WorldWideScience

Sample records for vessel ieee transactions

  1. Editorial for the IEEE Transactions on Power Electronics, January 2009

    DEFF Research Database (Denmark)

    Blaabjerg, Frede

    2009-01-01

    I am entering the fourth year as the Editor in Chief of the IEEE TRANSACTIONS ON POWER ELECTRONICS. A position like this becomes more and more important for the technical field as publishing in a peer-reviewed highly ranked journal has influence on the industrial and academic career. It is a way...

  2. Editorial for IEEE Transactions on Power Electronics

    DEFF Research Database (Denmark)

    Blaabjerg, Frede

    2007-01-01

    , this popularity creates a transient problem for many authors. The impact factor of the TRANSACTIONS has dropped significantly. This parameter was not important years ago for the PELS Society, but now, universities all over the world try to benchmark and one of their factors are publications in high impact...

  3. Editorial for IEEE Transactions on Power Electronics, January 2013

    DEFF Research Database (Denmark)

    Blaabjerg, Frede; Lehman, Brad

    2013-01-01

    The editors discuss the health of the Transactions, the rate of article submission, the time from submission to publication, and the Journal Citation Reports (JCR) Impact Factor of the Transactions and contributing factors for that value. They note that the Transactions have only 100-150 articles...... should increase the impact factor of the IEEE TRANSACTIONS ON POWER ELECTRONICS (TPEL). In 2007, TPEL published 2600 pages, and it has gradually been increased to 4000 pages in 2011, 5000 pages in 2012, and 5500 pages are projected for 2013. We have decided to publish 12 printed issues so every month...... a new issue will be printed. A graph is provided showing the number of regular papers received in the past years as well as the number of published pages in the TPEL. Finally they note that in 2008, TPEL obtained a record high value for the impact factor (as shown in a figure) but in 2009 it was reduced...

  4. Special NSREC 2016 Issue of the IEEE Transactions on Nuclear Science Comments by the Editors

    Science.gov (United States)

    Fleetwood, Daniel M.; Brown, Dennis; Girard, Sylvain; Gerardin, Simone; Quinn, Heather; Kobayashi, Daisuke; Esqueda, Ivan Sanchez; Robinson, William

    2017-01-01

    The January 2017 special issue of the IEEE Transactions on Nuclear Science (TNS) contains selected papers from the 53rd annual IEEE International Nuclear and Space Radiation Effects Conference (NSREC) held July 11-15, 2016, in Portland, OR, USA. The 2016 IEEE NSREC was sponsored by the IEEE Nuclear and Plasma Sciences Society. 98 of the 104 papers presented in Portland were submitted for consideration for this year's special issue. The papers that appear in this special issue successfully completed the review process before the deadline. A few additional papers may appear in subsequent issues of the Transactions.

  5. 19 CFR 4.90 - Simultaneous vessel transactions.

    Science.gov (United States)

    2010-04-01

    ... transactions. (a) A vessel may proceed from port to port in the United States for the purpose of engaging in two or more of the following transactions simultaneously, 121 subject to the limitations hereafter... 19 Customs Duties 1 2010-04-01 2010-04-01 false Simultaneous vessel transactions. 4.90 Section 4...

  6. IEEE Transactions on Professional Communication

    DEFF Research Database (Denmark)

    2008-01-01

    , the theory and practice of technical communication in Europe, Asia, South America, and other places deserve closer attention. Substantial differences between the state of the discipline in North America and abroad impact our work in this globalized world, as well as our current students' future professional...... practice. For example, technical communication theory and practice in the U.S. typically emerge from Rhetoric and Writing Studies as well as from Communication Studies. Competence in multiple languages is usually not required for obtaining a degree or working in the field. In contrast, in Western Europe......, technical communication as a discipline is heavily influenced by the theory and practice of translation and language for specific purposes due to the multilingual and multicultural nature of the space in which technical communicators operate. Similarly, in countries like Ukraine and Russia, instruction...

  7. Transactional Distributed Shared Memory

    Science.gov (United States)

    1992-07-01

    consisted of Joshua Bloch, Dean Daniels, Richard Draves, Dan Duchamp , Jeffrey Eppinger, Elliot Jaffe, Toshihiko Kato, George Michaels, Lily Mummert, Randy...34 Non-blocking commit. The non-blocking commit protocol [LeLann 81, Duchamp 89] is a modification of two-phase commit to guarantee that at least one...Architecture, pages "*-442. IEEE, 1986. Computer Architecture News Volume 14 Number 2. [ Duchamp 89] Dan Duchamp . Transaction Management. PhD thesis, Carnegie

  8. IEEE Prize for Lucio Rossi

    CERN Multimedia

    IEEE Council on Superconductivity

    2007-01-01

    Lucio Rossi receives his prize from John Spargo, Chairman of the IEEE Council on Superconductivity (left), and Martin Nisenoff, Chairman of the Council on Superconductivity's Awards Committee (right).

  9. Transactional Memory

    CERN Document Server

    Harris, Tim; Rajwar, Ravi

    2010-01-01

    The advent of multicore processors has renewed interest in the idea of incorporating transactions into the programming model used to write parallel programs.This approach, known as transactional memory, offers an alternative, and hopefully better, way to coordinate concurrent threads. The ACI(atomicity, consistency, isolation) properties of transactions provide a foundation to ensure that concurrent reads and writes of shared data do not produce inconsistent or incorrect results. At a higher level, a computation wrapped in a transaction executes atomically - either it completes successfullyand

  10. Access to IEEE Electronic Library

    CERN Multimedia

    2007-01-01

    From 2007, the CERN Library now offers readers online access to the complete IEEE Electronic Library (Institute of Electrical and Electronics Engineers). This new licence gives unlimited online access to all IEEE and IET (previously IEE) journals and proceedings as well as all current IEEE standards and selected archived ones. Some of the titles offer volumes back to 1913. This service currently represents more than 1,400,000 full-text articles! This leading engineering information resource replaces the previous service, a sub-product of the IEEE database called 'IEEE Enterprise', which offered online access to the complete collection of IEEE journals and proceedings, but with limited features. The service had become so popular that the CERN Working Group for Acquisitions recommended that the Library subscribe to the complete IEEE Electronic Library for 2007. Usage statistics for recent months showed there was a demand for the service from a large community of CERN users and we were aware that many users h...

  11. IEEE transactions on vehicular technology, Vol. Vt-19, No. 1

    Science.gov (United States)

    1970-02-01

    This special issue deals not only with integrated electronic systems but with the technology that is required to achieve successful operation. To place some of the 1969 dimensions of the highway system in the United States in proper focus, we note th...

  12. Communicating Transactions

    Science.gov (United States)

    de Vries, Edsko; Koutavas, Vasileios; Hennessy, Matthew

    We propose a novel language construct called communicating transactions, obtained by dropping the isolation requirement from classical transactions, which can be used to model automatic error recovery in distributed systems. We extend CCS with this construct and give a simple semantics for the extended calculus, called TransCCS. We develop a behavioural theory which is sound and complete with respect to the may-testing preorder, and use it to prove interesting laws and reason compositionally about example systems. Finally, we prove that communicating transactions do not increase the observational power of processes; thus CCS equivalences are preserved in the extended language.

  13. IEEE Conference Publications in Libraries.

    Science.gov (United States)

    Johnson, Karl E.

    1984-01-01

    Conclusions of surveys (63 libraries, OCLC database, University of Rhode Island users) assessing handling of Institute of Electrical and Electronics Engineers (IEEE) conference publications indicate that most libraries fully catalog these publications using LC cataloging, and library patrons frequently require series access to publications. Eight…

  14. 2012 IEEE Vehicular Networking Conference (VNC)

    NARCIS (Netherlands)

    Altintas, Onur; Chen, Wai; Heijenk, Geert; Oh, Hyun Seo; Chung, Jong-Moon; Dressler, Falko; Kargl, Frank; Pau, Giovanni; Schoch, Elmar

    2012-01-01

    On behalf of the Organizing Committee, we would like to welcome you to the fourth edition of the IEEE Vehicular Networking Conference in Seoul, Korea. IEEE VNC is a unique conference sponsored by both IEEE Communications Society and Intelligent Transportation Systems Society. It brings together

  15. IEEE Prize for Lucio Rossi

    CERN Multimedia

    2007-01-01

    Lucio Rossi receives his prize from John Spargo, Chairman of the IEEE Council on Superconductivity (left), and Martin Nisenoff, Chairman of the Council on Superconductivity’s Awards Committee (right). (Photo: IEEE Council on Superconductivity)With the magnets installed in the tunnel and work on the interconnections almost completed, Lucio Rossi has reaped the rewards of fifteen years of work. And yet, when the physicist from Milan arrived to take charge of the group responsible for the superconducting magnets in 2001, success seemed far from assured. Endowed with surprising levels of energy, Lucio Rossi, together with his team, ensured that production of these highly complex magnets got underway. Today, that achievement earns them the recognition not only of CERN but also of the international superconducting community. It is for this achievement that Lucio Rossi was awarded the prize by the IEEE’s (Institute of Electrical an...

  16. Leasing transactions

    Directory of Open Access Journals (Sweden)

    Radmila Presová

    2010-01-01

    Full Text Available The paper describes trade operations in lea­sin­g companies as specific businesses enabling acquisition of possession by legal and physical persons by gradual repayments of the purchase price. On a diagram it shows the complexity of business relations between the main participants of a lea­sin­g transaction, which are production companies, lea­sin­g companies and those interested in the subject of lea­sin­g. To capture the complexity of relations, there are also included all other participants. Their function in a lea­sin­g transaction starts only at the moment, when the leaseholders are not able to pay their liabilities to which they agreed in the innominate contract. Paper clarifies the term “lea­sin­g with zero mark-up”. With the help of calculation it describes the basis of a lea­sin­g transaction, where significantly participates also the production company, insurance company and commercial bank. All these subjects have certain benefits from a realized transaction. These are enabled by their close business relationships with the lea­sin­g company, which is sufficiently clear from the diagram and it is also substantiated by calculations. Paper includes a definition of lea­sin­g operations, as well as a ma­the­ma­ti­cal model of lea­sin­g payments calculation for a car. A part of the paper is also dealing with a cession of a lea­sin­g contract in the person of a leaseholder as a specific case enforced by financial issues of the leaseholder. The paper elaborates alternatives of evaluating client’s bonding capacity with the help of financial indicators.

  17. IEEE WEA 2012 - Mejores Trabajos

    Directory of Open Access Journals (Sweden)

    Miguel Alberto Melgarejo Rey

    2013-06-01

    Full Text Available El 2012 Workshop on Engineering Applications (WEA 2012 realizado porla Facultad de Ingeniería de la Universidad Distrital Francisco José deCaldas y su rama estudiantil IEEE (Institute for Electrical and ElectronicsEngineers, del 2 al 4 de mayo de 2012, fue un espacio académico dondeconvergieron academia e industria alrededor de áreas tan diversas comoel control, las comunicaciones, la electrónica de potencia, el procesamientode señales entre otras .A pesar de ser la primera edición delWEA, esta se caracterizó por una nutrida participación, se recibieron 69artículos, 49 provenientes de Colombia y 20 de otros países.

  18. The IEEE Milestone event at CERN

    CERN Multimedia

    2005-01-01

    On the initiative of its French and Swiss Sections, the IEEE has honoured CERN with an 'IEEE Milestone in the history of electricity and electronics' for the invention of the multi-wire proportional chamber in 1968. The IEEE established the Electrical Engineering Milestones programe in 1983 to honour significant achievements in the history of electrical and electronics engineering. To be designated, an achievement must be at least 25 years old, must have involved a unique solution to an engineering problem, and must have had at least regional impact. Currently there are more than  50 IEEE Milestones around the world. http://www.ieee.org/organizations/history_center/cern.html The installation and unveiling of this IEEE Milestone will provide the opportunity to emphasize the close relationship between science, technology, industry and well-being in society.  A ceremony, organised with the support of a group of IEEE members working at CERN, will be held at the CERN Globe of Science and Inn...

  19. TCP over IEEE 802.11

    Directory of Open Access Journals (Sweden)

    P. Chenna Reddy

    2009-01-01

    Full Text Available IEEE 802.11 is a widely used wireless LAN standard for medium access control. TCP is a prominent transport protocol originally designed for wired networks. TCP treats packet loss as congestion and reduces the data rate. In wireless networks packets are lost not only due to congestion but also due to various other reasons. Hence there is need for making TCP adaptable to wireless networks. Various parameters of TCP and IEEE 802.11 can be set to appropriate values to achieve optimum performance results. In this paper optimum values for various parameters of IEEE 802.11 are determined. Network simulator NS2 is used for simulation.

  20. CERN receives prestigious Milestone recognition from IEEE

    CERN Multimedia

    2005-01-01

    At a ceremony at CERN, Mr W. Cleon Anderson, President of the Institute of Electrical and Electronics Engineers (IEEE) formally a Milestone plaque in recognition of the invention of electronic particle detectors at CERN

  1. Design, Verification and Application of IEEE 1687

    OpenAIRE

    Ghani Zadegan, Farrokh; Larsson, Erik; Jutman, Artur; Devadze, Sergei; Krenz-Baath, René

    2014-01-01

    IEEE 1687 (IJTAG) has been developed to enable flexible and automated access to the increasing number of embedded instruments in today's integrated circuits. These instruments enable efficient post-silicon validation, debugging, wafer sort, package test, burn-in, bring-up and manufacturing test of printed circuit board assemblies, power-on self-test, and in-field test. Current paper presents an overview of challenges as well as selected examples in the following topics around IEEE 1687 ne...

  2. Managerial accounting for transaction costs

    OpenAIRE

    Лабынцев, Николай Тихонович

    2015-01-01

    Essence and significance of transaction accounting and its basic concepts – transaction and transaction costs – have been determined. Main types of transaction costs and elements of transaction accounting for expenses have been considered. Source documents forms for the purpose of accounting for transaction costs have been worked out.

  3. IEEE International Symposium on Biomedical Imaging.

    Science.gov (United States)

    2017-01-01

    The IEEE International Symposium on Biomedical Imaging (ISBI) is a scientific conference dedicated to mathematical, algorithmic, and computational aspects of biological and biomedical imaging, across all scales of observation. It fosters knowledge transfer among different imaging communities and contributes to an integrative approach to biomedical imaging. ISBI is a joint initiative from the IEEE Signal Processing Society (SPS) and the IEEE Engineering in Medicine and Biology Society (EMBS). The 2018 meeting will include tutorials, and a scientific program composed of plenary talks, invited special sessions, challenges, as well as oral and poster presentations of peer-reviewed papers. High-quality papers are requested containing original contributions to the topics of interest including image formation and reconstruction, computational and statistical image processing and analysis, dynamic imaging, visualization, image quality assessment, and physical, biological, and statistical modeling. Accepted 4-page regular papers will be published in the symposium proceedings published by IEEE and included in IEEE Xplore. To encourage attendance by a broader audience of imaging scientists and offer additional presentation opportunities, ISBI 2018 will continue to have a second track featuring posters selected from 1-page abstract submissions without subsequent archival publication.

  4. Vessel Operating Units (Vessels)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains data for vessels that are greater than five net tons and have a current US Coast Guard documentation number. Beginning in1979, the NMFS...

  5. CERN receives prestigious Milestone recognition from IEEE

    CERN Multimedia

    2005-01-01

    The Nobel prize winner Georges Charpak and W. Cleon Anderson, IEEE President, unveil the Milestone bronze plaques. At a ceremony on 26 September at the Globe of Science and Innovation, Mr W. Cleon Anderson, President of the Institute of Electrical and Electronics Engineers (IEEE) formally dedicated Milestone plaques recognising the invention of electronic particle detectors at CERN. The plaque were unveiled by Mr Anderson and Georges Charpak, the Nobel-prize winning inventor of wire chamber technology at CERN in 1968. The IEEE is the world's largest professional association dedicated to the advancement of technology with 365,000 individual members in over 150 countries. Established in 1983, there are currently over 60 Milestones around the world. They honour momentous achievements in the history of electrical and electronics engineering, such as the landing of the first transatlantic cable, code breaking at Bletchley Park during World War II, and the development of the Japanese Bullet train, the Tokaido Shin...

  6. High Availability Transactions

    OpenAIRE

    Kolltveit, Heine

    2005-01-01

    This thesis presents a framework of a passively replicated transaction manager. By integrating transactions and replication, two well known fault tolerance techniques, the framework provides high availability for transactional systems and better support for non-deterministic execution for replicated systems. A prototype Java implementation of the framework, based on Jgroup/ARM and Jini, has been developed and performance tests have been executed. The results indicate that the response time fo...

  7. The IEEE Software Engineering Standards Process

    Science.gov (United States)

    Buckley, Fletcher J.

    1984-01-01

    Software Engineering has emerged as a field in recent years, and those involved increasingly recognize the need for standards. As a result, members of the Institute of Electrical and Electronics Engineers (IEEE) formed a subcommittee to develop these standards. This paper discusses the ongoing standards development, and associated efforts.

  8. IEEE Standard for Floating Point Numbers

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 21; Issue 1. IEEE Standard for Floating Point Numbers. V Rajaraman. General Article Volume 21 Issue 1 January 2016 pp 11-30. Fulltext. Click here to view fulltext PDF. Permanent link: http://www.ias.ac.in/article/fulltext/reso/021/01/0011-0030. Keywords.

  9. The IEEE 802.11a standards

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. The IEEE 802.11a standards. Provides higher data rate and system capacities and uses OFDM in Physical Layer to mitigate the multi path effects;. Supports multiple 20Mhz channel. Each channel being an OFDM Modulated;; 52 Carriers. 48 data carrier; 4 Carry pilot ...

  10. Integrity in Transactional Leadership

    Science.gov (United States)

    Miller, Thomas

    2011-01-01

    This chapter begins with a discussion of the impact of limited resources on the integrity of transactions between students and student affairs administrators. A framework and guiding principles for maintaining integrity are offered, and then some general principles for transactions with students are presented. Next, the chapter involves integrity…

  11. Networks and transaction costs

    DEFF Research Database (Denmark)

    Henning, Christian H.C.A.; Henningsen, Geraldine; Henningsen, Arne

    -multiple output stochastic Ray production function to generate relative shadow prices of three inputs and two outputs traded by farms. At a second stage a structural equation system is derived from the first order conditions of farm’s profit maximization to estimate simultaneously the of commodity specific...... transaction cost functions for all traded farm inputs and outputs. Estimation results based on a sample of 315 Polish farms imply a significant influence of social network structures on farm’s transaction costs. Moreover, estimated transaction costs correspond to a reasonable amount of farm specific shadow...... prices....

  12. Bitcoin Transaction Graph Analysis

    OpenAIRE

    Fleder, Michael; Kester, Michael S; Pillai, Sudeep

    2015-01-01

    Bitcoins have recently become an increasingly popular cryptocurrency through which users trade electronically and more anonymously than via traditional electronic transfers. Bitcoin's design keeps all transactions in a public ledger. The sender and receiver for each transaction are identified only by cryptographic public-key ids. This leads to a common misconception that it inherently provides anonymous use. While Bitcoin's presumed anonymity offers new avenues for commerce, several recent st...

  13. Valuation of Transactive Systems

    Energy Technology Data Exchange (ETDEWEB)

    Hammerstrom, Donald J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Corbin, Charles D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Fernandez, Nicholas [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Homer, Juliet S. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Makhmalbaf, Atefe [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Pratt, Robert G. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Somani, Abhishek [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Gilbert, Erik I. [Navigant Consulting, Boulder, CO (United States); Chandler, Shawn [Navigant Consulting, Portland, OR (United States); Shandross, Richard [Navigant Consulting, Burlington, MA (United States)

    2016-05-12

    This is a final report from a project funded by the U.S. Department of Energy to formulate and test a methodology for valuation of systems where transaction-based mechanisms coordinate the exchange of value between the system’s actors. Today, the principal commodity being exchanged is electrical energy, and such mechanisms are called transactive energy systems. The authors strove to lay a foundation for meaningful valuations of transactive systems in general, and transactive energy systems as a special case. The word valuation is used in many different ways. This report proposes a valuation methodology that is inclusive of many types of valuations. Many will be familiar with cost-benefit valuations, in which both costs and benefits are assessed to determine whether the assets are worth their cost. Another set of valuation methods attempt to optimize an outcome using available resources, as is the case with integrated resource planning. In the end, this report’s methodology was most influenced by and most resembles the integrated-resource-planning approach. Regardless, we wish to enforce the premise that all valuations are comparative and should clearly specify a baseline scenario. A long, annotated list of prior valuation studies and valuation methodologies that influenced this report has been appended to this report. Much research is being conducted today concerning transactive systems, but only a handful of transactive system mechanisms have been formulated and field tested. They are found to be quite diverse, and the documentation of the various mechanisms is uneven in breadth and quality. It is therefore not adequate to simply assert that a valuation scenario includes a transactive system; certain characteristics and qualities of the chosen transactive system mechanism must be defined and stated. The report lists and discusses most of the known transactive system mechanisms. It offers a set of questions that may be used to help specify important

  14. Transactional Network Platform: Applications

    Energy Technology Data Exchange (ETDEWEB)

    Katipamula, Srinivas; Lutes, Robert G.; Ngo, Hung; Underhill, Ronald M.

    2013-10-31

    In FY13, Pacific Northwest National Laboratory (PNNL) with funding from the Department of Energy’s (DOE’s) Building Technologies Office (BTO) designed, prototyped and tested a transactional network platform to support energy, operational and financial transactions between any networked entities (equipment, organizations, buildings, grid, etc.). Initially, in FY13, the concept demonstrated transactions between packaged rooftop air conditioners and heat pump units (RTUs) and the electric grid using applications or "agents" that reside on the platform, on the equipment, on a local building controller or in the Cloud. The transactional network project is a multi-lab effort with Oakridge National Laboratory (ORNL) and Lawrence Berkeley National Laboratory (LBNL) also contributing to the effort. PNNL coordinated the project and also was responsible for the development of the transactional network (TN) platform and three different applications associated with RTUs. This document describes two applications or "agents" in details, and also summarizes the platform. The TN platform details are described in another companion document.

  15. Resources and Transaction Costs

    DEFF Research Database (Denmark)

    Foss, Kirsten; Foss, Nicolai Juul

    2004-01-01

    resources depends on the propertyrights that she holds to those resources and on the transaction costs of exchanging,defining and protecting the relevant property rights. While transaction costs aremajor sources of value dissipation, value may be created by reducing suchdissipation. Implications for the RBV......AbstractThe economics of property rights furthers the resource-based view in a number ofways. Resource analysis is refined by conceptualizing resources as composed ofmultiple attributes to which property rights may be held. A resource owner's abilityto create, appropriate and sustain value from...

  16. Resources and transaction costs

    DEFF Research Database (Denmark)

    Foss, Kirsten; Foss, Nicolai Juul

    2005-01-01

    from resources depends on the property rights that he or she holds and on the transaction costs of exchanging, defining, and protecting them. While transaction costs are a major source of value dissipation, reducing such dissipation may create value. Implications for the RBV analysis of sustained......Property rights economics furthers the resource-based view of strategic management in a number of ways. First, resources are conceptualized as being composed of multiple attributes for which property rights may be held. Second, a resource owner's ability to create, appropriate, and sustain value...

  17. Value and Transaction Costs

    DEFF Research Database (Denmark)

    Foss, Kirsten; Foss, Nicolai Juul

    2003-01-01

    and capturing propertyrights. We clarify the key role of transaction costs with respect to understandingvalue creation and the limitations and opportunities of strategizing relative tocompetitive forces. The economics of property rights identifies new sources ofvalue creation (i.e., reducing the dissipation......AbstractWe forge linkages between the economics of property rights (Coase, Demsetz,Cheung, Barzel) and strategic management. Property rights to resources consistof the rights to consume, obtain income from, and alienate these resources.Transaction costs are the costs of exchanging, protecting...

  18. Networks and Transaction Costs

    OpenAIRE

    Henning, Christian; Henningsen, Geraldine; Henningsen, Arne

    2011-01-01

    Based on the well-known fact that social networks can provide effective mechanisms that help to increase the trust level between two trade partners, we apply a simple game-theoretical framework to derive transaction costs as a high risk of opportunistic behavior in a repeated trade relation determined by the density and size of trading networks. In the empirical part of the paper we apply a two stage procedure to estimate the impact of social network structures on farm’s transaction costs obs...

  19. 7th IEEE International Conference Intelligent Systems

    CERN Document Server

    Atanassov, KT; Doukovska, L; Hadjiski, M; Jotsov, V; Kacprzyk, J; Kasabov, N; Sotirov, S; Szmidt, E; Zadrożny, S; Filev, D; Jabłkowski, J; Kacprzyk, J; Krawczak, M; Popchev, I; Rutkowski, L; Sgurev, V; Sotirova, E; Szynkarczyk, P

    2015-01-01

    This two volume set of books constitutes the proceedings of the 2014  7th IEEE International Conference Intelligent Systems (IS), or IEEE IS’2014 for short, held on September 24‐26, 2014 in Warsaw, Poland. Moreover, it contains some selected papers from the collocated IWIFSGN'2014-Thirteenth International Workshop on Intuitionistic Fuzzy Sets and Generalized Nets.The conference was organized by the Systems Research Institute, Polish Academy of Sciences, Department IV of Engineering Sciences, Polish Academy of Sciences, and Industrial Institute of Automation and Measurements - PIAP.The papers included in the two proceedings volumes have been subject to a thorough review process by three highly qualified peer reviewers.Comments and suggestions from them have considerable helped improve the quality of the papers but also the division of the volumes into parts, and assignment of the papers to the best suited parts.  

  20. Utterance Generation for Transaction Dialogues

    NARCIS (Netherlands)

    Hulstijn, J.; van Hessen, Adrianus J.

    1998-01-01

    This paper discusses the utterance generation module of a spoken dialogue system for transactions. Transactions are interesting because they involve obligations of both parties: the system should provide all relevant information; the user should feel committed to the transaction once it has been

  1. IEEE Standard Dictionary of Electrical and Electronics Terms.

    Science.gov (United States)

    Institute of Electrical and Electronics Engineers, Inc., New York, NY.

    This dictionary, prepared by the Institute of Electrical and Electronics Engineers, Inc. (IEEE), defines 13,000 technical words from every area of electrical and electronics engineering. The dictionary contains hundreds of new terms as well as revisions of earlier ones. Each definition is an official standard of IEEE. The definitions are arranged…

  2. IEEE International Workshop on Machine Learning for Signal Processing: Preface

    DEFF Research Database (Denmark)

    Tao, Jianhua

    The 21st IEEE International Workshop on Machine Learning for Signal Processing will be held in Beijing, China, on September 18–21, 2011. The workshop series is the major annual technical event of the IEEE Signal Processing Society's Technical Committee on Machine Learning for Signal Processing...

  3. Modelling Real Property Transactions

    DEFF Research Database (Denmark)

    Stubkjær, Erik

    2003-01-01

    Der er store forskelle i financieringsomkostningerne ved hussalg i forskellige lande. Er disse forskelle nødvendige? og kan udgifterne reduceres? Sådanne spørgsmål søger forskningsprojektet ?Modelling Real Property Transactions?, officielt sat i værk indenfor rammerne af COST (European Co...

  4. 5. Cash Transactions

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 4. Electronic Commerce-Cash Transactions. V Rajaraman. Series Article Volume 6 Issue 4 April 2001 pp 8-14. Fulltext. Click here to view fulltext PDF. Permanent link: http://www.ias.ac.in/article/fulltext/reso/006/04/0008-0014. Author Affiliations.

  5. Proceedings of IEEE Machine Learning for Signal Processing Workshop XV

    DEFF Research Database (Denmark)

    Larsen, Jan

    These proceedings contains refereed papers presented at the Fifteenth IEEE Workshop on Machine Learning for Signal Processing (MLSP’2005), held in Mystic, Connecticut, USA, September 28-30, 2005. This is a continuation of the IEEE Workshops on Neural Networks for Signal Processing (NNSP) organized...... by the NNSP Technical Committee of the IEEE Signal Processing Society. The name of the Technical Committee, hence of the Workshop, was changed to Machine Learning for Signal Processing in September 2003 to better reflect the areas represented by the Technical Committee. The conference is organized...... by the Machine Learning for Signal Processing Technical Committee with sponsorship of the IEEE Signal Processing Society. Following the practice started two years ago, the bound volume of the proceedings is going to be published by IEEE following the Workshop, and we are pleased to offer to conference attendees...

  6. Transaction based approach

    Science.gov (United States)

    Hunka, Frantisek; Matula, Jiri

    2017-07-01

    Transaction based approach is utilized in some methodologies in business process modeling. Essential parts of these transactions are human beings. The notion of agent or actor role is usually used for them. The paper on a particular example describes possibilities of Design Engineering Methodology for Organizations (DEMO) and Resource-Event-Agent (REA) methodology. Whereas the DEMO methodology can be regarded as a generic methodology having its foundation in the theory of Enterprise Ontology the REA methodology is regarded as the domain specific methodology and has its origin in accountancy systems. The results of these approaches is that the DEMO methodology captures everything that happens in the reality with a good empirical evidence whereas the REA methodology captures only changes connected with economic events. Economic events represent either change of the property rights to economic resource or consumption or production of economic resources. This results from the essence of economic events and their connection to economic resources.

  7. RELATED PARTY TRANSACTIONS - OVERVIEW

    OpenAIRE

    Alexandra Corlaciu; Adriana Tiron Tudor

    2011-01-01

    The purpose of the present investigation is to provide a short overview of themain implications arising from carrying related parties transactions: accounting reporting(related party disclosures - IAS 24), auditing (audit procedures for related partytransactions), taxation (issues regarding the transfer prices used for intra-grouptransactions). Although this research does not identify a problem with the scope to solve ithowever the utility might be observed by its contribution to the future d...

  8. IEEE 802.11s Analysis And Simulation

    OpenAIRE

    Alfonso Delgado, Diego

    2015-01-01

    [ANGLÈS] Simulation of wifi networks using ieee802.11s to collect data and help to develop this new standard. [CASTELLÀ] Simulacion de redes wifi usando el protocolo ieee802.11s para recopilar datos y estadisticas que ayuden en el desarrollo de este nuevo estandar. [CATALÀ] Simulació de xarxes wifi usant el protocol ieee802.11s per recopilar dades i estadístiques que ajudin en el desenvolupament d'aquest nou estàndard.

  9. Research vessels

    Digital Repository Service at National Institute of Oceanography (India)

    Rao, P.S.

    by the research vessels RV Gaveshani and ORV Sagar Kanya are reported. The work carried out by the three charted ships is also recorded. A short note on cruise plans for the study of ferromanganese nodules is added...

  10. Memory Abstractions for Data Transactions

    OpenAIRE

    Herman, Nathaniel

    2015-01-01

    This thesis presents STO, a software transactional memory (STM) based not on low-level reads and writes on memory, but on datatypes—arrays, lists, queues, hash tables, and so forth—that explicitly support transactional operations. Conventional STMs allow programmers to write concurrent code in much the same way as sequential code—thereby more easily taking advantage of multiple CPU cores. However, these conventional STMs track every memory word accessed during a transaction, so even simple op...

  11. Utterance Generation for Transaction Dialogues

    OpenAIRE

    Hulstijn, J.; van Hessen, Adrianus J.

    1998-01-01

    This paper discusses the utterance generation module of a spoken dialogue system for transactions. Transactions are interesting because they involve obligations of both parties: the system should provide all relevant information; the user should feel committed to the transaction once it has been concluded. Utterance generation plays a major role in this. The utterance generation module works with prosodically annotated utterance templates. An appropriate template for a given dialogue act is s...

  12. Inventory Dynamics under Transaction Costs

    OpenAIRE

    Jean-Paul Chavas; Paula M. Despins; T. Randy Fortenbery

    2000-01-01

    A conceptual model of storage behavior is developed. Optimal intertemporal pricing is derived to analyze the effects of transaction costs on storage andarbitrage pricing. It is shown how transaction costs can rationalize the existence of an inverse carrying charge for inventory. The model is applied to U.S. soybeans stocks for the period 1960–95. The empirical results suggest that transaction costs have a significant influence on storage behavior andintertemporal arbitrage pricing. Copyright ...

  13. IEEE International Workshop on Machine Learning for Signal Processing: Preface

    DEFF Research Database (Denmark)

    Tao, Jianhua

    The 21st IEEE International Workshop on Machine Learning for Signal Processing will be held in Beijing, China, on September 18–21, 2011. The workshop series is the major annual technical event of the IEEE Signal Processing Society's Technical Committee on Machine Learning for Signal Processing....... This year the workshop is held in the National Laboratory of Pattern Recognition (NLPR), Institute of Automation, Chinese Academy of Sciences....

  14. Anonymous publication of sensitive transactional data

    KAUST Repository

    Ghinita, Gabriel

    2011-02-01

    Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and ℓ-diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low dimensionality. Nevertheless, certain applications require privacy-preserving publishing of transactional data (or basket data), which involve hundreds or even thousands of dimensions, rendering existing methods unusable. We propose two categories of novel anonymization methods for sparse high-dimensional data. The first category is based on approximate nearest-neighbor (NN) search in high-dimensional spaces, which is efficiently performed through locality-sensitive hashing (LSH). In the second category, we propose two data transformations that capture the correlation in the underlying data: 1) reduction to a band matrix and 2) Gray encoding-based sorting. These representations facilitate the formation of anonymized groups with low information loss, through an efficient linear-time heuristic. We show experimentally, using real-life data sets, that all our methods clearly outperform existing state of the art. Among the proposed techniques, NN-search yields superior data utility compared to the band matrix transformation, but incurs higher computational overhead. The data transformation based on Gray code sorting performs best in terms of both data utility and execution time. © 2006 IEEE.

  15. Synergistic Use of IEEE and IEC Nuclear Power Plant Standards

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, G

    2001-12-19

    Many organizations worldwide develop standards that affect nuclear instrumentation and control (I and C). Two of the primary standards organizations are the US IEEE's Nuclear Power Engineering Committee (NPEC), and the IEC subcommittee on Reactor Instrumentation (SC45A). This paper surveys the contents of the two sets of standards. Opportunities for complementary use of IEEE and IEC standards are discussed. The collections of IEEE. and IEC standards have some overlap, but in many cases cover significantly different topics. For example, IEEE standards go to great depth on environmental qualification of many specific types of components, while IEC covers the topic only at the general level. Conversely, certain IEC standards deal with specific instrumentation and control functions, a topic area where IEEE standards are largely mute. This paper considers how the two sets of standards may be used in a complementary fashion to achieve broader topic coverage than is possible using only one or the other standard suite. To understand the similarities and differences between IEC and IEEE nuclear standards layer diagrams were developed for each set of standards. Another paper [Johnson, 2001] used the same layer diagrams to investigate where coordination between the two sets of standards is most critical.

  16. Fluid dynamics transactions

    CERN Document Server

    Fiszdon, W

    1965-01-01

    Fluid Dynamics Transactions, Volume 2 compiles 46 papers on fluid dynamics, a subdiscipline of fluid mechanics that deals with fluid flow. The topics discussed in this book include developments in interference theory for aeronautical applications; diffusion from sources in a turbulent boundary layer; unsteady motion of a finite wing span in a compressible medium; and wall pressure covariance and comparison with experiment. The certain classes of non-stationary axially symmetric flows in magneto-gas-dynamics; description of the phenomenon of secondary flows in curved channels by means of co

  17. Delay Analysis of GTS Bridging between IEEE 802.15.4 and IEEE 802.11 Networks for Healthcare Applications.

    Science.gov (United States)

    Misić, Jelena; Sherman Shen, Xuemin

    2009-01-01

    We consider interconnection of IEEE 802.15.4 beacon-enabled network cluster with IEEE 802.11b network. This scenario is important in healthcare applications where IEEE 802.15.4 nodes comprise patient's body area network (BAN) and are involved in sensing some health-related data. BAN nodes have very short communication range in order to avoid harming patient's health and save energy. Sensed data needs to be transmitted to an access point in the ward room using wireless technology with higher transmission range and rate such as IEEE 802.11b. We model the interconnected network where IEEE 802.15.4-based BAN operates in guaranteed time slot (GTS) mode, and IEEE 802.11b part of the bridge conveys GTS superframe to the 802.11b access point. We then analyze the network delays. Performance analysis is performed using EKG traffic from continuous telemetry, and we discuss the delays of communication due the increasing number of patients.

  18. Simulasi Kinerja Jaringan Nirkabel IEEE-802.11a dan IEEE-802.11g Menggunakan NS-2

    Directory of Open Access Journals (Sweden)

    Helm Fitriawan

    2014-03-01

    Full Text Available Wireless network uses transmission media based on radio waves. This type of networks is mainly useddue to its efficiency and mobility in data exchanging. This paper reports the modeling and simulation of wirelessnetworks based on Cisco Aironet 1130ag access point devices with IEEE 802.11a and IEEE 802.11g standards. Themodeling and simulation are performed using network simulator version 2 (NS-2 that is installed on operationsystem Linux Ubuntu v.10.10. The NS-2 is commonly used and works well in numerous types of network simulation. From simulation, we obtain quality of service parameters by employing several simulation scenarios in terms ofnumber of nodes, distances, and packet data sizes. It can be concluded from simulation results that the IEEE 802.11gnetworks transfer data with better quality than those of IEEE 802.11a networks.  Furthermore, the IEEE 802.11gnetworks provide a higher throughput, with smaller amount of delay and packet loss percentage compared to thoseof IEEE 802.11a networks.

  19. FINANCING OF INTERNATIONAL TRANSACTIONS

    Directory of Open Access Journals (Sweden)

    RADU NICOLAE BĂLUNĂ

    2013-02-01

    Full Text Available Financing (funding is essentially the purchase of funds necessary for a business. This can be done from internal sources (company’s own funds or external (borrowed funds. The high value of goods traded in international trade makes revenues generated from internal resources not sufficient to settle the value of the goods. Thus, it is frequent to resort to borrowed funds. In International Business Transactions, external financing is done both by classical techniques of credit (credit supplier and buyer credit and modern techniques of financing (factoring, forfeiting, leasing all trade tailored. In terms of the length of financing, accounting funding is short-term (1-12 months and long-term financing (over a year. In principle, export and import operations prevailing short-term financing techniques, while international investment and industrial cooperation actions are specific long-term funding

  20. Implicit Block ACK Scheme for IEEE 802.11 WLANs

    Science.gov (United States)

    Sthapit, Pranesh; Pyun, Jae-Young

    2016-01-01

    The throughput of IEEE 802.11 standard is significantly bounded by the associated Medium Access Control (MAC) overhead. Because of the overhead, an upper limit exists for throughput, which is bounded, including situations where data rates are extremely high. Therefore, an overhead reduction is necessary to achieve higher throughput. The IEEE 802.11e amendment introduced the block ACK mechanism, to reduce the number of control messages in MAC. Although the block ACK scheme greatly reduces overhead, further improvements are possible. In this letter, we propose an implicit block ACK method that further reduces the overhead associated with IEEE 802.11e’s block ACK scheme. The mathematical analysis results are presented for both the original protocol and the proposed scheme. A performance improvement of greater than 10% was achieved with the proposed implementation.

  1. Introduction to IEEE P1900.4 Activities

    Science.gov (United States)

    Buljore, Soodesh; Muck, Markus; Martigne, Patricia; Houzé, Paul; Harada, Hiroshi; Ishizu, Kentaro; Holland, Oliver; Mihailovic, Andrej; Tsagkaris, Kostas A.; Sallent, Oriol; Clemo, Gary; Sooriyabandara, Mahesh; Ivanov, Vladimir; Nolte, Klaus; Stametalos, Makis

    The Project Authorization Request (PAR) for the IEEE P1900.4 Working Group (WG), under the IEEE Standards Coordinating Committee 41 (SCC41) was approved in December 2006, leading to this WG being officially launched in February 2007 [1]. The scope of this standard is to devise a functional architecture comprising building blocks to enable coordinated network-device distributed decision making, with the goal of aiding the optimization of radio resource usage, including spectrum access control, in heterogeneous wireless access networks. This paper introduces the activities and work under progress in IEEE P1900.4, including its scope and purpose in Sects. 1 and 2, the reference usage scenarios where the standard would be applicable in Sect. 4, and its current system architecture in Sect. 5.

