WorldWideScience

Sample records for zigbee-based mobile ad

  1. Mobile ad hoc networking

    CERN Document Server

    John Wiley & Sons

    2004-01-01

    "Assimilating the most up-to-date information on research and development activities in this rapidly growing area, Mobile Ad Hoc Networking covers physical, data link, network, and transport layers, as well as application, security, simulation, and power management issues in sensor, local area, personal, and mobile ad hoc networks. Each of the book's sixteen chapters has been written by a top expert and discusses in-depth the most important topics in the field. Mobile Ad Hoc Networking is an excellent reference and guide for professionals seeking an in-depth examination of topics that also provides a comprehensive overview of the current state-of-the-art."--Jacket.

  2. Queueing Models for Mobile Ad Hoc Networks

    NARCIS (Netherlands)

    de Haan, Roland

    2009-01-01

    This thesis presents models for the performance analysis of a recent communication paradigm: \\emph{mobile ad hoc networking}. The objective of mobile ad hoc networking is to provide wireless connectivity between stations in a highly dynamic environment. These dynamics are driven by the mobility of

  3. Model checking mobile ad hoc networks

    NARCIS (Netherlands)

    Ghassemi, Fatemeh; Fokkink, Wan

    2016-01-01

    Modeling arbitrary connectivity changes within mobile ad hoc networks (MANETs) makes application of automated formal verification challenging. We use constrained labeled transition systems as a semantic model to represent mobility. To model check MANET protocols with respect to the underlying

  4. Evolutionary algorithms for mobile ad hoc networks

    CERN Document Server

    Dorronsoro, Bernabé; Danoy, Grégoire; Pigné, Yoann; Bouvry, Pascal

    2014-01-01

    Describes how evolutionary algorithms (EAs) can be used to identify, model, and minimize day-to-day problems that arise for researchers in optimization and mobile networking. Mobile ad hoc networks (MANETs), vehicular networks (VANETs), sensor networks (SNs), and hybrid networks—each of these require a designer’s keen sense and knowledge of evolutionary algorithms in order to help with the common issues that plague professionals involved in optimization and mobile networking. This book introduces readers to both mobile ad hoc networks and evolutionary algorithms, presenting basic concepts as well as detailed descriptions of each. It demonstrates how metaheuristics and evolutionary algorithms (EAs) can be used to help provide low-cost operations in the optimization process—allowing designers to put some “intelligence” or sophistication into the design. It also offers efficient and accurate information on dissemination algorithms topology management, and mobility models to address challenges in the ...

  5. Modelling Mobility in Mobile AD-HOC Network Environments ...

    African Journals Online (AJOL)

    In the simulation of mobile ad-hoc networks (MANETs), the probability distribution governing the movement of nodes typically varies over time and converges to a steady state distribution, known as the stationary distribution. This paper presents and evaluates the stationary distribution for location, speed and pause time of a ...

  6. Spontaneous ad hoc mobile cloud computing network.

    Science.gov (United States)

    Lacuesta, Raquel; Lloret, Jaime; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes.

  7. A Novel Fuzzing Method for Zigbee Based on Finite State Machine

    OpenAIRE

    Baojiang Cui; Shurui Liang; Shilei Chen; Bing Zhao; Xiaobing Liang

    2014-01-01

    With the extensive application of Zigbee, some bodies of literature were devoted into finding the vulnerabilities of Zigbee by fuzzing. According to earlier test records, the majority of defects were exposed due to a series of testing cases. However, the context of malformed inputs is not taken account into the previous algorithms. In this paper, we propose a refined structure-based fuzzing algorithm for Zigbee based on FSM, FSM-fuzzing. Any malformed input in FSM-Fuzzing is injected to the t...

  8. Dynamic Mobile IP routers in ad hoc networks

    NARCIS (Netherlands)

    Kock, B.A.; Schmidt, J.R.

    2005-01-01

    This paper describes a concept combining mobile IP and ad hoc routing to create a robust mobile network. In this network all nodes are mobile and globally and locally reachable under the same IP address. Essential for implementing this network are the dynamic mobile IP routers. They act as gateways

  9. Internet-Based Mobile Ad Hoc Networking (Preprint)

    National Research Council Canada - National Science Library

    Corson, M. S; Macker, Joseph P; Cirincione, Gregory H

    1999-01-01

    Internet-based Mobile Ad Hoc Networking is an emerging technology that supports self-organizing, mobile networking infrastructures, and is one which appears well-suited for use in future commercial...

  10. Ad hoc mobile wireless networks principles, protocols, and applications

    CERN Document Server

    Sarkar, Subir Kumar

    2013-01-01

    The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of serv

  11. Ad hoc mobile wireless networks principles, protocols and applications

    CERN Document Server

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  12. Building Realistic Mobility Models for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Adrian Pullin

    2018-04-01

    Full Text Available A mobile ad hoc network (MANET is a self-configuring wireless network in which each node could act as a router, as well as a data source or sink. Its application areas include battlefields and vehicular and disaster areas. Many techniques applied to infrastructure-based networks are less effective in MANETs, with routing being a particular challenge. This paper presents a rigorous study into simulation techniques for evaluating routing solutions for MANETs with the aim of producing more realistic simulation models and thereby, more accurate protocol evaluations. MANET simulations require models that reflect the world in which the MANET is to operate. Much of the published research uses movement models, such as the random waypoint (RWP model, with arbitrary world sizes and node counts. This paper presents a technique for developing more realistic simulation models to test and evaluate MANET protocols. The technique is animation, which is applied to a realistic scenario to produce a model that accurately reflects the size and shape of the world, node count, movement patterns, and time period over which the MANET may operate. The animation technique has been used to develop a battlefield model based on established military tactics. Trace data has been used to build a model of maritime movements in the Irish Sea. Similar world models have been built using the random waypoint movement model for comparison. All models have been built using the ns-2 simulator. These models have been used to compare the performance of three routing protocols: dynamic source routing (DSR, destination-sequenced distance-vector routing (DSDV, and ad hoc n-demand distance vector routing (AODV. The findings reveal that protocol performance is dependent on the model used. In particular, it is shown that RWP models do not reflect the performance of these protocols under realistic circumstances, and protocol selection is subject to the scenario to which it is applied. To

  13. Source Authentication for Multicast in Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Ramachandran, Prabha

    2003-01-01

    Recent emergence and popularity of mobile ad hoc networks in a host of current-day applications has instigated a suite of research challenges, primarily in routing and security issues for such networks...

  14. Value Added Services and Adoption of Mobile Payments

    DEFF Research Database (Denmark)

    Augsburg, Christel; Hedman, Jonas

    2014-01-01

    In this paper, we investigate the role of Value Added Services (VAS) in consumers’ adoption of mobile payments. VAS are supplementary digital services offered in connection with mobile payments; in this study exemplified by receipts, loyalty cards, and coupons. A research model is derived from...... that intention to adopt mobile payments increases as VAS are introduced and that this increase comes from a positive change in Perceived Usefulness, compatibility, and Convenience....

  15. Mobile agents affect worm spreading in wireless ad hoc networks

    International Nuclear Information System (INIS)

    Huang, Zi-Gang; Sun, Jin-Tu; Wang, Ying-Hai; Wang, Sheng-Jun; Xu, Xin-Jian

    2009-01-01

    Considering the dynamic nature of portable computing devices with wireless communication capability, an extended model is introduced for worm spreading in the wireless ad hoc network, with a population of mobile agents in a planar distribution, starting from an initial infected seed. The effect of agents' mobility on worm spreading is investigated via extensive Monte Carlo simulations. The threshold behavior and the dynamics of worm epidemics in the wireless networks are greatly affected by both agents' mobility and spatial and temporal correlations. The medium access control mechanism for the wireless communication promotes the sensitivity of the spreading dynamics to agents' mobility

  16. A Clustering Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinke Huang

    2016-01-01

    Full Text Available The dynamic topology of a mobile ad hoc network poses a real challenge in the design of hierarchical routing protocol, which combines proactive with reactive routing protocols and takes advantages of both. And as an essential technique of hierarchical routing protocol, clustering of nodes provides an efficient method of establishing a hierarchical structure in mobile ad hoc networks. In this paper, we designed a novel clustering algorithm and a corresponding hierarchical routing protocol for large-scale mobile ad hoc networks. Each cluster is composed of a cluster head, several cluster gateway nodes, several cluster guest nodes, and other cluster members. The proposed routing protocol uses proactive protocol between nodes within individual clusters and reactive protocol between clusters. Simulation results show that the proposed clustering algorithm and hierarchical routing protocol provide superior performance with several advantages over existing clustering algorithm and routing protocol, respectively.

  17. Auto-configuration protocols in mobile ad hoc networks.

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity.

  18. Information Sharing Modalities for Mobile Ad-Hoc Networks

    Science.gov (United States)

    de Spindler, Alexandre; Grossniklaus, Michael; Lins, Christoph; Norrie, Moira C.

    Current mobile phone technologies have fostered the emergence of a new generation of mobile applications. Such applications allow users to interact and share information opportunistically when their mobile devices are in physical proximity or close to fixed installations. It has been shown how mobile applications such as collaborative filtering and location-based services can take advantage of ad-hoc connectivity to use physical proximity as a filter mechanism inherent to the application logic. We discuss the different modes of information sharing that arise in such settings based on the models of persistence and synchronisation. We present a platform that supports the development of applications that can exploit these modes of ad-hoc information sharing and, by means of an example, show how such an application can be realised based on the supported event model.

  19. Verification of mobile ad hoc networks : an algebraic approach

    NARCIS (Netherlands)

    Ghassemi, F.; Fokkink, W.J.; Movaghar, A.

    2011-01-01

    We introduced Computed Network Process Theory to reason about protocols for mobile ad hoc networks (MANETs). Here we explore the applicability of our framework in two regards: model checking and equational reasoning. The operational semantics of our framework is based on constrained labeled

  20. ON SECURE FULL DUPLEX COMMUNICATION IN MOBILE AD HOC NETWORK

    OpenAIRE

    S. C. Dutta; Sudha Singh; D. K. Singh

    2013-01-01

    This paper is to establish Ad Hoc network in mobile phones and start fully secured full duplex communication in any situation. This type of communication will be cost effective and it will be fastest way of communication in case of any server failure or server error.

  1. Collaboration Layer for Robots in Mobile Ad-hoc Networks

    DEFF Research Database (Denmark)

    Borch, Ole; Madsen, Per Printz; Broberg, Jacob Honor´e

    2009-01-01

    In many applications multiple robots in Mobile Ad-hoc Networks are required to collaborate in order to solve a task. This paper shows by proof of concept that a Collaboration Layer can be modelled and designed to handle the collaborative communication, which enables robots in small to medium size...

  2. Capacity, delay and mobility in wireless ad-hoc networks

    NARCIS (Netherlands)

    Bansal, N.; Liu, Z.

    2003-01-01

    Network throughput and packet delay are two important parameters in the design and the evaluation of routing protocols for ad-hoc networks. While mobility has been shown to increase the capacity of a network, it is not clear whether the delay can be kept low without trading off the throughput. We

  3. What Makes Consumers Recall Banner Ads in Mobile Applications

    Directory of Open Access Journals (Sweden)

    Mesut Çiçek

    2017-09-01

    Full Text Available The uses of mobile advertisements are increasing their popularity across the world. Companies can gather information about the mobile users based on their locations, lifestyle, and preferences via GPS, cookies and browsing history and embed highly personalized banner ads in mobile applications. However, in the literature there is hardly any work on the effectiveness of these highly personalized in-app banner ads. The aim of the study is to reveal which factors affect the effectiveness of in-app banner ads. An experimental study was designed and 209 subjects participated. The results of Ordinal Logistic Regression indicated that prior brand attitude and attitude towards application have a positive effect, while brand engagement with self-concept has a negative effect on the recall of in-app banner ads. Moreover, in-app banner ads are recalled more when they are located in landscape applications and positioned at the top part of the screen. This research provides some implications for future studies and practitioners.

  4. Innovative research of AD HOC network mobility model

    Science.gov (United States)

    Chen, Xin

    2017-08-01

    It is difficult for researchers of AD HOC network to conduct actual deployment during experimental stage as the network topology is changeable and location of nodes is unfixed. Thus simulation still remains the main research method of the network. Mobility model is an important component of AD HOC network simulation. It is used to describe the movement pattern of nodes in AD HOC network (including location and velocity, etc.) and decides the movement trail of nodes, playing as the abstraction of the movement modes of nodes. Therefore, mobility model which simulates node movement is an important foundation for simulation research. In AD HOC network research, mobility model shall reflect the movement law of nodes as truly as possible. In this paper, node generally refers to the wireless equipment people carry. The main research contents include how nodes avoid obstacles during movement process and the impacts of obstacles on the mutual relation among nodes, based on which a Node Self Avoiding Obstacle, i.e. NASO model is established in AD HOC network.

  5. Routing Protocol for Mobile Ad-hoc Wireless Networks

    Directory of Open Access Journals (Sweden)

    I. M. B. Nogales

    2007-09-01

    Full Text Available Bluetooth is a cutting-edge technology used for implementing wireless ad hoc networks. In order to provide an overall scheme for mobile ad hoc networks, this paper deals with scatternet topology formation and routing algorithm to form larger ad hoc wireless Networks. Scatternet topology starts by forming a robust network, which is less susceptible to the problems posed by node mobility. Mobile topology relies on the presence of free nodes that create multiple connections with the network and on their subsequently rejoining the network. Our routing protocol is a proactive routing protocol, which is tailor made for the Bluetooth ad hoc network. The connection establishment connects nodes in a structure that simplifies packet routing and scheduling. The design allows nodes to arrive and leave arbitrarily, incrementally building the topology and healing partitions when they occur. We present simulation results that show that the algorithm presents low formation latency and also generates an efficient topology for forwarding packets along ad-hoc wireless networks.

  6. Securing DSR with mobile agents in wireless ad hoc networks

    Directory of Open Access Journals (Sweden)

    Ahmed Abosamra

    2011-03-01

    Full Text Available Ad hoc wireless network consists of a set of wireless nodes communicating with each other without a pre-defined infrastructure. They communicate by forwarding packets which can reach wireless nodes that do not exist in the range of the direct radio transmission. Designing ad hoc network routing protocols is a challenging task because of its decentralized infrastructure which makes securing ad hoc networks more and more challenging. Dynamic Source Routing (DSR protocol is a popular routing protocol designed for use in wireless ad hoc networks. Mobile agent is a promising technology used in diverse fields of network applications. In this paper, we try to implement DSR using mobile agents for securing this type of wireless network. Hybrid encryption technique (symmetric key encryption/public key encryption is used to improve performance; where symmetric keys are used to encrypt routing data to authenticate and authorize node sending data, while, public keys are used for the exchange of symmetric keys between nodes. We found that DSR may be secured using mobile agents with competitive performance.

  7. Analysis of Pervasive Mobile Ad Hoc Routing Protocols

    Science.gov (United States)

    Qadri, Nadia N.; Liotta, Antonio

    Mobile ad hoc networks (MANETs) are a fundamental element of pervasive networks and therefore, of pervasive systems that truly support pervasive computing, where user can communicate anywhere, anytime and on-the-fly. In fact, future advances in pervasive computing rely on advancements in mobile communication, which includes both infrastructure-based wireless networks and non-infrastructure-based MANETs. MANETs introduce a new communication paradigm, which does not require a fixed infrastructure - they rely on wireless terminals for routing and transport services. Due to highly dynamic topology, absence of established infrastructure for centralized administration, bandwidth constrained wireless links, and limited resources in MANETs, it is challenging to design an efficient and reliable routing protocol. This chapter reviews the key studies carried out so far on the performance of mobile ad hoc routing protocols. We discuss performance issues and metrics required for the evaluation of ad hoc routing protocols. This leads to a survey of existing work, which captures the performance of ad hoc routing algorithms and their behaviour from different perspectives and highlights avenues for future research.

  8. Enhancing On-Demand Multicast Routing Protocols using Mobility Prediction in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Nermin Makhlouf

    2014-08-01

    Full Text Available A Mobile Ad hoc Network (MANET is a self-organizing wireless communication network in which mobile devices are based on no infrastructure like base stations or access points. Minimal configuration and quick deployment make ad hoc networks suitable for emergency situations like disaster recovery or military conflict. Since node mobility may cause links to be broken frequently, a very important issue for routing in MANETs is how to set reliable paths which can last as long as possible. To solve this problem, non-random behaviors for the mobility patterns that mobile users exhibit are exploited. This paper introduces a scheme to improve On-Demand Multicast Routing Protocol (ODMRP performances by using mobility prediction. 

  9. A framework for reactive optimization in mobile ad hoc networks

    DEFF Research Database (Denmark)

    McClary, Dan; Syrotiuk, Violet; Kulahci, Murat

    2008-01-01

    We present a framework to optimize the performance of a mobile ad hoc network over a wide range of operating conditions. It includes screening experiments to quantify the parameters and interactions among parameters influential to throughput. Profile-driven regression is applied to obtain a model....... The predictive accuracy of the model is monitored and used to update the model dynamically. The results indicate the framework may be useful for the optimization of dynamic systems of high dimension....

  10. Power control algorithms for mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Nuraj L. Pradhan

    2011-07-01

    We will also focus on an adaptive distributed power management (DISPOW algorithm as an example of the multi-parameter optimization approach which manages the transmit power of nodes in a wireless ad hoc network to preserve network connectivity and cooperatively reduce interference. We will show that the algorithm in a distributed manner builds a unique stable network topology tailored to its surrounding node density and propagation environment over random topologies in a dynamic mobile wireless channel.

  11. A Survey on Trust Management for Mobile Ad Hoc Networks

    Science.gov (United States)

    2011-11-01

    expects, trust is dangerous implying the possible betrayal of trust. In his comments on Lagerspetz’s book titled Trust: The Tacit Demand, Lahno [24...AODV Zouridaki et al. (2005 ) [79] (2006) [80] Secure routing Direct observation [79][80] Reputation by secondhand information [80] Packet dropping...areas of signal processing, wireless communications, sensor and mobile ad hoc networks. He is co-editor of the book Wireless Sensor Networks: Signal

  12. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  13. Classification and Evaluation of Mobility Metrics for Mobility Model Movement Patterns in Mobile Ad-Hoc Networks

    OpenAIRE

    Santosh Kumar S C Sharma Bhupendra Suman

    2011-01-01

    A mobile ad hoc network is collection of self configuring and adaption of wireless link between communicating devices (mobile devices) to form an arbitrary topology and multihop wireless connectivity without the use of existing infrastructure. It requires efficient dynamic routing protocol to determine the routes subsequent to a set of rules that enables two or more devices to communicate with each others. This paper basically classifies and evaluates the mobility metrics into two categories-...

  14. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    Science.gov (United States)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  15. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks.

    Science.gov (United States)

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV.

  16. Autonomous Power Control MAC Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available Battery energy limitation has become a performance bottleneck for mobile ad hoc networks. IEEE 802.11 has been adopted as the current standard MAC protocol for ad hoc networks. However, it was developed without considering energy efficiency. To solve this problem, many modifications on IEEE 802.11 to incorporate power control have been proposed in the literature. The main idea of these power control schemes is to use a maximum possible power level for transmitting RTS/CTS and the lowest acceptable power for sending DATA/ACK. However, these schemes may degrade network throughput and reduce the overall energy efficiency of the network. This paper proposes autonomous power control MAC protocol (APCMP, which allows mobile nodes dynamically adjusting power level for transmitting DATA/ACK according to the distances between the transmitter and its neighbors. In addition, the power level for transmitting RTS/CTS is also adjustable according to the power level for DATA/ACK packets. In this paper, the performance of APCMP protocol is evaluated by simulation and is compared with that of other protocols.

  17. Energy Efficient Probabilistic Broadcasting for Mobile Ad-Hoc Network

    Science.gov (United States)

    Kumar, Sumit; Mehfuz, Shabana

    2017-06-01

    In mobile ad-hoc network (MANETs) flooding method is used for broadcasting route request (RREQ) packet from one node to another node for route discovery. This is the simplest method of broadcasting of RREQ packets but it often results in broadcast storm problem, originating collisions and congestion of packets in the network. A probabilistic broadcasting is one of the widely used broadcasting scheme for route discovery in MANETs and provides solution for broadcasting storm problem. But it does not consider limited energy of the battery of the nodes. In this paper, a new energy efficient probabilistic broadcasting (EEPB) is proposed in which probability of broadcasting RREQs is calculated with respect to remaining energy of nodes. The analysis of simulation results clearly indicate that an EEPB route discovery scheme in ad-hoc on demand distance vector (AODV) can increase the network lifetime with a decrease in the average power consumption and RREQ packet overhead. It also decreases the number of dropped packets in the network, in comparison to other EEPB schemes like energy constraint gossip (ECG), energy aware gossip (EAG), energy based gossip (EBG) and network lifetime through energy efficient broadcast gossip (NEBG).

  18. On-Demand Routing in Multi-hop Wireless Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Maltz, David A

    2001-01-01

    .... Routing protocols used in ad hoc networks must automatically adjust to environments that can vary between the extremes of high mobility with low bandwidth, and low mobility with high bandwidth...

  19. Les Protocoles de routage dans les réseaux mobiles Ad Hoc ...

    African Journals Online (AJOL)

    Dans cet article nous présentons un état de l'art sur les protocoles de routage dans les réseaux mobiles Ad hoc. Mots clés : Réseaux mobiles ad hoc/, Protocoles de routage. Routing protocols in wireless mobile ad hoc networks. Abstract:The communication between users with handheld computers interconnected through ...

  20. A Dynamic Reputation Management System for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Eric Chiejina

    2015-04-01

    Full Text Available Nodes in mobile ad hoc networks (MANETs are mandated to utilize their limited energy resources in forwarding routing control and data packets for other nodes. Since a MANET lacks a centralized administration and control, a node may decide to act selfishly, either by refusing to respond to route requests from other nodes or deceitfully by responding to some route requests, but dropping the corresponding data packets that are presented for forwarding. A significant increase in the presence of these misbehaving nodes in a MANET can subsequently degrade network performance. In this paper, we propose a dynamic reputation management system for detecting and isolating misbehaving nodes in MANETs. Our model employs a novel direct monitoring technique to evaluate the reputation of a node in the network, which ensures that nodes that expend their energy in transmitting data and routing control packets for others are allowed to carry out their network activities while the misbehaving nodes are detected and isolated from the network. Simulation results show that our model is effective at curbing and mitigating the effects of misbehaving nodes in the network.

  1. Data management issues in mobile ad hoc networks.

    Science.gov (United States)

    Hara, Takahiro

    2017-01-01

    Research on mobile ad hoc networks (MANETs) has become a hot research topic since the middle 1990's. Over the first decade, most research focused on networking techniques, ignoring data management issues. We, however, realized early the importance of data management in MANETs, and have been conducting studies in this area for 15 years. In this review, we summarize some key technical issues related to data management in MANETs, and the studies we have done in addressing these issues, which include placement of data replicas, update management, and query processing with security management. The techniques proposed in our studies have been designed with deep considerations of MANET features including network partitioning, node participation/disappearance, limited network bandwidth, and energy efficiency. Our studies published in early 2000's have developed a new research field as data management in MANETs. Also, our recent studies are expected to be significant guidelines of new research directions. We conclude the review by discussing some future directions for research.

  2. Design of Zigbee-Based Wireless Sensor suitable for Radiation Detection and Monitoring

    International Nuclear Information System (INIS)

    Madian, A.A.

    2012-01-01

    This paper presents a design for a wireless sensor nuclear radiation monitoring and detection based on Zigbee. The system consists of transmitter and receiver modules. The wireless sensor installed at transmitter whiles the receiver processing data. The communication between Tx and Rx done through Zigbee module using the protocol of CSMA/CA. The Zigbee has the advantages of reliable, power-efficient, and low-latency communications between low-cost Tx/Rx.The wireless sensor implementation can easily be deployed to discover unusual or abnormal radioactivity. The sensors are convenient to be installed indoors or outdoors, as well as to be mounted on mobile equipment's. All wireless nuclear detection sensors are designed using micro controller and other integrated systems

  3. Sensor Sharing in Mobile Ad-Hoc Networks

    Science.gov (United States)

    Mitra, Pramita

    2013-01-01

    Today's modern mobile devices (such as smartphones and tablets) present great potential for growth of many novel, powerful, but also highly demanding applications. However, most mobile devices/users operate in isolation from one another, i.e., they are not aware of the presence of other devices in their proximity. There are numerous situations…

  4. Effects of Data Replication on Data Exfiltration in Mobile Ad Hoc Networks Utilizing Reactive Protocols

    Science.gov (United States)

    2015-03-01

    aerial vehicle VANET vehicular ad hoc network VoIP Voice over Internet Protocol VRR Virtual Ring Routing xiii EFFECTS OF DATA REPLICATION ON DATA...ad hoc networks in mobile ad hoc networks (MANETs), vehicular ad hoc networks (VANETs), and flying ad hoc net- works (FANETs). Much of the research...metric, such as capacity, congestion , power, or combinations thereof. Caro refers to two different types of ants, FANTs and BANTs which are analogous to

  5. FHWA White Paper on Mobile Ad Hoc Networks

    Science.gov (United States)

    2018-01-01

    Advanced next generation communications technologies offer the potential to greatly improve safety, system efficiency, and mobility across our Nations roadways. These new technologies and processes can address both traditionally difficult as well ...

  6. Simplified Multicast Forwarding in Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Macker, Joseph P; Dean, Justin; Chao, William

    2004-01-01

    ...) based upon flooding mechanisms. We present the design of a working experimental prototype and some initial performance results using the NRL mobile network emulation system and various optional flooding approaches within the design framework...

  7. Diabetes and Orientation and Mobility Training: An Added Challenge.

    Science.gov (United States)

    Kozel, B.

    1995-01-01

    Issues related to promoting orientation and mobility training for individuals with visual impairments and diabetes are discussed, including effects of insulin, hypoglycemia and hyperglycemia, the timing of training, complications to the feet, and fluctuations in vision. Major lifestyle changes required by diabetes are stressed. (Author/SW)

  8. Information Sharing Mechanism among Mobile Agents In Ad-hoc Network Environment and Its Applications

    Directory of Open Access Journals (Sweden)

    Kunio Umetsuji

    2004-12-01

    Full Text Available Mobile agents are programs that can move from one site to another in a network with their data and states. Mobile agents are expected to be an essential tool in pervasive computing. In multi platform environment, it is important to communicate with mobile agents only using their universal or logical name not using their physical locations. More, in an ad-hoc network environment, an agent can migrate autonomously and communicate with other agents on demand. It is difficult that mobile agent grasps the position information on other agents correctly each other, because mobile agent processes a task while moving a network successively. In order to realize on-demand mutual communication among mobile agents without any centralized servers, we propose a new information sharing mechanism within mobile agents. In this paper, we present a new information sharing mechanism within mobile agents. The method is a complete peer based and requires no agent servers to manage mobile agent locations. Therefore, a mobile agent can get another mobile agent, communicate with it and shares information stored in the agent without any knowledge of the location of the target mobile agent. The basic idea of the mechanism is an introduction of Agent Ring, Agent Chain and Shadow Agent. With this mechanism, each agent can communicate with other agents in a server-less environment, which is suitable for ad-hoc agent network and an agent system can manage agents search and communications efficiently.

  9. A Tool for Visualizing Mobile Ad-Hoc Network Topology Definitions Files

    National Research Council Canada - National Science Library

    Nguyen, Binh Q

    2006-01-01

    This report documents a research and development effort that the U.S. Army Research Laboratory conducted in FY05 in support of the building of an emulated tactical mobile ad hoc network (MANET) research test bed...

  10. Mobility Models for Next Generation Wireless Networks Ad Hoc, Vehicular and Mesh Networks

    CERN Document Server

    Santi, Paolo

    2012-01-01

    Mobility Models for Next Generation Wireless Networks: Ad Hoc, Vehicular and Mesh Networks provides the reader with an overview of mobility modelling, encompassing both theoretical and practical aspects related to the challenging mobility modelling task. It also: Provides up-to-date coverage of mobility models for next generation wireless networksOffers an in-depth discussion of the most representative mobility models for major next generation wireless network application scenarios, including WLAN/mesh networks, vehicular networks, wireless sensor networks, and

  11. Analysis and Enhancements of Leader Elections algorithms in Mobile Ad Hoc Networks

    OpenAIRE

    Shayeji, Mohammad H. Al; Al-Azmi, AbdulRahman R.; Al-Azmi, AbdulAziz R.; Samrajesh, M. D.

    2012-01-01

    Mobile Ad Hoc networks (MANET), distinct from traditional distributed systems, are dynamic and self-organizing networks. MANET requires a leader to coordinate and organize tasks. The challenge is to have the right election algorithm that chooses the right leader based on various factors in MANET. In this paper, we analyze four leader election algorithms used in mobile Ad Hoc Networks. Factors considered in our analysis are time complexity, message complexity, assumptions considered, fault tol...

  12. User-centred and context-aware identity management in mobile ad-hoc networks

    CERN Document Server

    Arabo, Abdullahi

    2013-01-01

    The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and provide services via networks connected in an ad-hoc manner. These have resulted in the proliferation of wireless technologies such as Mobile Ad-hoc Networks (MANets), which offer attractive solutions for services that need flexible setup as well as dynamic and low cost wireless connectivity. However, the growing trend outlined above also raises serious concerns over Identity Management (IM) du...

  13. Impact of mobility on the performance of relaying in ad hoc networks (Extended version)

    NARCIS (Netherlands)

    Al Hanbali, A.; Kherani, A.A.; Groenevelt, R.; Nain, P.; Altman, E.

    2007-01-01

    We consider a mobile ad hoc network consisting of three types of nodes: source, destination, and relay nodes. All the nodes are moving over a bounded region with possibly different mobility patterns. We introduce and study the notion of relay throughput, i.e. the maximum rate at which a node can

  14. Impact of Mobility on the Performance of Relaying in Ad Hoc Networks

    NARCIS (Netherlands)

    Al Hanbali, Ahmad; Kherani, A.A.; Groenevelt, R.; Nain, P.; Altman, E

    2006-01-01

    We consider a mobile ad hoc network consisting of three types of nodes: source, destination, and relay nodes. All the nodes are moving over a bounded region with possibly different mobility patterns. We introduce and study the notion of relay throughput, i.e. the maximum rate at which a node can

  15. Impact of mobility on the performance7 of relaying in ad hoc networks – Extended version

    NARCIS (Netherlands)

    Al Hanbali, Ahmad; Kherani, A.A.; Groenevelt, R.; Nain, P.; Altman, E

    2007-01-01

    We consider a mobile ad hoc network consisting of three types of nodes: source, destination, and relay nodes. All the nodes are moving over a bounded region with possibly different mobility patterns. We introduce and study the notion of relay throughput, i.e. the maximum rate at which a node can

  16. Ad-me: Intelligent Context-Sensitive Advertising within a Mobile Tourist Guide.

    OpenAIRE

    Hristova, Nataliya; O'Hare, G. M. P. (Greg M. P.)

    2001-01-01

    The mobile commerce sector is set to witness phenomenal growth. In particular context sensitive advertising will represent a high yield revenue stream. This paper introduces the Ad-me (Advertising for the mobile e-commerce user) system which proactively delivers advertisements to users. Within the context of a mobile tourist guide advertisements are presented relative to user location and perceived needs. It uses Global Positioning System (GPS) and embraces agent-oriented design p...

  17. Mobile ad hoc networking the cutting edge directions

    CERN Document Server

    Basagni, Stefano; Giordano, Silvia; Stojmenovic, Ivan

    2013-01-01

    ""An excellent book for those who are interested in learning the current status of research and development . . . [and] who want to get a comprehensive overview of the current state-of-the-art.""-E-Streams This book provides up-to-date information on research and development in the rapidly growing area of networks based on the multihop ad hoc networking paradigm. It reviews all classes of networks that have successfully adopted this paradigm, pointing out how they penetrated the mass market and sparked breakthrough research. Covering both physical issues and applica

  18. Mobile home automation-merging mobile value added services and home automation technologies

    OpenAIRE

    Rosendahl, Andreas; Hampe, Felix J.; Botterweck, Goetz

    2007-01-01

    non-peer-reviewed In this paper we study mobile home automation, a field that emerges from an integration of mobile application platforms and home automation technologies. In a conceptual introduction we first illustrate the need for such applications by introducing a two-dimensional conceptual model of mobility. Subsequently we suggest an architecture and discuss different options of how a user might access a mobile home automation service and the controlled devices. As another contrib...

  19. A Hybrid Energy Efficient Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Niranjan Kumar Ray

    2016-01-01

    Full Text Available We proposed an energy conservation technique called Location Based Topology Control with Sleep Scheduling for ad hoc networks. It uses the feature of both topology control approach and power management approach. Like the topology control approach, it attempts to reduce the transmission power of a node, which is determined from its neighborhood location information. A node goes to sleep state based on the traffic condition as that of power management approach. In the proposed scheme, a node goes to sleep state only when its absence does not create local partition in its neighborhood. We preformed extensive simulation to compare the proposed scheme with existing ones. Simulation results show that the energy consumption is lower with increase in the network lifetime and higher throughput in the proposed scheme.

  20. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Kai-Wen Hu

    2008-04-01

    Full Text Available With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  1. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Huang Chenn-Jung

    2008-01-01

    Full Text Available Abstract With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  2. Performance Analysis of Hierarchical Group Key Management Integrated with Adaptive Intrusion Detection in Mobile ad hoc Networks

    Science.gov (United States)

    2016-04-05

    applications in wireless networks such as military battlefields, emergency response, mobile commerce , online gaming, and collaborative work are based on the...www.elsevier.com/locate/peva Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc...Accepted 19 September 2010 Available online 26 September 2010 Keywords: Mobile ad hoc networks Intrusion detection Group communication systems Group

  3. ARSENAL: A Cross Layer Architecture for Secure Resilient Tactical Mobile AdHoc Networks

    Science.gov (United States)

    2016-01-21

    stations separated by 0.5 to 1 km can be coherently measured to a single mobile subscriber using LTE signaling. These are the first measurements of...undertake three parallel but inter-coupled tasks geared towards a) performing measurements via real deployments and enhancing our understanding of layer...dependencies and vulnerabilities in mobile ad hoc networks; these measurements will be on existing testbeds at The views, opinions and/or findings

  4. Clustering of Mobile Ad Hoc Networks: An Adaptive Broadcast Period Approach

    OpenAIRE

    Gavalas, Damianos; Pantziou, Grammati; Konstantopoulos, Charalampos; Mamalis, Basilis

    2011-01-01

    Organization, scalability and routing have been identified as key problems hindering viability and commercial success of mobile ad hoc networks. Clustering of mobile nodes among separate domains has been proposed as an efficient approach to address those issues. In this work, we introduce an efficient distributed clustering algorithm that uses both location and energy metrics for cluster formation. Our proposed solution mainly addresses cluster stability, manageability and energy efficiency i...

  5. Peer-to-peer over mobile ad hoc networks (Chapter 11)

    NARCIS (Netherlands)

    Qadri, N.N.; Liotta, A.; Pierre, S.

    2010-01-01

    In this chapter we review various approaches for the convergence of Peer-to-Peer (P2P) and Mobile Ad hoc Networks (MANETs), identifying strengths and weaknesses, and putting things in perspective. P2P and MANETs are among the most active research topics in pervasive computing. The convergence of P2P

  6. Specification and Validation of an Edge Router Discovery Protocol for Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Kristensen, Lars Michael; Jensen, Kurt

    2004-01-01

    We present an industrial project at Ericsson Telebit A/S where Coloured Petri Nets (CP-nets or CPNs) have been used for the design and specification of an edge router discovery protocol for mobile ad-hoc networks. The Edge Router Discovery Protocol (ERDP) supports an edge router in a stationary...

  7. Model-based prototyping of an interoperability protocol for mobile ad-hoc networks

    NARCIS (Netherlands)

    Kristensen, L.M.; Westergaard, M.; Norgaard, P.C.; Romijn, J.; Smith, G.; Pol, van de J.

    2005-01-01

    We present an industrial project conducted at Ericsson Danmark A/S, Telebit where formal methods in the form of Coloured Petri Nets (CP-nets or CPNs) have been used for the specification of an interoperability protocol for routing packets between fixed core networks and mobile ad-hoc networks. The

  8. BLESSED with Opportunistic Beacons: A Lightweight Data Dissemination Model for Smart Mobile Ad-Hoc Networks

    NARCIS (Netherlands)

    Türkes, Okan; Scholten, Johan; Havinga, Paul J.M.

    2015-01-01

    This paper introduces BLESSED, a universal opportunistic ad hoc networking model intended for smart mobile devices. It enables fast and lightweight data dissemination in wireless community networks through the complementary utilization of the IEEE 802.11 and Bluetooth Low Energy standards. As a

  9. Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks

    Science.gov (United States)

    2013-01-01

    high resiliency to malicious attacks and misbehaving nodes. Keywords—trust management; mobile ad hoc networks; QoS trust; social trust; trust...paper we address an importance issue of trust management protocol design for MANETs: trust bias minimization despite misbehaving nodes performing

  10. PNNI routing support for ad hoc mobile networking: The multilevel case

    Energy Technology Data Exchange (ETDEWEB)

    Martinez, L.; Sholander, P.; Tolendino, L.

    1998-01-01

    This contribution extends the Outside Nodal Hierarchy List (ONHL) procedures described in ATM Forum Contributions 97-0766 and 97-0933. These extensions allow multiple mobile networks to form either an ad hoc network or an extension of a fixed PNNI infrastructure. A previous contribution (97-1073) covered the simplest case where the top-most Logical Group Nodes (LGNs), in those mobile networks, all resided at the same level in a PNNI hierarchy. This contribution covers the more general case wherein those top-most LGNs may reside at different PNNI hierarchy levels. Both of the SNL contributions consider flat ad hoc network architectures in the sense that each mobile network always participates in the PNNI hierarchy at the pre-configured level of its top-most LGN.

  11. Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. Madhusudhanan

    2015-01-01

    Full Text Available In MANET multicasting, forward and backward secrecy result in increased packet drop rate owing to mobility. Frequent rekeying causes large message overhead which increases energy consumption and end-to-end delay. Particularly, the prevailing group key management techniques cause frequent mobility and disconnections. So there is a need to design a multicast key management technique to overcome these problems. In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. A multicast tree is constructed such that for every weak node, there is a strong parent node. A session key-based encryption technique is utilized to transmit a multicast data. The rekeying process is performed periodically by the initiator node. The rekeying interval is fixed depending on the node category so that this technique greatly minimizes the rekeying overhead. By simulation results, we show that our proposed approach reduces the packet drop rate and improves the data confidentiality.

  12. An Effective Approach for Mobile ad hoc Network via I-Watchdog Protocol

    Directory of Open Access Journals (Sweden)

    Nidhi Lal

    2014-12-01

    Full Text Available Mobile ad hoc network (MANET is now days become very famous due to their fixed infrastructure-less quality and dynamic nature. They contain a large number of nodes which are connected and communicated to each other in wireless nature. Mobile ad hoc network is a wireless technology that contains high mobility of nodes and does not depend on the background administrator for central authority, because they do not contain any infrastructure. Nodes of the MANET use radio wave for communication and having limited resources and limited computational power. The Topology of this network is changing very frequently because they are distributed in nature and self-configurable. Due to its wireless nature and lack of any central authority in the background, Mobile ad hoc networks are always vulnerable to some security issues and performance issues. The security imposes a huge impact on the performance of any network. Some of the security issues are black hole attack, flooding, wormhole attack etc. In this paper, we will discuss issues regarding low performance of Watchdog protocol used in the MANET and proposed an improved Watchdog mechanism, which is called by I-Watchdog protocol that overcomes the limitations of Watchdog protocol and gives high performance in terms of throughput, delay.

  13. Exploiting Mobile Ad Hoc Networking and Knowledge Generation to Achieve Ambient Intelligence

    Directory of Open Access Journals (Sweden)

    Anna Lekova

    2012-01-01

    Full Text Available Ambient Intelligence (AmI joins together the fields of ubiquitous computing and communications, context awareness, and intelligent user interfaces. Energy, fault-tolerance, and mobility are newly added dimensions of AmI. Within the context of AmI the concept of mobile ad hoc networks (MANETs for “anytime and anywhere” is likely to play larger roles in the future in which people are surrounded and supported by small context-aware, cooperative, and nonobtrusive devices that will aid our everyday life. The connection between knowledge generation and communication ad hoc networking is symbiotic—knowledge generation utilizes ad hoc networking to perform their communication needs, and MANETs will utilize the knowledge generation to enhance their network services. The contribution of the present study is a distributed evolving fuzzy modeling framework (EFMF to observe and categorize relationships and activities in the user and application level and based on that social context to take intelligent decisions about MANETs service management. EFMF employs unsupervised online one-pass fuzzy clustering method to recognize nodes' mobility context from social scenario traces and ubiquitously learn “friends” and “strangers” indirectly and anonymously.

  14. Improvement over the OLSR Routing Protocol in Mobile Ad Hoc Networks by Eliminating the Unnecessary Loops

    OpenAIRE

    Shahram Behzad; Reza Fotohi; Shahram Jamali

    2013-01-01

    Mobile ad hoc networks are type of wireless networks in which any kind of infrastructure is not used, i.e. there are no infrastructures such as routers or switches or anything else on the network that can be used to support the network structure and the nodes has mobility. The purpose of this paper is to provide a better quality of the package delivery rate and the throughput, that is in need of powerful routing protocol standards, which can guarantee delivering of the packages to destination...

  15. Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks

    Science.gov (United States)

    Alicherry, Mansoor; Keromytis, Angelos D.; Stavrou, Angelos

    Mobile Ad-hoc Networks (MANETs) are increasingly employed in tactical military and civil rapid-deployment networks, including emergency rescue operations and ad hoc disaster-relief networks. However, this flexibility of MANETs comes at a price, when compared to wired and base station-based wireless networks: MANETs are susceptible to both insider and outsider attacks. This is mainly because of the lack of a well-defined defense perimeter preventing the effective use of wired defenses including firewalls and intrusion detection systems.

  16. Cross-Layer Design Approach for Power Control in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    A. Sarfaraz Ahmed

    2015-03-01

    Full Text Available In mobile ad hoc networks, communication among mobile nodes occurs through wireless medium The design of ad hoc network protocol, generally based on a traditional “layered approach”, has been found ineffective to deal with receiving signal strength (RSS-related problems, affecting the physical layer, the network layer and transport layer. This paper proposes a design approach, deviating from the traditional network design, toward enhancing the cross-layer interaction among different layers, namely physical, MAC and network. The Cross-Layer design approach for Power control (CLPC would help to enhance the transmission power by averaging the RSS values and to find an effective route between the source and the destination. This cross-layer design approach was tested by simulation (NS2 simulator and its performance over AODV was found to be better.

  17. PERFORMANCE ANALYSIS OF DSR ROUTING PROTOCOL UNDER ENERGY BASED SELFISH ATTACK IN MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    T.V.P.Sundararajan

    2010-06-01

    Full Text Available Mobile Ad hoc Networks (MANETs rely on the cooperation of all participating nodes to provide the fundamental operations such as routing and data forwarding. However, due to the open structure and scarcely available battery-based energy, node misbehaviors may exist.[1]. One such routing misbehavior is that some selfish nodes will participate in the route discovery and maintenance processes but refuse to forward data packets. This paper pointed out Energy based selfish nodes (EBSN where these selfish nodes tend to use the network but do not cooperate, saving battery life for their own communications [2],[3]. We present a simulation study of the effects of Energy based selfish nodes (EBSN on DSR routing protocol and its impact over network performance in terms of throughput and delay of a mobile ad hoc network where a defined percentage of nodes were misbehaving.

  18. Effect of grain mobility on ionic conductivity of Ceria added YSZ electrolyte

    International Nuclear Information System (INIS)

    Gupta, Alka; Omar, Shobit; Balani, Kantesh

    2012-01-01

    In an effort to develop novel electrolyte materials, the present work explores the effect of grain boundary mobility on ionic conductivity of CeO 2 -YSZ electrolyte. For cubic zirconia in general, the higher the grain boundary mobility, the lower the activation energy for oxide ion migration and judicious doping can be an effective method for mobility control. The two main directions for fabricating 8 mol. % YSZs (8YSZ) with 0,5 and 10 wt % CeO 2 are being followed: (i) co doping by conventional sintering (CS, 1400 ℃, 4h holding, ∼98 % theoretical density), and (ii) nano composite approach by spark plasma sintering (SPS, 1200 ℃, 5 min holding, ∼96 % theoretical density). Phase analysis by XRD, indicates that CeO 2 forms the complete solid solution with YSZ when synthesized by CS and both solid solution and composite formation (seen as isolated ceria rich zones in YSZ matrix by EDS analysis via TEM) by SPS. The grain boundary mobility for CS samples of pure and 10%CeO 2 added YSZ are 6.69 x 10 -18 to 10.35 X 10 -18 m 3 /N/s respectively. While for SPS sintered samples of pure and 10% CeO 2 added YSZ the grain boundary mobility comes out to be ∼0.032 X 10 -18 to 0.039 X 10 18 m 3 /N/s respectively. Grain mobility does not show any marginal change with increasing ceria content, elicit that the defect concentration is nearly constant in 8YSZ and is insensitive to ceria content. Remarkable increase of grain mobility in the SPS samples is attributed to rapid grain coarsening in the nano-grains limited to shorter sintering times. As expected, grain mobility for longer-times average out the transient phase and lower the net grain mobility such as in CS samples. The enhanced mobility in CeO 2 -YSZ SPS sintered electrolytes must be due to lower cation migration energy (activation energy for oxide ion migration), promoting enhanced ionic conductivity. (author)

  19. Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions

    OpenAIRE

    Kainda , Ronald; Flechais , Ivan; Roscoe , A. W.

