WorldWideScience

Sample records for upstream mobility scheme

  1. ESCAP mobile training scheme.

    Science.gov (United States)

    Yasas, F M

    1977-01-01

    In response to a United Nations resolution, the Mobile Training Scheme (MTS) was set up to provide training to the trainers of national cadres engaged in frontline and supervisory tasks in social welfare and rural development. The training is innovative in its being based on an analysis of field realities. The MTS team consisted of a leader, an expert on teaching methods and materials, and an expert on action research and evaluation. The country's trainers from different departments were sent to villages to work for a short period and to report their problems in fulfilling their roles. From these grass roots experiences, they made an analysis of the job, determining what knowledge, attitude and skills it required. Analysis of daily incidents and problems were used to produce indigenous teaching materials drawn from actual field practice. How to consider the problems encountered through government structures for policy making and decisions was also learned. Tasks of the students were to identify the skills needed for role performance by job analysis, daily diaries and project histories; to analyze the particular community by village profiles; to produce indigenous teaching materials; and to practice the role skills by actual role performance. The MTS scheme was tried in Nepal in 1974-75; 3 training programs trained 25 trainers and 51 frontline workers; indigenous teaching materials were created; technical papers written; and consultations were provided. In Afghanistan the scheme was used in 1975-76; 45 participants completed the training; seminars were held; and an ongoing Council was created. It is hoped that the training program will be expanded to other countries.

  2. Willingness of upstream and downstream resource managers to engage in compensation schemes for environmental services

    Directory of Open Access Journals (Sweden)

    Chapika Sangkapitux

    2009-04-01

    Full Text Available Providing compensation for agricultural conservation practices adopted by upstream farmers is still an alien concept in the Thai political context. The governance of common-pool natural resources, such as forest and water, has traditionally been under the control of powerful government line agencies, while the contribution of local communities to natural resource conservation have been hardly recognized by policy-makers. Drawing on a case study in Mae Sa watershed, Chiang Mai province, northern Thailand, this paper discusses the potential of developing compensation schemes in a socio-political context where upland farmers – mostly belonging to ethnic minority groups – tend to be considered a threat to the natural resource base rather than providers of environmental services. Based on data obtained from 371 households in the upstream communities and 151 households in the downstream communities of the watershed, upstream resource managers’ willingness to accept compensation for the conservation measures and downstream resource managers’ willingness to pay for water resource improvements were estimated through the use of choice experiments. Results from the study suggest that downstream resource managers would be willing to provide on average nearly 1% of their annual income for a substantial improvement of the quantity and quality of water resources, which could be achieved by compensating upstream farmers’ change of their agricultural systems towards more environment-friendly practices. Both willingness to pay of downstream respondents and willingness of upstream resource managers to accept compensation were positively correlated with age, education, participation in environmental conservation activities and previous experiences with droughts and/or erosion. The paper concludes that there is a clear potential for establishing compensation schemes for provision of environmental services in northern Thai watersheds. The important policy

  3. Scalable Fault-Tolerant Location Management Scheme for Mobile IP

    Directory of Open Access Journals (Sweden)

    JinHo Ahn

    2001-11-01

    Full Text Available As the number of mobile nodes registering with a network rapidly increases in Mobile IP, multiple mobility (home of foreign agents can be allocated to a network in order to improve performance and availability. Previous fault tolerant schemes (denoted by PRT schemes to mask failures of the mobility agents use passive replication techniques. However, they result in high failure-free latency during registration process if the number of mobility agents in the same network increases, and force each mobility agent to manage bindings of all the mobile nodes registering with its network. In this paper, we present a new fault-tolerant scheme (denoted by CML scheme using checkpointing and message logging techniques. The CML scheme achieves low failure-free latency even if the number of mobility agents in a network increases, and improves scalability to a large number of mobile nodes registering with each network compared with the PRT schemes. Additionally, the CML scheme allows each failed mobility agent to recover bindings of the mobile nodes registering with the mobility agent when it is repaired even if all the other mobility agents in the same network concurrently fail.

  4. AN AGENT BASED TRANSACTION PROCESSING SCHEME FOR DISCONNECTED MOBILE NODES

    Directory of Open Access Journals (Sweden)

    J.L. Walter Jeyakumar

    2010-12-01

    Full Text Available We present a mobile transaction framework in which mobile users can share data which is stored in the cache of a mobile agent. This mobile agent is a special mobile node which coordinates the sharing process. The proposed framework allows mobile affiliation work groups to be formed dynamically with a mobile agent and mobile hosts. Using short range wireless communication technology, mobile users can simultaneously access the data from the cache of the mobile agent. The data Access Manager module at the mobile agent enforces concurrency control using cache invalidation technique. This model supports disconnected mobile computing allowing mobile agent to move along with the Mobile Hosts. The proposed Transaction frame work has been simulated in Java 2 and performance of this scheme is compared with existing frame works.

  5. A scheme for regulating toxic substances to water quality of Chamsil upstream water system

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Kang Suk; Kim, Jee Hoon [Korea Environment Institute, Seoul (Korea)

    1998-12-01

    This study asserts to reflect a concept of toxicity thoroughly in the present water quality concept. It presents an appropriate solution to control toxic substances flowing into the Chamsil upstream water system. Although a regulation of toxic substances into major rivers in Korea other than Han river is also required urgently, it will be studied in future. It is expected that this study on Chamsil upstream would be a cornerstone for establishing a national regulation policy of toxic substances into water system. 28 refs., 1 fig., 36 tabs.

  6. Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks

    Directory of Open Access Journals (Sweden)

    Jun-Sub Kim

    2013-01-01

    Full Text Available In 2012, Mun et al. pointed out that Wu et al.’s scheme failed to achieve user anonymity and perfect forward secrecy and disclosed the passwords of legitimate users. And they proposed a new enhancement for anonymous authentication scheme. However, their proposed scheme has vulnerabilities that are susceptible to replay attack and man-in-the-middle attack. It also incurs a high overhead in the database. In this paper, we examine the vulnerabilities in the existing schemes and the computational overhead incurred in the database. We then propose a secure and efficient anonymous authentication scheme for roaming service in global mobility network. Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'s scheme.

  7. A Transactional Asynchronous Replication Scheme for Mobile Database Systems

    Institute of Scientific and Technical Information of China (English)

    丁治明; 孟小峰; 王珊

    2002-01-01

    In mobile database systems, mobility of users has a significant impact on data replication. As a result, the various replica control protocols that exist today in traditional distributed and multidatabase environments are no longer suitable. To solve this problem, a new mobile database replication scheme, the Transaction-Level Result-Set Propagation (TLRSP)model, is put forward in this paper. The conflict detection and resolution strategy based on TLRSP is discussed in detail, and the implementation algorithm is proposed. In order to compare the performance of the TLRSP model with that of other mobile replication schemes, we have developed a detailed simulation model. Experimental results show that the TLRSP model provides an efficient support for replicated mobile database systems by reducing reprocessing overhead and maintaining database consistency.

  8. (LBA-and-WRM)-based DBA scheme for multi-wavelength upstream transmission supporting 10 Gbps and 1 Gbps in MAN

    Science.gov (United States)

    Zhang, Yuchao; Gan, Chaoqin; Gou, Kaiyu; Xu, Anni; Ma, Jiamin

    2018-01-01

    DBA scheme based on Load balance algorithm (LBA) and wavelength recycle mechanism (WRM) for multi-wavelength upstream transmission is proposed in this paper. According to 1 Gbps and 10 Gbps line rates, ONUs are grouped into different VPONs. To facilitate wavelength management, resource pool is proposed to record wavelength state. To realize quantitative analysis, a mathematical model describing metro-access network (MAN) environment is presented. To 10G-EPON upstream, load balance algorithm is designed to ensure load distribution fairness for 10G-OLTs. To 1G-EPON upstream, wavelength recycle mechanism is designed to share remained wavelengths. Finally, the effectiveness of the proposed scheme is demonstrated by simulation and analysis.

  9. A Remote User Authentication Scheme with Anonymity for Mobile Devices

    Directory of Open Access Journals (Sweden)

    Soobok Shin

    2012-04-01

    Full Text Available With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e-commerce. When a remote server provides such e-commerce services to a user, it must verify the legitimacy of the user over an insecure communication channel. Therefore, remote user authentication has been widely deployed to verify the legitimacy of remote user login requests using mobile devices like smart cards. In this paper we propose a smart card-based authentication scheme that provides both user anonymity and mutual authentication between a remote server and a user. The proposed authentication scheme is a simple and efficient system applicable to the limited resource and low computing performance of the smart card. The proposed scheme provides not only resilience to potential attacks in the smart card-based authentication scheme, but also secure authentication functions. A smart card performs a simple one-way hash function, the operations of exclusive-or and concatenation in the authentication phase of the proposed scheme. The proposed scheme also provides user anonymity using a dynamic identity and key agreement, and secure password change.

  10. Fast rerouting schemes for protected mobile IP over MPLS networks

    Science.gov (United States)

    Wen, Chih-Chao; Chang, Sheng-Yi; Chen, Huan; Chen, Kim-Joan

    2005-10-01

    Fast rerouting is a critical traffic engineering operation in the MPLS networks. To implement the Mobile IP service over the MPLS network, one can collaborate with the fast rerouting operation to enhance the availability and survivability. MPLS can protect critical LSP tunnel between Home Agent (HA) and Foreign Agent (FA) using the fast rerouting scheme. In this paper, we propose a simple but efficient algorithm to address the triangle routing problem for the Mobile IP over the MPLS networks. We consider this routing issue as a link weighting and capacity assignment (LW-CA) problem. The derived solution is used to plan the fast restoration mechanism to protect the link or node failure. In this paper, we first model the LW-CA problem as a mixed integer optimization problem. Our goal is to minimize the call blocking probability on the most congested working truck for the mobile IP connections. Many existing network topologies are used to evaluate the performance of our scheme. Results show that our proposed scheme can obtain the best performance in terms of the smallest blocking probability compared to other schemes.

  11. Sensor proxy mobile IPv6 (SPMIPv6)--a novel scheme for mobility supported IP-WSNs.

    Science.gov (United States)

    Islam, Md Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly.

  12. Handover Based IMS Registration Scheme for Next Generation Mobile Networks

    Directory of Open Access Journals (Sweden)

    Shireen Tahira

    2017-01-01

    Full Text Available Next generation mobile networks aim to provide faster speed and more capacity along with energy efficiency to support video streaming and massive data sharing in social and communication networks. In these networks, user equipment has to register with IP Multimedia Subsystem (IMS which promises quality of service to the mobile users that frequently move across different access networks. After each handover caused due to mobility, IMS provides IPSec Security Association establishment and authentication phases. The main issue is that unnecessary reregistration after every handover results in latency and communication overhead. To tackle these issues, this paper presents a lightweight Fast IMS Mobility (FIM registration scheme that avoids unnecessary conventional registration phases such as security associations, authentication, and authorization. FIM maintains a flag to avoid deregistration and sends a subsequent message to provide necessary parameters to IMS servers after mobility. It also handles the change of IP address for user equipment and transferring the security associations from old to new servers. We have validated the performance of FIM by developing a testbed consisting of IMS servers and user equipment. The experimental results demonstrate the performance supremacy of FIM. It reduces media disruption time, number of messages, and packet loss up to 67%, 100%, and 61%, respectively, as compared to preliminaries.

  13. Dynamic Symmetric Key Mobile Commerce Scheme Based on Self-Verified Mechanism

    Directory of Open Access Journals (Sweden)

    Jiachen Yang

    2014-01-01

    Full Text Available In terms of the security and efficiency of mobile e-commerce, the authors summarized the advantages and disadvantages of several related schemes, especially the self-verified mobile payment scheme based on the elliptic curve cryptosystem (ECC and then proposed a new type of dynamic symmetric key mobile commerce scheme based on self-verified mechanism. The authors analyzed the basic algorithm based on self-verified mechanisms and detailed the complete transaction process of the proposed scheme. The authors analyzed the payment scheme based on the security and high efficiency index. The analysis shows that the proposed scheme not only meets the high efficiency of mobile electronic payment premise, but also takes the security into account. The user confirmation mechanism at the end of the proposed scheme further strengthens the security of the proposed scheme. In brief, the proposed scheme is more efficient and practical than most of the existing schemes.

  14. A note on macro-financial implications of mobile money schemes

    OpenAIRE

    Mas, Ignacio; Klein, Michael

    2012-01-01

    Across the world mobile money schemes are being launched. In such schemes financial service providers interact with clients via mobile phones or other mobile devices such as tablets. Service offerings include payments and saving as well as basic insurance products and sometimes credit based on scoring methods that use information about the client’s payment history. The world of mobile money is still in the experimental stage. Some schemes like M-PESA in Kenya have, at least initially, been ru...

  15. Distributed Group-Based Mobility Management Scheme in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Moneeb Gohar

    2017-01-01

    Full Text Available For group-based mobility management in 6LoWPAN-based wireless body area networks (WBAN, some schemes using the Proxy Mobile IPv6 (PMIP have been proposed. However, the existing PMIP-based mobility schemes tend to induce large registration delay and handover delay. To overcome such limitations, we propose a new distributed group-based mobility management scheme, in which the Local Mobility Anchor (LMA function is implemented by each Mobile Access Gateway (MAG and the handover operation is performed between two neighboring MAGs without the help of LMA. Besides, each MAG maintains the information of the group of mobile sensors and aggregates the Authentication-Authorization-Accounting (AAA query messages for a group of mobile sensors as a “single” message to decrease the control overhead. By numerical analysis, it is shown that the proposed scheme can reduce the registration and handover delays, compared to the existing PMIP-based mobility schemes.

  16. Improvement Schemes for Indoor Mobile Location Estimation: A Survey

    Directory of Open Access Journals (Sweden)

    Jianga Shang

    2015-01-01

    Full Text Available Location estimation is significant in mobile and ubiquitous computing systems. The complexity and smaller scale of the indoor environment impose a great impact on location estimation. The key of location estimation lies in the representation and fusion of uncertain information from multiple sources. The improvement of location estimation is a complicated and comprehensive issue. A lot of research has been done to address this issue. However, existing research typically focuses on certain aspects of the problem and specific methods. This paper reviews mainstream schemes on improving indoor location estimation from multiple levels and perspectives by combining existing works and our own working experiences. Initially, we analyze the error sources of common indoor localization techniques and provide a multilayered conceptual framework of improvement schemes for location estimation. This is followed by a discussion of probabilistic methods for location estimation, including Bayes filters, Kalman filters, extended Kalman filters, sigma-point Kalman filters, particle filters, and hidden Markov models. Then, we investigate the hybrid localization methods, including multimodal fingerprinting, triangulation fusing multiple measurements, combination of wireless positioning with pedestrian dead reckoning (PDR, and cooperative localization. Next, we focus on the location determination approaches that fuse spatial contexts, namely, map matching, landmark fusion, and spatial model-aided methods. Finally, we present the directions for future research.

  17. A Scheme for Verification on Data Integrity in Mobile Multicloud Computing Environment

    Directory of Open Access Journals (Sweden)

    Laicheng Cao

    2016-01-01

    Full Text Available In order to verify the data integrity in mobile multicloud computing environment, a MMCDIV (mobile multicloud data integrity verification scheme is proposed. First, the computability and nondegeneracy of verification can be obtained by adopting BLS (Boneh-Lynn-Shacham short signature scheme. Second, communication overhead is reduced based on HVR (Homomorphic Verifiable Response with random masking and sMHT (sequence-enforced Merkle hash tree construction. Finally, considering the resource constraints of mobile devices, data integrity is verified by lightweight computing and low data transmission. The scheme improves shortage that mobile device communication and computing power are limited, it supports dynamic data operation in mobile multicloud environment, and data integrity can be verified without using direct source file block. Experimental results also demonstrate that this scheme can achieve a lower cost of computing and communications.

  18. A Comprehensive Study of Data Collection Schemes Using Mobile Sinks in Wireless Sensor Networks

    Science.gov (United States)

    Khan, Abdul Waheed; Abdullah, Abdul Hanan; Anisi, Mohammad Hossein; Bangash, Javed Iqbal

    2014-01-01

    Recently sink mobility has been exploited in numerous schemes to prolong the lifetime of wireless sensor networks (WSNs). Contrary to traditional WSNs where sensory data from sensor field is ultimately sent to a static sink, mobile sink-based approaches alleviate energy-holes issues thereby facilitating balanced energy consumption among nodes. In mobility scenarios, nodes need to keep track of the latest location of mobile sinks for data delivery. However, frequent propagation of sink topological updates undermines the energy conservation goal and therefore should be controlled. Furthermore, controlled propagation of sinks' topological updates affects the performance of routing strategies thereby increasing data delivery latency and reducing packet delivery ratios. This paper presents a taxonomy of various data collection/dissemination schemes that exploit sink mobility. Based on how sink mobility is exploited in the sensor field, we classify existing schemes into three classes, namely path constrained, path unconstrained, and controlled sink mobility-based schemes. We also organize existing schemes based on their primary goals and provide a comparative study to aid readers in selecting the appropriate scheme in accordance with their particular intended applications and network dynamics. Finally, we conclude our discussion with the identification of some unresolved issues in pursuit of data delivery to a mobile sink. PMID:24504107

  19. Design, Implementation, and Performance Evaluation of Efficient PMIPv6 Based Mobile Multicast Sender Support Schemes

    Directory of Open Access Journals (Sweden)

    Lili Wang

    2015-01-01

    Full Text Available Proxy Mobile IPv6 (PMIPv6 is proposed as a promising network-based mobility management protocol, which does not need any participation of mobile nodes. PMIPv6 does not support the multicast well and most of the current research concentrates on the mobile multicast receiver. However, the mobile multicast sender is also very important and challenging, which has not been addressed well. Therefore, in this paper we propose two efficient PMIPv6 based mobile multicast sender support schemes which are PMIP bidirectional tunneling (PMIP-BT and PMIP direct routing (PMIP-DR. In the PMIP-BT, the multicast traffic can be delivered through the PMIPv6 bidirectional tunnel, while, in the PMIP-DR, the multicast data can be transmitted via an optimized direct multicast routing. Both of them can support the multicast sender mobility transparently enabled in the PMIPv6 networks. We evaluate the performance of the proposed schemes by theoretical analysis, and the numerical results show that the proposed schemes have a better performance in terms of the signaling cost than the current schemes. Meanwhile, the proposed schemes are also implemented on the test bed, and the experimental results not only verify the validity and feasibility of our proposed schemes, but also conclude the different scenarios to which they are applicable.

  20. An Effective Collaborative Mobile Weighted Clustering Schemes for Energy Balancing in Wireless Sensor Networks.

    Science.gov (United States)

    Tang, Chengpei; Shokla, Sanesy Kumcr; Modhawar, George; Wang, Qiang

    2016-02-19

    Collaborative strategies for mobile sensor nodes ensure the efficiency and the robustness of data processing, while limiting the required communication bandwidth. In order to solve the problem of pipeline inspection and oil leakage monitoring, a collaborative weighted mobile sensing scheme is proposed. By adopting a weighted mobile sensing scheme, the adaptive collaborative clustering protocol can realize an even distribution of energy load among the mobile sensor nodes in each round, and make the best use of battery energy. A detailed theoretical analysis and experimental results revealed that the proposed protocol is an energy efficient collaborative strategy such that the sensor nodes can communicate with a fusion center and produce high power gain.

  1. LoWMob: Intra-PAN Mobility Support Schemes for 6LoWPAN

    Directory of Open Access Journals (Sweden)

    Seung-Wha Yoo

    2009-07-01

    Full Text Available Mobility in 6LoWPAN (IPv6 over Low Power Personal Area Networks is being utilized in realizing many applications where sensor nodes, while moving, sense and transmit the gathered data to a monitoring server. By employing IEEE802.15.4 as a baseline for the link layer technology, 6LoWPAN implies low data rate and low power consumption with periodic sleep and wakeups for sensor nodes, without requiring them to incorporate complex hardware. Also enabling sensor nodes with IPv6 ensures that the sensor data can be accessed anytime and anywhere from the world. Several existing mobility-related schemes like HMIPv6, MIPv6, HAWAII, and Cellular IP require active participation of mobile nodes in the mobility signaling, thus leading to the mobility-related changes in the protocol stack of mobile nodes. In this paper, we present LoWMob, which is a network-based mobility scheme for mobile 6LoWPAN nodes in which the mobility of 6LoWPAN nodes is handled at the network-side. LoWMob ensures multi-hop communication between gateways and mobile nodes with the help of the static nodes within a 6LoWPAN. In order to reduce the signaling overhead of static nodes for supporting mobile nodes, LoWMob proposes a mobility support packet format at the adaptation layer of 6LoWPAN. Also we present a distributed version of LoWMob, named as DLoWMob (or Distributed LoWMob, which employs Mobility Support Points (MSPs to distribute the traffic concentration at the gateways and to optimize the multi-hop routing path between source and destination nodes in a 6LoWPAN. Moreover, we have also discussed the security considerations for our proposed mobility schemes. The performance of our proposed schemes is evaluated in terms of mobility signaling costs, end-to-end delay, and packet success ratio.

  2. LoWMob: Intra-PAN Mobility Support Schemes for 6LoWPAN.

    Science.gov (United States)

    Bag, Gargi; Raza, Muhammad Taqi; Kim, Ki-Hyung; Yoo, Seung-Wha

    2009-01-01

    Mobility in 6LoWPAN (IPv6 over Low Power Personal Area Networks) is being utilized in realizing many applications where sensor nodes, while moving, sense and transmit the gathered data to a monitoring server. By employing IEEE802.15.4 as a baseline for the link layer technology, 6LoWPAN implies low data rate and low power consumption with periodic sleep and wakeups for sensor nodes, without requiring them to incorporate complex hardware. Also enabling sensor nodes with IPv6 ensures that the sensor data can be accessed anytime and anywhere from the world. Several existing mobility-related schemes like HMIPv6, MIPv6, HAWAII, and Cellular IP require active participation of mobile nodes in the mobility signaling, thus leading to the mobility-related changes in the protocol stack of mobile nodes. In this paper, we present LoWMob, which is a network-based mobility scheme for mobile 6LoWPAN nodes in which the mobility of 6LoWPAN nodes is handled at the network-side. LoWMob ensures multi-hop communication between gateways and mobile nodes with the help of the static nodes within a 6LoWPAN. In order to reduce the signaling overhead of static nodes for supporting mobile nodes, LoWMob proposes a mobility support packet format at the adaptation layer of 6LoWPAN. Also we present a distributed version of LoWMob, named as DLoWMob (or Distributed LoWMob), which employs Mobility Support Points (MSPs) to distribute the traffic concentration at the gateways and to optimize the multi-hop routing path between source and destination nodes in a 6LoWPAN. Moreover, we have also discussed the security considerations for our proposed mobility schemes. The performance of our proposed schemes is evaluated in terms of mobility signaling costs, end-to-end delay, and packet success ratio.

  3. A Novel Cache Invalidation Scheme for Mobile Networks

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    In this paper, we propose a strategy of maintaining cache consistency in wireless mobile environments, which adds a validation server (VS) into the GPRS network, utilizes the location information of mobile terminal in SGSN located at GPRS backbone, just sends invalidation information to mobile terminal which is online in accordance with the cached data, and reduces the information amount in asynchronous transmission. This strategy enables mobile terminal to access cached data with very little computing amount, little delay and arbitrary disconnection intervals, and excels the synchronous IR and asynchronous state (AS) in the total performances.

  4. SMR-Based Adaptive Mobility Management Scheme in Hierarchical SIP Networks

    Directory of Open Access Journals (Sweden)

    KwangHee Choi

    2014-10-01

    Full Text Available In hierarchical SIP networks, paging is performed to reduce location update signaling cost for mobility management. However, the cost efficiency largely depends on each mobile node’s session-to-mobility-ratio (SMR, which is defined as a ratio of the session arrival rate to the movement rate. In this paper, we propose the adaptive mobility management scheme that can determine the policy regarding to each mobile node’s SMR. Each mobile node determines whether the paging is applied or not after comparing its SMR with the threshold. In other words, the paging is applied to a mobile node when a mobile node’s SMR is less than the threshold. Therefore, the proposed scheme provides a way to minimize signaling costs according to each mobile node’s SMR. We find out the optimal threshold through performance analysis, and show that the proposed scheme can reduce signaling cost than the existing SIP and paging schemes in hierarchical SIP networks.

  5. Cost-effective handoff scheme based on mobility-aware dual pointer forwarding in proxy mobile IPv6 networks.

    Science.gov (United States)

    Son, Seungsik; Jeong, Jongpil

    2014-01-01

    In this paper, a mobility-aware Dual Pointer Forwarding scheme (mDPF) is applied in Proxy Mobile IPv6 (PMIPv6) networks. The movement of a Mobile Node (MN) is classified as intra-domain and inter-domain handoff. When the MN moves, this scheme can reduce the high signaling overhead for intra-handoff/inter-handoff, because the Local Mobility Anchor (LMA) and Mobile Access Gateway (MAG) are connected by pointer chains. In other words, a handoff is aware of low mobility between the previously attached MAG (pMAG) and newly attached MAG (nMAG), and another handoff between the previously attached LMA (pLMA) and newly attached LMA (nLMA) is aware of high mobility. Based on these mobility-aware binding updates, the overhead of the packet delivery can be reduced. Also, we analyse the binding update cost and packet delivery cost for route optimization, based on the mathematical analytic model. Analytical results show that our mDPF outperforms the PMIPv6 and the other pointer forwarding schemes, in terms of reducing the total cost of signaling.

  6. Sensor Proxy Mobile IPv6 (SPMIPv6)—A Novel Scheme for Mobility Supported IP-WSNs

    Science.gov (United States)

    Islam, Md. Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly. PMID:22319386

  7. Sensor Proxy Mobile IPv6 (SPMIPv6—A Novel Scheme for Mobility Supported IP-WSNs

    Directory of Open Access Journals (Sweden)

    Md. Motaharul Islam

    2011-02-01

    Full Text Available IP based Wireless Sensor Networks (IP-WSNs are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6. We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly.

  8. Enhanced Security and Pairing-free Handover Authentication Scheme for Mobile Wireless Networks

    Science.gov (United States)

    Chen, Rui; Shu, Guangqiang; Chen, Peng; Zhang, Lijun

    2017-10-01

    With the widely deployment of mobile wireless networks, we aim to propose a secure and seamless handover authentication scheme that allows users to roam freely in wireless networks without worrying about security and privacy issues. Given the open characteristic of wireless networks, safety and efficiency should be considered seriously. Several previous protocols are designed based on a bilinear pairing mapping, which is time-consuming and inefficient work, as well as unsuitable for practical situations. To address these issues, we designed a new pairing-free handover authentication scheme for mobile wireless networks. This scheme is an effective improvement of the protocol by Xu et al., which is suffer from the mobile node impersonation attack. Security analysis and simulation experiment indicate that the proposed protocol has many excellent security properties when compared with other recent similar handover schemes, such as mutual authentication and resistance to known network threats, as well as requiring lower computation and communication cost.

  9. A Sentiment Delivering Estimate Scheme Based on Trust Chain in Mobile Social Network

    Directory of Open Access Journals (Sweden)

    Meizi Li

    2015-01-01

    Full Text Available User sentiment analysis has become a flourishing frontier in data mining mobile social network platform since the mobile social network plays a significant role in users’ daily communication and sentiment interaction. This study studies the scheme of sentiment estimate by using the users’ trustworthy relationships for evaluating sentiment delivering. First, we address an overview of sentiment delivering estimate scheme and propose its related definitions, that is, trust chain among users, sentiment semantics, and sentiment ontology. Second, this study proposes the trust chain model and its evaluation method, which is composed of evaluation of atomic, serial, parallel, and combined trust chains. Then, we propose sentiment modeling method by presenting its modeling rules. Further, we propose the sentiment delivering estimate scheme from two aspects: explicit and implicit sentiment delivering estimate schemes, based on trust chain and sentiment modeling method. Finally, examinations and results are given to further explain effectiveness and feasibility of our scheme.

  10. Adaptive guard channel allocation scheme with buffer for mobile ...

    African Journals Online (AJOL)

    The devastating effect congestion has on the quality of service delivery and overall network performance demands an utmost attention. This certainly calls for taking some expedient measures to deal with congestion so as to salvage the network from total collapse. In this paper, an adaptive guard channel allocation scheme ...

  11. Modeling and performance analysis of an improved movement-based location management scheme for packet-switched mobile communication systems.

    Science.gov (United States)

    Chung, Yun Won; Kwon, Jae Kyun; Park, Suwon

    2014-01-01

    One of the key technologies to support mobility of mobile station (MS) in mobile communication systems is location management which consists of location update and paging. In this paper, an improved movement-based location management scheme with two movement thresholds is proposed, considering bursty data traffic characteristics of packet-switched (PS) services. The analytical modeling for location update and paging signaling loads of the proposed scheme is developed thoroughly and the performance of the proposed scheme is compared with that of the conventional scheme. We show that the proposed scheme outperforms the conventional scheme in terms of total signaling load with an appropriate selection of movement thresholds.

  12. LPTA: Location Predictive and Time Adaptive Data Gathering Scheme with Mobile Sink for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chuan Zhu

    2014-01-01

    Full Text Available This paper exploits sink mobility to prolong the lifetime of sensor networks while maintaining the data transmission delay relatively low. A location predictive and time adaptive data gathering scheme is proposed. In this paper, we introduce a sink location prediction principle based on loose time synchronization and deduce the time-location formulas of the mobile sink. According to local clocks and the time-location formulas of the mobile sink, nodes in the network are able to calculate the current location of the mobile sink accurately and route data packets timely toward the mobile sink by multihop relay. Considering that data packets generating from different areas may be different greatly, an adaptive dwelling time adjustment method is also proposed to balance energy consumption among nodes in the network. Simulation results show that our data gathering scheme enables data routing with less data transmission time delay and balance energy consumption among nodes.

  13. LPTA: location predictive and time adaptive data gathering scheme with mobile sink for wireless sensor networks.

    Science.gov (United States)

    Zhu, Chuan; Wang, Yao; Han, Guangjie; Rodrigues, Joel J P C; Lloret, Jaime

    2014-01-01

    This paper exploits sink mobility to prolong the lifetime of sensor networks while maintaining the data transmission delay relatively low. A location predictive and time adaptive data gathering scheme is proposed. In this paper, we introduce a sink location prediction principle based on loose time synchronization and deduce the time-location formulas of the mobile sink. According to local clocks and the time-location formulas of the mobile sink, nodes in the network are able to calculate the current location of the mobile sink accurately and route data packets timely toward the mobile sink by multihop relay. Considering that data packets generating from different areas may be different greatly, an adaptive dwelling time adjustment method is also proposed to balance energy consumption among nodes in the network. Simulation results show that our data gathering scheme enables data routing with less data transmission time delay and balance energy consumption among nodes.

  14. ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6

    Science.gov (United States)

    You, Ilsun; Lee, Jong-Hyouk; Sakurai, Kouichi; Hori, Yoshiaki

    Fast Handover for Hierarchical Mobile IPv6 (F-HMIPv6) that combines advantages of Fast Handover for Mobile IPv6 (FMIPv6) and Hierarchical Mobile IPv6 (HMIPv6) achieves the superior performance in terms of handover latency and signaling overhead compared with previously developed mobility protocols. However, without being secured, F-HMIPv6 is vulnerable to various security threats. In 2007, Kang and Park proposed a security scheme, which is seamlessly integrated into F-HMIPv6. In this paper, we reveal that Kang-Park's scheme cannot defend against the Denial of Service (DoS) and redirect attacks while largely relying on the group key. Then, we propose an Enhanced Security Scheme for F-HMIPv6 (ESS-FH) that achieves the strong key exchange and the key independence as well as addresses the weaknesses of Kang-Park's scheme. More importantly, it enables fast handover between different MAP domains. The proposed scheme is formally verified based on BAN-logic, and its handover latency is analyzed and compared with that of Kang-Park's scheme.

  15. The evaluation of interblock mobility using a modified midpoint weighting scheme

    Energy Technology Data Exchange (ETDEWEB)

    Ito, Y

    1981-01-01

    A modified midpoint weighting scheme is a technique which can be used for increasing the accuracy and stability of finite difference numerical simulations. Generally, if midpoint weighting is used to evaluate the transmissibility at an interface between adjacent blocks in an oil reservoir, explicit methods may not produce the correct solution and implicit methods may lead to an oscillatory behavior. Reasons for this behavior have been investigated and it has been found that these problems occur because of numerical limitations during accumulation of the displacing fluid within the upstream block. A proposed modified version of midpoint weighting appears to eliminate this problem and several linear displacement test runs have indicated that the local truncation errors are comparable to those in the two-point upsteam scheme the use of which is constrained due to its assymetric charcter. The results were also compared to the single-point upsteam scheme the use of which is constrained due to its assymetric character. The results were also compared to the singlepoint upstream weighting method and it was found that the modified midpoint weighting scheme allowed the use of a coarser grid while maintaining similar accuracy. An additional advantage to this new technique is that it can also be used in an implicit formulation. 8 refs., 11 figs.

  16. Sleep Scheduling Schemes Based on Location of Mobile User in Sensor-Cloud

    OpenAIRE

    N. Mahendran; R. Priya

    2016-01-01

    The mobile cloud computing (MCC) with wireless sensor networks (WSNs) technology gets more attraction by research scholars because its combines the sensors data gathering ability with the cloud data processing capacity. This approach overcomes the limitation of data storage capacity and computational ability of sensor nodes. Finally, the stored data are sent to the mobile users when the user sends the request. The most of the integrated sensor-cloud schemes fail to observe the following crite...

  17. Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data †

    Science.gov (United States)

    Xie, Qingqing; Wang, Liangmin

    2016-01-01

    With the wide use of mobile sensing application, more and more location-embedded data are collected and stored in mobile clouds, such as iCloud, Samsung cloud, etc. Using these data, the cloud service provider (CSP) can provide location-based service (LBS) for users. However, the mobile cloud is untrustworthy. The privacy concerns force the sensitive locations to be stored on the mobile cloud in an encrypted form. However, this brings a great challenge to utilize these data to provide efficient LBS. To solve this problem, we propose a privacy-preserving LBS scheme for mobile sensing data, based on the RSA (for Rivest, Shamir and Adleman) algorithm and ciphertext policy attribute-based encryption (CP-ABE) scheme. The mobile cloud can perform location distance computing and comparison efficiently for authorized users, without location privacy leakage. In the end, theoretical security analysis and experimental evaluation demonstrate that our scheme is secure against the chosen plaintext attack (CPA) and efficient enough for practical applications in terms of user side computation overhead. PMID:27897984

  18. Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data

    Directory of Open Access Journals (Sweden)

    Qingqing Xie

    2016-11-01

    Full Text Available With the wide use of mobile sensing application, more and more location-embedded data are collected and stored in mobile clouds, such as iCloud, Samsung cloud, etc. Using these data, the cloud service provider (CSP can provide location-based service (LBS for users. However, the mobile cloud is untrustworthy. The privacy concerns force the sensitive locations to be stored on the mobile cloud in an encrypted form. However, this brings a great challenge to utilize these data to provide efficient LBS. To solve this problem, we propose a privacy-preserving LBS scheme for mobile sensing data, based on the RSA (for Rivest, Shamir and Adleman algorithm and ciphertext policy attribute-based encryption (CP-ABE scheme. The mobile cloud can perform location distance computing and comparison efficiently for authorized users, without location privacy leakage. In the end, theoretical security analysis and experimental evaluation demonstrate that our scheme is secure against the chosen plaintext attack (CPA and efficient enough for practical applications in terms of user side computation overhead.

  19. Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data.

    Science.gov (United States)

    Xie, Qingqing; Wang, Liangmin

    2016-11-25

    With the wide use of mobile sensing application, more and more location-embedded data are collected and stored in mobile clouds, such as iCloud, Samsung cloud, etc. Using these data, the cloud service provider (CSP) can provide location-based service (LBS) for users. However, the mobile cloud is untrustworthy. The privacy concerns force the sensitive locations to be stored on the mobile cloud in an encrypted form. However, this brings a great challenge to utilize these data to provide efficient LBS. To solve this problem, we propose a privacy-preserving LBS scheme for mobile sensing data, based on the RSA (for Rivest, Shamir and Adleman) algorithm and ciphertext policy attribute-based encryption (CP-ABE) scheme. The mobile cloud can perform location distance computing and comparison efficiently for authorized users, without location privacy leakage. In the end, theoretical security analysis and experimental evaluation demonstrate that our scheme is secure against the chosen plaintext attack (CPA) and efficient enough for practical applications in terms of user side computation overhead.

  20. Quality of service management efficient scheme for the universal mobile telecommunications system

    Directory of Open Access Journals (Sweden)

    E. Zaleta–Alejandre

    2008-04-01

    Full Text Available This research work proposes a new Radio Resource Management (RRM scheme in order to accomplish the Quality of Service (QoS management for the Universal Mobile Telecommunications System (UMTS. The solution is based on UMTS standardization and a performance evaluation is presented to demonstrate its efficiency.

  1. A Novel WLAN Roaming Decision and Selection Scheme for Mobile Data Offloading

    Directory of Open Access Journals (Sweden)

    Nam Nguyen

    2015-01-01

    Full Text Available The existing IEEE and 3GPP standards have laid the foundation for integrating cellular and WiFi network to deliver a seamless experience for the end-users when roaming across multiple access networks. However, in recent studies, the issue of making roaming decision and intelligently selecting the most preferable Point of Service to optimize network resource and improve end user’s experience has not been considered properly. In this paper, we propose a novel cellular and WiFi roaming decision and AP selection scheme based on state of the art, 3GPP TS24.312 and IEEE 802.11u, k standards. Our proposed scheme assists the mobile nodes to decide the right timing to make roaming decision and select preferable point of service based on the operator’s policies and real-time network condition. We also introduce our simulation model of a heterogeneous network with cellular and WiFi interworking as well as 3GPP ANDSF, TS24.312. It is a complete end-to-end system model from application to physical layer with considering user’s mobility and realistic traffic model. The proposed scheme outperformed the conventional WiFi selection scheme in terms of dynamically steering mobile node’s data traffic from macrocell to available Access Points. The proposed scheme increased the utilization and balanced the traffic load of access points and improved user’s experienced throughput.

  2. An Energy-aware Routing Scheme in Delay Tolerant Mobile Sensor Networking

    Directory of Open Access Journals (Sweden)

    Zhe Chen

    2014-08-01

    Full Text Available In Delay Tolerant Mobile Sensor Networking (DTMSN, mobile sensor nodes are usually limited to their energy capacity, one important concern in routing design of DTMSN is energy consumption. This paper presents a number of variations of the Epidemic Routing Protocol (ERP to extend the DTMSN lifetime. It introduces the analytical model for ERP, after introducing the concepts behind the Target Delivery Probability and Minimum Delivery Probability, it defines the network lifetime. In this paper, it firstly studies many variations of the Epidemic Routing Protocol to extend the lifetime of the DTMSN. Secondly, based on the Epidemic Routing Protocol, three schemes are introduced. Those schemes rely on the limiting the times of message allowed for propagation (LT scheme, directly controlling the number of the copies (LC scheme, split the copies to the residual energies of the nodes (LE scheme. Finally, with the experiment and the validation of the simulation, the LE scheme can significantly maximize the lifetime of DTMSN, because it minimizes the number of copies and that shifts the generation of the copies to the nodes with larger residual energy.

  3. DRO: domain-based route optimization scheme for nested mobile networks

    Directory of Open Access Journals (Sweden)

    Chuang Ming-Chin

    2011-01-01

    Full Text Available Abstract The network mobility (NEMO basic support protocol is designed to support NEMO management, and to ensure communication continuity between nodes in mobile networks. However, in nested mobile networks, NEMO suffers from the pinball routing problem, which results in long packet transmission delays. To solve the problem, we propose a domain-based route optimization (DRO scheme that incorporates a domain-based network architecture and ad hoc routing protocols for route optimization. DRO also improves the intra-domain handoff performance, reduces the convergence time during route optimization, and avoids the out-of-sequence packet problem. A detailed performance analysis and simulations were conducted to evaluate the scheme. The results demonstrate that DRO outperforms existing mechanisms in terms of packet transmission delay (i.e., better route-optimization, intra-domain handoff latency, convergence time, and packet tunneling overhead.

  4. HiCoDG: A Hierarchical Data-Gathering Scheme Using Cooperative Multiple Mobile Elements †

    Science.gov (United States)

    Van Le, Duc; Oh, Hoon; Yoon, Seokhoon

    2014-01-01

    In this paper, we study mobile element (ME)-based data-gathering schemes in wireless sensor networks. Due to the physical speed limits of mobile elements, the existing data-gathering schemes that use mobile elements can suffer from high data-gathering latency. In order to address this problem, this paper proposes a new hierarchical and cooperative data-gathering (HiCoDG) scheme that enables multiple mobile elements to cooperate with each other to collect and relay data. In HiCoDG, two types of mobile elements are used: the mobile collector (MC) and the mobile relay (MR). MCs collect data from sensors and forward them to the MR, which will deliver them to the sink. In this work, we also formulated an integer linear programming (ILP) optimization problem to find the optimal trajectories for MCs and the MR, such that the traveling distance of MEs is minimized. Two variants of HiCoDG, intermediate station (IS)-based and cooperative movement scheduling (CMS)-based, are proposed to facilitate cooperative data forwarding from MCs to the MR. An analytical model for estimating the average data-gathering latency in HiCoDG was also designed. Simulations were performed to compare the performance of the IS and CMS variants, as well as a multiple traveling salesman problem (mTSP)-based approach. The simulation results show that HiCoDG outperforms mTSP in terms of latency. The results also show that CMS can achieve the lowest latency with low energy consumption. PMID:25526356

  5. HiCoDG: a hierarchical data-gathering scheme using cooperative multiple mobile elements.

    Science.gov (United States)

    Van Le, Duc; Oh, Hoon; Yoon, Seokhoon

    2014-12-17

    In this paper, we study mobile element (ME)-based data-gathering schemes in wireless sensor networks. Due to the physical speed limits of mobile elements, the existing data-gathering schemes that use mobile elements can suffer from high data-gathering latency. In order to address this problem, this paper proposes a new hierarchical and cooperative data-gathering (HiCoDG) scheme that enables multiple mobile elements to cooperate with each other to collect and relay data. In HiCoDG, two types of mobile elements are used: the mobile collector (MC) and the mobile relay (MR). MCs collect data from sensors and forward them to the MR, which will deliver them to the sink. In this work, we also formulated an integer linear programming (ILP) optimization problem to find the optimal trajectories for MCs and the MR, such that the traveling distance of MEs is minimized. Two variants of HiCoDG, intermediate station (IS)-based and cooperative movement scheduling (CMS)-based, are proposed to facilitate cooperative data forwarding from MCs to the MR. An analytical model for estimating the average data-gathering latency in HiCoDG was also designed. Simulations were performed to compare the performance of the IS and CMS variants, as well as a multiple traveling salesman problem (mTSP)-based approach. The simulation results show that HiCoDG outperforms mTSP in terms of latency. The results also show that CMS can achieve the lowest latency with low energy consumption.

  6. Multiple Schemes for Mobile Payment Authentication Using QR Code and Visual Cryptography

    Directory of Open Access Journals (Sweden)

    Jianfeng Lu

    2017-01-01

    Full Text Available QR code (quick response code is used due to its beneficial properties, especially in the mobile payment field. However, there exists an inevitable risk in the transaction process. It is not easily perceived that the attacker tampers with or replaces the QR code that contains merchant’s beneficiary account. Thus, it is of great urgency to conduct authentication of QR code. In this study, we propose a novel mechanism based on visual cryptography scheme (VCS and aesthetic QR code, which contains three primary schemes for different concealment levels. The main steps of these schemes are as follows. Firstly, one original QR code is split into two shadows using VC multiple rules; secondly, the two shadows are embedded into the same background image, respectively, and the embedded results are fused with the same carrier QR code, respectively, using XOR mechanism of RS and QR code error correction mechanism. Finally, the two aesthetic QR codes can be stacked precisely and the original QR code is restored according to the defined VCS. Experiments corresponding to three proposed schemes are conducted and demonstrate the feasibility and security of the mobile payment authentication, the significant improvement of the concealment for the shadows in QR code, and the diversity of mobile payment authentication.

  7. CS-DRM: A Cloud-Based SIM DRM Scheme for Mobile Internet

    Directory of Open Access Journals (Sweden)

    Liu Zhang

    2011-01-01

    Full Text Available With the rapid development and growth of the mobile industry, a considerable amount of mobile applications and services are available, which involve Internet scale data collections. Meanwhile, it has a tremendous impact on digital content providers as well as the mobile industry that a large number of digital content have been pirated and illegally distributed. Digital Rights Management (DRM aims at protecting digital contents from being abused through regulating their usage. Unfortunately, to the best of our knowledge, fewer of these DRM schemes are concerned with the cost of the servers in a DRM system when the number of users scales up, and consider benefits of content providers who can be seen as tenants of a content server. In this paper, we propose CS-DRM, a cloud-based SIM DRM scheme, for the mobile Internet. The SIM card is introduced into CS-DRM to both reduce the cost and provide higher security. Also, the characteristics of cloud computing enable CS-DRM to bring benefits for content providers, and well satisfy the performance requirements with low cost when the number of users increases significantly. Furthermore, we have implemented a prototype of our DRM scheme, which demonstrates that CS-DRM is efficient, secure, and practicable.

  8. Gleer: A Novel Gini-Based Energy Balancing Scheme for Mobile Botnet Retopology

    Directory of Open Access Journals (Sweden)

    Yichuan Wang

    2018-01-01

    Full Text Available Mobile botnet has recently evolved due to the rapid growth of smartphone technologies. Unlike legacy botnets, mobile devices are characterized by limited power capacity, calculation capabilities, and wide communication methods. As such, the logical topology structure and communication mode have to be redesigned for mobile botnets to narrow energy gap and lower the reduction speed of nodes. In this paper, we try to design a novel Gini-based energy balancing scheme (Gleer for the atomic network, which is a fundamental component of the heterogeneous multilayer mobile botnet. Firstly, for each operation cycle, we utilize the dynamic energy threshold to categorize atomic network into two groups. Then, the Gini coefficient is introduced to estimate botnet energy gap and to regulate the probability for each node to be picked as a region C&C server. Experimental results indicate that our proposed method can effectively prolong the botnet lifetime and prevent the reduction of network size. Meanwhile, the stealthiness of botnet with Gleer scheme is analyzed from users’ perspective, and results show that the proposed scheme works well in the reduction of user’ detection awareness.

  9. Data Transmission Scheme Using Mobile Sink in Static Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Awais Ahmad

    2015-01-01

    Full Text Available Multihop communication in wireless sensor network (WSN brings new challenges in reliable data transmission. Recent work shows that data collection from sensor nodes using mobile sink minimizes multihop data transmission and improves energy efficiency. However, due to continuous movements, mobile sink has limited communication time to collect data from sensor nodes, which results in rapid depletion of node’s energy. Therefore, we propose a data transmission scheme that addresses the aforementioned constraints. The proposed scheme first finds out the group based region on the basis of localization information of the sensor nodes and predefined trajectory information of a mobile sink. After determining the group region in the network, selection of master nodes is made. The master nodes directly transmit their data to the mobile sink upon its arrival at their group region through restricted flooding scheme. In addition, the agent node concept is introduced for swapping of the role of the master nodes in each group region. The master node when consuming energy up to a certain threshold, neighboring node with second highest residual energy is selected as an agent node. The mathematical analysis shows that the selection of agent node maximizes the throughput while minimizing transmission delay in the network.

  10. HiCoDG: A Hierarchical Data-Gathering Scheme Using Cooperative Multiple Mobile Elements

    Directory of Open Access Journals (Sweden)

    Duc Van Le

    2014-12-01

    Full Text Available In this paper, we study mobile element (ME-based data-gathering schemes in wireless sensor networks. Due to the physical speed limits of mobile elements, the existing data-gathering schemes that usemobile elements can suffer from high data-gathering latency. In order to address this problem, this paper proposes a new hierarchical and cooperative data-gathering (HiCoDG scheme that enables multiple mobile elements to cooperate with each other to collect and relay data. In HiCoDG, two types of mobile elements are used: the mobile collector (MC and the mobile relay (MR. MCs collect data from sensors and forward them to the MR, which will deliver them to the sink. In this work, we also formulated an integer linear programming (ILP optimization problem to find the optimal trajectories for MCs and the MR, such that the traveling distance of MEs is minimized. Two variants of HiCoDG, intermediate station (IS-based and cooperative movement scheduling (CMS-based, are proposed to facilitate cooperative data forwarding from MCs to theMR. An analytical model for estimating the average data-gathering latency in HiCoDG was also designed. Simulations were performed to compare the performance of the IS and CMS variants, as well as a multiple traveling salesman problem (mTSP-based approach. The simulation results show that HiCoDG outperformsmTSP in terms of latency. The results also show that CMS can achieve the lowest latency with low energy consumption.

  11. Effective Scheme of Channel Tracking and Estimation for Mobile WiMAX DL-PUSC System

    Directory of Open Access Journals (Sweden)

    Phuong Thi Thu Pham

    2010-01-01

    Full Text Available This paper introduces an effective joint scheme of channel estimation and tracking for downlink partial usage of subchannel (DL-PUSC mode of mobile WiMAX system. Based on the pilot pattern of this particular system, some channel estimation methods including conventional interpolations and a more favorable least-squares line fitting (LSLF technique are comparatively studied. Besides, channel estimation performance can be remarkably improved by taking advantage of channel tracking derived from the preamble symbol. System performances in terms of packet error rate (PER and user link throughput are investigated in various channels adopted from the well-known ITU models for mobile environments. Simulation results show a significant performance enhancement when the proposed joint scheme is utilized, at least 5 dB, compared to only commonly used channel estimation approaches.

  12. A new channel allocation scheme and performance optimizing for mobile multimedia wireless networks

    Institute of Scientific and Technical Information of China (English)

    ZHAO Fang-ming; JIANG Ling-ge; MA Ming-da

    2008-01-01

    A multimedia channel allocation scheme is proposed and studied in terms of the connection-level QoS. A new traffic model based on multidimensional Markov chain is developed considering the traffic charac-teristic of two special periods of time. And the pre-emptive priority strategies are used to classify real-time serv-ices and non-real-time services. Real-time service is given higher priority for its allowance to pre-empt channels used by non-real-time service. Considering the mobility of persons in a day, which affects the mobile user's den-sity, the simulation was conducted involving the two pre-emptive priority strategies. The result of some compari-sons shows the feasibility of the proposed scheme.

  13. A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Qiuhua Wang

    2017-02-01

    Full Text Available Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate.

  14. SDN-Based Mobile Data Offloading Scheme Using a Femtocell and WiFi Networks

    Directory of Open Access Journals (Sweden)

    Chang-Woo Ahn

    2017-01-01

    Full Text Available Because of the many applications running on smartphones, the load of mobile data traffic on cellular networks is increasing rapidly. A femtocell is a solution to increase the cellular network capacity and coverage. However, because it uses the same frequency bands as a macrocell, interference problems have prevented its widespread adoption. In this paper, we propose a scheme for traffic offloading between femtocells and WiFi networks utilizing software-defined networking (SDN technology. In the proposed offloading scheme, the SDN technology allows a terminal to maintain existing sessions after offloading through a centralized control of the SDN-based equipment. We also propose an offloading target selection scheme based on available bandwidth estimation and an association control mechanism to reduce the femtocell load while ensuring quality of service (QoS in terms of throughput. Experimental results on an actual testbed showed that the proposed offloading scheme provides seamless connectivity and reduces the femtocell load by up to 46% with the aid of the proposed target selection scheme, while ensuring QoS after offloading. We also observed that the proposed target selection scheme offloads 28% more traffic to WiFi networks compared to received signal strength indicator-based target selection in a low background traffic environment.

  15. A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks.

    Science.gov (United States)

    Wang, Qiuhua

    2017-02-04

    Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS) records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate.

  16. A comparative signaling cost analysis of Macro Mobility scheme in NEMO (MM-NEMO) with mobility management protocol

    Science.gov (United States)

    Islam, Shayla; Abdalla, Aisha H.; Habaebi, Mohamed H.; Latif, Suhaimi A.; Hassan, Wan H.; Hasan, Mohammad K.; Ramli, H. A. M.; Khalifa, Othman O.

    2013-12-01

    NEMO BSP is an upgraded addition to Mobile IPv6 (MIPv6). As MIPv6 and its enhancements (i.e. HMIPv6) possess some limitations like higher handoff latency, packet loss, NEMO BSP also faces all these shortcomings by inheritance. Network Mobility (NEMO) is involved to handle the movement of Mobile Router (MR) and it's Mobile Network Nodes (MNNs) during handoff. Hence it is essential to upgrade the performance of mobility management protocol to obtain continuous session connectivity with lower delay and packet loss in NEMO environment. The completion of handoff process in NEMO BSP usually takes longer period since MR needs to register its single primary care of address (CoA) with home network that may cause performance degradation of the applications running on Mobile Network Nodes. Moreover, when a change in point of attachment of the mobile network is accompanied by a sudden burst of signaling messages, "Signaling Storm" occurs which eventually results in temporary congestion, packet delays or even packet loss. This effect is particularly significant for wireless environment where a wireless link is not as steady as a wired link since bandwidth is relatively limited in wireless link. Hence, providing continuous Internet connection without any interruption through applying multihoming technique and route optimization mechanism in NEMO are becoming the center of attention to the current researchers. In this paper, we propose a handoff cost model to compare the signaling cost of MM-NEMO with NEMO Basic Support Protocol (NEMO BSP) and HMIPv6.The numerical results shows that the signaling cost for the MM-NEMO scheme is about 69.6 % less than the NEMO-BSP and HMIPv6.

