Science.gov

Sample records for ad hoc analysis

  1. Ad Hoc Networks: Headline 2000 Communications Analysis

    NASA Astrophysics Data System (ADS)

    Blair, W. D.; Reynolds, A. B.

    2002-06-01

    This report examines unit location data and terrain from Headline 2000 to investigate communications networks within the maneuver units. Within the Enhanced Combat Force timeframe, such units would be supported by a Tactical Data Distribution Sub-system (TDDS). This is envisaged as an ad hoc network changing its topology as units maneuver across the battlespace. The report describes approaches that can be applied to Headline 2000 and other data to characterize the nature of the network topology, both statically and as it changes over time, in order to explore the impact on the TDDS network capacity and hence to hence to assist in elucidating consequent requirements of a candidate TDDS.

  2. Does Ad Hoc Coronary Intervention Reduce Radiation Exposure? – Analysis of 568 Patients

    PubMed Central

    Truffa, Márcio A. M.; Alves, Gustavo M.P.; Bernardi, Fernando; Esteves Filho, Antonio; Ribeiro, Expedito; Galon, Micheli Z.; Spadaro, André; Kajita, Luiz J.; Arrieta, Raul; Lemos, Pedro A.

    2015-01-01

    Background Advantages and disadvantages of ad hoc percutaneous coronary intervention have been described. However little is known about the radiation exposure of that procedure as compared with the staged intervention. Objective To compare the radiation dose of the ad hoc percutaneous coronary intervention with that of the staged procedure Methods The dose-area product and total Kerma were measured, and the doses of the diagnostic and therapeutic procedures were added. In addition, total fluoroscopic time and number of acquisitions were evaluated. Results A total of 568 consecutive patients were treated with ad hoc percutaneous coronary intervention (n = 320) or staged percutaneous coronary intervention (n = 248). On admission, the ad hoc group had less hypertension (74.1% vs 81.9%; p = 0.035), dyslipidemia (57.8% vs. 67.7%; p = 0.02) and three-vessel disease (38.8% vs. 50.4%; p = 0.015). The ad hoc group was exposed to significantly lower radiation doses, even after baseline characteristic adjustment between both groups. The ad hoc group was exposed to a total dose-area product of 119.7 ± 70.7 Gycm2, while the staged group, to 139.2 ± 75.3 Gycm2 (p < 0.001). Conclusion Ad hoc percutaneous coronary intervention reduced radiation exposure as compared with diagnostic and therapeutic procedures performed at two separate times. PMID:26351982

  3. Performance Analysis of Ad Hoc Routing Protocols in City Scenario for VANET

    NASA Astrophysics Data System (ADS)

    Das, Sanjoy; Raw, Ram Shringar; Das, Indrani

    2011-12-01

    In this paper, performance analysis of Location Aided Routing (LAR), AODV and DSR protocol in city scenarios has been done. The mobility model considered is Manhattan model. This mobility model used to emulate the movement pattern of nodes i.e., vehicles on streets defined by maps. Our objective is to provide a comparative analysis among LAR, AODV and DSR protocol in city scenarios in Vehicular Ad hoc Networks. The simulation work has been conducted using the Glomosim 2.03 simulator. The results show that LAR1 protocol achieves maximum packet delivery ratio is 100% in the sparsely populated network. The delay is maximum in AODV 121.88 ms when the number of node is 10 in the network. The results show that LAR1 outperform DSR and AODV in term of packet delivery ratio and end to end delay.

  4. Analysis of a distributed algorithm to determine multiple routes with path diversity in ad hoc networks.

    SciTech Connect

    Ghosal, Dipak; Mueller, Stephen Ng

    2005-04-01

    With multipath routing in mobile ad hoc networks (MANETs), a source can establish multiple routes to a destination for routing data. In MANETs, mulitpath routing can be used to provide route resilience, smaller end-to-end delay, and better load balancing. However, when the multiple paths are close together, transmissions of different paths may interfere with each other, causing degradation in performance. Besides interference, the physical diversity of paths also improves fault tolerance. We present a purely distributed multipath protocol based on the AODV-Multipath (AODVM) protocol called AODVM with Path Diversity (AODVM/PD) that finds multiple paths with a desired degree of correlation between paths specified as an input parameter to the algorithm. We demonstrate through detailed simulation analysis that multiple paths with low degree of correlation determined by AODVM/PD provides both smaller end-to-end delay than AODVM in networks with low mobility and better route resilience in the presence of correlated node failures.

  5. Analysis and Proposal of Position-Based Routing Protocols for Vehicular Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Okada, Hiraku; Takano, Akira; Mase, Kenichi

    One of the most promising applications of a mobile ad hoc network is a vehicular ad hoc network (VANET). Each vehicle is aware of its position information by GPS or other methods, so position-based routing is a useful approach in VANET. The position-based routing protocol can be classified roughly into a next-hop forwarding method and a directed flooding method. We evaluate performance of both methods by analytic approach and compare them in this paper. From the evaluation results, we conclude that it is effective for the position-based routing to choose either the next-hop forwarding method or the directed flooding method according to the environment. Then we propose the hybrid transmission method which can select one of them according to the environment, and clarify that the proposed method can keep the packet delivery ratio at a high level and reduce the delay time.

  6. Ad Hoc Supervision of General Practice Registrars as a "Community of Practice": Analysis, Interpretation and Re-Presentation

    ERIC Educational Resources Information Center

    Clement, T.; Brown, J.; Morrison, J.; Nestel, D.

    2016-01-01

    General practice registrars in Australia undertake most of their vocational training in accredited general practices. They typically see patients alone from the start of their community-based training and are expected to seek timely ad hoc support from their supervisor. Such ad hoc encounters are a mechanism for ensuring patient safety, but also…

  7. Ad hoc supervision of general practice registrars as a 'community of practice': analysis, interpretation and re-presentation.

    PubMed

    Clement, T; Brown, J; Morrison, J; Nestel, D

    2016-05-01

    General practice registrars in Australia undertake most of their vocational training in accredited general practices. They typically see patients alone from the start of their community-based training and are expected to seek timely ad hoc support from their supervisor. Such ad hoc encounters are a mechanism for ensuring patient safety, but also provide an opportunity for learning and teaching. Wenger's (Communities of practice: learning, meaning, and identity. Cambridge University Press, New York, 1998) social theory of learning ('communities of practice') guided a secondary analysis of audio-recordings of ad hoc encounters. Data from one encounter is re-presented as an extended sequence to maintain congruence with the theoretical perspective and enhance vicariousness. An interpretive commentary communicates key features of Wenger's theory and highlights the researchers' interpretations. We argue that one encounter can reveal universal understandings of clinical supervision and that the process of naturalistic generalisation allows readers to transfer others' experiences to their own contexts. The paper raises significant analytic, interpretive, and representational issues. We highlight that report writing is an important, but infrequently discussed, part of research design. We discuss the challenges of supporting the learning and teaching that arises from adopting a socio-cultural lens and argue that such a perspective importantly captures the complex range of issues that work-based practitioners have to grapple with. This offers a challenge to how we research and seek to influence work-based learning and teaching in health care settings. PMID:26384813

  8. Research of Ad Hoc Networks Access Algorithm

    NASA Astrophysics Data System (ADS)

    Xiang, Ma

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.

  9. Ad Hoc Access Gateway Selection Algorithm

    NASA Astrophysics Data System (ADS)

    Jie, Liu

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. For mobile nodes in Ad Hoc network to internet, internet communications in the peer nodes must be achieved through the gateway. Therefore, the key Ad Hoc Access Networks will focus on the discovery gateway, as well as gateway selection in the case of multi-gateway and handover problems between different gateways. This paper considers the mobile node and the gateway, based on the average number of hops from an average access time and the stability of routes, improved gateway selection algorithm were proposed. An improved gateway selection algorithm, which mainly considers the algorithm can improve the access time of Ad Hoc nodes and the continuity of communication between the gateways, were proposed. This can improve the quality of communication across the network.

  10. Robust message routing for mobile (wireless) ad hoc networks.

    SciTech Connect

    Goldsby, Michael E.; Johnson, Michael M.; Kilman, Dominique Marie; Bierbaum, Neal Robert; Chen, Helen Y.; Ammerlahn, Heidi R.; Tsang, Rose P.; Nicol, David M.

    2004-01-01

    This report describes the results of research targeting improvements in the robustness of message transport in wireless ad hoc networks. The first section of the report provides an analysis of throughput and latency in the wireless medium access control (MAC) layer and relates the analysis to the commonly used 802.11 protocol. The second section describes enhancements made to several existing models of wireless MAC and ad hoc routing protocols; the models were used in support of the work described in the following section. The third section of the report presents a lightweight transport layer protocol that is superior to TCP for use in wireless networks. In addition, it introduces techniques that improve the performance of any ad hoc source routing protocol. The fourth section presents a novel, highly scalable ad hoc routing protocol that is based on geographic principles but requires no localization hardware.

  11. Anomaly Detection Techniques for Ad Hoc Networks

    ERIC Educational Resources Information Center

    Cai, Chaoli

    2009-01-01

    Anomaly detection is an important and indispensable aspect of any computer security mechanism. Ad hoc and mobile networks consist of a number of peer mobile nodes that are capable of communicating with each other absent a fixed infrastructure. Arbitrary node movements and lack of centralized control make them vulnerable to a wide variety of…

  12. Supporting Dynamic Ad hoc Collaboration Capabilities

    SciTech Connect

    Agarwal, Deborah A.; Berket, Karlo

    2003-07-14

    Modern HENP experiments such as CMS and Atlas involve as many as 2000 collaborators around the world. Collaborations this large will be unable to meet often enough to support working closely together. Many of the tools currently available for collaboration focus on heavy-weight applications such as videoconferencing tools. While these are important, there is a more basic need for tools that support connecting physicists to work together on an ad hoc or continuous basis. Tools that support the day-to-day connectivity and underlying needs of a group of collaborators are important for providing light-weight, non-intrusive, and flexible ways to work collaboratively. Some example tools include messaging, file-sharing, and shared plot viewers. An important component of the environment is a scalable underlying communication framework. In this paper we will describe our current progress on building a dynamic and ad hoc collaboration environment and our vision for its evolution into a HENP collaboration environment.

  13. Routing Security in Ad Hoc Wireless Networks

    NASA Astrophysics Data System (ADS)

    Pervaiz, Mohammad O.; Cardei, Mihaela; Wu, Jie

    Wireless networks provide rapid, untethered access to information and computing, eliminating the barriers of distance, time, and location for many applications ranging from collaborative, distributed mobile computing to disaster recovery (such as fire, flood, earthquake), law enforcement (crowd control, search, and rescue), and military communications (command, control, surveillance, and reconnaissance). An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration [11

  14. Global Coverage from Ad-Hoc Constellations in Rideshare Orbits

    NASA Technical Reports Server (NTRS)

    Ellis, Armin; Mercury, Michael; Brown, Shannon

    2012-01-01

    A promising area of small satellite development is in providing higher temporal resolution than larger satellites. Traditional constellations have required specific orbits and dedicated launch vehicles. In this paper we discuss an alternative architecture in which the individual elements of the constellation are launched as rideshare opportunities. We compare the coverage of such an ad-hoc constellation with more traditional constellations. Coverage analysis is based on actual historical data from rideshare opportunities. Our analysis includes ground coverage and temporal revisits for Polar, Tropics, Temperate, and Global regions, comparing ad-hoc and Walker constellation.

  15. 14 CFR 1203.903 - Ad hoc committees.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Ad hoc committees. 1203.903 Section 1203... NASA Information Security Program Committee § 1203.903 Ad hoc committees. The Chairperson is authorized to establish such ad hoc panels or subcommittees as may be necessary in the conduct of the...

  16. 14 CFR 1203.903 - Ad hoc committees.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Ad hoc committees. 1203.903 Section 1203.903... Information Security Program Committee § 1203.903 Ad hoc committees. The Chairperson is authorized to establish such ad hoc panels or subcommittees as may be necessary in the conduct of the Committee's work....

  17. 21 CFR 14.90 - Ad hoc advisory committee members.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Ad hoc advisory committee members. 14.90 Section... PUBLIC HEARING BEFORE A PUBLIC ADVISORY COMMITTEE Members of Advisory Committees § 14.90 Ad hoc advisory committee members. In selecting members of an ad hoc advisory committee, the Commissioner may use...

  18. 21 CFR 14.90 - Ad hoc advisory committee members.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 1 2012-04-01 2012-04-01 false Ad hoc advisory committee members. 14.90 Section... PUBLIC HEARING BEFORE A PUBLIC ADVISORY COMMITTEE Members of Advisory Committees § 14.90 Ad hoc advisory committee members. In selecting members of an ad hoc advisory committee, the Commissioner may use...

  19. 21 CFR 14.90 - Ad hoc advisory committee members.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 1 2011-04-01 2011-04-01 false Ad hoc advisory committee members. 14.90 Section... PUBLIC HEARING BEFORE A PUBLIC ADVISORY COMMITTEE Members of Advisory Committees § 14.90 Ad hoc advisory committee members. In selecting members of an ad hoc advisory committee, the Commissioner may use...

  20. 14 CFR § 1203.803 - Ad hoc committees.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false Ad hoc committees. § 1203.803 Section Â... PROGRAM Delegation of Authority To Make Determinations in Original Classification Matters § 1203.803 Ad hoc committees. The Chairperson is authorized to establish such ad hoc panels or subcommittees as...

  1. 14 CFR 1203.903 - Ad hoc committees.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false Ad hoc committees. 1203.903 Section 1203... NASA Information Security Program Committee § 1203.903 Ad hoc committees. The Chairperson is authorized to establish such ad hoc panels or subcommittees as may be necessary in the conduct of the...

  2. 21 CFR 14.90 - Ad hoc advisory committee members.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 1 2014-04-01 2014-04-01 false Ad hoc advisory committee members. 14.90 Section... PUBLIC HEARING BEFORE A PUBLIC ADVISORY COMMITTEE Members of Advisory Committees § 14.90 Ad hoc advisory committee members. In selecting members of an ad hoc advisory committee, the Commissioner may use...

  3. 14 CFR 1203.903 - Ad hoc committees.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 5 2012-01-01 2012-01-01 false Ad hoc committees. 1203.903 Section 1203... NASA Information Security Program Committee § 1203.903 Ad hoc committees. The Chairperson is authorized to establish such ad hoc panels or subcommittees as may be necessary in the conduct of the...

  4. 14 CFR § 1203.903 - Ad hoc committees.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false Ad hoc committees. § 1203.903 Section Â... PROGRAM NASA Information Security Program Committee § 1203.903 Ad hoc committees. The Chairperson is authorized to establish such ad hoc panels or subcommittees as may be necessary in the conduct of...

  5. 21 CFR 14.90 - Ad hoc advisory committee members.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 1 2013-04-01 2013-04-01 false Ad hoc advisory committee members. 14.90 Section... PUBLIC HEARING BEFORE A PUBLIC ADVISORY COMMITTEE Members of Advisory Committees § 14.90 Ad hoc advisory committee members. In selecting members of an ad hoc advisory committee, the Commissioner may use...

  6. Worm epidemics in wireless ad hoc networks

    NASA Astrophysics Data System (ADS)

    Nekovee, Maziar

    2007-06-01

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet.

  7. Declarative ad-hoc sensor networking

    NASA Astrophysics Data System (ADS)

    Coffin, Daniel A.; Van Hook, Daniel J.; McGarry, Stephen M.; Kolek, Stephen R.

    2000-11-01

    Networking protocols for distributed collaborative ad-hoc wireless sensing are constrained by requirements such as energy efficiency, scalability, and support for greater variations in topology than traditional fully wired or last- hop wireless (remote to base station) networks. In such a highly constrained and dynamic environment, conventional networking approaches are generally not adequate. A declarative approach to network configuration and organization appears to offer significant benefits. Declarative networking exploits application-supplied data descriptions to control network routing and resource allocation in such a way as to enhance energy efficiency and scalability. An implementation of this approach, called the Declarative Routing Protocol (DRP) has been developed as part of DARPA's Sensor Information Technology program. This paper introduces the concept of declarative networking and what distinguishes it from more conventional networking approaches, describes the Declarative Routing Protocol, and presents performance results from initial experiments.

  8. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks

    PubMed Central

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV. PMID:27258013

  9. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks.

    PubMed

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV. PMID:27258013

  10. Spontaneous Ad Hoc Mobile Cloud Computing Network

    PubMed Central

    Lacuesta, Raquel; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes. PMID:25202715

  11. Shuttle-run synchronization in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Ma, Sheng-Fei; Bi, Hong-Jie; Zou, Yong; Liu, Zong-Hua; Guan, Shu-Guang

    2015-06-01

    In this work, we study the collective dynamics of phase oscillators in a mobile ad hoc network whose topology changes dynamically. As the network size or the communication radius of individual oscillators increases, the topology of the ad hoc network first undergoes percolation, forming a giant cluster, and then gradually achieves global connectivity. It is shown that oscillator mobility generally enhances the coherence in such networks. Interestingly, we find a new type of phase synchronization/clustering, in which the phases of the oscillators are distributed in a certain narrow range, while the instantaneous frequencies change signs frequently, leading to shuttle-run-like motion of the oscillators in phase space. We conduct a theoretical analysis to explain the mechanism of this synchronization and obtain the critical transition point.

  12. Distributed Reinforcement Learning Approach for Vehicular Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Wu, Celimuge; Kumekawa, Kazuya; Kato, Toshihiko

    In Vehicular Ad hoc Networks (VANETs), general purpose ad hoc routing protocols such as AODV cannot work efficiently due to the frequent changes in network topology caused by vehicle movement. This paper proposes a VANET routing protocol QLAODV (Q-Learning AODV) which suits unicast applications in high mobility scenarios. QLAODV is a distributed reinforcement learning routing protocol, which uses a Q-Learning algorithm to infer network state information and uses unicast control packets to check the path availability in a real time manner in order to allow Q-Learning to work efficiently in a highly dynamic network environment. QLAODV is favored by its dynamic route change mechanism, which makes it capable of reacting quickly to network topology changes. We present an analysis of the performance of QLAODV by simulation using different mobility models. The simulation results show that QLAODV can efficiently handle unicast applications in VANETs.

  13. Assured Information Sharing for Ad-Hoc Collaboration

    ERIC Educational Resources Information Center

    Jin, Jing

    2009-01-01

    Collaborative information sharing tends to be highly dynamic and often ad hoc among organizations. The dynamic natures and sharing patterns in ad-hoc collaboration impose a need for a comprehensive and flexible approach to reflecting and coping with the unique access control requirements associated with the environment. This dissertation…

  14. Enhanced Weight based DSR for Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Verma, Samant; Jain, Sweta

    2011-12-01

    Routing in ad hoc network is a great problematic, since a good routing protocol must ensure fast and efficient packet forwarding, which isn't evident in ad hoc networks. In literature there exists lot of routing protocols however they don't include all the aspects of ad hoc networks as mobility, device and medium constraints which make these protocols not efficient for some configuration and categories of ad hoc networks. Thus in this paper we propose an improvement of Weight Based DSR in order to include some of the aspects of ad hoc networks as stability, remaining battery power, load and trust factor and proposing a new approach Enhanced Weight Based DSR.

  15. Performance analysis of multi-radio routing protocol in cognitive radio ad hoc networks under different path failure rate

    NASA Astrophysics Data System (ADS)

    Che-Aron, Z.; Abdalla, A. H.; Abdullah, K.; Hassan, W. H.

    2013-12-01

    In recent years, Cognitive Radio (CR) technology has largely attracted significant studies and research. Cognitive Radio Ad Hoc Network (CRAHN) is an emerging self-organized, multi-hop, wireless network which allows unlicensed users to opportunistically access available licensed spectrum bands for data communication under an intelligent and cautious manner. However, in CRAHNs, a lot of failures can easily occur during data transmission caused by PU (Primary User) activity, topology change, node fault, or link degradation. In this paper, an attempt has been made to evaluate the performance of the Multi-Radio Link-Quality Source Routing (MR-LQSR) protocol in CRAHNs under different path failure rate. In the MR-LQSR protocol, the Weighted Cumulative Expected Transmission Time (WCETT) is used as the routing metric. The simulations are carried out using the NS-2 simulator. The protocol performance is evaluated with respect to performance metrics like average throughput, packet loss, average end-to-end delay and average jitter. From the simulation results, it is observed that the number of path failures depends on the PUs number and mobility rate of SUs (Secondary Users). Moreover, the protocol performance is greatly affected when the path failure rate is high, leading to major service outages.

  16. Malicious node detection in ad-hoc wireless networks

    NASA Astrophysics Data System (ADS)

    Griswold, Richard L.; Medidi, Sirisha R.

    2003-07-01

    Advances in wireless communications and the proliferation of mobile computing devices has led to the rise of a new type of computer network: the ad-hoc wireless network. Ad-hoc networks are characterized by a lack of fixed infrastructure, which give ad-hoc networks a great deal of flexibility, but also increases the risk of security problems. In wired networks, key pieces of network infrastructure are secured to prevent unauthorized physical access and tampering. Network administrators ensure that everything is properly configured and are on-hand to fix problems and deal with intrusions. In contrast, the nodes in an ad-hoc network are responsible for routing and forwarding data in the network, and there are no network administrators to handle potential problems. This makes an ad-hoc network more vulnerable to a misconfigured, faulty, or compromised node. We propose a means for a node in an ad-hoc network to detect and handle these malicious nodes by comparing data available to the routing protocol, such as cached routes in Dynamic Source Routing, ICMP messages, and transport layer information, such as TCP timeouts. This data can then be used along with network probes to isolate the malicious node.

  17. Energy Efficient Probabilistic Broadcasting for Mobile Ad-Hoc Network

    NASA Astrophysics Data System (ADS)

    Kumar, Sumit; Mehfuz, Shabana

    2016-08-01

    In mobile ad-hoc network (MANETs) flooding method is used for broadcasting route request (RREQ) packet from one node to another node for route discovery. This is the simplest method of broadcasting of RREQ packets but it often results in broadcast storm problem, originating collisions and congestion of packets in the network. A probabilistic broadcasting is one of the widely used broadcasting scheme for route discovery in MANETs and provides solution for broadcasting storm problem. But it does not consider limited energy of the battery of the nodes. In this paper, a new energy efficient probabilistic broadcasting (EEPB) is proposed in which probability of broadcasting RREQs is calculated with respect to remaining energy of nodes. The analysis of simulation results clearly indicate that an EEPB route discovery scheme in ad-hoc on demand distance vector (AODV) can increase the network lifetime with a decrease in the average power consumption and RREQ packet overhead. It also decreases the number of dropped packets in the network, in comparison to other EEPB schemes like energy constraint gossip (ECG), energy aware gossip (EAG), energy based gossip (EBG) and network lifetime through energy efficient broadcast gossip (NEBG).

  18. Metadata-driven Ad Hoc Query of Clinical Studies Data

    PubMed Central

    Deshpande, Aniruddha M.; Nadkarni, Prakash M.

    2001-01-01

    The Entity-Attribute-Value (EAV) data representation is widely used in both clinical patient record systems (CPRSs) and clinical study data management systems (CSDMS). Both of these systems are heterogeneous in that many types of data are also represented conventionally, a situation that complicates data display, editing and ad hoc query. Seamless functioning of such systems mandates the presence of developer-defined metadata (data describing the rest of the database) that records, among other things, how individual parameters are represented within the system. We illustrate a web-based ad hoc query tool that relies on the metadata to generate syntactically and semantically correct SQL.

  19. Energy-Saving Topology Control for Heterogeneous Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Zhang, Lei; Wang, Xuehui

    Topology control with per-node transmission power adjustment in wireless ad hoc networks has been shown to be effective with respect to prolonging network lifetime and increasing network capacity. In this paper, we propose a fully distributed, asynchronous and localized energy-saving topology control algorithm for heterogeneous ad hoc networks with non-uniform transmission ranges. We prove the topology derived from the algorithm preserves the network connectivity and bi-directionality. It need not the position system support and dramatically reduces the communication overhead compared to other topology control algorithms. Simulation results show the effectiveness of our proposed algorithm.

  20. Routing Protocol of Sparse Urban Vehicular Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Li, Huxiong

    Vehicular ad hoc network (VANET) is an application of mobile ad hoc technology in transportation systems, it has become an important part of ITS. Since multi-hop link is hard to set up in sparse VANET, a traffic-aware routing (TAR) protocol is proposed which estimates vehicle average neighbors (VAN) of roads by exchanging beacon messages between encounter vehicles. Road with high VAN is preferred to be selected as part of forwarding path at intersection. Packets are forwarded to the next intersection in road in a greedy manner. Simulations show that TAR outperforms the compared protocols in terms of both packet delivery ratio and average end-to-end delay.

  1. Report of the Ad Hoc Committee on Scope and Sequence.

    ERIC Educational Resources Information Center

    Hergesheimer, John; And Others

    1989-01-01

    Describes the establishment of the Ad Hoc Committee on Scope and Sequence by the National Council for the Social Studies (NCSS). Outlines the responsibilities of the Committee, the process used to formulate curriculum criteria and the resultant criteria for social studies education curriculum design. (SLM)

  2. Providing Location Security in Vehicular Ad Hoc Networks

    ERIC Educational Resources Information Center

    Yan, Gongjun

    2010-01-01

    Location is fundamental information in Vehicular Ad-hoc Networks (VANETs). Almost all VANET applications rely on location information. Therefore it is of importance to ensure location information integrity, meaning that location information is original (from the generator), correct (not bogus or fabricated) and unmodified (value not changed). We…

  3. 14 CFR § 1203.1002 - Ad hoc committees.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false Ad hoc committees. § 1203.1002 Section § 1203.1002 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Special Access Programs (SAP) and Sensitive Compartmented Information (SCI) Programs...

  4. Routing in Ad Hoc Network Using Ant Colony Optimization

    NASA Astrophysics Data System (ADS)

    Khanpara, Pimal; Valiveti, Sharada; Kotecha, K.

    The ad hoc networks have dynamic topology and are infrastructure less. So it is required to implement a new network protocol for providing efficient end to end communication based on TCP/IP structure. There is a need to re-define or modify the functions of each layer of TCP/IP model to provide end to end communication between nodes. The mobility of the nodes and the limited resources are the main reason for this change. The main challenge in ad hoc networks is routing. Due to the mobility of the nodes in the ad hoc networks, routing becomes very difficult. Ant based algorithms are suitable for routing in ad hoc networks due to its dynamic nature and adaptive behavior. There are number of routing algorithms based on the concept of ant colony optimizations. It is quite difficult to determine the best ant based algorithm for routing as these algorithms perform differently under various circumstances such as the traffic distribution and network topology. In this paper, the overview of such routing algorithms is given.

  5. Delay Analysis of Max-Weight Queue Algorithm for Time-Varying Wireless Ad hoc Networks—Control Theoretical Approach

    NASA Astrophysics Data System (ADS)

    Chen, Junting; Lau, Vincent K. N.

    2013-01-01

    Max weighted queue (MWQ) control policy is a widely used cross-layer control policy that achieves queue stability and a reasonable delay performance. In most of the existing literature, it is assumed that optimal MWQ policy can be obtained instantaneously at every time slot. However, this assumption may be unrealistic in time varying wireless systems, especially when there is no closed-form MWQ solution and iterative algorithms have to be applied to obtain the optimal solution. This paper investigates the convergence behavior and the queue delay performance of the conventional MWQ iterations in which the channel state information (CSI) and queue state information (QSI) are changing in a similar timescale as the algorithm iterations. Our results are established by studying the stochastic stability of an equivalent virtual stochastic dynamic system (VSDS), and an extended Foster-Lyapunov criteria is applied for the stability analysis. We derive a closed form delay bound of the wireless network in terms of the CSI fading rate and the sensitivity of MWQ policy over CSI and QSI. Based on the equivalent VSDS, we propose a novel MWQ iterative algorithm with compensation to improve the tracking performance. We demonstrate that under some mild conditions, the proposed modified MWQ algorithm converges to the optimal MWQ control despite the time-varying CSI and QSI.

  6. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    PubMed Central

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  7. Auto-configuration protocols in mobile ad hoc networks.

    PubMed

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  8. MWAHCA: A Multimedia Wireless Ad Hoc Cluster Architecture

    PubMed Central

    Diaz, Juan R.; Jimenez, Jose M.; Sendra, Sandra

    2014-01-01

    Wireless Ad hoc networks provide a flexible and adaptable infrastructure to transport data over a great variety of environments. Recently, real-time audio and video data transmission has been increased due to the appearance of many multimedia applications. One of the major challenges is to ensure the quality of multimedia streams when they have passed through a wireless ad hoc network. It requires adapting the network architecture to the multimedia QoS requirements. In this paper we propose a new architecture to organize and manage cluster-based ad hoc networks in order to provide multimedia streams. Proposed architecture adapts the network wireless topology in order to improve the quality of audio and video transmissions. In order to achieve this goal, the architecture uses some information such as each node's capacity and the QoS parameters (bandwidth, delay, jitter, and packet loss). The architecture splits the network into clusters which are specialized in specific multimedia traffic. The real system performance study provided at the end of the paper will demonstrate the feasibility of the proposal. PMID:24737996

  9. MAC protocol for ad hoc networks using a genetic algorithm.

    PubMed

    Elizarraras, Omar; Panduro, Marco; Méndez, Aldo L; Reyna, Alberto

    2014-01-01

    The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR) and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC) protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access) for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15%) compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput. PMID:25140339

  10. MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm

    PubMed Central

    Elizarraras, Omar; Panduro, Marco; Méndez, Aldo L.

    2014-01-01

    The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR) and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC) protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access) for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15%) compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput. PMID:25140339

  11. 29 CFR 1912.11 - Terms of ad hoc committee members.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 7 2010-07-01 2010-07-01 false Terms of ad hoc committee members. 1912.11 Section 1912.11..., DEPARTMENT OF LABOR (CONTINUED) ADVISORY COMMITTEES ON STANDARDS Organizational Matters § 1912.11 Terms of ad hoc committee members. Each member of an ad hoc advisory committee shall serve for such period as...

  12. 29 CFR 1912.11 - Terms of ad hoc committee members.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 29 Labor 7 2013-07-01 2013-07-01 false Terms of ad hoc committee members. 1912.11 Section 1912.11..., DEPARTMENT OF LABOR (CONTINUED) ADVISORY COMMITTEES ON STANDARDS Organizational Matters § 1912.11 Terms of ad hoc committee members. Each member of an ad hoc advisory committee shall serve for such period as...

  13. 29 CFR 1912.11 - Terms of ad hoc committee members.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 29 Labor 7 2012-07-01 2012-07-01 false Terms of ad hoc committee members. 1912.11 Section 1912.11..., DEPARTMENT OF LABOR (CONTINUED) ADVISORY COMMITTEES ON STANDARDS Organizational Matters § 1912.11 Terms of ad hoc committee members. Each member of an ad hoc advisory committee shall serve for such period as...

  14. 29 CFR 1912.11 - Terms of ad hoc committee members.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 29 Labor 7 2014-07-01 2014-07-01 false Terms of ad hoc committee members. 1912.11 Section 1912.11..., DEPARTMENT OF LABOR (CONTINUED) ADVISORY COMMITTEES ON STANDARDS Organizational Matters § 1912.11 Terms of ad hoc committee members. Each member of an ad hoc advisory committee shall serve for such period as...

  15. 29 CFR 1912.11 - Terms of ad hoc committee members.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 7 2011-07-01 2011-07-01 false Terms of ad hoc committee members. 1912.11 Section 1912.11..., DEPARTMENT OF LABOR (CONTINUED) ADVISORY COMMITTEES ON STANDARDS Organizational Matters § 1912.11 Terms of ad hoc committee members. Each member of an ad hoc advisory committee shall serve for such period as...

  16. Ad Hoc Selection of Voice over Internet Streams

    NASA Technical Reports Server (NTRS)

    Macha, Mitchell G. (Inventor); Bullock, John T. (Inventor)

    2008-01-01

    A method and apparatus for a communication system technique involving ad hoc selection of at least two audio streams is provided. Each of the at least two audio streams is a packetized version of an audio source. A data connection exists between a server and a client where a transport protocol actively propagates the at least two audio streams from the server to the client. Furthermore, software instructions executable on the client indicate a presence of the at least two audio streams, allow selection of at least one of the at least two audio streams, and direct the selected at least one of the at least two audio streams for audio playback.

  17. Ad Hoc Selection of Voice over Internet Streams

    NASA Technical Reports Server (NTRS)

    Macha, Mitchell G. (Inventor); Bullock, John T. (Inventor)

    2014-01-01

    A method and apparatus for a communication system technique involving ad hoc selection of at least two audio streams is provided. Each of the at least two audio streams is a packetized version of an audio source. A data connection exists between a server and a client where a transport protocol actively propagates the at least two audio streams from the server to the client. Furthermore, software instructions executable on the client indicate a presence of the at least two audio streams, allow selection of at least one of the at least two audio streams, and direct the selected at least one of the at least two audio streams for audio playback.

  18. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  19. Scalable Architecture for Multihop Wireless ad Hoc Networks

    NASA Technical Reports Server (NTRS)

    Arabshahi, Payman; Gray, Andrew; Okino, Clayton; Yan, Tsun-Yee

    2004-01-01

    A scalable architecture for wireless digital data and voice communications via ad hoc networks has been proposed. Although the details of the architecture and of its implementation in hardware and software have yet to be developed, the broad outlines of the architecture are fairly clear: This architecture departs from current commercial wireless communication architectures, which are characterized by low effective bandwidth per user and are not well suited to low-cost, rapid scaling in large metropolitan areas. This architecture is inspired by a vision more akin to that of more than two dozen noncommercial community wireless networking organizations established by volunteers in North America and several European countries.

  20. On Trust Evaluation in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Nguyen, Dang Quan; Lamont, Louise; Mason, Peter C.

    Trust has been considered as a social relationship between two individuals in human society. But, as computer science and networking have succeeded in using computers to automate many tasks, the concept of trust can be generalized to cover the reliability and relationships of non-human interaction, such as, for example, information gathering and data routing. This paper investigates the evaluation of trust in the context of ad hoc networks. Nodes evaluate each other’s behaviour based on observables. A node then decides whether to trust another node to have certain innate abilities. We show how accurate such an evaluation could be. We also provide the minimum number of observations required to obtain an accurate evaluation, a result that indicates that observation-based trust in ad hoc networks will remain a challenging problem. The impact of making networking decisions using trust evaluation on the network connectivity is also examined. In this manner, quantitative decisions can be made concerning trust-based routing with the knowledge of the potential impact on connectivity.

  1. Intelligent routing protocol for ad hoc wireless network

    NASA Astrophysics Data System (ADS)

    Peng, Chaorong; Chen, Chang Wen

    2006-05-01

    A novel routing scheme for mobile ad hoc networks (MANETs), which combines hybrid and multi-inter-routing path properties with a distributed topology discovery route mechanism using control agents is proposed in this paper. In recent years, a variety of hybrid routing protocols for Mobile Ad hoc wireless networks (MANETs) have been developed. Which is proactively maintains routing information for a local neighborhood, while reactively acquiring routes to destinations beyond the global. The hybrid protocol reduces routing discovery latency and the end-to-end delay by providing high connectivity without requiring much of the scarce network capacity. On the other side the hybrid routing protocols in MANETs likes Zone Routing Protocol still need route "re-discover" time when a route between zones link break. Sine the topology update information needs to be broadcast routing request on local zone. Due to this delay, the routing protocol may not be applicable for real-time data and multimedia communication. We utilize the advantages of a clustering organization and multi-routing path in routing protocol to achieve several goals at the same time. Firstly, IRP efficiently saves network bandwidth and reduces route reconstruction time when a routing path fails. The IRP protocol does not require global periodic routing advertisements, local control agents will automatically monitor and repair broke links. Secondly, it efficiently reduces congestion and traffic "bottlenecks" for ClusterHeads in clustering network. Thirdly, it reduces significant overheads associated with maintaining clusters. Fourthly, it improves clusters stability due to dynamic topology changing frequently. In this paper, we present the Intelligent Routing Protocol. First, we discuss the problem of routing in ad hoc networks and the motivation of IRP. We describe the hierarchical architecture of IRP. We describe the routing process and illustrate it with an example. Further, we describe the control manage

  2. Opportunistic Channel Scheduling for Ad Hoc Networks with Queue Stability

    NASA Astrophysics Data System (ADS)

    Dong, Lei; Wang, Yongchao

    2015-03-01

    In this paper, a distributed opportunistic channel access strategy in ad hoc network is proposed. We consider the multiple sources contend for the transmission opportunity, the winner source decides to transmit or restart contention based on the current channel condition. Owing to real data assumption at all links, the decision still needs to consider the stability of the queues. We formulate the channel opportunistic scheduling as a constrained optimization problem which maximizes the system average throughput with the constraints that the queues of all links are stable. The proposed optimization model is solved by Lyapunov stability in queueing theory. The successive channel access problem is decoupled into single optimal stopping problem at every frame and solved with Lyapunov algorithm. The threshold for every frame is different, and it is derived based on the instantaneous queue information. Finally, computer simulations are conducted to demonstrate the validity of the proposed strategy.

  3. Indoor Positioning - An Ad-Hoc Positioning System

    NASA Astrophysics Data System (ADS)

    Mautz, Rainer

    2008-06-01

    The aim of this paper is to discuss the development of an automatic, low-cost system that exploits current or near future wireless communications technology to enable continuous tracking of the location of devices in all environments. The development of such a wireless sensor network involves system design, digital signal processing, protocol development, extraction of ranges and localisation. This paper focuses on the user requirements, system architecture and network positioning. The user requirements are presented with a focus on applications in geodesy. A high level strategy for the positioning function is presented based on an ad-hoc geodetic network positioning method including issues of accuracy, quality and reliability of the node positions. Results show that it is possible to achieve a position deviation that is of the size of the ranging error.

  4. Topology for efficient information dissemination in ad-hoc networking

    NASA Technical Reports Server (NTRS)

    Jennings, E.; Okino, C. M.

    2002-01-01

    In this paper, we explore the information dissemination problem in ad-hoc wirless networks. First, we analyze the probability of successful broadcast, assuming: the nodes are uniformly distributed, the available area has a lower bould relative to the total number of nodes, and there is zero knowledge of the overall topology of the network. By showing that the probability of such events is small, we are motivated to extract good graph topologies to minimize the overall transmissions. Three algorithms are used to generate topologies of the network with guaranteed connectivity. These are the minimum radius graph, the relative neighborhood graph and the minimum spanning tree. Our simulation shows that the relative neighborhood graph has certain good graph properties, which makes it suitable for efficient information dissemination.

  5. Ad hoc committee on global climate issues: Annual report

    USGS Publications Warehouse

    Gerhard, L.C.; Hanson, B.M.B.

    2000-01-01

    The AAPG Ad Hoc Committee on Global Climate Issues has studied the supposition of human-induced climate change since the committee's inception in January 1998. This paper details the progress and findings of the committee through June 1999. At that time there had been essentially no geologic input into the global climate change debate. The following statements reflect the current state of climate knowledge from the geologic perspective as interpreted by the majority of the committee membership. The committee recognizes that new data could change its conclusions. The earth's climate is constantly changing owing to natural variability in earth processes. Natural climate variability over recent geological time is greater than reasonable estimates of potential human-induced greenhouse gas changes. Because no tool is available to test the supposition of human-induced climate change and the range of natural variability is so great, there is no discernible human influence on global climate at this time.

  6. Realistic Mobility Modeling for Vehicular Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Akay, Hilal; Tugcu, Tuna

    2009-08-01

    Simulations used for evaluating the performance of routing protocols for Vehicular Ad Hoc Networks (VANET) are mostly based on random mobility and fail to consider individual behaviors of the vehicles. Unrealistic assumptions about mobility produce misleading results about the behavior of routing protocols in real deployments. In this paper, a realistic mobility modeling tool, Mobility for Vehicles (MOVE), which considers the basic mobility behaviors of vehicles, is proposed for a more accurate evaluation. The proposed model is tested against the Random Waypoint (RWP) model using AODV and OLSR protocols. The results show that the mobility model significantly affects the number of nodes within the transmission range of a node, the volume of control traffic, and the number of collisions. It is shown that number of intersections, grid size, and node density are important parameters when dealing with VANET performance.

  7. Maximizing the Effective Lifetime of Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Hossain, M. Julius; Dewan, M. Ali Akber; Chae, Oksam

    This paper presents a new routing approach to extend the effective lifetime of mobile ad hoc networks (MANET) considering both residual battery energy of the participating nodes and routing cost. As the nodes in ad hoc networks are limited in power, a power failure occurs if a node has insufficient remaining energy to send, receive or forward a message. So, it is important to minimize the energy expenditure as well as to balance the remaining battery power among the nodes. Cost effective routing algorithms attempt to minimize the total power needed to transmit a packet which causes a large number of nodes to loose energy quickly and die. On the other hand, lifetime prediction based routing algorithms try to balance the remaining energies among the nodes in the networks and ignore the transmission cost. These approaches extend the lifetime of first few individual nodes. But as nodes spend more energy for packet transfer, power failures occurs, within short interval resulting more number of total dead node earlier. This reduces the effective lifetime of the network, as at this stage successful communication is not possible due to the lack of forwarding node. The proposed method keeps the transmission power in modest range and at the same time tries to reduce the variance of the residual energy of the nodes more effectively to obtain the highest useful lifetime of the networks in the long run. Nonetheless, movement of nodes frequently creates network topology changes via link breaks and link creation and thus effects on the stability of the network. So, the pattern of the node movement is also incorporated in our route selection procedure.

  8. 32 CFR 2800.7 - Designation of chairperson for Ad Hoc Committees.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Designation of chairperson for Ad Hoc Committees... VICE PRESIDENT OF THE UNITED STATES SECURITY PROCEDURES § 2800.7 Designation of chairperson for Ad Hoc Committees. The Counsel to the Vice President is designated as the responsible official to chair Ad...

  9. 32 CFR 2800.7 - Designation of chairperson for Ad Hoc Committees.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Designation of chairperson for Ad Hoc Committees... VICE PRESIDENT OF THE UNITED STATES SECURITY PROCEDURES § 2800.7 Designation of chairperson for Ad Hoc Committees. The Counsel to the Vice President is designated as the responsible official to chair Ad...

  10. 32 CFR 2800.7 - Designation of chairperson for Ad Hoc Committees.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Designation of chairperson for Ad Hoc Committees... VICE PRESIDENT OF THE UNITED STATES SECURITY PROCEDURES § 2800.7 Designation of chairperson for Ad Hoc Committees. The Counsel to the Vice President is designated as the responsible official to chair Ad...

  11. 32 CFR 2800.7 - Designation of chairperson for Ad Hoc Committees.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Designation of chairperson for Ad Hoc Committees... VICE PRESIDENT OF THE UNITED STATES SECURITY PROCEDURES § 2800.7 Designation of chairperson for Ad Hoc Committees. The Counsel to the Vice President is designated as the responsible official to chair Ad...

  12. 32 CFR 2800.7 - Designation of chairperson for Ad Hoc Committees.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Designation of chairperson for Ad Hoc Committees... VICE PRESIDENT OF THE UNITED STATES SECURITY PROCEDURES § 2800.7 Designation of chairperson for Ad Hoc Committees. The Counsel to the Vice President is designated as the responsible official to chair Ad...

  13. Estimating HIV Incidence during Pregnancy and Knowledge of Prevention of Mother-to-Child Transmission with an Ad Hoc Analysis of Potential Cofactors

    PubMed Central

    Egbe, Thomas Obinchemti; Tazinya, Rose-Mary Asong; Halle-Ekane, Gregory Edie; Egbe, Eta-Nkongho; Achidi, Eric Akum

    2016-01-01

    Background. We determined the incidence of HIV seroconversion during the second and third trimesters of pregnancy and ad hoc potential cofactors associated with HIV seroconversion after having an HIV-negative result antenatally. We also studied knowledge of PMTCT among pregnant women in seven health facilities in Fako Division, South West Region, Cameroon. Method. During the period between September 12 and December 4, 2011, we recruited a cohort of 477 HIV-negative pregnant women by cluster sampling. Data collection was with a pretested interviewer-administered questionnaire. Sociodemographic information, knowledge of PMTCT, and methods of HIV prevention were obtained from the study population and we did Voluntary Counselling and Testing (VCT) for HIV. Results. The incidence rate of HIV seroconversion during pregnancy was 6.8/100 woman-years. Ninety percent of the participants did not use condoms throughout pregnancy but had a good knowledge of PMTCT of HIV. Only 31.9% of participants knew their HIV status before the booking visit and 33% did not know the HIV status of their partners. Conclusion. The incidence rate of HIV seroconversion in the Fako Division, Cameroon, was 6.8/100 woman-years. No risk factors associated with HIV seroconversion were identified among the study participants because of lack of power to do so. PMID:27127653

  14. Z306 molecular contamination ad hoc committee results

    NASA Technical Reports Server (NTRS)

    Golden, Johnny L.

    1992-01-01

    LDEF external surfaces which did not receive significant amounts of atomic oxygen were observed to be coated with a brown contamination, apparently the result of a condensed organic residue darkened due to UV radiation exposure. During the initial Materials Special Investigation Group (MSIG) Meeting after LDEF deintegration, held in Seattle - July 1990, this organic contamination was the subject of much discussion. The amount of contamination was thought to be significant and its source was immediately believed to be the Z306 black thermal control coating used to coat the entire inner surface of LDEF. Due to the size of the structure, it was not feasible to bake-out the coating. However, initial data on the contamination film was confusing in that significant amounts of silicon was observed by several different researchers. Silicon (from silicone) was not expected to be a potential outgassing product of the Z306 polyurethane coating. To investigate the connection between external contamination and the interior paint, a MSIG ad hoc committee was formed.

  15. Managing performance of DB2 Ad Hoc Reports

    SciTech Connect

    Chow, A.

    1994-02-01

    The DB2 financial reporting systems at Westinghouse Savannah River Company consists of 212 standardized reports that over 1034 users have accessed in 1993 to generate their reports. Each report has a range of selection criteria that the users can specify. Depending on the selection criteria, a report can access from a few rows to millions of rows of data. When this new DB2 system went into production in 1992, the CPU was at 100% utilization. From the beginning, ad hoc reports had a backlog of 4--5 days. Since DB2 was a new DBMS, most people blamed the poor report turn around times on DB2 as an inefficient DBMS and on a shortage of CPU cycles. Since we are unable to purchase a more powerful CPU, the only option left to us was to improve report turn around was system and application performance tuning. This document presents our efforts in these areas. Education of users in report submission was a starting point. And as to index tuning techniques that were applied, we created more friendly indexes, used clustering indexes, and used a reorganizing mechanism. A more efficient SQL was written which saved a lot of money.

  16. Algorithmic aspects of topology control problems for ad hoc networks

    SciTech Connect

    Liu, R.; Lloyd, E. L.; Marathe, M. V.; Ramanathan, R.; Ravi, S. S.

    2002-01-01

    Topology control problems are concerned with the assignment of power values to nodes of an ad hoc network so that the power assignment leads to a graph topology satisfying some specified properties. This paper considers such problems under several optimization objectives, including minimizing the maximum power and minimizing the total power. A general approach leading to a polynomial algorithm is presented for minimizing maximum power for a class of graph properties, called monotone properties. The difficulty of generalizing the approach to properties that are not monoione is pointed out. Problems involving the minimization of total power are known to be NP-complete even for simple graph properties. A general approach that leads to an approximation algorithm for minimizing the total power for some monotone properties is presented. Using this approach, a new approximation algorithm for the problem of minimizing the total power for obtaining a 2-node-connected graph is obtained. It is shown that this algorithm provides a constant performance guarantee. Experimental results from an implementation of the approximation algorithm are also presented.

  17. Load-aware Flooding for Streaming over Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Utsu, Keisuke; Ishii, Hiroshi

    This paper discusses the streaming of high rate media such as video or audio information over ad hoc networks in disaster situations or for temporary events when it is difficult to use fixed infrastructure. The conventional simple flooding is not applicable for this application because it generates a large number of redundant rebroadcast and heavy traffic load to the network. To restrain redundant rebroadcast messages, several methods have been proposed. But since those studies do not take into account the actual load condition at each node that will affect network efficiency, they cannot achieve both ensuring the high message reachability and reducing redundant rebroadcast. In this paper, we propose two novel load-aware flooding methods using the MAC transmission queue information at each node to make the decision about whether rebroadcast messages should be sent or not. Through network simulations, we evaluate and show the effectiveness of our proposals. The result shows that our proposals achieve both ensuring high message reachability and restraint of redundant rebroadcast comparing with existing methods.