    2010-01-01

    International audience; Protocols for bootstrapping security in ad hoc mobile device interactions rely on users' ability to perform specific tasks such as transferring or comparing fingerprints of information between devices. The size of fingerprints depends on the level of technical security required by a given application but, at the same time, is limited by users' inability to deal with large amounts of data with high levels of accuracy. Large fingerprints provide high technical security b...

  20. Revenue-sharing analysis in the mobile value-added services

    Institute of Scientific and Technical Information of China (English)

    LIU Bing; TANG Shou-lian

    2006-01-01

    This article provides a framework e within which the revenue-sharing in mobile value-added services can be analyzed.It shows that the revenue-sharing ratio between a network operator and a content provider (CP) has no significant effect on prices, market shares or social welfare in the case of nonstandardization. This implies that the revenue-sharing ratio cannot be used as a policy variable.

  1. Energy-Efficient Cluster Based Routing Protocol in Mobile Ad Hoc Networks Using Network Coding

    OpenAIRE

    Srinivas Kanakala; Venugopal Reddy Ananthula; Prashanthi Vempaty

    2014-01-01

    In mobile ad hoc networks, all nodes are energy constrained. In such situations, it is important to reduce energy consumption. In this paper, we consider the issues of energy efficient communication in MANETs using network coding. Network coding is an effective method to improve the performance of wireless networks. COPE protocol implements network coding concept to reduce number of transmissions by mixing the packets at intermediate nodes. We incorporate COPE into cluster based routing proto...

  2. Context dependent off loading for cloudlet in mobile ad-hoc network

    Science.gov (United States)

    Bhatt, N.; Nadesh, R. K.; ArivuSelvan, K.

    2017-11-01

    Cloud Computing in Mobile Ad-hoc network is emerging part of research consideration as the demand and competency of mobile devices increased in last few years. To follow out operation within the remote cloud builds the postponement and influences the administration standard. To keep away from this trouble cloudlet is presented. Cloudlet gives identical support of the devices as cloud at low inactivity however at high transfer speed. Be that as it may, choice of a cloudlet for offloading calculation with flat energy is a noteworthy test if multiple cloud let is accessible adjacent. Here I proposed energy and bandwidth (Traffic overload for communication with cloud) aware cloudlet selection strategy based on the context dependency of the device location. It works on the basis of mobile device location and bandwidth availability of cloudlet. The cloudlet offloading and selection process using given solution is simulated in Cloud ~ Simulator.

  3. Distributed generation of shared RSA keys in mobile ad hoc networks

    Science.gov (United States)

    Liu, Yi-Liang; Huang, Qin; Shen, Ying

    2005-12-01

    Mobile Ad Hoc Networks is a totally new concept in which mobile nodes are able to communicate together over wireless links in an independent manner, independent of fixed physical infrastructure and centralized administrative infrastructure. However, the nature of Ad Hoc Networks makes them very vulnerable to security threats. Generation and distribution of shared keys for CA (Certification Authority) is challenging for security solution based on distributed PKI(Public-Key Infrastructure)/CA. The solutions that have been proposed in the literature and some related issues are discussed in this paper. The solution of a distributed generation of shared threshold RSA keys for CA is proposed in the present paper. During the process of creating an RSA private key share, every CA node only has its own private security. Distributed arithmetic is used to create the CA's private share locally, and that the requirement of centralized management institution is eliminated. Based on fully considering the Mobile Ad Hoc network's characteristic of self-organization, it avoids the security hidden trouble that comes by holding an all private security share of CA, with which the security and robustness of system is enhanced.

  4. A COMPREHENSIVE SURVEY ON DETECTING BLACK HOLE ATTACK IN MOBILE AD-HOC NETWORK (MANET

    Directory of Open Access Journals (Sweden)

    Pascal Maniriho

    2018-01-01

    Full Text Available The infrastructure-less nature and mobility of nodes in mobile ad-hoc network (MANET make it to be very susceptible to various attacks. Besides, owing to its flexibility and simplicity, there is no predefined time or permission set for nodes to leave or join the network and each node can act as a client or server.  Nevertheless, securing communication between nodes has become a challenging problem than in other types of network. Attacks in MANET range into different categories. Black hole attack is one of the attacks that has been addressed by many researchers in the recent years. It does occur when a harmful mobile node called black hole becomes a part of the network and tries to use its malicious behaviors by sending fake route reply packets (RREP for any received route request packets (RREQ. When these faked packets arrive to the source node, it does reply to them by sending data packet via the established route. Once the packets are received by the black hole, it drops them before reaching the destination.  Hence, preventing the source node from reaching the intended destination. In this paper, we present an overview of a wide range of techniques suggested in the literature for detecting and preventing black hole attacks in mobile ad hoc network. Additionally, the effect of each approach on the network performance is also presented.

  5. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    M. Isabel Vara

    2015-07-01

    Full Text Available Service discovery plays an important role in mobile ad hoc networks (MANETs. The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2. In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1. In order to advertise services, we have added a new type-length-value structure (TLV to the OLSRv2 protocol, called service discovery message (SDM, according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV protocol, in terms of service discovery ratio, service latency and network overhead.

  6. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks.

    Science.gov (United States)

    Vara, M Isabel; Campo, Celeste

    2015-07-20

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead.

  7. A communication theoretical analysis of FRET-based mobile ad hoc molecular nanonetworks.

    Science.gov (United States)

    Kuscu, Murat; Akan, Ozgur B

    2014-09-01

    Nanonetworks refer to a group of nanosized machines with very basic operational capabilities communicating to each other in order to accomplish more complex tasks such as in-body drug delivery, or chemical defense. Realizing reliable and high-rate communication between these nanomachines is a fundamental problem for the practicality of these nanonetworks. Recently, we have proposed a molecular communication method based on Förster Resonance Energy Transfer (FRET) which is a nonradiative excited state energy transfer phenomenon observed among fluorescent molecules, i.e., fluorophores. We have modeled the FRET-based communication channel considering the fluorophores as single-molecular immobile nanomachines, and shown its reliability at high rates, and practicality at the current stage of nanotechnology. In this study, for the first time in the literature, we investigate the network of mobile nanomachines communicating through FRET. We introduce two novel mobile molecular nanonetworks: FRET-based mobile molecular sensor/actor nanonetwork (FRET-MSAN) which is a distributed system of mobile fluorophores acting as sensor or actor node; and FRET-based mobile ad hoc molecular nanonetwork (FRET-MAMNET) which consists of fluorophore-based nanotransmitter, nanoreceivers and nanorelays. We model the single message propagation based on birth-death processes with continuous time Markov chains. We evaluate the performance of FRET-MSAN and FRET-MAMNET in terms of successful transmission probability and mean extinction time of the messages, system throughput, channel capacity and achievable communication rates.

  8. Design and implementation of an IEEE 802.15.4/ZigBee based star network for data acquisition and monitoring

    International Nuclear Information System (INIS)

    Guha, S.K.; Nabhiraj, P.Y.; Bhaumik, T.K.; Mallik, C.

    2012-01-01

    ZigBee based wireless technology is used to provide a low cost, low power, secured, PAN solution for monitoring of parameters from several distributed vacuum pumping modules installed in the SCC injection line. The parameters include module's pump RPM, input current and pressure reading of different vacuum gauges. The ZigBee stack is written in a simplified form so that each node can create a network and can join to any established network when powered on. End nodes can be replaced through a little modification in the firmware codes. End node consists of sensors, signal conditioning circuits, microcontroller and ZigBee Transceiver whereas the Central node consists of microcontroller, Transceiver and UART interface. This paper highlights the future approach of utilizing this network for data acquisition related with environmental temperature, relative humidity, noise, water leakage from inaccessible areas of Cyclotron Vault, Pit, Basement and ECR Highbay for the ease of maintenance also the development of an environment monitoring system powered by solar cells covering a wide area. (author)

  9. Two-terminal reliability analyses for a mobile ad hoc wireless network

    International Nuclear Information System (INIS)

    Cook, Jason L.; Ramirez-Marquez, Jose Emmanuel

    2007-01-01

    Reliability is one of the most important performance measures for emerging technologies. For these systems, shortcomings are often overlooked in early releases as the cutting edge technology overshadows a fragile design. Currently, the proliferation of the mobile ad hoc wireless networks (MAWN) is moving from cutting edge to commodity and thus, reliable performance will be expected. Generally, ad hoc networking is applied for the flexibility and mobility it provides. As a result, military and first responders employ this network scheme and the reliability of the network becomes paramount. To ensure reliability is achieved, one must first be able to analyze and calculate the reliability of the MAWN. This work describes the unique attributes of the MAWN and how the classical analysis of network reliability, where the network configuration is known a priori, can be adjusted to model and analyze this type of network. The methods developed acknowledge the dynamic and scalable nature of the MAWN along with its absence of infrastructure. Thus, the methods rely on a modeling approach that considers the probabilistic formation of different network configurations in a MAWN. Hence, this paper proposes reliability analysis methods that consider the effect of node mobility and the continuous changes in the network's connectivity

  10. Integrated data lookup and replication scheme in mobile ad hoc networks

    Science.gov (United States)

    Chen, Kai; Nahrstedt, Klara

    2001-11-01

    Accessing remote data is a challenging task in mobile ad hoc networks. Two problems have to be solved: (1) how to learn about available data in the network; and (2) how to access desired data even when the original copy of the data is unreachable. In this paper, we develop an integrated data lookup and replication scheme to solve these problems. In our scheme, a group of mobile nodes collectively host a set of data to improve data accessibility for all members of the group. They exchange data availability information by broadcasting advertising (ad) messages to the group using an adaptive sending rate policy. The ad messages are used by other nodes to derive a local data lookup table, and to reduce data redundancy within a connected group. Our data replication scheme predicts group partitioning based on each node's current location and movement patterns, and replicates data to other partitions before partitioning occurs. Our simulations show that data availability information can quickly propagate throughout the network, and that the successful data access ratio of each node is significantly improved.

  11. Improving VANETs Connectivity with a Totally Ad Hoc Living Mobile Backbone

    Directory of Open Access Journals (Sweden)

    Joilson Alves Junior

    2015-01-01

    Full Text Available The vehicular ad hoc network (VANET for intelligent transportation systems is an emerging concept to improve transportation security, reliability, and management. The network behavior can be totally different in topological aspects because of the mobility of vehicular nodes. The topology can be fully connected when the flow of vehicles is high and may have low connectivity or be invalid when the flow of vehicles is low or unbalanced. In big cities, the metropolitan buses that travel on exclusive lanes may be used to set up a metropolitan vehicular data network (backbone, raising the connectivity among the vehicles. Therefore, this paper proposes the implementation of a living mobile backbone, totally ad hoc (MOB-NET, which will provide infrastructure and raise the network connectivity. In order to show the viability of MOB-NET, statistical analyses were made with real data of express buses that travel through exclusive lanes, besides evaluations through simulations and analytic models. The statistic, analytic, and simulation results prove that the buses that travel through exclusive lanes can be used to build a communication network totally ad hoc and provide connectivity in more than 99% of the time, besides raising the delivery rate up to 95%.

  12. Rollback recovery with low overhead for fault tolerance in mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Parmeet Kaur Jaggi

    2015-10-01

    Full Text Available Mobile ad hoc networks (MANETs have significantly enhanced the wireless networks by eliminating the need for any fixed infrastructure. Hence, these are increasingly being used for expanding the computing capacity of existing networks or for implementation of autonomous mobile computing Grids. However, the fragile nature of MANETs makes the constituent nodes susceptible to failures and the computing potential of these networks can be utilized only if they are fault tolerant. The technique of checkpointing based rollback recovery has been used effectively for fault tolerance in static and cellular mobile systems; yet, the implementation of existing protocols for MANETs is not straightforward. The paper presents a novel rollback recovery protocol for handling the failures of mobile nodes in a MANET using checkpointing and sender based message logging. The proposed protocol utilizes the routing protocol existing in the network for implementing a low overhead recovery mechanism. The presented recovery procedure at a node is completely domino-free and asynchronous. The protocol is resilient to the dynamic characteristics of the MANET; allowing a distributed application to be executed independently without access to any wired Grid or cellular network access points. We also present an algorithm to record a consistent global snapshot of the MANET.

  13. A DNA-Inspired Encryption Methodology for Secure, Mobile Ad Hoc Networks

    Science.gov (United States)

    Shaw, Harry

    2012-01-01

    Users are pushing for greater physical mobility with their network and Internet access. Mobile ad hoc networks (MANET) can provide an efficient mobile network architecture, but security is a key concern. A figure summarizes differences in the state of network security for MANET and fixed networks. MANETs require the ability to distinguish trusted peers, and tolerate the ingress/egress of nodes on an unscheduled basis. Because the networks by their very nature are mobile and self-organizing, use of a Public Key Infra structure (PKI), X.509 certificates, RSA, and nonce ex changes becomes problematic if the ideal of MANET is to be achieved. Molecular biology models such as DNA evolution can provide a basis for a proprietary security architecture that achieves high degrees of diffusion and confusion, and resistance to cryptanalysis. A proprietary encryption mechanism was developed that uses the principles of DNA replication and steganography (hidden word cryptography) for confidentiality and authentication. The foundation of the approach includes organization of coded words and messages using base pairs organized into genes, an expandable genome consisting of DNA-based chromosome keys, and a DNA-based message encoding, replication, and evolution and fitness. In evolutionary computing, a fitness algorithm determines whether candidate solutions, in this case encrypted messages, are sufficiently encrypted to be transmitted. The technology provides a mechanism for confidential electronic traffic over a MANET without a PKI for authenticating users.

  14. 移动Ad Hoc网络路由协议综述%A Survey of Routing Protocols for Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    张顺亮; 叶澄清; 李方敏

    2003-01-01

    A review of current research about routing protocols for mobile Ad Hoc networks is made. Based on classifying of them, the characteristic, the strength and the weakness of these protocols are evaluated respectively. Then some crucial strategies to improve the existing routing protocols are proposed. Besides, a frame of new routing protocol for Ad Hoc networks is put forward. Finally, open issues that still need investigation are listed.

  15. An enhanced performance through agent-based secure approach for mobile ad hoc networks

    Science.gov (United States)

    Bisen, Dhananjay; Sharma, Sanjeev

    2018-01-01

    This paper proposes an agent-based secure enhanced performance approach (AB-SEP) for mobile ad hoc network. In this approach, agent nodes are selected through optimal node reliability as a factor. This factor is calculated on the basis of node performance features such as degree difference, normalised distance value, energy level, mobility and optimal hello interval of node. After selection of agent nodes, a procedure of malicious behaviour detection is performed using fuzzy-based secure architecture (FBSA). To evaluate the performance of the proposed approach, comparative analysis is done with conventional schemes using performance parameters such as packet delivery ratio, throughput, total packet forwarding, network overhead, end-to-end delay and percentage of malicious detection.

  16. Secure neighborhood discovery: A fundamental element for mobile ad hoc networking

    DEFF Research Database (Denmark)

    Papadimitratos, P.; Poturalski, M.; Schaller, P.

    2008-01-01

    Pervasive computing systems will likely be deployed in the near future, with the proliferation of wireless devices and the emergence of ad hoc networking as key enablers. Coping with mobility and the volatility of wireless communications in such systems is critical. Neighborhood discovery (ND......) - the discovery of devices directly reachable for communication or in physical proximity - becomes a fundamental requirement and building block for various applications. However, the very nature of wireless mobile networks makes it easy to abuse ND and thereby compromise the overlying protocols and applications....... Thus, providing methods to mitigate this vulnerability and secure ND is crucial. In this article we focus on this problem and provide definitions of neighborhood types and ND protocol properties, as well as a broad classification of attacks. Our ND literature survey reveals that securing ND is indeed...

  17. PSO-Optimized Hopfield Neural Network-Based Multipath Routing for Mobile Ad-hoc Networks

    Directory of Open Access Journals (Sweden)

    Mansour Sheikhan

    2012-06-01

    Full Text Available Mobile ad-hoc network (MANET is a dynamic collection of mobile computers without the need for any existing infrastructure. Nodes in a MANET act as hosts and routers. Designing of robust routing algorithms for MANETs is a challenging task. Disjoint multipath routing protocols address this problem and increase the reliability, security and lifetime of network. However, selecting an optimal multipath is an NP-complete problem. In this paper, Hopfield neural network (HNN which its parameters are optimized by particle swarm optimization (PSO algorithm is proposed as multipath routing algorithm. Link expiration time (LET between each two nodes is used as the link reliability estimation metric. This approach can find either node-disjoint or link-disjoint paths in singlephase route discovery. Simulation results confirm that PSO-HNN routing algorithm has better performance as compared to backup path set selection algorithm (BPSA in terms of the path set reliability and number of paths in the set.

  18. An Opportunistic Routing for Data Forwarding Based on Vehicle Mobility Association in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Leilei Wang

    2017-11-01

    Full Text Available Vehicular ad hoc networks (VANETs have emerged as a new powerful technology for data transmission between vehicles. Efficient data transmission accompanied with low data delay plays an important role in selecting the ideal data forwarding path in VANETs. This paper proposes a new opportunity routing protocol for data forwarding based on vehicle mobility association (OVMA. With assistance from the vehicle mobility association, data can be forwarded without passing through many extra intermediate nodes. Besides, each vehicle carries the only replica information to record its associated vehicle information, so the routing decision can adapt to the vehicle densities. Simulation results show that the OVMA protocol can extend the network lifetime, improve the performance of data delivery ratio, and reduce the data delay and routing overhead when compared to the other well-known routing protocols.

  19. Modelling and Initial Validation of the DYMO Routing Protocol for Mobile Ad-Hoc Networks

    DEFF Research Database (Denmark)

    Espensen, Kristian Asbjørn Leth; Kjeldsen, Mads Keblov; Kristensen, Lars Michael

    2008-01-01

    A mobile ad-hoc network (MANET) is an infrastructureless network established by a set of mobile devices using wireless communication. The Dynamic MANET On-demand (DYMO) protocol is a routing protocol for multi-hop communication in MANETs currently under development by the Internet Engineering Task...... Force (IETF). This paper presents a Coloured Petri Net (CPN) model of the mandatory parts of the DYMO protocol, and shows how scenario-based state space exploration has been used to validate key properties of the protocol. Our CPN modelling and verification work has spanned two revisions of the DYMO...... protocol specification and have had direct impact on the most recent version of the protocol specification....

  20. Link reliability based hybrid routing for tactical mobile ad hoc network

    Institute of Scientific and Technical Information of China (English)

    Xie Xiaochuan; Wei Gang; Wu Keping; Wang Gang; Jia Shilou

    2008-01-01

    Tactical mobile ad hoc network (MANET) is a collection of mobile nodes forming a temporary network,without the aid of pre-established network infrastructure. The routing protocol has a crucial impact on the networkperformance in battlefields. Link reliability based hybrid routing (LRHR) is proposed, which is a novel hybrid routing protocol, for tactical MANET. Contrary to the traditional single path routing strategy, multiple paths are established between a pair of source-destination nodes. In the hybrid routing strategy, the rate of topological change provides a natural mechanism for switching dynamically between table-driven and on-demand routing. The simulation results indicate that the performances of the protocol in packet delivery ratio, routing overhead, and average end-to-end delay are better than the conventional routing protocol.

  1. Reputation-Based Internet Protocol Security: A Multilayer Security Framework for Mobile Ad Hoc Networks

    Science.gov (United States)

    2010-09-01

    motivated research in behavior grading systems [56]. Peer-to-peer eCommerce appli- cations such as eBay, Amazon, uBid, and Yahoo have performed research that...Security in Mobile Ad Hoc Networks”. IEEE Security & Privacy , 72–75, 2008. 15. Chakeres, ID and EM Belding-Royer. “AODV Routing Protocol Implementa...Detection System”. Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy , 240–250. 1992. 21. Devore, J.L. and N.R. Farnum

  2. Performance Analysis of Mobile Ad Hoc Unmanned Aerial Vehicle Communication Networks with Directional Antennas

    Directory of Open Access Journals (Sweden)

    Abdel Ilah Alshbatat

    2010-01-01

    Full Text Available Unmanned aerial vehicles (UAVs have the potential of creating an ad hoc communication network in the air. Most UAVs used in communication networks are equipped with wireless transceivers using omnidirectional antennas. In this paper, we consider a collection of UAVs that communicate through wireless links as a mobile ad-hoc network using directional antennas. The network design goal is to maximize the throughput and minimize the end-to-end delay. In this respect, we propose a new medium access control protocol for a network of UAVs with directional antennas. We analyze the communication channel between the UAVs and the effect of aircraft attitude on the network performance. Using the optimized network engineering tool (OPNET, we compare our protocol with the IEEE 802.11 protocol for omnidirectional antennas. The simulation results show performance improvement in end-to-end delay as well as throughput.

  3. A LOOP-BASED APPROACH IN CLUSTERING AND ROUTING IN MOBILE AD HOC NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Li Yanping; Wang Xin; Xue Xiangyang; C.K. Toh

    2006-01-01

    Although clustering is a convenient framework to enable traffic control and service support in Mobile Ad hoc NETworks (MANETs), it is seldom adopted in practice due to the additional traffic overhead it leads to for the resource limited ad hoc network. In order to address this problem, we proposed a loop-based approach to combine clustering and routing. By employing loop topologies, topology information is disseminated with a loop instead of a single node, which provides better robustness, and the nature of a loop that there are two paths between each pair of nodes within a loop suggests smart route recovery strategy. Our approach is composed of setup procedure, regular procedure and recovery procedure to achieve clustering, routing and emergent route recovering.

  4. Enhanced Secure Trusted AODV (ESTA Protocol to Mitigate Blackhole Attack in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Dilraj Singh

    2015-09-01

    Full Text Available The self-organizing nature of the Mobile Ad hoc Networks (MANETs provide a communication channel anywhere, anytime without any pre-existing network infrastructure. However, it is exposed to various vulnerabilities that may be exploited by the malicious nodes. One such malicious behavior is introduced by blackhole nodes, which can be easily introduced in the network and, in turn, such nodes try to crumble the working of the network by dropping the maximum data under transmission. In this paper, a new protocol is proposed which is based on the widely used Ad hoc On-Demand Distance Vector (AODV protocol, Enhanced Secure Trusted AODV (ESTA, which makes use of multiple paths along with use of trust and asymmetric cryptography to ensure data security. The results, based on NS-3 simulation, reveal that the proposed protocol is effectively able to counter the blackhole nodes in three different scenarios.

  5. Formal reconstruction of attack scenarios in mobile ad hoc and sensor networks

    Directory of Open Access Journals (Sweden)

    Rekhis Slim

    2011-01-01

    Full Text Available Abstract Several techniques of theoretical digital investigation are presented in the literature but most of them are unsuitable to cope with attacks in wireless networks, especially in Mobile Ad hoc and Sensor Networks (MASNets. In this article, we propose a formal approach for digital investigation of security attacks in wireless networks. We provide a model for describing attack scenarios in a wireless environment, and system and network evidence generated consequently. The use of formal approaches is motivated by the need to avoid ad hoc generation of results that impedes the accuracy of analysis and integrity of investigation. We develop an inference system that integrates the two types of evidence, handles incompleteness and duplication of information in them, and allows possible and provable actions and attack scenarios to be generated. To illustrate the proposal, we consider a case study dealing with the investigation of a remote buffer overflow attack.

  6. Illustration, detection and prevention of sleep deprivation anomaly in mobile ad hoc networks

    International Nuclear Information System (INIS)

    Nadeem, A.; Ahsan, K.; Sarim, M.

    2017-01-01

    MANETs (Mobile Ad Hoc Networks) have applications in various walks of life from rescue operations to battle field operations, personal and commercial. However, routing operations in MANETs are still vulnerable to anomalies and DoS (Denial of Service) attacks such as sleep deprivation. In SD (Sleep Deprivation) attack malicious node exploits the vulnerability in the route discovery function of the reactive routing protocol for example AODV (Ad Hoc On-Demand Distance Vector). In this paper, we first illustrate the SD anomaly in MANETs and then propose a SD detection and prevention algorithm which efficiently deals with this attack. We assess the performance of our proposed approach through simulation, evaluating its successfulness using different network scenarios. (author)

  7. An Automated Tool for the Creation of Desired Emulated Topologies of a Mobile Ad-Hoc Network

    National Research Council Canada - National Science Library

    Nguyen, Binh Q

    2006-01-01

    This report documents a research effort that the U.S. Army Research Laboratory conducted in FY 2005 in support of the development of advanced technologies for tactical mobile ad hoc networks (MANET...

  8. The added value of a gaming context and intelligent adaptation for a mobile application for vocabulary learning

    NARCIS (Netherlands)

    Sandberg, J.; Maris, M.; Hoogendoorn, P.

    2014-01-01

    Two groups participated in a study on the added value of a gaming context and intelligent adaptation for a mobile learning application. The control group worked at home for a fortnight with the original Mobile English Learning application (MEL-original) developed in a previous project. The

  9. An Agent-Based Approach To Nodes Misbehaviour Detection In Mobile Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Otor Samera U.

    2017-02-01

    Full Text Available Existing Misbehaviour Detection Systems in Mobile Ad-hoc Networks MANETs are challenged with routing overhead and high latency resulting from complexity and failure to isolate and block misbehaving nodes for the reason that it is difficult to detect them as they participate fully in route finding. In this work a Mobile Agent-Based Acknowledgement scheme MAACK was formulated to address this problem using an object oriented algorithm deployed to report misbehaving nodes to the source and destination by registering the Internet Protocol IP address of misbehaving nodes in their header. The scheme was simulated using Network Simulator-3 NS-3 and results benchmarked with an existing scheme the Enhanced Adaptive Acknowledgment EAACK using packet delivery ratio routing overhead and latency as performance metrics in the two scenarios. The results showed that the MAACK paradigm guaranteed a higher packet delivery ratio lower latency and routing overhead than the EAACK scheme. The model can be adapted by Ad-Hoc network protocol developers.

  10. Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization in Mobile Ad Hoc Networks.

    Science.gov (United States)

    Robinson, Y Harold; Rajaram, M

    2015-01-01

    Mobile ad hoc network (MANET) is a collection of autonomous mobile nodes forming an ad hoc network without fixed infrastructure. Dynamic topology property of MANET may degrade the performance of the network. However, multipath selection is a great challenging task to improve the network lifetime. We proposed an energy-aware multipath routing scheme based on particle swarm optimization (EMPSO) that uses continuous time recurrent neural network (CTRNN) to solve optimization problems. CTRNN finds the optimal loop-free paths to solve link disjoint paths in a MANET. The CTRNN is used as an optimum path selection technique that produces a set of optimal paths between source and destination. In CTRNN, particle swarm optimization (PSO) method is primly used for training the RNN. The proposed scheme uses the reliability measures such as transmission cost, energy factor, and the optimal traffic ratio between source and destination to increase routing performance. In this scheme, optimal loop-free paths can be found using PSO to seek better link quality nodes in route discovery phase. PSO optimizes a problem by iteratively trying to get a better solution with regard to a measure of quality. The proposed scheme discovers multiple loop-free paths by using PSO technique.

  11. Evaluation of mobile ad hoc network reliability using propagation-based link reliability model

    International Nuclear Information System (INIS)

    Padmavathy, N.; Chaturvedi, Sanjay K.

    2013-01-01

    A wireless mobile ad hoc network (MANET) is a collection of solely independent nodes (that can move randomly around the area of deployment) making the topology highly dynamic; nodes communicate with each other by forming a single hop/multi-hop network and maintain connectivity in decentralized manner. MANET is modelled using geometric random graphs rather than random graphs because the link existence in MANET is a function of the geometric distance between the nodes and the transmission range of the nodes. Among many factors that contribute to the MANET reliability, the reliability of these networks also depends on the robustness of the link between the mobile nodes of the network. Recently, the reliability of such networks has been evaluated for imperfect nodes (transceivers) with binary model of communication links based on the transmission range of the mobile nodes and the distance between them. However, in reality, the probability of successful communication decreases as the signal strength deteriorates due to noise, fading or interference effects even up to the nodes' transmission range. Hence, in this paper, using a propagation-based link reliability model rather than a binary-model with nodes following a known failure distribution to evaluate the network reliability (2TR m , ATR m and AoTR m ) of MANET through Monte Carlo Simulation is proposed. The method is illustrated with an application and some imperative results are also presented

  12. Approaches to Addressing Service Selection Ties in Ad Hoc Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Ayotuyi Tosin Akinola

    2018-01-01

    Full Text Available The ad hoc mobile cloud (AMC allows mobile devices to connect together through a wireless connection or any other means and send a request for web services from one to another within the mobile cloud. However, one of the major challenges in the AMC is the occurrence of dissatisfaction experienced by the users. This is because there are many services with similar functionalities but varying nonfunctional properties. Moreover, another resultant cause of user dissatisfaction being coupled with runtime redundancy is the attainment of similar quality computations during service selection, often referred to as “service selection ties.” In an attempt to address this challenge, service selection mechanisms for the AMC were developed in this work. This includes the use of selected quality of service properties coupled with user feedback data to determine the most suitable service. These mechanisms were evaluated using the experimental method. The evaluation of the mechanisms mainly focused on the metrics that evaluate the satisfaction of users' interest via the quantitative evaluation. The experiments affirmed that the use of the shortest distance can help to break selection ties between potential servicing nodes. Also, a continuous use of updated and unlimited range of users' assessments enhances an optimal service selection.

  13. Securing mobile ad hoc networks using danger theory-based artificial immune algorithm.

    Science.gov (United States)

    Abdelhaq, Maha; Alsaqour, Raed; Abdelhaq, Shawkat

    2015-01-01

    A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs.

  14. Analysis of DDoS Attack Effect and Protection Scheme in Wireless Mobile Ad-hoc Network

    OpenAIRE

    Ramratan Ahirwal; Leeladhar Mahour

    2012-01-01

    In Wireless mobile Ad Hoc Networks (MANET) every node functions as transmitter, router and data sink is network without infrastructure. Detecting malicious nodes in an open ad-hoc network in whichparticipating nodes have no previous security associations presents a number of challenges not faced by traditional wired networks. Traffic monitoring in wired networks is usually performed at switches,routers and gateways, but an ad-hoc network does not have these types of network elements where the...

  15. A Performance Evaluation Model for Mobile Ad Hoc Networks and Sensor Networks

    Directory of Open Access Journals (Sweden)

    Heng LUO

    2014-03-01

    Full Text Available Potential applications in areas such as military sites and disaster relief fields that are characterized by absence of prefixed infrastructure justify the development of mobile ad hoc networks (MANETs and wireless sensor networks (WSNs. However, unfavorable wireless links and dynamic topology are still challenging, leading to the proposal of a collection of routing protocols for MANETs and WSNs. Nevertheless the performance of algorithms may vary with deployment scenario due to the application dependent philosophy behind algorithms. In this paper, the performance evaluation problem for MANETs and WSNs is investigated and a novel performance ranking model, termed AHP-SAW, is proposed. For simplicity but without loss of generality, the performance of two routing protocols DSDV and DSR are studies based on which ranking results are provided. Extensive simulations show that an overall 37.2 %, at most, gain may be achieved based on the AHP-SAW model.

  16. A Protocol for Content-Based Communication in Disconnected Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Julien Haillot

    2010-01-01

    Full Text Available In content-based communication, information flows towards interested hosts rather than towards specifically set destinations. This new style of communication perfectly fits the needs of applications dedicated to information sharing, news distribution, service advertisement and discovery, etc. In this paper we address the problem of supporting content-based communication in partially or intermittently connected mobile ad hoc networks (MANETs. The protocol we designed leverages on the concepts of opportunistic networking and delay-tolerant networking in order to account for the absence of end-to-end connectivity in disconnected MANETs. The paper provides an overview of the protocol, as well as simulation results that show how this protocol can perform in realistic conditions.

  17. Probabilistic Modelling of Information Propagation in Wireless Mobile Ad-Hoc Network

    DEFF Research Database (Denmark)

    Schiøler, Henrik; Hansen, Martin Bøgsted; Schwefel, Hans-Peter

    2005-01-01

    In this paper the dynamics of broadcasting wireless ad-hoc networks is studied through probabilistic modelling. A randomized transmission discipline is assumed in accordance with existing MAC definitions such as WLAN with Decentralized Coordination or IEEE-802.15.4. Message reception is assumed...... to be governed by node power-down policies and is equivalently assumed to be randomized. Altogether randomization facilitates a probabilistic model in the shape of an integro-differential equation governing the propagation of information, where brownian node mobility may be accounted for by including an extra...... diffusion term. The established model is analyzed for transient behaviour and a travelling wave solution facilitates expressions for propagation speed as well as parametrized analysis of network reliability and node power consumption. Applications of the developed models for node localization and network...

  18. Construction of Pipelined Strategic Connected Dominating Set for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ceronmani Sharmila

    2016-06-01

    Full Text Available Efficient routing between nodes is the most important challenge in a Mobile Ad Hoc Network (MANET. A Connected Dominating Set (CDS acts as a virtual backbone for routing in a MANET. Hence, the construction of CDS based on the need and its application plays a vital role in the applications of MANET. The PipeLined Strategic CDS (PLS-CDS is constructed based on strategy, dynamic diameter and transmission range. The strategy used for selecting the starting node is, any source node in the network, which has its entire destination within a virtual pipelined coverage, instead of the node with maximum connectivity. The other nodes are then selected based on density and velocity. The proposed CDS also utilizes the energy of the nodes in the network in an optimized manner. Simulation results showed that the proposed algorithm is better in terms of size of the CDS and average hop per path length.

  19. A survey and taxonomy of distributed certificate authorities in mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Jabbehdari Sam

    2011-01-01

    Full Text Available Abstract Certificate authorities (CAs are the main components of PKI that enable us for providing basic security services in wired networks and Internet. But, we cannot use centralized CAs, in mobile ad hoc networks (MANETs. So, many efforts have been made to adapt CA to the special characteristics of MANETs and new concepts such as distributed CAs (DCAs have been proposed that distribute the functionality of CA between MANET nodes. In this article, we study various proposed DCA schemes for MANET and then classify these schemes according to their internal structures and techniques. Finally, we propose the characteristics of an ideal DCA system that can be used to verify the completeness of any DCA scheme. This classification and taxonomy identify the weakness and constraints of each scheme, and are very important for designing more secure, scalable, and high performance DCA systems for MANETs and other networks.

  20. AUTHENTICATION ARCHITECTURE USING THRESHOLD CRYPTOGRAPHY IN KERBEROS FOR MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Hadj Gharib

    2014-06-01

    Full Text Available The use of wireless technologies is gradually increasing and risks related to the use of these technologies are considerable. Due to their dynamically changing topology and open environment without a centralized policy control of a traditional network, a mobile ad hoc network (MANET is vulnerable to the presence of malicious nodes and attacks. The ideal solution to overcome a myriad of security concerns in MANET’s is the use of reliable authentication architecture. In this paper we propose a new key management scheme based on threshold cryptography in kerberos for MANET’s, the proposed scheme uses the elliptic curve cryptography method that consumes fewer resources well adapted to the wireless environment. Our approach shows a strength and effectiveness against attacks.

  1. Improved AODV route recovery in mobile ad-hoc networks using a genetic algorithm

    Directory of Open Access Journals (Sweden)

    Ahmad Maleki

    2014-09-01

    Full Text Available An important issue in ad-hoc on-demand distance vector (AODV routing protocols is route failure caused by node mobility in the MANETs. The AODV requires a new route discovery procedure whenever a route breaks and these frequent route discoveries increase transmission delays and routing overhead. The present study proposes a new method for AODVs using a genetic algorithm to improve the route recovery mechanism. When failure occurs in a route, the proposed method (GAAODV makes decisions regarding the QOS parameter to select source or local repair. The task of the genetic algorithm is to find an appropriate combination of weights to optimize end-to-end delay. This paper evaluates the metrics of routing overhead, average end-to-end delay, and packet delivery ratio. Comparison of the new algorithm and AODV (RFC 3561 using a NS-2 simulator shows that GAAODV obtains better results for the QOS parameters.

  2. Mobile Ad Hoc Networks in Bandwidth-Demanding Mission-Critical Applications: Practical Implementation Insights

    KAUST Repository

    Bader, Ahmed

    2016-09-28

    There has been recently a growing trend of using live video feeds in mission-critical applications. Real-time video streaming from front-end personnel or mobile agents is believed to substantially improve situational awareness in mission-critical operations such as disaster relief, law enforcement, and emergency response. Mobile Ad Hoc Networks (MANET) is a natural contender in such contexts. However, classical MANET routing schemes fall short in terms of scalability, bandwidth and latency; all three metrics being quite essential for mission-critical applications. As such, autonomous cooperative routing (ACR) has gained traction as the most viable MANET proposition. Nonetheless, ACR is also associated with a few implementation challenges. If they go unaddressed, will deem ACR practically useless. In this paper, efficient and low-complexity remedies to those issues are presented, analyzed, and validated. The validation is based on field experiments carried out using software-defined radio (SDR) platforms. Compared to classical MANET routing schemes, ACR was shown to offer up to 2X better throughput, more than 4X reduction in end-to-end latency, while observing a given target of transport rate normalized to energy consumption.

  3. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Michael D. Colagrosso

    2006-11-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  4. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Colagrosso Michael D

    2007-01-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  5. Mobile Ad Hoc Network Energy Cost Algorithm Based on Artificial Bee Colony

    Directory of Open Access Journals (Sweden)

    Mustafa Tareq

    2017-01-01

    Full Text Available A mobile ad hoc network (MANET is a collection of mobile nodes that dynamically form a temporary network without using any existing network infrastructure. MANET selects a path with minimal number of intermediate nodes to reach the destination node. As the distance between each node increases, the quantity of transmission power increases. The power level of nodes affects the simplicity with which a route is constituted between a couple of nodes. This study utilizes the swarm intelligence technique through the artificial bee colony (ABC algorithm to optimize the energy consumption in a dynamic source routing (DSR protocol in MANET. The proposed algorithm is called bee DSR (BEEDSR. The ABC algorithm is used to identify the optimal path from the source to the destination to overcome energy problems. The performance of the BEEDSR algorithm is compared with DSR and bee-inspired protocols (BeeIP. The comparison was conducted based on average energy consumption, average throughput, average end-to-end delay, routing overhead, and packet delivery ratio performance metrics, varying the node speed and packet size. The BEEDSR algorithm is superior in performance than other protocols in terms of energy conservation and delay degradation relating to node speed and packet size.

  6. Quality-of-Service Routing Using Path and Power Aware Techniques in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    R. Asokan

    2008-01-01

    Full Text Available Mobile ad hoc network (MANET is a collection of wireless mobile hosts dynamically forming a temporary network without the aid of any existing established infrastructure. Quality of service (QoS is a set of service requirements that needs to be met by the network while transporting a packet stream from a source to its destination. QoS support MANETs is a challenging task due to the dynamic topology and limited resources. The main objective of this paper is to enhance the QoS routing for MANET using temporally ordered routing algorithm (TORA with self-healing and optimized routing techniques (SHORT. SHORT improves routing optimality by monitoring routing paths continuously and redirecting the path whenever a shortcut path is available. In this paper, the performance comparison of TORA and TORA with SHORT has been analyzed using network simulator for various parameters. TORA with SHORT enhances performance of TORA in terms of throughput, packet loss, end-to-end delay, and energy.

  7. Cooperative Caching in Mobile Ad Hoc Networks Based on Data Utility

    Directory of Open Access Journals (Sweden)

    Narottam Chand

    2007-01-01

    Full Text Available Cooperative caching, which allows sharing and coordination of cached data among clients, is a potential technique to improve the data access performance and availability in mobile ad hoc networks. However, variable data sizes, frequent data updates, limited client resources, insufficient wireless bandwidth and client's mobility make cache management a challenge. In this paper, we propose a utility based cache replacement policy, least utility value (LUV, to improve the data availability and reduce the local cache miss ratio. LUV considers several factors that affect cache performance, namely access probability, distance between the requester and data source/cache, coherency and data size. A cooperative cache management strategy, Zone Cooperative (ZC, is developed that employs LUV as replacement policy. In ZC one-hop neighbors of a client form a cooperation zone since the cost for communication with them is low both in terms of energy consumption and message exchange. Simulation experiments have been conducted to evaluate the performance of LUV based ZC caching strategy. The simulation results show that, LUV replacement policy substantially outperforms the LRU policy.

  8. Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. Paramasivan

    2014-01-01

    Full Text Available Mobile ad hoc networks (MANETs are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  9. Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.

    Science.gov (United States)

    Paramasivan, B; Kaliappan, M

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  10. FRCA: A Fuzzy Relevance-Based Cluster Head Selection Algorithm for Wireless Mobile Ad-Hoc Sensor Networks

    Directory of Open Access Journals (Sweden)

    Taegwon Jeong

    2011-05-01

    Full Text Available Clustering is an important mechanism that efficiently provides information for mobile nodes and improves the processing capacity of routing, bandwidth allocation, and resource management and sharing. Clustering algorithms can be based on such criteria as the battery power of nodes, mobility, network size, distance, speed and direction. Above all, in order to achieve good clustering performance, overhead should be minimized, allowing mobile nodes to join and leave without perturbing the membership of the cluster while preserving current cluster structure as much as possible. This paper proposes a Fuzzy Relevance-based Cluster head selection Algorithm (FRCA to solve problems found in existing wireless mobile ad hoc sensor networks, such as the node distribution found in dynamic properties due to mobility and flat structures and disturbance of the cluster formation. The proposed mechanism uses fuzzy relevance to select the cluster head for clustering in wireless mobile ad hoc sensor networks. In the simulation implemented on the NS-2 simulator, the proposed FRCA is compared with algorithms such as the Cluster-based Routing Protocol (CBRP, the Weighted-based Adaptive Clustering Algorithm (WACA, and the Scenario-based Clustering Algorithm for Mobile ad hoc networks (SCAM. The simulation results showed that the proposed FRCA achieves better performance than that of the other existing mechanisms.

  11. FRCA: a fuzzy relevance-based cluster head selection algorithm for wireless mobile ad-hoc sensor networks.

    Science.gov (United States)

    Lee, Chongdeuk; Jeong, Taegwon

    2011-01-01

    Clustering is an important mechanism that efficiently provides information for mobile nodes and improves the processing capacity of routing, bandwidth allocation, and resource management and sharing. Clustering algorithms can be based on such criteria as the battery power of nodes, mobility, network size, distance, speed and direction. Above all, in order to achieve good clustering performance, overhead should be minimized, allowing mobile nodes to join and leave without perturbing the membership of the cluster while preserving current cluster structure as much as possible. This paper proposes a Fuzzy Relevance-based Cluster head selection Algorithm (FRCA) to solve problems found in existing wireless mobile ad hoc sensor networks, such as the node distribution found in dynamic properties due to mobility and flat structures and disturbance of the cluster formation. The proposed mechanism uses fuzzy relevance to select the cluster head for clustering in wireless mobile ad hoc sensor networks. In the simulation implemented on the NS-2 simulator, the proposed FRCA is compared with algorithms such as the Cluster-based Routing Protocol (CBRP), the Weighted-based Adaptive Clustering Algorithm (WACA), and the Scenario-based Clustering Algorithm for Mobile ad hoc networks (SCAM). The simulation results showed that the proposed FRCA achieves better performance than that of the other existing mechanisms.

  12. Unmanned Aerial ad Hoc Networks: Simulation-Based Evaluation of Entity Mobility Models’ Impact on Routing Performance

    Directory of Open Access Journals (Sweden)

    Jean-Daniel Medjo Me Biomo

    2015-06-01

    Full Text Available An unmanned aerial ad hoc network (UAANET is a special type of mobile ad hoc network (MANET. For these networks, researchers rely mostly on simulations to evaluate their proposed networking protocols. Hence, it is of great importance that the simulation environment of a UAANET replicates as much as possible the reality of UAVs. One major component of that environment is the movement pattern of the UAVs. This means that the mobility model used in simulations has to be thoroughly understood in terms of its impact on the performance of the network. In this paper, we investigate how mobility models affect the performance of UAANET in simulations in order to come up with conclusions/recommendations that provide a benchmark for future UAANET simulations. To that end, we first propose a few metrics to evaluate the mobility models. Then, we present five random entity mobility models that allow nodes to move almost freely and independently from one another and evaluate four carefully-chosen MANET/UAANET routing protocols: ad hoc on-demand distance vector (AODV, optimized link state routing (OLSR, reactive-geographic hybrid routing (RGR and geographic routing protocol (GRP. In addition, flooding is also evaluated. The results show a wide variation of the protocol performance over different mobility models. These performance differences can be explained by the mobility model characteristics, and we discuss these effects. The results of our analysis show that: (i the enhanced Gauss–Markov (EGM mobility model is best suited for UAANET; (ii OLSR, a table-driven proactive routing protocol, and GRP, a position-based geographic protocol, are the protocols most sensitive to the change of mobility models; (iii RGR, a reactive-geographic hybrid routing protocol, is best suited for UAANET.

  13. Two-terminal reliability of a mobile ad hoc network under the asymptotic spatial distribution of the random waypoint model

    International Nuclear Information System (INIS)

    Chen, Binchao; Phillips, Aaron; Matis, Timothy I.

    2012-01-01

    The random waypoint (RWP) mobility model is frequently used in describing the movement pattern of mobile users in a mobile ad hoc network (MANET). As the asymptotic spatial distribution of nodes under a RWP model exhibits central tendency, the two-terminal reliability of the MANET is investigated as a function of the source node location. In particular, analytical expressions for one and two hop connectivities are developed as well as an efficient simulation methodology for two-terminal reliability. A study is then performed to assess the effect of nodal density and network topology on network reliability.

  14. Investing in communities: evaluating the added value of community mobilization on HIV prevention outcomes among FSWs in India.