  17. A comparative signaling cost analysis of Macro Mobility scheme in NEMO (MM-NEMO) with mobility management protocol

    International Nuclear Information System (INIS)

    Islam, Shayla; Abdalla, Aisha H; Habaebi, Mohamed H; Latif, Suhaimi A; Hassan, Wan H; Hasan, Mohammad K; Ramli, H A M; Khalifa, Othman O

    2013-01-01

    NEMO BSP is an upgraded addition to Mobile IPv6 (MIPv6). As MIPv6 and its enhancements (i.e. HMIPv6) possess some limitations like higher handoff latency, packet loss, NEMO BSP also faces all these shortcomings by inheritance. Network Mobility (NEMO) is involved to handle the movement of Mobile Router (MR) and it's Mobile Network Nodes (MNNs) during handoff. Hence it is essential to upgrade the performance of mobility management protocol to obtain continuous session connectivity with lower delay and packet loss in NEMO environment. The completion of handoff process in NEMO BSP usually takes longer period since MR needs to register its single primary care of address (CoA) with home network that may cause performance degradation of the applications running on Mobile Network Nodes. Moreover, when a change in point of attachment of the mobile network is accompanied by a sudden burst of signaling messages, ''Signaling Storm'' occurs which eventually results in temporary congestion, packet delays or even packet loss. This effect is particularly significant for wireless environment where a wireless link is not as steady as a wired link since bandwidth is relatively limited in wireless link. Hence, providing continuous Internet connection without any interruption through applying multihoming technique and route optimization mechanism in NEMO are becoming the center of attention to the current researchers. In this paper, we propose a handoff cost model to compare the signaling cost of MM-NEMO with NEMO Basic Support Protocol (NEMO BSP) and HMIPv6.The numerical results shows that the signaling cost for the MM-NEMO scheme is about 69.6 % less than the NEMO-BSP and HMIPv6

  18. A Novel Mobile Communications Authentication Scheme with Roaming Service and User Anonymity

    Directory of Open Access Journals (Sweden)

    Kai Chain

    2016-11-01

    Full Text Available Many novel, effective, and efficient applications and networking services are being developed for the Social Internet of Things. Recently, Li proposed a more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications. The security analysis and discussion of the agreement phase is sufficiently safe; however, an attacker can intercept the identity of a mobile user’s home agent in the authentication phase. By using this information, the attacker can mount distributed denial-of-service attacks in the roaming phase through replay attacks targeting the network’s foreign agent and mobile user’s home agent by using their corresponding session keys. Li’s method also has some shortcomings regarding anonymity that we aim to address. To overcome these issues, this study proposes an elliptic curve–based wireless roaming anonymous login method for the authentication phase. The problems faced in the roaming phase are resolved, and this approach provides balanced session key computation between senders and receivers. Burrows-Abadi-Needham logic (BAN-logic is used to verify the security of the proposed scheme. The proposed scheme affords good security, efficiency, and integrity and maintains anonymity.

  19. Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization in Mobile Ad Hoc Networks.

    Science.gov (United States)

    Robinson, Y Harold; Rajaram, M

    2015-01-01

    Mobile ad hoc network (MANET) is a collection of autonomous mobile nodes forming an ad hoc network without fixed infrastructure. Dynamic topology property of MANET may degrade the performance of the network. However, multipath selection is a great challenging task to improve the network lifetime. We proposed an energy-aware multipath routing scheme based on particle swarm optimization (EMPSO) that uses continuous time recurrent neural network (CTRNN) to solve optimization problems. CTRNN finds the optimal loop-free paths to solve link disjoint paths in a MANET. The CTRNN is used as an optimum path selection technique that produces a set of optimal paths between source and destination. In CTRNN, particle swarm optimization (PSO) method is primly used for training the RNN. The proposed scheme uses the reliability measures such as transmission cost, energy factor, and the optimal traffic ratio between source and destination to increase routing performance. In this scheme, optimal loop-free paths can be found using PSO to seek better link quality nodes in route discovery phase. PSO optimizes a problem by iteratively trying to get a better solution with regard to a measure of quality. The proposed scheme discovers multiple loop-free paths by using PSO technique.

  20. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ying Zhang

    2016-01-01

    Full Text Available In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  1. Key-Insulated Undetachable Digital Signature Scheme and Solution for Secure Mobile Agents in Electronic Commerce

    Directory of Open Access Journals (Sweden)

    Yang Shi

    2016-01-01

    Full Text Available Considering the security of both the customers’ hosts and the eShops’ servers, we introduce the idea of a key-insulated undetachable digital signature, enabling mobile agents to generate undetachable digital signatures on remote hosts with the key-insulated property of the original signer’s signing key. From the theoretical perspective, we provide the formal definition and security notion of a key-insulated undetachable digital signature. From the practical perspective, we propose a concrete scheme to secure mobile agents in electronic commerce. The scheme is mainly focused on protecting the signing key from leakage and preventing the misuse of the signature algorithm on malicious servers. Agents do not carry the signing key when they generate digital signatures on behalf of the original signer, so the key is protected on remote servers. Furthermore, if a hacker gains the signing key of the original signer, the hacker is still unable to forge a signature for any time period other than the key being accessed. In addition, the encrypted function is combined with the original signer’s requirement to prevent the misuse of signing algorithm. The scheme is constructed on gap Diffie–Hellman groups with provable security, and the performance testing indicates that the scheme is efficient.

  2. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks.

    Science.gov (United States)

    Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Jiang, Shengming; Chen, Wei

    2016-01-29

    In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS) should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN) in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH) algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  3. Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World

    Directory of Open Access Journals (Sweden)

    Jong Hyuk Park

    2016-10-01

    Full Text Available Long Term Evolution (LTE and Long Term Evolution-Advanced (LTE-A support a better data transmission service than 3G dose and are globally commercialized technologies in a cyber world that is essential for constructing a future mobile environment, since network traffics have exponentially increased as people have started to use more than just one mobile device. However, when User Equipment (UE is executing initial attach processes to access LTE networks, there is a vulnerability in which identification parameters like International Mobile Subscriber Identity (IMSI and Radio Network Temporary Identities (RNTI are transmitted as plain texts. It can threat various services that are commercialized therewith in a cyber world. Therefore, a security scheme is proposed in this paper where identification parameters can be securely transmitted and hidden in four cases where initial attach occurs between UE and Mobility Management Entity (MME. The proposed security scheme not only supports encrypted transmission of identification parameters but also mutual authentication between Evolved Node B (eNB and MME to make a secure cyber world. Additionally, performance analysis results using an OPNET simulator showed the satisfaction of the average delay rate that is specified in LTE standards.

  4. PS-CARA: Context-Aware Resource Allocation Scheme for Mobile Public Safety Networks

    Directory of Open Access Journals (Sweden)

    Zeeshan Kaleem

    2018-05-01

    Full Text Available The fifth-generation (5G communications systems are expecting to support users with diverse quality-of-service (QoS requirements. Beside these requirements, the task with utmost importance is to support the emergency communication services during natural or man-made disasters. Most of the conventional base stations are not properly functional during a disaster situation, so deployment of emergency base stations such as mobile personal cell (mPC is crucial. An mPC having moving capability can move in the disaster area to provide emergency communication services. However, mPC deployment causes severe co-channel interference to the users in its vicinity. The problem in the existing resource allocation schemes is its support for static environment, that does not fit well for mPC. So, a resource allocation scheme for mPC users is desired that can dynamically allocate resources based on users’ location and its connection establishment priority. In this paper, we propose a public safety users priority-based context-aware resource allocation (PS-CARA scheme for users sum-rate maximization in disaster environment. Simulations results demonstrate that the proposed PS-CARA scheme can increase the user average and edge rate around 10.3% and 32.8% , respectively because of context information availability and by prioritizing the public safety users. The simulation results ensure that call blocking probability is also reduced considerably under the PS-CARA scheme.

  5. Energy-Efficient Region Shift Scheme to Support Mobile Sink Group in Wireless Sensor Networks.

    Science.gov (United States)

    Yim, Yongbin; Kim, Kyong Hoon; Aldwairi, Monther; Kim, Ki-Il

    2017-12-30

    Mobile sink groups play crucial roles to perform their own missions in many wireless sensor network (WSN) applications. In order to support mobility of such sink groups, it is important to design a mechanism for effective discovery of the group in motion. However, earlier studies obtain group region information by periodic query. For that reason, the mechanism leads to significant signaling overhead due to frequent flooding for the query regardless of the group movement. Furthermore, the mechanism worsens the problem by the flooding in the whole expected area. To deal with this problem, we propose a novel mobile sink group support scheme with low communication cost, called Region-Shift-based Mobile Geocasting Protocol (RSMGP). In this study, we utilize the group mobility feature for which members of a group have joint motion patterns. Thus, we could trace group movement by shifting the region as much as partial members move out of the previous region. Furthermore, the region acquisition is only performed at the moment by just deviated members without collaboration of all members. Experimental results validate the improved signaling overhead of our study compared to the previous studies.

  6. An Adaptive Handover Prediction Scheme for Seamless Mobility Based Wireless Networks

    Directory of Open Access Journals (Sweden)

    Ali Safa Sadiq

    2014-01-01

    Full Text Available We propose an adaptive handover prediction (AHP scheme for seamless mobility based wireless networks. That is, the AHP scheme incorporates fuzzy logic with AP prediction process in order to lend cognitive capability to handover decision making. Selection metrics, including received signal strength, mobile node relative direction towards the access points in the vicinity, and access point load, are collected and considered inputs of the fuzzy decision making system in order to select the best preferable AP around WLANs. The obtained handover decision which is based on the calculated quality cost using fuzzy inference system is also based on adaptable coefficients instead of fixed coefficients. In other words, the mean and the standard deviation of the normalized network prediction metrics of fuzzy inference system, which are collected from available WLANs are obtained adaptively. Accordingly, they are applied as statistical information to adjust or adapt the coefficients of membership functions. In addition, we propose an adjustable weight vector concept for input metrics in order to cope with the continuous, unpredictable variation in their membership degrees. Furthermore, handover decisions are performed in each MN independently after knowing RSS, direction toward APs, and AP load. Finally, performance evaluation of the proposed scheme shows its superiority compared with representatives of the prediction approaches.

  7. Integrated data lookup and replication scheme in mobile ad hoc networks

    Science.gov (United States)

    Chen, Kai; Nahrstedt, Klara

    2001-11-01

    Accessing remote data is a challenging task in mobile ad hoc networks. Two problems have to be solved: (1) how to learn about available data in the network; and (2) how to access desired data even when the original copy of the data is unreachable. In this paper, we develop an integrated data lookup and replication scheme to solve these problems. In our scheme, a group of mobile nodes collectively host a set of data to improve data accessibility for all members of the group. They exchange data availability information by broadcasting advertising (ad) messages to the group using an adaptive sending rate policy. The ad messages are used by other nodes to derive a local data lookup table, and to reduce data redundancy within a connected group. Our data replication scheme predicts group partitioning based on each node's current location and movement patterns, and replicates data to other partitions before partitioning occurs. Our simulations show that data availability information can quickly propagate throughout the network, and that the successful data access ratio of each node is significantly improved.

  8. Design and Analysis of a Data Fusion Scheme in Mobile Wireless Sensor Networks Based on Multi-Protocol Mobile Agents

    Directory of Open Access Journals (Sweden)

    Chunxue Wu

    2017-11-01

    Full Text Available Sensors are increasingly used in mobile environments with wireless network connections. Multiple sensor types measure distinct aspects of the same event. Their measurements are then combined to produce integrated, reliable results. As the number of sensors in networks increases, low energy requirements and changing network connections complicate event detection and measurement. We present a data fusion scheme for use in mobile wireless sensor networks with high energy efficiency and low network delays, that still produces reliable results. In the first phase, we used a network simulation where mobile agents dynamically select the next hop migration node based on the stability parameter of the link, and perform the data fusion at the migration node. Agents use the fusion results to decide if it should return the fusion results to the processing center or continue to collect more data. In the second phase. The feasibility of data fusion at the node level is confirmed by an experimental design where fused data from color sensors show near-identical results to actual physical temperatures. These results are potentially important for new large-scale sensor network applications.

  9. Design and Analysis of a Data Fusion Scheme in Mobile Wireless Sensor Networks Based on Multi-Protocol Mobile Agents.

    Science.gov (United States)

    Wu, Chunxue; Wu, Wenliang; Wan, Caihua; Bekkering, Ernst; Xiong, Naixue

    2017-11-03

    Sensors are increasingly used in mobile environments with wireless network connections. Multiple sensor types measure distinct aspects of the same event. Their measurements are then combined to produce integrated, reliable results. As the number of sensors in networks increases, low energy requirements and changing network connections complicate event detection and measurement. We present a data fusion scheme for use in mobile wireless sensor networks with high energy efficiency and low network delays, that still produces reliable results. In the first phase, we used a network simulation where mobile agents dynamically select the next hop migration node based on the stability parameter of the link, and perform the data fusion at the migration node. Agents use the fusion results to decide if it should return the fusion results to the processing center or continue to collect more data. In the second phase. The feasibility of data fusion at the node level is confirmed by an experimental design where fused data from color sensors show near-identical results to actual physical temperatures. These results are potentially important for new large-scale sensor network applications.

  10. A Classification Scheme for Analyzing Mobile Apps Used to Prevent and Manage Disease in Late Life

    Science.gov (United States)

    Wang, Aiguo; Lu, Xin; Chen, Hongtu; Li, Changqun; Levkoff, Sue

    2014-01-01

    Background There are several mobile apps that offer tools for disease prevention and management among older adults, and promote health behaviors that could potentially reduce or delay the onset of disease. A classification scheme that categorizes apps could be useful to both older adult app users and app developers. Objective The objective of our study was to build and evaluate the effectiveness of a classification scheme that classifies mobile apps available for older adults in the “Health & Fitness” category of the iTunes App Store. Methods We constructed a classification scheme for mobile apps according to three dimensions: (1) the Precede-Proceed Model (PPM), which classifies mobile apps in terms of predisposing, enabling, and reinforcing factors for behavior change; (2) health care process, specifically prevention versus management of disease; and (3) health conditions, including physical health and mental health. Content analysis was conducted by the research team on health and fitness apps designed specifically for older adults, as well as those applicable to older adults, released during the months of June and August 2011 and August 2012. Face validity was assessed by a different group of individuals, who were not related to the study. A reliability analysis was conducted to confirm the accuracy of the coding scheme of the sample apps in this study. Results After applying sample inclusion and exclusion criteria, a total of 119 apps were included in the study sample, of which 26/119 (21.8%) were released in June 2011, 45/119 (37.8%) in August 2011, and 48/119 (40.3%) in August 2012. Face validity was determined by interviewing 11 people, who agreed that this scheme accurately reflected the nature of this application. The entire study sample was successfully coded, demonstrating satisfactory inter-rater reliability by two independent coders (95.8% initial concordance and 100% concordance after consensus was reached). The apps included in the study sample

  11. Observation Likelihood Model Design and Failure Recovery Scheme toward Reliable Localization of Mobile Robots

    Directory of Open Access Journals (Sweden)

    Chang-bae Moon

    2011-01-01

    Full Text Available Although there have been many researches on mobile robot localization, it is still difficult to obtain reliable localization performance in a human co-existing real environment. Reliability of localization is highly dependent upon developer's experiences because uncertainty is caused by a variety of reasons. We have developed a range sensor based integrated localization scheme for various indoor service robots. Through the experience, we found out that there are several significant experimental issues. In this paper, we provide useful solutions for following questions which are frequently faced with in practical applications: 1 How to design an observation likelihood model? 2 How to detect the localization failure? 3 How to recover from the localization failure? We present design guidelines of observation likelihood model. Localization failure detection and recovery schemes are presented by focusing on abrupt wheel slippage. Experiments were carried out in a typical office building environment. The proposed scheme to identify the localizer status is useful in practical environments. Moreover, the semi-global localization is a computationally efficient recovery scheme from localization failure. The results of experiments and analysis clearly present the usefulness of proposed solutions.

  12. Observation Likelihood Model Design and Failure Recovery Scheme Toward Reliable Localization of Mobile Robots

    Directory of Open Access Journals (Sweden)

    Chang-bae Moon

    2010-12-01

    Full Text Available Although there have been many researches on mobile robot localization, it is still difficult to obtain reliable localization performance in a human co-existing real environment. Reliability of localization is highly dependent upon developer's experiences because uncertainty is caused by a variety of reasons. We have developed a range sensor based integrated localization scheme for various indoor service robots. Through the experience, we found out that there are several significant experimental issues. In this paper, we provide useful solutions for following questions which are frequently faced with in practical applications: 1 How to design an observation likelihood model? 2 How to detect the localization failure? 3 How to recover from the localization failure? We present design guidelines of observation likelihood model. Localization failure detection and recovery schemes are presented by focusing on abrupt wheel slippage. Experiments were carried out in a typical office building environment. The proposed scheme to identify the localizer status is useful in practical environments. Moreover, the semi-global localization is a computationally efficient recovery scheme from localization failure. The results of experiments and analysis clearly present the usefulness of proposed solutions.

  13. A Novel Mobile Video Community Discovery Scheme Using Ontology-Based Semantical Interest Capture

    Directory of Open Access Journals (Sweden)

    Ruiling Zhang

    2016-01-01

    Full Text Available Leveraging network virtualization technologies, the community-based video systems rely on the measurement of common interests to define and steady relationship between community members, which promotes video sharing performance and improves scalability community structure. In this paper, we propose a novel mobile Video Community discovery scheme using ontology-based semantical interest capture (VCOSI. An ontology-based semantical extension approach is proposed, which describes video content and measures video similarity according to video key word selection methods. In order to reduce the calculation load of video similarity, VCOSI designs a prefix-filtering-based estimation algorithm to decrease energy consumption of mobile nodes. VCOSI further proposes a member relationship estimate method to construct scalable and resilient node communities, which promotes video sharing capacity of video systems with the flexible and economic community maintenance. Extensive tests show how VCOSI obtains better performance results in comparison with other state-of-the-art solutions.

  14. A Hybrid Scheme Based on Pipelining and Multitasking in Mobile Application Processors for Advanced Video Coding

    Directory of Open Access Journals (Sweden)

    Muhammad Asif

    2015-01-01

    Full Text Available One of the key requirements for mobile devices is to provide high-performance computing at lower power consumption. The processors used in these devices provide specific hardware resources to handle computationally intensive video processing and interactive graphical applications. Moreover, processors designed for low-power applications may introduce limitations on the availability and usage of resources, which present additional challenges to the system designers. Owing to the specific design of the JZ47x series of mobile application processors, a hybrid software-hardware implementation scheme for H.264/AVC encoder is proposed in this work. The proposed scheme distributes the encoding tasks among hardware and software modules. A series of optimization techniques are developed to speed up the memory access and data transferring among memories. Moreover, an efficient data reusage design is proposed for the deblock filter video processing unit to reduce the memory accesses. Furthermore, fine grained macroblock (MB level parallelism is effectively exploited and a pipelined approach is proposed for efficient utilization of hardware processing cores. Finally, based on parallelism in the proposed design, encoding tasks are distributed between two processing cores. Experiments show that the hybrid encoder is 12 times faster than a highly optimized sequential encoder due to proposed techniques.

  15. Cooperative Control of Mobile Sensor Networks for Environmental Monitoring: An Event-Triggered Finite-Time Control Scheme.

    Science.gov (United States)

    Lu, Qiang; Han, Qing-Long; Zhang, Botao; Liu, Dongliang; Liu, Shirong

    2017-12-01

    This paper deals with the problem of environmental monitoring by developing an event-triggered finite-time control scheme for mobile sensor networks. The proposed control scheme can be executed by each sensor node independently and consists of two parts: one part is a finite-time consensus algorithm while the other part is an event-triggered rule. The consensus algorithm is employed to enable the positions and velocities of sensor nodes to quickly track the position and velocity of a virtual leader in finite time. The event-triggered rule is used to reduce the updating frequency of controllers in order to save the computational resources of sensor nodes. Some stability conditions are derived for mobile sensor networks with the proposed control scheme under both a fixed communication topology and a switching communication topology. Finally, simulation results illustrate the effectiveness of the proposed control scheme for the problem of environmental monitoring.

  16. Implementation of a Low-Latency Contention-Free Geographical Routing Scheme for Mobile Cyber-Physical Systems

    KAUST Repository

    Bader, Ahmed

    2015-07-09

    Results and lessons learned from the implementation of a novel ultra low-latency geo-routing scheme are presented in this paper. The geo-routing scheme is intended for team-based mobile cyber-physical systems whereby a cluster of unmanned vehicles (robots) are deployed to accomplish a critical mission under human supervision. The contention-free nature of the developed scheme lends itself to jointly achieve lower latency and higher throughput. Implementation challenges are presented and corresponding resolutions are discussed herewith.

  17. An extra power saving scheme for prolonging lifetime of mobile handset in the 4G mobile networks.

    Science.gov (United States)

    Chen, Jenhui; Tarn, Woei-Hwa; Lee, Jiann-Der

    2014-01-01

    In the fourth generation or next generation networks, services of non-real-time variable bit rate (NRT-VBR) and best effort (BE) will dominate over 85% of the total traffic in the networks. In this paper, we study the power saving mechanism of NRT-VBR and BE services for mobile handsets (MHs) to prolong their battery lifetime (i.e., the sustained operation duration) in the fourth generation networks. Because the priority of NRT-VBR and BE is lower than that of real-time VBR (RT-VBR) or guaranteed bit rate (GBR) services, we investigate an extended sleep mode for lower priority services (e.g., NRT-VBR and BE) in an MH to conserve the energy. The extended sleep mode is used when the MH wakes up from the sleep mode but it cannot obtain the bandwidth from base station (BS). The proposed mechanism, named extra power saving scheme (EPSS), uses the M/M/k/k Markovian queuing model to estimate the extended sleep duration to let MHs conserve their battery energy when the networks traffic is congested. To study the performance of EPSS, an accurate analysis model of energy is presented and validated by taking a series of simulations. Numerical experiments show that EPSS can achieve 43% extra energy conservation at most when downlink resource is saturated. We conclude that the energy of MHs can be conserved further by applying EPSS when the traffic load is saturated. The effect of energy saving becomes more obvious when the portion of NRT-VBR and BE services is greater than that of RT-VBR and GBR services.

  18. Energy-Efficient Deadline-Aware Data-Gathering Scheme Using Multiple Mobile Data Collectors.

    Science.gov (United States)

    Dasgupta, Rumpa; Yoon, Seokhoon

    2017-04-01

    In wireless sensor networks, the data collected by sensors are usually forwarded to the sink through multi-hop forwarding. However, multi-hop forwarding can be inefficient due to the energy hole problem and high communications overhead. Moreover, when the monitored area is large and the number of sensors is small, sensors cannot send the data via multi-hop forwarding due to the lack of network connectivity. In order to address those problems of multi-hop forwarding, in this paper, we consider a data collection scheme that uses mobile data collectors (MDCs), which visit sensors and collect data from them. Due to the recent breakthroughs in wireless power transfer technology, MDCs can also be used to recharge the sensors to keep them from draining their energy. In MDC-based data-gathering schemes, a big challenge is how to find the MDCs' traveling paths in a balanced way, such that their energy consumption is minimized and the packet-delay constraint is satisfied. Therefore, in this paper, we aim at finding the MDCs' paths, taking energy efficiency and delay constraints into account. We first define an optimization problem, named the delay-constrained energy minimization (DCEM) problem, to find the paths for MDCs. An integer linear programming problem is formulated to find the optimal solution. We also propose a two-phase path-selection algorithm to efficiently solve the DCEM problem. Simulations are performed to compare the performance of the proposed algorithms with two heuristics algorithms for the vehicle routing problem under various scenarios. The simulation results show that the proposed algorithms can outperform existing algorithms in terms of energy efficiency and packet delay.

  19. STUDY OF PRESERVING PRIVACY IN MOBILE SOCIAL NETWORK BY PERSONALIZATION OF FINE GRAINED SPAM FILTERING SCHEME

    OpenAIRE

    S. B. GHATTE , A. B. RAJMANE

    2018-01-01

    Mobile social-networking is a social networking where people with similar interests connect to their social communities with a mobile device. Mobile users share various types of information, such as newsletters, advertisements, experiences, interests, opinions and personal content through their mobile devices. Because of Mobile social network (MSN) it is possible for mobile users to share information in the near area and makes their cyber–physical–social interaction easier.

  20. A new encoding scheme for visible light communications with applications to mobile connections

    Science.gov (United States)

    Benton, David M.; St. John Brittan, Paul

    2017-10-01

    A new, novel and unconventional encoding scheme called concurrent coding, has recently been demonstrated and shown to offer interesting features and benefits in comparison to conventional techniques, such as robustness against burst errors and improved efficiency of transmitted power. Free space optical communications can suffer particularly from issues of alignment which requires stable, fixed links to be established and beam wander which can interrupt communications. Concurrent coding has the potential to help ease these difficulties and enable mobile, flexible optical communications to be implemented through the use of a source encoding technique. This concept has been applied for the first time to optical communications where standard light emitting diodes (LEDs) have been used to transmit information encoded with concurrent coding. The technique successfully transmits and decodes data despite unpredictable interruptions to the transmission causing significant drop-outs to the detected signal. The technique also shows how it is possible to send a single block of data in isolation with no pre-synchronisation required between transmitter and receiver, and no specific synchronisation sequence appended to the transmission. Such systems are robust against interference - intentional or otherwise - as well as intermittent beam blockage.

  1. Joint Optimized CPU and Networking Control Scheme for Improved Energy Efficiency in Video Streaming on Mobile Devices

    Directory of Open Access Journals (Sweden)

    Sung-Woong Jo

    2017-01-01

    Full Text Available Video streaming service is one of the most popular applications for mobile users. However, mobile video streaming services consume a lot of energy, resulting in a reduced battery life. This is a critical problem that results in a degraded user’s quality of experience (QoE. Therefore, in this paper, a joint optimization scheme that controls both the central processing unit (CPU and wireless networking of the video streaming process for improved energy efficiency on mobile devices is proposed. For this purpose, the energy consumption of the network interface and CPU is analyzed, and based on the energy consumption profile a joint optimization problem is formulated to maximize the energy efficiency of the mobile device. The proposed algorithm adaptively adjusts the number of chunks to be downloaded and decoded in each packet. Simulation results show that the proposed algorithm can effectively improve the energy efficiency when compared with the existing algorithms.

  2. CAC DPLB MCN: A Distributed Load Balancing Scheme in Multimedia Mobile Cellular Networks

    Directory of Open Access Journals (Sweden)

    Sharma Abhijit

    2016-11-01

    Full Text Available The problem of non-uniform traffic demand in different cells of a cellular network may lead to a gross imbalance in the system performance. Thus, the users in hot cells may suffer from low throughput. In this paper, an effective and simple load balancing scheme CAC_DPLB_MCN is proposed that can effectively reduce the overall call blocking. This model considers dealing with multi-media traffic as well as time-varying geographical traffic distribution. The proposed scheme uses the concept of cell-tiering thereby creating fractional frequency reuse environment. A message exchange based distributed scheme instead of centralized one is used which help the proposed scheme be implemented in a multiple hot cell environment also. Furthermore, concept of dynamic pricing is used to serve the best interest of the users as well as for the service providers. The performance of the proposed scheme is compared with two other existing schemes in terms of call blocking probability and bandwidth utilization. Simulation results show that the proposed scheme can reduce the call blocking significantly in highly congested cell with highest bandwidth utilization. Use of dynamic pricing also makes the scheme useful to increase revenue of the service providers in contrast with compared schemes.

  3. An Efficient and Secure m-IPS Scheme of Mobile Devices for Human-Centric Computing

    OpenAIRE

    Jeong, Young-Sik; Lee, Jae Dong; Lee, Jeong-Bae; Jung, Jai-Jin; Park, Jong Hyuk

    2014-01-01

    Recent rapid developments in wireless and mobile IT technologies have led to their application in many real-life areas, such as disasters, home networks, mobile social networks, medical services, industry, schools, and the military. Business/work environments have become wire/wireless, integrated with wireless networks. Although the increase in the use of mobile devices that can use wireless networks increases work efficiency and provides greater convenience, wireless access to networks repre...

  4. Comparative Analysis of Mobility Management Schemes in a Low Earth Orbit Satellite Network

    National Research Council Canada - National Science Library

    Conkling, Stephen

    2000-01-01

    .... This resource must be used efficiently, and this involves reducing the management overhead. This thesis investigates one aspect of management overhead, the bandwidth cost associated with mobility...

  5. An Efficient and Secure m-IPS Scheme of Mobile Devices for Human-Centric Computing

    Directory of Open Access Journals (Sweden)

    Young-Sik Jeong

    2014-01-01

    Full Text Available Recent rapid developments in wireless and mobile IT technologies have led to their application in many real-life areas, such as disasters, home networks, mobile social networks, medical services, industry, schools, and the military. Business/work environments have become wire/wireless, integrated with wireless networks. Although the increase in the use of mobile devices that can use wireless networks increases work efficiency and provides greater convenience, wireless access to networks represents a security threat. Currently, wireless intrusion prevention systems (IPSs are used to prevent wireless security threats. However, these are not an ideal security measure for businesses that utilize mobile devices because they do not take account of temporal-spatial and role information factors. Therefore, in this paper, an efficient and secure mobile-IPS (m-IPS is proposed for businesses utilizing mobile devices in mobile environments for human-centric computing. The m-IPS system incorporates temporal-spatial awareness in human-centric computing with various mobile devices and checks users’ temporal spatial information, profiles, and role information to provide precise access control. And it also can extend application of m-IPS to the Internet of things (IoT, which is one of the important advanced technologies for supporting human-centric computing environment completely, for real ubiquitous field with mobile devices.

  6. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge

    Directory of Open Access Journals (Sweden)

    Le Xuan Hung

    2008-12-01

    Full Text Available For many sensor network applications such as military or homeland security, it is essential for users (sinks to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODEplus. It is a significant extension of our previous study in five aspects: (1 Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2 The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3 The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4 Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5 No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODEplus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully.

  7. Applicability of DUKPT Key Management Scheme to Cloud Wallet and other Mobile Payments

    OpenAIRE

    Saha, Amal; Sanyal, Sugata

    2014-01-01

    After discussing the concept of DUKPT based symmetric encryption key management (e.g., for 3DES) and definition of cloud or remote wallet, the paper analyses applicability of DUKPT to different use cases like mobile banking, NFC payment using EMV contactless card and mobile based EMV card emulation, web browser based transaction and cloud or remote wallet. Cloud wallet is an emerging payment method and is gaining momentum very fast. Anticipating that the wallet product managers and security s...

  8. On the Performance of Counter-Based Broadcast Scheme for Mobile ...

    African Journals Online (AJOL)

    Despite its simplicity, it can result in high redundant retransmission, contention and collision, a phenomenon collectively referred to as the broadcast storm problem. Counter-based broadcast scheme has been proposed to mitigate this inherent problem and it relies on counter threshold value for rebroadcast decision. Thus ...

  9. RLAM: A Dynamic and Efficient Reinforcement Learning-Based Adaptive Mapping Scheme in Mobile WiMAX Networks

    Directory of Open Access Journals (Sweden)

    M. Louta

    2014-01-01

    Full Text Available WiMAX (Worldwide Interoperability for Microwave Access constitutes a candidate networking technology towards the 4G vision realization. By adopting the Orthogonal Frequency Division Multiple Access (OFDMA technique, the latest IEEE 802.16x amendments manage to provide QoS-aware access services with full mobility support. A number of interesting scheduling and mapping schemes have been proposed in research literature. However, they neglect a considerable asset of the OFDMA-based wireless systems: the dynamic adjustment of the downlink-to-uplink width ratio. In order to fully exploit the supported mobile WiMAX features, we design, develop, and evaluate a rigorous adaptive model, which inherits its main aspects from the reinforcement learning field. The model proposed endeavours to efficiently determine the downlink-to-uplinkwidth ratio, on a frame-by-frame basis, taking into account both the downlink and uplink traffic in the Base Station (BS. Extensive evaluation results indicate that the model proposed succeeds in providing quite accurate estimations, keeping the average error rate below 15% with respect to the optimal sub-frame configurations. Additionally, it presents improved performance compared to other learning methods (e.g., learning automata and notable improvements compared to static schemes that maintain a fixed predefined ratio in terms of service ratio and resource utilization.

  10. Mobility as a Service : A Critical Review of Definitions, Assessments of Schemes, and Key Challenges

    NARCIS (Netherlands)

    Jittrapirom, Peraphan; Caiati, Valeria; Feneri, Anna-Maria; Ebrahimigharehbaghi, S.; Alonso González, M.J.; Sreekantan Nair, J.N.

    2017-01-01

    Mobility as a Service (MaaS) is a recent innovative transport concept, anticipated to induce significant changes in the current transport practices. However, there is ambiguity surrounding the concept; it is uncertain what are the core characteristics of MaaS and in which way they can be addressed.

  11. Performance of Multilevel Coding Schemes with Different Decoding Methods and Mapping Strategies in Mobile Fading Channels

    Institute of Scientific and Technical Information of China (English)

    YUAN Dongfeng; WANG Chengxiang; YAO Qi; CAO Zhigang

    2001-01-01

    Based on "capacity rule", the perfor-mance of multilevel coding (MLC) schemes with dif-ferent set partitioning strategies and decoding meth-ods in AWGN and Rayleigh fading channels is investi-gated, in which BCH codes are chosen as componentcodes and 8ASK modulation is used. Numerical re-sults indicate that MLC scheme with UP strategy canobtain optimal performance in AWGN channels andBP is the best mapping strategy for Rayleigh fadingchannels. BP strategy is of good robustness in bothkinds of channels to realize an optimum MLC system.Multistage decoding (MSD) is a sub-optimal decodingmethod of MLC for both channels. For Ungerboeckpartitioning (UP) and mixed partitioning (MP) strat-egy, MSD is strongly recommended to use for MLCsystem, while for BP strategy, PDL is suggested to useas a simple decoding method compared with MSD.

  12. COLLECTIVE ACTION AND COLLECTIVE SCHEME IN THE MOBILIZATION OF LEARNING CHEMISTRY ACCORDING TO VERGNAUD’S THEORY OF CONCEPTUAL FIELDS

    Directory of Open Access Journals (Sweden)

    Lucia Machado de Andrade

    2017-10-01

    Full Text Available This research’s aim was to analyze the mobilization in learning chemistry promoted by the collective action of three entrant students in higher education courses, in a college located in Santo André. For such, cognitive indicators mobilized by them while living individual and group situations on water’s boiling point, using Screencast video lessons as a motivational strategy, were analyzed. The fulfilment of these situations’ corresponding tasks was filmed, and the recordings were transcribed and analyzed with the help from the Transana software. The indicators used for the Discursive Textual Analysis were created by associating Vicente Talanquer’s Chemistry Knowledge Space to Gérard Vergnaud’s Theory of Conceptual Fields. The results displayed higher quantity and better quality to the indicators in situations with collective character, to the detriment to the ones with individual character. Thus, one might conclude that, under this research’s conditions, collective action, generated by a collective scheme, was capable of mobilizing the learning of chemistry.

  13. Upstream cash cloud

    International Nuclear Information System (INIS)

    Shepherd, R.

    1998-01-01

    This paper focuses on the effects of the slowdown in budgetary growth on the upstream business and offshore services. The dangers facing investors, the strong growth in energy demand, oil company priorities, the dip in profits of the oil companies, new field economics, the budgets for exploration and production, and the rig market outlook are discussed. (UK)

  14. An Efficient SDN Load Balancing Scheme Based on Variance Analysis for Massive Mobile Users

    Directory of Open Access Journals (Sweden)

    Hong Zhong

    2015-01-01

    Full Text Available In a traditional network, server load balancing is used to satisfy the demand for high data volumes. The technique requires large capital investment while offering poor scalability and flexibility, which difficultly supports highly dynamic workload demands from massive mobile users. To solve these problems, this paper analyses the principle of software-defined networking (SDN and presents a new probabilistic method of load balancing based on variance analysis. The method can be used to dynamically manage traffic flows for supporting massive mobile users in SDN networks. The paper proposes a solution using the OpenFlow virtual switching technology instead of the traditional hardware switching technology. A SDN controller monitors data traffic of each port by means of variance analysis and provides a probability-based selection algorithm to redirect traffic dynamically with the OpenFlow technology. Compared with the existing load balancing methods which were designed to support traditional networks, this solution has lower cost, higher reliability, and greater scalability which satisfy the needs of mobile users.

  15. An overview on real-time control schemes for wheeled mobile robot

    Science.gov (United States)

    Radzak, M. S. A.; Ali, M. A. H.; Sha’amri, S.; Azwan, A. R.

    2018-04-01

    The purpose of this paper is to review real-time control motion algorithms for wheeled mobile robot (WMR) when navigating in environment such as road. Its need a good controller to avoid collision with any disturbance and maintain a track error at zero level. The controllers are used with other aiding sensors to measure the WMR’s velocities, posture, and interference to estimate the required torque to be applied on the wheels of mobile robot. Four main categories for wheeled mobile robot control systems have been found in literature which are namely: Kinematic based controller, Dynamic based controllers, artificial intelligence based control system, and Active Force control. A MATLAB/Simulink software is the main software to simulate and implement the control system. The real-time toolbox in MATLAB/SIMULINK are used to receive/send data from sensors/to actuator with presence of disturbances, however others software such C, C++ and visual basic are rare to be used.

  16. Upstream health law.

    Science.gov (United States)

    Sage, William M; McIlhattan, Kelley

    2014-01-01

    For the first time, entrepreneurs are aggressively developing new technologies and business models designed to improve individual and population health, not just to deliver specialized medical care. Consumers of these goods and services are not yet "patients"; they are simply people. As this sector of the health care industry expands, it is likely to require new forms of legal governance, which we term "upstream health law." © 2014 American Society of Law, Medicine & Ethics, Inc.

  17. Homography-based control scheme for mobile robots with nonholonomic and field-of-view constraints.

    Science.gov (United States)

    López-Nicolás, Gonzalo; Gans, Nicholas R; Bhattacharya, Sourabh; Sagüés, Carlos; Guerrero, Josechu J; Hutchinson, Seth

    2010-08-01

    In this paper, we present a visual servo controller that effects optimal paths for a nonholonomic differential drive robot with field-of-view constraints imposed by the vision system. The control scheme relies on the computation of homographies between current and goal images, but unlike previous homography-based methods, it does not use the homography to compute estimates of pose parameters. Instead, the control laws are directly expressed in terms of individual entries in the homography matrix. In particular, we develop individual control laws for the three path classes that define the language of optimal paths: rotations, straight-line segments, and logarithmic spirals. These control laws, as well as the switching conditions that define how to sequence path segments, are defined in terms of the entries of homography matrices. The selection of the corresponding control law requires the homography decomposition before starting the navigation. We provide a controllability and stability analysis for our system and give experimental results.

  18. F2AC: A Lightweight, Fine-Grained, and Flexible Access Control Scheme for File Storage in Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Wei Ren

    2016-01-01

    Full Text Available Current file storage service models for cloud servers assume that users either belong to single layer with different privileges or cannot authorize privileges iteratively. Thus, the access control is not fine-grained and flexible. Besides, most access control methods at cloud servers mainly rely on computationally intensive cryptographic algorithms and, especially, may not be able to support highly dynamic ad hoc groups with addition and removal of group members. In this paper, we propose a scheme called F2AC, which is a lightweight, fine-grained, and flexible access control scheme for file storage in mobile cloud computing. F2AC can not only achieve iterative authorization, authentication with tailored policies, and access control for dynamically changing accessing groups, but also provide access privilege transition and revocation. A new access control model called directed tree with linked leaf model is proposed for further implementations in data structures and algorithms. The extensive analysis is given for justifying the soundness and completeness of F2AC.

  19. A Computer Clone of Human Expert for Mobility Management Scheme (E-MMS): Step toward Green Transportation

    Science.gov (United States)

    Resdiansyah; O. K Rahmat, R. A.; Ismail, A.

    2018-03-01

    Green transportation refers to a sustainable transport that gives the least impact in terms of social and environmental but at the same time is able to supply energy sources globally that includes non-motorized transport strategies deployment to promote healthy lifestyles, also known as Mobility Management Scheme (MMS). As construction of road infrastructure cannot help solve the problem of congestion, past research has shown that MMS is an effective measure to mitigate congestion and to achieve green transportation. MMS consists of different strategies and policies that subdivided into categories according to how they are able to influence travel behaviour. Appropriate selection of mobility strategies will ensure its effectiveness in mitigating congestion problems. Nevertheless, determining appropriate strategies requires human expert and depends on a number of success factors. This research has successfully developed a computer clone system based on human expert, called E-MMS. The process of knowledge acquisition for MMS strategies and the next following process to selection of strategy has been encode in a knowledge-based system using a shell expert system. The newly developed computer cloning system was successfully verified, validated and evaluated (VV&E) by comparing the result output with the real transportation expert recommendation in which the findings suggested Introduction

  20. Adaptive resource allocation scheme using sliding window subchannel gain computation: context of OFDMA wireless mobiles systems

    International Nuclear Information System (INIS)

    Khelifa, F.; Samet, A.; Ben Hassen, W.; Afif, M.

    2011-01-01

    Multiuser diversity combined with Orthogonal Frequency Division Multiple Access (OFDMA) are a promising technique for achieving high downlink capacities in new generation of cellular and wireless network systems. The total capacity of OFDMA based-system is maximized when each subchannel is assigned to the mobile station with the best channel to noise ratio for that subchannel with power is uniformly distributed between all subchannels. A contiguous method for subchannel construction is adopted in IEEE 802.16 m standard in order to reduce OFDMA system complexity. In this context, new subchannel gain computation method, can contribute, jointly with optimal assignment subchannel to maximize total system capacity. In this paper, two new methods have been proposed in order to achieve a better trade-off between fairness and efficiency use of resources. Numerical results show that proposed algorithms provide low complexity, higher total system capacity and fairness among users compared to others recent methods.

  1. Two-level modulation scheme to reduce latency for optical mobile fronthaul networks.

    Science.gov (United States)

    Sung, Jiun-Yu; Chow, Chi-Wai; Yeh, Chien-Hung; Chang, Gee-Kung

    2016-10-31

    A system using optical two-level orthogonal-frequency-division-multiplexing (OFDM) - amplitude-shift-keying (ASK) modulation is proposed and demonstrated to reduce the processing latency for the optical mobile fronthaul networks. At the proposed remote-radio-head (RRH), the high data rate OFDM signal does not need to be processed, but is directly launched into a high speed photodiode (HSPD) and subsequently emitted by an antenna. Only a low bandwidth PD is needed to recover the low data rate ASK control signal. Hence, it is simple and provides low-latency. Furthermore, transporting the proposed system over the already deployed optical-distribution-networks (ODNs) of passive-optical-networks (PONs) is also demonstrated with 256 ODN split-ratios.

  2. LHCb upstream tracker

    CERN Multimedia

    Artuso, Marina

    2016-01-01

    The detector for the LHCb upgrade is designed for 40MHz readout, allowing the experiment to run at an instantaneous luminosity of 2x10^33 cm$^2$s$^-1$. The upgrade of the tracker subsystem in front of the dipole magnet, the Upstream Tracker, is crucial for charged track reconstruction and fast trigger decisions based on a tracking algorithm involving also vertex detector information. The detector consists of 4 planes with a total area of about 8.5m$^2$, made of single sided silicon strip sensors read-out by a novel custom-made ASIC (SALT). Details on the performance of prototype sensors, front-end electronics, near-detector electronics and mechanical components are presented.

  3. Toward Cultural Policy Studies on Mobility: Reflections on a Study of the Hong Kong Working Holiday Scheme

    Directory of Open Access Journals (Sweden)

    Louis Ho

    2017-05-01

    Full Text Available Cultural policy is predominantly, and practically, considered the sum of a government’s activities with respect to the arts, humanities and heritage. Thus, cultural policy encompasses a much broader range of activities than was traditionally associated with an arts policy. Critical cultural policy studies, then, sees a distinction between ‘explicit’ cultural policies that are manifestly labelled as ‘cultural’, and ‘implicit’ cultural policies that are not labelled as such, but that work to shape cultural experiences. This article considers this explicit/implicit cultural policy distinction through John Urry’s idea of ‘social as mobility’, suggesting that some public policies regarding mobility (such as immigration, international trade and labour policy have led to specific cultural consequences and therefore qualify as implicit cultural policy. Using Hong Kong’s working holiday scheme as a case study, this article explores how an economic policy on temporary immigrant labour involves a deliberate cultural agenda as well as ‘unintentional’ cultural consequences and problematises the fact that cultural policy studies are largely framed by the idea of ‘social as society’.

  4. Detection and Prevention of Denial of Service (DoS Attacks in Mobile Ad Hoc Networks using Reputation-based Incentive Schemes

    Directory of Open Access Journals (Sweden)

    Mieso, K Denko

    2005-08-01

    Full Text Available Mobile ad hoc networks (MANETs are dynamic mobile networks that can be formed in the absence of any pre-existing communication infrastructure. In addition to node mobility, a MANET is characterized by limited resources such as bandwidth, battery power, and storage space. The underlying assumption in MANETs is that the intermediate nodes cooperate in forwarding packets. However, this assumption does not hold in commercial and emerging civilian applications. MANETs are vulnerable to Denial of Service (DoS due to their salient characteristics. There is a need to provide an incentive mechanism that can provide cooperation among nodes in the network and improve overall network performance by reducing DoS attacks. In this paper, we propose a reputation-based incentive mechanism for detecting and preventing DoS attacks. DoS attacks committed by selfish and malicious nodes were investigated. Our scheme motivates nodes to cooperate and excludes them from the network only if they fail to do so. We evaluated the performance of our scheme using the packet delivery ratio, the routing and communication overhead, and misbehaving node detection in a discrete event-simulation environment. The results indicate that a reputation-based incentive mechanism can significantly reduce the effect of DoS attacks and improve performance in MANETs.

  5. 双卡双待移动终端锁网方案研究%Research on network locking scheme for DCDS mobile terminal

    Institute of Scientific and Technical Information of China (English)

    高杰; 张岳彤; 包志祥

    2015-01-01

    Since the competition of mobile communication market becomes more intense with the arrival of 3G & 4G mobile communication era,communication operators launch series marketing strategies including charging phone calls for free mobile phone or cheap sale of mobile phone. In this situation,to ensure operators′ legal rights and interests,network locking function has become the operators′ basic requirements for customized mobile terminal gradually. How to meet the demands of customers′personalization and intelligentization to the utmost while ensuring operators′ legal rights and interests,becomes the important problem that the DCDS mobile terminal network locking is faced. As for current DCDS mobile terminal network locking tech⁃niques,three different kinds of network locking technologies were formed. In this paper,three DCDS network locking schemes are introduced,and a new DCDS network locking scheme based on them is proposed.%随着3G乃至4G移动通信时代的到来,移动通信市场的竞争越来越激烈,各运营商推出了充话费送手机或廉价出售手机等一系列的营销策略。这种情况下,为了充分保证自己的合法权益,锁网功能逐渐成为运营商定制移动终端的基本需求。同时,双卡双待移动终端在整个终端市场上的占比也越来越高。如何能在满足运营商合法权益的前提下,最大限度地兼顾到客户的个性化和智能化需求,成为双卡双待移动终端锁网所面临的重要问题。就当前双卡双待移动终端锁网技术领域的发展而言,形成了三种方式各异的锁网技术,对这三种锁网技术方案进行了介绍,并在此基础上提出了一种新的双卡双待移动终端锁网方案。

  6. Mobilities

    DEFF Research Database (Denmark)

    to social networks, personal identities, and our relationship to the built environment. The omnipresence of mobilities within everyday life, high politics, technology, and tourism (to mention but a few) all point to a key insight harnessed by the ‘mobilities turn’. Namely that mobilities is much more than......The world is on the move. This is a widespread understanding by many inhabitants of contemporary society across the Globe. But what does it actually mean? During over one decade the ‘mobilities turn’ within the social sciences have provided a new set of insights into the repercussions of mobilities...... and environmental degradation. The spaces and territories marked by mobilities as well as the sites marked by the bypassing of such are explored. Moreover, the architectural and technological dimensions to infrastructures and sites of mobilities will be included as well as the issues of power, social exclusion...

  7. A Comparative Study on Two Typical Schemes for Securing Spatial-Temporal Top-k Queries in Two-Tiered Mobile Wireless Sensor Networks.

    Science.gov (United States)

    Ma, Xingpo; Liu, Xingjian; Liang, Junbin; Li, Yin; Li, Ran; Ma, Wenpeng; Qi, Chuanda

    2018-03-15

    A novel network paradigm of mobile edge computing, namely TMWSNs (two-tiered mobile wireless sensor networks), has just been proposed by researchers in recent years for its high scalability and robustness. However, only a few works have considered the security of TMWSNs. In fact, the storage nodes, which are located at the upper layer of TMWSNs, are prone to being attacked by the adversaries because they play a key role in bridging both the sensor nodes and the sink, which may lead to the disclosure of all data stored on them as well as some other potentially devastating results. In this paper, we make a comparative study on two typical schemes, EVTopk and VTMSN, which have been proposed recently for securing Top- k queries in TMWSNs, through both theoretical analysis and extensive simulations, aiming at finding out their disadvantages and advancements. We find that both schemes unsatisfactorily raise communication costs. Specifically, the extra communication cost brought about by transmitting the proof information uses up more than 40% of the total communication cost between the sensor nodes and the storage nodes, and 80% of that between the storage nodes and the sink. We discuss the corresponding reasons and present our suggestions, hoping that it will inspire the researchers researching this subject.

  8. Analysis of DDoS Attack Effect and Protection Scheme in Wireless Mobile Ad-hoc Network

    OpenAIRE

    Ramratan Ahirwal; Leeladhar Mahour

    2012-01-01

    In Wireless mobile Ad Hoc Networks (MANET) every node functions as transmitter, router and data sink is network without infrastructure. Detecting malicious nodes in an open ad-hoc network in whichparticipating nodes have no previous security associations presents a number of challenges not faced by traditional wired networks. Traffic monitoring in wired networks is usually performed at switches,routers and gateways, but an ad-hoc network does not have these types of network elements where the...

  9. Efficient eNB inter-communication scheme in converged mobile and NG-PON2 system

    Science.gov (United States)

    Xiao, Simiao; Sun, Xiao; Zhang, Kaibin

    2016-02-01

    In LTE, a new X2-interface is defined to facilitate direct communication between neighboring eNBs. Since LTE is an all-IP network, the X2-interface traffic currently needs to be routed and transponded in L3 at the edge router by IP addressing. As mobile data increases, it is a promising trend to backhaul mobile services based on PON. In this paper, an effective approach for eNB inter-communication over TWDM-PON is proposed. By associating the IP address of eNB and the MAC address of ONU, the "inter-eNB communication in L3" can be mapped into "inter-ONU communication in L2" and transponded via the protocol of PON at the OLT. Thus, fast and cost-effective eNB inter-communication can be realized based on TWDM-PON within one wavelength channel and between different wavelength channels. The increasing data traffic pressure to the core network can also be alleviated.

  10. A Measurement Study of BLE iBeacon and Geometric Adjustment Scheme for Indoor Location-Based Mobile Applications

    Directory of Open Access Journals (Sweden)

    Jeongyeup Paek

    2016-01-01

    Full Text Available Bluetooth Low Energy (BLE and the iBeacons have recently gained large interest for enabling various proximity-based application services. Given the ubiquitously deployed nature of Bluetooth devices including mobile smartphones, using BLE and iBeacon technologies seemed to be a promising future to come. This work started off with the belief that this was true: iBeacons could provide us with the accuracy in proximity and distance estimation to enable and simplify the development of many previously difficult applications. However, our empirical studies with three different iBeacon devices from various vendors and two types of smartphone platforms prove that this is not the case. Signal strength readings vary significantly over different iBeacon vendors, mobile platforms, environmental or deployment factors, and usage scenarios. This variability in signal strength naturally complicates the process of extracting an accurate location/proximity estimation in real environments. Our lessons on the limitations of iBeacon technique lead us to design a simple class attendance checking application by performing a simple form of geometric adjustments to compensate for the natural variations in beacon signal strength readings. We believe that the negative observations made in this work can provide future researchers with a reference on how well of a performance to expect from iBeacon devices as they enter their system design phases.

  11. Upstream waves in Saturn's foreshock

    Science.gov (United States)

    Bavassano Cattaneo, M. B.; Cattaneo, P.; Moreno, G.; Lepping, R. P.

    1991-01-01

    An analysis based on plasma and magnetic-field data obtained from Voyager 1 during its Saturn encounter is reported. The plasma data provided every 96 sec and magnetic-field data averaged over 48 sec are utilized. The evidence of upstream waves at Saturn are detected. The waves have a period, in the spacecraft frame, of about 550 sec and a relative amplitude larger than 0.3, are left- and right-hand elliptically polarized, and propagate at about 30 deg with respect to the average magnetic field. The appearance of the waves is correlated with the spacecraft being magnetically connected to the bow shock.

  12. Mobilizing local innovation capacity through a simulation game in a participatory research project on agricultural innovation in El Brahmi irrigation scheme (Tunisia).

    Science.gov (United States)

    Dolinska, Aleksandra; d'Aquino, Patrick; Imache, Amar; Dionnet, Mathieu; Rougier, Jean-Emmanuel

    2015-04-01

    In the framework of the European Union and African Union cooperative research to increase Food production in irrigated farming systems in Africa (EAU4Food project) we conducted a participatory research on the possible innovative practices to increase production of dairy farms in the irrigation scheme El Brahmi in Tunisia in the face of changing economic, political and environmental conditions. Our aim was to find effective research method to stimulate farmers' participation in the innovation process. Although the capacities of farmers in producing knowledge and in innovating are recognized and the shift from the linear model of technology transfer towards more participatory approaches to innovation is postulated, in which the role of researchers changes from providing solutions towards supporting farmers in finding their own solutions, in practice, the position of farmers in shaping innovation practice and process remains weak. After a series of participatory workshops and in-depth interviews with the actors of the local innovation system we developed and tested a simple open simulation game Laitconomie for farmers. The game proved to be effective in increasing our understanding of the system as the farmers were adding new elements and rules while playing, and in mobilizing farmers' knowledge (including tacit knowledge) in the simulated innovation process. The result reported by the participants was learning how to improve farm management, soil fertility management and cow nutrition practices. Some of the participants used the game as a decision support tool. While our game and its scope were modest and mobilized only two types of players (farmers and extension agent), open simulation proved to be a useful tool to analyze a local innovation system. Designing similar type of tools that would mobilize more diverse players and hence have a larger scope can be imagined.