  18. Design of the next generation cognitive mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Amjad, Ali; Wang, Huiqiang; Chen, Xiaoming

    Cognition capability has been seen by researchers as the way forward for the design of next generation of Mobile Ad Hoc Networks (MANETs). The reason why a cognitive paradigm would be more suited to a MANET is because MANETs are highly dynamic networks. The topology may change very frequently during the operation of a MANET. Traffic patterns in MANETs can vary from time to time depending on the need of the users. The size of a MANET and node density is also very dynamic and may change without any predictable pattern. In a MANET environment, most of these parameters may change very rapidly and keeping track of them manually would be very difficult. Previous studies have shown that the performance of a certain routing approach in MANETs is dependent on the size of the network and node density. The choice of whether to use a reactive or proactive routing approach comes down to the network size parameter. Static or offline approaches to fine tune a MANET to achieve certain performance goals is hence not very productive as a lot of these parameters keep changing during the course of operation of MANETs. Similarly, the performance of MANETs would improve greatly if the MAC layer entity could operate in a more flexible manner. In this paper we propose a cognitive MANET design that will ensure that all these dynamic parameters are automatically monitored and decisions are based on the current status of these parameters.

  19. Random Time Identity Based Firewall In Mobile Ad hoc Networks

    NASA Astrophysics Data System (ADS)

    Suman, Patel, R. B.; Singh, Parvinder

    2010-11-01

    A mobile ad hoc network (MANET) is a self-organizing network of mobile routers and associated hosts connected by wireless links. MANETs are highly flexible and adaptable but at the same time are highly prone to security risks due to the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized control. Firewall is an effective means of protecting a local network from network-based security threats and forms a key component in MANET security architecture. This paper presents a review of firewall implementation techniques in MANETs and their relative merits and demerits. A new approach is proposed to select MANET nodes at random for firewall implementation. This approach randomly select a new node as firewall after fixed time and based on critical value of certain parameters like power backup. This approach effectively balances power and resource utilization of entire MANET because responsibility of implementing firewall is equally shared among all the nodes. At the same time it ensures improved security for MANETs from outside attacks as intruder will not be able to find out the entry point in MANET due to the random selection of nodes for firewall implementation.

  20. Detecting and isolating malicious nodes in wireless ad hoc networks

    NASA Astrophysics Data System (ADS)

    Li, Fanzhi; Jassim, Sabah

    2007-04-01

    Malicious nodes can seriously impair the performance of wireless ad hoc networks as a result of different actions such as packet dropping. Secure routes are shortest paths on which every node on the route is trusted even if unknown. Secure route discovery requires the adoption of mechanisms of associating trust to nodes. Most existing secure route discovery mechanisms rely on shared keys and digital signature. In the absence of central nodes that act as certification authority, such protocols suffer from heavy computational burden and are vulnerable to malicious attacks. In this paper we shall review existing techniques for secure routing and propose to complement route finding with creditability scores. Each node would have a credit list for its neighbors. Each node monitors its neighbors' pattern of delivering packets and regularly credits are reviewed and updated accordingly. Unlike most existing schemes the focus of our work is based on post route discovery stage, i.e. when packets are transmitted on discovered routes. The level of trust in any route will be based on the credits associated with the neighbors belonging to the discovered route. We shall evaluate the performance of the proposed scheme by modifying our simulation system so that each node has a dynamic changing "credit list" for its neighbors' behavior. We shall conduct a series of simulations with and without the proposed scheme and compare the results. We will demonstrate that the proposed mechanism is capable of isolating malicious nodes and thereby counteracting black hole attacks.

  1. Performance Improvement in Geographic Routing for Vehicular Ad Hoc Networks

    PubMed Central

    Kaiwartya, Omprakash; Kumar, Sushil; Lobiyal, D. K.; Abdullah, Abdul Hanan; Hassan, Ahmed Nazar

    2014-01-01

    Geographic routing is one of the most investigated themes by researchers for reliable and efficient dissemination of information in Vehicular Ad Hoc Networks (VANETs). Recently, different Geographic Distance Routing (GEDIR) protocols have been suggested in the literature. These protocols focus on reducing the forwarding region towards destination to select the Next Hop Vehicles (NHV). Most of these protocols suffer from the problem of elevated one-hop link disconnection, high end-to-end delay and low throughput even at normal vehicle speed in high vehicle density environment. This paper proposes a Geographic Distance Routing protocol based on Segment vehicle, Link quality and Degree of connectivity (SLD-GEDIR). The protocol selects a reliable NHV using the criteria segment vehicles, one-hop link quality and degree of connectivity. The proposed protocol has been simulated in NS-2 and its performance has been compared with the state-of-the-art protocols: P-GEDIR, J-GEDIR and V-GEDIR. The empirical results clearly reveal that SLD-GEDIR has lower link disconnection and end-to-end delay, and higher throughput as compared to the state-of-the-art protocols. It should be noted that the performance of the proposed protocol is preserved irrespective of vehicle density and speed. PMID:25429415

  2. An Optimal CDS Construction Algorithm with Activity Scheduling in Ad Hoc Networks.

    PubMed

    Penumalli, Chakradhar; Palanichamy, Yogesh

    2015-01-01

    A new energy efficient optimal Connected Dominating Set (CDS) algorithm with activity scheduling for mobile ad hoc networks (MANETs) is proposed. This algorithm achieves energy efficiency by minimizing the Broadcast Storm Problem [BSP] and at the same time considering the node's remaining energy. The Connected Dominating Set is widely used as a virtual backbone or spine in mobile ad hoc networks [MANETs] or Wireless Sensor Networks [WSN]. The CDS of a graph representing a network has a significant impact on an efficient design of routing protocol in wireless networks. Here the CDS is a distributed algorithm with activity scheduling based on unit disk graph [UDG]. The node's mobility and residual energy (RE) are considered as parameters in the construction of stable optimal energy efficient CDS. The performance is evaluated at various node densities, various transmission ranges, and mobility rates. The theoretical analysis and simulation results of this algorithm are also presented which yield better results. PMID:26221627

  3. Upper Bounding Service Capacity in Multihop Wireless SSMA-Based Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Du, Shirong; Daigle, John N.; Alidaee, Bahram

    Upper bounds on the service carrying capacity of a multihop, wireless, SSMA-based ad hoc network are considered herein. The network has a single radio band for transmission and reception. Each node can transmit to, or receive from, multiple nodes simultaneously. We formulate the scheduling of transmissions and control of transmit powers as a joint, mixed-integer, nonlinear optimization problem that yields maximum return at minimum power subject to SINR constraints. We present an efficient tabu search-based heuristic algorithm to solve the optimization problem and rigorously assess the quality of the results. Through analysis and simulation, we establish upper bounds on the VoIP call carrying capacity of the network as function of various parameters. We discuss the pros and cons of using SSMA as a spectrum sharing technique in wireless ad hoc networks

  4. An Optimal CDS Construction Algorithm with Activity Scheduling in Ad Hoc Networks

    PubMed Central

    Penumalli, Chakradhar; Palanichamy, Yogesh

    2015-01-01

    A new energy efficient optimal Connected Dominating Set (CDS) algorithm with activity scheduling for mobile ad hoc networks (MANETs) is proposed. This algorithm achieves energy efficiency by minimizing the Broadcast Storm Problem [BSP] and at the same time considering the node's remaining energy. The Connected Dominating Set is widely used as a virtual backbone or spine in mobile ad hoc networks [MANETs] or Wireless Sensor Networks [WSN]. The CDS of a graph representing a network has a significant impact on an efficient design of routing protocol in wireless networks. Here the CDS is a distributed algorithm with activity scheduling based on unit disk graph [UDG]. The node's mobility and residual energy (RE) are considered as parameters in the construction of stable optimal energy efficient CDS. The performance is evaluated at various node densities, various transmission ranges, and mobility rates. The theoretical analysis and simulation results of this algorithm are also presented which yield better results. PMID:26221627

  5. Typicality Mediates Performance during Category Verification in Both Ad-Hoc and Well-Defined Categories

    ERIC Educational Resources Information Center

    Sandberg, Chaleece; Sebastian, Rajani; Kiran, Swathi

    2012-01-01

    Background: The typicality effect is present in neurologically intact populations for natural, ad-hoc, and well-defined categories. Although sparse, there is evidence of typicality effects in persons with chronic stroke aphasia for natural and ad-hoc categories. However, it is unknown exactly what influences the typicality effect in this…

  6. A Token Ring Protocol for Dynamic Ad-hoc Wireless Environments

    SciTech Connect

    Top, P; Kohlhepp, V; Dowla, F

    2005-09-30

    A wireless ad-hoc networking protocol is presented. The protocol is designed to be flexible, easy to use and adaptable to a wide variety of potential applications. The primary considerations in design are small code size, guaranteed bandwidth access, limited delay, and error resilience in a highly dynamic ad-hoc environment. These considerations are achieved through the use of token ring protocol.

  7. Ad hoc CubeSat constellations: Secondary launch coverage and distribution

    NASA Astrophysics Data System (ADS)

    Marinan, A.; Nicholas, A.; Cahoy, K.

    The primary purpose of a constellation is to obtain global measurements with improved spatial and temporal resolution. The small size, low cost, standardized form factor, and increasing availability of commercial parts for CubeSats make them ideal for use in constellations. However, without taking advantage of secondary payload opportunities, it would be costly to launch and distribute a CubeSat constellation into a specific configuration. A cost-effective way to launch a constellation of CubeSats is via consecutive secondary payload launch opportunities, but the resulting constellation would be an ad hoc mix of orbit parameters. We focus on the feasibility of cobbling together constellation-like functionality from multiple secondary payload opportunities. Each participating CubeSat (or set of CubeSats) per launch could have completely different orbital parameters, even without propulsion onboard the CubeSats or intermediate transfer carriers. We look at the ground coverages that could be obtained for a constellation of five to six orbital planes with one to six satellites in each plane. We analyze past and announced future launch opportunities for CubeSats, including launch platforms supported by the NASA Educational Launch of Nanosatellites (ELaNa). We consider combinations of possible launch locations and temporal spacings over the course of one year and simulate the resulting ground coverage patterns and revisit times for an ad hoc constellation using these launch opportunities. We perform this analysis for two separate case studies - one with only US launches and one with both US and non-US opportunities - and vary the number of satellites per orbital plane. Typical CubeSat mission lifetimes and deorbit times for low-altitude orbits are included in these analyses. The ad hoc constellation results are compared to coverage from uniformly-placed LEO constellations and are quantified in terms of revisit time, time to 100% global coverage, and response time. For mu

  8. 75 FR 33838 - NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-15

    ... Parham, Exploration Systems Mission Directorate, National Aeronautics and Space Administration... SPACE ADMINISTRATION NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting AGENCY: National Aeronautics and Space Administration. ACTION: Notice of Meeting. SUMMARY: In accordance with...

  9. A Group Based Key Sharing and Management Algorithm for Vehicular Ad Hoc Networks

    PubMed Central

    Moharram, Mohammed Morsi; Azam, Farzana

    2014-01-01

    Vehicular ad hoc networks (VANETs) are one special type of ad hoc networks that involves vehicles on roads. Typically like ad hoc networks, broadcast approach is used for data dissemination. Blind broadcast to each and every node results in exchange of useless and irrelevant messages and hence creates an overhead. Unicasting is not preferred in ad-hoc networks due to the dynamic topology and the resource requirements as compared to broadcasting. Simple broadcasting techniques create several problems on privacy, disturbance, and resource utilization. In this paper, we propose media mixing algorithm to decide what information should be provided to each user and how to provide such information. Results obtained through simulation show that fewer number of keys are needed to share compared to simple broadcasting. Privacy is also enhanced through this approach. PMID:24587749

  10. Ad-hoc percutaneous coronary intervention and staged percutaneous coronary intervention.

    PubMed

    Rahman, Z; Paul, G K; Choudhury, A K

    2011-10-01

    Percutaneous coronary intervention (PCI) is a catheter based procedure where a catheter system is introduced through a systemic artery under local anesthesia in a stenotic coronary artery by controlled inflation of a distensible balloon. At early period, PCI was done in a separate session following coronary angiogram (Staged PCI) and it was more costly and hospital stay was long. As the expertization and laboratory facilities improved, the health care providers think about cost, hospital stay and patient convenience. So, to reduce the cost and patient preferred more PCI being done immediately following diagnostic catheterization (Ad-hoc PCI). Subsequently this Ad-hoc procedure becomes popular and now most of the PCI are Ad-hoc PCI worldwide. Rate of combined procedure (Ad-hoc) progressively increased from 54% in 1990 to 88% in 2000 with a significant decrease in rate of complications. In the initial study of Ad-hoc PCI suggested that Ad-hoc PCI should be done in selected group of patients as there was some potential risk factors (e.g. Multivessel diseases, unstable angina, aortic valve disease, and recent infarction or thrombolytic therapy) for Ad-hoc procedure and some (e.g. Older age, multivessel PTCA and complex lesion PTCA) for staged procedure. But recent studies showed that no significant difference in respect of safety and efficacy between Ad-hoc and staged PCI. Previous studies, in the era of balloon angioplasty from 1985 to 1995, Haraphonges et al. (1988), Rozenman et al. (1995) and Kimmel et al. (1997) suggested that an ad hoc approach is safe, with potentially more complications in patients with unstable angina pectoris or other high-risk factors. However, these reports have been limited to observational studies representing single institution experiences with small samples and inclusion of patients who underwent emergency PCI procedures. In Bangladesh a prospective observational study was done among 120 patients to compare the outcome of Ad-hoc and

  11. Design of multilevel heterogeneous ad-hoc wireless networks with UAVs

    NASA Astrophysics Data System (ADS)

    Gu, Daniel L.; Gerla, Mario; Ly, Henry; Xu, Kaixin; Kong, Jiejun; Hong, Xiaoyan

    2001-10-01

    Multi-Layer Ad Hoc Wireless Networks with UAVs is an ideal infrastructure to establish a rapidly deployable wireless communication system any time any where in the world for military applications. In this paper, we review the research we have done so far for our heterogeneous solution. First of all, we proposed the infrastructure of Multi-level Heterogeneous Ad-Hoc Wireless Network with UAVs. Second, we developed a new MAC layer protocol, Centralized Intelligent Channel Assigned Multiple Access (C-ICAMA), for ground mobile backbone nodes to access UAV. Third, we extended HSR (Hierarchical State Routing) to this Multi-Level Heterogeneous Ad-Hoc Wireless Network. Due to the intrinsic limitations of Extended HSR, we extended the Landmark Ad Hoc Routing (LANMAR) as our forth step. Security is a critical issue for mobile ad-hoc wireless networks, especially for military applications. We developed an embedded distributed security protocol and integrated with this heterogeneous hierarchical ad hoc wireless networks in our fifth step. Therefore, the hierarchical multi-layer approach is the most desirable approach to achieve routing scalability in multi-hop wireless networks.

  12. T2AR: trust-aware ad-hoc routing protocol for MANET.

    PubMed

    Dhananjayan, Gayathri; Subbiah, Janakiraman

    2016-01-01

    Secure data transfer against the malicious attacks is an important issue in an infrastructure-less independent network called mobile ad-hoc network (MANET). Trust assurance between MANET nodes is the key parameter in the high-security provision under dynamic topology variations and open wireless constraints. But, the malicious behavior of nodes reduces the trust level of the nodes that leads to an insecure data delivery. The increase in malicious attacks causes the excessive energy consumption that leads to a reduction of network lifetime. The lack of positional information update of the nodes in ad-hoc on-demand vector (AODV) protocol during the connection establishment offers less trust level between the nodes. Hence, the trust rate computation using energy and mobility models and its update are the essential tasks for secure data delivery. This paper proposes a trust-aware ad-hoc routing (T2AR) protocol to improve the trust level between the nodes in MANET. The proposed method modifies the traditional AODV routing protocol with the constraints of trust rate, energy, mobility based malicious behavior prediction. The packet sequence ID matching from the log reports of neighbor nodes determine the trust rate that avoids the malicious report generation. Besides, the direct and indirect trust observation schemes utilization increases the trust level. Besides, the received signal strength indicator utilization determines the trusted node is within the communication range or not. The comparative analysis between the proposed T2AR with the existing methods such as TRUNCMAN, RBT, GR, FBR and DICOTIDS regarding the average end-to-end delay, throughput, false positives, packet delivery ratio shows the effectiveness of T2AR in the secure MANET environment design. PMID:27441127

  13. Dynamic fair node spectrum allocation for ad hoc networks using random matrices

    NASA Astrophysics Data System (ADS)

    Rahmes, Mark; Lemieux, George; Chester, Dave; Sonnenberg, Jerry

    2015-05-01

    Dynamic Spectrum Access (DSA) is widely seen as a solution to the problem of limited spectrum, because of its ability to adapt the operating frequency of a radio. Mobile Ad Hoc Networks (MANETs) can extend high-capacity mobile communications over large areas where fixed and tethered-mobile systems are not available. In one use case with high potential impact, cognitive radio employs spectrum sensing to facilitate the identification of allocated frequencies not currently accessed by their primary users. Primary users own the rights to radiate at a specific frequency and geographic location, while secondary users opportunistically attempt to radiate at a specific frequency when the primary user is not using it. We populate a spatial radio environment map (REM) database with known information that can be leveraged in an ad hoc network to facilitate fair path use of the DSA-discovered links. Utilization of high-resolution geospatial data layers in RF propagation analysis is directly applicable. Random matrix theory (RMT) is useful in simulating network layer usage in nodes by a Wishart adjacency matrix. We use the Dijkstra algorithm for discovering ad hoc network node connection patterns. We present a method for analysts to dynamically allocate node-node path and link resources using fair division. User allocation of limited resources as a function of time must be dynamic and based on system fairness policies. The context of fair means that first available request for an asset is not envied as long as it is not yet allocated or tasked in order to prevent cycling of the system. This solution may also save money by offering a Pareto efficient repeatable process. We use a water fill queue algorithm to include Shapley value marginal contributions for allocation.

  14. A multihop key agreement scheme for wireless ad hoc networks based on channel characteristics.

    PubMed

    Hao, Zhuo; Zhong, Sheng; Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks. PMID:23766725

  15. A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics

    PubMed Central

    Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks. PMID:23766725

  16. The effects of malicious nodes on performance of mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Li, Fanzhi; Shi, Xiyu; Jassim, Sabah; Adams, Christopher

    2006-05-01

    Wireless ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to security attacks. Unlike their wired counterpart, infrastructureless ad hoc networks do not have a clear line of defense, their topology is dynamically changing, and every mobile node can receive messages from its neighbors and can be contacted by all other nodes in its neighborhood. This poses a great danger to network security if some nodes behave in a malicious manner. The immediate concern about the security in this type of networks is how to protect the network and the individual mobile nodes against malicious act of rogue nodes from within the network. This paper is concerned with security aspects of wireless ad hoc networks. We shall present results of simulation experiments on ad hoc network's performance in the presence of malicious nodes. We shall investigate two types of attacks and the consequences will be simulated and quantified in terms of loss of packets and other factors. The results show that network performance, in terms of successful packet delivery ratios, significantly deteriorates when malicious nodes act according to the defined misbehaving characteristics.

  17. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks

    PubMed Central

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-01-01

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes. PMID:26184224

  18. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.

    PubMed

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-01-01

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes. PMID:26184224

  19. A Decentralized VPN Service over Generalized Mobile Ad-Hoc Networks

    NASA Astrophysics Data System (ADS)

    Fujita, Sho; Shima, Keiichi; Uo, Yojiro; Esaki, Hiroshi

    We present a decentralized VPN service that can be built over generalized mobile ad-hoc networks (Generalized MANETs), in which topologies can be represented as a time-varying directed multigraph. We address wireless ad-hoc networks and overlay ad-hoc networks as instances of Generalized MANETs. We first propose an architecture to operate on various kinds of networks through a single set of operations. Then, we design and implement a decentralized VPN service on the proposed architecture. Through the development and operation of a prototype system we implemented, we found that the proposed architecture makes the VPN service applicable to each instance of Generalized MANETs, and that the VPN service makes it possible for unmodified applications to operate on the networks.

  20. Intelligent Sensing and Classification in DSR-Based Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Dempsey, Tae; Sahin, Gokhan; Morton, Yu T. (Jade

    Wireless ad hoc networks have fundamentally altered today's battlefield, with applications ranging from unmanned air vehicles to randomly deployed sensor networks. Security and vulnerabilities in wireless ad hoc networks have been considered at different layers, and many attack strategies have been proposed, including denial of service (DoS) through the intelligent jamming of the most critical packet types of flows in a network. This paper investigates the effectiveness of intelligent jamming in wireless ad hoc networks using the Dynamic Source Routing (DSR) and TCP protocols and introduces an intelligent classifier to facilitate the jamming of such networks. Assuming encrypted packet headers and contents, our classifier is based solely on the observable characteristics of size, inter-arrival timing, and direction and classifies packets with up to 99.4% accuracy in our experiments.

  1. Routing in wireless ad hoc and sensor network underground with sensor data in real-time

    NASA Astrophysics Data System (ADS)

    Odei-Lartey, Emmanuel; Hartmann, Klaus; Ahmadian, Hamidreza

    2012-05-01

    This paper first describes the innovative topology and structure of a wireless ad hoc and sensor network in a so called line-in-the-underground formation and the feasibility of achieving a reliable wireless connection underground with regards to a borehole telemetry system. It further describes a routing algorithm/protocol implementation based on a modification of the ad hoc on-demand distance vector protocol to achieve a reliable underground communication scheme for the wireless ad hoc network deployed underground for sensor data acquisition in real time as applied in the borehole telemetry system. Simulations and experiments are conducted to investigate and verify the effectiveness of this routing technique and the performance results are shown.

  2. Time geography for ad-hoc shared-ride trip planning in mobile geosensor networks

    NASA Astrophysics Data System (ADS)

    Raubal, Martin; Winter, Stephan; Teβmann, Sven; Gaisbauer, Christian

    Ad-hoc shared-ride trip planning in an urban environment is a complex task within a non-deterministic transportation network. Mobile geosensor networks provide the technical environment for realizing ad-hoc shared-ride trip planning: Network nodes are autonomous agents that interact locally by ad-hoc short-range communication and arrange for shared rides. In a mobile geosensor network, communication costs are critical because of constraints regarding bandwidth, available energy, and memory. This paper introduces spatio-temporal concepts from time geography, which can be employed during the planning process to significantly reduce communication costs. We will integrate network-based algorithms and different wayfinding strategies to assist both shared-ride clients and hosts in finding optimal travel assignments. Multi-agent geosimulation in a real street network is used to demonstrate the applicability of the approach and quantitatively confirm the theoretically foreseen reduction in communication costs.

  3. Fuzzy Multiple Metrics Link Assessment for Routing in Mobile Ad-Hoc Network

    NASA Astrophysics Data System (ADS)

    Soo, Ai Luang; Tan, Chong Eng; Tay, Kai Meng

    2011-06-01

    In this work, we investigate on the use of Sugeno fuzzy inference system (FIS) in route selection for mobile Ad-Hoc networks (MANETs). Sugeno FIS is introduced into Ad-Hoc On Demand Multipath Distance Vector (AOMDV) routing protocol, which is derived from its predecessor, Ad-Hoc On Demand Distance Vector (AODV). Instead of using the conventional way that considering only a single metric to choose the best route, our proposed fuzzy decision making model considers up to three metrics. In the model, the crisp inputs of the three parameters are fed into an FIS and being processed in stages, i.e., fuzzification, inference, and defuzzification. Finally, after experiencing all the stages, a single value score is generated from the combination metrics, which will be used to measure all the discovered routes credibility. Results obtained from simulations show a promising improvement as compared to AOMDV and AODV.

  4. Impact of network structure on the capacity of wireless multihop ad hoc communication

    NASA Astrophysics Data System (ADS)

    Krause, Wolfram; Glauche, Ingmar; Sollacher, Rudolf; Greiner, Martin

    2004-07-01

    As a representative of a complex technological system, the so-called wireless multihop ad hoc communication networks are discussed. They represent an infrastructure-less generalization of todays wireless cellular phone networks. Lacking a central control authority, the ad hoc nodes have to coordinate themselves such that the overall network performs in an optimal way. A performance indicator is the end-to-end throughput capacity. Various models, generating differing ad hoc network structure via differing transmission power assignments, are constructed and characterized. They serve as input for a generic data traffic simulation as well as some semi-analytic estimations. The latter reveal that due to the most-critical-node effect the end-to-end throughput capacity sensitively depends on the underlying network structure, resulting in differing scaling laws with respect to network size.

  5. Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Alicherry, Mansoor; Keromytis, Angelos D.; Stavrou, Angelos

    Mobile Ad-hoc Networks (MANETs) are increasingly employed in tactical military and civil rapid-deployment networks, including emergency rescue operations and ad hoc disaster-relief networks. However, this flexibility of MANETs comes at a price, when compared to wired and base station-based wireless networks: MANETs are susceptible to both insider and outsider attacks. This is mainly because of the lack of a well-defined defense perimeter preventing the effective use of wired defenses including firewalls and intrusion detection systems.

  6. Energy Efficient and QoS sensitive Routing Protocol for Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Saeed Tanoli, Tariq; Khalid Khan, Muhammad

    2013-12-01

    Efficient routing is an important part of wireless ad hoc networks. Since in ad hoc networks we have limited resources, there are many limitations like bandwidth, battery consumption, and processing cycle etc. Reliability is also necessary since there is no allowance for invalid or incomplete information (and expired data is useless). There are various protocols that perform routing by considering one parameter but ignoring other parameters. In this paper we present a protocol that finds route on the basis of bandwidth, energy and mobility of the nodes participating in the communication.

  7. Reliable on-demand multicast routing with congestion control in wireless ad hoc networks

    NASA Astrophysics Data System (ADS)

    Tang, Ken; Gerla, Mario

    2001-07-01

    In this paper, we address the congestion control multicast routing problem in wireless ad hoc networks through the medium access control (MAC) layer. We first introduce the Broadcast Medium Window (BMW) MAC protocol, which provides reliable delivery to broadcast packets at the MAC layer. We then extend the wireless On-Demand Multicast Routing Protocol (ODMRP) to facilitate congestion control in ad hoc networks using BMW. Through simulation, we show that ODMRP with congestion control adapts well to multicast sources that are aggressive in data transmissions.

  8. Topology Control in Large-Scale High Dynamic Mobile Ad-Hoc Networks

    NASA Astrophysics Data System (ADS)

    El-Habbal, Mohamed; Rückert, Ulrich; Witkowski, Ulf

    We present our contribution in projects related to ad-hoc networking using different routing protocols and hardware platforms, showing our results and new solutions regarding topology control and routing protocols. We mainly focus on our work in the GUARDIANS EU-project, where as a main disaster scenario a large industrial warehouse on fire is assumed. The paper presents the simulation results for the routing protocols ACR, DSR and EDSR, as well as the implementation of down-scaled demos for supporting the autonomous team of robots as well as the human squad team with robust communication coverage. Various hardware platforms were used in the demos for distance measurement, based on laser range finder and radio communication with time of flight analysis.

  9. Implementation and performance evaluation of mobile ad hoc network for Emergency Telemedicine System in disaster areas.

    PubMed

    Kim, J C; Kim, D Y; Jung, S M; Lee, M H; Kim, K S; Lee, C K; Nah, J Y; Lee, S H; Kim, J H; Choi, W J; Yoo, S K

    2009-01-01

    So far we have developed Emergency Telemedicine System (ETS) which is a robust system using heterogeneous networks. In disaster areas, however, ETS cannot be used if the primary network channel is disabled due to damages on the network infrastructures. Thus we designed network management software for disaster communication network by combination of Mobile Ad hoc Network (MANET) and Wireless LAN (WLAN). This software maintains routes to a Backbone Gateway Node in dynamic network topologies. In this paper, we introduce the proposed disaster communication network with management software, and evaluate its performance using ETS between Medical Center and simulated disaster areas. We also present the results of network performance analysis which identifies the possibility of actual Telemedicine Service in disaster areas via MANET and mobile network (e.g. HSDPA, WiBro). PMID:19964544

  10. Data Security in Ad Hoc Networks Using Randomization of Cryptographic Algorithms

    NASA Astrophysics Data System (ADS)

    Krishna, B. Ananda; Radha, S.; Keshava Reddy, K. Chenna

    Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The military tactical and other security-sensitive operations are still the main applications of ad hoc networks, although there is a trend to adopt ad hoc networks for commercial uses due to their unique properties. One main challenge in design of these networks is how to feasibly detect and defend the major attacks against data, impersonation and unauthorized data modification. Also, in the same network some nodes may be malicious whose objective is to degrade the network performance. In this study, we propose a security model in which the packets are encrypted and decrypted using multiple algorithms where the selection scheme is random. The performance of the proposed model is analyzed and it is observed that there is no increase in control overhead but a slight delay is introduced due to the encryption process. We conclude that the proposed security model works well for heavily loaded networks with high mobility and can be extended for more cryptographic algorithms.

  11. Work, Family, and Community: Summary Proceedings of an Ad Hoc Committee.

    ERIC Educational Resources Information Center

    Hayes, Cheryl D., Ed.

    These proceedings contain summaries of five working group discussions and a discussion of suggestions for future research from an ad hoc meeting on Work, Family, and Community (Fedruary 21-22, 1980) in Washington, D.C. The meeting had these objectives: (1) to identify salient policy and research issues associated with changing patterns of labor…

  12. The 5th Meeting of the Ad Hoc Panel on Terminal Configured Vehicles

    NASA Technical Reports Server (NTRS)

    1977-01-01

    A report of the fifth meeting of the NASA Research and Technology Advisory Council, Ad Hoc panel on Terminal Configured Vehicles is presented. Some of the following topics were discussed; (1) microwave landing systems; (2) whole word computer system status; (3) flight path angle control: (4) VTOL approaches and landing technology; and (5) simulation study in wind shear.

  13. Report of the Ad Hoc Committee on Religious and Cultural Celebrations in the Library.

    ERIC Educational Resources Information Center

    Rathemacher, Andree; Grubman, Sheila Black; Lahiri, Amar; Gilton, Donna; Sharif, Mohammed

    The charge of the University of Rhode Island's Ad Hoc Committee on Religious and Cultural Celebrations in the Library was to: investigate all opportunities for the library to educate the campus community about religious and cultural holidays; consider all the major religions of the world and the possibility of having displays for the symbols of…

  14. Report of the Council for Exceptional Children's Ad Hoc Committee on Medically Fragile Students.

    ERIC Educational Resources Information Center

    Council for Exceptional Children, Reston, VA.

    New opportunities are available for students with special health care needs requiring specialized technological health care procedures for life support and/or health support, and attention to appropriate educational programs is required. Guidelines proposed by the Council for Exceptional Children's Ad Hoc Committee on Medically Fragile Students…

  15. Final Report of the IAG AD Hoc Working Group on Global Change

    NASA Technical Reports Server (NTRS)

    Dickey, Jean O.

    1995-01-01

    None given. Paper gives final report of the IAG ad hoc working group on global change. They made three main recommendations to the group: 1. the post of and IAG liaison or representative to the IGBP should be established. 2. A new core program,.

  16. 75 FR 43565 - NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ... SPACE ADMINISTRATION NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting AGENCY: National Aeronautics and Space Administration. ACTION: Notice of meeting. SUMMARY: In accordance with the Federal Advisory Committee Act, Public Law 92-463, as amended, the National Aeronautics and...

  17. 75 FR 15742 - NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-30

    ... SPACE ADMINISTRATION NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting AGENCY: National Aeronautics and Space Administration. ACTION: Notice of meeting. SUMMARY: In accordance with the Federal Advisory Committee Act, Public Law 92-463, as amended, the National Aeronautics and...

  18. Protocols for Detection and Removal of Wormholes for Secure Routing and Neighborhood Creation in Wireless Ad Hoc Networks

    ERIC Educational Resources Information Center

    Hayajneh, Thaier Saleh

    2009-01-01

    Wireless ad hoc networks are suitable and sometimes the only solution for several applications. Many applications, particularly those in military and critical civilian domains (such as battlefield surveillance and emergency rescue) require that ad hoc networks be secure and stable. In fact, security is one of the main barriers to the extensive use…

  19. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks.

    PubMed

    Vara, M Isabel; Campo, Celeste

    2015-01-01

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead. PMID:26205272

  20. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks

    PubMed Central

    Vara, M. Isabel; Campo, Celeste

    2015-01-01

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead. PMID:26205272

  1. Characterizing the Interaction Between Routing and MAC Protocols in Ad-Hoc Networks

    SciTech Connect

    Barrett, C. L.; Drozda, M.; Marathe, A.; Marathe, M. V.

    2002-01-01

    We empirically study the effect of mobility on the performance of protocols designed for wireless ad-hoc networks. An important objective is to study the interaction of the Routing and MAC layer protocols under different mobility parameters. We use three basic mobility models: grid mobility model, random waypoint model, and exponential correlated random model. The performance of protocols is measured in terms of (i) latency, (ii) throughput, (iii) number of packets received, (iv) long term fairness and (v) number of control packets at the MAC and routing layer level. Three different commonly studied routing protocols are used: AODV, DSR and LAR1. Similarly three well known MAC protocols are used: MACA, 802.1 1 and CSMA. Our main contribution is simulation based experiments coupled with rigorous statistical analysis to characterize the interaction of MAC layer protocols with routing layer protocols in ad-hoc networks. From the results, we can conclude the following: e No single MAC or Routing protocol dominated the other protocols in their class. Probably more interestingly, no MAURouting protocol combination was better than other combinations over all scenarios and response variables. 0 In general, it is not meaningful to speak about a MAC or a routing protocol in isolation. Presence of interaction leads to trade-offs between the amount of control packets generated by each layer. The results raise the possibility of improving the performance of a particular MAC layer protocol by using a cleverly designed routing protocol or vice-versa. Thus in order to improve the performanceof a communication network, it is important to study the entire protocol stack as a single algorithmic construct; optimizing individual layers in the seven layer OS1 stack will not yield performance improvements beyond a point. A methodological contribution of this paper is the use of statistical methods such as analysis of variance (ANOVA), to characterize the interaction between the protocols

  2. Integrating Overlay Protocols for Providing Autonomic Services in Mobile Ad-Hoc Networks

    NASA Astrophysics Data System (ADS)

    Gouvas, Panagiotis; Zafeiropoulos, Anastasios; Liakopoulos, Athanassios; Mentzas, Gregoris; Mitrou, Nikolas

    Next generation network characteristics increase the complexity in the design and provision of advanced services, making inappropriate the selection of traditional approaches. Future networks are becoming larger in scale, more dynamic and more heterogeneous. In order to cope with these requirements, services are expected to adapt to environmental conditions and require minimum human intervention. In this paper a new model for providing autonomous and decentralized services is proposed, especially focusing on mobile ad hoc networks (MANETs). Using a newly proposed four-layered approach, service development may be realized independently from the underlying physical network. In a reference implementation, it is demonstrated that it is possible to set up an overlay network that hides any network changes from the service layer. Multiple mechanisms have been adapted in order to efficiently — in terms of message exchanges and convergence time — operate over an ad hoc environment. Finally, it is demonstrated that a specific service could operate over a dynamic network with multiple failures.

  3. Enhancements for distributed certificate authority approaches for mobile wireless ad hoc networks.

    SciTech Connect

    Van Leeuwen, Brian P.; Michalski, John T.; Anderson, William Erik

    2003-12-01

    Mobile wireless ad hoc networks that are resistant to adversarial manipulation are necessary for distributed systems used in military and security applications. Critical to the successful operation of these networks, which operate in the presence of adversarial stressors, are robust and efficient information assurance methods. In this report we describe necessary enhancements for a distributed certificate authority (CA) used in secure wireless network architectures. Necessary cryptographic algorithms used in distributed CAs are described and implementation enhancements of these algorithms in mobile wireless ad hoc networks are developed. The enhancements support a network's ability to detect compromised nodes and facilitate distributed CA services. We provide insights to the impacts the enhancements will have on network performance with timing diagrams and preliminary network simulation studies.

  4. Scope of practice in audiology. Ad Hoc Committee on scope of Practice in Audiology.

    PubMed

    1996-01-01

    This scope of practice in audiology statement is an official policy of the American Speech-Language Hearing Association (ASHA). The document was developed by the ASHA Ad Hoc Committee on the Scope of Practice in Audiology and approved in 1995 by the Legislative Council (8-95). Members of the ad hoc committee include David Wark (chair), Tamara Adkins, J. Michael Dennis, Dana L. Oviatt, Lori Williams, and Evelyn Cherow (ex officio). Lawrence Higdon, ASHA vice president for professional practices in audiology, served as monitoring vice president. This statement supersedes the Scope of Practice, Speech-Language Pathology and Audiology statement (LC 6-89), Asha, April 1990, 1-2. PMID:8680260

  5. PNNI routing support for ad hoc mobile networking: The multilevel case

    SciTech Connect

    Martinez, L.; Sholander, P.; Tolendino, L.

    1998-01-01

    This contribution extends the Outside Nodal Hierarchy List (ONHL) procedures described in ATM Forum Contributions 97-0766 and 97-0933. These extensions allow multiple mobile networks to form either an ad hoc network or an extension of a fixed PNNI infrastructure. A previous contribution (97-1073) covered the simplest case where the top-most Logical Group Nodes (LGNs), in those mobile networks, all resided at the same level in a PNNI hierarchy. This contribution covers the more general case wherein those top-most LGNs may reside at different PNNI hierarchy levels. Both of the SNL contributions consider flat ad hoc network architectures in the sense that each mobile network always participates in the PNNI hierarchy at the pre-configured level of its top-most LGN.

  6. The Ad Hoc process to strengthen the framework convention on climate change

    SciTech Connect

    Ramakrishna, K.; Deutz, A.M.; Jacobsen, L.A.

    1995-11-01

    The Woods Hole Research Center convened an International Conference on The Ad Hoc Process to Strengthen the Framework Convention on Climate Change in Woods Hole, MA, on October 7-9, 1995. The conference was conducted to examine the prospects for successful adoption of a protocol to the Framework Convention on Climate Change by 1997. In preparation for the Second session of the Ad Hoc Group on the Berlin Mandate, several governmental and nongovernmental representatives met in Woods Hole to discuss the process and possible outcome of the Berlin Mandate negotiations for a protocol or other legal instrument to strengthen the Convention. The conference was by invitation and all participants attended in their personal capacities.

  7. Forming an ad-hoc nearby storage, based on IKAROS and social networking services

    NASA Astrophysics Data System (ADS)

    Filippidis, Christos; Cotronis, Yiannis; Markou, Christos

    2014-06-01

    We present an ad-hoc "nearby" storage, based on IKAROS and social networking services, such as Facebook. By design, IKAROS is capable to increase or decrease the number of nodes of the I/O system instance on the fly, without bringing everything down or losing data. IKAROS is capable to decide the file partition distribution schema, by taking on account requests from the user or an application, as well as a domain or a Virtual Organization policy. In this way, it is possible to form multiple instances of smaller capacity higher bandwidth storage utilities capable to respond in an ad-hoc manner. This approach, focusing on flexibility, can scale both up and down and so can provide more cost effective infrastructures for both large scale and smaller size systems. A set of experiments is performed comparing IKAROS with PVFS2 by using multiple clients requests under HPC IOR benchmark and MPICH2.

  8. PNNI routing support for ad hoc mobile networking: A flat architecture

    SciTech Connect

    Martinez, L.; Sholander, P.; Tolendino, L.

    1997-12-01

    This contribution extends the Outside Nodal Hierarchy List (ONHL) procedures described in ATM Form Contribution 97-0766. These extensions allow multiple mobile networks to form either an ad hoc network or an extension of a fixed PNNI infrastructure. This contribution covers the simplest case where the top-most Logical Group Nodes (LGNs), in those mobile networks, all reside at the same level in a PNNI hierarchy. Future contributions will cover the general case where those top-most LGNs reside at different hierarchy levels. This contribution considers a flat ad hoc network architecture--in the sense that each mobile network always participates in the PNNI hierarchy at the preconfigured level of its top-most LGN.

  9. Adhoc: an R package to calculate ad hoc distance thresholds for DNA barcoding identification.

    PubMed

    Sonet, Gontran; Jordaens, Kurt; Nagy, Zoltán T; Breman, Floris C; De Meyer, Marc; Backeljau, Thierry; Virgilio, Massimiliano

    2013-12-30

    Identification by DNA barcoding is more likely to be erroneous when it is based on a large distance between the query (the barcode sequence of the specimen to identify) and its best match in a reference barcode library. The number of such false positive identifications can be decreased by setting a distance threshold above which identification has to be rejected. To this end, we proposed recently to use an ad hoc distance threshold producing identifications with an estimated relative error probability that can be fixed by the user (e.g. 5%). Here we introduce two R functions that automate the calculation of ad hoc distance thresholds for reference libraries of DNA barcodes. The scripts of both functions, a user manual and an example file are available on the JEMU website (http://jemu.myspecies.info/computer-programs) as well as on the comprehensive R archive network (CRAN, http://cran.r-project.org). PMID:24453565

  10. Adhoc: an R package to calculate ad hoc distance thresholds for DNA barcoding identification

    PubMed Central

    Sonet, Gontran; Jordaens, Kurt; Nagy, Zoltán T.; Breman, Floris C.; De Meyer, Marc; Backeljau, Thierry; Virgilio, Massimiliano

    2013-01-01

    Abstract Identification by DNA barcoding is more likely to be erroneous when it is based on a large distance between the query (the barcode sequence of the specimen to identify) and its best match in a reference barcode library. The number of such false positive identifications can be decreased by setting a distance threshold above which identification has to be rejected. To this end, we proposed recently to use an ad hoc distance threshold producing identifications with an estimated relative error probability that can be fixed by the user (e.g. 5%). Here we introduce two R functions that automate the calculation of ad hoc distance thresholds for reference libraries of DNA barcodes. The scripts of both functions, a user manual and an example file are available on the JEMU website (http://jemu.myspecies.info/computer-programs) as well as on the comprehensive R archive network (CRAN, http://cran.r-project.org). PMID:24453565

  11. Design of free patterns of nanocrystals with ad hoc features via templated dewetting

    SciTech Connect

    Aouassa, M.; Berbezier, I.; Favre, L.; Ronda, A.; Bollani, M.; Sordan, R.; Delobbe, A.; Sudraud, P.

    2012-07-02

    Design of monodisperse ultra-small nanocrystals (NCs) into large scale patterns with ad hoc features is demonstrated. The process makes use of solid state dewetting of a thin film templated through alloy liquid metal ion source focused ion beam (LMIS-FIB) nanopatterning. The solid state dewetting initiated at the edges of the patterns controllably creates the ordering of NCs with ad hoc placement and periodicity. The NC size is tuned by varying the nominal thickness of the film while their position results from the association of film retraction from the edges of the lay out and Rayleigh-like instability. The use of ultra-high resolution LMIS-FIB enables to produce monocrystalline NCs with size, periodicity, and placement tunable as well. It provides routes for the free design of nanostructures for generic applications in nanoelectronics.

  12. An Ad-Hoc Adaptive Pilot Model for Pitch Axis Gross Acquisition Tasks

    NASA Technical Reports Server (NTRS)

    Hanson, Curtis E.

    2012-01-01

    An ad-hoc algorithm is presented for real-time adaptation of the well-known crossover pilot model and applied to pitch axis gross acquisition tasks in a generic fighter aircraft. Off-line tuning of the crossover model to human pilot data gathered in a fixed-based high fidelity simulation is first accomplished for a series of changes in aircraft dynamics to provide expected values for model parameters. It is shown that in most cases, for this application, the traditional crossover model can be reduced to a gain and a time delay. The ad-hoc adaptive pilot gain algorithm is shown to have desirable convergence properties for most types of changes in aircraft dynamics.

  13. Vehicular ad hoc network for a surveillance system using multifrequency band enhancement

    NASA Astrophysics Data System (ADS)

    Bunruangses, Montree; Sunat, Khamron; Mitatha, Somsak; Yupapin, Preecha P.

    2010-09-01

    We present a new design of a surveillance system via a vehicular ad hoc network (VANET) integrated by a 3-G or 4-G cellular wireless network. We propose dense wavelength division multiplexing wavelength enhancement for increasing the channel capacity and signal security. Increase in the number of channels can be obtained by increasing the wavelength density. Signal security is introduced by a specific wavelength filter controlled by the central operator. Optical communication wavelength enhancement is reviewed. The advantage of this proposed system is that it can easily be implemented and incorporated into the existing communication link in either a cellular or ad hoc wireless system, where signal security and hence privacy can be provided.

  14. RHINO: armoured plated networking with intelligent high speed wireless ad hoc capability

    NASA Astrophysics Data System (ADS)

    Markarian, Garik; Singh, Farid

    2008-04-01

    This paper describes the concept of an intelligent high speed wireless ad-hoc network, which is currently being developed. The technology aims at, not replacing any of the existing standards, but aims to complement them in urban, military and hazardous environments. Known as Rhino, the technology is a platform independent, IP based network which will provide adequate bandwidth for real time video, audio and data traffic. The technology and specifications described in this paper are based on initial development of the technology.

  15. VoIP Implementation and Experiments on a Mobile Wireless AdHoc Network

    NASA Astrophysics Data System (ADS)

    Zhang, Hongqi; Yang, Oliver; Zhao, Jiying

    We have implemented a testbed to study the performance of VoIP in wireless ad hoc networks. The ASNC (Adaptive Source Network-rate Control) scheme is used to battle packet loss by feeding MOS (Mean Opinion Score) and loss information back to the sender. Our different VoIP experiments with measurements on delay, packet loss rate and MOS have validated the feasibility and efficiency of our scheme. It further verifies the simulator we used in the initial investigation.

  16. EGPS: An Efficient Privacy Preserving Scheme for Vehicular ad hoc Networks

    NASA Astrophysics Data System (ADS)

    Zhao, Baokang; Su, Xiangyu; Su, Jinshu; Song, Ziming; Sun, Yipin; Tao, Jing; Tang, Yong; Chen, Shuhui; Zhao, Guohong; Chen, Yijiao

    2010-09-01

    In this paper, we propose EGPS, an efficient privacy preserving scheme for vehicular ad hoc networks. The EGPS scheme is based on a very efficient group signature and Identity Based Cryptography(IBC) techniques. Several security properties of EGPS, including the correctness and unforgeability have been proved. Furthermore, EGPS is also proved to be more efficient than GSIS, which is currently one of the best state-of-the-art VANET privacy preserving schemes.

  17. In search of reflective behavior and shared understanding in ad hoc expert teams.

    PubMed

    Mulder, Ingrid; Swaak, Janine; Kessels, Joseph

    2004-04-01

    The work reported on here concentrates on virtual ad hoc expert teams for the integration of learning and working, as ad hoc teams seem to be one way to cope with complexity in a knowledge-intensive society. In order to let ad hoc teams learn and work together, group members require effective communication and shared understanding among each other. Two empirical studies were conducted to study collaborative learning and shared understanding, one exploratory study and one experiment. In the first study, it was explored how virtual design teams work and learn together. Based on conceptual ideas, collaborative learning and shared understanding were observed and assessed in a design team over a period of four months. It was concluded that shared understanding was suboptimal; mainly due to the effect that hardly any questions were raised and answered. The second study elaborates on the need to encourage question-answer patterns and reflective behavior in such teams. A tool was developed that supported questioning behavior. As it was hypothesized that this tool leads to better questioning behavior, which in turn results in more reflective behavior and in increased shared understanding, an experiment was conducted. In the exploratory study, as well as in the experimental study, the perceived shared understanding increased over time. However, in both studies suboptimal questioning behavior and little reflective activity were noticed. The main results of the two empirical studies are compared and discussed. PMID:15140358

  18. Real Time Semantic Interoperability in AD HOC Networks of Geospatial Data Sources: Challenges, Achievements and Perspectives

    NASA Astrophysics Data System (ADS)

    Mostafavi, M. A.; Bakillah, M.

    2012-07-01

    Recent advances in geospatial technologies have made available large amount of geospatial data. Meanwhile, new developments in Internet and communication technologies created a shift from isolated geospatial databases to ad hoc networks of geospatial data sources, where data sources can join or leave the network, and form groups to share data and services. However, effective integration and sharing of geospatial data among these data sources and their users are hampered by semantic heterogeneities. These heterogeneities affect the spatial, temporal and thematic aspects of geospatial concepts. There have been many efforts to address semantic interoperability issues in the geospatial domain. These efforts were mainly focused on resolving heterogeneities caused by different and implicit representations of the concepts. However, many approaches have focused on the thematic aspects, leaving aside the explicit representation of spatial and temporal aspects. Also, most semantic interoperability approaches for networks have focused on automating the semantic mapping process. However, the ad hoc network structure is continuously modified by source addition or removal, formation of groups, etc. This dynamic aspect is often neglected in those approaches. This paper proposes a conceptual framework for real time semantic interoperability in ad hoc networks of geospatial data sources. The conceptual framework presents the fundamental elements of real time semantic interoperability through a hierarchy of interrelated semantic states and processes. Then, we use the conceptual framework to set the discussion on the achievements that have already been made, the challenges that remain to be addressed and perspectives with respect to these challenges.