    Science.gov (United States)

    Kuhlmann, Anne Sebert; Galavotti, Christine; Hastings, Philip; Narayanan, Pradeep; Saggurti, Niranjan

    2014-04-01

    Community mobilization often requires greater time and resource investments than typical interventions, yet few evaluations exist to justify these investments. We evaluated the added benefit of community mobilization on HIV prevention outcomes among female sex workers (FSWs) using a composite measure of volunteer participation in program committees by FSWs. After adjusting for treatment propensity, we used multilevel structural equation modeling (MSEM) to test our program theory. We hypothesized that stronger community mobilization would be associated with increased levels of consistent condom use and with increased levels of perceived fairness, mediated by psychosocial processes. Community mobilization had an indirect effect on consistent condom use mediated through social cohesion and an indirect effect on perceived fairness mediated by collective efficacy. Our results suggest higher levels of community mobilization help improve condom use and reduce perceived discrimination beyond the effects of the core HIV intervention program. We recommend further testing of this model.

  15. VisitSense: Sensing Place Visit Patterns from Ambient Radio on Smartphones for Targeted Mobile Ads in Shopping Malls

    Directory of Open Access Journals (Sweden)

    Byoungjip Kim

    2015-07-01

    Full Text Available In this paper, we introduce a novel smartphone framework called VisitSense that automatically detects and predicts a smartphone user’s place visits from ambient radio to enable behavioral targeting for mobile ads in large shopping malls. VisitSense enables mobile app developers to adopt visit-pattern-aware mobile advertising for shopping mall visitors in their apps. It also benefits mobile users by allowing them to receive highly relevant mobile ads that are aware of their place visit patterns in shopping malls. To achieve the goal, VisitSense employs accurate visit detection and prediction methods. For accurate visit detection, we develop a change-based detection method to take into consideration the stability change of ambient radio and the mobility change of users. It performs well in large shopping malls where ambient radio is quite noisy and causes existing algorithms to easily fail. In addition, we proposed a causality-based visit prediction model to capture the causality in the sequential visit patterns for effective prediction. We have developed a VisitSense prototype system, and a visit-pattern-aware mobile advertising application that is based on it. Furthermore, we deploy the system in the COEX Mall, one of the largest shopping malls in Korea, and conduct diverse experiments to show the effectiveness of VisitSense.

  16. VisitSense: Sensing Place Visit Patterns from Ambient Radio on Smartphones for Targeted Mobile Ads in Shopping Malls.

    Science.gov (United States)

    Kim, Byoungjip; Kang, Seungwoo; Ha, Jin-Young; Song, Junehwa

    2015-07-16

    In this paper, we introduce a novel smartphone framework called VisitSense that automatically detects and predicts a smartphone user's place visits from ambient radio to enable behavioral targeting for mobile ads in large shopping malls. VisitSense enables mobile app developers to adopt visit-pattern-aware mobile advertising for shopping mall visitors in their apps. It also benefits mobile users by allowing them to receive highly relevant mobile ads that are aware of their place visit patterns in shopping malls. To achieve the goal, VisitSense employs accurate visit detection and prediction methods. For accurate visit detection, we develop a change-based detection method to take into consideration the stability change of ambient radio and the mobility change of users. It performs well in large shopping malls where ambient radio is quite noisy and causes existing algorithms to easily fail. In addition, we proposed a causality-based visit prediction model to capture the causality in the sequential visit patterns for effective prediction. We have developed a VisitSense prototype system, and a visit-pattern-aware mobile advertising application that is based on it. Furthermore, we deploy the system in the COEX Mall, one of the largest shopping malls in Korea, and conduct diverse experiments to show the effectiveness of VisitSense.

  17. VisitSense: Sensing Place Visit Patterns from Ambient Radio on Smartphones for Targeted Mobile Ads in Shopping Malls

    Science.gov (United States)

    Kim, Byoungjip; Kang, Seungwoo; Ha, Jin-Young; Song, Junehwa

    2015-01-01

    In this paper, we introduce a novel smartphone framework called VisitSense that automatically detects and predicts a smartphone user’s place visits from ambient radio to enable behavioral targeting for mobile ads in large shopping malls. VisitSense enables mobile app developers to adopt visit-pattern-aware mobile advertising for shopping mall visitors in their apps. It also benefits mobile users by allowing them to receive highly relevant mobile ads that are aware of their place visit patterns in shopping malls. To achieve the goal, VisitSense employs accurate visit detection and prediction methods. For accurate visit detection, we develop a change-based detection method to take into consideration the stability change of ambient radio and the mobility change of users. It performs well in large shopping malls where ambient radio is quite noisy and causes existing algorithms to easily fail. In addition, we proposed a causality-based visit prediction model to capture the causality in the sequential visit patterns for effective prediction. We have developed a VisitSense prototype system, and a visit-pattern-aware mobile advertising application that is based on it. Furthermore, we deploy the system in the COEX Mall, one of the largest shopping malls in Korea, and conduct diverse experiments to show the effectiveness of VisitSense. PMID:26193275

  18. A Bioinspired Adaptive Congestion-Avoidance Routing for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Huang Qiong

    2014-01-01

    Full Text Available Traditional mobile Ad Hoc network routing protocols are mainly based on the Shortest Path, which possibly results in many congestion nodes that incur routing instability and rerouting. To mitigate the side-efforts, this paper proposed a new bioinspired adaptive routing protocol (ATAR based on a mathematics biology model ARAS. This paper improved the ARAS by reducing the randomness and by introducing a new routing-decision metric “the next-hop fitness” which was denoted as the congestion level of node and the length of routing path. In the route maintenance, the nodes decide to forward the data to next node according to a threshold value of the fitness. In the recovery phase, the node will adopt random manner to select the neighbor as the next hop by calculation of the improved ARAS. With this route mechanism, the ATAR could adaptively circumvent the congestion nodes and the rerouting action is taken in advance. Theoretical analysis and numerical simulation results show that the ATAR protocol outperforms AODV and MARAS in terms of delivery ratio, ETE delay, and the complexity. In particular, ATAR can efficiently mitigate the congestion.

  19. A FSA Model for Performance Evaluation over Mobile Ad Hoc Networks with Low Traffic Volume

    Directory of Open Access Journals (Sweden)

    Heng LUO

    2014-07-01

    Full Text Available A Mobile Ad hoc network (MANET, which is composed of nodes that are able to move arbitrarily, differs from a direct connection network in the way that it is multi-hopping and self- organizing and thus able to operate without the help of prefixed infrastructures. However, problems such as unfavorable wireless links and dynamic topology are challenging, resulting in the proposal of a collection of routing protocols for MANETs. Nevertheless the performance of protocols may deteriorate dramatically as deployment scenario changes due to the application dependent philosophy behind algorithms. In this paper, the performance evaluation problem for MANETs and is explored and a novel performance ranking model, termed FSA, is proposed. For simplicity but without loss of generality, the performance of two routing protocols DSDV and DSR are studies. The FSA is able to rank the performance of DSDV and DSR depending on the average value and standard deviation results. Extensive simulations show that an overall 20.74 %, at most, gain may be achieved based on the FSA model.

  20. The congestion control algorithm based on queue management of each node in mobile ad hoc networks

    Science.gov (United States)

    Wei, Yifei; Chang, Lin; Wang, Yali; Wang, Gaoping

    2016-12-01

    This paper proposes an active queue management mechanism, considering the node's own ability and its importance in the network to set the queue threshold. As the network load increases, local congestion of mobile ad hoc network may lead to network performance degradation, hot node's energy consumption increase even failure. If small energy nodes congested because of forwarding data packets, then when it is used as the source node will cause a lot of packet loss. This paper proposes an active queue management mechanism, considering the node's own ability and its importance in the network to set the queue threshold. Controlling nodes buffer queue in different levels of congestion area probability by adjusting the upper limits and lower limits, thus nodes can adjust responsibility of forwarding data packets according to their own situation. The proposed algorithm will slow down the send rate hop by hop along the data package transmission direction from congestion node to source node so that to prevent further congestion from the source node. The simulation results show that, the algorithm can better play the data forwarding ability of strong nodes, protect the weak nodes, can effectively alleviate the network congestion situation.

  1. Multipath Activity Based Routing Protocol for Mobile ‎Cognitive Radio Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Shereen Omar

    2017-01-01

    Full Text Available Cognitive radio networks improve spectrum utilization by ‎sharing licensed spectrum with cognitive radio devices. In ‎cognitive radio ad hoc networks the routing protocol is one ‎of the most challenging tasks due to the changes in ‎frequency spectrum and the interrupted connectivity ‎caused by the primary user activity. In this paper, a multi‎path activity based routing protocol for cognitive radio ‎network (MACNRP is proposed. The protocol utilizes ‎channel availability and creates multiple node-disjoint ‎routes between the source and destination nodes. The ‎proposed protocol is compared with D2CARP and FTCRP ‎protocols. The performance evaluation is conducted ‎through mathematical analysis and using OPNET ‎simulation. The performance of the proposed protocol ‎achieves an increase in network throughput; besides it ‎decreases the probability of route failure due to node ‎mobility and primary user activity. We have found that the ‎MACNRP scheme results in 50% to 75% reduction in ‎blocking probability and 33% to 78% improvement in ‎network throughput, with a reasonable additional routing ‎overhead and average packet delay. Due to the successful ‎reduction of collision between primary users and ‎cognitive users, the MACNRP scheme results in decreasing ‎the path failure rate by 50% to 87%.‎

  2. ADDED VALUE-BASED APROACH TO ANALYZE ELECTRONIC COMMERCE AND MOBILE COMMERCE BUSINESS MODELS

    Directory of Open Access Journals (Sweden)

    Moritz Weizmann

    2004-03-01

    Full Text Available

    Se propone aplicar la teoría del valor informacional agregado (Theory of Informational Added Values, IAV al Electronic Commerce (EC y al Mobile Commerce (MC. El trabajo presentado es una propuesta para acercarse a modelos de negocio, con el foco de criterios típicos de evaluación para modelos de negocio de Internet y del MC. Es también conveniente para comparar modelos de negocio distintos y para poner el valor añadido para los participantes en un contexto. De esta manera, se establecen criterios objetivos que reducen la subjetividad y permiten hacer ciertas predicciones. El artículo termina con un análisis crítico del estado del arte y un comentario sobre las perspectivas futuras.

  3. A Family of ACO Routing Protocols for Mobile Ad Hoc Networks

    Science.gov (United States)

    Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-hoon

    2017-01-01

    In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads. PMID:28531159

  4. Delay-dependent asymptotic stability of mobile ad-hoc networks: A descriptor system approach

    International Nuclear Information System (INIS)

    Yang Juan; Yang Dan; Zhang Xiao-Hong; Huang Bin; Luo Jian-Lu

    2014-01-01

    In order to analyze the capacity stability of the time-varying-propagation and delay-dependent of mobile ad-hoc networks (MANETs), in this paper, a novel approach is proposed to explore the capacity asymptotic stability for the delay-dependent of MANETs based on non-cooperative game theory, where the delay-dependent conditions are explicitly taken into consideration. This approach is based on the Lyapunov—Krasovskii stability theory for functional differential equations and the linear matrix inequality (LMI) technique. A corresponding Lyapunov—Krasovskii functional is introduced for the stability analysis of this system with use of the descriptor and “neutral-type” model transformation without producing any additional dynamics. The delay-dependent stability criteria are derived for this system. Conditions are given in terms of linear matrix inequalities, and for the first time referred to neutral systems with the time-varying propagation and delay-dependent stability for capacity analysis of MANETs. The proposed criteria are less conservative since they are based on an equivalent model transformation. Furthermore, we also provide an effective and efficient iterative algorithm to solve the constrained stability control model. Simulation experiments have verified the effectiveness and efficiency of our algorithm. (general)

  5. Data delivery method based on neighbor nodes' information in a mobile ad hoc network.

    Science.gov (United States)

    Kashihara, Shigeru; Hayashi, Takuma; Taenaka, Yuzo; Okuda, Takeshi; Yamaguchi, Suguru

    2014-01-01

    This paper proposes a data delivery method based on neighbor nodes' information to achieve reliable communication in a mobile ad hoc network (MANET). In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE), Chachulski et al. (2007), improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow.

  6. Data Delivery Method Based on Neighbor Nodes’ Information in a Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Shigeru Kashihara

    2014-01-01

    Full Text Available This paper proposes a data delivery method based on neighbor nodes’ information to achieve reliable communication in a mobile ad hoc network (MANET. In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE, Chachulski et al. (2007, improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow.

  7. Energy-Efficient Cluster Based Routing Protocol in Mobile Ad Hoc Networks Using Network Coding

    Directory of Open Access Journals (Sweden)

    Srinivas Kanakala

    2014-01-01

    Full Text Available In mobile ad hoc networks, all nodes are energy constrained. In such situations, it is important to reduce energy consumption. In this paper, we consider the issues of energy efficient communication in MANETs using network coding. Network coding is an effective method to improve the performance of wireless networks. COPE protocol implements network coding concept to reduce number of transmissions by mixing the packets at intermediate nodes. We incorporate COPE into cluster based routing protocol to further reduce the energy consumption. The proposed energy-efficient coding-aware cluster based routing protocol (ECCRP scheme applies network coding at cluster heads to reduce number of transmissions. We also modify the queue management procedure of COPE protocol to further improve coding opportunities. We also use an energy efficient scheme while selecting the cluster head. It helps to increase the life time of the network. We evaluate the performance of proposed energy efficient cluster based protocol using simulation. Simulation results show that the proposed ECCRP algorithm reduces energy consumption and increases life time of the network.

  8. A Family of ACO Routing Protocols for Mobile Ad Hoc Networks.

    Science.gov (United States)

    Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-Hoon

    2017-05-22

    In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads.

  9. Modeling Consumer Adoption and Usage of Value-Added Mobile Services

    NARCIS (Netherlands)

    R. Prins (Remco)

    2008-01-01

    textabstractIn recent years, the mobile telecommunications market has been very dynamic in terms of innovations. Mobile service providers continuously invest in new technologies and introduce many new mobile services for consumers, such as MMS and web services. However, adoption rates are often not

  10. Adding navigation, artificial audition and vital sign monitoring capabilities to a telepresence mobile robot for remote home care applications.

    Science.gov (United States)

    Laniel, Sebastien; Letourneau, Dominic; Labbe, Mathieu; Grondin, Francois; Polgar, Janice; Michaud, Francois

    2017-07-01

    A telepresence mobile robot is a remote-controlled, wheeled device with wireless internet connectivity for bidirectional audio, video and data transmission. In health care, a telepresence robot could be used to have a clinician or a caregiver assist seniors in their homes without having to travel to these locations. Many mobile telepresence robotic platforms have recently been introduced on the market, bringing mobility to telecommunication and vital sign monitoring at reasonable costs. What is missing for making them effective remote telepresence systems for home care assistance are capabilities specifically needed to assist the remote operator in controlling the robot and perceiving the environment through the robot's sensors or, in other words, minimizing cognitive load and maximizing situation awareness. This paper describes our approach adding navigation, artificial audition and vital sign monitoring capabilities to a commercially available telepresence mobile robot. This requires the use of a robot control architecture to integrate the autonomous and teleoperation capabilities of the platform.

  11. IDMA: improving the defense against malicious attack for mobile ad hoc networks based on ARIP protocol

    Science.gov (United States)

    Peng, Chaorong; Chen, Chang Wen

    2008-04-01

    Malicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks (MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes. However, the defense against malicious attack can be improved when a new layer of network architecture can be developed to separate true IP address from disclosing to the malicious nodes. In this paper, we propose a new algorithm to improve the defense against malicious attack (IDMA) that is based on a recently developed Assignment Router Identify Protocol (ARIP) for the clustering-based MANET management. In the ARIP protocol, we design the ARIP architecture based on the new Identity instead of the vulnerable IP addresses to provide the required security that is embedded seamlessly into the overall network architecture. We make full use of ARIP's special property to monitor gateway forward packets by Reply Request Route Packets (RREP) without additional intrusion detection layer. We name this new algorithm IDMA because of its inherent capability to improve the defense against malicious attacks. Through IDMA, a watching algorithm can be established so as to counterattack the malicious node in the routing path when it unusually drops up packets. We provide analysis examples for IDMA for the defense against a malicious node that disrupts the route discovery by impersonating the destination, or by responding with state of corrupted routing information, or by disseminating forged control traffic. The IDMA algorithm is able to counterattack the malicious node in the cases when the node lunch DoS attack by broadcast a large number of route requests, or make Target traffic congestion by delivering huge mount of data; or spoof the IP addresses and send forge packets with a fake ID to the same Target causing traffic congestion at that destination. We have implemented IDMA algorism using the GloMoSim simulator and have demonstrated its performance under a variety of

  12. An authenticated encrypted routing protocol against attacks in mobile ad-hoc networks

    Directory of Open Access Journals (Sweden)

    C.C. Suma

    2017-01-01

    Full Text Available Mobile Ad hoc Network is stated as a cluster that contains Digital data terminals and they are furnished with the wireless transceivers which are able to communicate with each other with no need of any fixed architecture or concentrated authority. Security is one of the major issues in MANETs because of vast applications such as Military Battlefields, emergency and rescue operations[10]. In order to provide anonymous communications and to identify the malicious nodes in MANETs, many authors have proposed different secure routing protocols but each protocol have their own advantages and disadvantages. In MANTE’s each and every node in the communicating network functions like router and transmits the packets among the networking nodes for the purpose of communication[11]. Sometimes nodes may be attacked by the malicious nodes or the legitimate node will be caught by foemen there by controlling and preventing the nodes to perform the assigned task or nodes may be corrupted due to loss of energy. So, due to these drawbacks securing the network under the presence of adversaries is an important thing. The existing protocols were designed with keeping anonymity and the identification of vicious nodes in the network as the main goal. For providing better security, the anonymity factors such as Unidentifiability and Unlinkability must be fully satisfied[1]. Many anonymous routing schemes that concentrate on achieving anonymity are proposed in the past decade and they provides the security at different levels and also provides the privacy protection that is of different cost. In this paper we consider a protocol called Authenticated Secure Routing Protocol proposed which provides both security & anonymity. Anonymity is achieved in this protocol using Group signature. Over all by using this protocol performance in terms of throughput as well as the packet dropping rate is good compared to the other living protocols.

  13. Information Literacy on the Go! Adding Mobile to an Age Old Challenge

    Science.gov (United States)

    Schmidt Hanbidge, Alice; Sanderson, Nicole; Tin, Tony

    2016-01-01

    Integrating information literacy skills is fundamental to learning in all contexts. The nexus of mobile devices and information literacy lessons to learn these skills is an innovative pedagogy in higher education explored in this Mobile Information Literacy Tool (MIL) project. Currently, the project's second stage of data collection and analysis…

  14. Mobile Ad Hoc Networks in Bandwidth-Demanding Mission-Critical Applications: Practical Implementation Insights

    KAUST Repository

    Bader, Ahmed; Alouini, Mohamed-Slim

    2016-01-01

    There has been recently a growing trend of using live video feeds in mission-critical applications. Real-time video streaming from front-end personnel or mobile agents is believed to substantially improve situational awareness in mission

  15. IF-MANET: Interoperable framework for heterogeneous mobile ad hoc networks

    OpenAIRE

    Hassan, H.

    2015-01-01

    The advances in low power micro-processors, wireless networks and embedded systems have raised the need to utilize the significant resources of mobile devices. These devices for example, smart phones, tablets, laptops, wearables, and sensors are gaining enormous processing power, storage capacity and wireless bandwidth. In addition, the advancement in wireless mobile technology has created a new communication paradigm via which a wireless network can be created without any priori infrastructu...

  16. Enabling Co-located Learning over Mobile Ad Hoc P2P with LightPeers

    DEFF Research Database (Denmark)

    Christensen, Bent Guldbjerg; Kristensen, Mads Darø; Hansen, Frank Allan

    2008-01-01

    This paper presents LightPeers – a new mobile P2P framework specifically tailored for use in a nomadic learning environment. A set of key requirements for the framework is identified based on nomadic learning, and these requirements are used as outset for designing and implementing the architectu...

  17. Mitigate DoS and DDoS attacks in Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Michalas, Antonis; Komninos, Nikos; Prasad, Neeli R.

    2011-01-01

    This paper proposes a technique to defeat Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks in Ad Hoc Networks. The technique is divided into two main parts and with game theory and cryptographic puzzles. Introduced first is a new client puzzle to prevent DoS attacks...... in DoS and DDoS attacks. Experimental results show the effectiveness of the approach for devices with limited resources and for environments like ad hoc networks where nodes must exchange information quickly....

  18. Optimal JPWL Forward Error Correction Rate Allocation for Robust JPEG 2000 Images and Video Streaming over Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Benoit Macq

    2008-07-01

    Full Text Available Based on the analysis of real mobile ad hoc network (MANET traces, we derive in this paper an optimal wireless JPEG 2000 compliant forward error correction (FEC rate allocation scheme for a robust streaming of images and videos over MANET. The packet-based proposed scheme has a low complexity and is compliant to JPWL, the 11th part of the JPEG 2000 standard. The effectiveness of the proposed method is evaluated using a wireless Motion JPEG 2000 client/server application; and the ability of the optimal scheme to guarantee quality of service (QoS to wireless clients is demonstrated.

  19. Probabilistic monitoring in intrusion detection module for energy efficiency in mobile ad hoc networks

    Science.gov (United States)

    De Rango, Floriano; Lupia, Andrea

    2016-05-01

    MANETs allow mobile nodes communicating to each other using the wireless medium. A key aspect of these kind of networks is the security, because their setup is done without an infrastructure, so external nodes could interfere in the communication. Mobile nodes could be compromised, misbehaving during the multi-hop transmission of data, or they could have a selfish behavior to save energy, which is another important constraint in MANETs. The detection of these behaviors need a framework that takes into account the latest interactions among nodes, so malicious or selfish nodes could be detected also if their behavior is changed over time. The monitoring activity increases the energy consumption, so our proposal takes into account this issue reducing the energy required by the monitoring system, keeping the effectiveness of the intrusion detection system. The results show an improvement in the saved energy, improving the detection performance too.

  20. Trust Management in Mobile Ad Hoc Networks for Bias Minimization and Application Performance Maximization

    Science.gov (United States)

    2014-02-26

    4 develops a novel model-based approach to de- scribe dynamic behaviors of nodes in MANETs in the pres- ence of misbehaving nodes with the objective...bile node to subjectively yet informatively assess the trust levels of other mobile nodes. Further, SQTrust is resilient against misbehaving nodes. Given...objective trust’’ despite the presence of misbehaving nodes. The desirable output is to achieve high accuracy in peer-to-peer subjective trust evaluation

  1. Cross Layer PHY-MAC Protocol for Wireless Static and Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Chris Blondia

    2008-11-01

    Full Text Available Multihop mobile wireless networks have drawn a lot of attention in recent years thanks to their wide applicability in civil and military environments. Since the existing IEEE 802.11 distributed coordination function (DCF standard does not provide satisfactory access to the wireless medium in multihop mobile networks, we have designed a cross-layer protocol, (CroSs-layer noise aware power driven MAC (SNAPdMac, which consists of two parts. The protocol first concentrates on the flexible adjustment of the upper and lower bounds of the contention window (CW to lower the number of collisions. In addition, it uses a power control scheme, triggered by the medium access control (MAC layer, to limit the waste of energy and also to decrease the number of collisions. Thanks to a noticeable energy conservation and decrease of the number of collisions, it prolongs significantly the lifetime of the network and delays the death of the first node while increasing both the throughput performance and the sending bit rate/throughput fairness among contending flows.

  2. Improving the Dominating-Set Routing over Delay-Tolerant Mobile Ad-Hoc Networks via Estimating Node Intermeeting Times

    Directory of Open Access Journals (Sweden)

    Preiss Bruno

    2011-01-01

    Full Text Available With limited coverage of wireless networks and frequent roaming of mobile users, providing a seamless communication service poses a technical challenge. In our previous research, we presented a supernode system architecture that employs the delay-tolerant network (DTN concept to provide seamless communications for roaming users over interconnected heterogeneous wireless networks. Mobile ad hoc networks (MANETs are considered a key component of the supernode system for services over an area not covered by other wireless networks. Within the super node system, a dominating-set routing technique is proposed to improve message delivery over MANETs and to achieve better resource utilization. The performance of the dominating-set routing technique depends on estimation accuracy of the probability of a future contact between nodes. This paper studies how node mobility can be modeled and used to better estimate the probability of a contact. We derive a distribution for the node-to-node intermeeting time and present numerical results to demonstrate that the distribution can be used to improve the dominating-set routing technique performance. Moreover, we investigate how the distribution can be employed to relax the constraints of selecting the dominating-set members in order to improve the system resource utilization.

  3. Adding intelligence to mobile asset management in hospitals: the true value of RFID.

    Science.gov (United States)

    Castro, Linda; Lefebvre, Elisabeth; Lefebvre, Louis A

    2013-10-01

    RFID (Radio Frequency Identification) technology is expected to play a vital role in the healthcare arena, especially in times when cost containments are at the top of the priorities of healthcare management authorities. Medical equipment represents a significant share of yearly healthcare operational costs; hence, ensuring an effective and efficient management of such key assets is critical to promptly and reliably deliver a diversity of clinical services at the patient bedside. Empirical evidence from a phased-out RFID implementation in one European hospital demonstrates that RFID has the potential to transform asset management by improving inventory management, enhancing asset utilization, increasing staff productivity, improving care services, enhancing maintenance compliance, and increasing information visibility. Most importantly, RFID allows the emergence of intelligent asset management processes, which is, undoubtedly, the most important benefit that could be derived from the RFID system. Results show that the added intelligence can be rather basic (auto-status change) or a bit more advanced (personalized automatic triggers). More importantly, adding intelligence improves planning and decision-making processes.

  4. Reliable Ant Colony Routing Algorithm for Dual-Channel Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    YongQiang Li

    2018-01-01

    Full Text Available For the problem of poor link reliability caused by high-speed dynamic changes and congestion owing to low network bandwidth in ad hoc networks, an ant colony routing algorithm, based on reliable path under dual-channel condition (DSAR, is proposed. First, dual-channel communication mode is used to improve network bandwidth, and a hierarchical network model is proposed to optimize the dual-layer network. Thus, we reduce network congestion and communication delay. Second, a comprehensive reliable path selection strategy is designed, and the reliable path is selected ahead of time to reduce the probability of routing restart. Finally, the ant colony algorithm is used to improve the adaptability of the routing algorithm to changes of network topology. Simulation results show that DSAR improves the reliability of routing, packet delivery, and throughput.

  5. Adding memory processing behaviors to the fuzzy behaviorist-based navigation of mobile robots

    Energy Technology Data Exchange (ETDEWEB)

    Pin, F.G.; Bender, S.R.

    1996-05-01

    Most fuzzy logic-based reasoning schemes developed for robot control are fully reactive, i.e., the reasoning modules consist of fuzzy rule bases that represent direct mappings from the stimuli provided by the perception systems to the responses implemented by the motion controllers. Due to their totally reactive nature, such reasoning systems can encounter problems such as infinite loops and limit cycles. In this paper, we proposed an approach to remedy these problems by adding a memory and memory-related behaviors to basic reactive systems. Three major types of memory behaviors are addressed: memory creation, memory management, and memory utilization. These are first presented, and examples of their implementation for the recognition of limit cycles during the navigation of an autonomous robot in a priori unknown environments are then discussed.

  6. Broadcast Expenses Controlling Techniques in Mobile Ad-hoc Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Naeem Ahmad

    2016-07-01

    Full Text Available The blind flooding of query packets in route discovery more often characterizes the broadcast storm problem, exponentially increases energy consumption of intermediate nodes and congests the entire network. In such a congested network, the task of establishing the path between resources may become very complex and unwieldy. An extensive research work has been done in this area to improve the route discovery phase of routing protocols by reducing broadcast expenses. The purpose of this study is to provide a comparative analysis of existing broadcasting techniques for the route discovery phase, in order to bring about an efficient broadcasting technique for determining the route with minimum conveying nodes in ad-hoc networks. The study is designed to highlight the collective merits and demerits of such broadcasting techniques along with certain conclusions that would contribute to the choice of broadcasting techniques.

  7. MUSIC algorithm DoA estimation for cooperative node location in mobile ad hoc networks

    Science.gov (United States)

    Warty, Chirag; Yu, Richard Wai; ElMahgoub, Khaled; Spinsante, Susanna

    In recent years the technological development has encouraged several applications based on distributed communications network without any fixed infrastructure. The problem of providing a collaborative early warning system for multiple mobile nodes against a fast moving object. The solution is provided subject to system level constraints: motion of nodes, antenna sensitivity and Doppler effect at 2.4 GHz and 5.8 GHz. This approach consists of three stages. The first phase consists of detecting the incoming object using a highly directive two element antenna at 5.0 GHz band. The second phase consists of broadcasting the warning message using a low directivity broad antenna beam using 2× 2 antenna array which then in third phase will be detected by receiving nodes by using direction of arrival (DOA) estimation technique. The DOA estimation technique is used to estimate the range and bearing of the incoming nodes. The position of fast arriving object can be estimated using the MUSIC algorithm for warning beam DOA estimation. This paper is mainly intended to demonstrate the feasibility of early detection and warning system using a collaborative node to node communication links. The simulation is performed to show the behavior of detecting and broadcasting antennas as well as performance of the detection algorithm. The idea can be further expanded to implement commercial grade detection and warning system

  8. Implementing a Topology Management Algorithm for Mobile Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Mrinal K. Naskar

    2008-01-01

    Full Text Available In this paper, we propose to maintain the topology of a MANET by suitably selecting multiple coordinators among the nodes constituting the MANET. The maintenance of topology in a mobile ad–hoc network is of primary importance because the routing techniques can only work if we have a connected network. Thus of the burning issues at present is to device algorithms which ensure that the network topology is always maintained. The basic philosophy behind our algorithm is to isolate two coordinators amongst the system based on positional data. Once elected, they are entrusted with the responsibility to emit signals of different frequencies while the other nodes individually decide the logic they need to follow in order to maintain the topology, thereby greatly reducing the overhead. As far as our knowledge goes, we are the first ones to introduce the concept of multiple coordinators which not only reduces the workload of the coordinator, but also eliminates the need of different signal ranges thereby ensuring greater efficiency. We have simulated the algorithm with the help of a number of robots using embedded systems. The results we have obtained have been quite encouraging.

  9. Monitoring and classifying animal behavior using ZigBee-based mobile ad hoc wireless sensor networks and artificial neural networks

    DEFF Research Database (Denmark)

    S. Nadimi, Esmaeil; Nyholm Jørgensen, Rasmus; Blanes-Vidal, Victoria

    2012-01-01

    Animal welfare is an issue of great importance in modern food production systems. Because animal behavior provides reliable information about animal health and welfare, recent research has aimed at designing monitoring systems capable of measuring behavioral parameters and transforming them...... into their corresponding behavioral modes. However, network unreliability and high-energy consumption have limited the applicability of those systems. In this study, a 2.4-GHz ZigBee-based mobile ad hoc wireless sensor network (MANET) that is able to overcome those problems is presented. The designed MANET showed high...... communication reliability, low energy consumption and low packet loss rate (14.8%) due to the deployment of modern communication protocols (e.g. multi-hop communication and handshaking protocol). The measured behavioral parameters were transformed into the corresponding behavioral modes using a multilayer...

  10. A Time-Slotted On-Demand Routing Protocol for Mobile Ad Hoc Unmanned Vehicle Systems

    Energy Technology Data Exchange (ETDEWEB)

    Hope Forsmann; Robert Hiromoto; John Svoboda

    2007-04-01

    The popularity of UAVs has increased dramatically because of their successful deployment in military operations, their ability to preserve human life, and the continual improvements in wireless communication that serves to increase their capabilities. We believe the usefulness of UAVs would be dramatically increased if formation flight were added to the list of capabilities. Currently, sustained formation flight with a cluster of UAVs has only been achieved with two nodes by the Multi-UAV Testbed at the Massachusetts Institute of Technology. (Park, 2004) Formation flight is a complex operation requiring the ability to adjust the flight patterns on the fly and correct for wind gusts, terrain, and differences in node equipment. All of which increases the amount of inner node communication. Since one of the problems with MANET communication is network congestion, we believe a first step towards formation flight can be made through improved inner node communication. We have investigated current communication routing protocols and developed an altered hybrid routing protocol in order to provide communication with less network congestion.

  11. A Simulation Study: The Impact of Random and Realistic Mobility Models on the Performance of Bypass-AODV in Ad Hoc Wireless Networks

    Directory of Open Access Journals (Sweden)

    Baroudi Uthman

    2010-01-01

    Full Text Available To bring VANET into reality, it is crucial to devise routing protocols that can exploit the inherited characteristics of VANET environment to enhance the performance of the running applications. Previous studies have shown that a certain routing protocol behaves differently under different presumed mobility patterns. Bypass-AODV is a new optimization of the AODV routing protocol for mobile ad-hoc networks. It is proposed as a local recovery mechanism to enhance the performance of the AODV routing protocol. It shows outstanding performance under the Random Waypoint mobility model compared with AODV. However, Random Waypoint is a simple model that may be applicable to some scenarios but it is not sufficient to capture some important mobility characteristics of scenarios where VANETs are deployed. In this paper, we will investigate the performance of Bypass-AODV under a wide range of mobility models including other random mobility models, group mobility models, and vehicular mobility models. Simulation results show an interesting feature that is the insensitivity of Bypass-AODV to the selected random mobility model, and it has a clear performance improvement compared to AODV. For group mobility model, both protocols show a comparable performance, but for vehicular mobility models, Bypass-AODV suffers from performance degradation in high-speed conditions.

  12. Implementing voice over Internet protocol in mobile ad hoc network – analysing its features regarding efficiency, reliability and security

    Directory of Open Access Journals (Sweden)

    Naveed Ahmed Sheikh

    2014-05-01

    Full Text Available Providing secure and efficient real-time voice communication in mobile ad hoc network (MANET environment is a challenging problem. Voice over Internet protocol (VoIP has originally been developed over the past two decades for infrastructure-based networks. There are strict timing constraints for acceptable quality VoIP services, in addition to registration and discovery issues in VoIP end-points. In MANETs, ad hoc nature of networks and multi-hop wireless environment with significant packet loss and delays present formidable challenges to the implementation. Providing a secure real-time VoIP service on MANET is the main design objective of this paper. The authors have successfully developed a prototype system that establishes reliable and efficient VoIP communication and provides an extremely flexible method for voice communication in MANETs. The authors’ cooperative mesh-based MANET implementation can be used for rapidly deployable VoIP communication with survivable and efficient dynamic networking using open source software.

  13. A MODIFIED ROUTE DISCOVERY APPROACH FOR DYNAMIC SOURCE ROUTING (DSR PROTOCOL IN MOBILE AD-HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Alaa Azmi Allahham

    2017-02-01

    Full Text Available Mobile Ad-hoc networks (MANETs involved in many applications, whether commercial or military because of their characteristics that do not depend on the infrastructure as well as the freedom movement of their elements, but in return has caused this random mobility of the nodes many of the challenges, where the routing is considered one of these challenges. There are many types of routing protocols that operate within MANET networks, which responsible for finding paths between the source and destination nodes with the modernization of these paths which are constantly changing due to the dynamic topology of the network stemming from the constant random movement of the nodes. The DSR (Dynamic Source Routing routing protocol algorithm is one of these routing protocols which consist of two main stages; route discovery and maintenance, where the route discovery algorithm operates based on blind flooding of request messages. blind flooding is considered as the most well known broadcasting mechanism, it is inefficient in terms of communication and resource utilization, which causing increasing the probability of collisions, repeating send several copies of the same message, as well as increasing the delay. Hence, a new mechanism in route discovery stage and in caching the routes in DSR algorithm according to the node's location in the network and the direction of the broadcast is proposed for better performance especially in terms of delay as well as redundant packets rate. The implementation of proposed algorithms showed positive results in terms of delay, overhead, and improve the performance of MANETs in general.

  14. A Family of Key Agreement Mechanisms for Mission Critical Communications for Secure Mobile Ad Hoc and Wireless Mesh Internetworking

    Directory of Open Access Journals (Sweden)

    Tryfonas Theo

    2011-01-01

    Full Text Available Future wireless networks like mobile ad hoc networks and wireless mesh networks are expected to play important role in demanding communications such as mission critical communications. MANETs are ideal for emergency cases where the communication infrastructure has been completely destroyed and there is a need for quick set up of communications among the rescue/emergency workers. In such emergency scenarios wireless mesh networks may be employed in a later phase for providing advanced communications and services acting as a backbone network in the affected area. Internetworking of both types of future networks will provide a broad range of mission critical applications. While offering many advantages, such as flexibility, easy of deployment and low cost, MANETs and mesh networks face important security and resilience threats, especially for such demanding applications. We introduce a family of key agreement methods based on weak to strong authentication associated with several multiparty contributory key establishment methods. We examine the attributes of each key establishment method and how each method can be better applied in different scenarios. The proposed protocols support seamlessly both types of networks and consider system and application requirements such as efficient and secure internetworking, dynamicity of network topologies and support of thin clients.

  15. Secure Communication and Information Exchange using Authenticated Ciphertext Policy Attribute-Based Encryption in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Samsul Huda

    2016-08-01

    Full Text Available MANETs are considered as suitable for commercial applications such as law enforcement, conference meeting, and sharing information in a student classroom and critical services such as military operations, disaster relief, and rescue operations. Meanwhile, in military operation especially in the battlefield in freely medium which naturally needs high mobility and flexibility. Thus, applying MANETs make these networks vulnerable to various types of attacks such aspacket eavesdropping, data disseminating, message replay, message modification, and especially privacy issue. In this paper, we propose a secure communication and information exchange in MANET with considering secure adhoc routing and secure information exchange. Regarding privacy issue or anonymity, we use a reliable asymmetric encryption which protecting user privacy by utilizing insensitive user attributes as user identity, CP-ABE (Ciphertext-Policy Attribute-Based Encryption cryptographic scheme. We also design protocols to implement the proposed scheme for various battlefied scenarios in real evironment using embedded devices. Our experimental results showed that the additional of HMAC (Keyed-Hash Message Authentication Code and AES (Advanced Encryption standard schemes using processor 1.2GHz only take processing time about 4.452 ms,  we can confirm that our approach by using CP-ABE with added HMAC and AES schemes make low overhead.

  16. Disentangling location based mobile advertising: the effects of location congruence and type of the medium on consumers' ad-recall and buying behaviour

    NARCIS (Netherlands)

    Bernritter, S.; Ketelaar, P.; van Woudenberg, T.J.; Vantriet, J.; Huhn, A.; Janssen, L.

    2015-01-01

    An emerging body of research focuses on location-based advertising (LBA). This literature suggests that the merits of LBA rely on the fact that consumers can be targeted with location-congruent ads on their personal mobile devices. However, it has not yet been taken into account that LBA consists of

  17. Minimizing the negative effects of device mobility in cell-based ad-hoc wireless computational grids

    CSIR Research Space (South Africa)

    Mudali, P

    2006-09-01

    Full Text Available This paper provides an outline of research being conducted to minimize the disruptive effects of device mobility in wireless computational grid networks. The proposed wireless grid framework uses the existing GSM cellular architecture, with emphasis...

  18. MQARR-AODV: A NOVEL MULTIPATH QOS AWARE RELIABLE REVERSE ON-DEMAND DISTANCE VECTOR ROUTING PROTOCOL FOR MOBILE AD-HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    K.G. Santhiya

    2012-12-01

    Full Text Available MANET (Mobile Ad-hoc Network is an infra structure less wireless ad-hoc network that does not require any basic central control. The topology of the network changes drastically due to very fast mobility of nodes. So an adaptive routing protocol is needed for routing in MANET. AODV (Ad-hoc On-demand Distance Vector routing is the effective and prominent on-demand Ad-hoc routing protocols. During route establishment phase in traditional AODV, only one route reply message will be sent in the reverse path to establish routing path. The high mobility of nodes may affect the reply messages which lead to the retransmission of route request message by the sender which in turn leads to higher communication delay, power consumption and the reduction in the ratio of packets delivered. Sending multiple route reply messages and establishing multiple paths in a single path discovery will reduce the routing overhead involved in maintaining the connection between source and destination nodes. Multipath routing can render high scalability, end-to-end throughput and provide load balancing in MANET. The new proposed novel Multipath QoS aware reliable routing protocol establishes two routes of maximum node disjoint paths and the data transfer is carried out in the two paths simultaneously. To select best paths, the new proposed protocol uses three parameters Link Eminence, MAC overhead and node residual energy. The experimental values prove that the MQARR-AODV protocol achieves high reliability, stability, low latency and outperforms AODV by the less energy consumption, overhead and delay.

  19. A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mobile Ad Hoc and Sensor Networks

    OpenAIRE

    Francesco Beritelli; Aurelio La Corte; Corrado Rametta; Francesco Scaglione

    2018-01-01

    As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet access networks are not designed to support real-time data traffic because of several drawbacks concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc., which impact directly such parameters as delay, jitter, and packet loss rate that are...

  20. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks.

    Science.gov (United States)

    Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J; Pallarès Segarra, Esteve; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Sanvicente Gargallo, Emilio

    2015-04-17

    The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.

  1. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ahmad Mohamad Mezher

    2015-04-01

    Full Text Available The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc. could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.

  2. Mobilities

    DEFF Research Database (Denmark)

    to social networks, personal identities, and our relationship to the built environment. The omnipresence of mobilities within everyday life, high politics, technology, and tourism (to mention but a few) all point to a key insight harnessed by the ‘mobilities turn’. Namely that mobilities is much more than......The world is on the move. This is a widespread understanding by many inhabitants of contemporary society across the Globe. But what does it actually mean? During over one decade the ‘mobilities turn’ within the social sciences have provided a new set of insights into the repercussions of mobilities...... and environmental degradation. The spaces and territories marked by mobilities as well as the sites marked by the bypassing of such are explored. Moreover, the architectural and technological dimensions to infrastructures and sites of mobilities will be included as well as the issues of power, social exclusion...

  3. Effects of organic amendments on the mobility of Pb and Zn from mine tailings added to semi-arid soils.

    Science.gov (United States)

    Barajas-Aceves, M; Rodríguez-Vázquez, R

    2013-01-01

    The effects of mine tailings and three organic amendments (compost, bokashi and vermicompost) on the mobility factor for Pb and Zn and on the potential C and N mineralization in semi-arid agricultural and rangeland soils were examined. During the experiment, soil samples were analyzed periodically for CO(2)-C evolution, inorganic N, dehydrogenase activity and percent Pb and Zn mobility during 169 d of incubation. The dehydrogenase activity and CO(2)-C evolved were strongly inhibited by mine tailings mixed with organic compost in both agricultural and rangeland soils (37 to 43 %), followed by N mineralization in treatments with mine tailings plus bokashi or compost (13 to 26.5 %) at 169 d incubation. The highest % mobility of Pb and Zn were observed in soils amended with mine tailings alone, while the lowest was observed in agricultural soils treated with vermicompost plus mine tailings. The CO(2)-C evolved was fitted to first order E, while the cumulative N mineralization was fitted to the linearized power function. Mine tailings were found to influence the potential C and N mineralization rate constants in both soils. The models for C and N mineralization could be used to evaluate the effects of mine tailings, which include intrinsic parameters in the soil.

  4. Adding Value to the Network: Exploring the Software as a Service and Platform as a Service Models for Mobile Operators

    Science.gov (United States)

    Gonçalves, Vânia

    The environments of software development and software provision are shifting to Web-based platforms supported by Platform/Software as a Service (PaaS/SaaS) models. This paper will make the case that there is equally an opportunity for mobile operators to identify additional sources of revenue by exposing network functionalities through Web-based service platforms. By elaborating on the concepts, benefits and risks of SaaS and PaaS, several factors that should be taken into consideration in applying these models to the telecom world are delineated.

  5. Analisis Unjuk Kerja Aplikasi VoIP Call Android di Jaringan MANET [Performance Analysis of VoIP Call Application Android in MANET (Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Ryan Ari Setyawan

    2015-06-01

    Full Text Available Penelitian ini bertujuan menganalisis kinerja aplikasi  VoIP call android di jaringan MANET (mobile ad hoc network.  Hasil pengujian menunjukan bahwa aplikasi VoIP call android dapat digunakan di jaringan MANET. Delay yang dihasilkan paling besar di pengujian indoor dengan jarak 11-15 meter yakni sebesar 0,014624811 seconds. Packet loss yang dihasilkan pada range 1%-2% sedangkan standar packet loss yang ditetapkan oleh CISCO untuk layanan aplikasi VoIP adalah < 5%. Jitter yang dihasilkan yakni antara 0,01-0,06 seconds sedangkan standar yang ditetapkan oleh CISCO adalah ≤ 30 ms atau 0,03 seconds. Throughput yang dihasilkan pada proses pengujian yakni antar 161 kbps-481 kbps. *****This study aims to analyze the performance of VOIP call android application in the MANET (mobile ad hoc network. The results showed that VoIP applications could be implemented in MANET network. The highest  delay is produced in indoor testing  with distance of 11-15 meters,  which is equal to 0.014624811 seconds. Packet loss is generated in the range of 1% -2%, while packet loss standards set by Cisco for VoIP application services are <5%. The jitter is between 0.01 to 0.06 seconds, while the standard set by CISCO is ≤ 30 ms or 0.03 seconds. Throughput generated in the testing process is between 161 kbps-481 kbps.

  6. Detection and Prevention of Denial of Service (DoS Attacks in Mobile Ad Hoc Networks using Reputation-based Incentive Schemes

    Directory of Open Access Journals (Sweden)

    Mieso, K Denko

    2005-08-01

    Full Text Available Mobile ad hoc networks (MANETs are dynamic mobile networks that can be formed in the absence of any pre-existing communication infrastructure. In addition to node mobility, a MANET is characterized by limited resources such as bandwidth, battery power, and storage space. The underlying assumption in MANETs is that the intermediate nodes cooperate in forwarding packets. However, this assumption does not hold in commercial and emerging civilian applications. MANETs are vulnerable to Denial of Service (DoS due to their salient characteristics. There is a need to provide an incentive mechanism that can provide cooperation among nodes in the network and improve overall network performance by reducing DoS attacks. In this paper, we propose a reputation-based incentive mechanism for detecting and preventing DoS attacks. DoS attacks committed by selfish and malicious nodes were investigated. Our scheme motivates nodes to cooperate and excludes them from the network only if they fail to do so. We evaluated the performance of our scheme using the packet delivery ratio, the routing and communication overhead, and misbehaving node detection in a discrete event-simulation environment. The results indicate that a reputation-based incentive mechanism can significantly reduce the effect of DoS attacks and improve performance in MANETs.