  2. IEEE prize awarded to CERN PhD student

    CERN Multimedia

    2006-01-01

    Rafael Ballabriga Suñe is the recipient of the 2006 Institute of Electrical and Electronics Engineers, Inc. (IEEE) Nuclear and Plasma Sciences Society (NPSS)'s Student Paper Award. Ballabriga's winning paper reported on a prototype chip, which belongs to a new generation of single photon counting hybrid pixel detector readout chips - Medipix3. The award was presented by the deputy programme chair Vince Cianciolo (left) at the IEEE Nuclear Science Symposium held in San Diego on 29 October to 4 November.

  3. 28 CFR 80.3 - Transaction.

    Science.gov (United States)

    2010-07-01

    ... made prior to the requestor's commitment to proceed with a transaction. ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Transaction. 80.3 Section 80.3 Judicial... Transaction. The entire transaction which is the subject of the request must be an actual—not a hypothetical...

  4. Principles of Transactional Memory The Theory

    CERN Document Server

    Guerraoui, Rachid

    2010-01-01

    Transactional memory (TM) is an appealing paradigm for concurrent programming on shared memory architectures. With a TM, threads of an application communicate, and synchronize their actions, via in-memory transactions. Each transaction can perform any number of operations on shared data, and then either commit or abort. When the transaction commits, the effects of all its operations become immediately visible to other transactions; when it aborts, however, those effects are entirely discarded. Transactions are atomic: programmers get the illusion that every transaction executes all its operati

  5. Micro-transactions for concurrent data structures

    DEFF Research Database (Denmark)

    Meawad, Fadi; Iyer, Karthik; Schoeberl, Martin

    2013-01-01

    implementation of transactional memory that we call micro-transactions. In particular, we argue that hardware support for micro-transactions allows us to efficiently implement certain data structures. Those data structures are difficult to realize with the atomic operations provided by stock hardware and provide......, atomic instructions, and micro-transactions. Our results suggest that transactional memory is an interesting alternative to traditional concurrency control mechanisms....

  6. Guía para citar y referenciar. Estilo IEEE

    OpenAIRE

    Ruiz de Luzuriaga Peña, Manuel

    2016-01-01

    Esta guía ha sido redactada para uso de los alumnos de la Universidad Pública de Navarra en la redacción de sus trabajos académicos, siguiendo las pautas de IEEE Edition Style Guide y, para algunos aspectos no contemplados en esa obra, de la Guía para citar y referenciar APA Style.

  7. 2011 IEEE Vehicular Networking Conference (VNC): Demo Summaries

    NARCIS (Netherlands)

    Altintas, O.; Chen, W.; Heijenk, Geert; Dressler, F.; Ekici, E.; Kargl, Frank; Shigeno, H.; Dietzel, Stefan

    2011-01-01

    Foreword For the first time in its history, IEEE VNC has included this year’s demonstrations in its program. Demonstrations play an important role to expose the research community to practical aspects of research and to foster cross-fertilization among researchers both in academia and in industry.

  8. Eleanor McElwee and the Formation of IEEE PCS

    Science.gov (United States)

    Malone, Edward A.

    2015-01-01

    This article examines the historical professional project that created the Institute of Radio Engineers' Professional Group on Engineering Writing an Speech (IRE PGEWS)--now called the Institute of Electrical and Electronics Engineers' Professional Communication Society (IEEE PCS)--and recounts the group's early history in detail. It also traces…

  9. Specialty and Systems Engineering Supplement to IEEE 15288.1

    Science.gov (United States)

    2017-08-28

    SYSTEMS CENTER TAILORING SPECIALTY AND SYSTEMS ENGINEERING SUPPLEMENT TO IEEE-15288.1 APPROVED FOR PUBLIC...document) also published as SMC-T-006 (2017) (1) Changed title from “Specialty Engineering Supplement…” to “Specialty and Systems Engineering ... systems engineering tailoring (2) Provides document history (3) Documented current status of documents and added reference to adoption notices.

  10. Transaction Cost and Activity of Economic Agents

    Directory of Open Access Journals (Sweden)

    Ivan D. Kotliarov

    2017-03-01

    Full Text Available The goal of the present paper is to clarify the role of transaction cost for existence of an economic agent. It is demonstrated that the opposition of transaction cost and transformation cost is not rigid and there are costs that contain both transaction and transformation component. In addition the amount of transaction cost depends on parameters of company’s activity. This is why it is hardly possible to find the precise minimum of transaction cost and the model of organization of transactions within firm will be flexible. The firm’s structure contains special transaction divisions (centers of transaction cost that are necessary for existence of the firm as a mechanism of organization of transactions (opposed to market. The status of these divisions depends on firm’s size. Transaction divisions can also exist outside the firm. They will minimize transaction costs of other economic agents on the basis of external effect of scale. External transaction divisions can exist both as collective structures (coordinating centers of strategic alliances as well as independent ones (franchisors. A comparative analysis of transaction divisions and centers of cost was done. It was demonstrated that these elements of the firm have different economic and organizational structure. The notion of cost of external profitability was introduced. This notion can be used to analyze reasons for merger of companies or for their existence as independent structures. It is demonstrated that one of the functions of the firm is to use resources that cannot be used within independent production units.

  11. HTML thin client and transactions

    CERN Document Server

    Touchette, J F

    1999-01-01

    When writing applications for thin clients such as Web browsers, you face several challenges that do not exist with fat-client applications written in Visual Basic, Delphi, or Java. For one thing, your development tools do not include facilities for automatically building reliable, nonrepeatable transactions into applications. Consequently, you must devise your own techniques to prevent users from transmitting duplicate transactions. The author explains how to implement reliable, nonrepeatable transactions using a technique that is applicable to any Java Server Development Kit based architecture. Although the examples presented are based on the IBM WebSphere 2.1 Application Server, they do not make use of any IBM WebSphere extensions. In short, the concepts presented here can be implemented in Perl CGI and ASP scripts, and the sample code has been tested with JDK 1.1.6 and 1.2. (0 refs).

  12. Proceedings of IEEE Machine Learning for Signal Processing Workshop XVI

    DEFF Research Database (Denmark)

    Larsen, Jan

    These proceedings contains refereed papers presented at the sixteenth IEEE Workshop on Machine Learning for Signal Processing (MLSP'2006), held in Maynooth, Co. Kildare, Ireland, September 6-8, 2006. This is a continuation of the IEEE Workshops on Neural Networks for Signal Processing (NNSP......). The name of the Technical Committee, hence of the Workshop, was changed to Machine Learning for Signal Processing in September 2003 to better reflect the areas represented by the Technical Committee. The conference is organized by the Machine Learning for Signal Processing Technical Committee...... the same standard as the printed version and facilitates the reading and searching of the papers. The field of machine learning has matured considerably in both methodology and real-world application domains and has become particularly important for solution of problems in signal processing. As reflected...

  13. IEEE prize awarded to CERN PhD student

    CERN Multimedia

    2006-01-01

    Rafael Ballabriga Suñe (right) receives the Student Paper Award. Rafael Ballabriga Suñe is the recipient of the 2006 Institute of Electrical and Electronics Engineers, Inc. (IEEE) Nuclear and Plasma Sciences Society (NPSS)'s Student Paper Award. Ballabriga's winning paper reported on a prototype chip, which belongs to a new generation of single photon counting hybrid pixel detector readout chips - Medipix3. The NPSS established this award in 2005 to encourage outstanding student contributions and greater student participation as principle or sole authors of papers. The prizes were presented at the IEEE Nuclear Science Symposium held in San Diego on 29 October to 4 November. The prototype chip was designed by Ballabriga based on ideas generated within the CERN Medipix team - part of the PH Microelectronics group. It could be used in various fields in the future, including medical imaging, neutron imaging, electron microscopy, radiation monitoring and other applications in high-energy physics. The novel aspe...

  14. Remedial transactions curtailment via optimization

    Directory of Open Access Journals (Sweden)

    Maksimović Viktor

    2009-01-01

    Full Text Available The new method developed in this paper is aiming at transmission congestion management (CM. The new, Optimal Transactions Management method (OTM, is based on linear programming (LP, DC load flow (DCLF and linear security constraints. The OTM method is embedded in Available Transfer Capabilities (ATCs and Power Transfer Distribution Factors (PTDFs definitions' environment. Well-suited for both preventive and corrective modes of operation, the OTM method aids transmission system operator in running a congested power system network, where congestions are due to transactions. Potential congestion threat is solved by finding the 'culprit' transaction and its optimal reduction. Besides the proposed downsizing of scheduled and/or committed transactions, controls of the OTM method also include redispatching of generation and load levels. The task is to establish a system state without constraint violations. To ensure the feasible network solution, both DC and AC power flows are used. The common 5 nodes/7 lines Ward&Hale sample power system is used to clarify the OTM method. Besides, six other power system networks including the real-life power system network of Serbia, Macedonia and Montenegro (part of the South East Europe - SEE grid are used to test remedial potentials and CPU-time performances of the method. The 24-hour daily demand diagram is used with all test networks to study the effects of transactions as they are being superimposed to the regional grid. The remedial, transactions-curtailing OTM method is found well suited for market-related analyses precluding the hour-ahead, the day-ahead dispatch, as well as the real-time generation dispatch. It could also suit for the novel, Day Ahead Congestion Forecast (DACF procedure used in power markets. .

  15. Scheduling strategies and throughput optimization for the Downlink for IEEE 802.11ax and IEEE 802.11ac based networks

    OpenAIRE

    Sharon, Oran; Alpert, Yaron

    2017-01-01

    The new IEEE 802.11 standard, IEEE 802.11ax, has the challenging goal of serving more users compared to its predecessor IEEE 802.11ac, enabling consistent and reliable streams of data (average throughput) per station. In this paper we explore some of the IEEE 802.11ax new mechanisms and compare between the upper bounds on the throughputs of the Downlink unidirectional UDP Multi Users (MU) triadic based on Multiple-Input-Multiple-Output (MU-MIMO) and Orthogonal Frequency Division Multiple Acce...

  16. 17th IEEE NPSS Real Time Conference – RT-2010

    CERN Multimedia

    Carlos Varandas

    2010-01-01

    Congress Centre of “Instituto Superior Técnico”, Lisboa, Portugal, 24-28 May, 2010 ABSTRACT SUBMISSION OPEN Abstract Submission Deadline: March 1st, 2010 Dear Sir/Madam, We are pleased to announce that abstract submission for the 17th IEEE NPSS Real Time Conference is now open on our web site. The deadline for submitting an abstract is 1st March 2010. Full conference details General Chairman

  17. Ieee 802.15.4 Implementation on an Embedded Device

    OpenAIRE

    Thandee, Rithirong

    2012-01-01

    Software Defined Radio (SDR) is a growing technology that allows radio communication to become interoperable. SDR can lower the cost for a particular hardware radio to commu- nicate with another radio that uses a different standard. In order to show the capability of SDR, this thesis shows how to implement IEEE 802.14.5, a low-rate wireless personal area network (LR-WPAN) standard, on a standalone embedded machine. The implementation is done using a universal software radio pe...

  18. Interoperability in wireless sensor networks based on IEEE 1451 standard

    OpenAIRE

    Higuera Portilla, Jorge Eduardo; Polo Cantero, José

    2012-01-01

    The syntactic and semantic interoperability is a challenge of the Wireless Sensor Networks (WSN) with smart sensors in pervasive computing environments to increase their harmonization in a wide variety of applications. This chapter contains a detailed description of interoperability in heterogeneous WSN using the IEEE 1451 standard. This work focuses on personal area networks (PAN) with smart sensors and actuators. Also, a technical, syntactic and semantic levels of interoperability based on ...

  19. Decision, Transaction, Law and Contract

    DEFF Research Database (Denmark)

    Koch, Carsten Allan

    is transaction cost economics in the tradition of Oliver E. Williamson. The foundation for this tradition was laid by 1991 Nobel Laureate Ronald Coase in a paper, “The Nature of the Firm” in 1937. But the breakthrough as an influential research program was achieved with Williamson’s influential “Markets...... and Hierarchies” from 1975. Since then Williamson has, almost singlehandedly, erected an impressive research program which aims at explaining the institutional structures at the micro-level under which economic transactions take place. A number of different phenomena that were very hard to rationalize given...

  20. Performance Analysis of the IEEE 802.11s PSM

    Directory of Open Access Journals (Sweden)

    Mirza Nazrul Alam

    2012-01-01

    Full Text Available With the introduction of IEEE 802.11 power save mode (PSM, a lot of work has been done to enhance the energy saving ability of the wireless nodes. The ultimate goal of the research is to make the networking equipment carbon neutral and prolong the lifetime of the energy limited device for various applications; in some cases it is a trade-off between energy efficiency and delay. However, few studies have been made until now in the area of IEEE 802.11s based link specific power mode. The essence of this method is the ability of a node to maintain different power modes with its different peer nodes at the same time. A new peer service period (PSP mechanism is also proposed in IEEE 802.11s amendment for transmitting to a receiver operating in PSM. In this paper the performance of the link specific power mode is studied for a single- and a multilink network in terms of energy, delay throughput, and sleep duration. It is found that at small load the energy saving could be as high as eighty percent when compared with the active mode operation. A stochastic model, based on discrete time discrete state Markov chain, is developed for one peer link operation to study the system behavior closely during PSM operation.

  1. Transactions in domain-specific information systems

    Science.gov (United States)

    Zacek, Jaroslav

    2017-07-01

    Substantial number of the current information system (IS) implementations is based on transaction approach. In addition, most of the implementations are domain-specific (e.g. accounting IS, resource planning IS). Therefore, we have to have a generic transaction model to build and verify domain-specific IS. The paper proposes a new transaction model for domain-specific ontologies. This model is based on value oriented business process modelling technique. The transaction model is formalized by the Petri Net theory. First part of the paper presents common business processes and analyses related to business process modeling. Second part defines the transactional model delimited by REA enterprise ontology paradigm and introduces states of the generic transaction model. The generic model proposal is defined and visualized by the Petri Net modelling tool. Third part shows application of the generic transaction model. Last part of the paper concludes results and discusses a practical usability of the generic transaction model.

  2. Transactions Concurrency Control in Web Service Environment

    DEFF Research Database (Denmark)

    Alrifai, Mohammad; Dolog, Peter; Nejdl, Wolfgang

    2006-01-01

    an engineering point of view as it does not change the way consumers or clients of web services have to be programmed. Furthermore, it avoids direct communication between transaction coordinators which preserves security by keeping the information about business transactions restricted to the coordinators which......Business transactions in web service environments run with relaxed isolation and atomicity property. In such environments, transactions can commit and roll back independently on each other. Transaction management has to reflect this issue and address the problems which result for example from...... concurrent access to web service resources and data. In this paper we propose an extension to the WS-Transaction Protocol which ensures the consistency of the data when independent business transactions access the data concurrently under the relaxed transaction properties. Our extension is based...

  3. An automated method for accurate vessel segmentation

    Science.gov (United States)

    Yang, Xin; Liu, Chaoyue; Le Minh, Hung; Wang, Zhiwei; Chien, Aichi; (Tim Cheng, Kwang-Ting

    2017-05-01

    Vessel segmentation is a critical task for various medical applications, such as diagnosis assistance of diabetic retinopathy, quantification of cerebral aneurysm’s growth, and guiding surgery in neurosurgical procedures. Despite technology advances in image segmentation, existing methods still suffer from low accuracy for vessel segmentation in the two challenging while common scenarios in clinical usage: (1) regions with a low signal-to-noise-ratio (SNR), and (2) at vessel boundaries disturbed by adjacent non-vessel pixels. In this paper, we present an automated system which can achieve highly accurate vessel segmentation for both 2D and 3D images even under these challenging scenarios. Three key contributions achieved by our system are: (1) a progressive contrast enhancement method to adaptively enhance contrast of challenging pixels that were otherwise indistinguishable, (2) a boundary refinement method to effectively improve segmentation accuracy at vessel borders based on Canny edge detection, and (3) a content-aware region-of-interests (ROI) adjustment method to automatically determine the locations and sizes of ROIs which contain ambiguous pixels and demand further verification. Extensive evaluation of our method is conducted on both 2D and 3D datasets. On a public 2D retinal dataset (named DRIVE (Staal 2004 IEEE Trans. Med. Imaging 23 501-9)) and our 2D clinical cerebral dataset, our approach achieves superior performance to the state-of-the-art methods including a vesselness based method (Frangi 1998 Int. Conf. on Medical Image Computing and Computer-Assisted Intervention) and an optimally oriented flux (OOF) based method (Law and Chung 2008 European Conf. on Computer Vision). An evaluation on 11 clinical 3D CTA cerebral datasets shows that our method can achieve 94% average accuracy with respect to the manual segmentation reference, which is 23% to 33% better than the five baseline methods (Yushkevich 2006 Neuroimage 31 1116-28; Law and Chung 2008

  4. A model for ultrasound contrast agent in a phantom vessel

    KAUST Repository

    Qamar, Adnan

    2014-02-01

    A theoretical framework to model the dynamics of Ultrasound Contrast Agent (UCA) inside a phantom vessel is presented. The model is derived from the reduced Navier-Stokes equation and is coupled with the evolving flow field solution inside the vessel by a similarity transformation approach. The results are computed, and compared with experiments available in literature, for the initial UCA radius of Ro=1.5 μm and 2 μm for the vessel diameter of D=12 μm and 200 μm with the acoustic parameters as utilized in the experiments. When compared to other models, better agreement on smaller vessel diameter is obtained with the proposed coupled model. The model also predicts, quite accurately, bubble fragmentation in terms of acoustic and geometric parameters. © 2014 IEEE.

  5. Vessel Operator System

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Operator cards are required for any operator of a charter/party boat and or a commercial vessel (including carrier and processor vessels) issued a vessel permit from...

  6. Rethinking Ethiopian Secured Transactions Law through ...

    African Journals Online (AJOL)

    Various countries have reformed their secured transaction laws recognizing the significance of modern secured transactions law in enhancing access to credit and economic development. Ethiopia has not undertaken comprehensive secured transactions law reform, despite the demonstrable mismatch between the legal ...

  7. 5 CFR 1640.4 - Account transactions.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Account transactions. 1640.4 Section 1640... STATEMENTS § 1640.4 Account transactions. (a) Where relevant, the following transactions will be reported in each individual account statement: (1) Contributions; (2) Withdrawals; (3) Forfeitures; (4) Loan...

  8. Personality-relationship transactions revisited.

    Science.gov (United States)

    Neyer, Franz J; Mund, Marcus; Zimmermann, Julia; Wrzus, Cornelia

    2014-12-01

    The transactional paradigm states that people create, maintain, and change their environments according to their personalities. At the same time, the environment reacts back on personality. As social relationships are part of an individual's environment, this likewise implies that there are reciprocal transactions between personality and relationships. However, earlier studies have concluded that adult personality traits are so stable that they have a stronger effect on later relationships, but that relationship effects on personality are negligible. In this article, we contend that personality-relationship transactions should be revisited. We submit that the relative powers of personality versus relationship effects depend on the type of life transition during which the effects take place: Relationship effects on personality development are more likely to emerge in the context of rather normative and highly scripted life transitions, whereas personality effects on relationship development are more likely to occur in the context of rather non-normative life transitions that are less regulated by social expectations. We illustrate these assumptions with examples from our own work and other findings reported in the literature. Furthermore, we theorize that effects of personality-relationship transactions on health also vary with the normativeness of the eliciting life transition. © 2013 Wiley Periodicals, Inc.

  9. Transformational and transactional leadership conceptualization ...

    African Journals Online (AJOL)

    The study to revalidated and re-examined the factor structure and the conceptualization of the transformational and transactional leadership for a possible application to the study of leadership in Nigerian applied settings. Data were collected from 212 employees (160 males and 52 females) who rated eight CEOs (4 males ...

  10. PayPal Transactions Security

    OpenAIRE

    Razvan Toader

    2014-01-01

    Recent threads to prominent organizations and companies have greatly increased the need for information security. Many measures have been designed and developed to guard against threats from outsider attacks. Technologies are actively implemented to prohibit such attacks that could actively prohibit rogue connections. In this paper, common vulnerabilities for PayPal transactions identified as well as solutions for defending against them.

  11. Transactions on Computational Science IX

    DEFF Research Database (Denmark)

    The 9th issue of the Transactions on Computational Science journal, edited by François Anton, is devoted to the subject of Voronoi diagrams in science and engineering. The 9 papers included in the issue constitute extended versions of selected papers from the International Symposium on Voronoi...

  12. Coexistence of IEEE 802.11b/g WLANs and IEEE 802.15.4 WSNs : Modeling and Protocol Enhancements

    NARCIS (Netherlands)

    Yuan, W.

    2011-01-01

    As an emerging short-range wireless technology, IEEE 802.15.4/ZigBee Wireless Sensor Networks (WSNs) are increasingly used in the fields of home control, industrial control, consumer electronics, energy management, building automation, telecom services, personal healthcare, etc. IEEE

  13. 15th IEEE International Conference on Intelligent Engineering Systems

    CERN Document Server

    Živčák, Jozef; Aspects of Computational Intelligence Theory and Applications

    2013-01-01

    This volume covers the state-of-the art of the research and development in various aspects of computational intelligence and gives some perspective directions of development. Except the traditional engineering areas that contain theoretical knowledge, applications, designs and projects, the book includes the area of use of computational intelligence in biomedical engineering. „Aspects of Computational Intelligence: Theory and Applications” is a compilation of carefully selected extended papers written on the basis of original contributions presented at the 15th IEEE International Conference on Intelligent Engineering Systems 2011, INES 2011 held at June 23.-26. 2011 in AquaCity Poprad, Slovakia.    

  14. Visualizing Dynamic Bitcoin Transaction Patterns

    Science.gov (United States)

    McGinn, Dan; Birch, David; Akroyd, David; Molina-Solana, Miguel; Guo, Yike; Knottenbelt, William J.

    2016-01-01

    Abstract This work presents a systemic top-down visualization of Bitcoin transaction activity to explore dynamically generated patterns of algorithmic behavior. Bitcoin dominates the cryptocurrency markets and presents researchers with a rich source of real-time transactional data. The pseudonymous yet public nature of the data presents opportunities for the discovery of human and algorithmic behavioral patterns of interest to many parties such as financial regulators, protocol designers, and security analysts. However, retaining visual fidelity to the underlying data to retain a fuller understanding of activity within the network remains challenging, particularly in real time. We expose an effective force-directed graph visualization employed in our large-scale data observation facility to accelerate this data exploration and derive useful insight among domain experts and the general public alike. The high-fidelity visualizations demonstrated in this article allowed for collaborative discovery of unexpected high frequency transaction patterns, including automated laundering operations, and the evolution of multiple distinct algorithmic denial of service attacks on the Bitcoin network. PMID:27441715

  15. Visualizing Dynamic Bitcoin Transaction Patterns.

    Science.gov (United States)

    McGinn, Dan; Birch, David; Akroyd, David; Molina-Solana, Miguel; Guo, Yike; Knottenbelt, William J

    2016-06-01

    This work presents a systemic top-down visualization of Bitcoin transaction activity to explore dynamically generated patterns of algorithmic behavior. Bitcoin dominates the cryptocurrency markets and presents researchers with a rich source of real-time transactional data. The pseudonymous yet public nature of the data presents opportunities for the discovery of human and algorithmic behavioral patterns of interest to many parties such as financial regulators, protocol designers, and security analysts. However, retaining visual fidelity to the underlying data to retain a fuller understanding of activity within the network remains challenging, particularly in real time. We expose an effective force-directed graph visualization employed in our large-scale data observation facility to accelerate this data exploration and derive useful insight among domain experts and the general public alike. The high-fidelity visualizations demonstrated in this article allowed for collaborative discovery of unexpected high frequency transaction patterns, including automated laundering operations, and the evolution of multiple distinct algorithmic denial of service attacks on the Bitcoin network.

  16. Identifying Bitcoin users by transaction behavior

    Science.gov (United States)

    Monaco, John V.

    2015-05-01

    Digital currencies, such as Bitcoin, offer convenience and security to criminals operating in the black marketplace. Some Bitcoin marketplaces, such as Silk Road, even claim anonymity. This claim contradicts the findings in this work, where long term transactional behavior is used to identify and verify account holders. Transaction timestamps and network properties observed over time contribute to this finding. The timestamp of each transaction is the result of many factors: the desire purchase an item, daily schedule and activities, as well as hardware and network latency. Dynamic network properties of the transaction, such as coin flow and the number of edge outputs and inputs, contribute further to reveal account identity. In this paper, we propose a novel methodology for identifying and verifying Bitcoin users based on the observation of Bitcoin transactions over time. The behavior we attempt to quantify roughly occurs in the social band of Newell's time scale. A subset of the Blockchain 230686 is taken, selecting users that initiated between 100 and 1000 unique transactions per month for at least 6 different months. This dataset shows evidence of being nonrandom and nonlinear, thus a dynamical systems approach is taken. Classification and authentication accuracies are obtained under various representations of the monthly Bitcoin samples: outgoing transactions, as well as both outgoing and incoming transactions are considered, along with the timing and dynamic network properties of transaction sequences. The most appropriate representations of monthly Bitcoin samples are proposed. Results show an inherent lack of anonymity by exploiting patterns in long-term transactional behavior.

  17. BIOASSAY VESSEL FAILURE ANALYSIS

    Energy Technology Data Exchange (ETDEWEB)

    Vormelker, P

    2008-09-22

    Two high-pressure bioassay vessels failed at the Savannah River Site during a microwave heating process for biosample testing. Improper installation of the thermal shield in the first failure caused the vessel to burst during microwave heating. The second vessel failure is attributed to overpressurization during a test run. Vessel failure appeared to initiate in the mold parting line, the thinnest cross-section of the octagonal vessel. No material flaws were found in the vessel that would impair its structural performance. Content weight should be minimized to reduce operating temperature and pressure. Outer vessel life is dependent on actual temperature exposure. Since thermal aging of the vessels can be detrimental to their performance, it was recommended that the vessels be used for a limited number of cycles to be determined by additional testing.

  18. Capacity and performance study of IEEE 802.11e in WLANs and ad hoc networks

    OpenAIRE

    Mjøberg, Frank Roar

    2007-01-01

    This master thesis focuses on the IEEE 802.11e Enhanced Distribution Channel Access (EDCA). The IEEE 802.11e protocol became an IEEE standard in November 2005 and is a very popular research topic. Even though the protocol has been tested for faults and errors a long time there are still research topics to explore. This thesis will try to answer some of those topics. The main topic in this thesis is how the IEEE 802.11e MAC operates in a multihop ad hoc network. We discuss and evaluated th...

  19. Coexistence of IEEE 802.11b/g WLANs and IEEE 802.15.4 WSNs: Modeling and Protocol Enhancements

    OpenAIRE

    Yuan, W.

    2011-01-01

    As an emerging short-range wireless technology, IEEE 802.15.4/ZigBee Wireless Sensor Networks (WSNs) are increasingly used in the fields of home control, industrial control, consumer electronics, energy management, building automation, telecom services, personal healthcare, etc. IEEE 802.15.4/Zig-Bee WSNs share the same 2.4 GHz license-free Industrial, Scientific, and Medical (ISM) band with many other wireless systems such as IEEE 802.11b/g WLANs, Bluetooth, cordless phones, etc. Due to the ...

  20. Nonblocking Scheduling for Web Service Transactions

    DEFF Research Database (Denmark)

    Alrifai, Mohammad; Balke, Wolf-Tilo; Dolog, Peter

    2007-01-01

    . In this paper, we propose a novel nonblocking scheduling mechanism that is used prior to the actual service invocations. Its aim is to reach an agreement between the client and all participating providers on what transaction processing times have to be expected, accepted, and guaranteed. This enables service......For improved flexibility and concurrent usage existing transaction management models for Web services relax the isolation property of Web service-based transactions. Correctness of the concurrent execution then has to be ensured by commit order-preserving transaction schedulers. However, local...... schedulers of service providers typically do take into account neither time constraints for committing the whole transaction, nor the individual services' constraints when scheduling decisions are made. This often leads to an unnecessary blocking of transactions by (possibly long-running) others...

  1. Private benefits in corporate control transactions

    DEFF Research Database (Denmark)

    Poulsen, Thomas

    with high security benefits, or because the buyer has high private benefits from the control rights that come with the shares? Using voting rights as the vehicle for private benefits, I find that the selling shareholders in block transactions attach more value to private benefits than the buyers. In tender......This paper presents an analytical framework from which it can be inferred whether sellers or buyers in corporate control transactions value private benefits highest. I am thus able to suggest an answer to the question: Are blocks of shares traded because the buyer is a more efficient monitor...... offer transactions, the answer is that private benefits are insignificant to both sides of the transaction. As an alternative measure of the transaction premium, I calculate the abnormal return premium. This represents the stock market's valuation of the transaction. I find that the stock market puts...

  2. Correctness of Concurrent Executions of Closed Nested Transactions in Transactional Memory Systems

    Science.gov (United States)

    Peri, Sathya; Vidyasankar, Krishnamurthy

    A generally agreed upon requirement for correctness of concurrent executions in Transactional Memory systems is that all transactions including the aborted ones read consistent values. Opacity is a recently proposed correctness criterion that satisfies the above requirement. Our first contribution in this paper is extending the opacity definition for closed nested transactions. Secondly, we define conflicts appropriate for optimistic executions which are commonly used in Software Transactional Memory systems. Using these conflicts, we define a restricted, conflict-preserving, class of opacity for closed nested transactions the membership of which can be tested in polynomial time. As our third contribution, we propose a correctness criterion that defines a class of schedules where aborted transactions do not affect consistency of the other transactions. We define a conflict-preserving subclass of this class as well. Both the class definitions and the conflict definition are new for nested transactions.

  3. Disintermediation of Inter-Blockchain Transactions

    OpenAIRE

    English, S. Matthew; Orlandi, Fabrizio; Auer, Soeren

    2016-01-01

    Different versions of peer-to-peer electronic cash exist as data represented by separate blockchains. Payments between such systems cannot be sent directly from one party to another without going through a financial institution. Bitcoin provided part of the solution but its utility is limited to intra-blockchain transactions. The benefits are lost if a trusted third party is required to execute inter-blockchain transactions. We propose a solution to the inter-blockchain transaction problem us...

  4. Critical Evaluation of the EJB Transaction Model

    OpenAIRE

    Silaghi, Raul; Strohmeier, Alfred

    2002-01-01

    Enterprise JavaBeans is a widely-used technology that aims at supporting distributed component-based applications written in Java. One of the key features of the Enterprise JavaBeans architecture is the support of declarative distributed transactions, without requiring explicit coding. In this paper, after a brief introduction of the concepts and mechanisms related to the EJB Transaction Model, we provide guidelines for their consistent use. We then evaluate the EJB Transaction Model on an Au...

  5. 31 CFR 800.303 - Lending transactions.

    Science.gov (United States)

    2010-07-01

    ... INVESTMENT SECURITY, DEPARTMENT OF THE TREASURY REGULATIONS PERTAINING TO MERGERS, ACQUISITIONS, AND... a typical loan may constitute a covered transaction. (c) An acquisition of voting interest or assets...

  6. 31 CFR 544.404 - Transactions ordinarily incident to a licensed transaction.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transactions ordinarily incident to a licensed transaction. 544.404 Section 544.404 Money and Finance: Treasury Regulations Relating to Money and... parties required to complete the sale, including transactions by the buyer, broker, transfer agents, banks...

  7. 31 CFR 575.418 - Transactions incidental to a licensed transaction.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transactions incidental to a licensed transaction. 575.418 Section 575.418 Money and Finance: Treasury Regulations Relating to Money and Finance... activities by other parties required to complete the sale, including transactions by the buyer, brokers...

  8. 31 CFR 546.404 - Transactions ordinarily incident to a licensed transaction.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transactions ordinarily incident to a licensed transaction. 546.404 Section 546.404 Money and Finance: Treasury Regulations Relating to Money and... transactions by the buyer, broker, transfer agents, banks, etc., provided that such other parties are not...

  9. 31 CFR 585.417 - Transactions incidental to a licensed transaction.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transactions incidental to a licensed transaction. 585.417 Section 585.417 Money and Finance: Treasury Regulations Relating to Money and Finance... authorizes all activities by other parties required to complete the sale, including transactions by the buyer...

  10. 31 CFR 543.404 - Transactions ordinarily incident to a licensed transaction.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transactions ordinarily incident to a licensed transaction. 543.404 Section 543.404 Money and Finance: Treasury Regulations Relating to Money and... transactions by the buyer, broker, transfer agents, banks, etc., provided that such other parties are not...

  11. 31 CFR 548.404 - Transactions ordinarily incident to a licensed transaction.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transactions ordinarily incident to a licensed transaction. 548.404 Section 548.404 Money and Finance: Treasury Regulations Relating to Money and... transactions by the buyer, broker, transfer agents, banks, etc., provided that such other parties are not...

  12. Managing transaction risks in interdependent supply chains: an extended transaction cost economics perspective

    NARCIS (Netherlands)

    Wever, M.; Wognum, P.M.; Trienekens, J.H.; Omta, S.W.F.

    2012-01-01

    The present study examines the management of transaction risks in supply chains. Risk management studies often ignore the wider supply chain context in which individual transactions take place. However, risk management strategies which are suitable to use when only a single transaction is considered

  13. 21 CFR 1404.205 - Why is it important if a particular transaction is a covered transaction?

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Why is it important if a particular transaction is a covered transaction? 1404.205 Section 1404.205 Food and Drugs OFFICE OF NATIONAL DRUG CONTROL... important if a particular transaction is a covered transaction? The importance of a covered transaction...

  14. Guam Abandoned Vessel Inventory

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Guam. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral habitats...

  15. Florida Abandoned Vessel Inventory

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Florida. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral...

  16. Vessel Arrival Info - Legacy

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Vessel Arrival Info is a spreadsheet that gets filled out during the initial stage of the debriefing process by the debriefer. It contains vessel name, trip...

  17. Basic security measures for IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Oscar P. Sarmiento

    2010-05-01

    Full Text Available This article presents a tutorial/discussion of three commonly-used IEEE 802.11 wireless network security standards: WEP, WPA and WPA2. A detailed analysis of the RC4 algorithm supporting WEP is presented, including its vulnera-bilities. The WPA and WPA2 encryption protocols’ most relevant aspects and technical characteristics are reviewed for a comparative analysis of the three standards in terms of the security they provide. Special attention has been paid to WEP encryption by using an educational simulation tool written in C++ Builder for facilitating the unders-tanding of this protocol at academic level. Two practical cases of wireless security configurations using Cisco net-working equipment are also presented: configuring and enabling WPA-Personal and WPA2-Personal (these being security options used by TKIP and AES, respectively.

  18. IEEE 802.11 Wireless LAN Security White Paper

    Energy Technology Data Exchange (ETDEWEB)

    King, J

    2001-10-22

    Given the increased productivity and growing popularity of wireless communications in general, and wireless data communications in particular, this paper outlines the protocols, security implications, and architectures of IEEE Std. 802.11-1999 wireless LANs (WLANs) and makes recommendations regarding a phased implementation of WLANs at LLNL. This project is driven by the need for convenient and secure access to the Internet for Laboratory visitors and to the internal network for Laboratory employees. A solid architecture designed with a priority on security will allow LLNL to offer network access in areas where it is traditionally hard to deploy wired networks. It will also enable such services as wireless access for inventory control and convenient network access for conference rooms around LLNL. Wireless network access has the potential to increase productivity by enabling instant access to information.

  19. Basic security measures for IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Oscar P. Sarmiento

    2008-05-01

    Full Text Available This article presents a tutorial/discussion of three commonly-used IEEE 802.11 wireless network security standards: WEP, WPA and WPA2. A detailed analysis of the RC4 algorithm supporting WEP is presented, including its vulnera-bilities. The WPA and WPA2 encryption protocols’ most relevant aspects and technical characteristics are reviewed for a comparative analysis of the three standards in terms of the security they provide. Special attention has been paid to WEP encryption by using an educational simulation tool written in C++ Builder for facilitating the unders-tanding of this protocol at academic level. Two practical cases of wireless security configurations using Cisco net-working equipment are also presented: configuring and enabling WPA-Personal and WPA2-Personal (these being security options used by TKIP and AES, respectively.

  20. Proceedings of the IEEE Machine Learning for Signal Processing XVII

    DEFF Research Database (Denmark)

    The seventeenth of a series of workshops sponsored by the IEEE Signal Processing Society and organized by the Machine Learning for Signal Processing Technical Committee (MLSP-TC). The field of machine learning has matured considerably in both methodology and real-world application domains and has...... become particularly important for solution of problems in signal processing. As reflected in this collection, machine learning for signal processing combines many ideas from adaptive signal/image processing, learning theory and models, and statistics in order to solve complex real-world signal processing......, and two papers from the winners of the Data Analysis Competition. The program included papers in the following areas: genomic signal processing, pattern recognition and classification, image and video processing, blind signal processing, models, learning algorithms, and applications of machine learning...

  1. Report of the 2017 IEEE Cyber Science and Technology Congress

    Directory of Open Access Journals (Sweden)

    Wenbing Zhao

    2017-12-01

    Full Text Available The modern digitized world has led to the emergence of a new paradigm on global information networks and infrastructures known as Cyberspace and the studies of Cybernetics, which bring seamless integration of physical, social and mental spaces. Cyberspace is becoming an integral part of our daily life from learning and entertainment to business and cultural activities. As expected, this whole concept of Cybernetics brings new challenges that need to be tackled. The 2017 IEEE Cyber Science and Technology Congress (CyberSciTech 2017 provided a forum for researchers to report their research findings and exchange ideas. The congress took place in Orlando, Florida, USA during 6–10 November 2017. Not counting poster papers, the congress accepted over fifty papers that are divided into nine sessions. In this report, we provide an overview of the research contributions of the papers in CyberSciTech 2017.

  2. Review of the IEEE Standard for Computerized Operating Procedure Systems

    Energy Technology Data Exchange (ETDEWEB)

    O' Hara, J.; Higgins, J.

    2010-02-26

    Increasingly nuclear power plant procedures, such as emergency operating procedures, are being presented in computer form with functionality to support operator use and management of the procedures. The U.S. Nuclear Regulatory Commission (NRC) currently has guidance for the review of computer-based procedures (CBPs); however, there remain CBP functions and human performance issues for which up-to-date guidance is lacking. The Institute of Electrical and Electronics Engineers (IEEE) has initiated a standard development effort to address the human factors engineering (HFE) aspects of CBP systems. When completed, it may provide guidance to supplement the NRC staff's review criteria. The purpose of our study was to evaluate the suitability of the IEEE Standard for use in the NRC's HFE safety reviews of CBP systems and to ensure that the guidance meets the NRC's standard for scientific and engineering rigor used in its own guidance development efforts. We established the following criteria with which to evaluate the Standard: (1) it should meet an existing need of NRC reviewers, (2) it should be based in sound HFE principles, (3) it should be thoroughly peer-reviewed, and (4) it should address CBP-related human performance issues identified in the literature. This report describes the methodology we used to evaluate each criterion. Our evaluation concluded that the Standard generally does meet these criteria, however several areas were identified for which additional clarifications are needed. Thus consideration of the Standard's use by the NRC is supported. The standard evaluation methodology developed in this study can be generally applied to the review of other HFE standards being considered for possible use or endorsement by the NRC.

