WorldWideScience

Sample records for wlan usage patterns

  1. Motion sensing using WLAN signal fluctuations

    NARCIS (Netherlands)

    Kavitha Muthukrishnan, K.; Lijding, M.E.M.; Meratnia, Nirvana; Havinga, Paul J.M.

    2006-01-01

    The ability to infer the motion of the user has previously been possible only with the usage of additional hardware. In this paper we show how motion sensing can be obtained just by observing the WLAN radio’s signal strength and its fluctuations. For the first time, we have analyzed the signal

  2. VoIP over WLAN

    OpenAIRE

    Nikkari, Joni

    2007-01-01

    Tässä opinnäytetyössä tutkitaan VoIP over WLAN -tekniikan mahdollisuuksia nykyaikaisessa käyttöympäristössä, sekä yritysmaailman että kotikäyttäjän näkökulmasta. Toimiakseen VoWLAN tarvitsee kaksi eri tekniikkaa: langattoman lähiverkon sekä WLAN-puhelimen, joka perustuu VoIP-tekniikkaan.; WLAN:ssa tietoliikenne kulkee normaalin kaapeloinnin sijasta radiotaajuuksia käyttämällä. Standardina toimii IEEE 802.11, joka määrittelee WLAN-verkkojen toiminnan. Standardia on kehitetty jatkuvasti, ja si...

  3. Gaming Device Usage Patterns Predict Internet Gaming Disorder: Comparison across Different Gaming Device Usage Patterns

    OpenAIRE

    Soo-Hyun Paik; Hyun Cho; Ji-Won Chun; Jo-Eun Jeong; Dai-Jin Kim

    2017-01-01

    Gaming behaviors have been significantly influenced by smartphones. This study was designed to explore gaming behaviors and clinical characteristics across different gaming device usage patterns and the role of the patterns on Internet gaming disorder (IGD). Responders of an online survey regarding smartphone and online game usage were classified by different gaming device usage patterns: (1) individuals who played only computer games; (2) individuals who played computer games more than smart...

  4. Performance of WLAN RSS-based SON for LTE/WLAN access network selection

    NARCIS (Netherlands)

    Wang, Y.; Djapic, R.; Bergström, A.; Kovács, I.Z.; Laselva, D.; Spaey, K.; Sas, B.

    2014-01-01

    Mobile Network Operators (MNOs) are integrating carrier-grade Wireless Local Area Network (WLAN) to cellular networks to improve network performance and user experience. Access network selection (ANS) between cellular and WLAN plays a key role in the integration. Given the complexity of

  5. Usage of Wifi Technology for PLC Programming

    Directory of Open Access Journals (Sweden)

    Jaromír ŠKUTA

    2009-06-01

    Full Text Available This contribution describes usage of WIFI technology for programming and parameterization of application in PLC. INSYS WLAN unit from the Microelectronics INSYS Corporation is the base of application. Software access point with using USB WIFI component WL167 is running in industrial PC. Particular PC clients are connecting into network infrastructure PLC by the help of this access point and INSYS WLAN unit. This connection allows configuring and uploading program into this PLC.

  6. A Study of WLAN Campus in an Educational Establishment

    Directory of Open Access Journals (Sweden)

    Taghareed Abdul-Hameed

    2009-10-01

    Full Text Available the main aim of campus network is to efficiently separate, share and access knowledge among its users. The big demand of such systems of distributed knowledge networks is to be able to handle advanced applications which are the end-user requirements. The main goal of this study is to assess the ability of WLAN campus to dealing with applications request of end users in education establishments and network achievement under different conditions of operation. The study has been conducted in two stages: the first stage was accomplished by conducting a survey, using the Student Village network at Anglia Ruskin University as a case study; the main aim was to determine end-use requirements, gather information about the nature applications running by users and get a view about the likely future applications. The second stage was achieved by conducting experiments to evaluate the WLAN campus network performance under various different scenarios: impact of handover from Access Point (AP to another AP on end-user link performance, network performance in different usage time and network performance in different weather conditions.

  7. Gaming Device Usage Patterns Predict Internet Gaming Disorder: Comparison across Different Gaming Device Usage Patterns

    Science.gov (United States)

    Cho, Hyun; Chun, Ji-Won; Jeong, Jo-Eun; Kim, Dai-Jin

    2017-01-01

    Gaming behaviors have been significantly influenced by smartphones. This study was designed to explore gaming behaviors and clinical characteristics across different gaming device usage patterns and the role of the patterns on Internet gaming disorder (IGD). Responders of an online survey regarding smartphone and online game usage were classified by different gaming device usage patterns: (1) individuals who played only computer games; (2) individuals who played computer games more than smartphone games; (3) individuals who played computer and smartphone games evenly; (4) individuals who played smartphone games more than computer games; (5) individuals who played only smartphone games. Data on demographics, gaming-related behaviors, and scales for Internet and smartphone addiction, depression, anxiety disorder, and substance use were collected. Combined users, especially those who played computer and smartphone games evenly, had higher prevalence of IGD, depression, anxiety disorder, and substance use disorder. These subjects were more prone to develop IGD than reference group (computer only gamers) (B = 0.457, odds ratio = 1.579). Smartphone only gamers had the lowest prevalence of IGD, spent the least time and money on gaming, and showed lowest scores of Internet and smartphone addiction. Our findings suggest that gaming device usage patterns may be associated with the occurrence, course, and prognosis of IGD. PMID:29206183

  8. Gaming Device Usage Patterns Predict Internet Gaming Disorder: Comparison across Different Gaming Device Usage Patterns.

    Science.gov (United States)

    Paik, Soo-Hyun; Cho, Hyun; Chun, Ji-Won; Jeong, Jo-Eun; Kim, Dai-Jin

    2017-12-05

    Gaming behaviors have been significantly influenced by smartphones. This study was designed to explore gaming behaviors and clinical characteristics across different gaming device usage patterns and the role of the patterns on Internet gaming disorder (IGD). Responders of an online survey regarding smartphone and online game usage were classified by different gaming device usage patterns: (1) individuals who played only computer games; (2) individuals who played computer games more than smartphone games; (3) individuals who played computer and smartphone games evenly; (4) individuals who played smartphone games more than computer games; (5) individuals who played only smartphone games. Data on demographics, gaming-related behaviors, and scales for Internet and smartphone addiction, depression, anxiety disorder, and substance use were collected. Combined users, especially those who played computer and smartphone games evenly, had higher prevalence of IGD, depression, anxiety disorder, and substance use disorder. These subjects were more prone to develop IGD than reference group (computer only gamers) (B = 0.457, odds ratio = 1.579). Smartphone only gamers had the lowest prevalence of IGD, spent the least time and money on gaming, and showed lowest scores of Internet and smartphone addiction. Our findings suggest that gaming device usage patterns may be associated with the occurrence, course, and prognosis of IGD.

  9. Gaming Device Usage Patterns Predict Internet Gaming Disorder: Comparison across Different Gaming Device Usage Patterns

    Directory of Open Access Journals (Sweden)

    Soo-Hyun Paik

    2017-12-01

    Full Text Available Gaming behaviors have been significantly influenced by smartphones. This study was designed to explore gaming behaviors and clinical characteristics across different gaming device usage patterns and the role of the patterns on Internet gaming disorder (IGD. Responders of an online survey regarding smartphone and online game usage were classified by different gaming device usage patterns: (1 individuals who played only computer games; (2 individuals who played computer games more than smartphone games; (3 individuals who played computer and smartphone games evenly; (4 individuals who played smartphone games more than computer games; (5 individuals who played only smartphone games. Data on demographics, gaming-related behaviors, and scales for Internet and smartphone addiction, depression, anxiety disorder, and substance use were collected. Combined users, especially those who played computer and smartphone games evenly, had higher prevalence of IGD, depression, anxiety disorder, and substance use disorder. These subjects were more prone to develop IGD than reference group (computer only gamers (B = 0.457, odds ratio = 1.579. Smartphone only gamers had the lowest prevalence of IGD, spent the least time and money on gaming, and showed lowest scores of Internet and smartphone addiction. Our findings suggest that gaming device usage patterns may be associated with the occurrence, course, and prognosis of IGD.

  10. Recommended Practices Guide Securing WLANs using 802.11i

    Energy Technology Data Exchange (ETDEWEB)

    Masica, K

    2006-10-16

    This paper addresses design principles and best practices regarding the implementation and operation of Wireless LAN (WLAN) communication networks based on the 802.11i security standard. First, a general overview of WLAN technology and standards is provided in order to ground the discussion in the evolution of WLAN standards and security approaches. This is followed by a detailed explanation of the 802.11i standard for securing WLAN networks. Principles for designing secure WLAN networks are then presented, followed by a list of specific best practices that can be used as a guideline for organizations considering the deployment of WLAN networks for non-critical control and monitoring applications. Finally, a section on technical issues and considerations for deploying WLAN networks in critical environments is presented.

  11. A CPW-Fed Rectangular Ring Monopole Antenna for WLAN Applications

    Directory of Open Access Journals (Sweden)

    Sangjin Jo

    2014-01-01

    Full Text Available We present a simple coplanar waveguide- (CPW- fed rectangular ring monopole antenna designed for dual-band wireless local area network (WLAN applications. The antenna is based on a simple structure composed of a CPW feed line and a rectangular ring. Dual-band WLAN operation can be achieved by controlling the distance between the rectangular ring and the ground plane of the CPW feed line, as well as the horizontal vertical lengths of the rectangular ring. Simulated and measured data show that the antenna has a compact size of 21.4×59.4 mm2, an impedance bandwidths of 2.21–2.70 GHz and 5.04–6.03 GHz, and a reflection coefficient of less than −10 dB. The antenna also exhibits an almost omnidirectional radiation pattern. This simple compact antenna with favorable frequency characteristics therefore is attractive for applications in dual-band WLAN.

  12. Cognitive Radio MAC Protocol for WLAN

    DEFF Research Database (Denmark)

    Zhang, Qi; Fitzek, Frank H.P.; Iversen, Villy Bæk

    2008-01-01

    hole; moreover, it designs dual inband sensing scheme to detect primary user appearance. Additionally, C-CSMA/CA has the advantage to effectively solve the cognitive radio self-coexistence issues in the overlapping CR BSSs scenario. It also realizes station-based dynamic resource selection......To solve the performance degradation issue in current WLAN caused by the crowded unlicensed spectrum, we propose a cognitive radio (CR) media access protocol, C-CSMA/CA. The basic idea is that with cognitive radio techniques the WLAN devices can not only access the legacy WLAN unlicensed spectrum...

  13. Discovering More Accurate Frequent Web Usage Patterns

    OpenAIRE

    Bayir, Murat Ali; Toroslu, Ismail Hakki; Cosar, Ahmet; Fidan, Guven

    2008-01-01

    Web usage mining is a type of web mining, which exploits data mining techniques to discover valuable information from navigation behavior of World Wide Web users. As in classical data mining, data preparation and pattern discovery are the main issues in web usage mining. The first phase of web usage mining is the data processing phase, which includes the session reconstruction operation from server logs. Session reconstruction success directly affects the quality of the frequent patterns disc...

  14. _ MULTI-CELL CAMPUS WLAN ENVIRONMENT ~

    African Journals Online (AJOL)

    802.11 WLAN has been discovered to be naturally weak in supporting the mobility of mobile host (MH) when there is no traffic to be served for the MHs. . Quite a number of commendable works have been done to introduce paging in WLAN and, thereby properly manage scarce network resources such as bandwidth and ...

  15. WLAN Hot Spot services for the automotive and oil industries. A business analysis

    International Nuclear Information System (INIS)

    Pau, F.; Oremus, M.H.P.

    2003-04-01

    While you refuel for gas, why not refuel for information or download vehicle data? This paper analyzes in extensive detail the user segmentation by vehicle usage, service offering, and full business models from WLAN (Wireless Local Area Network) hot spot services delivered to vehicles (private, professional, public) around gas stations. Also analyzed are the parties which play a role in such service authorization, provisioning and delivery, with all the dependencies modelled by attributed digraphs. Service planning is included as to WLAN base station capabilities. Five year financial models (CAPEX,OPEX), and data pertain to two possible service suppliers: multi-service oil companies, and mobile service operators (or MVNO). Model optimization on the return-on-investment (ROI) is carried out for different deployment scenarios, geographical coverage assumptions, as well as tariff structures. Comparison is also being made with public GPRS data services, as precursors for 3G services, and the effect of WLAN roaming is analyzed. Analysis shows that due to manpower costs and marketing costs, suitable ROI will not be achieved unless externalities are accounted for and innovative tariff structures are introduced. Open issues and further research are outlined. Further work is carried out, also with automotive electronics sector, wireless systems providers, wireless terminals platform suppliers, and vehicle manufacturers

  16. WLAN Hot Spot services for the automotive and oil industries. A business analysis

    Energy Technology Data Exchange (ETDEWEB)

    Pau, F. [Rotterdam School of Management, Erasmus Research Institute of Management ERIM, Rotterdam (Netherlands); Oremus, M.H.P. [Rolls Royce (BMW) Germany, Dahlewitz (Germany)

    2003-04-01

    While you refuel for gas, why not refuel for information or download vehicle data? This paper analyzes in extensive detail the user segmentation by vehicle usage, service offering, and full business models from WLAN (Wireless Local Area Network) hot spot services delivered to vehicles (private, professional, public) around gas stations. Also analyzed are the parties which play a role in such service authorization, provisioning and delivery, with all the dependencies modelled by attributed digraphs. Service planning is included as to WLAN base station capabilities. Five year financial models (CAPEX,OPEX), and data pertain to two possible service suppliers: multi-service oil companies, and mobile service operators (or MVNO). Model optimization on the return-on-investment (ROI) is carried out for different deployment scenarios, geographical coverage assumptions, as well as tariff structures. Comparison is also being made with public GPRS data services, as precursors for 3G services, and the effect of WLAN roaming is analyzed. Analysis shows that due to manpower costs and marketing costs, suitable ROI will not be achieved unless externalities are accounted for and innovative tariff structures are introduced. Open issues and further research are outlined. Further work is carried out, also with automotive electronics sector, wireless systems providers, wireless terminals platform suppliers, and vehicle manufacturers.

  17. Analysis of synonymous codon usage patterns in the genus Rhizobium.

    Science.gov (United States)

    Wang, Xinxin; Wu, Liang; Zhou, Ping; Zhu, Shengfeng; An, Wei; Chen, Yu; Zhao, Lin

    2013-11-01

    The codon usage patterns of rhizobia have received increasing attention. However, little information is available regarding the conserved features of the codon usage patterns in a typical rhizobial genus. The codon usage patterns of six completely sequenced strains belonging to the genus Rhizobium were analysed as model rhizobia in the present study. The relative neutrality plot showed that selection pressure played a role in codon usage in the genus Rhizobium. Spearman's rank correlation analysis combined with correspondence analysis (COA) showed that the codon adaptation index and the effective number of codons (ENC) had strong correlation with the first axis of the COA, which indicated the important role of gene expression level and the ENC in the codon usage patterns in this genus. The relative synonymous codon usage of Cys codons had the strongest correlation with the second axis of the COA. Accordingly, the usage of Cys codons was another important factor that shaped the codon usage patterns in Rhizobium genomes and was a conserved feature of the genus. Moreover, the comparison of codon usage between highly and lowly expressed genes showed that 20 unique preferred codons were shared among Rhizobium genomes, revealing another conserved feature of the genus. This is the first report of the codon usage patterns in the genus Rhizobium.

  18. KAJIAN PENGARUH MODERATING KELOMPOK PENGGUNA DALAM PENERIMAAN GSM-WLAN DI KOTA BANDUNG BERDASARKAN MODEL UTAUT

    Directory of Open Access Journals (Sweden)

    Syarif Hidayatulloh

    2016-03-01

    Full Text Available Abstract - The increasing use of the internet is testament to the rapid development of technology. GSM-WLAN is one technology that is manifested by the provider with the aim can hit 3G and 4G technology which requires a very large investment funds for the internet service provider. One of its main objectives is the big cities that became the majority of the largest internet usage in Indonesia, Bandung City region was no exception as the capital of the province and city tours. Therefore please note the acceptance of these technologies in the community. The model that is used to find out the level of acceptance and use of such technology is a Unified Theory of Acceptance and Use of Technology (UTAUT. In this study examined factors that supposedly affects the acceptance and use of technology GSM-WLAN in Bandung. Those factors among other performance expectancy, effort expectancy, social influence, facilitating conditions and price value to account for the contribution of each variable to predict the user's stance on such technology by using user groups as a moderator variable. Data processing method used is a Structural Equation Models (SEM that use software AMOS. The data processing of the obtained results performance expectancy value and price effect on attitudes toward the use of GSM technology-WLAN. While the moderator variable user groups influence on the attitude of the users in using GSM technology WLAN. Keywords: Internet, WLAN, GSM-UTAUT, SEM Abstrak - Penggunaan internet yang semakin meningkatnya merupakan bukti perkembangan teknologi yang sangat pesat. GSM-WLAN merupakan salah satu teknologi yang dihadirkan oleh para provider dengan tujuan dapat menekan penggunaan teknologi 3G dan 4G yang memerlukan innvestasi dana yang sangat besar bagi para penyedia layanan internet. Salah satu sasaran utamanya ialah kota-kota besar yang menjadi mayoritas penggunaan internet terbesar di Indonesia, tidak terkecuali wilayah Kota Bandung sebagai Ibu kota

  19. WLAN vs. UMTS - The European Scene

    DEFF Research Database (Denmark)

    Tan, Su-En; Saugstrup, Dan; Olesen, Henning

    for further development/deployment of UMTS and WLAN services. More specifically, the paper discusses the technologies of "Voice over IP" (VoIP) and "Mobile over WLAN" through mobile devices, and the quasi-3G technology of EDGE, which could provide some of the same services as UMTS, but at a substantially...

  20. Seguridad en redes WLAN

    OpenAIRE

    Muñoz Villa, Diego Geovanny

    2006-01-01

    En nuestro medio es común ver que cada vez se implementan más redes inalámbricas (WLAN), en las empresas como complemento de las redes Lan. Las redes WLAN actualmente son una alternativa real y económica para implementar una red de computadores, sus características de flexibilidad, movilidad, adaptabilidad, y facilidad de instalación han sido la razón, para su buena aceptación en el mercado lo que ha producido una disminución en los costos de estos equipos. Pero sin embargo pocas personas ...

  1. CMOS SPDT switch for WLAN applications

    International Nuclear Information System (INIS)

    Bhuiyan, M A S; Reaz, M B I; Rahman, L F; Minhad, K N

    2015-01-01

    WLAN has become an essential part of our today's life. The advancement of CMOS technology let the researchers contribute low power, size and cost effective WLAN devices. This paper proposes a single pole double through transmit/receive (T/R) switch for WLAN applications in 0.13 μm CMOS technology. The proposed switch exhibit 1.36 dB insertion loss, 25.3 dB isolation and 24.3 dBm power handling capacity. Moreover, it only dissipates 786.7 nW power per cycle. The switch utilizes only transistor aspect ratio optimization and resistive body floating technique to achieve such desired performance. In this design the use of bulky inductor and capacitor is avoided to evade imposition of unwanted nonlinearities to the communication signal. (paper)

  2. Cmos spdt switch for wlan applications

    Science.gov (United States)

    Bhuiyan, M. A. S.; Reaz, M. B. I.; Rahman, L. F.; Minhad, K. N.

    2015-04-01

    WLAN has become an essential part of our today's life. The advancement of CMOS technology let the researchers contribute low power, size and cost effective WLAN devices. This paper proposes a single pole double through transmit/receive (T/R) switch for WLAN applications in 0.13 μm CMOS technology. The proposed switch exhibit 1.36 dB insertion loss, 25.3 dB isolation and 24.3 dBm power handling capacity. Moreover, it only dissipates 786.7 nW power per cycle. The switch utilizes only transistor aspect ratio optimization and resistive body floating technique to achieve such desired performance. In this design the use of bulky inductor and capacitor is avoided to evade imposition of unwanted nonlinearities to the communication signal.

  3. Flexible Hilbert-Curve Loop Antenna Having a Triple-Band and Omnidirectional Pattern for WLAN/WiMAX Applications

    Directory of Open Access Journals (Sweden)

    Dang-Oh Kim

    2012-01-01

    Full Text Available A triple-band flexible loop antenna is proposed for WLAN/WiMAX applications in this paper. The proposed antenna is formed by the third-order Hilbert-curve and bending type structure which provides flexible characteristics. Even though the radius of the curvature for bending antennas is changed, a triple-band feature still remains in the proposed antenna. Moreover, the antenna exhibits the characteristics of omnidirectional radiation pattern and circular polarization. To verify the receiving performance of antenna, a simulation on the antenna factor was conducted by an EM simulator. Based on these results, the suggested antenna makes a noteworthy performance over typical loop antennas.

  4. Motivations and usage patterns of Weibo.

    Science.gov (United States)

    Zhang, Lixuan; Pentina, Iryna

    2012-06-01

    Referred to as "Weibo," microblogging in China has witnessed an exponential growth. In addition to the Twitter-like functionality, Weibo allows rich media uploads into user feeds, provides threaded comments, and offers applications, games, and Weibo medals. This expanded functionality, as well as the observed differences in trending content, suggests potentially different user motivations to join Weibo and their usage patterns compared to Twitter. This pioneering study identifies dominant Weibo user motivations and their effects on usage patterns. We discuss the findings of an online survey of 234 Weibo users and suggest managerial implications and future research directions.

  5. A Low-Profile WLAN Antenna with Inductor and Tuning Stub for Broadband Impedance Matching

    Directory of Open Access Journals (Sweden)

    Woo-Su Kim

    2014-01-01

    Full Text Available This paper presents a low-profile multiband antenna suitable for wireless local area networks (WLANs, using a chip inductor and tuning stub for broadband impedance matching. The proposed antenna is compact 12×10×1 mm3 and covers three bands: 2.4-GHz (2.400–2.484 GHz, 5.2-GHz (5.150–5.350 GHz, and 5.8-GHz (5.725–5.825 GHz. The measured 10-dB bandwidths are 12.0% (2.28–2.57 GHz in the lower band for 2.4-GHz WLANs and 39.1% (4.81–7.15 GHz in the upper band for 5 GHz-WLANs. The measured peak gain of the antenna is between 2.7 and 4.39 dBi and the radiation patterns are omnidirectional.

  6. Efficient and Accurate WLAN Positioning with Weighted Graphs

    DEFF Research Database (Denmark)

    Hansen, Rene; Thomsen, Bent

    2009-01-01

    This paper concerns indoor location determination by using existing WLAN infrastructures and WLAN enabled mobile devices. The location fingerprinting technique performs localization by first constructing a radio map of signal strengths from nearby access points. The radio map is subsequently...

  7. WLAN-antenni ajoneuvokäyttöön

    OpenAIRE

    Mustonen, Sami

    2006-01-01

    Insinöörityössä tutkittiin, mikä WLAN-antenni soveltuisi parhaiten käytettäväksi Sunit Oy:n valmistamissa ajoneuvotietokoneissa. WLAN-antennin täytyy olla tehokas ja helposti asennettava ajoneuvokäyttöön. Työssä tutkittiin myös, kuinka merkittävässä asemassa ovat suurtaajuuskäytössä käytettävät RF-liittimet ja kaapelit. Insinöörityön tutkimus perustuu suurimmalta osaltaanantenniteoriaan, sähkömagnetismiin ja mikroaaltomittaustekniikkaan. WLAN-antennimittaukset on tehty Kajaanin ammattikork...

  8. Power-Efficient Communication Protocol for Integrated WWAN and WLAN

    Directory of Open Access Journals (Sweden)

    Golmie Nada

    2008-01-01

    Full Text Available Abstract One of the most impending requirements to support a seamless communication environment in heterogeneous wireless networks comes from the limited power supply of small-size and low-cost mobile terminals as in stand-alone WLANs or cellular networks. Thus, it is a challenge to design new techniques so that mobile terminals are able to not only maintain their active connection as they move across different types of wireless networks, but also minimize their power consumption. There have been several efforts aimed at having mobile devices equipped with multiple interfaces connect optimally to the access network that minimizes their power consumption. However, a study of existing schemes for WLAN notes that in the idle state, a device with both a WLAN and a WWAN interface needs to keep both interfaces on in order to receive periodic beacon messages from the access point (AP: WLAN and downlink control information from the base station (WWAN, resulting in significant power consumption. Therefore, in this paper, we propose a power-efficient communication protocol (PCP that includes turning off the WLAN interface after it enters the idle state and using the paging channel of WWAN in order to wake up the WLAN interface when there is incoming long-lived multimedia data. This scheme is known to limit the power consumption, while at the same time, it makes use of the paging channel in cellular networks. Further, our proposed scheme is designed to avoid repeatedly turning on and off WLAN interfaces, that consumes a significant amount of power. We propose turning on the WLAN interface when the number of packets in the radio network controller (RNC's buffer reaches a certain threshold level. The tradeoffs between the power saving and the number of packets dropped at the buffer are investigated analytically through the study of an on/off traffic model. Simulation results for scenarios of interest are also provided.

  9. Power-Efficient Communication Protocol for Integrated WWAN and WLAN

    Directory of Open Access Journals (Sweden)

    SuKyoung Lee

    2008-01-01

    Full Text Available One of the most impending requirements to support a seamless communication environment in heterogeneous wireless networks comes from the limited power supply of small-size and low-cost mobile terminals as in stand-alone WLANs or cellular networks. Thus, it is a challenge to design new techniques so that mobile terminals are able to not only maintain their active connection as they move across different types of wireless networks, but also minimize their power consumption. There have been several efforts aimed at having mobile devices equipped with multiple interfaces connect optimally to the access network that minimizes their power consumption. However, a study of existing schemes for WLAN notes that in the idle state, a device with both a WLAN and a WWAN interface needs to keep both interfaces on in order to receive periodic beacon messages from the access point (AP: WLAN and downlink control information from the base station (WWAN, resulting in significant power consumption. Therefore, in this paper, we propose a power-efficient communication protocol (PCP that includes turning off the WLAN interface after it enters the idle state and using the paging channel of WWAN in order to wake up the WLAN interface when there is incoming long-lived multimedia data. This scheme is known to limit the power consumption, while at the same time, it makes use of the paging channel in cellular networks. Further, our proposed scheme is designed to avoid repeatedly turning on and off WLAN interfaces, that consumes a significant amount of power. We propose turning on the WLAN interface when the number of packets in the radio network controller (RNC's buffer reaches a certain threshold level. The tradeoffs between the power saving and the number of packets dropped at the buffer are investigated analytically through the study of an on/off traffic model. Simulation results for scenarios of interest are also provided.

  10. Outdoor Long-Range WLANs : A Lesson for IEEE 802.11ah

    NARCIS (Netherlands)

    Aust, Stefan; Venkatesha Prasad, R.; Niemegeers, Ignas G M M

    2015-01-01

    Several service applications have been reported by many who proposed the use of wireless LANs (WLANs) over a wide variety of outdoor deployments. In particular, the upcoming IEEE 802.11ah WLAN protocol will enable a longer transmission range between WLAN access points (APs) and stations (STAs) up to

  11. PRIMAL: Page Rank-Based Indoor Mapping and Localization Using Gene-Sequenced Unlabeled WLAN Received Signal Strength

    Directory of Open Access Journals (Sweden)

    Mu Zhou

    2015-09-01

    Full Text Available Due to the wide deployment of wireless local area networks (WLAN, received signal strength (RSS-based indoor WLAN localization has attracted considerable attention in both academia and industry. In this paper, we propose a novel page rank-based indoor mapping and localization (PRIMAL by using the gene-sequenced unlabeled WLAN RSS for simultaneous localization and mapping (SLAM. Specifically, first of all, based on the observation of the motion patterns of the people in the target environment, we use the Allen logic to construct the mobility graph to characterize the connectivity among different areas of interest. Second, the concept of gene sequencing is utilized to assemble the sporadically-collected RSS sequences into a signal graph based on the transition relations among different RSS sequences. Third, we apply the graph drawing approach to exhibit both the mobility graph and signal graph in a more readable manner. Finally, the page rank (PR algorithm is proposed to construct the mapping from the signal graph into the mobility graph. The experimental results show that the proposed approach achieves satisfactory localization accuracy and meanwhile avoids the intensive time and labor cost involved in the conventional location fingerprinting-based indoor WLAN localization.

  12. PRIMAL: Page Rank-Based Indoor Mapping and Localization Using Gene-Sequenced Unlabeled WLAN Received Signal Strength.

    Science.gov (United States)

    Zhou, Mu; Zhang, Qiao; Xu, Kunjie; Tian, Zengshan; Wang, Yanmeng; He, Wei

    2015-09-25

    Due to the wide deployment of wireless local area networks (WLAN), received signal strength (RSS)-based indoor WLAN localization has attracted considerable attention in both academia and industry. In this paper, we propose a novel page rank-based indoor mapping and localization (PRIMAL) by using the gene-sequenced unlabeled WLAN RSS for simultaneous localization and mapping (SLAM). Specifically, first of all, based on the observation of the motion patterns of the people in the target environment, we use the Allen logic to construct the mobility graph to characterize the connectivity among different areas of interest. Second, the concept of gene sequencing is utilized to assemble the sporadically-collected RSS sequences into a signal graph based on the transition relations among different RSS sequences. Third, we apply the graph drawing approach to exhibit both the mobility graph and signal graph in a more readable manner. Finally, the page rank (PR) algorithm is proposed to construct the mapping from the signal graph into the mobility graph. The experimental results show that the proposed approach achieves satisfactory localization accuracy and meanwhile avoids the intensive time and labor cost involved in the conventional location fingerprinting-based indoor WLAN localization.

  13. WLAN Hot Spot services for the automotive and oil industries :a business analysis Or : "Refuel the car with petrol and information, both ways at the gas station"

    NARCIS (Netherlands)

    L-F. Pau (Louis-François); M.H.P. Oremus

    2003-01-01

    textabstractWhile you refuel for gas ,why not refuel for information or download vehicle data ? This paper analyzes in extensive detail the user segmentation by vehicle usage , service offering , and full business models from WLAN hot spot services delivered to vehicles (private, professional ,

  14. Handover Incentives for Self-Interested WLANs with Overlapping Coverage

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Siris, Vasilios A.

    2012-01-01

    We consider an environment where self-interested IEEE 802.11 Wireless Local Area Networks (WLANs) have overlapping coverage, and investigate the incentives that can trigger handovers between the WLANs. Our focus is on the incentives for supporting handovers due solely to the improved performance...

  15. Student Media Usage Patterns and Non-Traditional Learning in Higher Education

    Directory of Open Access Journals (Sweden)

    Olaf Zawacki-Richter

    2015-04-01

    Full Text Available A total of 2,338 students at German universities participated in a survey, which investigated media usage patterns of so-called traditional and non-traditional students (Schuetze & Wolter, 2003. The students provided information on the digital devices that they own or have access to, and on their usage of media and e-learning tools and services for their learning. A distinction was made between external, formal and internal, informal tools and services. Based on the students’ responses, a typology of media usage patterns was established by means of a latent class analysis (LCA. Four types or profiles of media usage patterns were identified. These types were labeled entertainment users, peripheral users, advanced users and instrumental users. Among non-traditional students, the proportion of instrumental users was rather high. Based on the usage patterns of traditional and non-traditional students, implications for media selection in the instructional design process are outlined in the paper.

  16. Design of Miniaturized Dual-Band Microstrip Antenna for WLAN Application

    Science.gov (United States)

    Yang, Jiachen; Wang, Huanling; Lv, Zhihan; Wang, Huihui

    2016-01-01

    Wireless local area network (WLAN) is a technology that combines computer network with wireless communication technology. The 2.4 GHz and 5 GHz frequency bands in the Industrial Scientific Medical (ISM) band can be used in the WLAN environment. Because of the development of wireless communication technology and the use of the frequency bands without the need for authorization, the application of WLAN is becoming more and more extensive. As the key part of the WLAN system, the antenna must also be adapted to the development of WLAN communication technology. This paper designs two new dual-frequency microstrip antennas with the use of electromagnetic simulation software—High Frequency Structure Simulator (HFSS). The two antennas adopt ordinary FR4 material as a dielectric substrate, with the advantages of low cost and small size. The first antenna adopts microstrip line feeding, and the antenna radiation patch is composed of a folded T-shaped radiating dipole which reduces the antenna size, and two symmetrical rectangular patches located on both sides of the T-shaped radiating patch. The second antenna is a microstrip patch antenna fed by coaxial line, and the size of the antenna is diminished by opening a stepped groove on the two edges of the patch and a folded slot inside the patch. Simulation experiments prove that the two designed antennas have a higher gain and a favourable transmission characteristic in the working frequency range, which is in accordance with the requirements of WLAN communication. PMID:27355954

  17. Analysis of Usage Patterns in Large Multimedia Websites

    Science.gov (United States)

    Singh, Rahul; Bhattarai, Bibek

    User behavior in a website is a critical indicator of the web site's usability and success. Therefore an understanding of usage patterns is essential to website design optimization. In this context, large multimedia websites pose a significant challenge for comprehension of the complex and diverse user behaviors they sustain. This is due to the complexity of analyzing and understanding user-data interactions in media-rich contexts. In this chapter we present a novel multi-perspective approach for usability analysis of large media rich websites. Our research combines multimedia web content analysis with elements of web-log analysis and visualization/visual mining of web usage metadata. Multimedia content analysis allows direct estimation of the information-cues presented to a user by the web content. Analysis of web logs and usage-metadata, such as location, type, and frequency of interactions provides a complimentary perspective on the site's usage. The entire set of information is leveraged through powerful visualization and interactive querying techniques to provide analysis of usage patterns, measure of design quality, as well as the ability to rapidly identify problems in the web-site design. Experiments on media rich sites including the SkyServer - a large multimedia web-based astronomy information repository demonstrate the efficacy and promise of the proposed approach.

  18. Mobile usage and sleep patterns among medical students.

    Science.gov (United States)

    Yogesh, Saxena; Abha, Shrivastava; Priyanka, Singh

    2014-01-01

    Exposure of humans to radio frequency electromagnetic field (EMF) both during receiving and transmitting the signals has amplified public and scientific debate about possible adverse effects on human health. The study was designed with the objective of assessing the extent of mobile phone use amongst medical students and finding correlation if any between the hours of usage of mobile to sleep pattern and quality. hundred medical students grouped as cases (n = 57) (> 2 hours/day of mobile usage) and control (n = 43) (≤ 2 hours/day of mobile usage) were examined for their sleep quality & pattern by Pittsburg sleep Quality Index (PSQI). Differences between groups were examined with the Mann Whitney "U" test for proportions (Quantitative values) and with Student't' test for continuous variables. The association of variables was analyzed by Spearman Rank's correlation. Probability was set at usage and sleep indices were observed in both genders (males r = 0.25; p = 0.04, females r = 0.31; p = 0.009). Evening usage of mobile phone in cases showed a statistically significant negative association (-0.606; p = 0.042) with Sleep quality (higher PSQI means sleep deprivation). Students using mobile for > 2 hours/day may cause sleep deprivation and day sleepiness affecting cognitive and learning abilities of medical students.

  19. An Efficient Back-off Mechanism for Simulation Study of VoWLAN Capacity Improvement using OPNET

    OpenAIRE

    Ahmed M. ABDEL NABI; Mohamed R. M. RIZK; Mohamed. S. IBRAHIM; Emad Eldin A. MAZIED

    2014-01-01

    Integration of delivering VoIP services over WLAN access networks (VoWLAN) increased the demand to support multiple of active simultaneous calls. Thus improving VoWLAN capacity has been addressed. The researchers are continuously contributing in improving VoWLAN capacity, (i.e. increasing the number of VoIP simultaneous calls), for various WLAN architectures. Although a lot of modifications have been developed for IEEE 802.11 standards toward improving its performance with real-time applicati...

  20. Pre-Authentication Schemes for UMTS-WLAN Interworking

    Directory of Open Access Journals (Sweden)

    Ali Al Shidhani

    2009-01-01

    Full Text Available Interworking Universal Mobile Telecommunication System (UMTS and IEEE 802.11 Wireless Local Area Networks (WLANs introduce new challenges including the design of secured and fast handover protocols. Handover operations within and between networks must not compromise the security of the networks involved. In addition, handovers must be instantaneous to sustain the quality of service (QoS of the applications running on the User Equipment (UE. There is a need to design fast and secured handover protocols to operate in UMTS-WLAN interworking architectures. This paper proposes two secured pre-authentication protocols in the UMTS-WLAN interworking architectures. Performance analysis of the proposed protocols show superior results in comparison to existing protocols in terms of authentication signaling cost, authentication delay and load on critical nodes involved in the authentication procedure. Additionally, the security of the proposed protocols was verified by the Automated Validation of Internet Security Protocols and Applications (AVISPA security analyzer.

  1. SON for LTE-WLAN access network selection : design and performance

    NARCIS (Netherlands)

    Willemen, P.; Laselva, D.; Wang, Y.; Kovács, I.; Djapic, R.; Moerman, I.

    2016-01-01

    Mobile network operators (MNOs) are deploying carrier-grade Wireless Local Area Network (WLAN) as an important complementary system to cellular networks. Access network selection (ANS) between cellular and WLAN is an essential component to improve network performance and user quality-of-service

  2. Improved Association and Disassociation Scheme for Enhanced WLAN Handover and VHO

    Directory of Open Access Journals (Sweden)

    Sungjin Shin

    2016-01-01

    Full Text Available The number of mobile devices and wireless connections is significantly increasing. Among many wireless protocol types, wireless local area networks (WLANs are expected to support a significant number of devices. Due to this reason, effective and efficient handover (HO and vertical handover (VHO support for WLAN mobile devices is important. A significant improvement in quality of service (QoS can be obtained by reducing the association and disassociation interruption time for user equipment (UE servicing real-time applications during WLAN HO and VHO operations. Based on this focus, this paper investigates the problem of using only the received signal strength indicator (RSSI in HO and VHO decisions, which is what the current IEEE 802.11 based WLAN systems use. Experimental results presented in this paper demonstrate that only using the RSSI results in significant interruption time during HO to another WLAN access point (AP or to a cellular base station during VHO. Therefore, in this paper, an improved association and disassociation scheme that can reduce the data interruption time (DIT and improve the throughput performance is proposed.

  3. Channel utilization based energy efficient RoF centralized enterprise WLAN

    NARCIS (Netherlands)

    DebBarma, D.; Wang, Q.; Chetan, B.M.; Niemegeers, I.; Heemstra De Groot, S.M.

    2016-01-01

    Centralized Enterprise WLAN (CE-WLAN) encompassing supernumerary access points (APs) are being used to provide capacity to indoor environments. The approach of over dimensioned deployment of APs to meet the capacity needs of users at critical time periods are advocated with little concern towards

  4. WLAN Technologies for Audio Delivery

    Directory of Open Access Journals (Sweden)

    Nicolas-Alexander Tatlas

    2007-01-01

    Full Text Available Audio delivery and reproduction for home or professional applications may greatly benefit from the adoption of digital wireless local area network (WLAN technologies. The most challenging aspect of such integration relates the synchronized and robust real-time streaming of multiple audio channels to multipoint receivers, for example, wireless active speakers. Here, it is shown that current WLAN solutions are susceptible to transmission errors. A detailed study of the IEEE802.11e protocol (currently under ratification is also presented and all relevant distortions are assessed via an analytical and experimental methodology. A novel synchronization scheme is also introduced, allowing optimized playback for multiple receivers. The perceptual audio performance is assessed for both stereo and 5-channel applications based on either PCM or compressed audio signals.

  5. Cost-Based Vertical Handover Decision Algorithm for WWAN/WLAN Integrated Networks

    Directory of Open Access Journals (Sweden)

    Kim LaeYoung

    2009-01-01

    Full Text Available Abstract Next generation wireless communications are expected to rely on integrated networks consisting of multiple wireless technologies. Heterogeneous networks based on Wireless Local Area Networks (WLANs and Wireless Wide Area Networks (WWANs can combine their respective advantages on coverage and data rates, offering a high Quality of Service (QoS to mobile users. In such environment, multi-interface terminals should seamlessly switch from one network to another in order to obtain improved performance or at least to maintain a continuous wireless connection. Therefore, network selection algorithm is important in providing better performance to the multi-interface terminals in the integrated networks. In this paper, we propose a cost-based vertical handover decision algorithm that triggers the Vertical Handover (VHO based on a cost function for WWAN/WLAN integrated networks. For the cost function, we focus on developing an analytical model of the expected cost of WLAN for the mobile users that enter the double-coverage area while having a connection in the WWAN. Our simulation results show that the proposed scheme achieves better performance in terms of power consumption and throughput than typical approach where WLANs are always preferred whenever the WLAN access is available.

  6. A flexible WLAN receiver

    NARCIS (Netherlands)

    Schiphorst, Roelof; Hoeksema, F.W.; Slump, Cornelis H.

    2003-01-01

    Flexible radio receivers are also called Software Defined Radios (SDRs) [1], [2]. The focus of our SDR project [3] is on designing the front end, from antenna to demodulation in bits, of a °exible, multi-standard WLAN receiver. We try to combine an instance of a (G)FSK receiver (Bluetooth) with an

  7. Security aspects of 3G-WLAN interworking

    DEFF Research Database (Denmark)

    Køien, Geir M.

    2003-01-01

    to roaming and mobility support. In short, WLAN systems are great for hot spot coverage, while 3G systems provide global coverage and the necessary network and management infrastructure to cater for security, roaming, and charging requirements. The focus of the article is on security aspects of 3GPP......Third-generation cellular systems will provide wide coverage and nearly universal roaming, but will not realistically live up to the bit rate expectations placed on them. On the other hand, WLAN systems already offer bit rates surpassing those of 3G systems, but are often found lacking with respect...

  8. Complex Codon Usage Pattern and Compositional Features of Retroviruses

    Directory of Open Access Journals (Sweden)

    Sourav RoyChoudhury

    2013-01-01

    Full Text Available Retroviruses infect a wide range of organisms including humans. Among them, HIV-1, which causes AIDS, has now become a major threat for world health. Some of these viruses are also potential gene transfer vectors. In this study, the patterns of synonymous codon usage in retroviruses have been studied through multivariate statistical methods on ORFs sequences from the available 56 retroviruses. The principal determinant for evolution of the codon usage pattern in retroviruses seemed to be the compositional constraints, while selection for translation of the viral genes plays a secondary role. This was further supported by multivariate analysis on relative synonymous codon usage. Thus, it seems that mutational bias might have dominated role over translational selection in shaping the codon usage of retroviruses. Codon adaptation index was used to identify translationally optimal codons among genes from retroviruses. The comparative analysis of the preferred and optimal codons among different retroviral groups revealed that four codons GAA, AAA, AGA, and GGA were significantly more frequent in most of the retroviral genes inspite of some differences. Cluster analysis also revealed that phylogenetically related groups of retroviruses have probably evolved their codon usage in a concerted manner under the influence of their nucleotide composition.

  9. Internet and Cell Phone Usage Patterns among Young Adults with Intellectual Disabilities

    Science.gov (United States)

    Jenaro, Cristina; Flores, Noelia; Cruz, Maribel; Pérez, Ma Carmen; Vega, Vanessa; Torres, Víctor A.

    2018-01-01

    Background: The risks and opportunities associated with the use of technologies are of growing research interest. Patterns of technology usage illuminate these opportunities and risks. However, no studies have assessed the usage patterns (frequency, duration, and intensity) and related factors in young people with intellectual disabilities.…

  10. Dual Wideband Antenna for WLAN/WiMAX and Satellite System Applications Based on a Metamaterial Transmission Line

    International Nuclear Information System (INIS)

    Jin Da-Lin; Hong Jing-Song; Xiong Han

    2012-01-01

    A dual band planar antenna based on metamaterial transmission lines is presented for WLAN, WiMAX, and satellite system communication applications. This antenna is composed of an interdigital capacitor and a ground plane with triangular shaped slots on its top edges to broaden the impedance bandwidth. The measured bandwidth for 10 dB return loss is from 3.29 to 4.27 GHz and 5.04 to 9.8 GHz, covering the 5.2/5.8 GHz WLAN, 3.5/5.5 GHz WiMAX bands, and the X-band satellite communication systems at 7.4 GHz. The proposed antenna exhibits stable monopole-like radiation patterns and enough gains across the dual operating bands

  11. Dual band monopole antenna for WLAN 2.4/5.2/5.8 with truncated ground

    Science.gov (United States)

    Chandan, Bharti, Gagandeep; Srivastava, Toolika; Rai, B. S.

    2018-04-01

    A dual-band mono-pole antenna is proposed for Wireless LAN applications. The WLAN band is obtained by cutting a rectangular ring and a circular slot in the radiating patch. The overall dimension of antenna is 17×16.5×0.8 mmł. The frequency bands obtained are 2.38-2.9 GHz and 4.7-6.1 GHz with ≤ - 10 dB return loss which covers WLAN 2.4/5.2/5.8 GHz bands. The behavior of the antenna is analyzed in terms of radiation pattern, peak realized gain, radiation efficiency and surface current density. It has dipole like radiation pattern with gain of 2.33 - 4.31 dBi for lower frequency band and 4.29 - 5.16 dBi for upper frequency band with radiation efficiency of 95-98% and 93-96% respectively. The parametric analysis is carried out to understand the consequence of the various shape parameters and to get an optimum design. The simulation and measurement gave the results having close agreement.

  12. E-book usage on a global scale: patterns, trends and opportunities

    Directory of Open Access Journals (Sweden)

    Michael Levine-Clark

    2015-07-01

    Full Text Available This study examines worldwide usage of over 600,000 e-books from EBL and ebrary. Using multiple modes of analysis, the study shows that there are variations in usage by geographic region as well as by subject. The study examines usage in relation to availability of titles, different types of usage per session, usage of the top ten percent of titles, and intensive and extensive use. These patterns can be used for benchmarking and as a model for local e-book studies.

  13. Design of UWB Filter with WLAN Notch

    Directory of Open Access Journals (Sweden)

    Harish Kumar

    2012-01-01

    Full Text Available UWB technology- (operating in broad frequency range of 3.1–10.6 GHz based filter with WLAN notch has shown great achievement for high-speed wireless communications. To satisfy the UWB system requirements, a band pass filter with a broad pass band width, low insertion loss, and high stop-band suppression are needed. UWB filter with wireless local area network (WLAN notch at 5.6 GHz and 3 dB fractional bandwidth of 109.5% using a microstrip structure is presented. Initially a two-transmission-pole UWB band pass filter in the frequency range 3.1–10.6 GHz is achieved by designing a parallel-coupled microstrip line with defective ground plane structure using GML 1000 substrate with specifications: dielectric constant 3.2 and thickness 0.762 mm at centre frequency 6.85 GHz. In this structure a λ/4 open-circuited stub is introduced to achieve the notch at 5.6 GHz to avoid the interference with WLAN frequency which lies in the desired UWB band. The design structure was simulated on electromagnetic circuit simulation software and fabricated by microwave integrated circuit technique. The measured VNA results show the close agreement with simulated results.

  14. The modeling of a digital forensic readiness approach to WLAN digital forensics

    CSIR Research Space (South Africa)

    Ngobeni, S

    2010-01-01

    Full Text Available digital forensics is seen as not only a counterproposal but as a solution to the rapid increase of cyber crime in WLANs. The key issue impacting WLAN digital forensics is that, it is an enormous challenge to intercept and preserve all the communications...

  15. Patterns of Internet Usage: Learning Sphere and the Socio-cultural Context

    Directory of Open Access Journals (Sweden)

    Hossein Ebrahimabadi

    2009-11-01

    Full Text Available In addition to the curriculum and the learning targets, there are some other points –as “the culture of the real life”, “patterns of communication and virtual-life’s experiencing”, and generally “pattern of communication and internet usage”- should be considered in evaluating internet. Applying results of a survey on the impacts of both the web-based and the traditional educational methods on students’ learning and motivation, the present study explores the patterns of internet usage. Research method is experimental, using the t test for independent groups and analyzing multi-variable regression, and some points as the population, method of sampling and data gathering is explained in the article. Results show that there is a meaningful difference between the grades of the test group and the witness group; thus variable of “the internet usage” could predict changes in learning. In other words, supra-usage of internet would decrease learning and curriculum development. However, using internet for scientific and schooling would cause students to correlate their patterns of computer and internet usage. As results show, decline in entertaining usage of internet is related to the socio-cultural context, way and amount of participating in the web, and the quality of virtual learning sphere, rather than the interest or disinterest of the users.

  16. A Codesigned Compact Dual-Band Filtering Antenna with PIN Loaded for WLAN Applications

    Directory of Open Access Journals (Sweden)

    Shanxiong Chen

    2014-01-01

    Full Text Available A codesigned compact dual-band filtering antenna incorporating a PIN diode for 2.45/5.2 GHz wireless local area network (WLAN applications is proposed in this paper. The integrated filtering antenna system consists of a simple monopole radiator, a microstrip dual-band band-pass filter, and a PIN diode. The performance of the filtering antenna is notably promoted by optimizing the impedance between the antenna and the band-pass filter, with good selectivity and out-of-band rejection. The design process follows the approach of the synthesis of band-pass filter. In addition, the PIN diode is incorporated in the filtering antenna for further size reduction, which also widens the coverage of the bandwidth by about 230% for 2.4 GHz WLAN. With the presence of small size and good filtering performances, the proposed filtering antenna is a good candidate for the wireless communication systems. Prototypes of the proposed filtering antenna incorporating a PIN diode are fabricated and measured. The measured results including return losses and radiation patterns are presented.

  17. Seguridad en redes inalámbricas de área local (WLAN)

    OpenAIRE

    Luaces Novoa, José Manuel

    2013-01-01

    Introducción a las WLAN, estudio de las diferentes amenazas, auditoría de los actuales protocolos de seguridad y caso práctico de implementación de servidor RADIUS. Introducció a les WLAN, estudi de les diferents amenaces, auditoria dels actuals protocols de seguretat i cas pràctic d'implementació de servidor RADIUS. Bachelor thesis for the Telecommunication Technologies program on Telematics.

  18. Quad Band Handset Antenna for LTE MIMO and WLAN Application

    Directory of Open Access Journals (Sweden)

    H. S. Wong

    2014-01-01

    Full Text Available A compact quad band antenna for long-term evolution (LTE MIMO and WLAN application in the handset is presented in this paper. The proposed antenna comprises two symmetrical quarter wavelength radiating strips and a slotted ground plane. On the ground plane, a T-shaped slot is cut from the bottom. Two symmetrical P-shaped slots are etched at both sides of the ground plane. The radiating strips and slots generate a lower resonant at 780 MHz and an upper resonant at 2.350 GHz to cover LTE 700 Band 14, LTE 2300, 2.4 GHz WLAN, and LTE 2500. A novel isolation technique by placing a rectangular patch between the radiating strips is presented. The rectangular patch creates a dedicated current path for each radiating strip. The proposed antenna has high isolation of less than −18 dBi at LTE 2300, 2.4 GHz WLAN, and LTE 2500 band.

  19. Ubiquitous and Seamless Localization: Fusing GNSS Pseudoranges and WLAN Signal Strengths

    Directory of Open Access Journals (Sweden)

    Philipp Richter

    2017-01-01

    Full Text Available Ubiquitous global positioning is not feasible by GNSS alone, as it lacks accurate position fixes in dense urban centres and indoors. Hybrid positioning methods have been developed to aid GNSS in those environments. Fingerprinting localization in wireless local area networks (WLANs is a promising aiding system because of its availability, accuracy, and error mechanisms opposed to that of GNSS. This article presents a low-cost approach to ubiquitous, seamless positioning based on a particle filter integrating GNSS pseudoranges and WLAN received signal strength indicators (RSSIs. To achieve accurate location estimates indoors/outdoors and in the transition zones, appropriate likelihood functions are essential as they determine the influence of each sensor information on the position estimate. We model the spatial RSSI distributions with Gaussian processes and use these models to predict RSSIs at the particle’s positions to obtain point estimates of the RSSI likelihood function. The particle filter’s performance is assessed with real data of two test trajectories in an environment challenging for GNSS and WLAN fingerprinting localization. Outcomes of an extended Kalman filter using pseudoranges and a WLAN position as observation is included as benchmark. The proposed algorithm achieves accurate and robust seamless localization with a median accuracy of five meters.

  20. Fuzzy usage pattern in customizing public transport fleet and its maintenance options

    Science.gov (United States)

    Husniah, H.; Herdiani, L.; Kusmaya; Supriatna, A. K.

    2018-05-01

    In this paper we study a two-dimensional maintenance contract for a fleet of public transport, such as buses, shuttle etc. The buses are sold with a two-dimensional warranty. The warranty and the maintenance contract are characterized by two parameters – age and usage – which define a two-dimensional region. However, we use one dimensional approach to model these age and usage of the buses. The under-laying maintenance service contracts is the one which offers policy limit cost to protect a service provider (an agent) from over claim and to pursue the owner to do maintenance under specified cost in house. This in turn gives benefit for both the owner of the buses and the agent of service contract. The decision problem for an agent is to determine the optimal price for each option offered, and for the owner is to select the best contract option. We use a Nash game theory formulation in order to obtain a win-win solution – i.e. the optimal price for the agent and the optimal option for the owner. We further assume that there will be three different usage pattern of the buses, i.e. low, medium, and high pattern of the usage rate. In many situations it is often that we face a blur boundary between the adjacent patterns. In this paper we look for the optimal price for the agent and the optimal option for the owner, which minimizes the expected total cost while considering the fuzziness of the usage rate pattern.

  1. Student Media Usage Patterns and Non-Traditional Learning in Higher Education

    Science.gov (United States)

    Zawacki-Richter, Olaf; Müskens, Wolfgang; Krause, Ulrike; Alturki, Uthman; Aldraiweesh, Ahmed

    2015-01-01

    A total of 2,338 students at German universities participated in a survey, which investigated media usage patterns of so-called traditional and non-traditional students (Schuetze & Wolter, 2003). The students provided information on the digital devices that they own or have access to, and on their usage of media and e-learning tools and…

  2. A Rectangular Ring, Open-Ended Monopole Antenna with Two Symmetric Strips for WLAN and WiMAX Applications

    Directory of Open Access Journals (Sweden)

    Joong-Han Yoon

    2013-01-01

    Full Text Available A triple-band rectangular ring, open-ended monopole antenna with symmetric L strips for wireless local area network (WLAN/Worldwide Interoperability of Microwave Access (WiMAX applications is proposed. The proposed antenna consists of two symmetric folded arms and L strips. Based on the concept, a prototype of the proposed triple antenna has been designed, fabricated, and tested. The numerical and experimental results demonstrated that the proposed antenna satisfied the −10 dB impedance bandwidth requirement while simultaneously covering the WLAN and WiMAX bands. Furthermore, this paper presented and discussed the 2D radiation patterns and 3D gains according to the results of the experiment. The proposed antenna’s peak gain varied between 2.17 and 4.93 dBi, and its average gain varied between −2.97 and −0.53 dBi.

  3. Determination of the duty cycle of WLAN for realistic radio frequency electromagnetic field exposure assessment.

    Science.gov (United States)

    Joseph, Wout; Pareit, Daan; Vermeeren, Günter; Naudts, Dries; Verloock, Leen; Martens, Luc; Moerman, Ingrid

    2013-01-01

    Wireless Local Area Networks (WLANs) are commonly deployed in various environments. The WLAN data packets are not transmitted continuously but often worst-case exposure of WLAN is assessed, assuming 100% activity and leading to huge overestimations. Actual duty cycles of WLAN are thus of importance for time-averaging of exposure when checking compliance with international guidelines on limiting adverse health effects. In this paper, duty cycles of WLAN using Wi-Fi technology are determined for exposure assessment on large scale at 179 locations for different environments and activities (file transfer, video streaming, audio, surfing on the internet, etc.). The median duty cycle equals 1.4% and the 95th percentile is 10.4% (standard deviation SD = 6.4%). Largest duty cycles are observed in urban and industrial environments. For actual applications, the theoretical upper limit for the WLAN duty cycle is 69.8% and 94.7% for maximum and minimum physical data rate, respectively. For lower data rates, higher duty cycles will occur. Although counterintuitive at first sight, poor WLAN connections result in higher possible exposures. File transfer at maximum data rate results in median duty cycles of 47.6% (SD = 16%), while it results in median values of 91.5% (SD = 18%) at minimum data rate. Surfing and audio streaming are less intensively using the wireless medium and therefore have median duty cycles lower than 3.2% (SD = 0.5-7.5%). For a specific example, overestimations up to a factor 8 for electric fields occur, when considering 100% activity compared to realistic duty cycles. Copyright © 2012 Elsevier Ltd. All rights reserved.

  4. Opportunistic Error Correction for WLAN Applications

    NARCIS (Netherlands)

    Shao, X.; Schiphorst, Roelof; Slump, Cornelis H.

    2008-01-01

    The current error correction layer of IEEE 802.11a WLAN is designed for worst case scenarios, which often do not apply. In this paper, we propose a new opportunistic error correction layer based on Fountain codes and a resolution adaptive ADC. The key part in the new proposed system is that only

  5. Internet and cell phone usage patterns among young adults with intellectual disabilities.

    Science.gov (United States)

    Jenaro, Cristina; Flores, Noelia; Cruz, Maribel; Pérez, Ma Carmen; Vega, Vanessa; Torres, Víctor A

    2018-03-01

    The risks and opportunities associated with the use of technologies are of growing research interest. Patterns of technology usage illuminate these opportunities and risks. However, no studies have assessed the usage patterns (frequency, duration, and intensity) and related factors in young people with intellectual disabilities. Questionnaires on Internet and cell phone usage patterns, the Internet Over-Use Scale and the Cell-Phone Over-Use Scale, as well as the Beck Depression Inventory were filled out in one-on-one interviews of 216 youth with intellectual disabilities. Young people with disabilities make more social and recreational rather than educational use of these tools, and show higher rates of excessive use of both technologies than a comparison group of 410 young people without disabilities. Also, their overuse is associated with other unhealthy behaviors. The framework of support needs of people with disabilities should be considered to promote healthy Internet and cell phone use. © 2017 John Wiley & Sons Ltd.

  6. Inferring motion and location using WLAN RSSI

    NARCIS (Netherlands)

    Kavitha Muthukrishnan, K.; van der Zwaag, B.J.; Havinga, Paul J.M.; Fuller, R.; Koutsoukos, X.

    2009-01-01

    We present novel algorithms to infer movement by making use of inherent fluctuations in the received signal strengths from existing WLAN infrastructure. We evaluate the performance of the presented algorithms based on classification metrics such as recall and precision using annotated traces

  7. A highly linear power amplifier for WLAN

    International Nuclear Information System (INIS)

    Jin Jie; Shi Jia; Ai Baoli; Zhang Xuguang

    2016-01-01

    A three-stage power amplifier (PA) for WLAN application in 2.4-2.5 GHz is presented. The proposed PA employs an adaptive bias circuit to adjust the operating point of the PA to improve the linearity of the PA. Two methods to short the 2nd harmonic circuit are compared in the area of efficiency and gain of the PA. The PA is taped out in the process of 2 μm InGaP/GaAs HBT and is tested by the evaluation board. The measured results show that 31.5 dB power gain and 29.3 dBm P 1dB with an associated 40.4% power added efficiency (PAE) under the single tone stimulus. Up to 26.5 dBm output power can be achieved with an error vector magnitude (EVM) of lower than 3% under the 64QAM/OFDM WLAN stimulus. (paper)

  8. Usage Patterns of a Mobile Palliative Care Application.

    Science.gov (United States)

    Zhang, Haipeng; Liu, David; Marks, Sean; Rickerson, Elizabeth M; Wright, Adam; Gordon, William J; Landman, Adam

    2018-06-01

    Fast Facts Mobile (FFM) was created to be a convenient way for clinicians to access the Fast Facts and Concepts database of palliative care articles on a smartphone or tablet device. We analyzed usage patterns of FFM through an integrated analytics platform on the mobile versions of the FFM application. The primary objective of this study was to evaluate the usage data from FFM as a way to better understand user behavior for FFM as a palliative care educational tool. This is an exploratory, retrospective analysis of de-identified analytics data collected through the iOS and Android versions of FFM captured from November 2015 to November 2016. FFM App download statistics from November 1, 2015, to November 1, 2016, were accessed from the Apple and Google development websites. Further FFM session data were obtained from the analytics platform built into FFM. FFM was downloaded 9409 times over the year with 201,383 articles accessed. The most searched-for terms in FFM include the following: nausea, methadone, and delirium. We compared frequent users of FFM to infrequent users of FFM and found that 13% of all users comprise 66% of all activity in the application. Demand for useful and scalable tools for both primary palliative care and specialty palliative care will likely continue to grow. Understanding the usage patterns for FFM has the potential to inform the development of future versions of Fast Facts. Further studies of mobile palliative care educational tools will be needed to further define the impact of these educational tools.

  9. Comparative studies on codon usage pattern of chloroplasts and ...

    Indian Academy of Sciences (India)

    Unknown

    different genomic organization and mutation pressures in nuclear and chloroplast genes. The results of Nc-plots and neutrality plots ... As an important organelle of plants, the chloroplast has its own genomic environment and ... leading to the suggestion that the translation mechanism and patterns of codon usage in ...

  10. Genome-Wide Analysis of the Synonymous Codon Usage Patterns in Riemerella anatipestifer

    Directory of Open Access Journals (Sweden)

    Jibin Liu

    2016-08-01

    Full Text Available Riemerella anatipestifer (RA belongs to the Flavobacteriaceae family and can cause a septicemia disease in poultry. The synonymous codon usage patterns of bacteria reflect a series of evolutionary changes that enable bacteria to improve tolerance of the various environments. We detailed the codon usage patterns of RA isolates from the available 12 sequenced genomes by multiple codon and statistical analysis. Nucleotide compositions and relative synonymous codon usage (RSCU analysis revealed that A or U ending codons are predominant in RA. Neutrality analysis found no significant correlation between GC12 and GC3 (p > 0.05. Correspondence analysis and ENc-plot results showed that natural selection dominated over mutation in the codon usage bias. The tree of cluster analysis based on RSCU was concordant with dendrogram based on genomic BLAST by neighbor-joining method. By comparative analysis, about 50 highly expressed genes that were orthologs across all 12 strains were found in the top 5% of high CAI value. Based on these CAI values, we infer that RA contains a number of predicted highly expressed coding sequences, involved in transcriptional regulation and metabolism, reflecting their requirement for dealing with diverse environmental conditions. These results provide some useful information on the mechanisms that contribute to codon usage bias and evolution of RA.

  11. Smartphone Usage Patterns by Canadian Neurosurgery Residents: A National Cross-Sectional Survey.

    Science.gov (United States)

    Kameda-Smith, Michelle Masayo; Iorio-Morin, Christian; Winkler-Schwartz, Alexander; Ahmed, Uzair S; Bergeron, David; Bigder, Mark; Dakson, Ayoub; Elliott, Cameron A; Guha, Daipayan; Lavergne, Pascal; Makarenko, Serge; Taccone, Michael S; Tso, Michael; Wang, Bill; Fortin, David

    2018-03-01

    Smartphones and their apps are used ubiquitously in medical practice. However, in some cases their use can be at odds with current patient data safety regulations such as Canada's Personal Health Information Protection Act of 2004. To assess current practices and inform mobile application development, we sought to better understand mobile device usage patterns among Canadian neurosurgery residents. Through the Canadian Neurosurgery Research Collaborative, an online survey characterizing smartphone ownership and usage patterns was developed and sent to all Canadian neurosurgery resident in April of 2016. Questionnaires were collected and completed surveys analyzed. Of 146 eligible residents, 76 returned completed surveys (52% response rate). Of these 99% of respondents owned a smartphone, with 79% running on Apple's iOS. Four general mobile uses were identified: 1) communication between members of the medical team, 2) decision support, 3) medical reference, and 4) documentation through medical photography. Communication and photography were areas where the most obvious breaches in the Canadian Personal Health Information Protection Act were noted, with 89% of respondents taking pictures of patients' radiologic studies and 75% exchanging them with Short Message System. Hospital policies had no impact on user behaviors. Smartphones are used daily by most neurosurgery residents. Identified usage patterns are associated with perceived gains in efficacy and challenges in privacy and data reliability. We believe creating and improving workflows that address these usage patterns has a greater potential to improve privacy than changing policies and enforcing regulations. Copyright © 2017 Elsevier Inc. All rights reserved.