  7. Research on user interest modeling in mobile ad recommendation%手机广告推荐中的用户兴趣建模研究

    Institute of Scientific and Technical Information of China (English)

    顾其威; 郭鹏; 潘锋

    2012-01-01

    为了增强基于WAP网页的手机广告推荐中用户建模的准确性,并对“非邀”式广告推荐中脱离用户兴趣试探性推荐进行修正,针对手机广告推荐中手机屏幕小、用户注意力集中等特点,根据用户对广告的访问历史和操作模式建立其广告兴趣模型和非兴趣模型,同时分析用户网页访问模式探测其网页兴趣度,在此基础上建立用户综合兴趣模型.分别采用基于网页兴趣模型、基于广告兴趣模型和基于用户综合兴趣模型进行广告推荐,随着样本空间增大,综合兴趣模型的查准率明显优于另两者.实验验证了用户综合兴趣模型在手机广告推荐中的有效性和优越性.%For enhancing the accuracy of mobile advertising recommendation on the basis of WAP Web page, and amending the exploratory recommended in the mobile advertising recommendation of which recommendation pattern is No Invitation, on account of mobile phone' s small screen and user' s great attention, builds advertising interest model and noninterest model according the ads visiting history and operation mode. Simultaneously, analyzed the Web access mode to detect the user' s Web interest degree, proposed a user comprehensive interest model which considering the user' s Web interest and user' s ads interest. Employed three recommended patterns to recommend the mobile advertising based on Web page interest model, advertising interest model and comprehensive interest model, with the sample space growing, the accuracy of comprehensive interest model was superior to other two models. Experiments prove that the effectiveness and superiority of comprehensive model in the mobile advertising recommendation.

  8. Rapid screening of non-steroidal anti-inflammatory drugs illegally added in anti-rheumatic herbal supplements and herbal remedies by portable ion mobility spectrometry.

    Science.gov (United States)

    Li, Mengjiao; Ma, Haiyan; Gao, Jinglin; Zhang, Lina; Wang, Xinyu; Liu, Di; Bian, Jing; Jiang, Ye

    2017-10-25

    In this work, for the first time, a high-performance ion mobility spectrometry with electrospray ionization (ESI-HPIMS) method has been employed as a rapid screening tool for the detection of acetaminophen, ibuprofen, naproxen, diclofenac sodium and indomethacin illegally added in anti-rheumatic herbal supplements and herbal remedies. Samples were dissolved and filtered through a 0.45μm microporous membrane, then the filtrate was directly injected into the high-performance ion mobility spectrometry for analysis. Using this approach, the screening of illegal additions can be accomplished in as rapid as two to three minutes with no pretreatment required. The proposed method provided a LOD of 0.06-0.33μgmL -1 , as well as a good seperation of the five NSAIDs. The precision of the method was 0.1-0.4% (repeatability, n=6) and 0.9-3.3% (reproducibility, n=3). The proposed method appeared to be simple, rapid and highly specific, thus could be effective for the in-situ screening of NSAIDs in anti-rheumatic herbal supplements and herbal remedies. Copyright © 2017 Elsevier B.V. All rights reserved.

  9. Dynamic ad hoc networks

    CERN Document Server

    Rashvand, Habib

    2013-01-01

    Motivated by the exciting new application paradigm of using amalgamated technologies of the Internet and wireless, the next generation communication networks (also called 'ubiquitous', 'complex' and 'unstructured' networking) are changing the way we develop and apply our future systems and services at home and on local, national and global scales. Whatever the interconnection - a WiMAX enabled networked mobile vehicle, MEMS or nanotechnology enabled distributed sensor systems, Vehicular Ad hoc Networking (VANET) or Mobile Ad hoc Networking (MANET) - all can be classified under new networking s

  10. Supervision de la sécurité pour des réseaux ad hoc mobiles : un système léger, robuste, et fiable de détection d'intrusion

    OpenAIRE

    Alattar , Mouhannad

    2013-01-01

    Mobile Ad hoc NETworks (referred to as MANETs) continue increasing their presence in our every day life. They become a corner stone in the commercial, the society, the military, the science, and even the next-generation applications. However, these networks mostly operate over open environments and are therefore vulnerable to a large body of threats. Traditional ways of securing networks relying on preventive techniques, e.g., firewall and encryption, are not sufficient and should henceforth ...

  11. Context discovery in ad-hoc networks

    NARCIS (Netherlands)

    Liu, F.

    2011-01-01

    With the rapid development of wireless technology and portable devices, mobile ad-hoc networks (MANETs) are more and more present in our daily life. Ad-hoc networks are often composed of mobile and battery-supplied devices, like laptops, mobile phones, and PDAs. With no requirement for

  12. Advertising on mobile applications

    OpenAIRE

    Sobolevsky, Alexandr

    2015-01-01

    The article analyzes the new method of mobile advertising. Advertising in mobile applications - a subspecies of mobile marketing, where advertising is distributed using mobile phones and smartphones. Ad placement is going on inside of applications and games for smartphones. It has a high potential due to the large number of mobile phone users (over 6.5 billion in 2013).

  13. Hairy AdS solitons

    International Nuclear Information System (INIS)

    Anabalón, Andrés; Astefanesei, Dumitru; Choque, David

    2016-01-01

    We construct exact hairy AdS soliton solutions in Einstein-dilaton gravity theory. We examine their thermodynamic properties and discuss the role of these solutions for the existence of first order phase transitions for hairy black holes. The negative energy density associated to hairy AdS solitons can be interpreted as the Casimir energy that is generated in the dual filed theory when the fermions are antiperiodic on the compact coordinate.

  14. Hairy AdS solitons

    Energy Technology Data Exchange (ETDEWEB)

    Anabalón, Andrés, E-mail: andres.anabalon@uai.cl [Departamento de Ciencias, Facultad de Artes Liberales and Facultad de Ingeniería y Ciencias, Universidad Adolfo Ibáñez, Av. Padre Hurtado 750, Viña del Mar (Chile); Astefanesei, Dumitru, E-mail: dumitru.astefanesei@pucv.cl [Instituto de Física, Pontificia Universidad Católica de Valparaíso, Casilla 4059, Valparaíso (Chile); Choque, David, E-mail: brst1010123@gmail.com [Instituto de Física, Pontificia Universidad Católica de Valparaíso, Casilla 4059, Valparaíso (Chile); Universidad Técnica Federico Santa María, Av. España 1680, Valparaíso (Chile)

    2016-11-10

    We construct exact hairy AdS soliton solutions in Einstein-dilaton gravity theory. We examine their thermodynamic properties and discuss the role of these solutions for the existence of first order phase transitions for hairy black holes. The negative energy density associated to hairy AdS solitons can be interpreted as the Casimir energy that is generated in the dual filed theory when the fermions are antiperiodic on the compact coordinate.

  15. Mobilities Mobilities

    Directory of Open Access Journals (Sweden)

    César Pompeyo

    2011-12-01

    Full Text Available Urry, John (2007 Mobilities.Oxford: Polity Press.Urry, John (2007 Mobilities.Oxford: Polity Press.John Urry (1946-, profesor en la Universidad de Lancaster, es un sociólogo de sobra conocido y altamente reputado en el panorama internacional de las ciencias sociales. Su dilatada carrera, aparentemente dispersa y diversificada, ha seguido senderos bastante bien definidos dejando tras de sí un catálogo extenso de obras sociológicas de primer nivel. Sus primeros trabajos se centraban en el campo de la teoría social y la filosofía de las ciencias sociales o de la sociología del poder [...

  16. Adding Ajax

    CERN Document Server

    Powers, Shelley

    2007-01-01

    Ajax can bring many advantages to an existing web application without forcing you to redo the whole thing. This book explains how you can add Ajax to enhance, rather than replace, the way your application works. For instance, if you have a traditional web application based on submitting a form to update a table, you can enhance it by adding the capability to update the table with changes to the form fields, without actually having to submit the form. That's just one example.Adding Ajax is for those of you more interested in extending existing applications than in creating Rich Internet Applica

  17. Bubbling AdS3

    International Nuclear Information System (INIS)

    Martelli, Dario; Morales, Jose Francisco

    2005-01-01

    In the light of the recent Lin, Lunin, Maldacena (LLM) results, we investigate 1/2-BPS geometries in minimal (and next to minimal) supergravity in D = 6 dimensions. In the case of minimal supergravity, solutions are given by fibrations of a two-torus T 2 specified by two harmonic functions. For a rectangular torus the two functions are related by a non-linear equation with rare solutions: AdS 3 x S 3 , the pp-wave and the multi-center string. 'Bubbling', i.e. superpositions of droplets, is accommodated by allowing the complex structure of the T 2 to vary over the base. The analysis is repeated in the presence of a tensor multiplet and similar conclusions are reached, with generic solutions describing D1D5 (or their dual fundamental string-momentum) systems. In this framework, the profile of the dual fundamental string-momentum system is identified with the boundaries of the droplets in a two-dimensional plane. (author)

  18. Realtime multiprocessor for mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    T. Jungeblut

    2008-05-01

    Full Text Available This paper introduces a real-time Multiprocessor System-On-Chip (MPSoC for low power wireless applications. The multiprocessor is based on eight 32bit RISC processors that are connected via an Network-On-Chip (NoC. The NoC follows a novel approach with guaranteed bandwidth to the application that meets hard realtime requirements. At a clock frequency of 100 MHz the total power consumption of the MPSoC that has been fabricated in 180 nm UMC standard cell technology is 772 mW.

  19. Secrecy in Mobile Ad-hoc Networks

    DEFF Research Database (Denmark)

    Hüttel, Hans; Rafnsson, Willard

    2008-01-01

    We propose a framework for automated verification of secrecy properties of MANET protocols, consisting of a formal language and a proven sound verifi- cation technique which can be automated. We start off by presenting the dis- tributed applied pi calculus with broadcast (DAπβ ), whereafter we summ...

  20. String Theory on AdS Spaces

    NARCIS (Netherlands)

    de Boer, J.

    2000-01-01

    In these notes we discuss various aspects of string theory in AdS spaces. We briefly review the formulation in terms of Green-Schwarz, NSR, and Berkovits variables, as well as the construction of exact conformal field theories with AdS backgrounds. Based on lectures given at the Kyoto YITP Workshop

  1. Warped AdS3 black holes

    International Nuclear Information System (INIS)

    Anninos, Dionysios; Li Wei; Padi, Megha; Song Wei; Strominger, Andrew

    2009-01-01

    Three dimensional topologically massive gravity (TMG) with a negative cosmological constant -l -2 and positive Newton constant G admits an AdS 3 vacuum solution for any value of the graviton mass μ. These are all known to be perturbatively unstable except at the recently explored chiral point μl = 1. However we show herein that for every value of μl ≠ 3 there are two other (potentially stable) vacuum solutions given by SL(2,R) x U(1)-invariant warped AdS 3 geometries, with a timelike or spacelike U(1) isometry. Critical behavior occurs at μl = 3, where the warping transitions from a stretching to a squashing, and there are a pair of warped solutions with a null U(1) isometry. For μl > 3, there are known warped black hole solutions which are asymptotic to warped AdS 3 . We show that these black holes are discrete quotients of warped AdS 3 just as BTZ black holes are discrete quotients of ordinary AdS 3 . Moreover new solutions of this type, relevant to any theory with warped AdS 3 solutions, are exhibited. Finally we note that the black hole thermodynamics is consistent with the hypothesis that, for μl > 3, the warped AdS 3 ground state of TMG is holographically dual to a 2D boundary CFT with central charges c R -formula and c L -formula.

  2. Connecting Mobile Game Advertising with Local Stores

    OpenAIRE

    Wen, Yanzhao

    2016-01-01

    With the growth of mobile market, mobile advertising and mobile game advertising are becoming more and more important. On one hand, mobile advertising is able to deliver relevant ads to targeted users based on their locations and behaviors. On the other hand, as the number of mobile game players and free-to-play mobile games are increasing, mobile game advertising forms one important way of monetization. It is important to increase the advertising effectiveness while producing friendly user e...

  3. AdS solutions through transgression

    International Nuclear Information System (INIS)

    Donos, Aristomenis; Gauntlett, Jerome P.; Kim, Nakwoo

    2008-01-01

    We present new classes of explicit supersymmetric AdS 3 solutions of type IIB supergravity with non-vanishing five-form flux and AdS 2 solutions of D = 11 supergravity with electric four-form flux. The former are dual to two-dimensional SCFTs with (0,2) supersymmetry and the latter to supersymmetric quantum mechanics with two supercharges. We also investigate more general classes of AdS 3 solutions of type IIB supergravity and AdS 2 solutions of D = 11 supergravity which in addition have non-vanishing three-form flux and magnetic four-form flux, respectively. The construction of these more general solutions makes essential use of the Chern-Simons or 'transgression' terms in the Bianchi identity or the equation of motion of the field strengths in the supergravity theories. We construct infinite new classes of explicit examples and for some of the type IIB solutions determine the central charge of the dual SCFTs. The type IIB solutions with non-vanishing three-form flux that we construct include a two-torus, and after two T-dualities and an S-duality, we obtain new AdS 3 solutions with only the NS fields being non-trivial.

  4. Polarised Black Holes in AdS

    CERN Document Server

    Costa, Miguel S.; Oliveira, Miguel; Penedones, João; Santos, Jorge E.

    2016-05-03

    We consider solutions in Einstein-Maxwell theory with a negative cosmological constant that asymptote to global $AdS_{4}$ with conformal boundary $S^{2}\\times\\mathbb{R}_{t}$. At the sphere at infinity we turn on a space-dependent electrostatic potential, which does not destroy the asymptotic $AdS$ behaviour. For simplicity we focus on the case of a dipolar electrostatic potential. We find two new geometries: (i) an $AdS$ soliton that includes the full backreaction of the electric field on the $AdS$ geometry; (ii) a polarised neutral black hole that is deformed by the electric field, accumulating opposite charges in each hemisphere. For both geometries we study boundary data such as the charge density and the stress tensor. For the black hole we also study the horizon charge density and area, and further verify a Smarr formula. Then we consider this system at finite temperature and compute the Gibbs free energy for both $AdS$ soliton and black hole phases. The corresponding phase diagram generalizes the Hawkin...

  5. Ad-Me: A Context-Sensitive Advertising System

    OpenAIRE

    Hristova, Nataliya; O'Hare, G. M. P. (Greg M. P.)

    2001-01-01

    The mobile commerce sector and in particular the context sensitive advertising will represent a high yield revenue stream. This paper introduces the Ad-me (Advertising for the Mobile E-commerce user) system. The Ad-me is a mobile tourist guide that proactively delivers advertisements to users based upon perceived individual user needs together with their location. A Multi-Agent Systems (MAS) design philosophy is adopted. In order to achieve maximum content diffusion a range of presentation...

  6. Mobile marketing for mobile games

    OpenAIRE

    Vu, Giang

    2016-01-01

    Highly developed mobile technology and devices enable the rise of mobile game industry and mobile marketing. Hence mobile marketing for mobile game is an essential key for a mobile game success. Even though there are many articles on marketing for mobile games, there is a need of highly understanding mobile marketing strategies, how to launch a mobile campaign for a mobile game. Besides that, it is essential to understand the relationship between mobile advertising and users behaviours. There...

  7. Mobility2.0: co-operative ITS systems for enhanced electric vehicle mobility

    NARCIS (Netherlands)

    Unknown, [Unknown; Dimitrova, D.C.; Brogle, M.; Braun, T.; Heijenk, Gerhard J.

    Mobility2.0 will develop and test an in-vehicle commuting assistant for FEV mobility, resulting in more reliable and energy-efficient electro-mobility. In order to achieve a maximum impact, Mobility2.0 takes an integrated approach of ad- dressing the main bottlenecks of urban FEV mobility: range

  8. Current status of AdS instability

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    arXiv:1403.6471 and thoroughly developed in arXiv:1407.6273. On the other hand the negative cosmological constant allows for the existence of stable, time-periodic, asymptotically AdS solutions of Einstein equations [arXiv:1303.3186].

  9. AdS. Klein-Gordon equation

    OpenAIRE

    Bel, Ll.

    2014-01-01

    I propose a generalization of the Klein-Gordon equation in the framework of AdS space-time and exhibit a four parameter family of solutions among which there is a two parameter family of time-dependent bound states.

  10. Ad Hoc Access Gateway Selection Algorithm

    Science.gov (United States)

    Jie, Liu

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. For mobile nodes in Ad Hoc network to internet, internet communications in the peer nodes must be achieved through the gateway. Therefore, the key Ad Hoc Access Networks will focus on the discovery gateway, as well as gateway selection in the case of multi-gateway and handover problems between different gateways. This paper considers the mobile node and the gateway, based on the average number of hops from an average access time and the stability of routes, improved gateway selection algorithm were proposed. An improved gateway selection algorithm, which mainly considers the algorithm can improve the access time of Ad Hoc nodes and the continuity of communication between the gateways, were proposed. This can improve the quality of communication across the network.

  11. Research of Ad Hoc Networks Access Algorithm

    Science.gov (United States)

    Xiang, Ma

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.

  12. Lorentzian AdS, Wormholes and Holography

    CERN Document Server

    Arias, Raul E; Silva, Guillermo A

    2011-01-01

    We investigate the structure of two point functions for the QFT dual to an asymptotically Lorentzian AdS-wormhole. The bulk geometry is a solution of 5-dimensional second order Einstein Gauss Bonnet gravity and causally connects two asymptotically AdS space times. We revisit the GKPW prescription for computing two-point correlation functions for dual QFT operators O in Lorentzian signature and we propose to express the bulk fields in terms of the independent boundary values phi_0^\\pm at each of the two asymptotic AdS regions, along the way we exhibit how the ambiguity of normalizable modes in the bulk, related to initial and final states, show up in the computations. The independent boundary values are interpreted as sources for dual operators O^\\pm and we argue that, apart from the possibility of entanglement, there exists a coupling between the degrees of freedom leaving at each boundary. The AdS_(1+1) geometry is also discussed in view of its similar boundary structure. Based on the analysis, we propose a ...

  13. Mechanism design for mobile geo-location advertising

    OpenAIRE

    Gatti, Nicola; Rocco, Marco; Ceppi, Sofia; Gerding, Enrico H.

    2014-01-01

    Mobile geo–location advertising, where mobile ads are targeted based on a user’s location, has been identified as a key growth factor for the mobile market. As with online advertising, a crucial ingredient for their success is the development of effective economic mechanisms. An important difference is that mobile ads are shown sequentially over time and information about the user can be learned based on their movements. Furthermore, ads need to be shown selectively to prevent ad fatigue. To ...

  14. Baby Skyrmions in AdS

    Energy Technology Data Exchange (ETDEWEB)

    Elliot-Ripley, Matthew; Winyard, Thomas [Department of Mathematical Sciences, Durham University,South Rd, Durham (United Kingdom)

    2015-09-01

    We study the baby Skyrme model in a pure AdS background without a mass term. The tail decays and scalings of massless radial solutions are demonstrated to take a similar form to those of the massive flat space model, with the AdS curvature playing a similar role to the flat space pion mass. We also numerically find minimal energy solutions for a range of higher topological charges and find that they form concentric ring-like solutions. Popcorn transitions (named in analogy with studies of toy models of holographic QCD) from an n layer to an n+1-layer configuration are observed at topological charges 9 and 27 and further popcorn transitions for higher charges are predicted. Finally, a point-particle approximation for the model is derived and used to successfully predict the ring structures and popcorn transitions for higher charge solitons.

  15. Supersymmetric AdS3, AdS2 and bubble solutions

    International Nuclear Information System (INIS)

    Gauntlett, Jerome P.; Waldram, Daniel; Kim, Nakwoo

    2007-01-01

    We present new supersymmetric AdS 3 solutions of type IIB supergravity and AdS 2 solutions of D = 11 supergravity. The former are dual to conformal field theories in two dimensions with N = (0, 2) supersymmetry while the latter are dual to conformal quantum mechanics with two supercharges. Our construction also includes AdS 2 solutions of D = 11 supergravity that have non-compact internal spaces which are dual to three-dimensional N = 2 superconformal field theories coupled to point-like defects. We also present some new bubble-type solutions, corresponding to BPS states in conformal theories, that preserve four supersymmetries

  16. Predicting AD conversion

    DEFF Research Database (Denmark)

    Liu, Yawu; Mattila, Jussi; Ruiz, Miguel �ngel Mu�oz

    2013-01-01

    To compare the accuracies of predicting AD conversion by using a decision support system (PredictAD tool) and current research criteria of prodromal AD as identified by combinations of episodic memory impairment of hippocampal type and visual assessment of medial temporal lobe atrophy (MTA) on MRI...

  17. Winding strings in AdS3

    International Nuclear Information System (INIS)

    Herscovich, Estanislao; Minces, Pablo; Nunez, Carmen

    2006-01-01

    Correlation functions of one-unit spectral flowed states in string theory on AdS 3 are considered. We present the modified Knizhnik-Zamolodchikov and null vector equations to be satisfied by amplitudes containing states in winding sector one and study their solution corresponding to the four point function including one w = 1 field. We compute the three point function involving two one-unit spectral flowed operators and find expressions for amplitudes of three w = 1 states satisfying certain particular relations among the spins of the fields. Several consistency checks are performed

  18. Mobile Context Toolbox

    DEFF Research Database (Denmark)

    Stopczynski, Arkadiusz; Larsen, Jakob Eg; Skomail, Lukasz

    2010-01-01

    In this paper we describe an open framework utilizing sensors and application data on the Maemo mobile platform enabling rapid prototyping of context-aware mobile applications. The framework has an extensible layered architecture allowing new hardware and software sensors and features to be added...... to the context framework. We present initial results from in-the-wild experiments where contextual data was acquired using the tool. In the experiments 6 participants were using a Nokia N900 mobile phone continuously with a logger application for an average of 33 days. The study has provided valuable insights...

  19. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  20. Displays enabling mobile multimedia

    Science.gov (United States)

    Kimmel, Jyrki

    2007-02-01

    With the rapid advances in telecommunications networks, mobile multimedia delivery to handsets is now a reality. While a truly immersive multimedia experience is still far ahead in the mobile world, significant advances have been made in the constituent audio-visual technologies to make this become possible. One of the critical components in multimedia delivery is the mobile handset display. While such alternatives as headset-style near-to-eye displays, autostereoscopic displays, mini-projectors, and roll-out flexible displays can deliver either a larger virtual screen size than the pocketable dimensions of the mobile device can offer, or an added degree of immersion by adding the illusion of the third dimension in the viewing experience, there are still challenges in the full deployment of such displays in real-life mobile communication terminals. Meanwhile, direct-view display technologies have developed steadily, and can provide a development platform for an even better viewing experience for multimedia in the near future. The paper presents an overview of the mobile display technology space with an emphasis on the advances and potential in developing direct-view displays further to meet the goal of enabling multimedia in the mobile domain.

  1. Auctioning Bulk Mobile Messages

    NARCIS (Netherlands)

    S. Meij (Simon); L-F. Pau (Louis-François); H.W.G.M. van Heck (Eric)

    2003-01-01

    textabstractThe search for enablers of continued growth of SMS traffic, as well as the take-off of the more diversified MMS message contents, open up for enterprises the potential of bulk use of mobile messaging , instead of essentially one-by-one use. In parallel, such enterprises or value added

  2. Mobile Learning Using Mobile Phones

    Science.gov (United States)

    Vicente, Paula

    2013-01-01

    The participation in mobile learning programs is conditioned by having/using mobile communication technology. Those who do not have or use such technology cannot participate in mobile learning programs. This study evaluates who are the most likely participants of mobile learning programs by examining the demographic profile and mobile phone usage…

  3. AdS2 holographic dictionary

    International Nuclear Information System (INIS)

    Cvetič, Mirjam; Papadimitriou, Ioannis

    2016-01-01

    We construct the holographic dictionary for both running and constant dilaton solutions of the two dimensional Einstein-Maxwell-Dilaton theory that is obtained by a circle reduction from Einstein-Hilbert gravity with negative cosmological constant in three dimensions. This specific model ensures that the dual theory has a well defined ultraviolet completion in terms of a two dimensional conformal field theory, but our results apply qualitatively to a wider class of two dimensional dilaton gravity theories. For each type of solutions we perform holographic renormalization, compute the exact renormalized one-point functions in the presence of arbitrary sources, and derive the asymptotic symmetries and the corresponding conserved charges. In both cases we find that the scalar operator dual to the dilaton plays a crucial role in the description of the dynamics. Its source gives rise to a matter conformal anomaly for the running dilaton solutions, while its expectation value is the only non trivial observable for constant dilaton solutions. The role of this operator has been largely overlooked in the literature. We further show that the only non trivial conserved charges for running dilaton solutions are the mass and the electric charge, while for constant dilaton solutions only the electric charge is non zero. However, by uplifting the solutions to three dimensions we show that constant dilaton solutions can support non trivial extended symmetry algebras, including the one found by Compère, Song and Strominger http://dx.doi.org/10.1007/JHEP05(2013)152, in agreement with the results of Castro and Song http://arxiv.org/abs/1411.1948. Finally, we demonstrate that any solution of this specific dilaton gravity model can be uplifted to a family of asymptotically AdS 2 ×S 2 or conformally AdS 2 ×S 2 solutions of the STU model in four dimensions, including non extremal black holes. The four dimensional solutions obtained by uplifting the running dilaton solutions coincide

  4. Complexity of the AdS soliton

    Science.gov (United States)

    Reynolds, Alan P.; Ross, Simon F.

    2018-05-01

    We consider the holographic complexity conjectures in the context of the AdS soliton, which is the holographic dual of the ground state of a field theory on a torus with antiperiodic boundary conditions for fermions on one cycle. The complexity is a non-trivial function of the size of the circle with antiperiodic boundary conditions, which sets an IR scale in the dual geometry. We find qualitative differences between the calculations of complexity from spatial volume and action (CV and CA). In the CV calculation, the complexity for antiperiodic boundary conditions is smaller than for periodic, and decreases monotonically with increasing IR scale. In the CA calculation, the complexity for antiperiodic boundary conditions is larger than for periodic, and initially increases with increasing IR scale, eventually decreasing to zero as the IR scale becomes of order the UV cutoff. We compare these results to a simple calculation for free fermions on a lattice, where we find the complexity for antiperiodic boundary conditions is larger than for periodic.

  5. AdS2 models in an embedding superspace

    International Nuclear Information System (INIS)

    McKeon, D.G.C.; Sherry, T.N.

    2003-01-01

    An embedding superspace, whose bosonic part is the flat (2+1)-dimensional embedding space for AdS 2 , is introduced. Superfields and several supersymmetric models are examined in the embedded AdS 2 superspace

  6. Staging Mobilities / Designing Mobilities

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    2015-01-01

    , and systems 'hosting' these multiple and complex mobilities are designed and how they are staging these in terms of their physical layout. By analysing specific cases of ‘mobilities design’ related to the four modes of moving; Walk, Bike, Train, and Car, the book uncover important and until now neglected...... is more than movement between point A and B. It explores how the movement of people, goods, information, and signs influences human understandings of self, other and the built environment. Moving towards a new understanding of the relationship between movement, interaction and environments, the project...

  7. Decentralized position verification in geographic ad hoc routing

    NARCIS (Netherlands)

    Leinmüller, Tim; Schoch, Elmar; Kargl, Frank; Maihöfer, Christian

    Inter-vehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). Compared to MANETs or wireless sensor networks (WSNs), these so-called vehicular ad hoc networks (VANETs) have unique requirements on network protocols. The requirements result mainly from

  8. AdS3: the NHEK generation

    International Nuclear Information System (INIS)

    Bena, Iosif; Heurtier, Lucien; Puhm, Andrea

    2016-01-01

    It was argued in http://dx.doi.org/10.1007/JHEP03(2013)028 that the five-dimensional near-horizon extremal Kerr (NHEK) geometry can be embedded in String Theory as the infrared region of an infinite family of non-supersymmetric geometries that have D1, D5, momentum and KK monopole charges. We show that there exists a method to embed these geometries into asymptotically-AdS 3 ×S 3 /ℤ N solutions, and hence to obtain infinite families of flows whose infrared is NHEK. This indicates that the CFT dual to the NHEK geometry is the IR fixed point of a Renormalization Group flow from a known local UV CFT and opens the door to its explicit construction.

  9. Hadronization at the AdS wall

    International Nuclear Information System (INIS)

    Evans, Nick; French, James; Threlfall, Ed; Jensen, Kristan

    2010-01-01

    We describe hadronization events, using the AdS/CFT Correspondence, which display many of the qualitative features expected in QCD. In particular we study the motion of strings with separating end points in a back-reacted hard wall geometry. The solutions show the development of a linear QCD-like string. The end points oscillate in the absence of string breaking. We introduce string breaking by hand and evolve the new state forward in time to observe the separation of two string segments. A kink associated with this breaking evolves to the end points of the string inducing rho meson production. We explicitly compute the rho meson production at the end point.

  10. Mobility management in mobile IP

    Science.gov (United States)

    Medidi, Sirisha; Golshani, Forouzan

    2002-07-01

    There is an emerging interest in integrating mobile wireless communication with the Internet based on the Ipv6 technology. Many issues introduced by the mobility of users arise when such an integration is attempted. This paper addresses the problem of mobility management, i.e., that of tracking the current IP addresses of mobile terminals and sustaining active IP connections as mobiles move. The paper presents some architectural and mobility management options for integrating wireless access to the Internet. We then present performance results for Mobile IPv4, route optimization and Mobile IPv6.

  11. Mobile Election

    OpenAIRE

    Long, Elena; Lovitskii, Vladimir; Thrasher, Michael; Traynor, David

    2009-01-01

    Mobile phones have the potential of fostering political mobilisation. There is a significant political power in mobile technology. Like the Internet, mobile phones facilitate communication and rapid access to information. Compared to the Internet, however, mobile phone diffusion has reached a larger proportion of the population in most countries, and thus the impact of this new medium is conceivably greater. There are now more mobile phones in the UK than there are people (ave...

  12. Mobile Advertising

    OpenAIRE

    Alamuri, Lavanya

    2009-01-01

    The aim of this project was to get an understanding of how companies adopt mobile as an advertising medium. The literature review aided in framing a draft of the factors that affect mobile advertising adoption and possible forms of mobile advertising. Considering the scope of the thesis work, branding strategy, service costs, personalization and privacy and platform were considered to be the factors that could affect the mobile advertising adoption. A few possible forms on mobile device we...

  13. Management job ads

    DEFF Research Database (Denmark)

    Holmgreen, Lise-Lotte

    2014-01-01

    jobs by discursively constructing job ads that appeal to both sexes. This argument is part of the broader field of corporate social responsibility, corporate citizenship, and stakeholder management, which involves discussions of the obligations of corporations to acknowledge and mitigate...... the increasingly widespread impact that their activities have on communities and social structures. The article emphasises the need for more active engagement on the part of corporations by analysing the discursive construction of preferred candidates in a small sample of Danish management job ads. By means...... that this agreement reflects a high degree of conservatism in the system where men enjoy a considerable advantage and where procedures that ensure male dominance are perpetuated even in the linguistic and discursive construction of job ads....

  14. ADS National Programmes: China

    International Nuclear Information System (INIS)

    2015-01-01

    In China the conceptual study of an ADS concept which lasted for about five years ended in 1999. As one project of the National Basic Research Programme of China (973 Programme) in energy domain, which is sponsored by the China Ministry of Science and Technology (MOST), a five year programme of fundamental research of ADS physics and related technology was launched in 2000 and passed national review at the end of 2005. From 2007, another five year 973 Programme Key Technology Research of Accelerator Driven Subcritical System for Nuclear waste Transmutation started. The research activities were focused on HPPA physics and technology, reactor physics of external source driven subcritical assembly, nuclear data base and material study. For HPPA, a high current injector consisting of an ECR ion source, LEBT and an RFQ accelerating structure of 3.5 MeV has been built and were being improved. In reactor physics study, a series of neutron multiplication experimental study has been carrying out. The VENUS I facility has been constructed as the basic experimental platform for neutronics study in ADS blanket. VENUS I a zero power subcritical neutron multiplying assembly driven by external neutron produced by a pulsed neutron generator or 252Cf neutron source. The theoretical, experimental and simulation studies on nuclear data, material properties and nuclear fuel circulation related to ADS are carried out in order to provide the database for ADS system analysis. China Institute of Atomic Energy (CIAE), Institute of High Energy Physics (IHEP) and other Chinese institutes carried out the MOST project together. Besides CIAE, China Academy of Science (CAS) pays more and more attention to Advanced Nuclear Fuel Cycles (ANFC). A large programme of ANFC, including ADS and Th based nuclear fuel cycle, has been launched by CAS

  15. The added value of a mobile application of Community Case Management on referral, re-consultation and hospitalization rates of children aged under 5 years in two districts in Northern Malawi: study protocol for a pragmatic, stepped-wedge cluster-randomized controlled trial.

    Science.gov (United States)

    Hardy, Victoria; O'Connor, Yvonne; Heavin, Ciara; Mastellos, Nikolaos; Tran, Tammy; O'Donoghue, John; Fitzpatrick, Annette L; Ide, Nicole; Wu, Tsung-Shu Joseph; Chirambo, Griphin Baxter; Muula, Adamson S; Nyirenda, Moffat; Carlsson, Sven; Andersson, Bo; Thompson, Matthew

    2017-10-11

    There is evidence to suggest that frontline community health workers in Malawi are under-referring children to higher-level facilities. Integrating a digitized version of paper-based methods of Community Case Management (CCM) could strengthen delivery, increasing urgent referral rates and preventing unnecessary re-consultations and hospital admissions. This trial aims to evaluate the added value of the Supporting LIFE electronic Community Case Management Application (SL eCCM App) compared to paper-based CCM on urgent referral, re-consultation and hospitalization rates, in two districts in Northern Malawi. This is a pragmatic, stepped-wedge cluster-randomized trial assessing the added value of the SL eCCM App on urgent referral, re-consultation and hospitalization rates of children aged 2 months and older to up to 5 years, within 7 days of the index visit. One hundred and two health surveillance assistants (HSAs) were stratified into six clusters based on geographical location, and clusters randomized to the timing of crossover to the intervention using simple, computer-generated randomization. Training workshops were conducted prior to the control (paper-CCM) and intervention (paper-CCM + SL eCCM App) in assigned clusters. Neither participants nor study personnel were blinded to allocation. Outcome measures were determined by abstraction of clinical data from patient records 2 weeks after recruitment. A nested qualitative study explored perceptions of adherence to urgent referral recommendations and a cost evaluation determined the financial and time-related costs to caregivers of subsequent health care utilization. The trial was conducted between July 2016 and February 2017. This is the first large-scale trial evaluating the value of adding a mobile application of CCM to the assessment of children aged under 5 years. The trial will generate evidence on the potential use of mobile health for CCM in Malawi, and more widely in other low- and middle

  16. Mobilities Design

    DEFF Research Database (Denmark)

    Lanng, Ditte Bendix; Wind, Simon; Jensen, Ole B.

    2017-01-01

    Mobilities comprise a large part of our world and everyday lives, and the mobilities spaces in which we travel are ubiquitous. Yet, ordinary mobilities spaces – such as parking lots, pedestrian tunnels, and road lay-bys – tend to be criticized as typologies that lack consideration for the people...... who use them and for their wider social, aesthetic, cultural, and ecological agency in the city. This is clearly not an unambiguous characterization. But from it follows an urgency to re-examine unheeded mobilities spaces and extend demands of their agency beyond standards of technical efficiency....... This article draws on the recent “mobilities turn” in social science to support such re-examination of mobilities spaces. In social-scientific mobilities research, mobilities are considered the departure point for understanding the socio-material world in which we live. Mobilities are regarded as far more than...

  17. Antecedents to Consumers' Acceptance of Mobile Advertisements

    DEFF Research Database (Denmark)

    Rajala, Risto; Westerlund, Mika

    2010-01-01

    The paper presents a hierarchical construct PLS structural equation model to analyze mobile advertisement acceptance. Hypotheses are established and tested about the hierarchical structure and the effects of the factors that precede consumers' behavioral intention to accept mobile advertisement....... The results suggest that valuable content and trust in advertisers are key predictors of mobile device users' acceptance of mobile advertising. In addition, subjective value of the ads and subjective norms mediate these antecedent-acceptance relationships. The results are invaluable to both scholars...

  18. Correlation ion mobility spectroscopy

    Science.gov (United States)

    Pfeifer, Kent B [Los Lunas, NM; Rohde, Steven B [Corrales, NM

    2008-08-26

    Correlation ion mobility spectrometry (CIMS) uses gating modulation and correlation signal processing to improve IMS instrument performance. Closely spaced ion peaks can be resolved by adding discriminating codes to the gate and matched filtering for the received ion current signal, thereby improving sensitivity and resolution of an ion mobility spectrometer. CIMS can be used to improve the signal-to-noise ratio even for transient chemical samples. CIMS is especially advantageous for small geometry IMS drift tubes that can otherwise have poor resolution due to their small size.

  19. Adding an extra storey

    DEFF Research Database (Denmark)

    Engelmark, Jesper; Dahl, Torben; Melgaard, Ebbe

    2007-01-01

    of them had to be renovated after a shorter period. In stead of just replacing the original roof with a new one, it is now a days rather common to ad an extra storey where that is possible according to local planning. The reason is as a rule based on economical benefits, but very often this extra storey...

  20. Mobile Workforce, Mobile Technology, Mobile Threats

    International Nuclear Information System (INIS)

    Garcia, J.

    2015-01-01

    Mobile technologies' introduction into the world of safeguards business processes such as inspection creates tremendous opportunity for novel approaches and could result in a number of improvements to such processes. Mobile applications are certainly the wave of the future. The success of the application ecosystems has shown that users want full fidelity, highly-usable, simple purpose applications with simple installation, quick responses and, of course, access to network resources at all times. But the counterpart to opportunity is risk, and the widespread adoption of mobile technologies requires a deep understanding of the threats and vulnerabilities inherent in mobile technologies. Modern mobile devices can be characterized as small computers. As such, the threats against computing infrastructure apply to mobile devices. Meanwhile, the attributes of mobile technology that make it such an obvious benefit over traditional computing platforms all have elements of risk: pervasive, always-on networking; diverse ecosystems; lack of centralized control; constantly shifting technological foundations; intense competition among competitors in the marketplace; the scale of the installation base (from millions to billions); and many more. This paper will explore the diverse and massive environment of mobile, the number of attackers and vast opportunities for compromise. The paper will explain how mobile devices prove valuable targets to both advanced and persistent attackers as well as less-skilled casual hackers. Organized crime, national intelligence agencies, corporate espionage are all part of the landscape. (author)

  1. Globally regular instability of AdS_3

    OpenAIRE

    Bizon, P.; Jałmużna, J.

    2013-01-01

    We consider three-dimensional AdS gravity minimally coupled to a massless scalar field and study numerically the evolution of small smooth circularly symmetric perturbations of the $AdS_3$ spacetime. As in higher dimensions, for a large class of perturbations, we observe a turbulent cascade of energy to high frequencies which entails instability of $AdS_3$. However, in contrast to higher dimensions, the cascade cannot be terminated by black hole formation because small perturbations have ener...

  2. Nonlinear realization of supersymmetric AdS space isometries

    International Nuclear Information System (INIS)

    Clark, T. E.; Love, S. T.

    2006-01-01

    The isometries of AdS 5 space and supersymmetric AdS 5 xS 1 space are nonlinearly realized on four-dimensional Minkowski space. The resultant effective actions in terms of the Nambu-Goldstone modes are constructed. The dilatonic mode governing the motion of the Minkowski space probe brane into the covolume of supersymmetric AdS 5 space is found to be unstable and the bulk of the AdS 5 space is unable to sustain the brane. No such instability appears in the nonsupersymmetric case

  3. Mobilities Design

    DEFF Research Database (Denmark)

    Jensen, Ole B.; Lanng, Ditte Bendix

    Contemporary society is marked and defined by the ways in which mobile goods, bodies, vehicles, objects, and data are organized, moved and staged. On the background of the ‘mobilities turn’ (e.g. Cresswell 2006, Urry 2007) this book articulates a new and emerging research field, namely that of ‘m......Contemporary society is marked and defined by the ways in which mobile goods, bodies, vehicles, objects, and data are organized, moved and staged. On the background of the ‘mobilities turn’ (e.g. Cresswell 2006, Urry 2007) this book articulates a new and emerging research field, namely...... that of ‘mobilities design’. The book revolves around the following research question: How are design decisions and interventions staging mobilities? It builds upon the Staging Mobilities model (Jensen 2013) in an explorative inquiry into the problems and potentials of the design of mobilities. The exchange value...

  4. Mobile economy

    OpenAIRE

    Turowski, Klaus

    2004-01-01

    Mobile economy : Transaktionen, Prozesse, Anwendungen und Dienste ; 4. Workshop Mobile Commerce, 02.-03. Februar 2004, Univ. Augsburg / K. Turowski ... (Hrsg.). - Bonn : Ges. für Informatik, 2004. - 189 S. : Ill., graph. Darst. - (GI-Edition : Proceedings ; 42)

  5. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  6. Mobile marketing

    OpenAIRE

    Gause, Matěj

    2012-01-01

    The goal of bachelor's thesis on the theme "Mobile marketing" is to outline its development and why is this new phenomen so important for all modern companies around the world. The work is not about simple description of mobile marketing media but it vividly informs about the latest trends and news from the world of mobile apps and games. It presents the most successful mobile apps which registered more than billion downloads and from their unique characteristics it unveils great potential of...

  7. Mobile marketing

    OpenAIRE

    KLEČKOVÁ, Zuzana

    2013-01-01

    The main aim of this thesis was to provide a comprehensive overview of the mobile marketing and analyze selected campaigns of Czech mobile marketing in comparison to world successful campaigns. The research contained studying of available literature about the theme to gain general knowledge about the issue. The theoretical part of the thesis contains predominantly various definitions of mobile marketing and its tools, advantages of these tools and some information about Mobile Marketing Assoc...

  8. Ads in Indonesia

    Directory of Open Access Journals (Sweden)

    Wulan Roro Retno

    2017-01-01

    Full Text Available Cosmetics industry created the beauty myth for women through advertising. A cosmetic ad in Indonesia has spread a new concept of white skin: East Asia beauty myth. The white concept of Asia white skin basically derived from colonial legacy. The purpose of the research was analyzing the beauty myth in Indonesia ads using postcolonial perspective. The principal result brought the discourse analysis and postcolonial perspective a new insight in communication research. Particularly on media and cultural studies. Major conclusions showed that the beauty myth since the Dutch colonial period never been change. The main concept is always in colonialism’s idea: “white is better”. The West is better than the East.

  9. Staging Mobilities

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    and lived as people are “staging themselves” (from below). Staging mobilities is a dynamic process between “being staged” (for example, being stopped at traffic lights) and the “mobile staging” of interacting individuals (negotiating a passage on the pavement). Staging Mobilities is about the fact...

  10. Subversive Mobilities

    DEFF Research Database (Denmark)

    Thelle, Mikkel

    2013-01-01

    The article approaches mobility through a cultural history of urban conflict. Using a case of “The Copenhagen Trouble,“ a series of riots in the Danish capital around 1900, a space of subversive mobilities is delineated. These turn-of-the-century riots points to a new pattern of mobile gathering...

  11. Philosophia ad bellum

    Directory of Open Access Journals (Sweden)

    Yu. O. Loboda

    2014-06-01

    Full Text Available In the paper «Philosophia ad bellum» is being realized an attempt to classify philosophic approaches to the study of phenomenon of war by the analogy with the structure of «Just war theory» – 1. Philosophia ad bellum – «philosophy for war», where are investigated ways of using of philosophic methods of cognition in applied military sciences; 2. Philosophia supra bello – «philosophy above war», which investigates world­view, historic­philosophic, existential, logic­epistemological aspects of war; 3. Philosophia contra belli – «philosophy against war», where research of the essence of war gets its logical conclusion in grounding of the absurdity of thinking schemes which justify war as an act of violence. In the article was made historic­philosophic overview of the part «Philosophia ad bellum», where were showed tangent questions, which are considered by philosophic logic and theory of strategic intelligence. It was stated, that specialists if military intelligence admit the important role of researches in logic and theory of cognition in their professional work; were defined basic questions, which have the most essential interest for military professionals. There were analyzed ways of using of philosophic methods in developing military strategies, was made a conclusion that philosophy can be a basis of strategic failures and victories as well.