  13. Sectoral approaches establishment for climate change mitigation in Thailand upstream oil and gas industry

    International Nuclear Information System (INIS)

    Chaiyapa, Warathida; Esteban, Miguel; Kameyama, Yasuko

    2016-01-01

    Understanding the upstream oil and gas (O&G) industry's responses to climate change and what factors can be influential to trigger their mitigation strategies is crucial for policy-makers to harness the huge resources that this industry can mobilize towards environmental protection. Considering that individual climate change efforts are unlikely to affect global mitigation paths, the study investigates the possibility that sectoral approaches can help in the reduction of greenhouse gas emissions, using Thailand as a case study. It conducted online questionnaire surveys and semi-structured interviews to acquire primary data from companies and key informants from the government, NGOs, NPOs and academics. The results suggested that, among three possible groups of factors that could affect company decisions on whether to promote sectoral approaches, domestic politics (particularly the Thai government) is the most important, though other factors also play important and interrelated roles. The most welcomed type of scheme that could be envisaged would appear to be a sectoral agreement between government and industry. Finally, the authors provide two main policy recommendations, namely the establishment of an industrial association of O&G companies and for it to target how to start looking at measures to reduce greenhouse gas emissions amongst large companies in the sector. - Highlights: •Examining the possibility of establishing a sectoral approach Thailand's upstream O&G industry. •Analytical framework was constructed to ascertain most influential factors. •Questionnaires and interviews were employed with companies, government, NGOs and academic. •Domestic politics is the most determining factor, but other factors have strong interrelation. •Sectoral agreement between government and industry is the most likely scheme to be established.

  14. The LHCb Upstream Tracker Project

    CERN Document Server

    Steinkamp, Olaf

    2015-01-01

    The LHCb detector performs searches for New Physics in CP-violating observables and rare heavy-quark decays at the LHC. A comprehensive upgrade is planned for the long shutdown of the LHC in 2018/19. A goal of this upgrade is to abolish hardware triggers and read out the full detector at 40 MHz. This requires to replace the existing TT station upstream of the LHCb magnet by a new silicon micro-strip detector, the Upstream Tracker (UT). The UT will have a new front-end chip compatible with 40 MHz readout, silicon sensors with improved radiation hardness, finer readout granularity, and improved acceptance coverage at small polar angles. The outer region of each detection layer will be covered by p-in-n sensors with 10 cm long strips and a pitch of about 180 mum, while n-in-p sensors with half the pitch and strip length will be employed in the regions of highest particle density close to the beam pipe. The innermost sensors will have a circular cutout to optimize the forward acceptance. The front-end chip is bei...

  15. Buzz words in the upstream

    International Nuclear Information System (INIS)

    Knoll, B.

    1998-01-01

    Examples of misleading or misunderstood 'buzz' words that are prevalent in modern upstream technology are illustrated. The terms underbalanced drilling, horizontal wells, and geo-steering, which were unheard of in the early 1980s, have become key 'buzz' words in modern exploitation terminology. The terms are not only misused, but the technologies themselves are frequently mis-applied as shown by the frequency of economic failures, or less than optimal technical successes which have occurred when these technologies have been employed. Two examples, 'horizontal drilling' and 'geosteering', are used to illustrate the point. With regard to horizontal drilling, many oil field professionals consider it as merely a more advanced method of directional drilling. This represents a serious, yet common, misconception. In truth, horizontal wells are not just an altered drilling process, but a fundamental change in exploitation technology. A more appropriate definition would be that a horizontal well is an enhanced oil recovery process, clearly implying a relationship to the exploitation benefit potential of horizontal wells. The other term, 'geo-steering' refers to defining, generating and monitoring a wellpath on geology rather than geometry. It, too, is frequently misused in the technical media. The term is also misrepresented by implying that it is applicable only to the horizontal section of a well, which in fact is far from the truth. To counter these misconceptions, the paper provides appropriate definitions for each of these terms, and defines the conditions under which the techniques themselves are most appropriately used. 7 figs

  16. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  17. Rare earth industries: Upstream business

    International Nuclear Information System (INIS)

    2011-01-01

    energy efficiency rely a lot on the use of rare earths. These include applications in energy efficient lighting, new and more reliable energy storage batteries as well as more efficient energy distribution mechanism. The growing demand for more efficient communication systems, not only in the world of business but also in defence and the military, is another significant driver of the global demand for rare earths. Mobility and miniaturisation, which feature prominently in the current specifications for telecommunications equipment's, rely a lot on the deployment of powerful and efficient magnetic technology. And rare earths have become a much sought after material in the latest magnets used in mobile phones, defence equipment's and computer hardware's. With the rise in the global investments in smart cities and intelligent communities, the demand for such communication products is destined to witness equally prolific expansion. This would inadvertently translate into a rising demand for rare earths. (author)

  18. Stochastic porous media modeling and high-resolution schemes for numerical simulation of subsurface immiscible fluid flow transport

    Science.gov (United States)

    Brantson, Eric Thompson; Ju, Binshan; Wu, Dan; Gyan, Patricia Semwaah

    2018-04-01

    This paper proposes stochastic petroleum porous media modeling for immiscible fluid flow simulation using Dykstra-Parson coefficient (V DP) and autocorrelation lengths to generate 2D stochastic permeability values which were also used to generate porosity fields through a linear interpolation technique based on Carman-Kozeny equation. The proposed method of permeability field generation in this study was compared to turning bands method (TBM) and uniform sampling randomization method (USRM). On the other hand, many studies have also reported that, upstream mobility weighting schemes, commonly used in conventional numerical reservoir simulators do not accurately capture immiscible displacement shocks and discontinuities through stochastically generated porous media. This can be attributed to high level of numerical smearing in first-order schemes, oftentimes misinterpreted as subsurface geological features. Therefore, this work employs high-resolution schemes of SUPERBEE flux limiter, weighted essentially non-oscillatory scheme (WENO), and monotone upstream-centered schemes for conservation laws (MUSCL) to accurately capture immiscible fluid flow transport in stochastic porous media. The high-order schemes results match well with Buckley Leverett (BL) analytical solution without any non-oscillatory solutions. The governing fluid flow equations were solved numerically using simultaneous solution (SS) technique, sequential solution (SEQ) technique and iterative implicit pressure and explicit saturation (IMPES) technique which produce acceptable numerical stability and convergence rate. A comparative and numerical examples study of flow transport through the proposed method, TBM and USRM permeability fields revealed detailed subsurface instabilities with their corresponding ultimate recovery factors. Also, the impact of autocorrelation lengths on immiscible fluid flow transport were analyzed and quantified. A finite number of lines used in the TBM resulted into visual

  19. Analysis of an upstream weighted collocation approximation to the transport equation

    International Nuclear Information System (INIS)

    Shapiro, A.; Pinder, G.F.

    1981-01-01

    The numerical behavior of a modified orthogonal collocation method, as applied to the transport equations, can be examined through the use of a Fourier series analysis. The necessity of such a study becomes apparent in the analysis of several techniques which emulate classical upstream weighting schemes. These techniques are employed in orthogonal collocation and other numerical methods as a means of handling parabolic partial differential equations with significant first-order terms. Divergent behavior can be shown to exist in one upstream weighting method applied to orthogonal collocation

  20. Inventories and upstream gasoline price dynamics

    NARCIS (Netherlands)

    Kuper, Gerard H.

    This paper sheds new light on the asymmetric dynamics in upstream U.S. gasoline prices. The model is based on Pindyck's inventory model of commodity price dynamics. We show that asymmetry in gasoline price dynamics is caused by changes in the net marginal convenience yield: higher costs of marketing

  1. Russian upstream joint ventures logging progress

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This paper reports that Occidental Petroleum Corp. has begun exporting oil from Russia as part of an enhanced recovery joint venture in western Siberia. Oxy holds a 50% interest in the joint venture company, Vanyoganneft, and will market the oil. In other activity, two Canadian companies are marking progress with Russian upstream joint ventures

  2. Improved surface-roughness scattering and mobility models for multi-gate FETs with arbitrary cross-section and biasing scheme

    Science.gov (United States)

    Lizzit, D.; Badami, O.; Specogna, R.; Esseni, D.

    2017-06-01

    We present a new model for surface roughness (SR) scattering in n-type multi-gate FETs (MuGFETs) and gate-all-around nanowire FETs with fairly arbitrary cross-sections, its implementation in a complete device simulator, and the validation against experimental electron mobility data. The model describes the SR scattering matrix elements as non-linear transformations of interface fluctuations, which strongly influences the root mean square value of the roughness required to reproduce experimental mobility data. Mobility simulations are performed via the deterministic solution of the Boltzmann transport equation for a 1D-electron gas and including the most relevant scattering mechanisms for electronic transport, such as acoustic, polar, and non-polar optical phonon scattering, Coulomb scattering, and SR scattering. Simulation results show the importance of accounting for arbitrary cross-sections and biasing conditions when compared to experimental data. We also discuss how mobility is affected by the shape of the cross-section as well as by its area in gate-all-around and tri-gate MuGFETs.

  3. Colour schemes

    DEFF Research Database (Denmark)

    van Leeuwen, Theo

    2013-01-01

    This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation.......This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation....

  4. Biodiesel byproduct bioconversion to rhamnolipids: Upstream aspects

    OpenAIRE

    Salazar-Bryam, Ana Maria; Lovaglio, Roberta Barros; Contiero, Jonas

    2017-01-01

    This study focused on two important aspects of the upstream process: the appropriate use of crude glycerol as a low-cost carbon source, and strain selection. The effect of different crude glycerol concentrations on rhamnolipid biosynthesis by two Pseudomonas aeruginosa strains (wild type LBI and mutant LBI 2A1) was studied. Finally, the synthesized rhamnolipids were characterized by mass spectrometry. When both strains were compared, 50 g/L was the most favorable concentration for both, but P...

  5. Anatomy of top 100 upstream players

    International Nuclear Information System (INIS)

    Burk, V.A.

    1992-01-01

    A brief review is given of a recent survey of the top one hundred upstream oil and gas companies which file financial data with the US Securities and Exchange Commission. The analysis indicates the increasing globalisation of the industry with exploration and development spending increasing dramatically outside the US. To survive, companies must operate as efficient low cost finders and producers of oil and gas and anticipate and meet changing market demands quickly. (UK)

  6. Upstream Atlantic salmon (Salmo salar) passage

    International Nuclear Information System (INIS)

    Clay, C.H.

    1993-01-01

    Upstream salmon passage though a dam is discussed with respect to three main components: the fishway entrance, the fishway, and the exit. Design considerations and alternative types of components are presented. For fishway entrances, an important consideration is the positioning of the entrance as far upstream as the fish can swim with respect to obstacles. For powerhouses using water diverted from a river, the problem of leading fish past the powerhouse may be overcome by either installing a tailrace barrier or increasing the flow until the home stream odor is sufficient to attract fish. Swimming ability should be the first consideration in fishway design. Fishways with 50 cm drops per pool would be satisfactory in most cases. The problem of headwater fluctuation is overcome through careful fishway selection. Fish locks, hoists, and elevators are other alternatives to pool/weir fishways. The location for a fish exit must be decided on the basis of whether the fishway will be used only for upstream migrations. 5 refs., 1 fig., 1 tab

  7. Mobilities Mobilities

    Directory of Open Access Journals (Sweden)

    César Pompeyo

    2011-12-01

    Full Text Available Urry, John (2007 Mobilities.Oxford: Polity Press.Urry, John (2007 Mobilities.Oxford: Polity Press.John Urry (1946-, profesor en la Universidad de Lancaster, es un sociólogo de sobra conocido y altamente reputado en el panorama internacional de las ciencias sociales. Su dilatada carrera, aparentemente dispersa y diversificada, ha seguido senderos bastante bien definidos dejando tras de sí un catálogo extenso de obras sociológicas de primer nivel. Sus primeros trabajos se centraban en el campo de la teoría social y la filosofía de las ciencias sociales o de la sociología del poder [...

  8. Meeting the challenge : capturing the upstream

    International Nuclear Information System (INIS)

    Bogle, E.W.

    1998-01-01

    The challenge facing the exploration and production sector of the petroleum industry to capture and hold onto the upstream was the main focus of this paper. The exploration and production (E and P) business was described as being highly complex, characterized by constant change and increasing competition. Some of the dynamic changes which have occurred in the Western Canada Basin (WCB) during the last five years and how they relate to the international playing field were reviewed. Significant changes to the production ranking profile as a result of acquisitions, and basin reserve endowment and maturity are the two major factors affecting current and future dynamics of upstream WCB E and P activity. Competitive pressures, contractor relationships, infrastructure access and controls, environmental issues are some of the other factors. Taking these factors into account, Talisman Energy Inc. has used its growth in the WCB to leverage its international activities, diversifying to less mature, but proven hydrocarbon basins. The company's international exploration strategy is designed to be adaptive and flexible and is guided by focus on a limited number of core areas with proven source rock and existing production, achievement of a set production level within a five-year time frame, ensuring strong relationships with host governments and partners, and selecting areas where a multiple of opportunity types are available. In general, for any upstream company it is important to recognize that the more predictable traditional order has given way to a market-driven environment where the rules change almost daily, and success depends on the ability to adapt to change.14 figs

  9. DOWNSTREAM ECOCIDE FROM UPSTREAM WATER PIRACY

    OpenAIRE

    Miah Muhammad Adel

    2012-01-01

    Upstream India and downstream Bangladesh share more than 50 international rivers. India has set up water diversion constructions in more than 50% of these rivers, the largest one being on the Bangladeshâs northwest upon the Ganges River, puts Bangladeshâs Gangetic ecosystem at stake. In some border rivers, India has set up groins on her side of river banks. Also, Indian side pumps Bangladesh river water stealthily from border-rivers. Further, India is constructing another dam and reservoir up...

  10. Canada's upstream petroleum industry : 1997 perspective

    International Nuclear Information System (INIS)

    1997-06-01

    A review of the trends and activities in the upstream petroleum industry during 1996 were presented, emphasizing the significance of the industry' contribution to Canada's economy. Among the areas included were highlights of Canada's hydrocarbon reserves, conventional production, frontier production, and non-conventional (oil sands) production. New market opportunities and activities in the pipeline transportation sector were also discussed. Environmental issues including health and safety received due attention. In this regard, the industry's efforts to work with government and other stakeholders to ensure that requirements for land use are balanced with the need to protect wilderness and wildlife habitat, received special mention. 16 figs

  11. Tradable schemes

    NARCIS (Netherlands)

    J.K. Hoogland (Jiri); C.D.D. Neumann

    2000-01-01

    textabstractIn this article we present a new approach to the numerical valuation of derivative securities. The method is based on our previous work where we formulated the theory of pricing in terms of tradables. The basic idea is to fit a finite difference scheme to exact solutions of the pricing

  12. Biodiesel byproduct bioconversion to rhamnolipids: Upstream aspects.

    Science.gov (United States)

    Salazar-Bryam, Ana Maria; Lovaglio, Roberta Barros; Contiero, Jonas

    2017-06-01

    This study focused on two important aspects of the upstream process: the appropriate use of crude glycerol as a low-cost carbon source, and strain selection. The effect of different crude glycerol concentrations on rhamnolipid biosynthesis by two Pseudomonas aeruginosa strains (wild type LBI and mutant LBI 2A1) was studied. Finally, the synthesized rhamnolipids were characterized by mass spectrometry. When both strains were compared, 50 g/L was the most favorable concentration for both, but P. aeruginosa LBI 2A1 showed an increase in rhamnolipid production (2.55 g/L) of 192% over wild type (1.3 g/L). The higher rhamnolipid production could be related to a possible mechanism developed after the mutation process at high antibiotic concentrations. Mass spectrometry confirmed the glycolipid nature of the produced biosurfactant, and the homologue composition showed a wide mixture of mono and di-rhamnolipids. These results show that high glycerol concentrations can inhibit microbial metabolism, due to osmotic stress, leading to a better understanding of glycerol metabolism towards its optimization in fermentation media. Since P. aeruginosa LBI 2A1 showed higher conversion yields than P. aeruginosa LBI, the use of a mutant strain associated with a low cost carbon source might improve biosurfactant biosynthesis, therefore yielding an important upstream improvement.

  13. Biodiesel byproduct bioconversion to rhamnolipids: Upstream aspects

    Directory of Open Access Journals (Sweden)

    Ana Maria Salazar-Bryam

    2017-06-01

    Full Text Available This study focused on two important aspects of the upstream process: the appropriate use of crude glycerol as a low-cost carbon source, and strain selection. The effect of different crude glycerol concentrations on rhamnolipid biosynthesis by two Pseudomonas aeruginosa strains (wild type LBI and mutant LBI 2A1 was studied. Finally, the synthesized rhamnolipids were characterized by mass spectrometry. When both strains were compared, 50 g/L was the most favorable concentration for both, but P. aeruginosa LBI 2A1 showed an increase in rhamnolipid production (2.55 g/L of 192% over wild type (1.3 g/L. The higher rhamnolipid production could be related to a possible mechanism developed after the mutation process at high antibiotic concentrations. Mass spectrometry confirmed the glycolipid nature of the produced biosurfactant, and the homologue composition showed a wide mixture of mono and di-rhamnolipids. These results show that high glycerol concentrations can inhibit microbial metabolism, due to osmotic stress, leading to a better understanding of glycerol metabolism towards its optimization in fermentation media. Since P. aeruginosa LBI 2A1 showed higher conversion yields than P. aeruginosa LBI, the use of a mutant strain associated with a low cost carbon source might improve biosurfactant biosynthesis, therefore yielding an important upstream improvement. Keywords: Biotechnology, Microbiology

  14. Upstream from OPERA: extreme attention to detail

    CERN Multimedia

    CERN Bulletin

    2011-01-01

    Two weeks ago, at a seminar held at CERN, the OPERA collaboration revealed their astonishing observation: neutrinos might move faster than light. The finding is currently under scrutiny in the scientific community. While the result downstream at Gran Sasso speaks for itself, upstream at CERN things are no less intriguing, with high-tech GPS systems, novel techniques for accurately measuring the time, and unique ways keeping the initial particle beam stable. Take away one ingredient and the accuracy needed for the final measurement is spoiled.   Underground installations of the CERN Neutrinos to Gran Sasso (CNGS) project. First ingredient: a stable beam CERN produces neutrinos by sending a beam of protons to hit a target. The collisions produce a secondary beam, which mostly consists of pions and kaons that decay in flight within an evacuated tunnel. Their decay products are muons and muon-neutrinos. An absorber stops the pions and kaons that do not decay, while the resulting muons are absorb...

  15. Upstream petroleum industry flaring guide : review draft

    International Nuclear Information System (INIS)

    1999-03-01

    The Alberta requirements and expectations for upstream petroleum flaring are presented. Flaring is associated with a wide range of energy activities including oil and gas well drilling and well completion operations. The guide incorporates the recommendations made to the Alberta Energy and Utilities Board (EUB) in June 1998 by the multi-stakeholder Clean Air Strategic Alliance (CASA) on associated or solution gas flaring. Additional requirements which address flaring issues not covered in the CASA report are also included in this guide. The Guide requires a 15 per cent reduction in solution gas flare volume by the end of year 2000 from the 1996 baseline, and a 25 per cent reduction by the end of 2001. The Guide prescribes new flare performance requirements for all flares, within three years for existing solution gas flares, five years for flares at other existing permanent facilities. It sets personal consultation and public notification requirements for new and existing solution gas batteries, and new sulphur recovery requirements for facilities not covered by existing EUB regulations. The Guide also addresses the question of conflict resolution to deal with flaring concerns, the release of flaring and venting data, the proposed reduction of flare limits, progress towards minimizing requirements for electricity generators using otherwise flared gas, annual reporting to the EUB, and management framework review in 2001

  16. Developmental Origins, Epigenetics, and Equity: Moving Upstream.

    Science.gov (United States)

    Wallack, Lawrence; Thornburg, Kent

    2016-05-01

    The Developmental Origins of Health and Disease and the related science of epigenetics redefines the meaning of what constitutes upstream approaches to significant social and public health problems. An increasingly frequent concept being expressed is "When it comes to your health, your zip code may be more important than your genetic code". Epigenetics explains how the environment-our zip code-literally gets under our skin, creates biological changes that increase our vulnerability for disease, and even children's prospects for social success, over their life course and into future generations. This science requires us to rethink where disease comes from and the best way to promote health. It identifies the most fundamental social equity issue in our society: that initial social and biological disadvantage, established even prior to birth, and linked to the social experience of prior generations, is made worse by adverse environments throughout the life course. But at the same time, it provides hope because it tells us that a concerted focus on using public policy to improve our social, physical, and economic environments can ultimately change our biology and the trajectory of health and social success into future generations.

  17. Distance tracking scheme for seamless handover in IMS-based ...

    African Journals Online (AJOL)

    This paper proposes a fast and seamless handover scheme for systems based on IP Multimedia Subsystem (IMS) architectural framework with Universal Mobile Telecommunications System (UMTS) access network. In the scheme the location, direction and movement pattern of a Mobile Node (MN) in a network cell are ...

  18. Oman: Current status, upstream and export developments, investment opportunities

    International Nuclear Information System (INIS)

    Skeet, I.

    1994-01-01

    Oil production in Oman has consistently increased since 1980 to reach its current level of ca 800,000 bbl/d. Reserves total ca 5 billion bbl and gas reserves are over 20 trillion ft 3 , of which a third is being dedicated for export. The main operator is Petroleum Development Oman (PDO), which is 60% owned by the Omani government. Some production areas are taken up by other companies under production sharing contracts. Gas is used for local industrial purposes and a third of gas reserves are being dedicated to a liquefied natural gas export scheme planned to be on-stream by 2000. The government has been seeking foreign investment and increasing private-sector participation, an example being a Belgian-Omani consortium to construct a 100-MW gas-fired power station. However, opportunities for investing in the upstream oil/gas sector are limited since most prospective areas have already been taken up. The economic, political, and social problems which may affect future investment are discussed. Oman is essentially a one-resource economy and declines in oil prices have led to widening government deficits. Social expectations created by the oil-financed welfare state make it difficult for government expenditures to be cut back. There is lack of public debate in the state-controlled media and no public participation in policy and decision making. There is a perception of widening corruption in government and a nascent movement toward a more rigid Islamic view of society. Controls are needed to maintain a reasonable balance between oil revenues and public expenditures, while pressures from an increasingly literate and numerous population will demand changes to the traditional autocratic system of government. 5 figs., 2 tabs

  19. Additive operator-difference schemes splitting schemes

    CERN Document Server

    Vabishchevich, Petr N

    2013-01-01

    Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy

  20. A new access scheme in OFDMA systems

    Institute of Scientific and Technical Information of China (English)

    GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping

    2006-01-01

    This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.

  1. Impact of upstream industrial effluents on irrigation water quality ...

    African Journals Online (AJOL)

    Impact of upstream industrial effluents on irrigation water quality, soils and ... Knowledge of irrigation water quality is critical to predicting, managing and reducing salt ... Presence of heavy metals in concentration higher than the recommended ...

  2. Clustering in large networks does not promote upstream reciprocity.

    Directory of Open Access Journals (Sweden)

    Naoki Masuda

    Full Text Available Upstream reciprocity (also called generalized reciprocity is a putative mechanism for cooperation in social dilemma situations with which players help others when they are helped by somebody else. It is a type of indirect reciprocity. Although upstream reciprocity is often observed in experiments, most theories suggest that it is operative only when players form short cycles such as triangles, implying a small population size, or when it is combined with other mechanisms that promote cooperation on their own. An expectation is that real social networks, which are known to be full of triangles and other short cycles, may accommodate upstream reciprocity. In this study, I extend the upstream reciprocity game proposed for a directed cycle by Boyd and Richerson to the case of general networks. The model is not evolutionary and concerns the conditions under which the unanimity of cooperative players is a Nash equilibrium. I show that an abundance of triangles or other short cycles in a network does little to promote upstream reciprocity. Cooperation is less likely for a larger population size even if triangles are abundant in the network. In addition, in contrast to the results for evolutionary social dilemma games on networks, scale-free networks lead to less cooperation than networks with a homogeneous degree distribution.

  3. Valuating Indonesian upstream oil management scenario through system dynamics modelling

    Science.gov (United States)

    Ketut Gunarta, I.; Putri, F. A.

    2018-04-01

    Under the existing regulation in Constitution Number 22 Year 2001 (UU No 22 Tahun 2001), Production Sharing Contract (PSC) continues to be the scenario in conducting oil and gas upstream mining activities as the previous regulation (UU No. 8 Tahun 1971). Because of the high costs and risks in upstream mining activities, the contractors are dominated by foreign companies, meanwhile National Oil Company (NOC) doesn’t act much. The domination of foreign contractor companies also warned Indonesia in several issues addressing to energy independence and energy security. Therefore, to achieve the goals of energy which is independence and security, there need to be a revision in upstream oil activities regulating scenario. The scenarios will be comparing the current scenario, which is PSC, with the “full concession” scenario for National Oil Company (NOC) in managing oil upstream mining activities. Both scenario will be modelled using System Dynamics methodology and assessed furthermore using financial valuation method of income approach. Under the 2 scenarios, the author will compare which scenario is better for upstream oil management in reaching the goals mentioned before and more profitable in financial aspect. From the simulation, it is gathered that concession scenario offers better option than PSC in reaching energy independence and energy security.

  4. Clustering in large networks does not promote upstream reciprocity.

    Science.gov (United States)

    Masuda, Naoki

    2011-01-01

    Upstream reciprocity (also called generalized reciprocity) is a putative mechanism for cooperation in social dilemma situations with which players help others when they are helped by somebody else. It is a type of indirect reciprocity. Although upstream reciprocity is often observed in experiments, most theories suggest that it is operative only when players form short cycles such as triangles, implying a small population size, or when it is combined with other mechanisms that promote cooperation on their own. An expectation is that real social networks, which are known to be full of triangles and other short cycles, may accommodate upstream reciprocity. In this study, I extend the upstream reciprocity game proposed for a directed cycle by Boyd and Richerson to the case of general networks. The model is not evolutionary and concerns the conditions under which the unanimity of cooperative players is a Nash equilibrium. I show that an abundance of triangles or other short cycles in a network does little to promote upstream reciprocity. Cooperation is less likely for a larger population size even if triangles are abundant in the network. In addition, in contrast to the results for evolutionary social dilemma games on networks, scale-free networks lead to less cooperation than networks with a homogeneous degree distribution.

  5. Participation costs can suppress the evolution of upstream reciprocity.

    Science.gov (United States)

    Peña, Jorge; Pestelacci, Enea; Berchtold, André; Tomassini, Marco

    2011-03-21

    Indirect reciprocity, one of the many mechanisms proposed to explain the evolution of cooperation, is the idea that altruistic actions can be rewarded by third parties. Upstream or generalized reciprocity is one type of indirect reciprocity in which individuals help someone if they have been helped by somebody else in the past. Although empirically found to be at work in humans, the evolution of upstream reciprocity is difficult to explain from a theoretical point of view. A recent model of upstream reciprocity, first proposed by Nowak and Roch (2007) and further analyzed by Iwagami and Masuda (2010), shows that while upstream reciprocity alone does not lead to the evolution of cooperation, it can act in tandem with mechanisms such as network reciprocity and increase the total level of cooperativity in the population. We argue, however, that Nowak and Roch's model systematically leads to non-uniform interaction rates, where more cooperative individuals take part in more games than less cooperative ones. As a result, the critical benefit-to-cost ratios derived under this model in previous studies are not invariant with respect to the addition of participation costs. We show that accounting for these costs can hinder and even suppress the evolution of upstream reciprocity, both for populations with non-random encounters and graph-structured populations. Copyright © 2011 Elsevier Ltd. All rights reserved.

  6. Human Resource Local Content in Ghana's Upstream Petroleum Industry

    Science.gov (United States)

    Benin, Papa

    Enactment of Ghana's Petroleum (Local Content and Local Participation) Regulations, 2013 (L.I. 2204) was intended to regulate the percentage of local products, personnel, financing, and goods and services rendered within Ghana's upstream petroleum industry value chain. Five years after the inception of Ghana's upstream oil and gas industry, a gap is evident between the requirements of L.I. 2204 and professional practice. Drawing on Lewin's change theory, a cross-sectional study was conducted to examine the extent of differences between the prevailing human resource local content and the requirements of L.I. 2204 in Ghana's upstream petroleum industry. The extent to which training acquired by indigenous Ghanaians seeking jobs in Ghana's oil fields affects the prevalent local content in its upstream petroleum industry was also examined. Survey data were collected from 97 management, technical, and other staff in 2 multinational petroleum companies whose oil and gas development plans have been approved by the Petroleum Commission of Ghana. To answer the research questions and test their hypotheses, one-way ANOVA was performed with staff category (management, technical, and other) as the independent variable and prevalent local content as the dependent variable. Results indicated that prevailing local content in Ghana's upstream petroleum industry meets the requirements of L.I. 2204. Further, training acquired by indigenous Ghanaians seeking jobs in Ghana's oil fields affects the prevalent local content in its offshore petroleum industry. Findings may encourage leaders within multinational oil companies and the Petroleum Commission of Ghana to organize educational seminars that equip indigenous Ghanaians with specialized skills for working in Ghana's upstream petroleum industry.

  7. Exploring Social Learning through Upstream Engagement in Science and Technology

    DEFF Research Database (Denmark)

    Mortensen, Jonas Egmose

    This discussion paper deliberates on how the concept of social learning can be used for evaluating upstream engagement initiatives in science and technology.  The paper briefly introduces to the concept of upstream engagement and a concrete case, the UK Citizen Science for Sustainability project...... (SuScit), as an outset for discussing how the concept of social learning can be used for analysing and understanding relations between citizen participation, Science and research, and sustainability. A number of relevant research questions and methodological considerations are distilled...

  8. Mobile marketing for mobile games

    OpenAIRE

    Vu, Giang

    2016-01-01

    Highly developed mobile technology and devices enable the rise of mobile game industry and mobile marketing. Hence mobile marketing for mobile game is an essential key for a mobile game success. Even though there are many articles on marketing for mobile games, there is a need of highly understanding mobile marketing strategies, how to launch a mobile campaign for a mobile game. Besides that, it is essential to understand the relationship between mobile advertising and users behaviours. There...

  9. A Two-Layered Mobility Architecture Using Fast Mobile IPv6 and Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Nursimloo DeeyaS

    2008-01-01

    Full Text Available Abstract This paper proposes an integrated mobility scheme that combines the procedures of fast handover for Mobile IPv6 (FMIPv6 and session initiation protocol (SIP mobility for realtime communications. This integrated approach is based on the context of the applications utilized. Furthermore, to reduce system redundancies and signaling loads, several functionalities of FMIPv6 and SIP have been integrated to optimize the integrated mobility scheme. The proposed scheme aims at reducing the handover latency and packet loss for an ongoing realtime traffic. Using ns-2 simulation, we analyze the performance of the proposed integrated scheme and compare it with the existing protocols for a VoIP and for a video stream traffic. This mobility architecture achieves lower handover delay and less packet loss than using either FMIPv6 or SIP and hence presents a powerful handover mobility scheme for next generation IP-based wireless systems.

  10. A Two-Layered Mobility Architecture Using Fast Mobile IPv6 and Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Deeya S. Nursimloo

    2007-12-01

    Full Text Available This paper proposes an integrated mobility scheme that combines the procedures of fast handover for Mobile IPv6 (FMIPv6 and session initiation protocol (SIP mobility for realtime communications. This integrated approach is based on the context of the applications utilized. Furthermore, to reduce system redundancies and signaling loads, several functionalities of FMIPv6 and SIP have been integrated to optimize the integrated mobility scheme. The proposed scheme aims at reducing the handover latency and packet loss for an ongoing realtime traffic. Using ns-2 simulation, we analyze the performance of the proposed integrated scheme and compare it with the existing protocols for a VoIP and for a video stream traffic. This mobility architecture achieves lower handover delay and less packet loss than using either FMIPv6 or SIP and hence presents a powerful handover mobility scheme for next generation IP-based wireless systems.

  11. Sector report: Malaysia. Upstream oil and gas industry

    International Nuclear Information System (INIS)

    1997-01-01

    This report is one of a series designed to introduce British exporters to the opportunities offered by the Malaysian market in oil and natural gas. The report includes Malaysia's oil and gas reserves, production, exploration, major profits upstream, production sharing contracts, pipeline construction, operators in production, service sector, and Petronas. (UK)

  12. Collisionless shocks and upstream waves and particles: Introductory remarks

    International Nuclear Information System (INIS)

    Kennel, C.F.

    1981-01-01

    We discuss more aspects of collisionless shock theory that might be pertinent to the problem of upstream waves and particles. It is hoped that our qualititive remarks may be a useful guide for the general reader as he goes through the detailed papers to come

  13. Characterization of upstream sequences from the 8S globulin gene ...

    African Journals Online (AJOL)

    Administrator

    2011-09-21

    Sep 21, 2011 ... added recombinant proteins and enzymes for industries. The upstream region ... cost, eukaryotic expression and no endogenous patho- gen pollution, thus it ... developmental process (Santino et al., 1997) which may deplete nutrient ... ideal bioreactors for economic production and storage of value-added ...

  14. Employee assistance programs in the upstream petroleum industry

    International Nuclear Information System (INIS)

    Crutcher, R.A.; Yip, R.Y.; Young, M.R.

    1991-01-01

    This paper is a descriptive overview of Employee Assistance Programs (EAPs) in the upstream Canadian petroleum industry. The authors review current EAP models within the occupational health setting and the Canadian health care context. This article also explores the challenging issues of EAP's emergent functions in workplace substance abuse programs, its changing role in organizational effectiveness and its professional identity

  15. Inlet effect induced ''upstream'' critical heat flux in smooth tubes

    International Nuclear Information System (INIS)

    Kitto, J.B. Jr.

    1986-01-01

    An unusual form of ''upstream'' critical heat flux (CHF) has been observed and directly linked to the inlet flow pattern during an experimental study of high pressure (17 - 20 MPa) water flowing through a vertical 38.1 mm ID smooth bore tube with uniform axial and nonuniform circumferential heating. These upstream CHF data were characterized by temperature excursions which initially occurred at a relatively fixed axial location in the middle of the test section while the outlet and inlet heated lengths experienced no change. A rifled tube inlet flow conditioner could be substituted for a smooth tube section to generate the desired swirling inlet flow pattern. The upstream CHF data were found to match data from a uniformly heated smooth bore tube when the comparison was made using the peak local heat flux. The mechanism proposed to account for the upstream CHF observations involves the destructive interference between the decaying swirl flow and the secondary circumferential liquid flow field resulting from the one-sided heating

  16. Finite Boltzmann schemes

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2006-01-01

    In the special case of relaxation parameter = 1 lattice Boltzmann schemes for (convection) diffusion and fluid flow are equivalent to finite difference/volume (FD) schemes, and are thus coined finite Boltzmann (FB) schemes. We show that the equivalence is inherent to the homology of the

  17. Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings

    Directory of Open Access Journals (Sweden)

    Caixue Zhou

    2017-01-01

    Full Text Available Generalized signcryption (GSC can be applied as an encryption scheme, a signature scheme, or a signcryption scheme with only one algorithm and one key pair. A key-insulated mechanism can resolve the private key exposure problem. To ensure the security of cloud storage, we introduce the key-insulated mechanism into GSC and propose a concrete scheme without bilinear pairings in the certificateless cryptosystem setting. We provide a formal definition and a security model of certificateless key-insulated GSC. Then, we prove that our scheme is confidential under the computational Diffie-Hellman (CDH assumption and unforgeable under the elliptic curve discrete logarithm (EC-DL assumption. Our scheme also supports both random-access key update and secure key update. Finally, we evaluate the efficiency of our scheme and demonstrate that it is highly efficient. Thus, our scheme is more suitable for users who communicate with the cloud using mobile devices.

  18. Upstream vertical cavity surface-emitting lasers for fault monitoring and localization in WDM passive optical networks

    Science.gov (United States)

    Wong, Elaine; Zhao, Xiaoxue; Chang-Hasnain, Connie J.

    2008-04-01

    As wavelength division multiplexed passive optical networks (WDM-PONs) are expected to be first deployed to transport high capacity services to business customers, real-time knowledge of fiber/device faults and the location of such faults will be a necessity to guarantee reliability. Nonetheless, the added benefit of implementing fault monitoring capability should only incur minimal cost associated with upgrades to the network. In this work, we propose and experimentally demonstrate a fault monitoring and localization scheme based on a highly-sensitive and potentially low-cost monitor in conjunction with vertical cavity surface-emitting lasers (VCSELs). The VCSELs are used as upstream transmitters in the WDM-PON. The proposed scheme benefits from the high reflectivity of the top distributed Bragg reflector (DBR) mirror of optical injection-locked (OIL) VCSELs to reflect monitoring channels back to the central office for monitoring. Characterization of the fault monitor demonstrates high sensitivity, low bandwidth requirements, and potentially low output power. The added advantage of the proposed fault monitoring scheme incurs only a 0.5 dB penalty on the upstream transmissions on the existing infrastructure.

  19. Emissions trading in the transport sector. Feasible approach for an upstream model. Executive summary; Emissionshandel im Verkehr. Ansaetze fuer einen moeglichen Up-Stream-Handel im Verkehr. Endbericht

    Energy Technology Data Exchange (ETDEWEB)

    Bertenrath, Roman; Liebig, Lars [Koeln Univ. (Germany). Finanzwissenschaftliches Forschungsinstitut; Betz, Regina; Rogge, Karoline; Schade, Wolfgang [Fraunhofer-Institut fuer Systemtechnik und Innovationsforschung (ISI), Karlsruhe (Germany); Duennebeil, Frank; Lambrecht, Udo [ifeu-Institut fuer Energie- und Umweltforschung GmbH, Heidelberg (Germany); Bergmann, Heidi

    2005-11-15

    In July, 2003, FiFo Koeln (Cologne Centre for Public Economics) was mandated by the German Federal Environmental Agency (UBA) with the examination of the UFOPLAN scheme 'Emissions Trading System for the Transport Sector - Development of a possible Trading Approach'. The main task of this study was the development of a concrete emissions trading approach for the transport sector, which triggers off a compulsory holding of emissions certificates at the beginning of the energy supply chain (upstream approach). The main focus was rather put on the practical options of the implementation of an upstream approach in the transport sector and its specific problems. The transaction costs of a trading system in the transport sector had to be kept at a minimum level. The upsteam approach discussed in his study seems to be more adequate to include further carbon dioxide emissions of other sectors than the EU downstream model. This can mainly be attributed to the amount and nature of the respective transaction costs. In Germany allocative failure in fuel taxation between diesel and petrol can be diminished regardless of the prices for CO{sub 2}. Emissions trading therefore leads to structural changes. An upstream approach has only indirect effects on the motorcar industry and refiners. Therefore, technical CO{sub 2} reduction can primarily be realised via an increased consumer demand for ore fuel-efficient vehicles, new propulsion technology or alternative fuels based on renewable energies. In the case of an open trading system the amount of transport emissions was estimated that actually could be reduced to be relatively small. The authors of the contribution under consideration are not convinced that the full potential of existing adaptation options in the transport sector can be tapped by an open emissions trading. The transport sector will cope with additional CO{sub 2} costs without tapping the potential of relatively cheap adaptation options. Also at closed

  20. A Mobile IPv6 based Distributed Mobility Management Mechanism of Mobile Internet

    Science.gov (United States)

    Yan, Shi; Jiayin, Cheng; Shanzhi, Chen

    A flatter architecture is one of the trends of mobile Internet. Traditional centralized mobility management mechanism faces the challenges such as scalability and UE reachability. A MIPv6 based distributed mobility management mechanism is proposed in this paper. Some important network entities and signaling procedures are defined. UE reachability is also considered in this paper through extension to DNS servers. Simulation results show that the proposed approach can overcome the scalability problem of the centralized scheme.

  1. Secure IP mobility management for VANET

    CERN Document Server

    Taha, Sanaa

    2013-01-01

    This brief presents the challenges and solutions for VANETs' security and privacy problems occurring in mobility management protocols including Mobile IPv6 (MIPv6), Proxy MIPv6 (PMIPv6), and Network Mobility (NEMO). The authors give an overview of the concept of the vehicular IP-address configurations as the prerequisite step to achieve mobility management for VANETs, and review the current security and privacy schemes applied in the three mobility management protocols. Throughout the brief, the authors propose new schemes and protocols to increase the security of IP addresses within VANETs in

  2. On-line soft sensing in upstream bioprocessing.

    Science.gov (United States)

    Randek, Judit; Mandenius, Carl-Fredrik

    2018-02-01

    This review provides an overview and a critical discussion of novel possibilities of applying soft sensors for on-line monitoring and control of industrial bioprocesses. Focus is on bio-product formation in the upstream process but also the integration with other parts of the process is addressed. The term soft sensor is used for the combination of analytical hardware data (from sensors, analytical devices, instruments and actuators) with mathematical models that create new real-time information about the process. In particular, the review assesses these possibilities from an industrial perspective, including sensor performance, information value and production economy. The capabilities of existing analytical on-line techniques are scrutinized in view of their usefulness in soft sensor setups and in relation to typical needs in bioprocessing in general. The review concludes with specific recommendations for further development of soft sensors for the monitoring and control of upstream bioprocessing.

  3. Upstream-downstream cooperation approach in Guanting Reservoir watershed.

    Science.gov (United States)

    Yang, Zhi-Feng; Zhang, Wen-Guo

    2005-01-01

    A case study is introduced and discussed concerning water dispute of misuse and pollution between up- and down-stream parts. The relations between water usage and local industrial structures are analyzed. Results show it is important to change industrial structures of the target region along with controlling water pollution by technical and engineering methods. Three manners of upstream-downstream cooperation are presented and discussed based on the actual conditions of Guangting Reservoir watershed. Two typical scenarios are supposed and studied along with the local plan on water resources development. The best solution for this cooperation presents a good way to help the upstream developing in a new pattern of eco-economy.

  4. Torque fluctuations caused by upstream mean flow and turbulence

    Science.gov (United States)

    Farr, T. D.; Hancock, P. E.

    2014-12-01

    A series of studies are in progress investigating the effects of turbine-array-wake interactions for a range of atmospheric boundary layer states by means of the EnFlo meteorological wind tunnel. The small, three-blade model wind turbines drive 4-quadrant motor-generators. Only a single turbine in neutral flow is considered here. The motor-generator current can be measured with adequate sensitivity by means of a current sensor allowing the mean and fluctuating torque to be inferred. Spectra of torque fluctuations and streamwise velocity fluctuations ahead of the rotor, between 0.1 and 2 diameters, show that only the large-scale turbulent motions contribute significantly to the torque fluctuations. Time-lagged cross-correlation between upstream velocity and torque fluctuations are largest over the inner part of the blade. They also show the turbulence to be frozen in behaviour over the 2 diameters upstream of the turbine.

  5. Environmental regulatory framework for the upstream petroleum industry

    International Nuclear Information System (INIS)

    1996-01-01

    In order to provide its member companies with a useful reference document in environmental analysis and compliance, CAPP compiled a list of Canadian legislation, regulations and guidelines which relate to the upstream petroleum industry. Text of all federal, Alberta, British Columbia and Saskatchewan legislation, regulations, guidelines and related documents were provided. Pending legislation, regulations and government policy have been identified. Annual updates will be provided to all subscribers

  6. Entrepreneurial Leadership in Upstream Oil and Gas Industry

    OpenAIRE

    Kalu, Mona Ukpai

    2015-01-01

    The study examined Entrepreneurial leadership in Upstream Oil and Gas industry and its ability to accelerate innovative energy technology development. The declining deliverability from existing reservoirs and ever increasing demand for energy to fuel growth in many parts of the world is driving oil and gas exploration into more difficult to access reservoirs like bituminous sands and shale gas. Accelerating new innovative technology development to access these new streams of profitable oil an...

  7. DENSITY FLUCTUATIONS UPSTREAM AND DOWNSTREAM OF INTERPLANETARY SHOCKS

    Energy Technology Data Exchange (ETDEWEB)

    Pitňa, A.; Šafránková, J.; Němeček, Z.; Goncharov, O.; Němec, F.; Přech, L. [Charles University, Faculty of Mathematics and Physics, V Holešovičkách 2, 180 00 Prague 8 (Czech Republic); Chen, C. H. K. [Department of Physics, Imperial College London, London SW7 2AZ (United Kingdom); Zastenker, G. N., E-mail: jana.safrankova@mff.cuni.cz [Space Research Institute of Russian Academy of Sciences, Moscow, Russia, Profsoyuznaya ul. 84/32, Moscow 117997 (Russian Federation)

    2016-03-01

    Interplanetary (IP) shocks as typical large-scale disturbances arising from processes such as stream–stream interactions or Interplanetary Coronal Mass Ejection (ICME) launching play a significant role in the energy redistribution, dissipation, particle heating, acceleration, etc. They can change the properties of the turbulent cascade on shorter scales. We focus on changes of the level and spectral properties of ion flux fluctuations upstream and downstream of fast forward oblique shocks. Although the fluctuation level increases by an order of magnitude across the shock, the spectral slope in the magnetohydrodynamic range is conserved. The frequency spectra upstream of IP shocks are the same as those in the solar wind (if not spoiled by foreshock waves). The spectral slopes downstream are roughly proportional to the corresponding slopes upstream, suggesting that the properties of the turbulent cascade are conserved across the shock; thus, the shock does not destroy the shape of the spectrum as turbulence passes through it. Frequency spectra downstream of IP shocks often exhibit “an exponential decay” in the ion kinetic range that was earlier reported at electron scales in the solar wind or at ion scales in the interstellar medium. We suggest that the exponential shape of ion flux spectra in this range is caused by stronger damping of the fluctuations in the downstream region.

  8. Upstream waves simultaneously observed by ISEE and UKS

    International Nuclear Information System (INIS)

    Russell, C.T.; Luhmann, J.G.; Elphic, R.C.; Southwood, D.J.; Smith, M.F.; Johnstone, A.D.

    1987-01-01

    Measurements obtained in the solar wind by ISEE-2 and the United Kingdom Subsatellite (UKS) have been examined for observations of upstream waves. These data reveal that the waves in the foreshock region are enhanced at all frequencies from at least 0.003 Hz to 0.5 Hz. The wave spectra generally have a spectral peak, but this peak is usually broad and the peak frequency depends on the position of the spacecraft. Generally, the spectra seen at the two spacecraft are most similar at high frequencies and least similar at low frequencies. The geometry of the interaction is displayed in the plane containing the magnetic field, the solar wind velocity, and the spacecraft location. However, this coordinate system does not order all the observed wave properties. It does not clearly explain or order the handedness of the waves, or their direction of propagation. It is clear that the upstream region is inherently three-dimensional. The position-dependent nature of the upstream waves indicates that comparisons between ground-based measurements and in-situ observations must be undertaken with some caution

  9. Scheme Program Documentation Tools

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2004-01-01

    are separate and intended for different documentation purposes they are related to each other in several ways. Both tools are based on XML languages for tool setup and for documentation authoring. In addition, both tools rely on the LAML framework which---in a systematic way---makes an XML language available...... as named functions in Scheme. Finally, the Scheme Elucidator is able to integrate SchemeDoc resources as part of an internal documentation resource....

  10. Optimal powering schemes for legged robotics

    Science.gov (United States)

    Muench, Paul; Bednarz, David; Czerniak, Gregory P.; Cheok, Ka C.

    2010-04-01

    Legged Robots have tremendous mobility, but they can also be very inefficient. These inefficiencies can be due to suboptimal control schemes, among other things. If your goal is to get from point A to point B in the least amount of time, your control scheme will be different from if your goal is to get there using the least amount of energy. In this paper, we seek a balance between these extremes by looking at both efficiency and speed. We model a walking robot as a rimless wheel, and, using Pontryagin's Maximum Principle (PMP), we find an "on-off" control for the model, and describe the switching curve between these control extremes.

  11. Monitoring upstream sinkhole development by detailed sonar profiling

    Energy Technology Data Exchange (ETDEWEB)

    Rigbey, S. [Acres International Ltd., Niagara Falls, ON (Canada)

    2004-09-01

    This paper describes the development and use of a simple sonar system that has been used by engineers for routine monitoring of small sinkholes on the upstream face of a distressed earth dam. Improper construction of the dam led to the development of several sinkholes measuring 10 to 20 m in diameter upstream from the dam which is founded on deep alluvial sands and gravels. The dam has a central core of silt and leakage varies between 200 and 500 l/s, depending on the water level of the reservoir. The main issues with the upstream blanket are: improper fill placement due to the inability to dewater the area properly; omission of a filter material between the blanket and the alluvium foundation; thin placement of fill and runnelling of the blanket prior to impoundment; and, short upstream extent of the blanket. A downstream weighting toe of material was placed to address the seepage and piping that developed immediately following impounding. Other incidents continued over the years, such as downstream sinkholes, slumping of the crest and repairs about 12 years after construction. An inverter filter was also constructed to better control the seepage. Simple bathymetric surveys conducted by sounding the bottom of the reservoir from the ice surface each winter revealed the presence of several large sinkholes. Although infilling programs were conducted, sinkholes redeveloped after each program. The bathymetric surveys were found to be limited in accuracy and repeatability. Therefore, it was not possible to monitor small developments on a yearly basis. A 3-dimensional seepage model was developed to reconcile some of the unexplained piezometric patterns and to better understand the seepage patterns. However, this was also unsuccessful on its own. A trial sonar survey was then undertaken in 2002 by a Vancouver-based sonar company using an Imagenix profiling sonar head. It was successful in locating a small, previously unknown sinkhole measuring a few metres in diameter at

  12. Multiresolution signal decomposition schemes

    NARCIS (Netherlands)

    J. Goutsias (John); H.J.A.M. Heijmans (Henk)

    1998-01-01

    textabstract[PNA-R9810] Interest in multiresolution techniques for signal processing and analysis is increasing steadily. An important instance of such a technique is the so-called pyramid decomposition scheme. This report proposes a general axiomatic pyramid decomposition scheme for signal analysis

  13. Adaptive protection scheme

    Directory of Open Access Journals (Sweden)

    R. Sitharthan

    2016-09-01

    Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.

  14. Energy-Saving Mechanism in WDM/TDM-PON Based on Upstream Network Traffic

    Directory of Open Access Journals (Sweden)

    Paola Garfias

    2014-08-01

    Full Text Available One of the main challenges of Passive Optical Networks (PONs is the resource (bandwidth and wavelength management. Since it has been shown that access networks consume a significant part of the overall energy of the telecom networks, the resource management schemes should also consider energy minimization strategies. To sustain the increased bandwidth demand of emerging applications in the access section of the network, it is expected that next generation optical access networks will adopt the wavelength division/time division multiplexing (WDM/TDM technique to increase PONs capacity. Compared with traditional PONs, the architecture of a WDM/TDM-PON requires more transceivers/receivers, hence they are expected to consume more energy. In this paper, we focus on the energy minimization in WDM/TDM-PONs and we propose an energy-efficient Dynamic Bandwidth and Wavelength Allocation mechanism whose objective is to turn off, whenever possible, the unnecessary upstream traffic receivers at the Optical Line Terminal (OLT. We evaluate our mechanism in different scenarios and show that the proper use of upstream channels leads to relevant energy savings. Our proposed energy-saving mechanism is able to save energy at the OLT while maintaining the introduced penalties in terms of packet delay and cycle time within an acceptable range. We might highlight the benefits of our proposal as a mechanism that maximizes the channel utilization. Detailed implementation of the proposed algorithm is presented, and simulation results are reported to quantify energy savings and effects on network performance on different network scenarios.

  15. Increased risk of oesophageal adenocarcinoma among upstream petroleum workers

    Science.gov (United States)

    Kirkeleit, Jorunn; Riise, Trond; Bjørge, Tone; Moen, Bente E; Bråtveit, Magne; Christiani, David C

    2013-01-01

    Objectives To investigate cancer risk, particularly oesophageal cancer, among male upstream petroleum workers offshore potentially exposed to various carcinogenic agents. Methods Using the Norwegian Registry of Employers and Employees, 24 765 male offshore workers registered from 1981 to 2003 was compared with 283 002 male referents from the general working population matched by age and community of residence. The historical cohort was linked to the Cancer Registry of Norway and the Norwegian Cause of Death Registry. Results Male offshore workers had excess risk of oesophageal cancer (RR 2.6, 95% CI 1.4 to 4.8) compared with the reference population. Only the adenocarcinoma type had a significantly increased risk (RR 2.7, 95% CI 1.0 to 7.0), mainly because of an increased risk among upstream operators (RR 4.3, 95% CI 1.3 to 14.5). Upstream operators did not have significant excess of respiratory system or colon cancer or mortality from any other lifestyle-related diseases investigated. Conclusion We found a fourfold excess risk of oesophageal adenocarcinoma among male workers assumed to have had the most extensive contact with crude oil. Due to the small number of cases, and a lack of detailed data on occupational exposure and lifestyle factors associated with oesophageal adenocarcinoma, the results must be interpreted with caution. Nevertheless, given the low risk of lifestyle-related cancers and causes of death in this working group, the results add to the observations in other low-powered studies on oesophageal cancer, further suggesting that factors related to the petroleum stream or carcinogenic agents used in the production process might be associated with risk of oesophageal adenocarcinoma. PMID:19858535

  16. POSTRANSLATIONAL MODIFICATIONS OF P53: UPSTREAM SIGNALING PATHWAYS.

    Energy Technology Data Exchange (ETDEWEB)

    ANDERSON,C.W.APPELLA,E.

    2003-10-23

    The p53 tumor suppressor is a tetrameric transcription factor that is posttranslational modified at >20 different sites by phosphorylation, acetylation, or sumoylation in response to various cellular stress conditions. Specific posttranslational modifications, or groups of modifications, that result from the activation of different stress-induced signaling pathways are thought to modulate p53 activity to regulate cell fate by inducing cell cycle arrest, apoptosis, or cellular senescence. Here we review recent progress in characterizing the upstream signaling pathways whose activation in response to various genotoxic and non-genotoxic stresses result in p53 posttranslational modifications.

  17. Electromagnetic ion beam instability upstream of the earth's bow shock

    International Nuclear Information System (INIS)

    Gary, S.P.; Gosling, J.T.; Forslund, D.W.