  12. A reconfigurable analog baseband circuit for WLAN, WCDMA, and Bluetooth

    International Nuclear Information System (INIS)

    Tong Tao; Chi Baoyong; Wang Ziqiang; Zhang Ying; Jiang Hanjun; Wang Zhihua

    2010-01-01

    A reconfigurable analog baseband circuit for WLAN, WCDMA, and Bluetooth in 0.35 μm CMOS is presented. The circuit consists of two variable gain amplifiers (VGA) in cascade and a G m -C elliptic low-pass filter (LPF). The filter-order and the cut-off frequency of the LPF can be reconfigured to satisfy the requirements of various applications. In order to achieve the optimum power consumption, the bandwidth of the VGAs can also be dynamically reconfigured and some G m cells can be cut off in the given application. Simulation results show that the analog baseband circuit consumes 16.8 mW for WLAN, 8.9 mW for WCDMA and only 6.5 mW for Bluetooth, all with a 3 V power supply. The analog baseband circuit could provide -10 to +40 dB variable gain, third-order low pass filtering with 1 MHz cut-off frequency for Bluetooth, fourth-order low pass filtering with 2.2 MHz cut-off frequency for WCDMA, and fifth-order low pass filtering with 11 MHz cut-off frequency for WLAN, respectively. (semiconductor integrated circuits)

  13. A reconfigurable analog baseband circuit for WLAN, WCDMA, and Bluetooth

    Energy Technology Data Exchange (ETDEWEB)

    Tong Tao; Chi Baoyong; Wang Ziqiang; Zhang Ying; Jiang Hanjun; Wang Zhihua, E-mail: tongt05@gmail.co [Institute of Microelectronics, Tsinghua University, Beijing 100084 (China)

    2010-05-15

    A reconfigurable analog baseband circuit for WLAN, WCDMA, and Bluetooth in 0.35 {mu}m CMOS is presented. The circuit consists of two variable gain amplifiers (VGA) in cascade and a G{sub m}-C elliptic low-pass filter (LPF). The filter-order and the cut-off frequency of the LPF can be reconfigured to satisfy the requirements of various applications. In order to achieve the optimum power consumption, the bandwidth of the VGAs can also be dynamically reconfigured and some G{sub m} cells can be cut off in the given application. Simulation results show that the analog baseband circuit consumes 16.8 mW for WLAN, 8.9 mW for WCDMA and only 6.5 mW for Bluetooth, all with a 3 V power supply. The analog baseband circuit could provide -10 to +40 dB variable gain, third-order low pass filtering with 1 MHz cut-off frequency for Bluetooth, fourth-order low pass filtering with 2.2 MHz cut-off frequency for WCDMA, and fifth-order low pass filtering with 11 MHz cut-off frequency for WLAN, respectively. (semiconductor integrated circuits)

  14. Modified Sierpinski Gasket Patch Antenna for UMTS and 2.4/5.2 WLAN

    Directory of Open Access Journals (Sweden)

    Y. E. Ali

    2013-05-01

    Full Text Available A modified Sierpinski Gasket fractal antenna for multiband application is proposed in this paper. The modified ground plane and the microstrip feed are used to obtain the wider bandwidth at the resonance frequency. The antenna is designed and printed on two layers FR-4 substrate (ϵr=4.4 and h=1.6 mm to cover the UMTS and 2.4/5.2 WLAN. The radiation pattern of the proposed antenna is similar to an omnidirectional. The proposed antenna has maximum gain of 1.88, 1.6, 4.31 dB at 2, 2.4, 5.2 GHz, respectively The properties of the antenna such as return losses, radiation pattern, input resistance and gain are determined via numerical CST Microwave Studio 2010 software.

  15. Using Clustering Techniques To Detect Usage Patterns in a Web-based Information System.

    Science.gov (United States)

    Chen, Hui-Min; Cooper, Michael D.

    2001-01-01

    This study developed an analytical approach to detecting groups with homogenous usage patterns in a Web-based information system. Principal component analysis was used for data reduction, cluster analysis for categorizing usage into groups. The methodology was demonstrated and tested using two independent samples of user sessions from the…

  16. A Low-Power WLAN Communication Scheme for IoT WLAN Devices Using Wake-Up Receivers

    Directory of Open Access Journals (Sweden)

    Hanseul Hong

    2018-01-01

    Full Text Available In this paper, we propose a delay- and power-efficient, multi-user, low-power wireless local area network (WLAN communication scheme for Internet of Things (IoT WLAN devices. Extremely low-power operation is one of the key requirements of emerging IoT devices. However, the current duty-cycle-based power saving approach may incur large access delay times owing to the trade-offs between the power consumption and the access delay. In order to reduce this delay and enhance the power-saving performance, wake-up receiver-based schemes have been proposed. However, because wake-up receiver-based schemes do not consider multiuser operation in dense communication environments, large delays are inevitable in the case of multiuser operation. In order to provide extremely low-power operation and under 1-mW standby power with reduced delay, we employed the optimized multiuser transmission scheduling of IEEE 802.11ax in the proposed scheme and proper enhanced distributed channel access (EDCA parameter settings. This is with the aim to reduce the delay caused by long wake-up times, and to avoid collisions caused by simultaneous transmission in uplink multiuser scenario. By using the proposed scheme, simultaneous IoT communication with multiple mobile IoT devices is possible while providing low-power operation. Simulation results verified the outstanding delay performance of the proposed scheme.

  17. Heterogeneous mobile phone ownership and usage patterns in Kenya.

    Science.gov (United States)

    Wesolowski, Amy; Eagle, Nathan; Noor, Abdisalan M; Snow, Robert W; Buckee, Caroline O

    2012-01-01

    The rapid adoption of mobile phone technologies in Africa is offering exciting opportunities for engaging with high-risk populations through mHealth programs, and the vast volumes of behavioral data being generated as people use their phones provide valuable data about human behavioral dynamics in these regions. Taking advantage of these opportunities requires an understanding of the penetration of mobile phones and phone usage patterns across the continent, but very little is known about the social and geographical heterogeneities in mobile phone ownership among African populations. Here, we analyze a survey of mobile phone ownership and usage across Kenya in 2009 and show that distinct regional, gender-related, and socioeconomic variations exist, with particularly low ownership among rural communities and poor people. We also examine patterns of phone sharing and highlight the contrasting relationships between ownership and sharing in different parts of the country. This heterogeneous penetration of mobile phones has important implications for the use of mobile technologies as a source of population data and as a public health tool in sub-Saharan Africa.

  18. A highly linear power amplifier for WLAN

    Science.gov (United States)

    Jie, Jin; Jia, Shi; Baoli, Ai; Xuguang, Zhang

    2016-02-01

    A three-stage power amplifier (PA) for WLAN application in 2.4-2.5 GHz is presented. The proposed PA employs an adaptive bias circuit to adjust the operating point of the PA to improve the linearity of the PA. Two methods to short the 2nd harmonic circuit are compared in the area of efficiency and gain of the PA. The PA is taped out in the process of 2 μm InGaP/GaAs HBT and is tested by the evaluation board. The measured results show that 31.5 dB power gain and 29.3 dBm P1dB with an associated 40.4% power added efficiency (PAE) under the single tone stimulus. Up to 26.5 dBm output power can be achieved with an error vector magnitude (EVM) of lower than 3% under the 64QAM/OFDM WLAN stimulus. Project supported by the National Natural Science Foundation of China (No. 61201244) and the Natural Science Fund of SUES (No. E1-0501-14-0168).

  19. Throughput of a MIMO OFDM based WLAN system

    NARCIS (Netherlands)

    Schenk, T.C.W.; Dolmans, G.; Modonesi, I.

    2004-01-01

    In this paper, the system throughput of a wireless local-area-network (WLAN) based on multiple-input multipleoutput orthogonal frequency division multiplexing (MIMO OFDM) is studied. A broadband channel model is derived from indoor channel measurements. This model is used in simulations to evaluate

  20. SSTL Based Low Power Thermal Efficient WLAN Specific 32bit ALU Design on 28nm FPGA

    DEFF Research Database (Denmark)

    Kalia, Kartik; Pandey, Bishwajeet; Das, Teerath

    2016-01-01

    at minimum and maximum temperature as compared to all other considered I/O standards. This design has application where 32bit ALU design is considered for designing an electronic device such as WLAN. The design can be implemented on different nano chips for better efficiency depending upon the design...... with consideration of airflow toward hit sink and different frequency on which ALU operate in network processor or any WLAN devices. We have done total power analysis of WLAN operating on different frequencies. We have considered a set of frequencies, which are based on IEEE 802.11 standards. First we did...... efficient IO standard. While analyzing we found out that when WLAN device shift from 343.15K to 283.15K, there is maximum thermal power reduction in SSTL135_R as compared to all considered I/O standards. When we compared same I/Os for different frequencies we observed maximum thermal efficiency in SSTL15...

  1. Fragility issues of medical video streaming over 802.11e-WLAN m-health environments.

    Science.gov (United States)

    Tan, Yow-Yiong Edwin; Philip, Nada; Istepanian, Robert H

    2006-01-01

    This paper presents some of the fragility issues of a medical video streaming over 802.11e-WLAN in m-health applications. In particular, we present a medical channel-adaptive fair allocation (MCAFA) scheme for enhanced QoS support for IEEE 802.11 (WLAN), as a modification for the standard 802.11e enhanced distributed coordination function (EDCF) is proposed for enhanced medical data performance. The medical channel-adaptive fair allocation (MCAFA) proposed extends the EDCF, by halving the contention window (CW) after zeta consecutive successful transmissions to reduce the collision probability when channel is busy. Simulation results show that MCAFA outperforms EDCF in-terms of overall performance relevant to the requirements of high throughput of medical data and video streaming traffic in 3G/WLAN wireless environments.

  2. Comparative analysis of codon usage bias and codon context patterns between dipteran and hymenopteran sequenced genomes.

    Directory of Open Access Journals (Sweden)

    Susanta K Behura

    Full Text Available BACKGROUND: Codon bias is a phenomenon of non-uniform usage of codons whereas codon context generally refers to sequential pair of codons in a gene. Although genome sequencing of multiple species of dipteran and hymenopteran insects have been completed only a few of these species have been analyzed for codon usage bias. METHODS AND PRINCIPAL FINDINGS: Here, we use bioinformatics approaches to analyze codon usage bias and codon context patterns in a genome-wide manner among 15 dipteran and 7 hymenopteran insect species. Results show that GAA is the most frequent codon in the dipteran species whereas GAG is the most frequent codon in the hymenopteran species. Data reveals that codons ending with C or G are frequently used in the dipteran genomes whereas codons ending with A or T are frequently used in the hymenopteran genomes. Synonymous codon usage orders (SCUO vary within genomes in a pattern that seems to be distinct for each species. Based on comparison of 30 one-to-one orthologous genes among 17 species, the fruit fly Drosophila willistoni shows the least codon usage bias whereas the honey bee (Apis mellifera shows the highest bias. Analysis of codon context patterns of these insects shows that specific codons are frequently used as the 3'- and 5'-context of start and stop codons, respectively. CONCLUSIONS: Codon bias pattern is distinct between dipteran and hymenopteran insects. While codon bias is favored by high GC content of dipteran genomes, high AT content of genes favors biased usage of synonymous codons in the hymenopteran insects. Also, codon context patterns vary among these species largely according to their phylogeny.

  3. Understanding usage patterns of electric kettle and energy saving potential

    International Nuclear Information System (INIS)

    Murray, D.M.; Liao, J.; Stankovic, L.; Stankovic, V.

    2016-01-01

    Highlights: • Time-of-use analysis to motivate kettle usage and consumption prediction. • Identification of households whose kettle usage and consumption is outside the norm. • Mathematical model to estimate water volume from consumed power measurements only. • Quantification of energy savings if a household uses its kettle more efficiently. • Kettle usage and demand prediction using an Adaptive Neuro Fuzzy Inference System. - Abstract: The availability of smart metering and smart appliances enables detecting and characterising appliance use in a household, quantifying energy savings through efficient appliance use and predicting appliance-specific demand from load measurements is possible. With growing electric kettle ownership and usage, lack of any efficiency labelling guidelines for the kettle, slow technological progress in improving kettle efficiency relative to other domestic appliances, and current consumer attitudes, urgent investigation into consumer kettle usage patterns is warranted. From an efficiency point of view, little can be done about the kettle, which is more efficient than other methods of heating water such as the stove top kettle. However, since a majority households use the kettle inefficiently by overfilling, in order to meet energy targets, it is imperative to quantify inefficient usage and predict demand. For the purposes of scalability, we propose tools that depend only on load measurement data for quantifying and visualising kettle usage and energy consumption, assessing energy wastage through overfilling via our proposed electric kettle model, and predicting kettle-specific demand, from which we can estimate potential energy savings in a household and across a housing stock. This is demonstrated using data from a longitudinal study across a sample of 14 UK households for a two-year period.

  4. Using time-of-flight for WLAN localization: feasibility study

    NARCIS (Netherlands)

    Kavitha Muthukrishnan, K.; Koprinkov, G.T.; Meratnia, Nirvana; Lijding, M.E.M.

    Although signal strength based techniques are widely employed for WLAN localization, they generally suffer from providing highly accurate location information. In this paper, we first present the general shortcomings of the signal strength based approaches used for WLANbased localization and then

  5. Using Weighted Graphs for Computationally Efficient WLAN Location Determination

    DEFF Research Database (Denmark)

    Thomsen, Bent; Hansen, Rene

    2007-01-01

    use of existing WLAN infrastructures. The technique consists of building a radio map of signal strength measurements which is searched to determine a position estimate. While the fingerprinting technique has produced good positioning accuracy results, the technique incurs a substantial computational...

  6. Indoor Propagation Measurement for WLAN Systems Operating in 2.45 GHz ISM Band

    Directory of Open Access Journals (Sweden)

    P. Pechac

    2002-12-01

    Full Text Available For a planning of indoor Wireless LAN systems working in the ISMband, the signal propagation prediction is needed. In this article, themeasurement campaign based on two types of measurements at 2.45 GHz isintroduced. The first type of the measurement was a classicalnarrowband signal level measurement within indoor scenario withoutpresence of people. The aim of this measurement was to find empiricalparameters for COST231 Multi-Wall and One-Slope models. In order tostatistically describe the time varying nature of the received envelopeof the signal, at WLAN 2.45 GHz band, the second part of measurementcampaign was accomplished. In this case, the signal level was measuredusing commercial WLAN PCMCIA cards in two notebooks. Probabilitydensity functions and corresponding cumulative distribution functionswere set and discussed based on the specific locations and orientationof one of the notebooks. Results from both measurement campaigns werecompared and conclusions are drawn for the needs of practical planningof indoor WLAN systems coverage.

  7. Miniaturized CPW-Fed Triband Antenna with Asymmetric Ring for WLAN/WiMAX Applications

    Directory of Open Access Journals (Sweden)

    Shanshan Huang

    2014-01-01

    Full Text Available A compact CPW-fed triband slot antenna for WLAN/WiMAX applications is proposed. The proposed antenna is formed by an asymmetric ring, an inverted L-strip, and a straight strip. By employing these structures, the antenna can generate three operation bands with compact size and simple structure. The measured and simulated results show the presented antenna has impedance bandwidths of 100 MHz (2.39–2.49 GHz, 360 MHz (3.36–3.72 GHz, and 760 MHz (5.13–5.89 GHz, which covers both WLAN in the 2.4/5.2 GHz bands and WiMAX in the 3.5/5.5 GHz bands. The antenna is successfully simulated and measured, showing triple bands can be obtained by using three different radiators and also indicating that the proposed antenna is suitable for the WiMAX/WLAN applications.

  8. Mining for Social Media: Usage Patterns of Small Businesses

    Directory of Open Access Journals (Sweden)

    Balan Shilpa

    2017-03-01

    Full Text Available Background: Information can now be rapidly exchanged due to social media. Due to its openness, Twitter has generated massive amounts of data. In this paper, we apply data mining and analytics to extract the usage patterns of social media by small businesses. Objectives: The aim of this paper is to describe with an example how data mining can be applied to social media. This paper further examines the impact of social media on small businesses. The Twitter posts related to small businesses are analyzed in detail. Methods/Approach: The patterns of social media usage by small businesses are observed using IBM Watson Analytics. In this paper, we particularly analyze tweets on Twitter for the hashtag #smallbusiness. Results: It is found that the number of females posting topics related to small business on Twitter is greater than the number of males. It is also found that the number of negative posts in Twitter is relatively low. Conclusions: Small firms are beginning to understand the importance of social media to realize their business goals. For future research, further analysis can be performed on the date and time the tweets were posted.

  9. WLAN location sharing through a privacy observant architecture

    NARCIS (Netherlands)

    Kavitha Muthukrishnan, K.; Meratnia, Nirvana; Lijding, M.E.M.; Koprinkov, G.T.; Havinga, Paul J.M.

    In the last few years, WLAN has seen immense growth and it will continue this trend due to the fact that it provides convenient connectivity as well as high speed links. Furthermore, the infrastructure already exists in most public places and is cheap to extend. These advantages, together with the

  10. Dual Y-Shaped Monopole Antenna for Dual-Band WLAN/WiMAX Operations

    Directory of Open Access Journals (Sweden)

    Huiqing Zhai

    2014-01-01

    Full Text Available A dual-band design of monopole antenna with two coupled Y-shaped strips for WLAN/WiMAX applications is presented. By the introduction of dual Y-shaped strips, two separated impedance bandwidths of 22.4% (3.28~4.10 GHz and 19.2% (4.90~5.94 GHz can be obtained to meet the specifications of the WLAN/WiMAX communication band applications. The proposed antenna is successfully simulated, designed, and measured, demonstrating the matched impedance and good radiation characteristics with an overall dimension of 17.7×26×1 mm3.

  11. Implementation of DoS attack and mitigation strategies in IEEE 802.11b/g WLAN

    Science.gov (United States)

    Deng, Julia; Meng, Ke; Xiao, Yang; Xu, Roger

    2010-04-01

    IEEE 802.11 wireless Local Area Network (WLAN) becomes very prevalent nowadays. Either as a simple range extender for a home wired Ethernet interface, or as a wireless deployment throughout an enterprise, WLAN provides mobility, convenience, and low cost. However, an IEEE 802.11b/g wireless network uses the frequency of unlicensed 2.4GHz, which makes the network unsafe and more vulnerable than traditional Ethernet networks. As a result, anyone who is familiar with wireless network may initiate a Denial of Service (DoS) attack to influence the common communication of the network or even make it crash. In this paper, we present our studies on the DoS attacks and mitigation strategies for IEEE 802.11b/g WLANs and describe some initial implementations using IEEE 802.11b/g wireless devices.

  12. Water Use Patterns in Vietnamese Hotels: Modeling Toilet and Shower Usage

    Directory of Open Access Journals (Sweden)

    Kanako Toyosada

    2016-03-01

    Full Text Available Water saving is a key issue in rapidly developing countries, such as Vietnam, that face various water resource management challenges. This study investigated water-use patterns in a hotel in Ho Chi Minh City in Vietnam. It aimed to quantify the efficiency of water-saving devices through modeling toilet and shower usage patterns, including water consumption. The shift in hourly consumption of cold and hot water was also identified. Analysis revealed that, on average, a full toilet flush occurs 3.3 times/day, a half flush 3.0 times/day, water consumption due to shower usage is 48.1 L/day, showering time is 7.3 min/day and the shower water temperature is 37.7 °C. Shifting levels of hot and cold water use revealed high activity in the morning time and that there are two peaks, occurring in the morning and at night.

  13. Antibiotic usage pattern in selected poultry farms in Ogun state ...

    African Journals Online (AJOL)

    A survey was conducted from March 2011 to July 2011 on antibiotic usage pattern in selected poultry farms in Ogun State. Using a well-structured questionnaire, a total of 58 poultry farms were randomly surveyed from the four geo-political zones of Ogun State. All the 58 (100%) poultry farms used one or more antibiotics.

  14. Genome-wide comparative analysis of codon usage bias and codon context patterns among cyanobacterial genomes.

    Science.gov (United States)

    Prabha, Ratna; Singh, Dhananjaya P; Sinha, Swati; Ahmad, Khurshid; Rai, Anil

    2017-04-01

    With the increasing accumulation of genomic sequence information of prokaryotes, the study of codon usage bias has gained renewed attention. The purpose of this study was to examine codon selection pattern within and across cyanobacterial species belonging to diverse taxonomic orders and habitats. We performed detailed comparative analysis of cyanobacterial genomes with respect to codon bias. Our analysis reflects that in cyanobacterial genomes, A- and/or T-ending codons were used predominantly in the genes whereas G- and/or C-ending codons were largely avoided. Variation in the codon context usage of cyanobacterial genes corresponded to the clustering of cyanobacteria as per their GC content. Analysis of codon adaptation index (CAI) and synonymous codon usage order (SCUO) revealed that majority of genes are associated with low codon bias. Codon selection pattern in cyanobacterial genomes reflected compositional constraints as major influencing factor. It is also identified that although, mutational constraint may play some role in affecting codon usage bias in cyanobacteria, compositional constraint in terms of genomic GC composition coupled with environmental factors affected codon selection pattern in cyanobacterial genomes. Copyright © 2016 Elsevier B.V. All rights reserved.

  15. Frequency notching applicable to CMOS implementation of WLAN compatible IR-UWB pulse generators

    DEFF Research Database (Denmark)

    Shen, Ming; Mikkelsen, Jan H.; Jiang, Hao

    2012-01-01

    Due to overlapping frequency bands, IEEE 802.11a WLAN and Ultra Wide-Band systems potentially suffer from mutual interference problems. This paper proposes a method for inserting frequency notches into the IR-UWB power spectrum to ensure compatibility with WLAN systems. In contrast to conventional...... approaches where complicated waveform equations are used, the proposed method uses a dual-pulse frequency notching approach to achieve frequency suppression in selected bands. The proposed method offers a solution that is generically applicable to UWB pulse generators using different pulse waveforms...

  16. Usage patterns of personal care products: Important factors for exposure assessment

    NARCIS (Netherlands)

    Biesterbos, J.W.H.; Dudzina, T.; Delmaar, C.J.; Bakker, M.I.; Russel, F.G.M.; Goetz, N. von; Scheepers, P.T.J.; Roeleveld, N.

    2013-01-01

    Complete information regarding the use of personal care products (PCPs) by consumers is limited, but such information is crucial for realistic consumer exposure assessment. To fill this gap, a database was created with person-oriented information regarding usage patterns and circumstances of use for

  17. An Optimized 2.4GHz RF Power Amplifier Performance for WLAN System

    International Nuclear Information System (INIS)

    Ali, Mohammed H; Chakrabarty, C K; Hock, Goh C; Abdalla, Ahmed N

    2013-01-01

    Recently, the design of RF power amplifiers (PAs) for modern wireless systems are faced with a difficult tradeoff for example, cellphone; battery lifetime is largely determined by the power efficiency of the PA and high spectral efficiency which have ability to transmit data at the highest possible rate for a given channel bandwidth. This paper presents the design a multi stage class AB power Amplifier with high power added efficiency (PAE) and acceptable linearity for the WLAN applications. The open-circuited third harmonic control circuit enhances the efficiency of the PA without deteriorating the linearity of class-AB mode of the PA. The voltage and current waveforms are simulated to evaluate the appropriate operation for the modes. The effectiveness of the proposed controller has been verified by comparing proposed method with another methods using simulation study under a variety of conditions. The proposed circuit operation for a WLAN signals delivers a power-added efficiency (PAE) of 37.6% is measured at 31.6-dBm output power while dissipating 34.61 mA from a 1.8V supply. Finally, the proposed PA is show a good and acceptable result for the WLAN system.

  18. An Optimized 2.4GHz RF Power Amplifier Performance for WLAN System

    Science.gov (United States)

    Ali, Mohammed H.; Chakrabarty, C. K.; Abdalla, Ahmed N.; Hock, Goh C.

    2013-06-01

    Recently, the design of RF power amplifiers (PAs) for modern wireless systems are faced with a difficult tradeoff for example, cellphone; battery lifetime is largely determined by the power efficiency of the PA and high spectral efficiency which have ability to transmit data at the highest possible rate for a given channel bandwidth. This paper presents the design a multi stage class AB power Amplifier with high power added efficiency (PAE) and acceptable linearity for the WLAN applications. The open-circuited third harmonic control circuit enhances the efficiency of the PA without deteriorating the linearity of class-AB mode of the PA. The voltage and current waveforms are simulated to evaluate the appropriate operation for the modes. The effectiveness of the proposed controller has been verified by comparing proposed method with another methods using simulation study under a variety of conditions. The proposed circuit operation for a WLAN signals delivers a power-added efficiency (PAE) of 37.6% is measured at 31.6-dBm output power while dissipating 34.61 mA from a 1.8V supply. Finally, the proposed PA is show a good and acceptable result for the WLAN system.

  19. Bandwidth enhancement of monopole antenna with DGS for SHF and reconfigurable structure for WiMAX, WLAN and C-band applications

    Science.gov (United States)

    Beigi, P.; Mohammadi, P.

    2017-11-01

    In this study a reconfigurable antenna for WiMAX, WLAN, C-bands and SHF applications has been presented. The main body of antenna includes rectangular and L-shaped slotted ground plane and a rectangular patch with slotted feed line, for impedance bandwidth enhancement. In the proposed antenna, a PIN diode is used to adjust the frequency band to SHF, WiMAX, WLAN and C-bands applications. When PIN diode is forward-biased, the antenna covers the 3.5-31 GHz frequency range (i.e. a 160% bandwidth) and when the PIN diode is in its off-state, it operates between 3.4-5.8 GHz. The designed antenna, with a very small size of 12 × 18 × 1.6 mm3, has been fabricated and tested. The radiation pattern is approximately omnidirectional. Simulations and experimental results are in a good agreement with each other and suggest good performance for the presented antenna.

  20. Building an SDN enterprise WLAN based on virtual APs

    NARCIS (Netherlands)

    Sequeira, L.; Cruz, J.L. de la; Ruiz-Mas, J.; Saldana, J.; Fernandez-Navajas, J.; Almodovar, J.

    2017-01-01

    In this letter, the development and testing of an open enterprise Wi-Fi solution based on virtual access points (APs), managed by a central WLAN controller is presented. It allows seamless handovers between APs in different channels, maintaining the QoS of real-time services. The potential

  1. Usage pattern of personal care products in California households.

    Science.gov (United States)

    Wu, Xiangmei May; Bennett, Deborah H; Ritz, Beate; Cassady, Diana L; Lee, Kiyoung; Hertz-Picciotto, Irva

    2010-11-01

    Given the concern over the potential for health risks associated with certain ingredients (e.g., phthalates) in personal care products, usage patterns of ∼30 types of personal care products (e.g., shampoo, sunscreen, fragrance, etc.) were collected in 604 California households through a telephone interview. Preferences in selecting products, e.g., scented or unscented, aerosol, and brand loyalty, were also investigated. Participants were recruited in three age groups, children (mostly preschoolers), their parents, and adults age 55 or older. Use frequencies of various product types varied by sex, age group, race, education, and climatic region. Product use by parent and child from the same household were correlated. Use frequencies of products in the same class (e.g., skincare) were moderately correlated, which may impact aggregate exposures. Use frequencies observed in this study were generally in the same range as those reported in the EPA Exposure Factor Handbook, but we found differences for some individual products. Our study provides additional data on population-based usage patterns of a large collection of commonly used personal care products pertaining to several age groups and socio-demographic strata. This information will be valuable for exposure and risk assessments. Copyright © 2010 Elsevier Ltd. All rights reserved.

  2. Pattern of Internet Usage in Planning after-School Programs

    Directory of Open Access Journals (Sweden)

    T. Shahjafari

    2015-05-01

    Full Text Available The present research studies the pattern of the Internet usage by the third grade students of middle schools in the school year 2012-13 in Tehran. For this purpose, the needs of Iranian teenagers in virtual and cyber space have been identified and studied through an interdisciplinary approach. A researcher-made questionnaire and interviews with specialists and scholars in the fields of curriculum planning, educational technology, educational planning, information technology and communication were used based on an interdisciplinary approach. Finally, the needs of the students were divided and categorized into two factors of knowledge and skill, and individual and social characteristics on the basis of factor analysis method; the pattern of the Internet usage, including leisure factors and accessibility to information and sources, was designed and presented. Also, the results indicate that these factors have no direct effect on the network features and this effect occurs in relation to leisure factors through the location of the programs. Students’ interest in the Internet was mainly for the purposes of downloading videos and music and also playing online games and entertainment programs. This implies the necessity of attention on the part of planners to preparing and providing videos, games and educational, scientific and entertaining programs.

  3. Distributed Medium Access Control with SDMA Support for WLANs

    Science.gov (United States)

    Zhou, Sheng; Niu, Zhisheng

    With simultaneous multi-user transmissions, spatial division multiple access (SDMA) provides substantial throughput gain over the single user transmission. However, its implementation in WLANs with contention-based IEEE 802.11 MAC remains challenging. Problems such as coordinating and synchronizing the multiple users need to be solved in a distributed way. In this paper, we propose a distributed MAC protocol for WLANs with SDMA support. A dual-mode CTS responding mechanism is designed to accomplish the channel estimation and user synchronization required for SDMA. We analytically study the throughput performance of the proposed MAC, and dynamic parameter adjustment is designed to enhance the protocol efficiency. In addition, the proposed MAC protocol does not rely on specific physical layer realizations, and can work on legacy IEEE 802.11 equipment with slight software updates. Simulation results show that the proposed MAC outperforms IEEE 802.11 significantly, and that the dynamic parameter adjustment can effectively track the load variation in the network.

  4. SEMICONDUCTOR INTEGRATED CIRCUITS: A reconfigurable analog baseband circuit for WLAN, WCDMA, and Bluetooth

    Science.gov (United States)

    Tao, Tong; Baoyong, Chi; Ziqiang, Wang; Ying, Zhang; Hanjun, Jiang; Zhihua, Wang

    2010-05-01

    A reconfigurable analog baseband circuit for WLAN, WCDMA, and Bluetooth in 0.35 μm CMOS is presented. The circuit consists of two variable gain amplifiers (VGA) in cascade and a Gm-C elliptic low-pass filter (LPF). The filter-order and the cut-off frequency of the LPF can be reconfigured to satisfy the requirements of various applications. In order to achieve the optimum power consumption, the bandwidth of the VGAs can also be dynamically reconfigured and some Gm cells can be cut off in the given application. Simulation results show that the analog baseband circuit consumes 16.8 mW for WLAN, 8.9 mW for WCDMA and only 6.5 mW for Bluetooth, all with a 3 V power supply. The analog baseband circuit could provide -10 to +40 dB variable gain, third-order low pass filtering with 1 MHz cut-off frequency for Bluetooth, fourth-order low pass filtering with 2.2 MHz cut-off frequency for WCDMA, and fifth-order low pass filtering with 11 MHz cut-off frequency for WLAN, respectively.

  5. An Information-Based Approach to Precision Analysis of Indoor WLAN Localization Using Location Fingerprint

    Directory of Open Access Journals (Sweden)

    Mu Zhou

    2015-12-01

    Full Text Available In this paper, we proposed a novel information-based approach to precision analysis of indoor wireless local area network (WLAN localization using location fingerprint. First of all, by using the Fisher information matrix (FIM, we derive the fundamental limit of WLAN fingerprint-based localization precision considering different signal distributions in characterizing the variation of received signal strengths (RSSs in the target environment. After that, we explore the relationship between the localization precision and access point (AP placement, which can provide valuable suggestions for the design of the highly-precise localization system. Second, we adopt the heuristic simulated annealing (SA algorithm to optimize the AP locations for the sake of approaching the fundamental limit of localization precision. Finally, the extensive simulations and experiments are conducted in both regular line-of-sight (LOS and irregular non-line-of-sight (NLOS environments to demonstrate that the proposed approach can not only effectively improve the WLAN fingerprint-based localization precision, but also reduce the time overhead.

  6. A detailed analysis of codon usage patterns and influencing factors in Zika virus.

    Science.gov (United States)

    Singh, Niraj K; Tyagi, Anuj

    2017-07-01

    Recent outbreaks of Zika virus (ZIKV) in Africa, Latin America, Europe, and Southeast Asia have resulted in serious health concerns. To understand more about evolution and transmission of ZIKV, detailed codon usage analysis was performed for all available strains. A high effective number of codons (ENC) value indicated the presence of low codon usage bias in ZIKV. The effect of mutational pressure on codon usage bias was confirmed by significant correlations between nucleotide compositions at third codon positions and ENCs. Correlation analysis between Gravy values, Aroma values and nucleotide compositions at third codon positions also indicated some influence of natural selection. However, the low codon adaptation index (CAI) value of ZIKV with reference to human and mosquito indicated poor adaptation of ZIKV codon usage towards its hosts, signifying that natural selection has a weaker influence than mutational pressure. Additionally, relative dinucleotide frequencies, geographical distribution, and evolutionary processes also influenced the codon usage pattern to some extent.

  7. 97 Medical Apparatuses tested at the Academic Medical Center (AMC) Amsterdam for interference by WLAN/WiFi signals

    NARCIS (Netherlands)

    Hensbroek, R.

    2009-01-01

    This research describes the influence of WLAN 1 signals on medical apparatuses in the Academic Medical Center (AMC) Amsterdam. The results in this report were obtained by testing medical equipment with WLAN signals. A comparable research was reported earlier. See TNO report KvL/P&Z 2007.117 dated

  8. COMPACT DUAL-BAND INVERTED L SHAPED MONOPOLE ANTENNA FOR WLAN APPLICATIONS

    Directory of Open Access Journals (Sweden)

    K Sumathi

    2015-12-01

    Full Text Available A highly compact and an optimized design of an Inverted L shaped printed monopole antenna with a simple compact ground plane is proposed. To make the designed antenna suitable for implantation it is embedded in FR-4 substrate and is presented. The antenna is designed for dual-band operation at 2.4GHz and 5.2GHz. It is suitable for Wireless Local Area Network (WLAN applications with return loss (S11 < -10dB. The antenna has two different resonant current paths that support two resonances at 2.44GHz and 5.18GHz (forming an F-shaped structure. The size of the antenna is 32.5mm × 19.6mm × 1.6mm. The antenna design is simulated using the tool Advanced Design System (ADS 2014. This antenna design has good return loss and radiation characteristics in both the required frequency bands. The radiation pattern obtained from the proposed antenna is an Omni directional radiation pattern in the E and H plane over the frequency ranges 2.4GHz and 5.2GHz.

  9. Use Contexts and Usage Patterns of Interactive Case Simulation Tools by HIV Healthcare Providers in a Statewide Online Clinical Education Program.

    Science.gov (United States)

    Wang, Dongwen

    2017-01-01

    We analyzed four interactive case simulation tools (ICSTs) from a statewide online clinical education program. Results have shown that ICSTs are increasingly used by HIV healthcare providers. Smart phone has become the primary usage platform for specific ICSTs. Usage patterns depend on particular ICST modules, usage stages, and use contexts. Future design of ICSTs should consider these usage patterns for more effective dissemination of clinical evidence to healthcare providers.

  10. Mining for Social Media: Usage Patterns of Small Businesses

    OpenAIRE

    Balan, Shilpa; Rege, Janhavi

    2017-01-01

    Background: Information can now be rapidly exchanged due to social media. Due to its openness, Twitter has generated massive amounts of data. In this paper, we apply data mining and analytics to extract the usage patterns of social media by small businesses. Objectives: The aim of this paper is to describe with an example how data mining can be applied to social media. This paper further examines the impact of social media on small businesses. The Twitter posts related to small businesses are...

  11. Modeling and Analysis of Hybrid Cellular/WLAN Systems with Integrated Service-Based Vertical Handoff Schemes

    Science.gov (United States)

    Xia, Weiwei; Shen, Lianfeng

    We propose two vertical handoff schemes for cellular network and wireless local area network (WLAN) integration: integrated service-based handoff (ISH) and integrated service-based handoff with queue capabilities (ISHQ). Compared with existing handoff schemes in integrated cellular/WLAN networks, the proposed schemes consider a more comprehensive set of system characteristics such as different features of voice and data services, dynamic information about the admitted calls, user mobility and vertical handoffs in two directions. The code division multiple access (CDMA) cellular network and IEEE 802.11e WLAN are taken into account in the proposed schemes. We model the integrated networks by using multi-dimensional Markov chains and the major performance measures are derived for voice and data services. The important system parameters such as thresholds to prioritize handoff voice calls and queue sizes are optimized. Numerical results demonstrate that the proposed ISHQ scheme can maximize the utilization of overall bandwidth resources with the best quality of service (QoS) provisioning for voice and data services.

  12. Enabling active and healthy ageing decision support systems with the smart collection of TV usage patterns.

    Science.gov (United States)

    Billis, Antonis S; Batziakas, Asterios; Bratsas, Charalampos; Tsatali, Marianna S; Karagianni, Maria; Bamidis, Panagiotis D

    2016-03-01

    Smart monitoring of seniors behavioural patterns and more specifically activities of daily living have attracted immense research interest in recent years. Development of smart decision support systems to support the promotion of health smart homes has also emerged taking advantage of the plethora of smart, inexpensive and unobtrusive monitoring sensors, devices and software tools. To this end, a smart monitoring system has been used in order to extract meaningful information about television (TV) usage patterns and subsequently associate them with clinical findings of experts. The smart TV operating state remote monitoring system was installed in four elderly women homes and gathered data for more than 11 months. Results suggest that TV daily usage (time the TV is turned on) can predict mental health change. Conclusively, the authors suggest that collection of smart device usage patterns could strengthen the inference capabilities of existing health DSSs applied in uncontrolled settings such as real senior homes.

  13. Analysis of Log File Data to Understand Mobile Service Context and Usage Patterns

    Directory of Open Access Journals (Sweden)

    Bernhard Klein

    2013-09-01

    Full Text Available Several mobile acceptance models exist today that focus on user interface handling and usage frequency evaluation. Since mobile applications reach much deeper into everyday life, it is however important to better consider user behaviour for the service evaluation. In this paper we introduce the Behaviour Assessment Model (BAM, which is designed to gaining insights about how well services enable, enhance and replace human activities. More specifically, the basic columns of the evaluation framework concentrate on (1 service actuation in relation to the current user context, (2 the balance between service usage effort and benefit, and (3 the degree to which community knowledge can be exploited. The evaluation is guided by a process model that specifies individual steps of data capturing, aggregation, and final assessment. The BAM helps to gain stronger insights regarding characteristic usage hotspots, frequent usage patterns, and leveraging of networking effects showing more realistically the strengths and weaknesses of mobile services

  14. AIS Algorithm for Smart Antenna Application in WLAN

    Directory of Open Access Journals (Sweden)

    Evizal Abdul Kadir

    2015-07-01

    Full Text Available Increasing numbers of wireless local area networks (WLAN replacing wired networks have an impact on wireless network systems, causing issues such as interference. The smart antenna system is a method to overcome interference issues in WLANs. This paper proposes an artificial immune system (AIS for a switch beam smart antenna system. A directional antenna is introduced to aim the beam at the desired user. The antenna consists of 8 directional antennas, each of which covers 45 degrees, thus creating an omnidirectional configuration of which the beams cover 360 degrees. To control the beam switching, an inexpensive PIC 16F877 microchip was used. An AIS algorithm was implemented in the microcontroller, which uses the received radio signal strength of the mobile device as reference. This is compared for each of the eight beams, after which the AIS algorithm selects the strongest signal received by the system and the microcontroller will then lock to the desired beam. In the experiment a frequency of 2.4 GHz (ISM band was used for transmitting and receiving. A test of the system was conducted in an outdoor environment. The results show that the switch beam smart antenna worked fine based on locating the mobile device.

  15. Ambient RF energy scavenging: GSM and WLAN power density measurements

    NARCIS (Netherlands)

    Visser, H.J.; Reniers, A.C.F.; Theeuwes, J.A.C.

    2009-01-01

    To assess the feasibility of ambient RF energy scavenging, a survey of expected power density levels distant from GSM-900 and GSM-1800 base stations has been conducted and power density measurements have been performed in a WLAN environment. It appears that for distances ranging from 25 m to 100 m

  16. Codon Usage Patterns of Tyrosinase Genes in Clonorchis sinensis.

    Science.gov (United States)

    Bae, Young-An

    2017-04-01

    Codon usage bias (CUB) is a unique property of genomes and has contributed to the better understanding of the molecular features and the evolution processes of particular gene. In this study, genetic indices associated with CUB, including relative synonymous codon usage and effective numbers of codons, as well as the nucleotide composition, were investigated in the Clonorchis sinensis tyrosinase genes and their platyhelminth orthologs, which play an important role in the eggshell formation. The relative synonymous codon usage patterns substantially differed among tyrosinase genes examined. In a neutrality analysis, the correlation between GC 12 and GC 3 was statistically significant, and the regression line had a relatively gradual slope (0.218). NC-plot, i.e., GC 3 vs effective number of codons (ENC), showed that most of the tyrosinase genes were below the expected curve. The codon adaptation index (CAI) values of the platyhelminth tyrosinases had a narrow distribution between 0.685/0.714 and 0.797/0.837, and were negatively correlated with their ENC. Taken together, these results suggested that CUB in the tyrosinase genes seemed to be basically governed by selection pressures rather than mutational bias, although the latter factor provided an additional force in shaping CUB of the C. sinensis and Opisthorchis viverrini genes. It was also apparent that the equilibrium point between selection pressure and mutational bias is much more inclined to selection pressure in highly expressed C. sinensis genes, than in poorly expressed genes.

  17. Solar-Powered Airplane with Cameras and WLAN

    Science.gov (United States)

    Higgins, Robert G.; Dunagan, Steve E.; Sullivan, Don; Slye, Robert; Brass, James; Leung, Joe G.; Gallmeyer, Bruce; Aoyagi, Michio; Wei, Mei Y.; Herwitz, Stanley R.; hide

    2004-01-01

    An experimental airborne remote sensing system includes a remotely controlled, lightweight, solar-powered airplane (see figure) that carries two digital-output electronic cameras and communicates with a nearby ground control and monitoring station via a wireless local-area network (WLAN). The speed of the airplane -- typically <50 km/h -- is low enough to enable loitering over farm fields, disaster scenes, or other areas of interest to collect high-resolution digital imagery that could be delivered to end users (e.g., farm managers or disaster-relief coordinators) in nearly real time.

  18. Dual-Band Split-Ring Antenna Design for WLAN Applications

    OpenAIRE

    BAŞARAN, S. Cumhur; ERDEMLİ, Yunus E.

    2014-01-01

    A dual-band microstrip antenna based on split-ring elements is introduced for WLAN (2.4/5.2 GHz) applications. The proposed split-ring antenna (SRA) has a compact novel design which provides about 2% impedance-bandwidth without a need for additional matching network. Analysis and design of the proposed microstrip antenna is carried out by means of full-wave simulators based on the finite-element method.

  19. Dual-band dual-polarized array for WLAN applications

    CSIR Research Space (South Africa)

    Steyn, JM

    2009-01-01

    Full Text Available dual-band dual-polarized (DBDP) antenna design for WLAN applications. The antenna is in the form of an array consisting of four double-dipole radiators. The basic radiating element consists of a rhombus shaped dipole above a planar ground plane... the ground planes and the respective feedlines. Substrate cuts and difierent heights for the horizontal feedlines were necessary to achieve the latter. The 2nd conflguration (for vertical polarization) has a slightly difierent feeding network layout...

  20. An FEC Adaptive Multicast MAC Protocol for Providing Reliability in WLANs

    Science.gov (United States)

    Basalamah, Anas; Sato, Takuro

    For wireless multicast applications like multimedia conferencing, voice over IP and video/audio streaming, a reliable transmission of packets within short delivery delay is needed. Moreover, reliability is crucial to the performance of error intolerant applications like file transfer, distributed computing, chat and whiteboard sharing. Forward Error Correction (FEC) is frequently used in wireless multicast to enhance Packet Error Rate (PER) performance, but cannot assure full reliability unless coupled with Automatic Repeat Request forming what is knows as Hybrid-ARQ. While reliable FEC can be deployed at different levels of the protocol stack, it cannot be deployed on the MAC layer of the unreliable IEEE802.11 WLAN due to its inability to exchange ACKs with multiple recipients. In this paper, we propose a Multicast MAC protocol that enhances WLAN reliability by using Adaptive FEC and study it's performance through mathematical analysis and simulation. Our results show that our protocol can deliver high reliability and throughput performance.

  1. Radiation Pattern of Chair Armed Microstrip Antenna

    Science.gov (United States)

    Mishra, Rabindra Kishore; Sahu, Kumar Satyabrat

    2016-12-01

    This work analyzes planar antenna conformable to chair arm shaped surfaces for WLAN application. Closed form expressions for its radiation pattern are developed and validated using measurements on prototype and commercial EM code at 2.4 GHz.

  2. Analysis of 3D Modeling Software Usage Patterns for K-12 Students

    Science.gov (United States)

    Wu, Yi-Chieh; Liao, Wen-Hung; Chi, Ming-Te; Li, Tsai-Yen

    2016-01-01

    In response to the recent trend in maker movement, teachers are learning 3D techniques actively and bringing 3D printing into the classroom to enhance variety and creativity in designing lectures. This study investigates the usage pattern of a 3D modeling software, Qmodel Creator, which is targeted at K-12 students. User logs containing…

  3. Ultrawideband Vivaldi Antenna for DVB-T, WLAN, and WiMAX Applications

    Directory of Open Access Journals (Sweden)

    Dalia M. Elsheakh

    2014-01-01

    Full Text Available Compact Vivaldi patch antenna with a parasitic meander line is presented in this paper. A PIN diode switch is used to connect and disconnect ultrahigh frequency band (UHF with ultrawide bandwidth (UWB. The operating frequencies can be switched among different services, depending on the switching states (ON/OFF to add the lower band when required. This antenna is suitable for portable DVB-T which extended from 450 MHz to 850 MHz receiver applications and the WLAN (Wireless Local Area Network IEEE 802.11b,g (5.1–5.8 GHz frequency bands and WiMAX band (3.3–3.8 GHz. The measured reflection coefficient of the proposed antenna is compared with the simulated one; good agreement is observed. Also, simulated radiation pattern of the antenna is presented. All simulations are carried out using the EM commercial simulator, high frequency structure simulator (HFSS ver.13.

  4. A network resource availability model for IEEE802.11a/b-based WLAN carrying different service types

    Directory of Open Access Journals (Sweden)

    Luo Weizhi

    2011-01-01

    Full Text Available Abstract Operators of integrated wireless systems need to have knowledge of the resource availability in their different access networks to perform efficient admission control and maintain good quality of experience to users. Network availability depends on the access technology and the service types. Resource availability in a WLAN is complex to gather when UDP and TCP services co-exist. Previous study on IEEE802.11a/b derived the achievable throughput under the assumption of inelastic and uniformly distributed traffic. Further study investigated TCP connections and derived a model to calculate the effective transmission rate of packets under the assumption of saturated traffic flows. The assumptions are too stringent; therefore, we developed a model for evaluating WLAN resource availability that tries to narrow the gap to more realistic scenarios. It provides an indication of WLAN resource availability for admitting UDP/TCP requests. This article presents the assumptions, the mathematical formulations, and the effectiveness of our model.

  5. Kalman filter with a linear state model for PDR+WLAN positioning and its application to assisting a particle filter

    Science.gov (United States)

    Raitoharju, Matti; Nurminen, Henri; Piché, Robert

    2015-12-01

    Indoor positioning based on wireless local area network (WLAN) signals is often enhanced using pedestrian dead reckoning (PDR) based on an inertial measurement unit. The state evolution model in PDR is usually nonlinear. We present a new linear state evolution model for PDR. In simulated-data and real-data tests of tightly coupled WLAN-PDR positioning, the positioning accuracy with this linear model is better than with the traditional models when the initial heading is not known, which is a common situation. The proposed method is computationally light and is also suitable for smoothing. Furthermore, we present modifications to WLAN positioning based on Gaussian coverage areas and show how a Kalman filter using the proposed model can be used for integrity monitoring and (re)initialization of a particle filter.

  6. A Multi-QoS Aggregation Mechanism for Improved Fairness in WLAN

    DEFF Research Database (Denmark)

    Gatnau, Marta; Catania, Davide; Cattoni, Andrea Fabio

    2013-01-01

    The 802.11e and subsequently the 802.11n amendments brought Quality of Service (QoS) into the Wireless Local Area Network (WLAN) arena, in order to provide higher access priority to certain types of traffic such as video and voice. Unfortunately these improvements are not enough, since in very...

  7. Shifted Known Symbol Padding for Efficient Data Communication in a WLAN Context

    NARCIS (Netherlands)

    Rousseaux, O.; Leus, G.; Moonen, M.

    2007-01-01

    To allow for a computationally efficient equalization scheme for the frequency-selective transmission channels encountered in wireless local area network (WLAN) applications, cyclic prefix (CP) block transmission schemes have been proposed, such as single-carrier CP (SC-CP) and multi-carrier CP

  8. Service in power stations. Improving workflow through adoption of WLAN, RFID, and e-Procurement technologies; Service im Kraftwerk. Verbesserung der Ablaeufe durch den Einsatz von WLAN, RFID, e-Procurement

    Energy Technology Data Exchange (ETDEWEB)

    Schellenberg, N [Siemens Power Generation L, Karlsruhe (Germany)

    2007-07-01

    WLAN, RFID and e-Procurement have revolutionized workflows in different industry branches and are here for the mainstay. The following report shows some of the current applications of these technologies today and illustrates a vision for potential application in power plant maintenance. (orig.)

  9. Incorporating antenna beamswitching technique into drivers for IEEE802.11 WLAN devices

    CSIR Research Space (South Africa)

    Mofolo, M

    2015-11-23

    Full Text Available the beamswitching technique for switched parasitic array (SPA) and electronically steerable parasitic array radiator (ESPAR) antennas in the drivers for IEEE802.11 WLAN devices. The modifications of the open source drivers (ath5k and ath9k) to enable real...

  10. An Analysis of Impact Factors for Positioning Performance in WLAN Fingerprinting Systems Using Ishikawa Diagrams and a Simulation Platform

    Directory of Open Access Journals (Sweden)

    Keqiang Liu

    2017-01-01

    Full Text Available Many factors influence the positioning performance in WLAN RSSI fingerprinting systems, and summary of these factors is an important but challenging job. Moreover, impact analysis on nonalgorithm factors is significant to system application and quality control but little research has been conducted. This paper analyzes and summarizes the potential impact factors by using an Ishikawa diagram considering radio signal transmitting, propagating, receiving, and processing. A simulation platform was developed to facilitate the analysis experiment, and the paper classifies the potential factors into controllable, uncontrollable, nuisance, and held-constant factors considering simulation feasibility. It takes five nonalgorithm controllable factors including APs density, APs distribution, radio signal propagating attenuation factor, radio signal propagating noise, and RPs density into consideration and adopted the OFAT analysis method in experiment. The positioning result was achieved by using the deterministic and probabilistic algorithms, and the error was presented by RMSE and CDF. The results indicate that the high APs density, signal propagating attenuation factor, and RPs density, with the low signal propagating noise level, are favorable to better performance, while APs distribution has no particular impact pattern on the positioning error. Overall, this paper has made great potential contribution to the quality control of WLAN fingerprinting solutions.

  11. Analysis of codon usage patterns in Morus notabilis based on genome and transcriptome data.

    Science.gov (United States)

    Wen, Yan; Zou, Ziliang; Li, Hongshun; Xiang, Zhonghuai; He, Ningjia

    2017-06-01

    Codons play important roles in regulating gene expression levels and mRNA half-lives. However, codon usage and related studies in multicellular organisms still lag far behind those in unicellular organisms. In this study, we describe for the first time genome-wide patterns of codon bias in Morus notabilis (mulberry tree), and analyze genome-wide codon usage in 12 other species within the order Rosales. The codon usage of M. notabilis was affected by nucleotide composition, mutation pressure, nature selection, and gene expression level. Translational selection optimal codons were identified and highly expressed genes of M. notabilis tended to use the optimal codons. Genes with higher expression levels have shorter coding region and lower amino acid complexity. Housekeeping genes showed stronger translational selection, which, notably, was not caused by the large differences between the expression level of housekeeping genes and other genes.

  12. A Printed Monopole Antenna for Triple-Band WLAN/WiMAX Applications

    Directory of Open Access Journals (Sweden)

    Huiqing Zhai

    2015-01-01

    Full Text Available A new compact design of monopole antenna for triple-band WLAN/WiMAX applications with two band-notches based on broadband antenna is presented. By introducing a stub loaded ground and two new paper clip structures etched on radiation patch, a compact overall dimension 31 mm × 33 mm × 1 mm and three separated operating bands effectively covering 2.4/5.2/5.8 GHz WLAN bands and 2.5/3.5/5.5 GHz WiMAX bands can be achieved. Compared with familiar U type slot, the introduced compact paper clip structure can save about 37% of dimension regions, which could effectively improve efficiency of band-notch formation. Simulated and measured results demonstrate that the proposed antenna has good dipole-like radiation characteristics with appreciable gain across the operating bands. Besides, main parameters of the two etched paper clip structures are investigated to control the positions and bandwidths of the two stop-bands, respectively, on basis of which the three working bands can be adjusted independently.

  13. Techniques for Improving the Accuracy of 802.11 WLAN-Based Networking Experimentation

    Directory of Open Access Journals (Sweden)

    Portoles-Comeras Marc

    2010-01-01

    Full Text Available Wireless networking experimentation research has become highly popular due to both the frequent mismatch between theory and practice and the widespread availability of low-cost WLAN cards. However, current WLAN solutions present a series of performance issues, sometimes difficult to predict in advance, that may compromise the validity of the results gathered. This paper surveys recent literature dealing with such issues and draws attention on the negative results of starting experimental research without properly understanding the tools that are going to be used. Furthermore, the paper details how a conscious assessment strategy can prevent placing wrong assumptions on the hardware. Indeed, there are numerous techniques that have been described throughout the literature that can be used to obtain a deeper understanding of the solutions that have been adopted. The paper surveys these techniques and classifies them in order to provide a handful reference for building experimental setups from which accurate measurements may be obtained.

  14. Handoff Between a Wireless Local Area Network (WLAN and a Wide Area Network (UMTS

    Directory of Open Access Journals (Sweden)

    J. Sánchez–García

    2009-04-01

    Full Text Available With the appearance of wireless data networks with variable coverage, band width and handoff strategies, in addition to the growing need of mobile nodes to freely roam among these networks, the support of an interoperable handoff strategy for hybrid wireless data networks is a requirement that needs to be addressed. The current trend in wireless data networks is to offer multimedia access to mobile users by employing the wireless local area network (WLAN standard IEEE802.11 while the user is located indoors; on the other hand, 3rd generation wireless networks (WAN are being deployed to provide coverage while the user is located outdoors. As a result, the mobile node will require a handoff mechanism to allow the user to roam between WLAN and WAN environments; up to this date several strategies have been proposed (Sattari et al., 2004 and HyoJin, 2007 in the literature, however, none of these have been standardized to date. To support this interoperability, the mobile node must be equipped with configurable wireless inetrfaces to support the handoff between the WLAN and the WAN networks. In this work a new algorithm is proposed to allow a mobile node to roam between a wireless local area network (IEEE802.11 and a WAN base station (UMTS, while employing IP mobility support. The algorithm is implemented in simulation, using the Network Simulator 2.

  15. CIRCULARLY POLARIZED SLOT ANTENNA WITH COMPACT SIZE FOR WLAN/WIMAX APPLICATION

    Directory of Open Access Journals (Sweden)

    Azim Rezaei Motlagh

    2014-01-01

    Full Text Available In this letter a circle patch that have two slots in ground and patch is presented. The antenna is operated in WLAN/WiMAX at 4.7~6 GHz. The 3dB axial ratio bandwidth is 0.5GHz at 5.3~5.8GHz. Comparison results between measured and simulated of antenna are acceptable.

  16. Distributed Antenna System for Mitigating Shadowing Effect in 60 GHz WLAN

    NARCIS (Netherlands)

    Wang, Qing; Debbarma, Diptanil; Lo, Anthony; Cao, Zizheng; Niemegeers, Ignas; Heemstra, Sonia

    2015-01-01

    The 60 GHz unlicensed frequency band has been adopted to support high data rate WLAN applications. The problem of this frequency band is that the wireless signal is vulnerable to the shadowing of objects. Especially in indoor scenarios, humans may frequently block the signal paths that cause

  17. Socio-Economic Factors Affecting Home Internet Usage Patterns in Central Queensland

    Directory of Open Access Journals (Sweden)

    Wal J. Taylor

    2003-01-01

    Full Text Available Governments and other policy makers are concerned with the gap in home Internet usage between people from metropolitan and rural areas. A survey conducted in Central Queensland, Australia examined differences in home Internet usage patterns between young and old, male and female, people in urban and rural areas, married and unmarried, well-educated and less educated, rich and poor, and employed and unemployed and found significant differences. These results highlight areas for further research and provide a basis for government agencies and industries to consider these associations in future policy formulation for regional development using ICT. The research suggested that further research should be conducted to monitor consuming behaviors of the youngest age group in Internet use for entertainment and information search in order to detect possible Internet overuse or addiction. In addition, further research should be conducted to find out what people search for on the Internet, and if for employment opportunities, financial incentives are suggested for the unemployed people.

  18. Internet-usage patterns of immigrants in the process of intercultural adaptation.

    Science.gov (United States)

    Chen, Wenli

    2010-08-01

    This paper investigates Internet-usage patterns of immigrants, and seeks to identify the correlation between Internet use and intercultural adaptation. The study focuses on mainland Chinese immigrants in Singapore, and was conducted via a nationwide telephone survey. The results show that immigrants tend to change their preferences on Internet use to reflect their residence in the host country. In particular, the longer an immigrant resides in the host country, the less likely they would be to surf their original country's websites and the more likely they would be to communicate with local people via the Internet. More importantly, differences in Internet usage are found to have a significant impact on immigrants' intercultural adaptation. In an online environment, the social communication in the host country is a critical component that can facilitate or impede immigrants' successful adaptation to the host country, whereas ethnic social communication also plays a role at the initial stage of transition.

  19. Gaining insights into the codon usage patterns of TP53 gene across eight mammalian species.

    Directory of Open Access Journals (Sweden)

    Tarikul Huda Mazumder

    Full Text Available TP53 gene is known as the "guardian of the genome" as it plays a vital role in regulating cell cycle, cell proliferation, DNA damage repair, initiation of programmed cell death and suppressing tumor growth. Non uniform usage of synonymous codons for a specific amino acid during translation of protein known as codon usage bias (CUB is a unique property of the genome and shows species specific deviation. Analysis of codon usage bias with compositional dynamics of coding sequences has contributed to the better understanding of the molecular mechanism and the evolution of a particular gene. In this study, the complete nucleotide coding sequences of TP53 gene from eight different mammalian species were used for CUB analysis. Our results showed that the codon usage patterns in TP53 gene across different mammalian species has been influenced by GC bias particularly GC3 and a moderate bias exists in the codon usage of TP53 gene. Moreover, we observed that nature has highly favored the most over represented codon CTG for leucine amino acid but selected against the ATA codon for isoleucine in TP53 gene across all mammalian species during the course of evolution.

  20. Estudio de técnicas de gestión de recursos para mejorar la eficiencia de sistemas WLAN

    OpenAIRE

    Cateura Díaz, Alejandro

    2005-01-01

    El presente trabajo de fin de carrera se sitúa en el ámbito de las comunicaciones inalámbricas y concretamente en las redes WLAN basadas en el estándar IEEE 802.11. Los objetivos del trabajo han sido proponer y estudiar técnicas basadas en el diseño Cross-Layer con el fin de mejorar la eficiencia y el aprovechamiento de los recursos disponibles en redes WLAN. La idea fundamental del diseño Cross-Layer consiste en permitir un intercambio de información entre las capas del mod...

  1. Comparative investigation of the various determinants that influence the codon and amino acid usage patterns in the genus Bifidobacterium.

    Science.gov (United States)

    Roy, Ayan; Mukhopadhyay, Subhasish; Sarkar, Indrani; Sen, Arnab

    2015-06-01

    Various strains of the genus Bifidobacterium are crucial members of the human, animal and insect gut, associated with beneficial probiotic activities. An extensive analysis on codon and amino acid usage of the GC rich genus Bifidobacterium has been executed in the present study. Multivariate statistical analysis revealed a coupled effect of GC compositional constraint and natural selection for translational efficiency to be operative in producing the observed codon usage variations. Gene expression level was inferred to be the most crucial factor governing the codon usage patterns. Amino acid usage was found to be influenced significantly by hydrophobic and aromatic character of the encoded proteins. Gene expressivity and protein energetic cost also had considerable impact on the differential mode of amino acid usage. The genus was found to strictly obey the cost-minimization hypothesis as was reflected from the amino acid usage patterns of the potential highly expressed gene products. Evolutionary analysis revealed that the highly expressed genes were candidates to extreme evolutionary selection pressure and indicated a high degree of conservation at the proteomic level. Interestingly, the complimentary strands of replication appeared to evolve under similar evolutionary constraints which might be addressed as a consequence of absence of replicational selection and lack of strand-specific asymmetry among the members of the genus. Thus, the present endeavor confers considerable know-how pertaining to the codon and amino acid usage intricacies in Bifidobacterium and might prove handy for further scientific investigations associated with the concerned domain.

  2. How parental attitudes affect the risky computer and Internet usage patterns of adolescents: a population-based study in the Bursa District of Turkey.

    Science.gov (United States)

    Uncu, Yeşim; Vural, Pinar; Büyükuysal, Cağatay; Alper, Züleyha; Kiliç, Emine Zinnur

    2014-12-01

    We aimed to evaluate the computer usage patterns of adolescents and to determine the effects of family life and parental attitude on these patterns. This was a descriptive, cross-sectional, population-based survey that included 935 children between 11 and 16 years of age who were students in the second level of primary school and their parents as well. The following instruments were used in the survey: student and parent questionnaires on computer usage patterns and the Parental Attitude Research Instrument (PARI) to assess parental attitudes towards child-rearing and family life. Of the study population, the majority of the students had a computer in their homes and spent a lot of time on the Internet. Parental control over the amount of time spent on the Internet and the websites that were visited had sometimes limited and contradictory effects on computer usage among the students. A democratic parental attitude was the best approach. Using the computer as a reward or punishment had a negative impact on the children's computer usage patterns. Although parents are confused concerning the benefits and harms of the Internet for their children and not certain how to manage their children's use of the computer and safe navigation of the Internet, a democratic parental attitude appears to be the best approach for reaching the most beneficial computer usage patterns for students.

  3. World Wide Web Usage Mining Systems and Technologies

    Directory of Open Access Journals (Sweden)

    Wen-Chen Hu

    2003-08-01

    Full Text Available Web usage mining is used to discover interesting user navigation patterns and can be applied to many real-world problems, such as improving Web sites/pages, making additional topic or product recommendations, user/customer behavior studies, etc. This article provides a survey and analysis of current Web usage mining systems and technologies. A Web usage mining system performs five major tasks: i data gathering, ii data preparation, iii navigation pattern discovery, iv pattern analysis and visualization, and v pattern applications. Each task is explained in detail and its related technologies are introduced. A list of major research systems and projects concerning Web usage mining is also presented, and a summary of Web usage mining is given in the last section.

  4. Compact Modified Swastika Shape Patch Antenna for WLAN/WiMAX Applications

    Directory of Open Access Journals (Sweden)

    M. Samsuzzaman

    2014-01-01

    Full Text Available A compact simple structure modified Swastika shape multiband patch antenna is designed and investigated. The antenna, which occupies an overall dimension of 0.305λ × 0.305λ × 0.012λ at lower frequency, has a simple structure which comprises of a planar wide square slot in the ground with four slits and Swastika shape radiation patch with a rectangular slot. The proposed Swastika shape antenna was designed and analyzed by using a finite element method based high frequency structural simulator HFSS. The experimental and numerical results exhibit that the antenna operates over the frequency ranges 950 MHz (2.28–3.23 GHz, 660 MHz (3.28–3.94 GHz, and 1120 MHz (5.05–6.17 GHz suitable for WLAN (2.4/5.2/5.8 GHz and WiMAX 2.5/3.5/5.5 GHz applications. It has a good omnidirectional radiation pattern and reaches 3.97 dBi at 2.44 GHz, 4.04 dBi at 3.5 GHz, and 3.25 dBi at the band of 5.98 GHz. A prototype is fabricated and then measured. The experimental and simulation results show good impedance bandwidth, radiation pattern, and stable gain across the operating bands.

  5. Textile antenna integrated with compact AMC and parasitic elements for WLAN/WBAN applications

    Science.gov (United States)

    Lago, Herwansyah; Soh, Ping Jack; Jamlos, Mohd Faizal; Shohaimi, Nursuriati; Yan, Sen; Vandenbosch, Guy A. E.