  12. AD HOC Networks for the Autonomous Car

    Science.gov (United States)

    Ron, Davidescu; Negrus, Eugen

    2017-10-01

    The future of the vehicle is made of cars, roads and infrastructures connected in a two way automated communication in a holistic system. It is a mandatory to use Encryption to maintain Confidentiality, Integrity and Availability in an ad hoc vehicle network. Vehicle to Vehicle communication, requires multichannel interaction between mobile, moving and changing parties to insure the full benefit from data sharing and real time decision making, a network of such users referred as mobile ad hoc network (MANET), however as ad hoc networks were not implemented in such a scale, it is not clear what is the best method and protocol to apply. Furthermore the visibility of secure preferred asymmetric encrypted ad hoc networks in a real time environment of dense moving autonomous vehicles has to be demonstrated, In order to evaluate the performance of Ad Hoc networks in changing conditions a simulation of multiple protocols was performed on large number of mobile nodes. The following common routing protocols were tested, DSDV is a proactive protocol, every mobile station maintains a routing table with all available destinations, DSR is a reactive routing protocol which allows nodes in the MANET to dynamically discover a source route across multiple network hops, AODV is a reactive routing protocol Instead of being proactive. It minimizes the number of broadcasts by creating routes based on demand, SAODV is a secure version of AODV, requires heavyweight asymmetric cryptographic, ARIANDE is a routing protocol that relies on highly efficient symmetric cryptography the concept is primarily based on DSR. A methodical evolution was performed in a various density of transportation, based on known communication bench mark parameters including, Throughput Vs. time, Routing Load per packets and bytes. Out of the none encrypted protocols, It is clear that in terms of performance of throughput and routing load DSR protocol has a clear advantage the high node number mode. The encrypted

  13. Mobile Probes in Mobile Learning

    DEFF Research Database (Denmark)

    Ørngreen, Rikke; Blomhøj, Ulla; Duvaa, Uffe

    In this paper experiences from using mobile probes in educational design of a mobile learning application is presented. The probing process stems from the cultural probe method, and was influenced by qualitative interview and inquiry approaches. In the project, the mobile phone was not only acting...... as an agent for acquiring empirical data (as the situation in hitherto mobile probe settings) but was also the technological medium for which data should say something about (mobile learning). Consequently, not only the content of the data but also the ways in which data was delivered and handled, provided...... a valuable dimension for investigating mobile use. The data was collected at the same time as design activities took place and the collective data was analysed based on user experience goals and cognitive processes from interaction design and mobile learning. The mobile probe increased the knowledge base...

  14. The group approach to AdS space propagators

    International Nuclear Information System (INIS)

    Leonhardt, Thorsten; Manvelyan, Ruben; Ruehl, Werner

    2003-01-01

    We show that AdS two-point functions can be obtained by connecting two points in the interior of AdS space with one point on its boundary by a dual pair of Dobrev's boundary-to-bulk intertwiners and integrating over the boundary point

  15. Mobile Semiotics

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    2013-01-01

    This chapter aims to understand the mobile condition of contemporary life with a particular view to the signifying dimension of the environment and its ‘readability’. The chapter explores the potentials of semiotics and its relationship to the new mobilities literature. What takes place...... is a ‘mobile sense making’ where signs and materially situated meanings connect to the moving human body and thus create particular challenges and complexities of making sense of the world. The chapter includes notions of mobility systems and socio-technical networks in order to show how a ‘semiotic layer’ may...... work to afford or restrict mobile practices....

  16. Manifestly T-dual formulation of AdS space

    International Nuclear Information System (INIS)

    Hatsuda, Machiko; Kamimura, Kiyoshi; Siegel, Warren

    2017-01-01

    We present a manifestly T-dual formulation of curved spaces such as an AdS space. For group manifolds related by the orthogonal vielbein fields the three form H=dB in the doubled space is universal at least locally. We construct an affine nondegenerate doubled bosonic AdS algebra to define the AdS space with the Ramond-Ramond flux. The non-zero commutator of the left and right momenta leads to that the left momentum is in an AdS space while the right momentum is in a dS space. Dimensional reduction constraints and the physical AdS algebra are shown to preserve all the doubled coordinates.

  17. Evaporation of large black holes in AdS

    International Nuclear Information System (INIS)

    Rocha, Jorge V

    2010-01-01

    The AdS/CFT correspondence offers a new perspective on the long-standing black hole information paradox. However, to be able to use the available gauge/gravity machinery one is forced to consider so-called 'large' black holes in AdS, and these objects are thermodynamically stable - they do not evaporate. We describe a simple toy model that allows large AdS black holes to decay, by coupling the emitted radiation to an external scalar field propagating in an auxiliary space. This effectively changes the properties of the boundary of AdS, making it partly absorbing. We demonstrate that the evaporation process never ceases by explicitly presenting (a) the transmission coefficient for a wave scattering from the bulk into auxiliary space and (b) the greybody factor for a black 3-brane in an AdS background. Therefore, the model provides an interesting framework to address the information paradox using AdS/CFT techniques.

  18. Manifestly T-dual formulation of AdS space

    Energy Technology Data Exchange (ETDEWEB)

    Hatsuda, Machiko [Physics Division, Faculty of Medicine, Juntendo University,Chiba 270-1695 (Japan); KEK Theory Center, High Energy Accelerator Research Organization,Tsukuba, Ibaraki 305-0801 (Japan); Kamimura, Kiyoshi [Physics Division, Faculty of Medicine, Juntendo University,Chiba 270-1695 (Japan); Siegel, Warren [C.N. Yang Institute for Theoretical Physics, Stony Brook University,Stony Brook, NY 11794-3840 (United States)

    2017-05-12

    We present a manifestly T-dual formulation of curved spaces such as an AdS space. For group manifolds related by the orthogonal vielbein fields the three form H=dB in the doubled space is universal at least locally. We construct an affine nondegenerate doubled bosonic AdS algebra to define the AdS space with the Ramond-Ramond flux. The non-zero commutator of the left and right momenta leads to that the left momentum is in an AdS space while the right momentum is in a dS space. Dimensional reduction constraints and the physical AdS algebra are shown to preserve all the doubled coordinates.

  19. Open strings on AdS2 branes

    International Nuclear Information System (INIS)

    Lee, Peter; Ooguri, Hirosi.; Park, Jongwon; Tannenhauser, Jonathan

    2001-01-01

    We study the spectrum of open strings on AdS 2 branes in AdS 3 in an NS-NS background, using the SL(2,R) WZW model. When the brane carries no fundamental string charge, the open string spectrum is the holomorphic square root of the spectrum of closed strings in AdS 3 . It contains short and long strings, and is invariant under spectral flow. When the brane carries fundamental string charge, the open string spectrum again contains short and long strings in all winding sectors. However, branes with fundamental string charge break half the spectral flow symmetry. This has different implications for short and long strings. As the fundamental string charge increases, the brane approaches the boundary of AdS 3 . In this limit, the induced electric field on the worldvolume reaches its critical value, producing noncommutative open string theory on AdS 2

  20. Mobile Lexicography

    DEFF Research Database (Denmark)

    Køhler Simonsen, Henrik

    2014-01-01

    Users are already mobile, but the question is to which extent knowledge-based dictionary apps are designed for the mobile user situation. The objective of this article is to analyse the characteristics of the mobile user situation and to look further into the stationary user situation and the mob......Users are already mobile, but the question is to which extent knowledge-based dictionary apps are designed for the mobile user situation. The objective of this article is to analyse the characteristics of the mobile user situation and to look further into the stationary user situation...... and the mobile user situation. The analysis is based on an empirical survey involving ten medical doctors and a monolingual app designed to support cognitive lexicographic functions, cf. (Tarp 2006:61-64). In test A the doctors looked up five medical terms while sitting down at a desk and in test B the doctors...

  1. Mobility Divides

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    Contemporary mobilities are cultural and social manifestations, and the mobile practices in the everyday life of billions of humans are re-configuring senses of place, self, other and relationships to the built environment. The way ‘mobile situations’ are staged in designed and built environments......’ in the everyday life and cast light on how design and ‘materialities of mobilites’ are creating differential mobilities across societies, social networks, and communities of practices.......Contemporary mobilities are cultural and social manifestations, and the mobile practices in the everyday life of billions of humans are re-configuring senses of place, self, other and relationships to the built environment. The way ‘mobile situations’ are staged in designed and built environments...

  2. Mobile Semiotics - signs and mobilities

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    a potential for mobilities studies if the awareness of seeing the environment as a semiotic layer and system can be sensitized to the insights of the ‘mobilities turn’. Empirically the paper tentatively explores the usefulness of a mobile semiotics approach to cases such as street signage, airport design...

  3. Leading Change, Adding Value.

    Science.gov (United States)

    Evans, Nick

    2016-09-12

    Essential facts Leading Change, Adding Value is NHS England's new nursing and midwifery framework. It is designed to build on Compassion in Practice (CiP), which was published 3 years ago and set out the 6Cs: compassion, care, commitment, courage, competence and communication. CiP established the values at the heart of nursing and midwifery, while the new framework sets out how staff can help transform the health and care sectors to meet the aims of the NHS England's Five Year Forward View.

  4. Analysis of pervasive mobile ad hoc routing protocols

    NARCIS (Netherlands)

    Qadri, N.N.; Liotta, A.; Hassanien, A.E.; Abawajy, J.H.; Abraham, A.; Hagras, H.

    2009-01-01

    Pervasive computing (also referred to as ubiquitous computing or ambient intelligence) aims to create environments where computers are invisibly and seamlessly integrated and connected into our everyday environment. Pervasive computing and intelligent multimedia technologies are becoming

  5. Probabilistic Models and Process Calculi for Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Song, Lei

    , thus the network topology may undergo constant changes. Moreover the devices in an MANET are loosely connected not depending on pre-installed infrastructure or central control components, they exchange messages via wireless connections which are less reliable compared to wired connections. Therefore...

  6. Ad hoc networking scheme for mobile cyber-physical systems

    KAUST Repository

    Bader, Ahmed; Alouini, Mohamed-Slim

    2017-01-01

    Embodiments of the present disclosure provide techniques for packet routing. In an embodiment, when a transmitting communication device injects a packet into a communication network, a receiving communication device that is closer to a sink

  7. Ad hoc networking scheme for mobile cyber-physical systems

    KAUST Repository

    Bader, Ahmed

    2017-08-17

    Embodiments of the present disclosure provide techniques for packet routing. In an embodiment, when a transmitting communication device injects a packet into a communication network, a receiving communication device that is closer to a sink or destination than the transmitting communication device relays the packet in a first hop. In a subsequent hop, a receiving communication device evaluates position information conveyed by the transmitting communication device of the first hop to determine whether to forward the packet. Accordingly, a receiving communication device receiver that offers progress towards the sink can elect to forward the packet.

  8. Space-Time Processing for Tactical Mobile Ad Hoc Networks

    Science.gov (United States)

    2009-08-01

    the results for the standard 8 bits per pixel ( bpp ) 512512 Lena image [3] with a transmission rate of 0.375 bpp . To compare the image quality, we...use peak-signal-to-noise ratio (PSNR), defined as  DE 2255 log10PSNR  (dB) (2) where 255 is due to the 8 bpp image

  9. Network Management System for Tactical Mobile Ad Hoc Network Segments

    Science.gov (United States)

    2011-09-01

    Protocol UFO UHF Follow-On UHF Ultra High Frequency USB Universal Serial Bus VHF Very High Frequency VIRT Valuable Information at the Right Time...military satellite system known as the UHF Follow-on system ( UFO ) only provides capacity for 600 concurrent users. DoD users also have commercial

  10. Space-Time Processing for Tactical Mobile Ad Hoc Networks

    Science.gov (United States)

    2010-05-01

    results quantifying the impact of fading on average symbol and error probability (SEP/ BEP ) are available for various modulation schemes. However, in slow...fading situations, there is no mapping between the average SEP/ BEP and the average PEP. Consequently knowing average SEP/ BEP does not help in...understanding the average PEP. Analysis of average PEP is a more complicated problem compared to the analysis of average SEP/ BEP . Analytical

  11. Collaboration Layer for Robots in Mobile Ad-hoc Networks

    DEFF Research Database (Denmark)

    Borch, Ole; Madsen, Per Printz; Broberg, Jacob Honor´e

    2009-01-01

    networks to solve tasks collaboratively. In this proposal the Collaboration Layer is modelled to handle service and position discovery, group management, and synchronisation among robots, but the layer is also designed to be extendable. Based on this model of the Collaboration Layer, generic services...... are provided to the application running on the robot. The services are generic because they can be used by many different applications, independent of the task to be solved. Likewise, specific services are requested from the underlying Virtual Machine, such as broadcast, multicast, and reliable unicast....... A prototype of the Collaboration Layer has been developed to run in a simulated environment and tested in an evaluation scenario. In the scenario five robots solve the tasks of vacuum cleaning and entrance guarding, which involves the ability to discover potential co-workers, form groups, shift from one group...

  12. Conical singularities in AdS space time

    International Nuclear Information System (INIS)

    Ferreira, Cristine Nunes

    2011-01-01

    Full text: In recent years, the study of conformal gauge theories from 10-D has been motivated by the AdS d+1 /CFT d correspondence, first conjectured by J. Maldacena. The aim of this work is to consider the d = 4 case by analysing the configuration of the N coincident D3 branes. In this context, the work shows that there is a duality between type IIB string theory in AdS 5 x S 5 and N = 4 SU(N) Super Yang-Mills Theory in the IR. The AdS 5 /CFT 4 correspondence brought also new approaches to the strong coupling problem in QCD. Nowadays, there is a whole line of works that focus on the low dimensional correspondence AdS 4 /CFT 3 , like the application to graphene and topological insulators, and the AdS 3 /CFT 2 correspondence, related with the entanglement entropy. In this work, we consider the vortex configuration solution to the AdS 4 and AdS 3 space-time. The most important motivation is to discuss the boundary theory resulting from these solutions. We have examined a straightforward approach to a holographic computation of the graphene and entanglement entropy in the presence of the conical singularity. After this analysis, we consider the scalar field in the bulk in the presence of this metrics and work out the compactification modes. Taking the holographic point of view, we study and discuss the resulting Green function. (author)

  13. Hawking radiation from AdS black holes

    International Nuclear Information System (INIS)

    Hubeny, Veronika E; Rangamani, Mukund; Marolf, Donald

    2010-01-01

    We study Hartle-Hawking-like states of quantum field theories on asymptotically AdS black hole backgrounds, with particular regard to the phase structure of interacting theories. By a suitable analytic continuation we show that the equilibrium dynamics of field theories on large asymptotically AdS black holes can be related to the low-temperature states of the same field theory on the AdS soliton (or pure AdS) background. This allows us to gain insight into Hartle-Hawking-like states on large-radius Schwarzschild- or rotating-AdS black holes. Furthermore, we exploit the AdS/CFT correspondence to explore the physics of strongly coupled large N theories on asymptotically AdS black holes. In particular, we exhibit a plausibly complete set of phases for the M2-brane world-volume superconformal field theory on a BTZ black hole background. Our analysis partially resolves puzzles previously raised in connection with Hawking radiation on large AdS black holes.

  14. Sensor and ad-hoc networks theoretical and algorithmic aspects

    CERN Document Server

    Makki, S Kami; Pissinou, Niki; Makki, Shamila; Karimi, Masoumeh; Makki, Kia

    2008-01-01

    This book brings together leading researchers and developers in the field of wireless sensor networks to explain the special problems and challenges of the algorithmic aspects of sensor and ad-hoc networks. The book also fosters communication not only between the different sensor and ad-hoc communities, but also between those communities and the distributed systems and information systems communities. The topics addressed pertain to the sensors and mobile environment.

  15. Broadcast scheduling for mobile advertising

    OpenAIRE

    De Reyck, B.; Degraeve, Z.

    2003-01-01

    We describe a broadcast scheduling system developed for a precision marketing firm specialized in location-sensitive permission-based mobile advertising using SMS (Short Message Service) text messaging. Text messages containing advertisements were sent to registered customers when they were shopping in one of two shopping centers in the vicinity of London. The ads typically contained a limited-time promotional offer. The company's problem was deciding which ads to send out to which customers ...

  16. Mobile Clouds

    DEFF Research Database (Denmark)

    Fitzek, Frank; Katz, Marcos

    A mobile cloud is a cooperative arrangement of dynamically connected communication nodes sharing opportunistic resources. In this book, authors provide a comprehensive and motivating overview of this rapidly emerging technology. The book explores how distributed resources can be shared by mobile...... users in very different ways and for various purposes. The book provides many stimulating examples of resource-sharing applications. Enabling technologies for mobile clouds are also discussed, highlighting the key role of network coding. Mobile clouds have the potential to enhance communications...... performance, improve utilization of resources and create flexible platforms to share resources in very novel ways. Energy efficient aspects of mobile clouds are discussed in detail, showing how being cooperative can bring mobile users significant energy saving. The book presents and discusses multiple...

  17. Mobilities Design

    DEFF Research Database (Denmark)

    Jensen, Ole B.; Lanng, Ditte Bendix; Wind, Simon

    2016-01-01

    In this paper, we identify the nexus between design (architecture, urban design, service design, etc.) and mobilities as a new and emerging research field. In this paper, we apply a “situational mobilities” perspective and take point of departure in the pragmatist question: “What design decisions...... and interventions affords this particular mobile situation?” The paper presents the contours of an emerging research agenda within mobilities research. The advent of “mobilities design” as an emerging research field points towards a critical interest in the material as well as practical consequences of contemporary......-making. The paper proposes that increased understanding of the material affordances facilitated through design provides important insight to planning and policymaking that at times might be in risk of becoming too detached from the everyday life of the mobile subject within contemporary mobilities landscapes....

  18. Mobiles Robotersystem

    OpenAIRE

    Schmierer, G.; Wolf, A.

    1999-01-01

    DE 19816893 A UPAB: 20000203 NOVELTY - An optical and or acoustic noticeable advertising and or information carrier (10) is fixed permitting detachment in such a manner at the mobile platform (8), that the advertising and or information carrier does not impair the movability of the mobile platform. The advertising is provided at an exposed place on the mobile platform. USE - Advertising or information communication. ADVANTAGE - Advertising or information is imparted in prominent positioning w...

  19. Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Hong-Chuan Yang

    2007-01-01

    Full Text Available We study the energy-efficient configuration of multihop paths with automatic repeat request (ARQ mechanism in wireless ad hoc networks. We adopt a cross-layer design approach and take both the quality of each radio hop and the battery capacity of each transmitting node into consideration. Under certain constraints on the maximum tolerable transmission delay and the required packet delivery ratio, we solve optimization problems to jointly schedule the transmitting power of each transmitting node and the retransmission limit over each hop. Numerical results demonstrate that the path configuration methods can either significantly reduce the average energy consumption per packet delivery or considerably extend the average lifetime of the multihop route.

  20. AdS Branes from Partial Breaking of Superconformal Symmetries

    International Nuclear Information System (INIS)

    Ivanov, E.A.

    2005-01-01

    It is shown how the static-gauge world-volume superfield actions of diverse superbranes on the AdS d+1 superbackgrounds can be systematically derived from nonlinear realizations of the appropriate AdS supersymmetries. The latter are treated as superconformal symmetries of flat Minkowski superspaces of the bosonic dimension d. Examples include the N = 1 AdS 4 supermembrane, which is associated with the 1/2 partial breaking of the OSp(1|4) supersymmetry down to the N = 1, d = 3 Poincare supersymmetry, and the T-duality related L3-brane on AdS 5 and scalar 3-brane on AdS 5 x S 1 , which are associated with two different patterns of 1/2 breaking of the SU(2, 2|1) supersymmetry. Another (closely related) topic is the AdS/CFT equivalence transformation. It maps the world-volume actions of the codimension-one AdS d+1 (super)branes onto the actions of the appropriate Minkowski (super)conformal field theories in the dimension d

  1. Mobil marketing

    OpenAIRE

    Engelová, Kateřina

    2006-01-01

    Mobil marketing - reklama a podpora prodeje prostřednictvím mobilních telefonů. Technologické a kulturní předpoklady vzniku tohoto odvětví. Mobil marketing a marketingový mix, možnosti synergie. Nástroje mobil marketingu - reklamní SMS a MMS, lokační služby, soutěže, ankety a hlasování, věrnostní systémy, mobilní obsah. Subjekty mobil marketingu. M-komerce. Využití pro podnikové aplikace.

  2. Supersymmetric warped AdS in extended topologically massive supergravity

    International Nuclear Information System (INIS)

    Deger, N.S.; Kaya, A.; Samtleben, H.; Sezgin, E.

    2014-01-01

    We determine the most general form of off-shell N=(1,1) supergravity field configurations in three dimensions by requiring that at least one off-shell Killing spinor exists. We then impose the field equations of the topologically massive off-shell supergravity and find a class of solutions whose properties crucially depend on the norm of the auxiliary vector field. These are spacelike-squashed and timelike-stretched AdS 3 for the spacelike and timelike norms, respectively. At the transition point where the norm vanishes, the solution is null warped AdS 3 . This occurs when the coefficient of the Lorentz–Chern–Simons term is related to the AdS radius by μℓ=2. We find that the spacelike-squashed AdS 3 can be modded out by a suitable discrete subgroup of the isometry group, yielding an extremal black hole solution which avoids closed timelike curves

  3. Mobile phones and mobile communication

    DEFF Research Database (Denmark)

    Ling, Richard; Donner, Jonathan

    With staggering swiftness, the mobile phone has become a fixture of daily life in almost every society on earth. In 2007, the world had over 3 billion mobile subscriptions. Prosperous nations boast of having more subscriptions than people. In the developing world, hundreds of millions of people who...... could never afford a landline telephone now have a mobile number of their own. With a mobile in our hand many of us feel safer, more productive, and more connected to loved ones, but perhaps also more distracted and less involved with things happening immediately around us. Written by two leading...... researchers in the field, this volume presents an overview of the mobile telephone as a social and cultural phenomenon. Research is summarized and made accessible though detailed descriptions of ten mobile users from around the world. These illustrate popular debates, as well as deeper social forces at work...

  4. Ad gist : Ad communication in a single eye fixation

    NARCIS (Netherlands)

    Pieters, R.; Wedel, M.

    2012-01-01

    Most ads in practice receive no more than a single eye fixation. This study investigates the limits of what ads can communicate under such adverse exposure conditions. We find that consumers already know at maximum levels of accuracy and with high degree of certainty whether something is an ad or is

  5. Urban Mobility

    DEFF Research Database (Denmark)

    2017-01-01

    This anthology is the proceedings publication from the 2015 NAF Symposium in Malmö, Sweden. The aim of the 2015 NAF Symposium “Urban Mobility – Architectures, Geographies and Social Space” was to facilitate a cross-disciplinary discussion on urban mobility in which the juxtaposition of different...

  6. Urban Mobility

    DEFF Research Database (Denmark)

    2017-01-01

    This anthology is the proceedings publication from the 2015 NAF Symposium in Malmö, Sweden. The aim of the 2015 NAF Symposium “Urban Mobility – Architectures, Geographies and Social Space” was to facilitate a cross-disciplinary discussion on urban mobility in which the juxtaposition of different ...

  7. Mobile phone

    International Nuclear Information System (INIS)

    2009-01-01

    Almost the entire Norwegian population has cell phone. The usefulness of the cell phone is great, but can use a mobile phone to health or discomfort? How can exposure be reduced? NRPA follows research and provides advice on mobile phone use. (AG)

  8. Intensive mobilities

    DEFF Research Database (Denmark)

    Vannini, Phillip; Bissell, David; Jensen, Ole B.

    with fieldwork conducted in Canada, Denmark and Australia to develop our understanding of the experiential politics of long distance workers. Rather than focusing on the extensive dimensions of mobilities that are implicated in patterns and trends, our paper turns to the intensive dimensions of this experience......This paper explores the intensities of long distance commuting journeys as a way of exploring how bodily sensibilities are being changed by the mobilities that they undertake. The context of this paper is that many people are travelling further to work than ever before owing to a variety of factors...... which relate to transport, housing and employment. Yet we argue that the experiential dimensions of long distance mobilities have not received the attention that they deserve within geographical research on mobilities. This paper combines ideas from mobilities research and contemporary social theory...

  9. Designing Mobilities

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    are often still not engaged with in a sufficiently manner. Often social sciences keep distance to the physical and material as if the social was still to be understood as a realm separate of technology, architecture, and design (for a critique of this see; Latour 2005 and Urry 2000). This paper takes point......Within the so-called ‘mobilities turn’ (Adey 2010; Cresswell 2006; Urry 2007) much research has taken place during the last decade bringing mobilities into the centre of sociological analysis. However, the materiality and spatiality of artefacts, infrastructures, and sites hosting mobilities...... of departure in the sociological perspective termed ‘Staging Mobilities’ (Jensen 2013a) and utilizes this as an analytical frame for exploring cases of mobility design. The paper put focus on how the material shape, design and architectures of technologies, spaces and sites influence mobilities practices...

  10. Mobile probes

    DEFF Research Database (Denmark)

    Ørngreen, Rikke; Jørgensen, Anna Neustrup; Noesgaard, Signe Schack

    2016-01-01

    A project investigating the effectiveness of a collection of online resources for teachers' professional development used mobile probes as a data collection method. Teachers received questions and tasks on their mobile in a dialogic manner while in their everyday context as opposed...... to in an interview. This method provided valuable insight into the contextual use, i.e. how did the online resource transfer to the work practice. However, the research team also found that mobile probes may provide the scaffolding necessary for individual and peer learning at a very local (intra-school) community...... level. This paper is an initial investigation of how the mobile probes process proved to engage teachers in their efforts to improve teaching. It also highlights some of the barriers emerging when applying mobile probes as a scaffold for learning....

  11. Mobilities Design

    DEFF Research Database (Denmark)

    Jensen, Ole B.; Lanng, Ditte Bendix

    2016-01-01

    of life’ for billions of people in the everyday life. This paper is structured in three parts. After the general introduction we present the mobilities theory perspective of ‘staging mobilities’ and connects this to the empirical phenomenon of parking lots and their design. The paper ends in section three......Contemporary society is marked and defined by the ways in which mobile goods, bodies, vehicles, objects, and data are organized, moved and staged. On the backgound of the ‘mobilities turn’ (for short review paper on this see; Sheller 2011, Vannini 2010) this paper proposes a further development...... of the perspective in the direction of a material and design oriented turn. In order to fulfill this purpose we articulate a new and emerging research field, namely that of ‘mobilities design’. In our understanding time has come to articulate ‘Mobilities Design’ as a dedicated research field in and of its own...

  12. Mobile Lexicography

    DEFF Research Database (Denmark)

    Køhler Simonsen, Henrik

    2015-01-01

    are already mobile – but lexicography is not yet fully ready for the mobile challenge, mobile users and mobile user situations. The article is based on empirical data from two surveys comprising 10 medical doctors, who were asked to look up five medical substances with the medical dictionary app Medicin.......dk and five students, who were asked to look up five terms with the dictionary app Gyldendal Engelsk-Dansk. The empirical data comprise approximately 15 hours of recordings of user behavior, think-aloud data and interview data. The data indicate that there is still much to be done in this area...... and that lexicographic innovation is needed. A new type of users, new user situations and new access methods call for new lexicographic solutions, and this article proposes a six-pointed hexagram model, which can be used during dictionary app design to lexicographically calibrate the six dimensions in mobile...

  13. Restricted Mobilities

    DEFF Research Database (Denmark)

    Nielsen, Mette; Lassen, Claus

    2012-01-01

    communities and shopping centres through mobility lenses. The article shows how different mobility systems enable and restrict the public access to private-public spaces, and it points out that proprietary communities create an unequal potential for human movement and access in the city. The main argument......Privatisation of public spaces in the contemporary city has increased during the last decades but only few studies have approached this field from a mobility perspective. Therefore the article seeks to rectify this by exploring two Australian examples of private spaces in the city; gated...... and stratification mechanisms. In conclusion the article therefore suggests that future urban research and planning also needs a mobile understanding of spaces in the cities and how different mobility systems play an important role to sustain the exclusiveness that often characterises the private/public spaces...

  14. Mobility Work

    DEFF Research Database (Denmark)

    Bardram, Jakob Eyvind; Bossen, Claus

    2005-01-01

    We posit the concept of Mobility Work to describe efforts of moving about people and things as part of accomplishing tasks. Mobility work can be seen as a spatial parallel to the concept of articulation work proposed by the sociologist Anselm Strauss. Articulation work describes efforts of coordi....../or resources. To accomplish their work, actors have to make the right configuration of these four aspects emerge.......We posit the concept of Mobility Work to describe efforts of moving about people and things as part of accomplishing tasks. Mobility work can be seen as a spatial parallel to the concept of articulation work proposed by the sociologist Anselm Strauss. Articulation work describes efforts...... of coordination necessary in cooperative work, but focuses, we argue, mainly on the temporal aspects of cooperative work. As a supplement, the concept of mobility work focuses on the spatial aspects of cooperative work. Whereas actors seek to diminish the amount of articulation work needed in collaboration...

  15. Mobility Challenges

    DEFF Research Database (Denmark)

    Jensen, Ole B.; Lassen, Claus

    2011-01-01

    This article takes point of departure in the challenges to understand the importance of contemporary mobility. The approach advocated is a cross-disciplinary one drawing on sociology, geography, urban planning and design, and cultural studies. As such the perspective is to be seen as a part...... of the so-called ‘mobility turn’ within social science. The perspective is illustrative for the research efforts at the Centre for Mobility and Urban Studies (C-MUS), Aalborg University. The article presents the contours of a theoretical perspective meeting the challenges to research into contemporary urban...... mobilities. In particular the article discusses 1) the physical city, its infrastructures and technological hardware/software, 2) policies and planning strategies for urban mobility and 3) the lived everyday life in the city and the region....

  16. Added masses of ship structures

    CERN Document Server

    Korotkin, Alexandr I

    2008-01-01

    This essentially self-contained reference book contains data on added masses of ships and various ship and marine engineering structures. Theoretical and experimental methods for determining added masses of these objects are described.

  17. Contribution to design a communication framework for vehicular ad hoc networks in urban scenarios

    OpenAIRE

    Tripp Barba, Carolina

    2013-01-01

    The constant mobility of people, the growing need to be always connected, the large number of vehicles that nowadays can be found in the roads and the advances in technology make Vehicular Ad hoc Networks (VANETs) be a major area of research. Vehicular Ad hoc Networks are a special type of wireless Mobile Ad hoc Networks (MANETs), which allow a group of mobile nodes configure a temporary network and maintain it without the need of a fixed infrastructure. A vehicular network presents some spec...

  18. AdS5 black holes with fermionic hair

    International Nuclear Information System (INIS)

    Burrington, Benjamin A.; Liu, James T.; Sabra, W. A.

    2005-01-01

    The study of new Bogomol'nyi-Prasad-Sommerfield (BPS) objects in AdS 5 has led to a deeper understanding of AdS/CFT. To help complete this picture, and to fully explore the consequences of the supersymmetry algebra, it is also important to obtain new solutions with bulk fermions turned on. In this paper we construct superpartners of the 1/2 BPS black hole in AdS 5 using a natural set of fermion zero modes. We demonstrate that these superpartners, carrying fermionic hair, have conserved charges differing from the original bosonic counterpart. To do so, we find the R-charge and dipole moment of the new system, as well as the mass and angular momentum, defined through the boundary stress tensor. The complete set of superpartners fits nicely into a chiral representation of AdS 5 supersymmetry, and the spinning solutions have the expected gyromagnetic ratio, g=1

  19. AdS Black Hole with Phantom Scalar Field

    Directory of Open Access Journals (Sweden)

    Limei Zhang

    2017-01-01

    Full Text Available We present an AdS black hole solution with Ricci flat horizon in Einstein-phantom scalar theory. The phantom scalar fields just depend on the transverse coordinates x and y, which are parameterized by the parameter α. We study the thermodynamics of the AdS phantom black hole. Although its horizon is a Ricci flat Euclidean space, we find that the thermodynamical properties of the black hole solution are qualitatively the same as those of AdS Schwarzschild black hole. Namely, there exists a minimal temperature and the large black hole is thermodynamically stable, while the smaller one is unstable, so there is a so-called Hawking-Page phase transition between the large black hole and the thermal gas solution in the AdS space-time in Poincare coordinates. We also calculate the entanglement entropy for a strip geometry dual to the AdS phantom black holes and find that the behavior of the entanglement entropy is qualitatively the same as that of the black hole thermodynamical entropy.

  20. Universal regularization prescription for Lovelock AdS gravity

    International Nuclear Information System (INIS)

    Kofinas, Georgios; Olea, Rodrigo

    2007-01-01

    A definite form for the boundary term that produces the finiteness of both the conserved quantities and Euclidean action for any Lovelock gravity with AdS asymptotics is presented. This prescription merely tells even from odd bulk dimensions, regardless the particular theory considered, what is valid even for Einstein-Hilbert and Einstein-Gauss-Bonnet AdS gravity. The boundary term is a given polynomial of the boundary extrinsic and intrinsic curvatures (also referred to as Kounterterms series). Only the coupling constant of the boundary term changes accordingly, such that it always preserves a well-posed variational principle for boundary conditions suitable for asymptotically AdS spaces. The background-independent conserved charges associated to asymptotic symmetries are found. In odd bulk dimensions, this regularization produces a generalized formula for the vacuum energy in Lovelock AdS gravity. The standard entropy for asymptotically AdS black holes is recovered directly from the regularization of the Euclidean action, and not only from the first law of thermodynamics associated to the conserved quantities

  1. Sustainable Mobility

    DEFF Research Database (Denmark)

    Kjærulff, Aslak Aamot

    This paper combines strands of mobilities theory and planning theory, and develops a qualitative approach to look across emerging planning practices. By actively following 8 Danish urban and transport planners, over the course of 2 years, we learn how their practices have changed, inspired...... by mobility management, a concept aiming to reduce carbon emissions from transportation in western societies. The article focuses on how municipal planners formulate the role of mobility management activities organized around private companies, and how their practices are connected to wider ideas on planning....

  2. New Massive Gravity and AdS4 Counterterms

    International Nuclear Information System (INIS)

    Jatkar, Dileep P.; Sinha, Aninda

    2011-01-01

    We show that the recently proposed Dirac-Born-Infeld extension of new massive gravity emerges naturally as a counterterm in four-dimensional anti-de Sitter space (AdS 4 ). The resulting on-shell Euclidean action is independent of the cutoff at zero temperature. We also find that the same choice of counterterm gives the usual area law for the AdS 4 Schwarzschild black hole entropy in a cutoff-independent manner. The parameter values of the resulting counterterm action correspond to a c=0 theory in the context of the duality between AdS 3 gravity and two-dimensional conformal field theory. We rewrite this theory in terms of the gauge field that is used to recast 3D gravity as a Chern-Simons theory.

  3. Constrained supermanifolds for AdS M-theory backgrounds

    International Nuclear Information System (INIS)

    Fre, Pietro; Grassi, Pietro Antonio

    2008-01-01

    A long standing problem is the supergauge completion of AdS 4 x ({G/H}) 7 or AdS 5 x ({G/H}) 5 backgrounds which preserve less then maximal supersymmetry. In parallel with the supersolvable realization of the AdS 4 x S 7 background based on κ-symmetry, we develop a technique which amounts to solving the above-mentioned problem in a way useful for pure spinor quantization for supermembranes and superstrings. Instead of gauge fixing some of the superspace coordinates using κ-symmetry, we impose an additional constraint on them reproducing the simplifications of the supersolvable representations. The constraints are quadratic, homogeneous, Sp(4,R)-covariant, and consistent from the quantum point of view in the pure spinor approach. Here we provide the geometrical solution which, in a subsequent work, will be applied to the membrane and the superstring sigma models

  4. Asymptotically AdS spacetimes with a timelike Kasner singularity

    Energy Technology Data Exchange (ETDEWEB)

    Ren, Jie [Racah Institute of Physics, The Hebrew University of Jerusalem, Jerusalem 91904 (Israel)

    2016-07-21

    Exact solutions to Einstein’s equations for holographic models are presented and studied. The IR geometry has a timelike cousin of the Kasner singularity, which is the less generic case of the BKL (Belinski-Khalatnikov-Lifshitz) singularity, and the UV is asymptotically AdS. This solution describes a holographic RG flow between them. The solution’s appearance is an interpolation between the planar AdS black hole and the AdS soliton. The causality constraint is always satisfied. The entanglement entropy and Wilson loops are discussed. The boundary condition for the current-current correlation function and the Laplacian in the IR is examined. There is no infalling wave in the IR, but instead, there is a normalizable solution in the IR. In a special case, a hyperscaling-violating geometry is obtained after a dimensional reduction.

  5. Holographic description of AdS2 black holes

    International Nuclear Information System (INIS)

    Castro, Alejandra; Larsen, Finn; Grumiller, Daniel; McNees, Robert

    2008-01-01

    We develop the holographic renormalization of AdS 2 gravity systematically. We find that a bulk Maxwell term necessitates a boundary mass term for the gauge field and verify that this unusual term is invariant under gauge transformations that preserve the boundary conditions. We determine the energy-momentum tensor and the central charge, recovering recent results by Hartman and Strominger. We show that our expressions are consistent with dimensional reduction of the AdS 3 energy-momentum tensor and the Brown-Henneaux central charge. As an application of our results we interpret the entropy of AdS 2 black holes as the ground state entropy of a dual CFT.

  6. Central charge for AdS2 quantum gravity

    International Nuclear Information System (INIS)

    Hartman, Thomas; Strominger, Andrew

    2009-01-01

    Two-dimensional Maxwell-dilaton quantum gravity on AdS 2 with radius l and a constant electric field E is studied. In conformal gauge, this is equivalent to a CFT on a strip. In order to maintain consistent boundary conditions, the usual conformal diffeomorphisms must be accompanied by a certain U(1) gauge transformation. The resulting conformal transformations are generated by a twisted stress tensor, which has a central charge c = 3kE 2 l 4 /4 where k is the level of the U(1) current. This is an AdS 2 analog of the Brown-Henneaux formula c = 3l/2G for the central charge of quantum gravity on AdS 3 .

  7. New supersymmetric AdS4 type II vacua

    International Nuclear Information System (INIS)

    Tsimpis, D.

    2010-01-01

    We review the supersymmetric AdS 4 x w M 6 backgrounds of type IIA/IIB supergravity constructed in[1]. In type IIA the supersymmetry is N=2, and the six-dimensional internal space is locally an S 2 bundle over a four-dimensional Kaehler-Einstein base; in IIB the internal space is the direct product of a circle and a five-dimensional squashed Sasaki-Einstein manifold. These backgrounds do not contain any sources, all fluxes (including the Romans mass in IIA) are generally non-zero, and the dilaton and warp factor are non-constant. The IIA solutions include the massive deformations of the IIA reduction of the eleven-dimensional AdS 4 x Y p,q solutions, and had been predicted to exist on the basis of the AdS 4 /CFT 3 correspondence. (Abstract Copyright [2010], Wiley Periodicals, Inc.)

  8. Instantons from geodesics in AdS moduli spaces

    Science.gov (United States)

    Ruggeri, Daniele; Trigiante, Mario; Van Riet, Thomas

    2018-03-01

    We investigate supergravity instantons in Euclidean AdS5 × S5/ℤk. These solutions are expected to be dual to instantons of N = 2 quiver gauge theories. On the supergravity side the (extremal) instanton solutions are neatly described by the (lightlike) geodesics on the AdS moduli space for which we find the explicit expression and compute the on-shell actions in terms of the quantised charges. The lightlike geodesics fall into two categories depending on the degree of nilpotency of the Noether charge matrix carried by the geodesic: for degree 2 the instantons preserve 8 supercharges and for degree 3 they are non-SUSY. We expect that these findings should apply to more general situations in the sense that there is a map between geodesics on moduli-spaces of Euclidean AdS vacua and instantons with holographic counterparts.

  9. Loops in AdS from conformal field theory

    Science.gov (United States)

    Aharony, Ofer; Alday, Luis F.; Bissi, Agnese; Perlmutter, Eric

    2017-07-01

    We propose and demonstrate a new use for conformal field theory (CFT) crossing equations in the context of AdS/CFT: the computation of loop amplitudes in AdS, dual to non-planar correlators in holographic CFTs. Loops in AdS are largely unexplored, mostly due to technical difficulties in direct calculations. We revisit this problem, and the dual 1 /N expansion of CFTs, in two independent ways. The first is to show how to explicitly solve the crossing equations to the first subleading order in 1 /N 2, given a leading order solution. This is done as a systematic expansion in inverse powers of the spin, to all orders. These expansions can be resummed, leading to the CFT data for finite values of the spin. Our second approach involves Mellin space. We show how the polar part of the four-point, loop-level Mellin amplitudes can be fully reconstructed from the leading-order data. The anomalous dimensions computed with both methods agree. In the case of ϕ 4 theory in AdS, our crossing solution reproduces a previous computation of the one-loop bubble diagram. We can go further, deriving the four-point scalar triangle diagram in AdS, which had never been computed. In the process, we show how to analytically derive anomalous dimensions from Mellin amplitudes with an infinite series of poles, and discuss applications to more complicated cases such as the N = 4 super-Yang-Mills theory.

  10. Phases of global AdS black holes

    International Nuclear Information System (INIS)

    Basu, Pallab; Krishnan, Chethan; Subramanian, P.N. Bala

    2016-01-01

    We study the phases of gravity coupled to a charged scalar and gauge field in an asymptotically Anti-de Sitter spacetime (AdS_4) in the grand canonical ensemble. For the conformally coupled scalar, an intricate phase diagram is charted out between the four relevant solutions: global AdS, boson star, Reissner-Nordstrom black hole and the hairy black hole. The nature of the phase diagram undergoes qualitative changes as the charge of the scalar is changed, which we discuss. We also discuss the new features that arise in the extremal limit.

  11. Minimal surfaces in AdS space and integrable systems

    Science.gov (United States)

    Burrington, Benjamin A.; Gao, Peng

    2010-04-01

    We consider the Pohlmeyer reduction for spacelike minimal area worldsheets in AdS5. The Lax pair for the reduced theory is found, and written entirely in terms of the A3 = D3 root system, generalizing the B2 affine Toda system which appears for the AdS4 string. For the B2 affine Toda system, we show that the area of the worlsheet is obtainable from the moduli space Kähler potential of a related Hitchin system. We also explore the Saveliev-Leznov construction for solutions of the B2 affine Toda system, and recover the rotationally symmetric solution associated to Painleve transcendent.

  12. AdS5 magnetized solutions in minimal gauged supergravity

    Directory of Open Access Journals (Sweden)

    Jose Luis Blázquez-Salcedo

    2017-08-01

    Full Text Available We construct a generalization of the AdS charged rotating black holes with two equal magnitude angular momenta in five-dimensional minimal gauged supergravity. In addition to the mass, electric charge and angular momentum, the new solutions possess an extra-parameter associated with a non-zero magnitude of the magnetic potential at infinity. In contrast with the known cases, these new black holes possess a non-trivial zero-horizon size limit which describes a one parameter family of spinning charged solitons. All configurations reported in this work approach asymptotically an AdS5 spacetime in global coordinates and are free of pathologies.

  13. Twistor description of spinning particles in AdS

    Science.gov (United States)

    Arvanitakis, Alex S.; Barns-Graham, Alec E.; Townsend, Paul K.

    2018-01-01

    The two-twistor formulation of particle mechanics in D-dimensional anti-de Sitter space for D = 4 , 5 , 7, which linearises invariance under the AdS isometry group Sp(4; K ) for K=R,C,H, is generalized to the massless N -extended "spinning particle". The twistor variables are gauge invariant with respect to the initial N local worldline supersymmetries; this simplifies aspects of the quantum theory such as implications of global gauge anomalies. We also give details of the two-supertwistor form of the superparticle, in particular the massive superparticle on AdS5.

  14. Holography in Lovelock Chern-Simons AdS gravity

    Science.gov (United States)

    Cvetković, Branislav; Miskovic, Olivera; Simić, Dejan

    2017-08-01

    We analyze holographic field theory dual to Lovelock Chern-Simons anti-de Sitter (AdS) gravity in higher dimensions using first order formalism. We first find asymptotic symmetries in the AdS sector showing that they consist of local translations, local Lorentz rotations, dilatations and non-Abelian gauge transformations. Then, we compute 1-point functions of energy-momentum and spin currents in a dual conformal field theory and write Ward identities. We find that the holographic theory possesses Weyl anomaly and also breaks non-Abelian gauge symmetry at the quantum level.

  15. The forecaster's added value

    Science.gov (United States)

    Turco, M.; Milelli, M.

    2009-09-01

    skill scores of two competitive forecast. It is important to underline that the conclusions refer to the analysis of the Piemonte operational alert system, so they cannot be directly taken as universally true. But we think that some of the main lessons that can be derived from this study could be useful for the meteorological community. In details, the main conclusions are the following: - despite the overall improvement in global scale and the fact that the resolution of the limited area models has increased considerably over recent years, the QPF produced by the meteorological models involved in this study has not improved enough to allow its direct use, that is, the subjective HQPF continues to offer the best performance; - in the forecast process, the step where humans have the largest added value with respect to mathematical models, is the communication. In fact the human characterisation and communication of the forecast uncertainty to end users cannot be replaced by any computer code; - eventually, although there is no novelty in this study, we would like to show that the correct application of appropriated statistical techniques permits a better definition and quantification of the errors and, mostly important, allows a correct (unbiased) communication between forecasters and decision makers.

  16. Mixed-symmetry fields in AdS(5), conformal fields, and AdS/CFT

    Energy Technology Data Exchange (ETDEWEB)

    Metsaev, R.R. [Department of Theoretical Physics, P.N. Lebedev Physical Institute,Leninsky prospect 53, Moscow 119991 (Russian Federation)

    2015-01-15

    Mixed-symmetry arbitrary spin massive, massless, and self-dual massive fields in AdS(5) are studied. Light-cone gauge actions for such fields leading to decoupled equations of motion are constructed. Light-cone gauge formulation of mixed-symmetry anomalous conformal currents and shadows in 4d flat space is also developed. AdS/CFT correspondence for normalizable and non-normalizable modes of mixed-symmetry AdS fields and the respective boundary mixed-symmetry anomalous conformal currents and shadows is studied. We demonstrate that the light-cone gauge action for massive mixed-symmetry AdS field evaluated on solution of the Dirichlet problem amounts to the light-cone gauge 2-point vertex of mixed-symmetry anomalous shadow. Also we show that UV divergence of the action for mixed-symmetry massive AdS field with some particular value of mass parameter evaluated on the Dirichlet problem amounts to the action of long mixed-symmetry conformal field, while UV divergence of the action for mixed-symmetry massless AdS field evaluated on the Dirichlet problem amounts to the action of short mixed-symmetry conformal field. We speculate on string theory interpretation of a model which involves short low-spin conformal fields and long higher-spin conformal fields.