  19. An artificial immune system approach with secondary response for misbehavior detection in mobile ad hoc networks.

    PubMed

    Sarafijanović, Slavisa; Le Boudec, Jean-Yves

    2005-09-01

    In mobile ad hoc networks, nodes act both as terminals and information relays, and they participate in a common routing protocol, such as dynamic source routing (DSR). The network is vulnerable to routing misbehavior, due to faulty or malicious nodes. Misbehavior detection systems aim at removing this vulnerability. In this paper, we investigate the use of an artificial immune system (AIS) to detect node misbehavior in a mobile ad hoc network using DSR. The system is inspired by the natural immune system (IS) of vertebrates. Our goal is to build a system that, like its natural counterpart, automatically learns, and detects new misbehavior. We describe our solution for the classification task of the AIS; it employs negative selection and clonal selection, the algorithms for learning and adaptation used by the natural IS. We define how we map the natural IS concepts such as self, antigen, and antibody to a mobile ad hoc network and give the resulting algorithm for classifying nodes as misbehaving. We implemented the system in the network simulator Glomosim; we present detection results and discuss how the system parameters affect the performance of primary and secondary response. Further steps will extend the design by using an analogy to the innate system, danger signal, and memory cells. PMID:16252818

  20. A Dirichlet reputation system in reliable routing of wireless ad hoc network

    SciTech Connect

    Yang, Dr. Li; Cui, Xiaohui; Cemerlic, Alma

    2010-01-01

    Ad hoc networks are very helpful in situations when no fixed network infrastructure is available, such as natural disasters and military conflicts. In such a network, all wireless nodes are equal peers simultaneously serving as both senders and routers for other nodes. Therefore, how to route packets through reliable paths becomes a fundamental problems when behaviors of certain nodes deviate from wireless ad hoc routing protocols. We proposed a novel Dirichlet reputation model based on Bayesian inference theory which evaluates reliability of each node in terms of packet delivery. Our system offers a way to predict and select a reliable path through combination of first-hand observation and second-hand reputation reports. We also proposed moving window mechanism which helps to adjust ours responsiveness of our system to changes of node behaviors. We integrated the Dirichlet reputation into routing protocol of wireless ad hoc networks. Our extensive simulation indicates that our proposed reputation system can improve good throughput of the network and reduce negative impacts caused by misbehaving nodes.

  1. Systematic lossy error protection for video transmission over wireless ad hoc networks

    NASA Astrophysics Data System (ADS)

    Zhu, Xiaoqing; Rane, Shantanu; Girod, Bernd

    2005-07-01

    Wireless ad hoc networks present a challenge for error-resilient video transmission, since node mobility and multipath fading result in time-varying link qualities in terms of packet loss ratio and available bandwidth. In this paper, we propose to use a systematic lossy error protection (SLEP) scheme for video transmission over wireless ad hoc networks. The transmitted video signal has two parts-a systematic portion consisting of a video sequence transmitted without channel coding over an error-prone channel, and error protection information consisting of a bitstream generated by Wyner-Ziv encoding of the video sequence. Using an end-to-end video distortion model in conjunction with online estimates of packet loss ratio and available bandwidth, the optimal Wyner-Ziv description can be selected dynamically according to current channel conditions. The scheme can also be applied to choose one path for transmission from amongst multiple candidate routes with varying available bandwidths and packet loss ratios, so that the expected end-to-end video distortion is maximized. Experimental results of video transmission over a simulated ad hoc wireless network shows that the proposed SLEP scheme outperforms the conventional application layer FEC approach in that it provides graceful degradation of received video quality over a wider range of packet loss ratios and is less susceptible to inaccuracy in the packet loss ratio estimation.

  2. Dynamic Agent Classification and Tracking Using an Ad Hoc Mobile Acoustic Sensor Network

    NASA Astrophysics Data System (ADS)

    Friedlander, David; Griffin, Christopher; Jacobson, Noah; Phoha, Shashi; Brooks, Richard R.

    2003-12-01

    Autonomous networks of sensor platforms can be designed to interact in dynamic and noisy environments to determine the occurrence of specified transient events that define the dynamic process of interest. For example, a sensor network may be used for battlefield surveillance with the purpose of detecting, identifying, and tracking enemy activity. When the number of nodes is large, human oversight and control of low-level operations is not feasible. Coordination and self-organization of multiple autonomous nodes is necessary to maintain connectivity and sensor coverage and to combine information for better understanding the dynamics of the environment. Resource conservation requires adaptive clustering in the vicinity of the event. This paper presents methods for dynamic distributed signal processing using an ad hoc mobile network of microsensors to detect, identify, and track targets in noisy environments. They seamlessly integrate data from fixed and mobile platforms and dynamically organize platforms into clusters to process local data along the trajectory of the targets. Local analysis of sensor data is used to determine a set of target attribute values and classify the target. Sensor data from a field test in the Marine base at Twentynine Palms, Calif, was analyzed using the techniques described in this paper. The results were compared to "ground truth" data obtained from GPS receivers on the vehicles.

  3. Emergency Situation Prediction Mechanism: A Novel Approach for Intelligent Transportation System Using Vehicular Ad Hoc Networks

    PubMed Central

    Gokulakrishnan, P.

    2015-01-01

    In Indian four-lane express highway, millions of vehicles are travelling every day. Accidents are unfortunate and frequently occurring in these highways causing deaths, increase in death toll, and damage to infrastructure. A mechanism is required to avoid such road accidents at the maximum to reduce the death toll. An Emergency Situation Prediction Mechanism, a novel and proactive approach, is proposed in this paper for achieving the best of Intelligent Transportation System using Vehicular Ad Hoc Network. ESPM intends to predict the possibility of occurrence of an accident in an Indian four-lane express highway. In ESPM, the emergency situation prediction is done by the Road Side Unit based on (i) the Status Report sent by the vehicles in the range of RSU and (ii) the road traffic flow analysis done by the RSU. Once the emergency situation or accident is predicted in advance, an Emergency Warning Message is constructed and disseminated to all vehicles in the area of RSU to alert and prevent the vehicles from accidents. ESPM performs well in emergency situation prediction in advance to the occurrence of an accident. ESPM predicts the emergency situation within 0.20 seconds which is comparatively less than the statistical value. The prediction accuracy of ESPM against vehicle density is found better in different traffic scenarios. PMID:26065014

  4. An adaptive neural swarm approach for intrusion defense in ad hoc networks

    NASA Astrophysics Data System (ADS)

    Cannady, James

    2011-06-01

    Wireless sensor networks (WSN) and mobile ad hoc networks (MANET) are being increasingly deployed in critical applications due to the flexibility and extensibility of the technology. While these networks possess numerous advantages over traditional wireless systems in dynamic environments they are still vulnerable to many of the same types of host-based and distributed attacks common to those systems. Unfortunately, the limited power and bandwidth available in WSNs and MANETs, combined with the dynamic connectivity that is a defining characteristic of the technology, makes it extremely difficult to utilize traditional intrusion detection techniques. This paper describes an approach to accurately and efficiently detect potentially damaging activity in WSNs and MANETs. It enables the network as a whole to recognize attacks, anomalies, and potential vulnerabilities in a distributive manner that reflects the autonomic processes of biological systems. Each component of the network recognizes activity in its local environment and then contributes to the overall situational awareness of the entire system. The approach utilizes agent-based swarm intelligence to adaptively identify potential data sources on each node and on adjacent nodes throughout the network. The swarm agents then self-organize into modular neural networks that utilize a reinforcement learning algorithm to identify relevant behavior patterns in the data without supervision. Once the modular neural networks have established interconnectivity both locally and with neighboring nodes the analysis of events within the network can be conducted collectively in real-time. The approach has been shown to be extremely effective in identifying distributed network attacks.

  5. Further Development of Synchronous Array Method for Ad Hoc Wireless Networks

    NASA Astrophysics Data System (ADS)

    Yu, Yuan; Huang, Yi; Zhao, Bin; Hua, Yingbo

    2008-12-01

    A further development of the synchronous array method (SAM) as a medium access control scheme for large-scale ad hoc wireless networks is presented. Under SAM, all transmissions of data packets between adjacent nodes are synchronized on a frame-by-frame basis, and the spacing between concurrent cochannel transmissions of data packets is properly controlled. An opportunistic SAM (O-SAM) is presented which allows concurrent cochannel transmissions to be locally adaptive to channel gain variations. A distributed SAM (D-SAM) is discussed that schedules all concurrent cochannel transmissions in a distributed fashion. For networks of low mobility, the control overhead required by SAM can be made much smaller than the payload. By analysis and simulation, the intranetwork throughput of O-SAM and D-SAM is evaluated. The effects of traffic load and multiple antennas on the intranetwork throughput are studied. The throughput of ALOHA is also analyzed and compared with that of O-SAM and D-SAM. By a distance-weighted throughput, a comparison of long distance transmission versus short distance transmission is also presented. The study of D-SAM reveals an important insight into the MSH-DSCH protocol adopted in IEEE 802.16 standards.

  6. Ad Hoc modeling, expert problem solving, and R&T program evaluation

    NASA Technical Reports Server (NTRS)

    Silverman, B. G.; Liebowitz, J.; Moustakis, V. S.

    1983-01-01

    A simplified cost and time (SCAT) analysis program utilizing personal-computer technology is presented and demonstrated in the case of the NASA-Goddard end-to-end data system. The difficulties encountered in implementing complex program-selection and evaluation models in the research and technology field are outlined. The prototype SCAT system described here is designed to allow user-friendly ad hoc modeling in real time and at low cost. A worksheet constructed on the computer screen displays the critical parameters and shows how each is affected when one is altered experimentally. In the NASA case, satellite data-output and control requirements, ground-facility data-handling capabilities, and project priorities are intricately interrelated. Scenario studies of the effects of spacecraft phaseout or new spacecraft on throughput and delay parameters are shown. The use of a network of personal computers for higher-level coordination of decision-making processes is suggested, as a complement or alternative to complex large-scale modeling.

  7. Sketching Awareness: A Participatory Study to Elicit Designs for Supporting Ad Hoc Emergency Medical Teamwork

    PubMed Central

    Kusunoki, Diana; Sarcevic, Aleksandra; Zhang, Zhan; Yala, Maria

    2014-01-01

    Prior CSCW research on awareness in clinical settings has mostly focused on higher-level team coordination spanning across longer-term trajectories at the department and inter-department levels. In this paper, we offer a perspective on what awareness means within the context of an ad hoc, time- and safety-critical medical setting by looking at teams treating severely ill patients with urgent needs. We report findings from four participatory design workshops conducted with emergency medicine clinicians at two regional emergency departments. Workshops were developed to elicit design ideas for information displays that support awareness in emergency medical situations. Through analysis of discussions and clinicians’ sketches of information displays, we identified five features of teamwork that can be used as a foundation for supporting awareness from the perspective of clinicians. Based on these findings, we contribute rich descriptions of four facets of awareness that teams manage during emergency medical situations: team member awareness, elapsed time awareness, teamwork-oriented and patient-driven task awareness, and overall progress awareness. We then discuss these four awareness types in relation to awareness facets found in the CSCW literature. PMID:25870498

  8. A Game Theory Algorithm for Intra-Cluster Data Aggregation in a Vehicular Ad Hoc Network.

    PubMed

    Chen, Yuzhong; Weng, Shining; Guo, Wenzhong; Xiong, Naixue

    2016-01-01

    Vehicular ad hoc networks (VANETs) have an important role in urban management and planning. The effective integration of vehicle information in VANETs is critical to traffic analysis, large-scale vehicle route planning and intelligent transportation scheduling. However, given the limitations in the precision of the output information of a single sensor and the difficulty of information sharing among various sensors in a highly dynamic VANET, effectively performing data aggregation in VANETs remains a challenge. Moreover, current studies have mainly focused on data aggregation in large-scale environments but have rarely discussed the issue of intra-cluster data aggregation in VANETs. In this study, we propose a multi-player game theory algorithm for intra-cluster data aggregation in VANETs by analyzing the competitive and cooperative relationships among sensor nodes. Several sensor-centric metrics are proposed to measure the data redundancy and stability of a cluster. We then study the utility function to achieve efficient intra-cluster data aggregation by considering both data redundancy and cluster stability. In particular, we prove the existence of a unique Nash equilibrium in the game model, and conduct extensive experiments to validate the proposed algorithm. Results demonstrate that the proposed algorithm has advantages over typical data aggregation algorithms in both accuracy and efficiency. PMID:26907272

  9. A Game Theory Algorithm for Intra-Cluster Data Aggregation in a Vehicular Ad Hoc Network

    PubMed Central

    Chen, Yuzhong; Weng, Shining; Guo, Wenzhong; Xiong, Naixue

    2016-01-01

    Vehicular ad hoc networks (VANETs) have an important role in urban management and planning. The effective integration of vehicle information in VANETs is critical to traffic analysis, large-scale vehicle route planning and intelligent transportation scheduling. However, given the limitations in the precision of the output information of a single sensor and the difficulty of information sharing among various sensors in a highly dynamic VANET, effectively performing data aggregation in VANETs remains a challenge. Moreover, current studies have mainly focused on data aggregation in large-scale environments but have rarely discussed the issue of intra-cluster data aggregation in VANETs. In this study, we propose a multi-player game theory algorithm for intra-cluster data aggregation in VANETs by analyzing the competitive and cooperative relationships among sensor nodes. Several sensor-centric metrics are proposed to measure the data redundancy and stability of a cluster. We then study the utility function to achieve efficient intra-cluster data aggregation by considering both data redundancy and cluster stability. In particular, we prove the existence of a unique Nash equilibrium in the game model, and conduct extensive experiments to validate the proposed algorithm. Results demonstrate that the proposed algorithm has advantages over typical data aggregation algorithms in both accuracy and efficiency. PMID:26907272

  10. Dynamic autonomous routing technology for IP-based satellite ad hoc networks

    NASA Astrophysics Data System (ADS)

    Wang, Xiaofei; Deng, Jing; Kostas, Theresa; Rajappan, Gowri

    2014-06-01

    IP-based routing for military LEO/MEO satellite ad hoc networks is very challenging due to network and traffic heterogeneity, network topology and traffic dynamics. In this paper, we describe a traffic priority-aware routing scheme for such networks, namely Dynamic Autonomous Routing Technology (DART) for satellite ad hoc networks. DART has a cross-layer design, and conducts routing and resource reservation concurrently for optimal performance in the fluid but predictable satellite ad hoc networks. DART ensures end-to-end data delivery with QoS assurances by only choosing routing paths that have sufficient resources, supporting different packet priority levels. In order to do so, DART incorporates several resource management and innovative routing mechanisms, which dynamically adapt to best fit the prevailing conditions. In particular, DART integrates a resource reservation mechanism to reserve network bandwidth resources; a proactive routing mechanism to set up non-overlapping spanning trees to segregate high priority traffic flows from lower priority flows so that the high priority flows do not face contention from low priority flows; a reactive routing mechanism to arbitrate resources between various traffic priorities when needed; a predictive routing mechanism to set up routes for scheduled missions and for anticipated topology changes for QoS assurance. We present simulation results showing the performance of DART. We have conducted these simulations using the Iridium constellation and trajectories as well as realistic military communications scenarios. The simulation results demonstrate DART's ability to discriminate between high-priority and low-priority traffic flows and ensure disparate QoS requirements of these traffic flows.

  11. Soil Property Mapping Over Large Areas Using Sparse Ad-hoc Samples

    NASA Astrophysics Data System (ADS)

    Zhu, A.; Liu, J.

    2011-12-01

    Information on spatial variation of soil properties over large areas is a critical input for environmental modeling at large scales. Yet, quality information on soil spatial variation over large areas is difficult to obtain due to the large number of field samples required. Existing samples are often sparse and ad-hoc. The soil property maps created from these samples using existing techniques are not only at low quality but also lack the uncertainty information. This paper presents a new approach to map soil properties and quantify uncertainty in the derived soil property maps over large areas using sparse and ad-hoc samples. The underlying assumption of this new approach is the soil-landscape concept which stipulates that the more similar the environment conditions between two locations the more similar the soil property values are between the two sites. Under this assumption each sample can be considered as a representative over areas of similar environmental conditions. The level of representation of an individual sample for an unsampled location can be approximated by the similarity between their respective environment conditions. Based on this "individual representation" concept and with a Case-based Reasoning (CBR) approach soil property values at unsampled locations can be predicted and the uncertainty associated with each prediction can also be quantified based on their environmental similarity to individual samples. A case study over the Illy Region, a 50,000 km2 area in Xinjiang, Northwest China, has demonstrated that the approach can be an effective alternative for mapping soil property and quantifying uncertainty over large areas with sparse and ad-hoc samples.

  12. Panel Discussion : Report of the APS Ad-Hoc Committee on LGBT Issues

    NASA Astrophysics Data System (ADS)

    Atherton, Tim; Barthelemy, Ramon; Garmon, Savannah; Reeves, Kyle; APS Ad-Hoc Committee on LGBT Issues Team

    Following the presentation of the findings and recommendations of the APS Ad-Hoc Committee on LGBT Issues (C-LGBT) by Committee Chair Michael Falk, a panel discussion will be held featuring several members of the committee. The discussion will focus on how APS can best ensure the recommendations of the committee are carried out in a timely fashion and other ideas on future APS efforts toward LGBT inclusion in physics. Discussion topics will also include the research and other input that shaped the committee's findings and recommendations.

  13. Joint Random Access and Power Control Game in Ad Hoc Networks with Noncooperative Users

    NASA Astrophysics Data System (ADS)

    Long, Chengnian; Guan, Xinping

    We consider a distributed joint random access and power control scheme for interference management in wireless ad hoc networks. To derive decentralized solutions that do not require any cooperation among the users, we formulate this problem as non-cooperative joint random access and power control game, in which each user minimizes its average transmission cost with a given rate constraint. Using supermodular game theory, the existence and uniqueness of Nash equilibrium are established. Furthermore, we present an asynchronous distributed algorithm to compute the solution of the game based on myopic best response updates, which converges to Nash equilibrium globally.

  14. Smart border: ad-hoc wireless sensor networks for border surveillance

    NASA Astrophysics Data System (ADS)

    He, Jun; Fallahi, Mahmoud; Norwood, Robert A.; Peyghambarian, Nasser

    2011-06-01

    Wireless sensor networks have been proposed as promising candidates to provide automated monitoring, target tracking, and intrusion detection for border surveillance. In this paper, we demonstrate an ad-hoc wireless sensor network system for border surveillance. The network consists of heterogeneously autonomous sensor nodes that distributively cooperate with each other to enable a smart border in remote areas. This paper also presents energy-aware and sleeping algorithms designed to maximize the operating lifetime of the deployed sensor network. Lessons learned in building the network and important findings from field experiments are shared in the paper.

  15. IDMA: improving the defense against malicious attack for mobile ad hoc networks based on ARIP protocol

    NASA Astrophysics Data System (ADS)

    Peng, Chaorong; Chen, Chang Wen

    2008-04-01

    Malicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks (MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes. However, the defense against malicious attack can be improved when a new layer of network architecture can be developed to separate true IP address from disclosing to the malicious nodes. In this paper, we propose a new algorithm to improve the defense against malicious attack (IDMA) that is based on a recently developed Assignment Router Identify Protocol (ARIP) for the clustering-based MANET management. In the ARIP protocol, we design the ARIP architecture based on the new Identity instead of the vulnerable IP addresses to provide the required security that is embedded seamlessly into the overall network architecture. We make full use of ARIP's special property to monitor gateway forward packets by Reply Request Route Packets (RREP) without additional intrusion detection layer. We name this new algorithm IDMA because of its inherent capability to improve the defense against malicious attacks. Through IDMA, a watching algorithm can be established so as to counterattack the malicious node in the routing path when it unusually drops up packets. We provide analysis examples for IDMA for the defense against a malicious node that disrupts the route discovery by impersonating the destination, or by responding with state of corrupted routing information, or by disseminating forged control traffic. The IDMA algorithm is able to counterattack the malicious node in the cases when the node lunch DoS attack by broadcast a large number of route requests, or make Target traffic congestion by delivering huge mount of data; or spoof the IP addresses and send forge packets with a fake ID to the same Target causing traffic congestion at that destination. We have implemented IDMA algorism using the GloMoSim simulator and have demonstrated its performance under a variety of

  16. Linking Satellites Via Earth "Hot Spots" and the Internet to Form Ad Hoc Constellations

    NASA Technical Reports Server (NTRS)

    Mandl, Dan; Frye, Stu; Grosvenor, Sandra; Ingram, Mary Ann; Langley, John; Miranda, Felix; Lee, Richard Q.; Romanofsky, Robert; Zaman, Afoz; Popovic, Zoya

    2004-01-01

    As more assets are placed in orbit, opportunities emerge to combine various sets of satellites in temporary constellations to perform collaborative image collections. Often, new operations concepts for a satellite or set of satellites emerge after launch. To the degree with which new space assets can be inexpensively and rapidly integrated into temporary or "ad hoc" constellations, will determine whether these new ideas will be implemented or not. On the Earth Observing 1 (EO-1) satellite, a New Millennium Program mission, a number of experiments were conducted and are being conducted to demonstrate various aspects of an architecture that, when taken as a whole, will enable progressive mission autonomy. In particular, the target architecture will use adaptive ground antenna arrays to form, as close as possible, the equivalent of wireless access points for low earth orbiting satellites. Coupled with various ground and flight software and the Internet. the architecture enables progressive mission autonomy. Thus, new collaborative sensing techniques can be implemented post-launch. This paper will outline the overall operations concept and highlight details of both the research effort being conducted in ad hoc constellations, mission autonomy and

  17. Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization in Mobile Ad Hoc Networks

    PubMed Central

    Robinson, Y. Harold; Rajaram, M.

    2015-01-01

    Mobile ad hoc network (MANET) is a collection of autonomous mobile nodes forming an ad hoc network without fixed infrastructure. Dynamic topology property of MANET may degrade the performance of the network. However, multipath selection is a great challenging task to improve the network lifetime. We proposed an energy-aware multipath routing scheme based on particle swarm optimization (EMPSO) that uses continuous time recurrent neural network (CTRNN) to solve optimization problems. CTRNN finds the optimal loop-free paths to solve link disjoint paths in a MANET. The CTRNN is used as an optimum path selection technique that produces a set of optimal paths between source and destination. In CTRNN, particle swarm optimization (PSO) method is primly used for training the RNN. The proposed scheme uses the reliability measures such as transmission cost, energy factor, and the optimal traffic ratio between source and destination to increase routing performance. In this scheme, optimal loop-free paths can be found using PSO to seek better link quality nodes in route discovery phase. PSO optimizes a problem by iteratively trying to get a better solution with regard to a measure of quality. The proposed scheme discovers multiple loop-free paths by using PSO technique. PMID:26819966

  18. Opportunistic Hybrid Transport Protocol (OHTP) for Cognitive Radio Ad Hoc Sensor Networks.

    PubMed

    Bin Zikria, Yousaf; Nosheen, Summera; Ishmanov, Farruh; Kim, Sung Won

    2015-01-01

    The inefficient assignment of spectrum for different communications purposes, plus technology enhancements and ever-increasing usage of wireless technology is causing spectrum scarcity. To address this issue, one of the proposed solutions in the literature is to access the spectrum dynamically or opportunistically. Therefore, the concept of cognitive radio appeared, which opens up a new research paradigm. There is extensive research on the physical, medium access control and network layers. The impact of the transport layer on the performance of cognitive radio ad hoc sensor networks is still unknown/unexplored. The Internet's de facto transport protocol is not well suited to wireless networks because of its congestion control mechanism. We propose an opportunistic hybrid transport protocol for cognitive radio ad hoc sensor networks. We developed a new congestion control mechanism to differentiate true congestion from interruption loss. After such detection and differentiation, we propose methods to handle them opportunistically. There are several benefits to window- and rate-based protocols. To exploit the benefits of both in order to enhance overall system performance, we propose a hybrid transport protocol. We empirically calculate the optimal threshold value to switch between window- and rate-based mechanisms. We then compare our proposed transport protocol to Transmission Control Protocol (TCP)-friendly rate control, TCP-friendly rate control for cognitive radio, and TCP-friendly window-based control. We ran an extensive set of simulations in Network Simulator 2. The results indicate that the proposed transport protocol performs better than all the others. PMID:26694396

  19. Greedy data transportation scheme with hard packet deadlines for wireless ad hoc networks.

    PubMed

    Lee, HyungJune

    2014-01-01

    We present a greedy data transportation scheme with hard packet deadlines in ad hoc sensor networks of stationary nodes and multiple mobile nodes with scheduled trajectory path and arrival time. In the proposed routing strategy, each stationary ad hoc node en route decides whether to relay a shortest-path stationary node toward destination or a passing-by mobile node that will carry closer to destination. We aim to utilize mobile nodes to minimize the total routing cost as far as the selected route can satisfy the end-to-end packet deadline. We evaluate our proposed routing algorithm in terms of routing cost, packet delivery ratio, packet delivery time, and usability of mobile nodes based on network level simulations. Simulation results show that our proposed algorithm fully exploits the remaining time till packet deadline to turn into networking benefits of reducing the overall routing cost and improving packet delivery performance. Also, we demonstrate that the routing scheme guarantees packet delivery with hard deadlines, contributing to QoS improvement in various network services. PMID:25258736

  20. A Secure 3-Way Routing Protocols for Intermittently Connected Mobile Ad Hoc Networks

    PubMed Central

    Parasuraman, Ganesh Kumar

    2014-01-01

    The mobile ad hoc network may be partially connected or it may be disconnected in nature and these forms of networks are termed intermittently connected mobile ad hoc network (ICMANET). The routing in such disconnected network is commonly an arduous task. Many routing protocols have been proposed for routing in ICMANET since decades. The routing techniques in existence for ICMANET are, namely, flooding, epidemic, probabilistic, copy case, spray and wait, and so forth. These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth. Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters. The algorithm along with efficient routing ensures higher degree of security. The security level is cited testing with respect to possibility of malicious nodes into the network. This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET. PMID:25136697

  1. Greedy Data Transportation Scheme with Hard Packet Deadlines for Wireless Ad Hoc Networks

    PubMed Central

    Lee, HyungJune

    2014-01-01

    We present a greedy data transportation scheme with hard packet deadlines in ad hoc sensor networks of stationary nodes and multiple mobile nodes with scheduled trajectory path and arrival time. In the proposed routing strategy, each stationary ad hoc node en route decides whether to relay a shortest-path stationary node toward destination or a passing-by mobile node that will carry closer to destination. We aim to utilize mobile nodes to minimize the total routing cost as far as the selected route can satisfy the end-to-end packet deadline. We evaluate our proposed routing algorithm in terms of routing cost, packet delivery ratio, packet delivery time, and usability of mobile nodes based on network level simulations. Simulation results show that our proposed algorithm fully exploits the remaining time till packet deadline to turn into networking benefits of reducing the overall routing cost and improving packet delivery performance. Also, we demonstrate that the routing scheme guarantees packet delivery with hard deadlines, contributing to QoS improvement in various network services. PMID:25258736

  2. New efficiency algorithm for flooding the packet in wireless ad hoc networks

    NASA Astrophysics Data System (ADS)

    Lee, Kyuhwan; Ma, Joongsoo

    2002-08-01

    This paper proposes a novel flooding algorithm based on an existing IEEE 802.11 MAC protocol in wireless ad hoc networks. Currently when we use the multi-hop routing algorithm, such as the Ad hoc On-demand Distance Vector (AODV) algorithm, the Cluster-Based Routing Protocol (CBRP) and so on, we frequently use the broadcast packet in order to get the topology information. At this time all nodes receiving the packet try to forward the received packet to other nodes. If a number of nodes are located in the sender's coverage, the channel is busy due to the delivery of the received packet. With respect to the coverage of the IEEE 802.11, the utilization factor of the wireless network is decreased because of occupying the channel to distribute the received packet. Thus we propose the new algorithm to resolve this problem. In this algorithm, each node maintains a table of immediate neighbors as well as each neighbor's neighbors. When each node receiving broadcast packets in the sender's coverage forwards the packets, it decides whether to forward them or not by comparing the neighbor list of receiver with that of sender. The proposed algorithm can increase the network efficiency due to the decrease in frequency of broadcast packets in the multi-hop routing protocol. Finally, we evaluate the improved performance through the simulation.

  3. A secure 3-way routing protocols for intermittently connected mobile ad hoc networks.

    PubMed

    Sekaran, Ramesh; Parasuraman, Ganesh Kumar

    2014-01-01

    The mobile ad hoc network may be partially connected or it may be disconnected in nature and these forms of networks are termed intermittently connected mobile ad hoc network (ICMANET). The routing in such disconnected network is commonly an arduous task. Many routing protocols have been proposed for routing in ICMANET since decades. The routing techniques in existence for ICMANET are, namely, flooding, epidemic, probabilistic, copy case, spray and wait, and so forth. These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth. Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters. The algorithm along with efficient routing ensures higher degree of security. The security level is cited testing with respect to possibility of malicious nodes into the network. This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET. PMID:25136697

  4. Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization in Mobile Ad Hoc Networks.

    PubMed

    Robinson, Y Harold; Rajaram, M

    2015-01-01

    Mobile ad hoc network (MANET) is a collection of autonomous mobile nodes forming an ad hoc network without fixed infrastructure. Dynamic topology property of MANET may degrade the performance of the network. However, multipath selection is a great challenging task to improve the network lifetime. We proposed an energy-aware multipath routing scheme based on particle swarm optimization (EMPSO) that uses continuous time recurrent neural network (CTRNN) to solve optimization problems. CTRNN finds the optimal loop-free paths to solve link disjoint paths in a MANET. The CTRNN is used as an optimum path selection technique that produces a set of optimal paths between source and destination. In CTRNN, particle swarm optimization (PSO) method is primly used for training the RNN. The proposed scheme uses the reliability measures such as transmission cost, energy factor, and the optimal traffic ratio between source and destination to increase routing performance. In this scheme, optimal loop-free paths can be found using PSO to seek better link quality nodes in route discovery phase. PSO optimizes a problem by iteratively trying to get a better solution with regard to a measure of quality. The proposed scheme discovers multiple loop-free paths by using PSO technique. PMID:26819966

  5. Distinguishing congestion from malicious behavior in mobile ad-hoc networks

    NASA Astrophysics Data System (ADS)

    Ding, Jin; Medidi, Sirisha R.

    2004-08-01

    Packet dropping in Mobile Ad-hoc Networks could be a result of wireless link errors, congestion, or malicious packet drop attack. Current techniques for detecting malicious behavior either do not consider congestion in the network or are not able to detect in real time. Further more, they usually work at network layer. In this paper, we propose a TCP-Manet protocol, which reacts to congestion like TCP Reno protocol, and has additional capability to distinguish among congestion, wireless link error, and malicious packet drop attack. It is an end-to-end mechanism that does not require additional modifications to the nodes in the network. Since it is an extension of existing TCP protocol, it is compatible with existing protocols. It works in conjunction with the network layer and an unobtrusive monitor to assist the network in the detection and characterization of the nature of the behavior. Experimental results show that TCP-Manet has the same performance as that of TCP-Reno in wired network, and performs better in wireless ad-hoc networks in terms of throughput while having good detection effectiveness.

  6. Intelligent QoS routing algorithm based on improved AODV protocol for Ad Hoc networks

    NASA Astrophysics Data System (ADS)

    Huibin, Liu; Jun, Zhang

    2016-04-01

    Mobile Ad Hoc Networks were playing an increasingly important part in disaster reliefs, military battlefields and scientific explorations. However, networks routing difficulties are more and more outstanding due to inherent structures. This paper proposed an improved cuckoo searching-based Ad hoc On-Demand Distance Vector Routing protocol (CSAODV). It elaborately designs the calculation methods of optimal routing algorithm used by protocol and transmission mechanism of communication-package. In calculation of optimal routing algorithm by CS Algorithm, by increasing QoS constraint, the found optimal routing algorithm can conform to the requirements of specified bandwidth and time delay, and a certain balance can be obtained among computation spending, bandwidth and time delay. Take advantage of NS2 simulation software to take performance test on protocol in three circumstances and validate the feasibility and validity of CSAODV protocol. In results, CSAODV routing protocol is more adapt to the change of network topological structure than AODV protocol, which improves package delivery fraction of protocol effectively, reduce the transmission time delay of network, reduce the extra burden to network brought by controlling information, and improve the routing efficiency of network.

  7. Energy conservation in ad hoc multimedia networks using traffic-shaping mechanisms

    NASA Astrophysics Data System (ADS)

    Chandra, Surendar

    2003-12-01

    In this work, we explore network traffic shaping mechanisms that deliver packets at pre-determined intervals; allowing the network interface to transition to a lower power consuming sleep state. We focus our efforts on commodity devices, IEEE 802.11b ad hoc mode and popular streaming formats. We argue that factors such as the lack of scheduling clock phase synchronization among the participants and scheduling delays introduced by back ground tasks affect the potential energy savings. Increasing the periodic transmission delays to transmit data infrequently can offset some of these effects at the expense of flooding the wireless channel for longer periods of time; potentially increasing the time to acquire the channel for non-multimedia traffic. Buffering mechanisms built into media browsers can mitigate the effects of these added delays from being mis-interpreted as network congestion. We show that practical implementations of such traffic shaping mechanisms can offer significant energy savings.

  8. Enhancing the Social Capital of Learning Communities by Using an Ad Hoc Transient Communities Service

    NASA Astrophysics Data System (ADS)

    Fetter, Sibren; Berlanga, Adriana J.; Sloep, Peter

    In online learning, communities can help to enhance learning. However, because of the dynamic nature of communities, attaining and sustaining these communities can be difficult. One aspect that has an influence on, and is influenced by these dynamics is the social capital of a community. Features of social capital are the social network structure, the sense of belonging and, the support received and provided. It is hypothesized that these features can be improved by using Ad Hoc Transient Communities (AHTCs). Through an AHTC learners are brought together for a specific, learning-related goal (‘ad hoc’) and for only a limited amount of time (‘transience’). To test whether the use of AHTCs has a positive influence on the social capital, a learner support service which enables the use of AHTCs is proposed. Furthermore, requirements, prerequisites, and future research are discussed.

  9. Predicting impact of multi-paths on phase change in map-based vehicular ad hoc networks

    NASA Astrophysics Data System (ADS)

    Rahmes, Mark; Lemieux, George; Sonnenberg, Jerome; Chester, David B.

    2014-05-01

    Dynamic Spectrum Access, which through its ability to adapt the operating frequency of a radio, is widely believed to be a solution to the limited spectrum problem. Mobile Ad Hoc Networks (MANETs) can extend high capacity mobile communications over large areas where fixed and tethered-mobile systems are not available. In one use case with high potential impact cognitive radio employs spectrum sensing to facilitate identification of allocated frequencies not currently accessed by their primary users. Primary users own the rights to radiate at a specific frequency and geographic location, secondary users opportunistically attempt to radiate at a specific frequency when the primary user is not using it. We quantify optimal signal detection in map based cognitive radio networks with multiple rapidly varying phase changes and multiple orthogonal signals. Doppler shift occurs due to reflection, scattering, and rapid vehicle movement. Path propagation as well as vehicle movement produces either constructive or destructive interference with the incident wave. Our signal detection algorithms can assist the Doppler spread compensation algorithm by deciding how many phase changes in signals are present in a selected band of interest. Additionally we can populate a spatial radio environment map (REM) database with known information that can be leveraged in an ad hoc network to facilitate Dynamic Spectrum Access. We show how topography can help predict the impact of multi-paths on phase change, as well as about the prediction from dense traffic areas. Utilization of high resolution geospatial data layers in RF propagation analysis is directly applicable.

  10. Intelligent self-organization methods for wireless ad hoc sensor networks based on limited resources

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2006-05-01

    A wireless ad hoc sensor network (WSN) is a configuration for area surveillance that affords rapid, flexible deployment in arbitrary threat environments. There is no infrastructure support and sensor nodes communicate with each other only when they are in transmission range. To a greater degree than the terminals found in mobile ad hoc networks (MANETs) for communications, sensor nodes are resource-constrained, with limited computational processing, bandwidth, memory, and power, and are typically unattended once in operation. Consequently, the level of information exchange among nodes, to support any complex adaptive algorithms to establish network connectivity and optimize throughput, not only deplete those limited resources and creates high overhead in narrowband communications, but also increase network vulnerability to eavesdropping by malicious nodes. Cooperation among nodes, critical to the mission of sensor networks, can thus be disrupted by the inappropriate choice of the method for self-organization. Recent published contributions to the self-configuration of ad hoc sensor networks, e.g., self-organizing mapping and swarm intelligence techniques, have been based on the adaptive control of the cross-layer interactions found in MANET protocols to achieve one or more performance objectives: connectivity, intrusion resistance, power control, throughput, and delay. However, few studies have examined the performance of these algorithms when implemented with the limited resources of WSNs. In this paper, self-organization algorithms for the initiation, operation and maintenance of a network topology from a collection of wireless sensor nodes are proposed that improve the performance metrics significant to WSNs. The intelligent algorithm approach emphasizes low computational complexity, energy efficiency and robust adaptation to change, allowing distributed implementation with the actual limited resources of the cooperative nodes of the network. Extensions of the

  11. Energy-efficient distributed constructions of miniumum spanning tree for wireless ad-hoc networks

    SciTech Connect

    Kumar, V. S. A.; Pandurangan, G.; Khan, M.

    2004-01-01

    The Minimum Spanning Tree (MST) problem is one of the most important and commonly occurring primitive in the design and operation of data and communication networks. While there a redistributed algorithms for the MST problem these require relatively large number of messages and time, and are fairly involved, require synchronization and a lot of book keeping; this makes these algorithms impractical for emerging technologies such as ad hoc and sensor networks. In such networks, a sensor has very limited power, and any algorithm needs to be simple, local and energy efficient for being practical. Motivated by these considerations, we study the performance of a class of simple and local algorithms called Nearest Neighbor Tree (NNT) algorithms for energy-efficient construction of MSTs in a wireless ad hoc setting. These employ a very simple idea to eliminate the work involved in cycle detection in other MST algorithms: each node chooses a distinct rank, and connects to the closest node of higher rank. We consider two variants of the NNT algorithms, obtained by two ways of choosing the ranks: (i) Random NNT, in which each node chooses a rank randomly, and (ii) Directional NNT, in which each node uses directional information for choosing the rank. We show provable bounds on the performance of these algorithms in instances obtained by uniformly distributed points in the unit square. Finally, we perform extensive simulations of our algorithms. We tested our algorithms on both uniformly random distributions of points, and on realistic distributions of points in an urban setting. The cost of the tree found by the NNT algorithms is within a factor of 2 of the MST, but there is more than a ten-fold saving on the energy and about a five fold saving on the number of messages sent. Also, our algorithms are significantly simpler to implement compared to, for instance, the GHS algorithm, which is essentially optimal with regards to the message complexity. Thus, our results

  12. Standardization of positive controls in diagnostic immunohistochemistry: recommendations from the International Ad Hoc Expert Committee.

    PubMed

    Torlakovic, Emina E; Nielsen, Søren; Francis, Glenn; Garratt, John; Gilks, Blake; Goldsmith, Jeffrey D; Hornick, Jason L; Hyjek, Elizabeth; Ibrahim, Merdol; Miller, Keith; Petcu, Eugen; Swanson, Paul E; Zhou, Xiaoge; Taylor, Clive R; Vyberg, Mogens

    2015-01-01

    Diagnostic immunohistochemistry (dIHC) has been practiced for several decades, with an ongoing expansion of applications for diagnostic use, and more recently for detection of prognostic and predictive biomarkers. However, standardization of practice has yet to be achieved, despite significant advances in methodology. An Ad Hoc Expert Committee was formed to address the standardization of controls, which is a missing link in demonstrating and assuring standardization of the various components of dIHC. This committee has also developed a concept of immunohistochemistry critical assay performance controls that are intended to facilitate methodology transfer and harmonization in dIHC. Furthermore, the committee has clarified definitions of IHC assay sensitivity and specificity, with special emphasis on how these definitions apply to positive controls. Recommendations for "best laboratory practice" regarding positive controls for dIHC are specified. The first set of immunohistochemistry critical assay performance controls for several frequently used IHC stains or tests is also developed and presented. PMID:25474126

  13. A high performance, ad-hoc, fuzzy query processing system for relational databases

    NASA Technical Reports Server (NTRS)

    Mansfield, William H., Jr.; Fleischman, Robert M.

    1992-01-01

    Database queries involving imprecise or fuzzy predicates are currently an evolving area of academic and industrial research. Such queries place severe stress on the indexing and I/O subsystems of conventional database environments since they involve the search of large numbers of records. The Datacycle architecture and research prototype is a database environment that uses filtering technology to perform an efficient, exhaustive search of an entire database. It has recently been modified to include fuzzy predicates in its query processing. The approach obviates the need for complex index structures, provides unlimited query throughput, permits the use of ad-hoc fuzzy membership functions, and provides a deterministic response time largely independent of query complexity and load. This paper describes the Datacycle prototype implementation of fuzzy queries and some recent performance results.

  14. Effective Route Maintenance and Restoration Schemes in Mobile Ad Hoc Networks

    PubMed Central

    Kang, Byung-Seok; Ko, In-Young

    2010-01-01

    This study proposes a location-based hybrid routing protocol to improve data packet delivery and to reduce control message overhead in mobile ad hoc networks. In mobile environments, where nodes move continuously at a high speed, it is generally difficult to maintain and restore route paths. Therefore, this study suggests a new flooding mechanism to control route paths. The essence of the proposed scheme is its effective tracking of the destination’s location based on the beacon messages of the main route nodes. Through experiments based on an NS-2 simulator, the proposed scheme shows improvements in the data packet delivery ratio and reduces the amount of routing control message overhead compared with existing routing protocols such as AODV, LAR, ZRP and AODV-DFR. PMID:22315570

  15. An epidemic model for biological data fusion in ad hoc sensor networks

    NASA Astrophysics Data System (ADS)

    Chang, K. C.; Kotari, Vikas

    2009-05-01

    Bio terrorism can be a very refined and a catastrophic approach of attacking a nation. This requires the development of a complete architecture dedicatedly designed for this purpose which includes but is not limited to Sensing/Detection, Tracking and Fusion, Communication, and others. In this paper we focus on one such architecture and evaluate its performance. Various sensors for this specific purpose have been studied. The accent has been on use of Distributed systems such as ad-hoc networks and on application of epidemic data fusion algorithms to better manage the bio threat data. The emphasis has been on understanding the performance characteristics of these algorithms under diversified real time scenarios which are implemented through extensive JAVA based simulations. Through comparative studies on communication and fusion the performance of channel filter algorithm for the purpose of biological sensor data fusion are validated.

  16. Secure Adaptive Topology Control for Wireless Ad-Hoc Sensor Networks

    PubMed Central

    Hsueh, Ching-Tsung; Li, Yu-Wei; Wen, Chih-Yu; Ouyang, Yen-Chieh

    2010-01-01

    This paper presents a secure decentralized clustering algorithm for wireless ad-hoc sensor networks. The algorithm operates without a centralized controller, operates asynchronously, and does not require that the location of the sensors be known a priori. Based on the cluster-based topology, secure hierarchical communication protocols and dynamic quarantine strategies are introduced to defend against spam attacks, since this type of attacks can exhaust the energy of sensor nodes and will shorten the lifetime of a sensor network drastically. By adjusting the threshold of infected percentage of the cluster coverage, our scheme can dynamically coordinate the proportion of the quarantine region and adaptively achieve the cluster control and the neighborhood control of attacks. Simulation results show that the proposed approach is feasible and cost effective for wireless sensor networks. PMID:22205866

  17. Noise-Assisted Concurrent Multipath Traffic Distribution in Ad Hoc Networks

    PubMed Central

    Murata, Masayuki

    2013-01-01

    The concept of biologically inspired networking has been introduced to tackle unpredictable and unstable situations in computer networks, especially in wireless ad hoc networks where network conditions are continuously changing, resulting in the need of robustness and adaptability of control methods. Unfortunately, existing methods often rely heavily on the detailed knowledge of each network component and the preconfigured, that is, fine-tuned, parameters. In this paper, we utilize a new concept, called attractor perturbation (AP), which enables controlling the network performance using only end-to-end information. Based on AP, we propose a concurrent multipath traffic distribution method, which aims at lowering the average end-to-end delay by only adjusting the transmission rate on each path. We demonstrate through simulations that, by utilizing the attractor perturbation relationship, the proposed method achieves a lower average end-to-end delay compared to other methods which do not take fluctuations into account. PMID:24319375

  18. Noise-assisted concurrent multipath traffic distribution in ad hoc networks.

    PubMed

    Asvarujanon, Narun; Leibnitz, Kenji; Wakamiya, Naoki; Murata, Masayuki

    2013-01-01

    The concept of biologically inspired networking has been introduced to tackle unpredictable and unstable situations in computer networks, especially in wireless ad hoc networks where network conditions are continuously changing, resulting in the need of robustness and adaptability of control methods. Unfortunately, existing methods often rely heavily on the detailed knowledge of each network component and the preconfigured, that is, fine-tuned, parameters. In this paper, we utilize a new concept, called attractor perturbation (AP), which enables controlling the network performance using only end-to-end information. Based on AP, we propose a concurrent multipath traffic distribution method, which aims at lowering the average end-to-end delay by only adjusting the transmission rate on each path. We demonstrate through simulations that, by utilizing the attractor perturbation relationship, the proposed method achieves a lower average end-to-end delay compared to other methods which do not take fluctuations into account. PMID:24319375

  19. A Leasing Model to Deal with Partial Failures in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Gonzalez Boix, Elisa; van Cutsem, Tom; Vallejos, Jorge; de Meuter, Wolfgang; D'Hondt, Theo

    In mobile ad hoc networks (MANETs) many partial failures are the result of temporary network partitions due to the intermittent connectivity of mobile devices. Some of these failures will be permanent and require application-level failure handling. However, it is impossible to distinguish a permanent from a transient failure. Leasing provides a solution to this problem based on the temporal restriction of resources. But to date no leasing model has been designed specifically for MANETs. In this paper, we identify three characteristics required for a leasing model to be usable in a MANET, discuss the issues with existing leasing models and then propose the leased object references model, which integrates leasing with remote object references. In addition, we describe an implementation of the model in the programming language AmbientTalk. Leased object references provide an extensible framework that allows programmers to express their own leasing patterns and enables both lease holders (clients) and lease grantors (services) to deal with permanent failures.

  20. Robotic disaster recovery efforts with ad-hoc deployable cloud computing

    NASA Astrophysics Data System (ADS)

    Straub, Jeremy; Marsh, Ronald; Mohammad, Atif F.

    2013-06-01

    Autonomous operations of search and rescue (SaR) robots is an ill posed problem, which is complexified by the dynamic disaster recovery environment. In a typical SaR response scenario, responder robots will require different levels of processing capabilities during various parts of the response effort and will need to utilize multiple algorithms. Placing these capabilities onboard the robot is a mediocre solution that precludes algorithm specific performance optimization and results in mediocre performance. Architecture for an ad-hoc, deployable cloud environment suitable for use in a disaster response scenario is presented. Under this model, each service provider is optimized for the task and maintains a database of situation-relevant information. This service-oriented architecture (SOA 3.0) compliant framework also serves as an example of the efficient use of SOA 3.0 in an actual cloud application.

  1. CP-TDMA: Coloring-and Probability-Based TDMA Scheduling for Wireless Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Zhang, Xuedan; Hong, Jun; Zhang, Lin; Shan, Xiuming; Li, Victor O. K.

    This paper addresses the issue of transmission scheduling in wireless ad hoc networks. We propose a Time Division Multiple Access (TDMA) scheduling scheme based on edge coloring and probabilistic assignment, called CP-TDMA. We categorize the conflicts suffered by wireless links into two types: explicit conflicts and implicit conflicts, and utilize two different strategies to deal with them. Explicit conflicts are avoided completely by a simple distributed edge-coloring algorithm μ-M, and implicit conflicts are minimized by applying probabilistic time slot assignments to links. We evaluate CP-TDMA analytically and numerically, and find that CP-TDMA, which requires only local information exhibits a better performance than previous work.