    2016-12-01

    A wearable antenna fully designed and fabricated using textile is presented. Both antenna and artificial magnetic conductor plane are designed for operation in the wireless local area network (WLAN)/wireless body area network (WBAN) band from 2.4 to 2.5 GHz. The AMC unit element is designed based on the rectangular patch structure, which is then integrated using slots and slits for bandwidth broadening. Meanwhile, the combination of the slits and L-shaped parasitic elements applied at four edges of the rectangular antenna structure enabled unidirectional radiation outwards from the body. The structure is coaxially fed using a rectangular ring slot centered on the radiating element. Simulated and measured reflection and radiation performance indicate a satisfactory agreement, fulfilling the requirements for WLAN/WBAN applications both in free space and on body. The shielding effectiveness provided by the AMC plane is also evaluated numerically in terms of specific absorption rate, indicating levels below the European regulatory limit of 2 W/kg.

  6. An exploratory study of treated-bed nets in Timor-Leste: patterns of intended and alternative usage

    Directory of Open Access Journals (Sweden)

    Wilder-Smith Annelies

    2011-07-01

    Full Text Available Abstract Background The Timor-Leste Ministry of Health has recently finalized the National Malaria Control Strategy for 2010-2020. A key component of this roadmap is to provide universal national coverage with long-lasting insecticide-treated nets (LLINs in support of achieving the primary goal of reducing both morbidity and mortality from malaria by 30% in the first three years, followed by a further reduction of 20% by end of the programme cycle in 2020 1. The strategic plan calls for this target to be supported by a comprehensive information, education and communication (IEC programme; however, there is limited prior research into household and personal usage patterns to assist in the creation of targeted, effective, and socio-culturally specific behaviour change materials. Methods Nine separate focus group discussions (FGDs were carried out in Dili, Manatuto, and Covalima districts, Democratic Republic of Timor-Leste, in July 2010. These focus groups primarily explored themes of perceived malaria risk, causes of malaria, net usage patterns within families, barriers to correct and consistent usage, and the daily experience of users (both male and female in households with at least one net. Comprehensive qualitative analysis utilized open source analysis software. Results The primary determinants of net usage were a widespread perception that nets could or should only be used by pregnant women and young children, and the availability of sufficient sleeping space under a limited number of nets within households. Both nuisance biting and disease prevention were commonly cited as primary motivations for usage, while seasonality was not a significant factor. Long-term net durability and ease of hanging were seen as key attributes in net design preference. Very frequent washing cycles were common, potentially degrading net effectiveness. Finally, extensive re-purposing of nets (fishing, protecting crops was both reported and observed, and may

  7. Codon usage bias: causative factors, quantification methods and genome-wide patterns: with emphasis on insect genomes.

    Science.gov (United States)

    Behura, Susanta K; Severson, David W

    2013-02-01

    Codon usage bias refers to the phenomenon where specific codons are used more often than other synonymous codons during translation of genes, the extent of which varies within and among species. Molecular evolutionary investigations suggest that codon bias is manifested as a result of balance between mutational and translational selection of such genes and that this phenomenon is widespread across species and may contribute to genome evolution in a significant manner. With the advent of whole-genome sequencing of numerous species, both prokaryotes and eukaryotes, genome-wide patterns of codon bias are emerging in different organisms. Various factors such as expression level, GC content, recombination rates, RNA stability, codon position, gene length and others (including environmental stress and population size) can influence codon usage bias within and among species. Moreover, there has been a continuous quest towards developing new concepts and tools to measure the extent of codon usage bias of genes. In this review, we outline the fundamental concepts of evolution of the genetic code, discuss various factors that may influence biased usage of synonymous codons and then outline different principles and methods of measurement of codon usage bias. Finally, we discuss selected studies performed using whole-genome sequences of different insect species to show how codon bias patterns vary within and among genomes. We conclude with generalized remarks on specific emerging aspects of codon bias studies and highlight the recent explosion of genome-sequencing efforts on arthropods (such as twelve Drosophila species, species of ants, honeybee, Nasonia and Anopheles mosquitoes as well as the recent launch of a genome-sequencing project involving 5000 insects and other arthropods) that may help us to understand better the evolution of codon bias and its biological significance. © 2012 The Authors. Biological Reviews © 2012 Cambridge Philosophical Society.

  8. Lecture Attendance and Web Based Lecture Technologies: A Comparison of Student Perceptions and Usage Patterns

    Science.gov (United States)

    von Konsky, Brian R.; Ivins, Jim; Gribble, Susan J.

    2009-01-01

    This paper investigates the impact of web based lecture recordings on learning and attendance at lectures. Student opinions regarding the perceived value of the recordings were evaluated in the context of usage patterns and final marks, and compared with attendance data and student perceptions regarding the usefulness of lectures. The availability…

  9. Recommendation Systems for Geoscience Data Portals Built by Analyzing Usage Patterns

    Science.gov (United States)

    Crosby, C.; Nandigam, V.; Baru, C.

    2009-04-01

    Since its launch five years ago, the National Science Foundation-funded GEON Project (www.geongrid.org) has been providing access to a variety of geoscience data sets such as geologic maps and other geographic information system (GIS)-oriented data, paleontologic databases, gravity and magnetics data and LiDAR topography via its online portal interface. In addition to data, the GEON Portal also provides web-based tools and other resources that enable users to process and interact with data. Examples of these tools include functions to dynamically map and integrate GIS data, compute synthetic seismograms, and to produce custom digital elevation models (DEMs) with user defined parameters such as resolution. The GEON portal built on the Gridsphere-portal framework allows us to capture user interaction with the system. In addition to the site access statistics captured by tools like Google Analystics which capture hits per unit time, search key words, operating systems, browsers, and referring sites, we also record additional statistics such as which data sets are being downloaded and in what formats, processing parameters, and navigation pathways through the portal. With over four years of data now available from the GEON Portal, this record of usage is a rich resource for exploring how earth scientists discover and utilize online data sets. Furthermore, we propose that this data could ultimately be harnessed to optimize the way users interact with the data portal, design intelligent processing and data management systems, and to make recommendations on algorithm settings and other available relevant data. The paradigm of integrating popular and commonly used patterns to make recommendations to a user is well established in the world of e-commerce where users receive suggestions on books, music and other products that they may find interesting based on their website browsing and purchasing history, as well as the patterns of fellow users who have made similar

  10. Cloud Usage Patterns : A Formalism for Description of Cloud Usage Scenarios

    NARCIS (Netherlands)

    Milenkoski, Aleksandar; Iosup, Alexandru; Kounev, Samuel; Sachs, Kai; Rygielski, Piotr; Ding, Jason; Cirne, Walfredo; Rosenberg, Florian

    2014-01-01

    Cloud computing is becoming an increasingly lucrative branch of the existing information and communication technologies (ICT). Enabling a debate about cloud usage scenarios can help with attracting new customers, sharing best-practices, and designing new cloud services. In contrast to previous

  11. Improving Energy Efficiency in Idle Listening of IEEE 802.11 WLANs

    Directory of Open Access Journals (Sweden)

    Muhammad Adnan

    2016-01-01

    Full Text Available This paper aims to improve energy efficiency of IEEE 802.11 wireless local area networks (WLANs by effectively dealing with idle listening (IL, which is required for channel sensing and is unavoidable in a contention-based channel access mechanism. Firstly, we show that IL is a dominant source of energy drain in WLANs and it cannot be effectively alleviated by the power saving mechanism proposed in the IEEE 802.11 standard. To solve this problem, we propose an energy-efficient mechanism that combines three schemes in a systematic way: downclocking, frame aggregation, and contention window adjustment. The downclocking scheme lets a station remain in a semisleep state when overhearing frames destined to neighbor stations, whereby the station consumes the minimal energy without impairing channel access capability. As well as decreasing the channel access overhead, the frame aggregation scheme prolongs the period of semisleep time. Moreover, by controlling the size of contention window based on the number of stations, the proposed mechanism decreases unnecessary IL time due to collision and retransmission. By deriving an analysis model and performing extensive simulations, we confirm that the proposed mechanism significantly improves the energy efficiency and throughput, by up to 2.8 and 1.8 times, respectively, compared to the conventional power saving mechanisms.

  12. Sum-rate performance of large centralized and distributed MU-MIMO systems in indoor WLAN

    NARCIS (Netherlands)

    Wang, Q.; Debbarma, D.; Lo, A.; Niemegeers, I.; Heemstra, Sonia

    2015-01-01

    Large MIMO systems are recognized as an effective technique for increasing the spectral and energy efficiency of wireless networks. The attractiveness of this technique for WLAN is that it can be an alternative approach to cell densification for providing high data rate wireless access. Here we

  13. Facebook Usage Pattern of the Students of Mawlana Bhasani Science and Technology University

    OpenAIRE

    N. N., Afroz; R. P., Lima

    2017-01-01

    Abstract Facebook is one of the popular social networking sites. This study investigates Facebook usage pattern of the students" of Mawlana Bhashani Science and Technology University. This research has been conducted over the Bachelor and Master"s degree students from the MBSTU. Frequency distribution, cross tabulation and chi-square test has been applied for data analysis. A self-administered structured close-ended questionnaire used to collect data from 250 students. This research found ...

  14. Predictable and reliable ECG monitoring over IEEE 802.11 WLANs within a hospital.

    Science.gov (United States)

    Park, Juyoung; Kang, Kyungtae

    2014-09-01

    Telecardiology provides mobility for patients who require constant electrocardiogram (ECG) monitoring. However, its safety is dependent on the predictability and robustness of data delivery, which must overcome errors in the wireless channel through which the ECG data are transmitted. We report here a framework that can be used to gauge the applicability of IEEE 802.11 wireless local area network (WLAN) technology to ECG monitoring systems in terms of delay constraints and transmission reliability. For this purpose, a medical-grade WLAN architecture achieved predictable delay through the combination of a medium access control mechanism based on the point coordination function provided by IEEE 802.11 and an error control scheme based on Reed-Solomon coding and block interleaving. The size of the jitter buffer needed was determined by this architecture to avoid service dropout caused by buffer underrun, through analysis of variations in transmission delay. Finally, we assessed this architecture in terms of service latency and reliability by modeling the transmission of uncompressed two-lead electrocardiogram data from the MIT-BIH Arrhythmia Database and highlight the applicability of this wireless technology to telecardiology.

  15. Patterns of youth tobacco and polytobacco usage: The shift to alternative tobacco products.

    Science.gov (United States)

    Harrell, Paul T; Naqvi, Syeda Mahrukh H; Plunk, Andrew D; Ji, Ming; Martins, Silvia S

    2017-11-01

    Despite significant declines in youth cigarette smoking, overall tobacco usage remains over 20% as non-cigarette tobacco product usage is increasingly common and polytobacco use (using 1+ tobacco product) remains steady. The present study was designed to identify patterns of youth tobacco use and examine associations with sociodemographic characteristics and tobacco dependence. The current analysis uses Latent Class Analysis (LCA) to examine the 6,958 tobacco users (n = 2,738 female) in the National Youth Tobacco Survey (2012 and 2013). We used as indicators past month use of tobacco products (cigarettes, cigars, smokeless tobacco, e-cigarettes, hookah, snus, pipes, bidis, and kreteks) and regressed resulting classes on sociodemographic characteristics and tobacco dependence. Nine classes emerged: cigarette smokers (33.4% of sample, also included small probabilities for use of cigars and e-cigarettes), cigar smokers (16.8%, nearly exclusive), smokeless tobacco users (12.3%, also included small probabilities for cigarettes, cigars, snus), hookah smokers (11.8%), tobacco smokers/chewers (10.7%, variety of primarily traditional tobacco products), tobacco/hookah smokers (7.2%), tobacco/snus/e-cig users (3.3%), e-cigarette users (2.9%,), and polytobacco users (1.7%, high probabilities for all products). Compared to cigarette smokers, tobacco/hookah smokers and hookah smokers were more likely to report Hispanic ethnicity. Polytobacco users were more likely to report dependence (AOR:2.77, 95% CI:[1.49-5.18]), whereas e-cigarette users were less likely (AOR:0.49, 95% CI:[0.24-0.97]). Findings are consistent with other research demonstrating shifts in adolescent tobacco product usage towards non-cigarette tobacco products. Continuous monitoring of these patterns is needed to help predict if this shift will ultimately result in improved public health.

  16. Virtualized healthcare delivery: understanding users and their usage patterns of online medical consultations.

    Science.gov (United States)

    Jung, Changmi; Padman, Rema

    2014-12-01

    Virtualization of healthcare delivery via patient portals has facilitated the increasing interest in online medical consultations due to its benefits such as improved convenience and flexibility, lower cost, and time savings. Despite this growing interest, adoption by both consumers and providers has been slow, and little is known about users and their usage and adoption patterns. To learn characteristics of online healthcare consumers and understand their patterns of adoption and usage of online clinical consultation services (or eVisits delivered via the portal) such as adoption time for portal users, whether adoption hazard changes over time, and what factors influence patients to become early/late adopters. Using online medical consultation records between April 1, 2009 and May 31, 2010 from four ambulatory practices affiliated with a major healthcare provider, we conduct simple descriptive analysis to understand the users of online clinical consults and their usage patterns. Multilevel Logit regression is employed to measure the effect of patient and primary care provider characteristics on the likelihood of eVisit adoption by the patient, and survival analysis and Ordered Logit regression are applied to study eVisit adoption patterns that delineate elements describing early or late adopters. On average, eVisit adopters are younger and predominantly female. Their primary care providers participate in the eVisit service, highlighting the importance of physician's role in encouraging patients to utilize the service. Patients who are familiar with the patient portal are more likely to use the service, as are patients with more complex health issues. Younger and female patients have higher adoption hazard, but gender does not affect the decision of adopting early vs. late. These adopters also access the patient portal more frequently before adoption, indicating that they are potentially more involved in managing their health. The majority of eVisits are submitted

  17. Patterns and determinants of communal latrine usage in urban poverty pockets in Bhopal, India.

    Science.gov (United States)

    Biran, A; Jenkins, M W; Dabrase, P; Bhagwat, I

    2011-07-01

    To explore and explain patterns of use of communal latrine facilities in urban poverty pockets. Six poverty pockets with communal latrine facilities representing two management models (Sulabh and municipal) were selected. Sampling was random and stratified by poverty pocket population size. A seventh, community-managed facility was also included. Data were collected by exit interviews with facility users and by interviews with residents from a randomly selected representative sample of poverty pocket households, on social, economic and demographic characteristics of households, latrine ownership, defecation practices, costs of using the facility and distance from the house to the facility. A tally of facility users was kept for 1 day at each facility. Data were analysed using logistic regression modelling to identify determinants of communal latrine usage. Communal latrines differed in their facilities, conditions, management and operating characteristics, and rates of usage. Reported usage rates among non-latrine-owning households ranged from 15% to 100%. There was significant variation in wealth, occupation and household structure across the poverty pockets as well as in household latrine ownership. Households in pockets with municipal communal latrine facilities appeared poorer. Households in pockets with Sulabh-managed communal facilities were significantly more likely to own a household latrine. Determinants of communal facility usage among households without a latrine were access and convenience (distance and opening hours), facility age, cleanliness/upkeep and cost. The ratio of male to female users was 2:1 across all facilities for both adults and children. Provision of communal facilities reduces but does not end the problem of open defecation in poverty pockets. Women appear to be relatively poorly served by communal facilities and, cost is a barrier to use by poorer households. Results suggest improving facility convenience and access and modifying fee

  18. Rate Adaptation Based on Collision Probability for IEEE 802.11 WLANs

    Science.gov (United States)

    Kim, Taejoon; Lim, Jong-Tae

    Nowadays IEEE 802.11 wireless local area networks (WLANs) support multiple transmission rates. To achieve the best performance, transmitting stations adopt the various forms of automatic rate fallback (ARF). However, ARF suffers from severe performance degradation as the number of transmitting stations increases. In this paper, we propose a new rate adaptation scheme which adjusts the ARF's up/down threshold according to the channel contention level. Simulation result shows that the proposed scheme achieves fairly good performance compared with the existing schemes.

  19. Complementary Split Ring Resonator Based Triple Band Microstrip Antenna for WLAN/WiMAX Applications

    Directory of Open Access Journals (Sweden)

    W. Ali

    2017-04-01

    Full Text Available A new simple design of a triple-band microstrip antenna using metamaterial concept is presented in this paper. Multi-unit cell was the key of the multi resonance response that was obtained by etching two circular and one rectangular split ring resonator (SRR unit cells in the ground plane of a conventional patch operating at 3.56 GHz .The circular unit cells are resonating at 5.6 GHz for the upper band of Wi-MAX, while the rectangular cell is designed to produce a resonance at 2.45 GHz for the lower band of WLAN. WiMAX's/WLAN's operating bands are covered by the triple resonances which are achieved by the proposed antenna with quite enhanced performance. A detailed parametric study of the placement for the metamaterial unit cells is introduced and the most suitable positions are chosen to be the place of the unit cells for enhanced performance. A good consistency between simulation and measurement confirms the ability of the proposed antenna to achieve an improved gain at the three different frequencies.

  20. Use of Order Sets in Inpatient Computerized Provider Order Entry Systems: A Comparative Analysis of Usage Patterns at Seven Sites

    Science.gov (United States)

    Wright, Adam; Feblowitz, Joshua C.; Pang, Justine E.; Carpenter, James D.; Krall, Michael A.; Middleton, Blackford; Sittig, Dean F.

    2012-01-01

    Background Many computerized provider order entry (CPOE) systems include the ability to create electronic order sets: collections of clinically-related orders grouped by purpose. Order sets promise to make CPOE systems more efficient, improve care quality and increase adherence to evidence-based guidelines. However, the development and implementation of order sets can be expensive and time-consuming and limited literature exists about their utilization. Methods Based on analysis of order set usage logs from a diverse purposive sample of seven sites with commercially- and internally-developed inpatient CPOE systems, we developed an original order set classification system. Order sets were categorized across seven non-mutually exclusive axes: admission/discharge/transfer (ADT), perioperative, condition-specific, task-specific, service-specific, convenience, and personal. In addition, 731 unique subtypes were identified within five axes: four in ADT (S=4), three in perioperative, 144 in condition-specific, 513 in task-specific, and 67 in service-specific. Results Order sets (n=1,914) were used a total of 676,142 times at the participating sites during a one-year period. ADT and perioperative order sets accounted for 27.6% and 24.2% of usage respectively. Peripartum/labor, chest pain/Acute Coronary Syndrome/Myocardial Infarction and diabetes order sets accounted for 51.6% of condition-specific usage. Insulin, angiography/angioplasty and arthroplasty order sets accounted for 19.4% of task-specific usage. Emergency/trauma, Obstetrics/Gynecology/Labor Delivery and anesthesia accounted for 32.4% of service-specific usage. Overall, the top 20% of order sets accounted for 90.1% of all usage. Additional salient patterns are identified and described. Conclusion We observed recurrent patterns in order set usage across multiple sites as well as meaningful variations between sites. Vendors and institutional developers should identify high-value order set types through concrete

  1. Codon usage bias and the evolution of influenza A viruses. Codon Usage Biases of Influenza Virus

    Directory of Open Access Journals (Sweden)

    Wong Emily HM

    2010-08-01

    Full Text Available Abstract Background The influenza A virus is an important infectious cause of morbidity and mortality in humans and was responsible for 3 pandemics in the 20th century. As the replication of the influenza virus is based on its host's machinery, codon usage of its viral genes might be subject to host selection pressures, especially after interspecies transmission. A better understanding of viral evolution and host adaptive responses might help control this disease. Results Relative Synonymous Codon Usage (RSCU values of the genes from segment 1 to segment 6 of avian and human influenza viruses, including pandemic H1N1, were studied via Correspondence Analysis (CA. The codon usage patterns of seasonal human influenza viruses were distinct among their subtypes and different from those of avian viruses. Newly isolated viruses could be added to the CA results, creating a tool to investigate the host origin and evolution of viral genes. It was found that the 1918 pandemic H1N1 virus contained genes with mammalian-like viral codon usage patterns, indicating that the introduction of this virus to humans was not through in toto transfer of an avian influenza virus. Many human viral genes had directional changes in codon usage over time of viral isolation, indicating the effect of host selection pressures. These changes reduced the overall GC content and the usage of G at the third codon position in the viral genome. Limited evidence of translational selection pressure was found in a few viral genes. Conclusions Codon usage patterns from CA allowed identification of host origin and evolutionary trends in influenza viruses, providing an alternative method and a tool to understand the evolution of influenza viruses. Human influenza viruses are subject to selection pressure on codon usage which might assist in understanding the characteristics of newly emerging viruses.

  2. Electronic Book Usage Patterns as Observed at an Academic Library: Searches and Viewings

    OpenAIRE

    Alain R. Lamothe

    2010-01-01

    In 2009, e-book usage statistics were evaluated at Laurentian University, Canada, to provide a better understanding in how the e-book collection has been utilized as well as to give direction for further collection development. The number of e-books, the number of viewings and the number of searches were examined. The size of the collection grew from a single book in 2002 to more than 60,000 in 2008. The pattern of purchase varied from that of bulk purchasing of large e-book collections to a ...

  3. A Novel Metamaterial MIMO Antenna with High Isolation for WLAN Applications

    Directory of Open Access Journals (Sweden)

    Nguyen Khac Kiem

    2015-01-01

    Full Text Available A compact 2×2 metamaterial-MIMO antenna for WLAN applications is presented in this paper. The MIMO antenna is designed by placing side by side two single metamaterial antennas which are constructed based on the modified composite right/left-handed (CRLH model. By adding another left-handed inductor, the total left-handed inductor of the modified CRLH model is increased remarkably in comparison with that of conventional CRLH model. As a result, the proposed metamaterial antenna achieves 60% size reduction in comparison with the unloaded antenna. The MIMO antenna is electrically small (30 mm × 44 mm with an edge-to-edge separation between two antennas of 0.06λ0 at 2.4 GHz. In order to reduce the mutual coupling of the antenna, a defected ground structure (DGS is inserted to suppress the effect of surface current between elements of the proposed antenna. The final design of the MIMO antenna satisfies the return loss requirement of less than −10 dB in a bandwidth ranging from 2.38 GHz to 2.5 GHz, which entirely covers WLAN frequency band allocated from 2.4 GHz to 2.48 GHz. The antenna also shows a high isolation coefficient which is less than −35 dB over the operating frequency band. A good agreement between simulation and measurement is shown in this context.

  4. Evaluasi Kinerja IEEE 802.11e HCCA untuk Dukungan QoS pada WLAN Menggunakan NS-2

    Directory of Open Access Journals (Sweden)

    Amry Daulat Gultom

    2014-06-01

    Full Text Available Wireless Local Area Network (WLAN digunakan oleh trafik multimedia yang seharusnya memerlukan persyaratan jaringan yang lebih baik terhadap delay, jitter dan packet losses. IEEE 802.11 Task Group E memperkenalkan perbaikan protokol MAC 802.11, yaitu Hybrid Coordination Function (HCF, yang terdiri dari dua mekanisme akses: Enhanced Distributed Channel Access (EDCA dan HCF Controlled Channel Access (HCCA yang memberikan dukungan Kualitas Layanan/Quality of Service (QoS bagi trafik multimedia. Tujuan dari penelitian ini adalah untuk memahami algoritma protokol MAC IEEE 802.11e HCCA pada jaringan WLAN, dan menganalisis kinerja protokol MAC 802.11e HCCA pada aplikasi multimedia dengan menggunakan metode simulasi pada NS-2. Metrik kinerja yang diukur adalah jitter dan throughput-nya. Hasil penelitian ini menunjukkan bahwa protokol MAC HCCA dapat memberikan jaminan QoS dibanding protokol MAC DCF, dimana jitter HCCA lebih stabil dari pada jitter DCF. Begitupula dengan throughput HCCA yang tidak berubah selama trafik berlangsung, tidak seperti pada DCF yang masih mengalami fluktuasi yang besar.

  5. Impact of cell load on 5GHz IEEE 802.11 WLAN

    OpenAIRE

    Abu-Tair, Mamoun; Bhatti, Saleem Noel

    2017-01-01

    We have conducted an empirical study of the latest 5GHz IEEE 802.11 wireless LAN (WLAN) variants of 802.11n (5GHz) and 802.11ac (Wave 1), under different cell load conditions. We have considered typical configurations of both protocols on a Linux testbed. Under light load,there is no clear difference between 802.11n and 802.11ac in terms of performance and energy consumption. However, in some cases of high cell load, we have found that there may be a small advantage with 802.11ac. Overall, we...

  6. LTE, WiMAX and WLAN network design, optimization and performance analysis

    CERN Document Server

    Korowajczuk, Leonhard

    2011-01-01

    A technological overview of LTE and WiMAX LTE, WiMAX and WLAN Network Design, Optimization and Performance Analysis provides a practical guide to LTE and WiMAX technologies introducing various tools and concepts used within. In addition, topics such as traffic modelling of IP-centric networks, RF propagation, fading, mobility, and indoor coverage are explored; new techniques which increase throughput such as MIMO and AAS technology are highlighted; and simulation, network design and performance analysis are also examined. Finally, in the latter part of the book Korowajczuk gives a step-by-step

  7. Analysis And Simulation Of Low Profile Planar Inverted - F Antenna Design For WLAN Operation In Portable Devices

    Directory of Open Access Journals (Sweden)

    Zaw Htet Lwin

    2015-08-01

    Full Text Available This paper presents a compact planar invertedF antenna PIFA design for WLAN operation in portable devices. The proposed design has size of 8 x 21 mm and provides peak directive gain of 5.78dBi with the peak return loss of -33.89dB and input impedance of 50.28amp8486. It covers a 10dB return loss bandwidth of 410MHz 2.37GHz 2.789GHz. Its VSWR varies from 1.96 to 1.93 within the antenna return loss bandwidth. As the dimension of the proposed antenna is very small the antenna is promising to be embedded within the different portable devices employing WiFi applications. This paper includes the return loss as a function of frequency with varying the different parameters VSWR input resistance radiation pattern and current distribution of the proposed antenna.

  8. Empirical investigation on the dependence of TCP downstream throughput on SNR in an IEEE802.11b WLAN system

    Directory of Open Access Journals (Sweden)

    Ikponmwosa Oghogho

    2017-04-01

    Full Text Available The dependence of TCP downstream throughput (TCPdownT on signal to noise ratio (SNR in an IEEE802.11b WLAN system was investigated in various environments and varieties of QoS traffic. TCPdownT was measured for various SNR observed. An Infrastructure based IEEE802.11b WLAN system having networked computers on which measurement software were installed, was set up consecutively in various environments (open corridor, small offices with block walls and plaster boards and free space. Empirical models describing TCPdownT against SNR for different signal ranges (all ranges of signals, strong signals only, grey signals only and weak signals only were statistically generated and validated. As the SNR values changed from high (strong signals through low (grey signals to very low (weak signals, our results show a strong dependence of TCPdownT on the received SNR. Our models showed lower RMS errors when compared with other similar models. We observed RMS errors of 0.6734791 Mbps, 0.472209 Mbps, 0.9111563 Mbps and 0.5764460 Mbps for general (all SNR model, strong signals model, grey signals model and Weak signals model respectively. Our models will provide researchers and WLAN systems users with a tool to estimate the TCP downstream throughput in a real network in various environments by monitoring the received SNR.

  9. A Very Compact and Low Profile UWB Planar Antenna with WLAN Band Rejection

    Directory of Open Access Journals (Sweden)

    Avez Syed

    2016-01-01

    Full Text Available A low-cost coplanar waveguide fed compact ultrawideband (UWB antenna with band rejection characteristics for wireless local area network (WLAN is proposed. The notch band characteristic is achieved by etching half wavelength C-shaped annular ring slot in the radiating patch. By properly choosing the radius and position of the slot, the notch band can be adjusted and controlled. With an overall size of 18.7 mm × 17.6 mm, the antenna turns out to be one of the smallest UWB antennas with band-notched characteristics. It has a wide fractional bandwidth of 130% (2.9–13.7 GHz with VSWR < 2 and rejecting IEEE 802.11a and HIPERLAN/2 frequency band of 5.1–5.9 GHz. Stable omnidirectional radiation patterns in the H plane with an average gain of 4.4 dBi are obtained. The band-notch mechanism of the proposed antenna is examined by HFSS simulator. A good agreement is found between measured and simulated results indicating that the proposed antenna is well suited for integration into portable devices for UWB applications.

  10. A highly linear baseband Gm—C filter for WLAN application

    Science.gov (United States)

    Lijun, Yang; Zheng, Gong; Yin, Shi; Zhiming, Chen

    2011-09-01

    A low voltage, highly linear transconductan—C (Gm—C) low-pass filter for wireless local area network (WLAN) transceiver application is proposed. This transmitter (Tx) filter adopts a 9.8 MHz 3rd-order Chebyshev low pass prototype and achieves 35 dB stop-band attenuation at 30 MHz frequency. By utilizing pseudo-differential linear-region MOS transconductors, the filter IIP3 is measured to be as high as 9.5 dBm. Fabricated in a 0.35 μm standard CMOS technology, the proposed filter chip occupies a 0.41 × 0.17 mm2 die area and consumes 3.36 mA from a 3.3-V power supply.

  11. Mobile phone usage pattern among undergraduate medical students at a Medical College of Kolkata, West Bengal, India

    Directory of Open Access Journals (Sweden)

    Bobby Paul

    2014-12-01

    Full Text Available AbstractObjective: Mobile phone usage has reached all ages across all segments of society, and its radiofrequency waves are an increasing concern among the general population. To find out the pattern of mobile phone usage among undergraduate medical students and their perceived symptoms and awareness about negative health effects due to their exposure to the radiofrequency waves. Methods: A descriptive type of epidemiological study was conducted among 295 undergraduate medical students in the Institute of Post Graduate Medical Education and Research, Kolkata, in August 2012 after obtaining Institutional Ethical Clearance. Data were collected by a pre-designed and pre-tested, semi structured questionnaire and analyzed with SPSS software, version 19.0. Results: Among the 1st semester students, browsing of the internet became the predominant activity; while listening to music and radio was the preferred activity among the 3rd, 5th and 7th semester students. In lecture class, 1st semester students (62.5% switch off; 40.6% of 5th semester students receive and 63.63% of 7th semester students keep the phone in silence mode. Duration of mobile phone usage was maximum among students who perceived headache as a side effect of usage. About 62.3% study subjects cited accidents as a harmful effect, followed by lack of concentration. Conclusions: Regulatory bodies should lay down specific regulations and guidelines regarding mobile phone usage in class as well as during patient care. Further research is needed to comment on long term health outcome keeping in view its usage and popularity among younger people. Keywords: Mobile phone use, medical students, hazard awareness 

  12. Horizontal Handoffs within WLANs : A detailed analysis and measurement concerning voice like traffic

    OpenAIRE

    Nankani, Ajeet

    2005-01-01

    IEEE 802.11 based Wireless Local Area Networks (WLANs) in addition to being used as access networks for providing traditional data services, are now also being used as access networks for providing realtime services such as VoIP and multimedia streaming. These realtime services are sensitive to latency, hence requiring seamless or low delay service from the lower layers throughout an ongoing session. The IEEE 802.11 standard does not define any technique or algorithm to provide seamless conne...

  13. Efficient Transmission of H.264 Video over Multirate IEEE 802.11e WLANs

    Directory of Open Access Journals (Sweden)

    Alnuweiri Hussein

    2008-01-01

    Full Text Available The H.264 video encoding technology, which has emerged as one of the most promising compression standards, offers many new delivery-aware features such as data partitioning. Efficient transmission of H.264 video over any communication medium requires a great deal of coordination between different communication network layers. This paper considers the increasingly popular and widespread 802.11 Wireless Local Area Networks (WLANs and studies different schemes for the delivery of the baseline and extended profiles of H.264 video over such networks. While the baseline profile produces data similar to conventional video technologies, the extended profile offers a partitioning feature that divides video data into three sets with different levels of importance. This allows for the use of service differentiation provided in the WLAN. This paper examines the video transmission performance of the existing contention-based solutions for 802.11e, and compares it to our proposed scheduled access mechanism. It is demonstrated that the scheduled access scheme outperforms contention-based prioritized services of the 802.11e standard. For partitioned video, it is shown that the overhead of partitioning is too high, and better results are achieved if some partitions are aggregated. The effect of link adaptation and multirate operation of the physical layer (PHY is also investigated in this paper.

  14. A Pervasive Promotion Model for Personalized Promotion Systems on Using WLAN Localization and NFC Techniques

    Directory of Open Access Journals (Sweden)

    Kam-Yiu Lam

    2015-01-01

    Full Text Available In this paper, we propose a novel pervasive business model for sales promotion in retail chain stores utilizing WLAN localization and near field communication (NFC technologies. The objectives of the model are to increase the customers’ flow of the stores and their incentives in purchasing. In the proposed model, the NFC technology is used as the first mean to motivate customers to come to the stores. Then, with the use of WLAN, the movements of the customers, who are carrying smartphones, within the stores are captured and maintained in the movement database. By interpreting the movements of customers as indicators of their interests to the displayed items, personalized promotion strategies can be formulated to increase their incentives for purchasing future items. Various issues in the application of the adopted localization scheme for locating customers in a store are discussed. To facilitate the item management and space utilization in displaying the items, we propose an enhanced R-tree for indexing the data items maintained in the movement database. Experimental results have demonstrated the effectiveness of the adopted localization scheme in supporting the proposed model.

  15. A direct-conversion WLAN transceiver baseband with DC offset compensation and carrier leakage reduction

    Energy Technology Data Exchange (ETDEWEB)

    Yuan Fang; Yan Jun; Ma Heping; Shi Yin [Institute of Semiconductors, Chinese Academy of Sciences, Beijing 100083 (China); Foster, Dai Fa, E-mail: fyuan@sci-inc.com.c [Department of Electrical and Computer Engineering, Auburn University, Auburn, AL 36849-5201 (United States)

    2010-10-15

    A dual-band direct-conversion WLAN transceiver baseband compliant with the IEEE 802.11a/b/g standards is described. Several critical techniques for receiver DC offset compensation and transmitter carrier leakage rejection calibration are presented that enable the direct-conversion architecture to meet all WLAN specifications. The receiver baseband VGA provides 62 dB gain range with steps of 2 dB and a DC offset cancellation circuit is introduced to remove the offset from layout and self-mixing. The calibration loop achieves constant high-pass pole when gain changes; and a fast response time by programming the pole to 1 MHz during preamble and to 30 kHz during receiving data. The transmitter baseband employs an auto-calibration loop with on-chip AD and DA to suppress the carrier leakage, and AD can be powered down after calibration to save power consumption. The chip consumes 17.52 mA for RX baseband VGA and DCOC, and 8.3 mA for TX carrier leakage calibration (5.88 mA after calibration) from 2.85 V supply. Implemented in a 0.35 {mu}m SiGe technology, they occupy 0.68 mm{sup 2} and 0.18 mm{sup 2} die size respectively. (semiconductor integrated circuits)

  16. A highly linear baseband Gm-C filter for WLAN application

    International Nuclear Information System (INIS)

    Yang Lijun; Chen Zhiming; Gong Zheng; Shi Yin

    2011-01-01

    A low voltage, highly linear transconductan-C (G m -C) low-pass filter for wireless local area network (WLAN) transceiver application is proposed. This transmitter (Tx) filter adopts a 9.8 MHz 3rd-order Chebyshev low pass prototype and achieves 35 dB stop-band attenuation at 30 MHz frequency. By utilizing pseudo-differential linear-region MOS transconductors, the filter IIP 3 is measured to be as high as 9.5 dBm. Fabricated in a 0.35 μm standard CMOS technology, the proposed filter chip occupies a 0.41 x 0.17 mm 2 die area and consumes 3.36 mA from a 3.3-V power supply. (semiconductor integrated circuits)

  17. Impact of power limitations on the performance of WLANs for home networking applications

    OpenAIRE

    Armour, SMD; Lee, BS; Doufexi, A; Nix, AR; Bull, DR

    2001-01-01

    This paper considers the application of 5 GHz wireless LAN technology to home networking applications. An assessment of physical layer performance is presented in the form of the achievable data rate as a function of received signal to noise ratio. The transmit power limitations imposed by the relevant regulatory bodies are also summarised. Based on this information, a state of the art propagation modelling tool is used to evaluate the coverage achieved by a WLAN system in an example resident...

  18. Fractal analysis of intraflow unidirectional delay over w-lan and w-wan environments

    OpenAIRE

    Pezaros, D. P.; Sifalakis, M.; Mathy, Laurent

    2007-01-01

    We have analysed unidirectional delay traces of a diverse set of IPv6 microflows routed over W-LAN and W-WAN environments. Using a number of time-domain and frequency-domain estimators we have examined the existence and intensity of long-range dependence in packet delay when viewed as time-series data. The correlation structures of packet delay on bulk TCP data path and UDP flows follow asymptotic decay while Hurst exponent estimates suggest from moderate to strong intensity(H->1).

  19. Comparative analysis of codon usage patterns and identification of predicted highly expressed genes in five Salmonella genomes

    Directory of Open Access Journals (Sweden)

    Mondal U

    2008-01-01

    Full Text Available Purpose: To anlyse codon usage patterns of five complete genomes of Salmonella , predict highly expressed genes, examine horizontally transferred pathogenicity-related genes to detect their presence in the strains, and scrutinize the nature of highly expressed genes to infer upon their lifestyle. Methods: Protein coding genes, ribosomal protein genes, and pathogenicity-related genes were analysed with Codon W and CAI (codon adaptation index Calculator. Results: Translational efficiency plays a role in codon usage variation in Salmonella genes. Low bias was noticed in most of the genes. GC3 (guanine cytosine at third position composition does not influence codon usage variation in the genes of these Salmonella strains. Among the cluster of orthologous groups (COGs, translation, ribosomal structure biogenesis [J], and energy production and conversion [C] contained the highest number of potentially highly expressed (PHX genes. Correspondence analysis reveals the conserved nature of the genes. Highly expressed genes were detected. Conclusions: Selection for translational efficiency is the major source of variation of codon usage in the genes of Salmonella . Evolution of pathogenicity-related genes as a unit suggests their ability to infect and exist as a pathogen. Presence of a lot of PHX genes in the information and storage-processing category of COGs indicated their lifestyle and revealed that they were not subjected to genome reduction.

  20. Multiband Printed Asymmetric Dipole Antenna for LTE/WLAN Applications

    Directory of Open Access Journals (Sweden)

    Chia-Mei Peng

    2013-01-01

    Full Text Available The ability of a single layer strip fed printed asymmetric dipole antenna, which is composed of top-loading, asymmetric coplanar waveguide (ACPW and stepped-feeding structure, to operate at three wide frequency bands (698~960 MHz, 1710~2620 MHz, and 5150~5850 MHz to cover WLAN and LTE operation has been demonstrated. A prototype of the proposed antenna with 57.5 mm in length, 0.4 mm in thickness, and 5 mm in width is fabricated and experimentally investigated. The experimental results indicate that the VSWR 2.5 : 1 bandwidths achieved were 74.3%, 40.8%, and 18.2% at 700 MHz, 2450 MHz, and 5500 MHz, respectively. Experimental results are shown to verify the validity of theoretical work.

  1. Predicting Forearm Physical Exposures During Computer Work Using Self-Reports, Software-Recorded Computer Usage Patterns, and Anthropometric and Workstation Measurements.

    Science.gov (United States)

    Huysmans, Maaike A; Eijckelhof, Belinda H W; Garza, Jennifer L Bruno; Coenen, Pieter; Blatter, Birgitte M; Johnson, Peter W; van Dieën, Jaap H; van der Beek, Allard J; Dennerlein, Jack T

    2017-12-15

    Alternative techniques to assess physical exposures, such as prediction models, could facilitate more efficient epidemiological assessments in future large cohort studies examining physical exposures in relation to work-related musculoskeletal symptoms. The aim of this study was to evaluate two types of models that predict arm-wrist-hand physical exposures (i.e. muscle activity, wrist postures and kinematics, and keyboard and mouse forces) during computer use, which only differed with respect to the candidate predicting variables; (i) a full set of predicting variables, including self-reported factors, software-recorded computer usage patterns, and worksite measurements of anthropometrics and workstation set-up (full models); and (ii) a practical set of predicting variables, only including the self-reported factors and software-recorded computer usage patterns, that are relatively easy to assess (practical models). Prediction models were build using data from a field study among 117 office workers who were symptom-free at the time of measurement. Arm-wrist-hand physical exposures were measured for approximately two hours while workers performed their own computer work. Each worker's anthropometry and workstation set-up were measured by an experimenter, computer usage patterns were recorded using software and self-reported factors (including individual factors, job characteristics, computer work behaviours, psychosocial factors, workstation set-up characteristics, and leisure-time activities) were collected by an online questionnaire. We determined the predictive quality of the models in terms of R2 and root mean squared (RMS) values and exposure classification agreement to low-, medium-, and high-exposure categories (in the practical model only). The full models had R2 values that ranged from 0.16 to 0.80, whereas for the practical models values ranged from 0.05 to 0.43. Interquartile ranges were not that different for the two models, indicating that only for some

  2. Assessment of public exposure form WLANs in the west bank Palestine

    International Nuclear Information System (INIS)

    Lahham, Adnan; Sharabati, Afifeh; ALMasri, Hussein

    2017-01-01

    A total of 271 measurements were conducted at 69 different sites including homes, hospitals, educational institutions and other public places to assess the exposure to radiofrequency emission from wireless local area networks (WLANs). Measurements were conducted at different distances from 40 to 10 m from the access points (APs) in real life conditions using Narda SRM3000 selective radiation meter. Three measurements modes were considered at 1 m distance from the AP which are transmit mode, idle mode, and from the client card (laptop computer). All measurements were conducted indoor in the West Bank environment. Power density levels from WLAN systems were found to vary from 0.001 to ∼1.9 μW cm -2 with an average of 0.12 μW cm -2 . Maximum value found was in university environment, while the minimum was found in schools. For one measurement case where the AP was 20 cm far while transmitting large files, the measured power density reached a value of ∼4.5 μW cm -2 . This value is however 221 times below the general public exposure limit recommended by the International Commission on Non-Ionizing Radiation Protection, which was not exceeded in any case. Measurements of power density at 1 m around the laptop resulted in less exposure than the AP in both transmit and idle modes as well. Specific absorption rate for the head of the laptop user was estimated and found to vary from 0.1 to 2 mW/kg. The frequency distribution of measured power densities follows a log-normal distribution which is generally typical in the assessment of exposure resulting from sources of radiofrequency emissions. (authors)

  3. Dual Band Parasitic Element Patch Antenna for LTE/WLAN Applications

    Directory of Open Access Journals (Sweden)

    BAG Biplab

    2017-05-01

    Full Text Available In this paper, a single layer coaxial fed dual band slotted microstrip antenna is proposed. The proposed antenna consists of two direct couple parasitic elements and L-shape slots on the main resonating element. Two resonant modes are excited and it covers 4G LTE and WLAN middle band. The -10dB impedance bandwidth for resonant frequency of 2.35GHz and 5.28GHz are 140MHz (2.25-2.39GHz and 570MHz (5.18-5.75GHz, respectively. The measured VSWR at 2.35GHz is 1.27 and at 5.28GHz is 1.41. The proposed antenna is simple in design and compact in size. The simulated and measured results are in good agreement.

  4. Usage patterns, health, and nutritional status of long-term multiple dietary supplement users: a cross-sectional study

    OpenAIRE

    Wong Les G; Dalvi Tapashi B; Norkus Edward P; Jensen Christopher D; Block Gladys; McManus Jamie F; Hudes Mark L

    2007-01-01

    Abstract Background Dietary supplement use in the United States is prevalent and represents an important source of nutrition. However, little is known about individuals who routinely consume multiple dietary supplements. This study describes the dietary supplement usage patterns, health, and nutritional status of long-term multiple dietary supplement users, and where possible makes comparisons to non-users and multivitamin/mineral supplement users. Methods Using a cross-sectional study design...

  5. WLAN Fingerprint Indoor Positioning Strategy Based on Implicit Crowdsourcing and Semi-Supervised Learning

    Directory of Open Access Journals (Sweden)

    Chunjing Song

    2017-11-01

    Full Text Available Wireless local area network (WLAN fingerprint positioning is an indoor localization technique with high accuracy and low hardware requirements. However, collecting received signal strength (RSS samples for the fingerprint database is time-consuming and labor-intensive, hindering the use of this technique. The popular crowdsourcing sampling technique has been introduced to reduce the workload of sample collection, but has two challenges: one is the heterogeneity of devices, which can significantly affect the positioning accuracy; the other is the requirement of users’ intervention in traditional crowdsourcing, which reduces the practicality of the system. In response to these challenges, we have proposed a new WLAN indoor positioning strategy, which incorporates a new preprocessing method for RSS samples, the implicit crowdsourcing sampling technique, and a semi-supervised learning algorithm. First, implicit crowdsourcing does not require users’ intervention. The acquisition program silently collects unlabeled samples, the RSS samples, without information about the position. Secondly, to cope with the heterogeneity of devices, the preprocessing method maps all the RSS values of samples to a uniform range and discretizes them. Finally, by using a large number of unlabeled samples with some labeled samples, Co-Forest, the introduced semi-supervised learning algorithm, creates and repeatedly refines a random forest ensemble classifier that performs well for location estimation. The results of experiments conducted in a real indoor environment show that the proposed strategy reduces the demand for large quantities of labeled samples and achieves good positioning accuracy.

  6. Handoff Triggering and Network Selection Algorithms for Load-Balancing Handoff in CDMA-WLAN Integrated Networks

    Directory of Open Access Journals (Sweden)

    Khalid Qaraqe

    2008-10-01

    Full Text Available This paper proposes a novel vertical handoff algorithm between WLAN and CDMA networks to enable the integration of these networks. The proposed vertical handoff algorithm assumes a handoff decision process (handoff triggering and network selection. The handoff trigger is decided based on the received signal strength (RSS. To reduce the likelihood of unnecessary false handoffs, the distance criterion is also considered. As a network selection mechanism, based on the wireless channel assignment algorithm, this paper proposes a context-based network selection algorithm and the corresponding communication algorithms between WLAN and CDMA networks. This paper focuses on a handoff triggering criterion which uses both the RSS and distance information, and a network selection method which uses context information such as the dropping probability, blocking probability, GoS (grade of service, and number of handoff attempts. As a decision making criterion, the velocity threshold is determined to optimize the system performance. The optimal velocity threshold is adjusted to assign the available channels to the mobile stations. The optimal velocity threshold is adjusted to assign the available channels to the mobile stations using four handoff strategies. The four handoff strategies are evaluated and compared with each other in terms of GOS. Finally, the proposed scheme is validated by computer simulations.

  7. Handoff Triggering and Network Selection Algorithms for Load-Balancing Handoff in CDMA-WLAN Integrated Networks

    Directory of Open Access Journals (Sweden)

    Kim Jang-Sub

    2008-01-01

    Full Text Available This paper proposes a novel vertical handoff algorithm between WLAN and CDMA networks to enable the integration of these networks. The proposed vertical handoff algorithm assumes a handoff decision process (handoff triggering and network selection. The handoff trigger is decided based on the received signal strength (RSS. To reduce the likelihood of unnecessary false handoffs, the distance criterion is also considered. As a network selection mechanism, based on the wireless channel assignment algorithm, this paper proposes a context-based network selection algorithm and the corresponding communication algorithms between WLAN and CDMA networks. This paper focuses on a handoff triggering criterion which uses both the RSS and distance information, and a network selection method which uses context information such as the dropping probability, blocking probability, GoS (grade of service, and number of handoff attempts. As a decision making criterion, the velocity threshold is determined to optimize the system performance. The optimal velocity threshold is adjusted to assign the available channels to the mobile stations. The optimal velocity threshold is adjusted to assign the available channels to the mobile stations using four handoff strategies. The four handoff strategies are evaluated and compared with each other in terms of GOS. Finally, the proposed scheme is validated by computer simulations.

  8. ASSESSMENT OF PUBLIC EXPOSURE FORM WLANS IN THE WEST BANK-PALESTINE.

    Science.gov (United States)

    Lahham, Adnan; Sharabati, Afifeh; ALMasri, Hussein

    2017-11-01

    A total of 271 measurements were conducted at 69 different sites including homes, hospitals, educational institutions and other public places to assess the exposure to radiofrequency emission from wireless local area networks (WLANs). Measurements were conducted at different distances from 40 to 10 m from the access points (APs) in real life conditions using Narda SRM-3000 selective radiation meter. Three measurements modes were considered at 1 m distance from the AP which are transmit mode, idle mode, and from the client card (laptop computer). All measurements were conducted indoor in the West Bank environment. Power density levels from WLAN systems were found to vary from 0.001 to ~1.9 μW cm-2 with an average of 0.12 μW cm-2. Maximum value found was in university environment, while the minimum was found in schools. For one measurement case where the AP was 20 cm far while transmitting large files, the measured power density reached a value of ~4.5 μW cm-2. This value is however 221 times below the general public exposure limit recommended by the International Commission on Non-Ionizing Radiation Protection, which was not exceeded in any case. Measurements of power density at 1 m around the laptop resulted in less exposure than the AP in both transmit and idle modes as well. Specific absorption rate for the head of the laptop user was estimated and found to vary from 0.1 to 2 mW/kg. The frequency distribution of measured power densities follows a log-normal distribution which is generally typical in the assessment of exposure resulting from sources of radiofrequency emissions. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  9. Fractal analysis of intraflow unidirectional\\ud delay over W-LAN and W-WAN environments

    OpenAIRE

    Pezaros, D.; Sifalakis, M.; Mathy, L.

    2007-01-01

    We have analysed unidirectional delay traces of a diverse\\ud set of IPv6 microflows routed over W-LAN and W-WAN\\ud environments. Using a number of time-domain and frequency-domain estimators we have examined the existence and intensity of long-range dependence in packet delay when viewed as time-series data. The correlation structures of packet delay on bulk TCP data path and UDP flows follow asymptotic decay while Hurst exponent estimates suggest from moderate to strong intensity(H->1).

  10. Gene expression, nucleotide composition and codon usage bias of genes associated with human Y chromosome.

    Science.gov (United States)

    Choudhury, Monisha Nath; Uddin, Arif; Chakraborty, Supriyo

    2017-06-01

    Analysis of codon usage pattern is important to understand the genetic and evolutionary characteristics of genomes. We have used bioinformatic approaches to analyze the codon usage bias (CUB) of the genes located in human Y chromosome. Codon bias index (CBI) indicated that the overall extent of codon usage bias was low. The relative synonymous codon usage (RSCU) analysis suggested that approximately half of the codons out of 59 synonymous codons were most frequently used, and possessed a T or G at the third codon position. The codon usage pattern was different in different genes as revealed from correspondence analysis (COA). A significant correlation between effective number of codons (ENC) and various GC contents suggests that both mutation pressure and natural selection affect the codon usage pattern of genes located in human Y chromosome. In addition, Y-linked genes have significant difference in GC contents at the second and third codon positions, expression level, and codon usage pattern of some codons like the SPANX genes in X chromosome.

  11. Electronic Book Usage Patterns as Observed at an Academic Library: Searches and Viewings

    Directory of Open Access Journals (Sweden)

    Alain R. Lamothe

    2010-06-01

    Full Text Available In 2009, e-book usage statistics were evaluated at Laurentian University, Canada, to provide a better understanding in how the e-book collection has been utilized as well as to give direction for further collection development. The number of e-books, the number of viewings and the number of searches were examined. The size of the collection grew from a single book in 2002 to more than 60,000 in 2008. The pattern of purchase varied from that of bulk purchasing of large e-book collections to a more selective purchase from 2005 to 2007 and then back to that of bulk purchasing in 2008. Both viewings and searches have increased from year to year at a greater pace than the size e-book collection. The number of searches also appeared to provide a viable means to measure the use of an e-book collection rather than relying entirely on viewings or downloads. Ratios were calculated when comparing viewings and searches to the size of the collection. The largest viewings per e-book and searches per e-book ratios were observed in those years when purchasing was done more selectively. It is also clear that the electronic reference collection has seen far greater use then the electronic monographs. Furthermore, usage of electronic monographs also appeared to be directly proportional to the size of the collection.

  12. Multiple Evolutionary Selections Involved in Synonymous Codon Usages in the Streptococcus agalactiae Genome.

    Science.gov (United States)

    Ma, Yan-Ping; Ke, Hao; Liang, Zhi-Ling; Liu, Zhen-Xing; Hao, Le; Ma, Jiang-Yao; Li, Yu-Gu

    2016-02-24

    Streptococcus agalactiae is an important human and animal pathogen. To better understand the genetic features and evolution of S. agalactiae, multiple factors influencing synonymous codon usage patterns in S. agalactiae were analyzed in this study. A- and U-ending rich codons were used in S. agalactiae function genes through the overall codon usage analysis, indicating that Adenine (A)/Thymine (T) compositional constraints might contribute an important role to the synonymous codon usage pattern. The GC3% against the effective number of codon (ENC) value suggested that translational selection was the important factor for codon bias in the microorganism. Principal component analysis (PCA) showed that (i) mutational pressure was the most important factor in shaping codon usage of all open reading frames (ORFs) in the S. agalactiae genome; (ii) strand specific mutational bias was not capable of influencing the codon usage bias in the leading and lagging strands; and (iii) gene length was not the important factor in synonymous codon usage pattern in this organism. Additionally, the high correlation between tRNA adaptation index (tAI) value and codon adaptation index (CAI), frequency of optimal codons (Fop) value, reinforced the role of natural selection for efficient translation in S. agalactiae. Comparison of synonymous codon usage pattern between S. agalactiae and susceptible hosts (human and tilapia) showed that synonymous codon usage of S. agalactiae was independent of the synonymous codon usage of susceptible hosts. The study of codon usage in S. agalactiae may provide evidence about the molecular evolution of the bacterium and a greater understanding of evolutionary relationships between S. agalactiae and its hosts.

  13. Comparing the Self-Report and Measured Smartphone Usage of College Students: A Pilot Study.

    Science.gov (United States)

    Lee, Heyoung; Ahn, Heejune; Nguyen, Trung Giang; Choi, Sam-Wook; Kim, Dae Jin

    2017-03-01

    Nowadays smartphone overuse has become a social and medical concern. For the diagnosis and treatment, clinicians use the self-report information, but the report data often does not match actual usage pattern. The paper examines the similarity and variance in smartphone usage patterns between the measured data and self-reported data. Together with the self-reported data, the real usage log data is collected from 35 college students in a metropolitan region of Northeast Asia, using Android smartphone monitoring application developed by the authors. The unconscious users underestimate their usage time by 40%, in spite of 15% more use in the actual usage. Messengers are most-used application regardless of their self-report, and significant preference to SNS applications was observed in addict group. The actual hourly pattern is consistent with the reported one. College students use more in the afternoon, when they have more free time and cannot use PCs. No significant difference in hourly pattern is observed between the measured and self-report. The result shows there are significant cognitive bias in actual usage patterns exists in self report of smartphone addictions. Clinicians are recommended to utilize measurement tools in diagnosis and treatment of smartphone overusing subjects.

  14. Full-duplex transmission of IEEE 802.11ac-compliant MIMO WLAN signals over a 2-km 7-core fiber

    NARCIS (Netherlands)

    Fan, Yuting; Li, Jianqiang; Lei, Yi; Tang, Ming; Yin, Feifei; Dai, Yitang; Xu, Kun

    2017-01-01

    In this Letter, we experimentally demonstrate a full-duplex transmission system of IEEE 802.11ac-compliant multiple-input multiple-output (MIMO) signals over a 2-km 7-core fiber for in-building wireless local-area network (WLAN) distributed antenna systems. For full-duplex 3 � 3 MIMO

  15. A Comparative Survey of Adaptive Codec Solutions for VoIP over Multirate WLANs: A Capacity versus Quality Performance Trade-Off

    Directory of Open Access Journals (Sweden)

    Sfairopoulou A

    2011-01-01

    Full Text Available In multi-rate WLANs, users can suffer transmission rate changes due to the link adaptation mechanism. This results in a variable capacity channel, which is very hostile for VoIP and can cause serious quality of service (QoS degradation in all active calls. Various codec adaptation mechanisms have been proposed as a solution to this, as well as to solve congestion problems on WLAN environments. Here, these solutions are presented, categorized according to the adaptation policy and scenario they implement, and evaluated at call-level in terms of the resulting blocking and dropping probabilities, as well as the perceived voice quality. To define a common performance metric, a new index named VGoS-factor is presented, which, by combining these capacity and quality indicators, can provide an overall view of the capacity versus quality trade-off of the proposed mechanisms and consequently help in choosing the adequate policy for each scenario.

  16. A Very Compact and Low Profile UWB Planar Antenna with WLAN Band Rejection.

    Science.gov (United States)

    Syed, Avez; Aldhaheri, Rabah W

    2016-01-01

    A low-cost coplanar waveguide fed compact ultrawideband (UWB) antenna with band rejection characteristics for wireless local area network (WLAN) is proposed. The notch band characteristic is achieved by etching half wavelength C-shaped annular ring slot in the radiating patch. By properly choosing the radius and position of the slot, the notch band can be adjusted and controlled. With an overall size of 18.7 mm × 17.6 mm, the antenna turns out to be one of the smallest UWB antennas with band-notched characteristics. It has a wide fractional bandwidth of 130% (2.9-13.7 GHz) with VSWR applications.

  17. Socio-Psychological Dimensions of Mobile Phone Addiction and Usage Patterns amongst Teenagers in Higher Institutions of Learning in Kwara State

    Science.gov (United States)

    Titilope, Afolayan Oluyinka

    2014-01-01

    Mobile phone addiction is now a common phenomenon in the 21st century, especially among teenagers due to the unusual cravings in the use of technological devices. In view of this phenomenon, the study examined the socio-psychological dimensions of mobile phone addiction and usage patterns amongst teenagers in three Higher Institutions of Learning…

  18. Energy-Efficient Bandwidth Allocation for Multiuser Scalable Video Streaming over WLAN

    Directory of Open Access Journals (Sweden)

    Lafruit Gauthier

    2008-01-01

    Full Text Available Abstract We consider the problem of packet scheduling for the transmission of multiple video streams over a wireless local area network (WLAN. A cross-layer optimization framework is proposed to minimize the wireless transceiver energy consumption while meeting the user required visual quality constraints. The framework relies on the IEEE 802.11 standard and on the embedded bitstream structure of the scalable video coding scheme. It integrates an application-level video quality metric as QoS constraint (instead of a communication layer quality metric with energy consumption optimization through link layer scaling and sleeping. Both energy minimization and min-max energy optimization strategies are discussed. Simulation results demonstrate significant energy gains compared to the state-of-the-art approaches.

  19. An evaluation on consumers' usage pattern of acetaminophen (paracetamol: A multicenter study from Penang, Malaysia

    Directory of Open Access Journals (Sweden)

    Chee Ping Chong

    2017-01-01

    Full Text Available Background: Acetaminophen poisoning is becoming an increasingly common social problem in Malaysia. An understanding of consumers' usage pattern of acetaminophen is essential in addressing the issue of accidental acetaminophen poisoning. This study was therefore aimed to evaluate the usage pattern of acetaminophen among the consumers in the state of Penang, Malaysia. Methods: A survey using a questionnaire was carried out in Health Clinic of University Sciences Malaysia (USM, Outpatient Clinic of Advance Medical and Dental Institute, USM, and five selected community pharmacies in the state of Penang from February 2013 to April 2013. A convenient sample of 400 Malaysian consumers was involved in this study. Results: Majority (98.0% of the consumers had ever taken acetaminophen. The consumers mostly used acetaminophen for headache (75.0% and fever (72.8%. The 500 mg acetaminophen tablet was more commonly used among the consumers (94.3% then the 650 mg tablet (44.3%. A total of 1.1% of the consumers had taken more than two tablets of acetaminophen 500 mg tablet per intake. Meanwhile, 24.4% of the consumers had taken two tablets or more of acetaminophen 650 mg tablet per intake. The consumers mostly consumed acetaminophen in a frequency of either 4 hourly (29.5%, 8 hourly (17.3% or 6 hourly (14.8%. However, 6.3% and 7.0% of the consumers would increase the dosage or frequency of acetaminophen consumption, respectively, when their conditions or symptoms persisted after taking the acetaminophen. Conclusions: The use of acetaminophen is prevalent among the surveyed consumers. The risks of acetaminophen overdose were found among the consumers.

  20. Peri-operative communication patterns and media usage--implications for systems design.

    Science.gov (United States)

    Karlsen, Ero S; Toussaint, Pieter Jelle

    2010-01-01

    Inter-hospital communication amounts for a great deal of clinicians' work time. While communication is essential to coordinate care, it can also be time consuming and interruptive, and breakdown in communication is an important source of medical errors. One contributor to the interruptive nature of communication is the use of synchronous media, and there is clearly a potential for novel technologies. To assess communication patterns and media usage we performed an ethnographic field study in the peri-operative environment at a Norwegian hospital, as well as interviews with nurses. We analyze the results with regards to choice of media, characteristics of the conversations taking place and meta-messages, and account for addressing, obtrusiveness and information richness in the message exchanges. We find a relative high degree of interruptiveness in communication, and ascribe it to 1) a lack of situational awareness between locations in the peri-operative domain, as well as 2) use of synchronous media. This suggests that design of novel technology for intra-hospital communication should aim at supporting sender-receiver awareness and signaling of availability.

  1. Fairness analysis of throughput and delay in WLAN environments with channel diversities

    Directory of Open Access Journals (Sweden)

    Fang Shih-Hau

    2011-01-01

    Full Text Available Abstract The article investigates fairness in terms of throughput and packet delays among users with diverse channel conditions due to the mobility and fading effects in IEEE 802.11 WLAN (wireless local area networks environments. From our analytical results, it is shown that 802.11 CSMA/CA can present fairness among hosts with identical link qualities regardless of equal or different data rates applied. Our analytical results further demonstrate that the presence of diverse channel conditions can pose significant unfairness on both throughput and packet delays even with a link adaptation mechanism since the MCSs (modulation and coding schemes available are limited. The simulation results validate the accuracy of our analytical model.

  2. A highly linear baseband G{sub m}-C filter for WLAN application

    Energy Technology Data Exchange (ETDEWEB)

    Yang Lijun; Chen Zhiming [Department of Electronic Engineering, Xi' an University of Technology, Xi' an 710048 (China); Gong Zheng; Shi Yin, E-mail: ljyang@sci-inc.com.cn [Suzhou-CAS Semiconductors Integrated Technology Research Center, Suzhou 215021 (China)

    2011-09-15

    A low voltage, highly linear transconductan-C (G{sub m}-C) low-pass filter for wireless local area network (WLAN) transceiver application is proposed. This transmitter (Tx) filter adopts a 9.8 MHz 3rd-order Chebyshev low pass prototype and achieves 35 dB stop-band attenuation at 30 MHz frequency. By utilizing pseudo-differential linear-region MOS transconductors, the filter IIP{sub 3} is measured to be as high as 9.5 dBm. Fabricated in a 0.35 {mu}m standard CMOS technology, the proposed filter chip occupies a 0.41 x 0.17 mm{sup 2} die area and consumes 3.36 mA from a 3.3-V power supply. (semiconductor integrated circuits)

  3. Computer usage and its relationship with adolescent lifestyle in Hong Kong.

    Science.gov (United States)

    Ho, S M; Lee, T M

    2001-10-01

    To determine the patterns of computer usage among adolescents in Hong Kong and to examine whether computer usage is associated with less physical activity and social support among adolescents. A total of 2110 secondary school students (52% boys and 48% girls) in Hong Kong completed a set of questionnaires to measure their computer usage and lifestyle. Mean age of the respondents was 14.16 years (SD = 1.81 years). Computer usage was taped by asking the students to indicate how much time (in minutes) they spent on the computer each day for doing homework assignments; playing computer games; "surfing" the Internet; and communicating with others. The students also provided information on their social-physical lifestyle. Student's t-tests and analysis of variance were used to examine group differences. Pearson product moment correlations were used to explore relationships between computer usage and lifestyle. Boys who use computers for doing homework, "surfing" the Internet, and communicating with others engage in more social-physical activities than others. Boys who use computers to play games tend to be more social-behaviorally inactive. For girls, patterns of computer usage are not related to lifestyle. Computer users tended to engage in social-physical activities more frequently and had higher social support than nonusers. But among computer users, the amount of time spent daily on the computer was not associated with lifestyle. Instead, patterns of computer usage are more related to lifestyle and the relationship is moderated by gender.

  4. Compact Dual-Band Dipole Antenna with Asymmetric Arms for WLAN Applications

    Directory of Open Access Journals (Sweden)

    Chung-Hsiu Chiu

    2014-01-01

    Full Text Available A dual-band dipole antenna that consists of a horn- and a C-shaped metallic arm is presented. Depending on the asymmetric arms, the antenna provides two −10 dB impedance bandwidths of 225 MHz (about 9.2% at 2.45 GHz and 1190 MHz (about 21.6% at 5.5 GHz, respectively. This feature enables it to cover the required bandwidths for wireless local area network (WLAN operation at the 2.4 GHz band and 5.2/5.8 GHz bands for IEEE 802.11 a/b/g standards. More importantly, the compact size (7 mm × 24 mm and good radiating performance of the antenna are profitable to be integrated with wireless communication devices on restricted RF-elements spaces.