    1981-01-01

    The linear theory of the electromagnetic ion beam instability for arbitrary angles of propagation has been studied. The parameters considered in the theory are typical of the solar wind upstream of the earth's bow shock when a 'reflected' proton beam is present. Maximum growth occurs for propagation parallel to the ambient field B, but this instability also displays significant growth at wave-vectors oblique to B, Oblique, unstable modes seem to be the likely source of the compressive magnetic fluctuations recently observed in conjunction with 'diffuse' ion population. An energetic ion beam does not directly give rise to linear growth of either ion acoustic or whistler mode instabilities

  18. Multiple upstream modules regulate zebrafish myf5 expression

    Directory of Open Access Journals (Sweden)

    Weng Chih-Wei

    2007-01-01

    Full Text Available Abstract Background Myf5 is one member of the basic helix-loop-helix family of transcription factors, and it functions as a myogenic factor that is important for the specification and differentiation of muscle cells. The expression of myf5 is somite- and stage-dependent during embryogenesis through a delicate regulation. However, this complex regulatory mechanism of myf5 is not clearly understood. Results We isolated a 156-kb bacterial artificial chromosome clone that includes an upstream 80-kb region and a downstream 70-kb region of zebrafish myf5 and generated a transgenic line carrying this 156-kb segment fused to a green fluorescent protein (GFP reporter gene. We find strong GFP expression in the most rostral somite and in the presomitic mesoderm during segmentation stages, similar to endogenous myf5 expression. Later, the GFP signals persist in caudal somites near the tail bud but are down-regulated in the older, rostral somites. During the pharyngula period, we detect GFP signals in pectoral fin buds, dorsal rostral myotomes, hypaxial myotomes, and inferior oblique and superior oblique muscles, a pattern that also corresponds well with endogenous myf5 transcripts. To characterize the specific upstream cis-elements that regulate this complex and dynamic expression pattern, we also generated several transgenic lines that harbor various lengths within the upstream 80-kb segment. We find that (1 the -80 kb/-9977 segment contains a fin and cranial muscle element and a notochord repressor; (2 the -9977/-6213 segment contains a strong repressive element that does not include the notochord-specific repressor; (3 the -6212/-2938 segment contains tissue-specific elements for bone and spinal cord; (4 the -2937/-291 segment contains an eye enhancer, and the -2937/-2457 segment is required for notochord and myocyte expression; and (5 the -290/-1 segment is responsible for basal transcription in somites and the presomitic mesoderm. Conclusion We suggest

  19. Cost-Effective Location Management for Mobile Agents on the Internet

    OpenAIRE

    Chien-Sheng Chen; Jiing-Dong Hwang; Chyuan-Der Lu; Ting-Yuan Yeh

    2015-01-01

    Many mobile agent system-related services and applications require interacting with a mobile agent by passing messages. However, an agent’s mobility raises several challenges in delivering messages to a mobile agent accurately. Consisting of tracking and message delivery phases, most mobile agent location management schemes create or receive many update messages and interaction messages to ensure the effectiveness of the schemes. In addition to downgrading the overall performance of a mobile ...

  20. Upstream passage, spawning, and stock identification of fall chinook in the Snake River, 1992 and 1993. Final report

    International Nuclear Information System (INIS)

    Blankenship, H.L.; Mendel, G.W.

    1997-05-01

    This final report of the 3-year study summarizes activities and results for 1993. Study objectives were to: (1) determine the source of losses (or accounting errors) for adult chinook salmon between Ice Harbor Dam (IHR) and Lower Granite Dam (LGR), and upstream of LGR in the Snake River; (2) identify spawning locations upstream of LGR for calibration of aerial redd surveys, redd habitat mapping, carcass recovery for genetic stock profile analysis, and correction of estimated adult/redd ratios; and (3) estimate passage and migration times at Snake River. 200 fall chinook salmon were radio tagged and tracked with aerial, fixed-site, and ground mobile tracking. Fish were released upstream of IHR at Charbonneau Park (CHAR). 190 of the fish were tracked or relocated away from CHAR. 59 fish descended to below IHR without crossing Lower Monumental Dam (LMO). Another 128 salmon passed upstream of LMO without falling back at IHR. Only 80 salmon passed Little Goose Dam (LGO) without falling back at a downstream dam; 66 of these fish passed LGR. Many fish that fell back reascended the dams. A total of 72 salmon released at CHAR passed upstream of LGR, including fish that had fallen back and reascended a dam. Over 80 percent of the salmon that entered Lyons Ferry Hatchery each year had reached LGO before descending to the hatchery. Extensive wandering was documented between LMO and upstream of LGR before salmon entered Lyons Ferry Hatchery or the Tucannon River. In 1993, 41 salmon were found to be of hatchery origin when recovered. These fish entered Lyons Ferry Hatchery with similar movements to unmarked salmon. Each year a few salmon have remained near the hatchery without entering, which suggests the hatchery may have inadequate attraction flows. Fall chinook passed lower Snake River dams in 2-5 days each on average. Median travel times through LMO and LGO were 1.0-1.3 days each, which was slower than for spring chinook or steelhead in 1993. 5 refs., 21 figs., 20 tabs

  1. Functional promoter upstream p53 regulatory sequence of IGFBP3 that is silenced by tumor specific methylation

    International Nuclear Information System (INIS)

    Hanafusa, Tadashi; Shinji, Toshiyuki; Shiraha, Hidenori; Nouso, Kazuhiro; Iwasaki, Yoshiaki; Yumoto, Eichiro; Ono, Toshiro; Koide, Norio

    2005-01-01

    Insulin-like growth factor binding protein (IGFBP)-3 functions as a carrier of insulin-like growth factors (IGFs) in circulation and a mediator of the growth suppression signal in cells. There are two reported p53 regulatory regions in the IGFBP3 gene; one upstream of the promoter and one intronic. We previously reported a hot spot of promoter hypermethylation of IGFBP-3 in human hepatocellular carcinomas and derivative cell lines. As the hot spot locates at the putative upstream p53 consensus sequences, these p53 consensus sequences are really functional is a question to be answered. In this study, we examined the p53 consensus sequences upstream of the IGFBP-3 promoter for the p53 induced expression of IGFBP-3. Deletion, mutagenesis, and methylation constructs of IGFBP-3 promoter were assessed in the human hepatoblastoma cell line HepG2 for promoter activity. Deletions and mutations of these sequences completely abolished the expression of IGFBP-3 in the presence of p53 overexpression. In vitro methylation of these p53 consensus sequences also suppressed IGFBP-3 expression. In contrast, the expression of IGFBP-3 was not affected in the absence of p53 overexpression. Further, we observed by electrophoresis mobility shift assay that p53 binding to the promoter region was diminished when methylated. From these observations, we conclude that four out of eleven p53 consensus sequences upstream of the IGFBP-3 promoter are essential for the p53 induced expression of IGFBP-3, and hypermethylation of these sequences selectively suppresses p53 induced IGFBP-3 expression in HepG2 cells

  2. ISEE/IMP Observations of simultaneous upstream ion events

    International Nuclear Information System (INIS)

    Mitchel, D.G.; Roelof, E.C.; Sanderson, T.R.; Reinhard, R.; Wenzel, K.

    1983-01-01

    Propagation of upstream energetic (50--200 keV) ions is analyzed in sixteen events observed simulataneously by solid state detectors on ISEE 3 at approx.200 R/sub E/ and on IMP 8 at approx.35 R/sub E/ from the earth. Conclusions are based on comparisons of the pitch angle distributions observed at the two spacecraft and transformed into the solar wind frame. They are beamlike at ISEE 3 and are confined to the outward hemisphere. When IMP 8 is furtherest from the bow shock, they are also usually beamlike, or hemispheric. However, when IMP 8 is closer to the bow shock, pancakelike distributions are observed. This systematic variation in the IMP 8 pitch angle distributions delimits a scattering region l< or approx. =14 R/sub E/ upstream of the earth's bow shock (l measured along the interplanetary magnetic field) that dominates ion propagation, influences the global distribution of fluxes in the foreshock, and may play a role in acceleration of the ions. When IMP 8 is beyond lapprox.15 R/sub E/, the propagation appears to be essentially scatter-free between IMP 8 and ISEE 3; this is deduced from the absence of earthward fluxes at IMP 8 as well as the tendency for the spin-averaged fluxes to be comparable at the two spacecraft

  3. EMMPRIN, an upstream regulator of MMPs, in CNS biology.

    Science.gov (United States)

    Kaushik, Deepak Kumar; Hahn, Jennifer Nancy; Yong, V Wee

    2015-01-01

    Matrix metalloproteinases (MMPs) are engaged in pathologies associated with infections, tumors, autoimmune disorders and neurological dysfunctions. With the identification of an upstream regulator of MMPs, EMMPRIN (Extracellular matrix metalloproteinase inducer, CD147), it is relevant to address if EMMPRIN plays a role in the pathology of central nervous system (CNS) diseases. This would enable the possibility of a more upstream and effective therapeutic target. Indeed, conditions including gliomas, Alzheimer's disease (AD), multiple sclerosis (MS), and other insults such as hypoxia/ischemia show elevated levels of EMMPRIN which correlate with MMP production. In contrast, given EMMPRIN's role in CNS homeostasis with respect to regulation of monocarboxylate transporters (MCTs) and interactions with adhesion molecules including integrins, we need to consider that EMMPRIN may also serve important regulatory or protective functions. This review summarizes the current understanding of EMMPRIN's involvement in CNS homeostasis, its possible roles in escalating or reducing neural injury, and the mechanisms of EMMPRIN including and apart from MMP induction. Copyright © 2015 International Society of Matrix Biology. Published by Elsevier B.V. All rights reserved.

  4. A conservative scheme for 2D and 3D adaptive semi-Lagrangian advection

    OpenAIRE

    Behrens, Jörn; Mentrup, Lars

    2005-01-01

    This article describes a 2D and 3D adaptive and mass conservingsemi-Lagrangian advection scheme for atmospheric transport problems. Fromthe integral form of the conservation law we derive a semi-Lagrangian schemebased on conservation of mass along trajectories. The mapping of mass fromthe old (adaptively refined and possibly different) grid to the upstream controlvolume is performed by a mass packet based scheme, essentially consistingof a sub-grid discretization. We validate the new adaptive...

  5. Mobility management techniques for the next-generation wireless networks

    Science.gov (United States)

    Sun, Junzhao; Howie, Douglas P.; Sauvola, Jaakko J.

    2001-10-01

    The tremendous demands from social market are pushing the booming development of mobile communications faster than ever before, leading to plenty of new advanced techniques emerging. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Mobility management is an important issue in the area of mobile communications, which can be best solved at the network layer. One of the key features of the next generation wireless networks is all-IP infrastructure. This paper discusses the mobility management schemes for the next generation mobile networks through extending IP's functions with mobility support. A global hierarchical framework model for the mobility management of wireless networks is presented, in which the mobility management is divided into two complementary tasks: macro mobility and micro mobility. As the macro mobility solution, a basic principle of Mobile IP is introduced, together with the optimal schemes and the advances in IPv6. The disadvantages of the Mobile IP on solving the micro mobility problem are analyzed, on the basis of which three main proposals are discussed as the micro mobility solutions for mobile communications, including Hierarchical Mobile IP (HMIP), Cellular IP, and Handoff-Aware Wireless Access Internet Infrastructure (HAWAII). A unified model is also described in which the different micro mobility solutions can coexist simultaneously in mobile networks.

  6. CSR schemes in agribusiness

    DEFF Research Database (Denmark)

    Pötz, Katharina Anna; Haas, Rainer; Balzarova, Michaela

    2013-01-01

    of schemes that can be categorized on focus areas, scales, mechanisms, origins, types and commitment levels. Research limitations/implications – The findings contribute to conceptual and empirical research on existing models to compare and analyse CSR standards. Sampling technique and depth of analysis limit......Purpose – The rise of CSR followed a demand for CSR standards and guidelines. In a sector already characterized by a large number of standards, the authors seek to ask what CSR schemes apply to agribusiness, and how they can be systematically compared and analysed. Design....../methodology/approach – Following a deductive-inductive approach the authors develop a model to compare and analyse CSR schemes based on existing studies and on coding qualitative data on 216 CSR schemes. Findings – The authors confirm that CSR standards and guidelines have entered agribusiness and identify a complex landscape...

  7. Tabled Execution in Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  8. Machine protection schemes for the SLC

    International Nuclear Information System (INIS)

    Ross, M.C.

    1991-01-01

    The beamline components of a linear collider must be protected from high power beams in a way that is both reliable and has a minimum impact on integrated luminosity. When an upstream accelerator component fault occurs, the machine protection system suppresses the appropriate beam pulses and restores them when the fault clears or is compensated for. If an unacceptable localized beam loss is detected, without an accompanying component fault that is a likely cause of the loss, the system must provide identical, lower rate (lower average power), beam pulses to be used for diagnosis. This must not be done at the expense of any upstream beam stabilization system since fault diagnosis and recovery may take some time. Since the SLC beam pulse sequence is a regenerative one, i.e. correct function on a given pulse requires that several preceding pulses have been successfully completed, beam pulse repetition rate limiting is not trivial. Smooth, rapid, recovery from this type of fault is very important and can have a significant impact on luminosity. This paper provides an overview of the beam suppression and repetition rate limiting schemes used at the SLC

  9. Mobile Learning Using Mobile Phones

    Science.gov (United States)

    Vicente, Paula

    2013-01-01

    The participation in mobile learning programs is conditioned by having/using mobile communication technology. Those who do not have or use such technology cannot participate in mobile learning programs. This study evaluates who are the most likely participants of mobile learning programs by examining the demographic profile and mobile phone usage…

  10. Evaluating statistical cloud schemes

    OpenAIRE

    Grützun, Verena; Quaas, Johannes; Morcrette , Cyril J.; Ament, Felix

    2015-01-01

    Statistical cloud schemes with prognostic probability distribution functions have become more important in atmospheric modeling, especially since they are in principle scale adaptive and capture cloud physics in more detail. While in theory the schemes have a great potential, their accuracy is still questionable. High-resolution three-dimensional observational data of water vapor and cloud water, which could be used for testing them, are missing. We explore the potential of ground-based re...

  11. Gamma spectrometry; level schemes

    International Nuclear Information System (INIS)

    Blachot, J.; Bocquet, J.P.; Monnand, E.; Schussler, F.

    1977-01-01

    The research presented dealt with: a new beta emitter, isomer of 131 Sn; the 136 I levels fed through the radioactive decay of 136 Te (20.9s); the A=145 chain (β decay of Ba, La and Ce, and level schemes for 145 La, 145 Ce, 145 Pr); the A=47 chain (La and Ce, β decay, and the level schemes of 147 Ce and 147 Pr) [fr

  12. Scheme of energy utilities

    International Nuclear Information System (INIS)

    2002-04-01

    This scheme defines the objectives relative to the renewable energies and the rational use of the energy in the framework of the national energy policy. It evaluates the needs and the potentialities of the regions and preconizes the actions between the government and the territorial organizations. The document is presented in four parts: the situation, the stakes and forecasts; the possible actions for new measures; the scheme management and the regional contributions analysis. (A.L.B.)

  13. Advanced mobility handover for mobile IPv6 based wireless networks.

    Science.gov (United States)

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches.

  14. Advanced Mobility Handover for Mobile IPv6 Based Wireless Networks

    Science.gov (United States)

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches. PMID:25614890

  15. Staging Mobilities / Designing Mobilities

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    2015-01-01

    , and systems 'hosting' these multiple and complex mobilities are designed and how they are staging these in terms of their physical layout. By analysing specific cases of ‘mobilities design’ related to the four modes of moving; Walk, Bike, Train, and Car, the book uncover important and until now neglected...... is more than movement between point A and B. It explores how the movement of people, goods, information, and signs influences human understandings of self, other and the built environment. Moving towards a new understanding of the relationship between movement, interaction and environments, the project...

  16. Exploring the Evolution of New Mobile Services

    Directory of Open Access Journals (Sweden)

    Yong Chen

    2017-01-01

    Full Text Available The emergence and widespread use of mobile Internet technology has led to many different kinds of new mobile communications services, such as WeChat. Users could have more choices when attempting to satisfy their communications needs. The ability to predict the way in which users will use new mobile communications services is extremely valuable to mobile communications service providers. In this work, we propose a method for predicting how a user will use a new mobile service. Our scheme is inspired by the evolutionary game theory. With large-scale real world datasets collected from mobile service providers, we first extract the benefit-related features for users who were starting to use a new mobile service. Then we design our training and prediction methods for predicting potential users. We evaluate our scheme using experiments with large-scale real data. The results show that our approach can predict users’ future behavior with satisfying accuracy.

  17. OGJ group weathered tough times upstream and downstream in 1991

    International Nuclear Information System (INIS)

    Biggs, J.B.; Price, R.B.

    1992-01-01

    With an upstream sector hit by low oil and gas prices and downstream operations squeezed by weak petroleum demand, 1991, was a tough year for the group of 22 major integrated U.S. companies Oil and Gas Journal tracks. This paper reports that the brief respite caused by the oil price spike in second half 1990 ended abruptly early in first half 1991, and it turned into a year of buckling down for most companies. They shed non-core assets, implemented strategic restructuring moves, and reduced staff. Although low prices slowed overall drilling activity for the group, oil and gas production increased slightly, and most companies reported reserves gains. Recession in the U.S. and Europe depressed demand for the group's fined products enough to pinch downstream earnings even as buoyant Asia-Pacific demand helped jack up world product sales

  18. SAP and life-cycle management in the upstream

    International Nuclear Information System (INIS)

    Davis, B.

    1997-01-01

    Business relationships today depend more than ever on changing alliances and partnerships to leverage risk in a commodity market. SAP is a fully integrated, enterprise-wide software system that uses business processes tightly integrated around a common data model to facilitate these business relationships across the oil and gas supply chain. The SAP modules contain the business processes that are needed to handle the logistics and operations maintenance for operating an oil or gas field. Each industry has unique business-process requirements that the core SAP application set may not cover. In the oil and gas business, there are unique financial requirements in the upstream for working in joint ventures. In the downstream business segment, handling bulk hydrocarbons requires additional functionality

  19. Shape and shear guide sperm cells spiraling upstream

    Science.gov (United States)

    Kantsler, Vasily; Dunkel, Jorn; Goldstein, Raymond E.

    2014-11-01

    A major puzzle in biology is how mammalian sperm determine and maintain the correct swimming direction during the various phases of the sexual reproduction process. Currently debated mechanisms for sperm long range travel vary from peristaltic pumping to temperature sensing (thermotaxis) and direct response to fluid flow (rheotaxis), but little is known quantitatively about their relative importance. Here, we report the first quantitative experimental study of mammalian sperm rheotaxis. Using microfluidic devices, we investigate systematically the swimming behavior of human and bull sperm over a wide range of physiologically relevant shear rates and viscosities. Our measurements show that the interplay of fluid shear, steric surface-interactions and chirality of the flagellar beat leads to a stable upstream spiraling motion of sperm cells, thus providing a generic and robust rectification mechanism to support mammalian fertilization. To rationalize these findings, we identify a minimal mathematical model that is capable of describing quantitatively the experimental observations.

  20. Statistical handbook for Canada's upstream petroleum industry: '96 updates

    International Nuclear Information System (INIS)

    1997-01-01

    The Statistical Handbook of CAPP is an annual compilation of useful information about the Canadian petroleum and natural gas industry. It has been published since 1955, and is a key source of upstream petroleum statistics. It presents a historical summary of the petroleum industry''s progress and provides detailed statistical information on the production and consumption of petroleum, petroleum products, natural gas and natural gas liquids, imports and exports, land sales, pipelines, reserves, drilling and refinery activities, and prices in Canada. The information, mostly in tabular form, is based on the latest available data (generally up to and including 1996). For the first time in 1997, the Handbook is also made available in CD-ROM format (EXCEL 5.0). Plans are also underway to publish the Handbook on a secure site on the Internet

  1. Interaction of Energetic Particles with Discontinuities Upstream of Strong Shocks

    Science.gov (United States)

    Malkov, Mikhail; Diamond, Patrick

    2008-11-01

    Acceleration of particles in strong astrophysical shocks is known to be accompanied and promoted by a number of instabilities which are driven by the particles themselves. One of them is an acoustic (also known as Drury's) instability driven by the pressure gradient of accelerated particles upstream. The generated sound waves naturally steepen into shocks thus forming a shocktrain. Similar magnetoacoustic or Alfven type structures may be driven by pick-up ions, for example. We consider the solutions of kinetic equation for accelerated particles within the shocktrain. The accelerated particles are assumed to be coupled to the flow by an intensive pitch-angle scattering on the self-generated Alfven waves. The implications for acceleration and confinement of cosmic rays in this shock environment will be discussed.

  2. From Worker Health To Citizen Health: Moving Upstream

    Science.gov (United States)

    Sepulveda, Martin-Jose

    2014-01-01

    New rapid growth economies, urbanization, health systems crises and “big data” are causing fundamental changes in social structures and systems including health. These forces for change have significant consequences for occupational and environmental medicine and will challenge the specialty to think beyond workers and workplaces as the principal locus of innovation for health and performance. These trends are placing great emphasis on upstream strategies for addressing the complex systems dynamics of the social determinants of health. The need to engage systems in communities for healthier workforces is a shift in orientation from worker and workplace centric to citizen and community centric. This change for occupational and environmental medicine requires extending systems approaches in the workplace to communities which are systems of systems and which require different skills, data, tools and partnerships. PMID:24284749

  3. Upstream Disaster Management to Support People Experiencing Homelessness.

    Science.gov (United States)

    Sundareswaran, Madura; Ghazzawi, Andrea; O'Sullivan, Tracey L

    2015-08-18

    The unique context of day-to-day living for people who are chronically homeless or living with housing insecurity puts them at high risk during community disasters. The impacts of extreme events, such as flooding, storms, riots, and other sources of community disruption, underscore the importance of preparedness efforts and fostering community resilience. This study is part of larger initiative focused on enhancing resilience and preparedness among high risk populations. The purpose of this study was to explore critical issues and strategies to promote resilience and disaster preparedness among people who are homeless in Canada. A sample of interviews (n=21) from key informants across Canada was analyzed to explore existing programs and supports for homeless populations. The data was selected from a larger sample of (n=43) interviews focused on programs and supports for people who are at heightened risk for negative impacts during disasters. Qualitative content analysis was used to extract emergent themes and develop a model of multi-level collaboration to support disaster resilience among people who are homeless. The results indicate there is a need for more upstream continuity planning, collaboration and communication between the emergency management sector and community service organizations that support people who are homeless. Prioritization and investment in the social determinants of health and community supports is necessary to promote resilience among this high-risk population. The findings from this study highlight the importance of acknowledging community support organizations as assets in disaster preparedness. Day-to-day resilience is an ongoing theme for people who are chronically homeless or living with housing insecurity. Upstream investment to build adaptive capacity and collaborate with community organizations is an important strategy to enhance community resilience.

  4. Explosion Clad for Upstream Oil and Gas Equipment

    Science.gov (United States)

    Banker, John G.; Massarello, Jack; Pauly, Stephane

    2011-01-01

    Today's upstream oil and gas facilities frequently involve the combination of high pressures, high temperatures, and highly corrosive environments, requiring equipment that is thick wall, corrosion resistant, and cost effective. When significant concentrations of CO2 and/or H2S and/or chlorides are present, corrosion resistant alloys (CRA) can become the material of choice for separator equipment, piping, related components, and line pipe. They can provide reliable resistance to both corrosion and hydrogen embrittlement. For these applications, the more commonly used CRA's are 316L, 317L and duplex stainless steels, alloy 825 and alloy 625, dependent upon the application and the severity of the environment. Titanium is also an exceptional choice from the technical perspective, but is less commonly used except for heat exchangers. Explosion clad offers significant savings by providing a relatively thin corrosion resistant alloy on the surface metallurgically bonded to a thick, lower cost, steel substrate for the pressure containment. Developed and industrialized in the 1960's the explosion cladding technology can be used for cladding the more commonly used nickel based and stainless steel CRA's as well as titanium. It has many years of proven experience as a reliable and highly robust clad manufacturing process. The unique cold welding characteristics of explosion cladding reduce problems of alloy sensitization and dissimilar metal incompatibility. Explosion clad materials have been used extensively in both upstream and downstream oil, gas and petrochemical facilities for well over 40 years. The explosion clad equipment has demonstrated excellent resistance to corrosion, embrittlement and disbonding. Factors critical to insure reliable clad manufacture and equipment design and fabrication are addressed.

  5. Explosion Clad for Upstream Oil and Gas Equipment

    International Nuclear Information System (INIS)

    Banker, John G.; Massarello, Jack; Pauly, Stephane

    2011-01-01

    Today's upstream oil and gas facilities frequently involve the combination of high pressures, high temperatures, and highly corrosive environments, requiring equipment that is thick wall, corrosion resistant, and cost effective. When significant concentrations of CO 2 and/or H 2 S and/or chlorides are present, corrosion resistant alloys (CRA) can become the material of choice for separator equipment, piping, related components, and line pipe. They can provide reliable resistance to both corrosion and hydrogen embrittlement. For these applications, the more commonly used CRA's are 316L, 317L and duplex stainless steels, alloy 825 and alloy 625, dependent upon the application and the severity of the environment. Titanium is also an exceptional choice from the technical perspective, but is less commonly used except for heat exchangers. Explosion clad offers significant savings by providing a relatively thin corrosion resistant alloy on the surface metallurgically bonded to a thick, lower cost, steel substrate for the pressure containment. Developed and industrialized in the 1960's the explosion cladding technology can be used for cladding the more commonly used nickel based and stainless steel CRA's as well as titanium. It has many years of proven experience as a reliable and highly robust clad manufacturing process. The unique cold welding characteristics of explosion cladding reduce problems of alloy sensitization and dissimilar metal incompatibility. Explosion clad materials have been used extensively in both upstream and downstream oil, gas and petrochemical facilities for well over 40 years. The explosion clad equipment has demonstrated excellent resistance to corrosion, embrittlement and disbonding. Factors critical to insure reliable clad manufacture and equipment design and fabrication are addressed.

  6. Upstream particles observed in the earth's foreshock region

    International Nuclear Information System (INIS)

    Eastman, T.E.; Anderson, R.R.; Frank, L.A.; Parks, G.K.

    1981-01-01

    On the basis of primarily an extensive study of fully three-dimensional plasma data, we describe the interrelationships of the upstream particles and plasma waves observed in the earth's foreshock region. The University of Iowa LEPEDEAs detect ions and electrons from 1 eV to 45 keV over all except approx.2% of the unit sphere. Comparisons are made with high time resolution particle data obtained by the University of California (Berkeley) instruments and plasma wave data collected by the University of Iowa plasma wave instruments on the two ISEE spacecraft. The presence of ion beams or dispersed ion distributions is found to be a sufficient condition for the presence of electrostatic and electromagnetic wave emissions. Detailed correlations of ions with plasma waves down to a tenth of an ion gyroperiod indicate that ion acoustic emission is enhanced when increased anisotropies and gyrophase organization are observed. Time aliasing effects limit the interpretation of velocity distributions taken within the foreshock region. High time resolution correlations between the different instruments, however, demonstrate that time variations of a single isotropic or anisotropic distribution cannot produce the dispersed ion distributions. Detailed analysis of high time resolution data reveals that the upstream particles undergo significant spatial and temporal variations including gyrophase organization. Gyrophase organization comprises groups of ion clusters each one of which includes ions with similar pitch angles that gyrate together about a common guiding center. On the basis of our high time resolution analysis of three-dimensional plasma data combined with magnetic field and plasma wave data, we conclude that (1) ions observed in the foreshock region display gyrophase organization produced by ion clusters with a spatial scale <1 R/sub g/, and (2) dispersed ion distributions are produced primarily by direct sources at or near the bow shock

  7. Mobility management in mobile IP

    Science.gov (United States)

    Medidi, Sirisha; Golshani, Forouzan

    2002-07-01

    There is an emerging interest in integrating mobile wireless communication with the Internet based on the Ipv6 technology. Many issues introduced by the mobility of users arise when such an integration is attempted. This paper addresses the problem of mobility management, i.e., that of tracking the current IP addresses of mobile terminals and sustaining active IP connections as mobiles move. The paper presents some architectural and mobility management options for integrating wireless access to the Internet. We then present performance results for Mobile IPv4, route optimization and Mobile IPv6.

  8. Towards Symbolic Encryption Schemes

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik

    2012-01-01

    , namely an authenticated encryption scheme that is secure under chosen ciphertext attack. Therefore, many reasonable encryption schemes, such as AES in the CBC or CFB mode, are not among the implementation options. In this paper, we report new attacks on CBC and CFB based implementations of the well......Symbolic encryption, in the style of Dolev-Yao models, is ubiquitous in formal security models. In its common use, encryption on a whole message is specified as a single monolithic block. From a cryptographic perspective, however, this may require a resource-intensive cryptographic algorithm......-known Needham-Schroeder and Denning-Sacco protocols. To avoid such problems, we advocate the use of refined notions of symbolic encryption that have natural correspondence to standard cryptographic encryption schemes....

  9. Compact Spreader Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  10. New analytic unitarization schemes

    International Nuclear Information System (INIS)

    Cudell, J.-R.; Predazzi, E.; Selyugin, O. V.

    2009-01-01

    We consider two well-known classes of unitarization of Born amplitudes of hadron elastic scattering. The standard class, which saturates at the black-disk limit includes the standard eikonal representation, while the other class, which goes beyond the black-disk limit to reach the full unitarity circle, includes the U matrix. It is shown that the basic properties of these schemes are independent of the functional form used for the unitarization, and that U matrix and eikonal schemes can be extended to have similar properties. A common form of unitarization is proposed interpolating between both classes. The correspondence with different nonlinear equations are also briefly examined.

  11. Mobile Election

    OpenAIRE

    Long, Elena; Lovitskii, Vladimir; Thrasher, Michael; Traynor, David

    2009-01-01

    Mobile phones have the potential of fostering political mobilisation. There is a significant political power in mobile technology. Like the Internet, mobile phones facilitate communication and rapid access to information. Compared to the Internet, however, mobile phone diffusion has reached a larger proportion of the population in most countries, and thus the impact of this new medium is conceivably greater. There are now more mobile phones in the UK than there are people (ave...

  12. Mobile Advertising

    OpenAIRE

    Alamuri, Lavanya

    2009-01-01

    The aim of this project was to get an understanding of how companies adopt mobile as an advertising medium. The literature review aided in framing a draft of the factors that affect mobile advertising adoption and possible forms of mobile advertising. Considering the scope of the thesis work, branding strategy, service costs, personalization and privacy and platform were considered to be the factors that could affect the mobile advertising adoption. A few possible forms on mobile device we...

  13. Cloning and functional analysis of 5'-upstream region of the Pokemon gene.

    Science.gov (United States)

    Yang, Yutao; Zhou, Xiaowei; Zhu, Xudong; Zhang, Chuanfu; Yang, Zhixin; Xu, Long; Huang, Peitang

    2008-04-01

    Pokemon, the POK erythroid myeloid ontogenic factor, not only regulates the expression of many genes, but also plays an important role in cell tumorigenesis. To investigate the molecular mechanism regulating expression of the Pokemon gene in humans, its 5'-upstream region was cloned and analyzed. Transient analysis revealed that the Pokemon promoter is constitutive. Deletion analysis and a DNA decoy assay indicated that the NEG-U and NEG-D elements were involved in negative regulation of the Pokemon promoter, whereas the POS-D element was mainly responsible for its strong activity. Electrophoretic mobility shift assays suggested that the NEG-U, NEG-D and POS-D elements were specifically bound by the nuclear extract from A549 cells in vitro. Mutation analysis demonstrated that cooperation of the NEG-U and NEG-D elements led to negative regulation of the Pokemon promoter. Moreover, the NEG-U and NEG-D elements needed to be an appropriate distance apart in the Pokemon promoter in order to cooperate. Taken together, our results elucidate the mechanism underlying the regulation of Pokemon gene transcription, and also define a novel regulatory sequence that may be used to decrease expression of the Pokemon gene in cancer gene therapy.

  14. Internal Associations of the Acidic Region of Upstream Binding Factor Control Its Nucleolar Localization.

    Science.gov (United States)

    Ueshima, Shuhei; Nagata, Kyosuke; Okuwaki, Mitsuru

    2017-11-15

    Upstream binding factor (UBF) is a member of the high-mobility group (HMG) box protein family, characterized by multiple HMG boxes and a C-terminal acidic region (AR). UBF is an essential transcription factor for rRNA genes and mediates the formation of transcriptionally active chromatin in the nucleolus. However, it remains unknown how UBF is specifically localized to the nucleolus. Here, we examined the molecular mechanisms that localize UBF to the nucleolus. We found that the first HMG box (HMG box 1), the linker region (LR), and the AR cooperatively regulate the nucleolar localization of UBF1. We demonstrated that the AR intramolecularly associates with and attenuates the DNA binding activity of HMG boxes and confers the structured DNA preference to HMG box 1. In contrast, the LR was found to serve as a nuclear localization signal and compete with HMG boxes to bind the AR, permitting nucleolar localization of UBF1. The LR sequence binds DNA and assists the stable chromatin binding of UBF. We also showed that the phosphorylation status of the AR does not clearly affect the localization of UBF1. Our results strongly suggest that associations of the AR with HMG boxes and the LR regulate UBF nucleolar localization. Copyright © 2017 American Society for Microbiology.

  15. JEFX 10 demonstration of Cooperative Hunter Killer UAS and upstream data fusion

    Science.gov (United States)

    Funk, Brian K.; Castelli, Jonathan C.; Watkins, Adam S.; McCubbin, Christopher B.; Marshall, Steven J.; Barton, Jeffrey D.; Newman, Andrew J.; Peterson, Cammy K.; DeSena, Jonathan T.; Dutrow, Daniel A.; Rodriguez, Pedro A.

    2011-05-01

    The Johns Hopkins University Applied Physics Laboratory deployed and demonstrated a prototype Cooperative Hunter Killer (CHK) Unmanned Aerial System (UAS) capability and a prototype Upstream Data Fusion (UDF) capability as participants in the Joint Expeditionary Force Experiment 2010 in April 2010. The CHK capability was deployed at the Nevada Test and Training Range to prosecute a convoy protection operational thread. It used mission-level autonomy (MLA) software applied to a networked swarm of three Raven hunter UAS and a Procerus Miracle surrogate killer UAS, all equipped with full motion video (FMV). The MLA software provides the capability for the hunter-killer swarm to autonomously search an area or road network, divide the search area, deconflict flight paths, and maintain line of sight communications with mobile ground stations. It also provides an interface for an operator to designate a threat and initiate automatic engagement of the target by the killer UAS. The UDF prototype was deployed at the Maritime Operations Center at Commander Second Fleet, Naval Station Norfolk to provide intelligence analysts and the ISR commander with a common fused track picture from the available FMV sources. It consisted of a video exploitation component that automatically detected moving objects, a multiple hypothesis tracker that fused all of the detection data to produce a common track picture, and a display and user interface component that visualized the common track picture along with appropriate geospatial information such as maps and terrain as well as target coordinates and the source video.

  16. Mobile phone collection, reuse and recycling in the UK

    International Nuclear Information System (INIS)

    Ongondo, F.O.; Williams, I.D.

    2011-01-01

    Highlights: → We characterized the key features of the voluntary UK mobile phone takeback network via a survey. → We identified 3 flows: information; product (handsets and accessories); and incentives. → There has been a significant rise in the number of UK takeback schemes since 1997. → Most returned handsets are low quality; little data exists on quantities of mobile phones collected. → Takeback schemes increasingly divert EoL mobile phones from landfill and enable reuse/recycling. - Abstract: Mobile phones are the most ubiquitous electronic product on the globe. They have relatively short lifecycles and because of their (perceived) in-built obsolescence, discarded mobile phones represent a significant and growing problem with respect to waste electrical and electronic equipment (WEEE). An emerging and increasingly important issue for industry is the shortage of key metals, especially the types of metals found in mobile phones, and hence the primary aim of this timely study was to assess and evaluate the voluntary mobile phone takeback network in the UK. The study has characterised the information, product and incentives flows in the voluntary UK mobile phone takeback network and reviewed the merits and demerits of the incentives offered. A survey of the activities of the voluntary mobile phone takeback schemes was undertaken in 2008 to: identify and evaluate the takeback schemes operating in the UK; determine the target groups from whom handsets are collected; and assess the collection, promotion and advertising methods used by the schemes. In addition, the survey sought to identify and critically evaluate the incentives offered by the takeback schemes, evaluate their ease and convenience of use; and determine the types, qualities and quantities of mobile phones they collect. The study has established that the UK voluntary mobile phone takeback network can be characterised as three distinctive flows: information flow; product flow (handsets and related

  17. 4. Payment Schemes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 2. Electronic Commerce - Payment Schemes. V Rajaraman. Series Article Volume 6 Issue 2 February 2001 pp 6-13. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/006/02/0006-0013 ...

  18. Contract saving schemes

    NARCIS (Netherlands)

    Ronald, R.; Smith, S.J.; Elsinga, M.; Eng, O.S.; Fox O'Mahony, L.; Wachter, S.

    2012-01-01

    Contractual saving schemes for housing are institutionalised savings programmes normally linked to rights to loans for home purchase. They are diverse types as they have been developed differently in each national context, but normally fall into categories of open, closed, compulsory, and ‘free

  19. Alternative reprocessing schemes evaluation

    International Nuclear Information System (INIS)

    1979-02-01

    This paper reviews the parameters which determine the inaccessibility of the plutonium in reprocessing plants. Among the various parameters, the physical and chemical characteristics of the materials, the various processing schemes and the confinement are considered. The emphasis is placed on that latter parameter, and the advantages of an increased confinement in the socalled PIPEX reprocessing plant type are presented

  20. Introduction to association schemes

    NARCIS (Netherlands)

    Seidel, J.J.

    1991-01-01

    The present paper gives an introduction to the theory of association schemes, following Bose-Mesner (1959), Biggs (1974), Delsarte (1973), Bannai-Ito (1984) and Brouwer-Cohen-Neumaier (1989). Apart from definitions and many examples, also several proofs and some problems are included. The paragraphs

  1. Reaction schemes of immunoanalysis

    International Nuclear Information System (INIS)

    Delaage, M.; Barbet, J.

    1991-01-01

    The authors apply a general theory for multiple equilibria to the reaction schemes of immunoanalysis, competition and sandwich. This approach allows the manufacturer to optimize the system and provide the user with interpolation functions for the standard curve and its first derivative as well, thus giving access to variance [fr

  2. Alternative health insurance schemes

    DEFF Research Database (Denmark)

    Keiding, Hans; Hansen, Bodil O.

    2002-01-01

    In this paper, we present a simple model of health insurance with asymmetric information, where we compare two alternative ways of organizing the insurance market. Either as a competitive insurance market, where some risks remain uninsured, or as a compulsory scheme, where however, the level...... competitive insurance; this situation turns out to be at least as good as either of the alternatives...

  3. Modeling and Simulation of Handover Scheme in Integrated EPON-WiMAX Networks

    DEFF Research Database (Denmark)

    Yan, Ying; Dittmann, Lars

    2011-01-01

    In this paper, we tackle the seamless handover problem in integrated optical wireless networks. Our model applies for the convergence network of EPON and WiMAX and a mobilityaware signaling protocol is proposed. The proposed handover scheme, Integrated Mobility Management Scheme (IMMS), is assisted...... by enhancing the traditional MPCP signaling protocol, which cooperatively collects mobility information from the front-end wireless network and makes centralized bandwidth allocation decisions in the backhaul optical network. The integrated network architecture and the joint handover scheme are simulated using...... OPNET modeler. Results show validation of the protocol, i.e., integrated handover scheme gains better network performances....

  4. Mobilities Design

    DEFF Research Database (Denmark)

    Lanng, Ditte Bendix; Wind, Simon; Jensen, Ole B.

    2017-01-01

    Mobilities comprise a large part of our world and everyday lives, and the mobilities spaces in which we travel are ubiquitous. Yet, ordinary mobilities spaces – such as parking lots, pedestrian tunnels, and road lay-bys – tend to be criticized as typologies that lack consideration for the people...... who use them and for their wider social, aesthetic, cultural, and ecological agency in the city. This is clearly not an unambiguous characterization. But from it follows an urgency to re-examine unheeded mobilities spaces and extend demands of their agency beyond standards of technical efficiency....... This article draws on the recent “mobilities turn” in social science to support such re-examination of mobilities spaces. In social-scientific mobilities research, mobilities are considered the departure point for understanding the socio-material world in which we live. Mobilities are regarded as far more than...

  5. An improved anonymous authentication scheme for roaming in ubiquitous networks.

    Science.gov (United States)

    Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick; Won, Dongho

    2018-01-01

    With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.'s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al's scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments.

  6. An improved anonymous authentication scheme for roaming in ubiquitous networks.

    Directory of Open Access Journals (Sweden)

    Hakjun Lee

    Full Text Available With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.'s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al's scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments.

  7. Provisioning of adaptability to variable topologies for routing schemes in MANETs

    DEFF Research Database (Denmark)

    Jiang, Shengming; Liu, Yaoda; Jiang, Yuming

    2004-01-01

    .g., low, medium, and high mobility) have been proposed in the,literature. However, since a mobile node should not be limited to operate in a particular MANET assumed by-a routing scheme, an important issue is how to enable, a mobile node to achieve routing performance as high as possible when it roams...... in the dynamic source routing protocol to provide the adaptability to variable topologies caused by mobility through computer simulation in NS-2....

  8. Cost-efficient remediation of an upstream oilfield battery site

    Energy Technology Data Exchange (ETDEWEB)

    Siebert, L.D. [Imperial Oil Resources Canada, Calgary, AB (Canada); Bedard, G.; Pouliot, M.; Soucy, F.; Faucher, C.; Corbin, R. [Biogenie Inc., Quebec City, PQ (Canada)

    2003-07-01

    The soil at an oilfield battery site, located 18 kilometres (km) northwest of Devon, Alberta has been contaminated with crude oil and salt, following years of operation. Surrounding the site is flat farmland intended for future agricultural production. A remedial program aimed at complying with Tier I criteria of the Alberta Soil and Water Quality Guidelines for Hydrocarbons at Upstream Oil and Gas Facilities (ASWQG) of Alberta Environment, was developed and implemented. Characterization of the site was carried out in 1997 to delineate a salt plume, followed by a second sampling campaign in 1999, which all together revealed three impacted areas. A supplementary characterization was performed in 2001 by Biogenie in an effort to better determine the nature and level of petroleum contamination and more accurately evaluate the volume of contaminated soil. A three-dimensional Visualization software integrating a Kriging geostatistical model was used for this purpose. The results indicated that an estimated 8,800 cubic metres of contaminated soil would need to be excavated and treated. The next phase involved an evaluation of the various remedial options, which was accomplished using a biotreatability study. The remediation program selected involved the excavation of the contaminated soil and segregation of source material, the ex-situ Biopile treatment of the source material to meet Class II landfill criteria, and the ex-situ Biopile treatment of the contaminated soil followed by its use as backfill on site. The biotreatability study proved to be a strategic tool in the remediation effort. 1 tab., 2 figs.

  9. How will climate change policy affect upstream oil and gas

    International Nuclear Information System (INIS)

    Hyndman, R.

    2003-01-01

    This presentation outlined the status of climate change policies in Canada and Alberta for large industry with particular reference to the effect that the policies may have on upstream oil and gas. Global climate change and energy use was outlined along with what actions that should be taken to secure energy supplies and stabilize greenhouse gas (GHG) emissions. An economic model projection of global carbon dioxide emissions without the Kyoto agreement was presented. Global action on climate change will likely include greater efforts in energy efficiency to slow the growth in demand for energy. However, demand for oil and gas is still likely to increase in the next few decades due to a growing population worldwide. The author emphasized that developing countries should not forgo economic growth to avoid higher energy use. It was argued that Canadian climate change policies are out of line with the global climate change effort because they focus on short-term reductions rather than developing technologies. The policies also divert investment to competing suppliers that do not impose GHG costs, with no global GHG benefit. The author described why Alberta climate change policy rejects the Kyoto target. Natural Resource Canada's approach to large industrial emitters was also discussed along with a proposed policy framework by the Canadian Association of Petroleum Producers (CAPP) for long term certainty. 2 tabs., 12 figs

  10. Atmospheric emissions from the upstream oil and gas industry

    International Nuclear Information System (INIS)

    Taylor, B.G.S.

    1994-01-01

    The results are presented of a study set up to determine the nature and levels of atmospheric emissions resulting from United Kingdom oil and gas exploration and production activities. The study was commissioned by the UK Offshore Operators Association. Emissions by the upstream oil and gas industry of common pollutants, such as carbon monoxide, sulphur dioxide and nitrous oxide, and ozone depletion chemicals were shown in each case to be less than 1% of total UK emissions. Greenhouse gas emissions in the industry arise mainly from production operations with a small but significant contribution from onshore activities. Carbon dioxide is the major component followed in descending order by nitrogen oxides, methane and volatile organic compounds. In 1991, these emissions formed 3.2%, 4.6%, 2.9% and 2.8% of the UK totals respectively; overall this represented only about 3% of UK global warming emissions. The evidence of this study illustrates that the industry, which produces 67% of the UK's primary energy, is successfully managing its operations in an environmentally responsible way. (3 figures, 3 tables) (UK)

  11. Conserved upstream open reading frames in higher plants

    Directory of Open Access Journals (Sweden)

    Schultz Carolyn J

    2008-07-01

    Full Text Available Abstract Background Upstream open reading frames (uORFs can down-regulate the translation of the main open reading frame (mORF through two broad mechanisms: ribosomal stalling and reducing reinitiation efficiency. In distantly related plants, such as rice and Arabidopsis, it has been found that conserved uORFs are rare in these transcriptomes with approximately 100 loci. It is unclear how prevalent conserved uORFs are in closely related plants. Results We used a homology-based approach to identify conserved uORFs in five cereals (monocots that could potentially regulate translation. Our approach used a modified reciprocal best hit method to identify putative orthologous sequences that were then analysed by a comparative R-nomics program called uORFSCAN to find conserved uORFs. Conclusion This research identified new genes that may be controlled at the level of translation by conserved uORFs. We report that conserved uORFs are rare (

  12. Mobile Workforce, Mobile Technology, Mobile Threats

    International Nuclear Information System (INIS)

    Garcia, J.

    2015-01-01

    Mobile technologies' introduction into the world of safeguards business processes such as inspection creates tremendous opportunity for novel approaches and could result in a number of improvements to such processes. Mobile applications are certainly the wave of the future. The success of the application ecosystems has shown that users want full fidelity, highly-usable, simple purpose applications with simple installation, quick responses and, of course, access to network resources at all times. But the counterpart to opportunity is risk, and the widespread adoption of mobile technologies requires a deep understanding of the threats and vulnerabilities inherent in mobile technologies. Modern mobile devices can be characterized as small computers. As such, the threats against computing infrastructure apply to mobile devices. Meanwhile, the attributes of mobile technology that make it such an obvious benefit over traditional computing platforms all have elements of risk: pervasive, always-on networking; diverse ecosystems; lack of centralized control; constantly shifting technological foundations; intense competition among competitors in the marketplace; the scale of the installation base (from millions to billions); and many more. This paper will explore the diverse and massive environment of mobile, the number of attackers and vast opportunities for compromise. The paper will explain how mobile devices prove valuable targets to both advanced and persistent attackers as well as less-skilled casual hackers. Organized crime, national intelligence agencies, corporate espionage are all part of the landscape. (author)

  13. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  14. Mobilities Design

    DEFF Research Database (Denmark)

    Jensen, Ole B.; Lanng, Ditte Bendix

    Contemporary society is marked and defined by the ways in which mobile goods, bodies, vehicles, objects, and data are organized, moved and staged. On the background of the ‘mobilities turn’ (e.g. Cresswell 2006, Urry 2007) this book articulates a new and emerging research field, namely that of ‘m......Contemporary society is marked and defined by the ways in which mobile goods, bodies, vehicles, objects, and data are organized, moved and staged. On the background of the ‘mobilities turn’ (e.g. Cresswell 2006, Urry 2007) this book articulates a new and emerging research field, namely...... that of ‘mobilities design’. The book revolves around the following research question: How are design decisions and interventions staging mobilities? It builds upon the Staging Mobilities model (Jensen 2013) in an explorative inquiry into the problems and potentials of the design of mobilities. The exchange value...

  15. Mobile economy

    OpenAIRE

    Turowski, Klaus

    2004-01-01

    Mobile economy : Transaktionen, Prozesse, Anwendungen und Dienste ; 4. Workshop Mobile Commerce, 02.-03. Februar 2004, Univ. Augsburg / K. Turowski ... (Hrsg.). - Bonn : Ges. für Informatik, 2004. - 189 S. : Ill., graph. Darst. - (GI-Edition : Proceedings ; 42)

  16. The role of the upstream oil and gas industry in the Canadian economy and the macroeconomic impacts of increased taxation

    International Nuclear Information System (INIS)

    Anon.

    1996-01-01

    The direct, indirect and overall impacts of the upstream oil and gas industry on the Canadian economy and the impact of increased taxation on the industry and the overall economy was assessed. The industry's value of production in 1995 was $25 billion, two-thirds of which were exports that contributed to Canada's trade surplus. In the same year, the industry also spent more than $10 billion in exploration and development. About five per cent of Canadian gross domestic product (GDP) and three per cent of national employment can be traced to the upstream oil and gas industry, therefore, increased taxation on the industry would have significant impacts on overall economic activity. For the purposes of this analysis, three assumptions were made: (1) a one-time $100 million tax increase on the industry, (2) the tax revenue to go toward government debt reduction, and (3) the reduction in industry net revenue to produce an investment impact equal with the average behaviour of the industry in recent years. Given these factors, it was concluded that a one-time $100 million tax increase could reduce national GDP by $250 million and employment by 3000 jobs. The balance of payments impact would be about -$75 million. Once factors related to expectations and capital mobility have been factored in, the negative macroeconomic impacts could be even greater. 6 tabs., 24 figs

  17. Characterization of upstream sequences of the LIM2 gene that bind developmentally regulated and lens-specific proteins

    Institute of Scientific and Technical Information of China (English)

    HSU Heng; Robert L. CHURCH

    2004-01-01

    During lens development, lens epithelial cells differentiate into fiber cells. To date, four major lens fiber cell intrinsic membrane proteins (MIP) ranging in size from 70 kD to 19 kD have been characterized. The second most abundant lens fiber cell intrinsic membrane protein is MP19. This protein probably is involved with lens cell communication and relates with cataractogenesis. The aim of this research is to characterize upstream sequences of the MP19 (also called LIM2) gene that bind developmentally regulated and lens-specific proteins. We have used the gel mobility assays and corresponding competition experiments to identify and characterize cis elements within approximately 500 bases of LIM2 upstream sequences. Our studies locate the positions of some cis elements, including a "CA" repeat, a methylation Hha I island, an FnuD II site, an Ap1 and an Ap2 consensus sequences, and identify some specific cis elements which relate to lens-specific transcription of LIM2. Our experiments also preliminarily identify trans factors which bind to specific cis elements of the LIM2 promoter and/or regulate transcription of LIM2. We conclude that developmental regulation and coordination of the MP 19 gene in ocular lens fiber cells is controlled by the presence of specific cis elements that bind regulatory trans factors that affect LIM2 gene expression. DNA methylation is one mechanism of controlling LIM2 gene expression during lens development.

  18. "Upstream Thinking": the catchment management approach of a water provider

    Science.gov (United States)

    Grand-Clement, E.; Ross, M.; Smith, D.; Anderson, K.; Luscombe, D.; Le Feuvre, N.; Brazier, R. E.

    2012-04-01

    Human activities have large impacts on water quality and provision. Water companies throughout the UK are faced with the consequences of poor land management and need to find appropriate solutions to decreasing water quality. This is particularly true in the South West of England, where 93% of the drinking water is sourced from rivers and reservoirs: large areas of drained peatlands (i.e. Exmoor and Dartmoor National Parks) are responsible for a significant input of dissolved organic carbon (DOC) discolouring the water, whilst poorly managed farming activities can lead to diffuse pollution. Alongside the direct environmental implications, poor water quality is partly increasing water treatment costs and will drive significant future investment in additional water treatment, with further repercussions on customers. This highlights the need for water companies throughout the UK, and further afield, to be more involved in catchment management. "Upstream Thinking" is South West Water's (SWW) approach to catchment management, where working with stakeholders to improve water quality upstream aims to avoid increasingly costly solutions downstream. This approach has led the company to invest in two major areas of work: (1) The Farmland programme where problematic farm management practices and potential solutions are identified, typically 40% of the required investment is then offered in exchange for a legal undertaking to maintain the new farm assets in good condition for 25 years; (2) The Mires programme which involves heavy investment in peatland restoration through the blocking of open ditches in order to improve water storage and quality in the long term. From these two projects, it has been clear that stakeholder involvement of groups such as local farmers, the Westcountry Rivers Trust, the Exmoor National Park Authority, the Environment Agency, Natural England and the Exmoor Society is essential, first because it draws in catchment improvement expertise which is not

  19. Geological nominations at UNESCO World Heritage, an upstream struggle

    Science.gov (United States)

    Olive-Garcia, Cécile; van Wyk de Vries, Benjamin

    2017-04-01

    Using my 10 years experience in setting up and defending a UNESCO world Heritage Geological nomination, this presentation aims to give a personal insight into this international process and the differential use of science, subjective perception (aesthetic and 'naturality'), and politics. At this point in the process, new protocols have been tested in order to improve the dialogue, accountability and transparency between the different stake-holders. These are, the State parties, the IUCN, the scientific community, and UNESCO itself. Our proposal is the Chaîne des Puys-Limagne fault ensemble, which combines tectonic, geomorphological evolution and volcanology. The project's essence is a conjunction of inseparable geological features and processes, set in the context of plate tectonics. This very unicit yof diverse forms and processes creates the value of the site. However, it is just this that has caused a problem, as the advisory body has a categorical approach of nominations that separates items to assess them in an unconnected manner.From the start we proposed a combined approach, where a property is seen in its entirety, and the constituent elements seen as interlinked elements reflecting the joint underlying phenomena. At this point, our project has received the first ever open review by an independent technical mission (jointly set up by IUCN, UNESCO and the State party). The subsequent report was broadly supportive of the project's approach and of the value of the ensemble of features. The UNESCO committee in 2016, re-referred the nomination, acknowledging the potential Outstanding Universal Value of the site and requesting the parties to continue the upstream process (e.g. collaborative work), notably on the recommendations and conclusions of the Independent Technical mission report. Meetings are continuing, and I shall provide you with the hot-off-the-press news as this ground breaking nomination progresses.