  2. Performance optimisation through EPT-WBC in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Agarwal, Ratish; Gupta, Roopam; Motwani, Mahesh

    2016-03-01

    Mobile ad hoc networks are self-organised, infrastructure-less networks in which each mobile host works as a router to provide connectivity within the network. Nodes out of reach to each other can communicate with the help of intermediate routers (nodes). Routing protocols are the rules which determine the way in which these routing activities are to be performed. In cluster-based architecture, some selected nodes (clusterheads) are identified to bear the extra burden of network activities like routing. Selection of clusterheads is a critical issue which significantly affects the performance of the network. This paper proposes an enhanced performance and trusted weight-based clustering approach in which a number of performance factors such as trust, load balancing, energy consumption, mobility and battery power are considered for the selection of clusterheads. Moreover, the performance of the proposed scheme is compared with other existing approaches to demonstrate the effectiveness of the work.

  3. Opportunistic Hybrid Transport Protocol (OHTP) for Cognitive Radio Ad Hoc Sensor Networks

    PubMed Central

    Zikria, Yousaf Bin; Nosheen, Summera; Ishmanov, Farruh; Kim, Sung Won

    2015-01-01

    The inefficient assignment of spectrum for different communications purposes, plus technology enhancements and ever-increasing usage of wireless technology is causing spectrum scarcity. To address this issue, one of the proposed solutions in the literature is to access the spectrum dynamically or opportunistically. Therefore, the concept of cognitive radio appeared, which opens up a new research paradigm. There is extensive research on the physical, medium access control and network layers. The impact of the transport layer on the performance of cognitive radio ad hoc sensor networks is still unknown/unexplored. The Internet’s de facto transport protocol is not well suited to wireless networks because of its congestion control mechanism. We propose an opportunistic hybrid transport protocol for cognitive radio ad hoc sensor networks. We developed a new congestion control mechanism to differentiate true congestion from interruption loss. After such detection and differentiation, we propose methods to handle them opportunistically. There are several benefits to window- and rate-based protocols. To exploit the benefits of both in order to enhance overall system performance, we propose a hybrid transport protocol. We empirically calculate the optimal threshold value to switch between window- and rate-based mechanisms. We then compare our proposed transport protocol to Transmission Control Protocol (TCP)-friendly rate control, TCP-friendly rate control for cognitive radio, and TCP-friendly window-based control. We ran an extensive set of simulations in Network Simulator 2. The results indicate that the proposed transport protocol performs better than all the others. PMID:26694396

  4. Exploiting Location Information and Enabling Adaptive Mobile Ad Hoc Network Protocols

    NASA Astrophysics Data System (ADS)

    Boleng, Jeff

    2002-09-01

    Mobile Ad Hoc Networks (MANETs) consist of a group of mobile nodes which form a communication network without prior infrastructure. Each node in the network is responsible to provide services to other nodes in order to realize the ad hoc communication capability. A key component and primary challenge in MANETs is routing data packets over multiple hops between nodes. MANET routing has received considerable research interest recently. However, no routing protocol proposed to date has proven to be effective in the wide range of mobility conditions present in a MANET. We combine location information and mobility feedback to create an innovative MANET routing protocol which we prove is effective over a wide range of mobility conditions typical in a MANET. We introduce link duration as our mobility feedback metric, and we demonstrate that mobility feedback using link duration effectively enables adaptive MANET protocols. Using our mobility feedback agent, we develop a hybrid MANET routing protocol which adapts in order to combine the strengths of both component protocols while avoiding their weaknesses. Our hybrid, adaptive protocol achieves data packet delivery ratios above 80% in highly demanding network mobility conditions (i.e. link durations less than 4 seconds and node speeds up to 40 m/s). No existing MANET routing protocol can achieve such high performance operating alone. In addition we show that location information increases the performance of MANET routing. Finally, we develop a comprehensive set of mathematical models for data packet delivery ratio, overhead, and delay. These models confirm the suitability of link duration as a mobility metric, validate our simulation results and conclusions, and provide valuable insight into reactive MANET routing protocol operation.

  5. A novel unbalanced multiple description coder for robust video transmission over ad hoc wireless networks

    NASA Astrophysics Data System (ADS)

    Huang, Feng; Sun, Lifeng; Zhong, Yuzhuo

    2006-01-01

    Robust transmission of live video over ad hoc wireless networks presents new challenges: high bandwidth requirements are coupled with delay constraints; even a single packet loss causes error propagation until a complete video frame is coded in the intra-mode; ad hoc wireless networks suffer from bursty packet losses that drastically degrade the viewing experience. Accordingly, we propose a novel UMD coder capable of quickly recovering from losses and ensuring continuous playout. It uses 'peg' frames to prevent error propagation in the High-Resolution (HR) description and improve the robustness of key frames. The Low-Resolution (LR) coder works independent of the HR one, but they can also help each other recover from losses. Like many UMD coders, our UMD coder is drift-free, disruption-tolerant and able to make good use of the asymmetric available bandwidths of multiple paths. The simulation results under different conditions show that the proposed UMD coder has the highest decoded quality and lowest probability of pause when compared with concurrent UMDC techniques. The coder also has a comparable decoded quality, lower startup delay and lower probability of pause than a state-of-the-art FEC-based scheme. To provide robustness for video multicast applications, we propose non-end-to-end UMDC-based video distribution over a multi-tree multicast network. The multiplicity of parents decorrelates losses and the non-end-to-end feature increases the throughput of UMDC video data. We deploy an application-level service of LR description reconstruction in some intermediate nodes of the LR multicast tree. The principle behind this is to reconstruct the disrupted LR frames by the correctly received HR frames. As a result, the viewing experience at the downstream nodes benefits from the protection reconstruction at the upstream nodes.

  6. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks

    PubMed Central

    Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J.; Segarra, Esteve Pallarès; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Gargallo, Emilio Sanvicente

    2015-01-01

    The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic.Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs. PMID:25897496

  7. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks.

    PubMed

    Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J; Pallarès Segarra, Esteve; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Sanvicente Gargallo, Emilio

    2015-01-01

    The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs. PMID:25897496

  8. Virtual machine-based simulation platform for mobile ad-hoc network-based cyber infrastructure

    DOE PAGESBeta

    Yoginath, Srikanth B.; Perumalla, Kayla S.; Henz, Brian J.

    2015-09-29

    In modeling and simulating complex systems such as mobile ad-hoc networks (MANETs) in de-fense communications, it is a major challenge to reconcile multiple important considerations: the rapidity of unavoidable changes to the software (network layers and applications), the difficulty of modeling the critical, implementation-dependent behavioral effects, the need to sustain larger scale scenarios, and the desire for faster simulations. Here we present our approach in success-fully reconciling them using a virtual time-synchronized virtual machine(VM)-based parallel ex-ecution framework that accurately lifts both the devices as well as the network communications to a virtual time plane while retaining full fidelity. At themore » core of our framework is a scheduling engine that operates at the level of a hypervisor scheduler, offering a unique ability to execute multi-core guest nodes over multi-core host nodes in an accurate, virtual time-synchronized manner. In contrast to other related approaches that suffer from either speed or accuracy issues, our framework provides MANET node-wise scalability, high fidelity of software behaviors, and time-ordering accuracy. The design and development of this framework is presented, and an ac-tual implementation based on the widely used Xen hypervisor system is described. Benchmarks with synthetic and actual applications are used to identify the benefits of our approach. The time inaccuracy of traditional emulation methods is demonstrated, in comparison with the accurate execution of our framework verified by theoretically correct results expected from analytical models of the same scenarios. In the largest high fidelity tests, we are able to perform virtual time-synchronized simulation of 64-node VM-based full-stack, actual software behaviors of MANETs containing a mix of static and mobile (unmanned airborne vehicle) nodes, hosted on a 32-core host, with full fidelity of unmodified ad-hoc routing protocols, unmodified

  9. Virtual machine-based simulation platform for mobile ad-hoc network-based cyber infrastructure

    SciTech Connect

    Yoginath, Srikanth B.; Perumalla, Kayla S.; Henz, Brian J.

    2015-09-29

    In modeling and simulating complex systems such as mobile ad-hoc networks (MANETs) in de-fense communications, it is a major challenge to reconcile multiple important considerations: the rapidity of unavoidable changes to the software (network layers and applications), the difficulty of modeling the critical, implementation-dependent behavioral effects, the need to sustain larger scale scenarios, and the desire for faster simulations. Here we present our approach in success-fully reconciling them using a virtual time-synchronized virtual machine(VM)-based parallel ex-ecution framework that accurately lifts both the devices as well as the network communications to a virtual time plane while retaining full fidelity. At the core of our framework is a scheduling engine that operates at the level of a hypervisor scheduler, offering a unique ability to execute multi-core guest nodes over multi-core host nodes in an accurate, virtual time-synchronized manner. In contrast to other related approaches that suffer from either speed or accuracy issues, our framework provides MANET node-wise scalability, high fidelity of software behaviors, and time-ordering accuracy. The design and development of this framework is presented, and an ac-tual implementation based on the widely used Xen hypervisor system is described. Benchmarks with synthetic and actual applications are used to identify the benefits of our approach. The time inaccuracy of traditional emulation methods is demonstrated, in comparison with the accurate execution of our framework verified by theoretically correct results expected from analytical models of the same scenarios. In the largest high fidelity tests, we are able to perform virtual time-synchronized simulation of 64-node VM-based full-stack, actual software behaviors of MANETs containing a mix of static and mobile (unmanned airborne vehicle) nodes, hosted on a 32-core host, with full fidelity of unmodified ad-hoc routing protocols, unmodified application

  10. Future Information Services at the Texas A&M University Library: Background and Recommendations (Report of an Ad Hoc Committee).

    ERIC Educational Resources Information Center

    Cook, Colleen; And Others

    The Ad Hoc Committee on Future Information Services explored possible future directions for information services at Texas A&M University Library and developed a plan to guide the library into the next decade in terms of automated access to information. In exploring future directions for automated information services, the committee members…

  11. Federal Government Printing and Publishing: Policy Issues. Report of the Ad Hoc Advisory Committee on Revision of Title 44.

    ERIC Educational Resources Information Center

    Joint Committee on Printing, Washington, DC.

    Designed to present a better understanding of the government's system of printing and distributing information and to highlight problems, alternatives, and important policy questions, this report synthesizes 13 weeks of the Ad Hoc Advisory Committee hearings on six topics: (1) Administration of policy--who should establish and administer policy in…

  12. VehiHealth: An Emergency Routing Protocol for Vehicular Ad Hoc Network to Support Healthcare System.

    PubMed

    Bhoi, S K; Khilar, P M

    2016-03-01

    Survival of a patient depends on effective data communication in healthcare system. In this paper, an emergency routing protocol for Vehicular Ad hoc Network (VANET) is proposed to quickly forward the current patient status information from the ambulance to the hospital to provide pre-medical treatment. As the ambulance takes time to reach the hospital, ambulance doctor can provide sudden treatment to the patient in emergency by sending patient status information to the hospital through the vehicles using vehicular communication. Secondly, the experienced doctors respond to the information by quickly sending a treatment information to the ambulance. In this protocol, data is forwarded through that path which has less link breakage problem between the vehicles. This is done by calculating an intersection value I v a l u e for the neighboring intersections by using the current traffic information. Then the data is forwarded through that intersection which has minimum I v a l u e . Simulation results show VehiHealth performs better than P-GEDIR, GyTAR, A-STAR and GSR routing protocols in terms of average end-to-end delay, number of link breakage, path length, and average response time. PMID:26696419

  13. Multiobjective Reinforcement Learning for Traffic Signal Control Using Vehicular Ad Hoc Network

    NASA Astrophysics Data System (ADS)

    Houli, Duan; Zhiheng, Li; Yi, Zhang

    2010-12-01

    We propose a new multiobjective control algorithm based on reinforcement learning for urban traffic signal control, named multi-RL. A multiagent structure is used to describe the traffic system. A vehicular ad hoc network is used for the data exchange among agents. A reinforcement learning algorithm is applied to predict the overall value of the optimization objective given vehicles' states. The policy which minimizes the cumulative value of the optimization objective is regarded as the optimal one. In order to make the method adaptive to various traffic conditions, we also introduce a multiobjective control scheme in which the optimization objective is selected adaptively to real-time traffic states. The optimization objectives include the vehicle stops, the average waiting time, and the maximum queue length of the next intersection. In addition, we also accommodate a priority control to the buses and the emergency vehicles through our model. The simulation results indicated that our algorithm could perform more efficiently than traditional traffic light control methods.

  14. Integration of Body Sensor Networks and Vehicular Ad-hoc Networks for Traffic Safety

    PubMed Central

    Reyes-Muñoz, Angelica; Domingo, Mari Carmen; López-Trinidad, Marco Antonio; Delgado, José Luis

    2016-01-01

    The emergence of Body Sensor Networks (BSNs) constitutes a new and fast growing trend for the development of daily routine applications. However, in the case of heterogeneous BSNs integration with Vehicular ad hoc Networks (VANETs) a large number of difficulties remain, that must be solved, especially when talking about the detection of human state factors that impair the driving of motor vehicles. The main contributions of this investigation are principally three: (1) an exhaustive review of the current mechanisms to detect four basic physiological behavior states (drowsy, drunk, driving under emotional state disorders and distracted driving) that may cause traffic accidents is presented; (2) A middleware architecture is proposed. This architecture can communicate with the car dashboard, emergency services, vehicles belonging to the VANET and road or street facilities. This architecture seeks on the one hand to improve the car driving experience of the driver and on the other hand to extend security mechanisms for the surrounding individuals; and (3) as a proof of concept, an Android real-time attention low level detection application that runs in a next-generation smartphone is developed. The application features mechanisms that allow one to measure the degree of attention of a driver on the base of her/his EEG signals, establish wireless communication links via various standard wireless means, GPRS, Bluetooth and WiFi and issue alarms of critical low driver attention levels. PMID:26784204

  15. SVANET: A smart vehicular ad hoc network for efficient data transmission with wireless sensors.

    PubMed

    Sahoo, Prasan Kumar; Chiang, Ming-Jer; Wu, Shih-Lin

    2014-01-01

    Wireless sensors can sense any event, such as accidents, as well as icy roads, and can forward the rescue/warning messages through intermediate vehicles for any necessary help. In this paper, we propose a smart vehicular ad hoc network (SVANET) architecture that uses wireless sensors to detect events and vehicles to transmit the safety and non-safety messages efficiently by using different service channels and one control channel with different priorities. We have developed a data transmission protocol for the vehicles in the highway, in which data can be forwarded with the help of vehicles if they are connected with each other or data can be forwarded with the help of nearby wireless sensors. Our data transmission protocol is designed to increase the driving safety, to prevent accidents and to utilize channels efficiently by adjusting the control and service channel time intervals dynamically. Besides, our protocol can transmit information to vehicles in advance, so that drivers can decide an alternate route in case of traffic congestion. For various data sharing, we design a method that can select a few leader nodes among vehicles running along a highway to broadcast data efficiently. Simulation results show that our protocol can outperform the existing standard in terms of the end to end packet delivery ratio and latency. PMID:25429409

  16. SVANET: A Smart Vehicular Ad Hoc Network for Efficient Data Transmission with Wireless Sensors

    PubMed Central

    Sahoo, Prasan Kumar; Chiang, Ming-Jer; Wu, Shih-Lin

    2014-01-01

    Wireless sensors can sense any event, such as accidents, as well as icy roads, and can forward the rescue/warning messages through intermediate vehicles for any necessary help. In this paper, we propose a smart vehicular ad hoc network (SVANET) architecture that uses wireless sensors to detect events and vehicles to transmit the safety and non-safety messages efficiently by using different service channels and one control channel with different priorities. We have developed a data transmission protocol for the vehicles in the highway, in which data can be forwarded with the help of vehicles if they are connected with each other or data can be forwarded with the help of nearby wireless sensors. Our data transmission protocol is designed to increase the driving safety, to prevent accidents and to utilize channels efficiently by adjusting the control and service channel time intervals dynamically. Besides, our protocol can transmit information to vehicles in advance, so that drivers can decide an alternate route in case of traffic congestion. For various data sharing, we design a method that can select a few leader nodes among vehicles running along a highway to broadcast data efficiently. Simulation results show that our protocol can outperform the existing standard in terms of the end to end packet delivery ratio and latency. PMID:25429409

  17. Securing Mobile Ad Hoc Networks Using Danger Theory-Based Artificial Immune Algorithm

    PubMed Central

    2015-01-01

    A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs. PMID:25946001

  18. Mean field game theoretic approach for security in mobile ad-hoc networks

    NASA Astrophysics Data System (ADS)

    Wang, Yanwei; Tang, Helen; Yu, F. Richard; Huang, Minyi

    2013-05-01

    Game theory can provide a useful tool to study the security problem in mobile ad hoc networks (MANETs). Most existing work on applying game theories to security only considers two players in the security game model: an attacker and a defender. While this assumption is valid for a network with centralized administration, it may not be realistic in MANETs, where centralized administration is not available. Consequently, each individual node in a MANET should be treated separately in the security game model. In this paper, using recent advances in mean field game theory, we propose a novel game theoretic approach for security in MANETs. Mean field game theory provides a powerful mathematical tool for problems with a large number of players. Since security defence mechanisms consume precious system resources (e.g., energy), the proposed scheme considers not only the security requirement of MANETs but also the system resources. In addition, each node only needs to know its own state information and the aggregate effect of the other nodes in the MANET. Therefore, the proposed scheme is a fully distributed scheme. Simulation results are presented to illustrate the effectiveness of the proposed scheme.

  19. A Threshold-Adaptive Reputation System on Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsai, Hsiao-Chien; Lo, Nai-Wei; Wu, Tzong-Chen

    In recent years huge potential benefits from novel applications in mobile ad hoc networks (MANET) have been discussed extensively. However, without robust security mechanisms and systems to provide safety shell through the MANET infrastructure, MANET applications can be vulnerable and hammered by malicious attackers easily. In order to detect misbehaved message routing and identify malicious attackers in MANET, schemes based on reputation concept have shown their advantages in this area in terms of good scalability and simple threshold-based detection strategy. We observed that previous reputation schemes generally use predefined thresholds which do not take into account the effect of behavior dynamics between nodes in a period of time. In this paper, we propose a Threshold-Adaptive Reputation System (TARS) to overcome the shortcomings of static threshold strategy and improve the overall MANET performance under misbehaved routing attack. A fuzzy-based inference engine is introduced to evaluate the trustiness of a node's one-hop neighbors. Malicious nodes whose trust values are lower than the adaptive threshold, will be detected and filtered out by their honest neighbors during trustiness evaluation process. The results of network simulation show that the TARS outperforms other compared schemes under security attacks in most cases and at the same time reduces the decrease of total packet delivery ratio by 67% in comparison with MANET without reputation system.

  20. Data Delivery Method Based on Neighbor Nodes' Information in a Mobile Ad Hoc Network

    PubMed Central

    Hayashi, Takuma; Taenaka, Yuzo; Okuda, Takeshi; Yamaguchi, Suguru

    2014-01-01

    This paper proposes a data delivery method based on neighbor nodes' information to achieve reliable communication in a mobile ad hoc network (MANET). In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE), Chachulski et al. (2007), improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow. PMID:24672371

  1. Report of the APS Ad-Hoc Committee on LGBT Issues - Presentation of Findings and Recommendations

    NASA Astrophysics Data System (ADS)

    Long, Elena

    2016-03-01

    In 2014 the Executive Officer of the American Physical Society (APS), Kate Kirby, created an Ad-Hoc Committee on LGBT Issues (C-LGBT) charged with reporting on the obstacles to inclusion of LGBT physicists, a term which for the purpose of this report refers to persons who self-identify as lesbian, gay, bisexual, transgender, queer, questioning, intersex, or asexual, as well as other sexual and gender minorities. The full charge was as follows: ``The committee will advise the APS on the current status of LGBT issues in physics, provide recommendations for greater inclusion, and engage physicists in laying the foundation for a more inclusive physics community? More specifically, the committee will investigate LGBT representation in physics, assess the educational and professional climate in physics, recommend changes in policies and practices that impact LGBT physicists, and address other issues that affect inclusion.'' We will present the findings and recommendations of the C-LGBT final report, and a panel discussion will be held following the presentation to discuss the future of APS efforts toward LGBT inclusion in physics.

  2. Concurrent Transmission Based on Channel Quality in Ad Hoc Networks: A Game Theoretic Approach

    NASA Astrophysics Data System (ADS)

    Chen, Chen; Gao, Xinbo; Li, Xiaoji; Pei, Qingqi

    In this paper, a decentralized concurrent transmission strategy in shared channel in Ad Hoc networks is proposed based on game theory. Firstly, a static concurrent transmissions game is used to determine the candidates for transmitting by channel quality threshold and to maximize the overall throughput with consideration of channel quality variation. To achieve NES (Nash Equilibrium Solution), the selfish behaviors of node to attempt to improve the channel gain unilaterally are evaluated. Therefore, this game allows each node to be distributed and to decide whether to transmit concurrently with others or not depending on NES. Secondly, as there are always some nodes with lower channel gain than NES, which are defined as hunger nodes in this paper, a hunger suppression scheme is proposed by adjusting the price function with interferences reservation and forward relay, to fairly give hunger nodes transmission opportunities. Finally, inspired by stock trading, a dynamic concurrent transmission threshold determination scheme is implemented to make the static game practical. Numerical results show that the proposed scheme is feasible to increase concurrent transmission opportunities for active nodes, and at the same time, the number of hunger nodes is greatly reduced with the least increase of threshold by interferences reservation. Also, the good performance on network goodput of the proposed model can be seen from the results.

  3. Distributive routing and congestion control in wireless multihop ad hoc communication networks

    NASA Astrophysics Data System (ADS)

    Glauche, Ingmar; Krause, Wolfram; Sollacher, Rudolf; Greiner, Martin

    2004-10-01

    Due to their inherent complexity, engineered wireless multihop ad hoc communication networks represent a technological challenge. Having no mastering infrastructure the nodes have to selforganize themselves in such a way that for example network connectivity, good data traffic performance and robustness are guaranteed. In this contribution the focus is on routing and congestion control. First, random data traffic along shortest path routes is studied by simulations as well as theoretical modeling. Measures of congestion like end-to-end time delay and relaxation times are given. A scaling law of the average time delay with respect to network size is revealed and found to depend on the underlying network topology. In the second step, a distributive routing and congestion control is proposed. Each node locally propagates its routing cost estimates and information about its congestion state to its neighbors, which then update their respective cost estimates. This allows for a flexible adaptation of end-to-end routes to the overall congestion state of the network. Compared to shortest-path routing, the critical network load is significantly increased.

  4. An Ad-hoc Satellite Network to Measure Filamentary Current Structures in the Auroral Zone

    NASA Astrophysics Data System (ADS)

    Nabong, C.; Fritz, T. A.; Semeter, J. L.

    2014-12-01

    An ad-hoc cubesat-based satellite network project known as ANDESITE is under development at Boston University. It aims to develop a dense constellation of easy-to-use, rapidly-deployable low-cost wireless sensor nodes in space. The objectives of the project are threefold: 1) Demonstrate viability of satellite based sensor networks by deploying an 8-node miniature sensor network to study the filamentation of the field aligned currents in the auroral zones of the Earth's magnetosphere. 2) Test the scalability of proposed protocols, including localization techniques, tracking, data aggregation, and routing, for a 3 dimensional wireless sensor network using a "flock" of nodes. 3) Construct a 6U Cube-sat running the Android OS as an integrated constellation manager, data mule and sensor node deplorer. This small network of sensor nodes will resolve current densities at different spatial resolutions in the near-Earth magnetosphere using measurements from magnetometers with 1-nT sensitivities and 0.2 nT/√Hz self-noise. Mapping of these currents will provide new constraints for models of auroral particle acceleration, wave-particle interactions, ionospheric destabilization, and other kinetic processes operating in the low-beta plasma of the near Earth magnetosphere.

  5. A Sensitive Secondary Users Selection Algorithm for Cognitive Radio Ad Hoc Networks

    PubMed Central

    Li, Aohan; Han, Guangjie; Wan, Liangtian; Shu, Lei

    2016-01-01

    Secondary Users (SUs) are allowed to use the temporarily unused licensed spectrum without disturbing Primary Users (PUs) in Cognitive Radio Ad Hoc Networks (CRAHNs). Existing architectures for CRAHNs impose energy-consuming Cognitive Radios (CRs) on SUs. However, the advanced CRs will increase energy cost for their cognitive functionalities, which is undesirable for the battery powered devices. A new architecture referred to as spectral Requirement-based CRAHN (RCRAHN) is proposed to enhance energy efficiency for CRAHNs in this paper. In RCRAHNs, only parts of SUs are equipped with CRs. SUs equipped with CRs are referred to as Cognitive Radio Users (CRUs). To further enhance energy efficiency of CRAHNs, we aim to select minimum CRUs to sense available spectrum. A non-linear programming problem is mathematically formulated under the constraints of energy efficiency and real-time. Considering the NP-hardness of the problem, a framework of a heuristic algorithm referred to as Sensitive Secondary Users Selection (SSUS) was designed to compute the near-optimal solutions. The simulation results demonstrate that SSUS not only improves the energy efficiency, but also achieves satisfied performances in end-to-end delay and communication reliability. PMID:27023562

  6. Energy-Efficient Algorithm for Broadcasting in Ad Hoc Wireless Sensor Networks

    PubMed Central

    Xiong, Naixue; Huang, Xingbo; Cheng, Hongju; Wan, Zheng

    2013-01-01

    Broadcasting is a common and basic operation used to support various network protocols in wireless networks. To achieve energy-efficient broadcasting is especially important for ad hoc wireless sensor networks because sensors are generally powered by batteries with limited lifetimes. Energy consumption for broadcast operations can be reduced by minimizing the number of relay nodes based on the observation that data transmission processes consume more energy than data reception processes in the sensor nodes, and how to improve the network lifetime is always an interesting issue in sensor network research. The minimum-energy broadcast problem is then equivalent to the problem of finding the minimum Connected Dominating Set (CDS) for a connected graph that is proved NP-complete. In this paper, we introduce an Efficient Minimum CDS algorithm (EMCDS) with help of a proposed ordered sequence list. EMCDS does not concern itself with node energy and broadcast operations might fail if relay nodes are out of energy. Next we have proposed a Minimum Energy-consumption Broadcast Scheme (MEBS) with a modified version of EMCDS, and aimed at providing an efficient scheduling scheme with maximized network lifetime. The simulation results show that the proposed EMCDS algorithm can find smaller CDS compared with related works, and the MEBS can help to increase the network lifetime by efficiently balancing energy among nodes in the networks. PMID:23584121

  7. Ad Hoc Query Support For Very Large Simulation Mesh Data: The Metadata Approach

    SciTech Connect

    Lee, B; Snapp, R; Musick, R; Critchlow, T

    2001-12-17

    We present our approach to enabling approximate ad hoc queries on terabyte-scale mesh data generated from large scientific simulations through the extension and integration of database, statistical, and data mining techniques. There are several significant barriers to overcome in achieving this objective. First, large-scale simulation data is already at the multi-terabyte scale and growing quickly, thus rendering traditional forms of interactive data exploration and query processing untenable. Second, a priori knowledge of user queries is not available, making it impossible to tune special-purpose solutions. Third, the data has spatial and temporal aspects, as well as arbitrarily high dimensionality, which exacerbates the task of finding compact, accurate, and easy-to-compute data models. Our approach is to preprocess the mesh data to generate highly compressed, lossy models that are used in lieu of the original data to answer users' queries. This approach leads to interesting challenges. The model (equivalently, the content-oriented metadata) being generated must be smaller than the original data by at least an order of magnitude. Second, the metadata representation must contain enough information to support a broad class of queries. Finally, the accuracy and speed of the queries must be within the tolerances required by users. In this paper we give an overview of ongoing development efforts with an emphasis on extracting metadata and using it in query processing.

  8. Energy Efficient Link Aware Routing with Power Control in Wireless Ad Hoc Networks

    PubMed Central

    Katiravan, Jeevaa; Sylvia, D.; Rao, D. Srinivasa

    2015-01-01

    In wireless ad hoc networks, the traditional routing protocols make the route selection based on minimum distance between the nodes and the minimum number of hop counts. Most of the routing decisions do not consider the condition of the network such as link quality and residual energy of the nodes. Also, when a link failure occurs, a route discovery mechanism is initiated which incurs high routing overhead. If the broadcast nature and the spatial diversity of the wireless communication are utilized efficiently it becomes possible to achieve improvement in the performance of the wireless networks. In contrast to the traditional routing scheme which makes use of a predetermined route for packet transmission, such an opportunistic routing scheme defines a predefined forwarding candidate list formed by using single network metrics. In this paper, a protocol is proposed which uses multiple metrics such as residual energy and link quality for route selection and also includes a monitoring mechanism which initiates a route discovery for a poor link, thereby reducing the overhead involved and improving the throughput of the network while maintaining network connectivity. Power control is also implemented not only to save energy but also to improve the network performance. Using simulations, we show the performance improvement attained in the network in terms of packet delivery ratio, routing overhead, and residual energy of the network. PMID:26167529

  9. A Sensitive Secondary Users Selection Algorithm for Cognitive Radio Ad Hoc Networks.

    PubMed

    Li, Aohan; Han, Guangjie; Wan, Liangtian; Shu, Lei

    2016-01-01

    Secondary Users (SUs) are allowed to use the temporarily unused licensed spectrum without disturbing Primary Users (PUs) in Cognitive Radio Ad Hoc Networks (CRAHNs). Existing architectures for CRAHNs impose energy-consuming Cognitive Radios (CRs) on SUs. However, the advanced CRs will increase energy cost for their cognitive functionalities, which is undesirable for the battery powered devices. A new architecture referred to as spectral Requirement-based CRAHN (RCRAHN) is proposed to enhance energy efficiency for CRAHNs in this paper. In RCRAHNs, only parts of SUs are equipped with CRs. SUs equipped with CRs are referred to as Cognitive Radio Users (CRUs). To further enhance energy efficiency of CRAHNs, we aim to select minimum CRUs to sense available spectrum. A non-linear programming problem is mathematically formulated under the constraints of energy efficiency and real-time. Considering the NP-hardness of the problem, a framework of a heuristic algorithm referred to as Sensitive Secondary Users Selection (SSUS) was designed to compute the near-optimal solutions. The simulation results demonstrate that SSUS not only improves the energy efficiency, but also achieves satisfied performances in end-to-end delay and communication reliability. PMID:27023562

  10. Integration of Body Sensor Networks and Vehicular Ad-hoc Networks for Traffic Safety.

    PubMed

    Reyes-Muñoz, Angelica; Domingo, Mari Carmen; López-Trinidad, Marco Antonio; Delgado, José Luis

    2016-01-01

    The emergence of Body Sensor Networks (BSNs) constitutes a new and fast growing trend for the development of daily routine applications. However, in the case of heterogeneous BSNs integration with Vehicular ad hoc Networks (VANETs) a large number of difficulties remain, that must be solved, especially when talking about the detection of human state factors that impair the driving of motor vehicles. The main contributions of this investigation are principally three: (1) an exhaustive review of the current mechanisms to detect four basic physiological behavior states (drowsy, drunk, driving under emotional state disorders and distracted driving) that may cause traffic accidents is presented; (2) A middleware architecture is proposed. This architecture can communicate with the car dashboard, emergency services, vehicles belonging to the VANET and road or street facilities. This architecture seeks on the one hand to improve the car driving experience of the driver and on the other hand to extend security mechanisms for the surrounding individuals; and (3) as a proof of concept, an Android real-time attention low level detection application that runs in a next-generation smartphone is developed. The application features mechanisms that allow one to measure the degree of attention of a driver on the base of her/his EEG signals, establish wireless communication links via various standard wireless means, GPRS, Bluetooth and WiFi and issue alarms of critical low driver attention levels. PMID:26784204

  11. Report of the APS Ad-Hoc Committee on LGBT Issues - Presentation of Findings and Recommendations

    NASA Astrophysics Data System (ADS)

    Falk, Michael

    In 2014 the Executive Officer of the American Physical Society (APS), Kate Kirby, created an Ad-Hoc Committee on LGBT Issues (C-LGBT) charged with reporting on the obstacles to inclusion of LGBT physicists, a term which for the purpose of this report refers to persons who self-identify as lesbian, gay, bisexual, transgender, queer, questioning, intersex, or asexual, as well as other sexual and gender minorities. The full charge was as follows: ``The committee will advise the APS on the current status of LGBT issues in physics, provide recommendations for greater inclusion, and engage physicists in laying the foundation for a more inclusive physics community. ?More specifically, the committee will investigate LGBT representation in physics, assess the educational and professional climate in physics, recommend changes in policies and practices that impact LGBT physicists, and address other issues that affect inclusion.'' We will present the findings and recommendations of the C-LGBT final report, and a panel discussion will be held following the presentation to discuss the future of APS efforts toward LGBT inclusion in physics.

  12. History-based route selection for reactive ad hoc routing protocols

    NASA Astrophysics Data System (ADS)

    Medidi, Sirisha; Cappetto, Peter

    2007-04-01

    Ad hoc networks rely on cooperation in order to operate, but in a resource constrained environment not all nodes behave altruistically. Selfish nodes preserve their own resources and do not forward packets not in their own self interest. These nodes degrade the performance of the network, but judicious route selection can help maintain performance despite this behavior. Many route selection algorithms place importance on shortness of the route rather than its reliability. We introduce a light-weight route selection algorithm that uses past behavior to judge the quality of a route rather than solely on the length of the route. It draws information from the underlying routing layer at no extra cost and selects routes with a simple algorithm. This technique maintains this data in a small table, which does not place a high cost on memory. History-based route selection's minimalism suits the needs the portable wireless devices and is easy to implement. We implemented our algorithm and tested it in the ns2 environment. Our simulation results show that history-based route selection achieves higher packet delivery and improved stability than its length-based counterpart.

  13. Securing mobile ad hoc networks using danger theory-based artificial immune algorithm.

    PubMed

    Abdelhaq, Maha; Alsaqour, Raed; Abdelhaq, Shawkat

    2015-01-01

    A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs. PMID:25946001

  14. Enhanced ad hoc wireless connectivity in complex environment using small radio repeater systems

    NASA Astrophysics Data System (ADS)

    Sarabandi, Kamal; Song, Young Jun; Oh, Jungsuek

    2011-06-01

    Ad hoc communication among small robotic platforms in complex indoor environment is further challenged by three limiting factors: 1) limited power, 2) small size antennas, and 3) near-ground operation. In complex environments such as indoor scenarios often times the line-of-sight communication cannot be established and the wireless connectivity must rely on multi-path propagation. As a result, the propagation path-loss is much higher than free-space, and more power will be needed to obtain the need coverage. Near ground operation also leads to increased path-loss. To maintain the network connectivity without increasing the required power a novel high gain miniaturized radio repeater is presented. Unlike existing repeater systems, this system utilizes two closely spaced low profile miniaturized planar antennas capable of producing omnidirectional and vertical radiation patterns as well as a channel isolator layer that serves to decouple the adjacent antennas. The meta-material based channel isolator serves as an electromagnetic shield, thus enabling it to be built in a sub-wavelength size of 0.07λ0 2 × λ0/70, the smallest repeater ever built. Also wave propagation simulations have been conducted to determine the required gain of such repeaters so to ensure the signal from the repeater is the dominant component. A prototype of the small radio repeater is fabricated to verify the design performance through a standard free-space measurement setup.

  15. A DNA-Inspired Encryption Methodology for Secure, Mobile Ad Hoc Networks

    NASA Technical Reports Server (NTRS)

    Shaw, Harry

    2012-01-01

    Users are pushing for greater physical mobility with their network and Internet access. Mobile ad hoc networks (MANET) can provide an efficient mobile network architecture, but security is a key concern. A figure summarizes differences in the state of network security for MANET and fixed networks. MANETs require the ability to distinguish trusted peers, and tolerate the ingress/egress of nodes on an unscheduled basis. Because the networks by their very nature are mobile and self-organizing, use of a Public Key Infra structure (PKI), X.509 certificates, RSA, and nonce ex changes becomes problematic if the ideal of MANET is to be achieved. Molecular biology models such as DNA evolution can provide a basis for a proprietary security architecture that achieves high degrees of diffusion and confusion, and resistance to cryptanalysis. A proprietary encryption mechanism was developed that uses the principles of DNA replication and steganography (hidden word cryptography) for confidentiality and authentication. The foundation of the approach includes organization of coded words and messages using base pairs organized into genes, an expandable genome consisting of DNA-based chromosome keys, and a DNA-based message encoding, replication, and evolution and fitness. In evolutionary computing, a fitness algorithm determines whether candidate solutions, in this case encrypted messages, are sufficiently encrypted to be transmitted. The technology provides a mechanism for confidential electronic traffic over a MANET without a PKI for authenticating users.

  16. Adaptive Control Parameters for Dispersal of Multi-Agent Mobile Ad Hoc Network (MANET) Swarms

    SciTech Connect

    Kurt Derr; Milos Manic

    2013-11-01

    A mobile ad hoc network is a collection of independent nodes that communicate wirelessly with one another. This paper investigates nodes that are swarm robots with communications and sensing capabilities. Each robot in the swarm may operate in a distributed and decentralized manner to achieve some goal. This paper presents a novel approach to dynamically adapting control parameters to achieve mesh configuration stability. The presented approach to robot interaction is based on spring force laws (attraction and repulsion laws) to create near-optimal mesh like configurations. In prior work, we presented the extended virtual spring mesh (EVSM) algorithm for the dispersion of robot swarms. This paper extends the EVSM framework by providing the first known study on the effects of adaptive versus static control parameters on robot swarm stability. The EVSM algorithm provides the following novelties: 1) improved performance with adaptive control parameters and 2) accelerated convergence with high formation effectiveness. Simulation results show that 120 robots reach convergence using adaptive control parameters more than twice as fast as with static control parameters in a multiple obstacle environment.

  17. Bringing Ad-Hoc Analytics to Big Earth Data: the EarthServer Experience

    NASA Astrophysics Data System (ADS)

    Baumann, Peter

    2014-05-01

    From the commonly accepted Vs defining the Big Data challenge - volume, velocity, variety - we more and more learn that the sheer volume is not the only, and often not even the decisive factor inhibiting access and analytics. In particular variety of data is a frequent core issue, posing manifold issues. Based on this observation we claim that a key aspect to analytics is the freedom to ask any questions, simple or complex, anytime and combining any choice of data structures, whatever diverging they may be. Actually, techniques for such "ad-hoc queries" we can learn from classical databases. Their concept of high-level query languages brings along several benefits: a uniform semantic, allowing machine-to-machine communication, including automatic generation of queries; massive server-side optimization and parallelization; and building attractive client interfaces hiding the query syntax from casual users while allowing power users to utilize it. However, these benefits used to be available only on tabular and set oriented data, text, and - more recently - graph data. With the advent of Array Databases, they become available on large multidimensional raster data assets as well, getting one step closer to the Holy Grail of itnegrated, uniform retrieval for users. ErthServer is a transatlantic initiative setting up operationa linfrastructures based on this paradigm. In our talk, we present core EarthServer technology concepts as well as a spectrum of Earth Science applications utilizing the EarthServer platform for versatile, visualisation supported analytics services. Further, we discuss the substantial impact EarthServer is having on Big Geo Data standardization in OGC and ISO. Time and Internet connection permitting a live demo can be presented.

  18. Performance evaluation of reactive and proactive routing protocol in IEEE 802.11 ad hoc network

    NASA Astrophysics Data System (ADS)

    Hamma, Salima; Cizeron, Eddy; Issaka, Hafiz; Guédon, Jean-Pierre

    2006-10-01

    Wireless technology based on the IEEE 802.11 standard is widely deployed. This technology is used to support multiple types of communication services (data, voice, image) with different QoS requirements. MANET (Mobile Adhoc NETwork) does not require a fixed infrastructure. Mobile nodes communicate through multihop paths. The wireless communication medium has variable and unpredictable characteristics. Furthermore, node mobility creates a continuously changing communication topology in which paths break and new one form dynamically. The routing table of each router in an adhoc network must be kept up-to-date. MANET uses Distance Vector or Link State algorithms which insure that the route to every host is always known. However, this approach must take into account the adhoc networks specific characteristics: dynamic topologies, limited bandwidth, energy constraints, limited physical security, ... Two main routing protocols categories are studied in this paper: proactive protocols (e.g. Optimised Link State Routing - OLSR) and reactive protocols (e.g. Ad hoc On Demand Distance Vector - AODV, Dynamic Source Routing - DSR). The proactive protocols are based on periodic exchanges that update the routing tables to all possible destinations, even if no traffic goes through. The reactive protocols are based on on-demand route discoveries that update routing tables only for the destination that has traffic going through. The present paper focuses on study and performance evaluation of these categories using NS2 simulations. We have considered qualitative and quantitative criteria. The first one concerns distributed operation, loop-freedom, security, sleep period operation. The second are used to assess performance of different routing protocols presented in this paper. We can list end-to-end data delay, jitter, packet delivery ratio, routing load, activity distribution. Comparative study will be presented with number of networking context consideration and the results show

  19. Road Accident Prevention with Instant Emergency Warning Message Dissemination in Vehicular Ad-Hoc Network

    PubMed Central

    P, Gokulakrishnan; P, Ganeshkumar

    2015-01-01

    A Road Accident Prevention (RAP) scheme based on Vehicular Backbone Network (VBN) structure is proposed in this paper for Vehicular Ad-hoc Network (VANET). The RAP scheme attempts to prevent vehicles from highway road traffic accidents and thereby reduces death and injury rates. Once the possibility of an emergency situation (i.e. an accident) is predicted in advance, instantly RAP initiates a highway road traffic accident prevention scheme. The RAP scheme constitutes the following activities: (i) the Road Side Unit (RSU) constructs a Prediction Report (PR) based on the status of the vehicles and traffic in the highway roads, (ii) the RSU generates an Emergency Warning Message (EWM) based on an abnormal PR, (iii) the RSU forms a VBN structure and (iv) the RSU disseminates the EWM to the vehicles that holds the high Risk Factor (RF) and travels in High Risk Zone (HRZ). These vehicles might reside either within the RSU’s coverage area or outside RSU’s coverage area (reached using VBN structure). The RAP scheme improves the performance of EWM dissemination in terms of increase in notification and decrease in end-to-end delay. The RAP scheme also reduces infrastructure cost (number of RSUs) by formulating and deploying the VBN structure. The RAP scheme with VBN structure improves notification by 19 percent and end-to-end delay by 14.38 percent for a vehicle density of 160 vehicles. It is also proved from the simulation experiment that the performance of RAP scheme is promising in 4-lane highway roads. PMID:26636576

  20. Road Accident Prevention with Instant Emergency Warning Message Dissemination in Vehicular Ad-Hoc Network.

    PubMed

    Gokulakrishnan, P; Ganeshkumar, P

    2015-01-01

    A Road Accident Prevention (RAP) scheme based on Vehicular Backbone Network (VBN) structure is proposed in this paper for Vehicular Ad-hoc Network (VANET). The RAP scheme attempts to prevent vehicles from highway road traffic accidents and thereby reduces death and injury rates. Once the possibility of an emergency situation (i.e. an accident) is predicted in advance, instantly RAP initiates a highway road traffic accident prevention scheme. The RAP scheme constitutes the following activities: (i) the Road Side Unit (RSU) constructs a Prediction Report (PR) based on the status of the vehicles and traffic in the highway roads, (ii) the RSU generates an Emergency Warning Message (EWM) based on an abnormal PR, (iii) the RSU forms a VBN structure and (iv) the RSU disseminates the EWM to the vehicles that holds the high Risk Factor (RF) and travels in High Risk Zone (HRZ). These vehicles might reside either within the RSU's coverage area or outside RSU's coverage area (reached using VBN structure). The RAP scheme improves the performance of EWM dissemination in terms of increase in notification and decrease in end-to-end delay. The RAP scheme also reduces infrastructure cost (number of RSUs) by formulating and deploying the VBN structure. The RAP scheme with VBN structure improves notification by 19 percent and end-to-end delay by 14.38 percent for a vehicle density of 160 vehicles. It is also proved from the simulation experiment that the performance of RAP scheme is promising in 4-lane highway roads. PMID:26636576

  1. Analytical Models of Cross-Layer Protocol Optimization in Real-Time Wireless Sensor Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    The real-time interactions among the nodes of a wireless sensor network (WSN) to cooperatively process data from multiple sensors are modeled. Quality-of-service (QoS) metrics are associated with the quality of fused information: throughput, delay, packet error rate, etc. Multivariate point process (MVPP) models of discrete random events in WSNs establish stochastic characteristics of optimal cross-layer protocols. Discrete-event, cross-layer interactions in mobile ad hoc network (MANET) protocols have been modeled using a set of concatenated design parameters and associated resource levels by the MVPPs. Characterization of the "best" cross-layer designs for a MANET is formulated by applying the general theory of martingale representations to controlled MVPPs. Performance is described in terms of concatenated protocol parameters and controlled through conditional rates of the MVPPs. Modeling limitations to determination of closed-form solutions versus explicit iterative solutions for ad hoc WSN controls are examined.

  2. FRCA: a fuzzy relevance-based cluster head selection algorithm for wireless mobile ad-hoc sensor networks.

    PubMed

    Lee, Chongdeuk; Jeong, Taegwon

    2011-01-01

    Clustering is an important mechanism that efficiently provides information for mobile nodes and improves the processing capacity of routing, bandwidth allocation, and resource management and sharing. Clustering algorithms can be based on such criteria as the battery power of nodes, mobility, network size, distance, speed and direction. Above all, in order to achieve good clustering performance, overhead should be minimized, allowing mobile nodes to join and leave without perturbing the membership of the cluster while preserving current cluster structure as much as possible. This paper proposes a Fuzzy Relevance-based Cluster head selection Algorithm (FRCA) to solve problems found in existing wireless mobile ad hoc sensor networks, such as the node distribution found in dynamic properties due to mobility and flat structures and disturbance of the cluster formation. The proposed mechanism uses fuzzy relevance to select the cluster head for clustering in wireless mobile ad hoc sensor networks. In the simulation implemented on the NS-2 simulator, the proposed FRCA is compared with algorithms such as the Cluster-based Routing Protocol (CBRP), the Weighted-based Adaptive Clustering Algorithm (WACA), and the Scenario-based Clustering Algorithm for Mobile ad hoc networks (SCAM). The simulation results showed that the proposed FRCA achieves better performance than that of the other existing mechanisms. PMID:22163905

  3. Unsupervised algorithms for intrusion detection and identification in wireless ad hoc sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2009-05-01

    In previous work by the author, parameters across network protocol layers were selected as features in supervised algorithms that detect and identify certain intrusion attacks on wireless ad hoc sensor networks (WSNs) carrying multisensor data. The algorithms improved the residual performance of the intrusion prevention measures provided by any dynamic key-management schemes and trust models implemented among network nodes. The approach of this paper does not train algorithms on the signature of known attack traffic, but, instead, the approach is based on unsupervised anomaly detection techniques that learn the signature of normal network traffic. Unsupervised learning does not require the data to be labeled or to be purely of one type, i.e., normal or attack traffic. The approach can be augmented to add any security attributes and quantified trust levels, established during data exchanges among nodes, to the set of cross-layer features from the WSN protocols. A two-stage framework is introduced for the security algorithms to overcome the problems of input size and resource constraints. The first stage is an unsupervised clustering algorithm which reduces the payload of network data packets to a tractable size. The second stage is a traditional anomaly detection algorithm based on a variation of support vector machines (SVMs), whose efficiency is improved by the availability of data in the packet payload. In the first stage, selected algorithms are adapted to WSN platforms to meet system requirements for simple parallel distributed computation, distributed storage and data robustness. A set of mobile software agents, acting like an ant colony in securing the WSN, are distributed at the nodes to implement the algorithms. The agents move among the layers involved in the network response to the intrusions at each active node and trustworthy neighborhood, collecting parametric values and executing assigned decision tasks. This minimizes the need to move large amounts

  4. SARA: a self-adaptive and resource-aware approach towards secure wireless ad hoc and sensor networks

    NASA Astrophysics Data System (ADS)

    Chigan, Chunxiao; Li, Leiyuan

    2005-05-01

    Providing security is essential for mission critical Wireless Ad Hoc and Sensor Networks (WAHSN) applications. Often a highly secure mechanism inevitably consumes a rather large amount of system resources, which in turn may unintentionally cause a Security Service Denial of Service (SSDoS) attack. This paper proposes a self-adaptive resource-aware (SARA) security provisioning approach for WAHSNs. For resource scarce WAHSNs, SARA strives to provide the optimal tradeoff between the sufficient security (which is reflected by the Security Index (SI)) and the acceptable network performance degradation (which is reflected by the Performance Index (PI)). With the support of the offline optimal secure protocol selection module and the online self-adaptive security control module, SARA is capable of employing different combinations of secure protocol sets to satisfy different security need at different condition for different applications. To determine the security index SI of a secure protocol set, a heuristic cross-layer security-service mapping mechanism is presented. Furthermore, we evaluate performance index PI of a secure protocol set via simulation followed by Analysis of Variance (ANOVA). Consequently, the proposed self-adaptive security provisioning based on both SI and PI achieves the maximum overall network security services and network performance services, without causing the SSDoS attack. Furthermore, this self-adaptive mechanism is capable of switching from one secure protocol set to another while keeping similar level of security and performance, it thus provides additional security by security service hopping.