  3. Programming Idioms for Transactional Events

    Directory of Open Access Journals (Sweden)

    Matthew Kehrt

    2010-02-01

    Full Text Available Transactional events (TE are an extension of Concurrent ML (CML, a programming model for synchronous message-passing. Prior work has focused on TE's formal semantics and its implementation. This paper considers programming idioms, particularly those that vary unexpectedly from the corresponding CML idioms. First, we solve a subtle problem with client-server protocols in TE. Second, we argue that CML's wrap and guard primitives do not translate well to TE, and we suggest useful workarounds. Finally, we discuss how to rewrite CML protocols that use abort actions.

  4. ALICE HMPID Radiator Vessel

    CERN Multimedia

    2003-01-01

    View of the radiator vessels of the ALICE/HMPID mounted on the support frame. Each HMPID module is equipped with 3 indipendent radiator vessels made out of neoceram and fused silica (quartz) windows glued together. The spacers inside the vessel are needed to stand the hydrostatic pressure. http://alice-hmpid.web.cern.ch/alice-hmpid

  5. Research on IEEE 802.22.1 Beacon Networks Application%IEEE 802.22.1信标网络应用研究

    Institute of Scientific and Technical Information of China (English)

    杨大全

    2012-01-01

    Several IEEE 802.22.1 beacon devices are used to build beacon network by self-organization. IEEE 802.22.1 beacon protocol is introduced, and the decision strategies of beacon networks in the process of establishing and maintenance are discussed. IEEE 802.22.1 beacon networks sensing and information detection in WRAN device are introduced. The maximum latency before scheduling a quiet period that will ensure to capture the full information of the beacon network is given.%多个IEEE 802.22.1信标设备将自组织成信标网络.介绍了IEEE 802.22.1标准中定义的自组织方案;讨论了信标网络建立与维持过程中的判决策略;介绍了无线区域网络(WRAN)设备对IEEE 802.22.1信标网络的识别与信息获取机制;给出了确保实现对信标网络信息解析所需要安排的最大时延.

  6. 76 FR 3165 - Proposed Exemptions From Certain Prohibited Transaction Restrictions

    Science.gov (United States)

    2011-01-19

    ... Applicants note that the Transaction proceeded on a more expedited basis than is typical of most... Employee Benefits Security Administration Proposed Exemptions From Certain Prohibited Transaction... proposed exemptions from certain of the prohibited transaction restrictions of the Employee Retirement...

  7. 0011-0030.What is IEEE 754 StandardHow to convert real number ...

    Indian Academy of Sciences (India)

    Home; public; Volumes; reso; 021; 01; 0011-0030.What is IEEE 754 StandardHow to convert real number in binary format using IEEE 754 StandardAn.pdf. 404! error. The page your are looking for can not be found! Please check the link or use the navigation bar at the top. YouTube; Twitter; Facebook; Blog. Academy News.

  8. A formal analysis of ISO/IEEE P11073-20601 standard of medical device communication

    NARCIS (Netherlands)

    Goga, Nicolae; Costache, Stefania; Moldoveanu, Florica

    2009-01-01

    This article presents the formal work done for the ISO/IEEE P11073-20601 Draft Standard for Health informatics - Personal health device communication - Application profile Optimized exchange protocol. ISO/IEEE 11073 family defines standards for device communication between agents (e.g. blood

  9. Guest editorial: Special issue on selected papers from the IEEE SENSORS 2015 conference

    NARCIS (Netherlands)

    Krijnen, Gijsbertus J.M.; Jiang, Hongrui; Maeda, Ryutaro; Vellekoop, M.H.

    2016-01-01

    Over the years, the IEEE SENSORS Conference has become one of the premier, true international, conferences on anything that has to do with sensors, ranging from principles, design and fabrication to interfacing, data-extraction, applications, etc. The IEEE SENSORS 2015 Conference was held in Bushan,

  10. Design Optimization of Cyber-Physical Distributed Systems using IEEE Time-sensitive Networks (TSN)

    DEFF Research Database (Denmark)

    Pop, Paul; Lander Raagaard, Michael; Craciunas, Silviu S.

    2016-01-01

    In this paper we are interested in safety-critical real-time applications implemented on distributed architectures supporting the Time-SensitiveNetworking (TSN) standard. The ongoing standardization of TSN is an IEEE effort to bring deterministic real-time capabilities into the IEEE 802.1 Ethernet...

  11. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    Full Text Available Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated. Introduction In the entire history of

  12. Introduction to the Theory of Nested Transactions,

    Science.gov (United States)

    1986-07-01

    since the common terminology for access and non-access transactions is of great benefit in unifying the statements and proofs of our results. ’lhus...34Guardians and Actions: Linguistic Support for Robust, 60 Distributed Programs", ACAI Transactions on Programming Ianguages and Systems 5. 3, (July

  13. 76 FR 40779 - Retail Foreign Exchange Transactions

    Science.gov (United States)

    2011-07-12

    ... regulations do not apply to traditional foreign currency forwards, spots, or swap transactions that an insured... requirements for foreign currency futures, options on futures, and options that an insured depository... on other foreign currency transactions that are functionally or economically similar, including so...

  14. Integrated Telecommunications Systems and Instructional Transaction.

    Science.gov (United States)

    Saba, Farhad

    1988-01-01

    Discussion of how learner and teacher communicate in distance education focuses on Morre's concept of transactional distance in light of recent developments in telecommunications. Integrated telecommunications systems are described, adult learning and instructional transactions are discussed, and system dynamics are presented as a tool for…

  15. The Transactive Nature of Therapeutic Communication.

    Science.gov (United States)

    Tubbs, Stewart L.

    Therapeutic communication, or interaction which provokes personal insight or reorientation, can be best understood as a transactive, rather than linear, interrelationship between people or groups. Two practical responses to "pathological" communication patterns illustrate the validity of the transactional communication theory: the…

  16. The transactional approach in company boundaries

    Directory of Open Access Journals (Sweden)

    Bruno Chaihuaque Dueñas

    2009-12-01

    Full Text Available This article shows the relationship between market and firms through the theory of transactional cost and the relationsthat determine the structure and boundaries of the firm. Using the assumptions from the transactional cost approach,this article proposes some variables that determine optimal organizational structures and their boundaries.

  17. Distributed Management of Concurrent Web Service Transactions

    DEFF Research Database (Denmark)

    Alrifai, Mohammad; Dolog, Peter; Balke, Wolf-Tilo

    2009-01-01

    of conventional ACID transaction models for Web services far from being straightforward. Current Web service transaction models relax the isolation property and rely on compensation mechanisms to ensure atomicity of business transactions in the presence of service failures. However, ensuring consistency......Business processes involve dynamic compositions of interleaved tasks. Therefore, ensuring reliable transactional processing of Web services is crucial for the success of Web service-based B2B and B2C applications. But the inherent autonomy and heterogeneity of Web services render the applicability...... in the open and dynamic environment of Web services, where interleaving business transactions enter and exit the system independently, remains an open issue. In this paper, we address this problem and propose an architecture that supports concurrency control on the Web services level. An extension...

  18. The topology of card transaction money flows

    Science.gov (United States)

    Zanin, Massimiliano; Papo, David; Romance, Miguel; Criado, Regino; Moral, Santiago

    2016-11-01

    Money flow models are essential tools to understand different economical phenomena, like saving propensities and wealth distributions. In spite of their importance, most of them are based on synthetic transaction networks with simple topologies, e.g. random or scale-free ones, as the characterisation of real networks is made difficult by the confidentiality and sensitivity of money transaction data. Here, we present an analysis of the topology created by real credit card transactions from one of the biggest world banks, and show how different distributions, e.g. number of transactions per card or amount, have nontrivial characteristics. We further describe a stochastic model to create transactions data sets, feeding from the obtained distributions, which will allow researchers to create more realistic money flow models.

  19. Pressure vessel design manual

    CERN Document Server

    Moss, Dennis R

    2013-01-01

    Pressure vessels are closed containers designed to hold gases or liquids at a pressure substantially different from the ambient pressure. They have a variety of applications in industry, including in oil refineries, nuclear reactors, vehicle airbrake reservoirs, and more. The pressure differential with such vessels is dangerous, and due to the risk of accident and fatality around their use, the design, manufacture, operation and inspection of pressure vessels is regulated by engineering authorities and guided by legal codes and standards. Pressure Vessel Design Manual is a solutions-focused guide to the many problems and technical challenges involved in the design of pressure vessels to match stringent standards and codes. It brings together otherwise scattered information and explanations into one easy-to-use resource to minimize research and take readers from problem to solution in the most direct manner possible. * Covers almost all problems that a working pressure vessel designer can expect to face, with ...

  20. IEEE 802.11ah: A Technology to Face the IoT Challenge

    Directory of Open Access Journals (Sweden)

    Victor Baños-Gonzalez

    2016-11-01

    Full Text Available Since the conception of the Internet of things (IoT, a large number of promising applications and technologies have been developed, which will change different aspects in our daily life. This paper explores the key characteristics of the forthcoming IEEE 802.11ah specification. This future IEEE 802.11 standard aims to amend the IEEE 802.11 legacy specification to support IoT requirements. We present a thorough evaluation of the foregoing amendment in comparison to the most notable IEEE 802.11 standards. In addition, we expose the capabilities of future IEEE 802.11ah in supporting different IoT applications. Also, we provide a brief overview of the technology contenders that are competing to cover the IoT communications framework. Numerical results are presented showing how the future IEEE 802.11ah specification offers the features required by IoT communications, thus putting forward IEEE 802.11ah as a technology to cater the needs of the Internet of Things paradigm.

  1. IEEE 802.11ah: A Technology to Face the IoT Challenge.

    Science.gov (United States)

    Baños-Gonzalez, Victor; Afaqui, M Shahwaiz; Lopez-Aguilera, Elena; Garcia-Villegas, Eduard

    2016-11-22

    Since the conception of the Internet of things (IoT), a large number of promising applications and technologies have been developed, which will change different aspects in our daily life. This paper explores the key characteristics of the forthcoming IEEE 802.11ah specification. This future IEEE 802.11 standard aims to amend the IEEE 802.11 legacy specification to support IoT requirements. We present a thorough evaluation of the foregoing amendment in comparison to the most notable IEEE 802.11 standards. In addition, we expose the capabilities of future IEEE 802.11ah in supporting different IoT applications. Also, we provide a brief overview of the technology contenders that are competing to cover the IoT communications framework. Numerical results are presented showing how the future IEEE 802.11ah specification offers the features required by IoT communications, thus putting forward IEEE 802.11ah as a technology to cater the needs of the Internet of Things paradigm.

  2. 48 CFR 52.223-16 - IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false IEEE 1680 Standard for the... CONTRACT CLAUSES Text of Provisions and Clauses 52.223-16 IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products. As prescribed in 23.706(b)(1), insert the following clause: IEEE...

  3. An Asynchronous IEEE Floating-Point Arithmetic Unit

    Directory of Open Access Journals (Sweden)

    Joel R. Noche

    2007-12-01

    Full Text Available An asynchronous floating-point arithmetic unit is designed and tested at the transistor level usingCadence software. It uses CMOS (complementary metal oxide semiconductor and DCVS (differentialcascode voltage switch logic in a 0.35 µm process using a 3.3 V supply voltage, with dual-rail data andsingle-rail control signals using four-phase handshaking.Using 17,085 transistors, the unit handles single-precision (32-bit addition/subtraction, multiplication,division, and remainder using the IEEE 754-1985 Standard for Binary Floating-Point Arithmetic, withrounding and other operations to be handled by separate hardware or software. Division and remainderare done using a restoring subtractive algorithm; multiplication uses an additive algorithm. Exceptionsare noted by flags (and not trap handlers and the output is in single-precision.Previous work on asynchronous floating-point arithmetic units have mostly focused on single operationssuch as division. This is the first work to the authors' knowledge that can perform floating-point addition,multiplication, division, and remainder using a common datapath.

  4. Maury Journals - German Vessels

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — German vessels observations, after the 1853 Brussels Conference that set International Maritime Standards, modeled after Maury Marine Standard Observations.

  5. TRANSACTIONAL AND TRANSFORMATIONAL LEADERSHIP: DEVELOPMENT THROUGH CHANGES

    Directory of Open Access Journals (Sweden)

    Srđan Nikezić

    2012-09-01

    Full Text Available The success and rewarding are mostly expressed in business performance at the end of the year. Transactional and transformational leadership as a new paradigm of quality effects on creation of roles and processes in the organizat ion. From the leaders are expected to use leadership as a process of ensuring the long - term goals of the organization, especially in turbulent competitive environment. Therefore, this paper points out the impact of leadership competencies through transactional and trans formational leadership, characteristics and processes that show different levels of participation of transformation and transactional leadership of organizations.

  6. Entrepreneurship, Transaction Costs, and Resource Attributes

    DEFF Research Database (Denmark)

    Foss, Kirsten; Foss, Nicolai Juul

    This paper responds to Kim and Mahoney's "How Property Rights Economics Furthers the Resource-Based View: Resources, Transaction Costs and Entrepreneurial Discovery" (a comment on Foss and Foss, 2005). While we agree with many of their arguments, we argue that they fail to recognize how exactly...... transaction costs and property rights shape the process of entrepreneurial discovery. We provide a sketch of the mechanisms that link entrepreneurship, property rights, and transaction costs in a resource-based setting, contributing further to the attempt to take the RBV in a more dynamic direction....

  7. Security of M-Commerce transactions

    Directory of Open Access Journals (Sweden)

    Ion IVAN

    2013-07-01

    Full Text Available In this material electronic market are defined. How they are structured. Security in E-Commerce applications is very important both at the administrative level and from the user perspective. The new trend in the field is the M-commerce that involves making purchases through mobile devices. And for M-commerce transactions the security is a very important thing. Here's how to analyze the security of M-commerce transactions and ways to increase security for these transactions taking into account the organization of M-Commerce applications, software used, hardware used and other important issues in the development of these applications.

  8. Entrepreneurship, transaction costs, and resource attributes

    DEFF Research Database (Denmark)

    Foss, Kirsten; Foss, Nicolai Juul

    2006-01-01

    This paper responds to Kim and Mahoney's "How Property Rights Economics Furthers the Resource-Based View: Resources, Transaction Costs and Entrepreneurial Discovery" (a comment on Foss and Foss, 2005). While we agree with many of their arguments, we argue that they fail to recognise how exactly t...... transaction costs shape the process of entrepreneurial discovery. We provide a sketch of the mechanisms that link entrepreneurship, property rights, and transaction costs in a resource-based setting, contributing further to the attempt to take the RBV in a more dynamic direction....

  9. Accounting costs of transactions in real estate

    DEFF Research Database (Denmark)

    Stubkjær, Erik

    2005-01-01

    in relating theoretical conceptualizations of transaction costs to national accounting and further to the identification and quantification of actions on units of real estate. The notion of satellite accounting of the System of National Accounts is applied to the segment of society concerned with changes......The costs of transactions in real estate is of importance for households, for investors, for statistical services, for governmental and international bodies concerned with the efficient delivery of basic state functions, as well as for research. The paper takes a multi-disciplinary approach...... in real estate. The paper ends up with an estimate of the cost of a major real property transaction in Denmark....

  10. Energy Harvesting - Wireless Sensor Networks for Indoors Applications Using IEEE 802.11

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Sørensen, Thomas; Madsen, Jan

    2014-01-01

    The paper investigates the feasibility of using IEEE 802.11 in energy harvesting low-power sensing applications. The investigation is based on a prototype carbon dioxide sensor node that is powered by artificial indoors light. The wireless communication module of the sensor node is based on the RTX......4100 module. RTX4100 incorporates a wireless protocol that duty-cycles the radio while being compatible with IEEE 802.11 access points. The presented experiments demonstrate sustainable operation but indicate a trade-off between the benefits of using IEEE 802.11 in energy harvesting applications...

  11. 19 CFR 152.103 - Transaction value.

    Science.gov (United States)

    2010-04-01

    ... advantage of the cash discount. The transaction value is $98, the price actually paid or payable. (2..., in the United States, of copyrights and trademarks related to the imported merchandise generally will...

  12. 77 FR 64663 - Iranian Transactions Regulations

    Science.gov (United States)

    2012-10-22

    ... transaction or dealing includes but is not limited to purchasing, selling, transporting, swapping, brokering... U.S. person holding funds, such as currency, bank deposits, or liquidated financial obligations...

  13. Equity Markets, Transactions Costs, and Capital Accumulation

    National Research Council Canada - National Science Library

    Starr, Ross M; Bencivenga, Valerie R; Smith, Bruce D

    1996-01-01

    Poorly developed equity markets inhibit the transfer of capital ownership. Moreover, the costs of transacting in equity markets affect not just the level of investment, but the kinds of investments that are undertaken...

  14. Nurse managers as transformational and transactional leaders.

    Science.gov (United States)

    McGuire, Elaine; Kennerly, Susan M

    2006-01-01

    Nurse managers demonstrating transformational leadership are more likely than transactional leaders to have committed staff nurse followers. Committed followers exert extra effort, thus improving unit performance and enhancing the organization's competitive advantage.

  15. Guarding against Collateral Damage during Chromatin Transactions

    DEFF Research Database (Denmark)

    Altmeyer, Matthias; Lukas, Jiri

    2013-01-01

    Signal amplifications are vital for chromatin function, yet they also bear the risk of transforming into unrestrained, self-escalating, and potentially harmful responses. Examples of inbuilt limitations are emerging, revealing how chromatin transactions are confined within physiological boundaries....

  16. PRESSURE-RESISTANT VESSEL

    NARCIS (Netherlands)

    Beukers, A.; De Jong, T.

    1997-01-01

    Abstract of WO 9717570 (A1) The invention is directed to a wheel-shaped pressure-resistant vessel for gaseous, liquid or liquefied material having a substantially rigid shape, said vessel comprising a substantially continuous shell of a fiber-reinforced resin having a central opening, an inner

  17. IEEE 1588 Time Synchronization Board in MTCA.4 Form Factor

    Science.gov (United States)

    Jabłoński, G.; Makowski, D.; Mielczarek, A.; Orlikowski, M.; Perek, P.; Napieralski, A.; Makijarvi, P.; Simrock, S.

    2015-06-01

    Distributed data acquisition and control systems in large-scale scientific experiments, like e.g. ITER, require time synchronization with nanosecond precision. A protocol commonly used for that purpose is the Precise Timing Protocol (PTP), also known as IEEE 1588 standard. It uses the standard Ethernet signalling and protocols and allows obtaining timing accuracy of the order of tens of nanoseconds. The MTCA.4 is gradually becoming the platform of choice for building such systems. Currently there is no commercially available implementation of the PTP receiver on that platform. In this paper, we present a module in the MTCA.4 form factor supporting this standard. The module may be used as a timing receiver providing reference clocks in an MTCA.4 chassis, generating a Pulse Per Second (PPS) signal and allowing generation of triggers and timestamping of events on 8 configurable backplane lines and two front panel connectors. The module is based on the Xilinx Spartan 6 FPGA and thermally stabilized Voltage Controlled Oscillator controlled by the digital-to-analog converter. The board supports standalone operation, without the support from the host operating system, as the entire control algorithm is run on a Microblaze CPU implemented in the FPGA. The software support for the card includes the low-level API in the form of Linux driver, user-mode library, high-level API: ITER Nominal Device Support and EPICS IOC. The device has been tested in the ITER timing distribution network (TCN) with three cascaded PTP-enabled Hirschmann switches and a GPS reference clock source. An RMS synchronization accuracy, measured by direct comparison of the PPS signals, better than 20 ns has been obtained.

  18. Sale Leaseback Transactions: Price Premiums and Market Efficiency

    OpenAIRE

    Sirmans, C.F.; Slade, Barrett A.

    2010-01-01

    Sale-leaseback transactions are ubiquitous in real estate markets in the United States with annual volume estimated to be greater than $7 billion. However, there is no evidence concerning the price impact of such transactional arrangements. Using a data set of sale-leaseback transactions, this study examines the price impact on commercial property transactions across seven markets. The findings reveal that transactions structured as saleleasebacks occur at significantly higher prices than mar...

  19. Containment vessel drain system

    Energy Technology Data Exchange (ETDEWEB)

    Harris, Scott G.

    2018-01-30

    A system for draining a containment vessel may include a drain inlet located in a lower portion of the containment vessel. The containment vessel may be at least partially filled with a liquid, and the drain inlet may be located below a surface of the liquid. The system may further comprise an inlet located in an upper portion of the containment vessel. The inlet may be configured to insert pressurized gas into the containment vessel to form a pressurized region above the surface of the liquid, and the pressurized region may operate to apply a surface pressure that forces the liquid into the drain inlet. Additionally, a fluid separation device may be operatively connected to the drain inlet. The fluid separation device may be configured to separate the liquid from the pressurized gas that enters the drain inlet after the surface of the liquid falls below the drain inlet.

  20. Conceptualizing and Measuring Transformational and Transactional Leadership

    DEFF Research Database (Denmark)

    Jensen, Ulrich Thy; Andersen, Lotte Bøgh; Ladegaard, Louise

    2016-01-01

    Existing conceptualizations and measures of transformational and transactional leadership have unclear theoretical bases, confound leadership and its effects, and are not necessarily suitable for public organizations. Overcoming these problems is necessary to test how leadership affects performance....... Many public administration scholars apply the concepts, emphasizing the need to ensure that the concepts are applicable in both public and private organizations. The article reconceptualizes transformational and transactional leadership and develops and tests revised measures that can be employed...

  1. Related Party Transactions and Earnings Management

    OpenAIRE

    Kuan, Linvani; Tower, Greg; Rusmin, Rusmin; Zahn, J-L.W. Mitchell Van der

    2010-01-01

    This study examines the association between related party transactions and earnings man-agement, based on a sample of 50 Indonesian publicly listed companies for the periods ending 2004 and 2005. The hypothesis developed in this study draw on past literature and the tenets of agency theory which suggest that the existence of related party transactions represent potential conflict of interest which may results in earnings management and appropriation by controlling shareholder to minority shar...

  2. Mobile transactions over NFC and GSM

    OpenAIRE

    Saeed, MQ; Walter, C.; Pourghomi, P; G. Ghinea

    2014-01-01

    Dynamic relationships between Near Field Communication (NFC) ecosystem players in a monetary transaction make them partners in a way that they sometimes require to share access permission to applications that are running in the service environment. One of the technologies that can be used to ensure secure NFC transactions is cloud computing. This offers a wider range of advantages than the use of only a Secure Element (SE) in an NFC enabled mobile phone. In this paper, we propose a protocol f...

  3. Transactional theory in leadership and work motivation

    OpenAIRE

    Pavšič, Tine

    2014-01-01

    The thesis presents transactional theory in leadership and motivational theory, self-determination theory. Theoretical part presents components of self-determination continuum, work extrinsic and intrinsic motivation, components of transformational and transactional leadership and researches which are exploring this components. The empirical part of the thesis includes research, which presents the correlation between leadership styles and work self-determination index. Moreover, it presen...

  4. Reactions to Corporate Insider’s Transactions

    DEFF Research Database (Denmark)

    Rose, Caspar; Søpstad, Nicolai

    2015-01-01

    We test the impact on security prices of top manager’s requirement’s to disclose their own share transactions in the firm. Specifically we study whether buy or sales transactions convey relevant information for market participants thereby studying the effects of legal stock market disclosure rules......, which to our knowledge have not been noticed already by others. Thus, our event study shows that the Danish stock market seems to be efficient in the semi-strong from....

  5. The Secret Life of Mundane Transaction Costs

    OpenAIRE

    Richard N. Langlois

    2005-01-01

    Transaction costs, one often hears, are the economic equivalent of friction in physical systems. Like physicists, economists can sometimes neglect friction in formulating theories; but like engineers, they can never neglect friction in studying how the system actually does let alone should work. Interestingly, however, the present-day economics of organization also ignores friction. That is, almost single-mindedly, the literature analyzes transactions from the point of view of misaligned ince...

  6. Mutual authentication in electronic commerce transactions.

    OpenAIRE

    2008-01-01

    Electronic commerce is a large and ever growing industry. Online transactions are returning ever-growing revenues to electronic merchants. The e-commerce industry is still facing a range of problems concerning the process of completion of online transactions. Such problems are connected to consumer fears dealing with the identity of online merchants, their security pre- cautions and methods for accepting online payments. This thesis develops and presents a Mutual Authentication Model (MAM), w...

  7. Proceedings of the IEEE 2003 Neural Networks for Signal Processing Workshop

    DEFF Research Database (Denmark)

    Larsen, Jan

    methodology and real-world application domains and is widely entering into everyday solutions adopted by research and industry, going far beyond “traditional” neural networks and academic examples. As reflected in this collection, contemporary neural networks for signal processing combine many ideas from......This proceeding contains refereed papers presented at the thirteenth IEEE Workshop on Neural Networks for Signal Processing (NNSP’2003), held at the Atria-Mercure Conference Center, Toulouse, France, September 17-19, 2003. The Neural Networks for Signal Processing Technical Committee of the IEEE...... Signal Processing Society organized the workshop with sponsorship of the Signal Processing Society and the co-operation of the IEEE Neural Networks Society. The IEEE Press published the previous twelve volumes of the NNSP Workshop proceedings in a hardbound volume. This year, the bound volume...

  8. Throughput Analysis Model for IEEE 802.11e EDCA with Multiple Access Categories

    Directory of Open Access Journals (Sweden)

    Y. Lee

    2013-08-01

    Full Text Available IEEE 802.11e standard has been specified to support differentiated quality of service (QoS, one of the critical issues on the conventional IEEE 802.11 wireless local area networks (WLANs. Enhanced Distributed Channel Access (EDCA is the fundamental and mandatory contention-based channel access method of IEEE 802.11e, and delivers traffic based on differentiated Access Categories (ACs. A general three dimensional Markov chain model of IEEE 802.11e EDCA for performance analysis is proposed in this paper. The analytical model considers multiple stations with an arbitrary number of different ACs. It also differentiates the contention window (CW sizes and the arbitration interframe spaces (AIFSs, and considers virtual collision mechanism. Based on the model, the saturation throughput of EDCA is derived, and the accuracy of the proposed model is validated via simulations.

  9. 0011-0030.How to make an abstract in IEEE Format for ...

    Indian Academy of Sciences (India)

    Home; public; Volumes; reso; 021; 01; 0011-0030.How to make an abstract in IEEE Format for AvishkarMulticultural Night in IEEE R10 Student Congress 2009Performances.pdf. 404! error. The page your are looking for can not be found! Please check the link or use the navigation bar at the top. YouTube · Twitter · Facebook ...

  10. ANDSF-Assisted Vertical Handover Decisions in the IEEE 802.11/LTE-Advanced Network

    OpenAIRE

    Xenakis, Dionysis; Passas, Nikos; Merakos, Lazaros; Verikoukis, Christos

    2016-01-01

    To address the challenging issues of energy-efficiency and seamless connectivity in heterogeneous networks, 3GPP and IEEE have recently incorporated several architectural and functional enhancements to the baseline operation of their standards for cellular and wireless local area network access, respectively. Based on the 3GPP Access Network Discovery and Selection Function (ANDSF) as well as the advanced measurement capabilities provided by the IEEE 802.11-2012 and the 3GPP Long Term Evoluti...

  11. Management Control of Market Transactions: The Relation Between Transaction Characteristics, Incomplete Contract Design and Subsequent Performance

    NARCIS (Netherlands)

    Anderson, S.W.; Dekker, H.C.

    2005-01-01

    Using an unusually comprehensive database on 858 transactions for information technology products and accompanying services, we study how close partners who are exposed to opportunistic hazards structure and control a significant transaction. We analyze data on the terms of contracting to determine

  12. Extending Software Transactional Memory in Clojure with Side-Effects and Transaction Control

    DEFF Research Database (Denmark)

    Jensen, Søren Kejser; Thomsen, Lone Leth

    2016-01-01

    In conjunction with the increase of multi-core processors the use of functional programming languages has increased in recent years. The functional language Clojure has concurrency as a core feature, and provides Software Transactional Memory (STM) as a substitute for locks. Transactions in Cloju...

  13. 2013 Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  14. 2011 Passenger Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  15. 2011 Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  16. 2013 Passenger Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  17. 2013 Tanker Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  18. 2013 Cargo Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  19. High Performance Marine Vessels

    CERN Document Server

    Yun, Liang

    2012-01-01

    High Performance Marine Vessels (HPMVs) range from the Fast Ferries to the latest high speed Navy Craft, including competition power boats and hydroplanes, hydrofoils, hovercraft, catamarans and other multi-hull craft. High Performance Marine Vessels covers the main concepts of HPMVs and discusses historical background, design features, services that have been successful and not so successful, and some sample data of the range of HPMVs to date. Included is a comparison of all HPMVs craft and the differences between them and descriptions of performance (hydrodynamics and aerodynamics). Readers will find a comprehensive overview of the design, development and building of HPMVs. In summary, this book: Focuses on technology at the aero-marine interface Covers the full range of high performance marine vessel concepts Explains the historical development of various HPMVs Discusses ferries, racing and pleasure craft, as well as utility and military missions High Performance Marine Vessels is an ideal book for student...

  20. Cheboygan Vessel Base

    Data.gov (United States)

    Federal Laboratory Consortium — Cheboygan Vessel Base (CVB), located in Cheboygan, Michigan, is a field station of the USGS Great Lakes Science Center (GLSC). CVB was established by congressional...

  1. Maury Journals - US Vessels

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — U.S. vessels observations, after the 1853 Brussels Conference that set International Maritime Standards, modeled after Maury Marine Standard Observations.

  2. 2011 Cargo Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  3. 2011 Tanker Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  4. 2013 Fishing Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  5. Coastal Logbook Survey (Vessels)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains catch (landed catch) and effort for fishing trips made by vessels that have been issued a Federal permit for the Gulf of Mexico reef fish,...

  6. LANL Robotic Vessel Scanning

    Energy Technology Data Exchange (ETDEWEB)

    Webber, Nels W. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-11-25

    Los Alamos National Laboratory in J-1 DARHT Operations Group uses 6ft spherical vessels to contain hazardous materials produced in a hydrodynamic experiment. These contaminated vessels must be analyzed by means of a worker entering the vessel to locate, measure, and document every penetration mark on the vessel. If the worker can be replaced by a highly automated robotic system with a high precision scanner, it will eliminate the risks to the worker and provide management with an accurate 3D model of the vessel presenting the existing damage with the flexibility to manipulate the model for better and more in-depth assessment.The project was successful in meeting the primary goal of installing an automated system which scanned a 6ft vessel with an elapsed time of 45 minutes. This robotic system reduces the total time for the original scope of work by 75 minutes and results in excellent data accumulation and transmission to the 3D model imaging program.

  7. Assessing Transaction Environment Conditions for Investment and Construction

    Directory of Open Access Journals (Sweden)

    Mishlanova Marina

    2016-01-01

    Full Text Available This paper contains characteristic description of the transaction-based approach and identifies problems of studying the transaction envi-ronment for investments and construction. It also discusses the results of transaction cost analysis in the real estate sector, and assessment of the business environment in Russia. The authors present indirect assessment of transaction environment through the economic freedom index, detailed particularly for Russia; they demonstrate the transaction environment structure and offer methodological recommendations on evaluation of transaction environment for investment and construction.

  8. Hardware Timestamping for an Image Acquisition System Based on FlexRIO and IEEE 1588 v2 Standard

    Science.gov (United States)

    Esquembri, S.; Sanz, D.; Barrera, E.; Ruiz, M.; Bustos, A.; Vega, J.; Castro, R.

    2016-02-01

    Current fusion devices usually implement distributed acquisition systems for the multiple diagnostics of their experiments. However, each diagnostic is composed by hundreds or even thousands of signals, including images from the vessel interior. These signals and images must be correctly timestamped, because all the information will be analyzed to identify plasma behavior using temporal correlations. For acquisition devices without synchronization mechanisms the timestamp is given by another device with timing capabilities when signaled by the first device. Later, each data should be related with its timestamp, usually via software. This critical action is unfeasible for software applications when sampling rates are high. In order to solve this problem this paper presents the implementation of an image acquisition system with real-time hardware timestamping mechanism. This is synchronized with a master clock using the IEEE 1588 v2 Precision Time Protocol (PTP). Synchronization, image acquisition and processing, and timestamping mechanisms are implemented using Field Programmable Gate Array (FPGA) and a timing card -PTP v2 synchronized. The system has been validated using a camera simulator streaming videos from fusion databases. The developed architecture is fully compatible with ITER Fast Controllers and has been integrated with EPICS to control and monitor the whole system.

  9. Optimizing Concurrent M3-Transactions: A Fuzzy Constraint Satisfaction Approach

    Directory of Open Access Journals (Sweden)

    Peng LI

    2004-10-01

    Full Text Available Due to the high connectivity and great convenience, many E-commerce application systems have a high transaction volume. Consequently, the system state changes rapidly and it is likely that customers issue transactions based on out-of-date state information. Thus, the potential of transaction abortion increases greatly. To address this problem, we proposed an M3-transaction model. An M3-transaction is a generalized transaction where users can issue their preferences in a request by specifying multiple criteria and optional data resources simultaneously within one transaction. In this paper, we introduce the transaction grouping and group evaluation techniques. We consider evaluating a group of M3-transactions arrived to the system within a short duration together. The system makes optimal decisions in allocating data to transactions to achieve better customer satisfaction and lower transaction failure rate. We apply the fuzzy constraint satisfaction approach for decision-making. We also conduct experimental studies to evaluate the performance of our approach. The results show that the M3-transaction with group evaluation is more resilient to failure and yields much better performance than the traditional transaction model.

  10. The Econometric Procedures of Specific Transaction Identification

    Directory of Open Access Journals (Sweden)

    Doszyń Mariusz

    2017-06-01

    Full Text Available The paper presents the econometric procedures of identifying specific transactions, in which atypical conditions or attributes may occur. These procedures are based on studentized and predictive residuals of the accordingly specified econometric models. The dependent variable is a unit transactional price, and explanatory variables are both the real properties’ attributes and accordingly defined artificial binary variables. The utility of the proposed method has been verified by means of a real market data base. The proposed procedures can be helpful during the property valuation process, making it possible to reject real properties that are specific (both from the point of view of the transaction conditions and the properties’ attributes and, consequently, to select an appropriate set of similar attributes that are essential for the valuation process.

  11. IEEE 1547 and 2030 Standards for Distributed Energy Resources Interconnection and Interoperability with the Electricity Grid

    Energy Technology Data Exchange (ETDEWEB)

    Basso, T.

    2014-12-01

    Public-private partnerships have been a mainstay of the U.S. Department of Energy and the National Renewable Energy Laboratory (DOE/NREL) approach to research and development. These partnerships also include technology development that enables grid modernization and distributed energy resources (DER) advancement, especially renewable energy systems integration with the grid. Through DOE/NREL and industry support of Institute of Electrical and Electronics Engineers (IEEE) standards development, the IEEE 1547 series of standards has helped shape the way utilities and other businesses have worked together to realize increasing amounts of DER interconnected with the distribution grid. And more recently, the IEEE 2030 series of standards is helping to further realize greater implementation of communications and information technologies that provide interoperability solutions for enhanced integration of DER and loads with the grid. For these standards development partnerships, for approximately $1 of federal funding, industry partnering has contributed $5. In this report, the status update is presented for the American National Standards IEEE 1547 and IEEE 2030 series of standards. A short synopsis of the history of the 1547 standards is first presented, then the current status and future direction of the ongoing standards development activities are discussed.

  12. Implementing e-Transactions with Asynchronous Replication

    OpenAIRE

    Frolund, Svend; Guerraoui, Rachid

    2000-01-01

    An e-Transaction is one that executes exactly-once despite failures. This paper describes a distributed protocol that implements the abstraction of e-Transactionsin three-tier architectures. Three-tier architectures are typically Internet-oriented architectures, where the end-user interacts with front-end clients (e.g., browsers) that invoke middle-tier application servers (e.g., web servers) to access back-end databases. We implement the e-Transaction abstraction using an asynchronous replic...

  13. Plural Governance: A Modified Transaction Cost Model

    DEFF Research Database (Denmark)

    Mols, Niels Peter; Menard, Claude

    2014-01-01

    Plural governance is a form of governance where a firm both makes and buys similar goods or services. Despite a widespread use of plural governance there are no transaction cost models of how plural governance affects performance. This paper reviews the literature about plural forms and proposes...... a model relating transaction cost and resource-based variables to the cost of the plural form. The model is then used to analyze when the plural form is efficient compared to alternative governance structures. We also use the model to discuss the strength of three plural form synergies....

  14. Lazy Evaluation for Concurrent OLTP and Bulk Transactions

    NARCIS (Netherlands)

    Wevers, L.; Huisman, Marieke; van Keulen, Maurice

    2016-01-01

    Existing concurrency control systems cannot execute transactions with overlapping updates concurrently. This is especially problematic for bulk updates, which usually overlap with all concurrent transactions. To solve this, we have developed a concurrency control mechanism based on lazy evaluation,

  15. Nonlinear Transaction Pricing in the Securities Trading Value Chain

    OpenAIRE

    Burghardt, Matthias

    2007-01-01

    Most of the research on transaction costs in the market microstructure literature focuses on implicit transaction costs. Research on the design of price schedules for explicit transaction fees is rare. This paper analyzes and classifies different price schedules and discusses their application to the market transaction business. The discussion highlights design issues and the need for a structured approach for price schedule design in the context of market engineering. In order to get some...

  16. Transaction costs and asset prices : a dynamic equilibrium model

    OpenAIRE

    Dimitri Vayanos

    1998-01-01

    In this article we study the effects of transaction costs on asset prices. We assume an overlapping generations economy with a riskless, liquid bond, and many risky stocks carrying proportional transaction costs. We obtain stock prices and turnover in closed form. Surprisingly, a stock's price may increase in transaction costs, and a more frequently traded stock may be less adversely affected by an increase in transaction costs. Calculations based on the 'marginal' investor overestimate the e...

  17. IEEE 1451.2 based Smart sensor system using ADuc847

    Science.gov (United States)

    Sreejithlal, A.; Ajith, Jose

    IEEE 1451 standard defines a standard interface for connecting transducers to microprocessor based data acquisition systems, instrumentation systems, control and field networks. Smart transducer interface module (STIM) acts as a unit which provides signal conditioning, digitization and data packet generation functions to the transducers connected to it. This paper describes the implementation of a microcontroller based smart transducer interface module based on IEEE 1451.2 standard. The module, implemented using ADuc847 microcontroller has 2 transducer channels and is programmed using Embedded C language. The Sensor system consists of a Network Controlled Application Processor (NCAP) module which controls the Smart transducer interface module (STIM) over an IEEE1451.2-RS232 bus. The NCAP module is implemented as a software module in C# language. The hardware details, control principles involved and the software implementation for the STIM are described in detail.

  18. An Extended IEEE 118-Bus Test System With High Renewable Penetration

    Energy Technology Data Exchange (ETDEWEB)

    Pena, Ivonne; Martinez-Anido, Carlo Brancucci; Hodge, Bri-Mathias

    2018-01-01

    This article describes a new publicly available version of the IEEE 118-bus test system, named NREL-118. The database is based on the transmission representation (buses and lines) of the IEEE 118-bus test system, with a reconfigured generation representation using three regions of the US Western Interconnection from the latest Western Electricity Coordination Council (WECC) 2024 Common Case [1]. Time-synchronous hourly load, wind, and solar time series are provided for over one year (8784 hours). The public database presented and described in this manuscript will allow researchers to model a test power system using detailed transmission, generation, load, wind, and solar data. This database includes key additional features that add to the current IEEE 118-bus test model, such as: the inclusion of 10 generation technologies with different heat rate functions, minimum stable levels and ramping rates, GHG emissions rates, regulation and contingency reserves, and hourly time series data for one full year for load, wind and solar generation.