  5. Electromagnetic compatibility of WLAN adapters with life-supporting medical devices.

    Science.gov (United States)

    Calcagnini, G; Mattei, E; Censi, F; Triventi, M; Lo Sterzo, R; Marchetta, E; Bartolini, P

    2011-05-01

    This paper investigates the electromagnetic compatibility of 45 critical care medical devices (infusion pumps, defibrillators, monitors, lung ventilators, anesthesia machines and external pacemakers) with various types of wireless local area network (WLAN, IEEE 802.11 b/g, 2.45 GHz, 100 mW) adapters. Interference is evaluated by performing ad-hoc tests according to the ANSI C63.18 recommended practice. The behavior of the devices during the tests was monitored using patient simulators/device testers specific for each device class. Electromagnetic interference cases were observed in three of 45 devices at a maximum distance of 5 cm. In two cases the interference caused malfunctions that may have clinical consequences for the patient. The authors' findings show that the use of these wireless local area network adapters can be considered reasonably safe, although interference may occur if they are operated at very close distance (<10 cm) to the medical devices.

  6. Usage patterns and attitudes towards emergency contraception: the International Emergency Contraception Research Initiative.

    Science.gov (United States)

    Krassovics, Miklós; Virágh, Gabriella

    2016-08-01

    The aim of the survey was to gain understanding of women's usage patterns and attitudes towards emergency contraception (i.e., the 'morning after pill') and to gain insight into the role and attitudes of pharmacists as providers of emergency contraception. As part of the International Emergency Contraception Research Initiative, approximately 6500 women (15-49 years) and nearly 500 pharmacists from 14 countries in Western, Central and Eastern Europe, and Central Asia completed questionnaires via web-based interrogation or computer-assisted/paper-assisted personal interviews. Common to almost all countries and cultures was that, while awareness of emergency contraception was high (≥84% of respondents, except in Kazakhstan), usage was generally low (4-18%). In Austria, the Czech Republic, Spain, and the UK, better underlying protection with hormonal contraceptives or male condoms would have meant less need for emergency contraception. In Bulgaria, Lithuania, Romania, and Russia, greater dependence on less reliable contraceptive methods such as calendar + withdrawal was associated with higher use of the emergency contraceptive pill (11-18%) but also with higher abortion rates (19-21%). Overt rejection of emergency contraception in the event of an accident was low, except in countries (e.g., Austria, Poland) where the misperception that it acts as an abortifacient was common. Except for Bulgaria, pharmacists elsewhere tended to have limited knowledge and moralistic attitudes towards emergency contraception. Improved educational efforts, probably country-specific, are required to increase the use of highly effective methods of regular contraception and overcome barriers to acceptance of emergency contraception as a suitable postcoital solution to avoid unwanted pregnancy or abortion.

  7. A study on PubMed search tag usage pattern: association rule mining of a full-day PubMed query log.

    Science.gov (United States)

    Mosa, Abu Saleh Mohammad; Yoo, Illhoi

    2013-01-09

    The practice of evidence-based medicine requires efficient biomedical literature search such as PubMed/MEDLINE. Retrieval performance relies highly on the efficient use of search field tags. The purpose of this study was to analyze PubMed log data in order to understand the usage pattern of search tags by the end user in PubMed/MEDLINE search. A PubMed query log file was obtained from the National Library of Medicine containing anonymous user identification, timestamp, and query text. Inconsistent records were removed from the dataset and the search tags were extracted from the query texts. A total of 2,917,159 queries were selected for this study issued by a total of 613,061 users. The analysis of frequent co-occurrences and usage patterns of the search tags was conducted using an association mining algorithm. The percentage of search tag usage was low (11.38% of the total queries) and only 2.95% of queries contained two or more tags. Three out of four users used no search tag and about two-third of them issued less than four queries. Among the queries containing at least one tagged search term, the average number of search tags was almost half of the number of total search terms. Navigational search tags are more frequently used than informational search tags. While no strong association was observed between informational and navigational tags, six (out of 19) informational tags and six (out of 29) navigational tags showed strong associations in PubMed searches. The low percentage of search tag usage implies that PubMed/MEDLINE users do not utilize the features of PubMed/MEDLINE widely or they are not aware of such features or solely depend on the high recall focused query translation by the PubMed's Automatic Term Mapping. The users need further education and interactive search application for effective use of the search tags in order to fulfill their biomedical information needs from PubMed/MEDLINE.

  8. Whose name is it anyway? Varying patterns of possessive usage in eponymous neurodegenerative diseases

    Directory of Open Access Journals (Sweden)

    Michael R. MacAskill

    2013-04-01

    Full Text Available There has been long-standing debate over whether use of the possessive form of the names of eponymous neurological disorders should be abandoned. Which view has actually predominated in practice? We empirically assessed current and historical usage in the scientific literature. The PubMed database was queried for the percentage of titles published each year from 1960–2012 which contained the possessive form of Parkinson’s (PD, Alzheimer’s (AD, Huntington’s (HD, Wilson’s (WD, and Gaucher’s (GD diseases (e.g. Huntington’s disease or chorea vs Huntington disease or chorea. Down syndrome (DS, well known for its changes in terminology, was used as a reference. The possessive form was nearly universal in all conditions from 1960 until the early 1970s. In both DS and GD it then declined at an approximately constant rate of 2 percentage points per year to drop below 15%. The possessive forms of both PD and AD began to decline at the same time but stabilised and have since remained above 80%, with a similar but more volatile pattern in HD. WD, meanwhile, is intermediate between the DS/GD and PD/AD/HD patterns, with a slower decline to its current value of approximately 60%. Declining possessive form usage in GD and DS papers has been remarkably uniform over time and has nearly reached completion. PD and AD appear stable in remaining predominantly possessive. The larger volume of papers published in those fields and their possibly greater public recognition and involvement may make that unlikely to change in the short-term. In a secondary analysis restricted to PD, we found that practices have switched dramatically several times in each of three US-published general neurology journals. Meanwhile, in two UK-published journals, and in the specialist title “Movement Disorders”, the possessive form has been maintained consistently. The use of eponyms in neurology shows systematic variation across time, disorders, and journals.

  9. 8.64-11.62 GHz CMOS VCO and divider in a zero-IF 802.11a/b/g WLAN and Bluetooth application

    International Nuclear Information System (INIS)

    Sun Yu; Mei Niansong; Lu Bo; Huang Yumei; Hong Zhiliang

    2010-01-01

    A fully integrated VCO and divider implemented in SMIC 0.13-μm RFCMOS 1P8M technology with a 1.2 V supply voltage is presented. The frequency of the VCO is tuning from 8.64 to 11.62 GHz while the quadrature LO signals for 802.11a WLAN in 5.8 GHz band or for 802.11b/g WLAN and Bluetooth in 2.4 GHz band can be obtained by a frequency division by 2 or 4, respectively. A 6 bit switched capacitor array is applied for precise tuning of all necessary frequency bands. The testing results show that the VCO has a phase noise of-113 dBc - 1 MHz offset from the carrier of 5.5 GHz by dividing VCO output by two and the VCO core consumes 3.72 mW. The figure-of-merit for the tuning-range (FOM T ) of the VCO is -192.6 dBc/Hz. (semiconductor integrated circuits)

  10. 8.64-11.62 GHz CMOS VCO and divider in a zero-IF 802.11a/b/g WLAN and Bluetooth application

    Energy Technology Data Exchange (ETDEWEB)

    Sun Yu; Mei Niansong; Lu Bo; Huang Yumei; Hong Zhiliang, E-mail: yumeihuang@fudan.edu.c [ASIC and System State Key Laboratory, Fudan University, Shanghai 201203 (China)

    2010-10-15

    A fully integrated VCO and divider implemented in SMIC 0.13-{mu}m RFCMOS 1P8M technology with a 1.2 V supply voltage is presented. The frequency of the VCO is tuning from 8.64 to 11.62 GHz while the quadrature LO signals for 802.11a WLAN in 5.8 GHz band or for 802.11b/g WLAN and Bluetooth in 2.4 GHz band can be obtained by a frequency division by 2 or 4, respectively. A 6 bit switched capacitor array is applied for precise tuning of all necessary frequency bands. The testing results show that the VCO has a phase noise of-113 dBc - 1 MHz offset from the carrier of 5.5 GHz by dividing VCO output by two and the VCO core consumes 3.72 mW. The figure-of-merit for the tuning-range (FOM{sub T}) of the VCO is -192.6 dBc/Hz. (semiconductor integrated circuits)

  11. Genomic analysis of codon usage shows influence of mutation pressure, natural selection, and host features on Marburg virus evolution.

    Science.gov (United States)

    Nasrullah, Izza; Butt, Azeem M; Tahir, Shifa; Idrees, Muhammad; Tong, Yigang

    2015-08-26

    The Marburg virus (MARV) has a negative-sense single-stranded RNA genome, belongs to the family Filoviridae, and is responsible for several outbreaks of highly fatal hemorrhagic fever. Codon usage patterns of viruses reflect a series of evolutionary changes that enable viruses to shape their survival rates and fitness toward the external environment and, most importantly, their hosts. To understand the evolution of MARV at the codon level, we report a comprehensive analysis of synonymous codon usage patterns in MARV genomes. Multiple codon analysis approaches and statistical methods were performed to determine overall codon usage patterns, biases in codon usage, and influence of various factors, including mutation pressure, natural selection, and its two hosts, Homo sapiens and Rousettus aegyptiacus. Nucleotide composition and relative synonymous codon usage (RSCU) analysis revealed that MARV shows mutation bias and prefers U- and A-ended codons to code amino acids. Effective number of codons analysis indicated that overall codon usage among MARV genomes is slightly biased. The Parity Rule 2 plot analysis showed that GC and AU nucleotides were not used proportionally which accounts for the presence of natural selection. Codon usage patterns of MARV were also found to be influenced by its hosts. This indicates that MARV have evolved codon usage patterns that are specific to both of its hosts. Moreover, selection pressure from R. aegyptiacus on the MARV RSCU patterns was found to be dominant compared with that from H. sapiens. Overall, mutation pressure was found to be the most important and dominant force that shapes codon usage patterns in MARV. To our knowledge, this is the first detailed codon usage analysis of MARV and extends our understanding of the mechanisms that contribute to codon usage and evolution of MARV.

  12. Contraceptive usage patterns in North American medical students

    Science.gov (United States)

    Rowen, Tami S.; Smith, James F.; Eisenberg, Michael L.; Breyer, Benjamin N.; Drey, Eleanor A.; Shindel, Alan W.

    2013-01-01

    Background Previous studies indicate that the sexual beliefs and mores of students in medical professions may influence their capacity to care for patients’ sexuality and contraception issues. Students also represent a large sample of reproductive-age individuals. In this study, we examined contraceptive usage patterns in North American medical students. Study Design Students using online medical student social and information networks enrolled in allopathic and osteopathic medical schools in North America between February and July of 2008 were invited to participate via email and published announcements in an Internet-based survey consisting of a questionnaire that assessed ethnodemographic factors, year in school and sexual history. We also collected information about current use of contraceptive and barrier methods. Descriptive statistics and logistic regression were utilized to analyze responses. Results Among our 2269 complete responses, at least one form of contraception was being utilized by 71% of men and 76% of women. Condoms were the most popular form of contraceptive, utilized by 1011 respondents (50% of men and 40% of women). Oral contraceptive pills were the contraceptive of choice for 34% of men and 41% of women. Decreased rates of contraception use were associated with being black or Asian, not being in a relationship and having more sexual dysfunction in female respondents. Students who reported comfort discussing sexual issues with patients were more likely to use effective contraceptive methods themselves. Ten percent of this of sexually active medical students was not currently using contraception. Conclusions There are significant differences in contraceptive use based on demographics, even at the highest education levels. The personal contraception choices of medical students may influence their ability to accurately convey information about contraception to their patients. In addition, medical students may personally benefit from improved

  13. Physical layer simulation study for the coexistence of WLAN standards

    Energy Technology Data Exchange (ETDEWEB)

    Howlader, M. K. [Marquette Univ., 222 Haggerty Hall, P. O. Box 1881, Milwaukee, WI 53201 (United States); Keiger, C. [Analysis and Measurement Services Corporation, 9111 Cross Park Drive, Knoxville, TN 37923 (United States); Ewing, P. D. [Oak Ridge National Laboratory, MS-6006, P. O. Box 2008, Oak Ridge, TN 37831 (United States); Govan, T. V. [U.S. Nuclear Regulatory Commission, MS T-10-D20, 11545 Rockville Pike, Rockville, MD 20852 (United States)

    2006-07-01

    This paper presents the results of a study on the performance of wireless local area network (WLAN) devices in the presence of interference from other wireless devices. To understand the coexistence of these wireless protocols, simplified physical-layer-system models were developed for the Bluetooth, Wireless Fidelity (WiFi), and Zigbee devices, all of which operate within the 2.4-GHz frequency band. The performances of these protocols were evaluated using Monte-Carlo simulations under various interference and channel conditions. The channel models considered were basic additive white Gaussian noise (AWGN), Rayleigh fading, and site-specific fading. The study also incorporated the basic modulation schemes, multiple access techniques, and channel allocations of the three protocols. This research is helping the U.S. Nuclear Regulatory Commission (NRC) understand the coexistence issues associated with deploying wireless devices and could prove useful in the development of a technical basis for guidance to address safety-related issues with the implementation of wireless systems in nuclear facilities. (authors)

  14. Physical layer simulation study for the coexistence of WLAN standards

    International Nuclear Information System (INIS)

    Howlader, M. K.; Keiger, C.; Ewing, P. D.; Govan, T. V.

    2006-01-01

    This paper presents the results of a study on the performance of wireless local area network (WLAN) devices in the presence of interference from other wireless devices. To understand the coexistence of these wireless protocols, simplified physical-layer-system models were developed for the Bluetooth, Wireless Fidelity (WiFi), and Zigbee devices, all of which operate within the 2.4-GHz frequency band. The performances of these protocols were evaluated using Monte-Carlo simulations under various interference and channel conditions. The channel models considered were basic additive white Gaussian noise (AWGN), Rayleigh fading, and site-specific fading. The study also incorporated the basic modulation schemes, multiple access techniques, and channel allocations of the three protocols. This research is helping the U.S. Nuclear Regulatory Commission (NRC) understand the coexistence issues associated with deploying wireless devices and could prove useful in the development of a technical basis for guidance to address safety-related issues with the implementation of wireless systems in nuclear facilities. (authors)

  15. A Study of Age and Gender seen through Mobile Phone Usage Patterns in Mexico

    OpenAIRE

    Sarraute, Carlos; Blanc, Pablo; Burroni, Javier

    2015-01-01

    Mobile phone usage provides a wealth of information, which can be used to better understand the demographic structure of a population. In this paper we focus on the population of Mexican mobile phone users. Our first contribution is an observational study of mobile phone usage according to gender and age groups. We were able to detect significant differences in phone usage among different subgroups of the population. Our second contribution is to provide a novel methodology to predict demogra...

  16. The Scope of Usage-based Theory

    Directory of Open Access Journals (Sweden)

    Paul eIbbotson

    2013-05-01

    Full Text Available Usage-based approaches typically draw on a relatively small set of cognitive processes, such as categorization, analogy and chunking to explain language structure and function. The goal of this paper is to first review the extent to which the ‘cognitive commitment’ of usage-based theory has had success in explaining empirical findings across domains, including language acquisition, processing and typology. We then look at the overall strengths and weaknesses of usage-based theory and highlight where there are significant debates. Finally, we draw special attention to a set of culturally generated structural patterns that seem to lie beyond the explanation of core usage-based cognitive processes. In this context we draw a distinction between cognition permitting language structure versus cognition entailing language structure. As well as addressing the need for greater clarity on the mechanisms of generalizations and the fundamental units of grammar, we suggest that integrating culturally generated structures within existing cognitive models of use will generate tighter predictions about how language works.

  17. TOWARDS A USAGE-BASED COGNITIVE PHONOLOGY

    Directory of Open Access Journals (Sweden)

    Gitten Kristiansen

    2006-12-01

    Full Text Available The usage-based conception of language is a major tenet in Cognitive Linguistics, but cognitive phonology has not yet been developed sufficiently in this direction. Often, phonemic analysis is carried out at the high level of abstraction of `a language´, disregarding rich patterns of languageinternal variation. This paper first argues that cognitive phonology must aim at a higher degree of descriptive refinement, especially in the direction of social variation. Then it goes on to examine the implications of a usage-based and multi-faceted model for a theoretical discussion of the phoneme as a prototype category.

  18. Analysis of transcriptome data reveals multifactor constraint on codon usage in Taenia multiceps.

    Science.gov (United States)

    Huang, Xing; Xu, Jing; Chen, Lin; Wang, Yu; Gu, Xiaobin; Peng, Xuerong; Yang, Guangyou

    2017-04-20

    Codon usage bias (CUB) is an important evolutionary feature in genomes that has been widely observed in many organisms. However, the synonymous codon usage pattern in the genome of T. multiceps remains to be clarified. In this study, we analyzed the codon usage of T. multiceps based on the transcriptome data to reveal the constraint factors and to gain an improved understanding of the mechanisms that shape synonymous CUB. Analysis of a total of 8,620 annotated mRNA sequences from T. multiceps indicated only a weak codon bias, with mean GC and GC3 content values of 49.29% and 51.43%, respectively. Our analysis indicated that nucleotide composition, mutational pressure, natural selection, gene expression level, amino acids with grand average of hydropathicity (GRAVY) and aromaticity (Aromo) and the effective selection of amino-acids all contributed to the codon usage in T. multiceps. Among these factors, natural selection was implicated as the major factor affecting the codon usage variation in T. multiceps. The codon usage of ribosome genes was affected mainly by mutations, while the essential genes were affected mainly by selection. In addition, 21codons were identified as "optimal codons". Overall, the optimal codons were GC-rich (GC:AU, 41:22), and ended with G or C (except CGU). Furthermore, different degrees of variation in codon usage were found between T. multiceps and Escherichia coli, yeast, Homo sapiens. However, little difference was found between T. multiceps and Taenia pisiformis. In this study, the codon usage pattern of T. multiceps was analyzed systematically and factors affected CUB were also identified. This is the first study of codon biology in T. multiceps. Understanding the codon usage pattern in T. multiceps can be helpful for the discovery of new genes, molecular genetic engineering and evolutionary studies.

  19. Performance Analysis of the IEEE 802.11A WLAN Standard Optimum and Sub-Optimum Receiver in Frequency-Selective, Slowly Fading Nakagami Channels with AWGN and Pulsed Noise Jamming

    National Research Council Canada - National Science Library

    Kalogrias, Christos

    2004-01-01

    ... 802.11a wireless local area network (WLAN) standard receiver when the signal is transmitted over a frequency selective, slow fading Nakagami channel in a worst case, pulse-noise jamming environment...

  20. Exposure levels due to WLAN devices in indoor environments corrected by a time-amplitude factor of distribution of the quasi-stochastic signals

    International Nuclear Information System (INIS)

    Miclaus, Simona; Bechet, Paul; Stratakis, Dimitrios

    2014-01-01

    With the development of radiofrequency technology, radiating quasi-stochastic signals like the wireless local area networks (WLAN), a proper procedure of exposure level assessment is needed. No standardised procedure exists at the moment. While channel power measurement proved to overestimate the field strength, weighting techniques were proposed. The paper compares the exposure levels determined by three different procedures, two of them correcting the field level by weighting. Twenty-three experimental cases of WLAN traffic load are analysed in an indoor environment in controlled conditions. The results show the differences obtained when the duty cycle (DC) method is applied comparatively with the application of weighting based on an amplitude-time correction. Significant exposure level reductions of 52.6-79.2 % from the field determined by frequency domain method and of 36.5-72.8 % from the field determined by the DC weighting method were obtained by time-amplitude method. Specificities of weighting factors probability density functions were investigated and regression analysis was applied for a detailed characterisation of this procedure. (authors)

  1. Mutual Coupling Effects on Pattern Diversity Antennas for MIMO Femtocells

    Directory of Open Access Journals (Sweden)

    Yue Gao

    2010-01-01

    Full Text Available Diversity antennas play an important role in wireless communications. However, mutual coupling between multiple ports of a diversity antenna has significant effects on wireless radio links and channel capacity. In this paper, dual-port pattern diversity antennas for femtocell applications are proposed to cover GSM1800, UMTS, and WLAN frequency bands. The channel capacities of the proposed antennas and two ideal dipoles with different mutual coupling levels are investigated in an indoor environment. The relation between mutual coupling and channel capacity is observed through investigations of these antennas.

  2. Design of modified pentagonal patch antenna on defective ground for Wi-Max/WLAN application

    Science.gov (United States)

    Rawat, Sanyog; Sharma, K. K.

    2016-04-01

    This paper presents the design and performance of a modified pentagonal patch antenna with defective ground plane. A pentagonal slot is inserted in the pentagonal patch and slot loaded ground through optimized dimensions is used in the antenna to resonate it at dual frequency. The geometry operates at two resonant frequencies (2.5 GHz and 5.58 GHz) and offers impedance bandwidth of 864 MHz and 554 MHz in the two bands of interest. The proposed antenna covers the lower band (2.45 to 2.484/2.495 to 2.695 GHz) and upper band (5.15 to 5.825 GHz/5.25 to 5.85 GHz) allocated for Wi-Max and WLAN communication systems.

  3. Efficient Closed-Loop Schemes for MIMO-OFDM-Based WLANs

    Directory of Open Access Journals (Sweden)

    Jiang Yi

    2006-01-01

    Full Text Available The single-input single-output (SISO orthogonal frequency-division multiplexing (OFDM systems for wireless local area networks (WLAN defined by the IEEE 802.11a standard can support data rates up to 54 Mbps. In this paper, we consider deploying two transmit and two receive antennas to increase the data rate up to 108 Mbps. Applying our recent multiple-input multiple-output (MIMO transceiver designs, that is, the geometric mean decomposition (GMD and the uniform channel decomposition (UCD schemes, we propose simple and efficient closed-loop MIMO-OFDM designs for much improved performance, compared to the standard singular value decomposition (SVD based schemes as well as the open-loop V-BLAST (vertical Bell Labs layered space-time based counterparts. In the explicit feedback mode, precoder feedback is needed for the proposed schemes. We show that the overhead of feedback can be made very moderate by using a vector quantization method. In the time-division duplex (TDD mode where the channel reciprocity is exploited, our schemes turn out to be robust against the mismatch between the uplink and downlink channels. The advantages of our schemes are demonstrated via extensive numerical examples.

  4. Commercial Building Tenant Energy Usage Aggregation and Privacy

    Energy Technology Data Exchange (ETDEWEB)

    Livingston, Olga V.; Pulsipher, Trenton C.; Anderson, David M.; Wang, Na

    2014-10-31

    A growing number of building owners are benchmarking their building energy use. This requires the building owner to acquire monthly whole-building energy usage information, which can be challenging for buildings in which individual tenants have their own utility meters and accounts with the utility. Some utilities and utility regulators have turned to aggregation of customer energy use data (CEUD) as a way to give building owners whole-building energy usage data while protecting customer privacy. Meter profile aggregation adds a layer of protection that decreases the risk of revealing CEUD as the number of meters aggregated increases. The report statistically characterizes the similarity between individual energy usage patterns and whole-building totals at various levels of meter aggregation.

  5. Improvement in the workflow efficiency of treating non-emergency outpatients by using a WLAN-based real-time location system in a level I trauma center.

    Science.gov (United States)

    Stübig, Timo; Suero, Eduardo; Zeckey, Christian; Min, William; Janzen, Laura; Citak, Musa; Krettek, Christian; Hüfner, Tobias; Gaulke, Ralph

    2013-01-01

    Patient localization can improve workflow in outpatient settings, which might lead to lower costs. The existing wireless local area network (WLAN) architecture in many hospitals opens up the possibility of adopting real-time patient tracking systems for capturing and processing position data; once captured, these data can be linked with clinical patient data. To analyze the effect of a WLAN-based real-time patient localization system for tracking outpatients in our level I trauma center. Outpatients from April to August 2009 were included in the study, which was performed in two different stages. In phase I, patient tracking was performed with the real-time location system, but acquired data were not displayed to the personnel. In phase II tracking, the acquired data were automatically collected and displayed. Total treatment time was the primary outcome parameter. Statistical analysis was performed using multiple linear regression, with the significance level set at 0.05. Covariates included sex, age, type of encounter, prioritization, treatment team, number of residents, and radiographic imaging. 1045 patients were included in our study (540 in phase I and 505 in phase 2). An overall improvement of efficiency, as determined by a significantly decreased total treatment time (23.7%) from phase I to phase II, was noted. Additionally, significantly lower treatment times were noted for phase II patients even when other factors were considered (increased numbers of residents, the addition of imaging diagnostics, and comparison among various localization zones). WLAN-based real-time patient localization systems can reduce process inefficiencies associated with manual patient identification and tracking.

  6. Fuzzy Clustering: An Approachfor Mining Usage Profilesfrom Web

    OpenAIRE

    Ms.Archana N. Boob; Prof. D. M. Dakhane

    2012-01-01

    Web usage mining is an application of data mining technology to mining the data of the web server log file. It can discover the browsing patterns of user and some kind of correlations between the web pages. Web usage mining provides the support for the web site design, providing personalization server and other business making decision, etc. Web mining applies the data mining, the artificial intelligence and the chart technology and so on to the web data and traces users' visiting characteris...

  7. Genome-wide analysis of codon usage bias in Ebolavirus.

    Science.gov (United States)

    Cristina, Juan; Moreno, Pilar; Moratorio, Gonzalo; Musto, Héctor

    2015-01-22

    Ebola virus (EBOV) is a member of the family Filoviridae and its genome consists of a 19-kb, single-stranded, negative sense RNA. EBOV is subdivided into five distinct species with different pathogenicities, being Zaire ebolavirus (ZEBOV) the most lethal species. The interplay of codon usage among viruses and their hosts is expected to affect overall viral survival, fitness, evasion from host's immune system and evolution. In the present study, we performed comprehensive analyses of codon usage and composition of ZEBOV. Effective number of codons (ENC) indicates that the overall codon usage among ZEBOV strains is slightly biased. Different codon preferences in ZEBOV genes in relation to codon usage of human genes were found. Highly preferred codons are all A-ending triplets, which strongly suggests that mutational bias is a main force shaping codon usage in ZEBOV. Dinucleotide composition also plays a role in the overall pattern of ZEBOV codon usage. ZEBOV does not seem to use the most abundant tRNAs present in the human cells for most of their preferred codons. Copyright © 2014 Elsevier B.V. All rights reserved.

  8. SEMICONDUCTOR INTEGRATED CIRCUITS 8.64-11.62 GHz CMOS VCO and divider in a zero-IF 802.11a/b/g WLAN and Bluetooth application

    Science.gov (United States)

    Yu, Sun; Niansong, Mei; Bo, Lu; Yumei, Huang; Zhiliang, Hong

    2010-10-01

    A fully integrated VCO and divider implemented in SMIC 0.13-μm RFCMOS 1P8M technology with a 1.2 V supply voltage is presented. The frequency of the VCO is tuning from 8.64 to 11.62 GHz while the quadrature LO signals for 802.11a WLAN in 5.8 GHz band or for 802.11b/g WLAN and Bluetooth in 2.4 GHz band can be obtained by a frequency division by 2 or 4, respectively. A 6 bit switched capacitor array is applied for precise tuning of all necessary frequency bands. The testing results show that the VCO has a phase noise of—113 dBc @ 1 MHz offset from the carrier of 5.5 GHz by dividing VCO output by two and the VCO core consumes 3.72 mW. The figure-of-merit for the tuning-range (FOMT) of the VCO is -192.6 dBc/Hz.

  9. Differential trends in the codon usage patterns in HIV-1 genes.

    Directory of Open Access Journals (Sweden)

    Aridaman Pandit

    Full Text Available Host-pathogen interactions underlie one of the most complex evolutionary phenomena resulting in continual adaptive genetic changes, where pathogens exploit the host's molecular resources for growth and survival, while hosts try to eliminate the pathogen. Deciphering the molecular basis of host-pathogen interactions is useful in understanding the factors governing pathogen evolution and disease propagation. In host-pathogen context, a balance between mutation, selection, and genetic drift is known to maintain codon bias in both organisms. Studies revealing determinants of the bias and its dynamics are central to the understanding of host-pathogen evolution. We considered the Human Immunodeficiency Virus (HIV type 1 and its human host to search for evolutionary signatures in the viral genome. Positive selection is known to dominate intra-host evolution of HIV-1, whereas high genetic variability underlies the belief that neutral processes drive inter-host differences. In this study, we analyze the codon usage patterns of HIV-1 genomes across all subtypes and clades sequenced over a period of 23 years. We show presence of unique temporal correlations in the codon bias of three HIV-1 genes illustrating differential adaptation of the HIV-1 genes towards the host preferred codons. Our results point towards gene-specific translational selection to be an important force driving the evolution of HIV-1 at the population level.

  10. Describing Speech Usage in Daily Activities in Typical Adults.

    Science.gov (United States)

    Anderson, Laine; Baylor, Carolyn R; Eadie, Tanya L; Yorkston, Kathryn M

    2016-01-01

    "Speech usage" refers to what people want or need to do with their speech to meet communication demands in life roles. The purpose of this study was to contribute to validation of the Levels of Speech Usage scale by providing descriptive data from a sample of adults without communication disorders, comparing this scale to a published Occupational Voice Demands scale and examining predictors of speech usage levels. This is a survey design. Adults aged ≥25 years without reported communication disorders were recruited nationally to complete an online questionnaire. The questionnaire included the Levels of Speech Usage scale, questions about relevant occupational and nonoccupational activities (eg, socializing, hobbies, childcare, and so forth), and demographic information. Participants were also categorized according to Koufman and Isaacson occupational voice demands scale. A total of 276 participants completed the questionnaires. People who worked for pay tended to report higher levels of speech usage than those who do not work for pay. Regression analyses showed employment to be the major contributor to speech usage; however, considerable variance left unaccounted for suggests that determinants of speech usage and the relationship between speech usage, employment, and other life activities are not yet fully defined. The Levels of Speech Usage may be a viable instrument to systematically rate speech usage because it captures both occupational and nonoccupational speech demands. These data from a sample of typical adults may provide a reference to help in interpreting the impact of communication disorders on speech usage patterns. Copyright © 2016 The Voice Foundation. Published by Elsevier Inc. All rights reserved.

  11. Codon usage bias and phylogenetic analysis of mitochondrial ND1 gene in pisces, aves, and mammals.

    Science.gov (United States)

    Uddin, Arif; Choudhury, Monisha Nath; Chakraborty, Supriyo

    2018-01-01

    The mitochondrially encoded NADH:ubiquinone oxidoreductase core subunit 1 (MT-ND1) gene is a subunit of the respiratory chain complex I and involved in the first step of the electron transport chain of oxidative phosphorylation (OXPHOS). To understand the pattern of compositional properties, codon usage and expression level of mitochondrial ND1 genes in pisces, aves, and mammals, we used bioinformatic approaches as no work was reported earlier. In this study, a perl script was used for calculating nucleotide contents and different codon usage bias parameters. The codon usage bias of MT-ND1 was low but the expression level was high as revealed from high ENC and CAI value. Correspondence analysis (COA) suggests that the pattern of codon usage for MT-ND1 gene is not same across species and that compositional constraint played an important role in codon usage pattern of this gene among pisces, aves, and mammals. From the regression equation of GC12 on GC3, it can be inferred that the natural selection might have played a dominant role while mutation pressure played a minor role in influencing the codon usage patterns. Further, ND1 gene has a discrepancy with cytochrome B (CYB) gene in preference of codons as evident from COA. The codon usage bias was low. It is influenced by nucleotide composition, natural selection, mutation pressure, length (number) of amino acids, and relative dinucleotide composition. This study helps in understanding the molecular biology, genetics, evolution of MT-ND1 gene, and also for designing a synthetic gene.

  12. Dual-Band Compact Planar Antenna for a Low-Cost WLAN USB Dongle

    Directory of Open Access Journals (Sweden)

    Maurício Henrique Costa Dias

    2014-01-01

    Full Text Available Among the present technologies for WLAN devices, USB dongles still play a noticeable role. One major design challenge regards the antenna, which unavoidably has to comply with a very small volume available and sometimes should also allow multiband operation. In this scope, the present work discusses a dual-band WiFi compact planar IFA-based antenna design for a low-cost USB dongle application. Like most of the related published solutions, the methodology for deriving the present proposition was assisted by the use of an antenna analysis software. A prototype was assembled and tested in order to qualify the radiator design. Practical operation conditions were considered in the tests, such as the influence of the dongle case and the effect of the notebook itself. The results complied with the design constraints, presenting an impedance match quite stable regardless of the stick position alongside a laptop base.

  13. Wideband dual frequency modified ellipse shaped patch antenna for WLAN/Wi-MAX/UWB application

    Science.gov (United States)

    Jain, P. K.; Jangid, K. G.; R. Sharma, B.; Saxena, V. K.; Bhatnagar, D.

    2018-05-01

    This paper communicates the design and performance of microstrip line fed modified ellipses shaped radiating patch with defected ground structure. Wide impedance bandwidth performance is achieved by applying a pentagonal slot and T slot structure in ground plane. By inserting two semi ellipses shaped ring in ground, we obtained axial ratio bandwidth approx 600 MHz. The proposed antenna is simulated by utilizing CST Microwave Studio simulator 2014. This antenna furnishes wide impedance bandwidth approx. 4.23 GHz, which has spread into two bands 2.45 GHz - 5.73 GHz and 7.22 GHz - 8.17 GHz with nearly flat gain in operating frequency range. This antenna may be proved as a practicable structure for modern wireless communication systems including Wi-MAX, WLAN and lower band of UWB.

  14. Questionnaire survey to assess the pattern and characteristics of cell-phone usage among Indian oncologists.

    Science.gov (United States)

    Munshi, Anusheel; Dutta, Debanarayan; Tike, Pramod; Agarwal, Jai Prakash

    2016-01-01

    Obtain baseline data of cell-phone usage in the medical (MO), surgical (SO) and radiation (RO) oncology community practicing in India. Indigenously prepared cell-phone usage related questionnaire was used in the present study after approval by the Institutional Ethics/Scientific Committees. The questionnaire had 41 items and was made to assess the cell-phone usage parameters, utility in clinical practice, awareness, and to compare parameters between oncology specialties. Between November 2009 and January 2010, the questionnaire was sent as an E-mail attachment to 200 oncologists in India. In all, 123 responses were received (61% responders); 84 (68.3%) were RO. The median age of responders was 35 years. Overall, 80% felt handicapped without cell-phone. The Mean cell-phone score, an index to assess overall usefulness over a score of 1-10, was 6.46 (median 7, standard deviation 1.709). There was no significant difference between RO, MO and SO in duration of usage (P = 0.235), number of cell-phones (P = 0.496), call duration per day (P = 0.490) and dependence on cell-phone (P = 0.574). Age of starting cell-phone usage was earlier in RO (P = 0.086). Professional usage was significantly more by MO and SO compared to RO (P cell-phone hazards compared to RO (P cell-phones a useful tool in patient care. More RO are aware of potential cell-phone hazards compared to non-RO's.

  15. Analisa Horizontal Handover Terhadap Qos Layanan Streaming Multimedia E-Learning Pada Jaringan WLAN 802.11

    Directory of Open Access Journals (Sweden)

    I M.O. Widyantara

    2015-06-01

    Full Text Available In this globalization era, the state of the user who no longer occupies in a single place, but always moving, it is necessary to continuity of communication that will cause a handover. This paper intends to analyze the effect of 802.11 WLAN horizontal handover to the QoS of streaming e-learning. Methods of data collection process using the Cisco 3500 series access point that supports handover with existing network systems, ad-hoc network and type of hard handover. The results of the data analysis showed that the handover process is able to improve the QoS by gradually restored gradually, to get back to normal QoS

  16. Collecting conditions usage metadata to optimize current and future ATLAS software and processing

    CERN Document Server

    AUTHOR|(INSPIRE)INSPIRE-00064378; The ATLAS collaboration; Formica, Andrea; Gallas, Elizabeth; Oda, Susumu; Rinaldi, Lorenzo; Rybkin, Grigori; Verducci, Monica

    2017-01-01

    Conditions data (for example: alignment, calibration, data quality) are used extensively in the processing of real and simulated data in ATLAS. The volume and variety of the conditions data needed by different types of processing are quite diverse, so optimizing its access requires a careful understanding of conditions usage patterns. These patterns can be quantified by mining representative log files from each type of processing and gathering detailed information about conditions usage for that type of processing into a central repository.

  17. Analysis of the synonymous codon usage bias in recently emerged enterovirus D68 strains.

    Science.gov (United States)

    Karniychuk, Uladzimir U

    2016-09-02

    Understanding the codon usage pattern of a pathogen and relationship between pathogen and host's codon usage patterns has fundamental and applied interests. Enterovirus D68 (EV-D68) is an emerging pathogen with a potentially high public health significance. In the present study, the synonymous codon usage bias of 27 recently emerged, and historical EV-D68 strains was analyzed. In contrast to previously studied enteroviruses (enterovirus 71 and poliovirus), EV-D68 and human host have a high discrepancy between favored codons. Analysis of viral synonymous codon usage bias metrics, viral nucleotide/dinucleotide compositional parameters, and viral protein properties showed that mutational pressure is more involved in shaping the synonymous codon usage bias of EV-D68 than translation selection. Computation of codon adaptation indices allowed to estimate expression potential of the EV-D68 genome in several commonly used laboratory animals. This approach requires experimental validation and may provide an auxiliary tool for the rational selection of laboratory animals to model emerging viral diseases. Enterovirus D68 genome compositional and codon usage data can be useful for further pathogenesis, animal model, and vaccine design studies. Copyright © 2016 Elsevier B.V. All rights reserved.

  18. Current practice patterns of drain usage amongst UK and Irish surgeons performing bilateral breast reductions: Evidence down the drain.

    Science.gov (United States)

    Sugrue, Conor M; McInerney, Niall; Joyce, Cormac W; Jones, Deidre; Hussey, Alan J; Kelly, Jack L; Kerin, Michael J; Regan, Padraic J

    2015-01-01

    Bilateral breast reduction (BBR) is one of the most frequently performed female breast operations. Despite no evidence supporting efficacy of drain usage in BBRs, postoperative insertion is common. Recent high quality evidence demonstrating potential harm from drain use has subsequently challenged this traditional practice. The aim of this study is to assess the current practice patterns of drains usage by Plastic & Reconstructive and Breast Surgeons in UK and Ireland performing BBRs. An 18 question survey was created evaluating various aspects of BBR practice. UK and Irish Plastic & Reconstructive and Breast Surgeons were invited to participate by an email containing a link to a web-based survey. Statistical analysis was performed with student t-test and chi-square test. Two hundred and eleven responding surgeons were analysed, including 80.1% (171/211) Plastic Surgeons and 18.9% (40/211) Breast Surgeons. Of the responding surgeons, 71.6% (151/211) routinely inserted postoperative drains, for a mean of 1.32 days. Drains were used significantly less by surgeons performing ≥20 BBRs (p = 0.02). With the majority of BBRs performed as an inpatient procedure, there was a trend towards less drain usage in surgeons performing this procedure as an outpatient; however, this was not statistically significant (p = 0.07). Even with the high level of evidence demonstrating the safety of BBR without drains, they are still routinely utilised. In an era of evidence- based medicine, surgeons performing breast reductions must adopt the results from scientific research into their clinical practice.

  19. A MIMO System with Backward Compatibility for OFDM-Based WLANs

    Directory of Open Access Journals (Sweden)

    Liu Jianhua

    2004-01-01

    Full Text Available Orthogonal frequency division multiplexing (OFDM has been selected as the basis for the new IEEE 802.11a standard for high-speed wireless local area networks (WLANs. We consider doubling the transmission data rate of the IEEE 802.11a system by using two transmit and two receive antennas. We propose a preamble design for this multi-input multi-output (MIMO system that is backward compatible with its single-input single-output (SISO counterpart as specified by the IEEE 802.11a standard. Based on this preamble design, we devise a sequential method for the estimation of the carrier frequency offset (CFO, symbol timing, and MIMO channel response. We also provide a simple soft detector based on the unstructured least square approach to obtain the soft information for the Viterbi decoder. This soft detector is very simple since it decouples the multidimensional QAM symbol detection into multiple one-dimensional QAM symbol—and further PAM symbol—detections. Both the sequential parameter estimation method and the soft detector can provide excellent overall system performance and are ideally suited for real-time implementations. The effectiveness of our methods is demonstrated via numerical examples.

  20. Changing word usage predicts changing word durations in New Zealand English.

    Science.gov (United States)

    Sóskuthy, Márton; Hay, Jennifer

    2017-09-01

    This paper investigates the emergence of lexicalized effects of word usage on word duration by looking at parallel changes in usage and duration over 130years in New Zealand English. Previous research has found that frequent words are shorter, informative words are longer, and words in utterance-final position are also longer. It has also been argued that some of these patterns are not simply online adjustments, but are incorporated into lexical representations. While these studies tend to focus on the synchronic aspects of such patterns, our corpus shows that word-usage patterns and word durations are not static over time. Many words change in duration and also change with respect to frequency, informativity and likelihood of occurring utterance-finally. Analysis of changing word durations over this time period shows substantial patterns of co-adaptation between word usage and word durations. Words that are increasing in frequency are becoming shorter. Words that are increasing/decreasing in informativity show a change in the same direction in duration (e.g. increasing informativity is associated with increasing duration). And words that are increasingly appearing utterance-finally are lengthening. These effects exist independently of the local effects of the predictors. For example, words that are increasing utterance-finally lengthen in all positions, including utterance-medially. We show that these results are compatible with a number of different views about lexical representations, but they cannot be explained without reference to a production-perception loop that allows speakers to update their representations dynamically on the basis of their experience. Copyright © 2017 The Authors. Published by Elsevier B.V. All rights reserved.

  1. In patients with minimally symptomatic OSA can baseline characteristics and early patterns of CPAP usage predict those who are likely to be longer-term users of CPAP.

    Science.gov (United States)

    Turnbull, Christopher D; Bratton, Daniel J; Craig, Sonya E; Kohler, Malcolm; Stradling, John R

    2016-02-01

    Long-term continuous positive airway pressure (CPAP) usage varies between individuals. It would be of value to be able to identify those who are likely to benefit from CPAP (and use it long term), versus those who would not, and might therefore benefit from additional help early on. First, we explored whether baseline characteristics predicted CPAP usage in minimally symptomatic obstructive sleep apnoea (OSA) patients, a group who would be expected to have low usage. Second, we explored if early CPAP usage was predictive of longer-term usage, as has been shown in more symptomatic OSA patients. The MOSAIC trial was a multi-centre randomised controlled trial where minimally symptomatic OSA patients were randomised to CPAP, or standard care, for 6 months. Here we have studied only those patients randomised to CPAP treatment. Baseline characteristics including symptoms, questionnaires [including the Epworth sleepiness score (ESS)] and sleep study parameters were recorded. CPAP usage was recorded at 2-4 weeks after initiation and after 6 months. The correlation and association between baseline characteristics and 6 months CPAP usage was assessed, as was the correlation between 2 and 4 weeks CPAP usage and 6 months CPAP usage. One hundred and ninety-five patients randomised to CPAP therapy had median [interquartile range (IQR)] CPAP usage of 2:49 (0:44, 5:13) h:min/night (h/n) at the 2-4 weeks visit, and 2:17 (0:08, 4:54) h/n at the 6 months follow-up visit. Only male gender was associated with increased long-term CPAP use (male usage 2:56 h/n, female 1:57 h/n; P=0.02). There was a moderate correlation between the usage of CPAP at 2-4 weeks and 6 months, with about 50% of the variability in long-term use being predicted by the short-term use. In patients with minimally symptomatic OSA, our study has shown that male gender (and not OSA severity or symptom burden) is associated with increased long-term use of CPAP at 6 months. Although, in general, early patterns of CPAP

  2. A CPW-fed Triple-band Antenna for WLAN and WiMAX Applications

    Directory of Open Access Journals (Sweden)

    X.L.Yang

    2014-12-01

    Full Text Available In this letter, a compact printed antenna fed by coplanar waveguide for triple-band is presented. The proposed antenna consists of two rectangular metallic loops in front and a slit square ring on the backside. Tri-band has been achieved, which can be easily tuned by adjusting the sizes of the rectangles. An analysis of equal lumped circuit mechanism as well the triple band operation is provided. Key parameters to tune the resonant frequencies have been identified. The overall dimension of the proposed antenna is 30×26 mm^2. Simulated results show that the presented antenna can cover three separated impedance bandwidths of ~13% at 300 MHz (2.2–2.5 GHz, ~14% at 500 MHz (3.3–3.8 GHz, and ~15% at 800 MHz (5.1–5.9 GHz, which are well applied for both 2.4/5.2/5.8-GHz WLAN bands and 3.5/5.5-GHz WiMAX bands.

  3. Modified Cooperative Access with Relay’s Data (MCARD based Directional Antenna for multi-rate WLANs

    Directory of Open Access Journals (Sweden)

    Ahmed Magdy

    2014-03-01

    Full Text Available In this paper, for multi-rate wireless local area networks (WLANs, a modified protocol in Medium Access Control (MAC, called Modified Cooperative Access with Relay’s Data (MCARD based Directional Antenna using half wave length dipole in Uniform Circular Array (UCA topology is proposed. MCARD gives remote stations chance to send their information by using intermediate stations (relays to Access Point (AP at a higher data rate based practical antenna. As can be seen under MCARD, a relay station transmits its information before forwarding information from the source station because it uses directional antenna. Analytical results and simulations show that MCARD can significantly improve system quality of service (QOS in terms of throughput under different channel conditions.

  4. Customers Demographics Influence on Usage of Retail Banking Channels

    Directory of Open Access Journals (Sweden)

    Neha GUPTA

    2016-09-01

    Full Text Available The study presents the usage of retail banking influenced by customers’ demographics of selected Public Sector Banks (PSBs of India. The study was based on primary data collected through structured questionnaire. The simple random sampling technique used for data collection for sample size 692. The study finds that public sector banks need to understand the usage pattern of an individual customer using delivery channel to add greater value to customers. Respondent age groups influence ATMs usage. Internet banking is majorly influenced by the customers’ demographics. Respondents’ age group and qualification influence mobile banking. Branch lobby kiosk is not influenced by any demographics. The identification of most influential demographic variable will help to build strong and effective cross-selling and up-selling of financial products and services. Our study was limited to the customers of PSBs of India. This study may be helpful to PSBs for enhancing effective usage of delivery channels.

  5. Virtual Learning System Usage in Higher Education – A Study at Two South African Institutions

    Directory of Open Access Journals (Sweden)

    Indira Padayachee

    2015-12-01

    Full Text Available In higher education institutions various VLSs have been formally adopted to support online teaching and learning. However, there has been little research on patterns of VLS use among educators. The purpose of the research was to provide a descriptive analysis of VLS feature usage, and associated challenges at two South African higher education institutions. A case study research strategy was adopted, combining qualitative and quantitative approaches to data collection and analysis. Survey findings revealed four clusters of VLS feature usage, namely, communication, management, content and pedagogic. Analysis showed that the ‘content cluster’ was used more than the other clusters. The average usage of the ‘pedagogic cluster’ for Durban University of Technology (DUT was significantly greater than that of University of KwaZulu-Natal (UKZN, which tentatively indicates that staff development seems to be an important aspect of VLS usage. There was no significant difference in the usage of the ‘communication’ and ‘management’ clusters between the two institutions, DUT and UKZN. The study contributes to the body of system utilisation research by confirming an uneven pattern of VLS feature usage among educators, whilst providing fresh insights into the challenges associated with the usage of two different VLSs in two different universities.

  6. Jungle Juice: Knowledge and Usage Among Kenyan Surgical Teams

    African Journals Online (AJOL)

    This survey aimed to evaluate knowledge and safe usage of jungle juice on patients in ... patterns and safety measures employed during use of jungle juice among ... Regarding the specific antidote for severe local anesthetic toxicity and its ...

  7. The usage of amount, quantity and body in a corpus of biology

    Directory of Open Access Journals (Sweden)

    Purificación Sánchez Hernández

    2002-04-01

    Full Text Available Grammars and dictionaries usually offer relevant and accurate information to students of a second language. However, the meaning of a textual element is often dynamic and that information is not always based on real usage patterns. New occurrences on the object level in new contexts can introduce novel semantic potentials, so that existing interpretations may be superseded by new ones. Concordancing has been shown to be one of the most important tools to facilitate the understanding of the usage patterns of a language. In this paper we examine the differences between amount, quantity and body as terms expressing magnitude, sum and size in a corpus of Biology. According to some popular dictionaries and grammars, the terms amount and quantity have always been considered synonymous terms for expressing magnitude, size and sum. We demonstrate that, according to our records, they cannot be always used as synonymous terms since they have different patterns of usage. On the other hand there are other forms, such as body, that appear in our Corpus, implying magnitude, size and sum, that are not usually described as having such meanings in dictionaries.

  8. Revelation of Influencing Factors in Overall Codon Usage Bias of Equine Influenza Viruses.

    Directory of Open Access Journals (Sweden)

    Naveen Kumar

    Full Text Available Equine influenza viruses (EIVs of H3N8 subtype are culprits of severe acute respiratory infections in horses, and are still responsible for significant outbreaks worldwide. Adaptability of influenza viruses to a particular host is significantly influenced by their codon usage preference, due to an absolute dependence on the host cellular machinery for their replication. In the present study, we analyzed genome-wide codon usage patterns in 92 EIV strains, including both H3N8 and H7N7 subtypes by computing several codon usage indices and applying multivariate statistical methods. Relative synonymous codon usage (RSCU analysis disclosed bias of preferred synonymous codons towards A/U-ended codons. The overall codon usage bias in EIVs was slightly lower, and mainly affected by the nucleotide compositional constraints as inferred from the RSCU and effective number of codon (ENc analysis. Our data suggested that codon usage pattern in EIVs is governed by the interplay of mutation pressure, natural selection from its hosts and undefined factors. The H7N7 subtype was found less fit to its host (horse in comparison to H3N8, by possessing higher codon bias, lower mutation pressure and much less adaptation to tRNA pool of equine cells. To the best of our knowledge, this is the first report describing the codon usage analysis of the complete genomes of EIVs. The outcome of our study is likely to enhance our understanding of factors involved in viral adaptation, evolution, and fitness towards their hosts.

  9. Revelation of Influencing Factors in Overall Codon Usage Bias of Equine Influenza Viruses

    Science.gov (United States)

    Bhatia, Sandeep; Sood, Richa; Selvaraj, Pavulraj

    2016-01-01

    Equine influenza viruses (EIVs) of H3N8 subtype are culprits of severe acute respiratory infections in horses, and are still responsible for significant outbreaks worldwide. Adaptability of influenza viruses to a particular host is significantly influenced by their codon usage preference, due to an absolute dependence on the host cellular machinery for their replication. In the present study, we analyzed genome-wide codon usage patterns in 92 EIV strains, including both H3N8 and H7N7 subtypes by computing several codon usage indices and applying multivariate statistical methods. Relative synonymous codon usage (RSCU) analysis disclosed bias of preferred synonymous codons towards A/U-ended codons. The overall codon usage bias in EIVs was slightly lower, and mainly affected by the nucleotide compositional constraints as inferred from the RSCU and effective number of codon (ENc) analysis. Our data suggested that codon usage pattern in EIVs is governed by the interplay of mutation pressure, natural selection from its hosts and undefined factors. The H7N7 subtype was found less fit to its host (horse) in comparison to H3N8, by possessing higher codon bias, lower mutation pressure and much less adaptation to tRNA pool of equine cells. To the best of our knowledge, this is the first report describing the codon usage analysis of the complete genomes of EIVs. The outcome of our study is likely to enhance our understanding of factors involved in viral adaptation, evolution, and fitness towards their hosts. PMID:27119730

  10. Everyday Preschool Interpersonal Speech Usage: Methodological, Developmental, and Sociolinguistic Studies

    Science.gov (United States)

    Schachter, Frances Fuchs; And Others

    1974-01-01

    Reports on a study designed to provide data on developmental and sociolinguistic patterns of interpersonal speech usage from ages 2 to 5 years which may have important implications for poverty school programs. (Author/CS)

  11. MRI usage in a pediatric emergency department: an analysis of usage and usage trends over 5 years

    Energy Technology Data Exchange (ETDEWEB)

    Scheinfeld, Meir H. [Montefiore Medical Center, Albert Einstein College of Medicine, Department of Radiology, Division of Emergency Radiology, Bronx, NY (United States); Moon, Jee-Young; Wang, Dan [Albert Einstein College of Medicine, Department of Epidemiology and Population Health, Bronx, NY (United States); Fagan, Michele J. [Montefiore Medical Center, Albert Einstein College of Medicine, Department of Pediatrics, Division of Emergency Medicine, Bronx, NY (United States); Davoudzadeh, Reubin [Montefiore Medical Center, Department of Radiology, Bronx, NY (United States); Taragin, Benjamin H. [Montefiore Medical Center, Albert Einstein College of Medicine, Department of Radiology, Division of Pediatric Radiology, Bronx, NY (United States)

    2017-03-15

    Magnetic resonance imaging (MRI) usage has anecdotally increased due to the principles of ALARA and the desire to Image Gently. Aside from a single abstract in the emergency medicine literature, pediatric emergency department MRI usage has not been described. Our objective was to determine whether MRI use is indeed increasing at a high-volume urban pediatric emergency department with 24/7 MRI availability. Also, we sought to determine which exams, time periods and demographics influenced the trend. Institutional Review Board exemption was obtained. Emergency department patient visit and exam data were obtained from the hospital database for the 2011-2015 time period. MRI usage data were normalized using emergency department patient visit data to determine usage rates. The z-test was used to compare MRI use by gender. The chi-square test was used to test for trends in MRI usage during the study period and in patient age. MRI usage for each hour and each weekday were tabulated to determine peak and trough usage times. MRI usage rate per emergency department patient visit was 0.36%. Headache, pain and rule-out appendicitis were the most common indications for neuroradiology, musculoskeletal and trunk exams, respectively. Usage in female patients was significantly greater than in males (0.42% vs. 0.29%, respectively, P<0.001). Usage significantly increased during the 5-year period (P<0.001). Use significantly increased from age 3 to 17 (0.011% to 1.1%, respectively, P<0.001). Sixty percent of exams were performed after-hours, the highest volume during the 10 p.m. hour and lowest between 4 a.m. and 9 a.m. MRI use was highest on Thursdays and lowest on Sundays (MRI on 0.45% and 0.22% of patients, respectively). MRI use in children increased during the study period, most notably in females, on weekdays and after-hours. (orig.)

  12. Analysis of an Adaptive P-Persistent MAC Scheme for WLAN Providing Delay Fairness

    Science.gov (United States)

    Yen, Chih-Ming; Chang, Chung-Ju; Chen, Yih-Shen; Huang, Ching Yao

    The paper proposes and analyzes an adaptive p-persistent-based (APP) medium access control (MAC) scheme for IEEE 802.11 WLAN. The APP MAC scheme intends to support delay fairness for every station in each access, denoting small delay variance. It differentiates permission probabilities of transmission for stations which are incurred with various packet delays. This permission probability is designed as a function of the numbers of retransmissions and re-backoffs so that stations with larger packet delay are endowed with higher permission probability. Also, the scheme is analyzed by a Markov-chain analysis, where the collision probability, the system throughput, and the average delay are successfully obtained. Numerical results show that the proposed APP MAC scheme can attain lower mean delay and higher mean throughput. In the mean time, simulation results are given to justify the validity of the analysis, and also show that the APP MAC scheme can achieve more delay fairness than conventional algorithms.

  13. ChloroMitoCU: Codon patterns across organelle genomes for functional genomics and evolutionary applications.

    Science.gov (United States)

    Sablok, Gaurav; Chen, Ting-Wen; Lee, Chi-Ching; Yang, Chi; Gan, Ruei-Chi; Wegrzyn, Jill L; Porta, Nicola L; Nayak, Kinshuk C; Huang, Po-Jung; Varotto, Claudio; Tang, Petrus

    2017-06-01

    Organelle genomes are widely thought to have arisen from reduction events involving cyanobacterial and archaeal genomes, in the case of chloroplasts, or α-proteobacterial genomes, in the case of mitochondria. Heterogeneity in base composition and codon preference has long been the subject of investigation of topics ranging from phylogenetic distortion to the design of overexpression cassettes for transgenic expression. From the overexpression point of view, it is critical to systematically analyze the codon usage patterns of the organelle genomes. In light of the importance of codon usage patterns in the development of hyper-expression organelle transgenics, we present ChloroMitoCU, the first-ever curated, web-based reference catalog of the codon usage patterns in organelle genomes. ChloroMitoCU contains the pre-compiled codon usage patterns of 328 chloroplast genomes (29,960 CDS) and 3,502 mitochondrial genomes (49,066 CDS), enabling genome-wide exploration and comparative analysis of codon usage patterns across species. ChloroMitoCU allows the phylogenetic comparison of codon usage patterns across organelle genomes, the prediction of codon usage patterns based on user-submitted transcripts or assembled organelle genes, and comparative analysis with the pre-compiled patterns across species of interest. ChloroMitoCU can increase our understanding of the biased patterns of codon usage in organelle genomes across multiple clades. ChloroMitoCU can be accessed at: http://chloromitocu.cgu.edu.tw/. © The Author 2017. Published by Oxford University Press on behalf of Kazusa DNA Research Institute.

  14. Dual Band a-Si:H Solar-Slot Antenna for 2.4/5.2GHz WLAN Applications

    Directory of Open Access Journals (Sweden)

    S. V. Shynu

    2009-12-01

    Full Text Available A simple and compact design of solar-slot antenna for dual band 2.4/5.2GHz wireless local area networks (WLAN applications is proposed. The design employs amorphous silicon (a-Si:H solar cells in polyimide substrate with an embedded twin strip slot structure to generate dual resonant frequencies. A T-shaped microstripline feed is used to excite the twin slot in the a-Si:H solar cell. The measured impedance bandwidths for the proposed solar antenna are 25.9% (642 MHz centered at 2.482 GHz and 8.2% (420 MHz centered at 5.098 GHz. The measured gain at 2.4 and 5.2 GHz are 3.1 dBi and 2.1 dBi respectively.

  15. Social networking through email : studying email usage patterns of persons with aphasia

    NARCIS (Netherlands)

    Al Mahmud, A.; Martens, J.B.O.S.

    2016-01-01

    Background: A social networking program has been developed by the Aphasia Union Netherlands (AVN) to enhance communication between older persons with aphasia (PWA) mutually and with their therapists. The medium of communication is email. Aims: The aim of the paper is to understand the email usage

  16. Cost and usage patterns of antibiotics in a tertiary care neurosurgical unit

    Directory of Open Access Journals (Sweden)

    Manish Singh Sharma

    2012-01-01

    Full Text Available Objectives: The routine use of prophylactic antibiotics in neurosurgery has been shown to significantly reduce surgical site infection rates. The documentation of non-surgical site, nosocomial infections in neurosurgical patients remains limited, despite this being a stimulus for prolific antibiotic usage. The actual quantum of antibiotic use in neurosurgery and its role in infection control remain both undocumented and controversial. The authors address this issue with a cost-effectiveness study using historical controls. Materials and Methods: Bacteriologically positive body fluid samples were used to quantify infection rates in the year 2006 and compared with those in the year 1997. Itemized drug lists obtained from dedicated neurosurgical intensive care units and wards were used to quantify antibiotic usage and calculate their costs. Results were compared using both historical and internal controls. The monetary conversion factor used was INR 40=US$1. Results: A total of 3114 consecutive elective and emergency neurosurgical procedures were performed during the study period. 329 patients (10.6% were recorded to have bacteriologically positive body fluid samples, and 100,250 units of antibiotics were consumed costing Rs. 14,378,227.5 ($359,455.7. On an average, an operated patient received 32.2 units of antibiotics valued at Rs. 4,617 ($115.4. The crude infection rates were recorded to have reduced significantly in comparison to 1997, but did not differ between mirror intra-departmental units with significantly different antibiotic usage. Conclusions: Antibiotics accounted for 31% of the per capita cost of consumables for performing a craniotomy in the year 2006. This estimate should be factored into projecting future package costs.

  17. The role of knowledge about user behaviour in demand response management of domestic hot water usage

    NARCIS (Netherlands)

    Tabatabaei, Seyed Amin; Klein, Michel

    2018-01-01

    Load balancing is an important topic in smart grid systems. Dynamic pricing is a common approach to achieve a better balance between renewable energy production and energy usage. This assumes that individual households adapt their energy usage patterns based on energy prices. However, the actual

  18. ANÁLISIS DE MÁXIMO DESEMPEÑO PARA WLAN OPERANDO A TASAS FIJAS O ADAPTIVAS USANDO EL ESTÁNDAR IEEE 802.11 a/b/g FIXED OR ADAPTIVE RATE MAXIMUM THROUGHPUT ANALYSIS FOR IEEE 802.11 a/b/g WLAN'S

    Directory of Open Access Journals (Sweden)

    Walter Grote H

    2007-12-01

    Full Text Available En este trabajo se presenta un análisis simple, pero efectivo, de desempeño (throughput de redes de área local inalámbricas (WLAN: Wireless Local Area Networks operando bajo la familia de estándares IEEE 802.11 a/b/g. El análisis considera la influencia del tamaño de los paquetes, parámetros de configuración de los dispositivos (uso del protocolo RTS/CTS o acceso básico, tamaño de la ventana de contienda inicial, tasas de transmisión como el efecto del número de dispositivos que conforman la red. El objetivo de este estudio es que los administradores de este tipo de redes puedan estimar los efectos que tiene sobre el desempeño la configuración de los dispositivos de la red. Los resultados obtenidos mediante este análisis constituyen una cota máxima del desempeño de la red, ya que, con el objetivo de evitar un análisis estocástico, se asume ausencia de colisiones e interferencia electromagnética en el canalIn this publication a simple, but effective, throughput analysis for WLANs (Wireless Local Area Networks operating according to the IEEE 802.11 a/b/g family of standards is presented. The influence of data packet sizes, device configuration parameters (RTS/CTS or basic access protocol, initial contention window, transmission rate and the effect of the number of devices of the network are considered. The purpose of this study is to provide network administrators an insight of how network configuration parameters affect network performance. Results of this kind of analysis will provide an upper bound on network performance, since they do not consider the effect of collisions and electromagnetic interference

  19. A low power Gm-C filter with on-chip automatic tuning for a WLAN transceiver

    International Nuclear Information System (INIS)

    Liu Silin; Ma Heping; Shi Yin

    2010-01-01

    A sixth-order Butterworth Gm-C low-pass filter (LPF) with a continuous tuning architecture has been implemented for a wireless LAN (WLAN) transceiver in 0.35 μm CMOS technology. An interior node scaling technique has been applied directly to the LPF to improve the dynamic range and the structure of the LPF has been optimized to reduce both the die size and the current consumption. Measurement results show that the filter has 77.5 dB dynamic range, 16.3 ns group delay variation, better than 3% cutoff frequency accuracy, and 0 dBm passband IIP3. The whole LPF with the tuning circuit dissipates only 1.42 mA (5 MHz cutoff frequency) or 2.81 mA (10 MHz cutoff frequency) from 2.85 V supply voltage, and only occupies 0.175 mm 2 die size. (semiconductor integrated circuits)

  20. Collecting conditions usage metadata to optimize current and future ATLAS software and processing

    CERN Document Server

    Barberis, Dario; The ATLAS collaboration; Gallas, Elizabeth; Oda, Susumu

    2016-01-01

    Conditions data (for example: alignment, calibration, data quality) are used extensively in the processing of real and simulated data in ATLAS. The volume and variety of the conditions data needed by different types of processing are quite diverse, so optimizing its access requires a careful understanding of conditions usage patterns. These patterns can be quantified by mining representative log files from each type of processing and gathering detailed information about conditions usage for that type of processing into a central repository. In this presentation, we describe the systems developed to collect this conditions usage metadata per job type and describe a few specific (but very different) ways in which it has been used. For example, it can be used to cull specific conditions data into a much more compact package to be used by jobs doing similar types of processing: these customized collections can then be shipped with jobs to be executed on isolated worker nodes (such as HPC farms) that have no netwo...