  5. Cross-layer design for intrusion detection and data security in wireless ad hoc sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2007-09-01

    A wireless ad hoc sensor network is a configuration for area surveillance that affords rapid, flexible deployment in arbitrary threat environments. There is no infrastructure support and sensor nodes communicate with each other only when they are in transmission range. The nodes are severely resource-constrained, with limited processing, memory and power capacities and must operate cooperatively to fulfill a common mission in typically unattended modes. In a wireless sensor network (WSN), each sensor at a node can observe locally some underlying physical phenomenon and sends a quantized version of the observation to sink (destination) nodes via wireless links. Since the wireless medium can be easily eavesdropped, links can be compromised by intrusion attacks from nodes that may mount denial-of-service attacks or insert spurious information into routing packets, leading to routing loops, long timeouts, impersonation, and node exhaustion. A cross-layer design based on protocol-layer interactions is proposed for detection and identification of various intrusion attacks on WSN operation. A feature set is formed from selected cross-layer parameters of the WSN protocol to detect and identify security threats due to intrusion attacks. A separate protocol is not constructed from the cross-layer design; instead, security attributes and quantified trust levels at and among nodes established during data exchanges complement customary WSN metrics of energy usage, reliability, route availability, and end-to-end quality-of-service (QoS) provisioning. Statistical pattern recognition algorithms are applied that use observed feature-set patterns observed during network operations, viewed as security audit logs. These algorithms provide the "best" network global performance in the presence of various intrusion attacks. A set of mobile (software) agents distributed at the nodes implement the algorithms, by moving among the layers involved in the network response at each active node

  6. Cross-layer protocols optimized for real-time multimedia services in energy-constrained mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2003-07-01

    Mobile ad hoc networking (MANET) supports self-organizing, mobile infrastructures and enables an autonomous network of mobile nodes that can operate without a wired backbone. Ad hoc networks are characterized by multihop, wireless connectivity via packet radios and by the need for efficient dynamic protocols. All routers are mobile and can establish connectivity with other nodes only when they are within transmission range. Importantly, ad hoc wireless nodes are resource-constrained, having limited processing, memory, and battery capacity. Delivery of high quality-ofservice (QoS), real-time multimedia services from Internet-based applications over a MANET is a challenge not yet achieved by proposed Internet Engineering Task Force (IETF) ad hoc network protocols in terms of standard performance metrics such as end-to-end throughput, packet error rate, and delay. In the distributed operations of route discovery and maintenance, strong interaction occurs across MANET protocol layers, in particular, the physical, media access control (MAC), network, and application layers. The QoS requirements are specified for the service classes by the application layer. The cross-layer design must also satisfy the battery-limited energy constraints, by minimizing the distributed power consumption at the nodes and of selected routes. Interactions across the layers are modeled in terms of the set of concatenated design parameters including associated energy costs. Functional dependencies of the QoS metrics are described in terms of the concatenated control parameters. New cross-layer designs are sought that optimize layer interdependencies to achieve the "best" QoS available in an energy-constrained, time-varying network. The protocol design, based on a reactive MANET protocol, adapts the provisioned QoS to dynamic network conditions and residual energy capacities. The cross-layer optimization is based on stochastic dynamic programming conditions derived from time-dependent models of

  7. BCDP: Budget Constrained and Delay-Bounded Placement for Hybrid Roadside Units in Vehicular Ad Hoc Networks

    PubMed Central

    Li, Peng; Huang, Chuanhe; Liu, Qin

    2014-01-01

    In vehicular ad hoc networks, roadside units (RSUs) placement has been proposed to improve the the overall network performance in many ITS applications. This paper addresses the budget constrained and delay-bounded placement problem (BCDP) for roadside units in vehicular ad hoc networks. There are two types of RSUs: cable connected RSU (c-RSU) and wireless RSU (w-RSU). c-RSUs are interconnected through wired lines, and they form the backbone of VANETs, while w-RSUs connect to other RSUs through wireless communication and serve as an economical extension of the coverage of c-RSUs. The delay-bounded coverage range and deployment cost of these two cases are totally different. We are given a budget constraint and a delay bound, the problem is how to find the optimal candidate sites with the maximal delay-bounded coverage to place RSUs such that a message from any c-RSU in the region can be disseminated to the more vehicles within the given budget constraint and delay bound. We first prove that the BCDP problem is NP-hard. Then we propose several algorithms to solve the BCDP problem. Simulation results show the heuristic algorithms can significantly improve the coverage range and reduce the total deployment cost, compared with other heuristic methods. PMID:25436656

  8. A Novel Clustering Algorithm for Mobile Ad Hoc Networks Based on Determination of Virtual Links' Weight to Increase Network Stability

    PubMed Central

    Karimi, Abbas; Afsharfarnia, Abbas; Zarafshan, Faraneh; Al-Haddad, S. A. R.

    2014-01-01

    The stability of clusters is a serious issue in mobile ad hoc networks. Low stability of clusters may lead to rapid failure of clusters, high energy consumption for reclustering, and decrease in the overall network stability in mobile ad hoc network. In order to improve the stability of clusters, weight-based clustering algorithms are utilized. However, these algorithms only use limited features of the nodes. Thus, they decrease the weight accuracy in determining node's competency and lead to incorrect selection of cluster heads. A new weight-based algorithm presented in this paper not only determines node's weight using its own features, but also considers the direct effect of feature of adjacent nodes. It determines the weight of virtual links between nodes and the effect of the weights on determining node's final weight. By using this strategy, the highest weight is assigned to the best choices for being the cluster heads and the accuracy of nodes selection increases. The performance of new algorithm is analyzed by using computer simulation. The results show that produced clusters have longer lifetime and higher stability. Mathematical simulation shows that this algorithm has high availability in case of failure. PMID:25114965

  9. Determination of endogenous concentration of γ-hydroxybutyric acid (GHB) in hair through an ad hoc GC-MS analysis: A study on a wide population and influence of gender and age.

    PubMed

    Vaiano, Fabio; Serpelloni, Giovanni; Furlanetto, Sandra; Palumbo, Diego; Mari, Francesco; Fioravanti, Alessia; Bertol, Elisabetta

    2016-01-25

    γ-Hydroxybutyric acid (GHB) spread for recreational purposes or as "rape drug" represents a hard issue for forensic toxicologists due to its endogenous nature. It is clear that an actual and reliable discrimination between basal and exogenous levels is mandatory to achieve a correct evaluation of conscious/unconscious administration. This research aimed to study the GHB baseline in hair samples, collected from 150 volunteers, non-consumers of any drugs of abuse, in order to evaluate if a generic cut-off value could be accepted, also focusing on potential influences of gender and age. The analysis consisted of an overnight incubation with NaOH at 56 °C, liquid-liquid extraction with ethylacetate and trimethylsylil derivatization. Detection was carried out through gas chromatography-mass spectrometry in single ion monitoring (m/z 233, 234, 147 for GHB; m/z 239, 240 and 147 for GHB-d6). The endogenous amount in "blank" hair was estimated by the standard addition method. Concentration range was 0.279-2.839 ng/mg. In males, the average GHB levels were higher than in females (0.829 vs 0.596 ng/mg, respectively), especially in the first age category (<30 years, 1.008 vs 0.606 ng/mg, respectively). Age influences on GHB levels seemed to be different among the two sexes: in male population concentrations were higher <30 (1.008 ng/mg) and similar in the other age ranges (0.762 ng/mg, 30-50; 0.763 ng/mg, >50); in female, quite similar levels were registered throughout all the age categories (0.606 ng/mg, <30; 0.536 ng/mg, 30-50; 0.691 ng/mg, >50). Further study should be performed on GHB physiology in order to better understand these differences among ages and genders. Moreover, we demonstrated that for hair analysis a cut-off reference value is not strictly mandatory, underlining the great interpretative valence of segmental analysis. PMID:26551534

  10. Evaluating the Importance of Image-related Text for Ad-hoc and Case-based Biomedical Article Retrieval

    PubMed Central

    Simpson, Matthew S.; Demner-Fushman, Dina; Thoma, George R.

    2010-01-01

    Images and their associated text are an essential source of information in biomedical articles. However, their use in providing evidence for clinical case descriptions has yet to be evaluated in the context of information retrieval. Given the complexity of case-based document retrieval, understanding the importance of images and image-related text is critical for future research into text- and content-based approaches to this problem. In this study, we compare the extent to which image-related text is useful in facilitating document retrieval for both case-based information requests and ad-hoc clinical questions in the domain of family practice. We show that case-based document retrieval is significantly improved with the use of image-related text whereas retrieval for clinical questions is largely unaffected. This suggests that visual evidence is more relevant for the case descriptions used in our study than the clinical questions. PMID:21347079

  11. Scope of practice in speech-language pathology. Ad Hoc Committee on Scope of Practice in Speech-Language Pathology.

    PubMed

    1996-01-01

    This scope of practice in speech-language pathology statement is an official policy of the American Speech-Language-Hearing Association (ASHA). It was developed by the Ad Hoc Committee on Scope of Practice in Speech-Language Pathology: Sarah W. Blackstone, chair; Diane Paul-Brown, ex officio; David A. Brandt; Rhonda Friedlander; Luis F. Riquelme; and Mark Ylvisaker. Crystal S. Cooper, vice president for professional practices in speech-language pathology, served as monitoring vice-president. The contributions of the editor, Jude Langsam, and select the widespread peer reviewers are grateful acknowledged. This statement supersedes the Scope of Practice, Speech-Language Pathology and Audiology statement (LC 6-89), Asha, April 1990, 1-2. PMID:8680261

  12. Potentials, Limitations and Applications of long-term and mobile ad-hoc Wireless Sensor Networks for Environmental Monitoring

    NASA Astrophysics Data System (ADS)

    Bumberger, Jan; Mollenhauer, Hannes; Lapteva, Yulia; Hutschenreuther, Tino; Toepfer, Hannes; Dietrich, Peter

    2014-05-01

    To characterize environmental systems it is necessary to identify and describe processes with suitable methods. Environmental systems are often characterized by their high heterogeneity, so individual measurements for their complete representation are often not sufficient. The application of wireless sensor networks in terrestrial and aquatic ecosystems offer significant benefits as a better consideration of the local test conditions becomes possible. This can be essential for the monitoring of heterogeneous environmental systems. Significant advantages in the application of mobile ad-hoc wireless sensor networks are their self-organizing behavior, resulting in a major reduction in installation and operation costs and time. In addition, a point measurement with a sensor is significantly improved by measuring at several points. It is also possible to perform analog and digital signal processing and computation on the basis of the measured data close to the sensor. Hence, a significant reduction of the data to be transmitted can be achieved which leads to a better energy management of sensor nodes. Furthermore, their localization via satellite, the miniaturization of the nodes and long-term energy self-sufficiency are current topics under investigation. The possibilities and limitations of the applicability of wireless sensor networks for long-term and mobile environmental monitoring are presented. A concepts and realization example are given in the field of micrometeorology and soil parameters for the interaction of biotic and abiotic processes .This long term monitoring is part of the Global Change Experimental Facility (GCEF), a large field-based experimental platform to assess the effects of climate change on ecosystem functions and processes under different land-use scenarios. Furthermore a mobile ad-hoc sensor network is presented for the monitoring of water induced mass wasting processes.

  13. On using multiple routing metrics with destination sequenced distance vector protocol for MultiHop wireless ad hoc networks

    NASA Astrophysics Data System (ADS)

    Mehic, M.; Fazio, P.; Voznak, M.; Partila, P.; Komosny, D.; Tovarek, J.; Chmelikova, Z.

    2016-05-01

    A mobile ad hoc network is a collection of mobile nodes which communicate without a fixed backbone or centralized infrastructure. Due to the frequent mobility of nodes, routes connecting two distant nodes may change. Therefore, it is not possible to establish a priori fixed paths for message delivery through the network. Because of its importance, routing is the most studied problem in mobile ad hoc networks. In addition, if the Quality of Service (QoS) is demanded, one must guarantee the QoS not only over a single hop but over an entire wireless multi-hop path which may not be a trivial task. In turns, this requires the propagation of QoS information within the network. The key to the support of QoS reporting is QoS routing, which provides path QoS information at each source. To support QoS for real-time traffic one needs to know not only minimum delay on the path to the destination but also the bandwidth available on it. Therefore, throughput, end-to-end delay, and routing overhead are traditional performance metrics used to evaluate the performance of routing protocol. To obtain additional information about the link, most of quality-link metrics are based on calculation of the lost probabilities of links by broadcasting probe packets. In this paper, we address the problem of including multiple routing metrics in existing routing packets that are broadcasted through the network. We evaluate the efficiency of such approach with modified version of DSDV routing protocols in ns-3 simulator.

  14. Augmenting 3d City Model Components by Geodata Joins to Facilitate Ad-Hoc Geometric-Topologically Sound Integration

    NASA Astrophysics Data System (ADS)

    Kaden, R.; Kolbe, T. H.

    2012-07-01

    Virtual 3D city models are integrated complex compositions of spatial data of different themes, origin, quality, scale, and dimensions. Within this paper, we address the problem of spatial compatibility of geodata aiming to provide support for ad-hoc integration of virtual 3D city models including geodata of different sources and themes like buildings, terrain, and city furniture. In contrast to related work which is dealing with the integration of redundant geodata structured according to different data models and ontologies, we focus on the integration of complex 3D models of the same representation (here: CityGML) but regarding to the geometric-topological consistent matching of non-homologous objects, e.g. a building is connected to a road, and their geometric homogenisation. Therefore, we present an approach including a data model for a Geodata Join and the general concept of an integration procedure using the join information. The Geodata Join aims to bridge the lack of information between fragmented geodata by describing the relationship between adjacent objects from different datasets. The join information includes the geometrical representation of those parts of an object, which have a specific/known topological or geometrical relationship to another object. This part is referred to as a Connector and is either described by points, lines, or surfaces of the existing object geometry or by additional join geometry. In addition, the join information includes the specification of the connected object in the other dataset and the description of the topological and geometrical relationship between both objects, which is used to aid the matching process. Furthermore, the Geodata Join contains object-related information like accuracy values and restrictions of movement and deformation which are used to optimize the integration process. Based on these parameters, a functional model including a matching algorithm, transformation methods, and conditioned adjustment

  15. Criteria for intraventricular conduction disturbances and pre-excitation. World Health Organizational/International Society and Federation for Cardiology Task Force Ad Hoc.

    PubMed

    Willems, J L; Robles de Medina, E O; Bernard, R; Coumel, P; Fisch, C; Krikler, D; Mazur, N A; Meijler, F L; Mogensen, L; Moret, P

    1985-06-01

    In an effort to standardize terminology and criteria for clinical electrocardiography, and as a follow-up of its work on definitions of terms related to cardiac rhythm, an Ad Hoc Working Group established by the World Health Organization and the International Society and Federation of Cardiology reviewed criteria for the diagnosis of conduction disturbances and pre-excitation. Recommendations resulting from these discussions are summarized for the diagnosis of complete and incomplete right and left bundle branch block, left anterior and left posterior fascicular block, nonspecific intraventricular block, Wolff-Parkinson-White syndrome and related pre-excitation patterns. Criteria for intraatrial conduction disturbances are also briefly reviewed. The criteria are described in clinical terms. A concise description of the criteria using formal Boolean logic is given in the Appendix. For the incorporation into computer electrocardiographic analysis programs, the limits of some interval measurements may need to be adjusted. PMID:3889097

  16. On the Connectivity, Lifetime and Hop Count of Routes Determined Using the City Section and Manhattan Mobility Models for Vehicular Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Meghanathan, Natarajan

    The high-level contribution of this paper is a simulation based analysis of the network connectivity, hop count and lifetime of the routes determined for vehicular ad hoc networks (VANETs) using the City Section and Manhattan mobility models. The Random Waypoint mobility model is used as a benchmark in the simulation studies. Two kinds of paths are determined on the sequence of static graphs representing the topology over the duration of the network session: paths with the minimum hop count (using the Dijkstra algorithm) and stable paths with the longest lifetime (using our recently proposed OptPathTrans algorithm). Simulation results indicate that the City Section model provided higher network connectivity compared to the Manhattan model for all the network scenarios. Minimum hop paths and stable paths determined under the Manhattan model have a smaller lifetime and larger hop count compared to those determined using the City Section and Random Waypoint mobility models.

  17. A Time-Slotted On-Demand Routing Protocol for Mobile Ad Hoc Unmanned Vehicle Systems

    SciTech Connect

    Hope Forsmann; Robert Hiromoto; John Svoboda

    2007-04-01

    The popularity of UAVs has increased dramatically because of their successful deployment in military operations, their ability to preserve human life, and the continual improvements in wireless communication that serves to increase their capabilities. We believe the usefulness of UAVs would be dramatically increased if formation flight were added to the list of capabilities. Currently, sustained formation flight with a cluster of UAVs has only been achieved with two nodes by the Multi-UAV Testbed at the Massachusetts Institute of Technology. (Park, 2004) Formation flight is a complex operation requiring the ability to adjust the flight patterns on the fly and correct for wind gusts, terrain, and differences in node equipment. All of which increases the amount of inner node communication. Since one of the problems with MANET communication is network congestion, we believe a first step towards formation flight can be made through improved inner node communication. We have investigated current communication routing protocols and developed an altered hybrid routing protocol in order to provide communication with less network congestion.

  18. Ad Hoc Influenza Vaccination During Years of Significant Antigenic Drift in a Tropical City With 2 Seasonal Peaks

    PubMed Central

    Wong, Martin C.S.; Nelson, E. Anthony S.; Leung, Czarina; Lee, Nelson; Chan, Martin C.W.; Choi, Kin Wing; Rainer, Timothy H.; Cheng, Frankie W.T.; Wong, Samuel Y.S.; Lai, Christopher K.C.; Lam, Bosco; Cheung, Tak Hong; Leung, Ting Fan; Chan, Paul K.S.

    2016-01-01

    Abstract We evaluated the acceptability of an additional ad hoc influenza vaccination among the health care professionals following seasons with significant antigenic drift. Self-administered, anonymous surveys were performed by hard copy questionnaires in public hospitals, and by an on-line platform available to all healthcare professionals, from April 1st to May 31st, 2015. A total of 1290 healthcare professionals completed the questionnaires, including doctors, nurses, and allied health professionals working in both the public and private systems. Only 31.8% of participating respondents expressed an intention to receive the additional vaccine, despite that the majority of them agreed or strongly agreed that it would bring benefit to the community (88.9%), save lives (86.7%), reduce medical expenses (76.3%), satisfy public expectation (82.8%), and increase awareness of vaccination (86.1%). However, a significant proportion expressed concern that the vaccine could disturb the normal immunization schedule (45.5%); felt uncertain what to do in the next vaccination round (66.0%); perceived that the summer peak might not occur (48.2%); and believed that the summer peak might not be of the same virus (83.5%). Furthermore, 27.8% of all respondents expected that the additional vaccination could weaken the efficacy of previous vaccinations; 51.3% was concerned about side effects; and 61.3% estimated that there would be a low uptake rate. If the supply of vaccine was limited, higher priority groups were considered to include the elderly aged ≥65 years with chronic medical conditions (89.2%), the elderly living in residential care homes (87.4%), and long-stay residents of institutions for the disabled (80.7%). The strongest factors associated with accepting the additional vaccine included immunization with influenza vaccines in the past 3 years, higher perceived risk of contracting influenza, and higher perceived severity of the disease impact. The acceptability to an

  19. Preserving Nevada's Environmental Heritage: A Report of the Ad Hoc Committee on Environmental Quality. Final Report to the Governor's Natural Resources Council.

    ERIC Educational Resources Information Center

    Nevada State Dept. of Conservation and Natural Resources, Carson City.

    The Environmental Quality Ad Hoc Committee has prepared this report for the Governor's Natural Resources Council (Nevada). It is a compilation of available factual data focusing attention on needed statutory and administrative changes to preserve Nevada's environmental heritage and from which recommendations for future budgetary and legislative…

  20. The Future of 12th Grade NAEP: Report of the Ad Hoc Committee on Planning for NAEP 12th Grade Assessments in 2009

    ERIC Educational Resources Information Center

    National Assessment Governing Board, 2006

    2006-01-01

    The task of the Ad Hoc Committee on Planning for the the National Assessment of Educational Progress (NAEP) 12th Grade Assessments in 2009 addresses three policy areas: (1) Conducting assessment at the state level in 12th grade; (2) Reporting on 12th grade student preparedness for college-credit coursework, training for employment and entrance…

  1. Scientific and Technical Information for Developing Countries. A Report of an Ad Hoc Advisory Panel of the Board on Science and Technology for International Development.

    ERIC Educational Resources Information Center

    National Academy of Sciences - National Research Council, Washington, DC.

    This report from an ad hoc advisory panel of the Board of Science and Technology for International Development attempts to provide an argument for the importance of systematic scientific and technical information transfer within the framework of the total technical assistance effort. It stresses the need for substantially greater activity and a…

  2. Priorities in Community Services Research for the Northeast: A Report of the Ad Hoc Committee on Community Services. Publication No. 10.

    ERIC Educational Resources Information Center

    Northeast Regional Center for Rural Development, Ithaca, NY.

    Constituted to include research users, the ad hoc Committee on Community Services Research in the Northeast analyzed the problems and information needs of community service personnel during a conference session. Issues and questions derived from this initial interchange were categorized and then translated into research problems. Criteria employed…

  3. Report of the NASA Ad Hoc Committee on failure of high strength structural materials

    NASA Technical Reports Server (NTRS)

    Brown, W. F., Jr. (Editor)

    1972-01-01

    An analysis of structural failures that have occurred in NASA programs was conducted. Reports of 231 examples of structural failure were reviewed. Attempts were made to identify those factors which contributed to the failures, and recommendations were formulated for actions which would minimize their effects on future NASA programs. Two classes of factors were identified: (1) those associated with deficiencies in existing materials and structures technology and (2) those attributable to inadequate documentation or communication of that technology.

  4. Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsaur, Woei-Jiunn; Pai, Haw-Tyng

    2008-11-01

    The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.

  5. Services Oriented Architectures and Rapid Deployment of Ad-Hoc Health Surveillance Systems: Lessons from Katrina Relief Efforts

    PubMed Central

    Mirhaji, Parsa; Casscells, S. Ward; Srinivasan, Arunkumar; Kunapareddy, Narendra; Byrne, Sean; Richards, David; Arafat, Raouf

    2006-01-01

    During the Hurricane Katrina relief efforts, a new city was born overnight within the City of Houston to provide accommodation and health services for thousands of evacuees deprived of food, rest, medical attention, and sanitation [1]. The hurricane victims had been exposed to flood water, toxic materials, physical injury, and mental stress. This scenario was an invitation for a variety of public health hazards, primarily infectious disease outbreaks. Early detection and monitoring of morbidity and mortality among evacuees due to unattended health conditions was an urgent priority and called for deployment of real-time surveillance to collect and analyze data at the scene, and to enable and guide appropriate response and planning activities [2]. To address this need, the University of Texas Health Science Center at Houston (UTHSC) and the Houston Department of Health and Human Services (HDHHS) deployed an ad hoc surveillance system overnight by leveraging Internet-based technologies and Services Oriented Architecture (SOA) [3, 4]. The system was post-coordinated through the orchestration of Web Services such as information integration, natural language processing, UMLS terminology services, syndromic case finding, and online analytical processing (OLAP) [5]. Here we will report the use of Internet-based and distributed architectures in providing timely, novel, and customizable solutions just in time for unprecedented events such as natural disasters. PMID:17238405

  6. On interaction between MAC and transport layers for media streaming in 802.11 ad hoc networks

    NASA Astrophysics Data System (ADS)

    Nahm, Kitae; Helmy, Ahmed; Kuo, C.-C. Jay

    2004-10-01

    We examine the validity of TCP-friendliness and the utility of equation-based congestion control as a mean for the media streaming service in 802.11 multi-hop networks. Our investigation is motivated by the recent findings of the bandwidth-delay product of 802.11 multi-hop networks via intensive computer simulations. We show that TCP behavior in 802.11 multi-hop networks is generally inefficient and unstable because the standard TCP is too aggressive considering the low bandwidth-delay product of 802.11 networks. We introduce the concept of the `fractional window' mechanism (which resembles the stop-and-go protocol) for TCP, and show that the modified TCP is more stable and efficient while outperforming the legacy TCP in 802.11-based ad hoc networks. Finally, we show that many of the typical problems of TCP protocol (performance, network fairness, and TCP-friendliness) in 802.11 networks can be solved simply by increasing the bandwidth-delay product of 802.11 networks without any TCP modification. Based on this observation, we conclude that the assumption of the ideal steady-state TCP behavior is generally invalid in 802.11 multi-hop networking environment, and that congestion control based on TCP-friendly equation can hardly provide TCP-fair throughput and smoothness in 802.11 multi-hop networking environment.

  7. Obtaining appropriate interval estimates for age when multiple indicators are used: evaluation of an ad-hoc procedure.

    PubMed

    Fieuws, Steffen; Willems, Guy; Larsen-Tangmose, Sara; Lynnerup, Niels; Boldsen, Jesper; Thevissen, Patrick

    2016-03-01

    When an estimate of age is needed, typically multiple indicators are present as found in skeletal or dental information. There exists a vast literature on approaches to estimate age from such multivariate data. Application of Bayes' rule has been proposed to overcome drawbacks of classical regression models but becomes less trivial as soon as the number of indicators increases. Each of the age indicators can lead to a different point estimate ("the most plausible value for age") and a prediction interval ("the range of possible values"). The major challenge in the combination of multiple indicators is not the calculation of a combined point estimate for age but the construction of an appropriate prediction interval. Ignoring the correlation between the age indicators results in intervals being too small. Boldsen et al. (2002) presented an ad-hoc procedure to construct an approximate confidence interval without the need to model the multivariate correlation structure between the indicators. The aim of the present paper is to bring under attention this pragmatic approach and to evaluate its performance in a practical setting. This is all the more needed since recent publications ignore the need for interval estimation. To illustrate and evaluate the method, Köhler et al. (1995) third molar scores are used to estimate the age in a dataset of 3200 male subjects in the juvenile age range. PMID:26024791

  8. Extended Virtual Spring Mesh (EVSM): The Distributed Self-Organizing Mobile Ad Hoc Network for Area Exploration

    SciTech Connect

    Kurt Derr

    2011-12-01

    Mobile Ad hoc NETworks (MANETs) are distributed self-organizing networks that can change locations and configure themselves on the fly. This paper focuses on an algorithmic approach for the deployment of a MANET within an enclosed area, such as a building in a disaster scenario, which can provide a robust communication infrastructure for search and rescue operations. While a virtual spring mesh (VSM) algorithm provides scalable, self-organizing, and fault-tolerant capabilities required by aMANET, the VSM lacks the MANET's capabilities of deployment mechanisms for blanket coverage of an area and does not provide an obstacle avoidance mechanism. This paper presents a new technique, an extended VSM (EVSM) algorithm that provides the following novelties: (1) new control laws for exploration and expansion to provide blanket coverage, (2) virtual adaptive springs enabling the mesh to expand as necessary, (3) adapts to communications disturbances by varying the density and movement of mobile nodes, and (4) new metrics to assess the performance of the EVSM algorithm. Simulation results show that EVSM provides up to 16% more coverage and is 3.5 times faster than VSM in environments with eight obstacles.

  9. Do we need an Ad hoc chemical mechanism for Mexico City's photochemical smog?

    NASA Astrophysics Data System (ADS)

    Ruiz-Suárez, L. G.; Castro, T.; Mar, B.; Ruiz-Santoyo, M. E.; Cruz, X.

    Chemical mechanisms in mathematical models for air quality studies represent the synthesis of about 30 years of research in gas kinetics and atmospheric chemistry, and are able to represent, to a good extent, the chemistry of photochemical smog. However, due to the large amount of computer resources required by these models, different well-known approaches have been used in order to make them operative. In any of these approaches, a set of educated guesses is made, based upon the knowledge of the conditions under which the reactions occur and the competition between them, and upon the expected absolute and relative concentrations of the emitted reactive organic gases (ROG). Are those educated guesses applicable to Mexico City? Do we know enough how the prevalent conditions of temperature, total pressure, ultraviolet irradiation and water content in the atmosphere operate over the chemistry of photochemical smog? An answer to these questions has been attempted by performing variational analysis of selected hydrocarbons. Some results for n-butane, propene and trans-2-butene are shown; they show that under conditions of high reactivity, some assumptions may not be applicable to Mexico City. Also, the results serve to show the applicability of the method to preliminary reactivity studies.

  10. Ad-hoc model acquisition for combat simulation in urban terrain

    NASA Astrophysics Data System (ADS)

    Bulatov, Dimitri; Solbrig, Peter; Wernerus, Peter

    2012-10-01

    Situation awareness in complex urban environments is an important component for a successful task fulfillment both in military and civil area of applications. In the first area, the fields of deployment of the members of the North Atlantic Alliance have been changed, in the past two decades, from the originally assigned task of acting as national and allied defense forces within the partners' own borders to out-of-area missions under conditions of an asymmetric conflict. Because of its complicated structure, urban terrain represents a particular difficulty of military missions such as patrolling. In the civil field of applications, police and rescue forces are also often strongly dependent on a local visibility and accessibility analysis. However, the process of decision-taking within a short time and under enormous pressure can be extensively trained in an environment that is tailored to the concrete situation. The contribution of this work consists of context-based modeling of urban terrain that can be then integrated into simulation software, for example, Virtual Battlespace 2 (VBS2). The input of our procedure is made up by the airborne sensor data, collected either by an active or a passive sensor. The latter is particularly important if the application is time-critical or the area to be explored is small. After description of our procedure for urban terrain modeling with a detailed focus on the recent innovations, the main steps of model integration into simulation software will be presented and two examples of missions for military and civil applications that can be easily created with VBS2 will be given.

  11. A probabilistic dynamic energy model for ad-hoc wireless sensors network with varying topology

    NASA Astrophysics Data System (ADS)

    Al-Husseini, Amal

    In this dissertation we investigate the behavior of Wireless Sensor Networks (WSNs) from the degree distribution and evolution perspective. In specific, we focus on implementation of a scale-free degree distribution topology for energy efficient WSNs. WSNs is an emerging technology that finds its applications in different areas such as environment monitoring, agricultural crop monitoring, forest fire monitoring, and hazardous chemical monitoring in war zones. This technology allows us to collect data without human presence or intervention. Energy conservation/efficiency is one of the major issues in prolonging the active life WSNs. Recently, many energy aware and fault tolerant topology control algorithms have been presented, but there is dearth of research focused on energy conservation/efficiency of WSNs. Therefore, we study energy efficiency and fault-tolerance in WSNs from the degree distribution and evolution perspective. Self-organization observed in natural and biological systems has been directly linked to their degree distribution. It is widely known that scale-free distribution bestows robustness, fault-tolerance, and access efficiency to system. Fascinated by these properties, we propose two complex network theoretic self-organizing models for adaptive WSNs. In particular, we focus on adopting the Barabasi and Albert scale-free model to fit into the constraints and limitations of WSNs. We developed simulation models to conduct numerical experiments and network analysis. The main objective of studying these models is to find ways to reducing energy usage of each node and balancing the overall network energy disrupted by faulty communication among nodes. The first model constructs the wireless sensor network relative to the degree (connectivity) and remaining energy of every individual node. We observed that it results in a scale-free network structure which has good fault tolerance properties in face of random node failures. The second model considers

  12. EFFECT OF MOBILITY ON PERFORMANCE OF WIRELESS AD-HOC NETWORK PROTOCOLS.

    SciTech Connect

    Barrett, C. L.; Drozda, M.; Marathe, M. V.; Marathe, A.

    2001-01-01

    not only speed that influences the performance but also node degree and connectivity of the dynamic network that affects the protocol performance. 'The main implication of OUI' work is that performance analysis of protocols at a given level in the protocol stack need to be studied not locally in isolation but as a part of the complete protocol stack. The results suggest that in order to improve the pcrlormance of a communication network, it will be important to study the entire protocol stack as a single algorithmic construct; optimizing individual layers in the 7 layer OS1 stilck will not yield performance improvements beyond a point. A methodological contribution of this paper is the use of statistical methods such as design of experinierits arzd aiialysis qf variance methods to characterize the interaction between the protocols, mobility patterns and speed. This allows us to mako much more informed conclusions about the performance of thc protocols than would have been possible by merely running these experiments and observing the data. These ideas are of independtmt interest and are applicable in other contexts wherein one experimentally analyzes algorithms.

  13. Ad Hoc Rural Regionalism

    ERIC Educational Resources Information Center

    Hamin, Elisabeth M.; Marcucci, Daniel J.

    2008-01-01

    A new regionalism has been much documented and researched for metropolitan areas; this article documents that there is a new rural regionalism as well. In the United States, these groups appear most likely to emerge in areas that are challenged by outcomes characterizing globalization's effects on the rural condition: namely, exurban or…

  14. Adaptive Wireless Ad-hoc Sensor Networks for Long-term and Event-oriented Environmental Monitoring

    NASA Astrophysics Data System (ADS)

    Bumberger, Jan; Mollenhauer, Hannes; Remmler, Paul; Schaedler, Martin; Schima, Robert; Mollenhauer, Olaf; Hutschenreuther, Tino; Toepfer, Hannes; Dietrich, Peter

    2015-04-01

    Ecosystems are often characterized by their high heterogeneity, complexity and dynamic. Hence, single point measurements are often not sufficient for their complete representation. The application of wireless sensor networks in terrestrial and aquatic environmental systems offer significant benefits as a better consideration to the local test conditions, due to the simple adjustment of the sensor distribution, the sensor types and the sample rate. Another advantage of wireless ad-hoc sensor networks is their self-organizing behavior, resulting in a major reduction in installation and operation costs and time. In addition, individual point measurements with a sensor are significantly improved by measuring at several points continuously. In this work a concept and realization for Long-term ecosystem research is given in the field monitoring of micrometeorology and soil parameters for the interaction of biotic and abiotic processes. This long term analyses are part of the Global Change Experimental Facility (GCEF), a large field-based experimental platform to assess the effects of climate change on ecosystem functions and processes under different land-use scenarios. Regarding to the adaptive behavior of the network, also a mobile version was developed to overcome the lack of information of temporally and spatially fixed measurements for the detection and recording of highly dynamic or time limited processes. First results of different field campaigns are given to present the potentials and limitations of this application in environmental science, especially for the monitoring of the interaction of biotic and abiotic processes, soil-atmosphere interaction and the validation of remote sensing data.

  15. Combined bio-inspired/evolutionary computational methods in cross-layer protocol optimization for wireless ad hoc sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2011-06-01

    Published studies have focused on the application of one bio-inspired or evolutionary computational method to the functions of a single protocol layer in a wireless ad hoc sensor network (WSN). For example, swarm intelligence in the form of ant colony optimization (ACO), has been repeatedly considered for the routing of data/information among nodes, a network-layer function, while genetic algorithms (GAs) have been used to select transmission frequencies and power levels, physical-layer functions. Similarly, artificial immune systems (AISs) as well as trust models of quantized data reputation have been invoked for detection of network intrusions that cause anomalies in data and information; these act on the application and presentation layers. Most recently, a self-organizing scheduling scheme inspired by frog-calling behavior for reliable data transmission in wireless sensor networks, termed anti-phase synchronization, has been applied to realize collision-free transmissions between neighboring nodes, a function of the MAC layer. In a novel departure from previous work, the cross-layer approach to WSN protocol design suggests applying more than one evolutionary computational method to the functions of the appropriate layers to improve the QoS performance of the cross-layer design beyond that of one method applied to a single layer's functions. A baseline WSN protocol design, embedding GAs, anti-phase synchronization, ACO, and a trust model based on quantized data reputation at the physical, MAC, network, and application layers, respectively, is constructed. Simulation results demonstrate the synergies among the bioinspired/ evolutionary methods of the proposed baseline design improve the overall QoS performance of networks over that of a single computational method.

  16. Adaptive Wireless Ad-hoc Sensor Networks for Long-term and Event-oriented Environmental Monitoring

    NASA Astrophysics Data System (ADS)

    Bumberger, Jan; Mollenhauer, Hannes; Remmler, Paul; Chirila, Andrei Marian; Mollenhauer, Olaf; Hutschenreuther, Tino; Toepfer, Hannes; Dietrich, Peter

    2016-04-01

    Ecosystems are often characterized by their high heterogeneity, complexity and dynamic. Hence, single point measurements are often not sufficient for their complete representation. The application of wireless sensor networks in terrestrial and aquatic environmental systems offer significant benefits as a better consideration to the local test conditions, due to the simple adjustment of the sensor distribution, the sensor types and the sample rate. Another advantage of wireless ad-hoc sensor networks is their self-organizing behavior, resulting in a major reduction in installation and operation costs and time. In addition, individual point measurements with a sensor are significantly improved by measuring at several points continuously. In this work a concept and realization for Long-term ecosystem research is given in the field monitoring of micrometeorology and soil parameters for the interaction of biotic and abiotic processes. This long term analyses are part of the Global Change Experimental Facility (GCEF), a large field-based experimental platform to assess the effects of climate change on ecosystem functions and processes under different land-use scenarios. Regarding to the adaptive behavior of the network, also a mobile version was developed to overcome the lack of information of temporally and spatially fixed measurements for the detection and recording of highly dynamic or time limited processes. First results of different field campaigns are given to present the potentials and limitations of this application in environmental science, especially for the monitoring of the interaction of biotic and abiotic processes, soil-atmosphere interaction and the validation of remote sensing data.

  17. Clinician Ratings of Interpreter Mediated Visits in Underserved Primary Care Settings with Ad hoc, In-person Professional, and Video Conferencing Modes

    PubMed Central

    Nápoles, Anna M.; Santoyo-Olsson, Jasmine; Karliner, Leah S.; O’Brien, Helen; Gregorich, Steven E.; Pérez-Stable, Eliseo J.

    2013-01-01

    Language interpretation ameliorates health disparities among underserved limited English-proficient patients, yet few studies have compared clinician satisfaction with these services. Self-administered clinician post-visit surveys compared the quality of interpretation and communication, visit satisfaction, degree of patient engagement, and cultural competence of visits using untrained people acting as interpreters (ad hoc), in-person professional, or video conferencing professional interpretation for 283 visits. Adjusting for clinician and patient characteristics, the quality of interpretation of in-person and video conferencing modes were rated similarly (OR=1.79; 95% CI 0.74, 4.33). The quality of in-person (OR=5.55; 95% CI 1.50, 20.51) and video conferencing (OR=3.10; 95% CI 1.16, 8.31) were rated higher than ad hoc interpretation. Self-assessed cultural competence was better for in-person versus video conferencing interpretation (OR=2.32; 95% CI 1.11, 4.86). Video conferencing interpretation increases access without compromising quality, but cultural nuances may be better addressed by in-person interpreters. Professional interpretation is superior to ad hoc (OR=4.15; 95% CI 1.43, 12.09). PMID:20173271

  18. Development of Innovative and Inexpensive Optical Sensors in Wireless Ad-hoc Sensor Networks for Environmental Monitoring

    NASA Astrophysics Data System (ADS)

    Mollenhauer, Hannes; Schima, Robert; Assing, Martin; Mollenhauer, Olaf; Dietrich, Peter; Bumberger, Jan

    2015-04-01

    Due to the heterogeneity and dynamic of ecosystems, the observation and monitoring of natural processes necessitate a high temporal and spatial resolution. This also requires inexpensive and adaptive measurements as well as innovative monitoring strategies. To this end, the application of ad-hoc wireless sensor networks holds the potential of creating an adequate monitoring platform. In order to achieve a comprehensive monitoring in space and time with affordability, it is necessary to reduce the sensor costs. Common investigation methods, especially with regard to vegetation processes, are based on optical measurements. In particular, different wavelengths correspond to specific properties of the plants and preserve the possibility to derive information about the ecosystem, e.g. photosynthetic performance or nutrient content. In this context, photosynthetically active radiation (PAR) sensors and hyperspectral sensors are in major use. This work aims the development, evaluation and application of inexpensive but high performance optical sensors for the implementation in wireless sensor networks. Photosynthetically active radiation designates the spectral range from 400 to 700 nanometers that photosynthetic organisms are able to use in the process of photosynthesis. PAR sensors enable the detection of the reflected solar light of the vegetation in the whole PAR wave band. The amount of absorption indicates photosynthetic activity of the plant, with good approximation. Hyperspectral sensors observe specific parts or rather distinct wavelengths of the solar light spectrum and facilitate the determination of the main pigment classes, e.g. Chlorophyll, Carotenoid and Anthocyanin. Due to the specific absorption of certain pigments, a characteristic spectral signature can be seen in the visible part of the electromagnetic spectrum, known as narrow-band peaks. In an analogous manner, also the presence and concentration of different nutrients cause a characteristic spectral

  19. Ad-hoc and context-dependent adjustments of selective attention in conflict control: an ERP study with visual probes.

    PubMed

    Nigbur, R; Schneider, J; Sommer, W; Dimigen, O; Stürmer, B

    2015-02-15

    Cognitive conflict control in flanker tasks has often been described using the zoom-lens metaphor of selective attention. However, whether and how selective attention - in terms of suppression and enhancement - operates in this context has remained unclear. To examine the dynamic interplay of selective attention and cognitive control we used electrophysiological measures and presented task-irrelevant visual probe stimuli at foveal, parafoveal, and peripheral display positions. Target-flanker congruency varied either randomly from trial to trial (mixed-block) or block-wise (fixed-block) in order to induce reactive versus proactive control modes, respectively. Three EEG measures were used to capture ad-hoc adjustments within trials as well as effects of context-based predictions: the N1 component of the visual evoked potential (VEP) to probes, the VEP to targets, and the conflict-related midfrontal N2 component. Results from probe-VEPs indicate that enhanced processing of the foveal target rather than suppression of the peripheral flankers supports interference control. In incongruent mixed-block trials VEPs were larger to probes near the targets. In the fixed-blocks probe-VEPs were not modulated, but contrary to the mixed-block the preceding target-related VEP was affected by congruency. Results of the control-related N2 reveal largest amplitudes in the unpredictable context, which did not differentiate for stimulus and response incongruency. In contrast, in the predictable context, N2 amplitudes were reduced overall and differentiated between stimulus and response incongruency. Taken together these results imply that predictability alters interference control by a reconfiguration of stimulus processing. During unpredictable sequences participants adjust their attentional focus dynamically on a trial-by-trial basis as reflected in congruency-dependent probe-VEP-modulation. This reactive control mode also elicits larger N2 amplitudes. In contrast, when task demands

  20. A Security Solution for IEEE 802.11's Ad-hoc Mode:Password-Authentication and Group Diffie-Hellman Key Exchange

    SciTech Connect

    Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval

    2005-10-01

    The IEEE 802 standards ease the deployment of networkinginfrastructures and enable employers to accesscorporate networks whiletraveling. These standards provide two modes of communication calledinfrastructure and ad-hoc modes. A security solution for the IEEE802.11's infrastructure mode took several years to reach maturity andfirmware are still been upgraded, yet a solution for the ad-hoc modeneeds to be specified. The present paper is a first attempt in thisdirection. It leverages the latest developments in the area ofpassword-based authentication and (group) Diffie-Hellman key exchange todevelop a provably-secure key-exchange protocol for IEEE 802.11's ad-hocmode. The protocol allows users to securely join and leave the wirelessgroup at time, accommodates either a single-shared password orpairwise-shared passwords among the group members, or at least with acentral server; achieves security against dictionary attacks in theideal-hash model (i.e. random-oracles). This is, to the best of ourknowledge, the first such protocol to appear in the cryptographicliterature.

  1. Myths & Facts about Value-Added Analysis

    ERIC Educational Resources Information Center

    TNTP, 2011

    2011-01-01

    This paper presents myths as well as facts about value-added analysis. These myths include: (1) "Value-added isn't fair to teachers who work in high-need schools, where students tend to lag far behind academically"; (2) "Value-added scores are too volatile from year-to-year to be trusted"; (3) "There's no research behind value-added"; (4) "Using…

  2. An ultra-wide bandwidth-based range/GPS tight integration approach for relative positioning in vehicular ad hoc networks

    NASA Astrophysics Data System (ADS)

    Shen, Feng; Wayn Cheong, Joon; Dempster, Andrew G.

    2015-04-01

    Relative position awareness is a vital premise for the implementation of emerging intelligent transportation systems, such as collision warning. However, commercial global navigation satellite systems (GNSS) receivers do not satisfy the requirements of these applications. Fortunately, cooperative positioning (CP) techniques, through sharing the GNSS measurements between vehicles, can improve the performance of relative positioning in a vehicular ad hoc network (VANET). In this paper, while assuming there are no obstacles between vehicles, a new enhanced tightly coupled CP technique is presented by adding ultra-wide bandwidth (UWB)-based inter-vehicular range measurements. In the proposed CP method, each vehicle fuses the GPS measurements and the inter-vehicular range measurements. Based on analytical and experimental results, in the full GPS coverage environment, the new tight integration CP method outperforms the INS-aided tight CP method, tight CP method, and DGPS by 11%, 15%, and 24%, respectively; in the GPS outage scenario, the performance improvement achieves 60%, 65%, and 73%, respectively.

  3. Ad Hoc Influenza Vaccination During Years of Significant Antigenic Drift in a Tropical City With 2 Seasonal Peaks: A Cross-Sectional Survey Among Health Care Practitioners.

    PubMed

    Wong, Martin C S; Nelson, E Anthony S; Leung, Czarina; Lee, Nelson; Chan, Martin C W; Choi, Kin Wing; Rainer, Timothy H; Cheng, Frankie W T; Wong, Samuel Y S; Lai, Christopher K C; Lam, Bosco; Cheung, Tak Hong; Leung, Ting Fan; Chan, Paul K S

    2016-05-01

    We evaluated the acceptability of an additional ad hoc influenza vaccination among the health care professionals following seasons with significant antigenic drift.Self-administered, anonymous surveys were performed by hard copy questionnaires in public hospitals, and by an on-line platform available to all healthcare professionals, from April 1st to May 31st, 2015. A total of 1290 healthcare professionals completed the questionnaires, including doctors, nurses, and allied health professionals working in both the public and private systems.Only 31.8% of participating respondents expressed an intention to receive the additional vaccine, despite that the majority of them agreed or strongly agreed that it would bring benefit to the community (88.9%), save lives (86.7%), reduce medical expenses (76.3%), satisfy public expectation (82.8%), and increase awareness of vaccination (86.1%). However, a significant proportion expressed concern that the vaccine could disturb the normal immunization schedule (45.5%); felt uncertain what to do in the next vaccination round (66.0%); perceived that the summer peak might not occur (48.2%); and believed that the summer peak might not be of the same virus (83.5%). Furthermore, 27.8% of all respondents expected that the additional vaccination could weaken the efficacy of previous vaccinations; 51.3% was concerned about side effects; and 61.3% estimated that there would be a low uptake rate. If the supply of vaccine was limited, higher priority groups were considered to include the elderly aged ≥65 years with chronic medical conditions (89.2%), the elderly living in residential care homes (87.4%), and long-stay residents of institutions for the disabled (80.7%). The strongest factors associated with accepting the additional vaccine included immunization with influenza vaccines in the past 3 years, higher perceived risk of contracting influenza, and higher perceived severity of the disease impact.The acceptability to an additional ad

  4. Ad Hoc Conference on the Education of Migrants: Introductory Report on Theme III, "Opportunities for Vocational and Technical Training and General Education for Adults and Adolescents" (Strasbourg, France, November 5-8, 1974).

    ERIC Educational Resources Information Center

    Egger, Eugene

    Theme III of the Ad Hoc Conference on the Education of Migrants was "measures to secure the satisfactory provision of opportunities for vocational and technical training and general education for adults and adolescents". This report briefly summarizes the situation in member countries regarding the vocational and technical training and general…

  5. AHIMSA - Ad hoc histogram information measure sensing algorithm for feature selection in the context of histogram inspired clustering techniques

    NASA Technical Reports Server (NTRS)

    Dasarathy, B. V.

    1976-01-01

    An algorithm is proposed for dimensionality reduction in the context of clustering techniques based on histogram analysis. The approach is based on an evaluation of the hills and valleys in the unidimensional histograms along the different features and provides an economical means of assessing the significance of the features in a nonparametric unsupervised data environment. The method has relevance to remote sensing applications.