  19. PERFORMANCE STUDY OF DISTRIBUTED COORDINATION FUNCTION OVER IEEE 802.11A PHYSICAL LAYER

    Directory of Open Access Journals (Sweden)

    S. SELVAKENEDDY

    2006-06-01

    Full Text Available IEEE 802.11a is one of the latest standards to be released by the IEEE Project 802 for wireless LANs. It has specified an additional physical layer (PHY to support higher data rates, and is termed as the orthogonal frequency division multiplexing (OFDM. In order to exploit its benefits, one of the medium access control (MAC protocols specified in the IEEE 802.11 specification is called distributed coordination function (DCF. DCF is a carrier sense multiple access with collision avoidance (CSMA/CA scheme with slotted binary exponential backoff. The frames can be transmitted using the basic access scheme or the RTS/CTS scheme in DCF. It was demonstrated previously that the RTS/CTS mechanism works well in most scenarios for the previously specified PHYs. In this work, a simple simulator is developed to verify the scalability of the RTS/CTS mechanism over OFDM PHY, which supports much higher data rates.

  20. Design of handoff procedures for broadband wireless access IEEE 802.16 based networks

    Directory of Open Access Journals (Sweden)

    V. Rangel–Licea

    2008-01-01

    Full Text Available IEEE 802.16 is a protocol for fixed broad band wire less access that is currently trying to add mobility among mobile users in the standard. However, mobility adds some technical barriers that should be solved first, this is the case of HO "handoff" (change of connection between two base stations "BS" by a mobile user. In this paper, the problem of HO in IEEE 802.16 is approached try ing to maintain the quality of service (QoS of mobile users. A mechanism for changing connection during HO is pre sented. A simulation model based on OPNET MODELER1 was developed to evaluate the performance of the proposed HO mechanism. Finally, this paper demonstrates that it is possible to implement a seam less HO mech a nism over IEEE 802.16 even for users with de manding applications such as voice over IP.

  1. Adaptive Ranging Code Allocation Scheme in IEEE 802.16 Networks

    Directory of Open Access Journals (Sweden)

    Chu Kuo-Chih

    2010-01-01

    Full Text Available IEEE 802.16 uses the code division multiple access (CDMA method as the channel access method to decrease the collision probability of data delivery. However, IEEE 802.16 does not regulate a ranging code allocation scheme in its specification. In this paper, we propose the adaptive ranging code allocation (ARCA scheme, a novel ranging code allocation scheme for IEEE 802.16. According to the traffic sent to the base station (BS from the mobile station (MS, the ARCA scheme not only forecasts the traffic quantity of the MS but also finds the optimal ranging code allocation value for the MS to improve the transmission success rate next time. The ARCA scheme is verified with simulation and compared with other schemes in performance differences. According to the simulation results, the ARCA scheme is proved to have better performance than other schemes.

  2. An analytical model for the performance analysis of concurrent transmission in IEEE 802.15.4.

    Science.gov (United States)

    Gezer, Cengiz; Zanella, Alberto; Verdone, Roberto

    2014-03-20

    Interference is a serious cause of performance degradation for IEEE802.15.4 devices. The effect of concurrent transmissions in IEEE 802.15.4 has been generally investigated by means of simulation or experimental activities. In this paper, a mathematical framework for the derivation of chip, symbol and packet error probability of a typical IEEE 802.15.4 receiver in the presence of interference is proposed. Both non-coherent and coherent demodulation schemes are considered by our model under the assumption of the absence of thermal noise. Simulation results are also added to assess the validity of the mathematical framework when the effect of thermal noise cannot be neglected. Numerical results show that the proposed analysis is in agreement with the measurement results on the literature under realistic working conditions.

  3. A 1-GHz charge pump PLL frequency synthesizer for IEEE 1394b PHY

    DEFF Research Database (Denmark)

    Ji, J.; Liu, H.; Li, Q.

    2012-01-01

    This paper presents an implementation of multi-rate SerDes transceiver for IEEE 1394b applications. Simple and effective pre-emphasis and equalizer circuits are used at transmitter and receiver, respectively. A phase interpolator based clock and data recovery circuit with optimized linearity...... is also described. With an on-chip fully integrated phase locked loop, the transceiver works at data rates of 100Mb/s, 400Mb/s and 800Mb/s, supporting three different operating modes of S100b, S400b and S800b for IEEE 1394b. The chip has been fabricated using 0.13μm technology. The die area of transceiver...... is 2.9*1.6 mm including bonding pads and the total power dissipation is 284 mW with 1.2V and 3.3V supply voltages. © 2012 IEEE....

  4. Throughput and delay analysis of IEEE 802.15.6-based CSMA/CA protocol.

    Science.gov (United States)

    Ullah, Sana; Chen, Min; Kwak, Kyung Sup

    2012-12-01

    The IEEE 802.15.6 is a new communication standard on Wireless Body Area Network (WBAN) that focuses on a variety of medical, Consumer Electronics (CE) and entertainment applications. In this paper, the throughput and delay performance of the IEEE 802.15.6 is presented. Numerical formulas are derived to determine the maximum throughput and minimum delay limits of the IEEE 802.15.6 for an ideal channel with no transmission errors. These limits are derived for different frequency bands and data rates. Our analysis is validated by extensive simulations using a custom C+ + simulator. Based on analytical and simulation results, useful conclusions are derived for network provisioning and packet size optimization for different applications.

  5. Enhancing supply vessel safety

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-07-01

    A supply-vessel bridge installation consists of a navigating bridge and a control position aft, from which operators control the ship when close to rigs or platforms, and operate winches and other loading equipment. The international Convention for Safety of I Ale at Sea (SOLAS) does not regulate the layout, so design varies to a large degree, often causing an imperfect working environment. As for other types of ships, more than half the offshore service vessel accidents at sea are caused by bridge system failures. A majority can be traced back to technical design, and operational errors. The research and development project NAUT-OSV is a response to the offshore industry's safety concerns. Analysis of 24 incidents involving contact or collision between supply vessels and offshore installations owned or operated by Norwegian companies indicated that failures in the bridge system were often the cause.

  6. Applying IEEE storage system management standards at the National Storage Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Louis, S.; Hyer, S.W.

    1992-12-04

    Since its inception in 1990, the IEEE Storage System Standards Working Group has identified storage-system management as an area in need of further development The pressing need for standards in storage-system management arises from the requirement to exchange management information and to provide control in a consistent predictable manner between the components of a storage system. An appropriate set of management standards will allow multiple vendors to supply storage management subsystems or applications that are integral to or compatible with new storage systems conforming to future IEEE standards. An early, practical application of IEEE storage-system-management work is being pursued at the National Storage Laboratory (NSL), a recently-formed industrial collaboration at Lawrence Livermore National Laboratory. The NSL`s purpose is to develop advanced hardware and software technologies for high-performance, distributed storage systems. Since storage system management is of critical concern, it is being explored in depth at the NSL. Work was initiated to define basic management requirements and develop generalized graphical-user-interface tools using remote-procedure-call mechanisms to implement the NSL`s conceptual management framework. Several constraints were imposed on the development of early versions of this work to maintain compatibility with the NSL`s underlying UniTree-based software architecture and to provide timely prototypes and proof of concept. The project leverages the on-going standards work of the IEEE Storage System Standards Working Group (SSSWG) and also explores some of the relationships and interactions between IEEE storage-system management and more well known management methods for distributed systems and networks. It will have long term benefits by providing ``real-life`` storage-system-management requirements to the IEEE SSSWG for validation of evolving standards.

  7. 31 CFR 560.526 - Commodities trading and related transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Commodities trading and related transactions. 560.526 Section 560.526 Money and Finance: Treasury Regulations Relating to Money and Finance... Iranian-origin goods, or transactions incidental to such trading, where: (1) No party to the transaction...

  8. Electronic Business Transaction Infrastructure Analysis Using Petri Nets and Simulation

    Science.gov (United States)

    Feller, Andrew Lee

    2010-01-01

    Rapid growth in eBusiness has made industry and commerce increasingly dependent on the hardware and software infrastructure that enables high-volume transaction processing across the Internet. Large transaction volumes at major industrial-firm data centers rely on robust transaction protocols and adequately provisioned hardware capacity to ensure…

  9. 45 CFR 162.1901 - Medicaid pharmacy subrogation transaction.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Medicaid pharmacy subrogation transaction. 162... STANDARDS AND RELATED REQUIREMENTS ADMINISTRATIVE REQUIREMENTS Medicaid Pharmacy Subrogation § 162.1901 Medicaid pharmacy subrogation transaction. The Medicaid pharmacy subrogation transaction is the...

  10. 31 CFR 538.418 - Financial transactions in Sudan.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Financial transactions in Sudan. 538... Interpretations § 538.418 Financial transactions in Sudan. (a) Any financial transaction with a depository institution located in an area of Sudan other than the Specified Areas of Sudan, e.g., Khartoum, remains...

  11. An Architecture for Nested Transaction Support on Standard Database Systems

    NARCIS (Netherlands)

    Boertjes, E.M.; Grefen, P.W.P.J.; Vonk, J.; Apers, Peter M.G.

    Many applications dealing with complex processes require database support for nested transactions. Current commercial database systems lack this kind of support, offering flat, non-nested transactions only. This paper presents a three-layer architecture for implementing nested transaction support on

  12. 17 CFR 31.17 - Records of leverage transactions.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Records of leverage... LEVERAGE TRANSACTIONS § 31.17 Records of leverage transactions. (a) Each leverage transaction merchant receiving a leverage customer's order shall immediately upon receipt thereof prepare a written record of...

  13. 26 CFR 1.446-4 - Hedging transactions.

    Science.gov (United States)

    2010-04-01

    ... sales proceeds. If a hedge is associated with a particular purchase or sales transaction, the gain or... of cost incurred in, or sales proceeds from, that transaction. As with hedges of aggregate risk... 26 Internal Revenue 6 2010-04-01 2010-04-01 false Hedging transactions. 1.446-4 Section 1.446-4...

  14. 17 CFR 300.503 - Voidable securities transactions.

    Science.gov (United States)

    2010-04-01

    ... proceeding under the Act to avoid any securities transaction as fraudulent, preferential, or otherwise... securities transaction which could have been avoided in a liquidation proceeding under the Act. ... transactions. 300.503 Section 300.503 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION...

  15. 12 CFR 563.41 - Transactions with affiliates.

    Science.gov (United States)

    2010-01-01

    ... its affiliates and any other person to the extent that the proceeds of a transaction are used for the... proceed with the proposed transaction. ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Transactions with affiliates. 563.41 Section...

  16. GE networked mass storage solutions supporting IEEE network mass storage model

    Science.gov (United States)

    Herzog, Donald

    1993-01-01

    The General Electric Government Communications Systems Department (GE/GCSD) has developed a near real time digital data storage and retrieval system that extends the capabilities currently available in today's marketplace. This system called DuraStore uses commercially available rotary tape drive technology with ANSI/IEEE standards for automated magnetic tape based data storage. It uses a nonproprietary approach to satisfy a wide range of data rates and storage capabilities requirements and is compliant with the IEEE Network Storage Model. Rotary tape drives, standard interfaces, application specific hardware/software, networked automated tape libraries, library administrator, write protection, volume/physical media linkages, and maximum resource utilization are addressed.

  17. Design of acquisition devices management subsystem for IEEE 1073 compliant software agents.

    Science.gov (United States)

    Nagin, V A; Potapov, I V; Selishchev, S V

    2002-01-01

    The paper addresses the issue of device management system design for software agents compliant with IEEE 1073 device communication standard. Based on middleware architecture the device control layer represents a universal versatile object-oriented application-programming interface. The approach presented in the paper allows to implement plug-and-play integration and interoperability of medical acquisition devices within the medical device system be means of common middleware services. Adherence to Medical Data Information Base nomenclature, component part of IEEE 1073 communication standard, adds necessary consistency to presented component-based infrastructure.

  18. BER Analysis Of IEEE802.11n MIMO System Using MMSE And ZF Detectors

    Directory of Open Access Journals (Sweden)

    Ye Lwin Oo

    2015-06-01

    Full Text Available Abstract With the increasing demand of higher data rate for telecommunication the IEEE802.11n standard was constituted in 2009. The most important character of the standard is MIMO-OFDM which not only improves the throughput but also the spectrum efficiency and channel capacity. And in wireless communication the role of MIMO detectors plays an important part to remove inter-symbol interference ISI caused by multipath fading channel. In this paper the BER performance of IEEE 802.11n for 3x2 4x2 and 4x3 antennas are compared using MMSE and ZF detectors in Matlab Simulink.

  19. Reactive GTS Allocation Protocol for Sporadic Events Using the IEEE 802.15.4

    Directory of Open Access Journals (Sweden)

    Mukhtar Azeem

    2014-01-01

    by the IEEE 802.15.4 standard. The proposed control protocol ensures that a given offline sporadic schedule can be adapted online in a timely manner such that the static periodic schedule has not been disturbed and the IEEE 802.15.4 standard compliance remains intact. The proposed protocol is simulated in OPNET. The simulation results are analyzed and presented in this paper to prove the correctness of the proposed protocol regarding the efficient real-time sporadic event delivery along with the periodic event propagation.

  20. Analysis Of Impact Of Various Parameters On BER Performance For IEEE 802.11b

    Directory of Open Access Journals (Sweden)

    Nilesh B. Kalani

    2015-08-01

    Full Text Available Abstract This paper discusses about IEEE 802.11b simulation model implemented using LabVIEW software and its analyses for impact on bit error rate BER for different parameters as channel type channel number data transmission rate and packet size. Audio file is being transmitted processed and analyzed using the model for various parameters. This paper gives analysis of BER verses ESN0 for various parameter like data rate packet size and communication channel for the IEEE 802.11b simulation model generated using LabVIEW. It is proved that BER can be optimized by tweaking different parameters of wireless communication system.

  1. International Conference on Grey Systems and intelligent Services (IEEE GSIS 2009)

    CERN Document Server

    Liu, Sifeng; Advances in Grey Systems Research

    2010-01-01

    This book contains contributions by some of the leading researchers in the area of grey systems theory and applications. All the papers included in this volume are selected from the contributions physically presented at the 2009 IEEE International Conference on Grey Systems and Intelligent Services, November 11 – 12, 2009, Nanjing, Jiangsu, People’s Republic of China. This event was jointly sponsored by IEEE Systems, Man, and Cybernetics Society, Natural Science Foundation of China, and Grey Systems Society of China. Additionally, Nanjing University of Aeronautics and Astronautics also invested heavily in this event with its direct and indirect financial and administrative supports.

  2. Optimal Power Flow Analysis of IEEE 14 System with Distributed Generators

    Directory of Open Access Journals (Sweden)

    DULĂU Lucian Ioan

    2016-05-01

    Full Text Available This paper describes the mathematical model for the optimal power flow analysis of the IEEE 14 bus system. In the IEEE 14 bus system were connected two distributed generators (DGs: a hydro generator and a photovoltaic power plant. The two objective functions which are minimized, are the generation costs and the total power losses of the system, while there are satisfied equality and inequality constraints. The optimal power flow analysis will be performed for the steady-state condition of the system and for the whole day, for two cases: the DGs are connected to the system and the DGs are not connected to the system.

  3. IEEE 802.11e (EDCA analysis in the presence of hidden stations

    Directory of Open Access Journals (Sweden)

    Xijie Liu

    2011-07-01

    Full Text Available The key contribution of this paper is the combined analytical analysis of both saturated and non-saturated throughput of IEEE 802.11e networks in the presence of hidden stations. This approach is an extension to earlier works by other authors which provided Markov chain analysis to the IEEE 802.11 family under various assumptions. Our approach also modifies earlier expressions for the probability that a station transmits a packet in a vulnerable period. The numerical results provide the impact of the access categories on the channel throughput. Various throughput results under different mechanisms are presented.

  4. Protocolo de pruebas para máquinas rotativas de baja potencia fundamentadas en Normas IEEE

    OpenAIRE

    Ochoa Gutiérrez, Paúl Santiago

    2012-01-01

    En esta guía se ha realizado un análisis técnico para lograr normalizar la ejecución de los ensayos en los laboratorios de máquinas eléctricas, listar los equipos y procedimientos para la valoración de las pruebas, siguiendo lineamientos establecidos en las normativas IEEE 112-1996, 115-1995, 113-1985. El documento sintetiza: el tipo de pruebas; la selección de las pruebas; el uso de las normas IEEE; las pruebas con carga; la prueba de rotor bloqueado; y la hoja de toma de datos. Valida...

  5. Beyond Intra-Transaction Association Analysis: Mining Multi-Dimensional Inter-Transaction Association Rules

    NARCIS (Netherlands)

    Lu, H.J.; Feng, L.; Han, J.W.

    2000-01-01

    In this paper, we extend the scope of mining association rules from traditional single-dimensional intratransaction associations, to multidimensional intertransaction associations. Intratransaction associations are the associations among items with the same transaction, where the notion of the

  6. Relationship between transactional leadership and knowledge ...

    African Journals Online (AJOL)

    The Transactional style of leadership involves motivating and directing followers primarily through appealing to their own self-interest. Besides, Knowledge management (KM) is the process of capturing, developing, sharing, and effectively using organizational knowledge. It refers to a multi-disciplined approach to achieving ...

  7. Governance structures for real estate transactions: Markets ...

    African Journals Online (AJOL)

    This article examines the relative prevalence of markets, hierarchies and networks in the governance of real-estate transactions under three property rights regimes in Windhoek's low-income settlements. These governance structures are related to respective property rights regimes and to conjectures made about the ...

  8. Trust management for e-transactions

    Indian Academy of Sciences (India)

    Transactions and services over the internet have global reach and users, known or unknown to the service provider, might be interested in availing access or participating ... Trust plays a crucial role in the design of optimal contracts; not all the relevant, valuable information on the user's choice of action is incorporated in the ...

  9. Economic transactions, opportunistic behavior and protective mechanisms

    DEFF Research Database (Denmark)

    Koch, Carsten Allan

    Whenever actors participate in transactions they expose themselves to risks of various kinds. Some of these risks are attributable to events outside the control of the participants and are unavoidable. Others originate in, or are aggrevated by, opportunistic actions undertaken by contract partner...

  10. Rethinking Ethiopian Secured Transactions Law through ...

    African Journals Online (AJOL)

    Asress Adimi Gikay

    September 2017. Introduction. International organizations and states recognize modern secured transactions law as vital for economic development. The United Nations Commission on. International Trade Law (UNCITRAL),2. EBRD3 and the Institute for. Unification of Private International Law (UNIDROIT) are among the ...

  11. A Transactional Model of Bullying and Victimization

    Science.gov (United States)

    Georgiou, Stelios N.; Fanti, Kostas A.

    2010-01-01

    The purpose of the current study was to develop and test a transactional model, based on longitudinal data, capable to describe the existing interrelation between maternal behavior and child bullying and victimization experiences over time. The results confirmed the existence of such a model for bullying, but not for victimization in terms of…

  12. 75 FR 48562 - Iranian Transactions Regulations

    Science.gov (United States)

    2010-08-11

    ... transactions with respect to the development of Iranian petroleum resources. On May 6, 1995, to further respond... ENGINEERING COMPANY (a.k.a. MAHAB GHODSS CONSULTING ENGINEERING CO.; a.k.a. MAHAB GHODSS CONSULTING ENGINEERS SSK; a.k.a. MAHAB QODS ENGINEERING CONSULTING CO.), 16 Takharestan Alley, Dastgerdy Avenue, P.O. Box...

  13. Towards Online and Transactional Relational Schema Transformations

    NARCIS (Netherlands)

    Wevers, L.; Hofstra, Matthijs; Tammens, Menno; Huisman, Marieke; van Keulen, Maurice

    2014-01-01

    In this paper, we want to draw the attention of the database community to the problem of online schema changes: changing the schema of a database without blocking concurrent transactions. We have identified important classes of relational schema transformations that we want to perform online, and we

  14. Foreign experience of regulating international trade transactions

    Directory of Open Access Journals (Sweden)

    Klymenko L. V.

    2015-05-01

    Full Text Available The article deals with the international experience of state regulating international trade transactions; nature, directions and contradictions of contemporary processes of globalization are defined; components of regulatory and incentive means in system of state supporting foreign trade activity of commodity producers are considered; general provisions for the improvement of state regulation mechanisms of export-import activities in Ukraine are determined.

  15. Trust management for e-transactions

    Indian Academy of Sciences (India)

    R. Narasimhan (Krishtel eMaging) 1461 1996 Oct 15 13:05:22

    Transactions and services over the internet have global reach and users, known or unknown to the ... medium for disseminating information, doing commerce and business. The enabling tech- nologies are .... centralized models like X.509, trust accumulates at the global CA (root certification authority) and trustworthiness of ...

  16. Transformational and transactional leadership styles among leaders ...

    African Journals Online (AJOL)

    In contrast to transformational leadership where the leader works with employees to identify the needed change, creating a vision to guide the change through inspiration, and executing the change in tandem with committed members of the group, transactional leadership styles focus on the use of rewards and punishments ...

  17. Transactions of the Zimbabwe Scientific Association

    African Journals Online (AJOL)

    The Zimbabwe Scientific Association was founded in Bulawayo in 1899 (called the Rhodesia Scientific Assocation at the time) to promote the study and advancement of science in Zimbabwe and to facilitate the acquisition and dissemination of scientific knowledge. Its journal, Transactions of the Zimbabwe Scientific ...

  18. 17 CFR 30.3 - Prohibited transactions.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Prohibited transactions. 30.3 Section 30.3 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION FOREIGN FUTURES AND... foreign board of trade, and carried for or on behalf of a customer at a designated contract market...

  19. 31 CFR 800.207 - Covered transaction.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Covered transaction. 800.207 Section 800.207 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF INVESTMENT SECURITY, DEPARTMENT OF THE TREASURY REGULATIONS PERTAINING TO MERGERS, ACQUISITIONS, AND...

  20. Gestion des transactions en environnement mobile | Nouali ...

    African Journals Online (AJOL)

    Management of Transactions In Mobile Computing Environment Increasingly diverse applications have made computers an ubiquitous part of our daily lives. As their range of applications widens, demand is growing for computers that can perform outside the home or office. Accordingly, mobile computing is attracting ...

  1. 31 CFR 537.210 - Exempt transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Exempt transactions. 537.210 Section 537.210 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... personal and household effects set forth in §§ 537.511 and 537.514. ...

  2. Private benefits in corporate control transactions

    DEFF Research Database (Denmark)

    Poulsen, Thomas

    This paper presents an analytical framework from which it can be inferred whether sellers or buyers in corporate control transactions value private benefits highest. I am thus able to suggest an answer to the question: Are blocks of shares traded because the buyer is a more efficient monitor...

  3. Private Benefits in Corporate Control Transactions

    DEFF Research Database (Denmark)

    Poulsen, Thomas

    2011-01-01

    This paper presents an analytical framework from which it can be inferred whether sellers or buyers in block transactions value private benefits highest. I am thus able to suggest an answer to the question: Are blocks of shares traded because the buyer has high security benefits, or because the b...

  4. 76 FR 41375 - Retail Foreign Exchange Transactions

    Science.gov (United States)

    2011-07-14

    ... Commodity Futures Trading Commission (CFTC) issued a retail forex rule for persons subject to its... trading strategies; or (iii) the customer employs different trading strategies in one account and applies... transactions is trading as principal, by definition, when the retail forex customer loses money on a retail...

  5. 77 FR 62177 - Retail Foreign Exchange Transactions

    Science.gov (United States)

    2012-10-12

    ... (CFTC) with jurisdiction over certain accounts and pooled investment vehicles trading in retail forex, a...' forex trading is with bank funds or insurance company separate accounts? Question 5. Should the OCC's... \\5\\ (a retail foreign exchange (forex) rule). Transactions described in section 2(c)(2)(B)(i)(I...

  6. 76 FR 56094 - Retail Foreign Exchange Transactions

    Science.gov (United States)

    2011-09-12

    ... section is as follows: Risk Disclosure Statement Retail forex transactions involve the leveraged trading... margin for retail forex trading. You may lose more than you pledge as margin. If your margin falls below... before determining whether retail forex trading is appropriate for you. (1) Trading is not on a regulated...

  7. Culture and subculture in transactional letter writing

    DEFF Research Database (Denmark)

    Shaw, Philip; Okamura, Akiko

    2000-01-01

    This study examines the relative contributions of subculture membership and mother-tongue status/target culture membership in writing transactional letters. We examined the letters accompanying articles initially submitted for publication by 26 NSE and 23 NNSE academics, and compared them...

  8. Related party transactions and firms financial performance ...

    African Journals Online (AJOL)

    The study investigated related party transactions and firm's financial performance using Secondary data obtained from Nigeria stock Exchange. We tried to determine whether RPT is used by firms to manipulate and bloat Return on Asset, Return on Equity and Earnings per share of manufacturing firms. RPT was subjected ...

  9. 17 CFR 242.601 - Dissemination of transaction reports and last sale data with respect to transactions in NMS stocks.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Dissemination of transaction reports and last sale data with respect to transactions in NMS stocks. 242.601 Section 242.601 Commodity... National Market System § 242.601 Dissemination of transaction reports and last sale data with respect to...

  10. Transactive Campus Energy Systems: Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Katipamula, Srinivas [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Corbin, Charles D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Haack, Jereme N. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Hao, He [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Kim, Woohyun [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Hostick, Donna J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Akyol, Bora A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Allwardt, Craig H. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Carpenter, Brandon J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Huang, Sen [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Liu, Guopeng [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lutes, Robert G. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Makhmalbaf, Atefe [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Mendon, Vrushali V. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Ngo, Hung [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Somasundaram, Sriram [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Underhill, Ronald M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Zhao, Mingjie [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2017-09-26

    Transactive energy refers to the combination of economic and control techniques to improve grid reliability and efficiency. The fundamental purpose of transactive energy management is to seamlessly coordinate the operation of large numbers of new intelligent assets—such as distributed solar, energy storage and responsive building loads—to provide the flexibility needed to operate the power grid reliably and at minimum cost, particularly one filled with intermittent renewable generation such as the Pacific Northwest. It addresses the key challenge of providing smooth, stable, and predictable “control” of these assets, despite the fact that most are neither owned nor directly controlled by the power grid. The Clean Energy and Transactive Campus (CETC) work described in this report was done as part of a Cooperative Research and Development Agreement (CRADA) between the U.S. Department of Energy’s Pacific Northwest National Laboratory (PNNL) and the Washington State Department of Commerce (Commerce) through the Clean Energy Fund (CEF). The project team consisted of PNNL, the University of Washington (UW) and Washington State University (WSU), to connect the PNNL, UW, and WSU campuses to form a multi-campus testbed for transaction-based energy management—transactive—solutions. Building on the foundational transactive system established by the Pacific Northwest Smart Grid Demonstration (PNWSGD), the purpose of the project was to construct the testbed as both a regional flexibility resource and as a platform for research and development (R&D) on buildings/grid integration and information-based energy efficiency. This report provides a summary of the various tasks performed under the CRADA.

  11. GOLD PRESSURE VESSEL SEAL

    Science.gov (United States)

    Smith, A.E.

    1963-11-26

    An improved seal between the piston and die member of a piston-cylinder type pressure vessel is presented. A layer of gold, of sufficient thickness to provide an interference fit between the piston and die member, is plated on the contacting surface of at least one of the members. (AEC)

  12. Network of endocardial vessels.

    Science.gov (United States)

    Lee, Byung-Cheon; Kim, Hong Bae; Sung, Baeckkyoung; Kim, Ki Woo; Sohn, Jamin; Son, Boram; Chang, Byung-Joon; Soh, Kwang-Sup

    2011-01-01

    Although there have been reports on threadlike structures inside the heart, they have received little attention. We aimed to develop a method for observing such structures and to reveal their ultrastructures. An in situ staining method, which uses a series of procedures of 0.2-0.4% trypan blue spraying and washing, was applied to observe threadlike structures on the surfaces of endocardia. The threadlike structures were isolated and observed by using confocal laser scanning microscopy (CLSM) and transmission electron microscopy (TEM). Networks of endocardial vessels (20 μm in thickness) with expansions (40-100 μm in diameter) were visualized; they were movable on the endocardium of the bovine atrium and ventricle. CLSM showed that (1) rod-shaped nuclei were aligned along the longitudinal direction of the endocardial vessel and (2) there were many cells inside the expansion. TEM on the endocardial vessel revealed that (1) there existed multiple lumens (1-7 μm in diameter) and (2) the extracellular matrices mostly consisted of collagen fibers, which were aligned along the longitudinal direction of the endocardial vessel or were locally organized in reticular structures. We investigated the endocardial circulatory system in bovine cardiac chambers and its ultrastructures, such as nucleic distributions, microlumens, and collagenous extracellular matrices. Copyright © 2011 S. Karger AG, Basel.

  13. Pressurized Vessel Slurry Pumping

    Energy Technology Data Exchange (ETDEWEB)

    Pound, C.R.

    2001-09-17

    This report summarizes testing of an alternate ''pressurized vessel slurry pumping'' apparatus. The principle is similar to rural domestic water systems and ''acid eggs'' used in chemical laboratories in that material is extruded by displacement with compressed air.

  14. Transaction-Based Building Controls Framework, Volume 1: Reference Guide

    Energy Technology Data Exchange (ETDEWEB)

    Somasundaram, Sriram [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Pratt, Robert G. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Akyol, Bora A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Fernandez, Nicholas [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Foster, Nikolas AF [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Katipamula, Srinivas [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Mayhorn, Ebony T. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Somani, Abhishek [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Steckley, Andrew C. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Taylor, Zachary T. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2014-12-01

    This document proposes a framework concept to achieve the objectives of raising buildings’ efficiency and energy savings potential benefitting building owners and operators. We call it a transaction-based framework, wherein mutually-beneficial and cost-effective market-based transactions can be enabled between multiple players across different domains. Transaction-based building controls are one part of the transactional energy framework. While these controls realize benefits by enabling automatic, market-based intra-building efficiency optimizations, the transactional energy framework provides similar benefits using the same market -based structure, yet on a larger scale and beyond just buildings, to the society at large.

  15. How to deal with malleability of BitCoin transactions

    OpenAIRE

    Andrychowicz, Marcin; Dziembowski, Stefan; Malinowski, Daniel; Mazurek, Łukasz

    2013-01-01

    BitCoin transactions are malleable in a sense that given a transaction an adversary can easily construct an equivalent transaction which has a different hash. This can pose a serious problem in some BitCoin distributed contracts in which changing a transaction's hash may result in the protocol disruption and a financial loss. The problem mostly concerns protocols, which use a "refund" transaction to withdraw a deposit in a case of the protocol interruption. In this short note, we show a gener...

  16. Market Model Considering Bilateral Transactions in the Deregulated Electricity Market

    Science.gov (United States)

    Ruiz Monroy, José Joaquín; Kita, Hiroyuki; Tanaka, Eiichi; Hasegawa, Jun

    This paper proposes an algorithm to simulate the transactions that take place in a free market of electricity. The algorithm presented is used for Bilateral Transaction Matrix (BTM) creation assuming that a day ahead load forecast is previously known. Bids can be made by both the generation side and the demand side to determine transaction prices, then the algorithm allocates the transactions according to market rules until the demand is satisfied. This creates feasible BTMs that can be used to study system security and to find future methods to regulate bilateral transactions through market mechanisms like the application of penalties to the transactions that affect the system’s security. Results show that the proposed algorithm is a good option for electricity market analysis. The proposed algorithm provides system planners with a practical tool for data creation to further study the effects of bilateral transactions in a deregulated electricity market.

  17. IEEE Computer Society/Software Engineering Institute Watts S. Humphrey Software Process Achievement (SPA) Award 2016: Nationwide

    Science.gov (United States)

    2017-04-05

    REV-03.18.2016.0 IEEE Computer Society/Software Engineering Institute Watts S. Humphrey Software Process Achievement (SPA) Award 2016...20503. 1. AGENCY USE ONLY (Leave Blank) 2. REPORT DATE April 2017 3. REPORT TYPE AND DATES COVERED Final 4. TITLE AND SUBTITLE IEEE Computer

  18. Optimized tuning of contention window for IEEE 802.11 WLAN

    African Journals Online (AJOL)

    Department of Computer Science and Engineering, National Institute of Technology, Tiruchirappalli, INDIA ... Abstract. In wireless networks, the size of Contention Window (CW) plays a vital role as it changes the throughput and delay of the networks ..... Applications, IEEE/ACS International Conference, AICCSA 2008, pp.

  19. Evaluation of QoS Provisioning Capabilities of IEEE 802.11E Wireless LANs

    NARCIS (Netherlands)

    Roijers, Frank; van den Berg, Hans Leo; Fan, Xiang; Fleuren, Maria; Braun, Torsten; Carle, Georg; Koucheryavy, Yevgeni; Tsaoussidis, Vassilis

    2005-01-01

    Several studies in literature have investigated the performance of the proposed ieee 802.11e standard for qos differentiation in wlan, but most of them are limited both with respect to the range of the parameter settings and the considered traffic scenarios.The aim of the present study is to

  20. A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks

    Directory of Open Access Journals (Sweden)

    Yasmin M. Amin

    2016-01-01

    Full Text Available The IEEE 802.15.4 standard has been established as the dominant enabling technology for Wireless Sensor Networks (WSNs. With the proliferation of security-sensitive applications involving WSNs, WSN security has become a topic of great significance. In comparison with traditional wired and wireless networks, WSNs possess additional vulnerabilities which present opportunities for attackers to launch novel and more complicated attacks against such networks. For this reason, a thorough investigation of attacks against WSNs is required. This paper provides a single unified survey that dissects all IEEE 802.15.4 PHY and MAC layer attacks known to date. While the majority of existing references investigate the motive and behavior of each attack separately, this survey classifies the attacks according to clear metrics within the paper and addresses the interrelationships and differences between the attacks following their classification. The authors’ opinions and comments regarding the placement of the attacks within the defined classifications are also provided. A comparative analysis between the classified attacks is then performed with respect to a set of defined evaluation criteria. The first half of this paper addresses attacks on the IEEE 802.15.4 PHY layer, whereas the second half of the paper addresses IEEE 802.15.4 MAC layer attacks.

  1. Performance Evaluations for IEEE 802.15.4-based IoT Smart Home Solution

    Directory of Open Access Journals (Sweden)

    Nga Dinh

    2016-09-01

    Full Text Available The Internet of Things (IoT is going to be a market-changing force for a variety of real-time applications such as e-healthcare, home automation, environmental monitoring, and industrial automation. Low power wireless communication protocols offering long lifetime and high reliability such as the IEEE 802.15.4 standard have been a key enabling technology for IoT deployments and are deployed for home automation recently. The issues of the IEEE 802.15.4 networks have moved from theory to real world deployments. The work presented herein intends to demonstrate the use of the IEEE 802.15.4 standard in recent IoT commercial products for smart home applications: the Smart Home Starter Kit. The contributions of the paper are twofold. First, the paper presents how the IEEE 802.15.4 standard is employed in Smart Home Starter Kit. In particular, network topology, network operations, and data transfer mode are investigated. Second, network performance metrics such as end-to-end (E2E delay and frame reception ratio (FRR are evaluated by experiments. In addition, the paper discusses several directions for future improvements of home automation commercial products.

  2. 0011-0030.Content Alerts in IEEE XploreLearn.pdf | 01 | 021 | reso ...

    Indian Academy of Sciences (India)

    Home; public; Volumes; reso; 021; 01; 0011-0030.Content Alerts in IEEE XploreLearn.pdf. 404! error. The page your are looking for can not be found! Please check the link or use the navigation bar at the top. YouTube; Twitter; Facebook; Blog. Academy News. IAS Logo. Summer Research Fellowship Programme 2018 ...

  3. 0011-0030.IEEE 754: 64 Bit Double Precision FloatsThis.pdf | 01 ...

    Indian Academy of Sciences (India)

    Home; public; Volumes; reso; 021; 01; 0011-0030.IEEE 754: 64 Bit Double Precision FloatsThis.pdf. 404! error. The page your are looking for can not be found! Please check the link or use the navigation bar at the top. YouTube; Twitter; Facebook; Blog. Academy News. IAS Logo. Good Governance: Contribution of ...

  4. 0011-0030.Eng Hussein Mohammad Al-Masri Pres at 2015 IEEE ...

    Indian Academy of Sciences (India)

    Masri Pres at 2015 IEEE IAS Conference in DallasUSAIEEE ULT SB IAS participationWe.pdf. 404! error. The page your are looking for can not be found! Please check the link or use the navigation bar at the top. YouTube; Twitter; Facebook; Blog ...

  5. 0011-0030.IEEE Floating Point Addition amp MultiplicationPlease ...

    Indian Academy of Sciences (India)

    Home; public; Volumes; reso; 021; 01; 0011-0030.IEEE Floating Point Addition amp MultiplicationPlease.pdf. 404! error. The page your are looking for can not be found! Please check the link or use the navigation bar at the top. YouTube · Twitter · Facebook · Blog. Academy News. IAS Logo. Live streaming of the Symposium ...

  6. Computer Controlled Test Systems. Introduction. A Course Based on the IEEE 488 Bus.

    Science.gov (United States)

    Herrmann, Eric J.

    An introductory course in computer automated tests and measurement systems based on the International Test Instrument-Computer Interface Standard, the IEEE (Institute of Electrical and Electronics Engineers)-488, is presented in this study guide. This course is designed to: (1) introduce the electronics engineering technician to the functional…

  7. Evaluation of the Effects of Hidden Node Problems in IEEE 802.15.7 Uplink Performance.

    Science.gov (United States)

    Ley-Bosch, Carlos; Alonso-González, Itziar; Sánchez-Rodríguez, David; Ramírez-Casañas, Carlos

    2016-02-06

    In the last few years, the increasing use of LEDs in illumination systems has been conducted due to the emergence of Visible Light Communication (VLC) technologies, in which data communication is performed by transmitting through the visible band of the electromagnetic spectrum. In 2011, the Institute of Electrical and Electronics Engineers (IEEE) published the IEEE 802.15.7 standard for Wireless Personal Area Networks based on VLC. Due to limitations in the coverage of the transmitted signal, wireless networks can suffer from the hidden node problems, when there are nodes in the network whose transmissions are not detected by other nodes. This problem can cause an important degradation in communications when they are made by means of the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) access control method, which is used in IEEE 802.15.7 This research work evaluates the effects of the hidden node problem in the performance of the IEEE 802.15.7 standard We implement a simulator and analyze VLC performance in terms of parameters like end-to-end goodput and message loss rate. As part of this research work, a solution to the hidden node problem is proposed, based on the use of idle patterns defined in the standard. Idle patterns are sent by the network coordinator node to communicate to the other nodes that there is an ongoing transmission. The validity of the proposed solution is demonstrated with simulation results.

  8. Evaluation of H.264/AVC over IEEE 802.11p vehicular networks

    Science.gov (United States)

    Rozas-Ramallal, Ismael; Fernández-Caramés, Tiago M.; Dapena, Adriana; García-Naya, José Antonio

    2013-12-01

    The capacity of vehicular networks to offer non-safety services, like infotainment applications or the exchange of multimedia information between vehicles, have attracted a great deal of attention to the field of Intelligent Transport Systems (ITS). In particular, in this article we focus our attention on IEEE 802.11p which defines enhancements to IEEE 802.11 required to support ITS applications. We present an FPGA-based testbed developed to evaluate H.264/AVC (Advanced Video Coding) video transmission over vehicular networks. The testbed covers some of the most common situations in vehicle-to-vehicle and roadside-to-vehicle communications and it is highly flexible, allowing the performance evaluation of different vehicular standard configurations. We also show several experimental results to illustrate the quality obtained when H.264/AVC encoded video is transmitted over IEEE 802.11p networks. The quality is measured considering two important parameters: the percentage of recovered group of pictures and the frame quality. In order to improve performance, we propose to substitute the convolutional channel encoder used in IEEE 802.11p for a low-density parity-check code encoder. In addition, we suggest a simple strategy to decide the optimum number of iterations needed to decode each packet received.