  1. A novel beamforming based model of coverage and transmission costing in IEEE 802.11 WLAN networks

    Directory of Open Access Journals (Sweden)

    Mehdi Guessous

    2017-09-01

    Full Text Available IEEE 802.11 WLAN indoor networks face major inherent and environmental issues such as interference, noise, and obstacles. At the same time, they must provide a maximal service performance in highly changing radio environments and conformance to various applications’ requirements. For this purpose, they require a solid design approach that considers both inputs from the radio interface and the upper-layer services at every design step. The modelization of radio area coverage is a key component in this process and must build on feasible work hypotheses. It should be able also to interpret highly varying characteristics of dense indoor environments, technology advances, service design best practices, end-to-end integration with other network parts: Local Area Network (LAN, Wide Area Network (WAN or Data Center Network (DCN. This work focuses on Radio Resource Management (RRM as a key tool to achieve a solid design in WLAN indoor environments by planning frequency channel assignment, transmit directions and corresponding power levels. Its scope is limited to tackle co-channel interference but can be easily extended to address cross-channel ones. In this paper, we consider beamforming and costing techniques to augment conventional RRM’s Transmit Power Control (TPC procedures that market-leading vendors has implemented and related research has worked on. We present a novel approach of radio coverage modelization and prove its additions to the cited related-work’s models. Our solution model runs three algorithms to evaluate transmission opportunities of Wireless Devices (WD under the coverage area. It builds on realistic hypotheses and a thorough system operation’s understanding to evaluate such an opportunity to transmit, overcomes limitations from compared related-work’s models, and integrates a hierarchical costing system to match Service Level Agreement (SLA expectations. The term “opportunity” in this context relates also to the new

  2. Tri-Band CPW-Fed Stub-Loaded Slot Antenna Design for WLAN/WiMAX Applications

    Science.gov (United States)

    Li, Jianxing; Guo, Jianying; He, Bin; Zhang, Anxue; Liu, Qing Huo

    2016-11-01

    A novel uniplanar CPW-fed tri-band stub-loaded slot antenna is proposed for wireless local area network (WLAN) and worldwide interoperability for microwave access (WiMAX) applications. Dual resonant modes were effectively excited in the upper band by using two identical pairs of slot stubs and parasitic slots symmetrically along the arms of a traditional CPW-fed slot dipole, achieving a much wider bandwidth. The middle band was realized by the fundamental mode of the slot dipole. To obtain the lower band, two identical inverted-L-shaped open-ended slots were symmetrically etched in the ground plane. A prototype was fabricated and measured, showing that tri-band operation with 10-dB return loss bandwidths of 150 MHz from 2.375 to 2.525 GHz, 725 MHz from 3.075 to 3.8 GHz, and 1.9 GHz from 5.0 to 6.9 GHz has been achieved. Details of the antenna design as well as the measured and simulated results are presented and discussed.

  3. Vocal communication in a complex multi-level society: constrained acoustic structure and flexible call usage in Guinea baboons.

    Science.gov (United States)

    Maciej, Peter; Ndao, Ibrahima; Hammerschmidt, Kurt; Fischer, Julia

    2013-09-23

    To understand the evolution of acoustic communication in animals, it is important to distinguish between the structure and the usage of vocal signals, since both aspects are subject to different constraints. In terrestrial mammals, the structure of calls is largely innate, while individuals have a greater ability to actively initiate or withhold calls. In closely related taxa, one would therefore predict a higher flexibility in call usage compared to call structure. In the present study, we investigated the vocal repertoire of free living Guinea baboons (Papio papio) and examined the structure and usage of the animals' vocal signals. Guinea baboons live in a complex multi-level social organization and exhibit a largely tolerant and affiliative social style, contrary to most other baboon taxa. To classify the vocal repertoire of male and female Guinea baboons, cluster analyses were used and focal observations were conducted to assess the usage of vocal signals in the particular contexts. In general, the vocal repertoire of Guinea baboons largely corresponded to the vocal repertoire other baboon taxa. The usage of calls, however, differed considerably from other baboon taxa and corresponded with the specific characteristics of the Guinea baboons' social behaviour. While Guinea baboons showed a diminished usage of contest and display vocalizations (a common pattern observed in chacma baboons), they frequently used vocal signals during affiliative and greeting interactions. Our study shows that the call structure of primates is largely unaffected by the species' social system (including grouping patterns and social interactions), while the usage of calls can be more flexibly adjusted, reflecting the quality of social interactions of the individuals. Our results support the view that the primary function of social signals is to regulate social interactions, and therefore the degree of competition and cooperation may be more important to explain variation in call usage

  4. The prevalence, patterns of usage and people's attitude towards complementary and alternative medicine (CAM among the Indian community in Chatsworth, South Africa

    Directory of Open Access Journals (Sweden)

    Raidoo Deshandra M

    2004-02-01

    Full Text Available Abstract Background The purpose of this study was to determine, among the Indian community of Chatsworth, South Africa, the prevalence and utilisation patterns of complementary and alternative medicine (CAM, attitudes associated with CAM use and communication patterns of CAM users with their primary care doctors. Methods Face-to-face structured interviews were conducted in Chatsworth, a suburb of Durban in which South Africans of Indian origin predominantly reside. Participants were 200 randomly selected adult English-speaking Indian residents. Results The prevalence of CAM usage for period 2000/2001 was 38.5% (95% confidence interval 31.7% to 45.6%. Spiritual healing and herbal/natural medicines, including vitamins were the most common types of CAM used, accounting for 42.8% and 48.1% respectively of overall CAM usage. People used CAM to treat conditions including diabetes mellitus, headaches, arthritis and joint pains, stress, skin disorders, backaches, hypertension and nasal disorders. Half of the CAM users used allopathic medicines concurrently. The cost of CAM utilization over this 1-year period, incurred by 80.5% of users for the duration of therapy for their most troublesome condition was below R500 (approximately US$50. Age, sex, marital status, religion, level of education and income were shown not to influence the use of CAM. Greater than half (51.9% of CAM users did so either upon the advice of someone they knew, or after noticing a CAM advertisement in the local press. Seventy-nine percent of CAM users indicated that they had positive outcomes with their treatments. Fifty four percent of CAM users (excluding those using spiritual healing only failed to inform their doctors that they used CAM. The main reason given by half of this group was that informing their doctors did not seem necessary. Conclusion The prevalence of CAM in Chatsworth is similar to findings in other parts of the world. Although CAM was used to treat many different

  5. Usage Center

    DEFF Research Database (Denmark)

    Kleinaltenkamp, Michael; Plewa, Carolin; Gudergan, Siegfried

    2017-01-01

    Purpose: The purpose of this paper is to advance extant theorizing around resourceintegration by conceptualizing and delineating the notion of a usage center. Ausage center consists of a combination of interdependent actors that draw onresources across their individual usage processes to create v...

  6. Ringxiety and the Mobile Phone Usage Pattern among the Students of a Medical College in South India

    Science.gov (United States)

    Subba, Sonu H.; Mandelia, Chetan; Pathak, Vaibhav; Reddy, Divya; Goel, Akanksha; Tayal, Ayushi; Nair, Swati; Nagaraj, Kondagunta

    2013-01-01

    Aims: Technologies like mobile phones may not always work positively but they may have unforeseen adverse effects. This study was conducted to find the proportion of students who experienced ringxiety (phantom ringing) and other perceived effects, as well as the pattern of the mobile phone usage among college students. Method: A cross-sectional study was carried out at Kasturba Medical College, Mangalore, south India, among 336 medical students by using a pre-tested, semi-structured questionnaire. Results: Among the total number of students, 335 students possessed mobile phones. Mostly, the persons whom they talked to on their phones were parents for 220 (51%) of the students. 48% (150) talked for less than half hour in a day and 41% (137) were high volume message users. “Ringxiety” was experienced by 34.5% (116) of the students and they were more likely to use their phones at restricted places like classrooms (99%) and libraries (60.3%). A significantly larger proportion of ringxiety sufferers also complained of hampered studies. Conclusion: The pattern of mobile phone use among the medical students appeared to be problematic, as a fairly large proportion suffered from ringxiety, they reported getting very upset and they used their phones at restricted times and places. This problem needs to be recognized, all stakeholders must be made aware of the symptoms and measures must be taken to reduce it. PMID:23542709

  7. A low power Gm-C filter with on-chip automatic tuning for a WLAN transceiver

    Energy Technology Data Exchange (ETDEWEB)

    Liu Silin; Ma Heping; Shi Yin, E-mail: slliu@semi.ac.c [Institute of Semiconductors, Chinese Academy of Sciences, Beijing 100083 (China)

    2010-06-15

    A sixth-order Butterworth Gm-C low-pass filter (LPF) with a continuous tuning architecture has been implemented for a wireless LAN (WLAN) transceiver in 0.35 {mu}m CMOS technology. An interior node scaling technique has been applied directly to the LPF to improve the dynamic range and the structure of the LPF has been optimized to reduce both the die size and the current consumption. Measurement results show that the filter has 77.5 dB dynamic range, 16.3 ns group delay variation, better than 3% cutoff frequency accuracy, and 0 dBm passband IIP3. The whole LPF with the tuning circuit dissipates only 1.42 mA (5 MHz cutoff frequency) or 2.81 mA (10 MHz cutoff frequency) from 2.85 V supply voltage, and only occupies 0.175 mm{sup 2} die size. (semiconductor integrated circuits)

  8. Usage patterns of aromatherapy among the French general population: A descriptive study focusing on dermal exposure.

    Science.gov (United States)

    Dornic, N; Ficheux, A S; Roudot, A C; Saboureau, D; Ezzedine, K

    2016-04-01

    Although likely benefits of aromatherapy are well documented, little is known about essential oils consumption and exposure to molecules present in the oils. The aim of our study was to determine usage patterns of 12 types of essential oils among a quite large panel, sorted per sex and quintile of age from birth to 70. A survey was conducted in September 2014 among 1507 French individuals, selected to build a representative panel of the general population. The key point of our study, apart from the fact that it has never been done among general population, was the focus on dermal exposure. Information about types of essential oils used, skin areas exposed, frequencies and quantities were collected. Our work revealed that some sub-populations could be significantly exposed to molecules of toxicological concern, especially in terms of skin sensitization. This work is the first step to assess human exposure to these molecules, and will help safety authorities and risk managers to protect the population. Copyright © 2016 Elsevier Inc. All rights reserved.

  9. The Impact of the Acquisition of Electronic Medical Texts on the Usage of Equivalent Print Books in an Academic Medical Library

    Directory of Open Access Journals (Sweden)

    Pamela S. Morgan

    2010-09-01

    Full Text Available Objectives – This study examines whether acquiring a text in electronic format effects the usage of the print version of the text, focusing specifically on medical texts. Studies in the literature dealt specifically with general collections and it was not clear if they were applicable to medical collections. It was also not clear if these studies should play a role in determining whether a medical library should purchase electronic texts or whether reserve collections are still needed for print texts.Methods – Four usage studies were conducted using data from the circulation system and the electronic vendor systems. These were 1 trends of print usage; 2 trends of electronic usage; 3 a comparison of electronic usage with print usage of the same title in the reserve collection; 4 a comparison of electronic usage with print usage of the same title in the general collection.Results – In comparison to print, substantial usage is being made of electronic books. Print is maintaining a level pattern of usage while electronic usage is increasing steadily. There was a noticeable difference in the usage levels of the electronic texts as regards to the package in which they are contained. Usage of print texts both on reserve and in the general collection has decreased over time, however the acquisition of the electronic version of a medical title had little impact on the usage of the equivalent print version. Conclusion – There is a demand for medical texts in medical libraries. Electronic versions can replace print versions of texts in reserve. Further investigation is needed of current patterns of print collection usage, with particular emphasis on trends in reserve collection usage.

  10. Study on online community user motif using web usage mining

    Science.gov (United States)

    Alphy, Meera; Sharma, Ajay

    2016-04-01

    The Web usage mining is the application of data mining, which is used to extract useful information from the online community. The World Wide Web contains at least 4.73 billion pages according to Indexed Web and it contains at least 228.52 million pages according Dutch Indexed web on 6th august 2015, Thursday. It’s difficult to get needed data from these billions of web pages in World Wide Web. Here is the importance of web usage mining. Personalizing the search engine helps the web user to identify the most used data in an easy way. It reduces the time consumption; automatic site search and automatic restore the useful sites. This study represents the old techniques to latest techniques used in pattern discovery and analysis in web usage mining from 1996 to 2015. Analyzing user motif helps in the improvement of business, e-commerce, personalisation and improvement of websites.

  11. Large-Scale Genomic Analysis of Codon Usage in Dengue Virus and Evaluation of Its Phylogenetic Dependence

    Science.gov (United States)

    Lara-Ramírez, Edgar E.; Salazar, Ma Isabel; López-López, María de Jesús; Salas-Benito, Juan Santiago; Sánchez-Varela, Alejandro

    2014-01-01

    The increasing number of dengue virus (DENV) genome sequences available allows identifying the contributing factors to DENV evolution. In the present study, the codon usage in serotypes 1–4 (DENV1–4) has been explored for 3047 sequenced genomes using different statistics methods. The correlation analysis of total GC content (GC) with GC content at the three nucleotide positions of codons (GC1, GC2, and GC3) as well as the effective number of codons (ENC, ENCp) versus GC3 plots revealed mutational bias and purifying selection pressures as the major forces influencing the codon usage, but with distinct pressure on specific nucleotide position in the codon. The correspondence analysis (CA) and clustering analysis on relative synonymous codon usage (RSCU) within each serotype showed similar clustering patterns to the phylogenetic analysis of nucleotide sequences for DENV1–4. These clustering patterns are strongly related to the virus geographic origin. The phylogenetic dependence analysis also suggests that stabilizing selection acts on the codon usage bias. Our analysis of a large scale reveals new feature on DENV genomic evolution. PMID:25136631

  12. Usage patterns, health, and nutritional status of long-term multiple dietary supplement users: a cross-sectional study

    Science.gov (United States)

    Block, Gladys; Jensen, Christopher D; Norkus, Edward P; Dalvi, Tapashi B; Wong, Les G; McManus, Jamie F; Hudes, Mark L

    2007-01-01

    Background Dietary supplement use in the United States is prevalent and represents an important source of nutrition. However, little is known about individuals who routinely consume multiple dietary supplements. This study describes the dietary supplement usage patterns, health, and nutritional status of long-term multiple dietary supplement users, and where possible makes comparisons to non-users and multivitamin/mineral supplement users. Methods Using a cross-sectional study design, information was obtained by online questionnaires and physical examination (fasting blood, blood pressure, body weight) from a convenience sample of long-term users of multiple dietary supplements manufactured by Shaklee Corporation (Multiple Supp users, n = 278). Data for non-users (No Supp users, n = 602) and multivitamin/mineral supplement users (Single Supp users, n = 176) were obtained from the National Health and Nutrition Examination Survey (NHANES) 2001–2002 and NHANES III 1988–1994. Logistic regression methods were used to estimate odds ratios with 95% confidence intervals. Results Dietary supplements consumed on a daily basis by more than 50% of Multiple Supp users included a multivitamin/mineral, B-complex, vitamin C, carotenoids, vitamin E, calcium with vitamin D, omega-3 fatty acids, flavonoids, lecithin, alfalfa, coenzyme Q10 with resveratrol, glucosamine, and a herbal immune supplement. The majority of women also consumed gamma linolenic acid and a probiotic supplement, whereas men also consumed zinc, garlic, saw palmetto, and a soy protein supplement. Serum nutrient concentrations generally increased with increasing dietary supplement use. After adjustment for age, gender, income, education and body mass index, greater degree of supplement use was associated with more favorable concentrations of serum homocysteine, C-reactive protein, high-density lipoprotein cholesterol, and triglycerides, as well as lower risk of prevalent elevated blood pressure and diabetes

  13. Usage patterns, health, and nutritional status of long-term multiple dietary supplement users: a cross-sectional study

    Directory of Open Access Journals (Sweden)

    Wong Les G

    2007-10-01

    Full Text Available Abstract Background Dietary supplement use in the United States is prevalent and represents an important source of nutrition. However, little is known about individuals who routinely consume multiple dietary supplements. This study describes the dietary supplement usage patterns, health, and nutritional status of long-term multiple dietary supplement users, and where possible makes comparisons to non-users and multivitamin/mineral supplement users. Methods Using a cross-sectional study design, information was obtained by online questionnaires and physical examination (fasting blood, blood pressure, body weight from a convenience sample of long-term users of multiple dietary supplements manufactured by Shaklee Corporation (Multiple Supp users, n = 278. Data for non-users (No Supp users, n = 602 and multivitamin/mineral supplement users (Single Supp users, n = 176 were obtained from the National Health and Nutrition Examination Survey (NHANES 2001–2002 and NHANES III 1988–1994. Logistic regression methods were used to estimate odds ratios with 95% confidence intervals. Results Dietary supplements consumed on a daily basis by more than 50% of Multiple Supp users included a multivitamin/mineral, B-complex, vitamin C, carotenoids, vitamin E, calcium with vitamin D, omega-3 fatty acids, flavonoids, lecithin, alfalfa, coenzyme Q10 with resveratrol, glucosamine, and a herbal immune supplement. The majority of women also consumed gamma linolenic acid and a probiotic supplement, whereas men also consumed zinc, garlic, saw palmetto, and a soy protein supplement. Serum nutrient concentrations generally increased with increasing dietary supplement use. After adjustment for age, gender, income, education and body mass index, greater degree of supplement use was associated with more favorable concentrations of serum homocysteine, C-reactive protein, high-density lipoprotein cholesterol, and triglycerides, as well as lower risk of prevalent elevated blood

  14. Coexistence issues for a 2.4 GHz wireless audio streaming in presence of bluetooth paging and WLAN

    Science.gov (United States)

    Pfeiffer, F.; Rashwan, M.; Biebl, E.; Napholz, B.

    2015-11-01

    Nowadays, customers expect to integrate their mobile electronic devices (smartphones and laptops) in a vehicle to form a wireless network. Typically, IEEE 802.11 is used to provide a high-speed wireless local area network (WLAN) and Bluetooth is used for cable replacement applications in a wireless personal area network (PAN). In addition, Daimler uses KLEER as third wireless technology in the unlicensed (UL) 2.4 GHz-ISM-band to transmit full CD-quality digital audio. As Bluetooth, IEEE 802.11 and KLEER are operating in the same frequency band, it has to be ensured that all three technologies can be used simultaneously without interference. In this paper, we focus on the impact of Bluetooth and IEEE 802.11 as interferer in presence of a KLEER audio transmission.

  15. A dual-band reconfigurable Yagi-Uda antenna with diverse radiation patterns

    Science.gov (United States)

    Saurav, Kushmanda; Sarkar, Debdeep; Srivastava, Kumar Vaibhav

    2017-07-01

    In this paper, a dual-band pattern reconfigurable antenna is proposed. The antenna comprises of a dual-band complementary split ring resonators (CSRRs) loaded dipole as the driven element and two copper strips with varying lengths as parasitic segments on both sides of the driven dipole. PIN diodes are used with the parasitic elements to control their electrical length. The CSRRs loading provide a lower order mode in addition to the reference dipole mode, while the parasitic elements along with the PIN diodes are capable of switching the omni-directional radiation of the dual-band driven element to nine different configurations of radiation patterns which include bi-directional end-fire, broadside, and uni-directional end-fire in both the operating bands. A prototype of the designed antenna together with the PIN diodes and DC bias lines is fabricated to validate the concept of dual-band radiation pattern diversity. The simulation and measurement results are in good agreement. The proposed antenna can be used in wireless access points for PCS and WLAN applications.

  16. Feature Usage Explorer: Usage Monitoring and Visualization Tool in HTML5 Based Applications

    Directory of Open Access Journals (Sweden)

    Sarunas Marciuska

    2013-10-01

    Full Text Available Feature Usage Explorer is a JavaScript library, which automatically detects features in HTML5 based applications and monitors their usage. The collected information can be visualized in a Feature Usage Diagram, which is automatically generated from an input json file. Currently, the users of Feature Usage Explorer have to design their own tool in order to generate the json file from collected usage information. This option remains viable when using the library in order not to constraint the user’s choice of preferred data storage. Feature Usage Explorer can be reused in any HTML5 based applications where an understanding of how users interact with the system is required (i.e. user experience and usability studies, human computer interaction field, or requirement prioritization area.

  17. A 0.13 μm CMOS ΔΣ fractional-N frequency synthesizer for WLAN transceivers

    International Nuclear Information System (INIS)

    Chu Xiaojie; Jia Hailong; Lin Min; Shi Yin; Foster, Dai Fa

    2011-01-01

    A fractional-N frequency synthesizer fabricated in a 0.13 μm CMOS technology is presented for the application of IEEE 802.11 b/g wireless local area network (WLAN) transceivers. A monolithic LC voltage controlled oscillator (VCO) is implemented with an on-chip symmetric inductor. The fractional-N frequency divider consists of a pulse swallow frequency divider and a 3rd-order multistage noise shaping (MASH) ΔΣ modulator with noise-shaped dithering techniques. Measurement results show that in all channels, phase noise of the synthesizer achieves −93 dBc/Hz and −118 dBc/Hz in band and out of band respectively with a phase-frequency detector (PFD) frequency of 20 MHz and a loop bandwidth of 100 kHz. The integrated RMS phase error is no more than 0.8°. The proposed synthesizer consumes 8.4 mW from a 1.2 V supply and occupies an area of 0.86 mm 2 . (semiconductor integrated circuits)

  18. A 0.13 μm CMOS ΔΣ fractional-N frequency synthesizer for WLAN transceivers

    Science.gov (United States)

    Xiaojie, Chu; Hailong, Jia; Min, Lin; Yin, Shi; Foster, Dai Fa

    2011-10-01

    A fractional-N frequency synthesizer fabricated in a 0.13 μm CMOS technology is presented for the application of IEEE 802.11 b/g wireless local area network (WLAN) transceivers. A monolithic LC voltage controlled oscillator (VCO) is implemented with an on-chip symmetric inductor. The fractional-N frequency divider consists of a pulse swallow frequency divider and a 3rd-order multistage noise shaping (MASH) ΔΣ modulator with noise-shaped dithering techniques. Measurement results show that in all channels, phase noise of the synthesizer achieves -93 dBc/Hz and -118 dBc/Hz in band and out of band respectively with a phase-frequency detector (PFD) frequency of 20 MHz and a loop bandwidth of 100 kHz. The integrated RMS phase error is no more than 0.8°. The proposed synthesizer consumes 8.4 mW from a 1.2 V supply and occupies an area of 0.86 mm2.

  19. A Visualization Tool to Analyse Usage of Web-Based Interventions: The Example of Positive Online Weight Reduction (POWeR)

    Science.gov (United States)

    Smith, Emily; Bradbury, Katherine; Morrison, Leanne; Dennison, Laura; Michaelides, Danius; Yardley, Lucy

    2015-01-01

    Background Attrition is a significant problem in Web-based interventions. Consequently, this research aims to identify the relation between Web usage and benefit from such interventions. A visualization tool has been developed that enables researchers to more easily examine large datasets on intervention usage that can be difficult to make sense of using traditional descriptive or statistical techniques alone. Objective This paper demonstrates how the visualization tool was used to explore patterns in participants’ use of a Web-based weight management intervention, termed "positive online weight reduction (POWeR)." We also demonstrate how the visualization tool can be used to perform subsequent statistical analyses of the association between usage patterns, participant characteristics, and intervention outcome. Methods The visualization tool was used to analyze data from 132 participants who had accessed at least one session of the POWeR intervention. Results There was a drop in usage of optional sessions after participants had accessed the initial, core POWeR sessions, but many users nevertheless continued to complete goal and weight reviews. The POWeR tools relating to the food diary and steps diary were reused most often. Differences in participant characteristics and usage of other intervention components were identified between participants who did and did not choose to access optional POWeR sessions (in addition to the initial core sessions) or reuse the food and steps diaries. Reuse of the steps diary and the getting support tools was associated with greater weight loss. Conclusions The visualization tool provided a quick and efficient method for exploring patterns of Web usage, which enabled further analyses of whether different usage patterns were associated with participant characteristics or differences in intervention outcome. Further usage of visualization techniques is recommended to (1) make sense of large datasets more quickly and efficiently; (2

  20. Roflumilast Usage from 2010 to 2016

    DEFF Research Database (Denmark)

    Salvesen, Øyvind Nicolay Ulland; Davidsen, Jesper Rømhild; Pottegård, Anton

    2018-01-01

    Roflumilast, a phosphodiesterase-4-inhibitor, is marketed as add-on treatment to inhaled bronchodilators and corticosteroids in COPD patients with frequent exacerbations. Although marketed since 2010, usage pattern of roflumilast for an entire nation has not previously been explored. This study...... (OR 0.62; 95% CI 0.49-0.80). The decreasing incidence and high level of early roflumilast discontinuation could be due to lack of benefit, a low awareness of romiflulast's indication among physicians, secondary to a challenging prescribing procedure, or to adverse effects. This article is protected...

  1. Differences in ADHD medication usage patterns in children and adolescents from different cultural backgrounds in the Netherlands.

    Science.gov (United States)

    van den Ban, Els F; Souverein, Patrick C; van Engeland, Herman; Swaab, Hanna; Egberts, Toine C G; Heerdink, Eibert R

    2015-07-01

    Differences in incidence and prevalence of ADHD medication use between ethnic groups have been reported. Goal of this study was to determine whether there are also differences in usage patterns of ADHD medication among native Dutch children and adolescents and those with a Moroccan, Turkish and Surinam cultural background in the Netherlands between 1999 and 2010. In a cohort of ADHD patients cultural background never used ADHD medication compared to Dutch natives (21 %). One-fifth of native Dutch and Turkish patients already used ADHD medication before the ADHD diagnosis date. Discontinuation of ADHD medication within 5 years was significantly higher in Moroccan [HR 2.4 (95 % CI 1.8-3.1)] and Turkish [HR 1.7 (95 % CI 1.1-2.6)] patients. A sensitivity analysis with a zip code-matched comparison between Dutch natives and non-natives showed similar results, suggesting this effect is probably not explained by socio-economic status (SES). Differences are found in prescribing and use of ADHD medication between patients with a different cultural background. Native Dutch and Turkish patients start more frequently with ADHD medication before the ADHD diagnose date, which can be an indication of differences in either referral patterns and/or access to care. A higher percentage of patients with a Moroccan and Turkish cultural background never start using ADHD medication at all and discontinuation rate is higher compared to Dutch natives and Surinamese.

  2. Safety and Usage of C1-Inhibitor in Hereditary Angioedema

    DEFF Research Database (Denmark)

    Riedl, Marc A; Bygum, Anette; Lumry, William

    2016-01-01

    , international patient registry documented widespread implementation of pnfC1-INH self-administration outside of a health care setting consistent with current HAE guidelines. These real-world data revealed pnfC1-INH usage for a variety of reasons in patients with HAE and showed a high level of safety regardless...... of this study was to describe safety and usage patterns of pnfC1-INH. METHODS: A multicenter, observational, registry was conducted between 2010 and 2014 at 30 United States and 7 European sites to obtain both prospective (occurring after enrollment) and retrospective (occurring before enrollment) safety...... and usage data on subjects receiving pnfC1-INH for any reason. RESULTS: Of 343 enrolled patients, 318 received 1 or more doses of pnfC1-INH for HAE attacks (11,848 infusions) or for prophylaxis (3142 infusions), comprising the safety population. Median dosages per infusion were 10.8 IU/kg (attack treatment...

  3. Mobile Phone Usage and its Health Effects Among Adults in a Semi-Urban Area of Southern India.

    Science.gov (United States)

    Stalin, P; Abraham, Sherin Billy; Kanimozhy, K; Prasad, R Vishnu; Singh, Zile; Purty, Anil J

    2016-01-01

    Worldwide, mobile phone usage has been increased dramatically which could affect the health of the people. India has the second largest number of mobile phone users. However there are only few studies conducted in India to assess its effects on health. To determine the prevalence and pattern of mobile phone usage and to assess the relationship between certain selected health problems and mobile phone usage among adults. Community-based cross-sectional study was conducted in Kottakuppam, a town panchayat in Villupuram district of Coastal Tamil Nadu, Southern India. It is a semi-urban area with a population of about 16,000. Majority of the residents are Muslim by religion and belong to different socio economic status. The study was approved by the Institutional Ethics Committee. A total of 2121 study participants were interviewed by the pre-final medical students through house-to-house survey using a pretested structured questionnaire. The questionnaire included the variables such as socio demographic profile, mobile phone usage and pattern, selected health problems, perceived benefits and threats and blood pressure. Selected health problems included headache, earache, neck pain, tinnitus, painful fingers, restlessness, morning tiredness, tingling fingers, fatigue, eye symptoms, sleep disturbance and hypertension. Only 2054 were included for data analysis using SPSS 17 version. Proportions were calculated. Chi-square test was used to measure the p-value. The p-value phone usage was 70%. Calling facility (94.2%) was used more than the SMS (67.6%). Health problems like headache, earache, tinnitus, painful fingers and restlessness etc., were found to be positively associated with mobile phone usage. There was negative association between hypertension and mobile phone usage. The prevalence of mobile phone usage was high. There was significant association between selected health problems and mobile phone usage. In future, higher studies are required to confirm our

  4. Learning and Teaching 24/7: Daily Internet Usage Patterns at Nine Australian Universities

    Science.gov (United States)

    Spennemann, Dirk H. R.

    2007-01-01

    Purpose: This paper seeks to look at the usage of the internet by students, academics and university administrators as part of their normal working day. It investigates whether access to computer facilities and the mode of study have any influence, or whether other factors need to be considered when providing services. Design/methodology/approach:…

  5. Medical Information Exchange: Pattern of Global Mobile Messenger Usage among Otolaryngologists.

    Science.gov (United States)

    Siegal, Gil; Dagan, Elad; Wolf, Michael; Duvdevani, Shay; Alon, Eran E

    2016-11-01

    Information technology has revolutionized health care. However, the development of dedicated mobile health software has been lagging, leading to the use of general mobile applications to fill in the void. The use of such applications has several legal, ethical, and regulatory implications. We examined the experience and practices governing the usage of a global mobile messenger application (WhatsApp) for mobile health purposes in a national cohort of practicing otolaryngologists in Israel, a known early adaptor information technology society. Cross-sectional data were collected from practicing otolaryngologists and otolaryngology residents via self-administered questionnaire. The questionnaire was composed of a demographic section, a section surveying the practices of mobile application use, mobile health application use, and knowledge regarding institutional policies governing the transmission of medical data. The sample included 22 otolaryngology residents and 47 practicing otolaryngologists. Of the physicians, 83% worked in academic centers, and 88% and 40% of the physicians who worked in a hospital setting or a community clinic used WhatsApp for medical use, respectively. Working with residents increased the medical usage of WhatsApp from 50% to 91% (P = .006). Finally, 72% were unfamiliar with any institutional policy regarding the transfer of medical information by personal smartphones. Mobile health is becoming an integral part of modern medical systems, improving accessibility, efficiency, and possibly quality of medical care. The need to incorporate personal mobile devices in the overall information technology standards, guidelines, and regulation is becoming more acute. Nonetheless, practices must be properly instituted to prevent unwanted consequences. © American Academy of Otolaryngology—Head and Neck Surgery Foundation 2016.

  6. The Effect of Omeprazole Usage on the Viability of Random Pattern Skin Flaps in Rats.

    Science.gov (United States)

    Şen, Hilmi; Oruç, Melike; Işik, Veysel Murat; Sadiç, Murat; Sayar, Hamide; Çitil, Rana; Korkmaz, Meliha; Koçer, Uğur

    2017-06-01

    Necrosis of random pattern flaps caused by inadequate blood flow, especially in the distal part of the flap is one of the biggest challenges in reconstructive surgery. Various agents have been used to prevent flap ischemia. In this study, we used omeprazole, which is a potent inhibitor of gastric acidity to increase flap viability. In this study, 35 Wistar-Albino type rats which were divided into 5 equal groups were used. Random-pattern dorsal skin flaps were raised in all groups at seventh day of the study. Group 1 was accepted as control group, and the rats in this group was only given distilled water intraperitoneally for 14 days. Group 2 and group 3 received 10 and 40 mg/kg omeprazole daily for 14 days, respectively. Group 4 and group 5 were given distilled water for the first 7 days and then after the operations they received 10 and 40 mg/kg omeprazole daily for 7 days, respectively. Survival rates of the flaps were examined seventh day after elevation of the flaps by digital imaging and scintigraphy. After assessment of the amount of necrosis, number of vascular structures were counted histopathologically. Percentage of flap necrosis was found to be less in all omeprazole received groups. On digital imaging, percentages of flap necrosis in the study groups were statistically significantly lower than that of the control group (P 0.05).In the histopathologic specimens, it was detected that the mean number of vessels in proximal (a) and distal (c) portions of the flap in the study groups showed a significant increase when compared with the control group (P usage of medications increasing gastrin during flap surgeries can be thought as a positive contributor. In this sense, this study showed that parenteral administration of omeprazole in skin flap surgery increases flap viability possibly by increasing gastrin levels.

  7. Comparing usage of a web and app stress management intervention: An observational study

    Directory of Open Access Journals (Sweden)

    Leanne G. Morrison

    2018-06-01

    Full Text Available Choices in the design and delivery of digital health behaviour interventions may have a direct influence on subsequent usage and engagement. Few studies have been able to make direct, detailed comparisons of differences in usage between interventions that are delivered via web or app. This study compared the usage of two versions of a digital stress management intervention, one delivered via a website (Healthy Paths and the other delivered via an app (Healthy Mind. Design modifications were introduced within Healthy Mind to take account of reported differences in how individuals engage with websites compared to apps and mobile phones. Data were collected as part of an observational study nested within a broader exploratory trial of Healthy Mind. Objective usage of Healthy Paths and Healthy Mind were automatically recorded, including frequency and duration of logins, access to specific components within the intervention and order of page/screen visits. Usage was compared for a two week period following initial registration. In total, 381 participants completed the registration process for Healthy Paths (web and 162 participants completed the registration process for Healthy Mind (app. App users logged in twice as often (Mdn = 2.00 as web users (Mdn = 1.00, U = 13,059.50, p ≤ 0.001, but spent half as much time (Mdn = 5.23 min on the intervention compared to web users (Mdn = 10.52 min, U = 19,740.00, p ≤ 0.001. Visual exploration of usage patterns over time revealed that a significantly higher proportion of app users (n = 126, 82.35% accessed both types of support available within the intervention (i.e. awareness and change-focused tools compared to web users (n = 92, 40.17%, χ2(1, n = 382 = 66.60, p < 0.001. This study suggests that the digital platform used to deliver an intervention (i.e. web versus app and specific design choices (e.g. navigation, length and volume of content may be

  8. Analysis of Architecture Pattern Usage in Legacy System Architecture Documentation

    NARCIS (Netherlands)

    Harrison, Neil B.; Avgeriou, Paris

    2008-01-01

    Architecture patterns are an important tool in architectural design. However, while many architecture patterns have been identified, there is little in-depth understanding of their actual use in software architectures. For instance, there is no overview of how many patterns are used per system or

  9. Adaptive Backoff Algorithm for Contention Window for Dense IEEE 802.11 WLANs

    Directory of Open Access Journals (Sweden)

    Ikram Syed

    2016-01-01

    Full Text Available The performance improvement in IEEE 802.11 WLANs in widely fluctuating network loads is a challenging task. To improve the performance in this saturated state, we develop an adaptive backoff algorithm that maximizes the system throughput, reduces the collision probability, and maintains a high fairness for the IEEE 802.11 DCF under dense network conditions. In this paper, we present two main advantages of the proposed ABA-CW algorithm. First, it estimates the number of active stations and then calculates an optimal contention window based on the active station number. Each station calculates the channel state probabilities by observing the channel for the total backoff period. Based on these channel states probabilities, each station can estimate the number of active stations in the network, after which it calculates the optimal CW utilizing the estimated active number of stations. To evaluate the proposed mechanism, we derive an analytical model to determine the network performance. From our results, the proposed ABA-CW mechanism achieved better system performance compared to fixed-CW (BEB, EIED, LILD, and SETL and adaptive-CW (AMOCW, Idle Sense mechanisms. The simulation results confirmed the outstanding performance of the proposed mechanism in that it led to a lower collision probability, higher throughput, and high fairness.

  10. Large-Scale Genomic Analysis of Codon Usage in Dengue Virus and Evaluation of Its Phylogenetic Dependence

    Directory of Open Access Journals (Sweden)

    Edgar E. Lara-Ramírez

    2014-01-01

    Full Text Available The increasing number of dengue virus (DENV genome sequences available allows identifying the contributing factors to DENV evolution. In the present study, the codon usage in serotypes 1–4 (DENV1–4 has been explored for 3047 sequenced genomes using different statistics methods. The correlation analysis of total GC content (GC with GC content at the three nucleotide positions of codons (GC1, GC2, and GC3 as well as the effective number of codons (ENC, ENCp versus GC3 plots revealed mutational bias and purifying selection pressures as the major forces influencing the codon usage, but with distinct pressure on specific nucleotide position in the codon. The correspondence analysis (CA and clustering analysis on relative synonymous codon usage (RSCU within each serotype showed similar clustering patterns to the phylogenetic analysis of nucleotide sequences for DENV1–4. These clustering patterns are strongly related to the virus geographic origin. The phylogenetic dependence analysis also suggests that stabilizing selection acts on the codon usage bias. Our analysis of a large scale reveals new feature on DENV genomic evolution.

  11. Discovering and understanding android sensor usage behaviors with data flow analysis

    KAUST Repository

    Liu, Xing; Liu, Jiqiang; Wang, Wei; He, Yongzhong; Zhang, Xiangliang

    2017-01-01

    Today’s Android-powered smartphones have various embedded sensors that measure the acceleration, orientation, light and other environmental conditions. Many functions in the third-party applications (apps) need to use these sensors. However, embedded sensors may lead to security issues, as the third-party apps can read data from these sensors without claiming any permissions. It has been proven that embedded sensors can be exploited by well designed malicious apps, resulting in leaking users’ privacy. In this work, we are motivated to provide an overview of sensor usage patterns in current apps by investigating what, why and how embedded sensors are used in the apps collected from both a Chinese app. market called “AppChina” and the official market called “Google Play”. To fulfill this goal, We develop a tool called “SDFDroid” to identify the used sensors’ types and to generate the sensor data propagation graphs in each app. We then cluster the apps to find out their sensor usage patterns based on their sensor data propagation graphs. We apply our method on 22,010 apps collected from AppChina and 7,601 apps from Google Play. Extensive experiments are conducted and the experimental results show that most apps implement their sensor related functions by using the third-party libraries. We further study the sensor usage behaviors in the third-party libraries. Our results show that the accelerometer is the most frequently used sensor. Though many third-party libraries use no more than four types of sensors, there are still some third-party libraries registering all the types of sensors recklessly. These results call for more attentions on better regulating the sensor usage in Android apps.

  12. Discovering and understanding android sensor usage behaviors with data flow analysis

    KAUST Repository

    Liu, Xing

    2017-03-20

    Today’s Android-powered smartphones have various embedded sensors that measure the acceleration, orientation, light and other environmental conditions. Many functions in the third-party applications (apps) need to use these sensors. However, embedded sensors may lead to security issues, as the third-party apps can read data from these sensors without claiming any permissions. It has been proven that embedded sensors can be exploited by well designed malicious apps, resulting in leaking users’ privacy. In this work, we are motivated to provide an overview of sensor usage patterns in current apps by investigating what, why and how embedded sensors are used in the apps collected from both a Chinese app. market called “AppChina” and the official market called “Google Play”. To fulfill this goal, We develop a tool called “SDFDroid” to identify the used sensors’ types and to generate the sensor data propagation graphs in each app. We then cluster the apps to find out their sensor usage patterns based on their sensor data propagation graphs. We apply our method on 22,010 apps collected from AppChina and 7,601 apps from Google Play. Extensive experiments are conducted and the experimental results show that most apps implement their sensor related functions by using the third-party libraries. We further study the sensor usage behaviors in the third-party libraries. Our results show that the accelerometer is the most frequently used sensor. Though many third-party libraries use no more than four types of sensors, there are still some third-party libraries registering all the types of sensors recklessly. These results call for more attentions on better regulating the sensor usage in Android apps.

  13. Insight into pattern of codon biasness and nucleotide base usage in serotonin receptor gene family from different mammalian species.

    Science.gov (United States)

    Dass, J Febin Prabhu; Sudandiradoss, C

    2012-07-15

    5-HT (5-Hydroxy-tryptamine) or serotonin receptors are found both in central and peripheral nervous system as well as in non-neuronal tissues. In the animal and human nervous system, serotonin produces various functional effects through a variety of membrane bound receptors. In this study, we focus on 5-HT receptor family from different mammals and examined the factors that account for codon and nucleotide usage variation. A total of 110 homologous coding sequences from 11 different mammalian species were analyzed using relative synonymous codon usage (RSCU), correspondence analysis (COA) and hierarchical cluster analysis together with nucleotide base usage frequency of chemically similar amino acid codons. The mean effective number of codon (ENc) value of 37.06 for 5-HT(6) shows very high codon bias within the family and may be due to high selective translational efficiency. The COA and Spearman's rank correlation reveals that the nucleotide compositional mutation bias as the major factors influencing the codon usage in serotonin receptor genes. The hierarchical cluster analysis suggests that gene function is another dominant factor that affects the codon usage bias, while species is a minor factor. Nucleotide base usage was reported using Goldman, Engelman, Stietz (GES) scale reveals the presence of high uracil (>45%) content at functionally important hydrophobic regions. Our in silico approach will certainly help for further investigations on critical inference on evolution, structure, function and gene expression aspects of 5-HT receptors family which are potential antipsychotic drug targets. Copyright © 2012 Elsevier B.V. All rights reserved.

  14. Irregular bedtime and nocturnal cellular phone usage as risk factors for being involved in bullying: a cross-sectional survey of Japanese adolescents.

    Directory of Open Access Journals (Sweden)

    Mamoru Tochigi

    Full Text Available PURPOSE: A number of studies have tried to identify risk factors for being involved in bullying in order to help developing preventive measures; however, to our knowledge, no study has investigated the effect of nocturnal lifestyle behavior such as sleep pattern or cellular phone usage. In the present study, we aimed to investigate the relationship between school bullying and sleep pattern or nocturnal cellular phone usage in adolescents. The effect of school size on school bullying was also examined. METHODS: Data from the cross-sectional survey of psychopathologies conducted for 19,436 Japanese students from 45 public junior high schools (7(th-9(th grade and 28 senior high schools (10(th-12(th grade were analyzed. RESULTS: Bullying status was significantly associated with irregular bedtime (OR = 1.23 and 1.41 for pure bullies and bully-victims, respectively and e-mail exchange or calling after lights-out (OR = 1.53 and 1.31 for pure bullies and bully-victims, respectively after controlling domestic violence and substance usage. In addition, school size was significantly associated with the increased risk of bullying in junior high school students (OR = 1.13 for bully-victims. CONCLUSIONS: The present results suggested that sleep pattern and nocturnal cellular phone usage might be risk factors for being involved in school bullying in adolescents. Although further accumulation of data is needed, progressive trend towards nocturnal lifestyle and increasing usage of cellular phone might impair the well-being of adolescents. School-based interventions for lifestyle including sleep pattern and cellular phone usage may be encouraged to reduce school bullying.

  15. Usage Record Format Recommendation

    CERN Document Server

    Nilsen, J.K.; Muller-Pfeerkorn, R

    2013-01-01

    For resources to be shared, sites must be able to exchange basic accounting and usage data in a common format. This document describes a common format which enables the exchange of basic accounting and usage data from different resources. This record format is intended to facilitate the sharing of usage information, particularly in the area of the accounting of jobs, computing, memory, storage and cloud usage but with a structure that allows an easy extension to other resources. This document describes the Usage Record components both in natural language form and annotated XML. This document does not address how these records should be used, nor does it attempt to dictate the format in which the accounting records are stored. Instead, it denes a common exchange format. Furthermore, nothing is said regarding the communication mechanisms employed to exchange the records, i.e. transport layer, framing, authentication, integrity, etc.

  16. Classifying Internet Pathological Users: Their Usage, Internet Sensation Seeking, and Perceptions.

    Science.gov (United States)

    Lin, Sunny S. J.

    A study was conducted to identify pathological Internet users and to reveal their psychological features and problematic usage patterns. One thousand and fifty Taiwanese undergraduates were selected. An Internet Addiction Scale was adopted to classify 648 students into 4 clusters. The 146 users in the 4th cluster, who reported significantly higher…

  17. PATTERN OF INTERNET USAGE IN CYBER CAFÉS IN MANILA: AN EXPLORATORY STUDY

    Directory of Open Access Journals (Sweden)

    Rex P. Bringula

    2012-12-01

    Full Text Available This study determined the profile and pattern of Internet usage of respondents in cyber cafés in Manila. The study employed an exploratory-descriptive design in which a validated descriptive-survey form was used as the research instrument. Forty-seven cyber cafés in 14 districts in the City of Manila were randomly selected. There were 545 respondents. It was found that most of the respondents were Manila settlers (f = 368, 70%, students (f = 382, 73%, pursuing or had attained a college degree (f = 374, 72%, male (f = 356, 68%, young (19 and below (f = 314, 60%, Roman Catholic (f = 423, 81%, single (f = 470, 90%, had a computer at home (f = 269, 51%, belonged to the middle-income class (f = 334, 64%, and used the Internet in the afternoon (f = 274, 50.3%, 2 = 113.98, DF = 2, p < 0.01 once to twice a week (f = 193, 36.9%, 2 = 90.04, DF = 3, p < 0.01. Frequency of visit of Internet users was not equally distributed during the week and Internet users showed the tendency to visit cyber cafés at a particular time of the day when grouped according to profile. The first hypothesis stated that frequency of visiting a cyber café would not be equally distributed during the week when grouped according to profile was accepted. The second hypothesis, which stated that respondents would not show a tendency to use the internet in a cyber café at a particular time of the day was rejected. The study also discusses the limitations and implications of the findings.

  18. Translational selection on codon usage in the genus Aspergillus.

    Science.gov (United States)

    Iriarte, Andrés; Sanguinetti, Manuel; Fernández-Calero, Tamara; Naya, Hugo; Ramón, Ana; Musto, Héctor

    2012-09-10

    Aspergillus is a genus of mold fungi that includes more than 200 described species. Many members of the group are relevant pathogens and other species are economically important. Only one species has been analyzed for codon usage, and this was performed with a small number of genes. In this paper, we report the codon usage patterns of eight completely sequenced genomes which belong to this genus. The results suggest that selection for translational efficiency and accuracy are the major factors shaping codon usage in all of the species studied so far, and therefore they were active in the last common ancestor of the group. Composition and molecular distances analyses show that highly expressed genes evolve slower at synonymous sites. We identified a conserved core of translationally optimal codons and study the tRNA gene pool in each genome. We found that the great majority of preferred triplets match the respective cognate tRNA with more copies in the respective genome. We discuss the possible scenarios that can explain the observed differences among the species analyzed. Finally we highlight the biotechnological application of this research regarding heterologous protein expression. Copyright © 2012 Elsevier B.V. All rights reserved.

  19. The Combined Effect of Signal Strength and Background Traffic Load on Speech Quality in IEEE 802.11 WLAN

    Directory of Open Access Journals (Sweden)

    P. Pocta

    2011-04-01

    Full Text Available This paper deals with measurements of the combined effect of signal strength and background traffic load on speech quality in IEEE 802.11 WLAN. The ITU-T G.729AB encoding scheme is deployed in this study and the Distributed Internet Traffic Generator (D-ITG is used for the purpose of background traffic generation. The speech quality and background traffic load are assessed by means of the accomplished PESQ algorithm and Wireshark network analyzer, respectively. The results show that background traffic load has a bit higher impact on speech quality than signal strength when both effects are available together. Moreover, background traffic load also partially masks the impact of signal strength. The reasons for those findings are particularly discussed. The results also suggest some implications for designers of wireless networks providing VoIP service.

  20. How do household characteristics affect appliance usage? Application of conditional demand analysis to Japanese household data

    International Nuclear Information System (INIS)

    Matsumoto, Shigeru

    2016-01-01

    Although both appliance ownership and usage patterns determine residential electricity consumption, it is less known how households actually use their appliances. In this study, we conduct conditional demand analyses to break down total household electricity consumption into a set of demand functions for electricity usage, across 12 appliance categories. We then examine how the socioeconomic characteristics of the households explain their appliance usage. Analysis of micro-level data from the Nation Survey of Family and Expenditure in Japan reveals that the family and income structure of households affect appliance usage. Specifically, we find that the presence of teenagers increases both air conditioner and dishwasher use, labor income and nonlabor income affect microwave usage in different ways, air conditioner usage decreases as the wife's income increases, and microwave usage decreases as the husband's income increases. Furthermore, we find that households use more electricity with new personal computers than old ones; this implies that the replacement of old personal computers increases electricity consumption. - Highlights: •We conduct conditional demand analyses to study household appliance usage. •Micro-level data from the National Survey of Family and Expenditure in Japan are analyzed. •We show how household characteristics determine appliance usage. •High-income households use specific appliances less intensively than low-income households. •The replacement of old TVs and PCs lead to greater electricity consumption.

  1. A study to analyze the different patterns of quid usage among subjects with chewer′s mucosa

    Directory of Open Access Journals (Sweden)

    Saba Khan

    2012-01-01

    Full Text Available Aim: Betel chewer′s mucosa, although not considered as a potentially malignant lesion, has been suggested to be a precursor of oral submucous fibrosis (OSMF. Thus a study was undertaken to asses various quid chewing patterns in patients with chewer′s mucosa and to evaluate possible association between chewer′s mucosa and a particular quid usage patter. Materials and methods: The study was done on 150 subjects clinically diagnosed of having chewers mucosa lesion. After complete oral examination, a detailed habit history was taken through preformed questionnaire. The data obtained was analyzed using Chi-square test. Results: Among the 150 subjects males to female ratio was 8:2- Majority of the subjects were within the age group of 20 to 30 years and chewed a combination of betel leaf, arecanut, tobacco, lime- Majority of the subjects of chewer′s mucosa used the quid for a duration of 1 to 5 years, a frequency of three to five quid per day. Conclusion: In the present study, chewers mucosa was seen in majority of the subjects who used the quid for a duration of 1 to 5 years, a frequency of three to five quid per day and chewed the quid containing betel leaf, arecanut, tobacco, lime as its constituents.

  2. Comparing Usage Patterns Recorded between an Electronic Reference and an Electronic Monograph Collection: The Differences in Searches and Full-Text Content Viewings

    Science.gov (United States)

    Lamothe, Alain R.

    2012-01-01

    This paper presents the results from a quantitative and systematic analysis comparing the online usage of an e-reference and an e-monograph collection. A very strong relationship exists between size and usage: the larger the collection, the greater the usage. An equally strong relationship exists between searches and viewings, meaning that the…

  3. Towards a Collision-Free WLAN: Dynamic Parameter Adjustment in CSMA/E2CA

    Directory of Open Access Journals (Sweden)

    Bellalta Boris

    2011-01-01

    Full Text Available Carrier sense multiple access with enhanced collision avoidance (CSMA/ECA is a distributed MAC protocol that allows collision-free access to the medium in WLANs. The only difference between CSMA/ECA and the well-known CSMA/CA is that the former uses a deterministic backoff after successful transmissions. Collision-free operation is reached after a transient state during which some collisions may occur. This paper shows that the duration of the transient state can be shortened by appropriately setting the contention parameters. Standard absorbing Markov chain theory is used to describe the behaviour of the system in the transient state and to predict the expected number of slots to reach the collision-free operation. The paper also introduces CSMA/E2CA, in which a deterministic backoff is used two consecutive times after a successful transmission. CSMA/E2CA converges quicker to collision-free operation and delivers higher performance than CSMA/ECA, specially in harsh wireless scenarios with high frame-error rates. The last part of the paper addresses scenarios with a large number of contenders. We suggest dynamic parameter adjustment techniques to accommodate a varying (and potentially high number of contenders. The effectiveness of these adjustments in preventing collisions is validated by means of simulation.

  4. Trajectories of 12-Month Usage Patterns for Two Smoking Cessation Websites: Exploring How Users Engage Over Time.

    Science.gov (United States)

    Bricker, Jonathan B; Sridharan, Vasundhara; Zhu, Yifan; Mull, Kristin E; Heffner, Jaimee L; Watson, Noreen L; McClure, Jennifer B; Di, Chongzhi

    2018-04-20

    Little is known about how individuals engage with electronic health (eHealth) interventions over time and whether this engagement predicts health outcomes. The objectives of this study, by using the example of a specific type of eHealth intervention (ie, websites for smoking cessation), were to determine (1) distinct groups of log-in trajectories over a 12-month period, (2) their association with smoking cessation, and (3) baseline user characteristics that predict trajectory group membership. We conducted a functional clustering analysis of 365 consecutive days of log-in data from both arms of a large (N=2637) randomized trial of 2 website interventions for smoking cessation (WebQuit and Smokefree), with a primary outcome of 30-day point prevalence smoking abstinence at 12 months. We conducted analyses for each website separately. A total of 3 distinct trajectory groups emerged for each website. For WebQuit, participants were clustered into 3 groups: 1-week users (682/1240, 55.00% of the sample), 5-week users (399/1240, 32.18%), and 52-week users (159/1240, 12.82%). Compared with the 1-week users, the 5- and 52-week users had 57% higher odds (odds ratio [OR] 1.57, 95% CI 1.13-2.17; P=.007) and 124% higher odds (OR 2.24, 95% CI 1.45-3.43; Pusers were clustered into 3 groups: 1-week users (645/1309, 49.27% of the sample), 4-week users (395/1309, 30.18%), and 5-week users (269/1309, 20.55%). Compared with the 1-week users, 5-week users (but not 4-week users; P=.99) had 48% higher odds (OR 1.48, 95% CI 1.05-2.07; P=.02) of being abstinent at 12 months. In general, the WebQuit intervention had a greater number of weekly log-ins within each of the 3 trajectory groups as compared with those of the Smokefree intervention. Baseline characteristics associated with trajectory group membership varied between websites. Patterns of 1-, 4-, and 5-week usage of websites may be common for how people engage in eHealth interventions. The 5-week usage of either website, and 52-week

  5. Social networking patterns/hazards among teenagers.

    Science.gov (United States)

    Machold, C; Judge, G; Mavrinac, A; Elliott, J; Murphy, A M; Roche, E

    2012-05-01

    Social Networking Sites (SNSs) have grown substantially, posing new hazards to teenagers. This study aimed to determine general patterns of Internet usage among Irish teenagers aged 11-16 years, and to identify potential hazards, including; bullying, inappropriate contact, overuse, addiction and invasion of users' privacy. A cross-sectional study design was employed to survey students at three Irish secondary schools, with a sample of 474 completing a questionnaire. 202 (44%) (n = 460) accessed the Internet using a shared home computer. Two hours or less were spent online daily by 285(62%), of whom 450 (98%) were unsupervised. 306 (72%) (n = 425) reported frequent usage of SNSs, 403 (95%) of whom were Facebook users. 42 (10%) males and 51 (12%) females experienced bullying online, while 114 (27%) reported inappropriate contact from others. Concerning overuse and the risk of addiction, 140 (33%) felt they accessed SNSs too often. These patterns among Irish teenagers suggest that SNS usage poses significant dangers, which are going largely unaddressed.

  6. Social networking patterns/hazards among teenagers.

    LENUS (Irish Health Repository)

    Machold, C

    2012-05-01

    Social Networking Sites (SNSs) have grown substantially, posing new hazards to teenagers. This study aimed to determine general patterns of Internet usage among Irish teenagers aged 11-16 years, and to identify potential hazards, including; bullying, inappropriate contact, overuse, addiction and invasion of users\\' privacy. A cross-sectional study design was employed to survey students at three Irish secondary schools, with a sample of 474 completing a questionnaire. 202 (44%) (n = 460) accessed the Internet using a shared home computer. Two hours or less were spent online daily by 285(62%), of whom 450 (98%) were unsupervised. 306 (72%) (n = 425) reported frequent usage of SNSs, 403 (95%) of whom were Facebook users. 42 (10%) males and 51 (12%) females experienced bullying online, while 114 (27%) reported inappropriate contact from others. Concerning overuse and the risk of addiction, 140 (33%) felt they accessed SNSs too often. These patterns among Irish teenagers suggest that SNS usage poses significant dangers, which are going largely unaddressed.

  7. A 55 nm CMOS ΔΣ fractional-N frequency synthesizer for WLAN transceivers with low noise filters

    International Nuclear Information System (INIS)

    Chen Mingyi; Chu Xiaojie; Yu Peng; Yan Jun; Shi Yin

    2013-01-01

    A fully integrated ΔΣ fractional-N frequency synthesizer fabricated in a 55 nm CMOS technology is presented for the application of IEEE 802.11b/g wireless local area network (WLAN) transceivers. A low noise filter, occupying a small die area, whose power supply is given by a high PSRR and low noise LDO regulator, is integrated on chip. The proposed synthesizer needs no off-chip components and occupies an area of 0.72 mm 2 excluding PAD. Measurement results show that in all channels, the phase noise of the synthesizer achieves −99 dBc/Hz and −119 dBc/Hz in band and out of band respectively with a reference frequency of 40 MHz and a loop bandwidth of 200 kHz. The integrated RMS phase error is no more than 0.6°. The proposed synthesizer consumes a total power of 15.6 mW. (semiconductor integrated circuits)

  8. Interactions between BMP-7 and USAG-1 (uterine sensitization-associated gene-1 regulate supernumerary organ formations.

    Directory of Open Access Journals (Sweden)

    Honoka Kiso

    Full Text Available Bone morphogenetic proteins (BMPs are highly conserved signaling molecules that are part of the transforming growth factor (TGF-beta superfamily, and function in the patterning and morphogenesis of many organs including development of the dentition. The functions of the BMPs are controlled by certain classes of molecules that are recognized as BMP antagonists that inhibit BMP binding to their cognate receptors. In this study we tested the hypothesis that USAG-1 (uterine sensitization-associated gene-1 suppresses deciduous incisors by inhibition of BMP-7 function. We learned that USAG-1 and BMP-7 were expressed within odontogenic epithelium as well as mesenchyme during the late bud and early cap stages of tooth development. USAG-1 is a BMP antagonist, and also modulates Wnt signaling. USAG-1 abrogation rescued apoptotic elimination of odontogenic mesenchymal cells. BMP signaling in the rudimentary maxillary incisor, assessed by expressions of Msx1 and Dlx2 and the phosphorylation of Smad protein, was significantly enhanced. Using explant culture and subsequent subrenal capsule transplantation of E15 USAG-1 mutant maxillary incisor tooth primordia supplemented with BMP-7 demonstrated in USAG-1+/- as well as USAG-1-/- rescue and supernumerary tooth development. Based upon these results, we conclude that USAG-1 functions as an antagonist of BMP-7 in this model system. These results further suggest that the phenotypes of USAG-1 and BMP-7 mutant mice reported provide opportunities for regenerative medicine and dentistry.

  9. Design of an ultra low power third order continuous time current mode ΣΔ modulator for WLAN applications.

    Science.gov (United States)

    Behzadi, Kobra; Baghelani, Masoud

    2014-05-01

    This paper presents a third order continuous time current mode ΣΔ modulator for WLAN 802.11b standard applications. The proposed circuit utilized feedback architecture with scaled and optimized DAC coefficients. At circuit level, we propose a modified cascade current mirror integrator with reduced input impedance which results in more bandwidth and linearity and hence improves the dynamic range. Also, a very fast and precise novel dynamic latch based current comparator is introduced with low power consumption. This ultra fast comparator facilitates increasing the sampling rate toward GHz frequencies. The modulator exhibits dynamic range of more than 60 dB for 20 MHz signal bandwidth and OSR of 10 while consuming only 914 μW from 1.8 V power supply. The FoM of the modulator is calculated from two different methods, and excellent performance is achieved for proposed modulator.

  10. Performance Analysis of IEEE 802.11e (EDCF) and IEEE 802.11(DCF) WLAN Incorporating Different Physical Layer Standards

    Science.gov (United States)

    Sharma, V.; Singh, H.; Malhotra, J.

    2012-12-01

    Medium access coordination function basically implements the distributed coordination function (DCF) which provides support to best effort services but limited to QoS services. Subsequently, a new standard, namely enhanced distributed channel access (EDCA) is reported. The IEEE 802.11e (EDCA) defines MAC procedures to support QoS requirements which specifies distributed contention based access scheme to access the shared wireless media. This paper evaluates the performance of EDCA based IEEE 802.11 WLAN for various access categories (ACs) using OPNET™ Modeller 14.5. Further, the computed results are compared with DCF protocols in terms of QoS parameters. Furthermore, the simulative observation is reported at data rate of 54 Mbps using different physical layer protocols such as IEEE 802.11a/b/g to stumble on the best one to be implemented with EDCF to achieve improved QoS.

  11. Rethinking Hearing Aid Fitting by Learning From Behavioral Patterns

    DEFF Research Database (Denmark)

    Johansen, Benjamin; Petersen, Michael Kai; Pontoppidan, Niels Henrik

    2017-01-01

    users to remotely enhance auditory focus and attenuate background noise to improve speech intelligibility. N=5, participants changed program settings and adjusted volume on their hearing instruments using their smartphones. We found that individual behavioral patterns affected the usage of the devices....... A significant difference between program usage, and weekdays versus weekends, were found. Users not only changed programs to modify aspects of directionality and noise reduction, but also continuously adjusted the volume. Rethinking hearing instruments as devices that adaptively learn behavioral patterns based...

  12. Design and Analysis of Printed Yagi-Uda Antenna and Two-Element Array for WLAN Applications

    Directory of Open Access Journals (Sweden)

    Cai Run-Nan

    2012-01-01

    Full Text Available A printed director antenna with compact structure is proposed. The antenna is fed by a balanced microstrip-slotline and makes good use of space to reduce feeding network area and the size of antenna. According to the simulation results of CST MICROWAVE STUDIO software, broadband characteristics and directional radiation properties of the antenna are explained. The operating bandwidth is 1.8 GHz–3.5 GHz with reflection coefficient less than −10 dB. Antenna gain in band can achieve 4.5–6.8 dBi, and the overall size of antenna is smaller than 0.34λ0×0.58λ0. Then the antenna is developed to a two-element antenna array, working frequency and relative bandwidth of which are 2.15–2.87 GHz and 28.7%, respectively. Compared with antenna unit, the gain of the antenna array has increased by 2 dB. Thus the proposed antenna has characteristics of compact structure, relatively small size, and wideband, and it can be widely used in PCS/UMTS/WLAN/ WiMAX fields.

  13. Codon usage bias in phylum Actinobacteria: relevance to environmental adaptation and host pathogenicity.

    Science.gov (United States)

    Lal, Devi; Verma, Mansi; Behura, Susanta K; Lal, Rup

    2016-10-01

    Actinobacteria are Gram-positive bacteria commonly found in soil, freshwater and marine ecosystems. In this investigation, bias in codon usages of ninety actinobacterial genomes was analyzed by estimating different indices of codon bias such as Nc (effective number of codons), SCUO (synonymous codon usage order), RSCU (relative synonymous codon usage), as well as sequence patterns of codon contexts. The results revealed several characteristic features of codon usage in Actinobacteria, as follows: 1) C- or G-ending codons are used frequently in comparison with A- and U ending codons; 2) there is a direct relationship of GC content with use of specific amino acids such as alanine, proline and glycine; 3) there is an inverse relationship between GC content and Nc estimates, 4) there is low SCUO value (Actinobacteria, extreme GC content and codon bias are driven by mutation rather than natural selection; (2) traits like aerobicity are associated with effective natural selection and therefore low GC content and low codon bias, demonstrating the role of both mutational bias and translational selection in shaping the habitat and phenotype of actinobacterial species. Copyright © 2016 Institut Pasteur. Published by Elsevier Masson SAS. All rights reserved.

  14. WLAN versus LAN - environmental impacts of small and medium sized local area networks

    Energy Technology Data Exchange (ETDEWEB)

    Hottenroth, H.; Quack, D. [Oeko-Inst. e.V., Inst. for Applied Ecology, Freiburg (Germany); Sustainable Products and Material Flows Div., Freiburg (Germany)

    2004-07-01

    In the study presented here the environmental impacts of the infrastructure and the use of wireless LAN are investigated and compared to wired LAN. In order to determine if and under which conditions WLAN shows environmental benefits a comparison with a wired LAN was drawn on the basis of three exemplary applications. The environmental impacts of the life cycle of these applications were assessed using the method of LCA. The investigated systems include the production, the operation of the networks and their end of life stage. The three applications under investigation were the following: application 1: a peer-to-peer connection of two computers; application 2: a small network consisting of three computers like it is used in households and small offices (SOHO) and application 3: an office network consisting of 20 computers. The results showed no significant differences between the two alternatives for the applications 1 and 2 taking into account cumulative energy demand, global warming potential, acidification potential and photochemical oxidation potential as impact categories. In contrast to this a significant advantage for the wireless solution could be identified for the third application. Concerning electronic waste-arise, the wireless solution is advantageous for all three applications. From the results recommendations for equipment options, net structure, and use behaviour of local area networks are derived. (orig.)