  17. How Ad-talk and Word-of-Mouth Influence Consumers’ Responses

    DEFF Research Database (Denmark)

    Martensen, Anne; Mouritsen, Jan

    2014-01-01

    This study investigates: (a) if consumers talk about advertizing messages – ad-talk – is a new, distinct concept that differs from word-of-mouth (WOM) communication in definition and impact; (b) how ad-talk mobilizes WOM; (c) how WOM mediates the relationship between ad-talk and consumer responses....... A new model is developed that adapts the classic Theory of Reasoned Action (TRA) framework by replacing the social norm with consumers’ ad-talk and WOM. Two large scale internet surveys are conducted to test and validate the model. Findings show that ad-talk and WOM are two different social processes....... Ad-talk only mobilizes PWOM. PWOM mediates and leverages ad-talk’s influence on consumer responses, because PWOM adds personal experiences, preferences and social acceptance to the brand promise seen in the firm’s advertizing. This changes the value of the brand and makes the firm’s offer better than...

  18. AdS pure spinor superstring in constant backgrounds

    International Nuclear Information System (INIS)

    Chandia, Osvaldo; Bevilaqua, L. Ibiapina; Vallilo, Brenno Carlini

    2014-01-01

    In this paper we study the pure spinor formulation of the superstring in AdS_5×S"5 around point particle solutions of the classical equations of motion. As a particular example we quantize the pure spinor string in the BMN background

  19. Internet Advertising. Google AdWords versus Facebook Ads

    OpenAIRE

    Paul PAŞCU

    2014-01-01

    This article describes how to use the applications for Internet advertising, Google AdWords and Facebook Ads. Our attempt is to present the advantages and disadvantages of each of them, the costs and benefits, a useful aspect for companies that plan to start advertising campaigns on the Internet.

  20. Internet Advertising. Google AdWords versus Facebook Ads

    Directory of Open Access Journals (Sweden)

    Paul PAŞCU

    2014-05-01

    Full Text Available This article describes how to use the applications for Internet advertising, Google AdWords and Facebook Ads. Our attempt is to present the advantages and disadvantages of each of them, the costs and benefits, a useful aspect for companies that plan to start advertising campaigns on the Internet.

  1. Penrose inequality for asymptotically AdS spaces

    International Nuclear Information System (INIS)

    Itkin, Igor; Oz, Yaron

    2012-01-01

    In general relativity, the Penrose inequality relates the mass and the entropy associated with a gravitational background. If the inequality is violated by an initial Cauchy data, it suggests a creation of a naked singularity, thus providing means to consider the cosmic censorship hypothesis. We propose a general form of Penrose inequality for asymptotically locally AdS spaces.

  2. Penrose inequality for asymptotically AdS spaces

    Energy Technology Data Exchange (ETDEWEB)

    Itkin, Igor [Raymond and Beverly Sackler School of Physics and Astronomy, Tel-Aviv University, Tel-Aviv 69978 (Israel); Oz, Yaron, E-mail: yaronoz@post.tau.ac.il [Raymond and Beverly Sackler School of Physics and Astronomy, Tel-Aviv University, Tel-Aviv 69978 (Israel)

    2012-02-28

    In general relativity, the Penrose inequality relates the mass and the entropy associated with a gravitational background. If the inequality is violated by an initial Cauchy data, it suggests a creation of a naked singularity, thus providing means to consider the cosmic censorship hypothesis. We propose a general form of Penrose inequality for asymptotically locally AdS spaces.

  3. Confinement, glueballs and strings from deformed AdS

    International Nuclear Information System (INIS)

    Apreda, Riccardo; Crooks, David E.; Evans, Nick; Petrini, Michela

    2004-01-01

    We study aspects of confinement in two deformed versions of the AdS/CFT correspondence - the GPPZ dual of N = 1* Yang Mills, and the Yang Mills* N 0 dual. Both geometries describe discrete glueball spectra which we calculate numerically. The results agree at the 10% level with previous AdS/CFT computations in the Klebanov Strassler background and AdS Schwarzchild respectively. We also calculate the spectra of bound states of the massive fermions in these geometries and show that they are light, so not decoupled from the dynamics. We then study the behaviour of Wilson loops in the 10d lifts of these geometries. We find a transition from AdS-like strings in the UV to strings that interact with the unknown physics of the central singularity of the space in the IR. (author)

  4. AdDroid: Privilege Separation for Applications and Advertisers in Android

    Science.gov (United States)

    2013-05-14

    consumers . Mobile advertising services such as AdMob [1] and Millennial Media [22] play a key role in this ecosystem by allowing developers to generate...privacy-sensitive permissions just to display advertisements . 1Applications need phone state to obtain the phone’s In- ternational Mobile Equipment Identity...the Android permis- sion system and explain how mobile advertising currently works. We then explain how the current system leads to privacy and

  5. Mobile Marketing

    OpenAIRE

    竹安, 数博; Takeyasu, Kazuhiro

    2005-01-01

    This article deals with one of the modern trends in marketing communication, which is mobile marketing. Towards the end of 2008, several projects which use mobile phones for target marketing communication were launched. Commercial SMS´s are sent on the base of agreement or registration of the consumers on special websites, for example hellomobil.cz. The benefit for the consumers is the bonus which can have more forms - not only sending money to the account, free SMS´s/MMS´s and minutes but al...

  6. Mobile Usability

    DEFF Research Database (Denmark)

    Aryana, Bijan; Clemmensen, Torkil

    2013-01-01

    In this article, a country specific comparative mobile usability study is presented, using Iran and Turkey as the two chosen emerging/emergent nation exemplars of smartphone usage and adoption. In a focus group study, three mobile applications were selected by first-time users of smartphones...... personal contacts. The results and analysis establish the existence of country specific issues and concerns, as well as reveal generic usability issues. The article concludes that the source of these issues is most likely due to a combination of certain contextual features endemic to both Iran and Turkey...

  7. Driving advertising into mobile mediums : Study of consumer attitudes towards mobile advertising and of factors affecting on them

    OpenAIRE

    Pietz, Michal; Storbacka, Lauri

    2007-01-01

    The high penetration rate of mobile phones along with the recent technological development has created a whole new marketing medium named mobile advertising filled with possibilities for the advertisers. Earlier studies have although indicated the success of this new advertising channel to depend on user acceptance of receiving mobile ads. Wherefore a study of consumer attitudes towards mobile advertising can be considered necessary in order to create a lucrative business. Even though this to...

  8. Supersymmetric AdS6 solutions of type IIB supergravity

    International Nuclear Information System (INIS)

    Kim, Hyojoong; Kim, Nakwoo; Suh, Minwoo

    2015-01-01

    We study the general requirement for supersymmetric AdS 6 solutions in type IIB supergravity. We employ the Killing spinor technique and study the differential and algebraic relations among various Killing spinor bilinears to find the canonical form of the solutions. Our result agrees precisely with the work of Apruzzi et al. (JHEP 1411:099, 2014), which used the pure spinor technique. Hoping to identify the geometry of the problem, we also computed four-dimensional theory through the dimensional reduction of type IIB supergravity on AdS 6 . This effective action is essentially a non-linear sigma model with five scalar fields parametrizing SL(3,ℝ)/SO(2,1), modified by a scalar potential and coupled to Einstein gravity in Euclidean signature. We argue that the scalar potential can be explained by a subgroup CSO(1,1,1) ⊂SL(3,ℝ) in a way analogous to gauged supergravity

  9. AdS gravity and the scalar glueball spectrum

    Energy Technology Data Exchange (ETDEWEB)

    Vento, Vicente [Departament de Fisica Teorica, Universitat de Valencia y Institut de Fisica Corpuscular, Consejo Superior de Investigaciones Cientificas, Burjassot (Valencia) (Spain)

    2017-09-15

    The scalar glueball spectrum has attracted much attention since the formulation of Quantum Chromodynamics. Different approaches give very different results for the glueball masses. We revisit the problem from the perspective of the AdS/CFT correspondence. (orig.)

  10. Smoothed transitions in higher spin AdS gravity

    International Nuclear Information System (INIS)

    Banerjee, Shamik; Shenker, Stephen; Castro, Alejandra; Hellerman, Simeon; Hijano, Eliot; Lepage-Jutier, Arnaud; Maloney, Alexander

    2013-01-01

    We consider CFTs conjectured to be dual to higher spin theories of gravity in AdS 3 and AdS 4 . Two-dimensional CFTs with W N symmetry are considered in the λ = 0 (k → ∞) limit where they are conjectured to be described by continuous orbifolds. The torus partition function is computed, using reasonable assumptions, and equals that of a free-field theory. We find no phase transition at temperatures of order 1; the usual Hawking–Page phase transition is removed by the highly degenerate light states associated with conical defect states in the bulk. Three-dimensional Chern–Simons matter CFTs with vector-like matter are considered on T 3 , where the dynamics is described by an effective theory for the eigenvalues of the holonomies. Likewise, we find no evidence for a Hawking–Page phase transition at a large level k. (paper)

  11. Winding strings and AdS3 black holes

    International Nuclear Information System (INIS)

    Troost, Jan

    2002-01-01

    We start a systematic study of string theory in AdS 3 black hole backgrounds. Firstly, we analyse in detail the geodesic structure of the BTZ black hole, including spacelike geodesics. Secondly, we study the spectrum for massive and massless scalar fields, paying particular attention to the connection between Sl(2,R) subgroups, the theory of special functions and global properties of the BTZ black holes. We construct classical strings that wind the black holes. Finally, we apply the general formalism to the vacuum black hole background, and formulate the boundary spacetime Virasoro algebra in terms of worldsheet operators. We moreover establish the link between a proposal for a ghost free spectrum for Sl(2,R) string propagation and the massless black hole background, thereby claryfing aspects of the AdS 3 /CFT correspondence. (author)

  12. AdS strings with torsion: Noncomplex heterotic compactifications

    International Nuclear Information System (INIS)

    Frey, Andrew R.; Lippert, Matthew

    2005-01-01

    Combining the effects of fluxes and gaugino condensation in heterotic supergravity, we use a ten-dimensional approach to find a new class of four-dimensional supersymmetric AdS 4 compactifications on almost-Hermitian manifolds of SU(3) structure. Computation of the torsion allows a classification of the internal geometry, which for a particular combination of fluxes and condensate, is nearly Kaehler. We argue that all moduli are fixed, and we show that the Kaehler potential and superpotential proposed in the literature yield the correct AdS 4 radius. In the nearly Kaehler case, we are able to solve the H Bianchi identity using a nonstandard embedding. Finally, we point out subtleties in deriving the effective superpotential and understanding the heterotic supergravity in the presence of a gaugino condensate

  13. The Mixed Phase of Charged AdS Black Holes

    Directory of Open Access Journals (Sweden)

    Piyabut Burikham

    2016-01-01

    Full Text Available We study the mixed phase of charged AdS black hole and radiation when the total energy is fixed below the threshold to produce a stable charged black hole branch. The coexistence conditions for the charged AdS black hole and radiation are derived for the generic case when radiation particles carry charge. The phase diagram of the mixed phase is demonstrated for both fixed potential and charge ensemble. In the dual gauge picture, they correspond to the mixed phase of quark-gluon plasma (QGP and hadron gas in the fixed chemical potential and density ensemble, respectively. In the nuclei and heavy-ion collisions at intermediate energies, the mixed phase of exotic QGP and hadron gas could be produced. The mixed phase will condense and evaporate into the hadron gas as the fireball expands.

  14. Perturbative entanglement thermodynamics for AdS spacetime: renormalization

    International Nuclear Information System (INIS)

    Mishra, Rohit; Singh, Harvendra

    2015-01-01

    We study the effect of charged excitations in the AdS spacetime on the first law of entanglement thermodynamics. It is found that ‘boosted’ AdS black holes give rise to a more general form of first law which includes chemical potential and charge density. To obtain this result we have to resort to a second order perturbative calculation of entanglement entropy for small size subsystems. At first order the form of entanglement law remains unchanged even in the presence of charged excitations. But the thermodynamic quantities have to be appropriately ‘renormalized’ at the second order due to the corrections. We work in the perturbative regime where T thermal ≪T E .

  15. Cameras in mobile phones

    Science.gov (United States)

    Nummela, Ville; Viinikanoja, Jarkko; Alakarhu, Juha

    2006-04-01

    One of the fastest growing markets in consumer markets today are camera phones. During past few years total volume has been growing fast and today millions of mobile phones with camera will be sold. At the same time resolution and functionality of the cameras has been growing from CIF towards DSC level. From camera point of view the mobile world is an extremely challenging field. Cameras should have good image quality but in small size. They also need to be reliable and their construction should be suitable for mass manufacturing. All components of the imaging chain should be well optimized in this environment. Image quality and usability are the most important parameters to user. The current trend of adding more megapixels to cameras and at the same time using smaller pixels is affecting both. On the other hand reliability and miniaturization are key drivers for product development as well as the cost. In optimized solution all parameters are in balance but the process of finding the right trade-offs is not an easy task. In this paper trade-offs related to optics and their effects to image quality and usability of cameras are discussed. Key development areas from mobile phone camera point of view are also listed.

  16. Generalised structures for N=1 AdS backgrounds

    Energy Technology Data Exchange (ETDEWEB)

    Coimbra, André [Institut für Theoretische Physik & Center for Quantum Engineering and Spacetime Research,Leibniz Universität Hannover,Appelstraße 2, 30167 Hannover (Germany); Strickland-Constable, Charles [Institut de physique théorique, Université Paris Saclay, CEA, CNRS, Orme des Merisiers, F-91191 Gif-sur-Yvette (France)

    2016-11-16

    We expand upon a claim made in a recent paper [http://arxiv.org/abs/1411.5721] that generic minimally supersymmetric AdS backgrounds of warped flux compactifications of Type II and M theory can be understood as satisfying a straightforward weak integrability condition in the language of E{sub d(d)}×ℝ{sup +} generalised geometry. Namely, they are spaces admitting a generalised G-structure set by the Killing spinor and with constant singlet generalised intrinsic torsion.

  17. ADS Bumblebee comes of age

    Science.gov (United States)

    Accomazzi, Alberto; Kurtz, Michael J.; Henneken, Edwin; Grant, Carolyn S.; Thompson, Donna M.; Chyla, Roman; McDonald, Steven; Shaulis, Taylor J.; Blanco-Cuaresma, Sergi; Shapurian, Golnaz; Hostetler, Timothy W.; Templeton, Matthew R.; Lockhart, Kelly E.

    2018-01-01

    The ADS Team has been working on a new system architecture and user interface named “ADS Bumblebee” since 2015. The new system presents many advantages over the traditional ADS interface and search engine (“ADS Classic”). A new, state of the art search engine features a number of new capabilities such as full-text search, advanced citation queries, filtering of results and scalable analytics for any search results. Its services are built on a cloud computing platform which can be easily scaled to match user demand. The Bumblebee user interface is a rich javascript application which leverages the features of the search engine and integrates a number of additional visualizations such as co-author and co-citation networks which provide a hierarchical view of research groups and research topics, respectively. Displays of paper analytics provide views of the basic article metrics (citations, reads, and age). All visualizations are interactive and provide ways to further refine search results. This new search system, which has been in beta for the past three years, has now matured to the point that it provides feature and content parity with ADS Classic, and has become the recommended way to access ADS content and services. Following a successful transition to Bumblebee, the use of ADS Classic will be discouraged starting in 2018 and phased out in 2019. You can access our new interface at https://ui.adsabs.harvard.edu

  18. Designing Mobilities

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    How is the width of the pavement shaping the urban experience? How is the material design of transport infrastructure and mobile technology affording social interaction in everyday life spaces? How do people inhabit these spaces with their bodies and in accordance to social and cultural norms...

  19. Mobile IP

    NARCIS (Netherlands)

    Heijenk, Geert; Sallent, S.; Pras, Aiko

    1999-01-01

    The Internet is growing exponentially, both in the amount of traffic carried, and in the amount of hosts connected. IP technology is becoming more and more important, in company networks (Intranets), and also in the core networks for the next generation mobile networks. Further, wireless access to

  20. Mobile Misfortune

    DEFF Research Database (Denmark)

    Vigh, Henrik Erdman

    2015-01-01

    of the mobility it enables. This article, thus, looks at the motives and manners in which young men in Bissau become caught up in transnational flows of cocaine. It shows how motion is emotively anchored and affectively bound: tied to and directed toward a feeling of worth and realisation of being, and how...

  1. Going Mobile?

    DEFF Research Database (Denmark)

    Tallon, Loic; Froes, Isabel Cristina G.

    2011-01-01

    If the future is mobile, how is the museum community developing within that future? What are the challenges museums face within it? In which directions should we be seeking to evolve our collective knowledge share? It was to gain observations on questions such as these that the 2011 Museums & Mob...

  2. Resource Mobilization

    International Development Research Centre (IDRC) Digital Library (Canada)

    Annex 1: The Scoping Study on Donor Funding for. Development Research in ... publication of the Resource Mobilization: A Practical Guide for Research .... applied the concept or technique, which validates the practical application of ... some other staff member would write up a grant application addressed to one, two, or a ...

  3. Mobile Phone

    Institute of Scientific and Technical Information of China (English)

    籍万杰

    2004-01-01

    Your mobile phone rings.and instead of usual electronic signals,it's playing your favorite music.A friend sends your favorite song to cheer you up.One day,a record company might forward new records and music videos to your phone.

  4. Noncommutative D-branes from covariant AdS superstring

    International Nuclear Information System (INIS)

    Sakaguchi, Makoto; Yoshida, Kentaroh

    2008-01-01

    We study noncommutative (NC) D-branes on AdS 5 xS 5 from κ-invariance of covariant Green-Schwarz action of an open string with a non-trivial world-volume flux. Finding boundary conditions to ensure the κ-invariance, we can see possible configurations of the NC D-branes. With this method 1/4 BPS NC D-branes are discussed. The resulting NC Dp-branes are 1/4 BPS at arbitrary position other than the p=1 case. The exceptional D-string is 1/2 BPS at the origin and 1/4 BPS outside the origin. Those are reduced to possible 1/4 BPS or 1/2 BPS AdS D-branes in the commutative limit. The same analysis is applied to an open superstring in a pp-wave and leads to 1/4 BPS configurations of NC D-branes. These D-branes are consistently obtained from AdS D-branes via the Penrose limit

  5. Supersymmetric giant graviton solutions in AdS3

    International Nuclear Information System (INIS)

    Mandal, Gautam; Raju, Suvrat; Smedbaeck, Mikael

    2008-01-01

    We parametrize all classical probe brane configurations that preserve four supersymmetries in (a) the extremal D1-D5 geometry, (b) the extremal D1-D5-P geometry, (c) the smooth D1-D5 solutions proposed by Lunin and Mathur, and (d) global AdS 3 xS 3 xT 4 /K3. These configurations consist of D1 branes, D5 branes, and bound states of D5 and D1 branes with the property that a particular Killing vector is tangent to the brane world volume at each point. We show that the supersymmetric sector of the D5-brane world volume theory may be analyzed in an effective 1+1 dimensional framework that places it on the same footing as D1 branes. In global AdS and the corresponding Lunin-Mathur solution, the solutions we describe are ''bound'' to the center of AdS for generic parameters and cannot escape to infinity. We show that these probes only exist on the submanifold of moduli space where the background B NS field and theta angle vanish. We quantize these probes in the near-horizon region of the extremal D1-D5 geometry and obtain the theory of long strings discussed by Seiberg and Witten

  6. Exploring AdS waves via nonminimal coupling

    International Nuclear Information System (INIS)

    Ayon-Beato, Eloy; Hassaiene, Mokhtar

    2006-01-01

    We consider nonminimally coupled scalar fields to explore the Siklos spacetimes in three dimensions. Their interpretation as exact gravitational waves propagating on AdS space restrict the source to behave as a pure radiation field. We show that the related pure radiation constraints single out a unique self-interaction potential depending on one coupling constant. For a vanishing coupling constant, this potential reduces to a mass term with a mass fixed in terms of the nonminimal-coupling parameter. This mass dependence allows the existence of several free cases including massless and tachyonic sources. There even exists a particular value of the nonminimal-coupling parameter for which the corresponding mass exactly compensates the contribution generated by the negative scalar curvature, producing a genuinely massless field in this curved background. The self-interacting case is studied in detail for the conformal coupling. The resulting gravitational wave is formed by the superposition of the free and the self-interaction contributions, except for a critical value of the coupling constant where a nonperturbative effect relating the strong and weak regimes of the source appears. We establish a correspondence between the scalar source supporting an AdS wave and a pp wave by showing that their respective pure radiation constraints are conformally related, while their involved backgrounds are not. Finally, we consider the AdS waves for topologically massive gravity and its limit to conformal gravity

  7. Enthalpy and the mechanics of AdS black holes

    International Nuclear Information System (INIS)

    Kastor, David; Traschen, Jennie; Ray, Sourya

    2009-01-01

    We present geometric derivations of the Smarr formula for static AdS black holes and an expanded first law that includes variations in the cosmological constant. These two results are further related by a scaling argument based on Euler's theorem. The key new ingredient in the constructions is a two-form potential for the static Killing field. Surface integrals of the Killing potential determine the coefficient of the variation of Λ in the first law. This coefficient is proportional to a finite, effective volume for the region outside the AdS black hole horizon, which can also be interpreted as minus the volume excluded from a spatial slice by the black hole horizon. This effective volume also contributes to the Smarr formula. Since Λ is naturally thought of as a pressure, the new term in the first law has the form of effective volume times change in pressure that arises in the variation of the enthalpy in classical thermodynamics. This and related arguments suggest that the mass of an AdS black hole should be interpreted as the enthalpy of the spacetime.

  8. Shock wave collisions and thermalization in AdS5

    International Nuclear Information System (INIS)

    Kovchegov, Yuri V.

    2011-01-01

    We study heavy ion collisions at strong 't Hooft coupling using AdS/CFT correspondence. According to the AdS/CFT dictionary heavy ion collisions correspond to gravitational shock wave collisions in AdS 5 . We construct the metric in the forward light cone after the collision perturbatively through expansion of Einstein equations in graviton exchanges. We obtain an analytic expression for the metric including all-order graviton exchanges with one shock wave, while keeping the exchanges with another shock wave at the lowest order. We read off the corresponding energy-momentum tensor of the produced medium. Unfortunately this energy-momentum tensor does not correspond to ideal hydrodynamics, indicating that higher order graviton exchanges are needed to construct the full solution of the problem. We also show that shock waves must completely stop almost immediately after the collision in AdS 5 , which, on the field theory side, corresponds to complete nuclear stopping due to strong coupling effects, likely leading to Landau hydrodynamics. Finally, we perform trapped surface analysis of the shock wave collisions demonstrating that a bulk black hole, corresponding to ideal hydrodynamics on the boundary, has to be created in such collisions, thus constructing a proof of thermalization in heavy ion collisions at strong coupling. (author)

  9. Ad skepticisms: Antecedents and consequences

    Directory of Open Access Journals (Sweden)

    Rafique Ahmed

    2016-11-01

    Full Text Available Engaging customer is the burning issue for companies especially the service sector, either online or offline. Minimizing the customer disengagement is the same like reducing dissatisfaction or churn. Customer disengagement may be caused by many factors, ad skepticism is one of them; ad skepticism has two main antecedents personality variable and consumption/influencing varia-bles. This research explores the relationship of ad skepticism with customer disengagement through personality variables which are cynicism, reactance and self-esteem. The unit of analysis is the telecom and banking industry of Pakistan which is foreseeing an era of virtual currency and both are customer oriented industries. Only offline disengagement is researched and data is collected from the Business centers of telecom and banking branches dealing with virtual curren-cy in Pakistan. Hypothetical model is given after digging the relevant literature; model is tested through confirmatory factor analysis and structural equation modeling. Eight hypotheses were purposed from the connections of model, all hypotheses are accepted except the cynicism posi-tive effect on social ad skepticism. This can be due to commonality of social and charity in Paki-stani society, Muslims consider charity as a pious act and they do not think for cynic behavior in charity or social related works. The results manifest that customers in telecom industry are hav-ing ad skepticism and that is becoming the cause of their disengagement. Further, social ad skep-ticism has more impact on the customer disengagement than the general ad skepticism. While the reactance has more effect on general ad skepticism than other antecedents and cynicism has the lowest impact on social ad skepticism than other antecedents.

  10. Mobile Prototyping Platforms for Remote Engineering Applications

    Directory of Open Access Journals (Sweden)

    Karsten Henke

    2009-08-01

    Full Text Available This paper describes a low-cost mobile communication platform as a universal rapid-prototyping system, which is based on the Quadrocopter concept. At the Integrated Hardware and Software Systems Group at the Ilmenau University of Technology these mobile platforms are used to motivate bachelor and master students to study Computer Engineering sciences. This could be done by increasing their interest in technical issues, using this platform as integral part of a new ad-hoc lab to demonstrate different aspects in the area of Mobile Communication as well as universal rapid prototyping nodes to investigate different mechanisms for self-organized mobile communication systems within the International Graduate School on Mobile Communications. Beside the three fields of application, the paper describes the current architecture concept of the mobile prototyping platform as well as the chosen control mechanism and the assigned sensor systems to fulfill all the required tasks.

  11. ADS-B in space

    DEFF Research Database (Denmark)

    Knudsen, Bjarke Gosvig; Jensen, Morten; Birklykke, Alex

    2014-01-01

    ADS-B is increasingly used for air traffic control in areas covered by terrestrial receivers; however, its limited range makes it unsuitable for other areas such as the oceans. To overcome this limitation, it has been proposed to receive ADS-B signals from low earth orbit nano-satellites and relay...... them to the terrestrial receivers. This paper gives an overview of the GATOSS mission and of its highly-sensitive ADS-B software-defined radio receiver payload. Details of the design and implementation of the receiver's decoder are introduced. The first real-life, space-based results show that ADS......-B signals are indeed successfully received in space and retransmitted to a terrestrial station by the GATOSS nano-satellite orbiting at 700+ km altitudes, thus showing that GATOSS is capable of tracking flights, including transoceanic ones, from space....

  12. Virginia ADS consortium - thorium utilization

    International Nuclear Information System (INIS)

    Myneni, Ganapati

    2015-01-01

    A Virginia ADS consortium, consisting of Virginia Universities (UVa, VCU, VT), Industry (Casting Analysis Corporation, GEM*STAR, MuPlus Inc.), Jefferson Lab and not-for-profit ISOHIM, has been organizing International Accelerator-Driven Sub-Critical Systems (ADS) and Thorium Utilization (ThU) workshops. The third workshop of this series was hosted by VCU in Richmond, Virginia, USA Oct 2014 with CBMM and IAEA sponsorship and was endorsed by International Thorium Energy Committee (IThEC), Geneva and Virginia Nuclear Energy Consortium Authority. In this presentation a brief summary of the successful 3 rd International ADS and ThU workshop proceedings and review the worldwide ADS plans and/or programs is given. Additionally, a report on new start-ups on Molten Salt Reactor (MSR) systems is presented. Further, a discussion on potential simplistic fertile 232 Th to fissile 233 U conversion is made

  13. A closer look at two AdS4 branes in an AdS5 bulk

    International Nuclear Information System (INIS)

    Thambyahpillai, Shiyamala

    2005-01-01

    We investigate a scenario with two AdS 4 branes in an AdS 5 bulk. In this scenario there are two gravitons and we investigate the role played by each of them for different positions of the second brane. We show that both gravitons play a significant role only when the turn-around point in the warp factor is approximately equidistant from both branes. We find that the ultralight mode becomes heavy as the second brane approaches the turn-around point, and the physics begins to resemble that of the RS model. Thus we demonstrate the crucial role played by the turn-around in the warp factor in enabling the presence of both gravitons. (author)

  14. ADS/CFT and QCD

    International Nuclear Information System (INIS)

    Brodsky, Stanley J.; de Teramond, Guy F.

    2007-01-01

    The AdS/CFT correspondence between string theory in AdS space and conformal .eld theories in physical spacetime leads to an analytic, semi-classical model for strongly-coupled QCD which has scale invariance and dimensional counting at short distances and color confinement at large distances. Although QCD is not conformally invariant, one can nevertheless use the mathematical representation of the conformal group in five-dimensional anti-de Sitter space to construct a first approximation to the theory. The AdS/CFT correspondence also provides insights into the inherently non-perturbative aspects of QCD, such as the orbital and radial spectra of hadrons and the form of hadronic wavefunctions. In particular, we show that there is an exact correspondence between the fifth-dimensional coordinate of AdS space z and a specific impact variable ζ which measures the separation of the quark and gluonic constituents within the hadron in ordinary space-time. This connection allows one to compute the analytic form of the frame-independent light-front wavefunctions, the fundamental entities which encode hadron properties and allow the computation of decay constants, form factors, and other exclusive scattering amplitudes. New relativistic lightfront equations in ordinary space-time are found which reproduce the results obtained using the 5-dimensional theory. The effective light-front equations possess remarkable algebraic structures and integrability properties. Since they are complete and orthonormal, the AdS/CFT model wavefunctions can also be used as a basis for the diagonalization of the full light-front QCD Hamiltonian, thus systematically improving the AdS/CFT approximation

  15. Mobile Customer Relationship Management and Mobile Security

    Science.gov (United States)

    Sanayei, Ali; Mirzaei, Abas

    The purpose of this study is twofold. First, in order to guarantee a coherent discussion about mobile customer relationship management (mCRM), this paper presents a conceptualization of mCRM delineating its unique characteristics because of Among the variety of mobile services, considerable attention has been devoted to mobile marketing and in particular to mobile customer relationship management services. Second, the authors discusses the security risks in mobile computing in different level(user, mobile device, wireless network,...) and finally we focus on enterprise mobile security and it's subgroups with a series of suggestion and solution for improve mobile computing security.

  16. The African Mobile Story

    DEFF Research Database (Denmark)

    This book identifies the factors that has enabled the growth of mobile telephony in Africa. The book covers the regulatory factors, the development and usage of mobile application, mobile security and sustainable power source for mobile networks...

  17. Wilson lines for AdS5 black strings

    International Nuclear Information System (INIS)

    Hristov, Kiril; Katmadas, Stefanos

    2015-01-01

    We describe a simple method of extending AdS 5 black string solutions of 5d gauged supergravity in a supersymmetric way by addition of Wilson lines along a circular direction in space. When this direction is chosen along the string, and due to the specific form of 5d supergravity that features Chern-Simons terms, the existence of magnetic charges automatically generates conserved electric charges in a 5d analogue of the Witten effect. Therefore we find a rather generic, model-independent way of adding electric charges to already existing solutions with no backreaction from the geometry or breaking of any symmetry. We use this method to explicitly write down more general versions of the Benini-Bobev black strings (http://dx.doi.org/10.1103/PhysRevLett.110.061601, http://dx.doi.org/10.1007/JHEP06(2013)005) and comment on the implications for the dual field theory and the similarities with generalizations of the Cacciatori-Klemm black holes (http://dx.doi.org/10.1007/JHEP01(2010)085) in AdS 4 .

  18. An AdS3 dual for minimal model CFTs

    International Nuclear Information System (INIS)

    Gaberdiel, Matthias R.; Gopakumar, Rajesh

    2011-01-01

    We propose a duality between the 2d W N minimal models in the large N't Hooft limit, and a family of higher spin theories on AdS 3 . The 2d conformal field theories (CFTs) can be described as Wess-Zumino-Witten coset models, and include, for N=2, the usual Virasoro unitary series. The dual bulk theory contains, in addition to the massless higher spin fields, two complex scalars (of equal mass). The mass is directly related to the 't Hooft coupling constant of the dual CFT. We give convincing evidence that the spectra of the two theories match precisely for all values of the 't Hooft coupling. We also show that the renormalization group flows in the 2d CFT agree exactly with the usual AdS/CFT prediction of the gravity theory. Our proposal is in many ways analogous to the Klebanov-Polyakov conjecture for an AdS 4 dual for the singlet sector of large N vector models.

  19. Heavy ion collisions in AdS5

    International Nuclear Information System (INIS)

    Kovchegov, Yuri V.

    2011-01-01

    We study heavy ion collisions at strong 't Hooft coupling using AdS/CFT correspondence. Heavy ion collisions correspond to gravitational shock wave collisions in AdS 5 . We construct the metric in the forward light cone after the collision perturbatively through expansion of Einstein equations in graviton exchanges. We obtain an analytic expression for the metric including all-order graviton exchanges with one shock wave, while keeping the exchanges with another shock wave at the lowest order. We read off the corresponding energy-momentum tensor of the produced medium. Unfortunately this energy-momentum tensor does not correspond to ideal hydrodynamics, indicating that higher order graviton exchanges are needed to construct the full solution of the problem. We also show that shock waves must completely stop almost immediately after the collision in AdS 5 , which, on the field theory side, corresponds to complete nuclear stopping due to strong coupling effects, likely leading to Landau hydrodynamics. Finally, we perform trapped surface analysis of the shock wave collisions demonstrating that a bulk black hole, corresponding to ideal hydrodynamics on the boundary, has to be created in such collisions, thus constructing a proof of thermalization in heavy ion collisions at strong coupling.

  20. Supergravity one-loop corrections on AdS7 and AdS3, higher spins and AdS/CFT

    Directory of Open Access Journals (Sweden)

    Matteo Beccaria

    2015-03-01

    Full Text Available As was shown earlier, the one-loop correction in 10d supergravity on AdS5×S5 corresponds to the contributions to the vacuum energy and 4d boundary conformal anomaly which are minus the values for one N=4 Maxwell supermultiplet, thus reproducing the subleading term in the N2−1 coefficient in the dual SU(N SYM theory. We perform similar one-loop computations in 11d supergravity on AdS7×S4 and 10d supergravity on AdS3×S3×T4. In the AdS7 case we find that the corrections to the 6d conformal anomaly a-coefficient and the vacuum energy are again minus the ones for one (2,0 tensor multiplet, suggesting that the total a-anomaly coefficient for the dual (2,0 theory is 4N3−9/4N−7/4 and thus vanishes for N=1. In the AdS3 case the one-loop correction to the vacuum energy or 2d central charge turns out to be equal to that of one free (4,4 scalar multiplet, i.e. is c=+6. This reproduces the subleading term in the central charge c=6(Q1Q5+1 of the dual 2d CFT describing decoupling limit of D5–D1 system. We also present the expressions for the 6d a-anomaly coefficient and vacuum energy contributions of general-symmetry higher spin field in AdS7 and consider their application to tests of vectorial AdS/CFT with the boundary conformal 6d theory represented by free scalars, spinors or rank-2 antisymmetric tensors.

  1. Mobile weatherstation

    International Nuclear Information System (INIS)

    Hahn, H.; Koutny, P.; Schwabach, H.; Eisenwagner, H.

    1981-01-01

    A mobile weatherstation is described which allows to measure the following parameters: airtemperature, relative humidity, winddirection and windspeed. The station consists of three main units: the central station METEODAT, the multiplexer and the weather measure tower with the sensors. The measured data are displayed in digital form in the central unit and can be printed on a teletype. The power supply is either 220 Volt AC or 24 Volt DC. (author)

  2. Structural Mobility, Exchange Mobility and Subgroup Consistent Mobility Measurement – US–German Mobility Measurements Revisited

    OpenAIRE

    C. SCHLUTER; D. VAN DE GAER

    2008-01-01

    We formalize the concept of structural mobility and use the framework of subgroup consistent mobility measurement to derive a relative and an absolute measure of mobility that is increasing both in upward structural mobility and exchange mobility. In our empirical illustration, we contribute substantively to the ongoing debate about mobility rankings between the USA and Germany.

  3. Small AdS black holes from SYM

    International Nuclear Information System (INIS)

    Asplund, Curtis; Berenstein, David

    2009-01-01

    We provide a characterization of the set of configurations in N=4 SYM theory that are dual to small AdS black holes. Our construction shows that the black hole dual states are approximately thermal on a SU(M) subset of degrees of freedom of a SU(N) gauge theory. M is determined dynamically and the black hole degrees of freedom are dynamically insulated from the rest. These states are localized on the S 5 and have dynamical processes that correspond to matter absorption that make them behave as black objects

  4. On attractor mechanism of AdS4 black holes

    International Nuclear Information System (INIS)

    Anabalón, Andrés; Astefanesei, Dumitru

    2013-01-01

    We construct a general family of exact non-extremal 4-dimensional black holes in AdS gravity with U(1) gauge fields non-minimally coupled to a dilaton and a non-trivial dilaton potential. These black holes can have spherical, toroidal, and hyperbolic horizon topologies. We use the entropy function formalism to obtain the near horizon data in the extremal limit. Due to the non-trivial self-interaction of the scalar field, the zero temperature black holes can have a finite horizon area even if only the electric field is turned on

  5. Small black holes in global AdS spacetime

    Science.gov (United States)

    Jokela, Niko; Pönni, Arttu; Vuorinen, Aleksi

    2016-04-01

    We study the properties of two-point functions and quasinormal modes in a strongly coupled field theory holographically dual to a small black hole in global anti-de Sitter spacetime. Our results are seen to smoothly interpolate between known limits corresponding to large black holes and thermal AdS space, demonstrating that the Son-Starinets prescription works even when there is no black hole in the spacetime. Omitting issues related to the internal space, the results can be given a field theory interpretation in terms of the microcanonical ensemble, which provides access to energy densities forbidden in the canonical description.

  6. Configurational entropy of charged AdS black holes

    Directory of Open Access Journals (Sweden)

    Chong Oh Lee

    2017-09-01

    Full Text Available When we consider charged AdS black holes in higher dimensional spacetime and a molecule number density along coexistence curves is numerically extended to higher dimensional cases. It is found that a number density difference of a small and large black holes decrease as a total dimension grows up. In particular, we find that a configurational entropy is a concave function of a reduced temperature and reaches a maximum value at a critical (second-order phase transition point. Furthermore, the bigger a total dimension becomes, the more concave function in a configurational entropy while the more convex function in a reduced pressure.

  7. Gravitational charges of transverse asymptotically AdS spacetimes

    International Nuclear Information System (INIS)

    Cebeci, Hakan; Sarioglu, Oezguer; Tekin, Bayram

    2006-01-01

    Using Killing-Yano symmetries, we construct conserved charges of spacetimes that asymptotically approach to the flat or anti-de Sitter spaces only in certain directions. In D dimensions, this allows one to define gravitational charges (such as mass and angular momenta densities) of p-dimensional branes/solitons or any other extended objects that curve the transverse space into an asymptotically flat or AdS one. Our construction answers the question of what kind of charges the antisymmetric Killing-Yano tensors lead to

  8. Entanglement entropy and duality in AdS4

    Directory of Open Access Journals (Sweden)

    Ioannis Bakas

    2015-07-01

    Full Text Available Small variations of the entanglement entropy δS and the expectation value of the modular Hamiltonian δE are computed holographically for circular entangling curves in the boundary of AdS4, using gravitational perturbations with general boundary conditions in spherical coordinates. Agreement with the first law of thermodynamics, δS=δE, requires that the line element of the entangling curve remains constant. In this context, we also find a manifestation of electric–magnetic duality for the entanglement entropy and the corresponding modular Hamiltonian, following from the holographic energy–momentum/Cotton tensor duality.

  9. The AdS3 central charge in string theory

    International Nuclear Information System (INIS)

    Troost, Jan

    2011-01-01

    We evaluate the vacuum expectation value of the central charge operator in string theory in an AdS 3 vacuum. Our calculation provides a rare non-zero one-point function on a spherical worldsheet. The evaluation involves the regularization both of a worldsheet ultraviolet divergence (associated to the infinite volume of the conformal Killing group), and a space-time infrared divergence (corresponding to the infinite volume of space-time). The two divergences conspire to give a finite result, which is the classical general relativity value for the central charge, corrected in bosonic string theory by an infinite series of tree level higher derivative terms.

  10. Herbert: A Second Generation Mobile Robot.

    Science.gov (United States)

    1988-01-01

    PROJECT. TASK S Artificial Inteligence Laboratory AREA A WORK UNIT NUMBERS ’ ~ 545 Technology Square Cambridge, MA 02139 11. CONTROLLING OFFICE NAME...AD-AI93 632 WMRT: A SECOND GENERTION MOBILE ROWT(U) / MASSACHUSETTS IMST OF TECH CAMBRIDGE ARTIFICIAL INTELLIGENCE LAB R BROOKS ET AL .JAN l8 Al-M...MASSACHUSETTS INSTITUTE OF TECHNOLOGY ARTIFICIAL INTELLIGENCE LABORATORY A. I. Memo 1016 January, 1988 HERBERT: A SECOND GENERATION MOBILE ROBOT Rodney A

  11. Introducing ADS 2.0

    Science.gov (United States)

    Accomazzi, Alberto; Kurtz, M. J.; Henneken, E. A.; Grant, C. S.; Thompson, D.; Luker, J.; Chyla, R.; Murray, S. S.

    2014-01-01

    In the spring of 1993, the Smithsonian/NASA Astrophysics Data System (ADS) first launched its bibliographic search system. It was known then as the ADS Abstract Service, a component of the larger Astrophysics Data System effort which had developed an interoperable data system now seen as a precursor of the Virtual Observatory. As a result of the massive technological and sociological changes in the field of scholarly communication, the ADS is now completing the most ambitious technological upgrade in its twenty-year history. Code-named ADS 2.0, the new system features: an IT platform built on web and digital library standards; a new, extensible, industrial strength search engine; a public API with various access control capabilities; a set of applications supporting search, export, visualization, analysis; a collaborative, open source development model; and enhanced indexing of content which includes the full-text of astronomy and physics publications. The changes in the ADS platform affect all aspects of the system and its operations, including: the process through which data and metadata are harvested, curated and indexed; the interface and paradigm used for searching the database; and the follow-up analysis capabilities available to the users. This poster describes the choices behind the technical overhaul of the system, the technology stack used, and the opportunities which the upgrade is providing us with, namely gains in productivity and enhancements in our system capabilities.

  12. Zero added oxygen for high quality sputtered ITO: A data science investigation of reduced Sn-content and added Zr

    International Nuclear Information System (INIS)

    Peshek, Timothy J.; Burst, James M.; Coutts, Timothy J.; Gessert, Timothy A.

    2016-01-01

    The authors demonstrate mobilities of >45 cm 2 /V s for sputtered tin-doped indium oxide (ITO) films at zero added oxygen. All films were deposited with 5 wt. % SnO 2 , instead of the more conventional 8–10 wt. %, and had varying ZrO 2 content from 0 to 3 wt. %, with a subsequent reduction in In 2 O 3 content. These films were deposited by radio-frequency magnetron sputtering from nominally stoichiometric targets with varying oxygen partial pressure in the sputter ambient. Anomalous behavior was discovered for films with no Zr-added, where a bimodality of high and low mobilities was discovered for nominally similar growth conditions. However, all films showed the lowest resistivity and highest mobilities when the oxygen partial pressure in the sputter ambient was zero. This result is contrasted with several other reports of ITO transport performance having a maximum for small but nonzero oxygen partial pressure. This result is attributed to the reduced concentration of SnO 2 . The addition of ZrO 2 yielded the highest mobilities at >55 cm 2 /V s and the films showed a modest increase in optical transmission with increasing Zr-content

  13. Critical gravity on AdS2 spacetimes

    International Nuclear Information System (INIS)

    Myung, Yun Soo; Kim, Yong-Wan; Park, Young-Jai

    2011-01-01

    We study the critical gravity in two-dimensional anti-de Sitter (AdS 2 ) spacetimes, which was obtained from the cosmological topologically massive gravity (TMG Λ ) in three dimensions by using the Kaluza-Klein dimensional reduction. We perform the perturbation analysis around AdS 2 , which may correspond to the near-horizon geometry of the extremal Banados, Teitelboim, and Zanelli (BTZ) black hole obtained from the TMG Λ with identification upon uplifting three dimensions. A massive propagating scalar mode δF satisfies the second-order differential equation away from the critical point of K=l, whose solution is given by the Bessel functions. On the other hand, δF satisfies the fourth-order equation at the critical point. We exactly solve the fourth-order equation, and compare it with the log gravity in two dimensions. Consequently, the critical gravity in two dimensions could not be described by a massless scalar δF ml and its logarithmic partner δF log 4th .

  14. AdS pure spinor superstring in constant backgrounds

    Energy Technology Data Exchange (ETDEWEB)

    Chandia, Osvaldo [Departamento de Ciencias, Facultad de Artes Liberales, Universidad Adolfo Ibáñez,Facultad de Ingeniería y Ciencias, Universidad Adolfo Ibáñez,Diagonal Las Torres 2640, Peñalolén, Santiago (Chile); Bevilaqua, L. Ibiapina [Escola de Ciências e Tecnologia, Universidade Federal do Rio Grande do Norte,Caixa Postal 1524, 59072-970, Natal, RN (Brazil); Vallilo, Brenno Carlini [Facultad de Ciencias Exactas, Departamento de Ciencias Físicas, Universidad Andres Bello,Republica 220, Santiago (Chile)

    2014-06-05

    In this paper we study the pure spinor formulation of the superstring in AdS{sub 5}×S{sup 5} around point particle solutions of the classical equations of motion. As a particular example we quantize the pure spinor string in the BMN background.

  15. Crystal manyfold universes in /AdS space

    Science.gov (United States)

    Kaloper, N.

    2000-02-01

    We derive crystal braneworld solutions, comprising of intersecting families of parallel /n+2-branes in a /4+n-dimensional /AdS space. Each family consists of alternating positive and negative tension branes. In the simplest case of exactly orthogonal families, there arise different crystals with unbroken /4D Poincaré invariance on the intersections, where our world can reside. A crystal can be finite along some direction, either because that direction is compact, or because it ends on a segment of /AdS bulk, or infinite, where the branes continue forever. If the crystal is interlaced by connected /3-branes directed both along the intersections and orthogonal to them, it can be viewed as an example of a Manyfold universe proposed recently by Arkani-Hamed, Dimopoulos, Dvali and the author. There are new ways for generating hierarchies, since the bulk volume of the crystal and the lattice spacing affect the /4D Planck mass. The low energy physics is sensitive to the boundary conditions in the bulk, and has to satisfy the same constraints discussed in the Manyfold universe. Phenomenological considerations favor either finite crystals, or crystals which are infinite but have broken translational invariance in the bulk. The most distinctive signature of the bulk structure is that the bulk gravitons are Bloch waves, with a band spectrum, which we explicitly construct in the case of a /5-dimensional theory.