  9. Energy-aware path selection metric for IEEE 802.11s wireless mesh networking

    CSIR Research Space (South Africa)

    Mhlanga, MM

    2009-01-01

    Full Text Available The IEEE 802.11s working group has commenced activities, which would lead to the development of a standard for wireless mesh networks (WMNs). The draft of 802.11s introduces a new path selection metric called airtime link metric. However...

  10. Incorporating antenna beamswitching technique into drivers for IEEE802.11 WLAN devices

    CSIR Research Space (South Africa)

    Mofolo, M

    2015-11-23

    Full Text Available the beamswitching technique for switched parasitic array (SPA) and electronically steerable parasitic array radiator (ESPAR) antennas in the drivers for IEEE802.11 WLAN devices. The modifications of the open source drivers (ath5k and ath9k) to enable real...

  11. Energy-aware path selection metric for IEEE 802.11s wireless mesh networking

    CSIR Research Space (South Africa)

    Mhlanga, MM

    2009-08-01

    Full Text Available The IEEE 802.11s working group has commenced activities, which would lead to the development of a standard for wireless mesh networks (WMNs). The draft of 802.11s introduces a new path selection metric called airtime link metric. However...

  12. Synchronization Analysis and Simulation of a Standard IEEE 802.11G OFDM Signal

    Science.gov (United States)

    2004-03-01

    on Vehicular Technology, Vol. 48, No. 5, pp.1596- 1609, September 1999. 19. Flavio Daffara and Antoine Chouly, “Maximum Likelihood Frequency...November 1996. 21. Flavio Daffara and Ottavio Adami, “A New Frequency Detector for Orthogonal Multicarrier Transmission Techniques,” Proc. of IEEE

  13. Analysis and design of an on-chip retargeting engine for IEEE 1687 networks

    NARCIS (Netherlands)

    Ibrahim, Ahmed Mohammed Youssef; Kerkhoff, Hans G.

    IEEE 1687 (iJTAG) standard introduces a methodology for accessing the increasing number of embedded instruments found in modern System-on-Chips. Retargeting is defined by iJTAG as the procedure of translating instrument-level patterns to system-level scan vectors for a certain network organization.

  14. A versatile trigger and synchronization module with IEEE1588 capabilities and Epics support

    Energy Technology Data Exchange (ETDEWEB)

    Lopez, J.M.; Ruiz, M.; Borrego, J.; Arcas, G. de; Barrera, E. [Universidad Politecnica de Madrid, Grupo de Investigacion en Instrumentacion y Acustica Aplicada, Madrid (Spain); Vega, J. [Asociacion EURATOM/CIEMAT para Fusion. Madrid (Spain)

    2009-07-01

    Event timing and synchronization are two key aspects to improve the implementation of distributed data acquisition (dDAQ) systems such as the ones used in fusion experiments. It is very important to integrate dDAQ in control and measurement networks. This poster analyzes the applicability of the IEEE 1588 and EPICS standards to solve these problems, and presents a hardware module implementation based in both of them that allow adding these functionalities to any DAQ. The IEEE1588 standard facilitates the integration of event timing and synchronization mechanisms in distributed data acquisition systems based on IEEE 803.3 (Ethernet). An optimal implementation of such system requires the use of network interface devices which include specific hardware resources devoted to the IEE1588 functionalities. Unfortunately, this is not the approach followed in most of the large number of applications available nowadays. Therefore, most solutions are based in software and use standard hardware network interfaces. This paper presents the development of a hardware module (GI2E) with IEEE 1588 capabilities which includes USB, RS232, RS485 and CAN interfaces. This permits the integration of any DAQ element that uses these interfaces in dDAQ systems in an efficient and simple way. The module has been developed with Motorola's Coldfire MCF5234 processor and National Semiconductors's PHY DP83640T, providing it with the possibility to implement the PTP protocol of IEEE 1588 by hardware, and therefore increasing its performance over other implementations based in software. To facilitate the integration of the dDAQ system in control and measurement networks the module includes a basic IOC (Input Output Controller) functionality of the EPICS (Experimental Physics and Industrial Control System) architecture. This document is a poster. (authors)

  15. A versatile trigger and synchronization module with IEEE1588 capabilities and EPICS support

    Energy Technology Data Exchange (ETDEWEB)

    Lopez, J.M., E-mail: juanmanuel.lopez@upm.e [Grupo de Investigacion en Instrumentacion y Acustica Aplicada, Universidad Politecnica de Madrid, Crta. Valencia Km-7, Madrid 28031 (Spain); Ruiz, M.; Borrego, J.; Arcas, G. de; Barrera, E. [Grupo de Investigacion en Instrumentacion y Acustica Aplicada, Universidad Politecnica de Madrid, Crta. Valencia Km-7, Madrid 28031 (Spain); Vega, J. [Asociacion EURATOM/CIEMAT para Fusion, Madrid (Spain)

    2010-07-15

    Event timing and synchronization are two key aspects to improve in the implementation of distributed data acquisition (dDAQ) systems such as the ones used in fusion experiments. It is also of great importance the integration of dDAQ in control and measurement networks. This paper analyzes the applicability of the IEEE1588 and EPICS standards to solve these problems, and presents a hardware module implementation based in both of them that allow adding these functionalities to any DAQ. The IEEE1588 standard facilitates the integration of event timing and synchronization mechanisms in distributed data acquisition systems based on IEEE 803.3 (Ethernet). An optimal implementation of such system requires the use of network interface devices which include specific hardware resources devoted to the IEE1588 functionalities. Unfortunately, this is not the approach followed in most of the large number of applications available nowadays. Therefore, most solutions are based in software and use standard hardware network interfaces. This paper presents the development of a hardware module (GI2E) with IEEE1588 capabilities which includes USB, RS232, RS485 and CAN interfaces. This permits to integrate any DAQ element that uses these interfaces in dDAQ systems in an efficient and simple way. The module has been developed with Motorola's Coldfire MCF5234 processor and National Semiconductors's PHY DP83640T, providing it with the possibility to implement the PTP protocol of IEEE1588 by hardware, and therefore increasing its performance over other implementations based in software. To facilitate the integration of the dDAQ system in control and measurement networks the module includes a basic Input/Output Controller (IOC) functionality of the Experimental Physics and Industrial Control System (EPICS) architecture. The paper discusses the implementation details of this module and presents its applications in advanced dDAQ applications in the fusion community.

  16. IEEE 802.11ac sebagai Standar Pertama untuk Gigabit Wireless LAN

    Directory of Open Access Journals (Sweden)

    Afdhal Afdhal

    2014-04-01

    Full Text Available WLAN is a technology that currently has been used widely. This technology is considered as a data transferring media technology within the LAN/MAN. To ensure that WLAN technology can be used widely in the whole world, the IEEE has set a standard known as 802.11 to be an international standard for the WLAN technology. This standard was appeared in 1997, and has been revised and improved for several times. This improvement is done to anticipate the rapidly grown WLAN market as well as to keep this technology remains effective, efficient, and reliable at any time. At the beginning of 2014, the IEEE has set 802.11ac-2013 as a new standard for WLANs that operate below 6 GHz to achieve a data rate for up to 7 Gbps. The purpose of this article is to describe comprehensively the IEEE 802.11ac standard as a result of recent changes to the regulatory for WLAN technology which is known as the first standard issued by the IEEE for the gigabit WLANs. This article discusses the goals and objectives to be achieved by 802.11ac standard as well as the parts that have been enhanced significantly both in its PHY and MAC layers. This article will also contrast the differences between the 802.11ac standard and previous WLAN standards. Finally it will also explain the level of compatibility and interoperability of 802.11ac standards with some of previous WLAN standard.Keywords: IEEE, 802.11, 802.11ac, Gigabit WLAN

  17. Perspectives on development of IEEE 1073: the Medical Information Bus (MIB) standard.

    Science.gov (United States)

    Kennelly, R J; Gardner, R M

    1997-08-01

    Automated data capture from bedside patient medical devices is now possible using a new Institute of Electrical and Electronic Engineering (IEEE) and American National Standards Institute (ANSI) Medical Information Bus (MIB) data communications standard (IEEE 1073). The first two standard documents, IEEE 1073.3.1 (Transportation Profile) and IEEE 1073.4.1 (Physical Layer), define the hardware protocol for bedside device communications. With the above noted IEEE MIB standards in place, hospitals can now start designing customized applications for acquiring data from bedside devices such as bedside monitors, i.v. pumps, ventilators, etc. for multiple purposes. The hardware 'plug and play' features of the MIB will enable nurses and physicians to establish communications with these devices simply and conveniently by plugging them into a bedside data connector. No other action will be necessary to establish identification of the device or communications with the device. Presently to connect bedside devices, technical help from hardware and software experts are required to establish such communications links. As a result of standardization of communications, it will be easy to establish a highly mobile network of bedside devices and more promptly and efficiently collect patient related data. Collection of data automatically should lead to the design of new medical computing applications that will tie in directly with the emerging mission and operations of hospitals. The MIB will permit acquisition of patient data more efficiently with greater accuracy, more completeness and more promptly. The above noted features are all essential to the development of computerized treatment protocols and should lead to improved quality of patient care. This manuscript provides the rational and historical overview of the development of the MIB standard.

  18. Hawaii Abandoned Vessel Inventory, Kauai

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Kauai. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral habitats...

  19. CNMI Abandoned Vessel Inventory, Tinian

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Tinian. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral habitats...

  20. Puerto Rico Abandoned Vessel Inventory

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Puerto Rico. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral...

  1. American Samoa Abandoned Vessel Inventory

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for American Samoa. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral...

  2. Hawaii Abandoned Vessel Inventory, Oahu

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Oahu, Hawaii. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral...

  3. Hawaii Abandoned Vessel Inventory, Molokai

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Molokai, Hawaii. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral...

  4. CNMI Abandoned Vessel Inventory, Rota

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Rota. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral habitats...

  5. Hawaii Abandoned Vessel Inventory, Lanai

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Lanai. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral habitats...

  6. For-Hire Vessel Directory

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Vessel Directory is maintained as the sample frame for the For-Hire Survey. I contains data on for-hire vessels on the Atlantic and Gulf coasts. Data include...

  7. CNMI Abandoned Vessel Inventory, Saipan

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Saipan. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral habitats...

  8. Hawaii Abandoned Vessel Inventory, Maui

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Maui. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral habitats...

  9. Vessels in Transit - Web Tool

    Data.gov (United States)

    Department of Transportation — A web tool that provides real-time information on vessels transiting the Saint Lawrence Seaway. Visitors may sort by order of turn, vessel name, or last location in...

  10. Pressure vessel design manual

    Energy Technology Data Exchange (ETDEWEB)

    Moss, D.R.

    1987-01-01

    The first section of the book covers types of loadings, failures, and stress theories, and how they apply to pressure vessels. The book delineates the procedures for designing typical components as well as those for designing large openings in cylindrical shells, ring girders, davits, platforms, bins and elevated tanks. The techniques for designing conical transitions, cone-cylinder intersections, intermediate heads, flat heads, and spherically dished covers are also described. The book covers the design of vessel supports subject to wind and seismic loads and one section is devoted to the five major ways of analyzing loads on shells and heads. Each procedure is detailed enough to size all welds, bolts, and plate thicknesses and to determine actual stresses.

  11. New research vessels

    Science.gov (United States)

    1984-04-01

    Two “new” ocean-going research vessels operated by the Scripps Institution of Oceanography and the National Science Foundation (NSF) will soon begin full-time scientific duties off the coast of California and in the Antarctic, respectively. The 37.5-m Scripps vessel, named Robert Gordon Sprout in honor of the ex-president of the University of California, replaces the smaller ship Ellen B. Scripps, which had served the institution since 1965. The new ship is a slightly modified Gulf Coast workboat. Under the name of Midnight Alaskan, it had been used for high-resolution geophysical surveys in American and Latin American waters by such firms as Arco Oil & Gas, Exxon, Pennzoil, and Racal-Decca before its purchase by Scripps from a Lousiana chartering firm last summer.

  12. Large vessel vasculitides

    OpenAIRE

    Morović-Vergles, Jadranka; Pukšić, Silva; Gudelj Gračanin, Ana

    2013-01-01

    Large vessel vasculitis includes Giant cell arteritis and Takayasu arteritis. Giant cell arteritis is the most common form of vasculitis affect patients aged 50 years or over. The diagnosis should be considered in older patients who present with new onset of headache, visual disturbance, polymyalgia rheumatica and/or fever unknown cause. Glucocorticoides remain the cornerstone of therapy. Takayasu arteritis is a chronic panarteritis of the aorta ant its major branches presenting commonly in y...

  13. Very Versatile Vessel

    Science.gov (United States)

    2009-09-01

    data. This source provides information on aluminum hydrofoil vessels without the added weight of foil structures. The composite armor around the...seating compartment. The sides should also limit wave splash on the deck. The freeboard should contribute reserve buoyancy , increasing large-angle and...Resistance, Powering, and Propulsion Savitsky’s Method Since model testing data or other reliable performance data was unavailable for the proposed

  14. Transactive Control of Commercial Building HVAC Systems

    Energy Technology Data Exchange (ETDEWEB)

    Corbin, Charles D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Makhmalbaf, Atefe [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Huang, Sen [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Mendon, Vrushali V. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Zhao, Mingjie [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Somasundaram, Sriram [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Liu, Guopeng [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Ngo, Hung [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Katipamula, Srinivas [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-12-30

    This document details the development and testing of market-based transactive controls for building heating, ventilating and air conditioning (HVAC) systems. These controls are intended to serve the purposes of reducing electricity use through conservation, reducing peak building electric demand, and providing demand flexibility to assist with power system operations. This report is the summary of the first year of work conducted under Phase 1 of the Clean Energy and Transactive Campus Project. The methods and techniques described here were first investigated in simulation, and then subsequently deployed to a physical testbed on the Pacific Northwest National Laboratory (PNNL) campus for validation. In this report, we describe the models and control algorithms we have developed, testing of the control algorithms in simulation, and deployment to a physical testbed. Results from physical experiments support previous simulation findings, and provide insights for further improvement.

  15. Transactional distance in a blended learning environment

    Directory of Open Access Journals (Sweden)

    Jon Dron

    2004-12-01

    Full Text Available This paper presents a case study that describes and discusses the problems encountered during the design and implementation of a blended learning course, largely taught online through a web-based learning environment. Based on Moore's theory of transactional distance, the course was explicitly designed to have dialogue at its heart. However, the reality of systemic behaviours caused by delivering such a course within a group of conventional further and higher educational institutions has led to an entirely unanticipated reversion to structure, with unpleasant consequences for both quality and quantity of dialogue. The paper looks at some of the reasons for this drift, and suggests that some of the disappointing results (in particular in terms of the quality of the students' experience and associated poor retention can be attributed to the lack of dialogue, and consequent increase in transactional distance. It concludes with a description and evaluation of steps currently being taken to correct this behaviour.

  16. The quantum handshake entanglement, nonlocality and transactions

    CERN Document Server

    Cramer, John G

    2016-01-01

    This book shines bright light into the dim recesses of quantum theory, where the mysteries of entanglement, nonlocality, and wave collapse have motivated some to conjure up multiple universes, and others to adopt a "shut up and calculate" mentality. After an extensive and accessible introduction to quantum mechanics and its history, the author turns attention to his transactional model. Using a quantum handshake between normal and time-reversed waves, this model provides a clear visual picture explaining the baffling experimental results that flow daily from the quantum physics laboratories of the world. To demonstrate its powerful simplicity, the transactional model is applied to a collection of counter-intuitive experiments and conceptual problems.

  17. Risk sensitive asset management with transaction costs

    OpenAIRE

    Stanley R. Pliska; Tomasz R. Bielecki

    1999-01-01

    This paper develops a continuous time risk-sensitive portfolio optimization model with a general transaction cost structure and where the individual securities or asset categories are explicitly affected by underlying economic factors. The security prices and factors follow diffusion processes with the drift and diffusion coefficients for the securities being functions of the factor levels. We develop methods of risk sensitive impulsive control theory in order to maximize an infinite horizon ...

  18. 78 FR 29813 - Identification of Additional Vessels Pursuant to the Iranian Transactions and Sanctions...

    Science.gov (United States)

    2013-05-21

    ...: NATIONAL IRANIAN TANKER COMPANY). 8. SUNEAST (f.k.a. AZALEA; f.k.a. SINA) (9HNY9) Crude Oil Tanker... a 24-hour fax-on-demand service, Tel.: 202-622-0077. Background On February 5, 2012, the President... Institutions'' (the ``Order''). Section 1(a) of the Order blocks, with certain exceptions, all property and...

  19. 78 FR 11950 - Identification of Entities and Vessels Pursuant to the Iranian Transactions and Sanctions...

    Science.gov (United States)

    2013-02-20

    ... DEVELOPMENT, 53 Saanee, Jahan-e Koodak, Crossroads Africa St., Tehran, Iran 4. DEY BANK (a.k.a. BANK-E DEY... BANK (a.k.a. BANK-E TAAWON MANTAGHEEY-E ESLAMI; a.k.a. REGIONAL COOPERATION OF THE ISLAMIC BANK FOR DEVELOPMENT & INVESTMENT), Tohid Street, Before Tohid Circle, No. 33, Upper Level of Eghtesad-e Novin Bank...

  20. Transactive System: Part II: Analysis of Two Pilot Transactive Systems using Foundational Theory and Metrics

    Energy Technology Data Exchange (ETDEWEB)

    Lian, Jianming; Sun, Y; Kalsi, Karanjit; Widergren, Steven E.; Wu, Di; Ren, Huiying

    2018-01-24

    This document is the second of a two-part report. Part 1 reviewed several demonstrations of transactive control and compared them in terms of their payoff functions, control decisions, information privacy, and mathematical solution concepts. It was suggested in Part 1 that these four listed components should be adopted for meaningful comparison and design of future transactive systems. Part 2 proposes qualitative and quantitative metrics that will be needed to compare alternative transactive systems. It then uses the analysis and design principles from Part 1 while conducting more in-depth analysis of two transactive demonstrations: the American Electric Power (AEP) gridSMART Demonstration, which used a double –auction market mechanism, and a consensus method like that used in the Pacific Northwest Smart Grid Demonstration. Ultimately, metrics must be devised and used to meaningfully compare alternative transactive systems. One significant contribution of this report is an observation that the decision function used for thermostat control in the AEP gridSMART Demonstration has superior performance if its decision function is recast to more accurately reflect the power that will be used under for thermostatic control under alternative market outcomes.

  1. Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks.

    Science.gov (United States)

    Song, Caixia

    2017-12-12

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle's safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given.

  2. Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Caixia Song

    2017-12-01

    Full Text Available Vehicular Ad Hoc Networks (VANETs employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH interval and Service Channel (SCH interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA mechanism is employed to allow four Access Categories (ACs within a station with different priorities according to their criticality for the vehicle’s safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given.

  3. Hardware Transactional Memory Optimization Guidelines, Applied to Ordered Maps

    DEFF Research Database (Denmark)

    Bonnichsen, Lars Frydendal; Probst, Christian W.; Karlsson, Sven

    2015-01-01

    synchronization method scales well. Recently, hardware transactional memory was introduced, which allows threads to use transactions instead of locks. So far, applying hardware transactional memory has shown mixed results. We believe this is because transactions are different from locks, and using them...... efficiently requires reasoning about those differences. In this paper we present 5 guidelines for applying hardware transactional memory efficiently, and apply the guidelines to BT-trees, a concurrent ordered map. Evaluating BT-trees on standard benchmarks shows that they are up to 5.3 times faster than...... traditional maps using hardware transactional memory, and up to 3.9 times faster than state of the art concurrent ordered maps....

  4. Vessel Traffic Services.

    Science.gov (United States)

    1982-12-01

    Yorker" articles titled Silent Spring by Rachel Carson in 1963 produced a unifying effect, "the sort of rallying point of the movement to protect the...6232, 92d Cong., 1st. sess., 1971, p. 2. 15. Carson , Rachel L. , The Sea Around Us, New York: Oxford Univesity Press, 195-, p. IV. 16. U.S., Congress...Government Printing Office, 1974. 63. Buhler, L. and Geiger, J., Vessel Traffic Data Extraction MethodoloqX, Silver Spring , Maryland, O6erFae-tns

  5. Vanishing corneal vessels

    Science.gov (United States)

    Nicholson, Luke; Chana, Rupinder

    2013-01-01

    We wish to highlight the importance of acknowledging the accompanying effects of topical phenylephrine drops on the eye other than its intended mydriasis. We reported a case of a 92-year-old woman with a corneal graft who was noted to have superficial corneal vascularisation which was not documented previously. After the instillation of topical tropicamide 1% and phenylephrine 2.5%, for funduscopy, the corneal vascularisation was not visible. When reassessed on another visit, tropicamide had no effect on the vessels and only phenylephrine did. We wish to highlight that when reviewing patients in cornea clinics, instilling phenylephrine prior to being seen may mask important corneal vascularisation. PMID:24121816

  6. Commercial agencies and surrogate motherhood: a transaction cost approach.

    Science.gov (United States)

    Galbraith, Mhairi; McLachlan, Hugh V; Swales, J Kim

    2005-03-01

    In this paper we investigate the legal arrangements involved in UK surrogate motherhood from a transaction-cost perspective. We outline the specific forms the transaction costs take and critically comment on the way in which the UK institutional and organisational arrangements at present adversely influence transaction costs. We then focus specifically on the potential role of surrogacy agencies and look at UK and US evidence on commercial and voluntary agencies. Policy implications follow.

  7. The Transactional Interpretation of Quantum Mechanics and Quantum Nonlocality

    OpenAIRE

    Cramer, John G.

    2015-01-01

    Quantum nonlocality is discussed as an aspect of the quantum formalism that is seriously in need of interpretation. The Transactional Interpretation of quantum mechanics, which describes quantum processes as transactional "handshakes" between retarded $\\psi$ waves and advanced $\\psi*$ waves, is discussed. Examples of the use of the Transactional Interpretation in resolving quantum paradoxes and in understanding the counter-intuitive aspects of the formalism, particularly quantum nonlocality, ...

  8. Performance analysis of IEEE 802.11n network under unsaturated conditions

    Science.gov (United States)

    Lang, Gaiping; Ma, Lin; Xu, Yubin

    2017-07-01

    Frame aggregation is the most important medium access control (MAC) enhancement of IEEE 802.11n. In frame aggregation, multiple frames are encapsulated into a single frame. In the analysis of 802.11n performance, the existing researches assumed that each station always had a packet for transmission. But actually, sometimes stations may have no packet to transmit. In this paper, we develop an analytical model for IEEE 802.11n in unsaturated conditions. Therefore, the transmission of the station is assumed to be a bulk service queue system. Bulk size is aggregation size. According to the 802.11n standard, when the number of packets in the buffer is smaller than the aggregation size, we can also transmit all the packets in the buffer using A-MPDU. Therefore, bulk size is variable. The throughput and mean access delay are achieved. Numerical results show that the proposed algorithm can effectively increase the throughput and lower the access delay.

  9. Hybrid Polling Method for Direct Link Communication for IEEE 802.11 Wireless LANs

    Directory of Open Access Journals (Sweden)

    Woo-Yong Choi

    2008-10-01

    Full Text Available The direct link communication between STAtions (STAs is one of the techniques to improve the MAC performance of IEEE 802.11 infrastructure networks. For the efficient direct link communication, in the literature, the simultaneous polling method was proposed to allow the multiple direct data communication to be performed simultaneously. However, the efficiency of the simultaneous polling method is affected by the interference condition. To alleviate the problem of the lower polling efficiency with the larger interference range, the hybrid polling method is proposed for the direct link communication between STAs in IEEE 802.11 infrastructure networks. By the proposed polling method, we can integrate the sequential and simultaneous polling methods properly according to the interference condition. Numerical examples are also presented to show the medium access control (MAC performance improvement by the proposed polling method.

  10. A note on bound constraints handling for the IEEE CEC'05 benchmark function suite.

    Science.gov (United States)

    Liao, Tianjun; Molina, Daniel; de Oca, Marco A Montes; Stützle, Thomas

    2014-01-01

    The benchmark functions and some of the algorithms proposed for the special session on real parameter optimization of the 2005 IEEE Congress on Evolutionary Computation (CEC'05) have played and still play an important role in the assessment of the state of the art in continuous optimization. In this article, we show that if bound constraints are not enforced for the final reported solutions, state-of-the-art algorithms produce infeasible best candidate solutions for the majority of functions of the IEEE CEC'05 benchmark function suite. This occurs even though the optima of the CEC'05 functions are within the specified bounds. This phenomenon has important implications on algorithm comparisons, and therefore on algorithm designs. This article's goal is to draw the attention of the community to the fact that some authors might have drawn wrong conclusions from experiments using the CEC'05 problems.

  11. A Novel IEEE 802.15.4e DSME MAC for Wireless Sensor Networks.

    Science.gov (United States)

    Sahoo, Prasan Kumar; Pattanaik, Sudhir Ranjan; Wu, Shih-Lin

    2017-01-16

    IEEE 802.15.4e standard proposes Deterministic and Synchronous Multichannel Extension (DSME) mode for wireless sensor networks (WSNs) to support industrial, commercial and health care applications. In this paper, a new channel access scheme and beacon scheduling schemes are designed for the IEEE 802.15.4e enabled WSNs in star topology to reduce the network discovery time and energy consumption. In addition, a new dynamic guaranteed retransmission slot allocation scheme is designed for devices with the failure Guaranteed Time Slot (GTS) transmission to reduce the retransmission delay. To evaluate our schemes, analytical models are designed to analyze the performance of WSNs in terms of reliability, delay, throughput and energy consumption. Our schemes are validated with simulation and analytical results and are observed that simulation results well match with the analytical one. The evaluated results of our designed schemes can improve the reliability, throughput, delay, and energy consumptions significantly.

  12. 2011 IEEE Visualization Contest Winner: Visualizing Unsteady Vortical Behavior of a Centrifugal Pump

    KAUST Repository

    Otto, Mathias

    2012-09-01

    In the 2011 IEEE Visualization Contest, the dataset represented a high-resolution simulation of a centrifugal pump operating below optimal speed. The goal was to find suitable visualization techniques to identify regions of rotating stall that impede the pump\\'s effectiveness. The winning entry split analysis of the pump into three parts based on the pump\\'s functional behavior. It then applied local and integration-based methods to communicate the unsteady flow behavior in different regions of the dataset. This research formed the basis for a comparison of common vortex extractors and more recent methods. In particular, integration-based methods (separation measures, accumulated scalar fields, particle path lines, and advection textures) are well suited to capture the complex time-dependent flow behavior. This video (http://youtu.be/ oD7QuabY0oU) shows simulations of unsteady flow in a centrifugal pump. © 2012 IEEE.

  13. Capacity Evaluation for IEEE 802.16e Mobile WiMAX

    Directory of Open Access Journals (Sweden)

    Chakchai So-In

    2010-01-01

    Full Text Available We present a simple analytical method for capacity evaluation of IEEE 802.16e Mobile WiMAX networks. Various overheads that impact the capacity are explained and methods to reduce these overheads are also presented. The advantage of a simple model is that the effect of each decision and sensitivity to various parameters can be seen easily. We illustrate the model by estimating the capacity for three sample applications—Mobile TV, VoIP, and data. The analysis process helps explain various features of IEEE 802.16e Mobile WiMAX. It is shown that proper use of overhead reducing mechanisms and proper scheduling can make an order of magnitude difference in performance. This capacity evaluation method can also be used for validation of simulation models.

  14. A Fast MAC-Layer Handover for an IEEE 802.16e-Based WMAN

    Science.gov (United States)

    Ray, Sayan K.; Pawlikowski, Krzysztof; Sirisena, Harsha

    We propose a modification of the IEEE 802.16e hard handover (HHO) procedure, which significantly reduces the handover latency constraint of the original HHO procedure in IEEE 802.16e networks. It allows a better handling of the delay-sensitive traffic by avoiding unnecessary time-consuming scanning and synchronization activity as well as simplifies the network re-entry procedure. With the help of the backhaul network, it reduces the number of control messages in the original handover policy, making the handover latency acceptable also for real-time streaming traffic. Preliminary performance evaluation studies show that the modified handover procedure is able to reduce the total handover latency by about 50%.

  15. On Adaptive Contention Resolution Schemes for IEEE 802.16 BWA Systems

    Directory of Open Access Journals (Sweden)

    Deng Der-Jiunn

    2009-01-01

    Full Text Available According to the latest version of the IEEE 802.16 standard, the mandatory contention resolution method is the truncated binary exponential backoff, with the initial window size and the maximum window size controlled by the base station. However, the problem of choosing the right set of backoff parameters for the current network level remains unsolved and left as an open issue since this strategy might incur a high collision probability and the channel utilization could be degraded in congested scenario. In this paper, we propose two pragmatic adaptive algorithms, namely semi-dynamic and quasi-dynamic contention resolution schemes, that allow the base station to adjust its backoff window size based on current channel status. By controlling the size of backoff window according to varying network conditions, both schemes are able to achieve higher performance in comparison with the legacy IEEE 802.16 standard.

  16. Integration of IEEE 1451 and HL7 exchanging information for patients' sensor data.

    Science.gov (United States)

    Kim, Wooshik; Lim, Suyoung; Ahn, Jinsoo; Nah, Jiyoung; Kim, Namhyun

    2010-12-01

    HL7 (Health Level 7) is a standard developed for exchanging incompatible healthcare information generated from programs or devices among heterogenous medical information systems. At present, HL7 is growing as a global standard. However, the HL7 standard does not support effective methods for treating data from various medical sensors, especially from mobile sensors. As ubiquitous systems are growing, HL7 must communicate with various medical transducers. In the area of sensor fields, IEEE 1451 is a group of standards for controlling transducers and for communicating data from/to various transducers. In this paper, we present the possibility of interoperability between the two standards, i.e., HL7 and IEEE 1451. After we present a method to integrate them and show the preliminary results of this approach.

  17. Transient Stability Improvement of IEEE 9 Bus System Using Power World Simulator

    Directory of Open Access Journals (Sweden)

    Kaur Ramandeep

    2016-01-01

    Full Text Available The improvement of transient stability of power system was one of the most challenging research areas in power engineer.The main aim of this paper was transient stability analysis and improvement of IEEE 9 bus system. These studies were computed using POWER WORLD SIMULATOR. The IEEE 9 bus system was modelled in power world simulator and load flow studies were performed to determine pre-fault conditions in the system using Newton-Raphson method. The transient stability analysis was carried out using Runga method during three-phase balanced fault. For the improvement transient stability, the general methods adopted were fast acting exciters, FACT devices and addition of parallel transmission line. These techniques play an important role in improving the transient stability, increasing transmission capacity and damping low frequency oscillations.

  18. Transactive Demand Side Management Programs in Smart Grids with High Penetration of EVs

    Directory of Open Access Journals (Sweden)

    Poria Hasanpor Divshali

    2017-10-01

    Full Text Available Due to environmental concerns, economic issues, and emerging new loads, such as electrical vehicles (EVs, the importance of demand side management (DSM programs has increased in recent years. DSM programs using a dynamic real-time pricing (RTP method can help to adaptively control the electricity consumption. However, the existing RTP methods, particularly when they consider the EVs and the power system constraints, have many limitations, such as computational complexity and the need for centralized control. Therefore, a new transactive DSM program is proposed in this paper using an imperfect competition model with high EV penetration levels. In particular, a heuristic two-stage iterative method, considering the influence of decisions made independently by customers to minimize their own costs, is developed to find the market equilibrium quickly in a distributed manner. Simulations in the IEEE 37-bus system with 1141 customers and 670 EVs are performed to demonstrate the effectiveness of the proposed method. The results show that the proposed method can better manage the EVs and elastic appliances than the existing methods in terms of power constraints and cost. Also, the proposed method can solve the optimization problem quick enough to run in real-time.

  19. Software defined radio for cognitive wireless sensor networks : a reconfigurable IEEE 802.15.4 reconfigurable

    OpenAIRE

    Zitouni, Rafik

    2015-01-01

    The Increasing number of Wireless Sensor Networks (WSNs) applications has led industries to design the physical layer (PHY) of these networks following the IEEE 802.15.4 standard. The traditional design of that layer is on hardware suffering from a lack of flexibility of radio parameters, such as changing both frequency bands and modulations. This problem is emphasized by the scarcity of the radio-frequency spectrum. Software Defined Radio (SDR) is an attracting solution to easily reconfigure...

  20. [Mobile Health: IEEE Standard for Wearable Cuffless Blood Pressure Measuring Devices].

    Science.gov (United States)

    Zhou, Xia; Wu, Wenli; Bao, Shudi

    2015-07-01

    IEEE Std 1708-2014 breaks through the traditional standards of cuff based blood pressure measuring devices and establishes a normative definition of wearable cuffless blood pressure measuring devices and the objective performance evaluation of this kind of devices. This study firstly introduces the background of the new standard. Then, the standard details will be described, and the impact of cuffless blood pressure measuring devices with the new standard on manufacturers and end users will be addressed.

  1. IEEE Radio and Wireless Symposium Student Awards Support Request: 2010-2012

    Science.gov (United States)

    2012-01-01

    HEMTs , IEEE PAWR (09 2011) Paul M. Meaney, Shireen Geimer, Amir H. Golnabi, Keith D. Paulsen. Microwave Imaging for Breast Cancer Detection and...for Breast Cancer Detection and Therapy Monitoring Amir H. Golnabi, Paul M. Meaney, Shireen Geimer, and Keith D. Paulsen Thayer School of Engineering...2013) of Sonnet Professional, High Performance Solver edition, plus interfaces for Cadence Virtuoso, Agilent ADS and AWR MWO. Total value: $21,000

  2. Provision of QoS for Multimedia Services in IEEE 802.11 Wireless Network

    Science.gov (United States)

    2006-10-01

    INFORMATION SYSTEMS TECHNOLOGY PANEL SYMPOSIUM ON „DYNAMIC COMUNICATIONS MANAGEMENT ” IST-062 October 9 - 10, 2006 Piotr Lubkowski, Jaroslaw Krygier...Provision of QoS for Multimedia Services in IEEE 802.11 Wireless Network. In Dynamic Communications Management (pp. 10-1 – 10-16). Meeting Proceedings...mechanisms have been used for managing a limited bandwidth link within the IPv6 military narrowband network. The detailed description of these

  3. Radio Frequency Fingerprinting Techniques Through Preamble Modification in IEEE 802.11B

    Science.gov (United States)

    2014-06-30

    per second OFDM Orthogonal Frequency Division Multiplexing OSI Open Systems Interconnection PAN Personal Area Network PBCC Packet Binary Convolution...traffic. In addition, Section 2.5 also details preambles in 802.11, network synchronization and channel estimation . Section 2.6 introduces the...When these systems operate in monitor mode, they receive all IEEE 802.11 traffic, irrespective the operating channel . Consequently, these monitor

  4. Practical support for Lean Six Sigma software process definition using IEEE software engineering standards

    CERN Document Server

    Land, Susan K; Walz, John W

    2012-01-01

    Practical Support for Lean Six Sigma Software Process Definition: Using IEEE Software Engineering Standards addresses the task of meeting the specific documentation requirements in support of Lean Six Sigma. This book provides a set of templates supporting the documentation required for basic software project control and management and covers the integration of these templates for their entire product development life cycle. Find detailed documentation guidance in the form of organizational policy descriptions, integrated set of deployable document templates, artifacts required in suppo

  5. Impact of Delay Spread on IEEE 802.15.4a Networks with Energy Detection Receivers

    Directory of Open Access Journals (Sweden)

    P. Medina

    2010-12-01

    Full Text Available This work analyzes the impact of delay spread on IEEE 802.15.4a networks using energy detection (ED receivers.Specifically, we review the typical values for delay spread in Ultra Wide Band (UWB systems reported to date forindoor, outdoor and industrial environments, and study how the delay spread impacts the bit-error rate with andwithout Multiuser Interference (MUI.

  6. 46 CFR 289.2 - Vessels included.

    Science.gov (United States)

    2010-10-01

    ... CONSTRUCTION-DIFFERENTIAL SUBSIDY VESSELS, OPERATING-DIFFERENTIAL SUBSIDY VESSELS AND OF VESSELS SOLD OR ADJUSTED UNDER THE MERCHANT SHIP SALES ACT 1946 § 289.2 Vessels included. Vessels subject to the provisions of this part are: (a) All vessels which may in the future be constructed or sold with construction...

  7. Blood flow reprograms lymphatic vessels to blood vessels.

    Science.gov (United States)

    Chen, Chiu-Yu; Bertozzi, Cara; Zou, Zhiying; Yuan, Lijun; Lee, John S; Lu, MinMin; Stachelek, Stan J; Srinivasan, Sathish; Guo, Lili; Vicente, Andres; Vincente, Andres; Mericko, Patricia; Levy, Robert J; Makinen, Taija; Oliver, Guillermo; Kahn, Mark L

    2012-06-01

    Human vascular malformations cause disease as a result of changes in blood flow and vascular hemodynamic forces. Although the genetic mutations that underlie the formation of many human vascular malformations are known, the extent to which abnormal blood flow can subsequently influence the vascular genetic program and natural history is not. Loss of the SH2 domain-containing leukocyte protein of 76 kDa (SLP76) resulted in a vascular malformation that directed blood flow through mesenteric lymphatic vessels after birth in mice. Mesenteric vessels in the position of the congenital lymphatic in mature Slp76-null mice lacked lymphatic identity and expressed a marker of blood vessel identity. Genetic lineage tracing demonstrated that this change in vessel identity was the result of lymphatic endothelial cell reprogramming rather than replacement by blood endothelial cells. Exposure of lymphatic vessels to blood in the absence of significant flow did not alter vessel identity in vivo, but lymphatic endothelial cells exposed to similar levels of shear stress ex vivo rapidly lost expression of PROX1, a lymphatic fate-specifying transcription factor. These findings reveal that blood flow can convert lymphatic vessels to blood vessels, demonstrating that hemodynamic forces may reprogram endothelial and vessel identity in cardiovascular diseases associated with abnormal flow.

  8. Segmentized Clear Channel Assessment for IEEE 802.15.4 Networks.

    Science.gov (United States)

    Son, Kyou Jung; Hong, Sung Hyeuck; Moon, Seong-Pil; Chang, Tae Gyu; Cho, Hanjin

    2016-06-03

    This paper proposed segmentized clear channel assessment (CCA) which increases the performance of IEEE 802.15.4 networks by improving carrier sense multiple access with collision avoidance (CSMA/CA). Improving CSMA/CA is important because the low-power consumption feature and throughput performance of IEEE 802.15.4 are greatly affected by CSMA/CA behavior. To improve the performance of CSMA/CA, this paper focused on increasing the chance to transmit a packet by assessing precise channel status. The previous method used in CCA, which is employed by CSMA/CA, assesses the channel by measuring the energy level of the channel. However, this method shows limited channel assessing behavior, which comes from simple threshold dependent channel busy evaluation. The proposed method solves this limited channel decision problem by dividing CCA into two groups. Two groups of CCA compare their energy levels to get precise channel status. To evaluate the performance of the segmentized CCA method, a Markov chain model has been developed. The validation of analytic results is confirmed by comparing them with simulation results. Additionally, simulation results show the proposed method is improving a maximum 8.76% of throughput and decreasing a maximum 3.9% of the average number of CCAs per packet transmission than the IEEE 802.15.4 CCA method.

  9. FPGA implementation cost and performance evaluation of IEEE 802.11 protocol encryption security schemes

    Energy Technology Data Exchange (ETDEWEB)

    Sklavos, N; Selimis, G; Koufopavlou, O [Electrical and Computer Engineering Department, University of Patras, Patras (Greece)

    2005-01-01

    The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the wired equivalent privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the advanced encryption standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A field programmable gate array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given.