  20. Predicting functional upstream open reading frames in Saccharomyces cerevisiae

    Directory of Open Access Journals (Sweden)

    Kristiansson Erik

    2009-12-01

    Full Text Available Abstract Background Some upstream open reading frames (uORFs regulate gene expression (i.e., they are functional and can play key roles in keeping organisms healthy. However, how uORFs are involved in gene regulation is not yet fully understood. In order to get a complete view of how uORFs are involved in gene regulation, it is expected that a large number of experimentally verified functional uORFs are needed. Unfortunately, wet-experiments to verify that uORFs are functional are expensive. Results In this paper, a new computational approach to predicting functional uORFs in the yeast Saccharomyces cerevisiae is presented. Our approach is based on inductive logic programming and makes use of a novel combination of knowledge about biological conservation, Gene Ontology annotations and genes' responses to different conditions. Our method results in a set of simple and informative hypotheses with an estimated sensitivity of 76%. The hypotheses predict 301 further genes to have 398 novel functional uORFs. Three (RPC11, TPK1, and FOL1 of these 301 genes have been hypothesised, following wet-experiments, by a related study to have functional uORFs. A comparison with another related study suggests that eleven of the predicted functional uORFs from genes LDB17, HEM3, CIN8, BCK2, PMC1, FAS1, APP1, ACC1, CKA2, SUR1, and ATH1 are strong candidates for wet-lab experimental studies. Conclusions Learning based prediction of functional uORFs can be done with a high sensitivity. The predictions made in this study can serve as a list of candidates for subsequent wet-lab verification and might help to elucidate the regulatory roles of uORFs.

  1. Selectively strippable paint schemes

    Science.gov (United States)

    Stein, R.; Thumm, D.; Blackford, Roger W.

    1993-03-01

    In order to meet the requirements of more environmentally acceptable paint stripping processes many different removal methods are under evaluation. These new processes can be divided into mechanical and chemical methods. ICI has developed a paint scheme with intermediate coat and fluid resistant polyurethane topcoat which can be stripped chemically in a short period of time with methylene chloride free and phenol free paint strippers.

  2. Mobile marketing

    OpenAIRE

    Gause, Matěj

    2012-01-01

    The goal of bachelor's thesis on the theme "Mobile marketing" is to outline its development and why is this new phenomen so important for all modern companies around the world. The work is not about simple description of mobile marketing media but it vividly informs about the latest trends and news from the world of mobile apps and games. It presents the most successful mobile apps which registered more than billion downloads and from their unique characteristics it unveils great potential of...

  3. Mobile marketing

    OpenAIRE

    KLEČKOVÁ, Zuzana

    2013-01-01

    The main aim of this thesis was to provide a comprehensive overview of the mobile marketing and analyze selected campaigns of Czech mobile marketing in comparison to world successful campaigns. The research contained studying of available literature about the theme to gain general knowledge about the issue. The theoretical part of the thesis contains predominantly various definitions of mobile marketing and its tools, advantages of these tools and some information about Mobile Marketing Assoc...

  4. Innovation and performance: The case of the upstream petroleum sector

    Science.gov (United States)

    Persaud, A. C. Jai

    This thesis investigates innovation in the upstream crude oil and natural gas sector, a strategic part of the Canadian economy and a vital industry for North American energy trade and security. Significant interest exists in understanding innovation in this sector from a private and public policy perspective. Interest in the sector has intensified recently due to concerns about world oil supply, Canada's oil sands development, and the potential that Canada may become an "energy superpower." The study examines the factors that drive companies involved in exploration, development, and production in the upstream petroleum sector to innovate and the impact of their innovation activities through major technologies on their performance. The thesis focuses on process innovation, which involves the adoption of new or significantly improved production processes, and is distinct from product innovation, which is based on the development and commercialization of a product with improved product characteristics to deliver new services to the consumer. The thesis provides a comprehensive review of the literature and develops an investigative model framework to examine the drivers of innovation and the impact of innovation on performance in the upstream petroleum sector. The research employs a survey questionnaire that was developed to obtain data and information, which was missing in the literature or not publicly available to test key relationships of innovation and performance indicators. In addition to the survey questionnaire, a number of knowledgeable experts in the industry were also interviewed. A total of 68 respondents completed the survey questionnaire, accounting for 40 percent of the firms in the industry. This percentage goes up to over 50 percent when account is taken of extremely small firms who could not fill out the survey. Further, the 68 respondents account for most of the industry revenues, production, and employment. The respondents include most of the key

  5. Scalable Nonlinear Compact Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Ghosh, Debojyoti [Argonne National Lab. (ANL), Argonne, IL (United States); Constantinescu, Emil M. [Univ. of Chicago, IL (United States); Brown, Jed [Univ. of Colorado, Boulder, CO (United States)

    2014-04-01

    In this work, we focus on compact schemes resulting in tridiagonal systems of equations, specifically the fifth-order CRWENO scheme. We propose a scalable implementation of the nonlinear compact schemes by implementing a parallel tridiagonal solver based on the partitioning/substructuring approach. We use an iterative solver for the reduced system of equations; however, we solve this system to machine zero accuracy to ensure that no parallelization errors are introduced. It is possible to achieve machine-zero convergence with few iterations because of the diagonal dominance of the system. The number of iterations is specified a priori instead of a norm-based exit criterion, and collective communications are avoided. The overall algorithm thus involves only point-to-point communication between neighboring processors. Our implementation of the tridiagonal solver differs from and avoids the drawbacks of past efforts in the following ways: it introduces no parallelization-related approximations (multiprocessor solutions are exactly identical to uniprocessor ones), it involves minimal communication, the mathematical complexity is similar to that of the Thomas algorithm on a single processor, and it does not require any communication and computation scheduling.

  6. Employment and Training Schemes for Rural Youth: Learning from Experience.

    Science.gov (United States)

    Phan-Thuy, N.

    1985-01-01

    Over the past two decades a number of African and Asian governments have experimented with various types of youth mobilization or employment and training schemes in trying to cope with rural youth unemployment. A critical appraisal is made of some of these in an attempt to establish criteria that productive employment programs for rural youth…

  7. Staging Mobilities

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    and lived as people are “staging themselves” (from below). Staging mobilities is a dynamic process between “being staged” (for example, being stopped at traffic lights) and the “mobile staging” of interacting individuals (negotiating a passage on the pavement). Staging Mobilities is about the fact...

  8. Subversive Mobilities

    DEFF Research Database (Denmark)

    Thelle, Mikkel

    2013-01-01

    The article approaches mobility through a cultural history of urban conflict. Using a case of “The Copenhagen Trouble,“ a series of riots in the Danish capital around 1900, a space of subversive mobilities is delineated. These turn-of-the-century riots points to a new pattern of mobile gathering...

  9. Analysis of key thresholds leading to upstream dependencies in global transboundary water bodies

    Science.gov (United States)

    Munia, Hafsa Ahmed; Guillaume, Joseph; Kummu, Matti; Mirumachi, Naho; Wada, Yoshihide

    2017-04-01

    Transboundary water bodies supply 60% of global fresh water flow and are home to about 1/3 of the world's population; creating hydrological, social and economic interdependencies between countries. Trade-offs between water users are delimited by certain thresholds, that, when crossed, result in changes in system behavior, often related to undesirable impacts. A wide variety of thresholds are potentially related to water availability and scarcity. Scarcity can occur because of the country's own water use, and that is potentially intensified by upstream water use. In general, increased water scarcity escalates the reliance on shared water resources, which increases interdependencies between riparian states. In this paper the upstream dependencies of global transboundary river basins are examined at the scale of sub-basin areas. We aim to assess how upstream water withdrawals cause changes in the scarcity categories, such that crossing thresholds is interpreted in terms of downstream dependency on upstream water availability. The thresholds are defined for different types of water availability on which a sub-basin relies: - reliable local runoff (available even in a dry year), - less reliable local water (available in the wet year), - reliable dry year inflows from possible upstream area, and - less reliable wet year inflows from upstream. Possible upstream withdrawals reduce available water downstream, influencing the latter two water availabilities. Upstream dependencies have then been categorized by comparing a sub-basin's scarcity category across different water availability types. When population (or water consumption) grows, the sub-basin satisfies its needs using less reliable water. Thus, the factors affecting the type of water availability being used are different not only for each type of dependency category, but also possibly for every sub- basin. Our results show that, in the case of stress (impacts from high use of water), in 104 (12%) sub- basins out of

  10. Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services

    Directory of Open Access Journals (Sweden)

    Youngsook Lee

    2014-01-01

    Full Text Available An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.’s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1 it fails to provide user anonymity against any third party as well as the foreign agent, (2 it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3 it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.’s scheme can be addressed without degrading the efficiency of the scheme.

  11. Mobile Probes in Mobile Learning

    DEFF Research Database (Denmark)

    Ørngreen, Rikke; Blomhøj, Ulla; Duvaa, Uffe

    In this paper experiences from using mobile probes in educational design of a mobile learning application is presented. The probing process stems from the cultural probe method, and was influenced by qualitative interview and inquiry approaches. In the project, the mobile phone was not only acting...... as an agent for acquiring empirical data (as the situation in hitherto mobile probe settings) but was also the technological medium for which data should say something about (mobile learning). Consequently, not only the content of the data but also the ways in which data was delivered and handled, provided...... a valuable dimension for investigating mobile use. The data was collected at the same time as design activities took place and the collective data was analysed based on user experience goals and cognitive processes from interaction design and mobile learning. The mobile probe increased the knowledge base...

  12. Mobile Semiotics

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    2013-01-01

    This chapter aims to understand the mobile condition of contemporary life with a particular view to the signifying dimension of the environment and its ‘readability’. The chapter explores the potentials of semiotics and its relationship to the new mobilities literature. What takes place...... is a ‘mobile sense making’ where signs and materially situated meanings connect to the moving human body and thus create particular challenges and complexities of making sense of the world. The chapter includes notions of mobility systems and socio-technical networks in order to show how a ‘semiotic layer’ may...... work to afford or restrict mobile practices....

  13. Mobile Lexicography

    DEFF Research Database (Denmark)

    Køhler Simonsen, Henrik

    2014-01-01

    Users are already mobile, but the question is to which extent knowledge-based dictionary apps are designed for the mobile user situation. The objective of this article is to analyse the characteristics of the mobile user situation and to look further into the stationary user situation and the mob......Users are already mobile, but the question is to which extent knowledge-based dictionary apps are designed for the mobile user situation. The objective of this article is to analyse the characteristics of the mobile user situation and to look further into the stationary user situation...... and the mobile user situation. The analysis is based on an empirical survey involving ten medical doctors and a monolingual app designed to support cognitive lexicographic functions, cf. (Tarp 2006:61-64). In test A the doctors looked up five medical terms while sitting down at a desk and in test B the doctors...

  14. Mobility Divides

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    Contemporary mobilities are cultural and social manifestations, and the mobile practices in the everyday life of billions of humans are re-configuring senses of place, self, other and relationships to the built environment. The way ‘mobile situations’ are staged in designed and built environments......’ in the everyday life and cast light on how design and ‘materialities of mobilites’ are creating differential mobilities across societies, social networks, and communities of practices.......Contemporary mobilities are cultural and social manifestations, and the mobile practices in the everyday life of billions of humans are re-configuring senses of place, self, other and relationships to the built environment. The way ‘mobile situations’ are staged in designed and built environments...

  15. Mobile Semiotics - signs and mobilities

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    a potential for mobilities studies if the awareness of seeing the environment as a semiotic layer and system can be sensitized to the insights of the ‘mobilities turn’. Empirically the paper tentatively explores the usefulness of a mobile semiotics approach to cases such as street signage, airport design...

  16. Bonus schemes and trading activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; ter Horst, J.R.; Tobler, P.N.

    2014-01-01

    Little is known about how different bonus schemes affect traders' propensity to trade and which bonus schemes improve traders' performance. We study the effects of linear versus threshold bonus schemes on traders' behavior. Traders buy and sell shares in an experimental stock market on the basis of

  17. Succesful labelling schemes

    DEFF Research Database (Denmark)

    Juhl, Hans Jørn; Stacey, Julia

    2001-01-01

    . In the spring of 2001 MAPP carried out an extensive consumer study with special emphasis on the Nordic environmentally friendly label 'the swan'. The purpose was to find out how much consumers actually know and use various labelling schemes. 869 households were contacted and asked to fill in a questionnaire...... it into consideration when I go shopping. The respondent was asked to pick the most suitable answer, which described her use of each label. 29% - also called 'the labelling blind' - responded that they basically only knew the recycling label and the Government controlled organic label 'Ø-mærket'. Another segment of 6...

  18. Scheme of stepmotor control

    International Nuclear Information System (INIS)

    Grashilin, V.A.; Karyshev, Yu.Ya.

    1982-01-01

    A 6-cycle scheme of step motor is described. The block-diagram and the basic circuit of the step motor control are presented. The step motor control comprises a pulse shaper, electronic commutator and power amplifiers. The step motor supply from 6-cycle electronic commutator provides for higher reliability and accuracy than from 3-cycle commutator. The control of step motor work is realised by the program given by the external source of control signals. Time-dependent diagrams for step motor control are presented. The specifications of the step-motor is given

  19. A dynamic identity based authentication scheme using chaotic maps for telecare medicine information systems.

    Science.gov (United States)

    Wang, Zhiheng; Huo, Zhanqiang; Shi, Wenbo

    2015-01-01

    With rapid development of computer technology and wide use of mobile devices, the telecare medicine information system has become universal in the field of medical care. To protect patients' privacy and medial data's security, many authentication schemes for the telecare medicine information system have been proposed. Due to its better performance, chaotic maps have been used in the design of authentication schemes for the telecare medicine information system. However, most of them cannot provide user's anonymity. Recently, Lin proposed a dynamic identity based authentication scheme using chaotic maps for the telecare medicine information system and claimed that their scheme was secure against existential active attacks. In this paper, we will demonstrate that their scheme cannot provide user anonymity and is vulnerable to the impersonation attack. Further, we propose an improved scheme to fix security flaws in Lin's scheme and demonstrate the proposed scheme could withstand various attacks.

  20. An Ultra-Low-Latency Geo-Routing Scheme for Team-Based Unmanned Vehicular Applications

    KAUST Repository

    Bader, Ahmed; Alouini, Mohamed-Slim

    2016-01-01

    Results and lessons learned from the implementation of a novel ultra low-latency geo-routing scheme are presented in this paper. The geo-routing scheme is intended for team-based mobile systems whereby a cluster of unmanned autonomous vehicles

  1. LMIP/AAA: Local Authentication, Authorization and Accounting (AAA) Protocol for Mobile IP

    Science.gov (United States)

    Chenait, Manel

    Mobile IP represents a simple and scalable global mobility solution. However, it inhibits various vulnerabilities to malicious attacks and, therefore, requires the integration of appropriate security services. In this paper, we discuss two authentication schemes suggested for Mobile IP: standard authentication and Mobile IP/AAA authentication. In order to provide Mobile IP roaming services including identity verication, we propose an improvement to Mobile/AAA authentication scheme by applying a local politic key management in each domain, hence we reduce hando latency by avoiding the involvement of AAA infrastructure during mobile node roaming.

  2. Categorisation of Mobile EEG: A Researcher’s Perspective

    Directory of Open Access Journals (Sweden)

    Anthony D. Bateson

    2017-01-01

    Full Text Available Researchers are increasingly attempting to undertake electroencephalography (EEG recordings in novel environments and contexts outside of the traditional static laboratory setting. The term “mobile EEG,” although commonly used to describe many of these undertakings, is ambiguous, since it attempts to encompass a wide range of EEG device mobility, participant mobility, and system specifications used across investigations. To provide quantitative parameters for “mobile EEG,” we developed a Categorisation of Mobile EEG (CoME scheme based upon scoring of device mobility (D, from 0, off-body, to 5, head-mounted with no additional equipment, participant mobility (P, from 0, static, to 5, unconstrained running, system specification (S, from 4, lowest, to 20, highest, and number of channels (C used. The CoME scheme was applied to twenty-nine published mobile EEG studies. Device mobility scores ranged from 0D to 4D, participant mobility scores from 0P to 4P, and system specification scores from 6S to 17S. The format of the scores for the four parameters is given, for example, as (2D, 4P, 17S, 32C and readily enables comparisons across studies. Our CoME scheme enables researchers to quantify the degree of device mobility, participant mobility, and system specification used in their “mobile EEG” investigations in a standardised way.

  3. Mobile phone collection, reuse and recycling in the UK.

    Science.gov (United States)

    Ongondo, F O; Williams, I D

    2011-06-01

    Mobile phones are the most ubiquitous electronic product on the globe. They have relatively short lifecycles and because of their (perceived) in-built obsolescence, discarded mobile phones represent a significant and growing problem with respect to waste electrical and electronic equipment (WEEE). An emerging and increasingly important issue for industry is the shortage of key metals, especially the types of metals found in mobile phones, and hence the primary aim of this timely study was to assess and evaluate the voluntary mobile phone takeback network in the UK. The study has characterised the information, product and incentives flows in the voluntary UK mobile phone takeback network and reviewed the merits and demerits of the incentives offered. A survey of the activities of the voluntary mobile phone takeback schemes was undertaken in 2008 to: identify and evaluate the takeback schemes operating in the UK; determine the target groups from whom handsets are collected; and assess the collection, promotion and advertising methods used by the schemes. In addition, the survey sought to identify and critically evaluate the incentives offered by the takeback schemes, evaluate their ease and convenience of use; and determine the types, qualities and quantities of mobile phones they collect. The study has established that the UK voluntary mobile phone takeback network can be characterised as three distinctive flows: information flow; product flow (handsets and related accessories); and incentives flow. Over 100 voluntary schemes offering online takeback of mobile phone handsets were identified. The schemes are operated by manufacturers, retailers, mobile phone network service operators, charities and by mobile phone reuse, recycling and refurbishing companies. The latter two scheme categories offer the highest level of convenience and ease of use to their customers. Approximately 83% of the schemes are either for-profit/commercial-oriented and/or operate to raise funds

  4. Packet reversed packet combining scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2006-07-01

    The packet combining scheme is a well defined simple error correction scheme with erroneous copies at the receiver. It offers higher throughput combined with ARQ protocols in networks than that of basic ARQ protocols. But packet combining scheme fails to correct errors when the errors occur in the same bit locations of two erroneous copies. In the present work, we propose a scheme that will correct error if the errors occur at the same bit location of the erroneous copies. The proposed scheme when combined with ARQ protocol will offer higher throughput. (author)

  5. A full quantum network scheme

    International Nuclear Information System (INIS)

    Ma Hai-Qiang; Wei Ke-Jin; Yang Jian-Hui; Li Rui-Xue; Zhu Wu

    2014-01-01

    We present a full quantum network scheme using a modified BB84 protocol. Unlike other quantum network schemes, it allows quantum keys to be distributed between two arbitrary users with the help of an intermediary detecting user. Moreover, it has good expansibility and prevents all potential attacks using loopholes in a detector, so it is more practical to apply. Because the fiber birefringence effects are automatically compensated, the scheme is distinctly stable in principle and in experiment. The simple components for every user make our scheme easier for many applications. The experimental results demonstrate the stability and feasibility of this scheme. (general)

  6. Cost-Effective Location Management for Mobile Agents on the Internet

    Directory of Open Access Journals (Sweden)

    Chien-Sheng Chen

    2015-01-01

    Full Text Available Many mobile agent system-related services and applications require interacting with a mobile agent by passing messages. However, an agent’s mobility raises several challenges in delivering messages to a mobile agent accurately. Consisting of tracking and message delivery phases, most mobile agent location management schemes create or receive many update messages and interaction messages to ensure the effectiveness of the schemes. In addition to downgrading the overall performance of a mobile agent location management scheme, excessive transmission of messages increases the network load. The migration locality of a mobile agent and the interaction rate between mobile agents significantly affect the performance of a mobile agent location management scheme with respect to location management cost. This work presents a novel Dual Home based Scheme (DHS that can lower the location management costs in terms of migration locality and interaction rate. While the DHS scheme uniquely adopts dual home location management architecture, a selective update strategy based on that architecture is also designed for cost-effective location management of mobile agents. Moreover, DHS is compared with available schemes based on formulations and simulation experiments from the perspective of location management costs. Simulation results demonstrate that the proposed DHS scheme performs satisfactorily in terms of migration locality and interaction rate.

  7. A Quantum Proxy Weak Blind Signature Scheme Based on Controlled Quantum Teleportation

    Science.gov (United States)

    Cao, Hai-Jing; Yu, Yao-Feng; Song, Qin; Gao, Lan-Xiang

    2015-04-01

    Proxy blind signature is applied to the electronic paying system, electronic voting system, mobile agent system, security of internet, etc. A quantum proxy weak blind signature scheme is proposed in this paper. It is based on controlled quantum teleportation. Five-qubit entangled state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, so it could guarantee not only the unconditional security of the scheme but also the anonymity of the messages owner.

  8. A Privacy-Protecting Authentication Scheme for Roaming Services with Smart Cards

    Science.gov (United States)

    Son, Kyungho; Han, Dong-Guk; Won, Dongho

    In this work we propose a novel smart card based privacy-protecting authentication scheme for roaming services. Our proposal achieves so-called Class 2 privacy protection, i.e., no information identifying a roaming user and also linking the user's behaviors is not revealed in a visited network. It can be used to overcome the inherent structural flaws of smart card based anonymous authentication schemes issued recently. As shown in our analysis, our scheme is computationally efficient for a mobile user.

  9. Mobile Clouds

    DEFF Research Database (Denmark)

    Fitzek, Frank; Katz, Marcos

    A mobile cloud is a cooperative arrangement of dynamically connected communication nodes sharing opportunistic resources. In this book, authors provide a comprehensive and motivating overview of this rapidly emerging technology. The book explores how distributed resources can be shared by mobile...... users in very different ways and for various purposes. The book provides many stimulating examples of resource-sharing applications. Enabling technologies for mobile clouds are also discussed, highlighting the key role of network coding. Mobile clouds have the potential to enhance communications...... performance, improve utilization of resources and create flexible platforms to share resources in very novel ways. Energy efficient aspects of mobile clouds are discussed in detail, showing how being cooperative can bring mobile users significant energy saving. The book presents and discusses multiple...

  10. Mobilities Design

    DEFF Research Database (Denmark)

    Jensen, Ole B.; Lanng, Ditte Bendix; Wind, Simon

    2016-01-01

    In this paper, we identify the nexus between design (architecture, urban design, service design, etc.) and mobilities as a new and emerging research field. In this paper, we apply a “situational mobilities” perspective and take point of departure in the pragmatist question: “What design decisions...... and interventions affords this particular mobile situation?” The paper presents the contours of an emerging research agenda within mobilities research. The advent of “mobilities design” as an emerging research field points towards a critical interest in the material as well as practical consequences of contemporary......-making. The paper proposes that increased understanding of the material affordances facilitated through design provides important insight to planning and policymaking that at times might be in risk of becoming too detached from the everyday life of the mobile subject within contemporary mobilities landscapes....

  11. Doppler Shift Compensation Schemes in VANETs

    Directory of Open Access Journals (Sweden)

    F. Nyongesa

    2015-01-01

    Full Text Available Over the last decade vehicle-to-vehicle (V2V communication has received a lot of attention as it is a crucial issue in intravehicle communication as well as in Intelligent Transportation System (ITS. In ITS the focus is placed on integration of communication between mobile and fixed infrastructure to execute road safety as well as nonsafety information dissemination. The safety application such as emergence alerts lays emphasis on low-latency packet delivery rate (PDR, whereas multimedia and infotainment call for high data rates at low bit error rate (BER. The nonsafety information includes multimedia streaming for traffic information and infotainment applications such as playing audio content, utilizing navigation for driving, and accessing Internet. A lot of vehicular ad hoc network (VANET research has focused on specific areas including channel multiplexing, antenna diversity, and Doppler shift compensation schemes in an attempt to optimize BER performance. Despite this effort few surveys have been conducted to highlight the state-of-the-art collection on Doppler shift compensation schemes. Driven by this cause we survey some of the recent research activities in Doppler shift compensation schemes and highlight challenges and solutions as a stock-taking exercise. Moreover, we present open issues to be further investigated in order to address the challenges of Doppler shift in VANETs.

  12. Mobiles Robotersystem

    OpenAIRE

    Schmierer, G.; Wolf, A.

    1999-01-01

    DE 19816893 A UPAB: 20000203 NOVELTY - An optical and or acoustic noticeable advertising and or information carrier (10) is fixed permitting detachment in such a manner at the mobile platform (8), that the advertising and or information carrier does not impair the movability of the mobile platform. The advertising is provided at an exposed place on the mobile platform. USE - Advertising or information communication. ADVANTAGE - Advertising or information is imparted in prominent positioning w...

  13. Mobil marketing

    OpenAIRE

    Engelová, Kateřina

    2006-01-01

    Mobil marketing - reklama a podpora prodeje prostřednictvím mobilních telefonů. Technologické a kulturní předpoklady vzniku tohoto odvětví. Mobil marketing a marketingový mix, možnosti synergie. Nástroje mobil marketingu - reklamní SMS a MMS, lokační služby, soutěže, ankety a hlasování, věrnostní systémy, mobilní obsah. Subjekty mobil marketingu. M-komerce. Využití pro podnikové aplikace.

  14. Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce.

    Science.gov (United States)

    Mishra, Dheerendra; Mukhopadhyay, Sourav; Kumari, Saru; Khan, Muhammad Khurram; Chaturvedi, Ankita

    2014-05-01

    Telecare medicine information systems (TMIS) present the platform to deliver clinical service door to door. The technological advances in mobile computing are enhancing the quality of healthcare and a user can access these services using its mobile device. However, user and Telecare system communicate via public channels in these online services which increase the security risk. Therefore, it is required to ensure that only authorized user is accessing the system and user is interacting with the correct system. The mutual authentication provides the way to achieve this. Although existing schemes are either vulnerable to attacks or they have higher computational cost while an scalable authentication scheme for mobile devices should be secure and efficient. Recently, Awasthi and Srivastava presented a biometric based authentication scheme for TMIS with nonce. Their scheme only requires the computation of the hash and XOR functions.pagebreak Thus, this scheme fits for TMIS. However, we observe that Awasthi and Srivastava's scheme does not achieve efficient password change phase. Moreover, their scheme does not resist off-line password guessing attack. Further, we propose an improvement of Awasthi and Srivastava's scheme with the aim to remove the drawbacks of their scheme.

  15. Ad hoc networking scheme for mobile cyber-physical systems

    KAUST Repository

    Bader, Ahmed; Alouini, Mohamed-Slim

    2017-01-01

    Embodiments of the present disclosure provide techniques for packet routing. In an embodiment, when a transmitting communication device injects a packet into a communication network, a receiving communication device that is closer to a sink

  16. Ad hoc networking scheme for mobile cyber-physical systems

    KAUST Repository

    Bader, Ahmed

    2017-08-17

    Embodiments of the present disclosure provide techniques for packet routing. In an embodiment, when a transmitting communication device injects a packet into a communication network, a receiving communication device that is closer to a sink or destination than the transmitting communication device relays the packet in a first hop. In a subsequent hop, a receiving communication device evaluates position information conveyed by the transmitting communication device of the first hop to determine whether to forward the packet. Accordingly, a receiving communication device receiver that offers progress towards the sink can elect to forward the packet.

  17. Anonymous authentication and location privacy preserving schemes for LTE-A networks

    Directory of Open Access Journals (Sweden)

    Zaher Jabr Haddad

    2017-11-01

    Full Text Available Long Term Evaluation Advanced (LTE-A is the third generation partnership project for cellular network that allows subscribers to roam into networks (i.e., the Internet and wireless connections using spacial purpose base-stations, such as wireless access points and home node B. In such LTE-A based networks, neither base-stations, nor the Internet and wireless connections are trusted because base-stations are operated by un-trusted subscribers. Attackers may exploit these vulnerabilities to violate the privacy of the LTE-A subscribers. On the other hand, the tradeoff between privacy and authentication is another challenge in such networks. Therefore, in this paper, we propose two anonymous authentication schemes based on one-time pseudonymes and Schnorr Zero Knowledge Protocols. Instead of the international mobile subscriber identity, these schemes enable the user equipment, base-stations and mobility management entity to mutually authenticate each others and update the location of the user equipment without evolving the home subscriber server. The security analysis demonstrate that the proposed schemes thwart security and privacy attacks, such as malicious, international mobile subscriber identity catching, and tracking attacks. Additionally, our proposed schemes preserve the location privacy of user equipment since no entity except the mobility management entity and Gate-Way Mobile Location Center can link between the pseudonymes and the international mobile subscriber identity. Also attackers have no knowledge about international mobile subscriber identity. Hence, the proposed schemes achieve backward/forward secrecy. Furthermore, the performance evaluation shows that the proposed handover schemes impose a small overhead on the mobile nodes and it has smaller computation and communication overheads than those in other schemes.

  18. Static and dynamic efficiency of white certificate schemes

    International Nuclear Information System (INIS)

    Giraudet, L.G.; Finon, D.

    2011-01-01

    White Certificate Schemes mandate energy companies to promote energy efficiency through flexibility mechanisms, including the trading of energy savings. They can be characterized as a quantity-based, baseline-and-credit system for the diffusion of energy efficient technologies. This paper compares experiences with White Certificate Schemes in Great Britain, Italy and France, in order to identify the basic drivers of each, and ultimately offer an original interpretation as an adaptive instrument, in the sense that it can take different forms in response to specific institutional contexts. A first analysis shows that Schemes perform well in terms of static efficiency, i.e. they are cost-effective and generate net social benefits over the period considered, though with large discrepancies rooted in different technological potentials. Regarding dynamic efficiency, i.e. the ability to induce and sustain technological change over the long haul, market transformation occurred in Great Britain, but was poorly incentivized in Italy and France by inadequate compliance cost recovery rules. Substantial organizational change has occurred in every country, mainly by strengthening vertical relationships between obliged parties and upstream businesses. Overall, the obligation (rather than the market component) drives the early phases of the Schemes. (authors)

  19. Mobile phones and mobile communication

    DEFF Research Database (Denmark)

    Ling, Richard; Donner, Jonathan

    With staggering swiftness, the mobile phone has become a fixture of daily life in almost every society on earth. In 2007, the world had over 3 billion mobile subscriptions. Prosperous nations boast of having more subscriptions than people. In the developing world, hundreds of millions of people who...... could never afford a landline telephone now have a mobile number of their own. With a mobile in our hand many of us feel safer, more productive, and more connected to loved ones, but perhaps also more distracted and less involved with things happening immediately around us. Written by two leading...... researchers in the field, this volume presents an overview of the mobile telephone as a social and cultural phenomenon. Research is summarized and made accessible though detailed descriptions of ten mobile users from around the world. These illustrate popular debates, as well as deeper social forces at work...

  20. Modeling and Performance Analysis for Cell Access and Handoff Schemes in Two-Tier Cellular Networks

    Directory of Open Access Journals (Sweden)

    Kyungkoo Jun

    2014-01-01

    Full Text Available We investigate the effects of handoff on system performance in two-tier cellular networks. Two of the main performance metrics are new call blocking probability and handoff drop rate. We develop analytical models to evaluate the performance of two different handoff schemes. One scheme considers only femto-to-macrocell handoff while the other is bidirectional including macro-to-femtocell handoff. Our model is more elaborate than existing ones which have not considered the mobility of mobile stations. Numerical results show that the bidirectional scheme performs better than the femto-to-macrocell handoff as it achieves lower blocking probability and drop rate.

  1. Technology strategy in the upstream petroleum supply chain

    International Nuclear Information System (INIS)

    Bret-Rouzaut, N.; Thom, M.

    2005-03-01

    This study focuses on technology activities in the upstream oil and gas industry. Data from the period 1984 to 2002 is studied for evidence. The objectives are to describe technology strategies within this sector and to develop an understanding of how technology-related tasks and the control of technology are distributed throughout the supply chain. Frameworks for decision-making around technology strategy are presented. Firms that operate internationally and with the widest range of technological capabilities (so technology strategy is not modified strongly by any specialisation) are studied. These firms are large, private international oil companies and large integrated service and supply companies. Technology has different and distinct capabilities; it is a response to growth opportunities, it is a way to lower costs and it can lower the risks of certain business activities. Firms engage in Research and Development (R and D) to provide new technology. However, R and D is risky due to its typically long payback period and during this time many changes to forecasts and unforeseen paths may arise. These unforeseen circumstances provide unexpected benefits or expenses. In the context of this report, technology is defined as something that gives the user competitive advantage. Evidence points to having access to technology as a source of competitive advantage but oil companies and their suppliers have very different competitive objectives and strategies around technology. The former compete over the acquisition, exploration and production of crude oil and natural gas; competition is based on having some lead-time and/or cost advantage in terms of integrating the best technologies into any project. The later compete for the supply of products and services; competition is based on their technology content, quality and price. The international oil companies (IOCs), who are the traditional big spenders on technology, have reduced their technological activities

  2. Efficient Scheme for Chemical Flooding Simulation

    Directory of Open Access Journals (Sweden)

    Braconnier Benjamin

    2014-07-01

    Full Text Available In this paper, we investigate an efficient implicit scheme for the numerical simulation of chemical enhanced oil recovery technique for oil fields. For the sake of brevity, we only focus on flows with polymer to describe the physical and numerical models. In this framework, we consider a black oil model upgraded with the polymer modeling. We assume the polymer only transported in the water phase or adsorbed on the rock following a Langmuir isotherm. The polymer reduces the water phase mobility which can change drastically the behavior of water oil interfaces. Then, we propose a fractional step technique to resolve implicitly the system. The first step is devoted to the resolution of the black oil subsystem and the second to the polymer mass conservation. In such a way, jacobian matrices coming from the implicit formulation have a moderate size and preserve solvers efficiency. Nevertheless, the coupling between the black-oil subsystem and the polymer is not fully resolved. For efficiency and accuracy comparison, we propose an explicit scheme for the polymer for which large time step is prohibited due to its CFL (Courant-Friedrichs-Levy criterion and consequently approximates accurately the coupling. Numerical experiments with polymer are simulated : a core flood, a 5-spot reservoir with surfactant and ions and a 3D real case. Comparisons are performed between the polymer explicit and implicit scheme. They prove that our polymer implicit scheme is efficient, robust and resolves accurately the coupling physics. The development and the simulations have been performed with the software PumaFlow [PumaFlow (2013 Reference manual, release V600, Beicip Franlab].

  3. Urban Mobility

    DEFF Research Database (Denmark)

    2017-01-01

    This anthology is the proceedings publication from the 2015 NAF Symposium in Malmö, Sweden. The aim of the 2015 NAF Symposium “Urban Mobility – Architectures, Geographies and Social Space” was to facilitate a cross-disciplinary discussion on urban mobility in which the juxtaposition of different...

  4. Urban Mobility

    DEFF Research Database (Denmark)

    2017-01-01

    This anthology is the proceedings publication from the 2015 NAF Symposium in Malmö, Sweden. The aim of the 2015 NAF Symposium “Urban Mobility – Architectures, Geographies and Social Space” was to facilitate a cross-disciplinary discussion on urban mobility in which the juxtaposition of different ...

  5. Mobile phone

    International Nuclear Information System (INIS)

    2009-01-01

    Almost the entire Norwegian population has cell phone. The usefulness of the cell phone is great, but can use a mobile phone to health or discomfort? How can exposure be reduced? NRPA follows research and provides advice on mobile phone use. (AG)

  6. Intensive mobilities

    DEFF Research Database (Denmark)

    Vannini, Phillip; Bissell, David; Jensen, Ole B.

    with fieldwork conducted in Canada, Denmark and Australia to develop our understanding of the experiential politics of long distance workers. Rather than focusing on the extensive dimensions of mobilities that are implicated in patterns and trends, our paper turns to the intensive dimensions of this experience......This paper explores the intensities of long distance commuting journeys as a way of exploring how bodily sensibilities are being changed by the mobilities that they undertake. The context of this paper is that many people are travelling further to work than ever before owing to a variety of factors...... which relate to transport, housing and employment. Yet we argue that the experiential dimensions of long distance mobilities have not received the attention that they deserve within geographical research on mobilities. This paper combines ideas from mobilities research and contemporary social theory...

  7. Designing Mobilities

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    are often still not engaged with in a sufficiently manner. Often social sciences keep distance to the physical and material as if the social was still to be understood as a realm separate of technology, architecture, and design (for a critique of this see; Latour 2005 and Urry 2000). This paper takes point......Within the so-called ‘mobilities turn’ (Adey 2010; Cresswell 2006; Urry 2007) much research has taken place during the last decade bringing mobilities into the centre of sociological analysis. However, the materiality and spatiality of artefacts, infrastructures, and sites hosting mobilities...... of departure in the sociological perspective termed ‘Staging Mobilities’ (Jensen 2013a) and utilizes this as an analytical frame for exploring cases of mobility design. The paper put focus on how the material shape, design and architectures of technologies, spaces and sites influence mobilities practices...

  8. Mobile probes

    DEFF Research Database (Denmark)

    Ørngreen, Rikke; Jørgensen, Anna Neustrup; Noesgaard, Signe Schack

    2016-01-01

    A project investigating the effectiveness of a collection of online resources for teachers' professional development used mobile probes as a data collection method. Teachers received questions and tasks on their mobile in a dialogic manner while in their everyday context as opposed...... to in an interview. This method provided valuable insight into the contextual use, i.e. how did the online resource transfer to the work practice. However, the research team also found that mobile probes may provide the scaffolding necessary for individual and peer learning at a very local (intra-school) community...... level. This paper is an initial investigation of how the mobile probes process proved to engage teachers in their efforts to improve teaching. It also highlights some of the barriers emerging when applying mobile probes as a scaffold for learning....

  9. Mobilities Design

    DEFF Research Database (Denmark)

    Jensen, Ole B.; Lanng, Ditte Bendix

    2016-01-01

    of life’ for billions of people in the everyday life. This paper is structured in three parts. After the general introduction we present the mobilities theory perspective of ‘staging mobilities’ and connects this to the empirical phenomenon of parking lots and their design. The paper ends in section three......Contemporary society is marked and defined by the ways in which mobile goods, bodies, vehicles, objects, and data are organized, moved and staged. On the backgound of the ‘mobilities turn’ (for short review paper on this see; Sheller 2011, Vannini 2010) this paper proposes a further development...... of the perspective in the direction of a material and design oriented turn. In order to fulfill this purpose we articulate a new and emerging research field, namely that of ‘mobilities design’. In our understanding time has come to articulate ‘Mobilities Design’ as a dedicated research field in and of its own...

  10. Mobile Lexicography

    DEFF Research Database (Denmark)

    Køhler Simonsen, Henrik

    2015-01-01

    are already mobile – but lexicography is not yet fully ready for the mobile challenge, mobile users and mobile user situations. The article is based on empirical data from two surveys comprising 10 medical doctors, who were asked to look up five medical substances with the medical dictionary app Medicin.......dk and five students, who were asked to look up five terms with the dictionary app Gyldendal Engelsk-Dansk. The empirical data comprise approximately 15 hours of recordings of user behavior, think-aloud data and interview data. The data indicate that there is still much to be done in this area...... and that lexicographic innovation is needed. A new type of users, new user situations and new access methods call for new lexicographic solutions, and this article proposes a six-pointed hexagram model, which can be used during dictionary app design to lexicographically calibrate the six dimensions in mobile...

  11. Restricted Mobilities

    DEFF Research Database (Denmark)

    Nielsen, Mette; Lassen, Claus

    2012-01-01

    communities and shopping centres through mobility lenses. The article shows how different mobility systems enable and restrict the public access to private-public spaces, and it points out that proprietary communities create an unequal potential for human movement and access in the city. The main argument......Privatisation of public spaces in the contemporary city has increased during the last decades but only few studies have approached this field from a mobility perspective. Therefore the article seeks to rectify this by exploring two Australian examples of private spaces in the city; gated...... and stratification mechanisms. In conclusion the article therefore suggests that future urban research and planning also needs a mobile understanding of spaces in the cities and how different mobility systems play an important role to sustain the exclusiveness that often characterises the private/public spaces...

  12. Mobility Work

    DEFF Research Database (Denmark)

    Bardram, Jakob Eyvind; Bossen, Claus

    2005-01-01

    We posit the concept of Mobility Work to describe efforts of moving about people and things as part of accomplishing tasks. Mobility work can be seen as a spatial parallel to the concept of articulation work proposed by the sociologist Anselm Strauss. Articulation work describes efforts of coordi....../or resources. To accomplish their work, actors have to make the right configuration of these four aspects emerge.......We posit the concept of Mobility Work to describe efforts of moving about people and things as part of accomplishing tasks. Mobility work can be seen as a spatial parallel to the concept of articulation work proposed by the sociologist Anselm Strauss. Articulation work describes efforts...... of coordination necessary in cooperative work, but focuses, we argue, mainly on the temporal aspects of cooperative work. As a supplement, the concept of mobility work focuses on the spatial aspects of cooperative work. Whereas actors seek to diminish the amount of articulation work needed in collaboration...

  13. Mobility Challenges

    DEFF Research Database (Denmark)

    Jensen, Ole B.; Lassen, Claus

    2011-01-01

    This article takes point of departure in the challenges to understand the importance of contemporary mobility. The approach advocated is a cross-disciplinary one drawing on sociology, geography, urban planning and design, and cultural studies. As such the perspective is to be seen as a part...... of the so-called ‘mobility turn’ within social science. The perspective is illustrative for the research efforts at the Centre for Mobility and Urban Studies (C-MUS), Aalborg University. The article presents the contours of a theoretical perspective meeting the challenges to research into contemporary urban...... mobilities. In particular the article discusses 1) the physical city, its infrastructures and technological hardware/software, 2) policies and planning strategies for urban mobility and 3) the lived everyday life in the city and the region....

  14. Modified Aggressive Packet Combining Scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2010-06-01

    In this letter, a few schemes are presented to improve the performance of aggressive packet combining scheme (APC). To combat error in computer/data communication networks, ARQ (Automatic Repeat Request) techniques are used. Several modifications to improve the performance of ARQ are suggested by recent research and are found in literature. The important modifications are majority packet combining scheme (MjPC proposed by Wicker), packet combining scheme (PC proposed by Chakraborty), modified packet combining scheme (MPC proposed by Bhunia), and packet reversed packet combining (PRPC proposed by Bhunia) scheme. These modifications are appropriate for improving throughput of conventional ARQ protocols. Leung proposed an idea of APC for error control in wireless networks with the basic objective of error control in uplink wireless data network. We suggest a few modifications of APC to improve its performance in terms of higher throughput, lower delay and higher error correction capability. (author)

  15. Transmission usage cost allocation schemes

    International Nuclear Information System (INIS)

    Abou El Ela, A.A.; El-Sehiemy, R.A.

    2009-01-01

    This paper presents different suggested transmission usage cost allocation (TCA) schemes to the system individuals. Different independent system operator (ISO) visions are presented using the proportional rata and flow-based TCA methods. There are two proposed flow-based TCA schemes (FTCA). The first FTCA scheme generalizes the equivalent bilateral exchanges (EBE) concepts for lossy networks through two-stage procedure. The second FTCA scheme is based on the modified sensitivity factors (MSF). These factors are developed from the actual measurements of power flows in transmission lines and the power injections at different buses. The proposed schemes exhibit desirable apportioning properties and are easy to implement and understand. Case studies for different loading conditions are carried out to show the capability of the proposed schemes for solving the TCA problem. (author)

  16. Energetic particle diffusion coefficients upstream of quasi-parallel interplanetary shocks

    Science.gov (United States)

    Tan, L. C.; Mason, G. M.; Gloeckler, G.; Ipavich, F. M.

    1989-01-01

    The properties of about 30 to 130-keV/e protons and alpha particles upstream of six quasi-parallel interplanetary shocks that passed by the ISEE 3 spacecraft during 1978-1979 were analyzed, and the values for the upstream energegic particle diffusion coefficient, kappa, in these six events were deduced for a number of energies and upstream positions. These observations were compared with predictions of Lee's (1983) theory of shock acceleration. It was found that the observations verified the prediction of the A/Q dependence (where A and Q are the particle atomic mass and ionization state, respectively) of kappa for alpha and proton particles upstream of the quasi-parallel shocks.

  17. Low power consumption O-band VCSEL sources for upstream channels in PON systems

    DEFF Research Database (Denmark)

    Vegas Olmos, Juan José; Rodes Lopez, Roberto; Tafur Monroy, Idelfonso

    2012-01-01

    This paper presents an experimental validation of a low power optical network unit employing vertical-cavity surface-emitting lasers as upstream sources for passive optical networks with an increased power budget, enabling even larger splitting ratios....

  18. Review and Analysis of Cryptographic Schemes Implementing Threshold Signature

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-03-01

    Full Text Available This work is devoted to the study of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, ellipt ic curves and bilinear pairings were investigated. Different methods of generation and verification of threshold signatures were explored, e.g. used in a mobile agents, Internet banking and e-currency. The significance of the work is determined by the reduction of the level of counterfeit electronic documents, signed by certain group of users.

  19. A vertical handoff scheme based on adaptive period

    Directory of Open Access Journals (Sweden)

    Li Yang

    2017-08-01

    Full Text Available This paper presents a periodic adaptive vertical handoff scheme.In the phase of handoff initiation,the mobile terminal will adjust the interfaces activating interval to scan the potential new wireless signals according to the Received Signals Strength.In the phase of handoff decision,multiple attribute judgment method are adopted to judge the comprehensive perfomance of each network.The simulation shows that the proposed scheme can discover new wireless networks access the network that has the best comprehensive performance saving consumed power.

  20. An Efficient Offloading Scheme For MEC System Considering Delay and Energy Consumption

    Science.gov (United States)

    Sun, Yanhua; Hao, Zhe; Zhang, Yanhua

    2018-01-01

    With the increasing numbers of mobile devices, mobile edge computing (MEC) which provides cloud computing capabilities proximate to mobile devices in 5G networks has been envisioned as a promising paradigm to enhance users experience. In this paper, we investigate a joint consideration of delay and energy consumption offloading scheme (JCDE) for MEC system in 5G heterogeneous networks. An optimization is formulated to minimize the delay as well as energy consumption of the offloading system, which the delay and energy consumption of transmitting and calculating tasks are taken into account. We adopt an iterative greedy algorithm to solve the optimization problem. Furthermore, simulations were carried out to validate the utility and effectiveness of our proposed scheme. The effect of parameter variations on the system is analysed as well. Numerical results demonstrate delay and energy efficiency promotion of our proposed scheme compared with another paper’s scheme.

  1. Analysis of a fourth-order compact scheme for convection-diffusion

    International Nuclear Information System (INIS)

    Yavneh, I.

    1997-01-01

    In, 1984 Gupta et al. introduced a compact fourth-order finite-difference convection-diffusion operator with some very favorable properties. In particular, this scheme does not seem to suffer excessively from spurious oscillatory behavior, and it converges with standard methods such as Gauss Seidel or SOR (hence, multigrid) regardless of the diffusion. This scheme has been rederived, developed (including some variations), and applied in both convection-diffusion and Navier-Stokes equations by several authors. Accurate solutions to high Reynolds-number flow problems at relatively coarse resolutions have been reported. These solutions were often compared to those obtained by lower order discretizations, such as second-order central differences and first-order upstream discretizations. The latter, it was stated, achieved far less accurate results due to the artificial viscosity, which the compact scheme did not include. We show here that, while the compact scheme indeed does not suffer from a cross-stream artificial viscosity (as does the first-order upstream scheme when the characteristic direction is not aligned with the grid), it does include a streamwise artificial viscosity that is inversely proportional to the natural viscosity. This term is not always benign. 7 refs., 1 fig., 1 tab

  2. Broadcast Reserved Opportunity Assisted Diversity Relaying Scheme and Its Performance Evaluation

    Directory of Open Access Journals (Sweden)

    Xia Chen

    2008-05-01

    Full Text Available Relay-based transmission can over the benefits in terms of coverage extension as well as throughput improvement if compared to conventional direct transmission. In a relay enhanced cellular (REC network, where multiple mobile terminals act as relaying nodes (RNs, multiuser diversity gain can be exploited. We propose an efficient relaying scheme, referred to as Broadcast Reserved Opportunity Assisted Diversity (BROAD for the REC networks. Unlike the conventional Induced Multiuser Diversity Relaying (IMDR scheme, our scheme acquires channel quality information (CQI in which the destined node (DN sends pilots on a reserved radio resource. The BROAD scheme can significantly decrease the signaling overhead among the mobile RNs while achieving the same multiuser diversity as the conventional IMDR scheme. In addition, an alternative version of the BROAD scheme, named as A-BROAD scheme, is proposed also, in which the candidate RN(s feed back partial or full CQI to the base station (BS for further scheduling purpose. The A-BROAD scheme achieves a higher throughput than the BROAD scheme at the cost of extra signalling overhead. The theoretical analysis given in this paper demonstrates the feasibility of the schemes in terms of their multiuser diversity gains in a REC network.

  3. An improved anonymous authentication scheme for roaming in ubiquitous networks

    Science.gov (United States)

    Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick

    2018-01-01

    With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people’s lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.’s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al’s scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments. PMID:29505575

  4. Manet key management via Mobile Ficlke Key protocol (MFK ...

    African Journals Online (AJOL)

    Manet key management via Mobile Ficlke Key protocol (MFK) ... Journal of Fundamental and Applied Sciences. Journal Home · ABOUT THIS JOURNAL ... No Abstract. Keywords: MANET; key management scheme; simulation environment ...

  5. Sustainable Mobility

    DEFF Research Database (Denmark)

    Kjærulff, Aslak Aamot

    This paper combines strands of mobilities theory and planning theory, and develops a qualitative approach to look across emerging planning practices. By actively following 8 Danish urban and transport planners, over the course of 2 years, we learn how their practices have changed, inspired...... by mobility management, a concept aiming to reduce carbon emissions from transportation in western societies. The article focuses on how municipal planners formulate the role of mobility management activities organized around private companies, and how their practices are connected to wider ideas on planning....

  6. Coordinated renewable energy support schemes

    DEFF Research Database (Denmark)

    Morthorst, P.E.; Jensen, S.G.

    2006-01-01

    . The first example covers countries with regional power markets that also regionalise their support schemes, the second countries with separate national power markets that regionalise their support schemes. The main findings indicate that the almost ideal situation exists if the region prior to regionalising...

  7. CANONICAL BACKWARD DIFFERENTIATION SCHEMES FOR ...

    African Journals Online (AJOL)

    This paper describes a new nonlinear backward differentiation schemes for the numerical solution of nonlinear initial value problems of first order ordinary differential equations. The schemes are based on rational interpolation obtained from canonical polynomials. They are A-stable. The test problems show that they give ...

  8. Call Admission Scheme for Multidimensional Traffic Assuming Finite Handoff User

    Directory of Open Access Journals (Sweden)

    Md. Baitul Al Sadi

    2017-01-01

    Full Text Available Usually, the number of users within a cell in a mobile cellular network is considered infinite; hence, M/M/n/k model is appropriate for new originated traffic, but the number of ongoing calls around a cell is always finite. Hence, the traffic model of handoff call will be M/M/n/k/N. In this paper, a K-dimensional traffic model of a mobile cellular network is proposed using the combination of limited and unlimited users case. A new call admission scheme (CAS is proposed based on both thinning scheme and fading condition. The fading condition of the wireless channel access to a handoff call is prioritized compared to newly originated calls.

  9. Water Stress in Global Transboundary River Basins: Significance of Upstream Water Use on Downstream Stress

    Science.gov (United States)

    Munia, H.; Guillaume, J. H. A.; Mirumachi, N.; Porkka,M.; Wada, Yoshihide; Kummu, M.

    2016-01-01

    Growing population and water demand have increased pressure on water resources in various parts of the globe, including many transboundary river basins. While the impacts of upstream water use on downstream water availability have been analyzed in many of these international river basins, this has not been systematically done at the global scale using coherent and comparable datasets. In this study, we aim to assess the change in downstream water stress due to upstream water use in the world's transboundary river basins. Water stress was first calculated considering only local water use of each sub-basin based on country-basin mesh, then compared with the situation when upstream water use was subtracted from downstream water availability. Wefound that water stress was generally already high when considering only local water use, affecting 0.95-1.44 billion people or 33%-51% of the population in transboundary river basins. After accounting for upstream water use, stress level increased by at least 1 percentage-point for 30-65 sub-basins, affecting 0.29-1.13 billion people. Altogether 288 out of 298 middle-stream and downstream sub-basin areas experienced some change in stress level. Further, we assessed whether there is a link between increased water stress due to upstream water use and the number of conflictive and cooperative events in the transboundary river basins, as captured by two prominent databases. No direct relationship was found. This supports the argument that conflicts and cooperation events originate from a combination of different drivers, among which upstream-induced water stress may play a role. Our findings contribute to better understanding of upstream-downstream dynamics in water stress to help address water allocation problems.

  10. Adaptive Detection and ISI Mitigation for Mobile Molecular Communication.

    Science.gov (United States)

    Chang, Ge; Lin, Lin; Yan, Hao

    2018-03-01

    Current studies on modulation and detection schemes in molecular communication mainly focus on the scenarios with static transmitters and receivers. However, mobile molecular communication is needed in many envisioned applications, such as target tracking and drug delivery. Until now, investigations about mobile molecular communication have been limited. In this paper, a static transmitter and a mobile bacterium-based receiver performing random walk are considered. In this mobile scenario, the channel impulse response changes due to the dynamic change of the distance between the transmitter and the receiver. Detection schemes based on fixed distance fail in signal detection in such a scenario. Furthermore, the intersymbol interference (ISI) effect becomes more complex due to the dynamic character of the signal which makes the estimation and mitigation of the ISI even more difficult. In this paper, an adaptive ISI mitigation method and two adaptive detection schemes are proposed for this mobile scenario. In the proposed scheme, adaptive ISI mitigation, estimation of dynamic distance, and the corresponding impulse response reconstruction are performed in each symbol interval. Based on the dynamic channel impulse response in each interval, two adaptive detection schemes, concentration-based adaptive threshold detection and peak-time-based adaptive detection, are proposed for signal detection. Simulations demonstrate that the ISI effect is significantly reduced and the adaptive detection schemes are reliable and robust for mobile molecular communication.