  15. Dual Polarized Monopole Patch Antennas for UWB Applications with Elimination of WLAN Signals

    Directory of Open Access Journals (Sweden)

    P. Kumar

    2016-05-01

    Full Text Available This paper presents the design, fabrication and measurement of dual polarized microstrip patch antennas for ultra wideband (UWB applications with notch at 5-6 GHz band. The proposed antenna rejects the wireless local area network (WLAN signals and work properly in the entire remaining ultra-wideband. Two antennas are designed for two different frequency bands of ultra wideband and both antennas together produce the entire ultra wideband with notch at 5-6 GHz band. The antennas are fed by a 50 coaxial probe and the entire design is optimized using CST Microwave Studio. The bandwidth of 3.1-5 GHz is achieved by the optimized design of Antenna-1 and the bandwidth of 6 -10.6 GHz is achieved by the optimized design of Antenna-2. The bandwidth of the optimized combined antenna is 3.1-10.6 GHz with elimination of the 5-6 GHz band. Both antennas are simulated, developed and measured. The simulated and measured results are presented. The two designed dual polarized antennas i.e. Antenna-1 and Antenna-2 can be used for 3.1-5 GHz band and 6-10.6 GHz band dual polarized applications, respectively, and the combined antenna structure can be used for UWB dual polarized applications with elimination of 5-6 GHz band signals.

  16. Implementation and Evaluation of WLAN 802.11ac for Residential Networks in NS-3

    Directory of Open Access Journals (Sweden)

    Andy Bubune Amewuda

    2018-01-01

    Full Text Available Wi-Fi has been an amazingly successful technology. Its success may be attributed to the fact that, despite the significant advances made in technology over the last decade, it has remained backward compatible. 802.11ac is the latest version of the wireless LAN (WLAN standard that is currently being adopted, and it promises to deliver very high throughput (VHT, operating at the 5 GHz band. In this paper, we report on an implementation of 802.11ac wireless LAN for residential scenario based on the 802.11ax task group scenario document. We evaluate the 802.11ac protocol performance under different operating conditions. Key features such as modulation coding set (MCS, frame aggregation, and multiple-input multiple-output (MIMO were investigated. We also evaluate the average throughput, delay, jitter, optimum range for goodput, and effect of station (STA density per access point (AP in a network. ns-3, an open source network simulator with features supporting 802.11ac, was used to perform the simulation. Results obtained indicate that very high data rates are achievable. The highest data rate, the best mean delay, and mean jitter are possible under combined features of 802.11ac (MIMO and A-MPDU.

  17. Possible hepatotoxicity of chronic marijuana usage

    Directory of Open Access Journals (Sweden)

    Paulo Borini

    Full Text Available CONTEXT: Hepatotoxicity is a potential complication from the usage of various illicit drugs, possibly consequent to their liver metabolism, but information on this is scarce in the medical literature. OBJECTIVE: To study the occurrence of clinical and laboratory hepatic alterations in chronic marijuana users, from the use of marijuana on its own or in association with other legal or illicit drugs. TYPE OF STUDY: transversal study SETTING: Hospital Espírita de Marília, Marília, São Paulo, Brazil PARTICIPANTS: The study was made among 123 patients interned in the Hospital Espírita de Marília from October 1996 to December 1998, divided into 3 groups: 26 (21% using only marijuana, 83 (67.5% using marijuana and crack, and 14 (11.4% consuming marijuana and alcohol. PROCEDURES AND MAIN MEASUREMENTS: Patients were examined clinically with special emphasis on types of drugs used, drug intake route, age when consumption began, length and pattern of usage, presence of tattooing, jaundice, hepatomegaly and splenomegaly. Serum determinations of total proteins, albumin, globulin, total and fractions of bilirubin, aspartate (AST and alanine (ALT aminotransferases, alkaline phosphatase (AP, gamma-glutamyltransferase and prothrombin activity were performed. RESULTS: Among users of only marijuana, hepatomegaly was observed in 57.7% and splenomegaly in 73.1%, and slightly elevated AST (42.3%, ALT (34.6% and AP (53.8%. The three groups did not differ significantly in the prevalence of hepatomegaly, splenomegaly and hepatosplenomegaly. The group using both marijuana and alcohol showed the highest prevalence of alterations and highest levels of aminotransferases. Mean AP levels were above normal in all groups. CONCLUSIONS: Chronic marijuana usage, on its own or in association with other drugs, was associated with hepatic morphologic and enzymatic alterations. This indicates that cannabinoids are possible hepatotoxic substances.

  18. Differences in smartphone usage

    DEFF Research Database (Denmark)

    Gustarini, Mattia; Scipioni, Marcello Paolo; Fanourakis, Marios

    2016-01-01

    We analyze the users’ intimacy to investigate the differences in smartphone usage, considering the user’s location and number and kind of people physically around the user. With a first user study we (1) validate the intimacy concept, (2) evaluate its correlation to smartphone usage features and ...

  19. Internet and smartphone application usage in eating disorders: A descriptive study in Singapore.

    Science.gov (United States)

    Tan, Tina; Kuek, Angeline; Goh, Shih Ee; Lee, Ee Lian; Kwok, Victor

    2016-02-01

    Eating disorders are associated with significant morbidity and mortality. The Internet is a popular medium for individuals with eating disorders to discuss and reinforce their affliction. However, the available literature on Internet usage and eating disorders is scarce, especially in the area of social media and smartphone application ("app") usage. This study looked at the Internet and smartphone app usage patterns of participants who presented with an eating disorder in Singapore, and whether it corresponded to severity of illness. Individuals who presented to the Eating Disorders clinic at the Singapore General Hospital completed a self-reported questionnaire on Internet and app usage. They also completed the EDE-Q, EAT-26 and CIA 3.0. 55 participants completed the study. 41.8% had anorexia nervosa, 34.5% had bulimia nervosa, and 9.1% were ED-NOS. 41.8% felt that apps helped to perpetuate their illness while 32.7% felt that the apps were helpful for recovery. Overall, any smartphone application usage was associated with younger age and greater eating disorder psychopathology and psychosocial impairment. While 30.9% had encountered eating disorder-related content on Facebook, only 12.7% visited Facebook groups related to eating disorders. For YouTube, "Cooking and Food" and "Beauty and Fashion" videos were among the top 3 types of videos that participants watched. In conclusion, Internet and smartphone app usage is significant, and they are associated with greater severity of illness. It is necessary to include interventions in this aspect as part of treatment of eating disorders. Copyright © 2015 Elsevier B.V. All rights reserved.

  20. Residential air-conditioner usage in China and efficiency standardization

    International Nuclear Information System (INIS)

    Wu, Jianghong; Liu, Chaopeng; Li, Hongqi; Ouyang, Dong; Cheng, Jianhong; Wang, Yuanxia; You, Shaofang

    2017-01-01

    Determining the real energy consumption and usage pattern of a room air-conditioner (RAC) are important issues from the point of view of both RAC design and evaluation of its energy efficiency. An air-conditioner's running time is fundamental data for the calculation of SEER and APF values. Therefore, in 2010, a nationwide investigation of RAC usage was conducted and 400 selected air-conditioning-units were monitored for a full year to obtain data on their cooling and heating usage. Two running time curves (cooling and heating) were obtained for the air-conditioners as a function of outdoor air temperatures using statistical analysis. The results show that the 27–30 °C temperature range accounts for more than 52% of the cooling time. Conversely, the 0–8 °C temperature range is associated with more than 75% of the heating time. The research presented in this paper has significantly contributed to China's new variable-speed RAC efficiency standard (GB21455-2013). It also has far-reaching implications for both the air-conditioner industry and energy policy in China due to its different method of calculating energy efficiency. - Highlights: • A nationwide survey to realize China's residential air-conditions usage behaviors. • Air-conditioner running time-environment temperature curves are obtained. • The peak heating demand and peak cooling demand happen at 28 °C and 4 °C, respectively. • The temperature of 27 °C–30 °C accounts for over 52% refrigeration time. • The temperature of 0 °C–8 °C occupies more than 75% heating time.

  1. Fatigue approach for addressing environmental effects in fatigue usage calculation

    Energy Technology Data Exchange (ETDEWEB)

    Wilhelm, Paul; Rudolph, Juergen [AREVA GmbH, Erlangen (Germany); Steinmann, Paul [Erlangen-Nuremberg Univ., erlangen (Germany). Chair of Applied Mechanics

    2015-04-15

    Laboratory tests consider simple trapezoidal, triangle, and sinusoidal signals. However, actual plant components are characterized by complex loading patterns and periods of holds. Fatigue tests in water environment show, that the damage from a realistic strain variation or the presence of hold-times within cyclic loading results in an environmental reduction factor (Fen) only half that of a simple waveform. This study proposes a new fatigue approach for addressing environmental effects in fatigue usage calculation for class 1 boiler and pressure vessel reactor components. The currently accepted method of fatigue assessment has been used as a base model and all cycles, which have been comparable with realistic fatigue tests, have been excluded from the code-based fatigue calculation and evaluated directly with the test data. The results presented show that the engineering approach can successfully be integrated in the code-based fatigue assessment. The cumulative usage factor can be reduced considerably.

  2. Fatigue approach for addressing environmental effects in fatigue usage calculation

    International Nuclear Information System (INIS)

    Wilhelm, Paul; Rudolph, Juergen; Steinmann, Paul

    2015-01-01

    Laboratory tests consider simple trapezoidal, triangle, and sinusoidal signals. However, actual plant components are characterized by complex loading patterns and periods of holds. Fatigue tests in water environment show, that the damage from a realistic strain variation or the presence of hold-times within cyclic loading results in an environmental reduction factor (Fen) only half that of a simple waveform. This study proposes a new fatigue approach for addressing environmental effects in fatigue usage calculation for class 1 boiler and pressure vessel reactor components. The currently accepted method of fatigue assessment has been used as a base model and all cycles, which have been comparable with realistic fatigue tests, have been excluded from the code-based fatigue calculation and evaluated directly with the test data. The results presented show that the engineering approach can successfully be integrated in the code-based fatigue assessment. The cumulative usage factor can be reduced considerably.

  3. Big data modeling to predict platelet usage and minimize wastage in a tertiary care system.

    Science.gov (United States)

    Guan, Leying; Tian, Xiaoying; Gombar, Saurabh; Zemek, Allison J; Krishnan, Gomathi; Scott, Robert; Narasimhan, Balasubramanian; Tibshirani, Robert J; Pham, Tho D

    2017-10-24

    Maintaining a robust blood product supply is an essential requirement to guarantee optimal patient care in modern health care systems. However, daily blood product use is difficult to anticipate. Platelet products are the most variable in daily usage, have short shelf lives, and are also the most expensive to produce, test, and store. Due to the combination of absolute need, uncertain daily demand, and short shelf life, platelet products are frequently wasted due to expiration. Our aim is to build and validate a statistical model to forecast future platelet demand and thereby reduce wastage. We have investigated platelet usage patterns at our institution, and specifically interrogated the relationship between platelet usage and aggregated hospital-wide patient data over a recent consecutive 29-mo period. Using a convex statistical formulation, we have found that platelet usage is highly dependent on weekday/weekend pattern, number of patients with various abnormal complete blood count measurements, and location-specific hospital census data. We incorporated these relationships in a mathematical model to guide collection and ordering strategy. This model minimizes waste due to expiration while avoiding shortages; the number of remaining platelet units at the end of any day stays above 10 in our model during the same period. Compared with historical expiration rates during the same period, our model reduces the expiration rate from 10.5 to 3.2%. Extrapolating our results to the ∼2 million units of platelets transfused annually within the United States, if implemented successfully, our model can potentially save ∼80 million dollars in health care costs.

  4. Codon Usage Bias and Determining Forces in Taenia solium Genome.

    Science.gov (United States)

    Yang, Xing; Ma, Xusheng; Luo, Xuenong; Ling, Houjun; Zhang, Xichen; Cai, Xuepeng

    2015-12-01

    The tapeworm Taenia solium is an important human zoonotic parasite that causes great economic loss and also endangers public health. At present, an effective vaccine that will prevent infection and chemotherapy without any side effect remains to be developed. In this study, codon usage patterns in the T. solium genome were examined through 8,484 protein-coding genes. Neutrality analysis showed that T. solium had a narrow GC distribution, and a significant correlation was observed between GC12 and GC3. Examination of an NC (ENC vs GC3s)-plot showed a few genes on or close to the expected curve, but the majority of points with low-ENC (the effective number of codons) values were detected below the expected curve, suggesting that mutational bias plays a major role in shaping codon usage. The Parity Rule 2 plot (PR2) analysis showed that GC and AT were not used proportionally. We also identified 26 optimal codons in the T. solium genome, all of which ended with either a G or C residue. These optimal codons in the T. solium genome are likely consistent with tRNAs that are highly expressed in the cell, suggesting that mutational and translational selection forces are probably driving factors of codon usage bias in the T. solium genome.

  5. Tell me your apps and I will tell you your mood: Correlation of apps usage with Bipolar Disorder State

    DEFF Research Database (Denmark)

    Alvarez-Lozano, Jorge; Frost, Mads; Osmani, Venet

    2014-01-01

    Bipolar Disorder is a disease that is manifested with cycling periods of polar episodes, namely mania and depression. Depressive episodes are manifested through disturbed mood, psychomotor retardation, behaviour change, decrease in energy levels and length of sleep. Manic episodes are manifested...... be captured through the analysis of smartphone usage. We have analysed changes in smartphone usage, specifically app usage and how these changes correlate with the self-reported patient state. We also used psychiatric evaluation scores provided by the clinic to understand correlation of the patient smartphone...... behaviour before the psychiatric evaluation and after the psychiatric evaluation. The results show that patients have strong correlation of patterns of app usage with different aspects of their self-reported state including mood, sleep and irritability. While, on the other hand, the patients’ application...

  6. Usage of Plant Food Supplements across Six European Countries: Findings from the PlantLIBRA Consumer Survey

    Science.gov (United States)

    Garcia-Alvarez, Alicia; Egan, Bernadette; de Klein, Simone; Dima, Lorena; Maggi, Franco M.; Isoniemi, Merja; Ribas-Barba, Lourdes; Raats, Monique M.; Meissner, Eva Melanie; Badea, Mihaela; Bruno, Flavia; Salmenhaara, Maija; Milà-Villarroel, Raimon; Knaze, Viktoria; Hodgkins, Charo; Marculescu, Angela; Uusitalo, Liisa; Restani, Patrizia; Serra-Majem, Lluís

    2014-01-01

    Background The popularity of botanical products is on the rise in Europe, with consumers using them to complement their diets or to maintain health, and products are taken in many different forms (e.g. teas, juices, herbal medicinal products, plant food supplements (PFS)). However there is a scarcity of data on the usage of such products at European level. Objective To provide an overview of the characteristics and usage patterns of PFS consumers in six European countries. Design Data on PFS usage were collected in a cross-sectional, retrospective survey of PFS consumers using a bespoke frequency of PFS usage questionnaire. Subjects/setting A total sample of 2359 adult PFS consumers from Finland, Germany, Italy, Romania, Spain and the United Kingdom. Data analyses Descriptive analyses were conducted, with all data stratified by gender, age, and country. Absolute frequencies, percentages and 95% confidence intervals are reported. Results Overall, an estimated 18.8% of screened survey respondents used at least one PFS. Characteristics of PFS consumers included being older, well-educated, never having smoked and self-reporting health status as “good or very good”. Across countries, 491 different botanicals were identified in the PFS products used, with Ginkgo biloba (Ginkgo), Oenothera biennis (Evening primrose) and Cynara scolymus (Artichoke) being most frequently reported; the most popular dose forms were capsules and pills/tablets. Most consumers used one product and half of all users took single-botanical products. Some results varied across countries. Conclusions The PlantLIBRA consumer survey is unique in reporting on usage patterns of PFS consumers in six European countries. The survey highlights the complexity of measuring the intake of such products, particularly at pan-European level. Incorporating measures of the intake of botanicals in national dietary surveys would provide much-needed data for comprehensive risk and benefit assessments at the European

  7. Usage of plant food supplements across six European countries: findings from the PlantLIBRA consumer survey.

    Directory of Open Access Journals (Sweden)

    Alicia Garcia-Alvarez

    Full Text Available The popularity of botanical products is on the rise in Europe, with consumers using them to complement their diets or to maintain health, and products are taken in many different forms (e.g. teas, juices, herbal medicinal products, plant food supplements (PFS. However there is a scarcity of data on the usage of such products at European level.To provide an overview of the characteristics and usage patterns of PFS consumers in six European countries.Data on PFS usage were collected in a cross-sectional, retrospective survey of PFS consumers using a bespoke frequency of PFS usage questionnaire.A total sample of 2359 adult PFS consumers from Finland, Germany, Italy, Romania, Spain and the United Kingdom.Descriptive analyses were conducted, with all data stratified by gender, age, and country. Absolute frequencies, percentages and 95% confidence intervals are reported.Overall, an estimated 18.8% of screened survey respondents used at least one PFS. Characteristics of PFS consumers included being older, well-educated, never having smoked and self-reporting health status as "good or very good". Across countries, 491 different botanicals were identified in the PFS products used, with Ginkgo biloba (Ginkgo, Oenothera biennis (Evening primrose and Cynara scolymus (Artichoke being most frequently reported; the most popular dose forms were capsules and pills/tablets. Most consumers used one product and half of all users took single-botanical products. Some results varied across countries.The PlantLIBRA consumer survey is unique in reporting on usage patterns of PFS consumers in six European countries. The survey highlights the complexity of measuring the intake of such products, particularly at pan-European level. Incorporating measures of the intake of botanicals in national dietary surveys would provide much-needed data for comprehensive risk and benefit assessments at the European level.

  8. E-Book Usage and the "Choice" Outstanding Academic Book List: Is There a Correlation?

    Science.gov (United States)

    Carter Williams, Karen; Best, Rickey

    2006-01-01

    In this study, the staff of the library at Auburn University at Montgomery analyzed circulation patterns for electronic books in the fields of Political Science, Public Administration and Law to see if favorable "Choice" reviews can be used to predict usage of electronic books. A comparison of the circulations between print and…

  9. 5.2 GHz variable-gain amplifier and power amplifier driver for WLAN IEEE 802.11a transmitter front-end

    Energy Technology Data Exchange (ETDEWEB)

    Zhang Xuelian; Yan Jun; Shi Yin [Institute of Semiconductors, Chinese Academy of Sciences, Beijing 100083 (China); Foster, Dai Fa, E-mail: xlzhang@semi.ac.c [Department of Electrical and Computer Engineering, Auburn University, Auburn, AL 36849-5201 (United States)

    2009-01-15

    A 5.2 GHz variable-gain amplifier (VGA) and a power amplifier (PA) driver are designed for WLAN IEEE 802.11a monolithic RFIC. The VGA and the PA driver are implemented in a 50 GHz 0.35 mum SiGe BiCMOS technology and occupy 1.12 x 1.25 mm{sup 2} die area. The VGA with effective temperature compensation is controlled by 5 bits and has a gain range of 34 dB. The PA driver with tuned loads utilizes a differential input, single-ended output topology, and the tuned loads resonate at 5.2 GHz. The maximum overall gain of the VGA and the PA driver is 29 dB with the output third-order intercept point (OIP3) of 11 dBm. The gain drift over the temperature varying from -30 to 85 deg. C converges within +-3 dB. The total current consumption is 45 mA under a 2.85 V power supply.

  10. Multiple-Antenna Interference Cancellation for WLAN with MAC Interference Avoidance in Open Access Networks

    Directory of Open Access Journals (Sweden)

    Alexandr M. Kuzminskiy

    2007-10-01

    Full Text Available The potential of multiantenna interference cancellation receiver algorithms for increasing the uplink throughput in WLAN systems such as 802.11 is investigated. The medium access control (MAC in such systems is based on carrier sensing multiple-access with collision avoidance (CSMA/CA, which itself is a powerful tool for the mitigation of intrasystem interference. However, due to the spatial dependence of received signal strengths, it is possible for the collision avoidance mechanism to fail, resulting in packet collisions at the receiver and a reduction in system throughput. The CSMA/CA MAC protocol can be complemented in such scenarios by interference cancellation (IC algorithms at the physical (PHY layer. The corresponding gains in throughput are a result of the complex interplay between the PHY and MAC layers. It is shown that semiblind interference cancellation techniques are essential for mitigating the impact of interference bursts, in particular since these are typically asynchronous with respect to the desired signal burst. Semiblind IC algorithms based on second- and higher-order statistics are compared to the conventional no-IC and training-based IC techniques in an open access network (OAN scenario involving home and visiting users. It is found that the semiblind IC algorithms significantly outperform the other techniques due to the bursty and asynchronous nature of the interference caused by the MAC interference avoidance scheme.

  11. Multiple-Antenna Interference Cancellation for WLAN with MAC Interference Avoidance in Open Access Networks

    Directory of Open Access Journals (Sweden)

    Kuzminskiy Alexandr M

    2007-01-01

    Full Text Available The potential of multiantenna interference cancellation receiver algorithms for increasing the uplink throughput in WLAN systems such as 802.11 is investigated. The medium access control (MAC in such systems is based on carrier sensing multiple-access with collision avoidance (CSMA/CA, which itself is a powerful tool for the mitigation of intrasystem interference. However, due to the spatial dependence of received signal strengths, it is possible for the collision avoidance mechanism to fail, resulting in packet collisions at the receiver and a reduction in system throughput. The CSMA/CA MAC protocol can be complemented in such scenarios by interference cancellation (IC algorithms at the physical (PHY layer. The corresponding gains in throughput are a result of the complex interplay between the PHY and MAC layers. It is shown that semiblind interference cancellation techniques are essential for mitigating the impact of interference bursts, in particular since these are typically asynchronous with respect to the desired signal burst. Semiblind IC algorithms based on second- and higher-order statistics are compared to the conventional no-IC and training-based IC techniques in an open access network (OAN scenario involving home and visiting users. It is found that the semiblind IC algorithms significantly outperform the other techniques due to the bursty and asynchronous nature of the interference caused by the MAC interference avoidance scheme.

  12. CMOS analog baseband circuitry for an IEEE 802.11 b/g/n WLAN transceiver

    International Nuclear Information System (INIS)

    Gong Zheng; Chu Xiaojie; Shi Yin; Lei Qianqian; Lin Min

    2012-01-01

    An analog baseband circuit for a direct conversion wireless local area network (WLAN) transceiver in a standard 0.13-μm CMOS occupying 1.26 mm 2 is presented. The circuit consists of active-RC receiver (RX) 4th order elliptic lowpass filters(LPFs), transmit (PGAs) with DC offset cancellation (DCOC) servo loops, and on-chip output buffers. The RX baseband gain can be programmed in the range of −11 to 49 dB in 2 dB steps with 50–30.2 nV/√Hz input referred noise (IRN) and a 21 to −41 dBm in-band 3rd order interception point (IIP3). The RX/TX LPF cutoff frequencies can be switched between 5 MHz, 10 MHz, and 20 MHz to fulfill the multimode 802.11b/g/n requirements. The TX baseband gain of the I/Q paths are tuned separately from −1.6 to 0.9 dB in 0.1 dB steps to calibrate TX I/Q gain mismatches. By using an identical integrator based elliptic filter synthesis method together with global compensation applied to the LPF capacitor array, the power consumption of the RX LPF is considerably reduced and the proposed chip draws 26.8 mA/8 mA by the RX/TX baseband paths from a 1.2 V supply. (semiconductor integrated circuits)

  13. CMOS analog baseband circuitry for an IEEE 802.11 b/g/n WLAN transceiver

    Science.gov (United States)

    Zheng, Gong; Xiaojie, Chu; Qianqian, Lei; Min, Lin; Yin, Shi

    2012-11-01

    An analog baseband circuit for a direct conversion wireless local area network (WLAN) transceiver in a standard 0.13-μm CMOS occupying 1.26 mm2 is presented. The circuit consists of active-RC receiver (RX) 4th order elliptic lowpass filters(LPFs), transmit (PGAs) with DC offset cancellation (DCOC) servo loops, and on-chip output buffers. The RX baseband gain can be programmed in the range of -11 to 49 dB in 2 dB steps with 50-30.2 nV/√Hz input referred noise (IRN) and a 21 to -41 dBm in-band 3rd order interception point (IIP3). The RX/TX LPF cutoff frequencies can be switched between 5 MHz, 10 MHz, and 20 MHz to fulfill the multimode 802.11b/g/n requirements. The TX baseband gain of the I/Q paths are tuned separately from -1.6 to 0.9 dB in 0.1 dB steps to calibrate TX I/Q gain mismatches. By using an identical integrator based elliptic filter synthesis method together with global compensation applied to the LPF capacitor array, the power consumption of the RX LPF is considerably reduced and the proposed chip draws 26.8 mA/8 mA by the RX/TX baseband paths from a 1.2 V supply.

  14. Marijuana usage in relation to harmfulness ratings, perceived likelihood of negative consequences, and defense mechanisms in high school students.

    Science.gov (United States)

    Como-Lesko, N; Primavera, L H; Szeszko, P R

    1994-08-01

    This study investigated high school students' marijuana usage patterns in relation to their harmfulness ratings of 15 licit and illicit drugs, perceived negative consequences from using marijuana, and types of defense mechanisms employed. Subjects were classified into one of five pattern-of-use groups based on marijuana usage: principled nonusers, nonusers, light users, moderate users, and heavy users. Principled nonusers (individuals who have never used marijuana and would not do so if it was legalized) rated marijuana, hashish, cocaine, and alcohol as significantly more harmful than heavy users. A cluster analysis of the drugs' harmfulness ratings best fit a three cluster solution and were named medicinal drugs, recreational drugs, and hard drugs. In general, principled nonusers rated negative consequences from using marijuana as significantly more likely to occur than other groups. Principled nonusers and heavy users utilized reversal from the Defense Mechanism Inventory, which includes repression and denial, significantly more than nonusers, indicating some trait common to the two extreme pattern-of-use groups.

  15. Codon usage and expression level of human mitochondrial 13 protein coding genes across six continents.

    Science.gov (United States)

    Chakraborty, Supriyo; Uddin, Arif; Mazumder, Tarikul Huda; Choudhury, Monisha Nath; Malakar, Arup Kumar; Paul, Prosenjit; Halder, Binata; Deka, Himangshu; Mazumder, Gulshana Akthar; Barbhuiya, Riazul Ahmed; Barbhuiya, Masuk Ahmed; Devi, Warepam Jesmi

    2017-12-02

    The study of codon usage coupled with phylogenetic analysis is an important tool to understand the genetic and evolutionary relationship of a gene. The 13 protein coding genes of human mitochondria are involved in electron transport chain for the generation of energy currency (ATP). However, no work has yet been reported on the codon usage of the mitochondrial protein coding genes across six continents. To understand the patterns of codon usage in mitochondrial genes across six different continents, we used bioinformatic analyses to analyze the protein coding genes. The codon usage bias was low as revealed from high ENC value. Correlation between codon usage and GC3 suggested that all the codons ending with G/C were positively correlated with GC3 but vice versa for A/T ending codons with the exception of ND4L and ND5 genes. Neutrality plot revealed that for the genes ATP6, COI, COIII, CYB, ND4 and ND4L, natural selection might have played a major role while mutation pressure might have played a dominant role in the codon usage bias of ATP8, COII, ND1, ND2, ND3, ND5 and ND6 genes. Phylogenetic analysis indicated that evolutionary relationships in each of 13 protein coding genes of human mitochondria were different across six continents and further suggested that geographical distance was an important factor for the origin and evolution of 13 protein coding genes of human mitochondria. Copyright © 2017 Elsevier B.V. and Mitochondria Research Society. All rights reserved.

  16. Web Usage Mining, Pattern Discovery dan Log File

    OpenAIRE

    Tri Suratno; Toni Prahasto; Adian Fatchur Rochim

    2014-01-01

    Analysis  of  data  to  access  the  server  can  provide  significant  and  useful  information  for  performance  improvement,  restructuring  andimproving the effectiveness of a web site. Data mining is one of the most effective way to detect a series of patterns of information from large amounts of data. Application of  data mining  on  Internet use  called web  mining  is a set of  data mining  techniques  are  used  for the web. Web mining technologies and data mining is a combination o...

  17. ICT in University Education: Usage and Challenges among ...

    African Journals Online (AJOL)

    This study was a survey which explored ICT usage and challenges among academic staff. Thus, the main purpose of this study was to determine the areas of ICT usage among academic staff; identify the obstacles to their ICT usage and identify their areas of training need in ICT usage. Five research questions were posed ...

  18. Genetic and codon usage bias analyses of polymerase genes of equine influenza virus and its relation to evolution.

    Science.gov (United States)

    Bera, Bidhan Ch; Virmani, Nitin; Kumar, Naveen; Anand, Taruna; Pavulraj, S; Rash, Adam; Elton, Debra; Rash, Nicola; Bhatia, Sandeep; Sood, Richa; Singh, Raj Kumar; Tripathi, Bhupendra Nath

    2017-08-23

    Equine influenza is a major health problem of equines worldwide. The polymerase genes of influenza virus have key roles in virus replication, transcription, transmission between hosts and pathogenesis. Hence, the comprehensive genetic and codon usage bias of polymerase genes of equine influenza virus (EIV) were analyzed to elucidate the genetic and evolutionary relationships in a novel perspective. The group - specific consensus amino acid substitutions were identified in all polymerase genes of EIVs that led to divergence of EIVs into various clades. The consistent amino acid changes were also detected in the Florida clade 2 EIVs circulating in Europe and Asia since 2007. To study the codon usage patterns, a total of 281,324 codons of polymerase genes of EIV H3N8 isolates from 1963 to 2015 were systemically analyzed. The polymerase genes of EIVs exhibit a weak codon usage bias. The ENc-GC3s and Neutrality plots indicated that natural selection is the major influencing factor of codon usage bias, and that the impact of mutation pressure is comparatively minor. The methods for estimating host imposed translation pressure suggested that the polymerase acidic (PA) gene seems to be under less translational pressure compared to polymerase basic 1 (PB1) and polymerase basic 2 (PB2) genes. The multivariate statistical analysis of polymerase genes divided EIVs into four evolutionary diverged clusters - Pre-divergent, Eurasian, Florida sub-lineage 1 and 2. Various lineage specific amino acid substitutions observed in all polymerase genes of EIVs and especially, clade 2 EIVs underwent major variations which led to the emergence of a phylogenetically distinct group of EIVs originating from Richmond/1/07. The codon usage bias was low in all the polymerase genes of EIVs that was influenced by the multiple factors such as the nucleotide compositions, mutation pressure, aromaticity and hydropathicity. However, natural selection was the major influencing factor in defining the

  19. The Scope of Usage-based Theory

    OpenAIRE

    Paul eIbbotson

    2013-01-01

    Usage-based approaches typically draw on a relatively small set of cognitive processes, such as categorization, analogy, and chunking to explain language structure and function. The goal of this paper is to first review the extent to which the “cognitive commitment” of usage-based theory has had success in explaining empirical findings across domains, including language acquisition, processing, and typology. We then look at the overall strengths and weaknesses of usage-based theory and highli...

  20. Performance Analysis of a Burst Transmission Mechanism Using Microsleep Operation for Green IEEE 802.11 WLANs

    Directory of Open Access Journals (Sweden)

    Raul Palacios-Trujillo

    2017-07-01

    Full Text Available This paper evaluates the performance of a burst transmission mechanism using microsleep operation to support high energy efficiency in IEEE 802.11 Wireless Local Area Networks (WLANs. This mechanism is an implementation of the IEEE 802.11ac Transmission Opportunity Power Save Mode (TXOP PSM. A device using the TXOP PSM-based mechanism can switch to a low-power sleep state for the time that another device transmits a burst of data frames to a third one. This operation is called microsleep and its feasibility strongly depends on the time and energy consumption that a device incurs in the transitions from and to the sleep state. This paper accounts for the impact of these transitions in the derivation of an analytical model to calculate the energy efficiency of the TXOP PSM-based mechanism under network saturation. Results obtained show that the impact of the transition requirements on the feasibility of microsleep operation can be significant depending on the selected system parameters, although it can be reduced by using burst transmissions. When microsleep operation is feasible, the TXOP PSM-based mechanism can improve the energy efficiency of other legacy mechanisms by up to 424% under high traffic loads.

  1. Lithium-Ion Battery Cell Cycling and Usage Analysis in a Heavy-Duty Truck Field Study

    Directory of Open Access Journals (Sweden)

    Pontus Svens

    2015-05-01

    Full Text Available This paper presents results from a field test performed on commercial power-optimized lithium-ion battery cells cycled on three heavy-duty trucks. The goal with this study was to age battery cells in a hybrid electric vehicle (HEV environment and find suitable methods for identifying cell ageing. The battery cells were cycled on in-house developed equipment intended for testing on conventional vehicles by emulating an HEV environment. A hybrid strategy that allows battery usage to vary within certain limits depending on driving patterns was used. This concept allows unobtrusive and low-cost testing of battery cells under realistic conditions. Each truck was equipped with one cell cycling equipment and two battery cells. One cell per vehicle was cycled during the test period while a reference cell on each vehicle experienced the same environmental conditions without being cycled. Differential voltage analysis and electrochemical impedance spectroscopy were used to identify ageing of the tested battery cells. Analysis of driving patterns and battery usage was performed from collected vehicle data and battery cell data.

  2. Leisure Patterns among Four-Day Workers.

    Science.gov (United States)

    Seltzer, Joseph; Wilson, James A.

    1980-01-01

    Insight into the patterns of leisure time usage may lead to a better understanding of the relationships between work and leisure and other aspects of an individual's life. A five-factor model was developed to explicate individual motivations for leisure pursuits. (JN)

  3. Facebook usage by students in higher education

    NARCIS (Netherlands)

    Wesseling, N.F.; de la Poza, Elena; Dormènech, Jozep; Lloret, Jaime; Vincent Vela, M. Cinta; Zuriaga Agustí, Elena

    2015-01-01

    In this paper I measure first year student Facebook usage as part of a broader PhD study into the influence of social media usage on the success of students in higher education. A total of 906 students were asked to complete 3 surveys on Facebook usage with their peers, for two consecutive years

  4. Patterns of Undergraduates' Use of Scholarly Databases in a Large Research University

    Science.gov (United States)

    Mbabu, Loyd Gitari; Bertram, Albert; Varnum, Ken

    2013-01-01

    Authentication data was utilized to explore undergraduate usage of subscription electronic databases. These usage patterns were linked to the information literacy curriculum of the library. The data showed that out of the 26,208 enrolled undergraduate students, 42% of them accessed a scholarly database at least once in the course of the entire…

  5. Structural proteomics of minimal organisms: conservation ofprotein fold usage and evolutionary implications

    Energy Technology Data Exchange (ETDEWEB)

    Chandonia, John-Marc; Kim, Sung-Hou

    2006-03-15

    Background: Determining the complete repertoire of proteinstructures for all soluble, globular proteins in a single organism hasbeen one of the major goals of several structural genomics projects inrecent years. Results: We report that this goal has nearly been reachedfor several "minimal organisms"--parasites or symbionts with reducedgenomes--for which over 95 percent of the soluble, globular proteins maynow be assigned folds, overall 3-D backbone structures. We analyze thestructures of these proteins as they relate to cellular functions, andcompare conservation off old usage between functional categories. We alsocompare patterns in the conservation off olds among minimal organisms andthose observed between minimal organisms and other bacteria. Conclusion:We find that proteins performing essential cellular functions closelyrelated to transcription and translation exhibit a higher degree ofconservation in fold usage than proteins in other functional categories.Folds related to transcription and translation functional categories werealso over represented in minimal organisms compared to otherbacteria.

  6. Immersion Suit Usage Within the RAAF

    Science.gov (United States)

    1992-01-01

    IMMERSION SUIT USED UVIC QDIS HOLDINGS 202. in 12 Sizes, held by ALSS 492SQN REQUIREMENTS No comment USAGE POLICY REFERENCE DIRAF) AAP 7215.004-1 (P3C...held by ALSS 492SQN. REQUIREMENTS No comment ISACE POLICY REFERENCE DIIAF) AAP 7215.004-1 (P3C Flight Manual) RAAF Supplement No 92 USAGE POUICY UVIC...TYPE P3C REFERENCE Telecon FLTLT Toft I I SQNfRESO AVMED Dated 22 Mar 91 IMMERSION SUIT USED UVIC QDIS HOLDINGS No comment REQUIREMENTS No comment USAGE

  7. Extracting urban water usage habits from smart meter data: a functional clustering approach

    OpenAIRE

    CHEIFETZ, Nicolas; SAME, Allou; NOUMIR, Zineb; SANDRAZ, Anne Claire; FELIERS, Cédric; HEIM, Véronique

    2017-01-01

    Through automated meter reading systems, recent development of smart grids offers the opportunity for an efficient and responsible management of water resources. The present paper describes a novel methodology for identifying relevant usage profiles from hourly water consumption series collected by smart meters located on a water distribution network. The proposed approach operates in two stages. First, an additive time series decomposition model is used in order to extract seasonal patterns ...

  8. Influence of certain forces on evolution of synonymous codon usage bias in certain species of three basal orders of aquatic insects.

    Science.gov (United States)

    Selva Kumar, C; Nair, Rahul R; Sivaramakrishnan, K G; Ganesh, D; Janarthanan, S; Arunachalam, M; Sivaruban, T

    2012-12-01

    Forces that influence the evolution of synonymous codon usage bias are analyzed in six species of three basal orders of aquatic insects. The rationale behind choosing six species of aquatic insects (three from Ephemeroptera, one from Plecoptera, and two from Odonata) for the present analysis is based on phylogenetic position at the basal clades of the Order Insecta facilitating the understanding of the evolution of codon bias and of factors shaping codon usage patterns in primitive clades of insect lineages and their subtle differences in some of their ecological and environmental requirements in terms of habitat-microhabitat requirements, altitudinal preferences, temperature tolerance ranges, and consequent responses to climate change impacts. The present analysis focuses on open reading frames of the 13 protein-coding genes in the mitochondrial genome of six carefully chosen insect species to get a comprehensive picture of the evolutionary intricacies of codon bias. In all the six species, A and T contents are observed to be significantly higher than G and C, and are used roughly equally. Since transcription hypothesis on codon usage demands A richness and T poorness, it is quite likely that mutation pressure may be the key factor associated with synonymous codon usage (SCU) variations in these species because the mutation hypothesis predicts AT richness and GC poorness in the mitochondrial DNA. Thus, AT-biased mutation pressure seems to be an important factor in framing the SCU variation in all the selected species of aquatic insects, which in turn explains the predominance of A and T ending codons in these species. This study does not find any association between microhabitats and codon usage variations in the mitochondria of selected aquatic insects. However, this study has identified major forces, such as compositional constraints and mutation pressure, which shape patterns of codon usage in mitochondrial genes in the primitive clades of insect lineages.

  9. A Dual-Band Multiple Input Multiple Output Frequency Agile Antenna for GPSL1/Wi-Fi/WLAN2400/LTE Applications

    Directory of Open Access Journals (Sweden)

    Sajid Aqeel

    2016-01-01

    Full Text Available A novel dual-band, single element multiple input multiple output (MIMO dielectric resonator antenna (DRA with a modest frequency tuning ability is presented in this communication. The proposed antenna operates at GPS L1/Bluetooth/Wi-Fi/LTE2500/WLAN2400 frequency bands. A single dielectric resonator element is fed by two coaxial probes to excite the orthogonal modes. A couple of slots are introduced on the ground plane to improve the isolation between antenna ports. The slots also serve the purpose of reconfiguration in the lower band on placement of switches at optimized locations. The measured impedance bandwidth is 5.16% (1.41–1.49 GHz in the lower band and 26% (2.2–2.85 GHz in the higher band. The lower band reconfigures with an impedance bandwidth of 6.5% (1.55–1.65 GHz when PIN diodes are switched ON. The gain, efficiency, correlation coefficient, and diversity gain of the MIMO DRA are presented with a close agreement between simulated and measured results.

  10. E-book usage: counting the challenges and opportunities

    Directory of Open Access Journals (Sweden)

    Angela Conyers

    2017-07-01

    Full Text Available Academic libraries are spending a growing proportion of their increasingly stretched budgets on e-books each year. Within this context, demonstrating a return on investment is imperative, but gathering data about e-resource usage is not always easy.    This article summarizes how libraries and library consortia are acquiring and evaluating e-books, how usage statistics feature within library workflows, the issues faced in doing so and the resulting impact of these issues on understanding usage and informing purchasing of new titles. Discussions with publishers indicate how usage data are being used within the organization, the requirements of customers and the challenges involved in providing usage data for e-books. Assessing and evaluating e-book usage is a complex and challenging task with processes and workflows in development. A transition from print to e-books represents a significant change for libraries, and the availability of reliable usage statistics to support purchase decisions is vital. The article is based on a series of case study interviews with representatives from a small cross-section of academic libraries, library consortia, publishers and aggregators.    This work is of interest to anyone with responsibility for creating, managing, developing, delivering and supporting usage statistics and standards for e-books.

  11. Neurotic Anxiety, Pronoun Usage, and Stress

    Science.gov (United States)

    Alban, Lewis Sigmund; Groman, William D.

    1976-01-01

    Attempts to clarify the function of a particular aspect of verbal communication, pronoun usage, by (a) using a Gestalt Therapy theory conceptual framework and (b) experimentally focusing on the relationship of pronoun usage to neurotic anxiety and emotional stress. (Author/RK)

  12. Video personalization for usage environment

    Science.gov (United States)

    Tseng, Belle L.; Lin, Ching-Yung; Smith, John R.

    2002-07-01

    A video personalization and summarization system is designed and implemented incorporating usage environment to dynamically generate a personalized video summary. The personalization system adopts the three-tier server-middleware-client architecture in order to select, adapt, and deliver rich media content to the user. The server stores the content sources along with their corresponding MPEG-7 metadata descriptions. Our semantic metadata is provided through the use of the VideoAnnEx MPEG-7 Video Annotation Tool. When the user initiates a request for content, the client communicates the MPEG-21 usage environment description along with the user query to the middleware. The middleware is powered by the personalization engine and the content adaptation engine. Our personalization engine includes the VideoSue Summarization on Usage Environment engine that selects the optimal set of desired contents according to user preferences. Afterwards, the adaptation engine performs the required transformations and compositions of the selected contents for the specific usage environment using our VideoEd Editing and Composition Tool. Finally, two personalization and summarization systems are demonstrated for the IBM Websphere Portal Server and for the pervasive PDA devices.

  13. French grammar and usage

    CERN Document Server

    Hawkins, Roger

    2015-01-01

    Long trusted as the most comprehensive, up-to-date and user-friendly grammar available, French Grammar and Usage is a complete guide to French as it is written and spoken today. It includes clear descriptions of all the main grammatical phenomena of French, and their use, illustrated by numerous examples taken from contemporary French, and distinguishes the most common forms of usage, both formal and informal.Key features include:Comprehensive content, covering all the major structures of contemporary French User-friendly organisation offering easy-to-find sections with cross-referencing and i

  14. Factors Influencing Facebook Usage and Facebook Addictive Tendency in University Students: The Role of Online Psychological Privacy and Facebook Usage Motivation.

    Science.gov (United States)

    Hong, Fu-Yuan; Chiu, Su-Lin

    2016-04-01

    There are few studies analysing the influence of personal traits and motivation factors on Facebook usage and Facebook addictive tendency as seen in university students. In this study, 225 Taiwanese university students completed a questionnaire to determine their online psychological privacy scale, Facebook usage motivation scale, Facebook usage scale and Facebook addictive tendency scale, in order to evaluate the items that can be conceptualized as the effect of university students' online psychological privacy personal trait and motive factors, and Facebook usage motivation with respect to Facebook usage and Facebook addictive tendency. The study found that a desire for more online psychological privacy correlates with a stronger motivation to use Facebook and more Facebook usage behaviour among university students who may become high-risk groups for Facebook addictive tendency. The study found that a desire for or an acceptance of a lower online psychological privacy correlates with a stronger motivation to use Facebook among university students who may have more Facebook usage behaviour. This study can help understand university students' Facebook usage and Facebook addictive tendency and provide feature indicators for those who may become high-risk groups for Facebook addictive tendency. Finally, this study conducts discussion and proposes relevant suggestions for future study. Copyright © 2014 John Wiley & Sons, Ltd.

  15. Comparative evolutionary genomics of Corynebacterium with special reference to codon and amino acid usage diversities.

    Science.gov (United States)

    Pal, Shilpee; Sarkar, Indrani; Roy, Ayan; Mohapatra, Pradeep K Das; Mondal, Keshab C; Sen, Arnab

    2018-02-01

    The present study has been aimed to the comparative analysis of high GC composition containing Corynebacterium genomes and their evolutionary study by exploring codon and amino acid usage patterns. Phylogenetic study by MLSA approach, indel analysis and BLAST matrix differentiated Corynebacterium species in pathogenic and non-pathogenic clusters. Correspondence analysis on synonymous codon usage reveals that, gene length, optimal codon frequencies and tRNA abundance affect the gene expression of Corynebacterium. Most of the optimal codons as well as translationally optimal codons are C ending i.e. RNY (R-purine, N-any nucleotide base, and Y-pyrimidine) and reveal translational selection pressure on codon bias of Corynebacterium. Amino acid usage is affected by hydrophobicity, aromaticity, protein energy cost, etc. Highly expressed genes followed the cost minimization hypothesis and are less diverged at their synonymous positions of codons. Functional analysis of core genes shows significant difference in pathogenic and non-pathogenic Corynebacterium. The study reveals close relationship between non-pathogenic and opportunistic pathogenic Corynebaterium as well as between molecular evolution and survival niches of the organism.

  16. MESUR metrics from scholarly usage of resources

    CERN Document Server

    CERN. Geneva; Van de Sompel, Herbert

    2007-01-01

    Usage data is increasingly regarded as a valuable resource in the assessment of scholarly communication items. However, the development of quantitative, usage-based indicators of scholarly impact is still in its infancy. The Digital Library Research & Prototyping Team at the Los Alamos National Laboratory's Research library has therefore started a program to expand the set of usage-based tools for the assessment of scholarly communication items. The two-year MESUR project, funded by the Andrew W. Mellon Foundation, aims to define and validate a range of usage-based impact metrics, and issue guidelines with regards to their characteristics and proper application. The MESUR project is constructing a large-scale semantic model of the scholarly community that seamlessly integrates a wide range of bibliographic, citation and usage data. Functioning as a reference data set, this model is analyzed to characterize the intricate networks of typed relationships that exist in the scholarly community. The resulting c...

  17. Specific smartphone usage and cognitive performance affect gait characteristics during free-living and treadmill walking.

    Science.gov (United States)

    Niederer, Daniel; Bumann, Anke; Mühlhauser, Yvonne; Schmitt, Mareike; Wess, Katja; Engeroff, Tobias; Wilke, Jan; Vogt, Lutz; Banzer, Winfried

    2018-04-06

    Mobile phone tasks like texting, typing, and dialling during walking are known to impact gait characteristics. Beyond that, the effects of performing smartphone-typical actions like researching and taking self-portraits (selfie) on gait have not been investigated yet. We aimed to investigate the effects of smartphone usage on relevant gait characteristics and to reveal potential association of basic cognitive and walking plus smartphone dual-task abilities. Our cross-sectional, cross-over study on physically active, healthy participants was performed on two days, interrupted by a 24-h washout in between. Assessments were: 1) Cognitive testing battery consisting of the trail making test (TMT A and B) and the Stroop test 2) Treadmill walking under five smartphone usage conditions: no use (control condition), reading, dialling, internet searching and taking a selfie in randomized order. Kinematic and kinetic gait characteristics were assessed to estimate conditions influence. In our sample of 36 adults (24.6 ± 1 years, 23 female, 13 male), ANCOVAs followed by post-hoc t-tests revealed that smartphone usage impaired all tested gait characteristics: gait speed (decrease, all conditions): F = 54.7, p smartphone usage was systematically associated with the TMT B time regarding cadence and double stride length for reading (r = -0.37), dialling (r = -0.35) and taking a selfie (r = -0.34). Smartphone usage substantially impacts walking characteristics in most situations. Changes of gait patterns indicate higher cognitive loads and lower awareness. Copyright © 2018 Elsevier B.V. All rights reserved.

  18. Comprehensive analysis of the codon usage patterns in the envelope glycoprotein E2 gene of the classical swine fever virus.

    Directory of Open Access Journals (Sweden)

    Ye Chen

    Full Text Available The classical swine fever virus (CSFV, circulating worldwide, is a highly contagious virus. Since the emergence of CSFV, it has caused great economic loss in swine industry. The envelope glycoprotein E2 gene of the CSFV is an immunoprotective antigen that induces the immune system to produce neutralizing antibodies. Therefore, it is essential to study the codon usage of the E2 gene of the CSFV. In this study, 140 coding sequences of the E2 gene were analyzed. The value of effective number of codons (ENC showed low codon usage bias in the E2 gene. Our study showed that codon usage could be described mainly by mutation pressure ENC plot analysis combined with principal component analysis (PCA and translational selection-correlation analysis between the general average hydropathicity (Gravy and aromaticity (Aroma, and nucleotides at the third position of codons (A3s, T3s, G3s, C3s and GC3s. Furthermore, the neutrality analysis, which explained the relationship between GC12s and GC3s, revealed that natural selection had a key role compared with mutational bias during the evolution of the E2 gene. These results lay a foundation for further research on the molecular evolution of CSFV.

  19. Strong linkage between active microbial communities and microbial carbon usage in a deglaciated terrain of the High Arctic

    Science.gov (United States)

    Kim, M.; Gyeong, H. R.; Lee, Y. K.

    2017-12-01

    Soil microorganisms play pivotal roles in ecosystem development and carbon cycling in newly exposed glacier forelands. However, little is known about carbon utilization pattern by metabolically active microbes over the course of ecosystem succession in these nutrient-poor environments. We investigated RNA-based microbial community dynamics and its relation to microbial carbon usage along the chronosequence of a High Arctic glacier foreland. Among microbial taxa surveyed (bacteria, archaea and fungi), bacteria are among the most metabolically active taxa with a dominance of Cyanobacteria and Actinobacteria. There was a strong association between microbial carbon usage and active Actinobacterial communities, suggesting that member of Actinobacteria are actively involved in organic carbon degradation in glacier forelands. Both bacterial community and microbial carbon usage are converged towards later stage of succession, indicating that the composition of soil organic carbon plays important roles in structuring bacterial decomposer communities during ecosystem development.

  20. Association and Sequence Mining in Web Usage

    Directory of Open Access Journals (Sweden)

    Claudia Elena DINUCA

    2011-06-01

    Full Text Available Web servers worldwide generate a vast amount of information on web users’ browsing activities. Several researchers have studied these so-called clickstream or web access log data to better understand and characterize web users. Clickstream data can be enriched with information about the content of visited pages and the origin (e.g., geographic, organizational of the requests. The goal of this project is to analyse user behaviour by mining enriched web access log data. With the continued growth and proliferation of e-commerce, Web services, and Web-based information systems, the volumes of click stream and user data collected by Web-based organizations in their daily operations has reached astronomical proportions. This information can be exploited in various ways, such as enhancing the effectiveness of websites or developing directed web marketing campaigns. The discovered patterns are usually represented as collections of pages, objects, or re-sources that are frequently accessed by groups of users with common needs or interests. The focus of this paper is to provide an overview how to use frequent pattern techniques for discovering different types of patterns in a Web log database. In this paper we will focus on finding association as a data mining technique to extract potentially useful knowledge from web usage data. I implemented in Java, using NetBeans IDE, a program for identification of pages’ association from sessions. For exemplification, we used the log files from a commercial web site.

  1. Do usage and scientific collaboration associate with citation impact

    Energy Technology Data Exchange (ETDEWEB)

    Chi, P.S.; Glänzel, W.

    2016-07-01

    In this study usage counts and times cited from Web of Science Core Collection (WoS) were collected for each article published in 2013 with Belgian, Israeli and Iranian addresses. We investigate the relations among three indicators related to citation impact, usage counts coauthorship, respectively. In addition, we apply the method of Characteristic Scores and Scal (CSS) to analyse the distributions of citations and usage counts. The results show that citations and usage counts in WoS correlate to each other significantly, especially in the social sciences. However, the increase of the number of co-authors does not increase usage counts or citations significantly. Furthermore, the stability of CSS-class distributions proves the availability of CSS in characterising both usage and citation distributions. (Author)

  2. Military Parents' Personal Technology Usage and Interest in e-Health Information for Obesity Prevention.

    Science.gov (United States)

    Jai, Tun-Min; McCool, Barent N; Reed, Debra B

    2016-03-01

    U.S. military families are experiencing high obesity rates similar to the civilian population. The Department of Defense's Military Health System (MHS) is one of the largest healthcare providers in the United States, serving approximately 9.2 million active duty service members, retirees, spouses, and children. The annual cost to the MHS for morbidities associated with being overweight exceeds $1 billion. The preschool age has been suggested as an opportune time to intervene for the prevention of obesity. Thus, this study investigated the current level of technology usage by military service member families and assessed their needs and interests in health/nutrition information. This needs assessment is crucial for researchers/educators to design further studies and intervention programs for obesity prevention in military families with young children. In total, 288 military parents (233 Army and 55 Air Force) at two military bases whose children were enrolled in military childcare centers in the southwestern United States participated in a Technology Usage in Military Family (TUMF) survey in 2013. Overall, both bases presented similar technology usage patterns in terms of computer and mobile device usage on the Internet. Air Force base parents had a slightly higher knowledge level of nutrition/health information than Army base parents. The TUMF survey suggested practical ways such as mobile applications/Web sites, social networks, games, etc., that health educators can use to disseminate nutrition/health information for obesity prevention among military families with young children.

  3. MESUR: USAGE-BASED METRICS OF SCHOLARLY IMPACT

    Energy Technology Data Exchange (ETDEWEB)

    BOLLEN, JOHAN [Los Alamos National Laboratory; RODRIGUEZ, MARKO A. [Los Alamos National Laboratory; VAN DE SOMPEL, HERBERT [Los Alamos National Laboratory

    2007-01-30

    The evaluation of scholarly communication items is now largely a matter of expert opinion or metrics derived from citation data. Both approaches can fail to take into account the myriad of factors that shape scholarly impact. Usage data has emerged as a promising complement to existing methods o fassessment but the formal groundwork to reliably and validly apply usage-based metrics of schlolarly impact is lacking. The Andrew W. Mellon Foundation funded MESUR project constitutes a systematic effort to define, validate and cross-validate a range of usage-based metrics of schlolarly impact by creating a semantic model of the scholarly communication process. The constructed model will serve as the basis of a creating a large-scale semantic network that seamlessly relates citation, bibliographic and usage data from a variety of sources. A subsequent program that uses the established semantic network as a reference data set will determine the characteristics and semantics of a variety of usage-based metrics of schlolarly impact. This paper outlines the architecture and methodology adopted by the MESUR project and its future direction.

  4. Problematic Internet Usage of ICT Teachers

    Science.gov (United States)

    Gunduz, Semseddin

    2017-01-01

    Information and communication technologies (ICT) have affected all area in a society. Human can learn quickly and accurately from the internet. The aim of this study was to investigate what the problematic internet usage of ICT teachers. Therefore, the present study investigated the problematic internet usage, who worked as an ICT teacher in…

  5. 50 CFR 600.910 - Definitions and word usage.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Definitions and word usage. 600.910..., Consultation, and Recommendations § 600.910 Definitions and word usage. (a) Definitions. In addition to the... undertaken by a state agency. (b) Word usage. The terms “must”, “shall”, “should”, “may”, “may not”, “will...

  6. 50 CFR 600.810 - Definitions and word usage.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Definitions and word usage. 600.810...) § 600.810 Definitions and word usage. (a) Definitions. In addition to the definitions in the Magnuson...-Stevens Act. (b) Word usage. The terms “must”, “shall”, “should”, “may”, “may not”, “will”, “could”, and...

  7. CloudMonitor: Profiling Power Usage

    OpenAIRE

    Smith, James William; Khajeh-Hosseini, Ali; Ward, Jonathan Stuart; Sommerville, Ian

    2012-01-01

    In Cloud Computing platforms the addition of hardware monitoring devices to gather power usage data can be impractical or uneconomical due to the large number of machines to be metered. CloudMonitor, a monitoring tool that can generate power models for software-based power estimation, can provide insights to the energy costs of deployments without additional hardware. Accurate power usage data leads to the possibility of Cloud providers creating a separate tariff for power and therefore incen...

  8. Usage of Business Simulation Games in Croatia: Perceived Obstacles

    Directory of Open Access Journals (Sweden)

    Jovana Zoroja

    2013-09-01

    Full Text Available Business simulation games (BSGs enhance learning, since they actively involve students in the educational process through game playing. They began to play important role in business education in many universities in Croatia. However, quantitative information on their usage in higher educational institutions (HEIs in Croatia is still scarce. Goals of the paper are to explore: (1 differences among BSGs users and non-users according to demographic characteristics, (2 differences among BSGs users and non-users according to perceived obstacles of BSGs usage, and (3 impact of both demographic characteristics and perceived obstacles on the decision on usage or not-usage of BSGs. A survey was taken in business and economics departments of HEIs in Croatia. A regression model has been used to test the impact of demographic characteristics of educators and the perceived obstacles to the usage of BSGs in educational practice. Results indicate that BSGs usage is currently at a low level, mainly due to the lack of funds and management support. Academic rank, gender, and attitude toward new technologies also impact BSGs usage.

  9. Use of Design Patterns According to Hand Dominance in a Mobile User Interface

    Science.gov (United States)

    Al-Samarraie, Hosam; Ahmad, Yusof

    2016-01-01

    User interface (UI) design patterns for mobile applications provide a solution to design problems and can improve the usage experience for users. However, there is a lack of research categorizing the uses of design patterns according to users' hand dominance in a learning-based mobile UI. We classified the main design patterns for mobile…

  10. Impacts of iPad attributes, Lifestyles and media dependency on adoption of iPad and intensity of iPad usage in Mainland China

    OpenAIRE

    Kevin, Li Xinpeng

    2012-01-01

    The goal of this exploratory research is to identify attributes that can distinctly characterize iPad and examine the predictive power of iPad attributes, lifestyles, media dependency, and demographics on adoption of iPad, iPad usage patterns and intensity of iPad usage. Using a snowballing sample, an online survey was conducted with 623 university students in Mainland China, among which 217 were iPad users and 406 were non-users. Results of regression analyses show that application affordanc...

  11. Genome-wide analysis of codon usage bias in four sequenced cotton species.

    Science.gov (United States)

    Wang, Liyuan; Xing, Huixian; Yuan, Yanchao; Wang, Xianlin; Saeed, Muhammad; Tao, Jincai; Feng, Wei; Zhang, Guihua; Song, Xianliang; Sun, Xuezhen

    2018-01-01

    Codon usage bias (CUB) is an important evolutionary feature in a genome which provides important information for studying organism evolution, gene function and exogenous gene expression. The CUB and its shaping factors in the nuclear genomes of four sequenced cotton species, G. arboreum (A2), G. raimondii (D5), G. hirsutum (AD1) and G. barbadense (AD2) were analyzed in the present study. The effective number of codons (ENC) analysis showed the CUB was weak in these four species and the four subgenomes of the two tetraploids. Codon composition analysis revealed these four species preferred to use pyrimidine-rich codons more frequently than purine-rich codons. Correlation analysis indicated that the base content at the third position of codons affect the degree of codon preference. PR2-bias plot and ENC-plot analyses revealed that the CUB patterns in these genomes and subgenomes were influenced by combined effects of translational selection, directional mutation and other factors. The translational selection (P2) analysis results, together with the non-significant correlation between GC12 and GC3, further revealed that translational selection played the dominant role over mutation pressure in the codon usage bias. Through relative synonymous codon usage (RSCU) analysis, we detected 25 high frequency codons preferred to end with T or A, and 31 low frequency codons inclined to end with C or G in these four species and four subgenomes. Finally, 19 to 26 optimal codons with 19 common ones were determined for each species and subgenomes, which preferred to end with A or T. We concluded that the codon usage bias was weak and the translation selection was the main shaping factor in nuclear genes of these four cotton genomes and four subgenomes.

  12. A Novel Design of Frequency Reconfigurable Antenna for UWB Application

    Science.gov (United States)

    Yang, Xiaolin; Yu, Ziliang; Wu, Zheng; Shen, Huajiao

    2016-09-01

    In this paper, we present a novel frequency reconfigurable antenna which could be easily operate in a single notched-band (WiMAX (3.3-3.6 GHz)) UWB frequency band, another single notched-band (WLAN (5-6 GHz)) UWB frequency band and the dual band-notched UWB frequency band (the stopband covers the WiMAX (3.3-3.6 GHz) and WLAN (5-6 GHz)). The reconfigurability is achieved by changing the states of PIN diodes. The simulated results are in agreement well with the measured results. And the measured patterns are slightly changed with antenna reconfiguration. The proposed antenna is a good candidate for various UWB applications.

  13. Which Users Should Be the Focus of Mobile Personal Health Records? Analysis of User Characteristics Influencing Usage of a Tethered Mobile Personal Health Record.

    Science.gov (United States)

    Lee, Guna; Park, Joong Yeol; Shin, Soo-Yong; Hwang, Jong Su; Ryu, Hyeon Jeong; Lee, Jae Ho; Bates, David W

    2016-05-01

    This study was conducted to analyze the usage pattern of a hospital-tethered mobile personal health records (m-PHRs) application named My Chart in My Hand (MCMH) and to identify user characteristics that influence m-PHR usage. Access logs to MCMH and its menus were collected for a total of 18 months, from August 2011 to January 2013. Usage patterns between users without a patient identification number (ID) and users with a patient ID were compared. Users with a patient ID were divided into light and heavy user groups by the median number of monthly access. Multiple linear regression models were used to assess MCMH usage pattern by characteristics of MCMH user with a patient ID. The total number of MCMH logins was 105,603, and the median number of accesses was 15 times. Users (n = 7,096) mostly accessed the "My Chart" menu, but "OPD [outpatient department] Service Support" and "Health Management" menus were also frequently used. Patients with chronic diseases, experience of hospital visits including emergency room and OPD, and age group of 0-19 years were more frequently found among users with a patient ID (n = 2,186) (p < 0.001). A similar trend was found in the heavy user group (n = 1,123). Submenus of laboratory result, online appointment, and medication lists that were accessed mostly by users with a patient ID were associated with OPD visit and chronic diseases. This study showed that focuses on patients with chronic disease and more hospital visits and empowerment functions in a tethered m-PHR would be helpful to pursue the extensive use.

  14. Understanding Patterns of Library Use Among Undergraduate Students from Different Disciplines

    Directory of Open Access Journals (Sweden)

    Ellen Collins

    2014-09-01

    Full Text Available Objective – To test whether routinely-generated library usage data could be linked with information about students to understand patterns of library use among students from different disciplines at the University of Huddersfield. This information is important for librarians seeking to demonstrate the value of the library, and to ensure that they are providing services which meet user needs. The study seeks to join two strands of library user research which until now have been kept rather separate – an interest in disciplinary differences in usage, and a methodology which involves large-scale routinely-generated data. Methods – The study uses anonymized data about individual students derived from two sources: routinely-generated data on various dimensions of physical and electronic library resource usage, and information from the student registry on the course studied by each student. Courses were aggregated at a subject and then disciplinary level. Kruskal-Wallis and Mann Whitney tests were used to identify statistically significant differences between the high-level disciplinary groups, and within each disciplinary group at the subject level. Results – The study identifies a number of statistically significant differences on various dimensions of usage between both high-level disciplinary groupings and lower subject-level groupings. In some cases, differences are not the same as those observed in earlier studies, reflecting distinctive usage patterns and differences in the way that disciplines or subjects are defined and organised. While music students at Huddersfield are heavy library users within the arts subject-level grouping arts students use library resources less than those in social science disciplines, contradicting findings from studies at other institutions, Computing and engineering students were relatively similar, although computing students were more likely to download PDFs, and engineering students were more likely to

  15. Association of ertapenem and antipseudomonal carbapenem usage and carbapenem resistance in Pseudomonas aeruginosa among 12 hospitals in Queensland, Australia.