  10. An improved IEEE 802.11 protocol for reliable data transmission in power distribution fault diagnosis

    Energy Technology Data Exchange (ETDEWEB)

    Campoccia, F.; Di Silvestre, M.L.; Sanseverino, E.R.; Zizzo, G. [Palermo Univ., Palermo (Italy)

    2010-10-15

    In power systems, on-line transmission between local units and the central unit can be done by means of power line communications or wireless technology. During an electrical fault, the reliability of the distribution system depends on the security of the timely protective and restorative actions on the network. This paper focused on the WiFi system because of its economy and ease of installation. However, WiFi systems are typically managed by the IEEE 802.11 protocol, which is not reliable in terms of security in data communication. In WiFi networks, data is divided into packets and sent in succession to reduce errors within the radio channel. The IEEE 802.11 protocol has high probability for loss of packets or delay in their transmission. In order to ensure the reliability of data transmission times between two terminal units connected by WiFi stations, a new protocol was derived by modifying the IEEE 802.11. The improvements of the new protocol were highlighted and its capability for the diagnostic service was verified. The modified protocol eliminates the danger of collisions between packets and optimizes the transmission time for sending information. 6 refs., 7 tabs., 8 figs.

  11. Spectrum Hole Identification in IEEE 802.22 WRAN using Unsupervised Learning

    Directory of Open Access Journals (Sweden)

    V. Balaji

    2016-01-01

    Full Text Available In this paper we present a Cooperative Spectrum Sensing (CSS algorithm for Cognitive Radios (CR based on IEEE 802.22Wireless Regional Area Network (WRAN standard. The core objective is to improve cooperative sensing efficiency which specifies how fast a decision can be reached in each round of cooperation (iteration to sense an appropriate number of channels/bands (i.e. 86 channels of 7MHz bandwidth as per IEEE 802.22 within a time constraint (channel sensing time. To meet this objective, we have developed CSS algorithm using unsupervised K-means clustering classification approach. The received energy level of each Secondary User (SU is considered as the parameter for determining channel availability. The performance of proposed algorithm is quantified in terms of detection accuracy, training and classification delay time. Further, the detection accuracy of our proposed scheme meets the requirement of IEEE 802.22 WRAN with the target probability of falsealrm as 0.1. All the simulations are carried out using Matlab tool.

  12. Segmentized Clear Channel Assessment for IEEE 802.15.4 Networks

    Directory of Open Access Journals (Sweden)

    Kyou Jung Son

    2016-06-01

    Full Text Available This paper proposed segmentized clear channel assessment (CCA which increases the performance of IEEE 802.15.4 networks by improving carrier sense multiple access with collision avoidance (CSMA/CA. Improving CSMA/CA is important because the low-power consumption feature and throughput performance of IEEE 802.15.4 are greatly affected by CSMA/CA behavior. To improve the performance of CSMA/CA, this paper focused on increasing the chance to transmit a packet by assessing precise channel status. The previous method used in CCA, which is employed by CSMA/CA, assesses the channel by measuring the energy level of the channel. However, this method shows limited channel assessing behavior, which comes from simple threshold dependent channel busy evaluation. The proposed method solves this limited channel decision problem by dividing CCA into two groups. Two groups of CCA compare their energy levels to get precise channel status. To evaluate the performance of the segmentized CCA method, a Markov chain model has been developed. The validation of analytic results is confirmed by comparing them with simulation results. Additionally, simulation results show the proposed method is improving a maximum 8.76% of throughput and decreasing a maximum 3.9% of the average number of CCAs per packet transmission than the IEEE 802.15.4 CCA method.

  13. Study on additional carrier sensing for IEEE 802.15.4 wireless sensor networks.

    Science.gov (United States)

    Lee, Bih-Hwang; Lai, Ruei-Lung; Wu, Huai-Kuei; Wong, Chi-Ming

    2010-01-01

    Wireless sensor networks based on the IEEE 802.15.4 standard are able to achieve low-power transmissions in the guise of low-rate and short-distance wireless personal area networks (WPANs). The slotted carrier sense multiple access with collision avoidance (CSMA/CA) is used for contention mechanism. Sensor nodes perform a backoff process as soon as the clear channel assessment (CCA) detects a busy channel. In doing so they may neglect the implicit information of the failed CCA detection and further cause the redundant sensing. The blind backoff process in the slotted CSMA/CA will cause lower channel utilization. This paper proposes an additional carrier sensing (ACS) algorithm based on IEEE 802.15.4 to enhance the carrier sensing mechanism for the original slotted CSMA/CA. An analytical Markov chain model is developed to evaluate the performance of the ACS algorithm. Both analytical and simulation results show that the proposed algorithm performs better than IEEE 802.15.4, which in turn significantly improves throughput, average medium access control (MAC) delay and power consumption of CCA detection.

  14. Strategies for Optimal MAC Parameters Tuning in IEEE 802.15.6 Wearable Wireless Sensor Networks.

    Science.gov (United States)

    Alam, Muhammad Mahtab; Ben Hamida, Elyes

    2015-09-01

    Wireless body area networks (WBAN) has penetrated immensely in revolutionizing the classical heath-care system. Recently, number of WBAN applications has emerged which introduce potential limits to existing solutions. In particular, IEEE 802.15.6 standard has provided great flexibility, provisions and capabilities to deal emerging applications. In this paper, we investigate the application-specific throughput analysis by fine-tuning the physical (PHY) and medium access control (MAC) parameters of the IEEE 802.15.6 standard. Based on PHY characterizations in narrow band, at the MAC layer, carrier sense multiple access collision avoidance (CSMA/CA) and scheduled access protocols are extensively analyzed. It is concluded that, IEEE 802.15.6 standard can satisfy most of the WBANs applications throughput requirements by maximum achieving 680 Kbps. However, those emerging applications which require high quality audio or video transmissions, standard is not able to meet their constraints. Moreover, delay, energy efficiency and successful packet reception are considered as key performance metrics for comparing the MAC protocols. CSMA/CA protocol provides the best results to meet the delay constraints of medical and non-medical WBAN applications. Whereas, the scheduled access approach, performs very well both in energy efficiency and packet reception ratio.

  15. Interoperability in digital electrocardiography: harmonization of ISO/IEEE x73-PHD and SCP-ECG.

    Science.gov (United States)

    Trigo, Jesús D; Chiarugi, Franco; Alesanco, Alvaro; Martínez-Espronceda, Miguel; Serrano, Luis; Chronaki, Catherine E; Escayola, Javier; Martínez, Ignacio; García, José

    2010-11-01

    The ISO/IEEE 11073 (x73) family of standards is a reference frame for medical device interoperability. A draft for an ECG device specialization (ISO/IEEE 11073-10406-d02) has already been presented to the Personal Health Device (PHD) Working Group, and the Standard Communications Protocol for Computer-Assisted ElectroCardioGraphy (SCP-ECG) Standard for short-term diagnostic ECGs (EN1064:2005+A1:2007) has recently been approved as part of the x73 family (ISO 11073-91064:2009). These factors suggest the coordinated use of these two standards in foreseeable telecardiology environments, and hence the need to harmonize them. Such harmonization is the subject of this paper. Thus, a mapping of the mandatory attributes defined in the second draft of the ISO/IEEE 11073-10406-d02 and the minimum SCP-ECG fields is presented, and various other capabilities of the SCP-ECG Standard (such as the messaging part) are also analyzed from an x73-PHD point of view. As a result, this paper addresses and analyzes the implications of some inconsistencies in the coordinated use of these two standards. Finally, a proof-of-concept implementation of the draft x73-PHD ECG device specialization is presented, along with the conversion from x73-PHD to SCP-ECG. This paper, therefore, provides recommendations for future implementations of telecardiology systems that are compliant with both x73-PHD and SCP-ECG.

  16. On IEEE 802.15.6 IR-UWB receivers - simulations for DBPSK modulation.

    Science.gov (United States)

    Niemelä, Ville; Hämäläinen, Matti; Iinatti, Jari

    2013-01-01

    In 2002, Federal Communications Commission (FCC) was the first in defining regulations for ultra wideband (UWB) communications followed by Europe and Japan some years later. Focusing on impulse radio (IR) UWB, in 2007 was the time for the first published standard targeting in personal area networks, released by the IEEE. The second IEEE released standard including UWB definitions is targeted for wireless body area networks (WBAN) and was published in 2012. As the wireless communications has been and will be passing through almost any levels in society, the natural step with WBAN is using it in different medical, healthcare and wellbeing applications. The arguments for these are related to the modern lifestyle, in which people have increasingly more free time and are more interested in taking care of their health and wellbeing. Another challenge is the population composition, i.e., aging in developed countries which call for new solutions and procedures, particularly from cost wise. In this paper, we are evaluating UWB receivers based on the IEEE 802.15.6 physical layer definitions and capable of detecting differentially encoded modulation. The evaluation is performed using two different WBAN channel models.

  17. A Novel Prioritization Scheme to Improve QoS in IEEE 802.11e Networks

    Directory of Open Access Journals (Sweden)

    Navid Tadayon

    2010-01-01

    Full Text Available IEEE 802.11 WLAN utilizes a distributed function at its MAC layer, namely, DCF to access the wireless medium. Due to its distributed nature, DCF is able to guarantee working stability in a wireless medium while maintaining the assembling and maintenance cost in a low level. However, DCF is inefficient in dealing with real-time traffics due to its incapability on providing QoS. IEEE 802.11e was introduced as a supplementary standard to cope with this problem. This standard introduces an Enhanced Distributed Coordination Function (EDCF that works based on diff-Serve model and can serve multiple classes of traffics (by using different prioritizations schemes. With the emergence of new time-sensitive applications, EDCF has proved to be yet inefficient in dealing with these kinds of traffics because it could not provide network with well-differentiated QoS. In this study, we propose a novel prioritization scheme to improve QoS level in IEEE 802.11e network. In this scheme, we replace Uniform PDF with Gamma PDF, which has salient differentiating properties. We investigate the suitability and superiority of this scheme on furnishing network with well-differentiated QoS using probabilistic analysis. We strengthen our claims by extensive simulation runs.

  18. Performance Evaluation of Beacon-Enabled Mode for IEEE 802.15.4 Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    M. Udin Harun Al Rasyid

    2013-12-01

    Full Text Available IEEE 802.15.5 standard support structure of star and peer-to-peer network formation. Strating from these, the cluster tree network can be built as a special case of peer-to-peer network to increse coverage area. In this paper, we provide an performance evaluation of beacon- enabled mode for IEEE 802.15.4 wireless sensor network on star and cluster topology in order to get the maximum result to apply the appropriate topology model as needed. We conduct analysis on each topology model by using the numbers of nodes from 10 nodes to 100 nodes to analyze throughput, delay, energy consumption, and probability success packet by using NS2 simulator. The simulation results show that the throughput and the probability of success packet of cluster topology are higher than that of star topology, and the energy consumption of cluster topology is lesser than that of star topology. However, cluster topology increases the delay more than star topology. Keywords: IEEE 802.15.4, wireless sensor network, beacon-enabled mode, topology, csma/ca

  19. Analysis and Enhancement of IEEE 802.15.4e DSME Beacon Scheduling Model

    Directory of Open Access Journals (Sweden)

    Kwang-il Hwang

    2014-01-01

    Full Text Available In order to construct a successful Internet of things (IoT, reliable network construction and maintenance in a sensor domain should be supported. However, IEEE 802.15.4, which is the most representative wireless standard for IoT, still has problems in constructing a large-scale sensor network, such as beacon collision. To overcome some problems in IEEE 802.15.4, the 15.4e task group proposed various different modes of operation. Particularly, the IEEE 802.15.4e deterministic and synchronous multichannel extension (DSME mode presents a novel scheduling model to solve beacon collision problems. However, the DSME model specified in the 15.4e draft does not present a concrete design model but a conceptual abstract model. Therefore, in this paper we introduce a DSME beacon scheduling model and present a concrete design model. Furthermore, validity and performance of DSME are evaluated through experiments. Based on experiment results, we analyze the problems and limitations of DSME, present solutions step by step, and finally propose an enhanced DSME beacon scheduling model. Through additional experiments, we prove the performance superiority of enhanced DSME.

  20. Transaction and programme costs; Transaktions- und Programmkosten

    Energy Technology Data Exchange (ETDEWEB)

    Ostertag, K. [Fraunhofer-Institut fuer Systemtechnik und Innovationsforschung (ISI), Karlsruhe (Germany). Abt. Energietechnik und Energiepolitik

    1998-10-01

    There are many studies, among them many case studies and those based on energy system modelling (bottom-up studies) - revealing technologies or engineering measures that can be applied today in order to reduce CO{sub 2} emissions, and which either are even profitable at that, or do not require additional investment. This 'no-regret' potential is denied in particular by analysts who favour the top-down approach in their energy systems analyses. Their argument is that essential costs are left unconsidered in cost analysis, namely the transaction and programme costs. The article examines from the angle of transaction cost economics the nature of the transaction costs and the approach taken in valuating and modelling the cost of energy efficiency measures. Further, the necessity and adequacy of integrating programme costs into such analyses is discussed. (orig./CB) [German] Viele Studien - darunter viele Fallstudien und Studien auf Basis von Energiesystemmodellen (Bottom-up-Studien) - weisen technische Massnahmen aus, mit denen schon heute CO{sub 2}-Emissionen vermieden und gleichzeitig noch Gewinne erzielt werden koennen oder fuer die zumindest keine zusaetzlichen Kosten entstehen. Dieses 'no-regret'-Potential wird vor allem von Analytikern der 'Top-down'-Ebene bestritten mit dem Argument, bei der Berechnung der wirtschaftlichen Potentiale wuerden wesentliche Kosten - naemlich Transaktions- und Programmkosten - nicht beruecksichtigt (Grubb et al. 1993). Dieser Aufsatz hinterfragt den in der Fachdiskussion inzwischen sehr oft und oft leichtfertig gebrauchten Begriff der Transaktionskosten und wirft einen kritischen Blick auf die Bewertung und Modellierung der Kosten von Energiesparmassnahmen aus Sicht der Transaktionskostenoekonomie. Ausserdem wird die Notwendigkeit und Moeglichkeit, Programmkosten in die Betrachtung zu integrieren, diskutiert. (orig.)

  1. From Intra-transaction to Generalized Inter-transaction: Landscaping Multidimensional Contexts in Association Rule Mining

    NARCIS (Netherlands)

    Li, Q; Feng, L.; Wong, A.K.Y.

    The problem of mining multidimensional inter-transactional association rules was recently introduced in [ACM Trans. Inform. Syst. 18(4) (2000) 423; Proc. of the ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery, Seattle, Washington, June 1998, p. 12:1]. It extends the

  2. The Firm as Transaction Cost Economics Concept

    OpenAIRE

    Tchipev, Plamen D

    2003-01-01

    This is a draft English translation of the paper The Firm as Transaction Cost Economics Concept/ Фирмата в Теорията на транзакционните разходи which has been published in the “National Scientific Conference on Political Economy. Proceedings Volume”, Ruse: Publishing Centre of the Ruse University, 2016 Abstract: Within the framework of the mainstream neoclassical model, the existence of the firm creates serious theoretical difficulties. Major attempt to overcome them, leads to applicatio...

  3. The vessel fluence; Fluence cuve

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    This book presents the proceedings of the technical meeting on the reactors vessels fluence. They are grouped in eight sessions: the industrial context and the stakes of the vessels control; the organization and the methodology for the fluence computation; the concerned physical properties; the reference computation methods; the fluence monitoring in an industrial context; vessels monitoring under irradiation; others methods in the world; the research and development programs. (A.L.B.)

  4. NIH-IEEE 2015 Strategic Conference on Healthcare Innovations and Point-of-Care Technologies for Prec

    Science.gov (United States)

    NIH and the Institute for Electrical and Electronics Engineering, Engineering in Medicine and Biology Society (IEEE/EMBS) hosted the third iteration of the Healthcare Innovations and Point-of-Care Technologies Conference last week.

  5. Enterprise process consistency expressed by a formal description of transactions

    Directory of Open Access Journals (Sweden)

    Milan Mišovič

    2005-01-01

    Full Text Available Using a progressive Information Technology for development of Software Modules for Enterprise Information Systems brings a lot of practical and theoretical problems. One of them is a verification of results achieved in Life Cycle Stages. Object Oriented Analysis has the main position in the Object Life Cycle of Information Systems. It gives fundamental diagrams that will be processed in the Design and Implementation phases. We mention diagrams for enterprise processes and their refining to enterprise transaction diagrams. The Unified Modeling Language (UML has been very often used to enterprise processes and transactions modeling. There is one of very practical and theoretical problems concerning enterprise processes – their internal consistency that can be observed on the level of object transactions. We have in mind such problem as transaction feasibility and object cooperation feasibility in transactions that are strongly bound with states of objects. Therefore, a testing of object complex transactions before their programming appears to be very useful activity.This article introduces a formal description of the object cooperation logic. Therefore there is defined not only an elementary transaction feasibility but also an elementary object cooperation feasibility. It enables to search the feasibility of certain strings of elementary transactions and elementary object collaborations. One string of elementary transactions is very often regarded as a path. There are found two different systems of state logical equations. The first describes path transaction feasibility and the se- cond path object cooperation feasibility. The functional correctness of any complex transaction is founded on a functional correctness of all its paths.

  6. Implementation of IEEE-1588 timing and synchronization for ATCA control and data acquisition systems

    Energy Technology Data Exchange (ETDEWEB)

    Correia, Miguel, E-mail: miguelfc@lei.fis.uc.pt [Associacao EURATOM/IST, Instituto de Plasmas e Fusao Nuclear-Laboratorio Associado, Instituto Superior Tecnico, Universidade Tecnica de Lisboa, Lisboa (Portugal); Sousa, Jorge; Combo, Alvaro; Rodrigues, Antonio P.; Carvalho, Bernardo B.; Batista, Antonio J.N.; Goncalves, Bruno [Associacao EURATOM/IST, Instituto de Plasmas e Fusao Nuclear-Laboratorio Associado, Instituto Superior Tecnico, Universidade Tecnica de Lisboa, Lisboa (Portugal); Correia, Carlos M.B.A. [Grupo de Electronica e Instrumentacao do Centro de Instrumentacao, Dept. de Fisica, Universidade de Coimbra, Coimbra (Portugal); Varandas, Carlos A.F. [Associacao EURATOM/IST, Instituto de Plasmas e Fusao Nuclear-Laboratorio Associado, Instituto Superior Tecnico, Universidade Tecnica de Lisboa, Lisboa (Portugal)

    2012-12-15

    Highlights: Black-Right-Pointing-Pointer IEEE-1588 over Ethernet protocol is implemented for the synchronization of all clock signals of an ATCA AMC carrier module. Black-Right-Pointing-Pointer The ATCA hardware consists of an AMC quad-carrier main-board with PCI Express switching. Black-Right-Pointing-Pointer IEEE-1588 is to be implemented on a Virtex-6 FPGA. Black-Right-Pointing-Pointer Timing signals on the ATX-AMC4-PTP are managed and routed by a crosspoint-switch implemented on a Virtex-6 FPGA. Black-Right-Pointing-Pointer Each clock signal source may be independently located (on each of the AMC cards, RTM or ATCA backplane). - Abstract: Control and data acquisition (C and DA) systems for Fusion experiments are required to provide accurate timing and synchronization (T and S) signals to all of its components. IPFN adopted PICMG's Advanced Telecommunications Computing Architecture (ATCA) industry standard to develop C and DA instrumentation. ATCA was chosen not only for its high throughput characteristics but also for its high availability (HA) features which become of greater importance in steady-state operation scenarios. However, the specified ATCA clock and synchronization interface may be too limited for the timing and synchronization needs in advanced Physics experiments. Upcoming specification extensions, developed by the 'xTCA for Physics' workgroups, will contemplate, among others, a complementary timing specification, developed by the PICMG xTCA for Physics IO, Timing and Synchronization Technical Committee. The IEEE-1588 Precision Time Protocol (PTP) over Ethernet is one of the protocols, proposed by the Committee, aiming for precise synchronization of clocks in measurement and control systems, based on low jitter and slave-to-slave skew criteria. The paper presents an implementation of IEEE-1588 over Ethernet, in an ATCA hardware platform. The ATCA hardware consists of an Advanced Mezzanine Card (AMC) quad-carrier front board with PCI

  7. [Large vessel vasculitides].

    Science.gov (United States)

    Morović-Vergles, Jadranka; Puksić, Silva; Gracanin, Ana Gudelj

    2013-01-01

    Large vessel vasculitis includes Giant cell arteritis and Takayasu arteritis. Giant cell arteritis is the most common form of vasculitis affect patients aged 50 years or over. The diagnosis should be considered in older patients who present with new onset of headache, visual disturbance, polymyalgia rheumatica and/or fever unknown cause. Glucocorticoides remain the cornerstone of therapy. Takayasu arteritis is a chronic panarteritis of the aorta ant its major branches presenting commonly in young ages. Although all large arteries can be affected, the aorta, subclavian and carotid arteries are most commonly involved. The most common symptoms included upper extremity claudication, hypertension, pain over the carotid arteries (carotidynia), dizziness and visual disturbances. Early diagnosis and treatment has improved the outcome in patients with TA.

  8. Vessel segmentation in screening mammograms

    Science.gov (United States)

    Mordang, J. J.; Karssemeijer, N.

    2015-03-01

    Blood vessels are a major cause of false positives in computer aided detection systems for the detection of breast cancer. Therefore, the purpose of this study is to construct a framework for the segmentation of blood vessels in screening mammograms. The proposed framework is based on supervised learning using a cascade classifier. This cascade classifier consists of several stages where in each stage a GentleBoost classifier is trained on Haar-like features. A total of 30 cases were included in this study. In each image, vessel pixels were annotated by selecting pixels on the centerline of the vessel, control samples were taken by annotating a region without any visible vascular structures. This resulted in a total of 31,000 pixels marked as vascular and over 4 million control pixels. After training, the classifier assigns a vesselness likelihood to the pixels. The proposed framework was compared to three other vessel enhancing methods, i) a vesselness filter, ii) a gaussian derivative filter, and iii) a tubeness filter. The methods were compared in terms of area under the receiver operating characteristics curves, the Az values. The Az value of the cascade approach is 0:85. This is superior to the vesselness, Gaussian, and tubeness methods, with Az values of 0:77, 0:81, and 0:78, respectively. From these results, it can be concluded that our proposed framework is a promising method for the detection of vessels in screening mammograms.

  9. Americium behaviour in plastic vessels

    Energy Technology Data Exchange (ETDEWEB)

    Legarda, F.; Herranz, M. [Departamento de Ingenieria Nuclear y Mecanica de Fluidos, Escuela Tecnica Superior de Ingenieria de Bilbao, Universidad del Pais Vasco (UPV/EHU), Alameda de Urquijo s/n, 48013 Bilbao (Spain); Idoeta, R., E-mail: raquel.idoeta@ehu.e [Departamento de Ingenieria Nuclear y Mecanica de Fluidos, Escuela Tecnica Superior de Ingenieria de Bilbao, Universidad del Pais Vasco (UPV/EHU), Alameda de Urquijo s/n, 48013 Bilbao (Spain); Abelairas, A. [Departamento de Ingenieria Nuclear y Mecanica de Fluidos, Escuela Tecnica Superior de Ingenieria de Bilbao, Universidad del Pais Vasco (UPV/EHU), Alameda de Urquijo s/n, 48013 Bilbao (Spain)

    2010-07-15

    The adsorption of {sup 241}Am dissolved in water in different plastic storage vessels was determined. Three different plastics were investigated with natural and distilled waters and the retention of {sup 241}Am by these plastics was studied. The same was done by varying vessel agitation time, vessel agitation speed, surface/volume ratio of water in the vessels and water pH. Adsorptions were measured to be between 0% and 70%. The adsorption of {sup 241}Am is minimized with no water agitation, with PET or PVC plastics, and by water acidification.

  10. Determinants of Transaction Costs to Farmers Participation in ...

    African Journals Online (AJOL)

    Farmers are often encouraged to form producer groups to facilitate their access to markets in an effort to overcome transaction costs and enjoy economies of scale, which is often advocated in the collective action literature. The role of transaction costs in participation of smallholder farmers groups is attempts that underpin ...

  11. A Template Model for Multidimensional Inter-Transactional Association Rules

    NARCIS (Netherlands)

    Feng, L.; Yu, J.X.; Lu, H.J.; Han, J.W.

    2002-01-01

    Multidimensional inter-transactional association rules extend the traditional association rules to describe more general associations among items with multiple properties across transactions. “After McDonald and Burger King open branches, KFC will open a branch two months later and one mile away��?

  12. 15 CFR 748.5 - Parties to the transaction.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Parties to the transaction. 748.5... (CLASSIFICATION, ADVISORY, AND LICENSE) AND DOCUMENTATION § 748.5 Parties to the transaction. The following parties may be entered on the application. The definitions, which also appear in part 772 of the EAR, are...

  13. 77 FR 68834 - Proposed Exemptions From Certain Prohibited Transaction Restrictions

    Science.gov (United States)

    2012-11-16

    ... sales price, plus the greater of ``Lost Earnings,'' which is generally defined as the approximate amount... Transaction Compensation, if any, plus Lost Earnings on the Transaction Compensation from the time of the... Lost Earnings on the Principal Amount to pay to the IRA. (c) With respect to the Stock Purchase...

  14. Distributed Global Transaction Support for Workflow Management Applications

    NARCIS (Netherlands)

    Vonk, J.; Grefen, P.W.P.J.; Boertjes, E.M.; Apers, Peter M.G.

    Workflow management systems require advanced transaction support to cope with their inherently long-running processes. The recent trend to distribute workflow executions requires an even more advanced transaction support system that is able to handle distribution. This paper presents a model as well

  15. Distributed Global Transaction Support for Workflow Management Applications

    NARCIS (Netherlands)

    Vonk, J.; Grefen, P.W.P.J.; Boertjes, E.M.; Apers, Peter M.G.

    Workflow management systems require advanced transaction support to cope with their inherently long-running processes. The recent trend to distribute workflow executions requires an even more advanced transaction support system that is able to handle distribution. This report presents a model as

  16. Two-Layer Transaction Management for Workflow Management Applications

    NARCIS (Netherlands)

    Grefen, P.W.P.J.; Vonk, J.; Boertjes, E.M.; Apers, Peter M.G.

    Workflow management applications require advanced transaction management that is not offered by traditional database systems. For this reason, a number of extended transaction models has been proposed in the past. None of these models seems completely adequate, though, because workflow management

  17. 16 CFR 802.53 - Certain foreign banking transactions.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Certain foreign banking transactions. 802.53 Section 802.53 Commercial Practices FEDERAL TRADE COMMISSION RULES, REGULATIONS, STATEMENTS AND... foreign banking transactions. An acquisition which requires the consent or approval of the Board of...

  18. Nonverbal Communication and Client Satisfaction in Computer-Assisted Transactions.

    Science.gov (United States)

    Ketrow, Sandra M.

    1991-01-01

    Tests the arousal-valence model of nonverbal communication by examining the effect of selected immediate nonverbal communication cues exhibited by bank tellers on the satisfaction of their clients in banking transactions. Finds that immediacy in brief impersonal transactions is not a significant predictor of satisfaction. (SR)

  19. 31 CFR 595.201 - Prohibited transactions involving blocked property.

    Science.gov (United States)

    2010-07-01

    ... this section and a party to the transaction believes the funds have been blocked due to mistaken... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Prohibited transactions involving blocked property. 595.201 Section 595.201 Money and Finance: Treasury Regulations Relating to Money and...

  20. 31 CFR 536.201 - Prohibited transactions involving blocked property.

    Science.gov (United States)

    2010-07-01

    ... institution pursuant to this section and a party to the transaction believes the funds have been blocked due... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Prohibited transactions involving blocked property. 536.201 Section 536.201 Money and Finance: Treasury Regulations Relating to Money and...

  1. 31 CFR 515.404 - Transactions between principal and agent.

    Science.gov (United States)

    2010-07-01

    ... of such person is a transaction prohibited by § 515.201 to the same extent as if the parties to the... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transactions between principal and agent. 515.404 Section 515.404 Money and Finance: Treasury Regulations Relating to Money and Finance...

  2. 31 CFR 500.404 - Transactions between principal and agent.

    Science.gov (United States)

    2010-07-01

    ... of such person is a transaction prohibited by § 500.201 to the same extent as if the parties to the... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transactions between principal and agent. 500.404 Section 500.404 Money and Finance: Treasury Regulations Relating to Money and Finance...

  3. Deadline-aware scheduling for Software Transactional Memory

    DEFF Research Database (Denmark)

    Maldonado, Walter; Marlier, Patrick; Felber, Pascal

    2011-01-01

    limiting the progress of concurrent transactions. Our implementation comprises a STM extension for gathering statistics and implementing the execution mode strategies. We have also extended the Linux scheduler to disable preemption or migration of threads that are executing transactions with deadlines. Our...

  4. 19 CFR 181.81 - Applicability to NAFTA transactions.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Applicability to NAFTA transactions. 181.81... to NAFTA transactions. Except as otherwise provided in § 181.82 of this part, all criminal, civil or... violations of the laws and regulations relating to the NAFTA. ...

  5. 19 CFR 181.96 - Change in status of transaction.

    Science.gov (United States)

    2010-04-01

    ... with a NAFTA transaction must immediately advise Customs in writing of any change in the status of that... Customs field office. In addition, any person engaged in a NAFTA transaction coming under the jurisdiction of a Customs field office who has previously requested a NAFTA advance ruling with respect to that...

  6. Uncovering the Hidden Transaction Costs of Market Power

    DEFF Research Database (Denmark)

    Foss, Kirsten; Foss, Nicolai J.; Klein, Peter G.

    2017-01-01

    off by the exercise of market power can negotiate, bargain, form coalitions, and otherwise contract around the focal firm's attempts to appropriate monopoly profits—depending on transaction costs. We build on property rights economics to explain how transaction costs affect positioning and offer...

  7. Vertical Integration into Electronics: Transaction Costs and Organization Domain

    NARCIS (Netherlands)

    Sorge, A.; Batenburg, R.S.

    1999-01-01

    Transaction cost theory (TCT) had been posited, by Oliver Williamson, as a theoretically rigorous way of explaining the institutions that are found in capitalist economies, for regulating transactions in the face of bounded rationality and opportunism (Williamson 1995, 1996). The approach was

  8. Bridging the transactional gap in Open Distance Learning (ODL ...

    African Journals Online (AJOL)

    To serve the goal of the paper the following specific objectives were formulated: to establish types of e-learning resources available at Unisa, and to identify the benefits of elearning at Unisa. This study is informed by Michael Moore's Transactional Distance theory. This theory, which focuses on dialogue, transactional ...

  9. Leveraged Public to Private Transactions in the UK

    NARCIS (Netherlands)

    Renneboog, L.D.R.; Simons, T.; Wright, M.

    2005-01-01

    This paper examines the magnitude and the sources of the expected shareholder gains in UK public to private transactions (PTPs) in the second wave from 1997-2003.Pre-transaction shareholders on average receive a premium of 40% and the share price reaction to the PTP announcement is about 30%.The

  10. Parallel transaction processing in functional languages, towards practical functional databases

    NARCIS (Netherlands)

    Wevers, L.; Huisman, Marieke; de Keijzer, Ander

    2013-01-01

    This paper shows how functional languages can be adapted for transaction processing, and discusses the implementation of a parallel runtime system for such functional transaction processing languages. We extend functional languages with current state variables and result state variables to allow the

  11. 47 CFR 32.27 - Transactions with affiliates.

    Science.gov (United States)

    2010-10-01

    ... SYSTEM OF ACCOUNTS FOR TELECOMMUNICATIONS COMPANIES General Instructions § 32.27 Transactions with... prevailing price valuation, as defined in paragraph (d) of this section, shall be recorded at the prevailing... time, the carrier must perform the market valuation and value the transaction on a going-forward basis...

  12. 31 CFR 586.510 - Transactions related to telecommunications authorized.

    Science.gov (United States)

    2010-07-01

    ... telecommunications authorized. 586.510 Section 586.510 Money and Finance: Treasury Regulations Relating to Money and... Licensing Policy § 586.510 Transactions related to telecommunications authorized. All transactions with respect to the receipt and transmission of telecommunications involving the FRY (S&M) are authorized. This...

  13. 31 CFR 585.513 - Transactions related to telecommunications authorized.

    Science.gov (United States)

    2010-07-01

    ... telecommunications authorized. 585.513 Section 585.513 Money and Finance: Treasury Regulations Relating to Money and... Transactions related to telecommunications authorized. (a) All transactions of U.S. common carriers with respect to the receipt and transmission of telecommunications involving the FRY (S&M) are authorized...

  14. Semantics and Architecture of Global Transaction Support in Workflow Environments

    NARCIS (Netherlands)

    Grefen, P.W.P.J.; Vonk, J.; Boertjes, E.M.; Apers, Peter M.G.

    We present an approach to global transaction management in workflow environments. The transaction mechanism is based on the well-known notion of sagas, but extended to deal with arbitrary process structures including cycles and savepoints that allow partial compensation. We present a formal

  15. A Java Reference Model of Transacted Memory for Smart Cards

    NARCIS (Netherlands)

    Poll, Erik; Hartel, Pieter H.; de Jong, Eduard

    Transacted Memory offers persistence, undoability and auditing. We present a Java/JML Reference Model of the Transacted Memory system on the basis of our earlier separate Z model and C implementation. We conclude that Java/JML combines the advantages of a high level specification in the JML part

  16. Transaction Cost Of Borrowing Among Small Scale Farmers In ...

    African Journals Online (AJOL)

    ... farmers not aware of loan facilities, inability to provide securities, non-existence of banking services and high transaction cost. Transaction costs such as interest charges, transport, feeding, money paid for processing forms and gratification may influence the willingness of the small scale farmers to borrow or not to borrow.

  17. 27 CFR 555.127 - Daily summary of magazine transactions.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Daily summary of magazine....127 Daily summary of magazine transactions. In taking the inventory required by §§ 555.122, 555.123... transactions to be kept at each magazine of an approved storage facility; however, these records may be kept at...

  18. Father Knows Best: Using Adam Smith to Teach Transactions Costs

    Science.gov (United States)

    Dupont, Brandon

    2014-01-01

    Adam Smith's moral philosophy can be used to introduce economics students to the important idea of transactions costs. The author provides a brief background in this article to Smith's moral philosophy and connects it to the costs of transacting in a way that fits easily into the standard principles of microeconomics classroom. By doing…

  19. 29 CFR 4204.12 - De minimis transactions.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false De minimis transactions. 4204.12 Section 4204.12 Labor... transactions. The criterion under this section is that the amount of the bond or escrow does not exceed the lesser of $250,000 or two percent of the average total annual contributions made by all employers to the...

  20. Transaction costs and social networks in productivity measurement

    DEFF Research Database (Denmark)

    Henningsen, Geraldine; Henningsen, Arne; Henning, Christian H. C. A.

    2015-01-01

    and support. Hence, we use measures of a firm’s access to social networks as a proxy for the transaction costs the firm faces. We develop a microeconomic production model that takes into account transaction costs and networks. Using a data set of 384 Polish farms, we empirically estimate this model......We argue that in the presence of transaction costs, observed productivity measures may in many cases understate the true productivity, as production data seldom distinguish between resources entering the production process and resources of a similar type that are sacrificed for transaction costs....... Hence, both the absolute productivity measures and, more importantly, the productivity ranking will be distorted. A major driver of transaction costs is poor access to information and contract enforcement assistance. Social networks often catalyse information exchange as well as generate trust...

  1. Transactive Systems Simulation and Valuation Platform Trial Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Widergren, Steven E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Hammerstrom, Donald J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Huang, Qiuhua [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Kalsi, Karanjit [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lian, Jianming [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Makhmalbaf, Atefe [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); McDermott, Thomas E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Sivaraman, Deepak [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Tang, Yingying [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Veeramany, Arun [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Woodward, James C. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2017-04-01

    Transactive energy systems use principles of value to coordinate responsive supply and demand in energy systems. Work continues within the Transactive Systems Program, which is funded by the U.S. Department of Energy at Pacific Northwest National Laboratory, to understand the value of, understand the theory behind, and simulate the behaviors of transactive energy systems. This report summarizes recent advances made by this program. The main capability advances include a more comprehensive valuation model, including recommended documentation that should make valuation studies of all sorts more transparent, definition of economic metrics with which transactive mechanisms can be evaluated, and multiple improvements to the time-simulation environment that is being used to evaluate transactive scenarios.

  2. Supply Chain-Wide Consequences of Transaction Risks and Their Contractual Solutions: Towards an Extended Transaction Cost Economics Framework

    NARCIS (Netherlands)

    Wever, M.; Wognum, P.M.; Trienekens, J.H.; Omta, S.W.F.

    2012-01-01

    How supply chain actors manage their exposure to both supply- and demand-side risks is a topic that has been insufficiently examined within the transaction cost economics (TCE) literature. TCE studies often only examine transaction risks in the context of bilateral exchanges. This study aims to

  3. 17 CFR 155.6 - Trading standards for the transaction of business on registered derivatives transaction execution...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Trading standards for the transaction of business on registered derivatives transaction execution facilities. 155.6 Section 155.6 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION TRADING STANDARDS § 155.6 Trading...

  4. 75 FR 33642 - Proposed Amendment to Prohibited Transaction Exemption (PTE) 96-23 for Plan Asset Transactions...

    Science.gov (United States)

    2010-06-14

    ... 96-23 excludes from exemptive relief those transactions described in PTEs 81-6 (relating to... for any transaction specifically described in PTEs 81-6, 83-1 or 88-59, if a person determines not to... Department notes that on October 31, 2006, it amended and replaced PTEs 81-6 and 82-63, relating to...

  5. 50 CFR 648.8 - Vessel identification.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Vessel identification. 648.8 Section 648.8... identification. (a) Vessel name and official number. Each fishing vessel subject to this part and over 25 ft (7.6... or ocean quahog vessels licensed under New Jersey law may use the appropriate vessel identification...

  6. DoS detection in IEEE 802.11 with the presence of hidden nodes.

    Science.gov (United States)

    Soryal, Joseph; Liu, Xijie; Saadawi, Tarek

    2014-07-01

    The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehaving nodes in wireless networks with the presence of hidden nodes employing the widely used IEEE 802.11 Distributed Coordination Function (DCF) protocols described in the IEEE standard [1]. Attacker nodes alter the IEEE 802.11 DCF firmware to illicitly capture the channel via elevating the probability of the average number of packets transmitted successfully using up the bandwidth share of the innocent nodes that follow the protocol standards. We obtained the theoretical network throughput by solving two-dimensional Markov Chain model as described by Bianchi [2], and Liu and Saadawi [3] to determine the channel capacity. We validated the results obtained via the theoretical computations with the results obtained by OPNET simulator [4] to define the baseline for the average attainable throughput in the channel under standard conditions where all nodes follow the standards. The main goal of the DoS attacker is to prevent the innocent nodes from accessing the channel and by capturing the channel's bandwidth. In addition, the attacker strives to appear as an innocent node that follows the standards. The protocol resides in every node to enable each node to police other nodes in its immediate wireless coverage area. All innocent nodes are able to detect and identify the DoS attacker in its wireless coverage area. We applied the protocol to two Physical Layer technologies: Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS) and the results are presented to validate the algorithm.

  7. 4th IEEE/ACIS International Conference on Computer and Information Science

    CERN Document Server

    2016-01-01

    This edited book presents scientific results of the 14th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2015) which was held on June 28 – July 1, 2015 in Las Vegas, USA. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them.

  8. Low-frequency electrical dosimetry: research agenda of the IEEE International Committee on Electromagnetic Safety.

    Science.gov (United States)

    Reilly, J Patrick; Hirata, Akimasa

    2016-06-21

    This article treats unsettled issues in the use of numerical models of electrical dosimetry as applied to international limits on human exposure to low-frequency (typically  IEEE-ICES (International Committee on Electromagnetic Safety) Technical Committee 95. The paper discusses 25 issues needing attention, fitting into three general categories: induction models; electrostimulation models; and human exposure limits. Of these, 9 were voted as 'high priority' by members of Subcommittee 6. The list is presented as a research agenda for refinements in numerical modeling with applications to human exposure limits. It is likely that such issues are also important in medical and electrical product safety design applications.