  11. A privacy authentication scheme based on cloud for medical environment.

    Science.gov (United States)

    Chen, Chin-Ling; Yang, Tsai-Tung; Chiang, Mao-Lun; Shih, Tzay-Farn

    2014-11-01

    With the rapid development of the information technology, the health care technologies already became matured. Such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concerning issue. In spite of many literatures discussed about medical systems, these literatures should face many security challenges. The most important issue is patients' privacy. Therefore, we propose a privacy authentication scheme based on cloud environment. In our scheme, we use mobile device's characteristics, allowing peoples to use medical resources on the cloud environment to find medical advice conveniently. The digital signature is used to ensure the security of the medical information that is certified by the medical department in our proposed scheme.

  12. hybrid modulation scheme fo rid modulation scheme fo dulation

    African Journals Online (AJOL)

    eobe

    control technique is done through simulations and ex control technique .... HYBRID MODULATION SCHEME FOR CASCADED H-BRIDGE INVERTER CELLS. C. I. Odeh ..... and OR operations. Referring to ... MATLAB/SIMULINK environment.

  13. Upstream pressure variations associated with the bow shock and their effects on the magnetosphere

    International Nuclear Information System (INIS)

    Fairfield, D.H.; Baumjohann, W.; Paschmann, G.; Luehr, H.; Sibeck, D.G.

    1990-01-01

    Magnetic field enhancements and depressions on the time scales of minutes were frequently observed simultaneously by the AMPTE CCE, GOES 5, and GOES 6 spacecraft in the subsolar magnetosphere. The source of these perturbations has been detected in the high time resolution AMPTE IRM measurements of the kinetic pressure of the solar wind upstream of the bow shock. It is argued that these upstream pressure variations are not inherent in the solar wind but rather are associated with the bow shock. This conclusion follows from the facts that (1) the upstream field strength and the density associated with the perturbations are highly correlated with each other whereas these quantities tend to be anticorrelated in the undisturbed solar wind, and (2) the upstream perturbations occur within the foreshock or at its boundary. The results imply a mode of interaction between the solar wind and the magnetosphere whereby density changes produced in the foreshock subsequently convect through the bow shock and impinge on the magnetosphere. Also velocity decreases deep within the foreshock sometimes reach many tens of kilometers per second and may be associated with further pressure variations as a changing interplanetary field direction changes the foreshock geometry. Upstream pressure perturbations should create significant effects on the magnetopause and at the foot of nearby field lines that lead to the polar cusp ionosphere

  14. Moving Upstream in U.S. Hospital Care Toward Investments in Population Health.

    Science.gov (United States)

    Begun, James W; Potthoff, Sandra

    The root causes for most health outcomes are often collectively referred to as the social determinants of health. Hospitals and health systems now must decide how much to "move upstream," or invest in programs that directly affect the social determinants of health. Moving upstream in healthcare delivery requires an acceptance of responsibility for the health of populations. We examine responses of 950 nonfederal, general hospitals in the United States to the 2015 American Hospital Association Population Health Survey to identify characteristics that distinguish those hospitals that are most aligned with population health and most engaged in addressing social determinants of health. Those "upstream" hospitals are significantly more likely to be large, not-for-profit, metropolitan, teaching-affiliated, and members of systems. Internally, the more upstream hospitals are more likely to organize their population health activities with strong executive-level involvement, full-time-equivalent support, and coordination at the system level.The characteristics differentiating hospitals strongly involved in population health and upstream activity are not unlike those characteristics associated with diffusion of many innovations in hospitals. These hospitals may be the early adopters in a diffusion process that will eventually include most hospitals or, at least, most not-for-profit hospitals. Alternatively, the population health and social determinants movements could be transient or could be limited to a small portion of hospitals such as those identified here, with distinctive patient populations, missions, and resources.

  15. Spatial distribution of upstream magnetospheric ≥50 keV ions

    Directory of Open Access Journals (Sweden)

    G. C. Anagnostopoulos

    2000-01-01

    Full Text Available We present for the first time a statistical study of \\geq50 keV ion events of a magnetospheric origin upstream from Earth's bow shock. The statistical analysis of the 50-220 keV ion events observed by the IMP-8 spacecraft shows: (1 a dawn-dusk asymmetry in ion distributions, with most events and lower intensities upstream from the quasi-parallel pre-dawn side (4 LT-6 LT of the bow shock, (2 highest ion fluxes upstream from the nose/dusk side of the bow shock under an almost radial interplanetary magnetic field (IMF configuration, and (3 a positive correlation of the ion intensities with the solar wind speed and the index of geomagnetic index Kp, with an average solar wind speed as high as 620 km s-1 and values of the index Kp > 2. The statistical results are consistent with (1 preferential leakage of ~50 keV magnetospheric ions from the dusk magnetopause, (2 nearly scatter free motion of ~50 keV ions within the magnetosheath, and (3 final escape of magnetospheric ions from the quasi-parallel dawn side of the bow shock. An additional statistical analysis of higher energy (290-500 keV upstream ion events also shows a dawn-dusk asymmetry in the occurrence frequency of these events, with the occurrence frequency ranging between ~16%-~34% in the upstream region.Key words. Interplanetary physics (energetic particles; planetary bow shocks

  16. Spatial distribution of upstream magnetospheric ≥50 keV ions

    Directory of Open Access Journals (Sweden)

    G. Kaliabetsos

    Full Text Available We present for the first time a statistical study of geq50 keV ion events of a magnetospheric origin upstream from Earth's bow shock. The statistical analysis of the 50-220 keV ion events observed by the IMP-8 spacecraft shows: (1 a dawn-dusk asymmetry in ion distributions, with most events and lower intensities upstream from the quasi-parallel pre-dawn side (4 LT-6 LT of the bow shock, (2 highest ion fluxes upstream from the nose/dusk side of the bow shock under an almost radial interplanetary magnetic field (IMF configuration, and (3 a positive correlation of the ion intensities with the solar wind speed and the index of geomagnetic index Kp, with an average solar wind speed as high as 620 km s-1 and values of the index Kp > 2. The statistical results are consistent with (1 preferential leakage of ~50 keV magnetospheric ions from the dusk magnetopause, (2 nearly scatter free motion of ~50 keV ions within the magnetosheath, and (3 final escape of magnetospheric ions from the quasi-parallel dawn side of the bow shock. An additional statistical analysis of higher energy (290-500 keV upstream ion events also shows a dawn-dusk asymmetry in the occurrence frequency of these events, with the occurrence frequency ranging between ~16%-~34% in the upstream region.Key words. Interplanetary physics (energetic particles; planetary bow shocks

  17. Reducing Downlink Signaling Traffic in Wireless Systems Using Mobile-Assisted Scheduling

    OpenAIRE

    Moosavi, Reza; Larsson, Erik G.

    2010-01-01

    We present an idea to reduce the part of the downlink signaling traffic in wireless multiple access systems that contains scheduling information. The theoretical basis of the scheme is that the scheduling decisions made by the base station are correlated with the CSI reports from the mobiles. This correlation can be exploited by the source coding scheme that is used to compress the scheduling maps before they are sent to the mobiles. In the proposed scheme, this idea is implemented by letting...

  18. Strategic human resources study of the upstream petroleum industry : the decade ahead

    International Nuclear Information System (INIS)

    2003-10-01

    This report presents the results of a 10 month study of the human resources issues in Canada's upstream petroleum industry. The study identifies workforce demographics, skills, and supply and demand. It also discusses the impact of technology and other key challenges facing human resources issues. The upstream petroleum industry includes exploration and production, service industries, pipeline transmission, natural gas processing, and heavy oil and bitumen extracting and upgrading. The study defined four regions in Canada: Western Canada Sedimentary Basin, the oil sands, the north, and the east coast. The main influences on the management practices within the upstream petroleum industry are: globalization; cyclical economic conditions; operational excellence business models; government regulatory requirements; stakeholder expectations for involvement; technological advances; changing demographics, and workplace skills. The study also presented suggestions for changes in best practices to improve the efficiency and effectiveness of product and service delivery. refs., tabs., figs

  19. Ion acceleration at the earth's bow shock: A review of observations in the upstream region

    International Nuclear Information System (INIS)

    Gosling, J.T.; Asbridge, J.R.; Bame, S.J.; Feldman, W.C.

    1979-01-01

    Positive ions are accelerated at or near the earth's bow shock and propagate into the upstream region. Two distinctly different population of these ions, distinguished by their greatly different spectral and angular widths, can be identified there. The type of ion population observed in the upstream region is strongly correlated with the presence or absence of long-period compresive waves in the solar wind. Very few ions are accelerated in the vicinity of the shock to energies much above about 100 keV. It is not yet clear whether the most energetic ions (i.e. those near 100 keV) are accelerated at the shock or in the broad disturbed region upstream from the shock. In either case stochastic acceleration by turbulent electrostatic fields seems to be the most viable candidate for the acceleration of the most energetic particles

  20. Wake flow behaviour behind a smaller cylinder oscillating in the wake of an upstream stationary cylinder

    Energy Technology Data Exchange (ETDEWEB)

    Gao, Yangyang; Sun, Zhilin [Ocean College, Zhejiang University, Hangzhou 310058 (China); Tan, Danielle S [Maritime Research Centre, Nanyang Technological University, Singapore 639798 (Singapore); Yu, Dingyong [College of Engineering, Ocean University of China, 266100 (China); Tan, Soon Keat, E-mail: yygao@zju.edu.cn [Nanyang Environment and Water Research Institute, Nanyang Technological University, Singapore 639798 (Singapore)

    2014-04-01

    The flow patterns around a cylinder oscillating freely in the wake of a larger cylinder upstream were investigated using the particle image velocimetry technique. The upstream cylinder was fixed at both ends while the downstream smaller cylinder was held by springs such that it was free to oscillate in the transverse direction. The flow patterns, amplitudes of oscillation and vortex shedding frequencies were compared with those of a single cylinder. In the presence of the upstream cylinder, the three parameters characterizing the oscillation response of the smaller cylinder—amplitude of oscillation, vortex shedding frequency and Reynolds stresses—were greatly reduced. While their magnitude increased with gap ratio, these three parameters were still smaller than the corresponding magnitudes for a single oscillating cylinder. The peak values of turbulence statistics such as Reynolds shear stress and normal stress behind the oscillating downstream cylinder were similarly reduced, and increased with gap ratios. (paper)

  1. Observations of two distinct populations of bow shock ions in the upstream solar wind

    International Nuclear Information System (INIS)

    Gosling, J.T.; Asbridge, J.; Bame, S.J.; Paschmann, G.; Sckopke, N.

    1978-01-01

    Observations upstream of the earth's bow shock with the LASL/MPI fast plasma experiments on ISEE 1 and 2 reveal the presence of two distinct and mutually exclusive populations of low energy (< or approx. =40keV) ions apparently accelerated at the bow shock. The first of these, the ''reflected'' population, is characterized by 1) sharply peaked spectra seldom extending much above approx. 10 keV/ion and 2) relatively collimated flow coming from the direction of the shock. On the other hand, the ''diffuse'' ions are distinguished by relatively flat energy spectra above approx. 10 keV and broad angular distributions. They are by far the most commonly observed upstream ion event. A close causal association is suggested between the diffuse ion population in the upstream solar wind and energetic plasma ions observed within the magnetosheath

  2. Ion acceleration at the earth's bow shock: a review of observations in the upstream region

    International Nuclear Information System (INIS)

    Gosling, J.T.; Asbridge, J.R.; Bame, S.J.; Feldman, W.C.

    1979-01-01

    Positive ions are accelerated at or near the earth's bow shock and propagate into the upstream region. Two distinctly different populations of these ions, distinguished by their greatly different spectral and angular widths, can be identified there. The type of ion population observed in the upstream region is strongly correlated with the presence or absence of long-period compressive waves in the solar wind. Very few ions are accelerated in the vicinity of the shock to energies much above about 100 keV. It is not yet clear whether the most energetic ions (i.e., those near 100 keV) are accelerated at the shock or in broad disturbed region upstream from the shock. In either case stochastic acceleration by turbulent electrostatic fields seems to be the most viable candidate for the acceleration of the most energetic particles

  3. Good governance for pension schemes

    CERN Document Server

    Thornton, Paul

    2011-01-01

    Regulatory and market developments have transformed the way in which UK private sector pension schemes operate. This has increased demands on trustees and advisors and the trusteeship governance model must evolve in order to remain fit for purpose. This volume brings together leading practitioners to provide an overview of what today constitutes good governance for pension schemes, from both a legal and a practical perspective. It provides the reader with an appreciation of the distinctive characteristics of UK occupational pension schemes, how they sit within the capital markets and their social and fiduciary responsibilities. Providing a holistic analysis of pension risk, both from the trustee and the corporate perspective, the essays cover the crucial role of the employer covenant, financing and investment risk, developments in longevity risk hedging and insurance de-risking, and best practice scheme administration.

  4. Optimum RA reactor fuelling scheme

    International Nuclear Information System (INIS)

    Strugar, P.; Nikolic, V.

    1965-10-01

    Ideal reactor refueling scheme can be achieved only by continuous fuel elements movement in the core, which is not possible, and thus approximations are applied. One of the possible approximations is discontinuous movement of fuel elements groups in radial direction. This enables higher burnup especially if axial exchange is possible. Analysis of refueling schemes in the RA reactor core and schemes with mixing the fresh and used fuel elements show that 30% higher burnup can be achieved by applying mixing, and even 40% if reactivity due to decrease in experimental space is taken into account. Up to now, mean burnup of 4400 MWd/t has been achieved, and the proposed fueling scheme with reduction of experimental space could achieve mean burnup of 6300 MWd/t which means about 25 Mwd/t per fuel channel [sr

  5. A Novel Iris Segmentation Scheme

    Directory of Open Access Journals (Sweden)

    Chen-Chung Liu

    2014-01-01

    Full Text Available One of the key steps in the iris recognition system is the accurate iris segmentation from its surrounding noises including pupil, sclera, eyelashes, and eyebrows of a captured eye-image. This paper presents a novel iris segmentation scheme which utilizes the orientation matching transform to outline the outer and inner iris boundaries initially. It then employs Delogne-Kåsa circle fitting (instead of the traditional Hough transform to further eliminate the outlier points to extract a more precise iris area from an eye-image. In the extracted iris region, the proposed scheme further utilizes the differences in the intensity and positional characteristics of the iris, eyelid, and eyelashes to detect and delete these noises. The scheme is then applied on iris image database, UBIRIS.v1. The experimental results show that the presented scheme provides a more effective and efficient iris segmentation than other conventional methods.

  6. Numerical schemes for explosion hazards

    International Nuclear Information System (INIS)

    Therme, Nicolas

    2015-01-01

    In nuclear facilities, internal or external explosions can cause confinement breaches and radioactive materials release in the environment. Hence, modeling such phenomena is crucial for safety matters. Blast waves resulting from explosions are modeled by the system of Euler equations for compressible flows, whereas Navier-Stokes equations with reactive source terms and level set techniques are used to simulate the propagation of flame front during the deflagration phase. The purpose of this thesis is to contribute to the creation of efficient numerical schemes to solve these complex models. The work presented here focuses on two major aspects: first, the development of consistent schemes for the Euler equations, then the buildup of reliable schemes for the front propagation. In both cases, explicit in time schemes are used, but we also introduce a pressure correction scheme for the Euler equations. Staggered discretization is used in space. It is based on the internal energy formulation of the Euler system, which insures its positivity and avoids tedious discretization of the total energy over staggered grids. A discrete kinetic energy balance is derived from the scheme and a source term is added in the discrete internal energy balance equation to preserve the exact total energy balance at the limit. High order methods of MUSCL type are used in the discrete convective operators, based solely on material velocity. They lead to positivity of density and internal energy under CFL conditions. This ensures that the total energy cannot grow and we can furthermore derive a discrete entropy inequality. Under stability assumptions of the discrete L8 and BV norms of the scheme's solutions one can prove that a sequence of converging discrete solutions necessarily converges towards the weak solution of the Euler system. Besides it satisfies a weak entropy inequality at the limit. Concerning the front propagation, we transform the flame front evolution equation (the so called

  7. Breeding schemes in reindeer husbandry

    Directory of Open Access Journals (Sweden)

    Lars Rönnegård

    2003-04-01

    Full Text Available The objective of the paper was to investigate annual genetic gain from selection (G, and the influence of selection on the inbreeding effective population size (Ne, for different possible breeding schemes within a reindeer herding district. The breeding schemes were analysed for different proportions of the population within a herding district included in the selection programme. Two different breeding schemes were analysed: an open nucleus scheme where males mix and mate between owner flocks, and a closed nucleus scheme where the males in non-selected owner flocks are culled to maximise G in the whole population. The theory of expected long-term genetic contributions was used and maternal effects were included in the analyses. Realistic parameter values were used for the population, modelled with 5000 reindeer in the population and a sex ratio of 14 adult females per male. The standard deviation of calf weights was 4.1 kg. Four different situations were explored and the results showed: 1. When the population was randomly culled, Ne equalled 2400. 2. When the whole population was selected on calf weights, Ne equalled 1700 and the total annual genetic gain (direct + maternal in calf weight was 0.42 kg. 3. For the open nucleus scheme, G increased monotonically from 0 to 0.42 kg as the proportion of the population included in the selection programme increased from 0 to 1.0, and Ne decreased correspondingly from 2400 to 1700. 4. In the closed nucleus scheme the lowest value of Ne was 1300. For a given proportion of the population included in the selection programme, the difference in G between a closed nucleus scheme and an open one was up to 0.13 kg. We conclude that for mass selection based on calf weights in herding districts with 2000 animals or more, there are no risks of inbreeding effects caused by selection.

  8. Mobile Marketing

    OpenAIRE

    竹安, 数博; Takeyasu, Kazuhiro

    2005-01-01

    This article deals with one of the modern trends in marketing communication, which is mobile marketing. Towards the end of 2008, several projects which use mobile phones for target marketing communication were launched. Commercial SMS´s are sent on the base of agreement or registration of the consumers on special websites, for example hellomobil.cz. The benefit for the consumers is the bonus which can have more forms - not only sending money to the account, free SMS´s/MMS´s and minutes but al...

  9. Mobile Usability

    DEFF Research Database (Denmark)

    Aryana, Bijan; Clemmensen, Torkil

    2013-01-01

    In this article, a country specific comparative mobile usability study is presented, using Iran and Turkey as the two chosen emerging/emergent nation exemplars of smartphone usage and adoption. In a focus group study, three mobile applications were selected by first-time users of smartphones...... personal contacts. The results and analysis establish the existence of country specific issues and concerns, as well as reveal generic usability issues. The article concludes that the source of these issues is most likely due to a combination of certain contextual features endemic to both Iran and Turkey...

  10. Numerical investigation on compressible flow characteristics in axial compressors using a multi block finite-volume scheme

    International Nuclear Information System (INIS)

    Farhanieh, B.; Amanifard, N.; Ghorbanian, K.

    2002-01-01

    An unsteady two-dimensional numerical investigation was performed on the viscous flow passing through a multi-blade cascade. A Cartesian finite-volume approach was linked to Van-Leer's and Roe's flux splitting schemes to evaluate inviscid flux terms. To prevent the oscillatory behavior of numerical results and to increase the accuracy, Mon tonic Upstream Scheme for Conservation Laws was added to flux splitting schemes. The Baldwin-Lo max (B L) turbulence model was implemented to solve the turbulent case studies. Implicit solution was also provided using Lower and Upper (L U) decomposition technique to compare with explicit solutions. To validate the numerical procedure, two test cases are prepared and flow over a Na Ca 0012 airfoil was investigated and the pressure coefficients were compared to the reference data. The numerical solver was implemented to study the flow passing over a compressor cascade. The results of various combinations of splitting schemes and the Mon tonic Upstream Scheme for Conventional Laws limiter were compared with each other to find the suitable methods in cascade problems. Finally the convergence histories of implemented schemes were compared to each other to show the behavior of the solver in using various methods before implementation of them in flow instability studies

  11. Method and system for control of upstream flowfields of vehicle in supersonic or hypersonic atmospheric flight

    Science.gov (United States)

    Daso, Endwell O. (Inventor); Pritchett, II, Victor E. (Inventor); Wang, Ten-See (Inventor); Farr, Rebecca Ann (Inventor)

    2012-01-01

    The upstream flowfield of a vehicle traveling in supersonic or hypersonic atmospheric flight is actively controlled using attribute(s) experienced by the vehicle. Sensed attribute(s) include pressure along the vehicle's outer mold line, temperature along the vehicle's outer mold line, heat flux along the vehicle's outer mold line, and/or local acceleration response of the vehicle. A non-heated, non-plasma-producing gas is injected into an upstream flowfield of the vehicle from at least one surface location along the vehicle's outer mold line. The pressure of the gas so-injected is adjusted based on the attribute(s) so-sensed.

  12. The WW domain protein Kibra acts upstream of Hippo in Drosophila

    DEFF Research Database (Denmark)

    Baumgartner, Roland; Poernbacher, Ingrid; Buser, Nathalie

    2010-01-01

    inactivating the transcriptional coactivator Yorkie is well established, much less is known about the upstream events that regulate Hippo signaling activity. The FERM domain proteins Expanded and Merlin appear to represent two different signaling branches that feed into the Hippo pathway. Signaling...... by the atypical cadherin Fat may act via Expanded, but how Merlin is regulated has remained elusive. Here, we show that the WW domain protein Kibra is a Hippo signaling component upstream of Hippo and Merlin. Kibra acts synergistically with Expanded, and it physically interacts with Merlin. Thus, Kibra...

  13. Efficient Mobile Client Caching Supporting Transaction Semantics

    Directory of Open Access Journals (Sweden)

    IlYoung Chung

    2000-05-01

    Full Text Available In mobile client-server database systems, caching of frequently accessed data is an important technique that will reduce the contention on the narrow bandwidth wireless channel. As the server in mobile environments may not have any information about the state of its clients' cache(stateless server, using broadcasting approach to transmit the updated data lists to numerous concurrent mobile clients is an attractive approach. In this paper, a caching policy is proposed to maintain cache consistency for mobile computers. The proposed protocol adopts asynchronous(non-periodic broadcasting as the cache invalidation scheme, and supports transaction semantics in mobile environments. With the asynchronous broadcasting approach, the proposed protocol can improve the throughput by reducing the abortion of transactions with low communication costs. We study the performance of the protocol by means of simulation experiments.

  14. Conditions for acceptance and usage of mobile payment procedures

    OpenAIRE

    Pousttchi, Key

    2003-01-01

    Mobile payment (MP) is crucial for, but not limited to mobile commerce. The key to mobile payment acceptance is in the hands of customers. In this paper we examine the conditions for acceptance and actual usage of MP procedures by the customer. We identify essential conditions which belong to the categories costs, security and convenience. Different preferences lead to an individual set of essential conditions for any single user. We propose a scheme for their representation and comparison an...

  15. Enhancing On-Demand Multicast Routing Protocols using Mobility Prediction in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Nermin Makhlouf

    2014-08-01

    Full Text Available A Mobile Ad hoc Network (MANET is a self-organizing wireless communication network in which mobile devices are based on no infrastructure like base stations or access points. Minimal configuration and quick deployment make ad hoc networks suitable for emergency situations like disaster recovery or military conflict. Since node mobility may cause links to be broken frequently, a very important issue for routing in MANETs is how to set reliable paths which can last as long as possible. To solve this problem, non-random behaviors for the mobility patterns that mobile users exhibit are exploited. This paper introduces a scheme to improve On-Demand Multicast Routing Protocol (ODMRP performances by using mobility prediction. 

  16. Designing Mobilities

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    How is the width of the pavement shaping the urban experience? How is the material design of transport infrastructure and mobile technology affording social interaction in everyday life spaces? How do people inhabit these spaces with their bodies and in accordance to social and cultural norms...

  17. Mobile IP

    NARCIS (Netherlands)

    Heijenk, Geert; Sallent, S.; Pras, Aiko

    1999-01-01

    The Internet is growing exponentially, both in the amount of traffic carried, and in the amount of hosts connected. IP technology is becoming more and more important, in company networks (Intranets), and also in the core networks for the next generation mobile networks. Further, wireless access to

  18. Mobile Misfortune

    DEFF Research Database (Denmark)

    Vigh, Henrik Erdman

    2015-01-01

    of the mobility it enables. This article, thus, looks at the motives and manners in which young men in Bissau become caught up in transnational flows of cocaine. It shows how motion is emotively anchored and affectively bound: tied to and directed toward a feeling of worth and realisation of being, and how...

  19. Going Mobile?

    DEFF Research Database (Denmark)

    Tallon, Loic; Froes, Isabel Cristina G.

    2011-01-01

    If the future is mobile, how is the museum community developing within that future? What are the challenges museums face within it? In which directions should we be seeking to evolve our collective knowledge share? It was to gain observations on questions such as these that the 2011 Museums & Mob...

  20. Resource Mobilization

    International Development Research Centre (IDRC) Digital Library (Canada)

    Annex 1: The Scoping Study on Donor Funding for. Development Research in ... publication of the Resource Mobilization: A Practical Guide for Research .... applied the concept or technique, which validates the practical application of ... some other staff member would write up a grant application addressed to one, two, or a ...

  1. Mobile Phone

    Institute of Scientific and Technical Information of China (English)

    籍万杰

    2004-01-01

    Your mobile phone rings.and instead of usual electronic signals,it's playing your favorite music.A friend sends your favorite song to cheer you up.One day,a record company might forward new records and music videos to your phone.

  2. Supporting seamless mobility for P2P live streaming.

    Science.gov (United States)

    Kim, Eunsam; Kim, Sangjin; Lee, Choonhwa

    2014-01-01

    With advent of various mobile devices with powerful networking and computing capabilities, the users' demand to enjoy live video streaming services such as IPTV with mobile devices has been increasing rapidly. However, it is challenging to get over the degradation of service quality due to data loss caused by the handover. Although many handover schemes were proposed at protocol layers below the application layer, they inherently suffer from data loss while the network is being disconnected during the handover. We therefore propose an efficient application-layer handover scheme to support seamless mobility for P2P live streaming. By simulation experiments, we show that the P2P live streaming system with our proposed handover scheme can improve the playback continuity significantly compared to that without our scheme.

  3. Supporting Seamless Mobility for P2P Live Streaming

    Directory of Open Access Journals (Sweden)

    Eunsam Kim

    2014-01-01

    Full Text Available With advent of various mobile devices with powerful networking and computing capabilities, the users' demand to enjoy live video streaming services such as IPTV with mobile devices has been increasing rapidly. However, it is challenging to get over the degradation of service quality due to data loss caused by the handover. Although many handover schemes were proposed at protocol layers below the application layer, they inherently suffer from data loss while the network is being disconnected during the handover. We therefore propose an efficient application-layer handover scheme to support seamless mobility for P2P live streaming. By simulation experiments, we show that the P2P live streaming system with our proposed handover scheme can improve the playback continuity significantly compared to that without our scheme.

  4. Detection of mobile user location on next generation wireless networks

    DEFF Research Database (Denmark)

    Schou, Saowanee; Olesen, Henning

    2005-01-01

    This paper proposes a novel conceptual mechanism for detecting the location of a mobile user on next generation wireless networks. This mechanism can provide location information of a mobile user at different levels of accuracy, by applying the movement detection mechanism of Mobile IPv6 at both...... macro- and micromobility level. In this scheme, an intradomain mobility management protocol (IDMP) is applied to manage the location of the mobile terminal. The mobile terminal needs two care-of addresses, a global care-of address (GCoA) and a local care-of address (LCoA). The current location...... of a Mobile IPv6 device can be determined by mapping the geographical location information with the two care-of-addresses and the physical address of the access point where the user is connected. Such a mechanism makes location services for mobile entities available on a global IP network. The end-users can...

  5. A study of malware detection on smart mobile devices

    Science.gov (United States)

    Yu, Wei; Zhang, Hanlin; Xu, Guobin

    2013-05-01

    The growing in use of smart mobile devices for everyday applications has stimulated the spread of mobile malware, especially on popular mobile platforms. As a consequence, malware detection becomes ever more critical in sustaining the mobile market and providing a better user experience. In this paper, we review the existing malware and detection schemes. Using real-world malware samples with known signatures, we evaluate four popular commercial anti-virus tools and our data shows that these tools can achieve high detection accuracy. To deal with the new malware with unknown signatures, we study the anomaly based detection using decision tree algorithm. We evaluate the effectiveness of our detection scheme using malware and legitimate software samples. Our data shows that the detection scheme using decision tree can achieve a detection rate up to 90% and a false positive rate as low as 10%.

  6. Autonomous Distributed Self-Organization for Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chih-Yu Wen

    2009-11-01

    Full Text Available This paper presents an adaptive combined-metrics-based clustering scheme for mobile wireless sensor networks, which manages the mobile sensors by utilizing the hierarchical network structure and allocates network resources efficiently. A local criteria is used to help mobile sensors form a new cluster or join a current cluster. The messages transmitted during hierarchical clustering are applied to choose distributed gateways such that communication for adjacent clusters and distributed topology control can be achieved. In order to balance the load among clusters and govern the topology change, a cluster reformation scheme using localized criterions is implemented. The proposed scheme is simulated and analyzed to abstract the network behaviors in a number of settings. The experimental results show that the proposed algorithm provides efficient network topology management and achieves high scalability in mobile sensor networks.

  7. Autonomous distributed self-organization for mobile wireless sensor networks.

    Science.gov (United States)

    Wen, Chih-Yu; Tang, Hung-Kai

    2009-01-01

    This paper presents an adaptive combined-metrics-based clustering scheme for mobile wireless sensor networks, which manages the mobile sensors by utilizing the hierarchical network structure and allocates network resources efficiently A local criteria is used to help mobile sensors form a new cluster or join a current cluster. The messages transmitted during hierarchical clustering are applied to choose distributed gateways such that communication for adjacent clusters and distributed topology control can be achieved. In order to balance the load among clusters and govern the topology change, a cluster reformation scheme using localized criterions is implemented. The proposed scheme is simulated and analyzed to abstract the network behaviors in a number of settings. The experimental results show that the proposed algorithm provides efficient network topology management and achieves high scalability in mobile sensor networks.

  8. PROMoter uPstream Transcripts share characteristics with mRNAs and are produced upstream of all three major types of mammalian promoters

    DEFF Research Database (Denmark)

    Preker, Pascal; Almvig, Kristina; Christensen, Marianne S

    2011-01-01

    RNAs, PROMPTs are largely nuclear and rapidly turned over by the RNA exosome. PROMPT-transcribing DNA is occupied by RNA polymerase II (RNAPII) complexes with serine 2 phosphorylated C-terminal domains (CTDs), mimicking that of the associated genic region. Thus, the inefficient elongation capacity of PROMPT...... transcription cannot solely be assigned to poor CTD phosphorylation. Conditions that reduce gene transcription increase RNAPII occupancy of the upstream PROMPT region, suggesting that they reside in a common transcription compartment. Surprisingly, gene promoters that are actively transcribed by RNAPI...

  9. Influence of Upstream and Downstream Compressor Stators on Rotor Exit Flow Field

    Directory of Open Access Journals (Sweden)

    Nicole L. Key

    2014-01-01

    Full Text Available Measurements acquired at the rotor exit plane illuminate the interaction of the rotor with the upstream vane row and the downstream vane row. The relative phase of the upstream and downstream vane rows is adjusted using vane clocking so that the effect of the upstream propagating potential field from the downstream stator can be distinguished from the effects associated with the wakes shed from the upstream stator. Unsteady absolute flow angle information shows that the downstream potential field causes the absolute flow angle to increase in the vicinity of the downstream stator leading edge. The presence of Stator 1 wake is also detected at this measurement plane using unsteady total pressure data. The rotor wakes are measured at different circumferential locations across the vane passage, and the influence of Stator 1 wake on the suction side of the rotor wake is evident. Also, the influence of the downstream stator is detected on the pressure side of the rotor wake for a particular clocking configuration. Understanding the role of the surrounding vane rows on rotor wake development will lead to improved comparison between experimental data and results from computational models.

  10. Enhancer elements upstream of the SHOX gene are active in the developing limb.

    Science.gov (United States)

    Durand, Claudia; Bangs, Fiona; Signolet, Jason; Decker, Eva; Tickle, Cheryll; Rappold, Gudrun

    2010-05-01

    Léri-Weill Dyschondrosteosis (LWD) is a dominant skeletal disorder characterized by short stature and distinct bone anomalies. SHOX gene mutations and deletions of regulatory elements downstream of SHOX resulting in haploinsufficiency have been found in patients with LWD. SHOX encodes a homeodomain transcription factor and is known to be expressed in the developing limb. We have now analyzed the regulatory significance of the region upstream of the SHOX gene. By comparative genomic analyses, we identified several conserved non-coding elements, which subsequently were tested in an in ovo enhancer assay in both chicken limb bud and cornea, where SHOX is also expressed. In this assay, we found three enhancers to be active in the developing chicken limb, but none were functional in the developing cornea. A screening of 60 LWD patients with an intact SHOX coding and downstream region did not yield any deletion of the upstream enhancer region. Thus, we speculate that SHOX upstream deletions occur at a lower frequency because of the structural organization of this genomic region and/or that SHOX upstream deletions may cause a phenotype that differs from the one observed in LWD.

  11. Canadian upstream oil and gas industry profitability: Historical review and future perspectives [with executive summary

    International Nuclear Information System (INIS)

    1991-09-01

    The profitability of the Canadian upstream oil and gas industry is examined by analyzing return on equity and return on capital invested. By all measures and interpretations, the upstream industry has been unprofitable since the mid-1980s; returns generated are far below the industry's own historical cost of capital, and are inadequate relative to other sectors of the Canadian economy and to international oil and gas companies. This poor profitability is attributed to such factors as: overly optimistic price forecasts and healthy cash flows generated in the early 1980s, which led to excess capital spending; poor returns on capital reflective of the physical limitations of the Western Canadian Sedimentary Basin; high capital and operating costs; and a high royalty burden imposed by provincial governments. The consequences of low profitability include inadequate returns to equity investors, a drop in spending on upstream services such as drilling and exploration, a reduced ability of the industry to generate employment, and an adverse effect on the economy of Alberta. Forecasts indicate that the upstream sector is extremely vulnerable to a scenario of relatively flat prices due to high and increasing operating costs and depletion charges, and the significant royalty payments that still are in effect. Little scope is foreseen for industry profitability to return to acceptable levels over the first half of the 1990s. Reduced royalties have the potential to make a significant contribution to improved profitability. 52 figs., 40 tabs

  12. Multispacecraft observations of energetic ions upstream and downstream of the bow shock

    International Nuclear Information System (INIS)

    Scholer, M.; Mobius, E.; Kistler, L.M.; Klecker, B.; Ipavich, F.M.; Department of Physics and Astronomy, University of Maryland, College Park)

    1989-01-01

    We present simultaneous measurements of energetic protons and alpha particles inside and outside of the magnetopause, immediately upstream, and downstream as well as further upstream of the bow shock. A comparison between the intensity at the bow shock and further upstream results in an e-folding distance at 30 keV of similar to 6.2 R/sub E/. After transformation of the angular distribution into the solar wind frame a diffusion coefficeint of κ/sub parallel/similar to 3 R/sub E/ is obtained from the anisotropy and the intensity gradient. Immediately downstream of the bow shock the anisotropy in the shock frame is directed toward the magnetopause. After transformation into the plasma rest frame the distribution is isotropic. The intensity in the magnetosheath just outside the magnetopause is smaller than the intensity behind the bow shock. Thus, in the magnetosheath there is no gradient or streaming in the upstream direction. The spectra, intensities, and relative abundances in the magnetosheath and inside the magnetosphere are totally different. These observations are consistent with first order Fermi acceleration at the bow shock and subsequent downstream convection, and exclude a magnetospheric source for these particles. Copyright American Geophysical Union 1989

  13. Water stress in global transboundary river basins : Significance of upstream water use on downstream stress

    NARCIS (Netherlands)

    Munia, H.; Guillaume, J. H A; Mirumachi, N.; Porkka, M.; Wada, Y.|info:eu-repo/dai/nl/341387819; Kummu, M.

    2016-01-01

    Growing population and water demand have increased pressure on water resources in various parts of the globe, including many transboundary river basins. While the impacts of upstream water use on downstream water availability have been analysed in many of these international river basins, this has

  14. Restructuring: new relationships between the oil companies and the upstream oil firms

    International Nuclear Information System (INIS)

    Barreau, S.

    2001-11-01

    Since the 1986 oil shock, international oil companies have focused on their base competencies, concentrating on activities viewed as their core businesses and steadily increasing the number of tasks to be subcontracted to the upstream oil and gas service sector. The upstream oil and gas service companies had to be restructured to face this new challenge. The strategies they launched at the end of the 80's were varied. Some firms became largely integrated (Schlumberger, Baker Hughes, Halliburton) whereas other firms chose to broaden their range of services. However generally, they opted for external investment which led to an important wave of mergers and acquisitions. The first part characterizes the upstream oil and gas sector by introducing the main oil and gas service firms and their recent strategic evolution. This concludes with both an economic valuation and a typology of attempted growth strategies. To illustrate this, a matrix has been created to characterise the dynamic paths of the oil and gas service firms. The purpose of the second part is to consider the economic theories related to industrial strategies. The strategies of innovation, market protection, vertical integration and diversification have been studied to illustrate the main conclusion which is that the aim of all these strategies was to change the relationships between the oil companies and the upstream oil and gas service firms. (author)

  15. INDIRECT UPSTREAM EFFECTS OF DAMS: CONSEQUENCES OF MIGRATORY CONSUMER EXTIRPATION IN PUERTO RICO

    Science.gov (United States)

    EFFIE A. GREATHOUSE; CATHERINE M. PRINGLE; WILLIAM H. MCDOWELL; JEFF G. HOLMQUIST

    2006-01-01

    Large dams degrade the integrity of a wide variety of ecosystems, yet direct downstream effects of dams have received the most attention from ecosystem managers and researchers. We investigated indirect upstream effects of dams resulting from decimation of migratory freshwater shrimp and fish populations in Puerto Rico, USA, in both high- and low-gradient streams. In...

  16. The upstream escape of energized solar wind protons from the bow shock

    International Nuclear Information System (INIS)

    Greenstadt, E.W.

    1975-01-01

    Recently, there have been some systematic observations of backstreaming protons at the Earth's bow shock with parallel velocity components and total energies much too high to be associated with the usual long-period upstream waves or to be produced by Sonnerup's simple reflection process (Lin et al., 1974), and these protons (30-100keV) were attributed to some unknown acceleration mechanism in the upstream region. The observations of Lof et al. involved protons in high pitch angle, and, although their reasons for favoring an upstream acceleration were quite different, it may seem intuitive that high pitch angle particles would have difficulty escaping the shock, especially at large field-normal angles. Such an inference would superficially support the notion of energization outside the bow shock. It seems worthwhile therefore to examine the extent to which the geometry of individual particle motion alone might select among reflected particles those that can escape upstream and those that cannot. In this paper the geometry of escape is described and some simple numerical examples are worked out for a few special cases. It is found that protons with rather high energies and pitch angles can escape the shock at only marginally quasi-parallel field orientations (i.e., thetasub(nB) approximately 50 0 ), even if they have quite moderate speeds parallel to B. (Auth.)

  17. Effects on the upstream flood inundation caused from the operation of Chao Phraya Dam

    Directory of Open Access Journals (Sweden)

    Sutham Visutimeteegorn

    2007-11-01

    Full Text Available During the flooding events, the operation of Chao Phraya Dam to control downstream water discharge is one of the causes of the inundation occuring over the upstream area. The purposes of this research are to study the effects of the operation of Chao Phraya Dam upon the upstream flood inundation and to find out the new measures of the flood mitigation in the upstream areas of Chao Phraya Dam by using a hydrodynamic model. The results show that Manning's n in the Chao Phraya River and its tributaries is 0.030-0.035 in the main channels and 0.050-0.070 in the flood plain areas. The backwater due to the operation of the Chao Praya dam affects as far as 110 kilometers upstream. New methods of water diversion can mitigate the flood inundation without the effect on the floating rice fields. The construction of reservoirs in the Upper Sakaekang River Basin and the Upper Yom River Basin will mitigate the flood not only in their own basins but also in the Lower Chao Phraya River Basin. The coordinated operation of the Chao Phraya Dam, the regulators and the upper basin reservoirs will efficiently mitigate the flood inundation.

  18. Deletion of SNURF/SNRPN U1B and U1B* upstream exons in a ...

    Indian Academy of Sciences (India)

    RESEARCH ARTICLE. Deletion of SNURF/SNRPN U1B and U1B* upstream exons in a child ... whereby genes are expressed in a parent-of-origin dependent manner. One of the ... lity, neurodevelopmental delay, features of attention deficit hyperactivity .... Received 16 December 2015; accepted 8 January 2016. Unedited ...

  19. ENHANCING THE ROLE OF STAKEHOLDERS IN THE MANAGEMENT OF UPSTREAM CILIWUNG WATERSHED

    Directory of Open Access Journals (Sweden)

    Iis Alviya

    2016-08-01

    Full Text Available Stakeholders have a ver y important role interm of the management of upstream watershed. Thus, the common understanding on the existence and role of stakeholders is an important factor in order to achieve good governance of watershed management, leading to the attainment of environmental, social and economic benefits. This paper aims to analyse the role, interests, and cooperation among stakeholders and its relationship with the condition of upper Ciliwung watershed. Stakeholder analysis was used in this study to identify stakeholders, to categorize them, and to investigate the relationship between stakeholders. The analysis showed the lack of cooperation among stakeholders both between key stakeholders with primar y stakeholders. This resulted in lack of communities' understanding on the benefits and the importance of conservation activities in the upstream Ciliwung watershed. Meanwhile, the cooperation between key stakeholders and supporting stakeholders, especially the providers of funds, was relatively better/stronger. This can be seen from a better management of inter-agency cooperation in the upstream Ciliwung watershed, although the effort was tend to be project-oriented. Therefore, communication forum need to be established, to taking role for synchronizing , collaborating and coordinating stakeholders' efforts, so that the management programs of upstream Ciliwung watershed can be integrated.

  20. Implications of Upstream Flow Availability for Watershed Surface Water Supply Across the Conterminous United States

    Science.gov (United States)

    Kai Duan; Ge Sun; Peter V. Caldwell; Steven G. McNulty; Yang Zhang

    2018-01-01

    Although it is well established that the availability of upstream flow (AUF) affects downstream water supply, its significance has not been rigorously categorized and quantified at fine resolutions. This study aims to fill this gap by providing a nationwide inventory of AUF and local water resource, and assessing their roles in securing water supply across the 2,099 8-...

  1. Sodium Pick-Up Ion Observations in the Solar Wind Upstream of Mercury

    Science.gov (United States)

    Jasinski, J. M.; Raines, J. M.; Slavin, J. A.; Regoli, L. R.; Murphy, N.

    2018-05-01

    We present the first observations of sodium pick-up ions upstream of Mercury’s magnetosphere. From these observations we infer properties of Mercury’s sodium exosphere and implications for the solar wind interaction with Mercury’s magnetosphere.

  2. Coordination in the upstream supply chain of the Dutch railway sector : a research agenda

    NARCIS (Netherlands)

    Schlicher, L.P.J.; Slikker, M.; van Houtum, G.J.J.A.N.; Pombo, J.

    2016-01-01

    In this paper, we present a research agenda which identifies three research directions for the upstream supply chain of the Dutch railway sector. The first research direction focusses on coordination of spare parts with criticality differences and related allocations of potential cost savings

  3. Research on performance of upstream pumping mechanical seal with different deep spiral groove

    International Nuclear Information System (INIS)

    Wang, Q; Chen, H L; Liu, T; Liu, Y H; Liu, Z B; Liu, D H

    2012-01-01

    As one new type of mechanical seal, Upstream Pumping Mechanical Seal has been widely used in fluid machinery. In this paper, structure of spiral groove is innovatively optimized to improve performance of Upstream Pumping Mechanical Seal with Spiral Groove: keeping the dam zone and the weir zone not changed, changing the bottom shape of spiral groove only, substituting different deep spiral groove for equal deep spiral groove. The simulation on Upstream Pumping Mechanical Seal with different deep spiral grooves is done using FVM method. According to calculation, the performances of opening force and pressure distribution on seals face are obtained. Five types of spiral grooves are analyzed, namely equal deep spiral groove, circumferential convergent ladder-like different deep spiral groove, circumferential divergent ladder-like different deep spiral groove, radial convergent ladder-like different deep spiral groove and radial divergent ladder-like different deep spiral groove. This paper works on twenty-five working conditions. The results indicate the performances of circumferential divergent 2-ladder different deep spiral groove are better than the others, with more opening force and better stabilization, while with the same leakage. The outcome provides theoretical support for application of Upstream Pumping Mechanical Seal with circumferential convergent ladder-like different deep spiral groove.

  4. Research on performance of upstream pumping mechanical seal with different deep spiral groove

    Science.gov (United States)

    Wang, Q.; Chen, H. L.; Liu, T.; Liu, Y. H.; Liu, Z. B.; Liu, D. H.

    2012-11-01

    As one new type of mechanical seal, Upstream Pumping Mechanical Seal has been widely used in fluid machinery. In this paper, structure of spiral groove is innovatively optimized to improve performance of Upstream Pumping Mechanical Seal with Spiral Groove: keeping the dam zone and the weir zone not changed, changing the bottom shape of spiral groove only, substituting different deep spiral groove for equal deep spiral groove. The simulation on Upstream Pumping Mechanical Seal with different deep spiral grooves is done using FVM method. According to calculation, the performances of opening force and pressure distribution on seals face are obtained. Five types of spiral grooves are analyzed, namely equal deep spiral groove, circumferential convergent ladder-like different deep spiral groove, circumferential divergent ladder-like different deep spiral groove, radial convergent ladder-like different deep spiral groove and radial divergent ladder-like different deep spiral groove. This paper works on twenty-five working conditions. The results indicate the performances of circumferential divergent 2-ladder different deep spiral groove are better than the others, with more opening force and better stabilization, while with the same leakage. The outcome provides theoretical support for application of Upstream Pumping Mechanical Seal with circumferential convergent ladder-like different deep spiral groove.

  5. Upstream pumping of radial lip seals by tangentially deforming, rough seal surfaces

    NARCIS (Netherlands)

    Bavel, van P.G.M.; Ruijl, T.A.M.; Leeuwen, van H.J.; Muijderman, E.A.

    1996-01-01

    This paper aims at a theoretical explanation of the following two experimental observations of radial lip seals: fluid film formation and upstream pumping action. The origins of these observations are still poorly understood. A hydrodynamic analysis is presented for the fully flooded contact zone of

  6. Exploring Patterns of Upstream Internationalization: The Role of Home-region ‘Stickiness’

    NARCIS (Netherlands)

    A.R. Muller (Allan); R.J.M. van Tulder (Rob)

    2005-01-01

    textabstractRecent work has emphasized the importance of regional strategies downstream, adding new depth to the debate on ‘globalization’. This paper adds to the debate by exploring the regional dimension upstream for a sample of Triad-based Fortune 500 firms. We find support for our hypothesis

  7. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad; Alnuweiri, Hussein M.; Alouini, Mohamed-Slim

    2012-01-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  8. Nonlinear secret image sharing scheme.

    Science.gov (United States)

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.

  9. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad

    2012-09-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  10. Diffie-Hellman Key Based Authentication in Proxy Mobile IPv6

    Directory of Open Access Journals (Sweden)

    HyunGon Kim

    2010-01-01

    Full Text Available Wireless communication service providers have been showing strong interest in Proxy Mobile IPv6 for providing network-based IP mobility management. This could be a prominent way to support IP mobility to mobile nodes, because Proxy Mobile IPv6 requires minimal functionalities on the mobile node. While several extensions for Proxy Mobile IPv6 are being developed in the Internet Engineering Task Force, there has been little attentions paid to developing efficient authentication mechanisms. An authentication scheme for a mobility protocol must protect signaling messages against various security threats, e.g., session stealing attack, intercept attack by redirection, replay attack, and key exposure, while minimizing authentication latency. In this paper, we propose a Diffie-Hellman key based authentication scheme that utilizes the low layer signaling to exchange Diffie-Hellman variables and allows mobility service provisioning entities to exchange mobile node's profile and ongoing sessions securely. By utilizing the low layer signaling and context transfer between relevant nodes, the proposed authentication scheme minimizes authentication latency when the mobile node moves across different networks. In addition, thanks to the use of the Diffie-Hellman key agreement, pre-established security associations between mobility service provisioning entities are not required in the proposed authentication scheme so that network scalability in an operationally efficient manner is ensured. To ascertain its feasibility, security analysis and performance analysis are presented.

  11. An Overview and Analysis of Mobile Internet Protocols in Cellular Environments.

    Science.gov (United States)

    Chao, Han-Chieh

    2001-01-01

    Notes that cellular is the inevitable future architecture for the personal communication service system. Discusses the current cellular support based on Mobile Internet Protocol version 6 (Ipv6) and points out the shortfalls of using Mobile IP. Highlights protocols especially for mobile management schemes which can optimize a high-speed mobile…

  12. Efficient demodulation scheme for rolling-shutter-patterning of CMOS image sensor based visible light communications.

    Science.gov (United States)

    Chen, Chia-Wei; Chow, Chi-Wai; Liu, Yang; Yeh, Chien-Hung

    2017-10-02

    Recently even the low-end mobile-phones are equipped with a high-resolution complementary-metal-oxide-semiconductor (CMOS) image sensor. This motivates using a CMOS image sensor for visible light communication (VLC). Here we propose and demonstrate an efficient demodulation scheme to synchronize and demodulate the rolling shutter pattern in image sensor based VLC. The implementation algorithm is discussed. The bit-error-rate (BER) performance and processing latency are evaluated and compared with other thresholding schemes.

  13. Mobile Customer Relationship Management and Mobile Security

    Science.gov (United States)

    Sanayei, Ali; Mirzaei, Abas

    The purpose of this study is twofold. First, in order to guarantee a coherent discussion about mobile customer relationship management (mCRM), this paper presents a conceptualization of mCRM delineating its unique characteristics because of Among the variety of mobile services, considerable attention has been devoted to mobile marketing and in particular to mobile customer relationship management services. Second, the authors discusses the security risks in mobile computing in different level(user, mobile device, wireless network,...) and finally we focus on enterprise mobile security and it's subgroups with a series of suggestion and solution for improve mobile computing security.

  14. The African Mobile Story

    DEFF Research Database (Denmark)

    This book identifies the factors that has enabled the growth of mobile telephony in Africa. The book covers the regulatory factors, the development and usage of mobile application, mobile security and sustainable power source for mobile networks...

  15. Upstream ORF affects MYCN translation depending on exon 1b alternative splicing

    International Nuclear Information System (INIS)

    Besançon, Roger; Puisieux, Alain; Valsesia-Wittmann, Sandrine; Locher, Clara; Delloye-Bourgeois, Céline; Furhman, Lydie; Tutrone, Giovani; Bertrand, Christophe; Jallas, Anne-Catherine; Garin, Elisabeth

    2009-01-01

    The MYCN gene is transcribed into two major mRNAs: one full-length (MYCN) and one exon 1b-spliced (MYCN Δ1b ) mRNA. But nothing is known about their respective ability to translate the MYCN protein. Plasmids were prepared to enable translation from the upstream (uORF) and major ORF of the two MYCN transcripts. Translation was studied after transfection in neuroblastoma SH-EP cell line. Impact of the upstream AUG on translation was evaluated after directed mutagenesis. Functional study with the two MYCN mRNAs was conducted by a cell viability assay. Existence of a new protein encoded by the MYCN Δ1b uORF was explored by designing a rabbit polyclonal antibody against a specific epitope of this protein. Both are translated, but higher levels of protein were seen with MYCN Δ1b mRNA. An upstream ORF was shown to have positive cis-regulatory activity on translation from MYCN but not from MYCN Δ1b mRNA. In transfected SH-EP neuroblastoma cells, high MYCN dosage obtained with MYCN Δ1b mRNA translation induces an antiapoptotic effect after serum deprivation that was not observed with low MYCN expression obtained with MYCN mRNA. Here, we showed that MYCNOT: MYCN Overlap Transcript, a new protein of unknown function is translated from the upstream AUG of MYCN Δ1b mRNA. Existence of upstream ORF in MYCN transcripts leads to a new level of MYCN regulation. The resulting MYCN dosage has a weak but significant anti-apoptotic activity after intrinsic apoptosis induction

  16. Upstream structural management measures for an urban area flooding in Turkey

    Science.gov (United States)

    Akyurek, Z.; Bozoğlu, B.; Sürer, S.; Mumcu, H.

    2015-06-01

    In recent years, flooding has become an increasing concern across many parts of the world of both the general public and their governments. The climate change inducing more intense rainfall events occurring in short period of time lead flooding in rural and urban areas. In this study the flood modelling in an urbanized area, namely Samsun-Terme in Blacksea region of Turkey is performed. MIKE21 with flexible grid is used in 2-dimensional shallow water flow modelling. 1 × 1000-1 scaled maps with the buildings for the urbanized area and 1 × 5000-1 scaled maps for the rural parts are used to obtain DTM needed in the flood modelling. The bathymetry of the river is obtained from additional surveys. The main river passing through the urbanized area has a capacity of 500 m3 s-1 according to the design discharge obtained by simple ungauged discharge estimation depending on catchment area only. The upstream structural base precautions against flooding are modelled. The effect of four main upstream catchments on the flooding in the downstream urban area are modelled as different scenarios. It is observed that if the flow from the upstream catchments can be retarded through a detention pond constructed in one of the upstream catchments, estimated Q100 flood can be conveyed by the river without overtopping from the river channel. The operation of the upstream detention ponds and the scenarios to convey Q500 without causing flooding are also presented. Structural management measures to address changes in flood characteristics in water management planning are discussed.