    Science.gov (United States)

    McDougall, David A J; Morton, Anthony P; Playford, E Geoffrey

    2013-02-01

    The objective of this study was to determine the association between ertapenem and antipseudomonal carbapenem use and carbapenem resistance in Pseudomonas aeruginosa in 12 hospitals in Queensland, Australia. Data on usage of ertapenem and other antipseudomonal carbapenems, measured in defined daily doses per 1000 occupied bed-days, were collated using statewide pharmacy dispensing and distribution software from January 2007 until June 2011. The prevalence of unique carbapenem-resistant P. aeruginosa isolates derived from statewide laboratory information systems was collected for the same time period. Mixed-effects models were used to determine any relationship between ertapenem and antipseudomonal carbapenem usage and carbapenem resistance among P. aeruginosa isolates in the 12 hospitals analysed. No relationship between ertapenem usage and P. aeruginosa carbapenem resistance was observed. The introduction of ertapenem did not replace antipseudomonal carbapenem prescribing to any significant extent. However, an association between greater usage of antipseudomonal carbapenems and greater P. aeruginosa carbapenem resistance was demonstrated. It is likely that the only mechanism by which ertapenem can improve P. aeruginosa resistance patterns is by being used as a substitute for, rather than in addition to, antipseudomonal carbapenems.

  16. Library training to promote electronic resource usage

    DEFF Research Database (Denmark)

    Frandsen, Tove Faber; Tibyampansha, Dativa; Ibrahim, Glory

    2017-01-01

    Purpose: Increasing the usage of electronic resources is an issue of concern for many libraries all over the world. Several studies stress the importance of information literacy and instruction in order to increase the usage. Design/methodology/approach: The present article presents the results...

  17. 40 CFR 52.254 - Organic solvent usage.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 3 2010-07-01 2010-07-01 false Organic solvent usage. 52.254 Section...) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS California § 52.254 Organic solvent usage. (a) This... (d) of this section and the architectural coatings and solvent disposal emission limitations...

  18. Usage of the cyclotron facility local area network

    International Nuclear Information System (INIS)

    Heinzmann, H.; Peters, J.; Thow, T.J.

    1988-01-01

    Local area network of controllers at the Karlsruhe cyclotyron is shown. Experience after two years of usage is described. The system is applied controlling, data acquisition, management, databases usage

  19. Geospatial Estimates of Road Salt Usage Across a Gradient of Urbanizing Watersheds in Southern Ontario:Thesis for Masters in Spatial Analysis (MSA)

    Science.gov (United States)

    Giberson, G. K.; Oswald, C.

    2015-12-01

    In areas affected by snow, chloride (Cl) salts are widely used as a de-icing agent to improve road conditions. While the improvement in road safety is indisputable, there are environmental consequences to local aquatic ecosystems. In many waterways, Cl concentrations have been increasing since the early 1990s, often exceeding national water quality guidelines. To determine the quantity of Cl that is accumulating in urban and urbanizing watersheds, accurate estimates of road salt usage at the watershed-scale are needed. The complex jurisdictional control over road salt application in southern Ontario lends itself to a geospatial approach for calculating Cl inputs to improve the accuracy of watershed-scale Cl mass balance estimates. This study will develop a geospatial protocol for combining information on road salt applications and road network areas to refine watershed-scale Cl inputs, as well as assess spatiotemporal patterns in road salt application across the southern Ontario study region. The overall objective of this project is to use geospatial methods (predominantly ArcGIS) to develop high-accuracy estimates of road salt usage in urbanizing watersheds in southern Ontario. Specifically, the aims will be to map and summarize the types and areas ("lane-lengths") of roadways in each watershed that have road salt applied to them, to determine the most appropriate source(s) of road salt usage data for each watershed, taking into consideration multiple levels of jurisdiction (e.g. municipal, regional, provincial), to calculate and summarize sub-watershed and watershed-scale road salt usage estimates for multiple years, and to analyze intra-watershed spatiotemporal patterns of road salt usage, especially focusing on impervious surfaces. These analyses will recommend areas of concern exacerbated by high-levels of road salt distribution; recommendations around modifying on-the-ground operations will be the next step in helping to correct these issues.

  20. Illicit drugs and pharmaceuticals in the environment--forensic applications of environmental data. Part 1: Estimation of the usage of drugs in local communities.

    Science.gov (United States)

    Kasprzyk-Hordern, Barbara; Dinsdale, Richard M; Guwy, Alan J

    2009-06-01

    Pharmaceuticals and recently also illicit drugs have been recognised as emerging environmental contaminants due to their potential environmental impact: frequent occurrence, persistence and risk to aquatic life and humans. This manuscript is part one of the two-part study aiming to provide a better understanding and application of environmental data not only for environmental aims but also to meet forensic objectives. An attempt to use wastewater data is made in order to verify patterns of the usage of drugs (in particular illicit) in local communities. The average usage of cocaine in South Wales was estimated at 0.9 g day(-1) 1000 people(-1), which equals 1 tonne of this drug used or disposed of to sewage annually in Wales. The calculated usage of amphetamine denoted 2.5 g day(-1) 1000 people(-1) and is suspected to be an overestimate. Because no analysis of enantiomers of amphetamine was undertaken, no distinction between amphetamine's legal and illicit usage could be made.

  1. Constructing a web recommender system using web usage mining and user’s profiles

    Directory of Open Access Journals (Sweden)

    T. Mombeini

    2014-12-01

    Full Text Available The World Wide Web is a great source of information, which is nowadays being widely used due to the availability of useful information changing, dynamically. However, the large number of webpages often confuses many users and it is hard for them to find information on their interests. Therefore, it is necessary to provide a system capable of guiding users towards their desired choices and services. Recommender systems search among a large collection of user interests and recommend those, which are likely to be favored the most by the user. Web usage mining was designed to function on web server records, which are included in user search results. Therefore, recommender servers use the web usage mining technique to predict users’ browsing patterns and recommend those patterns in the form of a suggestion list. In this article, a recommender system based on web usage mining phases (online and offline was proposed. In the offline phase, the first step is to analyze user access records to identify user sessions. Next, user profiles are built using data from server records based on the frequency of access to pages, the time spent by the user on each page and the date of page view. Date is of importance since it is more possible for users to request new pages more than old ones and old pages are less probable to be viewed, as users mostly look for new information. Following the creation of user profiles, users are categorized in clusters using the Fuzzy C-means clustering algorithm and S(c criterion based on their similarities. In the online phase, a neural network is offered to identify the suggested model while online suggestions are generated using the suggestion module for the active user. Search engines analyze suggestion lists based on rate of user interest in pages and page rank and finally suggest appropriate pages to the active user. Experiments show that the proposed method of predicting user recent requested pages has more accuracy and

  2. Review of Bison Usage in VERA

    Energy Technology Data Exchange (ETDEWEB)

    Gardner, Russell [Idaho National Lab. (INL), Idaho Falls, ID (United States); Pawlowski, Roger P. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Clarno, Kevin T. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Stimpson, Shane G. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2017-11-01

    Bison is being used in VERA in a variety of ways; this milestone will document an independent review of the current usage of Bison and provide guidance that will improve the accuracy, performance, and consistency in the ways that Bison is used. This task will entail running a suite of small, single and multi-cycle problems with VERA-CS, followed by Bison, and Tiamat (inline) and evaluating the usage. It will also entail performing several detailed ramp to full power solutions to compare the one-way coupled solver with the fully-coupled Tiamat. This will include at least one iteration with the PHI team to incorporate some of the feedback and improve the usage. This work will also be completed in conjunction with an FMC task to evaluate the ability of Bison to model load-follow in a PWR

  3. Stochastic Modeling of Usage Patterns in a Web-Based Information System.

    Science.gov (United States)

    Chen, Hui-Min; Cooper, Michael D.

    2002-01-01

    Uses continuous-time stochastic models, mainly based on semi-Markov chains, to derive user state transition patterns, both in rates and in probabilities, in a Web-based information system. Describes search sessions from transaction logs of the University of California's MELVYL library catalog system and discusses sequential dependency. (Author/LRW)

  4. Why dentists don't use rubber dam during endodontics and how to promote its usage?

    Science.gov (United States)

    Madarati, Ahmad A

    2016-02-25

    This survey study aimed at investigating the frequency of rubber dam use during root canal treatment, identifying influencing factors for not using it by Saudi general dental practitioners (GDPs) and endodontists. It also aimed at identifying measures that increase rubber dam usage. After obtaining an ethical approval, two pilot studies were conducted on staff members at Taibah University College of Dentistry and a group of GDPs. A final online survey was constructed comprising 17 close-ended questions divided into six categories: demographics, endodontic practice, rubber dam use, alternative isolation methods, reasons for not using rubber dam, and measures and policies that increase its usage. The survey was emailed to 375 GDPs randomly selected from the dental register and all endodontists (n = 53) working in the western province, Saudi Arabia. Data were analyzed using the Chi-square and Linear-by-Linear association tests at p ≤ 0.05. The proportion of endodontists who used rubber dam (84.8 %) was significantly greater than that of GDPs (21.6 %) (p < 0.001). Significantly the highest proportion (40.5 %) did not use rubber dam because of unavailability at working place. Most rubber dam none-users (69.25 %) used a combination of other isolation means. The highest proportion of those who used rubber dam were working in the governmental sector (54.3 %). Among rubber dam users, the greatest proportion graduated from Saudi Arabia (57.8 %) compared to those graduated from Egypt (34.3 %) and Syria (22.4 %). There was a significant correlation between the patterns of rubber dam use during undergraduate training and its usage after graduation (p = 0.001). The highest proportion of participants (48.1 %) reported better undergraduate education as the most important factor that would increase rubber dam use in dental practice. Using of rubber dam was not common in Saudi general dental practice. Dentists must follow the recommended standards of care. Place of work and

  5. Health-related behaviors and technology usage among college students.

    Science.gov (United States)

    Melton, Bridget F; Bigham, Lauren E; Bland, Helen W; Bird, Matthew; Fairman, Ciaran

    2014-07-01

    To examine associations between technology usage and specific health factors among college students. The research employed was a quantitative, descriptive, cross-sectional design; undergraduate students enrolled in spring 2012 general health education courses were recruited to participate. To explore college students' specific technology usage and health-related behaviors, a 28-item questionnaire was utilized. Statistical significant differences of technology usage were found between 3 of the 4 health-related behaviors under study (BMI, sleep, and nutrition) (p technology usage continues to evolve within the college student population, health professionals need to understand its implications on health behaviors.

  6. Definite Article Usage across Varieties of English

    Science.gov (United States)

    Wahid, Ridwan

    2013-01-01

    This paper seeks to explore the extent of definite article usage variation in several varieties of English based on a classification of its usage types. An annotation scheme based on Hawkins and Prince was developed for this purpose. Using matching corpus data representing Inner Circle varieties and Outer Circle varieties, analysis was made on…

  7. Control of Turing patterns and their usage as sensors, memory arrays, and logic gates

    Science.gov (United States)

    Muzika, František; Schreiber, Igor

    2013-10-01

    We study a model system of three diffusively coupled reaction cells arranged in a linear array that display Turing patterns with special focus on the case of equal coupling strength for all components. As a suitable model reaction we consider a two-variable core model of glycolysis. Using numerical continuation and bifurcation techniques we analyze the dependence of the system's steady states on varying rate coefficient of the recycling step while the coupling coefficients of the inhibitor and activator are fixed and set at the ratios 100:1, 1:1, and 4:5. We show that stable Turing patterns occur at all three ratios but, as expected, spontaneous transition from the spatially uniform steady state to the spatially nonuniform Turing patterns occurs only in the first case. The other two cases possess multiple Turing patterns, which are stabilized by secondary bifurcations and coexist with stable uniform periodic oscillations. For the 1:1 ratio we examine modular spatiotemporal perturbations, which allow for controllable switching between the uniform oscillations and various Turing patterns. Such modular perturbations are then used to construct chemical computing devices utilizing the multiple Turing patterns. By classifying various responses we propose: (a) a single-input resettable sensor capable of reading certain value of concentration, (b) two-input and three-input memory arrays capable of storing logic information, (c) three-input, three-output logic gates performing combinations of logical functions OR, XOR, AND, and NAND.

  8. Análisis de seguridad de una muestra de redes WLAN en la ciudad de Tunja, Boyacá, Colombia

    Directory of Open Access Journals (Sweden)

    Julián Alberto Monsalve-Pulido

    2015-01-01

    Full Text Available Éste documento presenta resultados de un aná lisis de seguridad de redes WLAN en la ciudad de Tunja Boyacá Colombia basado en un a muestra aleatoria distribuida en toda la Ciudad. El estudio es resultado de investigación del proyecto “Diagnóstico de segurida d informática aplicado a una muestra de organizac iones de la ciudad de Tunja” financiado por la Universidad Santo Tomás Seccional Tunja. La información recolectada y analizada se obtuvo mediante las técnicas Wa rchalking y Wardriving en una representación significativa de redes inalámbricas de empre sas públicas, privadas, entidades educativas y hogares ubicados geográficamente en diferentes sectores de la ciudad. Como re sultado de la investigación se demostró di ferentes niveles de riesgo con respecto a configuraciones de tecnología de algunos dispos itivos de entidades públicas, privadas y sectores residenciales, por último se r ealizaron algunas recomendaciones y conclusiones que mej orarán el nivel de seguridad por medio de buenas prácticas a nivel de configuraci ón y uso de estas redes.

  9. Usage Inspection of KN-12 Spent Fuel Transport Cask

    International Nuclear Information System (INIS)

    Lee, J. C.; Seo, K. S.; Bang, K. S.; Cho, I. J.; Kim, D. H.; Min, D. K.

    2007-03-01

    The usage inspection of the KN-12 spent nuclear fuel transport package was performed to receive the license for reuse. According to the Korea Atomic Energy Act, all type B transport package should receive and pass the usage inspection every five years. The KN-12 transport cask was designed to transport twelve spent PWR fuel assemblies under wet and dry conditions. The cask was developed and licensed in 2002 in accordance with the Korea and the IAEA's safe transport regulations. The areas of usage inspection include: visual inspection, nondestructive weld inspection, load test, maximum operating pressure test, leakage test, shielding test, thermal test, external surface contamination test. In the results of the usage inspection, the damage or defect could not found out and the performance of the cask was maintained according to the requirements of the regulation. Therefore, the usage inspection was successfully performed to acquire the license for the reuse

  10. Seatbelt usage: is there an association with obesity?

    Science.gov (United States)

    Behzad, B; King, D M; Jacobson, S H

    2014-09-01

    Wearing a seatbelt can prevent motor vehicle crash deaths. While primary seatbelt laws are designed to encourage vehicle passengers to wear seatbelts by allowing law enforcement officers to issue tickets when passengers do not wear seatbelts, discomfort may discourage obese individuals from wearing a seatbelt. The objective of this study is to assess the association between state-level obesity and seatbelt usage rates in the US, and to examine the possible role played by seatbelt laws in these associations. The strength of the association between obesity rates, seatbelt usage, and primary seatbelt laws at the state level is investigated using data from 2006 to 2011. Linear regression analysis is employed. This model estimates that increasing the obesity rate by 1% in a state where a primary seatbelt law (by which law enforcement officers can issue a ticket when seatbelts are not worn) is in effect is associated with a 0.06% decrease in seatbelt usage. However the same percentage of increase in the obesity rate in a state where no primary seatbelt law is in effect is associated with a 0.55% decrease in seatbelt usage. The magnitude of the statistical association between state obesity rates and state-level seatbelt usage is related to the existence of a primary seatbelt law, such that obesity has less impact on seatbelt usage in states where primary seatbelt laws are in effect. Published by Elsevier Ltd.

  11. VHDL Models with Usage of the LFSR_PCKG Package

    Directory of Open Access Journals (Sweden)

    J. Mitrych

    2002-04-01

    Full Text Available LFSRs (Linear Feedback Shift Registers are very often used in theBIST (Built-In Self-Test methodology. Implementation of the LFSRs tothe design or application of digital system, which supports BISTtechniques or which only uses these LFSRs, can be done by VHDLlanguage. This paper presents VHDL models of the devices andsubroutines (e.g. test pattern generators, signature analysers. Modelsare based on LFSR structures with usage of the LFSR_PCKG packagedescribed in the (Kovalsky and Vlcek, 2001, which can be usedin the applications supporting BIST techniques. Devices are describedas behavioural and structural models. These models and descriptions canbe used e.g. in the (Kovalsky, 2001. The LFSR_PCKG was modifiedand new approach is presented. Naturally, there are presented somesynthesis conclusions of the VHDL models and applications in thispaper.

  12. Opportunistic resource usage in CMS

    International Nuclear Information System (INIS)

    Kreuzer, Peter; Hufnagel, Dirk; Dykstra, D; Gutsche, O; Tadel, M; Sfiligoi, I; Letts, J; Wuerthwein, F; McCrea, A; Bockelman, B; Fajardo, E; Linares, L; Wagner, R; Konstantinov, P; Blumenfeld, B; Bradley, D

    2014-01-01

    CMS is using a tiered setup of dedicated computing resources provided by sites distributed over the world and organized in WLCG. These sites pledge resources to CMS and are preparing them especially for CMS to run the experiment's applications. But there are more resources available opportunistically both on the GRID and in local university and research clusters which can be used for CMS applications. We will present CMS' strategy to use opportunistic resources and prepare them dynamically to run CMS applications. CMS is able to run its applications on resources that can be reached through the GRID, through EC2 compliant cloud interfaces. Even resources that can be used through ssh login nodes can be harnessed. All of these usage modes are integrated transparently into the GlideIn WMS submission infrastructure, which is the basis of CMS' opportunistic resource usage strategy. Technologies like Parrot to mount the software distribution via CVMFS and xrootd for access to data and simulation samples via the WAN are used and will be described. We will summarize the experience with opportunistic resource usage and give an outlook for the restart of LHC data taking in 2015.

  13. Posture does not matter! Paw usage and grasping paw preference in a small-bodied rooting quadrupedal mammal.

    Science.gov (United States)

    Joly, Marine; Scheumann, Marina; Zimmermann, Elke

    2012-01-01

    Recent results in birds, marsupials, rodents and nonhuman primates suggest that phylogeny and ecological factors such as body size, diet and postural habit of a species influence limb usage and the direction and strength of limb laterality. To examine to which extent these findings can be generalised to small-bodied rooting quadrupedal mammals, we studied trees shrews (Tupaia belangeri). We established a behavioural test battery for examining paw usage comparable to small-bodied primates and tested 36 Tupaia belangeri. We studied paw usage in a natural foraging situation (simple food grasping task) and measured the influence of varying postural demands (triped, biped, cling, sit) on paw preferences by applying a forced-food grasping task similar to other small-bodied primates. Our findings suggest that rooting tree shrews prefer mouth over paw usage to catch food in a natural foraging situation. Moreover, we demonstrated that despite differences in postural demand, tree shrews show a strong and consistent individual paw preference for grasping across different tasks, but no paw preference at a population level. Tree shrews showed less paw usage than small-bodied quadrupedal and arboreal primates, but the same paw preference. Our results confirm that individual paw preferences remain constant irrespective of postural demand in some small-bodied quadrupedal non primate and primate mammals which do not require fine motoric control for manipulating food items. Our findings suggest that the lack of paw/hand preference for grasping food at a population level is a universal pattern among those species and that the influence of postural demand on manual lateralisation in quadrupeds may have evolved in large-bodied species specialised in fine manipulations of food items.

  14. The Social Origins of association_ patterns of Tehrani audiences with the Persian Speaking Satellite Channels

    Directory of Open Access Journals (Sweden)

    Mahmoud Shahabi

    2008-07-01

    Full Text Available The present paper answer two basic questions: what are the association patterns of the Persian-speaking satellite television channels amongst Tehrani audiences? What are the social origins of these patterns? To answer these questions, we have adopted the research tradition of "the uses and gratifications" in it's structural-cultural variant. In order to identify the uses patterns of such televisions, we initially interviewed 32 audiacnes. Content analysis of the interviews resulted in identifying 60 most-frequently-stated gratification items to be used as part of a large scale questionnaire survey of 400 viewers who were accessed via snowball sampling. Employing an exploratory factor analysis with Varimax rotation, we constructed and named ten gratification scales as follows: dissatisfaction with the national television programs, getting political information, cross-cultural comparison (instructional usage,escaping from everyday life difficulties, lifestyle guidance, facilitating social interaction, familiarity with global and Iranian (underground popular culture, information on tourism and emigration issues, seeking social status, and finally seeking unedited information on sport events. A series of correlation tests on these ten factors as dependent variables and all the study's independent variables showed that the Blumler's conceptualization of the social character of media gratifications explains the usage patterns of Persian-speaking satellite televisions in Iran. Accordingly, different people turn to such televisions for different purposes and that the prevalent pattern of such usage is mainly of facilitatory, rather than compensatory character.

  15. Synonymous Codon Usage Analysis of Thirty Two Mycobacteriophage Genomes

    Directory of Open Access Journals (Sweden)

    Sameer Hassan

    2009-01-01

    Full Text Available Synonymous codon usage of protein coding genes of thirty two completely sequenced mycobacteriophage genomes was studied using multivariate statistical analysis. One of the major factors influencing codon usage is identified to be compositional bias. Codons ending with either C or G are preferred in highly expressed genes among which C ending codons are highly preferred over G ending codons. A strong negative correlation between effective number of codons (Nc and GC3s content was also observed, showing that the codon usage was effected by gene nucleotide composition. Translational selection is also identified to play a role in shaping the codon usage operative at the level of translational accuracy. High level of heterogeneity is seen among and between the genomes. Length of genes is also identified to influence the codon usage in 11 out of 32 phage genomes. Mycobacteriophage Cooper is identified to be the highly biased genome with better translation efficiency comparing well with the host specific tRNA genes.

  16. Usage Inspection of KN-12 Spent Fuel Transport Cask

    Energy Technology Data Exchange (ETDEWEB)

    Lee, J. C.; Seo, K. S.; Bang, K. S.; Cho, I. J.; Kim, D. H.; Min, D. K

    2007-03-15

    The usage inspection of the KN-12 spent nuclear fuel transport package was performed to receive the license for reuse. According to the Korea Atomic Energy Act, all type B transport package should receive and pass the usage inspection every five years. The KN-12 transport cask was designed to transport twelve spent PWR fuel assemblies under wet and dry conditions. The cask was developed and licensed in 2002 in accordance with the Korea and the IAEA's safe transport regulations. The areas of usage inspection include: visual inspection, nondestructive weld inspection, load test, maximum operating pressure test, leakage test, shielding test, thermal test, external surface contamination test. In the results of the usage inspection, the damage or defect could not found out and the performance of the cask was maintained according to the requirements of the regulation. Therefore, the usage inspection was successfully performed to acquire the license for the reuse.

  17. Universality and Shannon entropy of codon usage

    CERN Document Server

    Frappat, L; Sciarrino, A; Sorba, Paul

    2003-01-01

    The distribution functions of the codon usage probabilities, computed over all the available GenBank data, for 40 eukaryotic biological species and 5 chloroplasts, do not follow a Zipf law, but are best fitted by the sum of a constant, an exponential and a linear function in the rank of usage. For mitochondriae the analysis is not conclusive. A quantum-mechanics-inspired model is proposed to describe the observed behaviour. These functions are characterized by parameters that strongly depend on the total GC content of the coding regions of biological species. It is predicted that the codon usage is the same in all exonic genes with the same GC content. The Shannon entropy for codons, also strongly depending on the exonic GC content, is computed.

  18. Relationship between Impulsivity, Social Media Usage and Loneliness

    Directory of Open Access Journals (Sweden)

    Mustafa Savci

    2016-03-01

    Full Text Available The purpose of this study is to examine the relationships between impulsivity, social media usage, and loneliness and to test the structural hypothetical model developed based on the literature. The study was conducted on 307 (164 female, 143 male university students. Data collection instruments of the study were the Barratt Impulsivity Scale Short Form (BIS-11-SF, Social Media Usage Scale (SMUS, and UCLA Loneliness Scale Short Form (ULS-8. The measurement models of the latent variables were tested initially and it was observed that the scales of the latent variables were efficient enough to be included in the structural equation model. In addition, the suggested hypothetical model was tested. According to the analysis, it was observed that impulsivity directly, positively and significantly predicts social media usage, that social media usage directly, positively and significantly predicts loneliness, and that impulsivity indirectly, positively and significantly predicts loneliness.

  19. Foreign Language Instruction from a dynamic usage-based (DUB) perspective

    NARCIS (Netherlands)

    Rousse-Malpat, Audrey; Verspoor, Marjolijn; Tyler, Andrea E.; Ortega, Lourdes; Uno, Mariko; Park, Hae In

    2018-01-01

    In this chapter we combine ideas of usage based linguistics and dynamic systems theory to argue that language is a dynamic usage based system and L2 learning is a dynamic process. Two teaching approaches based on Dynamic Usage-based (DUB) principles with mainly implicit attention to form--a movie

  20. Illicit drugs and pharmaceuticals in the environment - Forensic applications of environmental data. Part 1: Estimation of the usage of drugs in local communities

    Energy Technology Data Exchange (ETDEWEB)

    Kasprzyk-Hordern, Barbara, E-mail: b.kasprzyk-hordern@hud.ac.u [University of Huddersfield, Department of Chemical and Biological Sciences, Queensgate, Huddersfield HD1 3DH (United Kingdom); University of Glamorgan, Sustainable Environment Research Centre, Faculty of Health, Sport and Science, Pontypridd CF37 1DL (United Kingdom); Dinsdale, Richard M.; Guwy, Alan J. [University of Glamorgan, Sustainable Environment Research Centre, Faculty of Health, Sport and Science, Pontypridd CF37 1DL (United Kingdom)

    2009-06-15

    Pharmaceuticals and recently also illicit drugs have been recognised as emerging environmental contaminants due to their potential environmental impact: frequent occurrence, persistence and risk to aquatic life and humans. This manuscript is part one of the two-part study aiming to provide a better understanding and application of environmental data not only for environmental aims but also to meet forensic objectives. An attempt to use wastewater data is made in order to verify patterns of the usage of drugs (in particular illicit) in local communities. The average usage of cocaine in South Wales was estimated at 0.9 g day{sup -1} 1000 people{sup -1}, which equals 1 tonne of this drug used or disposed of to sewage annually in Wales. The calculated usage of amphetamine denoted 2.5 g day{sup -1} 1000 people{sup -1} and is suspected to be an overestimate. Because no analysis of enantiomers of amphetamine was undertaken, no distinction between amphetamine's legal and illicit usage could be made. - Wastewater as an indicative source of information can be used in forensic applications.

  1. Illicit drugs and pharmaceuticals in the environment - Forensic applications of environmental data. Part 1: Estimation of the usage of drugs in local communities

    International Nuclear Information System (INIS)

    Kasprzyk-Hordern, Barbara; Dinsdale, Richard M.; Guwy, Alan J.

    2009-01-01

    Pharmaceuticals and recently also illicit drugs have been recognised as emerging environmental contaminants due to their potential environmental impact: frequent occurrence, persistence and risk to aquatic life and humans. This manuscript is part one of the two-part study aiming to provide a better understanding and application of environmental data not only for environmental aims but also to meet forensic objectives. An attempt to use wastewater data is made in order to verify patterns of the usage of drugs (in particular illicit) in local communities. The average usage of cocaine in South Wales was estimated at 0.9 g day -1 1000 people -1 , which equals 1 tonne of this drug used or disposed of to sewage annually in Wales. The calculated usage of amphetamine denoted 2.5 g day -1 1000 people -1 and is suspected to be an overestimate. Because no analysis of enantiomers of amphetamine was undertaken, no distinction between amphetamine's legal and illicit usage could be made. - Wastewater as an indicative source of information can be used in forensic applications.

  2. Pattern of antimicrobial usage in livestock animals in south-western Nigeria: The need for alternative plans

    Directory of Open Access Journals (Sweden)

    Hezekiah K. Adesokan

    2015-04-01

    Full Text Available Resistance to antibiotics has continued to increase, placing future animal and human disease management in real danger. The developing countries characterised by widespread indiscriminate antibiotic use and in which ‘third-generation’ antibiotics are not readily available or affordable are the worst affected. A 3-year (2010–2012 retrospective survey of antibiotic usage in livestock production in three selected states of south-western Nigeria was conducted. Data obtained from eight purposively selected licensed veterinary pharmaceutical sales establishments in the area, based on keeping detailed sales records for the study period, were analysed using Stata Version 12. Results showed that tetracyclines (33.6%, fluoroquinolones (26.5% and beta-lactams/aminoglycosides (20.4% constituted the majority of the antibiotics used over the 3 years. The differences in the quantities of antibiotic types used within each antimicrobial class were statistically significant for tetracyclines (F = 59.87; p < 0.0001 and fluoroquinolones (F = 43.97; p < 0.0001 but not for beta-lactams/aminoglycosides (F = 3.21; p = 0.148. Furthermore, antibiotic consumption increased by 40.4% between 2010 and 2012. Although statistically insignificant (F = 0.277; p = 0.762, the increasing trend across the years was at rates of 23.5% between 2010 and 2011 and 13.8% between 2011 and 2012. In addition, the findings show a significantly higher consumption rate (t = 15.21; df = 5; p < 0.0001 during the rainy (52.5% than the dry (47.5% seasons. The current increasing trend in antibiotic usage holds a serious danger for the future and therefore calls for alternative plans to safeguard future livestock production, food security and human health. This becomes more imperative considering emerging resistance against tetracyclines and fluoroquinolones, the foremost remedies for livestock diseases in most developing countries.

  3. Burnout and Humor Usage among Community College Nursing Faculty Members.

    Science.gov (United States)

    Talbot, Laura A.

    2000-01-01

    Assesses the correlation of burnout among community college nursing faculty members and their use of humor to mediate academic stress related to burnout. Differences in burnout between high versus low humor usage respondents showed a higher sense of personal accomplishment with high humor usage. Of those with low humor usage, workload was related…

  4. Game-Theoretic Models for Usage-based Maintenance Contract

    Science.gov (United States)

    Husniah, H.; Wangsaputra, R.; Cakravastia, A.; Iskandar, B. P.

    2018-03-01

    A usage-based maintenance contracts with coordination and non coordination between two parties is studied in this paper. The contract is applied to a dump truck operated in a mining industry. The situation under study is that an agent offers service contract to the owner of the truck after warranty ends. This contract has only a time limit but no usage limit. If the total usage per period exceeds the maximum usage allowed in the contract, then the owner will be charged an additional cost. In general, the agent (Original Equipment Manufacturer/OEM) provides a full coverage of maintenance, which includes PM and CM under the lease contract. The decision problem for the owner is to select the best option offered that fits to its requirement, and the decision problem for the agent is to find the optimal maintenance efforts for a given price of the service option offered. We first find the optimal decisions using coordination scheme and then with non coordination scheme for both parties.

  5. Measuring ICT usage quality for information society building

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Danylchenko, Lesya

    2014-01-01

    In 2003 the World Summit on Information Society made a call for measuring the state of Information Society (IS) building between countries. The purpose of the measuring was to assess and compare IS practices around the globe as well as share best practices. A number of measurement tools have sinc...... levels of ICT usage for the purpose of better policy-making, while establishing an information society, is accentuated....... these indicators on the actual levels of Information and Communication Technology (ICT) usage off the country’s stakeholders. This paper analyses the most currently used indices for measuring the state of Information Society building from the perspective of their constituent indicators. Based on the analysis......, an alternative framework for IS measurement, addressing the important aspects of ICT usage quality, is developed based on data from EU member states. By applying the framework on measuring of ICT usage quality at Romania, Cyprus and Estonia, the usefulness is tested positive, and the need to evaluate the actual...

  6. A comparison of antimicrobial usage in human and veterinary medicine in France from 1999 to 2005.

    Science.gov (United States)

    Moulin, Gérard; Cavalié, Philippe; Pellanne, Isabelle; Chevance, Anne; Laval, Arlette; Millemann, Yves; Colin, Pierre; Chauvin, Claire

    2008-09-01

    The antimicrobials allowed and amounts sold in veterinary and human medicine in France were compared to see if the same antimicrobial drugs are used in veterinary and human medicine, and to the same extent. Registers of all approved antimicrobial commercial products, kept by the French Agency for Veterinary Medicinal Products (AFSSA ANMV) for animals and the French Health Products Safety Agency (AFSSAPS) for humans, were compared to determine whether the same antimicrobials were approved in 2007 for use in both human and animal populations. Sales data were collected from pharmaceutical companies between 1999 and 2005 by the AFSSA ANMV and AFSSAPS. Usage of the different antimicrobial anatomical therapeutic chemical (ATC) classes in human and veterinary medicines was recorded. Data were expressed in tonnes of active ingredients and were then related to the animal and human biomasses to compare usages expressed in mg/kg. All antimicrobial ATC classes were used in both human and veterinary medicine. Tetracyclines accounted for the most sales in veterinary medicine. beta-Lactams predominated in human medicine. A decrease in the amounts consumed by both human and animal populations was observed during the study. In 2005, 760 tonnes were used in human medicine and 1320 tonnes in veterinary medicine, corresponding to 199 and 84 mg/kg of live weight in human and animal populations, respectively. The same antimicrobial drugs were used in human and veterinary medicines but the quantitative patterns of use were different. Expression of antimicrobial usage is a key point to address when comparing usage trends.

  7. Comparison of codon usage bias across Leishmania and Trypanosomatids to understand mRNA secondary structure, relative protein abundance and pathway functions.

    Science.gov (United States)

    Subramanian, Abhishek; Sarkar, Ram Rup

    2015-10-01

    Understanding the variations in gene organization and its effect on the phenotype across different Leishmania species, and to study differential clinical manifestations of parasite within the host, we performed large scale analysis of codon usage patterns between Leishmania and other known Trypanosomatid species. We present the causes and consequences of codon usage bias in Leishmania genomes with respect to mutational pressure, translational selection and amino acid composition bias. We establish GC bias at wobble position that governs codon usage bias across Leishmania species, rather than amino acid composition bias. We found that, within Leishmania, homogenous codon context coding for less frequent amino acid pairs and codons avoiding formation of folding structures in mRNA are essentially chosen. We predicted putative differences in global expression between genes belonging to specific pathways across Leishmania. This explains the role of evolution in shaping the otherwise conserved genome to demonstrate species-specific function-level differences for efficient survival. Copyright © 2015 Elsevier Inc. All rights reserved.

  8. Estimating Usage Can Reduce the Stress of Social Networking

    OpenAIRE

    Zhou, Y.; Bird, J.; Cox, A. L.; Brumby, D.

    2013-01-01

    Social networks are increasingly popular and provide benefits such as easy peer group communication. However, there is evidence that they can have negative consequences, such as increased stress levels. For two weeks, we provided participants with an objective measure of their social network usage and also asked them for a daily estimate of their usage over the previous 24 hours. Although their social network usage did not significantly change, participants’ perception of this activity was tr...

  9. System and methods of resource usage using an interoperable management framework

    Science.gov (United States)

    Heileman, Gregory L.; Jamkhedkar, Pramod A.; Lamb, Christopher C.

    2017-10-31

    Generic rights expression language allowing interoperability across different computing environments including resource usage of different applications. A formal framework for usage management provides scaffolding upon which interoperable usage management systems can be built. Certain features of the framework are standardized, such as the operational semantics, including areas free of standards that necessitate choice and innovation to achieve a balance of flexibility and usability for interoperability in usage management systems.

  10. Insecticide-treated nets usage and malaria episodes among ...

    African Journals Online (AJOL)

    ... is urgent need on the part of all the three tiers of Government for public health awareness campaigns through information, education and communication (IEC) to create positive ITN culture and usage. It is also suggested that ITN usage among boarding school pupils should be incorporated into school health service.

  11. Premarital Contraceptives Usage among Male and Female Adolescents.

    Science.gov (United States)

    Hornick, Joesph P.; And Others

    1979-01-01

    Variables important in predicting female contraception usage were found to be those which involved dyadic commitment, conditions of love, self-esteem, and father's occupation (social class). The best predictors of male contraception usage involved experience in dating and internalization of role models via mother's and father's permissiveness.…

  12. Designation of facility usage categories for Hanford Site facilities

    International Nuclear Information System (INIS)

    Wodrich, D.; Ellingson, D.; Scott, M.; Schade, A.

    1991-01-01

    This report summarizes the Hanford Site methodology used to ensure facility compliance with the natural phenomena design criteria set forth in the US Department of Energy orders and guidance. In particular, the Hanford Site approach to designating a suitable facility open-quotes Usage Category,close quotes is presented. The current Hanford Site methodology for Usage Category designation is based on an engineered feature's safety function and on the feature's assigned Safety Class. At the Hanford Site, Safety Class assignments are deterministic in nature and are based on the consequences of failure, without regard to the likelihood of occurrence. The report also proposes a risk-based approach to Usage Category designation, which is being considered for future application at the Hanford Site. To establish a proper Usage Category designation, the safety analysis and engineering design processes must be coupled. This union produces a common understanding of the safety function(s) to be accomplished by the design feature(s) and a sound basis for the assignment of Usage Categories to the appropriate systems, structures, and components

  13. Evaluation of usage and fuel savings of solar ovens in Nicaragua

    International Nuclear Information System (INIS)

    Bauer, Gordon

    2016-01-01

    Solar cooking technology has been promoted as a solution to both global poverty and environmental degradation, but relatively little research exists on the impact of solar oven usage on biomass fuel consumption. This study evaluates solar oven usage and wood consumption in northern Nicaragua during both the rainy and dry seasons, using surveys, temperature dataloggers, and direct measurements of fuelwood use. Solar oven owners reported usage on 79% of days during the dry season, and 41% of days during the rainy season. Comparison with oven temperature records confirmed usage on 50% of days during the dry season, and 16% of days during the rainy season. However, wood consumption measurements showed no statistically significant difference between days with solar oven usage and days without, suggesting that frequency of usage alone is not an appropriate proxy for fuel savings. Survey results suggest that a large part of solar oven usage came in addition to biomass cooking, as opposed to replacing it. These results suggest a need for further study of wood consumption in situ and more focus on the specific kinds of foods prepared in solar cookers, as well as local cultural and climatic conditions. - Highlights: • Solar oven usage reported on most days during dry season. • No statistically significant fuelwood savings can be attributed to solar oven use. • Usage reported on surveys differs substantially from solar oven temperature data. • Possible causes of lack of wood savings range from weather to diet and gender norms.

  14. A Comparative Study of Mobile Internet Usage between the U.S. and Korea

    Directory of Open Access Journals (Sweden)

    Luke Yunkeun Shin

    2014-08-01

    Full Text Available The introduction of smartphones illuminated mobile internet prevalence, highlighting nomophobia. This study explored the mobile internet usage dependency of Korean and U.S. mobile users and investigated the severity of such usage dependency and the factors involved. In the combined data set, it was found that Korean users have higher usage dependency levels than US users and that students, unemployed users, and younger generations are more susceptible to mobile internet usage dependency. When comparing the two countries as separate data sets Korean females present as having higher usage dependency levels. In the U.S., it is students and younger generation groups who present with higher usage dependency levels. Regression analysis found that frequency of access has higher associations with mobile internet usage dependency than usage length. country of origin and age are significantly associated with mobile internet usage dependency.

  15. Vehicle usage verification system

    NARCIS (Netherlands)

    Scanlon, W.G.; McQuiston, Jonathan; Cotton, Simon L.

    2012-01-01

    EN)A computer-implemented system for verifying vehicle usage comprising a server capable of communication with a plurality of clients across a communications network. Each client is provided in a respective vehicle and with a respective global positioning system (GPS) by which the client can

  16. Usage, structure, and substance in the English ditransitive construction

    DEFF Research Database (Denmark)

    Shibuya, Yoshikata; Jensen, Kim Ebensgaard

    on observation of actual usage-patterns of the construction in naturally occurring discourse. Secondly, Hudson very much treats ditransitives as a functional monolith, assuming functional uniformity and ignoring possible functional variation. Thirdly, his analysis is primarily based on formal structure and pays......-substance-cum-semantic-structure, the scenarios encoded by monotransitives and ditransitives (Rasmussen & Jakobsen 1996: 103-105), the participants associated with T-OBJs and D-OBJs are non-uniform (Goldberg 1995, Croft et al. 2001: 583-586, Hopper and Thompson 1980). Unlike Hudson's (1992) syntactic account, a symbolic account would categorize...... at the level of conceptual content. Hudson (1992: 266-268) observes variation in the functionality of D-OBJs depending on the verb, such that, unlike those occurring with give and deny, D-OBJs occurring with peel take on a more adjunct-like function, but gives the construction the monolithic treatment. We...

  17. Posture does not matter! Paw usage and grasping paw preference in a small-bodied rooting quadrupedal mammal.

    Directory of Open Access Journals (Sweden)

    Marine Joly

    Full Text Available BACKGROUND: Recent results in birds, marsupials, rodents and nonhuman primates suggest that phylogeny and ecological factors such as body size, diet and postural habit of a species influence limb usage and the direction and strength of limb laterality. To examine to which extent these findings can be generalised to small-bodied rooting quadrupedal mammals, we studied trees shrews (Tupaia belangeri. METHODOLOGY/PRINCIPAL FINDINGS: We established a behavioural test battery for examining paw usage comparable to small-bodied primates and tested 36 Tupaia belangeri. We studied paw usage in a natural foraging situation (simple food grasping task and measured the influence of varying postural demands (triped, biped, cling, sit on paw preferences by applying a forced-food grasping task similar to other small-bodied primates. Our findings suggest that rooting tree shrews prefer mouth over paw usage to catch food in a natural foraging situation. Moreover, we demonstrated that despite differences in postural demand, tree shrews show a strong and consistent individual paw preference for grasping across different tasks, but no paw preference at a population level. CONCLUSIONS/SIGNIFICANCE: Tree shrews showed less paw usage than small-bodied quadrupedal and arboreal primates, but the same paw preference. Our results confirm that individual paw preferences remain constant irrespective of postural demand in some small-bodied quadrupedal non primate and primate mammals which do not require fine motoric control for manipulating food items. Our findings suggest that the lack of paw/hand preference for grasping food at a population level is a universal pattern among those species and that the influence of postural demand on manual lateralisation in quadrupeds may have evolved in large-bodied species specialised in fine manipulations of food items.

  18. Perceived driving safety and seatbelt usage.

    Science.gov (United States)

    Svenson, O; Fischhoff, B; MacGregor, D

    1985-04-01

    Swedish and U.S. subjects judged their own driving skills and safety in relation to other drivers. As in earlier studies, most subjects showed an optimism bias: a tendency to judge oneself as safer and more skillful than the average driver, with a smaller risk of getting involved and injured in an accident. Different measures of the optimism effect were strongly correlated with one another, with driving experience and with the judged importance of human factors (as opposed to technical and chance factors) in causing accidents. Degree of optimism was positively, but weakly, correlated with reported seatbelt usage and worry about traffic accidents. Seatbelt usage was positively related to the extent to which belts are judged to be convenient and popular, and more modestly related to the belt's perceived contributions to safety. These results suggest that providing more information about the effectiveness of seatbelts may not be as efficient a way of increasing seatbelt usage as emphasizing other factors, such as comfort and social norms, which cannot be outweighed by optimism.

  19. Alternative promoter usage generates novel shorter MAPT mRNA transcripts in Alzheimer's disease and progressive supranuclear palsy brains.

    Science.gov (United States)

    Huin, Vincent; Buée, Luc; Behal, Hélène; Labreuche, Julien; Sablonnière, Bernard; Dhaenens, Claire-Marie

    2017-10-03

    Alternative promoter usage is an important mechanism for transcriptome diversity and the regulation of gene expression. Indeed, this alternative usage may influence tissue/subcellular specificity, protein translation and function of the proteins. The existence of an alternative promoter for MAPT gene was considered for a long time to explain differential tissue specificity and differential response to transcription and growth factors between mRNA transcripts. The alternative promoter usage could explain partly the different tau proteins expression patterns observed in tauopathies. Here, we report on our discovery of a functional alternative promoter for MAPT, located upstream of the gene's second exon (exon 1). By analyzing genome databases and brain tissue from control individuals and patients with Alzheimer's disease or progressive supranuclear palsy, we identified novel shorter transcripts derived from this alternative promoter. These transcripts are increased in patients' brain tissue as assessed by 5'RACE-PCR and qPCR. We suggest that these new MAPT isoforms can be translated into normal or amino-terminal-truncated tau proteins. We further suggest that activation of MAPT's alternative promoter under pathological conditions leads to the production of truncated proteins, changes in protein localization and function, and thus neurodegeneration.

  20. Understanding Mobile Social Media Usage

    DEFF Research Database (Denmark)

    Gan, Chunmei; Tan, Chee-Wee

    2017-01-01

    Despite the increasing popularity and growing trend of mobile social media in China, factors affecting users’ continued usage behavior remains unclear and deserves further scholarly attention. Synthesizing theories of expectation confirmation as well as uses and gratification, we advance a uses...... and gratification expectancy model that depicts how confirmation, perceived usability and gratification affect users’ continuance intention towards mobile social media. Empirical findings from an online survey of 247 respondents reveal that continuance intention is determined by a range of gratifications, including...... information sharing, media appeal and perceived enjoyment. In addition, confirmation of expectations and perceptions of usefulness gleaned through prior usage of mobile social media have significant effects on gratifications of information sharing, perceived enjoyment, social interaction, passing time...

  1. Tattoo inks in general usage contain nanoparticles

    DEFF Research Database (Denmark)

    Høgsberg, T; Löschner, Katrin; Löf, D

    2011-01-01

    the particle sizes in tattoo inks in general usage. Methods The particle size was measured by laser diffraction, electron microscopy and X-ray diffraction. Results The size of the pigments could be divided into three main classes. The black pigments were the smallest, the white pigments the largest...... in general usage is new and may contribute to the understanding of tattoo ink kinetics. How the body responds to NP tattoo pigments should be examined further....

  2. Usage of Recycled Pet

    Directory of Open Access Journals (Sweden)

    A. Ebru Tayyar

    2010-01-01

    Full Text Available The increasing industrialization, urbanization and the technological development have caused to increase depletion of the natural resources and environmental pollution's problem. Especially, for the countries which have not enough space recycling of the waste eliminating waste on regular basis or decreasing the amount and volume of waste have provided the important advantages. There are lots of studies and projects to develop both protect resources and prevent environmental pollution. PET bottles are commonly used in beverage industry and can be reused after physical and chemical recycling processes. Usage areas of recycled PET have been developed rapidly. Although recycled PET is used in plastic industry, composite industry also provides usage alternatives of recycled PET. Textile is a suitable sector for recycling of some plastics made of polymers too. In this study, the recycling technologies and applications of waste PET bottles have been investigated and scientific works in this area have been summarized.

  3. AR.Drone: security threat analysis and exemplary attack to track persons

    Science.gov (United States)

    Samland, Fred; Fruth, Jana; Hildebrandt, Mario; Hoppe, Tobias; Dittmann, Jana

    2012-01-01

    In this article we illustrate an approach of a security threat analysis of the quadrocopter AR.Drone, a toy for augmented reality (AR) games. The technical properties of the drone can be misused for attacks, which may relate security and/or privacy aspects. Our aim is to sensitize for the possibility of misuses and the motivation for an implementation of improved security mechanisms of the quadrocopter. We focus primarily on obvious security vulnerabilities (e.g. communication over unencrypted WLAN, usage of UDP, live video streaming via unencrypted WLAN to the control device) of this quadrocopter. We could practically verify in three exemplary scenarios that this can be misused by unauthorized persons for several attacks: high-jacking of the drone, eavesdropping of the AR.Drones unprotected video streams, and the tracking of persons. Amongst other aspects, our current research focuses on the realization of the attack of tracking persons and objects with the drone. Besides the realization of attacks, we want to evaluate the potential of this particular drone for a "safe-landing" function, as well as potential security enhancements. Additionally, in future we plan to investigate an automatic tracking of persons or objects without the need of human interactions.

  4. Exposure caused by wireless technologies used for short-range indoor communication in homes and offices.

    Science.gov (United States)

    Schmid, G; Lager, D; Preiner, P; Uberbacher, R; Cecil, S

    2007-01-01

    In order to estimate typical radio frequency exposures from indoor used wireless communication technologies applied in homes and offices, WLAN, Bluetooth and Digital Enhanced Cordless Telecommunications systems, as well as baby surveillance devices and wireless headphones for indoor usage, have been investigated by measurements and numerical computations. Based on optimised measurement methods, field distributions and resulting exposure were assessed on selected products and real exposure scenarios. Additionally, generic scenarios have been investigated on the basis of numerical computations. The obtained results demonstrate that under usual conditions the resulting spatially (over body dimensions) averaged and 6-min time-averaged exposure for persons in the radio frequency fields of the considered applications is below approximately 0.1% of the reference level for power density according to the International Commission on Non-Ionizing Radiation Protection (ICNIRP) guidelines published in 1998. Spatial and temporal peak values can be considerably higher by 2-3 orders of magnitude. In case of some transmitting devices operated in close proximity to the body (e.g. WLAN transmitters), local exposure can reach the same order of magnitude as the basic restriction; however, none of the devices considered in this study exceeded the limits according to the ICNIRP guidelines.

  5. Antagonistic Functions of USAG-1 and RUNX2 during Tooth Development.

    Directory of Open Access Journals (Sweden)

    Yumiko Togo

    Full Text Available Supernumerary teeth and tooth agenesis are common morphological anomalies in humans. We previously obtained evidence that supernumerary maxillary incisors form as a result of the successive development of the rudimentary maxillary incisor tooth germ in Usag-1 null mice. The development of tooth germs is arrested in Runx2 null mice, and such mice also exhibit lingual epithelial buds associated with the upper molars and incisors. The aim of this study is to investigate the potential crosstalk between Usag-1 and Runx2 during tooth development. In the present study, three interesting phenomena were observed in double null Usag-1-/-/Runx2-/- mice: the prevalence of supernumerary teeth was lower than in Usag-1 null mice; tooth development progressed further compared than in Runx2 null mice; and the frequency of molar lingual buds was lower than in Runx2 null mice. Therefore, we suggest that RUNX2 and USAG-1 act in an antagonistic manner. The lingual bud was completely filled with odontogenic epithelial Sox2-positive cells in the Usag-1+/+/Runx2-/- mice, whereas almost no odontogenic epithelial Sox2-positive cells contributed to supernumerary tooth formation in the rudimentary maxillary incisors of the Usag-1-/-/Runx2+/+ mice. Our findings suggest that RUNX2 directly or indirectly prevents the differentiation and/or proliferation of odontogenic epithelial Sox2-positive cells. We hypothesize that RUNX2 inhibits the bone morphogenetic protein (BMP and/or Wnt signaling pathways regulated by USAG-1, whereas RUNX2 expression is induced by BMP signaling independently of USAG-1.

  6. Contract Report for Usage Inspection of KN-12 Transport Cask

    International Nuclear Information System (INIS)

    Lee, J. C.; Seo, K. S.; Bang, K. S.; Cho, I. J.; Kim, D. H.; Min, D. K.

    2007-03-01

    The usage inspection of the KN-12 spent nuclear fuel transport package was performed to receive the license for reuse. According to the Korea Atomic Energy Act, all type B transport package should receive and pass the usage inspection every five years. The KN-12 transport cask was designed to transport twelve spent PWR fuel assemblies under wet and dry conditions. The cask was developed and licensed in 2002 in accordance with the Korea and the IAEA's safe transport regulations. The areas of usage inspection include: visual inspection, nondestructive weld inspection, load test, maximum operating pressure test, leakage test, shielding test, thermal test, external surface contamination test. In the results of the usage inspection, the damage or defect could not found out and the performance of the cask was maintained according to the requirements of the regulation. Therefore, the usage inspection was successfully performed to acquire the license for the reuse

  7. The Media and Technology Usage and Attitudes Scale: An empirical investigation

    Science.gov (United States)

    Rosen, L.D.; Whaling, K.; Carrier, L.M.; Cheever, N.A.; Rokkum, J.

    2015-01-01

    Current approaches to measuring people’s everyday usage of technology-based media and other computer-related activities have proved to be problematic as they use varied outcome measures, fail to measure behavior in a broad range of technology-related domains and do not take into account recently developed types of technology including smartphones. In the present study, a wide variety of items, covering a range of up-to-date technology and media usage behaviors. Sixty-six items concerning technology and media usage, along with 18 additional items assessing attitudes toward technology, were administered to two independent samples of individuals, comprising 942 participants. Factor analyses were used to create 11 usage subscales representing smartphone usage, general social media usage, Internet searching, e-mailing, media sharing, text messaging, video gaming, online friendships, Facebook friendships, phone calling, and watching television in addition to four attitude-based subscales: positive attitudes, negative attitudes, technological anxiety/dependence, and attitudes toward task-switching. All subscales showed strong reliabilities and relationships between the subscales and pre-existing measures of daily media usage and Internet addiction were as predicted. Given the reliability and validity results, the new Media and Technology Usage and Attitudes Scale was suggested as a method of measuring media and technology involvement across a variety of types of research studies either as a single 60-item scale or any subset of the 15 subscales. PMID:25722534

  8. The Media and Technology Usage and Attitudes Scale: An empirical investigation.

    Science.gov (United States)

    Rosen, L D; Whaling, K; Carrier, L M; Cheever, N A; Rokkum, J

    2013-11-01

    Current approaches to measuring people's everyday usage of technology-based media and other computer-related activities have proved to be problematic as they use varied outcome measures, fail to measure behavior in a broad range of technology-related domains and do not take into account recently developed types of technology including smartphones. In the present study, a wide variety of items, covering a range of up-to-date technology and media usage behaviors. Sixty-six items concerning technology and media usage, along with 18 additional items assessing attitudes toward technology, were administered to two independent samples of individuals, comprising 942 participants. Factor analyses were used to create 11 usage subscales representing smartphone usage, general social media usage, Internet searching, e-mailing, media sharing, text messaging, video gaming, online friendships, Facebook friendships, phone calling, and watching television in addition to four attitude-based subscales: positive attitudes, negative attitudes, technological anxiety/dependence, and attitudes toward task-switching. All subscales showed strong reliabilities and relationships between the subscales and pre-existing measures of daily media usage and Internet addiction were as predicted. Given the reliability and validity results, the new Media and Technology Usage and Attitudes Scale was suggested as a method of measuring media and technology involvement across a variety of types of research studies either as a single 60-item scale or any subset of the 15 subscales.

  9. High School Students' Social Media Usage Habits

    Science.gov (United States)

    Tezci, Erdogan; Içen, Mustafa

    2017-01-01

    Social media which is an important product of Computer and Internet Technologies has a growing usage level day by day. Increasing social media usage level gives opportunity for new software developments and making investments in this area. From this aspect, therefore, social media has not only economic function but also make persons participate in…

  10. Power factor regulation for household usage

    Science.gov (United States)

    Daud, Nik Ghazali Nik; Hashim, Fakroul Ridzuan; Tarmizi, Muhammad Haziq Ahmad

    2018-02-01

    Power factor regulator technology has recently drawn attention to the consumer and to power generation company in order for consumers to use electricity efficiently. Controlling of power factor for efficient usage can reduce the production of power in fulfilment demands hence reducing the greenhouse effect. This paper presents the design method of power factor controller for household usage. There are several methods to improve the power factor. The power factor controller used by this method is by using capacitors. Total harmonic distortion also has become a major problem for the reliability of the electrical appliances and techniques to control it will be discussed.

  11. Social Network Site Usage and Personal Relations of Migrants

    Directory of Open Access Journals (Sweden)

    Elena Damian

    2014-11-01

    Full Text Available In this study, we examine the relation between social network site (SNS usage and the personal networks of immigrants, using a unique dataset composed of a representative sample of immigrants living in the Netherlands. In theory, SNSs can be a helpful tool for immigrants, because they may help establish social ties in the destination country and help maintain ties with people in the country of origin. We examine whether this is also true in practice by analyzing whether the frequency of using two SNSs—Facebook and Hyves (a Dutch SNS—is associated with the number of ingroup and outgroup ties, as well as the quality of social relations. In addition, we test whether general emotional disclosure boosts the effect of SNS usage on the quality of relationships. We find that SNS usage is associated with more outgroup ties, but not with more ingroup ties. Our analyses also show that SNS usage is associated with greater quality social relationships among migrants. Contrary to our expectations, we found no interaction between general emotional disclosure and SNS usage on satisfaction with social relations. The implications of these findings are discussed.

  12. Remarks on Trade Usages And Business Practices In International Sales Law

    OpenAIRE

    Leonardo Graffi

    2011-01-01

    Trade usages and business practices are key elements of international commerce. In their day-to-day activities, traders and business people around the world constantly rely upon trade usages and business practices across a variety of industries. Usages and practices tend to be dignified by the business community with a status equivalent to that of actual law. As a matter of fact, many business persons often tend to regard trade usages and business practices as very powerful tools to ensure th...

  13. Usage of nuclear data library and proposal to JENDL

    International Nuclear Information System (INIS)

    Sasaki, M.; Iijima, S.; Kawai, Y.; Matsunobu, H.; Zukeran, A.

    1987-01-01

    A usage status of nuclear data libraries and proposals to the JENDL library are briefly reviewed. 1) Data bases used in plant design and fuel cycle design fields are summarized. JNDC evaluated data and JENDL are not utilized so much than expected in these fields. 2) Performances between JENDL-2 and ENDF/B-IV are compared in the FBR nuclear design field. JENDL-2 shows good characteristics. 3) Usages of JENDL-2 are shown in the LWR nuclear design field. JENDL-2 isn't always superior to the licensing library. 4) Usages of JENDL-2 are shown in the FBR shielding R D field. JENDL-2 underestimates measured spectra in case of the deep penetration experiment. 5) Based on the above usage status of JENDL-2, proposals to future JENDL and Nuclear Data Center are tabulated. (author)

  14. TURKEY’S MOST POPULAR 10 RADIO STATIONS FACEBOOK USAGE

    Directory of Open Access Journals (Sweden)

    Ufuk INAL

    2017-04-01

    Full Text Available Mass media is becoming a different structure day by day. When thinking about the use of fire for communicating with the distant, it is surprising that the development of the last century is remarkable. Today's communication systems make it possible for individuals to be active in many places at the same time thanks to mobile phones, computers and different mobile devices, channels and internet-enabled platforms. These platforms, such as Facebook, Twitter, and Instagram, have different billions of users from different parts of the world. These structures, which are generally known as social platforms, offer various possibilities not only for individuals but also for institutions and organizations. Today, many institutions and organizations appear to be on social platforms. According to the constructs, the social platforms of these institutions and organizations have varying purposes and forms of use. The sole example of the influence of social platforms in mass communication is the use of these platforms by mass media. In this study, it was emphasized the issue of the extent to which the radion, one of the oldest mass communication tools, used which effect and for what purpose. In this direction, the usage patterns of 10 most heard radio in Turkey are examined in Facebook, which is ahead of other social platforms in terms of user potential and frequency in Turkey. Meanwhile, Facebook profiles usage and content creation styles of the radios are determined. Finally, the link between the rest of the radios and the Facebook movement breakdown was questioned.

  15. Contract Report for Usage Inspection of KN-12 Transport Cask

    Energy Technology Data Exchange (ETDEWEB)

    Lee, J. C.; Seo, K. S.; Bang, K. S.; Cho, I. J.; Kim, D. H.; Min, D. K

    2007-03-15

    The usage inspection of the KN-12 spent nuclear fuel transport package was performed to receive the license for reuse. According to the Korea Atomic Energy Act, all type B transport package should receive and pass the usage inspection every five years. The KN-12 transport cask was designed to transport twelve spent PWR fuel assemblies under wet and dry conditions. The cask was developed and licensed in 2002 in accordance with the Korea and the IAEA's safe transport regulations. The areas of usage inspection include: visual inspection, nondestructive weld inspection, load test, maximum operating pressure test, leakage test, shielding test, thermal test, external surface contamination test. In the results of the usage inspection, the damage or defect could not found out and the performance of the cask was maintained according to the requirements of the regulation. Therefore, the usage inspection was successfully performed to acquire the license for the reuse.

  16. Management of colorectal injuries during operation iraqi freedom: patterns of stoma usage.

    Science.gov (United States)

    Duncan, James E; Corwin, Christian H; Sweeney, W Brian; Dunne, James R; Denobile, John W; Perdue, Philip W; Galarneau, Michael R; Pearl, Jonathan P

    2008-04-01

    Management of penetrating colorectal injuries in the civilian trauma population has evolved away from diversionary stoma into primary repair or resection and primary anastomosis. With this in mind, we evaluated how injuries to the colon and rectum were managed in the ongoing war in Iraq. The records of Operation Iraqi Freedom patients evacuated to National Naval Medical Center (NNMC) from March 2004 until November 2005 were retrospectively reviewed. Patients with colorectal injuries were identified and characterized by the following: (1) injury type; (2) mechanism; (3) associated injuries; (4) Injury Severity Score; (5) levels of medical care involved in patient treatment; (6) time interval(s) between levels of care; (7) management; and (8) outcomes. Twenty-three patients were identified as having either colon or rectal injury. The average ISS was 24.4 (range, 9-54; median 24). On average, patients were evaluated and treated at 2.5 levels of surgically capable medical care (range, 2-3; median 2) between time of injury and arrival at NNMC, with a median of 6 days from initial injury until presentation at NNMC (range, 3-11). Management of colorectal injuries included 7 primary repairs (30.4%), 3 resections with anastomoses (13.0%), and 13 colostomies (56.6%). There was one death (4.3%) and three anastomotic leaks (30%). Total complication rate was 48%. Based upon injury severity, the complex nature of triage and medical evacuation, and the multiple levels of care involved for injured military personnel, temporary stoma usage should play a greater role in military casualties than in the civilian environment for penetrating colorectal injuries.

  17. HIV Co-receptor usage in HIV-related non-hodgkin's lymphoma

    Directory of Open Access Journals (Sweden)

    Reid Erin

    2012-03-01

    Full Text Available Abstract In this study 15 banked samples of HIV-related Non-Hodgkin's Lymphoma (NHL cases were tested for HIV co-receptor usage and SDF1 3'A polymorphism. Reportable tropism from 9 plasma samples had 1 (11.1% HIV case with CXCR4 and 8 (88.9% with CCR5 usage, even though most of the cases occurred at a late stage of HIV (2/3 had CD4 counts below 200, where expected CXCR4 usage would be 60%. Based on the expected proportion of less than 50% CCR5 in chronically infected individuals, this would suggest that in NHL may be associated with CCR5 usage (P = 0.04.

  18. A Survey on Nickel Titanium Rotary Instruments and their Usage Techniques by Endodontists in India.

    Science.gov (United States)

    Patil, Thimmanagowda N; Saraf, Prahlad A; Penukonda, Raghavendra; Vanaki, Sneha S; Kamatagi, Laxmikant

    2017-05-01

    The preference and usage of nickel titanium rotary instruments varies from individual to individual based on their technique, experience with the rotary systems and the clinical situation. Very limited information is available to explain the adoption of changing concepts with respect to nickel titanium rotary instruments pertaining to the endodontists in India. The aim of this study was to conduct a questionnaire survey to acquire the knowledge concerning different NiTi rotary instruments and their usage techniques by endodontists in India. A Survey questionnaire was designed which consisted of 32 questions regarding designation, demographics, experience with rotary instruments, usage of different file systems, usage techniques, frequency of reuse, occurrence of file fracture, reasons and their management was distributed by hand in the national postgraduate convention and also disseminated via electronic medium to 400 and 600 endodontists respectively. Information was collected from each individual to gain insight into the experiences and beliefs of endodontists concerning the new endodontic technology of rotary NiTi instrumentation based on their clinical experience with the rotary systems. The questions were designed to ascertain the problems, patterns of use and to identify areas of perceived or potential concern regarding the rotary instruments and the data acquired was statistically evaluated using Fisher's-exact test and the Chi-Square test. Overall 63.8% (638) endodontists responded. ProTaper was one of the most commonly used file system followed by M two and ProTaper Next. There was a significant co relation between the years of experience and the file re use frequency, preparation technique, file separation, management of file separation. A large number of Endodontists prefer to reuse the rotary NiTi instruments. As there was an increase in the experience, the incidence of file separation reduced with increasing number of re use frequency and with

  19. Notational usage modulates attention networks in binumerates

    Directory of Open Access Journals (Sweden)

    Atesh eKoul

    2014-05-01

    Full Text Available Multicultural environments require learning multiple number notations wherein some are encountered more frequently than others. This leads to differences in exposure and consequently differences in usage between notations. We find that differential notational usage imposes a significant neurocognitive load on number processing. Despite simultaneous acquisition, forty-two adult binumerate populations, familiar with two positional writing systems namely Hindu Nagari digits and Hindu Arabic digits, reported significantly lower preference and usage for Nagari as compared to Arabic. Twenty-four participants showed significantly increased reaction times and reduced accuracy while performing magnitude comparison tasks in Nagari with respect to Arabic. Functional magnetic resonance imaging revealed that processing Nagari elicited significantly greater activity in number processing and attention networks. A direct subtraction of networks for Nagari and Arabic notations revealed a neural circuit comprising of bilateral intra-parietal sulcus, inferior and mid frontal gyri, fusiform gyrus and the anterior cingulate cortex (FDR p<0.005. Additionally, whole brain correlation analysis showed that activity in the left inferior parietal region was modulated by task performance in Nagari. We attribute the increased activation in Ng to increased task difficulty due to infrequent exposure and usage. Our results reiterate the role of the left intra-parietal sulcus in modulating performance in numeric tasks and highlight that of the attention network for monitoring symbolic notation mode in binumerates.