  6. Neural methods based on modified reputation rules for detection and identification of intrusion attacks in wireless ad hoc sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2010-04-01

    Determining methods to secure the process of data fusion against attacks by compromised nodes in wireless sensor networks (WSNs) and to quantify the uncertainty that may exist in the aggregation results is a critical issue in mitigating the effects of intrusion attacks. Published research has introduced the concept of the trustworthiness (reputation) of a single sensor node. Reputation is evaluated using an information-theoretic concept, the Kullback- Leibler (KL) distance. Reputation is added to the set of security features. In data aggregation, an opinion, a metric of the degree of belief, is generated to represent the uncertainty in the aggregation result. As aggregate information is disseminated along routes to the sink node(s), its corresponding opinion is propagated and regulated by Josang's belief model. By applying subjective logic on the opinion to manage trust propagation, the uncertainty inherent in aggregation results can be quantified for use in decision making. The concepts of reputation and opinion are modified to allow their application to a class of dynamic WSNs. Using reputation as a factor in determining interim aggregate information is equivalent to implementation of a reputation-based security filter at each processing stage of data fusion, thereby improving the intrusion detection and identification results based on unsupervised techniques. In particular, the reputation-based version of the probabilistic neural network (PNN) learns the signature of normal network traffic with the random probability weights normally used in the PNN replaced by the trust-based quantified reputations of sensor data or subsequent aggregation results generated by the sequential implementation of a version of Josang's belief model. A two-stage, intrusion detection and identification algorithm is implemented to overcome the problems of large sensor data loads and resource restrictions in WSNs. Performance of the twostage algorithm is assessed in simulations of WSN

  7. CIRRPC Science Panel report No. 3 and 2: Review of the report of the National Institutes of Health Ad Hoc Working Group to Develop Radioepidemiological Tables

    SciTech Connect

    1985-01-01

    This report of the Science Panel supplements an earlier document (included), which summarized the Panel`s views on the September, 1984, draft report of the National Institutes of Health Ad Hoc Working Group to Develop Radioepidemiological Tables. Although the Orphan Drug Act requires that tables be produced for a range of dose from one millirad to 1000 rad, the Working Group chose to make no estimates below one rad. The Science Panel is in agreement with this judgment because in the low-dose range there is little empirical evidence of a carcinogenic effect in humans. In order for the Tables to be applicable, a person must have both one of the cancers listed in the Tables and a previous exposure to ionizing radiation. Therefore, the Tables should not be applied to determine the likelihood that a person having received a specific radiation dose will have such a cancer. The Panel`s previous recommendations were primarily concerned with three issues, use of Quality Factors, use of tables for exposures from internally deposited radionuclides, and treatment of uncertainties. In the final report, the Working Group has dispensed with the use of Quality Factors in treating the risks from internally deposited alpha emitters and has substantially expanded on its treatment of uncertainties. The Science Panel`s comments on these changes and other aspects of the report are included.

  8. Efficacy response in CF patients treated with ivacaftor: post-hoc analysis.

    PubMed

    Konstan, Michael W; Plant, Barry J; Elborn, J Stuart; Rodriguez, Sally; Munck, Anne; Ahrens, Richard; Johnson, Charles

    2015-05-01

    Clinical studies in patients with cystic fibrosis and G551D-CFTR showed that the group treated with ivacaftor had improved clinical outcomes. To better understand the effect of ivacaftor therapy across the distribution of individual FEV(1) responses, data from Phase 3 studies (STRIVE/ENVISION) were re-examined. In this post-hoc analysis of patients (n = 209) who received 48 weeks of ivacaftor or placebo, patients were assigned to tertiles according to FEV(1) response. These groups were then used to evaluate response (FEV(1), sweat chloride, weight, CFQ-R, and pulmonary exacerbation). The number needed to treat (NNT) was calculated for specific thresholds for each outcome. Across all tertiles, numerical improvements in FEV(1), sweat chloride, CFQ-R and the frequency of pulmonary exacerbations were observed in ivacaftor-treated patients: the treatment difference versus placebo was statistically significant for all outcomes in the upper tertile and for some outcomes in the lower and middle tertiles. The NNT for a ≥ 5% improvement in %predicted FEV(1) was 1.90, for a ≥ 5% body weight increase was 5.74, and to prevent a pulmonary exacerbation was 3.85. This analysis suggests that the majority of patients with clinical characteristics similar to STRIVE/ENVISION patients have the potential to benefit from ivacaftor therapy. PMID:25755212

  9. A Post Hoc Analysis of D-Threo-Methylphenidate Hydrochloride (Focalin) Versus D,l-Threo-Methylphenidate Hydrochloride (Ritalin)

    ERIC Educational Resources Information Center

    Weiss, Margaret; Wasdell, Michael; Patin, John

    2004-01-01

    Objective: To evaluate clinical measures of the benefit/risk ratio in a post hoc analysis of a clinical trial of d-threo-methylphenidate hydrochloride (d-MPH) and d,l-threo-methylphenidate hydrochloride (d,l-MPH). Method: Data from a phase III clinical trial was used to compare equimolar doses of d-MPH and d,l-MPH treatment for…

  10. Monitoring of slope-instabilities and deformations with Micro-Electro-Mechanical-Systems (MEMS) in wireless ad-hoc Sensor Networks

    NASA Astrophysics Data System (ADS)

    Arnhardt, C.; Fernández-Steeger, T. M.; Azzam, R.

    2009-04-01

    In most mountainous regions, landslides represent a major threat to human life, properties and infrastructures. Nowadays existing landslide monitoring systems are often characterized by high efforts in terms of purchase, installation, maintenance, manpower and material. In addition (or because of this) only small areas or selective points of the endangered zone can be observed by the system. Therefore the improvement of existing and the development of new monitoring and warning systems are of high relevance. The joint project "Sensor based Landslide Early Warning Systems" (SLEWS) deals with the development of a prototypic Alarm- and Early Warning system (EWS) for different types of landslides using low-cost micro-sensors (MEMS) integrated in a wireless sensor network (WSN). Modern so called Ad-Hoc, Multi-Hop wireless sensor networks (WSN) are characterized by a self organizing and self-healing capacity of the system (autonomous systems). The network consists of numerous individual and own energy-supply operating sensor nodes, that can send data packages from their measuring devices (here: MEMS) over other nodes (Multi-Hop) to a collection point (gateway). The gateway provides the interface to central processing and data retrieval units (PC, Laptop or server) outside the network. In order to detect and monitor the different landslide processes (like fall, topple, spreading or sliding) 3D MEMS capacitive sensors made from single silicon crystals and glass were chosen to measure acceleration, tilting and altitude changes. Based on the so called MEMS (Micro-Electro-Mechanical Systems) technology, the sensors combine very small mechanical and electronic units, sensing elements and transducers on a small microchip. The mass production of such type of sensors allows low cost applications in different areas (like automobile industries, medicine, and automation technology). Apart from the small and so space saving size and the low costs another advantage is the energy

  11. Clinical Factors Associated with Dose of Loop Diuretics After Pediatric Cardiac Surgery: Post Hoc Analysis.

    PubMed

    Haiberger, Roberta; Favia, Isabella; Romagnoli, Stefano; Cogo, Paola; Ricci, Zaccaria

    2016-06-01

    A post hoc analysis of a randomized controlled trial comparing the clinical effects of furosemide and ethacrynic acid was conducted. Infants undergoing cardiac surgery with cardiopulmonary bypass were included in order to explore which clinical factors are associated with diuretic dose in infants with congenital heart disease. Overall, 67 patients with median (interquartile range) age of 48 (13-139) days were enrolled. Median diuretic dose was 0.34 (0.25-0.4) mg/kg/h at the end of postoperative day (POD) 0 and it significantly decreased (p = 0.04) over the following PODs; during this period, the ratio between urine output and diuretic dose increased significantly (p = 0.04). Age (r -0.26, p = 0.02), weight (r -0.28, p = 0.01), cross-clamp time (r 0.27, p = 0.03), administration of ethacrynic acid (OR 0.01, p = 0.03), and, at the end of POD0, creatinine levels (r 0.3, p = 0.009), renal near-infrared spectroscopy saturation (-0.44, p = 0.008), whole-blood neutrophil gelatinase-associated lipocalin levels (r 0.30, p = 0.01), pH (r -0.26, p = 0.02), urinary volume (r -0.2755, p = 0.03), and fluid balance (r 0.2577, p = 0.0266) showed a significant association with diuretic dose. At multivariable logistic regression cross-clamp time (OR 1.007, p = 0.04), use of ethacrynic acid (OR 0.2, p = 0.01) and blood pH at the end of POD0 (OR 0.0001, p = 0.03) was independently associated with diuretic dose. Early resistance to loop diuretics continuous infusion is evident in post-cardiac surgery infants: Higher doses are administered to patients with lower urinary output. Independently associated variables with diuretic dose in our population appeared to be cross-clamping time, the administration of ethacrynic acid, and blood pH. PMID:26961571

  12. Monitoring of slope-instabilities and deformations with Micro-Electro-Mechanical-Systems (MEMS) in wireless ad-hoc Sensor Networks

    NASA Astrophysics Data System (ADS)

    Arnhardt, C.; Fernández-Steeger, T. M.; Azzam, R.

    2009-04-01

    In most mountainous regions, landslides represent a major threat to human life, properties and infrastructures. Nowadays existing landslide monitoring systems are often characterized by high efforts in terms of purchase, installation, maintenance, manpower and material. In addition (or because of this) only small areas or selective points of the endangered zone can be observed by the system. Therefore the improvement of existing and the development of new monitoring and warning systems are of high relevance. The joint project "Sensor based Landslide Early Warning Systems" (SLEWS) deals with the development of a prototypic Alarm- and Early Warning system (EWS) for different types of landslides using low-cost micro-sensors (MEMS) integrated in a wireless sensor network (WSN). Modern so called Ad-Hoc, Multi-Hop wireless sensor networks (WSN) are characterized by a self organizing and self-healing capacity of the system (autonomous systems). The network consists of numerous individual and own energy-supply operating sensor nodes, that can send data packages from their measuring devices (here: MEMS) over other nodes (Multi-Hop) to a collection point (gateway). The gateway provides the interface to central processing and data retrieval units (PC, Laptop or server) outside the network. In order to detect and monitor the different landslide processes (like fall, topple, spreading or sliding) 3D MEMS capacitive sensors made from single silicon crystals and glass were chosen to measure acceleration, tilting and altitude changes. Based on the so called MEMS (Micro-Electro-Mechanical Systems) technology, the sensors combine very small mechanical and electronic units, sensing elements and transducers on a small microchip. The mass production of such type of sensors allows low cost applications in different areas (like automobile industries, medicine, and automation technology). Apart from the small and so space saving size and the low costs another advantage is the energy

  13. An Evidence-Based Unified Definition of Lifelong and Acquired Premature Ejaculation: Report of the Second International Society for Sexual Medicine Ad Hoc Committee for the Definition of Premature Ejaculation

    PubMed Central

    Serefoglu, Ege Can; McMahon, Chris G; Waldinger, Marcel D; Althof, Stanley E; Shindel, Alan; Adaikan, Ganesh; Becher, Edgardo F; Dean, John; Giuliano, Francois; Hellstrom, Wayne JG; Giraldi, Annamaria; Glina, Sidney; Incrocci, Luca; Jannini, Emmanuele; McCabe, Marita; Parish, Sharon; Rowland, David; Segraves, R Taylor; Sharlip, Ira; Torres, Luiz Otavio

    2014-01-01

    Introduction The International Society for Sexual Medicine (ISSM) Ad Hoc Committee for the Definition of Premature Ejaculation developed the first evidence-based definition for lifelong premature ejaculation (PE) in 2007 and concluded that there were insufficient published objective data at that time to develop a definition for acquired PE. Aim The aim of this article is to review and critique the current literature and develop a contemporary, evidence-based definition for acquired PE and/or a unified definition for both lifelong and acquired PE. Methods In April 2013, the ISSM convened a second Ad Hoc Committee for the Definition of Premature Ejaculation in Bangalore, India. The same evidence-based systematic approach to literature search, retrieval, and evaluation used by the original committee was adopted. Results The committee unanimously agreed that men with lifelong and acquired PE appear to share the dimensions of short ejaculatory latency, reduced or absent perceived ejaculatory control, and the presence of negative personal consequences. Men with acquired PE are older, have higher incidences of erectile dysfunction, comorbid disease, and cardiovascular risk factors, and have a longer intravaginal ejaculation latency time (IELT) as compared with men with lifelong PE. A self-estimated or stopwatch IELT of 3 minutes was identified as a valid IELT cut-off for diagnosing acquired PE. On this basis, the committee agreed on a unified definition of both acquired and lifelong PE as a male sexual dysfunction characterized by (i) ejaculation that always or nearly always occurs prior to or within about 1 minute of vaginal penetration from the first sexual experience (lifelong PE) or a clinically significant and bothersome reduction in latency time, often to about 3 minutes or less (acquired PE); (ii) the inability to delay ejaculation on all or nearly all vaginal penetrations; and (iii) negative personal consequences, such as distress, bother, frustration, and/or the

  14. Efficacy of octreotide long-acting repeatable in neuroendocrine tumors: RADIANT-2 placebo arm post hoc analysis

    PubMed Central

    Strosberg, Jonathan R; Yao, James C; Bajetta, Emilio; Aout, Mounir; Bakker, Bert; Hainsworth, John D; Ruszniewski, Philippe B; Van Cutsem, Eric; Öberg, Kjell; Pavel, Marianne E

    2015-01-01

    Somatostatin analogues (SSA) have demonstrated antiproliferative activity in addition to efficacy for carcinoid symptom control in functional neuroendocrine tumors (NET). A post hoc analysis of the placebo arm of the RAD001 In Advanced Neuroendocrine Tumors-2 (RADIANT-2) study was conducted to assess the efficacy of octreotide long-acting repeatable (LAR) on progression-free survival (PFS) and overall survival (OS) estimated using the Kaplan–Meier method. Out of 213 patients randomized to placebo plus octreotide LAR in RADIANT-2, 196 patients with foregut, midgut, or hindgut NET were considered for present analysis. Of these, 41 patients were SSA-treatment naïve and 155 had received SSA therapy before study entry. For SSA-naïve patients, median PFS by adjudicated central review was 13.6 (95% CI 8.2–22.7) months. For SSA-naïve patients with midgut NET (n=24), median PFS was 22.2 (95% CI 8.3–29.5) months. For patients who had received SSA previously, the median PFS was 11.1 (95% CI 8.4–14.3) months. Among the SSA-pretreated patients who had midgut NET (n=119), the median PFS was 12.0 (95% CI 8.4–19.3) months. Median OS was 35.8 (95% CI 32.5–48.9) months for patients in the placebo plus octreotide LAR arm; 50.6 (36.4 – not reached) months for SSA-naïve patients and 33.5 (95% CI 27.5–44.7) months for those who had received prior SSA. This post hoc analysis of the placebo arm of the large phase 3 RADIANT-2 study provides data on PFS and OS among patients with progressive NET treated with octreotide therapy. PMID:26373569

  15. ADDING REALISM TO NUCLEAR MATERIAL DISSOLVING ANALYSIS

    SciTech Connect

    Williamson, B.

    2011-08-15

    Two new criticality modeling approaches have greatly increased the efficiency of dissolver operations in H-Canyon. The first new approach takes credit for the linear, physical distribution of the mass throughout the entire length of the fuel assembly. This distribution of mass is referred to as the linear density. Crediting the linear density of the fuel bundles results in using lower fissile concentrations, which allows higher masses to be charged to the dissolver. Also, this approach takes credit for the fact that only part of the fissile mass is wetted at a time. There are multiple assemblies stacked on top of each other in a bundle. On average, only 50-75% of the mass (the bottom two or three assemblies) is wetted at a time. This means that only 50-75% (depending on operating level) of the mass is moderated and is contributing to the reactivity of the system. The second new approach takes credit for the progression of the dissolving process. Previously, dissolving analysis looked at a snapshot in time where the same fissile material existed both in the wells and in the bulk solution at the same time. The second new approach models multiple consecutive phases that simulate the fissile material moving from a high concentration in the wells to a low concentration in the bulk solution. This approach is more realistic and allows higher fissile masses to be charged to the dissolver.

  16. Hearings before the Ad Hoc Committee on Maritime Education and Training of the Committee on Merchant Marine and Fisheries, Ninety-Third Congress; Second Session on Officer Requirements, and Session on Maritime Education Regarding Safety at Sea. Serial No. 93-44.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. House Committee on Merchant Marine and Fisheries.

    The publication consists of Congressional hearings before the Ad Hoc Committee on Maritime Education and Training: (1) June 26, 1974 hearing pertaining to officer requirements and (2) November 19, 1974 hearing on maritime education regarding safety at sea. Estimated cost per graduate for the U. S. Merchant Marine 1973 class was $31,100. Supply and…

  17. Sea Training at Maritime Academies Oversight. Hearings Before the Ad Hoc Select Subcommittee on Maritime Education and Training of the Committee on Merchant Marine and Fisheries, House of Representatives, Ninety-Sixth Congress, Second Session on Sea Training of United States Merchant Marine Officers and Different Ways of Satisfying This Requirement at the Various Maritime Academies.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. House Committee on Merchant Marine and Fisheries.

    Recorded are minutes of hearings before the House Ad Hoc Select Subcommittee on Maritime Education and Training regarding the sea training of United States Merchant Marine officers. Examined are various approaches to meeting the sea training requirement, especially the options of maritime academy training vessels, sailing on U.S.-flag merchant…

  18. Spaceborne Mobile Ad-Hoc Networks

    NASA Astrophysics Data System (ADS)

    Forcada, Ignasi; Strauss, Adi

    2010-08-01

    Reliable global networking is essential for a rapidly growing mobile and interactive communication. Satellite communication plays already a significant role in this subject. However, the classical space-based data transmission requires an appropriate infrastructure, both on the ground and in orbit. This paper discusses the potential of a self-organising distributed satellite system in Low Earth Orbits (LEO) to achieve a seamless integration in already existing infrastructures. The communication approach is based on dynamic Inter Satellite Links (ISL) not controlled nor coordinated on an individual basis from the ground-based stations.

  19. Ad-Hoc Implicature in Preschool Children

    ERIC Educational Resources Information Center

    Stiller, Alex J.; Goodman, Noah D.; Frank, Michael C.

    2015-01-01

    If a speaker tells us that "some guests were late to the party," we typically infer that not all were. Implicatures, in which an ambiguous statement ("some and possibly all") is strengthened pragmatically (to "some and not all"), are a paradigm case of pragmatic reasoning. Inferences of this sort are difficult for…

  20. Prophylactic Azithromycin Therapy After Lung Transplantation: Post hoc Analysis of a Randomized Controlled Trial.

    PubMed

    Ruttens, D; Verleden, S E; Vandermeulen, E; Bellon, H; Vanaudenaerde, B M; Somers, J; Schoonis, A; Schaevers, V; Van Raemdonck, D E; Neyrinck, A; Dupont, L J; Yserbyt, J; Verleden, G M; Vos, R

    2016-01-01

    Prophylactic azithromycin treatment has been demonstrated to improve freedom from bronchiolitis obliterans syndrome (BOS) 2 years after lung transplantation (LTx). In the current study, we re-evaluated the long-term effects of this prophylactic approach in view of the updated classification system for chronic lung allograft dysfunction (CLAD). A retrospective, intention-to-treat analysis of a randomized controlled trial comparing prophylactic treatment with placebo (n = 43) versus azithromycin (n = 40) after LTx was performed. Graft dysfunction (CLAD), graft loss (retransplantation, mortality), evolution of pulmonary function and functional exercise capacity were analyzed 7 years after inclusion of the last study subject. Following LTx, 22/43 (51%) patients of the placebo group and 11/40 (28%) patients of the azithromycin group ever developed CLAD (p = 0.043). CLAD-free survival was significantly longer in the azithromycin group (p = 0.024). No difference was present in proportion of obstructive versus restrictive CLAD between both groups. Graft loss was similar in both groups: 23/43 (53%) versus 16/40 (40%) patients (p = 0.27). Long-term pulmonary function and functional exercise capacity were significantly better in the azithromycin group (p < 0.05). Prophylactic azithromycin therapy reduces long-term CLAD prevalence and improves CLAD-free survival, pulmonary function, and functional exercise capacity after LTx. PMID:26372728

  1. Polypharmacy and effects of apixaban versus warfarin in patients with atrial fibrillation: post hoc analysis of the ARISTOTLE trial

    PubMed Central

    Brouwer, Marc A; Wojdyla, Daniel M; Thomas, Laine; Lopes, Renato D; Washam, Jeffrey B; Lanas, Fernando; Xavier, Denis; Husted, Steen; Wallentin, Lars; Alexander, John H; Granger, Christopher B; Verheugt, Freek W A

    2016-01-01

    Objective To determine whether the treatment effect of apixaban versus warfarin differs with increasing numbers of concomitant drugs used by patients with atrial fibrillation. Design Post hoc analysis performed in 2015 of results from ARISTOTLE (apixaban for reduction in stroke and other thromboembolic events in atrial fibrillation)—a multicentre, double blind, double dummy trial that started in 2006 and ended in 2011. Participants 18 201 ARISTOTLE trial participants. Interventions In the ARISTOTLE trial, patients were randomised to either 5 mg apixaban twice daily (n=9120) or warfarin (target international normalised ratio range 2.0-3.0; n=9081). In the post hoc analysis, patients were divided into groups according to the number of concomitant drug treatments used at baseline (0-5, 6-8, ≥9 drugs) with a median follow-up of 1.8 years. Main outcome measures Clinical outcomes and treatment effects of apixaban versus warfarin (adjusted for age, sex, and country). Results Each patient used a median of six drugs (interquartile range 5-9); polypharmacy (≥5 drugs) was seen in 13 932 (76.5%) patients. Greater numbers of concomitant drugs were used in older patients, women, and patients in the United States. The number of comorbidities increased across groups of increasing numbers of drugs (0-5, 6-8, ≥9 drugs), as did the proportions of patients treated with drugs that interact with warfarin or apixaban. Mortality also rose significantly with the number of drug treatments (P<0.001), as did rates of stroke or systemic embolism (1.29, 1.48, and 1.57 per 100 patient years, for 0-5, 6-8, and ≥9 drugs, respectively) and major bleeding (1.91, 2.46, and 3.88 per 100 patient years, respectively). Relative risk reductions in stroke or systemic embolism for apixaban versus warfarin were consistent, regardless of the number of concomitant drugs (Pinteraction=0.82). A smaller reduction in major bleeding was seen with apixaban versus warfarin with increasing numbers

  2. The Efficacy Profile of Rotigotine During the Waking Hours in Patients With Advanced Parkinson's Disease: A Post Hoc Analysis

    PubMed Central

    LeWitt, Peter A.; Poewe, Werner; Elmer, Lawrence W.; Asgharnejad, Mahnaz; Boroojerdi, Babak; Grieger, Frank; Bauer, Lars

    2016-01-01

    Objectives Transdermal delivery of rotigotine maintains stable plasma concentrations for 24 hours. Three phase 3 studies of rotigotine as add-on to levodopa in advanced Parkinson's disease showed a significant reduction in “off” time from baseline to end of maintenance (EoM). However, detailed analyses over the range of a day have not yet been performed. The objective was to examine the time course of the efficacy profile of rotigotine throughout the day. Methods Post hoc analysis of diary data from 3 double-blind, placebo-controlled studies of rotigotine in patients with advanced Parkinson's disease inadequately controlled with levodopa, with average “off” time of ≥2.5 h/d (CLEOPATRA-PD [NCT00244387], 16-week maintenance; PREFER, 24-week maintenance; SP921 [NCT00522379], 12-week maintenance). Patients marked 30-minute intervals as “off,” “on without troublesome dyskinesia,” “on with troublesome dyskinesia,” or “sleep.” Diaries completed on the 3 days before EoM were analyzed. A 2-sample t test was performed for comparison of rotigotine + levodopa versus placebo + levodopa for mean percentage of time per status during four 6-hour periods: 12:00am (midnight) to 6:00am, 6:00am to 12:00pm (noon), noon to 6:00pm, and 6:00pm to midnight. Results Data were available for 967 patients (placebo + levodopa, 260; rotigotine + levodopa, 707). During the 24-hour period at EoM, an advantage in mean percentage time spent “off” and “on without troublesome dyskinesia” was observed with rotigotine + levodopa versus placebo + levodopa during the three 6-hour periods from 6:00am to midnight (P < 0.05; exploratory analysis). Conclusions These exploratory analyses of patients with motor fluctuations suggest that the efficacy of rotigotine transdermal patch, as captured by diary data, in reducing “off” time and increasing “on time without troublesome dyskinesia” may cover the full waking day. PMID:26882318

  3. A novel method to prioritize RNAseq data for post-hoc analysis based on absolute changes in transcript abundance.

    PubMed

    McNutt, Patrick; Gut, Ian; Hubbard, Kyle; Beske, Phil

    2015-06-01

    The use of fold-change (FC) to prioritize differentially expressed genes (DEGs) for post-hoc characterization is a common technique in the analysis of RNA sequencing datasets. However, the use of FC can overlook certain population of DEGs, such as high copy number transcripts which undergo metabolically expensive changes in expression yet fail to exceed the ratiometric FC cut-off, thereby missing potential important biological information. Here we evaluate an alternative approach to prioritizing RNAseq data based on absolute changes in normalized transcript counts (ΔT) between control and treatment conditions. In five pairwise comparisons with a wide range of effect sizes, rank-ordering of DEGs based on the magnitude of ΔT produced a power curve-like distribution, in which 4.7-5.0% of transcripts were responsible for 36-50% of the cumulative change. Thus, differential gene expression is characterized by the high production-cost expression of a small number of genes (large ΔT genes), while the differential expression of the majority of genes involves a much smaller metabolic investment by the cell. To determine whether the large ΔT datasets are representative of coordinated changes in the transcriptional program, we evaluated large ΔT genes for enrichment of gene ontologies (GOs) and predicted protein interactions. In comparison to randomly selected DEGs, the large ΔT transcripts were significantly enriched for both GOs and predicted protein interactions. Furthermore, enrichments were were consistent with the biological context of each comparison yet distinct from those produced using equal-sized populations of large FC genes, indicating that the large ΔT genes represent an orthagonal transcriptional response. Finally, the composition of the large ΔT gene sets were unique to each pairwise comparison, indicating that they represent coherent and context-specific responses to biological conditions rather than the non-specific upregulation of a family of genes

  4. The Grid Analysis and Display System (GrADS)

    NASA Technical Reports Server (NTRS)

    Kinter, James L., III

    1994-01-01

    During the period 1 September 1993 - 31 August 1994, further development of the Grid Analysis and Display System (GrADS) was conducted at the Center for Ocean-Land-Atmosphere Studies (COLA) of the Institute of Global Environment and Society, Inc. (IGES) under subcontract 5555-31 from the University Space Research Association (USRA) administered by The Center of Excellence in Space Data and Information Sciences (CESDIS). This final report documents progress made under this subcontract and provides directions on how to access the software and documentation developed therein. A short description of GrADS is provided followed by summary of progress completed and a summary of the distribution of the software to date and the establishment of research collaborations.

  5. Efficacy and tolerability of adjunct perampanel based on number of antiepileptic drugs at baseline and baseline predictors of efficacy: A phase III post-hoc analysis.

    PubMed

    Glauser, Tracy; Laurenza, Antonio; Yang, Haichen; Williams, Betsy; Ma, Tony; Fain, Randi

    2016-01-01

    Perampanel is a selective, noncompetitive AMPA receptor antagonist with demonstrated efficacy and tolerability in partial seizures in patients aged ≥ 12 years in Phase III studies. Post-hoc analysis of these studies was conducted to determine the efficacy and tolerability of perampanel based on the number of concomitant antiepileptic drugs (AEDs) at baseline, as well as to examine which baseline characteristics, if any, were predictors of efficacy. Efficacy parameters were based on the number of baseline AEDs, and logistic regression analyses were used to evaluate the association of demographic and baseline clinical factors with probability of ≥ 50% reduction in seizure frequency. Patients on 1 AED at baseline were significantly more likely to have reduced seizure frequency (P<0.02) and improved 50% responder rate (P<0.02) than patients on 3 AEDs at baseline. Secondarily generalized seizures at baseline, unknown etiology, and use of concomitant non-inducer AEDs were also established as positive predictors of efficacy (50% responder rate; P<0.01). Patients with more AEDs at baseline were associated with greater use of inducers (P<0.01), which may result in decreased exposure of perampanel in these patients and lower efficacy. Patients with 1 AED at baseline had a significantly shorter time since diagnosis compared with patients in the 3 (P<0.01) AEDs group, as well as a lower median seizure frequency at baseline compared to patients on 3 AEDs (P<0.05), suggesting that the reduced efficacy of perampanel with 3 AEDs may also be associated with the greater severity of seizures in the patient groups. The incidence of adverse events in perampanel-treated patients was similar regardless of the number of AEDs at baseline. Greater efficacy is predicted for patients receiving fewer concomitant AEDs when starting perampanel, as well as for those receiving concomitant treatment with AEDs that are not CYP3A4 enzyme-inducers, compared to patients treated with multiple

  6. ADS-Demo Fuel Rod Performance: Multivariate Statistical Analysis

    SciTech Connect

    Calabrese, R.; Vettraino, F.; Luzzi, L.

    2004-07-01

    A forward step in the development of Accelerator Driven System (ADS) for the Pu, MA and LLFP transmutation, is the realisation of a 80 MWt ADS-demo (XADS) whose basic objective is the system feasibility demonstration. The XADS is forecasted to adopt the UO{sub 2}-PuO{sub 2} mixed-oxides fuel already experimented in the sodium cooled fast reactors such as the french SPX-1. The present multivariate statistical analysis performed by using the Transuranus Code, was carried out for the Normal Operation at the so-called Enhanced Nominal Conditions (120% nominal reactor power), aimed at verifying that the fuel system complies with the stated design limits, i.e. centerline fuel temperature, cladding temperature and damage, during all the in-reactor lifetime. A statistical input set similar to SPX and PEC fuel case, was adopted. One most relevant assumption in the present calculations was a 30% AISI-316 cladding thickness corrosion at EOL. Relative influence of main fuel rod parameters on fuel centerline temperature was also evaluated. (authors)

  7. The “Gender Factor” in Wearing-Off among Patients with Parkinson's Disease: A Post Hoc Analysis of DEEP Study

    PubMed Central

    Colombo, Delia; Abbruzzese, Giovanni; Antonini, Angelo; Barone, Paolo; Bellia, Gilberto; Franconi, Flavia; Attar, Mahmood; Zagni, Emanuela; Haggiag, Shalom; Stocchi, Fabrizio

    2015-01-01

    Background. The early detection of wearing-off in Parkinson disease (DEEP) observational study demonstrated that women with Parkinson's disease (PD) carry an increased risk (80.1%) for wearing-off (WO). This post hoc analysis of DEEP study evaluates gender differences on WO and associated phenomena. Methods. Patients on dopaminergic treatment for ≥1 year were included in this multicenter observational cross-sectional study. In a single visit, WO was diagnosed based on neurologist assessment as well as the use of the 19-item wearing-off questionnaire (WOQ-19); WO was defined for scores ≥2. Post hoc analyses were conducted to investigate gender difference for demographic and clinical features with respect to WO. Results. Of 617 patients enrolled, 236 were women and 381 were men. Prevalence of WO was higher among women, according to both neurologists' judgment (61.9% versus 53.8%, P = 0.045) and the WOQ-19 analysis (72.5% versus 64.0%, P = 0.034). In patients with WO (WOQ-19), women experienced ≥1 motor symptom in 72.5% versus 64.0% in men and ≥1 nonmotor symptom in 44.5% versus 36.7%, in men. Conclusions. Our results suggest WO as more common among women, for both motor and nonmotor symptoms. Prospective studies are warranted to investigate this potential gender-effect. PMID:25685848

  8. Rotigotine in Combination with the MAO-B Inhibitor Selegiline in Early Parkinson’s Disease: A Post Hoc Analysis

    PubMed Central

    Giladi, Nir; Asgharnejad, Mahnaz; Bauer, Lars; Grieger, Frank; Boroojerdi, Babak

    2016-01-01

    Background: Monoamine oxidase B (MAO-B) inhibitors and dopamine receptor agonists are common first-line treatment options in early Parkinson’s disease (PD). Objective: To evaluate the efficacy and safety of rotigotine transdermal patch as an add-on therapy to an MAO-B inhibitor in patients with early-PD. Methods: In two Phase III, randomized, double-blind, placebo-controlled studies in early-PD (SP512, SP513), patients were randomized to rotigotine (titrated to optimal dose ≤8 mg/24 h) or placebo, and maintained for 24 (SP512) or 33 (SP513) weeks. Post hoc analyses were performed on pooled data for patients receiving an MAO-B inhibitor (selegiline) at a stable dose at randomization and throughout the studies, with groups defined as “Selegiline+Rotigotine” and “Selegiline+Placebo”. Outcome measures included change from baseline in Unified Parkinson’s Disease Rating Scale (UPDRS) II (activities of daily living), III (motor), UPDRS II+III and responders (patients achieving ≥20%, ≥25% or ≥30% decrease in UPDRS II+III). As post hoc analyses, p-values are exploratory. Results: 130 patients were evaluable for efficacy analyses (“Selegiline+Rotigotine”: 84, “Selegiline+Placebo”: 46). Combined treatment with rotigotine and selegiline improved UPDRS III and UPDRS II+III scores versus selegiline alone (LS-mean [95% CI] treatment difference for UPDRS III: –4.89 [–7.87 to –1.91], p = 0.0015; for UPDRS II+III: –5.76 [–9.71 to –1.82], p = 0.0045). Higher proportion of patients in the “Selegiline+Rotigotine” group were classified as ≥20%, ≥25% or ≥30% responders (all p < 0.001). Combined treatment appeared more effective in patients aged ≤65 years versus > 65 years (although patient numbers in the subgroups were low). Adverse event profile was consistent with the known safety profile of rotigotine. Conclusions: In these post hoc analyses, adjunctive treatment with rotigotine in patients already receiving an

  9. Analysis of Added Value of Subscores with Respect to Classification

    ERIC Educational Resources Information Center

    Sinharay, Sandip

    2014-01-01

    Brennan noted that users of test scores often want (indeed, demand) that subscores be reported, along with total test scores, for diagnostic purposes. Haberman suggested a method based on classical test theory (CTT) to determine if subscores have added value over the total score. One way to interpret the method is that a subscore has added value…

  10. Neuromathematical Trichotomous Mixed Methods Analysis: Using the Neuroscientific Tri-Squared Test Statistical Metric as a Post Hoc Analytic to Determine North Carolina School of Science and Mathematics Leadership Efficacy

    ERIC Educational Resources Information Center

    Osler, James Edward, II; Mason, Letita R.

    2016-01-01

    This study examines the leadership efficacy amongst graduates of The North Carolina School of Science and Mathematics (NCSSM) for the classes of 2000 through 2007 from a neuroscientific and neuromathematic perspective. NCSSM alumni (as the primary unit of analysis) were examined using a novel neuromathematic post hoc method of analysis. This study…

  11. The effect of macrobiotic Ma-Pi 2 diet on systemic inflammation in patients with type 2 diabetes: a post hoc analysis of the MADIAB trial

    PubMed Central

    Soare, Andreea; Del Toro, Rossella; Roncella, Elena; Khazrai, Yeganeh Manon; Angeletti, Silvia; Dugo, Laura; Fallucca, Sara; Fontana, Lucia; Altomare, Maria; Formisano, Valeria; Capata, Francesca; Gesuita, Rosaria; Manfrini, Silvia; Fallucca, Francesco; Pianesi, Mario; Pozzilli, Paolo

    2015-01-01

    Introduction Current guidelines for the management of type 2 diabetes (T2D) emphasize diet as essential therapy. However, the effect of diet on systemic inflammation remains unclear. We investigated the effects of consuming a macrobiotic Ma-Pi 2 diet versus a standard recommended diet (control diet) on markers of inflammation in patients with T2D. Methods This was a post hoc analysis of the MADIAB trial, a 21-day randomized controlled trial conducted in 51 patients (25 males and 26 females) with T2D. Patients were randomized 1:1 to the Ma-Pi 2 macrobiotic diet or a control diet based on dietary guidelines for T2D. Biological antioxidant potential of plasma and circulating levels of high-sensitivity C reactive protein, interleukin-6, tumor necrosis factor-α, and insulin-like growth factor-1 were assessed. Results After 21 days on the Ma-Pi 2 or control diet, markers of inflammation were reduced in both groups. The antioxidant potential of plasma improved significantly in the Ma-Pi group. A significant reduction in insulin growth factor-1 was observed in the Ma-Pi group versus control group (p<0.001). Conclusions Findings of this post hoc analysis demonstrated that the Ma-Pi 2 diet is a safe dietary strategy to reduce levels of the markers of insulin resistance and inflammation, compared with baseline values, in the short term. Furthermore, the Ma-Pi 2 diet was superior to the control diet in reducing insulin growth factor-1 and may be beneficial for patients with T2D. Trial registration number Current Controlled Trials ISRCTN10467793. PMID:25852946

  12. Nausea and Vomiting following Balanced Xenon Anesthesia Compared to Sevoflurane: A Post-Hoc Explorative Analysis of a Randomized Controlled Trial

    PubMed Central

    Fahlenkamp, Astrid V.; Stoppe, Christian; Cremer, Jan; Biener, Ingeborg A.; Peters, Dirk; Leuchter, Ricarda; Eisert, Albrecht; Apfel, Christian C.; Rossaint, Rolf; Coburn, Mark

    2016-01-01

    Objective Like other inhalational anesthetics xenon seems to be associated with post-operative nausea and vomiting (PONV). We assessed nausea incidence following balanced xenon anesthesia compared to sevoflurane, and dexamethasone for its prophylaxis in a randomized controlled trial with post-hoc explorative analysis. Methods 220 subjects with elevated PONV risk (Apfel score ≥2) undergoing elective abdominal surgery were randomized to receive xenon or sevoflurane anesthesia and dexamethasone or placebo after written informed consent. 93 subjects in the xenon group and 94 subjects in the sevoflurane group completed the trial. General anesthesia was maintained with 60% xenon or 2.0% sevoflurane. Dexamethasone 4mg or placebo was administered in the first hour. Subjects were analyzed for nausea and vomiting in predefined intervals during a 24h post-anesthesia follow-up. Results Logistic regression, controlled for dexamethasone and anesthesia/dexamethasone interaction, showed a significant risk to develop nausea following xenon anesthesia (OR 2.30, 95% CI 1.02–5.19, p = 0.044). Early-onset nausea incidence was 46% after xenon and 35% after sevoflurane anesthesia (p = 0.138). After xenon, nausea occurred significantly earlier (p = 0.014), was more frequent and rated worse in the beginning. Dexamethasone did not markedly reduce nausea occurrence in both groups. Late-onset nausea showed no considerable difference between the groups. Conclusion In our study setting, xenon anesthesia was associated with an elevated risk to develop nausea in sensitive subjects. Dexamethasone 4mg was not effective preventing nausea in our study. Group size or dosage might have been too small, and change of statistical analysis parameters in the post-hoc evaluation might have further contributed to a limitation of our results. Further trials will be needed to address prophylaxis of xenon-induced nausea. Trial Registration EU Clinical Trials EudraCT-2008-004132-20 ClinicalTrials.gov NCT

  13. Long-Term Effects of Safinamide on Dyskinesia in Mid- to Late-Stage Parkinson’s Disease: A Post-Hoc Analysis

    PubMed Central

    Cattaneo, Carlo; Ferla, R. La; Bonizzoni, Erminio; Sardina, Marco

    2015-01-01

    Abstract Background: Safinamide is a novel α-aminoamide with dopaminergic and non-dopaminergic properties developed as adjunctive therapy for patients with PD. Results from a 24-month double-blind controlled study suggested that as add-on to levodopa (and other PD medications) the benefits of safinamide on dyskinesia may be related to severity of dyskinesia at baseline. Objective: This post-hoc analysis further characterized the effects of safinamide on dyskinesia in mid- to late-stage PD patients. Methods: Patients were stratified by the presence or absence of dyskinesia at baseline, and by whether or not the dose of levodopa had been changed during the 24-month treatment period. Differences between safinamide and placebo were evaluated using the Wilcoxon rank-sum test. Results: For the overall treated population (with or without baseline dyskinesia), safinamide 100 mg/day significantly improved the dyskinesia rating scale score, compared with placebo, in the subgroup of patients with no change in levodopa dose (p = 0.0488). For patients with baseline dyskinesia, improvements over placebo were also significant (p = 0.0153) in patients with or without changes in levodopa dose, and nearly significant (p = 0.0546) in patients with no change in levodopa dose, suggesting that these improvements were not due to levodopa dose reductions. Conclusions: While no statistically significant difference in mean DRS scores was seen between safinamide and placebo in the original study population, the present post-hoc analysis helps to provide a meaningful interpretation of the long-term effects of safinamide on dyskinesia. These results may be related to safinamide state- and use-dependent inhibition of sodium channels and stimulated glutamate release, and are unlikely due to reduced dopaminergic stimulation. PMID:26406127

  14. Grid Analysis and Display System (GrADS): A practical tool for earth science visualization

    NASA Technical Reports Server (NTRS)

    Kinter, James L., III; Doty, Brian E.

    1991-01-01

    Viewgraphs on grid analysis and display system (GrADS): a practical tool for earth science visualization are presented. Topics covered include: GrADS design goals; data sets; and temperature profiles.

  15. Value-Added Analysis: A Review of Related Issues.

    ERIC Educational Resources Information Center

    Doran, Harold C.

    This paper makes the case that value added assessment (VAA) is one potential tool for increasing the accuracy of inferences regarding school effects, even though it is far from being a panacea. The promise of VAA rests in its focus on individual growth trajectories and its perceived ability to isolate the influence of a school from other factors…

  16. Pregabalin versus SSRIs and SNRIs in benzodiazepine-refractory outpatients with generalized anxiety disorder: a post hoc cost-effectiveness analysis in usual medical practice in Spain

    PubMed Central

    De Salas-Cansado, Marina; Olivares, José M; Álvarez, Enrique; Carrasco, Jose L; Barrueta, Andoni; Rejas, Javier

    2012-01-01

    Background Generalized anxiety disorder (GAD) is a prevalent health condition which seriously affects both patient quality of life and the National Health System. The aim of this research was to carry out a post hoc cost-effectiveness analysis of the effect of pregabalin versus selective serotonin reuptake inhibitors (SSRIs)/serotonin norepinephrine reuptake inhibitors (SNRIs) in treated benzodiazepine-refractory outpatients with GAD. Methods This post hoc cost-effectiveness analysis used secondary data extracted from the 6-month cohort, prospective, noninterventional ADAN study, which was conducted to ascertain the cost of illness in GAD subjects diagnosed according to Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition criteria. Benzodiazepine-refractory subjects were those who claimed persistent symptoms of anxiety and showed a suboptimal response (Hamilton Anxiety Rating Scale ≥ 16) to benzodiazepines, alone or in combination, over 6 months. Patients could switch to pregabalin (as monotherapy or addon) or to an SSRI or SNRI, alone or in combination. Effectiveness was expressed as quality-adjusted life years gained, and the perspective was that of the National Health System in the year 2008. A sensitivity analysis was performed using bootstrapping techniques (10,000 resamples were obtained) in order to obtain a cost-effectiveness plane and a corresponding acceptability curve. Results A total of 282 subjects (mean Hamilton Anxiety Rating Scale score 25.8) were identified, comprising 157 in a pregabalin group and 125 in an SSRI/SNRI group. Compared with SSRI/SNRI, pregabalin (average dose 163 mg/day) was associated with higher quality-adjusted life years gained (0.1086 ± 0.0953 versus 0.0967 ± 0.1003, P = 0.334), but increased health care costs (€1014 ± 762 versus €846 ± 620, P = 0.166) and drug costs (€376 ± 252 versus 220 ± 140, P < 0.001), resulting in an incremental cost-effectiveness ratio of €25,304 (95% confidence interval

  17. Anti-hypertensive drug treatment of patients with and the metabolic syndrome and obesity: a review of evidence, meta-analysis, post hoc and guidelines publications.

    PubMed

    Owen, Jonathan G; Reisin, Efrain

    2015-06-01

    Epidemiological studies have shown an increasing prevalence of obesity and the metabolic syndrome worldwide. Lifestyle modifications that include dietary changes, weight reduction, and exercise are the cornerstones in the treatment of this pathology. However, adherence to this approach often meets with failure in clinical practice; therefore, drug therapy should not be delayed. The ideal pharmacological antihypertensive regimen should target the underlying mechanisms involved in this syndrome, including sympathetic activation, increased renal tubular sodium reabsorption, and overexpression of the renin-angiotensin-aldosterone system by the adipocyte. Few prospective trials have been conducted in the search of the ideal antihypertensive regimen in patients with obesity and the metabolic syndrome. We summarize previously published ad hoc studies, prospective studies, and guideline publications regarding the treatment of hypertension in patients with obesity and the metabolic syndrome. We conclude that the optimal antihypertensive drug therapy in these patients has not been defined. Though caution exists regarding the use of thiazide diuretics due to potential metabolic derangements, there is insufficient data to show worsened cardiovascular or renal outcomes in patients treated with these drugs. In regard to beta blockers, the risk of accelerating conversion to diabetes and worsening of inflammatory mediators described in patients treated with traditional beta blockers appears much less pronounced or absent when using the vasodilating beta blockers. Renin-angiotensin-aldosterone system (RAAS) inhibition with an ACE or an ARB and treatment with calcium channel blockers appears safe and well tolerated in obesity-related hypertension and in patients with metabolic syndrome. Future prospective pharmacological studies in this population are needed. PMID:25916862

  18. Telavancin for Acute Bacterial Skin and Skin Structure Infections, a Post Hoc Analysis of the Phase 3 ATLAS Trials in Light of the 2013 FDA Guidance

    PubMed Central

    Pushkin, Richard; Barriere, Steven L.; Corey, G. Ralph; Stryjewski, Martin E.

    2015-01-01

    Two phase 3 ATLAS trials demonstrated noninferiority of telavancin compared with vancomycin for complicated skin and skin structure infections. Data from these trials were retrospectively evaluated according to 2013 U.S. Food and Drug Administration (FDA) guidance on acute bacterial skin and skin structure infections. This post hoc analysis included patients with lesion sizes of ≥75 cm2 and excluded patients with ulcers or burns (updated all-treated population; n = 1,127). Updated day 3 (early) clinical response was defined as a ≥20% reduction in lesion size from baseline and no rescue antibiotic. Updated test-of-cure (TOC) clinical response was defined as a ≥90% reduction in lesion size, no increase in lesion size since day 3, and no requirement for additional antibiotics or significant surgical procedures. Day 3 (early) clinical responses were achieved in 62.6% and 61.0% of patients receiving telavancin and vancomycin, respectively (difference, 1.7%, with a 95% confidence interval [CI] of −4.0% to 7.4%). Updated TOC visit cure rates were similar for telavancin (68.0%) and vancomycin (63.3%), with a difference of 4.8% (95% CI, −0.7% to 10.3%). Adopting current FDA guidance, this analysis corroborates previous noninferiority findings of the ATLAS trials of telavancin compared with vancomycin. PMID:26248356

  19. Multichannel MAC Layer In Mobile Ad—Hoc Network

    NASA Astrophysics Data System (ADS)

    Logesh, K.; Rao, Samba Siva

    2010-11-01

    This paper we presented the design objectives and technical challenges in Multichannel MAC protocols in Mobile Ad-hoc Network. In IEEE 802.11 a/b/g standards allow use of multiple channels, only a single channel is popularly used, due to the lack of efficient protocols that enable use of Multiple Channels. Even though complex environments in ad hoc networks require a combined control of physical (PHY) and medium access control (MAC) layers resources in order to optimize performance. And also we discuss the characteristics of cross-layer frame and give a multichannel MAC approach.