  17. Pseudo Last Useful Instant Queuing Strategy for Handovers in Low Earth Orbit Mobile Satellite Networks

    OpenAIRE

    W. Kiamouche; M. Benslama

    2008-01-01

    This paper presents an alternative strategy of queuing handover called Pseudo Last Useful Instant PLUI scheme for Low Earth Orbit Mobile Satellite Systems LEO MSSs. The PLUI scheme uses the same approach as the Last Useful Instant LUI scheme previously proposed in literature, with less complex implementation. Simulation tests were carried out using Dynamic Channel Allocation DCA in order to evaluate the performance of this scheme and also an analytical approach has been p...

  18. On the modelling of compressible inviscid flow problems using AUSM schemes

    Directory of Open Access Journals (Sweden)

    Hajžman M.

    2007-11-01

    Full Text Available During last decades, upwind schemes have become a popular method in the field of computational fluid dynamics. Although they are only first order accurate, AUSM (Advection Upstream Splitting Method schemes proved to be well suited for modelling of compressible flows due to their robustness and ability of capturing shock discontinuities. In this paper, we review the composition of the AUSM flux-vector splitting scheme and its improved version noted AUSM+, proposed by Liou, for the solution of the Euler equations. Mach number splitting functions operating with values from adjacent cells are used to determine numerical convective fluxes and pressure splitting is used for the evaluation of numerical pressure fluxes. Both versions of the AUSM scheme are applied for solving some test problems such as one-dimensional shock tube problem and three dimensional GAMM channel. Features of the schemes are discussed in comparison with some explicit central schemes of the first order accuracy (Lax-Friedrichs and of the second order accuracy (MacCormack.

  19. Mobile weatherstation

    International Nuclear Information System (INIS)

    Hahn, H.; Koutny, P.; Schwabach, H.; Eisenwagner, H.

    1981-01-01

    A mobile weatherstation is described which allows to measure the following parameters: airtemperature, relative humidity, winddirection and windspeed. The station consists of three main units: the central station METEODAT, the multiplexer and the weather measure tower with the sensors. The measured data are displayed in digital form in the central unit and can be printed on a teletype. The power supply is either 220 Volt AC or 24 Volt DC. (author)

  20. A Mathematical Scheme for Calculating Flows and Pressure Drops in Lit and Unlit Cigarettes

    Directory of Open Access Journals (Sweden)

    Dwyer RW

    2014-12-01

    Full Text Available A computational methodology is presented for evaluating the flows and pressure drops in both lit and unlit cigarettes. The flows and pressure drops across rows of tipping-paper perforations are considered explicitly, as are the locations and relative sizes of the ventilation holes. The flows and pressure drops across air-permeable cigarette papers are included. The influence of plugwrappermeabilities on filter ventilation is developed. Lit cigarettes are mimicked by adding a “coal” pressure drop to the upstream end of the cigarette. The computational scheme is used to predict the effects of tobacco-rod length, puff volume, and vent blocking on cigarette ventilation and pressure drop. A derivation of the pressure-drop and flow equations for a cigarette with an upstream pressure drop is included in an appendix.

  1. Electrical Injection Schemes for Nanolasers

    DEFF Research Database (Denmark)

    Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten

    2014-01-01

    Three electrical injection schemes based on recently demonstrated electrically pumped photonic crystal nanolasers have been numerically investigated: 1) a vertical p-i-n junction through a post structure; 2) a lateral p-i-n junction with a homostructure; and 3) a lateral p-i-n junction....... For this analysis, the properties of different schemes, i.e., electrical resistance, threshold voltage, threshold current, and internal efficiency as energy requirements for optical interconnects are compared and the physics behind the differences is discussed....

  2. Signal multiplexing scheme for LINAC

    International Nuclear Information System (INIS)

    Sujo, C.I.; Mohan, Shyam; Joshi, Gopal; Singh, S.K.; Karande, Jitendra

    2004-01-01

    For the proper operation of the LINAC some signals, RF (radio frequency) as well as LF (low frequency) have to be available at the Master Control Station (MCS). These signals are needed to control, calibrate and characterize the RF fields in the resonators. This can be achieved by proper multiplexing of various signals locally and then routing the selected signals to the MCS. A multiplexing scheme has been designed and implemented, which will allow the signals from the selected cavity to the MCS. High isolation between channels and low insertion loss for a given signal are important issues while selecting the multiplexing scheme. (author)

  3. Capacity-achieving CPM schemes

    OpenAIRE

    Perotti, Alberto; Tarable, Alberto; Benedetto, Sergio; Montorsi, Guido

    2008-01-01

    The pragmatic approach to coded continuous-phase modulation (CPM) is proposed as a capacity-achieving low-complexity alternative to the serially-concatenated CPM (SC-CPM) coding scheme. In this paper, we first perform a selection of the best spectrally-efficient CPM modulations to be embedded into SC-CPM schemes. Then, we consider the pragmatic capacity (a.k.a. BICM capacity) of CPM modulations and optimize it through a careful design of the mapping between input bits and CPM waveforms. The s...

  4. Upstream oil and gas industry options paper : report of the upstream oil and gas working group of the Industry Issues Table to the National Climate Change Secretariat

    International Nuclear Information System (INIS)

    1999-09-01

    The Canadian Association of Petroleum Producers (CAPP) has coordinated the efforts of the upstream oil and natural gas industry to draft a foundation paper to provide data on industry greenhouse gas (GHG) emissions and actions. This paper is a technical piece targeted at government officials and stakeholders involved in the National Climate Change Secretariat process. The paper also outlines the context for considering policies aimed at reducing oil and gas industry emissions on climate change. The 6 key messages that CAPP wanted to emphasize in this paper were: (1) Canada's situation is very different from that of the U.S. and most other industrial countries, (2) GHG emissions are primarily an end-use consumption issue, (3) the climate change issue and the Kyoto Protocol present a major uncertainty that could undermine Canadian oil and natural gas development opportunities, (4) Canada should not be penalised by its growth of oil and natural gas resources, (5) the ability to reduce emissions by changing production technology is limited because large reductions in Canadian upstream emissions would only mean a shift of production to other countries which would not help to reduce global emissions, and (6) Canada should focus on promoting cost-effective action, research and development and international flexibility, and ensure that recognition is given to those companies that reduce emissions. tabs., figs

  5. Structural Mobility, Exchange Mobility and Subgroup Consistent Mobility Measurement – US–German Mobility Measurements Revisited

    OpenAIRE

    C. SCHLUTER; D. VAN DE GAER

    2008-01-01

    We formalize the concept of structural mobility and use the framework of subgroup consistent mobility measurement to derive a relative and an absolute measure of mobility that is increasing both in upward structural mobility and exchange mobility. In our empirical illustration, we contribute substantively to the ongoing debate about mobility rankings between the USA and Germany.

  6. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    Directory of Open Access Journals (Sweden)

    Dongwoo Kang

    Full Text Available The Proxy Mobile IPv6 (PMIPv6 is a network-based mobility management protocol that allows a Mobile Node(MN connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG. As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  7. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    Science.gov (United States)

    Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick; Won, Dongho

    2017-01-01

    The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  8. An Ultra-Low-Latency Geo-Routing Scheme for Team-Based Unmanned Vehicular Applications

    KAUST Repository

    Bader, Ahmed

    2016-02-26

    Results and lessons learned from the implementation of a novel ultra low-latency geo-routing scheme are presented in this paper. The geo-routing scheme is intended for team-based mobile systems whereby a cluster of unmanned autonomous vehicles are deployed to accomplish a critical mission under human supervision. The contention-free nature of the developed scheme lends itself to jointly achieve lower latency and higher throughput. Implementation challenges are presented and corresponding resolutions are discussed herewith. © 2015 IEEE.

  9. On 165Ho level scheme

    International Nuclear Information System (INIS)

    Ardisson, Claire; Ardisson, Gerard.

    1976-01-01

    A 165 Ho level scheme was constructed which led to the interpretation of sixty γ rays belonging to the decay of 165 Dy. A new 702.9keV level was identified to be the 5/2 - member of the 1/2 ) 7541{ Nilsson orbit. )] [fr

  10. Homogenization scheme for acoustic metamaterials

    KAUST Repository

    Yang, Min; Ma, Guancong; Wu, Ying; Yang, Zhiyu; Sheng, Ping

    2014-01-01

    the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost

  11. Homogenization scheme for acoustic metamaterials

    KAUST Repository

    Yang, Min

    2014-02-26

    We present a homogenization scheme for acoustic metamaterials that is based on reproducing the lowest orders of scattering amplitudes from a finite volume of metamaterials. This approach is noted to differ significantly from that of coherent potential approximation, which is based on adjusting the effective-medium parameters to minimize scatterings in the long-wavelength limit. With the aid of metamaterials’ eigenstates, the effective parameters, such as mass density and elastic modulus can be obtained by matching the surface responses of a metamaterial\\'s structural unit cell with a piece of homogenized material. From the Green\\'s theorem applied to the exterior domain problem, matching the surface responses is noted to be the same as reproducing the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost exactly with numerical simulations and experiments and the scheme\\'s validity is constrained by the number of dominant surface multipoles instead of the usual long-wavelength assumption. In particular, the validity extends to the full band in one dimension and to regimes near the boundaries of the Brillouin zone in two dimensions.

  12. New practicable Siberian Snake schemes

    International Nuclear Information System (INIS)

    Steffen, K.

    1983-07-01

    Siberian Snake schemes can be inserted in ring accelerators for making the spin tune almost independent of energy. Two such schemes are here suggested which lend particularly well to practical application over a wide energy range. Being composed of horizontal and vertical bending magnets, the proposed snakes are designed to have a small maximum beam excursion in one plane. By applying in this plane a bending correction that varies with energy, they can be operated at fixed geometry in the other plane where most of the bending occurs, thus avoiding complicated magnet motion or excessively large magnet apertures that would otherwise be needed for large energy variations. The first of the proposed schemes employs a pair of standard-type Siberian Snakes, i.e. of the usual 1st and 2nd kind which rotate the spin about the longitudinal and the transverse horizontal axis, respectively. The second scheme employs a pair of novel-type snakes which rotate the spin about either one of the horizontal axes that are at 45 0 to the beam direction. In obvious reference to these axes, they are called left-pointed and right-pointed snakes. (orig.)

  13. Nonlinear Secret Image Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Sang-Ho Shin

    2014-01-01

    efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB and 1.74tlog2⁡m bit-per-pixel (bpp, respectively.

  14. Phenological response of vegetation to upstream river flow in the Heihe Rive basin by time series analysis of MODIS data

    Directory of Open Access Journals (Sweden)

    L. Jia

    2011-03-01

    Full Text Available Liquid and solid precipitation is abundant in the high elevation, upper reach of the Heihe River basin in northwestern China. The development of modern irrigation schemes in the middle reach of the basin is taking up an increasing share of fresh water resources, endangering the oasis and traditional irrigation systems in the lower reach. In this study, the response of vegetation in the Ejina Oasis in the lower reach of the Heihe River to the water yield of the upper catchment was analyzed by time series analysis of monthly observations of precipitation in the upper and lower catchment, river streamflow downstream of the modern irrigation schemes and satellite observations of vegetation index. Firstly, remotely sensed NDVI data acquired by Terra-MODIS are used to monitor the vegetation dynamic for a seven years period between 2000 and 2006. Due to cloud-contamination, atmospheric influence and different solar and viewing angles, however, the quality and consistence of time series of remotely sensed NDVI data are degraded. A Fourier Transform method – the Harmonic Analysis of Time Series (HANTS algorithm – is used to reconstruct cloud- and noise-free NDVI time series data from the Terra-MODIS NDVI dataset. Modification is made on HANTS by adding additional parameters to deal with large data gaps in yearly time series in combination with a Temporal-Similarity-Statistics (TSS method developed in this study to seek for initial values for the large gap periods. Secondly, the same Fourier Transform method is used to model time series of the vegetation phenology. The reconstructed cloud-free NDVI time series data are used to study the relationship between the water availability (i.e. the local precipitation and upstream water yield and the evolution of vegetation conditions in Ejina Oasis from 2000 to 2006. Anomalies in precipitation, streamflow, and vegetation index are detected by comparing each year with the average year. The results showed that

  15. Mobile Termination and Mobile Penetration

    OpenAIRE

    Hurkens, Sjaak; Jeon, Doh-Shin

    2009-01-01

    In this paper, we study how access pricing affects network competition when subscription demand is elastic and each network uses non-linear prices and can apply termination-based price discrimination. In the case of a fixed per minute termination charge, we find that a reduction of the termination charge below cost has two oppos- ing effects: it softens competition but helps to internalize network externalities. The former reduces mobile penetration while the latter boosts it. We find that fi...

  16. Mobile termination and mobile penetration

    OpenAIRE

    Hurkens, Sjaak

    2009-01-01

    In this paper, we study how access pricing affects network competition when subscription demand is elastic and each network uses non-linear prices and can apply termination-based price discrimination. In the case of a fixed per minute termination charge, we find that a reduction of the termination charge below cost has two opposing effects: it softens competition but helps to internalize network externalities. The former reduces mobile penetration while the latter boosts it. We find that firm...

  17. An Improved Dynamic ID-Based Remote User Authentication with Key Agreement Scheme

    Directory of Open Access Journals (Sweden)

    Juan Qu

    2013-01-01

    Full Text Available In recent years, several dynamic ID-based remote user authentication schemes have been proposed. In 2012, Wen and Li proposed a dynamic ID-based remote user authentication with key agreement scheme. They claimed that their scheme can resist impersonation attack and insider attack and provide anonymity for the users. However, we will show that Wen and Li's scheme cannot withstand insider attack and forward secrecy, does not provide anonymity for the users, and inefficiency for error password login. In this paper, we propose a novel ECC-based remote user authentication scheme which is immune to various known types of attack and is more secure and practical for mobile clients.

  18. Mobile Payments : Comparison of Mobile Wallet Concepts

    OpenAIRE

    Narayan, Srikant

    2013-01-01

    Mobile payments are an emerging trend and an alternative to traditional payment methods. Mobile payments involve the usage of the mobile phone to handle credit transfers during purchase of goods and peer to peer money transfers referred to as mobile wallet service, instead of depending on bank cards and cash. In this scenario, while the mobile wallet industry still being in its infancy there exist a few drivers of mobile wallet solutions aiming to create a de-facto standard in the mobile mark...

  19. Identification of the first PAR1 deletion encompassing upstream SHOX enhancers in a family with idiopathic short stature.

    Science.gov (United States)

    Benito-Sanz, Sara; Aza-Carmona, Miriam; Rodríguez-Estevez, Amaya; Rica-Etxebarria, Ixaso; Gracia, Ricardo; Campos-Barros, Angel; Heath, Karen E

    2012-01-01

    Short stature homeobox-containing gene, MIM 312865 (SHOX) is located within the pseudoautosomal region 1 (PAR1) of the sex chromosomes. Mutations in SHOX or its downstream transcriptional regulatory elements represent the underlying molecular defect in ~60% of Léri-Weill dyschondrosteosis (LWD) and ~5-15% of idiopathic short stature (ISS) patients. Recently, three novel enhancer elements have been identified upstream of SHOX but to date, no PAR1 deletions upstream of SHOX have been observed that only encompass these enhancers in LWD or ISS patients. We set out to search for genetic alterations of the upstream SHOX regulatory elements in 63 LWD and 100 ISS patients with no known alteration in SHOX or the downstream enhancer regions using a specifically designed MLPA assay, which covers the PAR1 upstream of SHOX. An upstream SHOX deletion was identified in an ISS proband and her affected father. The deletion was confirmed and delimited by array-CGH, to extend ~286 kb. The deletion included two of the upstream SHOX enhancers without affecting SHOX. The 13.3-year-old proband had proportionate short stature with normal GH and IGF-I levels. In conclusion, we have identified the first PAR1 deletion encompassing only the upstream SHOX transcription regulatory elements in a family with ISS. The loss of these elements may result in SHOX haploinsufficiency because of decreased SHOX transcription. Therefore, this upstream region should be included in the routine analysis of PAR1 in patients with LWD, LMD and ISS.

  20. A Cross-Layer Key Management Scheme for MIPv6 Fast Handover over IEEE 802.11 Wireless LAN

    Directory of Open Access Journals (Sweden)

    Chang-Seop Park

    2015-01-01

    Full Text Available A new key management and security scheme is proposed to integrate Layer Two (L2 and Layer Three (L3 keys for secure and fast Mobile IPv6 handover over IEEE 802.11 Wireless Local Area Network (WLAN. Unlike the original IEEE 802.11-based Mobile IPv6 Fast Handover (FMIPv6 that requires time-consuming IEEE 802.1x-based Extensible Authentication Protocol (EAP authentication on each L3 handover, the newly proposed key management and security scheme requires only one 802.1x-EAP regardless of how many L3 handovers occur. Therefore, the proposed scheme reduces the handover latency that results from a lengthy 802.1x-based EAP. The proposed key management and security scheme is extensively analyzed in terms of security and performance, and the proposed security scheme is shown to be more secure than those that were previously proposed.

  1. Mobile Marketing

    OpenAIRE

    Luengo Cascudo, Alberto

    2010-01-01

    El principal objetivo de este proyecto es explicar y entender la importancia del Mobile Marketing como nueva herramienta de negocio en el Marketing empresarial. Para ello, el primer objetivo es entender los dos factores que para mí son la clave de su importancia: la evolución del entorno tecnológico y el cambio en los hábitos del consumidor. Debido a la novedad de esta nueva forma de Marketing y al hecho de que está en constante definición, es básico exponer de la forma más cla...

  2. Wind Predictions Upstream Wind Turbines from a LiDAR Database

    Directory of Open Access Journals (Sweden)

    Soledad Le Clainche

    2018-03-01

    Full Text Available This article presents a new method to predict the wind velocity upstream a horizontal axis wind turbine from a set of light detection and ranging (LiDAR measurements. The method uses higher order dynamic mode decomposition (HODMD to construct a reduced order model (ROM that can be extrapolated in space. LiDAR measurements have been carried out upstream a wind turbine at six different planes perpendicular to the wind turbine axis. This new HODMD-based ROM predicts with high accuracy the wind velocity during a timespan of 24 h in a plane of measurements that is more than 225 m far away from the wind turbine. Moreover, the technique introduced is general and obtained with an almost negligible computational cost. This fact makes it possible to extend its application to both vertical axis wind turbines and real-time operation.

  3. Independents in European Gas Markets after liberalisation - downstream integration of upstream oil and gas companies

    International Nuclear Information System (INIS)

    Eikeland, Per Ove

    2005-01-01

    A central objective of gas market liberalisation in Europe in the 1990s was to increase competition by opening end-use markets for independent suppliers. Upstream oil and gas companies in Europe reacted to this opportunity by announcing strategies to integrate forward in European gas markets. By late 2004, however, upstream companies still recorded generally weak downstream strategy implementation in Europe. The article concludes that this general implementation gap should be explained by political failure in EU member states to abolish gas market barriers to entry for independents. Variation between companies in degree of implementation should be explained by variation in conditions in the companies' home markets / wider business spheres and internal company factors. (Author)

  4. Technological acceleration and organizational transformations in the upstream oil and gas industry

    International Nuclear Information System (INIS)

    Isabelle, M.

    2000-12-01

    The upstream oil and gas industry experienced a dramatic technological acceleration in the early 1970's. The relationships between the agents in this industry have themselves undergone deep changes since that date. This thesis shows that a tight link exists between the technological acceleration and the organizational transformations in the upstream oil and gas industry. In a first part, it focuses on the economic theory's developments concerning industrial organization. In a second part, it applies these developments to three types of relations: those between the owner-states of hydrocarbon resources and the international petroleum companies; those between the international petroleum companies and their subcontractors; and finally those between the international petroleum companies themselves. (author)

  5. Essential roles of caspases and their upstream regulators in rotenone-induced apoptosis

    International Nuclear Information System (INIS)

    Lee Jihjong; Huang, M.-S.; Yang, I-C.; Lai, T.-C.; Wang, J.-L.; Pang, V.F.; Hsiao, M.; Kuo, M.Y.P.

    2008-01-01

    In the present study, we examined whether caspases and their upstream regulators are involved in rotenone-induced cytotoxicity. Rotenone significantly inhibited the proliferation of oral cancer cell lines in a dose-dependent manner compared to normal oral mucosal fibroblasts. Flow cytometric analysis of DNA content showed that rotenone treatment induced apoptosis following G2/M arrest. Western blotting showed activation of both the caspase-8 and caspase-9 pathways, which differed from previous studies conducted in other cell types. Furthermore, p53 protein and its downstream pro-apoptotic target, Bax, were induced in SAS cells after treatment with rotenone. Rotenone-induced apoptosis was inhibited by antioxidants (glutathione, N-acetylcysteine, and tiron). In conclusion, our results demonstrate significant involvement of caspases and their upstream regulators in rotenone-induced cytotoxicity

  6. An upstream activation element exerting differential transcriptional activation on an archaeal promoter

    DEFF Research Database (Denmark)

    Peng, Nan; Xia, Qiu; Chen, Zhengjun

    2009-01-01

    S gene encoding an arabinose binding protein was characterized using an Sulfolobus islandicus reporter gene system. The minimal active araS promoter (P(araS)) was found to be 59 nucleotides long and harboured four promoter elements: an ara-box, an upstream transcription factor B-responsive element (BRE......), a TATA-box and a proximal promoter element, each of which contained important nucleotides that either greatly decreased or completely abolished promoter activity upon mutagenesis. The basal araS promoter was virtually inactive due to intrinsically weak BRE element, and the upstream activating sequence...... (UAS) ara-box activated the basal promoter by recruiting transcription factor B to its BRE. While this UAS ensured a general expression from an inactive or weak basal promoter in the presence of other tested carbon resources, it exhibited a strong arabinose-responsive transcriptional activation. To our...

  7. Measurements of energy spectra of fast electrons from PF-1000 in the upstream and downstream directions

    Energy Technology Data Exchange (ETDEWEB)

    Kwiatkowski, R.; Czaus, K.; Skladnik-Sadowska, E.; Malinowski, K.; Zebrowski, J. [The Andrzej Soltan Institute for Nuclear Studies (IPJ), 05-400 Otwock-Swierk (Poland); Sadowski, M.J. [The Andrzej Soltan Institute for Nuclear Studies (IPJ), 05-400 Otwock-Swierk (Poland); Karpinski, L.; Paduch, M.; Scholz, M. [Institute of Plasma Physics and Laser Microfusion (IPPLM), 01-497 Warsaw (Poland); Kubes, P. [Czech Technical University (CVUT), 166-27 Prague, (Czech Republic)

    2011-07-01

    The paper describes measurements of energy spectra of electrons emitted in the upstream direction along the symmetry-axis of the PF-1000 facility, operated with the deuterium filling at 21 kV, 290 kJ. The measurements were performed with a magnetic analyzer. The same analyzer was used to measure also electron beams emitted in along the symmetry-axis in the downstream direction. The recorded spectra showed that the electron-beams emitted in the upstream direction have energies in the range from about 40 keV to about 800 keV, while those in the downstream direction have energies in the range from about 60 keV to about 200 keV. These spectra confirm that in the PF (Plasma Focus) plasma column there appear strong local fields accelerating charged particles in different directions. This document is composed of a paper and a poster. (authors)

  8. Joint Transmit Antenna Selection and Power Allocation for ISDF Relaying Mobile-to-Mobile Sensor Networks.

    Science.gov (United States)

    Xu, Lingwei; Zhang, Hao; Gulliver, T Aaron

    2016-02-19

    The outage probability (OP) performance of multiple-relay incremental-selective decode-and-forward (ISDF) relaying mobile-to-mobile (M2M) sensor networks with transmit antenna selection (TAS) over N-Nakagami fading channels is investigated. Exact closed-form OP expressions for both optimal and suboptimal TAS schemes are derived. The power allocation problem is formulated to determine the optimal division of transmit power between the broadcast and relay phases. The OP performance under different conditions is evaluated via numerical simulation to verify the analysis. These results show that the optimal TAS scheme has better OP performance than the suboptimal scheme. Further, the power allocation parameter has a significant influence on the OP performance.

  9. Hierarchical micro-mobility management in high-speed multihop access networks

    Institute of Scientific and Technical Information of China (English)

    TANG Bi-hua; MA Xiao-lei; LIU Yuan-an; GAO Jin-chun

    2006-01-01

    This article integrates the hierarchical micro-mobility management and the high-speed multihop access networks (HMAN), to accomplish the smooth handover between different access routers. The proposed soft handover scheme in the high-speed HMAN can solve the micro-mobility management problem in the access network. This article also proposes the hybrid access router (AR) advertisement scheme and AR selection algorithm, which uses the time delay and stable route to the AR as the gateway selection parameters. By simulation, the proposed micro-mobility management scheme can achieve high packet delivery fraction and improve the lifetime of network.

  10. Ultra-high capacity WDM-SDM optical access network with self-homodyne detection downstream and 32QAM-FBMC upstream.

    Science.gov (United States)

    Feng, Zhenhua; Xu, Liang; Wu, Qiong; Tang, Ming; Fu, Songnian; Tong, Weijun; Shum, Perry Ping; Liu, Deming

    2017-03-20

    Towards 100G beyond large-capacity optical access networks, wavelength division multiplexing (WDM) techniques incorporating with space division multiplexing (SDM) and affordable spectrally efficient advanced modulation formats are indispensable. In this paper, we proposed and experimentally demonstrated a cost-efficient multicore fiber (MCF) based hybrid WDM-SDM optical access network with self-homodyne coherent detection (SHCD) based downstream (DS) and direct detection optical filter bank multi carrier (DDO-FBMC) based upstream (US). In the DS experiments, the inner core of the 7-core fiber is used as a dedicated channel to deliver the local oscillator (LO) lights while the other 6 outer cores are used to transmit 4 channels of wavelength multiplexed 200-Gb/s PDM-16QAM-OFDM signals. For US transmission, 4 wavelengths with channel spacing of 100 GHz are intensity modulated with 30 Gb/s 32-QAM-FBMC and directly detected by a ~7 GHz bandwidth receiver after transmission along one of the outer core. The results show that a 4 × 6 × 200-Gb/s DS transmission can be realized over 37 km 7-core fiber without carrier frequency offset (CFO) and phase noise (PN) compensation even using 10 MHz linewidth DFB lasers. The SHCD based on MCF provides a compromise and cost efficient scheme between conventional intradyne coherent detection and intensity modulation and direct detection (IM/DD) schemes. Both US and DS have acceptable BER performance and high spectral efficiency.

  11. Design of Optimized Multimedia Data Streaming Management Using OMDSM over Mobile Networks

    Directory of Open Access Journals (Sweden)

    Byungjoo Park

    2017-01-01

    Full Text Available Mobility management is an essential challenge for supporting reliable multimedia data streaming over wireless and mobile networks in the Internet of Things (IoT for location-based mobile marketing applications. The communications among mobile nodes for IoT need to have a seamless handover for delivering high quality multimedia services. The Internet Engineering Task Force (IETF mobility management schemes are the proposals for handling the routing of IPv6 packets to mobile nodes that have moved away from their home network. However, the standard mobility management scheme cannot prevent packet losses due to longer handover latency. In this article, a new enhanced data streaming route optimization scheme is introduced that uses an optimized Transmission Control Protocol (TCP realignment algorithm in order to prevent the packet disordering problem whenever the nodes in the IoT environment are communicating with each other. With the proposed scheme, data packets sequence realignment can be prevented, the packet traffic speed can be controlled, and the TCP performance can be improved. The experimental results show that managing the packet order in proposed new scheme remarkably increases the overall TCP performance over mobile networks within the IoT environment thus ensuring the high quality of service (QoS for multimedia data streaming in location-based mobile marketing applications.

  12. Wapice News Mobile Application

    OpenAIRE

    Söylemez, Ilke

    2017-01-01

    Since the mobile phones started to have an increasingly significant role in daily life, the mobile application development also started to be an important area in the software industry. The problem for mobile application developers is to develop a mobile application which supports all the devices and platforms on the market. This issue created a need for cross platform mobile applications. The cross platform mobile development refers to the development of mobile applications that could be use...

  13. Prediction-based association control scheme in dense femtocell networks

    Science.gov (United States)

    Pham, Ngoc-Thai; Huynh, Thong; Hwang, Won-Joo; You, Ilsun; Choo, Kim-Kwang Raymond

    2017-01-01

    The deployment of large number of femtocell base stations allows us to extend the coverage and efficiently utilize resources in a low cost manner. However, the small cell size of femtocell networks can result in frequent handovers to the mobile user, and consequently throughput degradation. Thus, in this paper, we propose predictive association control schemes to improve the system’s effective throughput. Our design focuses on reducing handover frequency without impacting on throughput. The proposed schemes determine handover decisions that contribute most to the network throughput and are proper for distributed implementations. The simulation results show significant gains compared with existing methods in terms of handover frequency and network throughput perspective. PMID:28328992

  14. The giant mottled eel, Anguilla marmorata, uses blue-shifted rod photoreceptors during upstream migration.

    Science.gov (United States)

    Wang, Feng-Yu; Fu, Wen-Chun; Wang, I-Li; Yan, Hong Young; Wang, Tzi-Yuan

    2014-01-01

    Catadromous fishes migrate between ocean and freshwater during particular phases of their life cycle. The dramatic environmental changes shape their physiological features, e.g. visual sensitivity, olfactory ability, and salinity tolerance. Anguilla marmorata, a catadromous eel, migrates upstream on dark nights, following the lunar cycle. Such behavior may be correlated with ontogenetic changes in sensory systems. Therefore, this study was designed to identify changes in spectral sensitivity and opsin gene expression of A. marmorata during upstream migration. Microspectrophotometry analysis revealed that the tropical eel possesses a duplex retina with rod and cone photoreceptors. The λmax of rod cells are 493, 489, and 489 nm in glass, yellow, and wild eels, while those of cone cells are 508, and 517 nm in yellow, and wild eels, respectively. Unlike European and American eels, Asian eels exhibited a blue-shifted pattern of rod photoreceptors during upstream migration. Quantitative gene expression analyses of four cloned opsin genes (Rh1f, Rh1d, Rh2, and SWS2) revealed that Rh1f expression is dominant at all three stages, while Rh1d is expressed only in older yellow eel. Furthermore, sequence comparison and protein modeling studies implied that a blue shift in Rh1d opsin may be induced by two known (N83, S292) and four putative (S124, V189, V286, I290) tuning sites adjacent to the retinal binding sites. Finally, expression of blue-shifted Rh1d opsin resulted in a spectral shift in rod photoreceptors. Our observations indicate that the giant mottled eel is color-blind, and its blue-shifted scotopic vision may influence its upstream migration behavior and habitat choice.

  15. The Giant Mottled Eel, Anguilla marmorata, Uses Blue-Shifted Rod Photoreceptors during Upstream Migration

    OpenAIRE

    Wang, Feng-Yu; Fu, Wen-Chun; Wang, I-Li; Yan, Hong Young; Wang, Tzi-Yuan

    2014-01-01

    Catadromous fishes migrate between ocean and freshwater during particular phases of their life cycle. The dramatic environmental changes shape their physiological features, e.g. visual sensitivity, olfactory ability, and salinity tolerance. Anguilla marmorata, a catadromous eel, migrates upstream on dark nights, following the lunar cycle. Such behavior may be correlated with ontogenetic changes in sensory systems. Therefore, this study was designed to identify changes in spectral sensitivity ...

  16. The giant mottled eel, Anguilla marmorata, uses blue-shifted rod photoreceptors during upstream migration.

    Directory of Open Access Journals (Sweden)

    Feng-Yu Wang

    Full Text Available Catadromous fishes migrate between ocean and freshwater during particular phases of their life cycle. The dramatic environmental changes shape their physiological features, e.g. visual sensitivity, olfactory ability, and salinity tolerance. Anguilla marmorata, a catadromous eel, migrates upstream on dark nights, following the lunar cycle. Such behavior may be correlated with ontogenetic changes in sensory systems. Therefore, this study was designed to identify changes in spectral sensitivity and opsin gene expression of A. marmorata during upstream migration. Microspectrophotometry analysis revealed that the tropical eel possesses a duplex retina with rod and cone photoreceptors. The λmax of rod cells are 493, 489, and 489 nm in glass, yellow, and wild eels, while those of cone cells are 508, and 517 nm in yellow, and wild eels, respectively. Unlike European and American eels, Asian eels exhibited a blue-shifted pattern of rod photoreceptors during upstream migration. Quantitative gene expression analyses of four cloned opsin genes (Rh1f, Rh1d, Rh2, and SWS2 revealed that Rh1f expression is dominant at all three stages, while Rh1d is expressed only in older yellow eel. Furthermore, sequence comparison and protein modeling studies implied that a blue shift in Rh1d opsin may be induced by two known (N83, S292 and four putative (S124, V189, V286, I290 tuning sites adjacent to the retinal binding sites. Finally, expression of blue-shifted Rh1d opsin resulted in a spectral shift in rod photoreceptors. Our observations indicate that the giant mottled eel is color-blind, and its blue-shifted scotopic vision may influence its upstream migration behavior and habitat choice.

  17. MESSENGER Magnetic Field Observations of Upstream Ultra-Low Frequency Waves at Mercury

    Science.gov (United States)

    Le, G.; Chi, P. J.; Boardsen, S.; Blanco-Cano, X.; Anderosn, B. J.; Korth, H.

    2012-01-01

    The region upstream from a planetary bow shock is a natural plasma laboratory containing a variety of wave particle phenomena. The study of foreshocks other than the Earth's is important for extending our understanding of collisionless shocks and foreshock physics since the bow shock strength varies with heliocentric distance from the Sun, and the sizes of the bow shocks are different at different planets. The Mercury's bow shock is unique in our solar system as it is produced by low Mach number solar wind blowing over a small magnetized body with a predominately radial interplanetary magnetic field. Previous observations of Mercury upstream ultra-low frequency (ULF) waves came exclusively from two Mercury flybys of Mariner 10. The MESSENGER orbiter data enable us to study of upstream waves in the Mercury's foreshock in depth. This paper reports an overview of upstream ULF waves in the Mercury's foreshock using high-time resolution magnetic field data, 20 samples per second, from the MESSENGER spacecraft. The most common foreshock waves have frequencies near 2 Hz, with properties similar to the I-Hz waves in the Earth's foreshock. They are present in both the flyby data and in every orbit of the orbital data we have surveyed. The most common wave phenomenon in the Earth's foreshock is the large-amplitude 30-s waves, but similar waves at Mercury have frequencies at near 0.1 Hz and occur only sporadically with short durations (a few wave cycles). Superposed on the "30-s" waves, there are spectral peaks at near 0.6 Hz, not reported previously in Mariner 10 data. We will discuss wave properties and their occurrence characteristics in this paper.

  18. Frequency effects of upstream wake and blade interaction on the unsteady boundary layer flow

    International Nuclear Information System (INIS)

    Kang, Dong Jin; Bae, Sang Su

    2002-01-01

    Effects of the reduced frequency of upstream wake on downstream unsteady boundary layer flow were simulated by using a Navier-Stokes code. The Navier-Stokes code is based on an unstructured finite volume method and uses a low Reynolds number turbulence model to close the momentum equations. The geometry used in this paper is the MIT flapping foil experimental set-up and the reduced frequency of the upstream wake is varied in the range of 0.91 to 10.86 to study its effect on the unsteady boundary layer flow. Numerical solutions show that they can be divided into two categories. One is so called the low frequency solution, and behaves quite similar to a Stokes layer. Its characteristics is found to be quite similar to those due to either a temporal or spatial wave. The low frequency solutions are observed clearly when reduced frequency is smaller than 3.26. The other one is the high frequency solution. It is observed for the reduced frequency larger than 7.24. It shows a sudden shift of the phase angle of the unsteady velocity around the edge of the boundary layer. The shift of phase angle is about 180 degree, and leads to separation of the boundary layer flow from corresponding outer flow. The high frequency solution shows the characteristics of a temporal wave whose wave length is half of the upstream frequency. This characteristics of the high frequency solution is found to be caused by the strong interaction between unsteady vortices. This strong interaction also leads to destroy of the upstream wake stripe inside the viscous sublayer as well as the buffer layer

  19. Hydrodynamic response of fuel rod with longitudinal fins to upstream generated vortices

    International Nuclear Information System (INIS)

    Naot, D.; Oron, A.; Technion-Israel Inst. of Tech., Haifa. Dept. of Mechanical Engineering)

    1984-01-01

    The hydrodynamic response of turbulent channel flow to upstream generated vortices was numerically simulated for fuel element with longitudinal cooling fins. Turbulence is modelled by an algebraic stress model and an energy-dissipation model. The developing flow is solved using a parabolic pressure correction algorithm. The decay of the initial vortices in non-circular sub-channel in the presence of geometry driven secondary currents is described and the uncertainty in the local turbulent shear stresses is discussed. (orig.)

  20. When is vertical integration profitable? Focus on a large upstream company in the gas market

    International Nuclear Information System (INIS)

    Hatlebakk, Magnus

    2001-12-01

    This note discusses basic economic mechanisms that may affect the profitability of vertical integration in the European gas industry. It concentrates on reasonable strategies for a large upstream company which considers a stronger engagement downstream. The note warns against the effect of simplified conclusions with regard to the impact of vertical integration. It applies a simple model of successive oligopolies to discuss double mark-ups, exclusions, barriers to entry, etc

  1. Key concerns of U.K. oil and gas company directors for upstream oil developments

    International Nuclear Information System (INIS)

    Anon.

    1996-01-01

    Energy 2006 is a survey published by Ernst and Young presenting the main concerns over the past decade of the UK company directors. The upstream conclusions are presented here. In the medium term (3 years) and long term (10 years), the main concerns were with replacing reserves and with oil price changes. Company re-organisation etc., de-regulation of the gas market, maximising production, return of Iraq to the oil market, and environmental issues were also of concern. (author)

  2. A numerical study on the flow upstream of a wind turbine on complex terran

    DEFF Research Database (Denmark)

    Meyer Forsting, Alexander Raul; Bechmann, Andreas; Troldborg, Niels

    2016-01-01

    The interaction of a wind turbine with the upstream flow-field in complex and flat terrain is studied using Reynolds-averaged Navier-Stokes (RANS) simulations with a two equation turbulence closure. The complex site modelled is Perdigao (Portugal), where a turbine is located on one of two parallel...... the wind turbine wake trajectory which in turn governs the orientation of the induction zone...

  3. Genes involved in complex adaptive processes tend to have highly conserved upstream regions in mammalian genomes

    Directory of Open Access Journals (Sweden)

    Kohane Isaac

    2005-11-01

    Full Text Available Abstract Background Recent advances in genome sequencing suggest a remarkable conservation in gene content of mammalian organisms. The similarity in gene repertoire present in different organisms has increased interest in studying regulatory mechanisms of gene expression aimed at elucidating the differences in phenotypes. In particular, a proximal promoter region contains a large number of regulatory elements that control the expression of its downstream gene. Although many studies have focused on identification of these elements, a broader picture on the complexity of transcriptional regulation of different biological processes has not been addressed in mammals. The regulatory complexity may strongly correlate with gene function, as different evolutionary forces must act on the regulatory systems under different biological conditions. We investigate this hypothesis by comparing the conservation of promoters upstream of genes classified in different functional categories. Results By conducting a rank correlation analysis between functional annotation and upstream sequence alignment scores obtained by human-mouse and human-dog comparison, we found a significantly greater conservation of the upstream sequence of genes involved in development, cell communication, neural functions and signaling processes than those involved in more basic processes shared with unicellular organisms such as metabolism and ribosomal function. This observation persists after controlling for G+C content. Considering conservation as a functional signature, we hypothesize a higher density of cis-regulatory elements upstream of genes participating in complex and adaptive processes. Conclusion We identified a class of functions that are associated with either high or low promoter conservation in mammals. We detected a significant tendency that points to complex and adaptive processes were associated with higher promoter conservation, despite the fact that they have emerged

  4. Upstream migration of Pacific lampreys in the John Day River, Oregon: Behavior, timing, and habitat use

    Science.gov (United States)

    Robinson, T. Craig; Bayer, J.M.

    2005-01-01

    Adult Pacific lamprey migration and habitat preferences for over-winter holding and spawning, and larval rearing in tributaries to the Columbia River are not well understood. The John Day River is one such tributary where larval and adult stages of this species have been documented, and its free-flowing character provided the opportunity to study migration of Pacific lampreys unimpeded by passage constraints. Forty-two adult Pacific lampreys were captured in the John Day River near its mouth during their upstream migration. Pacific lampreys were surgically implanted with radio transmitters and released onsite, and tracked by fixed-site, aerial, and terrestrial telemetry methods for nearly one year. Adults moved upstream exclusively at night, with a mean rate of 11.1 ?? 6.3 km/day. They halted upstream migration by September, and held a single position for approximately six months in the lateral margins of riffles and glides, using boulders for cover. More than half of Pacific lampreys resumed migration in March before ending movement in early May. Pacific lampreys that resumed migration in spring completed a median of 87% of their upstream migration before over-winter holding. Upon completing migration. Pacific lampreys briefly held position before beginning downstream movement at the end of May. Though not directly observed, halting migration and movement downstream were likely the result of spawning and death. Gains in adult Pacific lamprey passage through the Columbia River hydrosystem and tributaries may be made by improvements that would expedite migration during spring and summer and increase the quantity and variety of cover and refuge opportunities. ?? 2005 by the Northwest Scientific Association. All rights reserved.

  5. The role of the ionosphere in coupling upstream ULF wave power into the dayside magnetosphere

    International Nuclear Information System (INIS)

    Engebretson, M.J.; Cahill, L.J. Jr.; Arnoldy, R.L.; Anderson, B.J.; Rosenberg, T.J.; Carpenter, D.L.; Inan, U.S.; Eather, R.H.

    1991-01-01

    A series of recent studies of Pc 3 magnetic pulsations in the dayside outer magnetosphere has given new insights into the possible mechanisms of entry of ULF wave power into the magnetosphere from a bow shock related upstream source. In this paper, the authors first review many of these new observational results by presenting a comparison of data from two 10-hour intervals on successive days in April 1986 and then present a possible model for transmission of pulsation signals from the magnetosheath into the dayside magnetosphere. Simultaneous multi-instrument observations at South Pole Station, located below the cusp/cleft ionosphere near local noon, magnetic field observations by the AMPTE CCE satellite in the dayside outer magnetosphere, and upstream magnetic field observations by the IMP 8 satellite show clear interplanetary magnetic field field magnitude control of dayside resonant harmonic pulsations and band-limited very high latitude pulsations, as well as pulsation-modulated precipitation of what appear to be magnetosheath/boundary layer electrons. They believe that this modulated precipitation may be responsible for the propagation of upstream wave power in the Pc 3 frequency band into the high-latitude ionosphere, from whence it may be transported throughout the dayside outer magnetosphere by means of an ionospheric transistor. In this model, modulations in ionospheric conductivity caused by cusp/cleft precipitation cause varying ionospheric currents with frequency spectra determined by the upstream waves; these modulations will be superimposed on the Birkeland currents, which close via these ionospheric currents. Modulated region 2 Birkeland currents will in turn provide a narrow-band source of wave energy to a wide range of dayside local times in the outer magnetosphere

  6. Interaction control of a redundant mobile manipulator

    International Nuclear Information System (INIS)

    Chung, J.H.; Velinsky, S.A.; Hess, R.A.

    1998-01-01

    This paper discusses the modeling and control of a spatial mobile manipulator that consists of a robotic manipulator mounted on a wheeled mobile platform. The Lagrange-d'Alembert formulation is used to obtain a concise description of the dynamics of the system, which is subject to nonholonomic constraints. The complexity of the model is increased by introducing kinematic redundancy, which is created when a multilinked manipulator is used. The kinematic redundancy is resolved by decomposing the mobile manipulator into two subsystems: the mobile platform and the manipulator. The redundancy resolution scheme employs a nonlinear interaction-control algorithm, which is developed and applied to coordinate the two subsystems' controllers. The subsystem controllers are independently designed, based on each subsystem's dynamic characteristics. Simulation results show the promise of the developed algorithm

  7. Role of nitric oxide in vasodilation in upstream muscle during intermittent pneumatic compression.

    Science.gov (United States)

    Chen, Long-En; Liu, Kang; Qi, Wen-Ning; Joneschild, Elizabeth; Tan, Xiangling; Seaber, Anthony V; Stamler, Jonathan S; Urbaniak, James R

    2002-02-01

    This study investigated the dosage effects of nitric oxide synthase (NOS) inhibitor N(G)-monomethyl-L-arginine (L-NMMA) on intermittent pneumatic compression (IPC)-induced vasodilation in uncompressed upstream muscle and the effects of IPC on endothelial NOS (eNOS) expression in upstream muscle. After L-NMMA infusion, mean arterial pressure increased by 5% from baseline (99.5 +/- 18.7 mmHg; P < 0.05). Heart rate and respiratory rate were not significantly affected. One-hour IPC application on legs induced a 10% dilation from baseline in 10- to 20-microm arterioles and a 10-20% dilation in 21- to 40 microm arterioles and 41- to 70-microm arteries in uncompressed cremaster muscle. IPC-induced vasodilation was dose dependently reduced, abolished, or even reversed by concurrently infused L-NMMA. Moreover, expression of eNOS mRNA in uncompressed cremaster muscle was upregulated to 2 and 2.5 times normal at the end of 1- and 5-h IPC on legs, respectively, and the expression of eNOS protein was upregulated to 1.8 times normal. These increases returned to baseline level after cessation of IPC. The results suggest that eNOS plays an important role in regulating the microcirculation in upstream muscle during IPC.

  8. Influence of upstream stator on rotor flutter stability in a low pressure steam turbine stage

    Energy Technology Data Exchange (ETDEWEB)

    Huang, X.; He, L. [University of Durham (United Kingdom). School of Engineering; Bell, D. [ALSTOM Power Ltd., Rugby (United Kingdom)

    2006-07-01

    Conventional blade flutter prediction is normally based on an isolated blade row model, however, little is known about the influence of adjacent blade rows. In this article, an investigation is presented into the influence of the upstream stator row on the aero-elastic stability of rotor blades in the last stage of a low pressure (LP) steam turbine. The influence of the upstream blade row is computed directly by a time-marching, unsteady, Navier-Stokes flow solver in a stator-rotor coupled computational domain. The three-dimensional flutter solution is obtained, with adequate mesh resolution, in a single passage domain through application of the Fourier-Transform based Shape-Correction method. The capability of this single-passage method is examined through comparison with predictions obtained from a complete annulus model, and the results demonstrate a good level of accuracy, while achieving a speed up factor of 25. The present work shows that the upstream stator blade row can significantly change the aero-elastic behaviour of an LP steam turbine rotor. Caution is, therefore, advised when using an isolated blade row model for blade flutter prediction. The results presented also indicated that the intra-row interaction is of a strong three-dimensional nature. (author)

  9. Multiple spacecraft observations of interplanetary shocks: characteristics of the upstream ulf turbulence

    International Nuclear Information System (INIS)

    Russell, C.T.; Smith, E.J.; Tsurutani, B.T.; Gosling, J.T.; Bame, S.J.

    1982-01-01

    All interplanetary shocks observed by ISEE-3 and either ISEE-1 or ISEE-2 or both in 1978 and 1979 are examined for evidence of upstream waves. In order to characterize the properties of these shocks it is necessary to determine accurate shock normals. We invert an overdetermined set of equations to obtain shock normals, velocities and error estimates for all these shocks. Tests of the method indicate it is quite reliable. Using these normals we then calculate the Mach number and angle between the interplanetary magnetic field and the shock normal for each shock. These parameters allow us to separate the upstream waves into two classes: whistler-mode precursors which occur at low Mach numbers and upstream turbulence whose amplitude at Mach numbers greater than 1.5 is controlled by the angle of the field to the shock normal. The former waves are right-hand circularly polarized and quite monochromatic. The latter waves are more linearly polarized and have a broadband featureless spectrum

  10. Experimental Branch Retinal Vein Occlusion Induces Upstream Pericyte Loss and Vascular Destabilization.

    Directory of Open Access Journals (Sweden)

    Elisa Dominguez

    Full Text Available Branch retinal vein occlusion (BRVO leads to extensive vascular remodeling and is important cause of visual impairment. Although the vascular morphological changes following experimental vein occlusion have been described in a variety of models using angiography, the underlying cellular events are ill defined.We here show that laser-induced experimental BRVO in mice leads to a wave of TUNEL-positive endothelial cell (EC apoptosis in the upstream vascular network associated with a transient edema and hemorrhages. Subsequently, we observe an induction of EC proliferation within the dilated vein and capillaries, detected by EdU incorporation, and the edema resolves. However, the pericytes of the upstream capillaries are severely reduced, which was associated with continuing EC apoptosis and proliferation. The vascular remodeling was associated with increased expression of TGFβ, TSP-1, but also FGF2 expression. Exposure of the experimental animals to hypoxia, when pericyte (PC dropout had occurred, led to a dramatic increase in endothelial cell proliferation, confirming the vascular instability induced by the experimental BRVO.Experimental BRVO leads to acute endothelial cells apoptosis and increased permeability. Subsequently the upstream vascular network remains destabilized, characterized by pericyte dropout, un-physiologically high endothelial cells turnover and sensitivity to hypoxia. These early changes might pave the way for capillary loss and subsequent chronic ischemia and edema that characterize the late stage disease.

  11. The economic benefits of vegetation in the upstream area of Ciliwung watershed

    Science.gov (United States)

    Saridewi, T. R.; Nazaruddin

    2018-04-01

    Ciliwung watershed has strategic values since its entire downstream area is located in the Special Administrative Region of Jakarta (DKI Jakarta), the capital of Indonesia. This causes forest and farmland areas are converted into open areas or built-up areas. The existence of these areas provides enormous environmental and economic benefits. Economic benefit values are very important to be considered in developing a policy development plan, but they have not been calculated yet. This study aims to determine the economic benefits provided by trees and other vegetation anddevelops a development policy that takes into account simultaneously ecological and economic aspects. The study is conducted in the upstream Ciliwung watershed, by using land cover patterns in 1989, 2000, 2010 and 2014, and employs GIS and CITY green analysis. The results show that conversion of forest and farmland areas reduces the ability of Ciliwung upstream watershed to store water. Therefore, its ability to reduce the flow of surface has been decreased. This creates a decrease in the cost savings of annual stormwater, from US 15,175,721 in 1989 to US 13,317,469 in 2014. The Environmental Services Payment Policy (PES) for upstream community groups managing the watershed has been considered as a fairly effective policy.

  12. Urban search mobile platform modeling in hindered access conditions

    Science.gov (United States)

    Barankova, I. I.; Mikhailova, U. V.; Kalugina, O. B.; Barankov, V. V.

    2018-05-01

    The article explores the control system simulation and the design of the experimental model of the rescue robot mobile platform. The functional interface, a structural functional diagram of the mobile platform control unit, and a functional control scheme for the mobile platform of secure robot were modeled. The task of design a mobile platform for urban searching in hindered access conditions is realized through the use of a mechanical basis with a chassis and crawler drive, a warning device, human heat sensors and a microcontroller based on Arduino platforms.

  13. Support Schemes and Ownership Structures

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Costa, Ana

    , Denmark, France and Portugal. Another crucial aspect for the diffusion of the mCHP technology is possible ownership structures. These may range from full consumer ownership to ownership by utilities and energy service companies, which is discussed in Section 6. Finally, a conclusion (Section 7) wraps up......In recent years, fuel cell based micro‐combined heat and power has received increasing attention due to its potential contribution to energy savings, efficiency gains, customer proximity and flexibility in operation and capacity size. The FC4Home project assesses technical and economic aspects...... of support scheme simultaneously affects risk and technological development, which is the focus of Section 4. Subsequent to this conceptual overview, Section 5 takes a glance at the national application of support schemes for mCHP in practice, notably in the three country cases of the FC4Home project...

  14. [PICS: pharmaceutical inspection cooperation scheme].

    Science.gov (United States)

    Morénas, J

    2009-01-01

    The pharmaceutical inspection cooperation scheme (PICS) is a structure containing 34 participating authorities located worldwide (October 2008). It has been created in 1995 on the basis of the pharmaceutical inspection convention (PIC) settled by the European free trade association (EFTA) in1970. This scheme has different goals as to be an international recognised body in the field of good manufacturing practices (GMP), for training inspectors (by the way of an annual seminar and experts circles related notably to active pharmaceutical ingredients [API], quality risk management, computerized systems, useful for the writing of inspection's aide-memoires). PICS is also leading to high standards for GMP inspectorates (through regular crossed audits) and being a room for exchanges on technical matters between inspectors but also between inspectors and pharmaceutical industry.

  15. Project financing renewable energy schemes

    International Nuclear Information System (INIS)

    Brandler, A.

    1993-01-01

    The viability of many Renewable Energy projects is critically dependent upon the ability of these projects to secure the necessary financing on acceptable terms. The principal objective of the study was to provide an overview to project developers of project financing techniques and the conditions under which project finance for Renewable Energy schemes could be raised, focussing on the potential sources of finance, the typical project financing structures that could be utilised for Renewable Energy schemes and the risk/return and security requirements of lenders, investors and other potential sources of financing. A second objective is to describe the appropriate strategy and tactics for developers to adopt in approaching the financing markets for such projects. (author)

  16. Network Regulation and Support Schemes

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Jacobsen, Henrik

    2009-01-01

    -in tariffs to market-based quota systems, and network regulation approaches, comprising rate-of-return and incentive regulation. National regulation and the vertical structure of the electricity sector shape the incentives of market agents, notably of distributed generators and network operators......At present, there exists no explicit European policy framework on distributed generation. Various Directives encompass distributed generation; inherently, their implementation is to the discretion of the Member States. The latter have adopted different kinds of support schemes, ranging from feed....... This article seeks to investigate the interactions between the policy dimensions of support schemes and network regulation and how they affect the deployment of distributed generation. Firstly, a conceptual analysis examines how the incentives of the different market agents are affected. In particular...