  20. 2011 Radioactive Materials Usage Survey for Unmonitored Point Sources

    Energy Technology Data Exchange (ETDEWEB)

    Sturgeon, Richard W. [Los Alamos National Laboratory

    2012-06-27

    This report provides the results of the 2011 Radioactive Materials Usage Survey for Unmonitored Point Sources (RMUS), which was updated by the Environmental Protection (ENV) Division's Environmental Stewardship (ES) at Los Alamos National Laboratory (LANL). ES classifies LANL emission sources into one of four Tiers, based on the potential effective dose equivalent (PEDE) calculated for each point source. Detailed descriptions of these tiers are provided in Section 3. The usage survey is conducted annually; in odd-numbered years the survey addresses all monitored and unmonitored point sources and in even-numbered years it addresses all Tier III and various selected other sources. This graded approach was designed to ensure that the appropriate emphasis is placed on point sources that have higher potential emissions to the environment. For calendar year (CY) 2011, ES has divided the usage survey into two distinct reports, one covering the monitored point sources (to be completed later this year) and this report covering all unmonitored point sources. This usage survey includes the following release points: (1) all unmonitored sources identified in the 2010 usage survey, (2) any new release points identified through the new project review (NPR) process, and (3) other release points as designated by the Rad-NESHAP Team Leader. Data for all unmonitored point sources at LANL is stored in the survey files at ES. LANL uses this survey data to help demonstrate compliance with Clean Air Act radioactive air emissions regulations (40 CFR 61, Subpart H). The remainder of this introduction provides a brief description of the information contained in each section. Section 2 of this report describes the methods that were employed for gathering usage survey data and for calculating usage, emissions, and dose for these point sources. It also references the appropriate ES procedures for further information. Section 3 describes the RMUS and explains how the survey results are

  1. Initial observations of electronic medical record usage during CT and MRI interpretation: Frequency of use and impact on workflow.

    Science.gov (United States)

    Lin, Abraham; Harris, Mitchell; Zalis, Michael

    2010-07-01

    Electronic medical record (EMR) systems permit integration of contextual nonimaging EMR data into examination interpretation; however, the extra effort required to search and review these nonradiologic data are not well characterized. We assessed the gross frequency and pattern of EMR usage in the interpretation of diagnostic CT and MRI examinations. We defined nonradiologic EMR data as laboratory data, nonimaging specialty report, clinical note, and administrative data not available on PACS. For abdominal, neuroradiologic, and musculoskeletal CT and MRI, we prospectively recorded the time required for image analysis (including prior imaging studies and their reports), nonradiologic EMR use, and initial report drafting by fellows and staff in randomized sessions. We assessed EMR use as a fraction of work activity and according to technique, subspecialty, inpatient status, and radiologist experience. We observed 372 CT and MRI interpretations by 33 radiologists. For CT, radiologists used the EMR in 34% of abdominal, 57% of neuroradiologic, and 38% of musculoskeletal interpretations. For MRI, EMR was used in 73% of abdominal, 56% of neuroradiologic, and 33% of musculoskeletal interpretations. For CT, EMR usage comprised 18%, 14%, and 18% of diagnostic effort (image analysis plus EMR use) for abdominal, neuroradiologic, and musculoskeletal interpretations, respectively; for MRI, EMR usage comprised 21%, 16%, and 15% of diagnostic effort for abdominal, neuroradiologic, and musculoskeletal interpretations, respectively. Frequency of EMR use was significantly greater for neuroradiology CT and abdominal MRI (p < 0.05, Fisher's test). EMR usage was not consistently related to inpatient status for CT or radiologist experience. For CT and MRI interpretation, EMR usage is frequent and comprises a significant fraction of diagnostic effort.

  2. Examining student heuristic usage in a hydrogen bonding assessment.

    Science.gov (United States)

    Miller, Kathryn; Kim, Thomas

    2017-09-01

    This study investigates the role of representational competence in student responses to an assessment of hydrogen bonding. The assessment couples the use of a multiple-select item ("Choose all that apply") with an open-ended item to allow for an examination of students' cognitive processes as they relate to the assignment of hydrogen bonding within a structural representation. Response patterns from the multiple-select item implicate heuristic usage as a contributing factor to students' incorrect responses. The use of heuristics is further supported by the students' corresponding responses to the open-ended assessment item. Taken together, these data suggest that poor representational competence may contribute to students' previously observed inability to correctly navigate the concept of hydrogen bonding. © 2017 by The International Union of Biochemistry and Molecular Biology, 45(5):411-416, 2017. © 2017 The International Union of Biochemistry and Molecular Biology.

  3. Sibutramine usage in New Zealand: an analysis of prescription data by the Intensive Medicines Monitoring Programme.

    Science.gov (United States)

    Hill, Geraldine R; Ashton, Janelle; Harrison-Woolrych, Mira

    2007-11-01

    To describe patterns of sibutramine usage in New Zealand during the first 3 years of marketing using data acquired during post-marketing safety surveillance. Demographic and prescription data were examined from a nationwide cohort of 17 298 patients prescribed sibutramine between 1 February 2001 and 31 March 2004. Outcome measures were age and sex distribution of the cohort; period prevalence of sibutramine usage for each ethnic group; duration of treatment and reasons for cessation of therapy. Limited BMI data were also examined. About 0.5% of the NZ population were prescribed sibutramine in the period studied. Overwhelmingly, the highest users of sibutramine were NZ European women aged 30-59 years. Maori and Pacific Peoples were under-represented in the cohort, despite the higher prevalence of obesity among these populations. Sibutramine usage was predominantly short-term: 59% of the cohort used sibutramine for 90 days or less, half of whom used it for only 1 month. There has been extensive use of sibutramine in New Zealand. Sibutramine has been relatively under-utilised by Maori and Pacific ethnic groups, compared to New Zealand Europeans, despite their higher prevalence of obesity. A number of factors may have contributed to the predominantly short-term use of this medicine, including the cost of the medicine to the consumer, weight loss not meeting expectations and adverse effects of the medicine.

  4. A Behavioural Model of E-Banking Usage in Italy

    Directory of Open Access Journals (Sweden)

    Guendalina Capece

    2013-06-01

    Full Text Available E‐banking is defined as the automated delivery of new and traditional banking products and services directly to customers through electronic, interactive communication channels. “Pure online” banks are characterized by the absence of physical windows and front‐office personnel. Traditional banks are still integrating traditional distribution channels with online ones; the scenario is therefore still evolving over time. Despite the intrinsic potentialities, Italy is far from being a leader in the usage of innovative online instruments in the banking system and will struggle with new innovation waves. In this paper, we measure the potential effective ebanking usage. Furthermore, we investigate the behaviour of users and adopters, identifying the major causes influencing satisfaction and usage and the impact of these different causes on the intensity of utilization. The analysis is based on a panel of 495 real users, thus allowing the profiling of the Italian adopter to discover the causes of usage and outline strategies for the growth of e‐banking services in Italy.

  5. Designation of facility usage categories for Hanford Site facilities

    International Nuclear Information System (INIS)

    Woodrich, D.D.; Ellingson, D.R.; Scott, M.A.; Schade, A.R.

    1991-10-01

    This report summarizes the Hanford Site methodology used to ensure facility compliance with the natural phenomena design criteria set forth in the US Department of Energy Orders and guidance. The current Hanford Site methodology for Usage Category designation is based on an engineered feature's safety function and on the feature's assigned Safety Class. At the Hanford Site, Safety Class assignments are deterministic in nature and are based on teh consequences of failure, without regard to the likelihood of occurrence. The report also proposes a risk-based approach to Usage Category designation, which is being considered for future application at the Hanford Site. To establish a proper Usage Category designation, the safety analysis and engineering design processes must be coupled. This union produces a common understanding of the safety function(s) to be accomplished by the design feature(s) and a sound basis for the assignment of Usage Categories to the appropriate systems, structures, and components. 4 refs., 9 figs., 1 tab

  6. BEHAVIORAL ASPECT OF ACCOUNTING TEACHERS’ INFORMATION TECHNOLOGY USAGE

    OpenAIRE

    YILMAZ, Emine; ÖZER, Gökhan

    2015-01-01

    This study aims to examine behavioral process of accounting teachers’ information technology (IT) acceptance. To this end, we collected data from accounting teachers working in trade high schools. Research model and hypotheses were developed in the light of Theory of Reasoned Action. Accordingly, relationships among attitudes, subjective norms, intentions towards information technology usage and IT usage behaviors were investigated. Explanatory factor analysis and structural equation modeling...

  7. Usage pattern of synthetic food colours in different states of India and exposure assessment through commodities preferentially consumed by children.

    Science.gov (United States)

    Dixit, Sumita; Purshottam, S K; Khanna, S K; Das, Mukul

    2011-08-01

    Exposure studies in children are emphasized nowadays given children's higher consumption vulnerability. The present study generated national-level data covering 16 major states of India on the usage pattern of colours and it identified food commodities through which a particular colour has the scope to exceed ADI limits. Out of the total analysed samples, 87.8% contained permitted colours, of which only 48% adhered to the prescribed limit of 100 mg kg(-1). The majority of candyfloss, sugar toys, beverages, mouth fresheners, ice candy and bakery product samples exceeded the prescribed limit. Non-permitted colours were mostly prevalent in candyfloss and sugar toy samples. Though sunset yellow FCF (SSYFCF) and tartrazine were the two most popular colours, many samples used a blend of two or more colours. The blend of SSYFCF and tartrazine exceeded the prescribed limit by a factor of 37 in one sample, and the median and 95th percentile levels of this blend were 4.5- and 25.7-fold, respectively. The exposure assessment showed that the intake of erythrosine exceeded the ADI limits by two to six times at average levels of detected colours, whereas at the 95th percentile level both SSYFCF and erythrosine exceeded the respective ADI limits by three- to 12-fold in all five age groups. Thus, the uniform prescribed limit of synthetic colours at 100 mg kg(-1) under Indian rules needs to be reviewed and should be governed by consumption profiles of the food commodities to check the unnecessary exposure of excessive colours to those vulnerable in the population that may pose a health risk.

  8. TECHNOLOGY USAGE AMONG CONSTRUCTION STUDENTS THE MODERATING ROLE OF GENDER

    Directory of Open Access Journals (Sweden)

    T. Ramayah

    2008-06-01

    Full Text Available This study examines the impact of perceived usefulness and perceived ease of use on the extent of personal computer (PC usage among a group of undergraduates at the School of Housing, Building and Planning, Universiti Sains Malaysia. It also looks at the moderating role of gender in the above said relationship. Data was collected using a structured questionnaire. A total of 244 students responded to the survey. Results showed that perceived ease of use (β = 0.309, p < 0.01 was positively related to PC usage. A surprising finding of this study was that perceived usefulness was not a significant predictor of PC usage whereas perceived ease of use was. This can be explained in the context of mandated use where the usefulness is no longer an issue and ease of use becomes the primary concern. Gender was not a moderator in the above said relationship but was a significant independent predictor of usage. Males exhibited higher usage of the PC compared to the female students.

  9. Regulatory applications of the relationships between natural gas usage and weather

    International Nuclear Information System (INIS)

    Gray, J.A.; Patterson, D.L.; Proctor, M.S.; Warren, H.E.

    1997-01-01

    This document provides the basics required for analysis and forecasting of natural gas usage for determining the revenues and revision of rates. The focus is on the Local Distribution Company and its customers. Analysis of gas usage is required in a rate case in order to properly estimate the volumes and revenues that would be recovered from current rate under conditions of normal weather. Normal volumes are also required to evaluate proposed rates. In the context of the Local Distribution Company's procurement of gas supply, forecasting of gas usage is required to determine both the daily usage profile and the peak day requirement

  10. The relationship between codon usage bias and cold resistant genes

    International Nuclear Information System (INIS)

    Barozai, M.Y.; Din, M.

    2014-01-01

    This research is based on synonymous codon usage which has been well-known as a feature that affects typical expression level of protein in an organism. Different organisms prefer different codons for same amino acid and this is called Codon Usage Bias (CUB). The codon usage directly affects the level or even direction of changes in protein expression in responses to environmental stimuli. Cold stress is a major abiotic factor that limits the agricultural productivity of plants. In the recent study CUB has been studied in Arabidopsis thaliana cold resistant and housekeeping genes and their homologs in rice (Oryza sativa) to understand the cold stress and housekeeping genes relation with CUB. Six cold resistant and three housekeeping genes in Arabidopsis thaliana and their homologs in rice, were subjected to CUB analysis. The three cold resistant genes (DREB1B, RCI and MYB15) showed more than 50% (52%, 61% and 66% respectively) similar codon usage bias for Arabidopsis thaliana and rice. On the other hand three cold resistant genes (MPK3, ICE1 and ZAT12) showed less than 50% (38%, 38% and 47% respectively) similar codon usage bias for Arabidopsis thaliana and rice. The three housekeeping genes (Actin, Tubulin and Ubiquitin) showed 76% similar codon usage bias for Arabidopsis thaliana and rice. This study will help to manage the plant gene expression through codon optimization under the cold stress. (author)

  11. OER Usage by Instructional Designers and Training Managers in Corporations

    Directory of Open Access Journals (Sweden)

    Anat Cohen

    2015-12-01

    Full Text Available Since the development of Open Educational Resources (OERs, different models regarding the usage of these resources in education have appeared in the literature. Wiley’s 4-Rs model is considered to be one of the leading models. Research based on Wiley’s model shows that using materials without making changes is the most common use. Compared to the extensive literature regarding OER usage in education, the literature barely deals with OER usage by instructional designers or training managers in corporations. The purpose of this research is to examine the OER usage of these two stakeholders, distinguishing between Little and Big OER repositories, in which Little OER repositories such as YouTube and Wikipedia aren’t necessarily designed to fulfill educational purposes. Findings show that these stakeholders almost use only Little repositories and that their usage level is higher than what is documented in the literature: they mostly Revise–modify the form of the resource, and Remix–combine different resources to create new ones. These differences can be explained by the fact that materials from Little OER repositories are raw materials, requiring further editing and adjustment. Significant differences between instructional designers’ and training managers’ usage of OERs were found regarding the Reuse level of resources from internal repositories and the Google Images repository, and the frequency of this Reuse.

  12. USAGES – THE LEGAL REGIME IN NEW CIVIL CODE

    Directory of Open Access Journals (Sweden)

    EMILIAN CIONGARU

    2013-05-01

    Full Text Available In the broad sense, the concept of law is represented by totality of acts that are elaborated by competent state authorities and their purpose is legislating. There are juridical situations are outside the scope of regulation of legal norms and they are stipulated by the New Civil Code, namely the usages: which are defined, in the broad sense, as rules of conduct for a long time, born of social practice. If the law sanctioned any usage, by a rule of reference, giving them, as such obligatory legal power, they are sources of law and the legislator has provided, as is source of civil law, only usages which are in conformity to public order and morality. This problem there was no in the case of legal rules because, they themselves are created with the purpose of to generate the public order and morality. In the situations not covered by law, the usages have a greater force than that of the legal dispositions regarding similar situations, so the broad interpretation of the rules of civil law is made, in the cases which are not covered by the law, only if such an interpretation is not contrary to the usages. An analysis and understanding of the juridical status of usages representing: the customs and the local habits which is accepted by the members of that community as well as the professional uses, as rules of development of professional activities, may result in to perceive the legal force of their but also to reduce, on as much as possible, some potentials confusions of interpretation and application of the law.

  13. Analysis of Facebook content demand patterns

    OpenAIRE

    Kihl, Maria; Larsson, Robin; Unnervik, Niclas; Haberkamm, Jolina; Arvidsson, Åke; Aurelius, Andreas

    2014-01-01

    Data volumes in communication networks increase rapidly. Further, usage of social network applications is very wide spread among users, and among these applications, Facebook is the most popular. In this paper, we analyse user demands patterns and content popularity of Facebook generated traffic. The data comes from residential users in two metropolitan access networks in Sweden, and we analyse more than 17 million images downloaded by almost 16,000 Facebook users. We show that the distributi...

  14. Factors affecting dairy farmers' attitudes towards antimicrobial medicine usage in cattle in England and Wales.

    Science.gov (United States)

    Jones, P J; Marier, E A; Tranter, R B; Wu, G; Watson, E; Teale, C J

    2015-09-01

    There has been growing concern about bacterial resistance to antimicrobials in the farmed livestock sector. Attention has turned to sub-optimal use of antimicrobials as a driver of resistance. Recent reviews have identified a lack of data on the pattern of antimicrobial use as an impediment to the design of measures to tackle this growing problem. This paper reports on a study that explored use of antibiotics by dairy farmers and factors influencing their decision-making around this usage. We found that respondents had either recently reduced their use of antibiotics, or planned to do so. Advice from their veterinarian was instrumental in this. Over 70% thought reducing antibiotic usage would be a good thing to do. The most influential source of information used was their own veterinarian. Some 50% were unaware of the available guidelines on use in cattle production. However, 97% thought it important to keep treatment records. The Theory of Planned Behaviour was used to identify dairy farmers' drivers and barriers to reduce use of antibiotics. Intention to reduce usage was weakly correlated with current and past practice of antibiotic use, whilst the strongest driver was respondents' belief that their social and advisory network would approve of them doing this. The higher the proportion of income from milk production and the greater the chance of remaining in milk production, the significantly higher the likelihood of farmers exhibiting positive intention to reduce antibiotic usage. Such farmers may be more commercially minded than others and thus more cost-conscious or, perhaps, more aware of possible future restrictions. Strong correlation was found between farmers' perception of their social referents' beliefs and farmers' intent to reduce antibiotic use. Policy makers should target these social referents, especially veterinarians, with information on the benefits from, and the means to, achieving reductions in antibiotic usage. Information on sub-optimal use

  15. The Current State Of Secondary Resource Usage In Ukraine

    OpenAIRE

    Julia Makovetska

    2011-01-01

    The state and the perspectives of the development of secondary resource usage in Ukraine have been analyzed in the article. The level of the main types recyclable materials as paper and cardboard, glass, plastics, waste tires are considered. Priority directions of development of the secondary resources usage have been defined.

  16. Benchmarking Usage Statistics in Collection Management Decisions for Serials

    Science.gov (United States)

    Tucker, Cory

    2009-01-01

    Usage statistics are an important metric for making decisions on serials. Although the University of Nevada, Las Vegas (UNLV) Libraries have been collecting usage statistics, the statistics had not frequently been used to make decisions and had not been included in collection development policy. After undergoing a collection assessment, the…

  17. Les figures de l'usager de Twitter

    OpenAIRE

    Domenget , Jean-Claude

    2016-01-01

    International audience; L’analyse des figures de l’usager de Twitter représente un enjeu de recherche pour comprendre la construction de ces représentations diverses. L’objectif de cet article est d’analyser la notion d’usager dans le cadre de ce dispositif et d’interroger ses relations avec les notions de public(s), d’audience(s) et de communautés. Les quatre principales figures distinguées (twitto, consommateur, abonné, expert) sont étudiées à partir de deuxcritères majeurs : les principes ...

  18. USAGE OF UNMANNED AERIAL VEHICLES IN GENERAL AVIATION: CURRENT SITUATION AND PROSPECTS

    Directory of Open Access Journals (Sweden)

    2016-01-01

    Full Text Available The article aims at analyzing the current and future trends in usage of Unmanned Aerial Vehicles (UAV in gen- eral aviation (branches of economy. The main goal of the analysis is to determine the branches of economy, in which the usage of UAVs would be the most beneficial in the near- to mid-term future. The main requirements and restrictions of usage of the aircraft in general aviation were used as a basis for determining the types of operations, in which the usage of UAVs will be the most rational and effective. The effectiveness evaluation was based on the developed method, involving evaluation of the following factors such as: advantages of usage of manned aircraft, advantages of usage of unmanned air- craft, problems associated with the usage of manned aircraft, problems associated with the usage of unmanned aircraft. After evaluation of the mentioned aspects above the safety, operational productivity and ecological indicators were evaluat- ed. These qualitative assessments allowed identifying the branches of economy, where the usage of UAVs could potentially be the most advantageous. The article also discusses the possible strategies of UAVs development for general aviation. The so-called “mixed” strategy of UAV development is identified as the best in the current situation. This strategy combines the conversion of the existing military UAVs with the purpose of fitting them in to civilian use with the parallel development of brand new UAVs, which would be designed for operation in branches of economy right from the beginning (from scratch.

  19. Water in Architecture and its Usage in Contemporary Houses Interior Design

    Directory of Open Access Journals (Sweden)

    Samaneh Sedighi

    2017-10-01

    Full Text Available As one of the most fundamental natural elements, water has had a great share in the formation and architecture of architectural buildings. This research examines the effect of water and its presence in contemporary houses. Architecture is not merely a tridimensional compound of forms in space, but a manifestation of a sense or a thought in it. According to Feng Shui, the building where we live in can be the cause of balance and health for human being. As a whole, anything around us has active and mobile energies; by designing a building in a way that positive energies can follow around easier, one can easier bring happiness for the dwellers. Feng Shui is based on the harmony among five elements of water, wind, soil, fire and metal. Because of its stream, water removes negative energies and revives and mobilizes positive ones thereby having a great impact on the current of energies. Considering the fact that contemporary houses are small in space, designer does not feel free in the usage of water in internal spaces, thus he/she should utilize patterns that resemble or associate the feeling of water in the living environment. Conceptual, functional and aesthetic basics of water have been examined first via library studies and note taking from various papers and books. Then, the three qualities would be analyzed in Iranian architecture, and the properties of past people will be examined to emphasize material, spiritual and psychological aspects of water. Then, I will assess the philosophical basics of Feng Shui in using water for interior spaces via a qualitative method and content analysis, usage of water based on Feng Shui in interior design and decoration of homes. Considering these concepts, natural possibilities of water in interior architecture and its limitations in interior space design would be assessed and recognized. Finally, some patterns would be presented to use water in interior spaces of contemporary apartments.

  20. Media multitasking behavior: concurrent television and computer usage.

    Science.gov (United States)

    Brasel, S Adam; Gips, James

    2011-09-01

    Changes in the media landscape have made simultaneous usage of the computer and television increasingly commonplace, but little research has explored how individuals navigate this media multitasking environment. Prior work suggests that self-insight may be limited in media consumption and multitasking environments, reinforcing a rising need for direct observational research. A laboratory experiment recorded both younger and older individuals as they used a computer and television concurrently, multitasking across television and Internet content. Results show that individuals are attending primarily to the computer during media multitasking. Although gazes last longer on the computer when compared to the television, the overall distribution of gazes is strongly skewed toward very short gazes only a few seconds in duration. People switched between media at an extreme rate, averaging more than 4 switches per min and 120 switches over the 27.5-minute study exposure. Participants had little insight into their switching activity and recalled their switching behavior at an average of only 12 percent of their actual switching rate revealed in the objective data. Younger individuals switched more often than older individuals, but other individual differences such as stated multitasking preference and polychronicity had little effect on switching patterns or gaze duration. This overall pattern of results highlights the importance of exploring new media environments, such as the current drive toward media multitasking, and reinforces that self-monitoring, post hoc surveying, and lay theory may offer only limited insight into how individuals interact with media.

  1. Surgical loupe usage among oculoplastic surgeons in North America.

    Science.gov (United States)

    Wei, Chen; Wu, Albert Y

    2018-04-01

    To study the patterns of usage and perception among U.S. oculoplastic surgeons regarding surgical loupes. An anonymous 20-question survey was emailed out to the American Society of Ophthalmic Plastic and Reconstructive Surgery listserv. Data were compiled in Google Forms. SPSS was used for statistical analyses. This study was approved by the institutional review board. Of the 609 members contacted, 239 (39%) completed the survey; 95% of respondents owned loupes and 78% regularly used them. No association was observed between frequency of loupe usage and sex or years in practice. The most common magnification and brand were 2.5× and Designs for Vision, respectively. The most common problems associated with loupes were limited vision (33%) and lack of comfort (24%), with 11% citing neck and cervical spinal disorders. The most common benefits were magnification (93%) and increased visual accuracy (68%). Of the respondents, 56% believed improved patient care to be a benefit and 76% believed that loupes enhance surgical outcome. With regard to training, 67% supported incorporating loupes into residency, 35% believed in mandating loupe purchase, and 25% wanted residencies to provide loupes at no cost. Respondent support for the use of loupes in practice and training was directly correlated with how frequently they used loupes. The vast majority of respondents owned loupes. Although most loupe owners used loupes regularly, a sizable proportion operated with limited vision and lack of comfort. Overall, just over half of respondents believed that loupes improve patient care and should be integrated into residency. Copyright © 2018 Canadian Ophthalmological Society. Published by Elsevier Inc. All rights reserved.

  2. Screen media usage, sleep time and academic performance in adolescents: clustering a self-organizing maps analysis.

    Science.gov (United States)

    Peiró-Velert, Carmen; Valencia-Peris, Alexandra; González, Luis M; García-Massó, Xavier; Serra-Añó, Pilar; Devís-Devís, José

    2014-01-01

    Screen media usage, sleep time and socio-demographic features are related to adolescents' academic performance, but interrelations are little explored. This paper describes these interrelations and behavioral profiles clustered in low and high academic performance. A nationally representative sample of 3,095 Spanish adolescents, aged 12 to 18, was surveyed on 15 variables linked to the purpose of the study. A Self-Organizing Maps analysis established non-linear interrelationships among these variables and identified behavior patterns in subsequent cluster analyses. Topological interrelationships established from the 15 emerging maps indicated that boys used more passive videogames and computers for playing than girls, who tended to use mobile phones to communicate with others. Adolescents with the highest academic performance were the youngest. They slept more and spent less time using sedentary screen media when compared to those with the lowest performance, and they also showed topological relationships with higher socioeconomic status adolescents. Cluster 1 grouped boys who spent more than 5.5 hours daily using sedentary screen media. Their academic performance was low and they slept an average of 8 hours daily. Cluster 2 gathered girls with an excellent academic performance, who slept nearly 9 hours per day, and devoted less time daily to sedentary screen media. Academic performance was directly related to sleep time and socioeconomic status, but inversely related to overall sedentary screen media usage. Profiles from the two clusters were strongly differentiated by gender, age, sedentary screen media usage, sleep time and academic achievement. Girls with the highest academic results had a medium socioeconomic status in Cluster 2. Findings may contribute to establishing recommendations about the timing and duration of screen media usage in adolescents and appropriate sleep time needed to successfully meet the demands of school academics and to improve

  3. Screen media usage, sleep time and academic performance in adolescents: clustering a self-organizing maps analysis.

    Directory of Open Access Journals (Sweden)

    Carmen Peiró-Velert

    Full Text Available Screen media usage, sleep time and socio-demographic features are related to adolescents' academic performance, but interrelations are little explored. This paper describes these interrelations and behavioral profiles clustered in low and high academic performance. A nationally representative sample of 3,095 Spanish adolescents, aged 12 to 18, was surveyed on 15 variables linked to the purpose of the study. A Self-Organizing Maps analysis established non-linear interrelationships among these variables and identified behavior patterns in subsequent cluster analyses. Topological interrelationships established from the 15 emerging maps indicated that boys used more passive videogames and computers for playing than girls, who tended to use mobile phones to communicate with others. Adolescents with the highest academic performance were the youngest. They slept more and spent less time using sedentary screen media when compared to those with the lowest performance, and they also showed topological relationships with higher socioeconomic status adolescents. Cluster 1 grouped boys who spent more than 5.5 hours daily using sedentary screen media. Their academic performance was low and they slept an average of 8 hours daily. Cluster 2 gathered girls with an excellent academic performance, who slept nearly 9 hours per day, and devoted less time daily to sedentary screen media. Academic performance was directly related to sleep time and socioeconomic status, but inversely related to overall sedentary screen media usage. Profiles from the two clusters were strongly differentiated by gender, age, sedentary screen media usage, sleep time and academic achievement. Girls with the highest academic results had a medium socioeconomic status in Cluster 2. Findings may contribute to establishing recommendations about the timing and duration of screen media usage in adolescents and appropriate sleep time needed to successfully meet the demands of school academics and

  4. The Quality of Academic Library Building Improvements Has a Positive Impact on Library Usage. A review of: Shill, Harold B. and Shawn Tonner. “Does the Building Still Matter? Usage Patterns in New, Expanded, and Renovated Libraries, 1995‐2002.” College & Research Libraries 65.2 (Mar.2004: 123-150.

    Directory of Open Access Journals (Sweden)

    Julie McKenna

    2006-09-01

    Full Text Available Objective – To measure the impact of academic library facility improvements on physical library usage. Design – The facility improvement data used for this study were previously collected through a 68-item Web survey for the companion article “Creating a Better Place: Physical Improvements in Academic Libraries, 1995-2002” (Shill and Tonner. The measurement of library usage was by exit gate counts before and after library improvements. Setting – American academic libraries in which: facility improvement projects were completed between 1995 and 2002, the project space was not smaller than 20,000 square feet, the project space did not include off‐site storage or non-public space, and gate-count statistics from before and after facility changes were available. Subjects – Ninety of 384 identified academic libraries were able to provide usable data on: exit gate count, total circulation, in-house collection use, and reference transaction data. Methods – The data collection was undertaken in 2003 for the companion study (Shill and Tonner. A population of 384 libraries potentially able to meet criteria for the study was gathered and each library was invited by e‐mail to complete a Web‐based survey. Through this initial contact, 357 libraries were confirmed as meeting the study criteria, and responses were received from 182 of those providing a 51% overall response rate. Respondents were asked about institutional characteristics (public or private, Carnegie classification, etc.; project specific features (year of completion, nature of project, etc.; nature and extent of changes (seating, wiring, HVAC, etc.; presence of non‐library services in the facility; collection arrangements; before and after quality changes in lighting, seating and a range of services (as assessed by the survey respondent; and before and after project completion gate count usage statistics. Respondents were asked a set of eleven questions each with a five

  5. Persona Usage in Software Development: Advantages and Obstacles

    DEFF Research Database (Denmark)

    Billestrup, Jane; Stage, Jan; Nielsen, Lene

    2014-01-01

    The Personas technique has been promoted as a strong tool for providing software developers with a better understanding of the prospective users of their software. This paper reports from a questionnaire survey regarding knowledge about Personas and their usage in software development companies....... The questionnaire survey was conducted in a limited geographical area to establish the extent of Personas usage within all companies in the chosen region and determine whether software development companies used Personas during the development process. Several issues were identified as reasons for either not using...... the technique or for poor application of it. The study showed that 55% of the respondents had never heard about Personas. Among those who had heard about the Personas technique, the following obstacles towards usage of the technique were identified: Lack of knowledge of the technique, lack of resources (time...

  6. Usage of industrial robots in nuclear power industry

    International Nuclear Information System (INIS)

    Matsuo, Yoshio; Hamada, Kenjiro

    1982-01-01

    Japan is now at the top level in the world in robot technology.Its application to nuclear power field is one of the most expected. However, their usage spreads over various types of nuclear power plants, their manufacture and operation, and other areas such as fuel reprocessing plants and reactor plant decommissioning. The robots as used for the operation of BWR nuclear power plants, already developed and under development, are described: features in the nuclear-power usage of robots, the robots used currently for automatic fuel exchange, the replacement of control rod drives and in-service inspection; the robots under development for travelling inspection device and the inspection of main steam-relief safety valves, future development of robots. By robot usage, necessary personnel, work period and radiation exposure can be greatly reduced, and safety and reliability are also raised. (Mori, K.)

  7. Student Empowerment Through Internet Usage

    DEFF Research Database (Denmark)

    Purushothaman, Aparna

    2011-01-01

    in a University in Southern India to empower the female students through Internet usage. The study was done to find out the problems the woman students faced in gaining access and using Internet and how they can be empowered through Internet usage. Future workshop was conducted to find out the problems...... and reflecting. The paper will explore the various cultural issues and explicate how the social context plays a major role in the use of Internet even if there is sufficient access. These issues will be addressed from an empowerment perspective. The paper ends by recommending the methods to be adopted for more......Information and Communication Technology (ICT) has been widely recognized as a tool for human development (UNDP 2001). The rate at which ICT are growing is changing the way knowledge is developed, acquired and delivered. (Tongia, et al. 2005) Internet is one of the Information & Communication...

  8. Dual band multi frequency rectangular patch microstrip antenna with flyswatter shaped slot for wireless systems

    International Nuclear Information System (INIS)

    Bhardwaj, Dheeraj; Saraswat, Shriti; Gulati, Gitansh; Shekhar, Snehanshu; Joshi, Kanika; Sharma, Komal

    2016-01-01

    In this paper a dual band planar antenna has been proposed for IEEE 802.16 Wi-MAX /IEEE 802.11 WLAN/4.9 GHz public safety applications. The antenna comprises a frequency bandwidth of 560MHz (3.37GHz-3.93GHz) for WLAN and WiMAX and 372MHz (4.82GHz-5.192GHz) for 4.9 GHz public safety applications and Radio astronomy services (4.8-4.94 GHz). The proposed antenna constitutes of a single microstrip patch reactively loaded with three identical steps positioned in a zig-zag manner towards the radiating edges of the patch. The coaxially fed patch antenna characteristics (radiation pattern, antenna gain, antenna directivity, current distribution, S_1_1) have been investigated. The antenna design is primarily focused on achieving a dual band operation.

  9. Dual band multi frequency rectangular patch microstrip antenna with flyswatter shaped slot for wireless systems

    Energy Technology Data Exchange (ETDEWEB)

    Bhardwaj, Dheeraj, E-mail: dbhardwaj.bit@gmail.com [Department of Physics, BIT-Mesra-Jaipur Campus, Jaipur 302017 (India); Saraswat, Shriti, E-mail: saraswat.srishti@gmail.com; Gulati, Gitansh, E-mail: gitanshgulati@gmail.com; Shekhar, Snehanshu, E-mail: snehanshushekhar.bit@gmail.com; Joshi, Kanika, E-mail: kanika.karesh@gmail.com [Department of Electronics & Communication, BIT-Mesra-Jaipur Campus, Jaipur 302017 (India); Sharma, Komal, E-mail: kbhardwaj18@gmail.com [Department of Physics, Swami Keshvanand Institute of Technology, Jaipur 302017 (India)

    2016-03-09

    In this paper a dual band planar antenna has been proposed for IEEE 802.16 Wi-MAX /IEEE 802.11 WLAN/4.9 GHz public safety applications. The antenna comprises a frequency bandwidth of 560MHz (3.37GHz-3.93GHz) for WLAN and WiMAX and 372MHz (4.82GHz-5.192GHz) for 4.9 GHz public safety applications and Radio astronomy services (4.8-4.94 GHz). The proposed antenna constitutes of a single microstrip patch reactively loaded with three identical steps positioned in a zig-zag manner towards the radiating edges of the patch. The coaxially fed patch antenna characteristics (radiation pattern, antenna gain, antenna directivity, current distribution, S{sub 11}) have been investigated. The antenna design is primarily focused on achieving a dual band operation.

  10. Dual band multi frequency rectangular patch microstrip antenna with flyswatter shaped slot for wireless systems

    Science.gov (United States)

    Bhardwaj, Dheeraj; Saraswat, Shriti; Gulati, Gitansh; Shekhar, Snehanshu; Joshi, Kanika; Sharma, Komal

    2016-03-01

    In this paper a dual band planar antenna has been proposed for IEEE 802.16 Wi-MAX /IEEE 802.11 WLAN/4.9 GHz public safety applications. The antenna comprises a frequency bandwidth of 560MHz (3.37GHz-3.93GHz) for WLAN and WiMAX and 372MHz (4.82GHz-5.192GHz) for 4.9 GHz public safety applications and Radio astronomy services (4.8-4.94 GHz). The proposed antenna constitutes of a single microstrip patch reactively loaded with three identical steps positioned in a zig-zag manner towards the radiating edges of the patch. The coaxially fed patch antenna characteristics (radiation pattern, antenna gain, antenna directivity, current distribution, S11) have been investigated. The antenna design is primarily focused on achieving a dual band operation.

  11. A Factor Analytic Study of the Internet Usage Scale

    Science.gov (United States)

    Monetti, David M.; Whatley, Mark A.; Hinkle, Kerry T.; Cunningham, Kerry T.; Breneiser, Jennifer E.; Kisling, Rhea

    2011-01-01

    This study developed an Internet Usage Scale (IUS) for use with adolescent populations. The IUS is a 26-item scale that measures participants' beliefs about how their Internet usage impacts their behavior. The sample for this study consisted of 947 middle school students. An exploratory factor analysis with varimax rotation was conducted on the…

  12. A task-based usage strategy for control centre wall displays

    International Nuclear Information System (INIS)

    Davey, E.

    2005-01-01

    This paper summarizes the findings from an exploratory definition of a usage strategy for multiple control centre wall displays in CANDU nuclear power plants. Wall displays are defined as large sized, vertically oriented display surfaces that may be positioned in various locations about a control room to support user information needs. The paper begins by discussing the need for a usage strategy for all control room information resources, and then reviews the history in wall display implementation and usage in nuclear power plant control rooms. The balance of the paper discusses the approach used in characterization and review of control room task information needs and definition of a wall display usage strategy. The paper concludes by outlining some of the possible impacts on future control room design and operations that the introduction of wall displays may imply. (author)

  13. ICT USAGE BY DISTANCE LEARNERS IN INDIA

    Directory of Open Access Journals (Sweden)

    Ashish Kumar AWADHIYA

    2014-07-01

    Full Text Available Open Universities across the world are embracing ICT based teaching and learning process to disseminate quality education to their learners spread across the globe. In India availability and access of ICT and learner characteristics are uneven and vary from state to state. Hence it is important to establish the facts about ICT access among learners, their ICT usage patterns and their readiness to use ICT for educational purpose. In view of this, a study was conducted with the objective to find out the access level of ICT among distance learners. The analysis indicates that maximum learners have desktop/laptops and most of them are accessing internet very frequently from their home. The analysis also indicates that maximum respondents are browsing social networking sites followed by educational and e-mail service providing websites. Findings suggest that there is a need to generate ICT based tutorials complemented with social networking tools and mobile applications. Study also shows that learners are equipped with mobile phones and they are browsing internet through it and also availing support services offered by the university. Hence possibility of integrating mobile phone services may be used for providing learner support services and content delivery.

  14. Modelling of word usage frequency dynamics using artificial neural network

    International Nuclear Information System (INIS)

    Maslennikova, Yu S; Bochkarev, V V; Voloskov, D S

    2014-01-01

    In this paper the method for modelling of word usage frequency time series is proposed. An artificial feedforward neural network was used to predict word usage frequencies. The neural network was trained using the maximum likelihood criterion. The Google Books Ngram corpus was used for the analysis. This database provides a large amount of data on frequency of specific word forms for 7 languages. Statistical modelling of word usage frequency time series allows finding optimal fitting and filtering algorithm for subsequent lexicographic analysis and verification of frequency trend models

  15. Codification of Some Usage Cases of Lithuanian Language Cases and Prepositions

    Directory of Open Access Journals (Sweden)

    Vidas Valskys

    2013-12-01

    Full Text Available The present article is related to analysing several cases of the relationship between usage of cases and prepositions with the norms indicated in the syntax booklet “Language Advice”. The article is a discussion regarding some normative evaluation aspects regarding the usage of the preposition “greta” (next to having the meaning of exception (exclusion, usage of the adjectivised instrumental case in constructions with the verb “(pavirsti” (to turn, to become, to grow, to get and some cases of the postposition “dėka” (with the help of. Utmost attention is paid to discussion of (nonnormative evaluation of some constructions including usage of the said cases and prepositions that are doubtful in some aspects, their presentation in normative sources and further prospects related to further codification of the said cases. The article is based on vast empirical materials: examples from the “Corpus of the Contemporary Lithuanian”, the Internet and other texts related to contemporary usage.

  16. The Role of Wireless Computing Technology in the Design of Schools.

    Science.gov (United States)

    Nair, Prakash

    2003-01-01

    After briefly describing the educational advantages of wireless networks using mobile computers, discusses the technical, operational, financial aspects of wireless local area networks (WLAN). Provides examples of school facilities designed for the use of WLAN. Includes a glossary of WLAN-related terms. (Contains 12 references.)

  17. PATTERN OF MOBILE PHONE USE AND ITS EFFECT AMONG MEDICAL STUDENTS

    OpenAIRE

    Anju; Pooja; Satyendra Kumar

    2016-01-01

    BACKGROUND Mobile phone use has been tremendously increased in the last decades. Although mobile phone is used by large section of society, but awareness about its adverse effects has not increased in the same proportion. Hence, the present study was taken up to focus the pattern and effect of mobile phone usage amongst medical students. AIM To study the pattern of use of mobile phone and its effects. STUDY DESIGN A cross-sectional study was carried out at Rama Medical ...

  18. textbf{Historical Usage Inventories of DDT in China}

    Science.gov (United States)

    Qiang, Wang; Lijuan, Zhao; Jianxin, Hu

    2010-05-01

    Dichlorodiphenyltrichloroethane (DDT) is one of organochlorine pesticides and listed as one of the persistent organic pollutants to be reduced and finally eliminated in the Stockholm Convention on Persistent Organic Pollutants, because of its great persistence, toxics, bio-accumulation and potential for long-range transport. It is critical to create national DDT usage/emission inventories for China to carry out source-receptor relation analysis, risk assessment, and other research related to DDT in this country. Chinese inventories of DDT to the year1983 have been published; however, DDT is still being used indirectly in the dicifol producing and being applied for malaria control in case. Therefore it is needed to supplement and update the inventories. DDT production in China can be divided into three phases. Prior to 1965 is the first stage with an annual output of no more than 10,000 tons; 1966-1983 is the second phase. At this stage DDT was produced with an average annual production of 15,500 tons. After 1984 is the third production phase, of which the average annual DDT production was 6,465 tons. Before 1983, DDT was mainly used for agriculture, forestry and pesticides.China used a total of 270,000 tons of DDT during 1951 - 1983. According to China's cropland area, Li Yi-fan create China's DDT usage inventory of 1951-1983. In 1983 the State Council decided to ban DDT producing and DDT is no longer used in agriculture any more, but it is still being used in the producing of dicofol, malaria prevention and treatment anda small amount for export. To this end, this paper calculated theusage inventory of China's DDT from 1984 to 2003. Using sown areas of cotton, apple, citrus, tea and vegetable as surrogate data, usage of dicifolwas calculated, then the usage inventory of DDT resulting from dicofol use and DDT applied for malaria control with prefecture resolution was created. From 1984 to 2003, China used 15,312 tons of DDT, including 12,912 tons of DDT resulting

  19. Codon and amino acid usage in two major human pathogens of genus Bartonella--optimization between replicational-transcriptional selection, translational control and cost minimization.

    Science.gov (United States)

    Das, Sabyasachi; Paul, Sandip; Chatterjee, Sanjib; Dutta, Chitra

    2005-01-01

    Intra-genomic variation in synonymous codon and amino acid usage in two human pathogens Bartonella henselae and B. quintana has been carried out through multivariate analysis. Asymmetric mutational bias, coupled with replicational-transcriptional selection, has been identified as the prime selection force behind synonymous codon selection--a characteristic of the genus Bartonella, not exhibited by any other alpha-proteobacterial genome. Distinct codon usage patterns and low synonymous divergence values between orthologous sequences of highly expressed genes from the two Bartonella species indicate that there exists a residual intra-strand synonymous codon bias in the highly expressed genes, possibly operating at the level of translation. In the case of amino acid usage, the mean hydropathy level and aromaticity are the major sources of variation, both having nearly equal impact, while strand-specific mutational pressure and gene expressivity strongly influence the inter-strand variations. In both species under study, the highly expressed gene products tend not to contain heavy and/or aromatic residues, following the cost-minimization hypothesis in spite of their intracellular lifestyle. The codon and amino acid usage in these two human pathogens are, therefore, consequences of a complex balance between replicational-transcriptional selection, translational control, protein hydropathy and cost minimization.

  20. Usage based indicators to assess the impact of scholarly works: architecture and method

    Science.gov (United States)

    Bollen, Johan [Santa Fe, NM; Van De Sompel, Herbert [Santa Fe, NM

    2012-03-13

    Although recording of usage data is common in scholarly information services, its exploitation for the creation of value-added services remains limited due to concerns regarding, among others, user privacy, data validity, and the lack of accepted standards for the representation, sharing and aggregation of usage data. A technical, standards-based architecture for sharing usage information is presented. In this architecture, OpenURL-compliant linking servers aggregate usage information of a specific user community as it navigates the distributed information environment that it has access to. This usage information is made OAI-PMH harvestable so that usage information exposed by many linking servers can be aggregated to facilitate the creation of value-added services with a reach beyond that of a single community or a single information service.

  1. An analysis of the inter-relationship between savings product usage ...

    African Journals Online (AJOL)

    The article maintains that improved participation in the financial services industries seems to be dependent on satisfaction levels regarding financial services product usage. Empirical evidence shows that higher usage and higher satisfaction regarding basic savings products such as savings accounts, money market ...

  2. P-value based visualization of codon usage data

    Directory of Open Access Journals (Sweden)

    Fricke Wolfgang

    2006-06-01

    Full Text Available Abstract Two important and not yet solved problems in bacterial genome research are the identification of horizontally transferred genes and the prediction of gene expression levels. Both problems can be addressed by multivariate analysis of codon usage data. In particular dimensionality reduction methods for visualization of multivariate data have shown to be effective tools for codon usage analysis. We here propose a multidimensional scaling approach using a novel similarity measure for codon usage tables. Our probabilistic similarity measure is based on P-values derived from the well-known chi-square test for comparison of two distributions. Experimental results on four microbial genomes indicate that the new method is well-suited for the analysis of horizontal gene transfer and translational selection. As compared with the widely-used correspondence analysis, our method did not suffer from outlier sensitivity and showed a better clustering of putative alien genes in most cases.

  3. Patterns of Drug Use Among College Students. A Preliminary Report.

    Science.gov (United States)

    Mizner, George L.; And Others

    Initial data from a survey of drug usage among college students was presented. A large-scale effort was made to produce reliable figures on: (1) drug use patterns; (2) attitudes toward drug use; and (3) incidence of drug use among college students. Questionnaires were answered by 26,000 college students from the Denver-Boulder area, who were…

  4. Patterns of Mobile Technology Use in Teaching: The Teacher Perspective

    Science.gov (United States)

    Seifert, Tami

    2016-01-01

    The use of mobile learning spaces is an opportunity to break the boundaries of the classroom and to prepare teacher-educators and pre-service teachers for future school classes. The purpose of this study is to examine the implementation of mobile technology and usage patterns in the mobile technology space among lecturers in a teacher education…

  5. Local synteny and codon usage contribute to asymmetric sequence divergence of Saccharomyces cerevisiae gene duplicates

    Directory of Open Access Journals (Sweden)

    Bergthorsson Ulfar

    2011-09-01

    Full Text Available Abstract Background Duplicated genes frequently experience asymmetric rates of sequence evolution. Relaxed selective constraints and positive selection have both been invoked to explain the observation that one paralog within a gene-duplicate pair exhibits an accelerated rate of sequence evolution. In the majority of studies where asymmetric divergence has been established, there is no indication as to which gene copy, ancestral or derived, is evolving more rapidly. In this study we investigated the effect of local synteny (gene-neighborhood conservation and codon usage on the sequence evolution of gene duplicates in the S. cerevisiae genome. We further distinguish the gene duplicates into those that originated from a whole-genome duplication (WGD event (ohnologs versus small-scale duplications (SSD to determine if there exist any differences in their patterns of sequence evolution. Results For SSD pairs, the derived copy evolves faster than the ancestral copy. However, there is no relationship between rate asymmetry and synteny conservation (ancestral-like versus derived-like in ohnologs. mRNA abundance and optimal codon usage as measured by the CAI is lower in the derived SSD copies relative to ancestral paralogs. Moreover, in the case of ohnologs, the faster-evolving copy has lower CAI and lowered expression. Conclusions Together, these results suggest that relaxation of selection for codon usage and gene expression contribute to rate asymmetry in the evolution of duplicated genes and that in SSD pairs, the relaxation of selection stems from the loss of ancestral regulatory information in the derived copy.

  6. Creating context for the experiment record. User-defined metadata: investigations into metadata usage in the LabTrove ELN.

    Science.gov (United States)

    Willoughby, Cerys; Bird, Colin L; Coles, Simon J; Frey, Jeremy G

    2014-12-22

    The drive toward more transparency in research, the growing willingness to make data openly available, and the reuse of data to maximize the return on research investment all increase the importance of being able to find information and make links to the underlying data. The use of metadata in Electronic Laboratory Notebooks (ELNs) to curate experiment data is an essential ingredient for facilitating discovery. The University of Southampton has developed a Web browser-based ELN that enables users to add their own metadata to notebook entries. A survey of these notebooks was completed to assess user behavior and patterns of metadata usage within ELNs, while user perceptions and expectations were gathered through interviews and user-testing activities within the community. The findings indicate that while some groups are comfortable with metadata and are able to design a metadata structure that works effectively, many users are making little attempts to use it, thereby endangering their ability to recover data in the future. A survey of patterns of metadata use in these notebooks, together with feedback from the user community, indicated that while a few groups are comfortable with metadata and are able to design a metadata structure that works effectively, many users adopt a "minimum required" approach to metadata. To investigate whether the patterns of metadata use in LabTrove were unusual, a series of surveys were undertaken to investigate metadata usage in a variety of platforms supporting user-defined metadata. These surveys also provided the opportunity to investigate whether interface designs in these other environments might inform strategies for encouraging metadata creation and more effective use of metadata in LabTrove.

  7. Keep Them Engaged: Romanian County Inspectorates for Emergency Situations’ Facebook Usage for Disaster Risk Communication and Beyond

    Directory of Open Access Journals (Sweden)

    Monika Meltzer

    2018-05-01

    Full Text Available Nowadays, the use of social media by public institutions involved in disaster management is starting to become common practice. However, despite scientific interest in the effect of social media on disaster risk and crisis communication, data exploring emergency management agencies’ round-the-clock Facebook usage and the impact of their content and media choices on stakeholder engagement is limited. This study set out to investigate Romanian local emergency agencies’ Facebook usage patterns and stakeholders’ engagement with their content. The data is comprised of 7810 messages posted between the 1st January and 25th October 2017 by 32 County Inspectorates for Emergency Situations. First, using content analysis techniques, the topics of the posts were summarized to illustrate how these agencies use Facebook. Second, stakeholder engagement was investigated using social media marketing techniques. Third, messages related to natural hazards were analyzed in greater depth to reveal disaster risk communication patterns. The results suggest that Romanian emergency agencies mainly promote transparency and their institutional image on Facebook. Stakeholders were most likely to engage with brand-oriented posts, especially if these also offered rich multimedia feature. Meanwhile, stakeholders were less likely to interact with messages about natural hazards, particularly if they incorporated educational content. These observations suggest that, while at the moment Romanian local emergency management agencies take advantage of Facebook to create and maintain relationships with their stakeholders, they bypass opportunities to implement communication strategies for effective disaster risk reduction.

  8. A node linkage approach for sequential pattern mining.

    Directory of Open Access Journals (Sweden)

    Osvaldo Navarro

    Full Text Available Sequential Pattern Mining is a widely addressed problem in data mining, with applications such as analyzing Web usage, examining purchase behavior, and text mining, among others. Nevertheless, with the dramatic increase in data volume, the current approaches prove inefficient when dealing with large input datasets, a large number of different symbols and low minimum supports. In this paper, we propose a new sequential pattern mining algorithm, which follows a pattern-growth scheme to discover sequential patterns. Unlike most pattern growth algorithms, our approach does not build a data structure to represent the input dataset, but instead accesses the required sequences through pseudo-projection databases, achieving better runtime and reducing memory requirements. Our algorithm traverses the search space in a depth-first fashion and only preserves in memory a pattern node linkage and the pseudo-projections required for the branch being explored at the time. Experimental results show that our new approach, the Node Linkage Depth-First Traversal algorithm (NLDFT, has better performance and scalability in comparison with state of the art algorithms.

  9. Estimating Single and Multiple Target Locations Using K-Means Clustering with Radio Tomographic Imaging in Wireless Sensor Networks

    Science.gov (United States)

    2015-03-26

    clustering is an algorithm that has been used in data mining applications such as machine learning applications , pattern recognition, hyper-spectral imagery...42 3.7.2 Application of K-means Clustering . . . . . . . . . . . . . . . . . 42 3.8 Experiment Design...Tomographic Imaging WLAN Wireless Local Area Networks WSN Wireless Sensor Network xx ESTIMATING SINGLE AND MULTIPLE TARGET LOCATIONS USING K-MEANS CLUSTERING

  10. A New Look at Data Usage by Using Metadata Attributes as Indicators of Data Quality

    Science.gov (United States)

    Won, Y. I.; Wanchoo, L.; Behnke, J.

    2016-12-01

    NASA's Earth Observing System Data and Information System (EOSDIS) stores and distributes data from EOS satellites, as well as ancillary, airborne, in-situ, and socio-economic data. Twelve EOSDIS data centers support different scientific disciplines by providing products and services tailored to specific science communities. Although discipline oriented, these data centers provide common data management functions of ingest, archive and distribution, as well as documentation of their data and services on their web-sites. The Earth Science Data and Information System (ESDIS) Project collects these metrics from the EOSDIS data centers on a daily basis through a tool called the ESDIS Metrics System (EMS). These metrics are used in this study. The implementation of the Earthdata Login - formerly known as the User Registration System (URS) - across the various NASA data centers provides the EMS additional information about users obtaining data products from EOSDIS data centers. These additional user attributes collected by the Earthdata login, such as the user's primary area of study can augment the understanding of data usage, which in turn can help the EOSDIS program better understand the users' needs. This study will review the key metrics (users, distributed volume, and files) in multiple ways to gain an understanding of the significance of the metadata. Characterizing the usability of data by key metadata elements such as discipline and study area, will assist in understanding how the users have evolved over time. The data usage pattern based on version numbers may also provide some insight into the level of data quality. In addition, the data metrics by various services such as the Open-source Project for a Network Data Access Protocol (OPeNDAP), Web Map Service (WMS), Web Coverage Service (WCS), and subsets, will address how these services have extended the usage of data. Over-all, this study will present the usage of data and metadata by metrics analyses and will

  11. Influence of children pedestrian behaviour on pedestrian space usage

    Science.gov (United States)

    Makalew, F. P.; Adisasmita, S. A.; Wunas, S.; Hamid, S.

    2017-11-01

    School children pedestrian behaviour can be seen along their journey to and from school. Pedestrian spaces used by children are places available in urban and rural areas including streets with and without pedestrian pathways. Samples data are collected from 23 elementary schools in urban and rural areas in North Sulawesi, Indonesia in the form of video records and photos taken. The aim of this research is to analyse children pedestrian behaviour and its influence on the space usage on pedestrian areas. Method of analysis is a comparative study on urban and rural areas. Results of this research are types of behaviour, factors that influence the behaviour, physical condition of pedestrian areas and space usage by children. The behaviours are duck-line walking, running, playing, walking backward and walking with bare foot in which running is the main behaviour. These behaviours are influenced by factors including following friends and responding to acts. There are similarities and differences between pedestrian space usage in urban and rural areas. Space use by children pedestrian demonstrates the way pedestrian areas should be planned. Space usage by children pedestrian indicates that there is a need of evaluation of the space available considering pedestrian children behaviour.

  12. A PRACTICAL ONTOLOGY FOR THE LARGE-SCALE MODELING OF SCHOLARLY ARTIFACTS AND THEIR USAGE

    Energy Technology Data Exchange (ETDEWEB)

    RODRIGUEZ, MARKO A. [Los Alamos National Laboratory; BOLLEN, JOHAN [Los Alamos National Laboratory; VAN DE SOMPEL, HERBERT [Los Alamos National Laboratory

    2007-01-30

    The large-scale analysis of scholarly artifact usage is constrained primarily by current practices in usage data archiving, privacy issues concerned with the dissemination of usage data, and the lack of a practical ontology for modeling the usage domain. As a remedy to the third constraint, this article presents a scholarly ontology that was engineered to represent those classes for which large-scale bibliographic and usage data exists, supports usage research, and whose instantiation is scalable to the order of 50 million articles along with their associated artifacts (e.g. authors and journals) and an accompanying 1 billion usage events. The real world instantiation of the presented abstract ontology is a semantic network model of the scholarly community which lends the scholarly process to statistical analysis and computational support. They present the ontology, discuss its instantiation, and provide some example inference rules for calculating various scholarly artifact metrics.

  13. Context-Aware Usage-Based Grid Authorization Framework

    Institute of Scientific and Technical Information of China (English)

    CUI Yongquan; HONG Fan; FU Cai

    2006-01-01

    Due to inherent heterogeneity, multi-domain characteristic and highly dynamic nature, authorization is a critical concern in grid computing. This paper proposes a general authorization and access control architecture, grid usage control (GUCON), for grid computing. It's based on the next generation access control mechanism usage control (UCON) model. The GUCON Framework dynamic grants and adapts permission to the subject based on a set of contextual information collected from the system environments; while retaining the authorization by evaluating access requests based on subject attributes, object attributes and requests. In general, GUCON model provides very flexible approaches to adapt the dynamically security request. GUCON model is being implemented in our experiment prototype.

  14. Exposure caused by wireless technologies used for short-range indoor communication in homes and offices

    International Nuclear Information System (INIS)

    Schmid, G.; Lager, D.; Preiner, P.; Ueberbacher, R.; Cecil, S.

    2007-01-01

    In order to estimate typical radio frequency exposures from indoor used wireless communication technologies applied in homes and offices, WLAN, Bluetooth and Digital Enhanced Cordless Telecommunications systems, as well as baby surveillance devices and wireless headphones for indoor usage, have been investigated by measurements and numerical computations. Based on optimised measurement methods, field distributions and resulting exposure were assessed on selected products and real exposure scenarios. Additionally, generic scenarios have been investigated on the basis of numerical computations. The obtained results demonstrate that under usual conditions the resulting spatially (over body dimensions) averaged and 6-min time-averaged exposure for persons in the radio frequency fields of the considered applications is below ∼0.1% of the reference level for power density according to the International Commission on Non-Ionizing Radiation Protection (ICNIRP) guidelines published in 1998. Spatial and temporal peak values can be considerably higher by 2-3 orders of magnitude. In case of some transmitting devices operated in close proximity to the body (e.g. WLAN transmitters), local exposure can reach the same order of magnitude as the basic restriction; however, none of the devices considered in this study exceeded the limits according to the ICNIRP guidelines. (authors)

  15. Marriage Dot EU: The Effect of Internet Usage on Marriage Hazard

    OpenAIRE

    Mario Vozar

    2011-01-01

    The rapid growth of internet usage over the last two decades has been influencing many aspects of our life and most noticeably the ways in which people communicate with each other. Therefore, it is appropriate to ask whether the growth of internet usage influences individuals’ marital decisions in modern society. In my study, I concentrate on the effect of the growing internet usage on the gender and age-specific marriage hazard rate for the first time marriages in Europe. The panel data anal...

  16. Health insurance, neighborhood income, and emergency department usage by Utah children 1996–1998

    Directory of Open Access Journals (Sweden)

    Knight Stacey

    2005-04-01

    Full Text Available Abstract Background It is estimated that approximately half of emergency department (ED usage in the U.S. and other developed countries is for non-urgent conditions and that this usage is related to availability, social, and economic factors. We examined pediatric ED usage in a U.S. state with respect to income, health insurance status, types of medical conditions, and whether introduction of managed care affected utilization by Medicaid children. Methods Emergency department usage rates were calculated from 1996 through 1998 using Utah ED data for children with commercial health insurance, Medicaid, for uninsured children, and by income group estimating neighborhood household income from Zip code of residence. We analyzed usage following the July 1996 transition of Utah Medicaid to managed care. Results Children with Medicaid had approximately 50% greater ED utilization rates than children with commercial health insurance or uninsured children. The majority of usage for Medicaid and uninsured children was for non-traumatic conditions. Only 35% of total ED usage was for non-emergent or non-urgent conditions and this was related to both Medicaid and low household income. Children lacking health insurance were more likely to be discharged against medical advice (OR = 2.36, 95% C.I. 1.88–2.96. There was no reduction in Medicaid ED usage following the transition to managed care. Conclusion Usage of ED services is related to both health insurance status and income. Children lacking health insurance and Medicaid children have excessive usage for conditions which could be treated in a primary care setting. That managed care does not reduce Medicaid ED usage is consistent with findings of other studies.

  17. The impact of law and language as interactive patterns

    Directory of Open Access Journals (Sweden)

    Marina Kaishi

    2016-07-01

    Full Text Available Every country has adopted a certain law pattern. This has an impact on the language expression and the relevant adopted terminology. It can be tracked by examining and describing the lexical choices and the use of featuring structures, which form parallelisms in similar systems. Before proceeding with their linguistic description, it is necessary to explain the differences that exist between Greek-, French-, German-, Albanian law systems. It will be evident that they have some points in common, but at the same time they differ at a great extent in the way of conceptualizing the system. I shall use the Constitution as the basic law and a safe reference point for an explicit comparison. Terminology plays an important role in explaining these systems. The law & language are interactive patterns. We already have a European legal language, but it is time for a more coherent European wide legal language. The linguistic matters have a direct contact with judicial cases. Inside EU the usage of different languages is one of the main obstacles of the integration process. Then again according to EU it creates a specific problem for the European judges, translators and interpreters. So in order to achieve a co-usage of the language we need to develop a curriculum, in order to use a coherent terminology and linguistic patterns. To put a standard for the law language, used in the EU, we should follow a legal harmonization that is achieved through harmonized terminology inside EU. The right usage of the language and its terminology should be understood as a standardization process. Also European Union policy is of great importance because it informs us about language policy and how to deal with it. At last we must know that EU consists of 450 million people from different cultures and backgrounds. In this sense it can be said that EU is truly a multilingual institution that reinforces the ideal of a single community with different languages and different

  18. A privacy-preserving sharing method of electricity usage using self-organizing map

    Directory of Open Access Journals (Sweden)

    Yuichi Nakamura

    2018-03-01

    Full Text Available Smart meters for measuring electricity usage are expected in electricity usage management. Although the relevant power supplier stores the measured data, the data are worth sharing among power suppliers because the entire data of a city will be required to control the regional grid stability or demand–supply balance. Even though many techniques and methods of privacy-preserving data mining have been studied to share data while preserving data privacy, a study on sharing electricity usage data is still lacking. In this paper, we propose a sharing method of electricity usage while preserving data privacy using a self-organizing map. Keywords: Privacy preserving, Data sharing, Self-Organizing map

  19. Using travel socialization and underlying motivations to better understand motorcycle usage in Taiwan.

    Science.gov (United States)

    Chang, Hsin-Li; Lai, Chi-Yen

    2015-06-01

    This study introduces self-determination theory (SDT) to refine previous models of vehicle usage motivation. We add travel socialization theory regarding parental influence on vehicle usage to enhance previous structural models describing motorcycle usage behavior. Our newly developed model was empirically verified in a sample of 721 motorcycle users in Taiwan. In addition to instrumental, symbolic, and affective motivations, perceived parental attitudes (PPAs) towards motorcycle riding were found to have a significant effect on individuals' motorcycle use habits. Additionally, participants who perceived their parents to have more positive attitudes toward motorcycles were found to have more experience being chauffeured on motorcycles by their parents. Based on these results, we suggest means to confront the challenges brought on by the rapid growth of motorcycle usage, especially serious motorcycle traffic accidents. These results improve our understanding motorcycle usage in Taiwan and can be used by transportation professionals who are seeking solutions to the rapid growth of motorcycle usage. Copyright © 2015 Elsevier Ltd. All rights reserved.

  20. The Usage of E-Governance Applications by Higher Education Students

    Science.gov (United States)

    Öktem, M. Kemal; Demirhan, Kamil; Demirhan, Haydar

    2014-01-01

    This study aims to analyze the factors affecting the Internet usage of university students using e-governance applications. It is important to examine these factors to understand why the online citizen participation is not increasing as expected, while Information and Communication Technologies (ICT) usage is improving in governance. Governance is…