  20. Multipacting analysis for half wave resonators in the China ADS

    NASA Astrophysics Data System (ADS)

    Zhang, Cong; Zhang, Sheng-Hu; He, Yuan; Yue, Wei-Ming; Chang, Wei

    2015-11-01

    In the China ADS (CIADS) proton accelerator, multipacting is an issue of concern for the superconducting cavities. The parallel codes Omega3P and Track3P, developed at SLAC under the support of the DOE SciDAC program, have been used to calculate the electromagnetic field distribution and to analyze the multipacting barriers of such cavities. In this paper, two types of 162.5 MHz half wave resonator cavities, HWR-010 (cylinder type with β of 0.10) and HWR-015 (taper type with β of 0.15) have been analyzed, and the results of the multipacting analyses show that the resonant electrons occur at different regions with different accelerating gradients. The two-point 1st order multipacting on the short plate has also been researched and discussed. Supported by National Natural Science Foundation (11221064, 91026001)

  1. Treatment of Pulmonary Embolism With Rivaroxaban: Outcomes by Simplified Pulmonary Embolism Severity Index Score from a Post Hoc Analysis of the EINSTEIN PE Study

    PubMed Central

    Fermann, Gregory J; Erkens, Petra M G; Prins, Martin H; Wells, Philip S; Pap, Ákos F; Lensing, Anthonie W A; Kline, Jeffrey

    2015-01-01

    Objectives The objective was to assess adverse outcomes in relation to the simplified Pulmonary Embolism Severity Index (PESI) score in patients treated with rivaroxaban or standard therapy in the phase III EINSTEIN PE study and to evaluate the utility of the simplified PESI score to identify low-risk pulmonary embolism (PE) patients. Methods A post hoc analysis of EINSTEIN PE data was performed to assess the efficacy and safety of rivaroxaban in patients with a range of simplified PESI scores. Recurrent venous thromboembolism, fatal PE, all-cause mortality, and major bleeding were stratified by simplified PESI scores of 0, 1, or ≥2 and according to treatment period at 7, 14, 30, and 90 days and at the end of the full intended treatment period. Results Simplified PESI scores could be calculated in 4,831 of the 4,832 randomized patients; of those, 53.6, 36.7, and 9.7% had PESI scores of 0, 1, and ≥2, respectively. Among patients with simplified PESI scores of 0 or 1, fatal PE, all-cause mortality, and other adverse outcomes were uncommon within the first 7, 14, and 30 days. Patients with simplified PESI scores of ≥2 had more frequent adverse outcomes. Major bleeding was lower in the rivaroxaban group, particularly in those with simplified PESI scores of 1 or ≥2. Conclusions The findings support using risk stratification with the simplified PESI score to identify low-risk patients with PE. PMID:25716463

  2. Chronic effort dyspnea explained by lung function tests and by HRCT and CRX radiographic patterns in COPD: a post-hoc analysis in 51 patients.

    PubMed

    Giuntini, Carlo; Camiciottoli, Gianna; Maluccio, Nazzarena Maria; Mariani, Laura; Lavorini, Federico; Pistolesi, Massimo

    2007-09-01

    This paper is a post-hoc analysis of a previous study performed to investigate the relationship between computerized tomography (CT) and lung function in 51 outpatients with mild-to-moderate COPD. We studied whether changes in lung function and radiographic patterns may help to explain dyspnea, the most disturbing symptom in patients with COPD. The Medical Research Council (MRC) dyspnea scale shows, by univariate analysis, a similar strength of association to CT expiratory lung density and to DL(CO), a functional index of lung parenchymal loss. The MRC dyspnea scale shows a somewhat less strength of association with a small vertical heart on plain chest films. In multivariate analysis, the model with the strongest association to the MRC dyspnea scale (r = 0.76, p < 0.0001) contains 4 explanatory variables (DL(CO), FRC, PaCO(2), and radiographic pattern of pulmonary hypertension). We suggest that diffusing capacity reflects the emphysematous component of hyperinflation, associated by definition with destruction of terminal airspace walls, as distinct from the air trapping component, which is ascribed to airway obstruction and associated with FRC. PaCO(2) mainly reflects the ventilatory components, i.e., ventilatory drive and ventilatory constraints, of pulmonary gas exchange in COPD, while radiographic pattern of pulmonary hypertension likely reflects hypoxic vascular changes, which depend mainly on ventilation/perfusion mismatch and give rise to pulmonary arterial hypertension that may contribute per se to dyspnea. In conclusion, our analysis points out that chronic effort dyspnea variance may account for up to 58% (r(2) = 0.58) by lung function tests and radiographic patterns. Thus, about 42% of the MRC dyspnea variance remains unexplained by this model. On the other hand, dyspnea ascertainment is dependent on subjective behavior and evaluation and in tests is influenced by individual performance and perception. For example in the 6-minute walk test, a similar or

  3. Effects of statins on the progression of cerebral white matter lesion: Post hoc analysis of the ROCAS (Regression of Cerebral Artery Stenosis) study.

    PubMed

    Mok, Vincent C T; Lam, Wynnie W M; Fan, Yu Hua; Wong, Adrian; Ng, Ping Wing; Tsoi, Tak Hon; Yeung, Vincent; Wong, Ka Sing

    2009-05-01

    Arteriosclerotic related cerebral white matter lesion (WML) is associated with increased risk of death, stroke, dementia, depression, gait disturbance, and urinary incontinence. We investigated the effects of statins on WML progression by performing a post hoc analysis on the ROCAS (Regression of Cerebral Artery Stenosis) study, which is a randomized, double-blind, placebo-controlled study evaluating the effects of statins upon asymptomatic middle cerebral artery stenosis progression among stroke-free individuals. Two hundreds and eight randomized subjects were assigned to either placebo (n = 102) or simvastatin 20 mg daily (n = 106) for 2 years. Baseline severity of WML was graded visually into none, mild, and severe. Volume (cm3) of WML was determined quantitatively at baseline and at end of study using a semi-automated method based on MRI. Primary outcome was the change in WML volume over 2 years. After 2 years of follow-up, there was no significant change in WML volume between the active and the placebo group as a whole. However, stratified analysis showed that for those with severe WML at baseline, the median volume increase in the active group (1.9 cm3) was less compared with that in the placebo group (3.0 cm3; P = 0.047). Linear multivariate regression analysis identified that baseline WML volume (beta = 0.63, P < 0.001) and simvastatin treatment (beta = -0.214, P = 0.043) independently predicted change in WML volume. Our findings suggest that statins may delay the progression of cerebral WML only among those who already have severe WML at baseline. PMID:19252811

  4. The Stroop Revisited: A Meta-Analysis of Interference Control in AD/HD

    ERIC Educational Resources Information Center

    Van Mourik, Rosa; Oosterlaan, Jaap; Sergeant, Joseph A.

    2005-01-01

    Background: An inhibition deficit, including poor interference control, has been implicated as one of the core deficits in AD/HD. Interference control is clinically measured by the Stroop Colour-Word Task. The aim of this meta-analysis was to investigate the strength of an interference deficit in AD/HD as measured by the Stroop Colour-Word Task…

  5. Preoperative opioid strength may not affect outcomes of anterior cervical procedures: a post hoc analysis of 2 prospective, randomized trials

    PubMed Central

    Kelly, Michael P.; Anderson, Paul A.; Sasso, Rick C.; Riew, K. Daniel

    2015-01-01

    Object The aim of this study is to evaluate the relationship between preoperative opioid strength and outcomes of anterior cervical decompressive surgery. Methods A retrospective cohort of 1004 patients enrolled in 1 of 2 investigational device exemption studies comparing cervical total disc arthroplasty (TDA) and anterior cervical discectomy and fusion (ACDF) for single-level cervical disease causing radiculopathy or myelopathy was selected. At a preoperative visit, opioid use data, Neck Disability Index (NDI) scores, 36-ltem Short-Form Health Survey (SF-36) scores, and numeric rating scale scores for neck and arm pain were collected. Patients were divided into strong (oxycodone/morphine/meperidine), weak (codeine/propoxyphene/ hydrocodone), and opioid-naïve groups. Preoperative and postoperative (24 months) outcomes scores were compared within and between groups using the paired t-test and ANCOVA, respectively. Results Patients were categorized as follows: 226 strong, 762 weak, and 16 opioid naïve. The strong and weak groups were similar with respect to age, sex, race, marital status, education level, Worker's Compensation status, litigation status, and alcohol use. At 24-month follow-up, no differences in change in arm or neck pain scores (arm: strong –52.3, weak –50.6, naïve –54.0, p = 0.244; neck: strong –52.7, weak –50.8, naïve –44.6, p = 0.355); NDI scores (strong –36.0, weak –33.3, naïve –32.3, p = 0.181); or SF-36 Physical Component Summary scores (strong: 14.1, weak 13.3, naïve 21.7, p = 0.317) were present. Using a 15-point improvement in NDI to determine success, the authors found no between-groups difference in success rates (strong 80.6%, weak 82.7%, naïve 73.3%, p = 0.134). No difference existed between treatment arms (TDA vs ACDF) for any outcome at any time point. Conclusions Preoperative opioid strength did not adversely affect outcomes in this analysis. Careful patient selection can yield good results in this patient

  6. Effect of lurasidone dose on cognition in patients with schizophrenia: post-hoc analysis of a long-term, double-blind continuation study.

    PubMed

    Harvey, Philip D; Siu, Cynthia O; Ogasa, Masaaki; Loebel, Antony

    2015-08-01

    We previously reported that treatment with 160mg/d of lurasidone improved cognitive performance in a manner superior to placebo, quetiapine XR 600mg/d, and lurasidone 80mg/d, based on a 6-week randomized trial of patients with an acute exacerbation of schizophrenia. The objective of this post-hoc analysis was to explore the cognitive and functional performance of patients whose final doses of lurasidone were 40/80mg/d, 120mg/d, and 160mg/d compared to quetiapine XR 200-800mg/d (QXR) during a 6-month, double-blind continuation study that followed a short-term trial. Subjects who received final doses of lurasidone 120mg/d (n=77) and 160mg/d (n=49) showed significantly greater improvement in overall cognitive performance compared to QXR (n=85) at week 32 (month 6 of the extension study), while those on last doses of 40/80mg/d (n=25) showed a trend towards significance at week 32. Mean changes in neurocognitive composite z-score from pre-treatment baseline were significant for the 3 lurasidone final dose groups at both weeks 19 and 32, with composite change scores of z=1.53, z=1.43, and z=1.34 for the lurasidone 40/80mg/d, 120mg/d, and 160mg/d, respectively, at week 32. In contrast, the composite change score was not statistically significant in the overall quetiapine group (z=0.46), with none of the individual quetiapine doses showing any significant improvement. Functional capacity scores improved in all treatment groups. Our findings indicate improved cognitive performance in patients treated with each of the flexible doses of lurasidone 40-160mg/d, compared to quetiapine XR 200-800mg/d. All doses of lurasidone were superior to all doses of quetiapine for cognitive performance. PMID:26117157

  7. Post-hoc analysis showing better clinical response with the loading dose of certolizumab pegol in Japanese patients with active rheumatoid arthritis

    PubMed Central

    Takeuchi, Tsutomu; Yamamoto, Kazuhiko; Yamanaka, Hisashi; Ishiguro, Naoki; Tanaka, Yoshiya; Eguchi, Katsumi; Watanabe, Akira; Origasa, Hideki; Kobayashi, Mariko; Shoji, Toshiharu; Togo, Osamu; Miyasaka, Nobuyuki; Koike, Takao

    2016-01-01

    Abstract Objectives: To compare the efficacy and safety of certolizumab pegol (CZP) with and without loading dose (LD) in a post-hoc analysis of two Japanese clinical studies. Methods: Data from the double-blind trials (DBT) J-RAPID and HIKARI, and their open-label extension (OLE) studies, were used. Patients randomized to CZP 200 mg every 2 weeks (Q2W) groups starting with LD (400 mg Weeks 0/2/4; LD group; J-RAPID: n = 82, HIKARI: n = 116) and patients randomized to placebo groups who subsequently started CZP Q2W without LD in the OLEs (No-LD group; J-RAPID: n = 61, HIKARI: n = 99) were analyzed. Efficacy and pharmacokinetics were assessed during 24 weeks. Adverse events were reported from all studies. Results: In both trials, the LD groups showed more rapid initial ACR20/50/70 kinetics, and maintained higher ACR50/70 responses until 24 weeks, compared with the No-LD groups. Anti-CZP antibody development was less frequent in the LD groups (J-RAPID: 1.2% versus 4.9%; HIKARI: 17.2% versus 27.3%). Similar safety profiles were reported between LD and No-LD groups (any AEs: 281.8 versus 315.7 [J-RAPID], 282.6 versus 321.3 [HIKARI] [incidence rate/100 patient-years]). Conclusions: Despite limitations, including comparing DBT and OLE studies, these results suggest that a CZP LD improves clinical response in active rheumatoid arthritis without altering the safety profile. PMID:26472043

  8. Effects of calcium channel blocker-based combinations on intra-individual blood pressure variability: post hoc analysis of the COPE trial.

    PubMed

    Umemoto, Seiji; Ogihara, Toshio; Matsuzaki, Masunori; Rakugi, Hiromi; Ohashi, Yasuo; Saruta, Takao

    2016-01-01

    Visit-to-visit blood pressure (BP) variability is an important predictor of stroke. However, which antihypertensive drug combination is better at reducing visit-to-visit BP variability and therefore at reducing stroke incidence remains uncertain. We have previously reported that the dihydropyridine calcium channel blocker benidipine combined with a β-blocker appeared to be less beneficial in reducing the risk of stroke than a combination of benidipine and thiazide. Here, we further compare the visit-to-visit BP variability among three benidipine-based regimens, namely angiotensin receptor blocker (ARB), β-blocker and thiazide combinations. The present post hoc analysis included 2983 patients without cardiovascular events or death during the first 18 months after randomization. We compared the BP variability (defined as the s.d. and the coefficient of variation (CV)), maximum systolic BP (SBP) and diastolic BP (DBP) of the clinic mean on-treatment BPs obtained at 6-month intervals, starting 6 months after the treatment initiation, among the 3 treatments (ARB, n=1026; β-blocker, n=966; thiazide, n=991). During the first 6-36 months after randomization, both the s.d. and CV-BPs were lower in the benidipine-thiazide group than in the benidipine-β-blocker group (s.d.-SBP, P=0.019; s.d.-DBP, P=0.030; CV-SBP, P=0.012; CV-DBP, P=0.022). The s.d. and CV in the ARB group did not reach statistical significance compared with the other two groups. The maximum BPs did not differ among the three treatments. These findings suggest that the benidipine-thiazide combination may reduce visit-to-visit BP variability more than the benidipine-β-blocker combination. PMID:26490089

  9. History of Depressive and Anxiety Disorders and Paroxetine Response in Patients With Irritable Bowel Syndrome: Post Hoc Analysis From a Placebo-Controlled Study

    PubMed Central

    Marks, David M.; Han, Changsu; Krulewicz, Stan; Pae, Chi-Un; Peindl, Kathleen; Patkar, Ashwin A.; Masand, Prakash S.

    2008-01-01

    Objective: Although irritable bowel syndrome (IBS) is highly comorbid with depressive and anxiety disorders, information on the clinical implications of this comorbidity is limited. We investigated whether a history of depressive and/or anxiety disorders was associated with response to treatment in a double-blind, randomized, placebo-controlled trial of paroxetine controlled release (CR) in IBS. Method: Seventy-two IBS subjects (diagnosed using Rome II criteria) were recruited from August 2003 to November 2005 and randomly assigned to receive flexibly dosed paroxetine CR (dose, 12.5–50 mg/day) or placebo for 12 weeks. The Mini-International Neuropsychiatric Interview (MINI-Plus version) was used to ascertain current (exclusionary) or past diagnoses of depressive and anxiety disorders. Subjective depression, anxiety, and stress were assessed at entry and throughout the trial using the Beck Depression Inventory (BDI), Beck Anxiety Inventory (BAI), and Perceived Stress Scale (PSS). Severity of IBS symptoms was determined by the Composite Pain Score (CPS), administered via Interactive Voice Response System, and the Clinical Global Impressions scale (CGI). The primary outcome was treatment response defined as ≥ 25% reduction in CPS from randomization to end of treatment. A post hoc analysis (multivariate logistic regression) was done to evaluate whether a history of depressive and/or anxiety disorder was associated with response to medication. Results: Baseline demographic and clinical characteristics (CPS, BDI, BAI, PSS, CGI scores) were similar between groups (history of depressive/anxiety disorder vs. no history). In multivariate logistic regression analysis, treatment response was not predicted by history of depressive and/or anxiety disorder (OR = 0.58, CI = 0.29 to 1.68, p = .32) or drug status (paroxetine CR vs. placebo) (OR = 1.26, CI = 0.68 to 3.21, p = .19). Drug status was significantly associated with the secondary outcome variable of treatment response

  10. A Post Hoc Analysis of the Effect of Weight on Efficacy in Depressed Patients Treated With Desvenlafaxine 50 mg/d and 100 mg/d

    PubMed Central

    Fayyad, Rana S.; Guico-Pabia, Christine J.; Boucher, Matthieu

    2015-01-01

    Objective: To assess the effect of baseline body mass index (BMI) on efficacy and weight change in adults with major depressive disorder (MDD) treated with desvenlafaxine or placebo in a pooled, post hoc analysis. Method: Adults with MDD were randomly assigned to placebo or desvenlafaxine (50 mg or 100 mg) in 8 short-term, double-blind studies and 1 longer-term randomized withdrawal study (the studies were published between 2007 and 2013). Change from baseline in 17-item Hamilton Depression Rating Scale (HDRS-17) total score at week 8 was analyzed in normal (BMI ≤ 25 kg/m2), overweight (25 kg/m2 < BMI ≤ 30 kg/m2), and obese (BMI > 30 kg/m2) subgroups using analysis of covariance (ANCOVA). Weight change was analyzed in BMI subgroups using ANCOVA and a mixed-effects model for repeated measures. Results: Desvenlafaxine 50 mg/d or 100 mg/d improved HDRS-17 scores significantly from baseline to week 8 (last observation carried forward) versus placebo in all BMI subgroups (normal: n = 1,122; overweight: n = 960; obese: n = 1,302; all P ≤ .0027); improvement was greatest in normal BMI patients. There was a statistically significant decrease in weight (< 1 kg) with short-term desvenlafaxine 50 mg/d and 100 mg/d versus placebo in all BMI subgroups (all P < .0001). In the randomized withdrawal study (n = 548), no statistically significant difference in weight was observed for desvenlafaxine versus placebo in any BMI subgroup. Baseline BMI predicted weight change in short-term and longer-term desvenlafaxine treatment. Conclusions: Desvenlafaxine significantly improved symptoms of depression versus placebo regardless of baseline BMI. In all BMI subgroups, desvenlafaxine was associated with statistically significant weight loss (< 1 kg) versus placebo over 8 weeks, but no significant differences longer term. Trial Registration: ClinicalTrials.gov identifiers: NCT00072774, NCT00277823, NCT00300378, NCT00384033, NCT00798707, NCT00863798, NCT01121484, NCT00824291, NCT

  11. Trace-Back and Trace-Forward Tools Developed Ad Hoc and Used During the STEC O104:H4 Outbreak 2011 in Germany and Generic Concepts for Future Outbreak Situations

    PubMed Central

    Gross, Stefan; Schielke, Anika; Wigger, Jan-Frederik; Ernert, Andrea; Adolphs, Julian; Fetsch, Alexandra; Müller-Graf, Christine; Käsbohrer, Annemarie; Mosbach-Schulz, Olaf; Appel, Bernd; Greiner, Matthias

    2013-01-01

    Abstract The Shiga toxin–producing Escherichia coli O104:H4 outbreak in Germany in 2011 required the development of appropriate tools in real-time for tracing suspicious foods along the supply chain, namely salad ingredients, sprouts, and seeds. Food commodities consumed at locations identified as most probable site of infection (outbreak clusters) were traced back in order to identify connections between different disease clusters via the supply chain of the foods. A newly developed relational database with integrated consistency and plausibility checks was used to collate these data for further analysis. Connections between suppliers, distributors, and producers were visualized in network graphs and geographic projections. Finally, this trace-back and trace-forward analysis led to the identification of sprouts produced by a horticultural farm in Lower Saxony as vehicle for the pathogen, and a specific lot of fenugreek seeds imported from Egypt as the most likely source of contamination. Network graphs have proven to be a powerful tool for summarizing and communicating complex trade relationships to various stake holders. The present article gives a detailed description of the newly developed tracing tools and recommendations for necessary requirements and improvements for future foodborne outbreak investigations. PMID:23268760

  12. Tobacco industry response to public health concern: a content analysis of cigarette ads.

    PubMed

    Warner, K E

    1985-01-01

    Public awareness of the health hazards of smoking intensified when the subject received national publicity. To assess tobacco industry tactics to counter adverse publicity, we performed a content analysis of cigarette ads in selected issues of Time magazine, for selected years from 1929-84. The analysis showed direct responses to health concerns in all of the years of major smoking-and-health "events," with the possible exception of 1964, the year of the first Surgeon General's report. During these years large percentages of ads emphasized health themes instead of the conventional cigarette ad imagery. On average, health-theme ads have a higher verbal content than the more pictorial traditional ads. Correspondingly, they employ many fewer models. Health-theme ads tend to emphasize the "technological fix," such as the scientifically designed filter and the low-tar cigarette. Subtle changes in cigarette advertising include the elimination of visible smoke from ads. A decade's concentration on standard health themes, prompted by the "tar wars" of the 1970s, appears to have ended in the 1980s. Advertisers seem to have reverted to the "good times" nonhealth imagery of a bygone era, though possibly to deliver a subtle implicit health message. Understanding industry advertising tactics can assist public health professionals in developing insights into the promotion of smoking and in formulating smoking control strategies. Though highly exploratory and tentative in nature, this study is offered in the spirit of increasing such understanding. PMID:3997535

  13. Recruitment ad analysis offers new opportunities to attract GPs to short-staffed practices.

    PubMed

    Hemphill, Elizabeth; Kulik, Carol T

    2013-01-01

    As baby-boomer practitioners exit the workforce, physician shortages present new recruitment challenges for practices seeking GPs. This article reports findings from two studies examining GP recruitment practice. GP recruitment ad content analysis (Study 1) demonstrated that both Internet and print ads emphasize job attributes but rarely present family or practice attributes. Contacts at these medical practices reported that their practices offer distinctive family and practice attributes that could be exploited in recruitment advertising (Study 2). Understaffed medical practices seeking to attract GPs may differentiate their job offerings in a crowded market by incorporating family and/or practice attributes into their ads. PMID:23697854

  14. Differences in glycemic control across world regions: a post-hoc analysis in patients with type 2 diabetes mellitus on dual antidiabetes drug therapy

    PubMed Central

    Brath, H; Paldánius, P M; Bader, G; Kolaczynski, W M; Nilsson, P M

    2016-01-01

    Objective: This post-hoc analysis of the EDGE (Effectiveness of Diabetes control with vildaGliptin and vildagliptin/mEtformin) study assessed inter-regional differences in baseline characteristics and response to treatment intensification with dual oral antidiabetes drugs (OADs) in patients with type 2 diabetes mellitus (T2DM). Methods: Patients with T2DM inadequately controlled with first-line monotherapy were assigned to receive a dipeptidyl peptidase-4 (DPP-4) inhibitor, vildagliptin, or comparator OADs as add-on dual therapy. The primary effectiveness end point (PEP) was achieving glycated hemoglobin (HbA1c) reduction >0.3% without hypoglycemia, peripheral edema, discontinuation owing to gastrointestinal events or weight gain ⩾5% at 12 months. The secondary effectiveness end point (SEP) was achieving HbA1c of <7% without hypoglycemia or weight gain ⩾3% at 12 months. Results: Baseline characteristics of patients (N=43 791), including mean HbA1c (8.2%), varied across regions. Baseline age (62.3 years) and T2DM duration (6.3 years) were greater in patients from Europe than those from India and the Middle East (age: 51.8 and 52.1 years; T2DM duration: 4.3 and 4.2 years, respectively). The probability of achieving PEP with dual therapy was higher in India (odds ratio (OR): 1.5), Latin America (OR: 1.2) and Middle East (OR: 2.0) than in Europe (OR: 0.8) and East Asia (OR: 0.3). Achievement of SEP in patients receiving dual therapy was greater in Latin America (OR: 1.7) and Middle East (OR: 1.7). Vildagliptin add-on therapy allowed more patients to achieve SEP across regions. Women aged ⩾45 years less often attained glycemic target (HbA1c<7%) without significant weight gain ⩾5% compared with women aged <45 years (OR: 0.876, 95% confidence interval: 0.774, 0.992; P=0.037). Conclusions: Baseline HbA1c and T2DM duration differed considerably across all regions. Treatment intensification with second OAD, particularly with a DPP-4 inhibitor vildagliptin, resulted

  15. The PREVAIL trial of enzalutamide in men with chemotherapy-naïve, metastatic castration-resistant prostate cancer: Post hoc analysis of Korean patients

    PubMed Central

    Theeuwes, Ad; Kwon, Dong Deuk; Choi, Young Deuk; Chung, Byung Ha; Lee, Hyun Moo; Lee, Kang Hyun; Lee, Sang Eun

    2016-01-01

    Purpose This post hoc analysis evaluated treatment effects, safety, and pharmacokinetics of enzalutamide in Korean patients in the phase 3, double-blind, placebo-controlled PREVAIL trial. Materials and Methods Asymptomatic or mildly symptomatic chemotherapy-naive men with metastatic castration-resistant prostate cancer that progressed on androgen deprivation therapy received 160 mg/d oral enzalutamide or placebo (1:1) until death or discontinuation due to radiographic progression or skeletal-related event and initiation of subsequent therapy. Coprimary end points were centrally assessed radiographic progression-free survival (rPFS) and overall survival (OS). Secondary end points included investigator-assessed rPFS, time to initiation of chemotherapy, time to prostate-specific antigen (PSA) progression, PSA response (≥50% decline), and time to skeletal-related event. Results Of 1,717 total patients, 78 patients were enrolled in Korea (enzalutamide, n=40; placebo, n=38). Hazard ratios (95% confidence interval) for enzalutamide versus placebo were 0.23 (0.02–2.24) for centrally assessed rPFS, 0.77 (0.28–2.15) for OS, 0.21 (0.08–0.51) for time to chemotherapy, and 0.31 (0.17–0.56) for time to PSA progression. A PSA response was observed in 70.0% of enzalutamide-treated and 10.5% of placebo-treated Korean patients. Adverse events of grade ≥3 occurred in 33% of enzalutamide-treated and 11% of placebo-treated Korean patients, with median treatment durations of 13.0 and 5.1 months, respectively. At 13 weeks, the plasma concentration of enzalutamide plus N-desmethyl enzalutamide was similar in Korean and non-Korean patients (geometric mean ratio, 1.04; 90% confidence interval, 0.97–1.10). Conclusions In Korean patients, treatment effects and safety of enzalutamide were consistent with those observed in the overall PREVAIL study population (ClinicalTrials.gov Identifier: NCT01212991). PMID:27195316

  16. Concise review: no breakthroughs for human mesenchymal and embryonic stem cell culture: conditioned medium, feeder layer, or feeder-free; medium with fetal calf serum, human serum, or enriched plasma; serum-free, serum replacement nonconditioned medium, or ad hoc formula? All that glitters is not gold!

    PubMed

    Mannello, Ferdinando; Tonti, Gaetana A

    2007-07-01

    The choice of an optimal strategy of stem cell culture is at the moment an impossible task, and the elaboration of a culture medium adapted to the production of embryonic and adult mesenchymal stem cells for the clinical application of cell therapy remains a crucial matter. To make an informed choice, it is crucial to not underestimate the theoretical health risk of using xenogenic compounds, to limit the immunological reactions once stem cells are transplanted, to not overestimate the controversial results obtained with human serum, plasma, and blood derivatives, as well as to carefully examine the pros and cons of serum-free and ad hoc formulation strategies; besides that, to also maintain multipotentiality, self-renewal, and transplantability. The extent to which we are able to achieve effective cell therapies will depend on assimilating a rapidly developing base of scientific knowledge with the practical considerations of design, delivery, and host response. Although clinical studies have already started, many questions remain unsolved, and concomitantly even more evidence on suitable and safe off-the-shelf products (mainly xeno-free) for embryonic and mesenchymal stem cells is cropping up, even though there should be no rush to enter the clinical stage while the underlying basic research is still not so solid; this solely will lead to high-quality translational research, without making blunders stemming from the assumption that all that glitters is not gold. Disclosure of potential conflicts of interest is found at the end of this article. PMID:17395775

  17. Soil Parameter Mapping and Ad Hoc Power Analysis to Increase Blocking Efficiency Prior to Establishing a Long-Term Field Experiment.

    PubMed

    Collins, Doug; Benedict, Chris; Bary, Andy; Cogger, Craig

    2015-01-01

    The spatial heterogeneity of soil and weed populations poses a challenge to researchers. Unlike aboveground variability, below-ground variability is more difficult to discern without a strategic soil sampling pattern. While blocking is commonly used to control environmental variation, this strategy is rarely informed by data about current soil conditions. Fifty georeferenced sites were located in a 0.65 ha area prior to establishing a long-term field experiment. Soil organic matter (OM) and weed seed bank populations were analyzed at each site and the spatial structure was modeled with semivariograms and interpolated with kriging to map the surface. These maps were used to formulate three strategic blocking patterns and the efficiency of each pattern was compared to a completely randomized design and a west to east model not informed by soil variability. Compared to OM, weeds were more variable across the landscape and had a shorter range of autocorrelation, and models to increase blocking efficiency resulted in less increase in power. Weeds and OM were not correlated, so no model examined improved power equally for both parameters. Compared to the west to east blocking pattern, the final blocking pattern chosen resulted in a 7-fold increase in power for OM and a 36% increase in power for weeds. PMID:26247056

  18. Soil Parameter Mapping and Ad Hoc Power Analysis to Increase Blocking Efficiency Prior to Establishing a Long-Term Field Experiment

    PubMed Central

    Collins, Doug; Benedict, Chris; Bary, Andy; Cogger, Craig

    2015-01-01

    The spatial heterogeneity of soil and weed populations poses a challenge to researchers. Unlike aboveground variability, below-ground variability is more difficult to discern without a strategic soil sampling pattern. While blocking is commonly used to control environmental variation, this strategy is rarely informed by data about current soil conditions. Fifty georeferenced sites were located in a 0.65 ha area prior to establishing a long-term field experiment. Soil organic matter (OM) and weed seed bank populations were analyzed at each site and the spatial structure was modeled with semivariograms and interpolated with kriging to map the surface. These maps were used to formulate three strategic blocking patterns and the efficiency of each pattern was compared to a completely randomized design and a west to east model not informed by soil variability. Compared to OM, weeds were more variable across the landscape and had a shorter range of autocorrelation, and models to increase blocking efficiency resulted in less increase in power. Weeds and OM were not correlated, so no model examined improved power equally for both parameters. Compared to the west to east blocking pattern, the final blocking pattern chosen resulted in a 7-fold increase in power for OM and a 36% increase in power for weeds. PMID:26247056

  19. Reinforcement learning for routing in cognitive radio ad hoc networks.

    PubMed

    Al-Rawi, Hasan A A; Yau, Kok-Lim Alvin; Mohamad, Hafizal; Ramli, Nordin; Hashim, Wahidah

    2014-01-01

    Cognitive radio (CR) enables unlicensed users (or secondary users, SUs) to sense for and exploit underutilized licensed spectrum owned by the licensed users (or primary users, PUs). Reinforcement learning (RL) is an artificial intelligence approach that enables a node to observe, learn, and make appropriate decisions on action selection in order to maximize network performance. Routing enables a source node to search for a least-cost route to its destination node. While there have been increasing efforts to enhance the traditional RL approach for routing in wireless networks, this research area remains largely unexplored in the domain of routing in CR networks. This paper applies RL in routing and investigates the effects of various features of RL (i.e., reward function, exploitation, and exploration, as well as learning rate) through simulation. New approaches and recommendations are proposed to enhance the features in order to improve the network performance brought about by RL to routing. Simulation results show that the RL parameters of the reward function, exploitation, and exploration, as well as learning rate, must be well regulated, and the new approaches proposed in this paper improves SUs' network performance without significantly jeopardizing PUs' network performance, specifically SUs' interference to PUs. PMID:25140350

  20. Report of the AD HOC Committee on Patent Documentation.

    ERIC Educational Resources Information Center

    Urbach, Peter; And Others

    The Committee was established in September 1967 to study and make recommendations on Recommendation XXIX and XXX of the Report of the President's Commission on the Patent System. Based on interviews with Patent Office officials, patent examiners and classifiers and a review of Patent Office studies and documents, the Committee concluded that the…

  1. Ad Hoc Physical Hilbert Spaces in Quantum Mechanics

    NASA Astrophysics Data System (ADS)

    Fernández, Francisco M.; Garcia, Javier; Semorádová, Iveta; Znojil, Miloslav

    2015-12-01

    The overall principles of what is now widely known as PT-symmetric quantum mechanics are listed, explained and illustrated via a few examples. In particular, models based on an elementary local interaction V(x) are discussed as motivated by the naturally emergent possibility of an efficient regularization of an otherwise unacceptable presence of a strongly singular repulsive core in the origin. The emphasis is put on the constructive aspects of the models. Besides the overall outline of the formalism we show how the low-lying energies of bound states may be found in closed form in certain dynamical regimes. Finally, once these energies are found real we explain that in spite of a manifest non-Hermiticity of the Hamiltonian the time-evolution of the system becomes unitary in a properly amended physical Hilbert space.

  2. Sensor Sharing in Mobile Ad-Hoc Networks

    ERIC Educational Resources Information Center

    Mitra, Pramita

    2013-01-01

    Today's modern mobile devices (such as smartphones and tablets) present great potential for growth of many novel, powerful, but also highly demanding applications. However, most mobile devices/users operate in isolation from one another, i.e., they are not aware of the presence of other devices in their proximity. There are numerous situations…

  3. Applying Ad Hoc Institutional Research Findings to College Strategic Planning

    ERIC Educational Resources Information Center

    Clagett, Craig A.

    2004-01-01

    Environmental scanning, enrollment forecasting, budget analyses, and institutional effectiveness assessment are examples of the explicit contributions institutional research offices make to campus strategic planning.

  4. Adélie Penguin Population Diet Monitoring by Analysis of Food DNA in Scats

    PubMed Central

    Jarman, Simon N.; McInnes, Julie C.; Faux, Cassandra; Polanowski, Andrea M.; Marthick, James; Deagle, Bruce E.; Southwell, Colin; Emmerson, Louise

    2013-01-01

    The Adélie penguin is the most important animal currently used for ecosystem monitoring in the Southern Ocean. The diet of this species is generally studied by visual analysis of stomach contents; or ratios of isotopes of carbon and nitrogen incorporated into the penguin from its food. There are significant limitations to the information that can be gained from these methods. We evaluated population diet assessment by analysis of food DNA in scats as an alternative method for ecosystem monitoring with Adélie penguins as an indicator species. Scats were collected at four locations, three phases of the breeding cycle, and in four different years. A novel molecular diet assay and bioinformatics pipeline based on nuclear small subunit ribosomal RNA gene (SSU rDNA) sequencing was used to identify prey DNA in 389 scats. Analysis of the twelve population sample sets identified spatial and temporal dietary change in Adélie penguin population diet. Prey diversity was found to be greater than previously thought. Krill, fish, copepods and amphipods were the most important food groups, in general agreement with other Adélie penguin dietary studies based on hard part or stable isotope analysis. However, our DNA analysis estimated that a substantial portion of the diet was gelatinous groups such as jellyfish and comb jellies. A range of other prey not previously identified in the diet of this species were also discovered. The diverse prey identified by this DNA-based scat analysis confirms that the generalist feeding of Adélie penguins makes them a useful indicator species for prey community composition in the coastal zone of the Southern Ocean. Scat collection is a simple and non-invasive field sampling method that allows DNA-based estimation of prey community differences at many temporal and spatial scales and provides significant advantages over alternative diet analysis approaches. PMID:24358158

  5. Sensitivity and Uncertainty Analysis to Burn-up Estimates on ADS Using ACAB Code

    SciTech Connect

    Cabellos, O; Sanz, J; Rodriguez, A; Gonzalez, E; Embid, M; Alvarez, F; Reyes, S

    2005-02-11

    Within the scope of the Accelerator Driven System (ADS) concept for nuclear waste management applications, the burnup uncertainty estimates due to uncertainty in the activation cross sections (XSs) are important regarding both the safety and the efficiency of the waste burning process. We have applied both sensitivity analysis and Monte Carlo methodology to actinides burnup calculations in a lead-bismuth cooled subcritical ADS. The sensitivity analysis is used to identify the reaction XSs and the dominant chains that contribute most significantly to the uncertainty. The Monte Carlo methodology gives the burnup uncertainty estimates due to the synergetic/global effect of the complete set of XS uncertainties. These uncertainty estimates are valuable to assess the need of any experimental or systematic reevaluation of some uncertainty XSs for ADS.

  6. Sensitivity and Uncertainty Analysis to Burnup Estimates on ADS using the ACAB Code

    SciTech Connect

    Cabellos, O.; Sanz, J.; Rodriguez, A.; Gonzalez, E.; Embid, M.; Alvarez, F.; Reyes, S.

    2005-05-24

    Within the scope of the Accelerator Driven System (ADS) concept for nuclear waste management applications, the burnup uncertainty estimates due to uncertainty in the activation cross sections (XSs) are important regarding both the safety and the efficiency of the waste burning process. We have applied both sensitivity analysis and Monte Carlo methodology to actinides burnup calculations in a lead-bismuth cooled subcritical ADS. The sensitivity analysis is used to identify the reaction XSs and the dominant chains that contribute most significantly to the uncertainty. The Monte Carlo methodology gives the burnup uncertainty estimates due to the synergetic/global effect of the complete set of XS uncertainties. These uncertainty estimates are valuable to assess the need of any experimental or systematic re-evaluation of some uncertainty XSs for ADS.

  7. Dynamical systems analysis of spike-adding mechanisms in transient bursts.

    PubMed

    Nowacki, Jakub; Osinga, Hinke M; Tsaneva-Atanasova, Krasimira

    2012-01-01

    Transient bursting behaviour of excitable cells, such as neurons, is a common feature observed experimentally, but theoretically, it is not well understood. We analyse a five-dimensional simplified model of after-depolarisation that exhibits transient bursting behaviour when perturbed with a short current injection. Using one-parameter continuation of the perturbed orbit segment formulated as a well-posed boundary value problem, we show that the spike-adding mechanism is a canard-like transition that has a different character from known mechanisms for periodic burst solutions. The biophysical basis of the model gives a natural time-scale separation, which allows us to explain the spike-adding mechanism using geometric singular perturbation theory, but it does not involve actual bifurcations as for periodic bursts. We show that unstable sheets of the critical manifold, formed by saddle equilibria of the system that only exist in a singular limit, are responsible for the spike-adding transition; the transition is organised by the slow flow on the critical manifold near folds of this manifold. Our analysis shows that the orbit segment during the spike-adding transition includes a fast transition between two unstable sheets of the slow manifold that are of saddle type. We also discuss a different parameter regime where the presence of additional saddle equilibria of the full system alters the spike-adding mechanism. PMID:22655748

  8. Analysis of drugs illegally added into Chinese traditional patent medicine using surface-enhanced Raman scattering.

    PubMed

    Zhang, Yan; Huang, Xiaoyan; Liu, Wenfang; Cheng, Zeneng; Chen, Chuanpin; Yin, Lihui

    2013-01-01

    Illegal chemicals, which could cause unpredictable side effects, may be added into traditional Chinese medicine (TCM) for a rapid healing effect. In this report, a surface-enhanced Raman scattering (SERS) analysis method for five kinds of illegally added drugs (rosiglitazone maleate, phenformin hydrochloride, metformin hydrochloride, pioglitazone hydrochloride and sibutramine hydrochloride) in Chinese traditional patent medicine (CTPM) has been demonstrated, including simultaneous detections of drug mixtures with CTPM. Silver colloidal, prepared by a sodium citrate reaction, was used as a SERS substrate. The optimum pH condition for each drug has also been explored because of its combined effect on protonation, surface charge, repulsion of an analyte and nanoparticles. Furthermore, the simultaneous detection of two or three kinds of these chemicals has been carried out. Characteristic peaks are employed for qualitative analysis. This is the first research using SERS for the analysis of drug mixtures in CTPM without any separation process. PMID:24107564

  9. Effect of smoking reduction and cessation on the plasma levels of the oxidative stress biomarker glutathione--Post-hoc analysis of data from a smoking cessation trial.

    PubMed

    Mons, Ute; Muscat, Joshua E; Modesto, Jennifer; Richie, John P; Brenner, Hermann

    2016-02-01

    Cigarette smoke contains high concentrations of free radical components that induce oxidative stress. Smoking-induced oxidative stress is thought to contribute to chronic obstructive pulmonary disease, cardiovascular disease and lung cancer through degenerative processes in the lung and other tissues. It is uncertain however whether smoking cessation lowers the burden of oxidative stress. We used data from a randomized controlled cessation trial of 434 current smokers for a post-hoc examination of the effects of smoking cessation on blood plasma levels of total glutathione (tGSH), the most abundant endogenous antioxidant in cells, and total cysteine (tCys), an amino acid and constituent of glutathione. Smoking status was validated based on serum cotinine levels. Multivariate linear mixed models were fitted to examine the association of smoking cessation and change in cigarette consumption with tGSH and tCys. After 12 months follow-up, quitters (n=55) had significantly increased levels of tGSH compared to subjects who continued to smoke (P<0.01). No significant change in tGSH was found for subjects who continued to smoke but reduced their intensity of smoking. No significant effect of smoking cessation or reduction was observed on levels of tCys. These results suggest that smoking cessation but not smoking reduction reduces levels of oxidative stress. PMID:26708755

  10. Patient Background Factors Affecting the Therapeutic Outcomes in Response to Eszopiclone in Adult Patients with Chronic Insomnia: A Post Hoc Analysis of a Double-Blind Phase III Study in Japan

    PubMed Central

    Inoue, Yuichi; Kamijo, Atsushi; Nagai, Reiko

    2015-01-01

    Study Objective: To identify whether baseline demographic factors or subjective sleep variables are associated with the outcomes following treatment with eszopiclone using data from a recent randomized controlled trial of 78 Japanese subjects with insomnia who were treated with 2 mg eszopiclone per day. Methods: We performed a post hoc analysis of factors including sleep latency (SL), wake time after sleep onset (WASO) (both assessed via sleep diaries), and several demographic variables. Subjects with a SL or WASO > 30 min at baseline and with evaluable SL/WASO data at Week 4 were included in SL and WASO remitter analyses, respectively; those with a SL or WASO ≤ 30 min at Week 4 were defined as SL or WASO remitters, respectively. Threshold baseline SL and WASO values for identification of remitters were determined. Results: No relationships between subjectively assessed therapeutic outcomes and demographic factors were identified. Patients with shorter SL and lower WASO values at baseline showed better outcomes following treatment with eszopiclone in terms of SL and WASO changes, respectively. Baseline SL of 75 min and baseline WASO of 80 min were selected as arbitrary cutoff values for determination of SL and WASO remitters/non-remitters, respectively. Conclusions: These findings may help clinicians to predict their patients' outcomes in response to standard doses of eszopiclone in clinical practice. Citation: Inoue Y, Kamijo A, Nagai R. Patient background factors affecting the therapeutic outcomes in response to eszopiclone in adult patients with chronic insomnia: a post hoc analysis of a double-blind phase III study in Japan. J Clin Sleep Med 2015;11(10):1171–1178. PMID:26094929

  11. The embalming of John of Lancaster, first Duke of Bedford (1435 AD): A forensic analysis.

    PubMed

    Charlier, P; Poupon, J; Jeannel, G F; Favier, D; Popescu, S M; Augias, A; Huynh-Charlier, I; Laquay, L; Boudouma, O; Dorion-Peyronnet, C

    2016-04-01

    During the Middle Ages and Renaissance, embalming the cadaver of the elite was common practice, being a highly technical treatment mixing vegetal and mineral substances. To assess the exact kind of embalming reserved for the dead body (with the practical necessities of desiccation and good odour), we performed a full biomedical analysis of the mummified remains of John Plantagenet of Lancaster, first Duke of Bedford, regent of France for his nephew, the English King Henri VI (died 1435 AD). Here, we show, among other aspects, that the body was embalmed using substances whose origins were in apothecary and botany: mercury, myrtle, mint, frankincense, lime and, possibly, cinnamon and copper. PMID:26130751

  12. Treatment response in relation to subthreshold bipolarity in patients with major depressive disorder receiving antidepressant monotherapy: a post hoc data analysis (KOMDD study)

    PubMed Central

    Park, Young-Min; Lee, Bun-Hee

    2016-01-01

    Background The aim of this observational study was to determine whether subthreshold bipolarity affects treatment response and remission in patients with major depressive disorder receiving antidepressant (AD) monotherapy over a 6-month follow-up period. Methods Seventy-eight patients with major depressive disorder were stratified into two subgroups according to the presence of subthreshold bipolarity, identified using the Korean version of the Mood Disorder Questionnaire (K-MDQ), which classifies patients as positive for a screening of bipolarity based on the cutoff for the total K-MDQ score (ie, 7 points). They received AD monotherapy such as escitalopram, sertraline, paroxetine, or tianeptine for 6 months. The Beck Depression Inventory (BDI), Hamilton Depression Rating Scale (HAMD), Hamilton Anxiety Scale, and Beck Scale for Suicide Ideation were applied at baseline, 1 week, 3 weeks, 2 months, 3 months, and 6 months. Results The mean HAMD, BDI, and Beck Scale for Suicide Ideation scores were higher in the bipolarity group than in the nonbipolarity group at 3 weeks. The mean BDI score was also higher in the bipolarity group than in the nonbipolarity group at 6 months. Evaluation of the ratio of improvement for each scale revealed different patterns of percentage changes between the two groups over the 6-month follow-up period. Furthermore, the response and remission rates (as assessed using BDI and HAMD scores) were higher in the nonbipolarity group than in the bipolarity group, with the exception of HAMD scores at the 3-week follow-up time point. Conclusion The findings of this study showed that depressed patients with bipolarity had a worse response to AD monotherapy than did those without bipolarity. PMID:27274258

  13. The embalmed heart of Richard the Lionheart (1199 A.D.): a biological and anthropological analysis

    PubMed Central

    Charlier, Philippe; Poupon, Joël; Jeannel, Gaël-François; Favier, Dominique; Popescu, Speranta-Maria; Weil, Raphaël; Moulherat, Christophe; Huynh-Charlier, Isabelle; Dorion-Peyronnet, Caroline; Lazar, Ana-Maria; Hervé, Christian; de la Grandmaison, Geoffroy Lorin

    2013-01-01

    During the Middle Ages, the partition of the cadaver of the elite members was a current practice, with highly technical treatment given to symbolic organs such as the heart. Considered mostly from a theoretical point of view, this notion of dilaceratio corporis has never been biologically explored. To assess the exact kind of embalming reserved to the heart, we performed a full biomedical analysis of the mummified heart of the English King Richard I (1199 A.D.). Here we show among other aspects, that the organ has been embalmed using substances inspired by Biblical texts and practical necessities of desiccation. We found that the heart was deposed in linen, associated with myrtle, daisy, mint, frankincense, creosote, mercury and, possibly, lime. Furthermore, the goal of using such preservation materials was to allow long-term conservation of the tissues, and good-smelling similar to the one of the Christ (comparable to the odor of sanctity). PMID:23448897

  14. Grain size and shape analysis of the AD 1226 tephra layer, Reykjanes volcanic system

    NASA Astrophysics Data System (ADS)

    Ösp Magnúsdóttir, Agnes; Höskuldsson, Ármann; Larsen, Guðrún; Tumi Guðmunsson, Magnús; Sigurgeirsson, Magnús Á.