  17. Distance labeling schemes for trees

    DEFF Research Database (Denmark)

    Alstrup, Stephen; Gørtz, Inge Li; Bistrup Halvorsen, Esben

    2016-01-01

    We consider distance labeling schemes for trees: given a tree with n nodes, label the nodes with binary strings such that, given the labels of any two nodes, one can determine, by looking only at the labels, the distance in the tree between the two nodes. A lower bound by Gavoille et al. [Gavoille...... variants such as, for example, small distances in trees [Alstrup et al., SODA, 2003]. We improve the known upper and lower bounds of exact distance labeling by showing that 1/4 log2(n) bits are needed and that 1/2 log2(n) bits are sufficient. We also give (1 + ε)-stretch labeling schemes using Theta...

  18. Small-scale classification schemes

    DEFF Research Database (Denmark)

    Hertzum, Morten

    2004-01-01

    Small-scale classification schemes are used extensively in the coordination of cooperative work. This study investigates the creation and use of a classification scheme for handling the system requirements during the redevelopment of a nation-wide information system. This requirements...... classification inherited a lot of its structure from the existing system and rendered requirements that transcended the framework laid out by the existing system almost invisible. As a result, the requirements classification became a defining element of the requirements-engineering process, though its main...... effects remained largely implicit. The requirements classification contributed to constraining the requirements-engineering process by supporting the software engineers in maintaining some level of control over the process. This way, the requirements classification provided the software engineers...

  19. Mobile infostation network technology

    Science.gov (United States)

    Rajappan, Gowri; Acharya, Joydeep; Liu, Hongbo; Mandayam, Narayan; Seskar, Ivan; Yates, Roy

    2006-05-01

    Inefficient use of network resources on the battlefield is a serious liability: if an asset communicates with the network command for data-a terrain map, for instance-it ties up the end-to-end network resources. When many such assets contend for data simultaneously, traffic is limited by the slowest link along the path from the network command to the asset. A better approach is for a local server, known as an infostation, to download data on an anticipated-need basis when the network load is low. The infostation can then dump data when needed to the assets over a high-speed wireless connection. The infostation serves the local assets over an OFDM-based wireless data link that has MIMO enhancements for high data rate and robustness. We aim for data rate in excess of 100 Mbps, spectral efficiency in excess of 5 bits/sec/Hz, and robustness to poor channel conditions and jammers. We propose an adaptive physical layer that determines power levels, modulation schemes, and the MIMO enhancements to use based on the channel state and the level of interference in the system. We also incorporate the idea of superuser: a user who is allowed preferential use of the high data rate link. We propose a MAC that allows for this priority-based bandwidth allocation scheme. The proposed infostation MAC is integrated tightly with the physical layer through a cross-layer design. We call the proposed infostation PHY, MAC, and network technology, collectively, as the Mobile Infostation Network Technology (MINT).

  20. Mobile Autonomous Reconfigurable System

    Directory of Open Access Journals (Sweden)

    Pavliuk N.A.

    2018-04-01

    Full Text Available The object of this study is a multifunctional modular robot able to assemble independently in a given configuration and responsively change it in the process of operation depending on the current task. In this work we aim at developing and examining unified modules for a modular robot, which can both perform autonomous movement and form a complex structure by connecting to other modules. The existing solutions in the field of modular robotics were reviewed and classified by power supply, the ways of interconnection, the ways of movement and the possibility of independent movement of separate modules. Basing on the analysis of the shortcomings of existing analogues, we have developed a module of mobile autonomous reconfigurable system, including a base unit, a set of magneto-mechanical connectors and two motor wheels. The basic kinematic scheme of the modular robot, the features of a single module, as well as the modular structure formed by an array of similar modules were described. Two schemes for placing sets of magneto-mechanical connectors in the basic module have been proposed. We described the principle of operation of a magneto-mechanical connector based on redirection of the magnetic flux of a permanent magnet. This solution simplifies the system for controlling a mechanism of connection with other modules, increases energy efficiency and a battery life of the module. Since the energy is required only at the moment of switching the operating modes of the connector, there is no need to power constantly the connector mechanism to maintain the coupling mode.

  1. Cambridge community Optometry Glaucoma Scheme.

    Science.gov (United States)

    Keenan, Jonathan; Shahid, Humma; Bourne, Rupert R; White, Andrew J; Martin, Keith R

    2015-04-01

    With a higher life expectancy, there is an increased demand for hospital glaucoma services in the United Kingdom. The Cambridge community Optometry Glaucoma Scheme (COGS) was initiated in 2010, where new referrals for suspected glaucoma are evaluated by community optometrists with a special interest in glaucoma, with virtual electronic review and validation by a consultant ophthalmologist with special interest in glaucoma. 1733 patients were evaluated by this scheme between 2010 and 2013. Clinical assessment is performed by the optometrist at a remote site. Goldmann applanation tonometry, pachymetry, monoscopic colour optic disc photographs and automated Humphrey visual field testing are performed. A clinical decision is made as to whether a patient has glaucoma or is a suspect, and referred on or discharged as a false positive referral. The clinical findings, optic disc photographs and visual field test results are transmitted electronically for virtual review by a consultant ophthalmologist. The number of false positive referrals from initial referral into the scheme. Of the patients, 46.6% were discharged at assessment and a further 5.7% were discharged following virtual review. Of the patients initially discharged, 2.8% were recalled following virtual review. Following assessment at the hospital, a further 10.5% were discharged after a single visit. The COGS community-based glaucoma screening programme is a safe and effective way of evaluating glaucoma referrals in the community and reducing false-positive referrals for glaucoma into the hospital system. © 2014 Royal Australian and New Zealand College of Ophthalmologists.

  2. New schemes for particle accelerators

    International Nuclear Information System (INIS)

    Nishida, Y.

    1985-01-01

    In the present paper, the authors propose new schemes for realizing the v/sub p/xB accelerator, by using no plasma system for producing the strong longitudinal waves. The first method is to use a grating for obtaining extended interaction of an electron beam moving along the grating surface with light beam incident also along the surface. Here, the light beam propagates obliquely to the grating grooves for producing strong electric field, and the electron beam propagates in parallel to the light beam. The static magnetic field is applied perpendicularly to the grating surface. In the present system, the beam interacts synchronously with the p-polarized wave which has the electric field be parallel to the grating surface. Another conventional scheme is to use a delay circuit. Here, the light beam propagates obliquely between a pair of array of conductor fins or slots. The phase velocity of the spatial harmonics in the y-direction (right angle to the array of slots) is slower than the speed of light. With the aid of powerful laser light or microwave source, it should be possible to miniaturise linacs by using the v/sub p/xB effect and schemes proposed here

  3. Advertising on mobile applications

    OpenAIRE

    Sobolevsky, Alexandr

    2015-01-01

    The article analyzes the new method of mobile advertising. Advertising in mobile applications - a subspecies of mobile marketing, where advertising is distributed using mobile phones and smartphones. Ad placement is going on inside of applications and games for smartphones. It has a high potential due to the large number of mobile phone users (over 6.5 billion in 2013).

  4. Mobility Balance Sheet 2009

    International Nuclear Information System (INIS)

    Jorritsma, P.; Derriks, H.; Francke, J.; Gordijn, H.; Groot, W.; Harms, L.; Van der Loop, H.; Peer, S.; Savelberg, F.; Wouters, P.

    2009-06-01

    The Mobility Balance Sheet provides an overview of the state of the art of mobility in the Netherlands. In addition to describing the development of mobility this report also provides explanations for the growth of passenger and freight transport. Moreover, the Mobility Balance Sheet also focuses on a topical theme: the effects of economic crises on mobility. [nl

  5. A Memory Efficient Network Encryption Scheme

    Science.gov (United States)

    El-Fotouh, Mohamed Abo; Diepold, Klaus

    In this paper, we studied the two widely used encryption schemes in network applications. Shortcomings have been found in both schemes, as these schemes consume either more memory to gain high throughput or low memory with low throughput. The need has aroused for a scheme that has low memory requirements and in the same time possesses high speed, as the number of the internet users increases each day. We used the SSM model [1], to construct an encryption scheme based on the AES. The proposed scheme possesses high throughput together with low memory requirements.

  6. An Arbitrated Quantum Signature Scheme without Entanglement*

    International Nuclear Information System (INIS)

    Li Hui-Ran; Luo Ming-Xing; Peng Dai-Yuan; Wang Xiao-Jun

    2017-01-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks . (paper)

  7. Mobile video with mobile IPv6

    CERN Document Server

    Minoli, Daniel

    2012-01-01

    Increased reliance on mobile devices and streaming of video content are two of the most recent changes that have led those in the video distribution industry to be concerned about the shifting or erosion of traditional advertising revenues. Infrastructure providers also need to position themselves to take advantage of these trends. Mobile Video with Mobile IPv6provides an overview of the current mobile landscape, then delves specifically into the capabilities and operational details of IPv6. The book also addresses 3G and 4G services, the application of Mobile IPv6 to streaming and other mobil

  8. Multi-User Interference Cancellation Scheme(s) for Muliple Carrier Frequency Offset Compensation in Uplink OFDMA

    DEFF Research Database (Denmark)

    Nguyen, Huan Cong; Carvalho, Elisabeth De; Prasad, Ramjee

    2006-01-01

    (ICI) and degrade the system performance considerably. In this paper, we propose a novel Multi-User Interference (MUI) cancellation scheme for uplink OFDMA, which utilizes multiple OFDM-demodulators architecture to correct and then compensate the negative effects of multiple CFOs at the receiver's side......We consider the uplink of an Orthogonal Frequency Division Multiple Access (OFDMA)-based system, where each Mobile Station (MS) experiences a different Carrier Frequency Offset (CFO). Uncorrected CFO destroy the orthogonality among subcarriers, which could cause severe Inter-Carrier Interference...

  9. [Social mobilization].

    Science.gov (United States)

    Bop, C

    1990-04-01

    One of the principal recommendations from Alma Ata and the Bamako Initiative was the need for communities to take responsibility for their own health--a recommendation that still remains unmet and in need of reform in Africa because of the severe economic recession and lack of resources allocated for health care in the region. The mobilization of communities "is the opposite of passivity and submission." People must demystify the notion that health care is the exclusive right of health professionals and should realize that they themselves can bring about changes from the household to the village levels; community mobilization is an integral component of development planning. African societies have developed very centralized structures requiring changes that only their own communities can bring about. Because women remain the principal agents for the family's health they should be informed, about the multiple dimensions leading to good health care to enable them to provide the rest of the family with good nourishment and health care follow-up. Children are a vulnerable and important group that require preventive care. A UNICEF experiment in Senegal is training 10-13 year old school children to visit the parents of 5 children, inform them about vaccinating their children, and to follow-up on their activities with these "adopted families." The need for short and long-term IEC interventions in Africa are a priority and effective strategies must be found to reach the majority of the rural populations where all obstacles such as the lack of infrastructure and illiteracy exist. Mali has used traditional theatre "Koteba" to reach the rural populations on a variety of health issues such as oral rehydration and diarrhea as well as the Rural Audio Library (it used cassettes rather than books) to reach villagers in their own languages. The worst obstacle facing Africa today is the refusal of officials in power to allow people to manage their own lives, of which health is a

  10. A Spatial Discretization Scheme for Solving the Transport Equation on Unstructured Grids of Polyhedra

    International Nuclear Information System (INIS)

    Thompson, K.G.

    2000-01-01

    In this work, we develop a new spatial discretization scheme that may be used to numerically solve the neutron transport equation. This new discretization extends the family of corner balance spatial discretizations to include spatial grids of arbitrary polyhedra. This scheme enforces balance on subcell volumes called corners. It produces a lower triangular matrix for sweeping, is algebraically linear, is non-negative in a source-free absorber, and produces a robust and accurate solution in thick diffusive regions. Using an asymptotic analysis, we design the scheme so that in thick diffusive regions it will attain the same solution as an accurate polyhedral diffusion discretization. We then refine the approximations in the scheme to reduce numerical diffusion in vacuums, and we attempt to capture a second order truncation error. After we develop this Upstream Corner Balance Linear (UCBL) discretization we analyze its characteristics in several limits. We complete a full diffusion limit analysis showing that we capture the desired diffusion discretization in optically thick and highly scattering media. We review the upstream and linear properties of our discretization and then demonstrate that our scheme captures strictly non-negative solutions in source-free purely absorbing media. We then demonstrate the minimization of numerical diffusion of a beam and then demonstrate that the scheme is, in general, first order accurate. We also note that for slab-like problems our method actually behaves like a second-order method over a range of cell thicknesses that are of practical interest. We also discuss why our scheme is first order accurate for truly 3D problems and suggest changes in the algorithm that should make it a second-order accurate scheme. Finally, we demonstrate 3D UCBL's performance on several very different test problems. We show good performance in diffusive and streaming problems. We analyze truncation error in a 3D problem and demonstrate robustness in a

  11. SC-FDMA for mobile communications

    CERN Document Server

    Abd El-Samie, Fathi E

    2013-01-01

    SC-FDMA for Mobile Communications examines Single-Carrier Frequency Division Multiple Access (SC-FDMA). Explaining this rapidly evolving system for mobile communications, it describes its advantages and limitations and outlines possible solutions for addressing its current limitations. The book explores the emerging trend of cooperative communication with SC-FDMA and how it can improve the physical layer security. It considers the design of distributed coding schemes and protocols for wireless relay networks where users cooperate to send their data to the destination. Supplying you with the re

  12. Discretization of convection-diffusion equations with finite-difference scheme derived from simplified analytical solutions

    International Nuclear Information System (INIS)

    Kriventsev, Vladimir

    2000-09-01

    Most of thermal hydraulic processes in nuclear engineering can be described by general convection-diffusion equations that are often can be simulated numerically with finite-difference method (FDM). An effective scheme for finite-difference discretization of such equations is presented in this report. The derivation of this scheme is based on analytical solutions of a simplified one-dimensional equation written for every control volume of the finite-difference mesh. These analytical solutions are constructed using linearized representations of both diffusion coefficient and source term. As a result, the Efficient Finite-Differencing (EFD) scheme makes it possible to significantly improve the accuracy of numerical method even using mesh systems with fewer grid nodes that, in turn, allows to speed-up numerical simulation. EFD has been carefully verified on the series of sample problems for which either analytical or very precise numerical solutions can be found. EFD has been compared with other popular FDM schemes including novel, accurate (as well as sophisticated) methods. Among the methods compared were well-known central difference scheme, upwind scheme, exponential differencing and hybrid schemes of Spalding. Also, newly developed finite-difference schemes, such as the the quadratic upstream (QUICK) scheme of Leonard, the locally analytic differencing (LOAD) scheme of Wong and Raithby, the flux-spline scheme proposed by Varejago and Patankar as well as the latest LENS discretization of Sakai have been compared. Detailed results of this comparison are given in this report. These tests have shown a high efficiency of the EFD scheme. For most of sample problems considered EFD has demonstrated the numerical error that appeared to be in orders of magnitude lower than that of other discretization methods. Or, in other words, EFD has predicted numerical solution with the same given numerical error but using much fewer grid nodes. In this report, the detailed

  13. An Unexpected Location of the Arginine Catabolic Mobile Element (ACME) in a USA300-Related MRSA Strain

    DEFF Research Database (Denmark)

    Damkjær Bartels, Mette; Hansen, Lars H.; Boye, Kit

    2011-01-01

    In methicillin resistant Staphylococcus aureus (MRSA), the arginine catabolic mobile element (ACME) was initially described in USA300 (t008-ST8) where it is located downstream of the staphylococcal cassette chromosome mec (SCCmec). A common health-care associated MRSA in Copenhagen, Denmark (t024......-ST8) is clonally related to USA300 and is frequently PCR positive for the ACME specific arcA-gene. This study is the first to describe an ACME element upstream of the SCCmec in MRSA. By traditional SCCmec typing schemes, the SCCmec of t024-ST8 strain M1 carries SCCmec IVa, but full sequencing...... of SCCmec, M1 had two new DR between the orfX gene and the J3 region of the SCCmec. The region between the orfX DR (DR1) and DR2 contained the ccrAB4 genes. An ACME II-like element was located between DR2 and DR3. The entire 26,468 bp sequence between DR1 and DR3 was highly similar to parts of the ACME...

  14. A Numerical Scheme Based on an Immersed Boundary Method for Compressible Turbulent Flows with Shocks: Application to Two-Dimensional Flows around Cylinders

    Directory of Open Access Journals (Sweden)

    Shun Takahashi

    2014-01-01

    Full Text Available A computational code adopting immersed boundary methods for compressible gas-particle multiphase turbulent flows is developed and validated through two-dimensional numerical experiments. The turbulent flow region is modeled by a second-order pseudo skew-symmetric form with minimum dissipation, while the monotone upstream-centered scheme for conservation laws (MUSCL scheme is employed in the shock region. The present scheme is applied to the flow around a two-dimensional cylinder under various freestream Mach numbers. Compared with the original MUSCL scheme, the minimum dissipation enabled by the pseudo skew-symmetric form significantly improves the resolution of the vortex generated in the wake while retaining the shock capturing ability. In addition, the resulting aerodynamic force is significantly improved. Also, the present scheme is successfully applied to moving two-cylinder problems.

  15. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Kai-Wen Hu

    2008-04-01

    Full Text Available With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  16. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Huang Chenn-Jung

    2008-01-01

    Full Text Available Abstract With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  17. Time cycle calculation procedure for the special crew during the mining mobile machine complex operation

    International Nuclear Information System (INIS)

    Shmurygin, V; Lukyanov, V; Maslovsky, A

    2015-01-01

    The relevance of the research is specified by the necessity to optimize the delft mobile tunneling equipment operation. Target of the research is tunneling time cycle justification for the special crew during the mining mobile machine complex operation. Methods of the research included the consideration of operation organization schemes in the drifting face and effective use of the mobile equipment during mine exploratory working operations. Time cycle calculation procedures for major processes have been considered. This has been done for the special crew during the mobile machine complex operations for several working faces and various organization schemes

  18. Analysis and study of a handoff scheme with multiple priority strategies

    Institute of Scientific and Technical Information of China (English)

    李波; 吴成柯; 椋本介士; 福田明

    2000-01-01

    A handoff scheme with the combination of channel reservation and preemptive priority in integrated voice/data cellular mobile systems is proposed. In the scheme, calls are divided into three different classes: handoff voice calls, originating voice calls, and data calls. An access strategy with the combination of channel reservation and preemptive priority is provided to a handoff voice call. Furthermore, in order to improve the system capacity for the total voice traffic, preemptive priority is also given to partial originating voice calls. The system is modeled by a two-dimensional Markov chain. Both the iteration method and the approximate method are used to calculate and analyze some of the most important performance measures of the system. It is shown that our scheme can provide better quality of services for mobile subscribers.

  19. How downstream sub-basins depend on upstream inflows to avoid scarcity: typology and global analysis of transboundary rivers

    Science.gov (United States)

    Munia, Hafsa Ahmed; Guillaume, Joseph H. A.; Mirumachi, Naho; Wada, Yoshihide; Kummu, Matti

    2018-05-01

    Countries sharing river basins are often dependent upon water originating outside their boundaries; meaning that without that upstream water, water scarcity may occur with flow-on implications for water use and management. We develop a formalisation of this concept drawing on ideas about the transition between regimes from resilience literature, using water stress and water shortage as indicators of water scarcity. In our analytical framework, dependency occurs if water from upstream is needed to avoid scarcity. This can be diagnosed by comparing different types of water availability on which a sub-basin relies, in particular local runoff and upstream inflows. At the same time, possible upstream water withdrawals reduce available water downstream, influencing the latter water availability. By developing a framework of scarcity and dependency, we contribute to the understanding of transitions between system regimes. We apply our analytical framework to global transboundary river basins at the scale of sub-basin areas (SBAs). Our results show that 1175 million people live under water stress (42 % of the total transboundary population). Surprisingly, the majority (1150 million) of these currently suffer from stress only due to their own excessive water use and possible water from upstream does not have impact on the stress status - i.e. they are not yet dependent on upstream water to avoid stress - but could still impact on the intensity of the stress. At the same time, 386 million people (14 %) live in SBAs that can avoid stress owing to available water from upstream and have thus upstream dependency. In the case of water shortage, 306 million people (11 %) live in SBAs dependent on upstream water to avoid possible shortage. The identification of transitions between system regimes sheds light on how SBAs may be affected in the future, potentially contributing to further refined analysis of inter- and intrabasin hydro-political power relations and strategic planning

  20. Mobile OS Comparative Study

    OpenAIRE

    Joseph, Jyothy; K, Shinto Kurian

    2013-01-01

    In the fast growing mobile revolutionary era, many operating systems are playing vital role in present market. This study is intending to identify the apt and secure mobile based on mobile operating systems capability and user requirements.

  1. Mobile Inquiry Based Learning

    NARCIS (Netherlands)

    Specht, Marcus

    2012-01-01

    Specht, M. (2012, 8 November). Mobile Inquiry Based Learning. Presentation given at the Workshop "Mobile inquiry-based learning" at the Mobile Learning Day 2012 at the Fernuniversität Hagen, Hagen, Germany.

  2. MOBILITY: A SYSTEMS APPROACH

    Directory of Open Access Journals (Sweden)

    Mykola I. Striuk

    2015-10-01

    Full Text Available A comprehensive study on the problem of mobility in the socio-educational and technical systems was carried out: the evolution of the concept of mobility in scientific sources of XIX–XXI centuries was analyzed and the new sources on the issue of mobility introduced into scientific circulation, the interrelation of the types of mobility in the socio-pedagogical and technical systems are theoretically grounded, an integrative model of mobility in the information society is proposed. The major trends in academic mobility are identified (the transition from student mobility to mobility programs and educational services providers, the new mobility programs (franchising, double/joint degrees, combinations, nostrification etc. are characterized. The new types of mobility providers are reviewed and attention is focused on virtual universities that are now the basis of virtual mobility of students and activities which are based on the use of new ICT in higher education, especially – the Internet and mobile learning environments.

  3. Micro Mobility Marketing

    DEFF Research Database (Denmark)

    Hosbond, Jens Henrik; Skov, Mikael B.

    2008-01-01

    , in our case a medium-sized retail supermarket. Two prototypes based on push and pull marketing strategies are implemented and evaluated. Taking outset in a synthesis of central issues in contemporary research on mobile marketing, we discuss their role in micro mobility marketing to point to similarities......Mobile marketing refers to marketing of services or goods using mobile technology and mobile marketing holds potentially great economical opportunities. Traditionally, mobile marketing has been viewed as mobility in the large taking place virtually anywhere, anytime. Further, research shows...... considerable number of studies on push-based SMS mobile marketing campaigns. This paper explores a related yet different form of mobile marketing namely micro mobility marketing. Micro mobility marketing denotes mobility in the small, meaning that promotion of goods takes place within a circumscribed location...

  4. Certificateless short sequential and broadcast multisignature schemes using elliptic curve bilinear pairings

    Directory of Open Access Journals (Sweden)

    SK Hafizul Islam

    2014-01-01

    Full Text Available Several certificateless short signature and multisignature schemes based on traditional public key infrastructure (PKI or identity-based cryptosystem (IBC have been proposed in the literature; however, no certificateless short sequential (or serial multisignature (CL-SSMS or short broadcast (or parallel multisignature (CL-SBMS schemes have been proposed. In this paper, we propose two such new CL-SSMS and CL-SBMS schemes based on elliptic curve bilinear pairing. Like any certificateless public key cryptosystem (CL-PKC, the proposed schemes are free from the public key certificate management burden and the private key escrow problem as found in PKI- and IBC-based cryptosystems, respectively. In addition, the requirements of the expected security level and the fixed length signature with constant verification time have been achieved in our schemes. The schemes are communication efficient as the length of the multisignature is equivalent to a single elliptic curve point and thus become the shortest possible multisignature scheme. The proposed schemes are then suitable for communication systems having resource constrained devices such as PDAs, mobile phones, RFID chips, and sensors where the communication bandwidth, battery life, computing power and storage space are limited.

  5. An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Chen, Hung-Ming; Lo, Jung-Wen; Yeh, Chang-Kuo

    2012-12-01

    The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources has become a crucial challenge. A secure authentication scheme between the medical server and remote users is therefore needed to safeguard data integrity, confidentiality and to ensure availability. Recently, many authentication schemes that use low-cost mobile devices have been proposed to meet these requirements. In contrast to previous schemes, Khan et al. proposed a dynamic ID-based remote user authentication scheme that reduces computational complexity and includes features such as a provision for the revocation of lost or stolen smart cards and a time expiry check for the authentication process. However, Khan et al.'s scheme has some security drawbacks. To remedy theses, this study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.'s scheme and demonstrated this scheme is more secure and robust for use in a telecare medical information system.

  6. Decoupling schemes for the SSC Collider

    International Nuclear Information System (INIS)

    Cai, Y.; Bourianoff, G.; Cole, B.; Meinke, R.; Peterson, J.; Pilat, F.; Stampke, S.; Syphers, M.; Talman, R.

    1993-05-01

    A decoupling system is designed for the SSC Collider. This system can accommodate three decoupling schemes by using 44 skew quadrupoles in the different configurations. Several decoupling schemes are studied and compared in this paper

  7. Renormalization scheme-invariant perturbation theory

    International Nuclear Information System (INIS)

    Dhar, A.

    1983-01-01

    A complete solution to the problem of the renormalization scheme dependence of perturbative approximants to physical quantities is presented. An equation is derived which determines any physical quantity implicitly as a function of only scheme independent variables. (orig.)

  8. Wireless Broadband Access and Accounting Schemes

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    In this paper, we propose two wireless broadband access and accounting schemes. In both schemes, the accounting system adopts RADIUS protocol, but the access system adopts SSH and SSL protocols respectively.

  9. A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks.

    Science.gov (United States)

    Wang, Changji; Yuan, Yuan; Wu, Jiayuan

    2017-06-20

    Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication.

  10. Social Class, Family Background and Intergenerational Mobility

    DEFF Research Database (Denmark)

    D. Munk, Martin; McIntosh, James

    This research examines the various approaches taken by economists and sociologists for analyzing intergenerational mobility. Social mobility models based on social classes arising from an occupational classification scheme are analyzed. A test for the statistical validity of classification schemes...... is proposed and tested using Danish sample survey data that was first collected in 1976 and augmented in 2000. This is referred to as a homogeneity test and is a likelihood ratio test of a set of linear restrictions which define social classes. For Denmark it is shown that this test fails for an Erikson......-Goldthorpe classification system, raising doubts about the statistical validity of occupational classification systems in general. We also estimate regression models of occupational earnings, household earnings, and educational attainment using family background variables as covariates controlling for unobservables...

  11. Social Class, Family Background and Intergenerational Mobility

    DEFF Research Database (Denmark)

    D. Munk, Martin; McIntosh, James

    This research examines the various approaches taken by economists and sociologists for analyzing intergenerational mobility. Social mobility models based on social classes arising from an occupational classi.cation scheme are analyzed. A test for the statistical validity of classi.cation schemes...... is proposed and tested using Danish sample survey data that was .rst collected in 1976 and augmented in 2000. This is referred to as a homogeneity test and is a likelihood ratio test of a set of linear restrictions which define social classes. For Denmark it is shown that this test fails for an Erikson......-Goldthorpe classi.cation system, raising doubts about the statistical validity of occupational classication systems in general. We also estimate regression models of occupational earnings, household earnings, and educational attainment using family background variables as covariates controlling for unobservables...

  12. Mobile Search and Advertising

    OpenAIRE

    Lovitskii, Vladimir; McCaffery, Colin; Thrasher, Michael; Traynor, David; Wright, Peter

    2009-01-01

    Mobile advertising is a rapidly growing sector providing brands and marketing agencies the opportunity to connect with consumers beyond traditional and digital media and instead communicate directly on their mobile phones. Mobile advertising will be intrinsically linked with mobile search, which has transported from the internet to the mobile and is identified as an area of potential growth. The result of mobile searching show that as a general rule such search result exceed 1...

  13. Trends in Mobile Marketing

    OpenAIRE

    Chocholová, Petra

    2010-01-01

    The principal aim of this thesis is to assess the state of the mobile marketing as of the first quarter of 2011 and to discuss various scenarios of the future development. This thesis defines the terms "mobile marketing" and "mobile advertising" and identifies the main players in the industry. It explores the main categories of mobile advertising such as mobile messaging, in-content and mobile internet advertising. Later, it analyzes the latest trends in the industry and describes in detail t...

  14. A Study on Architecture of Malicious Code Blocking Scheme with White List in Smartphone Environment

    Science.gov (United States)

    Lee, Kijeong; Tolentino, Randy S.; Park, Gil-Cheol; Kim, Yong-Tae

    Recently, the interest and demands for mobile communications are growing so fast because of the increasing prevalence of smartphones around the world. In addition, the existing feature phones were replaced by smartphones and it has widely improved while using the explosive growth of Internet users using smartphones, e-commerce enabled Internet banking transactions and the importance of protecting personal information. Therefore, the development of smartphones antivirus products was developed and launched in order to prevent malicious code or virus infection. In this paper, we proposed a new scheme to protect the smartphone from malicious codes and malicious applications that are element of security threats in mobile environment and to prevent information leakage from malicious code infection. The proposed scheme is based on the white list smartphone application which only allows installing authorized applications and to prevent the installation of malicious and untrusted mobile applications which can possibly infect the applications and programs of smartphones.

  15. Effects of Distributed Generation on Overcurrent Relay Coordination and an Adaptive Protection Scheme

    Science.gov (United States)

    Ilik, Semih C.; Arsoy, Aysen B.

    2017-07-01

    Integration of distributed generation (DG) such as renewable energy sources to electrical network becomes more prevalent in recent years. Grid connection of DG has effects on load flow directions, voltage profile, short circuit power and especially protection selectivity. Applying traditional overcurrent protection scheme is inconvenient when system reliability and sustainability are considered. If a fault happens in DG connected network, short circuit contribution of DG, creates additional branch element feeding the fault current; compels to consider directional overcurrent (OC) protection scheme. Protection coordination might get lost for changing working conditions when DG sources are connected. Directional overcurrent relay parameters are determined for downstream and upstream relays when different combinations of DG connected singular or plural, on radial test system. With the help of proposed flow chart, relay parameters are updated and coordination between relays kept sustained for different working conditions in DigSILENT PowerFactory program.

  16. Tightly Secure Signatures From Lossy Identification Schemes

    OpenAIRE

    Abdalla , Michel; Fouque , Pierre-Alain; Lyubashevsky , Vadim; Tibouchi , Mehdi

    2015-01-01

    International audience; In this paper, we present three digital signature schemes with tight security reductions in the random oracle model. Our first signature scheme is a particularly efficient version of the short exponent discrete log-based scheme of Girault et al. (J Cryptol 19(4):463–487, 2006). Our scheme has a tight reduction to the decisional short discrete logarithm problem, while still maintaining the non-tight reduction to the computational version of the problem upon which the or...

  17. A New Adaptive Checkpointing Strategy for Mobile Computing

    Institute of Scientific and Technical Information of China (English)

    MENChaoguang; ZUODecheng; YANGXiaozong

    2005-01-01

    Adaptive checkpointing strategy is an efficient recovery scheme, which is suitable for mobile computing system. However, all existing adaptive checkpointing schemes are not correct to recover system when failure occurs in some special period. In this paper, the issues that will lead to system inconsistency are first discussed and then a new adaptive strategy that can recover system to correct consistent state is proposed. Our algorithm improves system recovery performance because only failure process needs rollback through logging.

  18. Trellis-coded CPM for satellite-based mobile communications

    Science.gov (United States)

    Abrishamkar, Farrokh; Biglieri, Ezio

    1988-01-01

    Digital transmission for satellite-based land mobile communications is discussed. To satisfy the power and bandwidth limitations imposed on such systems, a combination of trellis coding and continuous-phase modulated signals are considered. Some schemes based on this idea are presented, and their performance is analyzed by computer simulation. The results obtained show that a scheme based on directional detection and Viterbi decoding appears promising for practical applications.

  19. Bit Error Rate Performance Analysis of a Threshold-Based Generalized Selection Combining Scheme in Nakagami Fading Channels

    Directory of Open Access Journals (Sweden)

    Kousa Maan

    2005-01-01

    Full Text Available The severity of fading on mobile communication channels calls for the combining of multiple diversity sources to achieve acceptable error rate performance. Traditional approaches perform the combining of the different diversity sources using either the conventional selective diversity combining (CSC, equal-gain combining (EGC, or maximal-ratio combining (MRC schemes. CSC and MRC are the two extremes of compromise between performance quality and complexity. Some researches have proposed a generalized selection combining scheme (GSC that combines the best branches out of the available diversity resources ( . In this paper, we analyze a generalized selection combining scheme based on a threshold criterion rather than a fixed-size subset of the best channels. In this scheme, only those diversity branches whose energy levels are above a specified threshold are combined. Closed-form analytical solutions for the BER performances of this scheme over Nakagami fading channels are derived. We also discuss the merits of this scheme over GSC.

  20. Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme

    Science.gov (United States)

    Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook

    1995-01-01

    Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.

  1. Optimal Sales Schemes for Network Goods

    DEFF Research Database (Denmark)

    Parakhonyak, Alexei; Vikander, Nick

    consumers simultaneously, serve them all sequentially, or employ any intermediate scheme. We show that the optimal sales scheme is purely sequential, where each consumer observes all previous sales before choosing whether to buy himself. A sequential scheme maximizes the amount of information available...

  2. THROUGHPUT ANALYSIS OF EXTENDED ARQ SCHEMES

    African Journals Online (AJOL)

    PUBLICATIONS1

    ABSTRACT. Various Automatic Repeat Request (ARQ) schemes have been used to combat errors that befall in- formation transmitted in digital communication systems. Such schemes include simple ARQ, mixed mode ARQ and Hybrid ARQ (HARQ). In this study we introduce extended ARQ schemes and derive.

  3. Arbitrated quantum signature scheme with message recovery

    International Nuclear Information System (INIS)

    Lee, Hwayean; Hong, Changho; Kim, Hyunsang; Lim, Jongin; Yang, Hyung Jin

    2004-01-01

    Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other does not. However both schemes provide confidentiality of the message and a higher efficiency in transmission

  4. ENcentive: A Framework for Intelligent Marketing in Mobile Peer-To-Peer Environments

    National Research Council Canada - National Science Library

    Ratsimor, Olga; Finin, Tim; Joshi, Anupam; Yesha, Yelena

    2005-01-01

    .... eNcentive facilitates peer-to-peer electronic marketing in mobile ad hoc environments. Our framework employs an intelligent marketing scheme, by providing users the capability to collect information like sales promotions and discounts...

  5. An in situ Comparison of Electron Acceleration at Collisionless Shocks under Differing Upstream Magnetic Field Orientations

    Energy Technology Data Exchange (ETDEWEB)

    Masters, A.; Dougherty, M. K. [The Blackett Laboratory, Imperial College London, Prince Consort Road, London, SW7 2AZ (United Kingdom); Sulaiman, A. H. [Department of Physics and Astronomy, University of Iowa, Iowa City, IA 52242 (United States); Stawarz, Ł. [Astronomical Observatory, Jagiellonian University, ul. Orla 171, 30-244 Krakow (Poland); Reville, B. [School of Mathematics and Physics, Queens University Belfast, Belfast BT7 1NN (United Kingdom); Sergis, N. [Office of Space Research and Technology, Academy of Athens, Soranou Efesiou 4, 11527 Athens (Greece); Fujimoto, M. [Institute of Space and Astronautical Science, Japan Aerospace Exploration Agency, 3-1-1 Yoshinodai, Chuo-ku, Sagamihara, Kanagawa 252-5210 (Japan); Burgess, D. [School of Physics and Astronomy, Queen Mary University of London, London E1 4NS (United Kingdom); Coates, A. J., E-mail: a.masters@imperial.ac.uk [Mullard Space Science Laboratory, Department of Space and Climate Physics, University College London, Holmbury St. Mary, Dorking RH5 6NT (United Kingdom)

    2017-07-10

    A leading explanation for the origin of Galactic cosmic rays is acceleration at high-Mach number shock waves in the collisionless plasma surrounding young supernova remnants. Evidence for this is provided by multi-wavelength non-thermal emission thought to be associated with ultrarelativistic electrons at these shocks. However, the dependence of the electron acceleration process on the orientation of the upstream magnetic field with respect to the local normal to the shock front (quasi-parallel/quasi-perpendicular) is debated. Cassini spacecraft observations at Saturn’s bow shock have revealed examples of electron acceleration under quasi-perpendicular conditions, and the first in situ evidence of electron acceleration at a quasi-parallel shock. Here we use Cassini data to make the first comparison between energy spectra of locally accelerated electrons under these differing upstream magnetic field regimes. We present data taken during a quasi-perpendicular shock crossing on 2008 March 8 and during a quasi-parallel shock crossing on 2007 February 3, highlighting that both were associated with electron acceleration to at least MeV energies. The magnetic signature of the quasi-perpendicular crossing has a relatively sharp upstream–downstream transition, and energetic electrons were detected close to the transition and immediately downstream. The magnetic transition at the quasi-parallel crossing is less clear, energetic electrons were encountered upstream and downstream, and the electron energy spectrum is harder above ∼100 keV. We discuss whether the acceleration is consistent with diffusive shock acceleration theory in each case, and suggest that the quasi-parallel spectral break is due to an energy-dependent interaction between the electrons and short, large-amplitude magnetic structures.

  6. Ions upstream of the earth's bow shock: a theoretical comparison of alternative source populations

    International Nuclear Information System (INIS)

    Schwartz, S.J.; Thomsen, M.F.; Gosling, J.T.

    1983-01-01

    A theoretical framework is developed for studying trajectories of ions reflected or leaked upstream from the earth's bow shock and subject solely to the Lorentz force in a steady interplanetary magnetic field B and the V x B electric field. We include the effects of a sharp shock potential rise. Expressions are derived for the guiding center motion and gyromotion in a frame (the Hoffman-Teller frame) moving parallel to the shock surface with sufficient speed to transform the incident solar wind velocity into motion entirely along the interplanetary magnetic field: the appropriate equations are also provided to transform these motions back to the observer's frame. The utility of these expressions is illustrated by comparing the predicted upstream motions for four different source models for upstream ions: magnetic moment-conserving reflection of the solar wind ions, specular reflection of solar wind ions, magnetic moment-conserving leakage of magnetosheath ions, and leakage of magnetosheath ions parallel to the shock normal. This comparison reveals that, for identical geometries, the reflection models produce higher energies and/or gyromotion than do the leakage models. We further argue that in a single simple encounter with the shock, an ion should behave in an unmagnetized manner and hence should not conserve its magnetic moment. Conservation of magnetic moment, if it is to occur, would seem to require multiple encounters with the shock. We investigate the conditions under which such multiple encounters can occur and find that under most quasi-parallel geometries neither leaked nor reflected ions should probably conserve their magnetic moments

  7. Upstream effects of dams on alluvial channels: state-of-the-art and future challenges

    Science.gov (United States)

    Liro, Maciej

    2017-04-01

    More than 50,000 large dams (with the height above 15 m) operate all over the world and, thus, they significantly disturb water and sediment transport in river systems. These disturbances are recognized as one of the most important factors shaping river morphology in the Anthropocene. Downstream effects of dams have been well documented in numerous case studies and supported by predictions from existing models. In contrast, little is known on the upstream effects of dams on alluvial channels. This review highlights the lack of studies on sedimentological, hydromorphological and biogeomorphological adjustments of alluvial rivers in the base-level raised zones of backwater upstream of dam reservoirs where water level fluctuations occur. Up to date, it has been documented that backwater effects may facilitate fine and coarse sediment deposition, increase groundwater level, provide higher and more frequent channel and floodplain inundation and lead to significant morphological changes. But there have been no studies quantifying short- and long-term consequences of these disturbances for the hydromorphological and biogeomorphological feedbacks that control development of alluvial channels. Some recent studies carried out on gravel-bed and fine-grained bed rivers show that the above mentioned disturbances facilitate vegetation expansion on exposed channel sediments and floodplain influencing river morphology, which suggests that backwater area of alluvial rivers may be treated as the hotspot of bio-geomorphological changes in a fluvial system. To set the stage for future research on upstream effects of dams, this work presents the existing state-of-art and proposes some hypotheses which may be tested in future studies. This study was carried out within the scope of the Research Project 2015/19/N/ST10/01526 financed by the National Science Centre of Poland

  8. Beyond police crisis intervention: moving "upstream" to manage cases and places of behavioral health vulnerability.

    Science.gov (United States)

    Wood, Jennifer D; Beierschmitt, Laura

    2014-01-01

    Law enforcement officers continue to serve on the front lines as mental health interventionists, and as such have been subject to a wave of "first generation" reform designed to enhance their crisis response capabilities. Yet, this focus on crisis intervention has not answered recent calls to move "upstream" and bolster early intervention in the name of long-term recovery. This paper reports on findings from an action research project in Philadelphia aimed at exploring opportunities for enhanced upstream engagement. Study methods include spatial analyses of police mental health transportations from an eight year period (2004-2011) and qualitative data from twenty-three "framing conversations" with partners and other stakeholders, seven focus groups with police and outreach workers, five key informant interviews as well as document reviews of the service delivery system in Philadelphia. Recommendations include the need to move beyond a focus on what police can do to a wider conception of city agencies and business stakeholders who can influence vulnerable people and vulnerable spaces of the city. We argue for the need to develop shared principles and rules of engagement that clarify roles and stipulate how best to enlist city resources in a range of circumstances. Since issues of mental health, substance use and disorder are so tightly coupled, we stress the importance of establishing a data-driven approach to crime and disorder reduction in areas of the city we term "hotspots of vulnerability". In line with a recovery philosophy, such an approach should reduce opportunities for anti-social behavior among the "dually labeled" in ways consistent with "procedural justice". Furthermore, crime and disorder data flowing from police and security to behavioral health analysts could contribute to a more focused case management of "repeat utilizers" across the two systems. Our central argument is that a twin emphasis on "case management" and "place management" may provide

  9. Rearrangement of Upstream Sequences of the hTERT Gene During Cellular Immortalization

    Science.gov (United States)

    Zhao, Yuanjun; Wang, Shuwen; Popova, Evgenya Y.; Grigoryev, Sergei A.; Zhu, Jiyue

    2010-01-01

    Telomerase expression, resulting from transcriptional activation of the hTERT gene, allows cells to acquire indefinite proliferative potential during cellular immortalization and tumorigenesis. However, mechanisms of hTERT gene activation in many immortal cell lines and cancer cells are poorly understood. Here, we report our studies on hTERT activation using genetically related pairs of telomerase-negative (Tel−) and -positive (Tel+) fibroblast lines. First, whereas transiently transfected plasmid reporters did not recapitulate the endogenous hTERT promoter, the promoter in chromosomally integrated bacterial artificial chromosome (BAC) reporters was activated in a subset of Tel+ cells, indicating that activation of the hTERT promoter required native chromatin context and/or distal regulatory elements. Second, the hTERT gene, located near the telomere of chromosome 5p, was translocated in all three Tel+ cell lines but not in their parental pre-crisis cells and Tel− immortal siblings. The breakage points were mapped to regions upstream of the hTERT promoter, indicating that the hTERT gene was the target of these chromosomal rearrangements. In two Tel+ cell lines, translocation of the endogenous hTERT gene appeared to be the major mechanism of its activation as the activity of hTERT promoter in many chromosomally integrated BAC reporters, with intact upstream and downstream neighboring loci, remained relatively low. Therefore, our results suggest that rearrangement of upstream sequences is an important new mechanism of hTERT promoter activation during cellular immortalization. The chromosomal rearrangements likely occurred during cellular crisis and facilitated by telomere dysfunction. Such translocations allowed the hTERT promoter to escape from the native condensed chromatin environment. PMID:19672873

  10. Large-eddy simulation/Reynolds-averaged Navier-Stokes hybrid schemes for high speed flows

    Science.gov (United States)

    Xiao, Xudong

    Three LES/RANS hybrid schemes have been proposed for the prediction of high speed separated flows. Each method couples the k-zeta (Enstrophy) BANS model with an LES subgrid scale one-equation model by using a blending function that is coordinate system independent. Two of these functions are based on turbulence dissipation length scale and grid size, while the third one has no explicit dependence on the grid. To implement the LES/RANS hybrid schemes, a new rescaling-reintroducing method is used to generate time-dependent turbulent inflow conditions. The hybrid schemes have been tested on a Mach 2.88 flow over 25 degree compression-expansion ramp and a Mach 2.79 flow over 20 degree compression ramp. A special computation procedure has been designed to prevent the separation zone from expanding upstream to the recycle-plane. The code is parallelized using Message Passing Interface (MPI) and is optimized for running on IBM-SP3 parallel machine. The scheme was validated first for a flat plate. It was shown that the blending function has to be monotonic to prevent the RANS region from appearing in the LES region. In the 25 deg ramp case, the hybrid schemes provided better agreement with experiment in the recovery region. Grid refinement studies demonstrated the importance of using a grid independent blend function and further improvement with experiment in the recovery region. In the 20 deg ramp case, with a relatively finer grid, the hybrid scheme characterized by grid independent blending function well predicted the flow field in both the separation region and the recovery region. Therefore, with "appropriately" fine grid, current hybrid schemes are promising for the simulation of shock wave/boundary layer interaction problems.

  11. Energy-saving scheme based on downstream packet scheduling in ethernet passive optical networks

    Science.gov (United States)

    Zhang, Lincong; Liu, Yejun; Guo, Lei; Gong, Xiaoxue

    2013-03-01

    With increasing network sizes, the energy consumption of Passive Optical Networks (PONs) has grown significantly. Therefore, it is important to design effective energy-saving schemes in PONs. Generally, energy-saving schemes have focused on sleeping the low-loaded Optical Network Units (ONUs), which tends to bring large packet delays. Further, the traditional ONU sleep modes are not capable of sleeping the transmitter and receiver independently, though they are not required to transmit or receive packets. Clearly, this approach contributes to wasted energy. Thus, in this paper, we propose an Energy-Saving scheme that is based on downstream Packet Scheduling (ESPS) in Ethernet PON (EPON). First, we design both an algorithm and a rule for downstream packet scheduling at the inter- and intra-ONU levels, respectively, to reduce the downstream packet delay. After that, we propose a hybrid sleep mode that contains not only ONU deep sleep mode but also independent sleep modes for the transmitter and the receiver. This ensures that the energy consumed by the ONUs is minimal. To realize the hybrid sleep mode, a modified GATE control message is designed that involves 10 time points for sleep processes. In ESPS, the 10 time points are calculated according to the allocated bandwidths in both the upstream and the downstream. The simulation results show that ESPS outperforms traditional Upstream Centric Scheduling (UCS) scheme in terms of energy consumption and the average delay for both real-time and non-real-time packets downstream. The simulation results also show that the average energy consumption of each ONU in larger-sized networks is less than that in smaller-sized networks; hence, our ESPS is better suited for larger-sized networks.

  12. On the upstream boundary of electron foreshocks in the solar wind

    International Nuclear Information System (INIS)

    Zimbardo, G.; Veltri, P.

    1996-01-01

    The backstreaming of electrons from planetary and interplanetary shocks creates foreshocks of fast particles propagating along the magnetic field. The effect of low frequency magnetic fluctuations is to create both a broadening and a fine structure of the foreshock upstream boundary. This is studied by means of a newly developed 3-D numerical simulation of turbulent magnetic fields. Applications to the Earth and to the termination shock electron foreshocks are done, and some implications on the observations of the spreading and of the bursty structure of the foreshocks are discussed

  13. Compressor Stator Time-Variant Aerodynamic Response to Upstream Rotor Wakes.

    Science.gov (United States)

    1976-11-01

    periodic varia t i ons in pressure , velocity and flow direction in the exit field of an upstream element , wh i ch appea r as temporall y vary ing in a...compressor features blad i ng (42 rotor blades and 40 stator vanes , NACA 65 F Series ) that is aerodynamicall y l oaded to levels that are typical of...measurements were accom- — p lished by instrumenting a pair of the NACA Series 65 stator — vanes with flush mounted Ku lite thin -line des i gn dynamic

  14. Moving Upstream and Going Local: The Responsibility to Protect Ten Years Later

    Directory of Open Access Journals (Sweden)

    Bridget Moix

    2015-10-01

    Full Text Available Ten years ago the international community pledged to protect civilians from genocide, ethnic cleansing, war crimes, and crimes against humanity by endorsing the responsibility to protect (R2P doctrine. Yet today, horrific violence against civilians continues in places like Syria, Iraq, and South Sudan. This article examines some of the progress and gaps in the international community’s efforts to better protect civilians against mass violence over the past decade. It proposes two emerging directions for advancing the R2P agenda in the coming years: 1 greater focus on upstream prevention, and 2 increased support for locally-led peacebuilding and prevention actors and capacities.

  15. The role of upstream distal electrodes in mitigating electrochemical degradation of ionic liquid ion sources

    Science.gov (United States)

    Brikner, Natalya; Lozano, Paulo C.

    2012-11-01

    Ionic liquid ion sources produce molecular ions from micro-tip emitters wetted with room-temperature molten salts. When a single ion polarity is extracted, counterions accumulate and generate electrochemical reactions that limit the source lifetime. The dynamics of double layer formation are reviewed and distal electrode contacts are introduced to resolve detrimental electrochemical decomposition effects at the micro-tip apex. By having the emitter follow the ionic liquid potential, operation can be achieved for an extended period of time with no apparent degradation of the material, indicating that electrochemistry can be curtailed and isolated to the upstream distal electrode.

  16. Deep brine recognition upstream the EBE syndicate. Geochemical and isotopic investigations. Final report

    International Nuclear Information System (INIS)

    2009-01-01

    The authors report and discuss the results obtained after performing a drilling upstream the drinkable water harnessing field of a water supply syndicate in Alsace (Ensisheim, Bollwiller and surroundings), in order to confirm the existence of a deep brine source. This brine is diluted by recent waters. The first isotopic investigations do not allow the origin of this brine to be identified, but fractures due to some seismic events are suspected. The report presents the drilling and the various aspects of the chemical and isotopic studies (sampling, physico-chemical analysis, dating, identification of various isotopes)

  17. Is it a must to add upstream devices for high GVF multiphase

    Energy Technology Data Exchange (ETDEWEB)

    Dou, Jianwen; Guo, Jason; Gokulnath, R.

    2005-07-01

    High accuracies in measurement of the gross liquid and net oil flow rates at high GVF levels in the multiphase flow is identified as one of the most demanding needs of the industry, especially in high water cut environments. The underlying factor that decides the accuracy of the net oil flow rate measurement is the accuracy at which the gross liquid and water cut are measured and the prevailing water cut in the flow. It is an established fact that accuracies falter with increasing GVF in the multiphase flow. The purpose of this paper is to present the performance results of a newly developed Compact High GVF Haimo multiphase meter that addresses the above needs, without having to use an Upstream Separation Device for high GVF application while retaining the accuracies within +2% absolute for water cut and 10% relative for liquid and gas flow rates at 90% confidence level. while also optimising the footprint, the cost, the weight of the solution Further developmental work and trials are in progress to achieve the targeted accuracy levels under very high GVF conditions as well. Contents of the Paper:1) Definitions. 2) MFM 2000 + Upstream Separation Device. 3) Haimo's experience with upstream devices. 4) Motivation to develop the new Compact meter solution. 5) Description of the Compact solution. 6) Performance testing of the Compact solution in a third party test facility. 7) Conclusion and Benefit which are: The objective of working out a new solution for high GVF without having to use a Upstream Separation Device seem to have been achieved with excellent test results; The new configuration of Compact High GVF meter successfully met and exceeded its Acceptance criteria. The main objective was to asses its performance, confirm the quality of the measurements and check its compliance with the Accuracy specifications. The consistency of the absolute error on water cut much lower than 2% for the full range of the GVF and liquid flow rates re-establishes the

  18. Upstream oil and gas. Subsector no. 7: Oil and gas exploration and development 1995 to 1999

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-08-01

    Prepared by the Alberta Human Resources and Employment, this report provides a summary of the lost-time injuries and disease descriptions of workers injured while employed in the upstream oil and gas industries in Alberta during the period 1995 to 1999. The report includes the characteristics of the injured worker and the risk of injury to workers in the industries in Alberta, as well as the cost of injuries and revenue by means of total premiums paid by the employers. The occupational fatalities that were accepted by the Workers Compensation Board and investigated by the Occupational Health and Safety were summarized in the report along with a brief description of the injuries. The aim was to provide information concerning health and safety issues to government, employers, workers, and health and safety officers in the industries in Alberta about health and safety issues. The focus was placed on the oil and gas exploration and development sub-sector. Defined as all upstream oil field activities of employers which generate revenue from the production and sale of crude oil and/or natural gas, the sub-sector comprises major integrated oil and gas companies and small independent producers. In those cases where the owner/producer operates its own upstream production/processing facilities, they form an integral part of this sub-section. In addition, oil and gas marketing firms are included. Oil/gas well, well head equipment; flow lines/gathering systems tied into field processing facilities; battery sites/compressors stations; crude oil separators and natural gas dehydrators/treaters; natural gas/sulfur processing plants; heavy oil projects including steam generation; and other enhanced recovery methods are all included in the sub-sector. The other sub-sectors in the upstream oil and gas industries are: exploration, oilfield maintenance and construction, well servicing with service rigs and power swivels, drilling of oil and gas wells, oilfield downhole and other

  19. Downstream natural gas in Europe - high hopes dashed for upstream oil and gas companies

    International Nuclear Information System (INIS)

    Eikeland, P.O.

    2007-01-01

    Access for independents to retail gas markets was a central concern in European policy reform efforts in the 1990s. Upstream oil and gas companies reacted with strategic intentions of forward integration. By late 2004, forward integration was still weak, however. An important explanation of the gap between announced strategic re-orientation and actual strategy implementation lies in the political failure of EU member states to dismantle market barriers to entry for independents. Variations between companies in downstream strategy implementation are explained by variations in business opportunities and internal company factors. [Author

  20. Downstream natural gas in Europe-High hopes dashed for upstream oil and gas companies

    International Nuclear Information System (INIS)

    Eikeland, Per Ove

    2007-01-01

    Access for independents to retail gas markets was a central concern in European policy reform efforts in the 1990s. Upstream oil and gas companies reacted with strategic intentions of forward integration. By late 2004, forward integration was still weak, however. An important explanation of the gap between announced strategic re-orientation and actual strategy implementation lies in the political failure of EU member states to dismantle market barriers to entry for independents. Variations between companies in downstream strategy implementation are explained by variations in business opportunities and internal company factors