  16. The PredictAD project

    DEFF Research Database (Denmark)

    Antila, Kari; Lötjönen, Jyrki; Thurfjell, Lennart

    2013-01-01

    Alzheimer's disease (AD) is the most common cause of dementia affecting 36 million people worldwide. As the demographic transition in the developed countries progresses towards older population, the worsening ratio of workers per retirees and the growing number of patients with age-related illnes...... candidates and implement the framework in software. The results are currently used in several research projects, licensed to commercial use and being tested for clinical use in several trials....... objective of the PredictAD project was to find and integrate efficient biomarkers from heterogeneous patient data to make early diagnosis and to monitor the progress of AD in a more efficient, reliable and objective manner. The project focused on discovering biomarkers from biomolecular data...

  17. Facilities Management and Added Value

    DEFF Research Database (Denmark)

    Jensen, Per Anker

    2010-01-01

    Aim: This paper aims to present different models of the concept of the added value of Facilities Management (FM), including the FM Value Map, which forms the basis of research group in EuroFM, and to present some of the results of this research collaboration. Approach and methodology: The paper...... is based on literature reviews of the most influential journals within the academic fields of FM, Corporate Real Estate Management and Business to Business Marketing and discussions between participants of the research group working on a further exploration and testing of the FM Value Map. Conclusions......: The research shows a number of different definitions and focus points of Added Value of FM, dependent on the academic field and the area of application. The different research perspectives explored a holistic view on the added value of FM by the integration of an external market based view (with a focus...

  18. Mobile Termination and Mobile Penetration

    OpenAIRE

    Hurkens, Sjaak; Jeon, Doh-Shin

    2009-01-01

    In this paper, we study how access pricing affects network competition when subscription demand is elastic and each network uses non-linear prices and can apply termination-based price discrimination. In the case of a fixed per minute termination charge, we find that a reduction of the termination charge below cost has two oppos- ing effects: it softens competition but helps to internalize network externalities. The former reduces mobile penetration while the latter boosts it. We find that fi...

  19. Mobile termination and mobile penetration

    OpenAIRE

    Hurkens, Sjaak

    2009-01-01

    In this paper, we study how access pricing affects network competition when subscription demand is elastic and each network uses non-linear prices and can apply termination-based price discrimination. In the case of a fixed per minute termination charge, we find that a reduction of the termination charge below cost has two opposing effects: it softens competition but helps to internalize network externalities. The former reduces mobile penetration while the latter boosts it. We find that firm...

  20. Smooth causal patches for AdS black holes

    Science.gov (United States)

    Raju, Suvrat

    2017-06-01

    We review the paradox of low energy excitations of a black hole in anti-de Sitter space (AdS). An appropriately chosen unitary operator in the boundary theory can create a locally strong excitation near the black hole horizon, whose global energy is small as a result of the gravitational redshift. The paradox is that this seems to violate a general rule of statistical mechanics, which states that an operator with energy parametrically smaller than k T cannot create a significant excitation in a thermal system. When we carefully examine the position dependence of the boundary unitary operator that produces the excitation and the bulk observable necessary to detect the anomalously large effect, we find that they do not both fit in a single causal patch. This follows from a remarkable property of position-space AdS correlators that we establish explicitly and resolves the paradox in a generic state of the system, since no combination of observers can both create the excitation and observe its effect. As a special case of our analysis, we show how this resolves the "Born rule" paradox of Marolf and Polchinski [J. High Energy Phys. 01 (2016) 008, 10.1007/JHEP01(2016)008] and we verify our solution using an independent calculation. We then consider boundary states that are finely tuned to display a spontaneous excitation outside the causal patch of the infalling observer, and we propose a version of causal patch complementarity in AdS/CFT that resolves the paradox for such states as well.

  1. Mobile Payments : Comparison of Mobile Wallet Concepts

    OpenAIRE

    Narayan, Srikant

    2013-01-01

    Mobile payments are an emerging trend and an alternative to traditional payment methods. Mobile payments involve the usage of the mobile phone to handle credit transfers during purchase of goods and peer to peer money transfers referred to as mobile wallet service, instead of depending on bank cards and cash. In this scenario, while the mobile wallet industry still being in its infancy there exist a few drivers of mobile wallet solutions aiming to create a de-facto standard in the mobile mark...

  2. Multiagent Based Information Dissemination in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    S.S. Manvi

    2009-01-01

    Full Text Available Vehicular Ad hoc Networks (VANETs are a compelling application of ad hoc networks, because of the potential to access specific context information (e.g. traffic conditions, service updates, route planning and deliver multimedia services (Voice over IP, in-car entertainment, instant messaging, etc.. This paper proposes an agent based information dissemination model for VANETs. A two-tier agent architecture is employed comprising of the following: 1 'lightweight', network-facing, mobile agents; 2 'heavyweight', application-facing, norm-aware agents. The limitations of VANETs lead us to consider a hybrid wireless network architecture that includes Wireless LAN/Cellular and ad hoc networking for analyzing the proposed model. The proposed model provides flexibility, adaptability and maintainability for traffic information dissemination in VANETs as well as supports robust and agile network management. The proposed model has been simulated in various network scenarios to evaluate the effectiveness of the approach.

  3. Mobile Marketing

    OpenAIRE

    Luengo Cascudo, Alberto

    2010-01-01

    El principal objetivo de este proyecto es explicar y entender la importancia del Mobile Marketing como nueva herramienta de negocio en el Marketing empresarial. Para ello, el primer objetivo es entender los dos factores que para mí son la clave de su importancia: la evolución del entorno tecnológico y el cambio en los hábitos del consumidor. Debido a la novedad de esta nueva forma de Marketing y al hecho de que está en constante definición, es básico exponer de la forma más cla...

  4. Wapice News Mobile Application

    OpenAIRE

    Söylemez, Ilke

    2017-01-01

    Since the mobile phones started to have an increasingly significant role in daily life, the mobile application development also started to be an important area in the software industry. The problem for mobile application developers is to develop a mobile application which supports all the devices and platforms on the market. This issue created a need for cross platform mobile applications. The cross platform mobile development refers to the development of mobile applications that could be use...

  5. Smart AD and DA Converters

    NARCIS (Netherlands)

    Roermund, van A.H.M.; Hegt, J.A.; Harpe, P.J.A.; Radulov, G.I.; Zanikopoulos, A.; Doris, K.; Quinn, P.J.

    2005-01-01

    In this paper, a concept is proposed to solve the problems related to the embedding of AD and DA converters in system-on-chips, FPGAs or other VLSI solutions. Problems like embedded testing, yield, reliability and reduced design space become crucial bottlenecks in the integration of high-performance

  6. agradecimento aos consultores ad hoc

    Directory of Open Access Journals (Sweden)

    REA Editor

    2012-02-01

    Full Text Available Agradecemos aos professores Nildo Viana (UFG e Flavio Sofiati (UFG, organizadores do DOSSIÊ JUVENTUDE & SOCIEDADE, e aos Consultores Ad hoc pela leitura e apreciação crítica dos artigos submetidos e publicados nesta edição.

  7. STRAW - An Integrated Mobility and Traffic Model for VANETs

    National Research Council Canada - National Science Library

    Choffnes, David R; Bustamante, Fabian E

    2005-01-01

    Ad-hoc wireless communication among highly dynamic, mobile nodes in a urban network is a critical capability for a wide range of important applications including automated vehicles, real-time traffic...

  8. Mobile Health Approaches to Non-Communicable Diseases in ...

    African Journals Online (AJOL)

    Mobile Health Approaches to Non-Communicable Diseases in Rwanda ... child health, it would be cost-effective to leverage this infrastructure and adapt it for the NCD domain. .... gram currently exists in Rwanda that simultaneously ad-.

  9. An investigation of AdS2 backreaction and holography

    International Nuclear Information System (INIS)

    Engelsöy, Julius; Mertens, Thomas G.; Verlinde, Herman

    2016-01-01

    We investigate a dilaton gravity model in AdS 2 proposed by Almheiri and Polchinski http://dx.doi.org/10.1007/JHEP11(2015)014 and develop a 1d effective description in terms of a dynamical boundary time with a Schwarzian derivative action. We show that the effective model is equivalent to a 1d version of Liouville theory, and investigate its dynamics and symmetries via a standard canonical framework. We include the coupling to arbitrary conformal matter and analyze the effective action in the presence of possible sources. We compute commutators of local operators at large time separation, and match the result with the time shift due to a gravitational shockwave interaction. We study a black hole evaporation process and comment on the role of entropy in this model.

  10. Chiral gauge theory on AdS domain wall

    International Nuclear Information System (INIS)

    Shirman, Yuri

    2005-01-01

    We describe a realization of chiral gauge theories based on the domaim wall fermion construction implemented on an interval in five dimensional AdS spacetime. At semi-classical level deconstructed description of the theory is given in terms of 4-dimensional Minkowski slices supporting chiral zero modes at the ends. Energy scales warp down along the fifth dimension. When the theory is augmented by 4-dimensional neutral Majorana spinors together with the Higgs mechanism at the low energy end, we can arrange for a theory where the lightest gauge boson mode as well as chiral zero mode at the high energy end are parametrically lighter than other states. Triangle anomalies and instanton effects are expected to make gauge bosons heavy if the resulting effective theory is anomalous. Due to the strong coupling effects at the quantum level, full non-perturbative calculation will be necessary to validate this construction

  11. From free fields to AdS space: Thermal case

    International Nuclear Information System (INIS)

    Furuuchi, Kazuyuki

    2005-01-01

    We analyze the reorganization of free field theory correlators to closed string amplitudes investigated in previous papers in the case of Euclidean thermal field theory and study how the dual bulk geometry is encoded on them. The expectation value of Polyakov loop, which is an order parameter for confinement-deconfinement transition, is directly reflected on the dual bulk geometry. The dual geometry of the confined phase is found to be AdS space periodically identified in Euclidean time direction. The gluing of Schwinger parameters, which is a key step for the reorganization of field theory correlators, works in the same way as in the nonthermal case. In the deconfined phase the gluing is made possible only by taking the dual geometry correctly. The dual geometry for the deconfined phase does not have a noncontractable circle in the Euclidean time direction

  12. Fine Grained Chaos in AdS_{2} Gravity.

    Science.gov (United States)

    Haehl, Felix M; Rozali, Moshe

    2018-03-23

    Quantum chaos can be characterized by an exponential growth of the thermal out-of-time-order four-point function up to a scrambling time u[over ^]_{*}. We discuss generalizations of this statement for certain higher-point correlation functions. For concreteness, we study the Schwarzian theory of a one-dimensional time reparametrization mode, which describes two-dimensional anti-de Sitter space (AdS_{2}) gravity and the low-energy dynamics of the Sachdev-Ye-Kitaev model. We identify a particular set of 2k-point functions, characterized as being both "maximally braided" and "k-out of time order," which exhibit exponential growth until progressively longer time scales u[over ^]_{*}^{(k)}∼(k-1)u[over ^]_{*}. We suggest an interpretation as scrambling of increasingly fine grained measures of quantum information, which correspondingly take progressively longer time to reach their thermal values.

  13. Aspects of warped AdS3/CFT2 correspondence

    Science.gov (United States)

    Chen, Bin; Zhang, Jia-Ju; Zhang, Jian-Dong; Zhong, De-Liang

    2013-04-01

    In this paper we apply the thermodynamics method to investigate the holographic pictures for the BTZ black hole, the spacelike and the null warped black holes in three-dimensional topologically massive gravity (TMG) and new massive gravity (NMG). Even though there are higher derivative terms in these theories, the thermodynamics method is still effective. It gives consistent results with the ones obtained by using asymptotical symmetry group (ASG) analysis. In doing the ASG analysis we develop a brute-force realization of the Barnich-Brandt-Compere formalism with Mathematica code, which also allows us to calculate the masses and the angular momenta of the black holes. In particular, we propose the warped AdS3/CFT2 correspondence in the new massive gravity, which states that quantum gravity in the warped spacetime could holographically dual to a two-dimensional CFT with {c_R}={c_L}=24 /{Gm{β^2√{{2( {21-4{β^2}} )}}}}.

  14. Thermodynamics of charged Lovelock: AdS black holes

    International Nuclear Information System (INIS)

    Prasobh, C.B.; Suresh, Jishnu; Kuriakose, V.C.

    2016-01-01

    We investigate the thermodynamic behavior of maximally symmetric charged, asymptotically AdS black hole solutions of Lovelock gravity. We explore the thermodynamic stability of such solutions by the ordinary method of calculating the specific heat of the black holes and investigating its divergences which signal second-order phase transitions between black hole states. We then utilize the methods of thermodynamic geometry of black hole spacetimes in order to explain the origin of these points of divergence. We calculate the curvature scalar corresponding to a Legendre-invariant thermodynamic metric of these spacetimes and find that the divergences in the black hole specific heat correspond to singularities in the thermodynamic phase space. We also calculate the area spectrum for large black holes in the model by applying the Bohr-Sommerfeld quantization to the adiabatic invariant calculated for the spacetime. (orig.)

  15. Higher-derivative superparticle in AdS3 space

    Science.gov (United States)

    Kozyrev, Nikolay; Krivonos, Sergey; Lechtenfeld, Olaf

    2016-03-01

    Employing the coset approach we construct component actions for a superparticle moving in AdS3 with N =(2 ,0 ), D =3 supersymmetry partially broken to N =2 , d =1 . These actions may contain higher time-derivative terms, which are chosen to possess the same (super)symmetries as the free superparticle. In terms of the nonlinear-realization superfields, the component actions always take a simpler form when written in terms of covariant Cartan forms. We also consider in detail the reduction to the nonrelativistic case and construct the corresponding action of a Newton-Hooke superparticle and its higher-derivative generalizations. The structure of these higher time-derivative generalizations is completely fixed by invariance under the supersymmetric Newton-Hooke algebra extended by two central charges.

  16. Fine Grained Chaos in AdS2 Gravity

    Science.gov (United States)

    Haehl, Felix M.; Rozali, Moshe

    2018-03-01

    Quantum chaos can be characterized by an exponential growth of the thermal out-of-time-order four-point function up to a scrambling time u^*. We discuss generalizations of this statement for certain higher-point correlation functions. For concreteness, we study the Schwarzian theory of a one-dimensional time reparametrization mode, which describes two-dimensional anti-de Sitter space (AdS2 ) gravity and the low-energy dynamics of the Sachdev-Ye-Kitaev model. We identify a particular set of 2 k -point functions, characterized as being both "maximally braided" and "k -out of time order," which exhibit exponential growth until progressively longer time scales u^*(k)˜(k -1 )u^*. We suggest an interpretation as scrambling of increasingly fine grained measures of quantum information, which correspondingly take progressively longer time to reach their thermal values.

  17. Adiabatic pumping solutions in global AdS

    Energy Technology Data Exchange (ETDEWEB)

    Carracedo, Pablo [Meteo-Galicia,Santiago de Compostela E-15782 (Spain); Mas, Javier; Musso, Daniele; Serantes, Alexandre [Departamento de Física de Partículas, Universidade de Santiago de Compostela,Santiago de Compostela E-15782 (Spain); Instituto Galego de Física de Altas Enerxías (IGFAE),Santiago de Compostela E-15782 (Spain)

    2017-05-26

    We construct a family of very simple stationary solutions to gravity coupled to a massless scalar field in global AdS. They involve a constantly rising source for the scalar field at the boundary and thereby we name them pumping solutions. We construct them numerically in D=4. They are regular and, generically, have negative mass. We perform a study of linear and nonlinear stability and find both stable and unstable branches. In the latter case, solutions belonging to different sub-branches can either decay to black holes or to limiting cycles. This observation motivates the search for non-stationary exactly time-periodic solutions which we actually construct. We clarify the role of pumping solutions in the context of quasistatic adiabatic quenches. In D=3 the pumping solutions can be related to other previously known solutions, like magnetic or translationally-breaking backgrounds. From this we derive an analytic expression.

  18. Thermodynamics of charged Lovelock: AdS black holes

    Science.gov (United States)

    Prasobh, C. B.; Suresh, Jishnu; Kuriakose, V. C.

    2016-04-01

    We investigate the thermodynamic behavior of maximally symmetric charged, asymptotically AdS black hole solutions of Lovelock gravity. We explore the thermodynamic stability of such solutions by the ordinary method of calculating the specific heat of the black holes and investigating its divergences which signal second-order phase transitions between black hole states. We then utilize the methods of thermodynamic geometry of black hole spacetimes in order to explain the origin of these points of divergence. We calculate the curvature scalar corresponding to a Legendre-invariant thermodynamic metric of these spacetimes and find that the divergences in the black hole specific heat correspond to singularities in the thermodynamic phase space. We also calculate the area spectrum for large black holes in the model by applying the Bohr-Sommerfeld quantization to the adiabatic invariant calculated for the spacetime.

  19. Worldsheet dilatation operator for the AdS superstring

    Energy Technology Data Exchange (ETDEWEB)

    Ramírez, Israel [Departamento de Física, Universidad Técnica Federico Santa María,Casilla 110-V, Valparaíso (Chile); Institut für Mathematik und Institut für Physik, Humboldt-Universität zu Berlin,IRIS Haus, Zum Großen Windkanal 6, 12489 Berlin (Germany); Vallilo, Brenno Carlini [Departamento de Ciencias Físicas, Universidad Andres Bello,Republica 220, Santiago (Chile)

    2016-05-23

    In this work we propose a systematic way to compute the logarithmic divergences of composite operators in the pure spinor description of the AdS{sub 5}×S{sup 5} superstring. The computations of these divergences can be summarized in terms of a dilatation operator acting on the local operators. We check our results with some important composite operators of the formalism.

  20. Holography beyond conformal invariance and AdS isometry?

    CERN Document Server

    Barvinsky, A.O.

    2015-01-01

    We suggest that the principle of holographic duality can be extended beyond conformal invariance and AdS isometry. Such an extension is based on a special relation between functional determinants of the operators acting in the bulk and on its boundary, provided that the boundary operator represents the inverse propagators of the theory induced on the boundary by the Dirichlet boundary value problem from the bulk spacetime. This relation holds for operators of general spin-tensor structure on generic manifolds with boundaries irrespective of their background geometry and conformal invariance, and it apparently underlies numerous $O(N^0)$ tests of AdS/CFT correspondence, based on direct calculation of the bulk and boundary partition functions, Casimir energies and conformal anomalies. The generalized holographic duality is discussed within the concept of the "double-trace" deformation of the boundary theory, which is responsible in the case of large $N$ CFT coupled to the tower of higher spin gauge fields for t...

  1. Situational Effects on the Usage Intention of Mobile Games

    Science.gov (United States)

    Liang, Ting-Peng; Yeh, Yi-Hsuan

    As value-added services on mobile devices are developing rapidly, text messaging, multi-media messaging, music, video, games, GPS navigation, RFID, and mobile TV are all accessible from a single device. Mobile games that combine mobile communication with computer games are an emerging industry. The purpose of this research is to explore what situation factors may affect the intention to play mobile game. We propose a research model to fit the nature of mobile games and conducted an online survey to examine the effect of situational factors. The model integrates constructs in TAM and TRA. The findings are as follows. First, Subjective norm affects a user’s intention in using mobile games when a user has no other task. Second, perceived playfulness affects a user’s intention to use mobile games when the user has another task.

  2. Mobility Balance Sheet 2009

    International Nuclear Information System (INIS)

    Jorritsma, P.; Derriks, H.; Francke, J.; Gordijn, H.; Groot, W.; Harms, L.; Van der Loop, H.; Peer, S.; Savelberg, F.; Wouters, P.

    2009-06-01

    The Mobility Balance Sheet provides an overview of the state of the art of mobility in the Netherlands. In addition to describing the development of mobility this report also provides explanations for the growth of passenger and freight transport. Moreover, the Mobility Balance Sheet also focuses on a topical theme: the effects of economic crises on mobility. [nl

  3. Mobile video with mobile IPv6

    CERN Document Server

    Minoli, Daniel

    2012-01-01

    Increased reliance on mobile devices and streaming of video content are two of the most recent changes that have led those in the video distribution industry to be concerned about the shifting or erosion of traditional advertising revenues. Infrastructure providers also need to position themselves to take advantage of these trends. Mobile Video with Mobile IPv6provides an overview of the current mobile landscape, then delves specifically into the capabilities and operational details of IPv6. The book also addresses 3G and 4G services, the application of Mobile IPv6 to streaming and other mobil

  4. Neutronic design of an ADS

    International Nuclear Information System (INIS)

    Cintas, A; Lopasso, E.M; Marquez Damian, J.I

    2009-01-01

    We present a LEU-ADS design based on an existing Argentine experimental facility, the RA-8 pool type zero power reactor. The versatility of this reactor allows measurement of different core configurations using different fuel enrichment, burnable poison rods, water perturbations and different control rods types in critical or subcritical configurations with an external source. To assess the feasibility of the LEU-ADS, multiplication factors, kinetic parameters, spectra, and time flux evolution were computed. Two external sources were considered: an isotopic 252 C f source, and a D-D pulsed neutron source. Parameters for different core configurations were calculated, and the feasibility of using continuous and pulsed neutron sources was verified. [es

  5. [Social mobilization].

    Science.gov (United States)

    Bop, C

    1990-04-01

    One of the principal recommendations from Alma Ata and the Bamako Initiative was the need for communities to take responsibility for their own health--a recommendation that still remains unmet and in need of reform in Africa because of the severe economic recession and lack of resources allocated for health care in the region. The mobilization of communities "is the opposite of passivity and submission." People must demystify the notion that health care is the exclusive right of health professionals and should realize that they themselves can bring about changes from the household to the village levels; community mobilization is an integral component of development planning. African societies have developed very centralized structures requiring changes that only their own communities can bring about. Because women remain the principal agents for the family's health they should be informed, about the multiple dimensions leading to good health care to enable them to provide the rest of the family with good nourishment and health care follow-up. Children are a vulnerable and important group that require preventive care. A UNICEF experiment in Senegal is training 10-13 year old school children to visit the parents of 5 children, inform them about vaccinating their children, and to follow-up on their activities with these "adopted families." The need for short and long-term IEC interventions in Africa are a priority and effective strategies must be found to reach the majority of the rural populations where all obstacles such as the lack of infrastructure and illiteracy exist. Mali has used traditional theatre "Koteba" to reach the rural populations on a variety of health issues such as oral rehydration and diarrhea as well as the Rural Audio Library (it used cassettes rather than books) to reach villagers in their own languages. The worst obstacle facing Africa today is the refusal of officials in power to allow people to manage their own lives, of which health is a

  6. Realizing "value-added" metrology

    Science.gov (United States)

    Bunday, Benjamin; Lipscomb, Pete; Allgair, John; Patel, Dilip; Caldwell, Mark; Solecky, Eric; Archie, Chas; Morningstar, Jennifer; Rice, Bryan J.; Singh, Bhanwar; Cain, Jason; Emami, Iraj; Banke, Bill, Jr.; Herrera, Alfredo; Ukraintsev, Vladamir; Schlessinger, Jerry; Ritchison, Jeff

    2007-03-01

    The conventional premise that metrology is a "non-value-added necessary evil" is a misleading and dangerous assertion, which must be viewed as obsolete thinking. Many metrology applications are key enablers to traditionally labeled "value-added" processing steps in lithography and etch, such that they can be considered integral parts of the processes. Various key trends in modern, state-of-the-art processing such as optical proximity correction (OPC), design for manufacturability (DFM), and advanced process control (APC) are based, at their hearts, on the assumption of fine-tuned metrology, in terms of uncertainty and accuracy. These trends are vehicles where metrology thus has large opportunities to create value through the engineering of tight and targetable process distributions. Such distributions make possible predictability in speed-sorts and in other parameters, which results in high-end product. Additionally, significant reliance has also been placed on defect metrology to predict, improve, and reduce yield variability. The necessary quality metrology is strongly influenced by not only the choice of equipment, but also the quality application of these tools in a production environment. The ultimate value added by metrology is a result of quality tools run by a quality metrology team using quality practices. This paper will explore the relationships among present and future trends and challenges in metrology, including equipment, key applications, and metrology deployment in the manufacturing flow. Of key importance are metrology personnel, with their expertise, practices, and metrics in achieving and maintaining the required level of metrology performance, including where precision, matching, and accuracy fit into these considerations. The value of metrology will be demonstrated to have shifted to "key enabler of large revenues," debunking the out-of-date premise that metrology is "non-value-added." Examples used will be from critical dimension (CD

  7. A European Land Mobile Satellite System via EMS

    Science.gov (United States)

    Ananasso, Fulvio; Mistretta, Ignazio

    1991-10-01

    The paper analyzes the technical and market issues that influence the strategy of implementation of a Land Mobile Satellite System via the payload EMS (European Mobile System) embarked on ITALSAT F-2. The final goal is to determine services, network architecture, and added value chain that make LMSS via EMS profitable for a typical telecommunication company.

  8. Mobile phone interaction techniques for rural economy development ...

    African Journals Online (AJOL)

    The objective of this study is to identify the various researches on interaction techniques and user interface design as a first step to the design of suitable mobile interactions and user interfaces for rural users. This research project is also aimed at socio-economic development and adding value to mobile phone users in ...

  9. Air pollution from lead added to gasoline

    Energy Technology Data Exchange (ETDEWEB)

    Dingeon, B; Collombel, C

    1973-01-01

    General hygienic and toxicological problems of lead added to gasoline are discussed. Lead emitted by motor vehicles pollutes the air especially in cities and along highways, and is accumulated by soil and plants. The lead levels found in the blood of subjects living in cities and near highways was significantly higher than in rural dwellers. Close correlation between the atmospheric lead concentration and the carbon monoxide concentration as well as the traffic density was established, indicating traffic as the source of atmospheric lead. The effect of traffic on the atmospheric lead concentration extended over a distance of up to 4 km. The lead, emitted by motor vehicles in the form of submicron particles, is retained in the organism at rates of 5-10 percent following ingestion, and at rates of 30-50 percent when inhaled. Lead is partially excreted by the liver, kidney, hair, and nails. Some 95 percent of the retained lead is found in the blood, and accumulation in the bones with potential mobilization due to increases in the corticosteroid level was observed. Exposure to lead can be diagnosed by basophil granulation test, urine delta-aminolevulinic acid test, and delta-aminolevulinic acid dehydratase test.

  10. Mobile OS Comparative Study

    OpenAIRE

    Joseph, Jyothy; K, Shinto Kurian

    2013-01-01

    In the fast growing mobile revolutionary era, many operating systems are playing vital role in present market. This study is intending to identify the apt and secure mobile based on mobile operating systems capability and user requirements.

  11. Mobile Inquiry Based Learning

    NARCIS (Netherlands)

    Specht, Marcus

    2012-01-01

    Specht, M. (2012, 8 November). Mobile Inquiry Based Learning. Presentation given at the Workshop "Mobile inquiry-based learning" at the Mobile Learning Day 2012 at the Fernuniversität Hagen, Hagen, Germany.

  12. MOBILITY: A SYSTEMS APPROACH

    Directory of Open Access Journals (Sweden)

    Mykola I. Striuk

    2015-10-01

    Full Text Available A comprehensive study on the problem of mobility in the socio-educational and technical systems was carried out: the evolution of the concept of mobility in scientific sources of XIX–XXI centuries was analyzed and the new sources on the issue of mobility introduced into scientific circulation, the interrelation of the types of mobility in the socio-pedagogical and technical systems are theoretically grounded, an integrative model of mobility in the information society is proposed. The major trends in academic mobility are identified (the transition from student mobility to mobility programs and educational services providers, the new mobility programs (franchising, double/joint degrees, combinations, nostrification etc. are characterized. The new types of mobility providers are reviewed and attention is focused on virtual universities that are now the basis of virtual mobility of students and activities which are based on the use of new ICT in higher education, especially – the Internet and mobile learning environments.

  13. Micro Mobility Marketing

    DEFF Research Database (Denmark)

    Hosbond, Jens Henrik; Skov, Mikael B.

    2008-01-01

    , in our case a medium-sized retail supermarket. Two prototypes based on push and pull marketing strategies are implemented and evaluated. Taking outset in a synthesis of central issues in contemporary research on mobile marketing, we discuss their role in micro mobility marketing to point to similarities......Mobile marketing refers to marketing of services or goods using mobile technology and mobile marketing holds potentially great economical opportunities. Traditionally, mobile marketing has been viewed as mobility in the large taking place virtually anywhere, anytime. Further, research shows...... considerable number of studies on push-based SMS mobile marketing campaigns. This paper explores a related yet different form of mobile marketing namely micro mobility marketing. Micro mobility marketing denotes mobility in the small, meaning that promotion of goods takes place within a circumscribed location...

  14. Mobile Search and Advertising

    OpenAIRE

    Lovitskii, Vladimir; McCaffery, Colin; Thrasher, Michael; Traynor, David; Wright, Peter

    2009-01-01

    Mobile advertising is a rapidly growing sector providing brands and marketing agencies the opportunity to connect with consumers beyond traditional and digital media and instead communicate directly on their mobile phones. Mobile advertising will be intrinsically linked with mobile search, which has transported from the internet to the mobile and is identified as an area of potential growth. The result of mobile searching show that as a general rule such search result exceed 1...

  15. Trends in Mobile Marketing

    OpenAIRE

    Chocholová, Petra

    2010-01-01

    The principal aim of this thesis is to assess the state of the mobile marketing as of the first quarter of 2011 and to discuss various scenarios of the future development. This thesis defines the terms "mobile marketing" and "mobile advertising" and identifies the main players in the industry. It explores the main categories of mobile advertising such as mobile messaging, in-content and mobile internet advertising. Later, it analyzes the latest trends in the industry and describes in detail t...

  16. From free fields to AdS space. II

    International Nuclear Information System (INIS)

    Gopakumar, Rajesh

    2004-01-01

    We continue with the program of paper I [Phys. Rev. D 70, 025009 (2004)] to implement open-closed string duality on free gauge field theory (in the large-N limit). In this paper we consider correlators such as i=1 n TrΦ J i (x i )>. The Schwinger parametrization of this n-point function exhibits a partial gluing up into a set of basic skeleton graphs. We argue that the moduli space of the planar skeleton graphs is exactly the same as the moduli space of genus zero Riemann surfaces with n holes. In other words, we can explicitly rewrite the n-point (planar) free-field correlator as an integral over the moduli space of a sphere with n holes. A preliminary study of the integrand also indicates compatibility with a string theory on AdS space. The details of our argument are quite insensitive to the specific form of the operators and generalize to diagrams of a higher genus as well. We take this as evidence of the field theory's ability to reorganize itself into a string theory

  17. On modular properties of the AdS3 CFT

    International Nuclear Information System (INIS)

    Baron, Walter H.; Nunez, Carmen A.

    2011-01-01

    We study modular properties of the AdS 3 Wess-Zumino-Novikov-Witten model. Although the Euclidean partition function is modular invariant, the characters on the Euclidean torus diverge and the regularization proposed in the literature removes information on the spectrum and the usual one to one map between characters and representations of rational models is lost. Reconsidering the characters defined on the Lorentzian torus and focusing on their structure as distributions, we obtain expressions that recover those properties. We study their modular transformations and find a generalized S matrix, depending on the sign of the real modular parameters, which has two diagonal blocks and one off-diagonal block, mixing discrete and continuous representations, that we fully determine. We then explore the relations among the modular transformations, the fusion algebra and the boundary states. We explicitly construct Ishibashi states for the maximally symmetric D-branes and show that the generalized S matrix defines the one-point functions associated to pointlike and H 2 -branes as well as the fusion rules of the degenerate representations of sl(2,R) appearing in the open string spectrum of the pointlike D-branes, through a generalized Verlinde theorem.

  18. Quantum Black Holes as Holograms in AdS Braneworlds

    CERN Document Server

    Emparan, R; Kaloper, Nemanja; Emparan, Roberto; Fabbri, Alessandro; Kaloper, Nemanja

    2002-01-01

    We propose a new approach for using the AdS/CFT correspondence to study quantum black hole physics. The black holes on a brane in an AdS$_{D+1}$ braneworld that solve the classical bulk equations are interpreted as duals of {\\it quantum-corrected} $D$-dimensional black holes, rather than classical ones, of a conformal field theory coupled to gravity. We check this explicitly in D=3 and D=4. In D=3 we reinterpret the existing exact solutions on a flat membrane as states of the dual 2+1 CFT. We show that states with a sufficiently large mass really are 2+1 black holes where the quantum corrections dress the classical conical singularity with a horizon and censor it from the outside. On a negatively curved membrane, we reinterpret the classical bulk solutions as quantum-corrected BTZ black holes. In D=4 we argue that the bulk solution for the brane black hole should include a radiation component in order to describe a quantum-corrected black hole in the 3+1 dual. Hawking radiation of the conformal field is then ...

  19. Disentangling location-based advertising: The effects of location congruency and medium type on consumers' ad attention and brand choice

    NARCIS (Netherlands)

    Ketelaar, P.E.; Bernritter, S.F.; Riet, J.P. van 't; Hühn, A.E.; Woudenberg, T.J. van; Müller, B.C.N.; Janssen, L.

    2017-01-01

    Research on location-based advertising (LBA) suggests that the merits of LBA lie in the fact that consumers can be targeted with location-congruent ads on their personal mobile devices. However, LBA consists of two underlying constructs: a mobile (vs. point-of-sales) advertising medium and location

  20. Disentangling location-based advertising: the effects of location congruency and medium type on consumers' ad attention and brand choice

    NARCIS (Netherlands)

    Ketelaar, P.E.; Bernritter, S.F.; van't Riet, J.; Hühn, A.E.; van Woudenberg, T.J.; Müller, B.C.N.; Janssen, L.

    2017-01-01

    Research on location-based advertising (LBA) suggests that the merits of LBA lie in the fact that consumers can be targeted with location-congruent ads on their personal mobile devices. However, LBA consists of two underlying constructs: a mobile (vs. point-of-sales) advertising medium and location

  1. Disentangling location-based advertising : the effects of location congruency and medium type on consumers' ad attention and brand choice

    NARCIS (Netherlands)

    Ketelaar, Paul; Bernritter, Stefan; van 't Riet, Jonathan; Huhn, Arief Ernst; van Woudenberg, Thabo; Muller, Barbara; Janssen, Loes

    2017-01-01

    Research on location-based advertising (LBA) suggests that the merits of LBA lie in the fact that consumers can be targeted with location-congruent ads on their personal mobile devices. However, LBA consists of two underlying constructs: a mobile (vs. point-of-sales) advertising medium and location

  2. Position-Based Packet Forwarding for Vehicular Ad-Hoc Networks

    OpenAIRE

    Füßler, Holger

    2007-01-01

    Mobile Ad-Hoc Networks, or MANETs, are data communication networks between (potentially) mobile computer systems equipped with wireless communication devices and — in their purest form — in complete absence of communication infrastructure. Usage scenarios for these systems include communication during disaster recovery or battlefield communications. One of the great research challenges concerning MANETs is the Packet Forwarding Problem, i.e., the question to which neighbor node a data packet ...

  3. Ad valorem versus unit taxes

    DEFF Research Database (Denmark)

    Schröder, Philipp J.H.; Sørensen, Allan

    2010-01-01

    a general equilibrium monopolistic competition model with heterogeneous firms and intra-industry reallocations. We show that the welfare superiority of ad valorem over unit taxes under imperfect competition is not only preserved but amplified. The additional difference between the tools arises because unit...... taxes distort relative prices, which in turn reduces average industry productivity through reallocations (the survival and increased market share of lower productivity firms). Importantly, numerical solutions of the model reveal that the relative welfare loss from using the unit tax increases...

  4. Entanglement Entropy of AdS Black Holes

    Directory of Open Access Journals (Sweden)

    Maurizio Melis

    2010-11-01

    Full Text Available We review recent progress in understanding the entanglement entropy of gravitational configurations for anti-de Sitter gravity in two and three spacetime dimensions using the AdS/CFT correspondence. We derive simple expressions for the entanglement entropy of two- and three-dimensional black holes. In both cases, the leading term of the entanglement entropy in the large black hole mass expansion reproduces exactly the Bekenstein-Hawking entropy, whereas the subleading term behaves logarithmically. In particular, for the BTZ black hole the leading term of the entanglement entropy can be obtained from the large temperature expansion of the partition function of a broad class of 2D CFTs on the torus.

  5. Mobile Context Toolbox - an extensible context framework for S60 mobile phones

    DEFF Research Database (Denmark)

    Larsen, Jakob Eg; Jensen, Kristian

    2009-01-01

    We describe an open framework utilizing sensors and application data on S60 mobile phones enabling rapid prototyping of context-aware mobile applications. The framework has an extensible layered architecture allowing new sensors and features to be added to the context framework as they become....... In the experiments 14 participants have been continuously using a Nokia N95 mobile phone with a context logger application for an average of 48 days per user and covering 70% of the time. The study has provided valuable insights into the performance issues of the system in real-life usage situations, including...

  6. Antismoking Ads at the Point of Sale: The Influence of Ad Type and Context on Ad Reactions.

    Science.gov (United States)

    Kim, Annice; Nonnemaker, James; Guillory, Jamie; Shafer, Paul; Parvanta, Sarah; Holloway, John; Farrelly, Matthew

    2017-06-01

    Efforts are underway to educate consumers about the dangers of smoking at the point of sale (POS). Research is limited about the efficacy of POS antismoking ads to guide campaign development. This study experimentally tests whether the type of antismoking ad and the context in which ads are viewed influence people's reactions to the ads. A national convenience sample of 7,812 adult current smokers and recent quitters was randomized to 1 of 39 conditions. Participants viewed one of the four types of antismoking ads (negative health consequences-graphic, negative social consequences-intended emotive, benefits of quitting-informational, benefits of quitting-graphic) in one of the three contexts (alone, next to a cigarette ad, POS tobacco display). We assessed participants' reactions to the ads, including perceived effectiveness, negative emotion, affective dissonance, and motivational reaction. Graphic ads elicited more negative emotion and affective dissonance than benefits of quitting ads. Graphic ads elicited higher perceived effectiveness and more affective dissonance than intended emotive ads. Antismoking ads fared best when viewed alone, and graphic ads were least influenced by the context in which they were viewed. These results suggest that in developing POS campaigns, it is important to consider the competitive pro-tobacco context in which antismoking ads will be viewed.

  7. Mobility Model for Self-Organizing and Cooperative MSN and MANET Systems

    Directory of Open Access Journals (Sweden)

    Andrzej Sikora

    2012-03-01

    Full Text Available Self-organization mechanisms are used for building scalable systems consisting of a huge number of subsystems. In computer networks, self-organizing is especially important in ad hoc networking. A self-organizing ad hoc network is a collection of wireless devices that collaborate with each other to form a network system that adapts to achieve a goal or goals. Such network is often built from mobile devices that may spontaneously create a network and dynamically adapted to changes in an unknown environment. Mobility pattern is a critical element that influences the performance characteristics of mobile sensor networks (MSN and mobile ad hoc networks (MANET. In this paper, we survey main directions to mobility modeling. We describe a novel algorithm for calculating mobility patterns for mobile devices that is based on a cluster formation and an artificial potential function. Finally, we present the simulation results of its application to a rescue mission planning.

  8. Studies on urban vehicular ad-hoc networks

    CERN Document Server

    Zhu, Hongzi

    2013-01-01

    With the advancement of wireless technology, vehicular ad hoc networks (VANETs) are emerging as a promising approach to realizing 'smart cities' and addressing many important transportation problems such as road safety, efficiency, and convenience.This brief provides an introduction to the large trace data set collected from thousands of taxis and buses in Shanghai, the largest metropolis in China. It also presents the challenges, design issues, performance modeling and evaluation of a wide spectrum of VANET research topics, ranging from realistic vehicular mobility models and opportunistic ro

  9. Configuring Mobile Commerce Portals for Business Success

    DEFF Research Database (Denmark)

    Dholakia, Nikhilesh; Rask, Morten

    2004-01-01

    -portals must attract and retain customers. Success in mobile portal markets will depend on dynamic strategies that blend elements of personalization, permission, and specification of content. This chapter reviews the key differences between traditional e-commerce and the emergent m-commerce. It reviews...... the core concepts of personalization, permission, and content specification as they apply to e-commerce and m-commerce. The chapter presents a framework for developing effective business strategies for developing and managing mobile portals. http://www.morten-rask.dk/2003c.htm......M-commerce entails transactions conducted via mobile telecommunications networks using communication, information, and payment devices such as mobile phones or palmtop units. Geographic positioning and location capabilities are also being added to such networks and devices. Rather than using...

  10. SMS service from your GSM mobile phone

    CERN Multimedia

    IT Department

    2009-01-01

    The exchange of SMS (Short Message Service) messages is a very popular application of GSM mobile services. However, the use of the application with a CERN subscription is subject to certain conditions: First of all, only text messages can be sent and received with a CERN GSM subscription. These messages are limited to 160 characters. MMS (Multimedia Message Service) messages, which consist in attaching pictures, videos or sounds to a message, are not supported by the current CERN mobile network configuration. In addition, value-added SMS or SMS premium messages (e.g. messages to short numbers involving extra charges) are not permitted. Before sending a message, you must first record the number of the message centre (+41765980000) in your mobile. In principle, this configuration setting is automatically applied to all standard GSM mobile phones when they are issued. To send a message to another GSM user, you must of course enter his or her GSM number. This number must be e...

  11. Mobile Operating Systems

    OpenAIRE

    Vipin Kamboj; Hitesh Gupta

    2012-01-01

    Mobile phones are used by every people in today’s life. We use mobile phones without knowing the different factors that a mobile used including its technology, operating system, CPU ,RAM etc. Many types of operating system are used by different mobile. Every operating system has their advantage

  12. Mobile Africa : an introduction

    NARCIS (Netherlands)

    Bruijn, de M.E.; Dijk, van R.A.; Foeken, D.W.J.

    2001-01-01

    The case studies in this book on mobility in sub-Saharan Africa critically discuss dichotomous interpretations of mobility and reject the idea that migration indicates a breakdown in society. They adopt the approach that sedentary and mobile worlds converge and that mobility is part of the

  13. MUSICAL ARRANGEMENT OF MEDIA ADS

    Directory of Open Access Journals (Sweden)

    Chernyshov Alexander V.

    2015-01-01

    Full Text Available The music-compositional principles of commercial and political advertising and also the self-promotion of electronic media (radio, television, Internet are considered in this mediatext: from the elementary beeps, symbolic functions, emblems/logos and musical brands to the sound engineering technology to underscore the product's name and the complex synthesis between music and intra movements and color-light design of frames. Simultaneously examines, how the musical arrangement of ethereal advertising is involved in creation the emotional drama or bravado which reach the level of explicit or associative counterpoint 'music with the advertised object or subject' and which extend to expression of cultural image of all the broadcast channel. The article explores the works of the next genres like infomercial, teleshopping, film-ad, and autonomous commercials that have been produced in European countries or USA.

  14. Adding timing to the VELO

    CERN Document Server

    Mitreska, Biljana

    2017-01-01

    The LHCb experiment is designed to perform high precision measurements of matter-antimatter asymmetries and searches for rare and forbidden decays, with the aim of discovering new and unexpected particles and forces. In 2030 the LHC beam intensity will increase by a factor of 50 compared to current operations. This means increased samples of the particles we need to study, but it also presents experimental challenges. In particular, with current technology it becomes impossible to differentiate the many (>50) separate proton-proton collisions which occur for each bunch crossing.\\\\ In this project a Monte Carlo simulation was developed to model the operation of a silicon pixel vertex detector surrounding the collision region at LHCb, under the conditions expected after 2030, after the second upgrade of the Vertex Locator(VELO).The main goal was studying the effect of adding '4D' detectors which save high-precision timing information, in addition to the usual three spatial coordinates, as charged particles pas...

  15. Evolution of Mobile Applications

    Directory of Open Access Journals (Sweden)

    Phongtraychack Anachack

    2018-01-01

    Full Text Available Currently, we can see the rapid evolution of mobile technology, which involves mobile communication, mobile hardware, and mobile software. Features of mobile phones largely depend on software. In contemporary information and communication age [1–4], mobile application is one of the most concerned and rapidly developing areas. At the same time, the development of mobile application undergoes great changes with the introduction of new software, service platforms and software development kits (SDK. These changes lead to appearance of many new service platforms such as Google with Android and Apple with iOS. This article presents the information about the evolution of mobile application, gives some statistical data on the past and present situation, demonstrates how individual users of mobile devices can benefit, and shows how mobile applications affect society from the ethical perspective.

  16. MOBILITY: A SYSTEMS APPROACH

    OpenAIRE

    Mykola I. Striuk; Serhiy O. Semerikov; Andrii M. Striuk

    2015-01-01

    A comprehensive study on the problem of mobility in the socio-educational and technical systems was carried out: the evolution of the concept of mobility in scientific sources of XIX–XXI centuries was analyzed and the new sources on the issue of mobility introduced into scientific circulation, the interrelation of the types of mobility in the socio-pedagogical and technical systems are theoretically grounded, an integrative model of mobility in the information society is proposed. The major t...

  17. Mobile platform security

    CERN Document Server

    Asokan, N; Dmitrienko, Alexandra

    2013-01-01

    Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrat

  18. The Sociability of Mobile TV

    Science.gov (United States)

    Geerts, David

    Both mobile phones and television are known for the social practices they enable. Television has been a social medium since its introduction in households all over the world. Although its main aim is entertaining and informing its viewers, people often watch television together with close relatives or good friends, talk about what is going on while watching television or even structure their social activities around a television show (e.g., eating dinner while watching the news) (Lull 1980). But television programs are also part of social interactions away from the television set, when discussing favorite television programs around the water cooler at work, or recommending shows to watch to good friends. The main function of mobile phones on the other hand has always been social from the start: communicating with other people, when and wherever you want, first using voice communication and later also with text messages and video communication. So what happens when these two social media are combined? It is clear that mobile TV cannot be successful without taking social practices when watching TV on a mobile device into account. Although one approach could be to let the users appropriate the device in their social environment, as happened with text messaging, the risk that it does not match their current practices is too big. A better approach is to design mobile TV applications that take direct advantage of the social aspects of each medium, which means adding interactive features that will enable and support social interaction between users on different levels. In order to get an idea of the possibilities, it is interesting to look at recent research in the closely related domain of interactive television.