  9. An Analysis Model of IEEE 802.11p with Difference Services

    Science.gov (United States)

    Tian, Jin; Xu, Lu

    2017-10-01

    Quality of Service (QoS) is a critical issue for the broadcast scheme of IEEE 802.11p systems in Vehicular Ad hoc Networks (VANETs). We present a 3-dimensional (3-D) Markov chain that the extra dimension, which models the deferring period, allows us to accurately solve for the broadcast scheme of 802.11p systems. The 3-D model solutions are validated by key simulations. Our analyses reveal that the lack of retransmission in the 802.11p system results in poor QoS performance during heavy traffic load, particularly for large VANETs.

  10. Software-defined networking model for smart transformers with ISO/IEC/IEEE 21451 sensors

    Directory of Open Access Journals (Sweden)

    Longhua Guo

    2017-06-01

    Full Text Available The advanced IEC 61850 smart transformer has shown an improved performance in monitoring, controlling, and protecting the equipment in smart substations. However, heterogeneity, feasibility, and network control problems have limited the smart transformer’s performance in networks. To address these issues, a software-defined networking model was proposed using ISO/IEC/IEEE 21451 networks. An IEC-61850-based network controller was designed as a new kind of intelligent electrical device (IED. The proposed data and information models enhanced the network awareness ability and facilitated the access of smart sensors in transformer to communication networks. The performance evaluation results showed an improved efficiency.

  11. Latency and Jitter Analysis for IEEE 802.11e Wireless LANs

    Directory of Open Access Journals (Sweden)

    Sungkwan Youm

    2013-01-01

    Full Text Available This paper presents a numerical analysis of latency and jitter for IEEE 802.11e wireless local area networks (WLANs in a saturation condition, by using a Markov model. We use this model to explicate how the enhanced distributed coordination function (EDCF differentiates classes of service and to characterize the probability distribution of the medium access control (MAC layer packet latency and jitter, on which the quality of the voice over Internet protocol (VoIP calls is dependent. From the proposed analytic model, we can estimate the available number of nodes determining the system performance, in order to satisfy user demands on the latency and jitter.

  12. Adaptive Radio Resource Allocation in Hierarchical QoS Scheduling for IEEE 802.16 Systems

    DEFF Research Database (Denmark)

    Wang, Hua; Dittmann, Lars

    2007-01-01

    an adaptive bandwidth distribution algorithm for the aggregate scheduler in a two-level hierarchical scheduler, which can provide more organized service differentiation among different service classes. By taking the backlogged traffic, the spectral efficiency in terms of modulation efficiency, and the Qo...... of the class schedulers and distribute the bandwidth among them more efficiently than the conventional schemes.......Future mobile communication systems such as IEEE 802.16 are expected to deliver a variety of multimedia services with diverse QoS requirements. To guarantee the QoS provision, appropriate scheduler architecture and scheduling algorithms have to be carefully designed. In this paper, we propose...

  13. Distributed Fair Access Point Selection for Multi-Rate IEEE 802.11 WLANs

    Science.gov (United States)

    Gong, Huazhi; Nahm, Kitae; Kim, Jongwon

    In IEEE 802.11 networks, the access point (AP) selection based on the strongest signal strength often results in the extremely unfair bandwidth allocation among mobile users (MUs). In this paper, we propose a distributed AP selection algorithm to achieve a fair bandwidth allocation for MUs. The proposed algorithm gradually balances the AP loads based on max-min fairness for the available multiple bit rate choices in a distributed manner. We analyze the stability and overhead of the proposed algorithm, and show the improvement of the fairness via computer simulation.

  14. A Secure Simplification of the PKMv2 Protocol in IEEE 802.16e-2005

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielsen, Christoffer Rosenkilde

    2007-01-01

    Static analysis is successfully used for automatically validating security properties of classical cryptographic protocols. In this paper, we shall employ the same technique to a modern security protocol for wireless networks, namely the latest version of the Privacy and Key Management protocol...... for IEEE 802.16e, PKMv2. This protocol seems to have an exaggerated mixture of security features. Thus, we iteratively investigate which components are necessary for upholding the security properties and which can be omitted safely. This approach is based on the LySa process calculus and employs...

  15. Building smart sensor nodes according to IEEE 1451.3 standard.

    Science.gov (United States)

    da Costa, Murilo N J; Neto, Olegario C S; Ferreira, José O; da Rocha, Adson F; de A Barbosa, Talles M G

    2011-01-01

    A Body Sensor Network (BSN) application requires many software and hardware adaptations to support correctly data exchanges between different sensor node architectures. However, these customizations demand extra time, cost and components. This paper introduces a simple development process in order to customize off-the-shelf BSN sensor nodes according to Transducer Bus Interface Modules (TBIM) standard. IEEE 1451.3 offers technical solutions for interfacing multiple and physically separated transducer allowing self-identification, self-configuration, plug and play and hot swapping capabilities. These are important requirements relating to most BSN applications.

  16. Scheduling support for transactional memory contention management

    DEFF Research Database (Denmark)

    Maldonado, Walther; Marler, Patrick; Felber, Pascal

    2010-01-01

    Transactional Memory (TM) is considered as one of the most promising paradigms for developing concurrent applications. TM has been shown to scale well on >multiple cores when the data access pattern behaves "well," i.e., when few conflicts are induced. In contrast, data patterns with frequent write......-management has been proposed for increasing TM efficiency under high-contention [2, 5, 19]. However, only user-level schedulers have been considered. In this work, we propose, implement and evaluate several novel kernel-level scheduling support mechanisms for TM contention management. We also investigate...... different strategies for efficient communication between the kernel and the user-level TM library. To the best of our knowledge, our work is the first to investigate kernel-level support for TM contention management. We have introduced kernel-level TM scheduling support into both the Linux and Solaris...

  17. 2D Fast Vessel Visualization Using a Vessel Wall Mask Guiding Fine Vessel Detection

    Directory of Open Access Journals (Sweden)

    Sotirios Raptis

    2010-01-01

    and then try to approach the ridges and branches of the vasculature's using fine detection. Fine vessel screening looks into local structural inconsistencies in vessels properties, into noise, or into not expected intensity variations observed inside pre-known vessel-body areas. The vessels are first modelled sufficiently but not precisely by their walls with a tubular model-structure that is the result of an initial segmentation. This provides a chart of likely Vessel Wall Pixels (VWPs yielding a form of a likelihood vessel map mainly based on gradient filter's intensity and spatial arrangement parameters (e.g., linear consistency. Specific vessel parameters (centerline, width, location, fall-away rate, main orientation are post-computed by convolving the image with a set of pre-tuned spatial filters called Matched Filters (MFs. These are easily computed as Gaussian-like 2D forms that use a limited range sub-optimal parameters adjusted to the dominant vessel characteristics obtained by Spatial Grey Level Difference statistics limiting the range of search into vessel widths of 16, 32, and 64 pixels. Sparse pixels are effectively eliminated by applying a limited range Hough Transform (HT or region growing. Major benefits are limiting the range of parameters, reducing the search-space for post-convolution to only masked regions, representing almost 2% of the 2D volume, good speed versus accuracy/time trade-off. Results show the potentials of our approach in terms of time for detection ROC analysis and accuracy of vessel pixel (VP detection.

  18. BY FRUSTUM CONFINING VESSEL

    Directory of Open Access Journals (Sweden)

    Javad Khazaei

    2016-09-01

    Full Text Available Helical piles are environmentally friendly and economical deep foundations that, due to environmental considerations, are excellent additions to a variety of deep foundation alternatives available to the practitioner. Helical piles performance depends on soil properties, the pile geometry and soil-pile interaction. Helical piles can be a proper alternative in sensitive environmental sites if their bearing capacity is sufficient to support applied loads. The failure capacity of helical piles in this study was measured via an experimental research program that was carried out by Frustum Confining Vessel (FCV. FCV is a frustum chamber by approximately linear increase in vertical and lateral stresses along depth from top to bottom. Due to special geometry and applied bottom pressure, this apparatus is a proper choice to test small model piles which can simulate field stress conditions. Small scale helical piles are made with either single helix or more helixes and installed in fine grained sand with three various densities. Axial loading tests including compression and tension tests were performed to achieve pile ultimate capacity. The results indicate the helical piles behavior depends essentially on pile geometric characteristics, i.e. helix configuration and soil properties. According to the achievements, axial uplift capacity of helical model piles is about equal to usual steel model piles that have the helixes diameter. Helical pile compression bearing capacity is too sufficient to act as a medium pile, thus it can be substituted other piles in special geoenvironmental conditions. The bearing capacity also depends on spacing ratio, S/D, and helixes diameter.

  19. Southeast Region Headboat Survey-Vessel list/Vessel Directory

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This is a database of vessels that have been on the SRHS through time, their owners/operators, marinas/docks and their contact information. This assists in...

  20. Foreign exchange transaction exposure of enterprises in Serbia

    Directory of Open Access Journals (Sweden)

    Bogićević Jasmina

    2016-01-01

    Full Text Available Enterprises involved in international business face transaction exposure to foreign exchange risk. This type of exposure occurs when an enterprise trades, borrows, or lеnds in foreign currency. Transaction exposure has a direct effect on an enterprise’s financial position and profitability. It is one of the three forms of exposure to exchange rate fluctuations, the other two being translation exposure and operating exposure. The aim of this paper is to assess the transaction exposure of enterprises in Serbia operating internationally. In addition to identifying and measuring transaction exposure, this paper explores the practical importance that enterprises in Serbia attach to management of this type of foreign exchange risk. We do not find significant differences between domestic and foreign enterprises in their choice of the type of foreign exchange risk exposure to manage. Although transaction exposure is the most managed type of foreign exchange risk, research has shown that, compared to foreign businesses, Serbian enterprises do not use sufficient protective measures to minimize the negative impact of this type of exposure on their cash flows and profitability. We expected that there would be a statistically significant dependence between the volume of enterprises’ foreign currency transactions and the level of applied transaction exposure management practices. However, the results of our research, based on a sample of enterprises in Serbia operating internationally, show that transaction exposure management practices can be influenced by factors other than the level of an enterprise’s foreign currency transactions, such as the enterprise’s country of origin.

  1. FPGA-Based Vehicular Channel Emulator for Real-Time Performance Evaluation of IEEE 802.11p Transceivers

    Directory of Open Access Journals (Sweden)

    Fernández-Caramés TM

    2010-01-01

    Full Text Available IEEE 802.11p is one of the most promising future wireless standards due to the increasing demand of vehicular communication applications. At the time of writing, the document of the standard is in draft and much research is still required to study and improve the performance of transceivers in common vehicular scenarios. In this paper, we present a framework to evaluate the PHY layer of IEEE 802.11p systems in realistic situations. We detail the design and implementation of an FPGA-based real-time vehicular channel emulator. Contrarily to commercial emulators, ours is cheap, very flexible, and reconfigurable. We show its capabilities by evaluating performance in different high-speed scenarios. We also study the importance of coding and the benefits of using IEEE 802.11p instead of IEEE 802.11a in vehicular environments. Towards this aim, we developed a reference IEEE 802.11p PHY transceiver software model that can be taken as a convenient starting point for transceiver design.

  2. Self-Coexistence among IEEE 802.22 Networks: Distributed Allocation of Power and Channel

    Directory of Open Access Journals (Sweden)

    Sayef Azad Sakin

    2017-12-01

    Full Text Available Ensuring self-coexistence among IEEE 802.22 networks is a challenging problem owing to opportunistic access of incumbent-free radio resources by users in co-located networks. In this study, we propose a fully-distributed non-cooperative approach to ensure self-coexistence in downlink channels of IEEE 802.22 networks. We formulate the self-coexistence problem as a mixed-integer non-linear optimization problem for maximizing the network data rate, which is an NP-hard one. This work explores a sub-optimal solution by dividing the optimization problem into downlink channel allocation and power assignment sub-problems. Considering fairness, quality of service and minimum interference for customer-premises-equipment, we also develop a greedy algorithm for channel allocation and a non-cooperative game-theoretic framework for near-optimal power allocation. The base stations of networks are treated as players in a game, where they try to increase spectrum utilization by controlling power and reaching a Nash equilibrium point. We further develop a utility function for the game to increase the data rate by minimizing the transmission power and, subsequently, the interference from neighboring networks. A theoretical proof of the uniqueness and existence of the Nash equilibrium has been presented. Performance improvements in terms of data-rate with a degree of fairness compared to a cooperative branch-and-bound-based algorithm and a non-cooperative greedy approach have been shown through simulation studies.

  3. Service design projects sponsored by the Kansas State University Student Chapter of the IEEE EMBS.

    Science.gov (United States)

    Griffith, Connor; Gruber, Lucinda; Young, Ethan; Humphrey, Jason; Warren, Steve

    2008-01-01

    Service projects offer volunteer student organizations a means to generate interest and focus activity outside of the context of the classroom. This paper addresses efforts by the Kansas State University (KSU) Student Chapter of the IEEE Engineering in Medicine and Biology Society (EMBS) to initiate and guide service projects in two primary areas: (1) research to aid persons with disabilities (RAPD) and (2) hands-on efforts to interest young women in the quantitative fields of science and engineering. Three RAPD projects are presented: a computer mouse design that helps to alleviate productivity problems associated with Parkinson's tremors, a battery removal tool for arthritic individuals with limited dexterity, and a wireless door control and communication system to assist mobility-limited individuals. Service projects to garner science and engineering interest in young women are co-sponsored by the KSU Women in Engineering and Science Program (WESP). The most recent activity, entitled 'Vital Signs Shirts,' is presented in this paper, along with a summary of pending interactive laboratories designed to interest participants in engineering as applied to the human body. These service projects encourage IEEE EMBS student chapter members to explore their biomedical engineering interests and make a positive impact in the community.

  4. An Adaptive Medium Access Parameter Prediction Scheme for IEEE 802.11 Real-Time Applications

    Directory of Open Access Journals (Sweden)

    Estefanía Coronado

    2017-01-01

    Full Text Available Multimedia communications have experienced an unprecedented growth due mainly to the increase in the content quality and the emergence of smart devices. The demand for these contents is tending towards wireless technologies. However, these transmissions are quite sensitive to network delays. Therefore, ensuring an optimum QoS level becomes of great importance. The IEEE 802.11e amendment was released to address the lack of QoS capabilities in the original IEEE 802.11 standard. Accordingly, the Enhanced Distributed Channel Access (EDCA function was introduced, allowing it to differentiate traffic streams through a group of Medium Access Control (MAC parameters. Although EDCA recommends a default configuration for these parameters, it has been proved that it is not optimum in many scenarios. In this work a dynamic prediction scheme for these parameters is presented. This approach ensures an appropriate traffic differentiation while maintaining compatibility with the stations without QoS support. As the APs are the only devices that use this algorithm, no changes are required to current network cards. The results show improvements in both voice and video transmissions, as well as in the QoS level of the network that the proposal achieves with regard to EDCA.

  5. BOB-RED queue management for IEEE 802.15.4 wireless sensor networks

    Directory of Open Access Journals (Sweden)

    Wu Jean-Lien

    2011-01-01

    Full Text Available Abstract Multimedia services over resource constrained wireless sensor networks (WSNs face a performance bottleneck issue from the gateway node to the sink node. Therefore, the queue management at the gateway node is crucial for diversified messages conveyed from the front nodes to the sink node. In this article, beacon order-based random early detection (BOB-RED queue management is proposed. BOB-RED is a dynamic adaptation scheme based on adjusting beacon interval and superframe duration in the IEEE 802.15.4 MAC superframe accompanied with RED queue management scheme to increase the transmission efficiency of multimedia over WSNs. We focus on the performance improvement upon different traffic loads over WSNs. Evaluation metrics include end-to-end delay, packet delivery ratio, and energy consumption in IEEE 802.15.4 beacon enabled mode. Simulation results show that BOB-RED can effectively decrease end-to-end delay and energy consumption compared to the DropTail scheme.

  6. Predictable and reliable ECG monitoring over IEEE 802.11 WLANs within a hospital.

    Science.gov (United States)

    Park, Juyoung; Kang, Kyungtae

    2014-09-01

    Telecardiology provides mobility for patients who require constant electrocardiogram (ECG) monitoring. However, its safety is dependent on the predictability and robustness of data delivery, which must overcome errors in the wireless channel through which the ECG data are transmitted. We report here a framework that can be used to gauge the applicability of IEEE 802.11 wireless local area network (WLAN) technology to ECG monitoring systems in terms of delay constraints and transmission reliability. For this purpose, a medical-grade WLAN architecture achieved predictable delay through the combination of a medium access control mechanism based on the point coordination function provided by IEEE 802.11 and an error control scheme based on Reed-Solomon coding and block interleaving. The size of the jitter buffer needed was determined by this architecture to avoid service dropout caused by buffer underrun, through analysis of variations in transmission delay. Finally, we assessed this architecture in terms of service latency and reliability by modeling the transmission of uncompressed two-lead electrocardiogram data from the MIT-BIH Arrhythmia Database and highlight the applicability of this wireless technology to telecardiology.

  7. Investigating the efficiency of IEEE 802.15.4 for medical monitoring applications.

    Science.gov (United States)

    Pelegris, P; Banitsas, K

    2011-01-01

    Recent advancements in wireless communications technologies bring us one step closer to provide reliable Telecare services as an alternative to patients staying in a hospital mainly for monitoring purposes. In this research we investigate the efficiency of IEEE 802.15.4 in a simple scenario where a patient is being monitored using an ECG and a blood analysis module. This approach binds well with assisted living solutions, by sharing the network infrastructure for both monitoring and control while taking advantage of the low power features of the protocol. Such applications are becoming more and more realistic to implement as IEEE 802.15.4 compatible hardware becomes increasingly available. Our aim is to examine the impact of Beacon and Superframe Order in the medium access delay, dropped packets, end to end delay, average retransmission attempts and consumed power focusing on this bandwidth demanding situation where the network load does not allow low duty cycles, in order to draw some conclusions on the effect that this will have to telemonitoring applications.

  8. Self-Coexistence among IEEE 802.22 Networks: Distributed Allocation of Power and Channel.

    Science.gov (United States)

    Sakin, Sayef Azad; Razzaque, Md Abdur; Hassan, Mohammad Mehedi; Alamri, Atif; Tran, Nguyen H; Fortino, Giancarlo

    2017-12-07

    Ensuring self-coexistence among IEEE 802.22 networks is a challenging problem owing to opportunistic access of incumbent-free radio resources by users in co-located networks. In this study, we propose a fully-distributed non-cooperative approach to ensure self-coexistence in downlink channels of IEEE 802.22 networks. We formulate the self-coexistence problem as a mixed-integer non-linear optimization problem for maximizing the network data rate, which is an NP-hard one. This work explores a sub-optimal solution by dividing the optimization problem into downlink channel allocation and power assignment sub-problems. Considering fairness, quality of service and minimum interference for customer-premises-equipment, we also develop a greedy algorithm for channel allocation and a non-cooperative game-theoretic framework for near-optimal power allocation. The base stations of networks are treated as players in a game, where they try to increase spectrum utilization by controlling power and reaching a Nash equilibrium point. We further develop a utility function for the game to increase the data rate by minimizing the transmission power and, subsequently, the interference from neighboring networks. A theoretical proof of the uniqueness and existence of the Nash equilibrium has been presented. Performance improvements in terms of data-rate with a degree of fairness compared to a cooperative branch-and-bound-based algorithm and a non-cooperative greedy approach have been shown through simulation studies.

  9. A High Throughput Medium Access Control Implementation Based on IEEE 802.11e Standard

    Science.gov (United States)

    Huang, Min Li; Lee, Jin; Setiawan, Hendra; Ochi, Hiroshi; Park, Sin-Chong

    With the growing demand for high-performance multimedia applications over wireless channels, we need to develop a Medium Access Control (MAC) system that supports high throughput and quality of service enhancements. This paper presents the standard analysis, design architecture and design issues leading to the implementation of an IEEE 802.11e based MAC system that supports MAC throughput of over 100Mbps. In order to meet the MAC layer timing constraints, a hardware/software co-design approach is adopted. The proposed MAC architecture is implemented on the Xilinx Virtex-II Pro Field-Programmable Gate Array (FPGA) (XC2VP70-5FF1704C) prototype, and connected to a host computer through an external Universal Serial Bus (USB) interface. The total FPGA resource utilization is 11, 508 out of 33, 088 (34%) available slices. The measured MAC throughput is 100.7Mbps and 109.2Mbps for voice and video access categories, transmitted at a data rate of 260Mbps based on IEEE 802.11n Physical Layer (PHY), using the contention-based hybrid coordination function channel access mechanism.

  10. Improving Energy Efficiency in Idle Listening of IEEE 802.11 WLANs

    Directory of Open Access Journals (Sweden)

    Muhammad Adnan

    2016-01-01

    Full Text Available This paper aims to improve energy efficiency of IEEE 802.11 wireless local area networks (WLANs by effectively dealing with idle listening (IL, which is required for channel sensing and is unavoidable in a contention-based channel access mechanism. Firstly, we show that IL is a dominant source of energy drain in WLANs and it cannot be effectively alleviated by the power saving mechanism proposed in the IEEE 802.11 standard. To solve this problem, we propose an energy-efficient mechanism that combines three schemes in a systematic way: downclocking, frame aggregation, and contention window adjustment. The downclocking scheme lets a station remain in a semisleep state when overhearing frames destined to neighbor stations, whereby the station consumes the minimal energy without impairing channel access capability. As well as decreasing the channel access overhead, the frame aggregation scheme prolongs the period of semisleep time. Moreover, by controlling the size of contention window based on the number of stations, the proposed mechanism decreases unnecessary IL time due to collision and retransmission. By deriving an analysis model and performing extensive simulations, we confirm that the proposed mechanism significantly improves the energy efficiency and throughput, by up to 2.8 and 1.8 times, respectively, compared to the conventional power saving mechanisms.

  11. A Joint Beamforming based SDMA Protocol for IEEE 802.11n Downlink

    Directory of Open Access Journals (Sweden)

    Cheng Guo

    2015-09-01

    Full Text Available To support space division multiple access (SDMA in the IEEE 802.11n downlink, a joint beamforming based MAC protocol, J-MAC is presented in this paper. An access point (AP follows J-MAC, which employs multiple array antennas, and user equipments (UEs follow the IEEE 802.11x standard which employ omni-directional MIMO antennas. J-MAC maintains full compatibility with 802.11x, and UEs do not change any more. In J-MAC, firstly, the AP achieves the weight vector for the array antenna-based beamforming, and updates it periodically. Secondly, before transmitting any data-frame, the AP achieves the weight vector for the MIMO-based beamforming, which should be updated in each transmission. Finally, after getting the joint beamforming, the AP transmits its data-frames to multiple UEs simultaneously. Simulation results show that J-MAC can support the joint beamforming effectively and provide much higher network throughput, lower delay, jitter and packet-loss-rate than DCF does.

  12. Adaptive Backoff Algorithm for Contention Window for Dense IEEE 802.11 WLANs

    Directory of Open Access Journals (Sweden)

    Ikram Syed

    2016-01-01

    Full Text Available The performance improvement in IEEE 802.11 WLANs in widely fluctuating network loads is a challenging task. To improve the performance in this saturated state, we develop an adaptive backoff algorithm that maximizes the system throughput, reduces the collision probability, and maintains a high fairness for the IEEE 802.11 DCF under dense network conditions. In this paper, we present two main advantages of the proposed ABA-CW algorithm. First, it estimates the number of active stations and then calculates an optimal contention window based on the active station number. Each station calculates the channel state probabilities by observing the channel for the total backoff period. Based on these channel states probabilities, each station can estimate the number of active stations in the network, after which it calculates the optimal CW utilizing the estimated active number of stations. To evaluate the proposed mechanism, we derive an analytical model to determine the network performance. From our results, the proposed ABA-CW mechanism achieved better system performance compared to fixed-CW (BEB, EIED, LILD, and SETL and adaptive-CW (AMOCW, Idle Sense mechanisms. The simulation results confirmed the outstanding performance of the proposed mechanism in that it led to a lower collision probability, higher throughput, and high fairness.

  13. A Green Media Access Method for IEEE 802.15.6 Wireless Body Area Network.

    Science.gov (United States)

    Jacob, Anil K; Jacob, Lillykutty

    2017-09-30

    It is of utmost importance to conserve battery energy to the maximum possible extent in WBAN nodes while collecting and transferring medical data. The IEEE 802.15.6 WBAN standard does not specify any method to conserve energy. This paper focuses on a method to conserve energy in IEEE 802.15.6 WBAN nodes when using CSMA/CA, while simultaneously restricting data delivery delay to the required value as specified in medical applications. The technique is to allow the nodes to sleep all the times except for receiving beacons and for transmitting data frames whenever a data frame enters an empty buffer. The energy consumed by the nodes and the average latency of data frame for periodical arrival of data are found out analytically. The analytical results are validated and also the proposed method is compared with other energy conserving schemes, using Castalia simulation studies. The proposed method shows superior performance in both device lifetime and latency of emergency medical data.

  14. Evaluating IEEE 802.15.4 for Cyber-Physical Systems

    Directory of Open Access Journals (Sweden)

    Vinel Alexey

    2011-01-01

    Full Text Available With rapid advancements in sensing, networking, and computing technologies, recent years have witnessed the emergence of cyber-physical systems (CPS in a broad range of application domains. CPS is a new class of engineered systems that features the integration of computation, communications, and control. In contrast to general-purpose computing systems, many cyber-physical applications are safety critical. These applications impose considerable requirements on quality of service (QoS of the employed networking infrastruture. Since IEEE 802.15.4 has been widely considered as a suitable protocol for CPS over wireless sensor and actuator networks, it is of vital importance to evaluate its performance extensively. Serving for this purpose, this paper will analyze the performance of IEEE 802.15.4 standard operating in different modes respectively. Extensive simulations have been conducted to examine how network QoS will be impacted by some critical parameters. The results are presented and analyzed, which provide some useful insights for network parameter configuration and optimization for CPS design.

  15. Transactive Energy A Review of State of The Art and Implementation

    DEFF Research Database (Denmark)

    Liu, Zhaoxi; Wu, Qiuwei; Huang, Shaojun

    2017-01-01

    . This paper provides a bibliographical review on the researches and implementation of the transactive energy concepts and transactive control techniques in power systems. The ideas of transactive control are introduced mainly according to the transactive energy framework proposed by the GridWise Architecture...

  16. 31 CFR 800.220 - Party or parties to a transaction.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Party or parties to a transaction..., ACQUISITIONS, AND TAKEOVERS BY FOREIGN PERSONS Definitions § 800.220 Party or parties to a transaction. The terms party to a transaction and parties to a transaction mean: (a) In the case of an acquisition of an...

  17. 17 CFR 31.10 - Repurchase and resale of leverage contracts by leverage transaction merchants.

    Science.gov (United States)

    2010-04-01

    ... leverage contracts by leverage transaction merchants. 31.10 Section 31.10 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION LEVERAGE TRANSACTIONS § 31.10 Repurchase and resale of leverage contracts by leverage transaction merchants. (a) No leverage transaction merchant shall offer to...

  18. 26 CFR 157.5891-1 - Imposition of excise tax on structured settlement factoring transactions.

    Science.gov (United States)

    2010-04-01

    ... settlement factoring transactions. 157.5891-1 Section 157.5891-1 Internal Revenue INTERNAL REVENUE SERVICE... SETTLEMENT FACTORING TRANSACTIONS Tax on Structured Settlement Factoring Transactions § 157.5891-1 Imposition of excise tax on structured settlement factoring transactions. (a) In general. Section 5891 imposes...

  19. 75 FR 38700 - Excise Taxes on Prohibited Tax Shelter Transactions and Related Disclosure Requirements...

    Science.gov (United States)

    2010-07-06

    ... proceeds attributable to the transaction are allocated between the period before the transaction became... listed transaction or the first day of the taxable year; or (2) 75 percent of the proceeds received by... entity has net income or proceeds attributable to the transaction. A taxable year for tax-exempt entities...

  20. 2013 East Coast Vessel Tracklines

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  1. SC/OQ Vessel Database

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Data tables holding information for the Surf Clam/Ocean Quahog vessel and dealer/processor logbooks (negative and positive), as well as individual tag information...

  2. 2011 Great Lakes Vessel Tracklines

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  3. 2011 West Coast Vessel Tracklines

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  4. 2013 Great Lakes Vessel Tracklines

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  5. 2011 East Coast Vessel Tracklines

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  6. Integrin binding: Sticking around vessels

    Science.gov (United States)

    Blatchley, Michael R.; Gerecht, Sharon

    2017-09-01

    A study demonstrates that controlled integrin binding on a biomaterial was capable of promoting vascular cell sprouting and formation of a non-leaky blood vessel network in a healthy and diseased state.

  7. Transposition of the great vessels

    Science.gov (United States)

    ... vessel called the ductus arteriosus open, allowing some mixing of the 2 blood circulations. A procedure using ... they are not already immune. Eating well, avoiding alcohol, and controlling diabetes both before and during pregnancy ...

  8. 2013 West Coast Vessel Tracklines

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  9. Vessel Permit System Data Set

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — GARFO issues federal fishing permits annually to owners of fishing vessels who fish in the Greater Atlantic region, as required by federal regulation. These permits...

  10. 2011 Tug Towing Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  11. Caribbean PR Logbook Survey (Vessels)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains catch (landed catch) and effort for fishing trips made by vessels fishing in Puerto Rico. The catch and effort data for the entire trip are...

  12. Coastal Discard Logbook Survey (Vessels)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains data on the type and amount of marine resources that are discarded or interacted with by vessels that are selected to report to the Southeast...

  13. Implementation and Analysis of the use of the Blockchain Transactions on the Workings of the Bitcoin

    Science.gov (United States)

    Rizky Fauzi, Muhammad Reza; Michrandi Nasution, Surya; Paryasto, Marisa W.

    2017-11-01

    The present study discusses the workings of blockchain bitcoin in the transactions sector, on the development of today’s emerging computers in the financial sector of blockchain bitcoin traction. In this case the author analyzes how the transaction is running, as well as how blockchain bitcoin is doing work in transactions on the system to make transactions. Transaction is a data structure that encodes the transfer of values between users with in a bitcoin system. Every transaction is a public entry in this bitcoin blockchain. And become a large transaction bookkeeping global.

  14. Prosopomorphic vessels from Moesia Superior

    Directory of Open Access Journals (Sweden)

    Nikolić Snežana

    2008-01-01

    Full Text Available The prosopomorphic vessels from Moesia Superior had the form of beakers varying in outline but similar in size. They were wheel-thrown, mould-made or manufactured by using a combination of wheel-throwing and mould-made appliqués. Given that face vessels are considerably scarcer than other kinds of pottery, more than fifty finds from Moesia Superior make an enviable collection. In this and other provinces face vessels have been recovered from military camps, civilian settlements and necropolises, which suggests that they served more than one purpose. It is generally accepted that the faces-masks gave a protective role to the vessels, be it to protect the deceased or the family, their house and possessions. More than forty of all known finds from Moesia Superior come from Viminacium, a half of that number from necropolises. Although tangible evidence is lacking, there must have been several local workshops producing face vessels. The number and technological characteristics of the discovered vessels suggest that one of the workshops is likely to have been at Viminacium, an important pottery-making centre in the second and third centuries.

  15. A TRANSACTION COST ANALYSIS OF MICROPAYMENTS IN MOBILE COMMERCE

    Directory of Open Access Journals (Sweden)

    Daniel Gille

    2012-07-01

    Full Text Available Personalised, location-related and differentiated services in the mobile digitaleconomy create a demand for suitable pricing models. In the case of disaggregated“microservices” (e.g., small digitalized information or service units, as well as for theacquisition of low-value physical goods, the deployment of micropayments seemsappropriate.This paper analyzes the economic efficiency of marginal transaction amounts in the mcommercearea by applying the theoretical approach of transaction cost economics. Forthis purpose, a separation of technical and cognitive transaction costs is applied. Theinfluence of selected determinants such as specifity, uncertainty and bounded rationality ontransaction costs in mobile commerce micropayments is analyzed. The result is a morelikely application of micropayments for physical goods such as beverages or parking ticketsthan for digital goods and services, given the theoretical assumptions of the model. Inaddition, indicators for a significant above-zero lower limit of transaction amounts inmobile commerce are presented.

  16. 49 CFR 1180.2 - Types of transactions.

    Science.gov (United States)

    2010-10-01

    ... 49 U.S.C. 10101; and is of limited scope or unnecessary to protect shippers from market abuse. See 49... transactions under these rules will be subject to applicable statutory labor protective conditions. ...

  17. Transaction costs and social networks in productivity measurement

    DEFF Research Database (Denmark)

    Henningsen, Geraldine; Henningsen, Arne; Henning, Christian H. C. A.

    2015-01-01

    . Hence, both the absolute productivity measures and, more importantly, the productivity ranking will be distorted. A major driver of transaction costs is poor access to information and contract enforcement assistance. Social networks often catalyse information exchange as well as generate trust...... and support. Hence, we use measures of a firm’s access to social networks as a proxy for the transaction costs the firm faces. We develop a microeconomic production model that takes into account transaction costs and networks. Using a data set of 384 Polish farms, we empirically estimate this model...... and compare different parametric, semiparametric, and nonparametric model specifications. Our results generally support our hypothesis. Especially, large trading networks and dense household networks have a positive influence on a farm’s productivity. Furthermore, our results indicate that transaction costs...

  18. Structure and Anonymity of the Bitcoin Transaction Graph

    National Research Council Canada - National Science Library

    Micha Ober; Stefan Katzenbeisser; Kay Hamacher

    2013-01-01

    .... We found dynamical effects of which some increase anonymity while others decrease it. Most importantly, several parameters of the Bitcoin transaction graph seem to have become stationary over the last 12-18 months. We discuss the implications.

  19. Equity Markets, Transactions Costs, and Capital Accumulation: An Illustration

    National Research Council Canada - National Science Library

    Valerie R. Bencivenga; Bruce D. Smith; Ross M. Starr

    1996-01-01

    Poorly developed equity markets inhibit the transfer of capital ownership. Moreover, the costs of transacting in equity markets affect not just the level of investment, but the kinds of investments that are undertaken...

  20. 31 CFR 800.104 - Transactions or devices for avoidance.

    Science.gov (United States)

    2010-07-01

    ... (Continued) OFFICE OF INVESTMENT SECURITY, DEPARTMENT OF THE TREASURY REGULATIONS PERTAINING TO MERGERS, ACQUISITIONS, AND TAKEOVERS BY FOREIGN PERSONS General § 800.104 Transactions or devices for avoidance. Any...

  1. Structure and Anonymity of the Bitcoin Transaction Graph

    Directory of Open Access Journals (Sweden)

    Kay Hamacher

    2013-05-01

    Full Text Available The Bitcoin network of decentralized payment transactions has attracted a lot of attention from both Internet users and researchers in recent years. Bitcoin utilizes a peer-to-peer network to issue anonymous payment transactions between different users. In the currently used Bitcoin clients, the full transaction history is available at each node of the network to prevent double spending without the need for a central authority, forming a valuable source for empirical research on network structure, network dynamics, and the implied anonymity challenges, as well as guidance on the future evolution of complex payment systems. We found dynamical effects of which some increase anonymity while others decrease it. Most importantly, several parameters of the Bitcoin transaction graph seem to have become stationary over the last 12–18 months. We discuss the implications.

  2. Six Methods of Transaction Visualization in Virtual Environments

    Energy Technology Data Exchange (ETDEWEB)

    WALTHER, ELEANOR A.; TRAHAN, MICHAEL W.; SUMMERS, KENNETH L.; EYRING, TIM; CAUDELL, THOMAS P.

    2002-06-01

    Many governmental and corporate organizations are interested in tracking materials and/or information through a network. Often, as in the case of the U.S. Customs Service, the traffic is recorded as transactions through a large number of checkpoints with a correspondingly complex network. These networks will contain large numbers of uninteresting transactions that act as noise to conceal the chains of transactions of interest, such as drug trafficking. We are interested in finding significant paths in transaction data containing high noise levels, which tend to make traditional graph visualization methods complex and hard to understand. This paper covers the evolution of a series of graphing methods designed to assist in this search for paths-from 1-D to 2-D to 3-D and beyond.

  3. VOLTTRON Lite: Integration Platform for the Transactional Network

    Energy Technology Data Exchange (ETDEWEB)

    Haack, Jereme N.; Katipamula, Srinivas; Akyol, Bora A.; Lutes, Robert G.

    2013-10-31

    In FY13, Pacific Northwest National Laboratory (PNNL) with funding from the Department of Energy’s (DOE’s) Building Technologies Office (BTO) designed, prototyped and tested a transactional network platform. The platform is intended to support energy, operational and financial transactions between any networked entities (equipment, organizations, buildings, grid, etc.). Initially, in FY13, the concept demonstrated transactions between packaged rooftop units (RTUs) and the electric grid using applications or “agents” that reside on the platform, on the equipment, on local building controller or in the Cloud. This document describes the core of the transactional network platform, the Volttron Lite™ software and associated services hosted on the platform. Future enhancements are also discussed. The appendix of the document provides examples of how to use the various services hosted on the platform.

  4. 31 CFR 538.512 - Transactions related to telecommunications authorized.

    Science.gov (United States)

    2010-07-01

    ... telecommunications authorized. 538.512 Section 538.512 Money and Finance: Treasury Regulations Relating to Money and... telecommunications authorized. All transactions with respect to the receipt and transmission of telecommunications... a person in Sudan of telecommunications equipment or technology. ...

  5. Transactions and Proceedings of the New Zealand Institute, 1868

    National Research Council Canada - National Science Library

    1870-01-01

    ..., the various other societies engaged in similar pursuits that exist in the New Zealand Islands; and who in consequence transmit their papers, or abstracts of them, to the Institute for incorporation in their Transactions...

  6. Protecting Online Transactions with Unique Embedded Key Generators

    DEFF Research Database (Denmark)

    Boesgaard, Martin; Zenner, Erik

    2007-01-01

    We present a novel approach for protecting transactions over networks. While we use the example of a netbank application, the proposal is relevant for many security-critical transactions. The approach is based on two major changes compared to current solutions. The first one is the use of individ......We present a novel approach for protecting transactions over networks. While we use the example of a netbank application, the proposal is relevant for many security-critical transactions. The approach is based on two major changes compared to current solutions. The first one is the use...... of individualized key derivation functions, which ensure that given the same input, each copy of the application ends up with different keys. The second contribution is the individualizing of program copies by subtle code modification. This makes automated analysis and patching of a client-side application very...

  7. 31 CFR 800.214 - Foreign government-controlled transaction.

    Science.gov (United States)

    2010-07-01

    ... (Continued) OFFICE OF INVESTMENT SECURITY, DEPARTMENT OF THE TREASURY REGULATIONS PERTAINING TO MERGERS, ACQUISITIONS, AND TAKEOVERS BY FOREIGN PERSONS Definitions § 800.214 Foreign government-controlled transaction...

  8. A Cross-Layer Key Management Scheme for MIPv6 Fast Handover over IEEE 802.11 Wireless LAN

    Directory of Open Access Journals (Sweden)

    Chang-Seop Park

    2015-01-01

    Full Text Available A new key management and security scheme is proposed to integrate Layer Two (L2 and Layer Three (L3 keys for secure and fast Mobile IPv6 handover over IEEE 802.11 Wireless Local Area Network (WLAN. Unlike the original IEEE 802.11-based Mobile IPv6 Fast Handover (FMIPv6 that requires time-consuming IEEE 802.1x-based Extensible Authentication Protocol (EAP authentication on each L3 handover, the newly proposed key management and security scheme requires only one 802.1x-EAP regardless of how many L3 handovers occur. Therefore, the proposed scheme reduces the handover latency that results from a lengthy 802.1x-based EAP. The proposed key management and security scheme is extensively analyzed in terms of security and performance, and the proposed security scheme is shown to be more secure than those that were previously proposed.

  9. A distributed scheme to manage the dynamic coexistence of IEEE 802.15.4-based health-monitoring WBANs.

    Science.gov (United States)

    Deylami, Mohammad N; Jovanov, Emil

    2014-01-01

    The overlap of transmission ranges between wireless networks as a result of mobility is referred to as dynamic coexistence. The interference caused by coexistence may significantly affect the performance of wireless body area networks (WBANs) where reliability is particularly critical for health monitoring applications. In this paper, we analytically study the effects of dynamic coexistence on the operation of IEEE 802.15.4-based health monitoring WBANs. The current IEEE 802.15.4 standard lacks mechanisms for effectively managing the coexistence of mobile WBANs. Considering the specific characteristics and requirements of health monitoring WBANs, we propose the dynamic coexistence management (DCM) mechanism to make IEEE 802.15.4-based WBANs able to detect and mitigate the harmful effects of coexistence. We assess the effectiveness of this scheme using extensive OPNET simulations. Our results indicate that DCM improves the successful transmission rates of dynamically coexisting WBANs by 20%-25% for typical medical monitoring applications.

  10. A GRAPH-BASED INVESTIGATION OF BITCOIN TRANSACTIONS

    OpenAIRE

    Zhao, Chen; Guan, Yong

    2015-01-01

    Part 2: INTERNET CRIME INVESTIGATIONS; International audience; The Bitcoin global cryptocurrency system has been the subject of several criminal cases. The Bitcoin network is a peer-to-peer system that has participants from all over the Internet. The Bitcoin protocol requires participating nodes to retain and update all transaction records; this ensures that all Bitcoin activities are accessible from a consistent transaction history database. This chapter describes a graph-based method for an...

  11. Transactional and transformational leadership impacts on organizational learning

    OpenAIRE

    Zagorsek, Hugo; Dimovski, Vlado; Skerlavaj, Miha

    2009-01-01

    This study empirically relates two important areas of management research: the full-range theory of leadership and the organizational learning process. Specifically, this contribution addresses three issues: (1) the impact of transformational leadership and (2) of transactional leadership on the organizational learning process and (3) whether the influence of transformational leadership is stronger than of a transactional type of leadership. The results show that transformational leadership h...

  12. Foreign exchange transaction exposure of enterprises in Serbia

    OpenAIRE

    Bogićević Jasmina; Dmitrović-Šaponja Ljiljana; Pantelić Marija

    2016-01-01

    Enterprises involved in international business face transaction exposure to foreign exchange risk. This type of exposure occurs when an enterprise trades, borrows, or lеnds in foreign currency. Transaction exposure has a direct effect on an enterprise’s financial position and profitability. It is one of the three forms of exposure to exchange rate fluctuations, the other two being translation exposure and operating exposure. The aim of this paper is to asse...

  13. Transaction Costs from a Program Manager’s Perspective

    Science.gov (United States)

    2009-09-28

    for the governments of Mexico and the Czech Republic on achieving excellence in the public sector. As an adjunct professor for the University of...we attempted to directly measure transactions costs for defense acquisition programs using the expenditures of the Program Management Office ( PMO ...as an approximate measure of the amount of transaction costs present in an acquisition program. We found that DoD does not track PMO costs

  14. Third sector organizations in rural development: a transaction cost perspective

    Directory of Open Access Journals (Sweden)

    V. VALENTINOV

    2008-12-01

    Full Text Available In many parts of the world, rural development is supported by third sector organizations, such as nongovernmental organizations, farmer associations, and cooperatives. This essay develops a transaction cost explanation of these organizations’ role in rural areas. Since the traditional transaction cost theory is concerned with the choice of governance mechanisms within the for-profit sector, this essay adopts an alternative conceptualization of the notion of transaction cost by building on the theory of the division of labor. This theory regards transaction cost as a constraint on the division of labor causing the replacement of exchange with self-sufficiency. The proposed transaction cost explanation of rural third sector organizations consists of two arguments: 1 third sector organizations embody partial reliance on self-sufficiency; and 2 rural areas exhibit rurality-specific transaction cost acting as a constraint on the division of labor and thus creating a niche for third sector organizations. The essay concludes with suggesting a research program on developing an economic theory of the rural third sector.;

  15. Automated method for identification and artery-venous classification of vessel trees in retinal vessel networks.

    Directory of Open Access Journals (Sweden)

    Vinayak S Joshi

    Full Text Available The separation of the retinal vessel network into distinct arterial and venous vessel trees is of high interest. We propose an automated method for identification and separation of retinal vessel trees in a retinal color image by converting a vessel segmentation image into a vessel segment map and identifying the individual vessel trees by graph search. Orientation, width, and intensity of each vessel segment are utilized to find the optimal graph of vessel segments. The separated vessel trees are labeled as primary vessel or branches. We utilize the separated vessel trees for arterial-venous (AV classification, based on the color properties of the vessels in each tree graph. We applied our approach to a dataset of 50 fundus images from 50 subjects. The proposed method resulted in an accuracy of 91.44% correctly classified vessel pixels as either artery or vein. The accuracy of correctly classified major vessel segments was 96.42%.

  16. IEEE Xplore® Digital Library - Evolving to Meet YOUR Changing Needs

    OpenAIRE

    2014-01-01

    Представлена презентация доклада "Использование платформы IEEE Digital Library: уникальные научные публикации в области электроники, радиосвязи, вычислительной техники, информационных технологий, энергетики, машиностроения, физики, химии, геологии, нанотехнологий" Эстер Лукаш, специалиста по обучению IEEE (Германия), на семинаре «Использование платформы IEEE Digital Library», прошедшем 02 октября 2014 года в УрФУ, на английском языке....

  17. 26 CFR 53.4958-6 - Rebuttable presumption that a transaction is not an excess benefit transaction.

    Science.gov (United States)

    2010-04-01

    ... the meeting and is not present during debate and voting on the compensation arrangement or property... debate on the transaction that was approved and those who voted on it; (C) The comparability data...

  18. 50 CFR 697.8 - Vessel identification.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 9 2010-10-01 2010-10-01 false Vessel identification. 697.8 Section 697.8 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION....8 Vessel identification. (a) Vessel name and official number. Each fishing vessel issued a limited...

  19. Mechanosensing in developing lymphatic vessels.

    Science.gov (United States)

    Planas-Paz, Lara; Lammert, Eckhard

    2014-01-01

    The lymphatic vasculature is responsible for fluid homeostasis, transport of immune cells, inflammatory molecules, and dietary lipids. It is composed of a network of lymphatic capillaries that drain into collecting lymphatic vessels and ultimately bring fluid back to the blood circulation. Lymphatic endothelial cells (LECs) that line lymphatic capillaries present loose overlapping intercellular junctions and anchoring filaments that support fluid drainage. When interstitial fluid accumulates within tissues, the extracellular matrix (ECM) swells and pulls the anchoring filaments. This results in opening of the LEC junctions and permits interstitial fluid uptake. The absorbed fluid is then transported within collecting lymphatic vessels, which exhibit intraluminal valves that prevent lymph backflow and smooth muscle cells that sequentially contract to propel lymph.Mechanotransduction involves translation of mechanical stimuli into biological responses. LECs have been shown to sense and respond to changes in ECM stiffness, fluid pressure-induced cell stretch, and fluid flow-induced shear stress. How these signals influence LEC function and lymphatic vessel growth can be investigated by using different mechanotransduction assays in vitro and to some extent in vivo.In this chapter, we will focus on the mechanical forces that regulate lymphatic vessel expansion during embryonic development and possibly secondary lymphedema. In mouse embryos, it has been recently shown that the amount of interstitial fluid determines the extent of lymphatic vessel expansion via a mechanosensory complex formed by β1 integrin and vascular endothelial growth factor receptor-3 (VEGFR3). This model might as well apply to secondary lymphedema.

  20. 12th ACIS/IEEE International Conference on Computer Science and Information Science

    CERN Document Server

    2013-01-01

    This edited book presents scientific results of the 12th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2013) which was held on June 16-20, 2013 in Toki Messe, Niigata, Japan. The aim of this conference was to bring together scientists, engineers, computer users, and students to share their experiences and exchange new ideas, research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them The conference organizers selected the best 20 papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the program committee, and underwent further rigorous rounds of review.    

  1. Beamforming transmission in IEEE 802.11ac under time-varying channels.

    Science.gov (United States)

    Yu, Heejung; Kim, Taejoon

    2014-01-01

    The IEEE 802.11ac wireless local area network (WLAN) standard has adopted beamforming (BF) schemes to improve spectral efficiency and throughput with multiple antennas. To design the transmit beam, a channel sounding process to feedback channel state information (CSI) is required. Due to sounding overhead, throughput increases with the amount of transmit data under static channels. Under practical channel conditions with mobility, however, the mismatch between the transmit beam and the channel at transmission time causes performance loss when transmission duration after channel sounding is too long. When the fading rate, payload size, and operating signal-to-noise ratio are given, the optimal transmission duration (i.e., packet length) can be determined to maximize throughput. The relationship between packet length and throughput is also investigated for single-user and multiuser BF modes.

  2. Development of a low mobility IEEE 802.15.4 compliant VANET system for urban environments.

    Science.gov (United States)

    Nazabal, Juan Antonio; Falcone, Francisco; Fernández-Valdivielso, Carlos; Matías, Ignacio Raúl

    2013-05-29

    The use of Vehicular Ad-Hoc Networks (VANETs) is growing nowadays and it includes both roadside-to-vehicle communication (RVC) and inter-vehicle communication (IVC). The purpose of VANETs is to exchange useful information between vehicles and the roadside infrastructures for making an intelligent use of them. There are several possible applications for this technology like: emergency warning system for vehicles, cooperative adaptive cruise control or collision avoidance, among others. The objective of this work is to develop a VANET prototype system for urban environments using IEEE 802.15.4 compliant devices. Simulation-based values of the estimated signal strength and radio link quality values are obtained and compared with measurements in outdoor conditions to validate an implemented VANET system. The results confirm the possibility of implementing low cost vehicular communication networks operating at moderate vehicular speeds.

  3. 2011 IEEE Visualization Contest winner: Visualizing unsteady vortical behavior of a centrifugal pump.

    Science.gov (United States)

    Otto, Mathias; Kuhn, Alexander; Engelke, Wito; Theisel, Holger

    2012-01-01

    In the 2011 IEEE Visualization Contest, the dataset represented a high-resolution simulation of a centrifugal pump operating below optimal speed. The goal was to find suitable visualization techniques to identify regions of rotating stall that impede the pump's effectiveness. The winning entry split analysis of the pump into three parts based on the pump's functional behavior. It then applied local and integration-based methods to communicate the unsteady flow behavior in different regions of the dataset. This research formed the basis for a comparison of common vortex extractors and more recent methods. In particular, integration-based methods (separation measures, accumulated scalar fields, particle path lines, and advection textures) are well suited to capture the complex time-dependent flow behavior. This video (http://youtu.be/oD7QuabY0oU) shows simulations of unsteady flow in a centrifugal pump.

  4. Delay efficient cooperation in public safety vehicular networks using LTE and IEEE 802.11p

    KAUST Repository

    Atat, Rachad

    2012-01-01

    Cooperative schemes for critical content distribution over vehicular networks are presented and analyzed. The first scheme is based on unicasting from the base station, whereas the second is based on threshold based multicasting. Long Term Evolution (LTE) is used for long range communications with the base station (BS) and 802.11p is considered for inter-vehicle collaboration on the short range. A high mobility environment with correlated shadowing is adopted. Both schemes are shown to outperform non-cooperative unicasting and multicasting, respectively, when the appropriate 802.11p power class is used. The first scheme achieves the best performance among the compared methods, and a practical approximation of that scheme is shown to be close to optimal performance. © 2012 IEEE.

  5. Dynamic Voltage Stability Studies using a Modified IEEE 30-Bus System

    Directory of Open Access Journals (Sweden)

    Oluwafemi Emmanuel Oni

    2016-09-01

    Full Text Available Power System stability is an essential study in the planning and operation of an efficient, economic, reliable and secure electric power system because it encompasses all the facet of power systems operations, from planning, to conceptual design stages of the project as well as during the systems operating life span. This paper presents different scenario of power system stability studies on a modified IEEE 30-bus system which is subjected to different faults conditions. A scenario whereby the longest high voltage alternating current (HVAC line is replaced with a high voltage direct current (HVDC line was implemented. The results obtained show that the HVDC line enhances system stability more compared to the contemporary HVAC line. Dynamic analysis using RMS simulation tool was used on DigSILENT PowerFactory.

  6. Synchronous ethernet and IEEE 1588 in telecoms next generation synchronization networks

    CERN Document Server

    2013-01-01

    This book addresses the multiple technical aspects of the distribution of synchronization in new generation telecommunication networks, focusing in particular on synchronous Ethernet and IEEE1588 technologies. Many packet network engineers struggle with understanding the challenges that precise synchronization distribution can impose on networks. The usual “why”, “when” and particularly “how” can cause problems for many engineers. In parallel to this, some other markets have identical synchronization requirements, but with their own design requirements, generating further questions. This book attempts to respond to the different questions by providing background technical information. Invaluable information on state of-the-art packet network synchronization and timing architectures is provided, as well as an unbiased view on the synchronization technologies that have been internationally standardized over recent years, with the aim of providing the average reader (who is not skilled in the art) wi...

  7. Experimental video signals distribution MMF network based on IEEE 802.11 standard

    Science.gov (United States)

    Kowalczyk, Marcin; Maksymiuk, Lukasz; Siuzdak, Jerzy

    2014-11-01

    The article was focused on presentation the achievements in a scope of experimental research on transmission of digital video streams in the frame of specially realized for this purpose ROF (Radio over Fiber) network. Its construction was based on the merge of wireless IEEE 802.11 network, popularly referred as Wi-Fi, with a passive optical network PON based on multimode fibers MMF. The proposed approach can constitute interesting proposal in area of solutions in the scope of the systems monitoring extensive, within which is required covering of a large area with ensuring of a relatively high degree of immunity on the interferences transmitted signals from video IP cameras to the monitoring center and a high configuration flexibility (easily change the deployment of cameras) of such network.

  8. Integration of heterogeneous biomedical sensors into an ISO/IEEE 11073 compliant application.

    Science.gov (United States)

    Fioravanti, A; Fico, G; Arredondo, M T; Salvi, D; Villalar, J L

    2010-01-01

    Current trends in healthcare technology include mobile-based applications. Relevant advances in the integration of vital signs monitoring devices with mobile platforms are widely reported nowadays. In this context, conceiving and designing an interoperable application is essential due to the growing necessity of integrating a huge and heterogeneous amount of biomedical data, coming from a wide range of devices and sensors. In this paper the key research issues associated with such integration are presented as well as a specific proposal to solve these problems. It is based on a middleware architecture for the integration of biomedical sensors with mobile devices, derived from the ISO/IEEE 11073 standards family. The application has been developed in the framework of an EU-funded R&D project called METABO.

  9. Vispubdata.org: A Metadata Collection About IEEE Visualization (VIS) Publications.

    Science.gov (United States)

    Isenberg, Petra; Heimerl, Florian; Koch, Steffen; Isenberg, Tobias; Xu, Panpan; Stolper, Charles D; Sedlmair, Michael; Chen, Jian; Moller, Torsten; Stasko, John

    2017-09-01

    We have created and made available to all a dataset with information about every paper that has appeared at the IEEE Visualization (VIS) set of conferences: InfoVis, SciVis, VAST, and Vis. The information about each paper includes its title, abstract, authors, and citations to other papers in the conference series, among many other attributes. This article describes the motivation for creating the dataset, as well as our process of coalescing and cleaning the data, and a set of three visualizations we created to facilitate exploration of the data. This data is meant to be useful to the broad data visualization community to help understand the evolution of the field and as an example document collection for text data visualization research.

  10. 3th IEEE/ACIS International Conference on Computer and Information Science

    CERN Document Server

    2015-01-01

    This edited book presents scientific results of the 13th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2014) which was held on June 4-6, 2014 in Taiyuan, China. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The conference organizers selected the best papers from those papers accepted for presentation at the conference.  The papers were chosen based on review scores submitted by members of the program committee, and underwent further rigorous rounds of review. This publication captures 14 of the conference’s most promis...

  11. The IEEE guide to writing in the engineering and technical fields

    CERN Document Server

    Kmiec, David

    2017-01-01

    This book introduces students and practicing engineers to all the components of writing in the workplace. It teaches readers how considerations of audience and purpose govern the structure of their documents within particular work settings. The IEEE Guide to Writing in the Engineering and Technical Fields is broken up into two sections: "Writing in Engineering Organizations" and "What Can You Do With Writing?" The first section helps readers approach their writing in a logical and persuasive way as well as analyze their purpose for writing. The second section demonstrates how to distinguish rhetorical situations and the generic forms to inform, train, persuade, and collaborate. The emergence of the global workplace has brought with it an increasingly important role for effective technical communication. Engineers more often need to work in cross-functional teams with people in different disciplines, in different countries, and in different parts of the world. Engineers must know how to communicate in a rapid...

  12. IEEE/NASA Workshop on Leveraging Applications of Formal Methods, Verification, and Validation

    Science.gov (United States)

    Margaria, Tiziana (Editor); Steffen, Bernhard (Editor); Hichey, Michael G.

    2005-01-01

    This volume contains the Preliminary Proceedings of the 2005 IEEE ISoLA Workshop on Leveraging Applications of Formal Methods, Verification, and Validation, with a special track on the theme of Formal Methods in Human and Robotic Space Exploration. The workshop was held on 23-24 September 2005 at the Loyola College Graduate Center, Columbia, MD, USA. The idea behind the Workshop arose from the experience and feedback of ISoLA 2004, the 1st International Symposium on Leveraging Applications of Formal Methods held in Paphos (Cyprus) last October-November. ISoLA 2004 served the need of providing a forum for developers, users, and researchers to discuss issues related to the adoption and use of rigorous tools and methods for the specification, analysis, verification, certification, construction, test, and maintenance of systems from the point of view of their different application domains.

  13. IEEE 1394/firewire a low cost, high speed, digital serial bus

    Energy Technology Data Exchange (ETDEWEB)

    Gaunt, R.

    1997-05-01

    Does the world need yet another 1/0 bus standard? If you need fast and cheap serial video communication, then the answer is yes. As technology advances, so too must data transport mechanisms advance. You can`t expect RS-232 to support real-time digital video, and if you can`t afford expensive professional serial video interfaces, (such as Sony`s Serial Digital Interface), Firewire may be a good solution. IEEE 1394, or commonly known as Firewire, is a general purpose serial bus that meets many of the 1/0 needs of today`s video and multimedia developers. For those of you who only read the first paragraph, here`s Firewire in a nutshell: It provides a guaranteed transfer rate of 10OMbps or 20OMbps of digital data (such as video direct from camera to computer), over an inexpensive, non-proprietary serial bus. Here is a list of its features.

  14. Efficient Beacon Collision Resolution Procedure for IEEE 802.15.4 /Zigbee Wireless Personal Area Networks

    Directory of Open Access Journals (Sweden)

    Bassam A. Zafar

    2017-04-01

    Full Text Available While IEEE 802.15.4/Zigbee is a promising technology for Wireless Personal Area Networks, several transmission problems are not yet resolved. In particular, the problem of beacon transmission interferences is causing the device connection loss to the network. In order to resolve this problem, we present a new distributed and reactive procedure for beacon collision resolution. It is an extension of the alignment procedure to reorganize randomly the beacon transmission time when a collision has occurred. The detail of the proposed procedure will be fully described and analyzed. The performance of our approach is performed by simulations. The results show that our approach reduces the collision probability and the device disconnections consequently.

  15. Development of a Low Mobility IEEE 802.15.4 Compliant VANET System for Urban Environments

    Directory of Open Access Journals (Sweden)

    Ignacio Raúl Matías

    2013-05-01

    Full Text Available The use of Vehicular Ad-Hoc Networks (VANETs is growing nowadays and it includes both roadside-to-vehicle communication (RVC and inter-vehicle communication (IVC. The purpose of VANETs is to exchange useful information between vehicles and the roadside infrastructures for making an intelligent use of them. There are several possible applications for this technology like: emergency warning system for vehicles, cooperative adaptive cruise control or collision avoidance, among others. The objective of this work is to develop a VANET prototype system for urban environments using IEEE 802.15.4 compliant devices. Simulation-based values of the estimated signal strength and radio link quality values are obtained and compared with measurements in outdoor conditions to validate an implemented VANET system. The results confirm the possibility of implementing low cost vehicular communication networks operating at moderate vehicular speeds.

  16. 12 CFR 223.16 - What transactions by a member bank with any person are treated as transactions with an affiliate?

    Science.gov (United States)

    2010-01-01

    ... extent that the proceeds of the transaction are used for the benefit of, or transferred to, an affiliate... 12 Banks and Banking 3 2010-01-01 2010-01-01 false What transactions by a member bank with any person are treated as transactions with an affiliate? 223.16 Section 223.16 Banks and Banking FEDERAL...

  17. A study of IEEE 802.15.4 security framework for wireless body area networks.

    Science.gov (United States)

    Saleem, Shahnaz; Ullah, Sana; Kwak, Kyung Sup

    2011-01-01

    A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE) applications. Since WBAN nodes are used to collect sensitive (life-critical) information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS) attacks in WBAN at Physical, Medium Access Control (MAC), Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP) and Contention Free Period (CFP) parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS) in WBAN (since most of the data is carried in CFP period). As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN.

  18. A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Kyung Sup Kwak

    2011-01-01

    Full Text Available A Wireless Body Area Network (WBAN is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE applications. Since WBAN nodes are used to collect sensitive (life-critical information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS attacks in WBAN at Physical, Medium Access Control (MAC, Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP and Contention Free Period (CFP parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS in WBAN (since most of the data is carried in CFP period. As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN.

  19. Grounding Damage to Conventional Vessels

    DEFF Research Database (Denmark)

    Lützen, Marie; Simonsen, Bo Cerup

    2003-01-01

    regulations for design of bottom compartment layout with regard to grounding damages are largely based on statistical damage data. New and updated damage statistics holding 930 grounding accident records has been investigated. The bottom damage statistics is compared to current regulations for the bottom......The present paper is concerned with rational design of conventional vessels with regard to bottom damage generated in grounding accidents. The aim of the work described here is to improve the design basis, primarily through analysis of new statistical data for grounding damage. The current...... for the relation between the amount of deformed structure and the energy absorption. Finally, the paper shows how damage statistics for existing, conventional vessels can be used together with theoretical prediction methods for determining grounding damage distributions for new vessel types not included...

  20. 19 CFR 4.5 - Government vessels.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Government vessels. 4.5 Section 4.5 Customs Duties... VESSELS IN FOREIGN AND DOMESTIC TRADES Arrival and Entry of Vessels § 4.5 Government vessels. (a) No... that is the property of, the U.S. Department of Defense (DoD) will be treated as a Government vessel...

  1. Transactional Mechanism of Territorial Administration: Conceptualisation and Systematization of Elements

    Directory of Open Access Journals (Sweden)

    Elena Аleksandrovna Petrova

    2016-12-01

    Full Text Available The concept of transaction expenses developed by R. Coase allows to consider functioning of economy and its agents from the information viewpoint. This viewpoint implies that information exchange between agents and the urge to overcome information incompleteness start playing the crucial role. Transaction expenses are information exchange costs for the purpose of elimination (reduction of its incompleteness and the related uncertainty. R. Coase showed that creation and the size of firms are closely connected with the urge to minimize transaction expenses. Traditionally transaction expenses are associated with functioning of firms, however, the state actively participates in economy, for example, through formation of tax policy. Besides, financing of the public benefits takes place on the basis of collective decisions. But collective character of the decision causes interest, though smaller in comparison with the private choice, in the maximum efficiency of the decision. It is ensured by two factors: firstly, the position of an individual is not of great importance at collective decision-making; secondly, an individual is responsible for a small part of benefits and expenses which are formed in the course of decision implementation. The article deals with the concept of transaction costs, and systematically occurring types of transaction costs in the following groups: search information costы, the cost of negotiating, measuring costs, the costs of specification and protection of property rights, the costs of opportunistic behavior, the cost of “politicizing”, the costs of collective decisionmaking, influence costs. The authors propose a model of transaction mechanism of territorial administration, which includes the following elements: economic entities; a goal determined by system of indicators; methods; instruments; channels; forms of target use; landmark feedback on the system; subject to the experience stage of modernization; criteria

  2. [Pulmonary blood vessels in goats].

    Science.gov (United States)

    Roos, H; Hegner, K; Vollmerhaus, B

    1999-05-01

    The blood vessels in the lung of the goat, which until now have received little attention, are described in detail for the first time. With regard to the segments of the lung, blood vessels are bronchovascular units in the lobi craniales, lobus medius and lobus accessorius, but bronchoartery units in the lobi caudales. We investigated the types of branches of the Aa. pulmonales dextra et sinistra, the inter- and intraspecific principles of the outlet of the pulmonary veins and the importance of bronchopulmonary segmentation of the lungs.

  3. TRANSACTIONAL LEADER IN ROMANIAN PRIVATE BANKING SYSTEM

    Directory of Open Access Journals (Sweden)

    Lucian Ciprian CRIȘAN

    2016-05-01

    Full Text Available From a managerial point of view, all the media means of professional communication, socialization and interaction emphasize entrepreneurial success stories. One of the modern concerns of all current researchers is to underline the place and role of leaders in the institutional framework. The leadership is perceived as a support pillar in maintaining any business. The analysis of this phenomenon is extremely extensive, starting with the culture of a company, the purpose of its existence and comprises aspects concerning the employees motivation and the degree of identifying themselves with the organizational objective. A constant concern in analyzing this phenomenon is retaining the employees and encouraging them to bring added value to the organization where they perform their daily activities. Nevertheless, the Romanian banking system in Timişoara seems to display a strong resistance towards change. The leadership of this industry is comprised of people with great managerial abilities. The transactional method, manifested by the leader in the Romanian private banking system in Timişoara, seems to be the main phenomenon at the basis of their daily activity. The manager – leader hypothesis is slowly taking shape. Due to the resistance to change, generated by the educational model, from a managerial point of view, the balance is strongly tilting towards the managerial traits at the expense of the leadership ones. We are still at the stage where the tolerance towards liberty, uncertainty, are some of the traits of the leader in the Romanian private banking system in Timişoara, which are poorly identified at the management level of this very important segment of activity.

  4. MARKET RISK ESTIMATION IN (T+-TRANSACTIONS

    Directory of Open Access Journals (Sweden)

    Radik B. Begov

    2016-01-01

    Full Text Available Market risk analysis and estimation are presentedin T+ transactionsas they are used within the Moscow Exchange. There is a need to do so as a result of the cut-off of a new REPO product with Central Counterpartner (CCP. Here repurchase agreement goes through the National Clearing Center (NCC, the last being a bank and a clearing structure within the Moscow Exchange group.NCC actsas an intermediary (so called “Central Counterpartner” between trading participants.REPOs with CCP raisecontractor claims and commitments to the CCP which takes the risk of default on commitments from unfair contract side. The REPO with CCP cut-off made ready a technological platform to implement T+2 trades at the Moscow Exchange. As a result of it there appeared the possibility to enter security purchase/sell contracts partially collateralized. All these transactions (the REPO with CCP, T+ made it a must determining security market risks. The paper is aimed at presenting VaR-like risk estimates. The methods used are from the computer fi nance. Unusual TS rate of return indicator is proposed and applied to find optimal portfolios under the Markowitz approach and their VaRs (losses forecasts given the real “big” share price data and various horizons. Portfolio extreme rate and loss forecasting is our goal. To this end the forecasts are computed for three horizons (2, 5 and 10 days and for three significance levels.There were developed R-, Excel- and Bloomberg-basedsoftware tools as needed. The whole range of proposed computing steps and the tables with charts may be considered as candidates to be included in the future market risk standards.Paper results permit capital market participants to choose the correct (as to the required risk level common stocks.

  5. Packet size optimization for goodput and energy efficiency enhancement in slotted IEEE 802.15.4 networks

    NARCIS (Netherlands)

    Zhang, Y.; Shu, F.

    2009-01-01

    To address system goodput and energy efficiency enhancement, this paper studies packet size optimization for IEEE 802.15.4 networks. Taking into account of the CSMA-CA contention, protocol overhead, and channel condition, new analytical models are proposed to calculate the goodput and the energy

  6. AVSS 2007: IEEE International Conference onAdvanced Video and Signal based Surveillance, London, UK, September 2007

    DEFF Research Database (Denmark)

    Fihl, Preben

    This technical report will cover the participation in the IEEE International Conference on Advanced Video and Signal based Surveillance in September 2007. The report will give a concise description of the most relevant topics presented at the conference, focusing on the work related to the HERMES...

  7. Analyzing the Engineering Educational Research in Spain: A Global Vision through the Awards of CESEI-IEEE

    Science.gov (United States)

    Plaza, I.; Arcega, F.; Castro, M.; Llamas, M.

    2011-01-01

    CESEI is the acronym of the Spanish Chapter of the Education Society of IEEE (the Institute of Electric and Electronics Engineers). Every year, the CESEI awards a prize for the best doctoral thesis and FDP (final (master) degree projects) about education. The thesis or the project must be developed in the areas of electrical engineering,…

  8. Spectrum-efficient multi-channel design for coexisting IEEE 802.15.4 networks: A stochastic geometry approach

    KAUST Repository

    Elsawy, Hesham

    2014-07-01

    For networks with random topologies (e.g., wireless ad-hoc and sensor networks) and dynamically varying channel gains, choosing the long term operating parameters that optimize the network performance metrics is very challenging. In this paper, we use stochastic geometry analysis to develop a novel framework to design spectrum-efficient multi-channel random wireless networks based on the IEEE 802.15.4 standard. The proposed framework maximizes both spatial and time domain frequency utilization under channel gain uncertainties to minimize the number of frequency channels required to accommodate a certain population of coexisting IEEE 802.15.4 networks. The performance metrics are the outage probability and the self admission failure probability. We relax the single channel assumption that has been used traditionally in the stochastic geometry analysis. We show that the intensity of the admitted networks does not increase linearly with the number of channels and the rate of increase of the intensity of the admitted networks decreases with the number of channels. By using graph theory, we obtain the minimum required number of channels to accommodate a certain intensity of coexisting networks under a self admission failure probability constraint. To this end, we design a superframe structure for the coexisting IEEE 802.15.4 networks and a method for time-domain interference alignment. © 2002-2012 IEEE.

  9. An Efficient Resource Allocation Scheme for VoIP Services in the IEEE 802.16e OFDMA System

    Science.gov (United States)

    So, Jae-Woo

    In this letter, we propose an efficient resource allocation scheme that improves the system performance by reducing the signaling overhead for voice over Internet protocol (VoIP) services in the IEEE 802.16e OFDMA system. We theoretically analyze the performance of the proposed allocation scheme and carry out a computer simulation to evaluate the FA scheme.

  10. Mathematical modeling of a radio-frequency path for IEEE 802.11ah based wireless sensor networks

    Science.gov (United States)

    Tyshchenko, Igor; Cherepanov, Alexander; Dmitrii, Vakhnin; Popova, Mariia

    2017-09-01

    This article discusses the process of creating the mathematical model of a radio-frequency path for an IEEE 802.11ah based wireless sensor networks using M atLab Simulink CAD tools. In addition, it describes occurring perturbing effects and determining the presence of a useful signal in the received mixture.

  11. IEEE 802.11 Networks: A Simple Model Geared Towards Offloading Studies and Considerations on Future Small Cells

    DEFF Research Database (Denmark)

    Garcia, Luis Guilherme Uzeda; Rodriguez, Ignacio; Catania, Davide

    2013-01-01

    WiFi is the prevalent wireless access technology in local area deployments and is expected to play a major role in a mobile operator’s data offloading strategy. As a result, having simple tools that are able to assess the offloading potential of IEEE 802.11 networks is vital. In this paper, we...

  12. Real-life IT architecture design reports and their relation to IEEE Std 1471 stakeholders and concerns

    NARCIS (Netherlands)

    van Vliet, H.; Koning, H.

    2006-01-01

    Architectural designs are an important means to manage the development and deployment of information technology (IT). Much debate has been going on about a proper definition of architecture in IT and about how to describe it. In 2000, the IEEE Std 1471 proposed a model of an architecture description

  13. The logic of transaction cost economics in health care organization theory.

    Science.gov (United States)

    Stiles, R A; Mick, S S; Wise, C G

    2001-01-01

    Health care is, at its core, comprised of complex sequences of transactions among patients, providers, and other stakeholders; these transactions occur in markets as well as within systems and organizations. Health care transactions serve one of two functions: the production of care (i.e., the laying on of hands) or the coordination of that care (i.e., scheduling, logistics). Because coordinating transactions is integral to care delivery, it is imperative that they are executed smoothly and efficiently. Transaction cost economics (TCE) is a conceptual framework for analyzing health care transactions and quantifying their impact on health care structures (organizational forms), processes, and outcomes.

  14. FAMILY CONFLICT MODERATES EARLY PARENT-CHILD BEHAVIORAL TRANSACTIONS.

    Science.gov (United States)

    Paschall, Katherine W; Barnett, Melissa A; Mastergeorge, Ann M; Mortensen, Jennifer A

    2017-09-01

    The reciprocal transactions that shape early parent-child relationships are influenced by contextual stress, such as family conflict. Although family conflict is a salient stressor to the family system, few studies have considered how parent-child transactions vary according to exposure to family conflict. The present study examined how family conflict alters early parent-child behavioral transactions. We utilized three waves of data from a multisite longitudinal study of low-income families (N = 2, 876), child age 14 months, 24 months, and 36 months, to identify behavioral transactions of positive and negative maternal (supportiveness, negative regard) and child (engagement, negativity) behaviors. Results indicated that family conflict at 14 months diminished the positive association between maternal supportiveness and child engagement, and amplified the inverse association between maternal negativity and child engagement. Family conflict at 14 months also was associated with increased stability of child negativity and subsequent increased maternal negative regard at 36 months, in part via increases in 24-month child negativity. In sum, family conflict occurring early in childhood predicted and moderated behavioral transactions between young children and their mothers. © 2017 Michigan Association for Infant Mental Health.

  15. Money laundering: correlation between risk assessment and suspicious transactions

    Directory of Open Access Journals (Sweden)

    Sonja Cindori

    2013-06-01

    Full Text Available The risk assessment system was introduced in the Republic of Croatia in 2009, as a result of harmonization with international standards, especially the Directive 2005/60/EC on the prevention of the use of the financial system for the purpose of money laundering and terrorist financing. Risk assessment is an extensive concept which requires not only a legislative framework, but also the application of numerous criteria for its effective implementation in practice. Among these criteria are suspicious transactions, closely related to the assessment of the customer, transaction, product or service.The undeniable contribution of suspicious transactions to the quality of the risk assessment system will be confirmed by a statistical analysis of a number of West and East European countries. A combination of strict, but sufficiently flexible legal provisions governing the system for prevention of money laundering and terrorist financing and a statistical analysis of reported suspicious transactions will lead to conclusions that either support or represent criticism of the efficiency of application of the risk assessment system in practice.The aforementioned statistical analysis will show whether suspicious transactions are a reliable criterion for the risk assessment analysis, and whether they can be considered the only such criterion. There is a possibility that the findings of the analysis will be contradictory to those of some international studies.

  16. Commercial Passenger Fishing Vessel Fishery

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains the logbook data from U.S.A. Commercial Passenger Fishing Vessels (CPFV) fishing in the U.S.A. EEZ and in waters off of Baja California, from...

  17. Pressure vessel and method therefor

    Energy Technology Data Exchange (ETDEWEB)

    Saunders, Timothy

    2017-09-05

    A pressure vessel includes a pump having a passage that extends between an inlet and an outlet. A duct at the pump outlet includes at least one dimension that is adjustable to facilitate forming a dynamic seal that limits backflow of gas through the passage.

  18. BPC 157 and blood vessels.

    Science.gov (United States)

    Seiwerth, Sven; Brcic, Luka; Vuletic, Lovorka Batelja; Kolenc, Danijela; Aralica, Gorana; Misic, Marija; Zenko, Anita; Drmic, Domagoj; Rucman, Rudolf; Sikiric, Predrag

    2014-01-01

    This review focuses on the described effects of BPC 157 on blood vessels after different types of damage, and elucidate by investigating different aspects of vascular response to injury (endothelium damage, clotting, thrombosis, vasoconstriction, vasodilatation, vasculoneogenesis and edema formation) especially in connection to the healing processes. In this respect, BPC 157 was concluded to be the most potent angiomodulatory agent, acting through different vasoactive pathways and systems (e.g. NO, VEGF, FAK) and leading to optimization of the vascular response followed, as it has to be expected, by optimization of the healing process. Formation of new blood vessels involves two main, partly overlapping mechanisms, angiogenesis and vasculogenesis. The additional mechanism of arteriogenesis is involved in the formation of collaterals. In conjunction with blood vessel function, we at least have to consider leakage of fluid/proteins/plasma, resulting in edema/exudate formation as well as thrombogenesis. Blood vessels are also strongly involved in tumor biology. In this aspect, we have neoangiogenesis resulting in pathological vascularization, vascular invasion resulting in release of metastatic cells and the phenomenon of homing resulting in formation of secondary tumors--metastases.

  19. The determinants of fishing vessel accident severity.

    Science.gov (United States)

    Jin, Di

    2014-05-01

    The study examines the determinants of fishing vessel accident severity in the Northeastern United States using vessel accident data from the U.S. Coast Guard for 2001-2008. Vessel damage and crew injury severity equations were estimated separately utilizing the ordered probit model. The results suggest that fishing vessel accident severity is significantly affected by several types of accidents. Vessel damage severity is positively associated with loss of stability, sinking, daytime wind speed, vessel age, and distance to shore. Vessel damage severity is negatively associated with vessel size and daytime sea level pressure. Crew injury severity is also positively related to the loss of vessel stability and sinking. Copyright © 2014 Elsevier Ltd. All rights reserved.

  20. Reactor vessel lower head integrity

    Energy Technology Data Exchange (ETDEWEB)

    Rubin, A.M.

    1997-02-01

    On March 28, 1979, the Three Mile Island Unit 2 (TMI-2) nuclear power plant underwent a prolonged small break loss-of-coolant accident that resulted in severe damage to the reactor core. Post-accident examinations of the TMI-2 reactor core and lower plenum found that approximately 19,000 kg (19 metric tons) of molten material had relocated onto the lower head of the reactor vessel. Results of the OECD TMI-2 Vessel Investigation Project concluded that a localized hot spot of approximately 1 meter diameter had existed on the lower head. The maximum temperature on the inner surface of the reactor pressure vessel (RPV) in this region reached 1100{degrees}C and remained at that temperature for approximately 30 minutes before cooling occurred. Even under the combined loads of high temperature and high primary system pressure, the TMI-2 RPV did not fail. (i.e. The pressure varied from about 8.5 to 15 MPa during the four-hour period following the relocation of melt to the lower plenum.) Analyses of RPV failure under these conditions, using state-of-the-art computer codes, predicted that the RPV should have failed via local or global creep rupture. However, the vessel did not fail; and it has been hypothesized that rapid cooling of the debris and the vessel wall by water that was present in the lower plenum played an important role in maintaining RPV integrity during the accident. Although the exact mechanism(s) of how such cooling occurs is not known, it has been speculated that cooling in a small gap between the RPV wall and the crust, and/or in cracks within the debris itself, could result in sufficient cooling to maintain RPV integrity. Experimental data are needed to provide the basis to better understand these phenomena and improve models of RPV failure in severe accident codes.