  19. Thermodynamic and classical instability of AdS black holes in fourth-order gravity

    International Nuclear Information System (INIS)

    Myung, Yun Soo; Moon, Taeyoon

    2014-01-01

    We study thermodynamic and classical instability of AdS black holes in fourth-order gravity. These include the BTZ black hole in new massive gravity, Schwarzschild-AdS black hole, and higher-dimensional AdS black holes in fourth-order gravity. All thermodynamic quantities which are computed using the Abbot-Deser-Tekin method are used to study thermodynamic instability of AdS black holes. On the other hand, we investigate the s-mode Gregory-Laflamme instability of the massive graviton propagating around the AdS black holes. We establish the connection between the thermodynamic instability and the GL instability of AdS black holes in fourth-order gravity. This shows that the Gubser-Mitra conjecture holds for AdS black holes found from fourth-order gravity

  20. III Adli Bilimler Kongresi - Posterler

    Directory of Open Access Journals (Sweden)

    Adli Tıp Uzmanları Derneği ATUD

    2000-08-01

    Full Text Available POSTER ÖZETLERİ OTOPSİ UYGULAMASINA TOPLUMSAL YAKLAŞIM C. Haluk İNCE*, Nurhan İNCE** ***, Şebnem Korur FİNCANCI*, Yıldız TÜMERDEM**. ÖZET Otopsi sayısı, bir ülkenin sağlık ve yargı yönünden gelişmişliğinin kriterlerinden biridir. Çalışma bireylerin konu ile ilgili bilgi ve davranışları öğrenildiği takdirde otopsi ile ilgili olumsuz davranışlarının da en aza indirgenecek bir yöntemle eğitilmelerinin sağlanabileceği savı ile gerçekleştirilmiştir. Verileri İstanbul kentinde farklı sosyoekonomik kültürel (SEK düzeyli toplum yapısının gözlendiği ilçelerden rastlantısal örnekleme ile seçilen 342 katılıcıdan çok sorulu anketi (ön seçimli yüzyüze uygulama yöntemi ile toplanmıştır. 342 katılımcının %6l.4 (n=210'ü kadın, %38.6 (n=132'si erkektir. % 9.1 kişinin ailesinde bir otopsi deneyimi yaşamıştır. %76.9 (n:263 kişi otopsinin gerekli olduğunu ifade etmiştir. Bireylerin eğitim durumlarına göre otopsiye izin verme konusundaki görüşlerinin arasında öğrenim düzeyi yüksek olanların lehine istatistiksi açıdan anlamlı sonuç çıkmıştır. Her iki cinste de ailelerinde hangi birey olursa olsun otopsiye rıza konusundaki görüşlerinde farklılığın olmaması dikkat çekici bulunmuştur. % 16.1 (n:5' i ise dini inançlarına aykırı olduğu için otopsiye asla izin veremeyeceklerini ifade etmiştir. Toplumun SEK yapısından kaynaklanan yetersiz bilgi ülkemizdeki otopsi sayısının gelişmiş ülkelere oranla olumsuz etkilemektedir. Ancak hekim ve hekim dışı sağlık çalışanlarının da otopsi konusunda bilgi ve donanımlarını geliştirmeleri gerekmektedir. Bu çalışma otopsi sayısındaki düşüklüğün rolünü araştırmak üzere düzenlenmiştir. Anahtar Kelimeler: Otopsi, toplumsal yargı, bilgilendirme. TRAKTÖR KAZALARINDA ÖLEN OLGULARIN DEĞERLENDİRİLMESİ M.Selim ÖZKÖK*, Ufuk KATKICI. ÖZET Trafik kazaları adli tıp pratiğinde

  1. Light-cone AdS/CFT-adapted approach to AdS fields/currents, shadows, and conformal fields

    Energy Technology Data Exchange (ETDEWEB)

    Metsaev, R.R. [Department of Theoretical Physics, P.N. Lebedev Physical Institute, Leninsky prospect 53, Moscow 119991 (Russian Federation)

    2015-10-16

    Light-cone gauge formulation of fields in AdS space and conformal field theory in flat space adapted for the study of AdS/CFT correspondence is developed. Arbitrary spin mixed-symmetry fields in AdS space and arbitrary spin mixed-symmetry currents, shadows, and conformal fields in flat space are considered on an equal footing. For the massless and massive fields in AdS and the conformal fields in flat space, simple light-cone gauge actions leading to decoupled equations of motion are found. For the currents and shadows, simple expressions for all 2-point functions are also found. We demonstrate that representation of conformal algebra generators on space of currents, shadows, and conformal fields can be built in terms of spin operators entering the light-cone gauge formulation of AdS fields. This considerably simplifies the study of AdS/CFT correspondence. Light-cone gauge actions for totally symmetric arbitrary spin long conformal fields in flat space are presented. We apply our approach to the study of totally antisymmetric (one-column) and mixed-symmetry (two-column) fields in AdS space and currents, shadows, and conformal fields in flat space.

  2. Abrechnung mobiler Dienste im Mobile-Payment-Referenzmodell

    OpenAIRE

    Pousttchi, Key; Wiedemann, Dietmar Georg

    2005-01-01

    The purpose of the paper is to analyze mobile payments in the mobile commerce scenario. Therefore, we first classify the mobile payment in the mobile commerce scenario by explaining general offer models, charging concepts, and intermediaries. Second, we describe the mobile payment reference model, especially, the mobile payment reference organization model and different mobile payment standard types. Finally, we conclude our findings.

  3. Charging of mobile services by mobile payment reference model

    OpenAIRE

    Pousttchi, Key; Wiedemann, Dietmar Georg

    2005-01-01

    The purpose of the paper is to analyze mobile payments in the mobile commerce scenario. Therefore, we first classify the mobile payment in the mobile commerce scenario by explaining general offer models, charging concepts, and intermediaries. Second, we describe the mobile payment reference model, especially, the mobile payment reference organization model and different mobile payment standard types. Finally, we conclude our findings.

  4. Contribution to design a communication framework for vehicular ad hoc networks in urban scenarios

    OpenAIRE

    Tripp Barba, Carolina

    2013-01-01

    La movilidad constante de las personas y la creciente necesidad de estar conectados en todo momento ha hecho de las redes vehiculares un área cuyo interés ha ido en aumento. La gran cantidad de vehículos que hay en la actualidad, y los avances tecnológicos han hecho de las redes vehiculares (VANETS, Vehicular Ad hoc Networks) un gran campo de investigación. Las redes vehiculares son un tipo especial de redes móviles ad hoc inalámbricas, las cuales, al igual que las redes MANET (Mobile Ad hoc ...

  5. An Added Value of Neuroscientific Tools to Understand Consumers’ In-Store Behaviour

    DEFF Research Database (Denmark)

    Bagdziunaite, Dalia; Nassri, Khalid; Clement, Jesper

    2014-01-01

    Little is still understood about the actual in-store purchase process. Here, we report that prior ad exposure affects in-store decision-making. By using mobile eye-tracking and electroencephalography (EEG), we demonstrate that, unbeknownst to participants, the ad effect was driven by increased...... visual exploration of the product shelves for the brand that was presented during ad exposure, and a stronger motivation score, as assess by the brain’s prefrontal asymmetry. These findings are discussed in the light of the academic and commercial need to integrate neuroscientific tools in the study...

  6. Recurring Anomaly Detection System (ReADS)

    Data.gov (United States)

    National Aeronautics and Space Administration — Overview: ReADS can analyze text reports, such as aviation reports and problem or maintenance records. ReADS uses text clustering algorithms to group loosely related...

  7. TASI lectures on AdS/CFT

    CERN Document Server

    Penedones, Joao

    2017-01-01

    We introduce the AdS/CFT correspondence as a natural extension of QFT in a fixed AdS background. We start by reviewing some general concepts of CFT, including the embedding space formalism. We then consider QFT in a fixed AdS background and show that one can define boundary operators that enjoy very similar properties as in a CFT, except for the lack of a stress tensor. Including a dynamical metric in AdS generates a boundary stress tensor and completes the CFT axioms. We also discuss some applications of the bulk geometric intuition to strongly coupled QFT. Finally, we end with a review of the main properties of Mellin amplitudes for CFT correlation functions and their uses in the context of AdS/CFT.

  8. Nationwide impact and vehicle to grid application of electric vehicles mobility using an activity based model

    OpenAIRE

    Álvaro, Roberto; González, Jairo; Fraile Ardanuy, José Jesús; Knapen, Luk; Janssens, Davy

    2013-01-01

    This paper describes the impact of electric mobility on the transmission grid in Flanders region (Belgium), using a micro-simulation activity based models. These models are used to provide temporal and spatial estimation of energy and power demanded by electric vehicles (EVs) in different mobility zones. The increment in the load demand due to electric mobility is added to the background load demand in these mobility areas and the effects over the transmission substations are analyzed. From t...

  9. Myths & Facts about Value-Added Analysis

    Science.gov (United States)

    TNTP, 2011

    2011-01-01

    This paper presents myths as well as facts about value-added analysis. These myths include: (1) "Value-added isn't fair to teachers who work in high-need schools, where students tend to lag far behind academically"; (2) "Value-added scores are too volatile from year-to-year to be trusted"; (3) "There's no research behind value-added"; (4) "Using…

  10. Effective AdS/renormalized CFT

    OpenAIRE

    Fan, JiJi

    2011-01-01

    For an effective AdS theory, we present a simple prescription to compute the renormalization of its dual boundary field theory. In particular, we define anomalous dimension holographically as the dependence of the wave-function renormalization factor on the radial cutoff in the Poincare patch of AdS. With this definition, the anomalous dimensions of both single- and double- trace operators are calculated. Three different dualities are considered with the field theory being CFT, CFT with a dou...

  11. Power-Controlled MAC Protocols with Dynamic Neighbor Prediction for Ad hoc Networks

    Institute of Scientific and Technical Information of China (English)

    LI Meng; ZHANG Lin; XIAO Yong-kang; SHAN Xiu-ming

    2004-01-01

    Energy and bandwidth are the scarce resources in ad hoc networks because most of the mobile nodes are battery-supplied and share the exclusive wireless medium. Integrating the power control into MAC protocol is a promising technique to fully exploit these precious resources of ad hoc wireless networks. In this paper, a new intelligent power-controlled Medium Access Control (MAC) (iMAC) protocol with dynamic neighbor prediction is proposed. Through the elaborate design of the distributed transmit-receive strategy of mobile nodes, iMAC greatly outperforms the prevailing IEEE 802.11 MAC protocols in not only energy conservation but also network throughput. Using the Dynamic Neighbor Prediction (DNP), iMAC performs well in mobile scenes. To the best of our knowledge, iMAC is the first protocol that considers the performance deterioration of power-controlled MAC protocols in mobile scenes and then proposes a solution. Simulation results indicate that DNP is important and necessary for power-controlled MAC protocols in mobile ad hoc networks.

  12. Built-In Device Orientation Sensors for Ad-Hoc Pairing and Spatial Awareness

    DEFF Research Database (Denmark)

    Grønbæk, Jens Emil; O'Hara, Kenton

    Mobile devices are equipped with multiple sensors. The ubiquity of these sensors is key in their ability to support in-the-wild application and use. Building on the ubiquity we look at how we can use this existing sensing infrastructure combined with user mediation to support ad-hoc sharing with ...

  13. A tandem queueing model for delay analysis in disconnected ad hoc networks

    NARCIS (Netherlands)

    Al Hanbali, Ahmad; de Haan, Roland; Boucherie, Richardus J.; van Ommeren, Jan C.W.

    2007-01-01

    Ad hoc network routing protocols may fail to operate in the absence of an end-to-end connection from source to destination. This deficiency can be resolved by so-called opportunistic networking which exploits the mobility of the nodes by letting them operate as relays according to the

  14. Reconfigurable Robust Routing for Mobile Outreach Network

    Science.gov (United States)

    Lin, Ching-Fang

    2010-01-01

    The Reconfigurable Robust Routing for Mobile Outreach Network (R3MOO N) provides advanced communications networking technologies suitable for the lunar surface environment and applications. The R3MOON techn ology is based on a detailed concept of operations tailored for luna r surface networks, and includes intelligent routing algorithms and wireless mesh network implementation on AGNC's Coremicro Robots. The product's features include an integrated communication solution inco rporating energy efficiency and disruption-tolerance in a mobile ad h oc network, and a real-time control module to provide researchers an d engineers a convenient tool for reconfiguration, investigation, an d management.

  15. 16 CFR 460.18 - Insulation ads.

    Science.gov (United States)

    2010-01-01

    ... Commercial Practices FEDERAL TRADE COMMISSION TRADE REGULATION RULES LABELING AND ADVERTISING OF HOME INSULATION § 460.18 Insulation ads. (a) If your ad gives an R-value, you must give the type of insulation and... your ad gives a price, you must give the type of insulation, the R-value at a specific thickness, the...

  16. Effective ads: new technology answers old questions

    NARCIS (Netherlands)

    L.E. Couwenberg (Linda)

    2017-01-01

    markdownabstractMarketing experts commonly refer to ads as either “emotional” or “rational” in their appeal to consumers. This dichotomy of “thinking versus feeling” is most evident when it comes to discussions around what makes an ad effective. Some studies suggest that an ad that pulls on the

  17. Automated Experiments on Ad Privacy Settings

    Directory of Open Access Journals (Sweden)

    Datta Amit

    2015-04-01

    Full Text Available To partly address people’s concerns over web tracking, Google has created the Ad Settings webpage to provide information about and some choice over the profiles Google creates on users. We present AdFisher, an automated tool that explores how user behaviors, Google’s ads, and Ad Settings interact. AdFisher can run browser-based experiments and analyze data using machine learning and significance tests. Our tool uses a rigorous experimental design and statistical analysis to ensure the statistical soundness of our results. We use AdFisher to find that the Ad Settings was opaque about some features of a user’s profile, that it does provide some choice on ads, and that these choices can lead to seemingly discriminatory ads. In particular, we found that visiting webpages associated with substance abuse changed the ads shown but not the settings page. We also found that setting the gender to female resulted in getting fewer instances of an ad related to high paying jobs than setting it to male. We cannot determine who caused these findings due to our limited visibility into the ad ecosystem, which includes Google, advertisers, websites, and users. Nevertheless, these results can form the starting point for deeper investigations by either the companies themselves or by regulatory bodies.

  18. Contextual advertising using Google AdWords and Google AdSense

    OpenAIRE

    Mihok, Radovan

    2008-01-01

    The thesis introduces contextual advertising on internet using Google AdWords. The paper describes individual steps of an ad campaign (product choosing, ad types, keywords), its management and success evaluation (calculation of ROI and modified ROI).

  19. Head First Mobile Web

    CERN Document Server

    Gardner, Lyza; Grigsby, Jason

    2011-01-01

    Despite the huge number of mobile devices and apps in use today, your business still needs a website. You just need it to be mobile. Head First Mobile Web walks you through the process of making a conventional website work on a variety smartphones and tablets. Put your JavaScript, CSS media query, and HTML5 skills to work-then optimize your site to perform its best in the demanding mobile market. Along the way, you'll discover how to adapt your business strategy to target specific devices. Navigate the increasingly complex mobile landscapeTake both technical and strategic approaches to mobile

  20. Mobile Portal Implementation Strategy

    DEFF Research Database (Denmark)

    Gao, Ping; Damsgaard, Jan

    2005-01-01

    Mobile portal plays an important role in mobile commerce market. Current literature focuses on static analysis on the value chain of mobile portals. This article provides a dynamic perspective on mobile portal strategy. Drawing upon network economics, we describe mobile portal implementation...... as a fourphase process. In different phase, a portal provider has various challenges to overcome and adopt diverse strategies, and correspondingly the regulator has different foci. The conceptual framework proposed in this article offers a basis for further analyses on the market dynamics of mobile commerce......, and can be generalized to studying other networked technologies...

  1. Low-cost mobile phone microscopy with a reversed mobile phone camera lens.

    Science.gov (United States)

    Switz, Neil A; D'Ambrosio, Michael V; Fletcher, Daniel A

    2014-01-01

    The increasing capabilities and ubiquity of mobile phones and their associated digital cameras offer the possibility of extending low-cost, portable diagnostic microscopy to underserved and low-resource areas. However, mobile phone microscopes created by adding magnifying optics to the phone's camera module have been unable to make use of the full image sensor due to the specialized design of the embedded camera lens, exacerbating the tradeoff between resolution and field of view inherent to optical systems. This tradeoff is acutely felt for diagnostic applications, where the speed and cost of image-based diagnosis is related to the area of the sample that can be viewed at sufficient resolution. Here we present a simple and low-cost approach to mobile phone microscopy that uses a reversed mobile phone camera lens added to an intact mobile phone to enable high quality imaging over a significantly larger field of view than standard microscopy. We demonstrate use of the reversed lens mobile phone microscope to identify red and white blood cells in blood smears and soil-transmitted helminth eggs in stool samples.

  2. Low-cost mobile phone microscopy with a reversed mobile phone camera lens.

    Directory of Open Access Journals (Sweden)

    Neil A Switz

    Full Text Available The increasing capabilities and ubiquity of mobile phones and their associated digital cameras offer the possibility of extending low-cost, portable diagnostic microscopy to underserved and low-resource areas. However, mobile phone microscopes created by adding magnifying optics to the phone's camera module have been unable to make use of the full image sensor due to the specialized design of the embedded camera lens, exacerbating the tradeoff between resolution and field of view inherent to optical systems. This tradeoff is acutely felt for diagnostic applications, where the speed and cost of image-based diagnosis is related to the area of the sample that can be viewed at sufficient resolution. Here we present a simple and low-cost approach to mobile phone microscopy that uses a reversed mobile phone camera lens added to an intact mobile phone to enable high quality imaging over a significantly larger field of view than standard microscopy. We demonstrate use of the reversed lens mobile phone microscope to identify red and white blood cells in blood smears and soil-transmitted helminth eggs in stool samples.

  3. Reliability analysis of cluster-based ad-hoc networks

    International Nuclear Information System (INIS)

    Cook, Jason L.; Ramirez-Marquez, Jose Emmanuel

    2008-01-01

    The mobile ad-hoc wireless network (MAWN) is a new and emerging network scheme that is being employed in a variety of applications. The MAWN varies from traditional networks because it is a self-forming and dynamic network. The MAWN is free of infrastructure and, as such, only the mobile nodes comprise the network. Pairs of nodes communicate either directly or through other nodes. To do so, each node acts, in turn, as a source, destination, and relay of messages. The virtue of a MAWN is the flexibility this provides; however, the challenge for reliability analyses is also brought about by this unique feature. The variability and volatility of the MAWN configuration makes typical reliability methods (e.g. reliability block diagram) inappropriate because no single structure or configuration represents all manifestations of a MAWN. For this reason, new methods are being developed to analyze the reliability of this new networking technology. New published methods adapt to this feature by treating the configuration probabilistically or by inclusion of embedded mobility models. This paper joins both methods together and expands upon these works by modifying the problem formulation to address the reliability analysis of a cluster-based MAWN. The cluster-based MAWN is deployed in applications with constraints on networking resources such as bandwidth and energy. This paper presents the problem's formulation, a discussion of applicable reliability metrics for the MAWN, and illustration of a Monte Carlo simulation method through the analysis of several example networks

  4. Historical Literature in the ADS

    Science.gov (United States)

    Eichhorn, G.; Kurtz, M. J.; Accomazzi, A.; Grant, C. S.

    1997-12-01

    The Astrophysics Data System at http://adswww.harvard.edu is in the process of scanning the historical astronomical literature and making it available through the World Wide Web. We have scanned several volumes from the early 1800's of the "Astronomische Nachrichten", and the "Monthly Notices of the Royal Astronomical Society", the two oldest astronomical journals. We also have several of the early volumes of the "Astrophysical Journal" and the "Astronomical Journal" available. For all the journals that we cover, we have scanned volume 1. These early volumes can be accessed on a page-by-page basis. We plan to continue to scan this historical literature and complete these journals within the next year. We are also collaborating with a preservation project at Harvard University. This project will microfilm selected parts of astronomical Observatory reports. We plan to scan these microfilms to produce electronic images of these reports and put them on-line in the ADS. We hope to eventually cover most of the astronomical literature. In order to organize the scanned pages into articles, we need tables of contents (ToC). The early issues of the journals did not have printed ToC pages, so this needs to be done by hand. We do not have the financial resources to build these ToCs. We are looking for collaborators who would be willing to work with us in building these ToCs for the older journals and observatory reports. If you are interested in such a project, please contact the first author at gei@cfa.harvard.edu.

  5. Making Mobile Learning Work: Student Perceptions and Implementation Factors

    Directory of Open Access Journals (Sweden)

    Sharon W. Tabor

    2016-06-01

    Full Text Available Mobile devices are the constant companions of technology users of all ages. Studies show, however, that making calls is a minimal part of our engagement with today’s smart phones and that even texting has fallen off, leaving web browsing, gaming, and social media as top uses. A cross-disciplinary group of faculty at our university came together in the mLearning Scholars group to study the potential for using mobile devices for student learning. The group met bi-weekly throughout a semester and shared thoughts, ideas, resources, and examples, while experimenting with mobile learning activities in individual classes. This paper summarizes student perceptions and adoption intent for using mobile devices for learning, and discusses implementation issues for faculty in adding mobile learning to a college course. Outcomes reflect that mobile learning adoption is not a given, and students need help in using and understanding the value in using personal devices for learning activities.

  6. Collaboration and decision making tools for mobile groups

    International Nuclear Information System (INIS)

    Abrahamyan, S.; Balyan, S.; Degtyarev, A.; Ter-Minasyan, H.

    2017-01-01

    Nowadays the use of distributed collaboration tools is widespread in many areas of people activity. But lack of mobility and certain equipment dependence create difficulties and decelerate development and integration of such technologies. Also, mobile technologies allow individuals to interact with each other without need of traditional office spaces and regardless of location. Hence, realization of special infrastructures on mobile platforms with the help of ad hoc wireless local networks could eliminate hardware attachment and be also useful in terms of scientific approach. Solutions from basic internet messengers to complex software for online collaboration equipment in large-scale workgroups are implementations of tools based on mobile infrastructures. Despite growth of mobile infrastructures, applied distributed solutions in group decision-making and e-collaboration are not common. In this article we propose software complex for real-time collaboration and decision-making based on mobile devices, describe its architecture and evaluate performance.

  7. Collaboration and decision making tools for mobile groups

    Science.gov (United States)

    Abrahamyan, Suren; Balyan, Serob; Ter-Minasyan, Harutyun; Degtyarev, Alexander

    2017-12-01

    Nowadays the use of distributed collaboration tools is widespread in many areas of people activity. But lack of mobility and certain equipment-dependency creates difficulties and decelerates development and integration of such technologies. Also mobile technologies allow individuals to interact with each other without need of traditional office spaces and regardless of location. Hence, realization of special infrastructures on mobile platforms with help of ad-hoc wireless local networks could eliminate hardware-attachment and be useful also in terms of scientific approach. Solutions from basic internet-messengers to complex software for online collaboration equipment in large-scale workgroups are implementations of tools based on mobile infrastructures. Despite growth of mobile infrastructures, applied distributed solutions in group decisionmaking and e-collaboration are not common. In this article we propose software complex for real-time collaboration and decision-making based on mobile devices, describe its architecture and evaluate performance.

  8. Ad-hoc networking towards seamless communications

    CERN Document Server

    Gavrilovska, Liljana

    2006-01-01

    Ad-Hoc Networking Towards Seamless Communications is dedicated to an area that attracts growing interest in academia and industry and concentrates on wireless ad hoc networking paradigm. The persistent efforts to acquire the ability to establish dynamic wireless connections from anywhere to anyone with any device without prerequisite imbedded infrastructure move the communications boundaries towards ad-hoc networks. Recently, ad hoc networking has attracted growing interest due to advances in wireless communications, and developed framework for running IP based protocols. The expected degree of penetration of these networks will depend on the successful resolution of the key features. Ad-hoc networks pose many complex and open problems for researchers. Ad-Hoc Networking Towards Seamless Communications reveals the state-of-the-art in wireless ad-hoc networking and discusses some of the key research topics that are expected to promote and accelerate the commercial applications of these networks (e.g., MAC, rout...

  9. Ion mobility sensor system

    Science.gov (United States)

    Xu, Jun; Watson, David B.; Whitten, William B.

    2013-01-22

    An ion mobility sensor system including an ion mobility spectrometer and a differential mobility spectrometer coupled to the ion mobility spectrometer. The ion mobility spectrometer has a first chamber having first end and a second end extending along a first direction, and a first electrode system that generates a constant electric field parallel to the first direction. The differential mobility spectrometer includes a second chamber having a third end and a fourth end configured such that a fluid may flow in a second direction from the third end to the fourth end, and a second electrode system that generates an asymmetric electric field within an interior of the second chamber. Additionally, the ion mobility spectrometer and the differential mobility spectrometer form an interface region. Also, the first end and the third end are positioned facing one another so that the constant electric field enters the third end and overlaps the fluid flowing in the second direction.

  10. Seasonality, mobility, and livability.

    Science.gov (United States)

    2012-01-31

    Signature project 4a, Seasonality, Mobility, and Livability investigated the effects of weather, season, built environment, community amenities, attitudes, and demographics on mobility and quality of life (QOL). A four season panel survey exami...

  11. Mobile IP: Security & application

    NARCIS (Netherlands)

    Tuquerres, G.; Salvador, M.R.; Sprenkels, Ron

    1999-01-01

    As required in the TGS Mobile IP Advanced Module, this paper presents a survey of common security threats which mobile IP networks are exposed to as well as some proposed solutions to deal with such threats.

  12. Mobile Phones on Campus

    Institute of Scientific and Technical Information of China (English)

    朴春宝

    2007-01-01

    After entering the 21st century, more and more people have mobile phones in China. At the end of 2002, there were 20 million mobile phone users. By the year 2005 the number has reached up to 30 million.

  13. Mobile Internet Protocol Analysis

    National Research Council Canada - National Science Library

    Brachfeld, Lawrence

    1999-01-01

    ...) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet...

  14. Mobile Informal Learning

    NARCIS (Netherlands)

    Glahn, Christian; Börner, Dirk

    2010-01-01

    Glahn, C., & Börner, D. (2009). Mobile Informal Learning. Presented at Mobile Learning in Context Symposium at the Open University of the Netherlands. September, 11, 2009, Heerlen, The Netherlands: Open University of the Netherlands.

  15. Service for fault tolerance in the Ad Hoc Networks based on Multi Agent Systems

    Directory of Open Access Journals (Sweden)

    Ghalem Belalem

    2011-02-01

    Full Text Available The Ad hoc networks are distributed networks, self-organized and does not require infrastructure. In such network, mobile infrastructures are subject of disconnections. This situation may concern a voluntary or involuntary disconnection of nodes caused by the high mobility in the Ad hoc network. In these problems we are trying through this work to contribute to solving these problems in order to ensure continuous service by proposing our service for faults tolerance based on Multi Agent Systems (MAS, which predict a problem and decision making in relation to critical nodes. Our work contributes to study the prediction of voluntary and involuntary disconnections in the Ad hoc network; therefore we propose our service for faults tolerance that allows for effective distribution of information in the Network by selecting some objects of the network to be duplicates of information.

  16. Protein domain organisation: adding order

    Directory of Open Access Journals (Sweden)

    Kummerfeld Sarah K

    2009-01-01

    Full Text Available Abstract Background Domains are the building blocks of proteins. During evolution, they have been duplicated, fused and recombined, to produce proteins with novel structures and functions. Structural and genome-scale studies have shown that pairs or groups of domains observed together in a protein are almost always found in only one N to C terminal order and are the result of a single recombination event that has been propagated by duplication of the multi-domain unit. Previous studies of domain organisation have used graph theory to represent the co-occurrence of domains within proteins. We build on this approach by adding directionality to the graphs and connecting nodes based on their relative order in the protein. Most of the time, the linear order of domains is conserved. However, using the directed graph representation we have identified non-linear features of domain organization that are over-represented in genomes. Recognising these patterns and unravelling how they have arisen may allow us to understand the functional relationships between domains and understand how the protein repertoire has evolved. Results We identify groups of domains that are not linearly conserved, but instead have been shuffled during evolution so that they occur in multiple different orders. We consider 192 genomes across all three kingdoms of life and use domain and protein annotation to understand their functional significance. To identify these features and assess their statistical significance, we represent the linear order of domains in proteins as a directed graph and apply graph theoretical methods. We describe two higher-order patterns of domain organisation: clusters and bi-directionally associated domain pairs and explore their functional importance and phylogenetic conservation. Conclusion Taking into account the order of domains, we have derived a novel picture of global protein organization. We found that all genomes have a higher than expected

  17. Protein domain organisation: adding order.

    Science.gov (United States)

    Kummerfeld, Sarah K; Teichmann, Sarah A

    2009-01-29

    Domains are the building blocks of proteins. During evolution, they have been duplicated, fused and recombined, to produce proteins with novel structures and functions. Structural and genome-scale studies have shown that pairs or groups of domains observed together in a protein are almost always found in only one N to C terminal order and are the result of a single recombination event that has been propagated by duplication of the multi-domain unit. Previous studies of domain organisation have used graph theory to represent the co-occurrence of domains within proteins. We build on this approach by adding directionality to the graphs and connecting nodes based on their relative order in the protein. Most of the time, the linear order of domains is conserved. However, using the directed graph representation we have identified non-linear features of domain organization that are over-represented in genomes. Recognising these patterns and unravelling how they have arisen may allow us to understand the functional relationships between domains and understand how the protein repertoire has evolved. We identify groups of domains that are not linearly conserved, but instead have been shuffled during evolution so that they occur in multiple different orders. We consider 192 genomes across all three kingdoms of life and use domain and protein annotation to understand their functional significance. To identify these features and assess their statistical significance, we represent the linear order of domains in proteins as a directed graph and apply graph theoretical methods. We describe two higher-order patterns of domain organisation: clusters and bi-directionally associated domain pairs and explore their functional importance and phylogenetic conservation. Taking into account the order of domains, we have derived a novel picture of global protein organization. We found that all genomes have a higher than expected degree of clustering and more domain pairs in forward and

  18. Fixed mobile convergence handbook

    CERN Document Server

    Ahson, Syed A

    2010-01-01

    From basic concepts to future directions, this handbook provides technical information on all aspects of fixed-mobile convergence (FMC). The book examines such topics as integrated management architecture, business trends and strategic implications for service providers, personal area networks, mobile controlled handover methods, SIP-based session mobility, and supervisory and notification aggregator service. Case studies are used to illustrate technical and systematic implementation of unified and rationalized internet access by fixed-mobile network convergence. The text examines the technolo

  19. Ion mobility spectrometry

    CERN Document Server

    Eiceman, GA

    2005-01-01

    Key Developments for Faster, More Precise Detection Capabilities Driven by the demand for the rapid and advanced detection of explosives, chemical and biological warfare agents, and narcotics, ion mobility spectrometry (IMS) undergone significant refinements in technology, computational capabilities, and understanding of the principles of gas phase ion chemistry and mobility. Beginning with a thorough discussion of the fundamental theories and physics of ion mobility, Ion Mobility Spectrometry, Second Edition describes the recent advances in instrumentation and newly

  20. Mobile Marketing in Japan

    OpenAIRE

    Noah H. N. Lynn; Paul D. Berger

    2014-01-01

    In this paper we describe the state of mobile marketing in Japan. We consider the various aspects of mobile marketing in Japan and what has led to the overwhelming adoption by Japanese youth, and to a degree Japanese society as a whole, of social media and associated activities. This growth of mobile marketing has dramatic, positive implications for marketing, in general, as well as for the sale of selected product classes. We also consider markers for suggesting what the future of mobile mar...

  1. Non-relativistic AdS branes and Newton-Hooke superalgebra

    International Nuclear Information System (INIS)

    Sakaguchi, Makoto; Yoshida, Kentaroh

    2006-01-01

    We examine a non-relativistic limit of D-branes in AdS 5 x S 5 and M-branes in AdS 4/7 x S 7/4 . First, Newton-Hooke superalgebras for the AdS branes are derived from AdS x S superalgebras as Inoenue-Wigner contractions. It is shown that the directions along which the AdS-brane worldvolume extends are restricted by requiring that the isometry on the AdS-brane worldvolume and the Lorentz symmetry in the transverse space naturally extend to the super-isometry. We also derive Newton-Hooke superalgebras for pp-wave branes and show that the directions along which a brane worldvolume extends are restricted. Then the Wess-Zumino terms of the AdS branes are derived by using the Chevalley-Eilenberg cohomology on the super-AdS x S algebra, and the non-relativistic limit of the AdS-brane actions is considered. We show that the consistent limit is possible for the following branes: Dp (even,even) for p = 1 mod 4 and Dp (odd,odd) for p = 3 mod 4 in AdS 5 x S 5 , and M2 (0,3), M2 (2,1), M5 (1,5) and M5 (3,3) in AdS 4 x S 7 and S 4 x AdS 7 . We furthermore present non-relativistic actions for the AdS branes

  2. Mobile energy sharing futures

    DEFF Research Database (Denmark)

    Worgan, Paul; Knibbe, Jarrod; Plasencia, Diego Martinez

    2016-01-01

    We foresee a future where energy in our mobile devices can be shared and redistributed to suit our current task needs. Many of us are beginning to carry multiple mobile devices and we seek to re-evaluate the traditional view of a mobile device as only accepting energy. In our vision, we can...... sharing futures....

  3. CONCEPT OF MOBILE LEARNING

    Directory of Open Access Journals (Sweden)

    Г О Дуйсеева

    2016-12-01

    Full Text Available This article deals with the definition and the description of mobile learning. Ten years’ experience of the latest mobile technologies use and devices in educational process abroad is analyzed. Prospects and the possibilities of application of these technologies are considered. The basic concepts and development of mobile learning which proposed by scientists for the last years have been given.

  4. Marketing mobile imaging services.

    Science.gov (United States)

    McCue, P

    1987-09-01

    Competition in the mobile imaging arena has put radiologists, radiology directors, and other health care professionals in the unfamiliar position of being marketing agents for their services. Mobile imaging is being promoted through consumer advertising as well as through the traditional route of physician referral. This article offers some of the marketing lessons being learned in the mobile arena.

  5. Mobile Student Information System

    Science.gov (United States)

    Asif, Muhammad; Krogstie, John

    2011-01-01

    Purpose: A mobile student information system (MSIS) based on mobile computing and context-aware application concepts can provide more user-centric information services to students. The purpose of this paper is to describe a system for providing relevant information to students on a mobile platform. Design/methodology/approach: The research…

  6. Distributed mobility management - framework & analysis

    NARCIS (Netherlands)

    Liebsch, M.; Seite, P.; Karagiannis, Georgios

    2013-01-01

    Mobile operators consider the distribution of mobility anchors to enable offloading some traffic from their core network. The Distributed Mobility Management (DMM) Working Group is investigating the impact of decentralized mobility management to existing protocol solutions, while taking into account

  7. Light-cone gauge formulation for AdS4 x CP3

    International Nuclear Information System (INIS)

    Uvarov, D.V.

    2011-01-01

    We review the Type IIA superstring on the AdS 4 x CP 3 background in the k-symmetry light-cone gauge characterized by the choice of the lightlike directions from the D = 3 Minkowski boundary of AdS 4 both in the Lagrangian and Hamiltonian formulations

  8. Joule-Thomson expansion of the charged AdS black holes

    International Nuclear Information System (INIS)

    Oekcue, Oezguer; Aydiner, Ekrem

    2017-01-01

    In this paper, we study Joule-Thomson effects for charged AdS black holes. We obtain inversion temperatures and curves. We investigate similarities and differences between van der Waals fluids and charged AdS black holes for the expansion. We obtain isenthalpic curves for both systems in the T-P plane and determine the cooling-heating regions. (orig.)

  9. Joule-Thomson expansion of the charged AdS black holes

    Energy Technology Data Exchange (ETDEWEB)

    Oekcue, Oezguer; Aydiner, Ekrem [Istanbul University, Department of Physics, Faculty of Science, Vezneciler, Istanbul (Turkey)

    2017-01-15

    In this paper, we study Joule-Thomson effects for charged AdS black holes. We obtain inversion temperatures and curves. We investigate similarities and differences between van der Waals fluids and charged AdS black holes for the expansion. We obtain isenthalpic curves for both systems in the T-P plane and determine the cooling-heating regions. (orig.)

  10. Comparison of MANET Routing Protocols in Different Traffic and Mobility Models

    Directory of Open Access Journals (Sweden)

    J. Baraković

    2010-06-01

    Full Text Available Routing protocol election in MANET (Mobile Ad Hoc Network is a great challenge, because of its frequent topology changes and routing overhead. This paper compares performances of three routing protocols: Destination Sequenced Distance Vector (DSDV, Ad Hoc Ondemand Distance Vector (AODV and Dynamic Source Routing (DSR, based on results analysis obtained using simulations with different load and mobility scenarios performed with Network Simulator version 2 (NS-2. In low load and low mobility scenarios routing protocols perform in a similar manner. However, with mobility and load increasing DSR outperforms AODV and DSDV protocols.

  11. Understanding pastoral mobility

    DEFF Research Database (Denmark)

    Adriansen, Hanne Kirstine

    2008-01-01

    Based on a case study from Sahelian Senegal, this paper analyses how various actors perceive the importance of pastoral mobility and presents issues of importance for understanding the use of mobility among Fulani of Ferlo. One knowledge system is a scientific one, the 'new rangeland paradigm...... territory, which they consider their place, but are unwilling to employ large-scale mobility themselves. Mobility is not of importance for their ethnic identity and some use paid herders to care for their livestock. By looking at both knowledge systems, we achieve a better understanding of pastoral mobility...

  12. Mobile Virtual Private Networking

    Science.gov (United States)

    Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny

    Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.

  13. European mobility cultures

    DEFF Research Database (Denmark)

    Haustein, Sonja; Nielsen, Thomas A. Sick

    2016-01-01

    More targeted European policies promoting green travel patterns require better knowledge on differing mobility cultures across European regions. As a basis for this, we clustered the EU population into eight mobility styles based on Eurobarometer data. The mobility styles - including, for example...... positions on the path towards sustainable mobility and therefore different requirements towards European platforms and support measures, e.g. for 'Sustainable Urban Mobility Plans'. The country clusters can provide a starting point for future communication and targeting of European efforts in sustainable...

  14. Photogrammetric 3D reconstruction using mobile imaging

    Science.gov (United States)

    Fritsch, Dieter; Syll, Miguel

    2015-03-01

    In our paper we demonstrate the development of an Android Application (AndroidSfM) for photogrammetric 3D reconstruction that works on smartphones and tablets likewise. The photos are taken with mobile devices, and can thereafter directly be calibrated using standard calibration algorithms of photogrammetry and computer vision, on that device. Due to still limited computing resources on mobile devices, a client-server handshake using Dropbox transfers the photos to the sever to run AndroidSfM for the pose estimation of all photos by Structure-from-Motion and, thereafter, uses the oriented bunch of photos for dense point cloud estimation by dense image matching algorithms. The result is transferred back to the mobile device for visualization and ad-hoc on-screen measurements.

  15. LWR [Light Water Reactor] power plant simulations using the AD10 and AD100 systems

    International Nuclear Information System (INIS)

    Wulff, W.; Cheng, H.S.; Chien, C.J.; Jang, J.Y.; Lin, H.C.; Mallen, A.N.; Wang, S.J.

    1989-01-01

    Boiling (BWR) and Pressurized (PWR) Water Reactor Power Plants are being simulated at BNL with the AD10 and AD100 Peripheral Processor Systems. The AD10 system has been used for BWR simulations since 1984 for safety analyses, emergency training and optimization studies. BWR simulation capabilities have been implemented recently on the AD100 system and PWR simulation capabilities are currently being developed under the auspices of international cooperation. Modeling and simulation methods are presented with emphasis on the simulation of the Nuclear Steam Supply System. Results are presented for BWR simulation and performance characteristics are compared of the AD10 and AD100 systems. It will be shown that the AD100 simulates two times faster than two AD10 processors operating in parallel and that the computing capacity of one AD100 (with FMU processor) is twice as large as that of two AD10 processors. 9 refs., 5 figs., 1 tab

  16. Ad-Coop Positioning System (ACPS)

    DEFF Research Database (Denmark)

    Frattasi, Simone; Monti, Marco

    2008-01-01

    In this paper, we propose an innovative solution for positioning determination in 4G wireless networks by introducing the Ad-Coop Positioning System (ACPS). The ACPS is supported by a hybrid cellular ad-hoc architecture, where the cellular network has a centralized control over the ad-hoc connect......In this paper, we propose an innovative solution for positioning determination in 4G wireless networks by introducing the Ad-Coop Positioning System (ACPS). The ACPS is supported by a hybrid cellular ad-hoc architecture, where the cellular network has a centralized control over the ad...... method for the ACPS, which appropriately combines and weights the long- and short-range location information in a non-linear least square (NLLS) minimization procedure. The numerical results shown in the paper demonstrate that the ACPS enhances the location estimation accuracy with respect...

  17. Dimensional degression in AdSd

    International Nuclear Information System (INIS)

    Artsukevich, A. Yu.; Vasiliev, M. A.

    2009-01-01

    We analyze the pattern of fields in (d+1)-dimensional anti-de Sitter space in terms of those in d-dimensional anti-de Sitter space. The procedure, which is neither dimensional reduction nor dimensional compactification, is called dimensional degression. The analysis is performed group theoretically for all totally symmetric bosonic and fermionic representations of the anti-de Sitter algebra. The field-theoretical analysis is done for a massive scalar field in AdS d+d ' and massless spin-one-half, spin-one, and spin-two fields in AdS d+1 . The mass spectra of the resulting towers of fields in AdS d are found. For the scalar field case, the obtained results extend to the shadow sector those obtained by Metsaev [Nucl. Phys. B, Proc. Suppl. 102, 100 (2001)] by a different method.

  18. A mosaic adenovirus possessing serotype Ad5 and serotype Ad3 knobs exhibits expanded tropism

    International Nuclear Information System (INIS)

    Takayama, Koichi; Reynolds, Paul N.; Short, Joshua J.; Kawakami, Yosuke; Adachi, Yasuo; Glasgow, Joel N.; Rots, Marianne G.; Krasnykh, Victor; Douglas, Joanne T.; Curiel, David T.

    2003-01-01

    The efficiency of cancer gene therapy with recombinant adenoviruses based on serotype 5 (Ad5) has been limited partly because of variable, and often low, expression by human primary cancer cells of the primary cellular-receptor which recognizes the knob domain of the fiber protein, the coxsackie and adenovirus receptor (CAR). As a means of circumventing CAR deficiency, Ad vectors have been retargeted by utilizing chimeric fibers possessing knob domains of alternate Ad serotypes. We have reported that ovarian cancer cells possess a primary receptor for Ad3 to which the Ad3 knob binds independently of the CAR-Ad5 knob interaction. Furthermore, an Ad5-based chimeric vector, designated Ad5/3, containing a chimeric fiber proteins possessing the Ad3 knob, demonstrates CAR-independent tropism by virtue of targeting the Ad3 receptor. Based on these findings, we hypothesized that a mosaic virus possessing both the Ad5 knob and the Ad3 knob on the same virion could utilize either primary receptor, resulting in expanded tropism. In this study, we generated a dual-knob mosaic virus by coinfection of 293 cells with Ad5-based and Ad5/3-based vectors. Characterization of the resultant virions confirmed the incorporation of both Ad5 and Ad3 knobs in the same particle. Furthermore, this mosaic virus was able to utilize either receptor, CAR and the Ad3 receptor, for virus attachment to cells. Enhanced Ad infectivity with the mosaic virus was shown in a panel of cell lines, with receptor profiles ranging from CAR-dominant to Ad3 receptor-dominant. Thus, this mosaic virus strategy may offer the potential to improve Ad-based gene therapy approaches by infectivity enhancement and tropism expansion

  19. Engaging with mobile methods

    DEFF Research Database (Denmark)

    Jensen, Martin Trandberg

    2014-01-01

    This chapter showcases how mobile methods are more than calibrated techniques awaiting application by tourism researchers, but productive in the enactment of the mobile (Law and Urry, 2004). Drawing upon recent findings deriving from a PhD course on mobility and mobile methods it reveals...... the conceptual ambiguousness of the term ‘mobile methods’. In order to explore this ambiguousness the chapter provides a number of examples deriving from tourism research, to explore how mobile methods are always entangled in ideologies, predispositions, conventions and practice-realities. Accordingly......, the engagements with methods are acknowledged to be always political and contextual, reminding us to avoid essentialist discussions regarding research methods. Finally, the chapter draws on recent fieldwork to extend developments in mobilities-oriented tourism research, by employing auto-ethnography to call...

  20. Mobile systems development

    DEFF Research Database (Denmark)

    Pedersen, Ole; Kristiansen, Martin Lund; Kammersgaard, Marc N.

    2007-01-01

    in XP. In general, we find XP well-suited for mobile systems development projects. However, based on our experiences and an analytical comparison we propose the following modifications to XP: Make an essential design to avoid the worst time waste during refactoring. For faster development, reuse code......Development of mobile software is Surrounded by much uncertainty. Immature software platforms on mobile clients, a highly competitive market calling for innovation, efficiency and effectiveness in the development life cycle, and lacking end-user adoption are just some of the realities facing...... development teams in the mobile software industry. By taking a process view on development of mobile systems we seek to explore the strengths and limitations of eXtreme Programming (XP) in the context of mobile software development. Following an experimental approach a mobile systems development project...