    2014-05-01

    Recent explosive eruptions in Iceland have drawn attention to long range tephra transport in the atmosphere. In Iceland tephra forming explosion eruptions are frequent, due to abundance of water. However, the volcanism on the island is principally basaltic. Volcanism along the Reykjanes Peninsula is divided into five distinct volcanic systems. Volcano-tectonic activity within these systems is periodic, with recurrence intervals in the range of 1 ka. Last volcano-tectonic sequence began around AD 940, shortly after settlement of Iceland, and lasted through AD 1340. During this period activity was characterized by basaltic fissure eruptions. Furthermore, this activity period on the Reykjanes peninsula began within the eastern most volcanic system and gradually moved towards the west across the peninsula. The 1226 eruption was a basaltic fissure eruption with in the Reykjanes volcanic system. The eruption began on land and gradually progressed towards the SW until the volcanic fissure extended into the sea. Water-magma interaction changed the eruption from effusive into explosive forming the largest tephra layer on the peninsula. Due to its close proximity to the Keflavik international airport and that of the capital of Iceland it is important to get an insight into, the characteristics, generation and distribution of such tephra deposits. In this eruption the tephra produced had an approximate volume of 0.1 km3 and covered an area of some 3500 km2 within the 0.5 cm isopach. Total grain size distribution of this tephra layer will be presented along with analysis of principal grain shapes of the finer portion of the tephra layer as a function of distance from the source. The tephra grain size is dominated by particles finer than 1 millimeter with an almost complete absence of large grains independent of distance from the source. Comprehensive understanding of the characteristics of tephra generated in this eruption can help us to understand hazards posed by future

  15. Cytoarchitecture of the human lateral occipital cortex: mapping of two extrastriate areas hOc4la and hOc4lp.

    PubMed

    Malikovic, Aleksandar; Amunts, Katrin; Schleicher, Axel; Mohlberg, Hartmut; Kujovic, Milenko; Palomero-Gallagher, Nicola; Eickhoff, Simon B; Zilles, Karl

    2016-05-01

    The microstructural correlates of the functional segregation of the human lateral occipital cortex are largely unknown. Therefore, we analyzed the cytoarchitecture of this region in ten human post-mortem brains using an observer-independent and statistically testable parcellation method to define the position and extent of areas in the lateral occipital cortex. Two new cytoarchitectonic areas were found: an anterior area hOc4la and a posterior area hOc4lp. hOc4la was located behind the anterior occipital sulcus in rostral and ventral portions of this region where it occupies the anterior third of the middle and inferior lateral occipital gyri. hOc4lp was found in caudal and dorsal portions of this region where it extends along the superior and middle lateral occipital gyri. The cytoarchitectonic areas were registered to 3D reconstructions of the corresponding brains, which were subsequently spatially normalized to the Montreal Neurological Institute reference space. Continuous probabilistic maps of both areas based on the analysis of ten brains were generated to characterize their inter-subject variability in location and size. The maps of hOc4la and hOc4lp were then used as seeds for meta-analytic connectivity modeling and quantitative functional decoding to identify their co-activation patterns and assignment to functional domains. Convergent evidence from their location, topography, size, functional domains and connectivity indicates that hOc4la and hOc4lp are the potential anatomical correlates of the functionally defined lateral occipital areas LO-1 and LO-2. PMID:25687261

  16. Physicians Experience with and Expectations of the Safety and Tolerability of WHO-Step III Opioids for Chronic (Low) Back Pain: Post Hoc Analysis of Data from a German Cross-Sectional Physician Survey

    PubMed Central

    Ueberall, Michael A.; Eberhardt, Alice; Mueller-Schwefe, Gerhard H. H.

    2015-01-01

    Objective. To describe physicians' daily life experience with WHO-step III opioids in the treatment of chronic (low) back pain (CLBP). Methods. Post hoc analysis of data from a cross-sectional online survey with 4.283 Germany physicians. Results. With a reported median use in 17% of affected patients, WHO-step III opioids play a minor role in treatment of CLBP in daily practice associated with a broad spectrum of positive and negative effects. If prescribed, potent opioids were reported to show clinically relevant effects (such as ≥50% pain relief) in approximately 3 of 4 patients (median 72%). Analgesic effects reported are frequently related with adverse events (AEs). Only 20% of patients were reported to remain free of any AE. Most frequently reported AE was constipation (50%), also graded highest for AE-related daily life restrictions (median 46%). Specific AE countermeasures were reported to be necessary in approximately half of patients (median 45%); nevertheless AE-related premature discontinuation rates reported were high (median 22%). Fentanyl/morphine were the most/least prevalently prescribed potent opioids mentioned (median 20 versus 8%). Conclusion. Overall, use of WHO-step III opioids for CLBP is low. AEs, especially constipation, are commonly reported and interfere significantly with analgesic effects in daily practice. Nevertheless, beneficial effects outweigh related AEs in most patients with CLBP. PMID:26568890

  17. The relationship, structure and profiles of schizophrenia measurements: a post-hoc analysis of the baseline measures from a randomized clinical trial

    PubMed Central

    2011-01-01

    Background To fully assess the various dimensions affected by schizophrenia, clinical trials often include multiple scales measuring various symptom profiles, cognition, quality of life, subjective well-being, and functional impairment. In this exploratory study, we characterized the relationships among six clinical, functional, cognitive, and quality-of-life measures, identifying a parsimonious set of measurements. Methods We used baseline data from a randomized, multicenter study of patients diagnosed with schizophrenia, schizoaffective disorder, or schizophreniform disorder who were experiencing an acute symptom exacerbation (n = 628) to examine the relationship among several outcome measures. These measures included the Positive and Negative Syndrome Scale (PANSS), Montgomery-Asberg Depression Rating Scale (MADRS), Brief Assessment of Cognition in Schizophrenia Symbol Coding Test, Subjective Well-being Under Neuroleptics Scale Short Form (SWN-K), Schizophrenia Objective Functioning Instrument (SOFI), and Quality of Life Scale (QLS). Three analytic approaches were used: 1) path analysis; 2) factor analysis; and 3) categorical latent variable analysis. In the optimal path model, the SWN-K was selected as the final outcome, while the SOFI mediated the effect of the exogenous variables (PANSS, MADRS) on the QLS. Results The overall model explained 47% of variance in QLS and 17% of the variance in SOFI, but only 15% in SWN-K. Factor analysis suggested four factors: "Functioning," "Daily Living," "Depression," and "Psychopathology." A strong positive correlation was observed between the SOFI and QLS (r = 0.669), and both the QLS and SOFI loaded on the "Functioning" factor, suggesting redundancy between these scales. The measurement profiles from the categorical latent variable analysis showed significant variation in functioning and quality of life despite similar levels of psychopathology. Conclusions Researchers should consider collecting PANSS, SOFI, and SWN-K in

  18. Pooled post hoc analysis of population pharmacokinetics of oxycodone and acetaminophen following a single oral dose of biphasic immediate-release/extended-release oxycodone/acetaminophen tablets

    PubMed Central

    Franke, Ryan M; Morton, Terri; Devarakonda, Krishna

    2015-01-01

    This analysis evaluated the single-dose population pharmacokinetics (PK) of biphasic immediate-release (IR)/extended-release (ER) oxycodone (OC)/acetaminophen (APAP) 7.5/325 mg tablets administered under fasted conditions and the effects of a meal on their single-dose population PK. Data were pooled from four randomized, single-dose crossover trials enrolling healthy adult (18–55 years old) participants (three trials) and nondependent recreational users of prescription opioids (one trial) with a body weight of ≥59 kg. Participants received IR/ER OC/APAP 7.5/325 mg tablets in single doses of 7.5/325 mg (one tablet), 15/650 mg (two tablets), or 30/1,300 mg (four tablets) under fasted or fed conditions. Six variables were examined: sex, race, age, weight, height, and body mass index. Single-dose population PK was analyzed using first-order conditional estimation methods. A total of 151 participants were included in the analysis under fasted conditions, and 31 participants were included in the fed analysis. Under fasted conditions, a 10% change in body weight was accompanied by ~7.5% change in total body clearance (CL/F) and volume of distribution (V/F) of OC and APAP. Black participants had 17.3% lower CL/F and a 16.9% lower V/F of OC compared with white participants. Under fed conditions, the absorption rate constant of OC and APAP decreased significantly, although there was no effect on CL/F and V/F. Considering that the recommended dose for IR/ER OC/APAP 7.5/325 mg tablets is two tablets every 12 hours, adjustments of <50% are not clinically relevant. Dose adjustment may be necessary for large deviations from average body weight, but the small PK effects associated with race and consumption of a meal are not clinically relevant. PMID:26316698

  19. Pooled post hoc analysis of population pharmacokinetics of oxycodone and acetaminophen following a single oral dose of biphasic immediate-release/extended-release oxycodone/acetaminophen tablets.

    PubMed

    Franke, Ryan M; Morton, Terri; Devarakonda, Krishna

    2015-01-01

    This analysis evaluated the single-dose population pharmacokinetics (PK) of biphasic immediate-release (IR)/extended-release (ER) oxycodone (OC)/acetaminophen (APAP) 7.5/325 mg tablets administered under fasted conditions and the effects of a meal on their single-dose population PK. Data were pooled from four randomized, single-dose crossover trials enrolling healthy adult (18-55 years old) participants (three trials) and nondependent recreational users of prescription opioids (one trial) with a body weight of ≥59 kg. Participants received IR/ER OC/APAP 7.5/325 mg tablets in single doses of 7.5/325 mg (one tablet), 15/650 mg (two tablets), or 30/1,300 mg (four tablets) under fasted or fed conditions. Six variables were examined: sex, race, age, weight, height, and body mass index. Single-dose population PK was analyzed using first-order conditional estimation methods. A total of 151 participants were included in the analysis under fasted conditions, and 31 participants were included in the fed analysis. Under fasted conditions, a 10% change in body weight was accompanied by ~7.5% change in total body clearance (CL/F) and volume of distribution (V/F) of OC and APAP. Black participants had 17.3% lower CL/F and a 16.9% lower V/F of OC compared with white participants. Under fed conditions, the absorption rate constant of OC and APAP decreased significantly, although there was no effect on CL/F and V/F. Considering that the recommended dose for IR/ER OC/APAP 7.5/325 mg tablets is two tablets every 12 hours, adjustments of <50% are not clinically relevant. Dose adjustment may be necessary for large deviations from average body weight, but the small PK effects associated with race and consumption of a meal are not clinically relevant. PMID:26316698

  20. Post hoc Analysis for Detecting Individual Rare Variant Risk Associations Using Probit Regression Bayesian Variable Selection Methods in Case-Control Sequencing Studies.

    PubMed

    Larson, Nicholas B; McDonnell, Shannon; Albright, Lisa Cannon; Teerlink, Craig; Stanford, Janet; Ostrander, Elaine A; Isaacs, William B; Xu, Jianfeng; Cooney, Kathleen A; Lange, Ethan; Schleutker, Johanna; Carpten, John D; Powell, Isaac; Bailey-Wilson, Joan; Cussenot, Olivier; Cancel-Tassin, Geraldine; Giles, Graham; MacInnis, Robert; Maier, Christiane; Whittemore, Alice S; Hsieh, Chih-Lin; Wiklund, Fredrik; Catolona, William J; Foulkes, William; Mandal, Diptasri; Eeles, Rosalind; Kote-Jarai, Zsofia; Ackerman, Michael J; Olson, Timothy M; Klein, Christopher J; Thibodeau, Stephen N; Schaid, Daniel J

    2016-09-01

    Rare variants (RVs) have been shown to be significant contributors to complex disease risk. By definition, these variants have very low minor allele frequencies and traditional single-marker methods for statistical analysis are underpowered for typical sequencing study sample sizes. Multimarker burden-type approaches attempt to identify aggregation of RVs across case-control status by analyzing relatively small partitions of the genome, such as genes. However, it is generally the case that the aggregative measure would be a mixture of causal and neutral variants, and these omnibus tests do not directly provide any indication of which RVs may be driving a given association. Recently, Bayesian variable selection approaches have been proposed to identify RV associations from a large set of RVs under consideration. Although these approaches have been shown to be powerful at detecting associations at the RV level, there are often computational limitations on the total quantity of RVs under consideration and compromises are necessary for large-scale application. Here, we propose a computationally efficient alternative formulation of this method using a probit regression approach specifically capable of simultaneously analyzing hundreds to thousands of RVs. We evaluate our approach to detect causal variation on simulated data and examine sensitivity and specificity in instances of high RV dimensionality as well as apply it to pathway-level RV analysis results from a prostate cancer (PC) risk case-control sequencing study. Finally, we discuss potential extensions and future directions of this work. PMID:27312771

  1. Analysis of motor function in 6-month-old male and female 3xTg-AD mice.

    PubMed

    Stover, Kurt R; Campbell, Mackenzie A; Van Winssen, Christine M; Brown, Richard E

    2015-03-15

    The 3xTg-AD mouse has high validity as a model of Alzheimer's disease (AD) because it develops both amyloid beta plaques and neurofibrillary tangles. Human patients with AD typically develop motor deficits, which worsen as the disease progresses, but 3xTg-AD mice have been reported to show enhanced motor abilities. We investigated the motor behaviour phenotype of male and female 3xTg-AD and B6129SF2 wildtype mice on a battery of motor behaviours at 6 months of age. Compared to wildtype mice, the 3xTg-AD mice had enhanced motor performance on the Rotarod, but worse performance on the grid suspension task. In gait analysis 3xTg-AD mice had a longer stride length and made more foot slips on the balance beam than wildtype mice. There was no overall difference in voluntary wheel-running activity between genotypes, but there was a disruption in circadian activity rhythm in 3xTg-AD mice. In some motor tasks, such as the Rotarod and balance beam, females appeared to perform better than males, but this sex differences was accounted for by differences in body weight. Our results indicate that while the 3xTg-AD mice show enhanced performance on the Rotarod, they have poorer performance on other motor behaviour tasks, indicating that their motor behaviour phenotype is more complex than previously reported. The presence of the P301L transgene may explain the enhancement of Rotarod performance but the poorer performance on other motor behaviour tasks may be due to other transgenes. PMID:25486177

  2. Analysis of the automatic depressurization system (ADS) tests for the AP600 design

    SciTech Connect

    Brockie, A.J.; Carlson, R.W.; Bueter, T.W.

    1995-12-31

    The AP600 is a Westinghouse advanced pressurized water reactor (PWR) designed with passive plant safety features that rely on natural driving forces, such as gravity, and natural circulation which allows significant simplification of the plant systems equipment and operation. As part of the passive safety concept, the AP600 utilizes an Automatic Depressurization System (ADS) to depressurize the Reactor Coolant System (RCS) allowing long-term gravity injection to be initiated and maintained for passive reflood and long term core cooling. The ADS design consists of four flow paths, two of which are connected to the top of the pressurizer and a flow path from each of the two RCS hot legs. During a postulated accident, the two flow paths from the hot legs discharge directly to containment. The two paths from the pressurizer discharge steam and/or water from the RCS into the In-containment Refueling Water Storage Tank (IRWST) through spargers located underwater where the steam is normally condensed with no increase in containment pressure or temperature. The ADS tests are one part of the planned AP600 Westinghouse test program for the passive core cooling system (PXS). The ADS tests are full-scale simulations of AP600 ADS components. The ADS tests provide dynamic performance data of the ADS for use in computer code validation and design verification.

  3. Predictive factors of radiological progression after 2 years of remission-steered treatment in early arthritis patients: a post hoc analysis of the IMPROVED study

    PubMed Central

    Akdemir, Gülşah; Verheul, Marije K; Heimans, Lotte; Wevers-de Boer, Kirsten V C; Goekoop-Ruiterman, Yvonne P M; van Oosterhout, Maikel; Harbers, Joop B; Bijkerk, Casper; Steup-Beekman, Gerda M; Lard, Leroy R; Huizinga, Tom W J; Trouw, Leendert A; Allaart, Cornelia F

    2016-01-01

    Objectives To identify predictive factors of radiological progression in early arthritis patients treated by remission-steered treatment. Methods In the IMPROVED study, 610 patients with early rheumatoid arthritis (RA) or undifferentiated arthritis (UA) were treated with methotrexate (MTX) and a tapered high dose of prednisone. Patients in early remission (disease activity score (DAS) <1.6 after 4 months) tapered prednisone to zero. Patients not in early remission were randomised to arm 1: MTX plus hydroxychloroquine, sulfasalazine and prednisone, or to arm 2: MTX plus adalimumab. Predictors of radiological progression (≥0.5 Sharp/van der Heijde score; SHS) after 2 years were assessed using logistic regression analysis. Results Median (IQR) SHS progression in 488 patients was 0 (0–0) point, without differences between RA or UA patients or between treatment arms. In only 50/488 patients, the SHS progression was ≥0.5: 33 (66%) were in the early DAS remission group, 9 (18%) in arm 1, 5 (10%) in arm 2, 3 (6%) in the outside of protocol group. Age (OR (95% CI): 1.03 (1.00 to 1.06)) and the combined presence of anticarbamylated protein antibodies (anti-CarP) and anticitrullinated protein antibodies (ACPA) (2.54 (1.16 to 5.58)) were independent predictors for SHS progression. Symptom duration <12 weeks showed a trend. Conclusions After 2 years of remission steered treatment in early arthritis patients, there was limited SHS progression in only a small group of patients. Numerically, patients who had achieved early DAS remission had more SHS progression than other patients. Positivity for both anti-CarP and ACPA and age were independently associated with SHS progression. Trial registration numbers ISRCTN Register number 11916566 and EudraCT number 2006 06186-16. PMID:26925251

  4. Prevalence of acute and chronic viral seropositivity and characteristics of disease in patients with psoriatic arthritis treated with cyclosporine: a post hoc analysis from a sex point of view on the observational study of infectious events in psoriasis complicated by active psoriatic arthritis

    PubMed Central

    Colombo, Delia; Chimenti, Sergio; Grossi, Paolo Antonio; Marchesoni, Antonio; Bardazzi, Federico; Ayala, Fabio; Simoni, Lucia; Vassellatti, Donatella; Bellia, Gilberto

    2016-01-01

    Background Sex medicine studies have shown that there are sex differences with regard to disease characteristics in immune-mediated inflammatory diseases, including psoriasis, in immune response and susceptibility to viral infections. We performed a post hoc analysis of the Observational Study of infectious events in psoriasis complicated by active psoriatic arthritis (SYNERGY) study in patients with psoriatic arthritis (PsA) treated with immunosuppressive regimens including cyclosporine, in order to evaluate potential between-sex differences in severity of disease and prevalence of viral infections. Methods SYNERGY was an observational study conducted in 24 Italian dermatology clinics, which included 238 consecutively enrolled patients with PsA, under treatment with immunosuppressant regimens including cyclosporin A. In this post hoc analysis, patients’ demographical data and clinical characteristics of psoriasis, severity and activity of PsA, prevalence of seropositivity for at least one viral infection, and treatments administered for PsA and infections were compared between sexes. Results A total of 225 patients were evaluated in this post hoc analysis, and 121 (54%) were males. Demographic characteristics and concomitant diseases were comparable between sexes. Statistically significant sex differences were observed at baseline in Psoriasis Area and Severity Index score (higher in males), mean number of painful joints, Bath Ankylosing Spondylitis Disease Activity Index, and the global activity of disease assessed by patients (all higher in females). The percentage of patients with at least one seropositivity detected at baseline, indicative of concomitant or former viral infection, was significantly higher among women than among men. No between-sex differences were detected in other measures, at other time points, and in treatments. Patients developed no hepatitis B virus or hepatitis C virus reactivation during cyclosporine treatment. Conclusion Our post hoc

  5. The added value of biomarker analysis to the genesis of Plaggic Anthrosols.

    NASA Astrophysics Data System (ADS)

    van Mourik, Jan; Jansen, Boris

    2015-04-01

    Coversands (chemical poor Late-glacial aeolian sand deposits) dominate the surface geology of an extensive area in northwestern Europe. Plaggic Anthrosols occur in cultural landscapes, developed on coversands. They are the characteristic soils that developed on ancient fertilized arable fields. Plaggic Anthrosols have a complex genesis. They are records of aspects environmental and agricultural history. In previous studies information of the soil records was unlocked by application of pollen analysis, 14C and OSL dating. In this study we applied biomarker analysis to unlock additional information about the applied organic sources in the production of plaggic manure. Radiocarbon dating suggested the start of sedentary agriculture (after a period, characterized by shifting cultivation and Celtic fields) between 3000 and 2000 BP. In previous studies is assumed that farmers applied organic sods, dug on forest soils and heath to produce organic stable manure to fertilize the fields. The mineral fraction of the sods was supposed to be responsible for the development of the plaggic horizon and the raise of the land surface. Optically stimulated Luminescence dating however suggested that plaggic deposition on the fields started relatively late, in the 18th century. The use of ectorganic matter from the forest soils must have been ended in the 10th-12th century, due to commercial forest clear cuttings as recorded in archived documents. These deforestations resulted in the first extension of sand drifting and famers had to protect the valuable heath against this ' environmental catastrophe' . The use of heath for sheep grazing and other purposes as honey production could continue till the 18th century, as recorded in archived documents. In the course of the 18th century, the population growth resulted in increasing demand for food. The deep stable economy was introduced and the booming demand for manure resulted in intensive sod digging on the heath. This caused heath

  6. Development of opioid-induced constipation: post hoc analysis of data from a 12-week prospective, open-label, blinded-endpoint streamlined study in low-back pain patients treated with prolonged-release WHO step III opioids

    PubMed Central

    Ueberall, Michael A; Mueller-Schwefe, Gerhard HH

    2015-01-01

    Background Opioid-induced constipation is the most prevalent patient complaint associated with longer-term opioid use and interferes with analgesic efficacy, functionality, quality of life, and patient compliance. Objectives We aimed to compare the effects of prolonged-release (PR) oxycodone plus PR naloxone (OXN) vs PR oxycodone (OXY) vs PR morphine (MOR) on bowel function under real-life conditions in chronic low-back pain patients refractory to World Health Organization (WHO) step I and/or II analgesics. Research design and methods This was a post hoc analysis of the complete data set from a prospective, randomized, open-label, blinded endpoint (PROBE) streamlined study (German pain study registry: 2012-0012-05; European Union Drug Regulating Authorities Clinical Trials [EudraCT]: 2012-001317-16), carried out in 88 centers in Germany, where a total of 901 patients requiring WHO step III opioids to treat low-back pain were enrolled and prospectively observed for 3 months. Opioid allocation was based on either optional randomization (n=453) or physician decision (n=448). In both groups, treatment doses could be adjusted as per the German prescribing information, and physicians were free to address all side effects and tolerability issues as usual. The primary endpoint was the proportion of patients maintaining normal bowel function throughout the complete treatment period, assessed with the Bowel Function Index (BFI). Secondary analyses addressed absolute and relative BFI changes, complete spontaneous bowel movements, use of laxatives, treatment emergent adverse events, analgesic effects, and differences between randomized vs nonrandomized patient groups. Results BFI changed significantly with all three WHO step III treatments, however significantly less with OXN vs OXY and MOR despite a significantly higher use of laxatives with the latter ones (P<0.001). The percentage of patients who maintained normal BFI scores despite opioid treatment was 54.5% (164/301) with

  7. Is herpes zoster an additional complication in old age alongside comorbidity and multiple medications? Results of the post hoc analysis of the 12-month longitudinal prospective observational ARIZONA cohort study

    PubMed Central

    Pickering, Gisèle; Gavazzi, Gaëtan; Gaillat, Jacques; Paccalin, Marc; Bloch, Karine; Bouhassira, Didier

    2016-01-01

    Objectives To examine the burden of comorbidity, polypharmacy and herpes zoster (HZ), an infectious disease, and its main complication post-herpetic neuralgia (PHN) in young (50–70 years of age: 70−) and old (≥70 years of age: 70+) patients. Design Post hoc analysis of the results of the 12-month longitudinal prospective multicentre observational ARIZONA cohort study. Settings and participants The study took place in primary care in France from 20 November 2006 to 12 September 2008. Overall, 644 general practitioners (GPs) collected data from 1358 patients aged 50 years or more with acute eruptive HZ. Outcome measures Presence of HZ-related pain or PHN (pain persisting >3 months) was documented at day 0 and at months 3, 6, and 12. To investigate HZ and PHN burden, pain, quality of life (QoL) and mood were self-assessed using validated questionnaires (Zoster Brief Pain Inventory, 12-item Short-Form health survey and Hospital Anxiety and Depression Scale, respectively). Results As compared with younger patients, older patients more frequently presented with comorbidities, more frequently took analgesics and had poorer response on all questionnaires, indicating greater burden, at inclusion. Analgesics were more frequently prescribed to relieve acute pain or PHN in 70+ than 70− patients. Despite higher levels of medication prescription, poorer pain relief and poorer response to all questionnaires were reported in 70+ than 70− patients. Conclusions Occurrence of HZ and progression to PHN adds extra burden on top of pharmacological treatment and impaired quality of life, especially in older patients who already have health problems to cope with in everyday life. PMID:26892790

  8. How to Use Value-Added Analysis to Improve Student Learning: A Field Guide for School and District Leaders

    ERIC Educational Resources Information Center

    Kennedy, Kate; Peters, Mary; Thomas, Mike

    2012-01-01

    Value-added analysis is the most robust, statistically significant method available for helping educators quantify student progress over time. This powerful tool also reveals tangible strategies for improving instruction. Built around the work of Battelle for Kids, this book provides a field-tested continuous improvement model for using…

  9. SEM analysis of ionizing radiation effects in an analog to digital converter /AD571/

    NASA Technical Reports Server (NTRS)

    Gauthier, M. K.; Perret, J.; Evans, K. C.

    1981-01-01

    The considered investigation is concerned with the study of the total-dose degradation mechanisms in an IIL analog to digital (A/D) converter. The A/D converter is a 10 digit device having nine separate functional units on the chip which encompass several hundred transistors and circuit elements. It was the objective of the described research to find the radiation sensitive elements by a systematic search of the devices on the LSI chip. The employed technique using a scanning electron microscope to determine the functional blocks of an integrated circuit which are sensitive to ionizing radiation and then progressively zeroing in on the soft components within those blocks, proved extremely successful on the AD571. Four functional blocks were found to be sensitive to radiation, including the Voltage Reference, DAC, IIL Clock, and IIL SAR.

  10. Bubbling AdS3

    NASA Astrophysics Data System (ADS)

    Martelli, Dario; Morales, Jose F.

    2005-02-01

    In the light of the recent Lin, Lunin, Maldacena (LLM) results, we investigate 1/2-BPS geometries in minimal (and next to minimal) supergravity in D = 6 dimensions. In the case of minimal supergravity, solutions are given by fibrations of a two-torus T2 specified by two harmonic functions. For a rectangular torus the two functions are related by a non-linear equation with rare solutions: AdS3 × S3, the pp-wave and the multi-center string. ``Bubbling'', i.e. superpositions of droplets, is accommodated by allowing the complex structure of the T2 to vary over the base. The analysis is repeated in the presence of a tensor multiplet and similar conclusions are reached, with generic solutions describing D1D5 (or their dual fundamental string-momentum) systems. In this framework, the profile of the dual fundamental string-momentum system is identified with the boundaries of the droplets in a two-dimensional plane.

  11. Added Value of Dialogic Parent-Child Book Readings: A Meta-Analysis

    ERIC Educational Resources Information Center

    Mol, Suzanne E.; Bus, Adriana G.; de Jong, Maria T.; Smeets, Daisy J. H.

    2008-01-01

    Book reading has been demonstrated to promote vocabulary. The current study was conducted to examine the added value of an interactive shared book reading format that emphasizes active as opposed to noninteractive participation by the child. Studies that included a dialogic reading intervention group and a reading-as-usual control group, and that…

  12. The added value of biomarker analysis to the genesis of Plaggic Anthrosols.

    NASA Astrophysics Data System (ADS)

    van Mourik, Jan; Jansen, Boris

    2015-04-01

    Coversands (chemical poor Late-glacial aeolian sand deposits) dominate the surface geology of an extensive area in northwestern Europe. Plaggic Anthrosols occur in cultural landscapes, developed on coversands. They are the characteristic soils that developed on ancient fertilized arable fields. Plaggic Anthrosols have a complex genesis. They are records of aspects environmental and agricultural history. In previous studies information of the soil records was unlocked by application of pollen analysis, 14C and OSL dating. In this study we applied biomarker analysis to unlock additional information about the applied organic sources in the production of plaggic manure. Radiocarbon dating suggested the start of sedentary agriculture (after a period, characterized by shifting cultivation and Celtic fields) between 3000 and 2000 BP. In previous studies is assumed that farmers applied organic sods, dug on forest soils and heath to produce organic stable manure to fertilize the fields. The mineral fraction of the sods was supposed to be responsible for the development of the plaggic horizon and the raise of the land surface. Optically stimulated Luminescence dating however suggested that plaggic deposition on the fields started relatively late, in the 18th century. The use of ectorganic matter from the forest soils must have been ended in the 10th-12th century, due to commercial forest clear cuttings as recorded in archived documents. These deforestations resulted in the first extension of sand drifting and famers had to protect the valuable heath against this ' environmental catastrophe' . The use of heath for sheep grazing and other purposes as honey production could continue till the 18th century, as recorded in archived documents. In the course of the 18th century, the population growth resulted in increasing demand for food. The deep stable economy was introduced and the booming demand for manure resulted in intensive sod digging on the heath. This caused heath

  13. Comparison of efficacy and safety of two starting insulin regimens in non-Asian, Asian Indian, and East Asian patients with type 2 diabetes: a post hoc analysis of the PARADIGM study

    PubMed Central

    Ji, Linong; Min, Kyung Wan; Oliveira, Juliana; Lew, Thomas; Duan, Ran

    2016-01-01

    Objective The objective of this study was to explore the efficacy and safety of insulin lispro mix 25 (25% insulin lispro and 75% insulin lispro protamine suspension [LM25]) or insulin glargine plus insulin lispro (G+L) in insulin-naïve patients with type 2 diabetes from different racial/ethnic groups. Methods Three subgroups from the PARADIGM study were analyzed post hoc: non-Asian (n=130), Asian Indian (n=106), and East Asian (n=89). Results All subgroups recorded glycated hemoglobin (HbA1c) reductions: non-Asian (LM25, −2.07%; G+L, −2.05%), Asian Indian (LM25, −1.75%; G+L, −1.60%), and East Asian (LM25, −2.03%; G+L, −1.76%); end point HbA1c values were higher in Asian Indians and East Asians than in non-Asians. Fewer Asian Indians (LM25, 43.2%; G+L, 29.2%) and East Asians (LM25, 37.5%; G+L, 36.1%) reached HbA1c <7% versus non-Asians (LM25, 51.7%; G+L, 48.1%); differences were not significant (P=0.12 and P=0.06, respectively). The mean total daily insulin dose (U/kg) for non-Asians was 0.67 (LM25) and 0.61 (G+L), for Asian Indians was 0.91 (LM25) and 0.90 (G+L), and for East Asians was 0.53 (LM25) and 0.59 (G+L). The ratio of mealtime to total insulin dose in the G+L arm for non-Asians was 0.19±0.23, for Asian Indians was 0.33±0.25, and for East Asians was 0.34±0.27. Overall incidence (%) of hypoglycemia in non-Asians was 94.1 (LM25) and 91.8 (G+L), in Asian Indians was 90.4 (LM25) and 88.5 (G+L), and in East Asians was 69.8 (LM25) and 77.3 (G+L). Conclusion Asian Indians showed least improvement in glycemic HbA1c reduction despite greater insulin use. East Asians and non-Asians achieved similar HbA1c reduction in the LM25 arm with a lower rate of hypoglycemia. Asians required more mealtime insulin coverage than non-Asians. This study added important insight into the effect of ethnicity on insulin treatment outcomes in patients with type 2 diabetes. PMID:27563254

  14. Effect of ferric carboxymaltose on serum phosphate and C-terminal FGF23 levels in non-dialysis chronic kidney disease patients: post-hoc analysis of a prospective study

    PubMed Central

    2013-01-01

    Background Some parenteral iron therapies have been found to be associated with hypophosphatemia. The mechanism of the decrease in serum phosphate is unknown. The aim of this study is to examine the effect of IV ferric carboxymaltose(FCM) on phosphate metabolism and FGF23 levels in patients with chronic kidney disease(CKD). Methods This is a post-hoc analysis of a prospective study carried out in 47 non-dialysis CKD patients with iron-deficiency anaemia who received a single 1000 mg injection of FCM. Markers of mineral metabolism (calcium, phosphate, 1,25-dihydroxyvitamin D, PTH and FGF23[c-terminal]) were measured prior to FCM administration and at week 3 and week 12 after FCM administration. Based on the measured levels of serum phosphate at week 3, patiens were classified as hypophosphatemic or non-hypophosphatemic. Results Serum phosphate levels decreased significantly three weeks after FCM administration and remained at lower levels at week 12 (4.24 ± 0.84 vs 3.69 ± 1.10 vs 3.83 ± 0.68 mg/dL, respectively, p < 0.0001. Serum calcium, PTH and 1,25-dihydroxyvitamin D did not change over the course of the study. Serum FGF23 decreased significantly from 442(44.9-4079.2) at baseline to 340(68.5-2603.3) at week 3 and 191.6(51.3-2465.9) RU/mL at week 12, p < 0.0001. Twelve patients were non-hypophosphatemic and 35 hypophosphatemic. FGF23 levels decreased in both groups, whereas no changes were documented in any of the other mineral parameters. Conclusions In non-dialysis CKD patients, FCM induces reduction in serum phosphate levels that persists for three months. FCM causes a significant decrease in FGF23 levels without changes to other bone metabolism parameters. PMID:23902731

  15. Value Added?

    ERIC Educational Resources Information Center

    UCLA IDEA, 2012

    2012-01-01

    Value added measures (VAM) uses changes in student test scores to determine how much "value" an individual teacher has "added" to student growth during the school year. Some policymakers, school districts, and educational advocates have applauded VAM as a straightforward measure of teacher effectiveness: the better a teacher, the better students…

  16. Gas-sensing properties and complex impedance analysis of Ce-added WO 3 nanoparticles to VOC gases

    NASA Astrophysics Data System (ADS)

    Luo, Shijun; Fu, Gang; Chen, Huan; Liu, Zhiyu; Hong, Qiusan

    2007-06-01

    Nano-scaled tungsten-trioxide (WO 3) powder has been synthesized by sol-gel process using tungsten powders. The effect of cerium oxide (CeO 2) additive on the gas response of the samples was investigated, especially to the volatile organic compound (VOC) gases, and significant enhancement was achieved. The highest gas response of Ce-added WO 3 samples was found to shift to lower temperatures, compared to the pure WO 3 ones. The analysis with field-emission SEM reveals that grain boundary is pinned due to adding CeO 2, which results in decrease in the average grain size of Ce-added WO 3 and increase in the surface area, compared with the pure WO 3 ones. Complex impedance spectroscopy analysis indicates that grain boundary resistance increases and grain boundary capacitance decreases with the increasing concentration of CeO 2. It means that the Ce ions exist mainly in the WO 3 grain boundaries and helps to improve the microstructure.

  17. An analysis of early insulin glargine added to metformin with or without sulfonylurea: impact on glycaemic control and hypoglycaemia

    PubMed Central

    Fonseca, V; Gill, J; Zhou, R; Leahy, J

    2011-01-01

    Aim: To evaluate the benefits of initiating insulin at an earlier versus later treatment stage, and regimens with/without sulfonylurea (SU). Methods: Pooled analysis of 11 prospective randomized clinical trials, including 2171 adults with uncontrolled type 2 diabetes initiating insulin glargine following a specific titration algorithm. Clinical outcomes were glycated haemoglobin A1c (HbA1c) reduction, per cent achieving HbA1c ≤ 7.0%, weight gain and hypoglycaemic events. Statistical analysis compared outcomes 24 weeks after basal insulin initiation in patients previously uncontrolled on 0/1 oral antidiabetic drug (OAD) versus 2 OADs, and in patients taking metformin (MET) or SU alone or in combination at baseline. A meta-analysis was also conducted. Results: For the pooled analysis, patients on 0/1 OAD and those on MET monotherapy at baseline had the largest 24-week reductions in HbA1c following the addition of insulin glargine (∼0.44 U/kg). Of patients failing MET/SU monotherapy and MET + SU in combination, 68.1, 50.4 and 56.4% achieved HbA1c ≤ 7.0%, respectively (p = 0.0006). Weight gain was lowest when basal insulin was added to MET. Patients on 0/1 OAD at baseline had significantly less symptomatic hypoglycaemia when basal insulin was added than those on 2 OADs (p = 0.0007). Despite higher insulin doses, those taking MET alone had less hypoglycaemia than those taking SU or MET + SU. Results were confirmed in the meta-analysis. Conclusion: Adding insulin glargine to MET monotherapy early in treatment may provide efficacy/safety benefits over regimens including SU. This may reflect treatment earlier in the disease and supports the inclusion of insulin as a second step in the American Diabetes Association/European Association for the Study of Diabetes treatment algorithm. PMID:21481127

  18. Recovery of Weak Factor Loadings When Adding the Mean Structure in Confirmatory Factor Analysis: A Simulation Study

    PubMed Central

    Ximénez, Carmen

    2016-01-01

    This article extends previous research on the recovery of weak factor loadings in confirmatory factor analysis (CFA) by exploring the effects of adding the mean structure. This issue has not been examined in previous research. This study is based on the framework of Yung and Bentler (1999) and aims to examine the conditions that affect the recovery of weak factor loadings when the model includes the mean structure, compared to analyzing the covariance structure alone. A simulation study was conducted in which several constraints were defined for one-, two-, and three-factor models. Results show that adding the mean structure improves the recovery of weak factor loadings and reduces the asymptotic variances for the factor loadings, particularly for the models with a smaller number of factors and a small sample size. Therefore, under certain circumstances, modeling the means should be seriously considered for covariance models containing weak factor loadings. PMID:26779071

  19. Implementing EVM Data Analysis Adding Value from a NASA Project Manager's Perspective

    NASA Technical Reports Server (NTRS)

    Counts, Stacy; Kerby, Jerald

    2006-01-01

    Data Analysis is one of the keys to an effective Earned Value Management (EVM) Process. Project Managers (PM) must continually evaluate data in assessing the health of their projects. Good analysis of data can assist PMs in making better decisions in managing projects. To better support our P Ms, National Aeronautics and Space Administration (NASA) - Marshall Space Flight Center (MSFC) recently renewed its emphasis on sound EVM data analysis practices and processes, During this presentation we will discuss the approach that MSFC followed in implementing better data analysis across its Center. We will address our approach to effectively equip and support our projects in applying a sound data analysis process. In addition, the PM for the Space Station Biological Research Project will share her experiences of how effective data analysis can benefit a PM in the decision making process. The PM will discuss how the emphasis on data analysis has helped create a solid method for assessing the project s performance. Using data analysis successfully can be an effective and efficient tool in today s environment with increasing workloads and downsizing workforces

  20. Effects of Experimental Negative Affect Manipulations on Ad Lib Smoking: A Meta-Analysis

    PubMed Central

    Heckman, Bryan W.; Carpenter, Mathew J.; Correa, John B.; Wray, Jennifer M.; Saladin, Michael E.; Froeliger, Brett; Drobes, David J.; Brandon, Thomas H.

    2015-01-01

    Aims To quantify the effect of negative affect (NA), when manipulated experimentally, upon smoking as measured within laboratory paradigms. Quantitative meta-analyses tested the effects of NA vs. neutral conditions on 1) latency to smoke and 2) number of puffs taken. Methods Twelve experimental studies tested the influence of NA induction, relative to a neutral control condition (N = 1,190; range = 24–235). Those providing relevant data contributed to separate random effects meta-analyses to examine the effects of NA on two primary smoking measures: 1) latency to smoke (nine studies) and 2) number of puffs taken during ad lib smoking (eleven studies). Hedge’s g was calculated for all studies through the use of post-NA cue responses relative to post-neutral cue responses. This effect size estimate is similar to Cohen’s d, but corrects for small sample size bias. Results NA reliably decreased latency to smoke (g = −.14; CI = −.23 to −.04; p = .007) and increased number of puffs taken (g = .14; CI = .02 to .25; p = .02). There was considerable variability across studies for both outcomes (I2 = 51% and 65% for latency and consumption, respectively). Potential publication bias was indicated for both outcomes, and adjusted effect sizes were smaller and no longer statistically significant. Conclusions In experimental laboratory studies of smokers, negative affect appears to reduce latency to smoking and increase number of puffs taken but this could be due to publication bias. PMID:25641624

  1. Functional analysis of unfermented and fermented citrus peels and physical properties of citrus peel-added doughs for bread making.

    PubMed

    Shyu, Yung-Shin; Lu, Tzu-Chi; Lin, Chuan-Chuan

    2014-12-01

    Several studies have indicated citrus peels (CP) contain specific methoxy flavones, e.g. nobiletin and tangeretin, which have been shown to prevent numerous diseases. However, research reports regarding their application as food additive in healthy baked products is scarce. In our study, both unfermented (UF) and fermented (F) citrus peels were processed under different dry hot-air temperatures to make four citrus peel powders , UF-100 °C,UF-150 °C, F-100 °C, F-150 °C, respectively. The analysis of the basic components and nutraceuticals as well as antioxidant activity were conducted. Various percentages of CP were added to dough and toast bread for physical property and sensory evaluations. The results indicated the contents of crude proteins (3.3-4.3 mg/g) and fibers (10.9-14.9 %) among the four samples were similar. The UF extracts showed better antioxidant activities than F extracts. HPLC analysis indicated the contents of hesperidine, nobiletin and tangeretin in CP extracts were UF-150 °C > UF-100 °C. Farinograph analysis indicated a linear relation between CP powder content and the parameters of the physical properties of dough. A high percentage of fibrous CP powder in dough increases the water adsorption capacity of the dough, resulting in a decrease in its stability The sensory evaluation results indicated a greater acceptability of UF-added toast bread relative to the F-added one. Among these, according to the statistical anaylsis, the UF-150 °C 4 % and UF-100 °C 6 % groups were the best and F-150 °C 2 % group was the poorest in overall acceptability. PMID:25477647

  2. The added value of system robustness analysis for flood risk management illustrated by a case on the IJssel River

    NASA Astrophysics Data System (ADS)

    Mens, M. J. P.; Klijn, F.

    2015-02-01

    Decision makers in fluvial flood risk management increasingly acknowledge that they have to prepare for extreme events. Flood risk is the most common basis on which to compare flood risk-reducing strategies. To take uncertainties into account the criteria of robustness and flexibility are advocated as well. This paper discusses the added value of robustness as an additional decision criterion compared to single-value flood risk only. We do so by quantifying flood risk and system robustness for alternative system configurations of the IJssel River valley in the Netherlands. We found that robustness analysis has added value in three respects: (1) it does not require assumptions on current and future flood probabilities, since flood consequences are shown as a function of discharge; (2) it shows the sensitivity of the system to varying discharges; and (3) it supports a discussion on the acceptability of flood damage. We conclude that robustness analysis is a valuable addition to flood risk analysis in support of long-term decision-making on flood risk management.

  3. An Analysis of Secretarial Employment Ads with Implications for Curricular Modification.

    ERIC Educational Resources Information Center

    White, Shirley A.

    An analysis of secretarial employment advertisements in major metropolitan newspapers across the United States was made in order to determine required job skills. The study was designed to provide information regarding the modification of the secretarial training curriculum in order to reflect the current trends and developments in the business…

  4. An Item Response Theory (IRT) Analysis of the Short Inventory of Problems-Alcohol and Drugs (SIP-AD) among non-treatment seeking Men-Who-Have-Sex-With-Men: Evidence for a shortened 10-item SIP-AD

    PubMed Central

    Hagman, Brett T.; Kuerbis, Alexis N.; Morgenstern, Jon; Bux, Donald A.; Parsons, Jeffrey T.; Heidinger, Bram E.

    2009-01-01

    The Short Inventory of Problems-Alcohol and Drugs (SIP-AD) is a 15-item measure that assesses concurrently negative consequences associated with alcohol and illicit drug use. Current psychometric evaluation has been limited to classical test theory (CTT) statistics, and it has not been validated among non-treatment seeking men-who-have-sex-with-men (MSM). Methods from Item Response Theory (IRT) can improve upon CTT by providing an in-depth analysis of how each item performs across the underlying latent trait that it is purported to measure. The present study examined the psychometric properties of the SIP-AD using methods from both IRT and CTT among a non-treatment seeking MSM sample (N = 469). Participants were recruited from the New York City area and were asked to participate in a series of studies examining club drug use. Results indicated that five items on the SIP-AD demonstrated poor item misfit or significant differential item functioning (DIF) across race/ethnicity and HIV status. These five items were dropped and two-parameter IRT analyses were conducted on the remaining 10 items, which indicated a restricted range of item location parameters (−.15 to −.99) plotted at the lower end of the latent negative consequences severity continuum, and reasonably high discrimination parameters (1.30 to 2.22). Additional CTT statistics were compared between the original 15-item SIP-AD and the refined 10-item SIP-AD and suggest that the differences were negligible with the refined 10-item SIP-AD indicating a high degree of reliability and validity. Findings suggest the SIP-AD can be shortened to 10 items and appears to be a non-biased reliable and valid measure among non-treatment seeking MSM. PMID:19564078

  5. Adding Value.

    ERIC Educational Resources Information Center

    Orsini, Larry L.; Hudack, Lawrence R.; Zekan, Donald L.

    1999-01-01

    The value-added statement (VAS), relatively unknown in the United States, is used in financial reports by many European companies. Saint Bonaventure University (New York) has adapted a VAS to make it appropriate for not-for-profit universities by identifying stakeholder groups (students, faculty, administrators/support personnel, creditors, the…

  6. Analysis of the major floods in the Ebro River basin (Iberian Peninsula) since 1600 AD

    NASA Astrophysics Data System (ADS)

    Carles Balasch, Josep; Monserrate, Adrián; Sánchez, Alberto; Abellà, Andreu; Tuset, Jordi; Lluís Ruiz-Bellet, Josep; Barriendos, Mariano

    2014-05-01

    The magnitude and main characteristics of the major floods of the Ebro River in the last 400 years, one of the most important rivers in the Western Mediterranean, have been reconstructed at several locations along the river system. The reconstruction of each flood peak flow was possible thanks to the previous collection of historical accounts, limnimarks (flood marks) and old maps and sketches with information of flooded sections and areas. Then, for each event, an iterative hydraulic simulation method with a one-dimensional hydraulic model (HEC- RAS) was applied to a DTM of the bed and floodplain morphologies. The roughness coefficients were estimated from present and historical information. To reduce the uncertainty of the hydraulic simulation, models were calibrated with present-day, gauged flows. Nevertheless, the uncertainty of some crucial variables was also evaluated. The Ebro flows from West to East and can, thus, be divided into two major catchments: the Western sub-basin, which gathers water from the Western Pyrenees and the Iberian Range down to Zaragoza (40,400 km2); and the Eastern sub-basin, the Segre-Cinca river system (22,800 km2), which drains the Central Pyrenees. Our objective is to reconstruct major floods in both sub-basins in order to assess how they propagated along the river down to Xerta, a village located near the outlet with a very rich flood record. Results for the studied period (1600-2013 AD) show a total of 9 major floods that exceeded 4000 m3·s-1 at Xerta . From a time point of view, a more intense flooding period is noticeable during the second half of the 19th Century, and a clear reduction appears in the second half of the 20th century due to the construction of reservoirs. The heaviest flood of this period was in October 1787, with a maximum peak discharge of 13,000 m3·s-1 (0.16 m3·s-1·km-2); this value is of the same order of magnitude than the greatest floods in other Mediterranean and European rivers of similar

  7. Climate variability analysis of winter temperatures in the central Mediterranean since 1500 AD

    NASA Astrophysics Data System (ADS)

    Diodato, Nazzareno; Bellocchi, Gianni; Bertolin, Chiara; Camuffo, Dario

    2014-04-01

    This work presents the reconstruction of a time series of annual winter air temperatures across Central and Southern Italy for the period 1500-2010 that largely overlaps the Little Ice Age (LIA) period (1300-1850). A detailed analysis was undertaken on winter mean temperature data using both observations (1871-2010) and proxy-based reconstructions (1500-1870). Based on this homogeneized reconstructed series, a time-dependency in low-frequency time-pattern of temperatures (70- and 130-year cycles) was suggested although the temporal oscillation was not merely periodic. The LIA was characterized by marked climatic variability over this part of Southern Europe, with particular emphasis during the so-called "Maunder Minimum" (MM), between 1645 and 1715. The interannual variability of low temperatures, in particular, makes the MM an outstanding climatic period. There is some consistency that patterns of warming conditions observed in recent times also occurred in the past. Quasiperiodic cycles appear as a consequence of stochastic resonance emerging in long time scales but the variability inherent to the series of winter temperatures, although likely generated by processes internal to the climate system, is difficult to forecast because the system is chaotic and affected by unpredictable noise.

  8. Adding psychotherapy to antidepressant medication in depression and anxiety disorders: a meta-analysis

    PubMed Central

    Cuijpers, Pim; Sijbrandij, Marit; Koole, Sander L; Andersson, Gerhard; Beekman, Aartjan T; Reynolds, Charles F

    2014-01-01

    We conducted a meta-analysis of randomized trials in which the effects of treatment with antidepressant medication were compared to the effects of combined pharmacotherapy and psychotherapy in adults with a diagnosed depressive or anxiety disorder. A total of 52 studies (with 3,623 patients) met inclusion criteria, 32 on depressive disorders and 21 on anxiety disorders (one on both depressive and anxiety disorders). The overall difference between pharmacotherapy and combined treatment was Hedges' g = 0.43 (95% CI: 0.31-0.56), indicating a moderately large effect and clinically meaningful difference in favor of combined treatment, which corresponds to a number needed to treat (NNT) of 4.20. There was sufficient evidence that combined treatment is superior for major depression, panic disorder, and obsessive-compulsive disorder (OCD). The effects of combined treatment compared with placebo only were about twice as large as those of pharmacotherapy compared with placebo only, underscoring the clinical advantage of combined treatment. The results also suggest that the effects of pharmacotherapy and those of psychotherapy are largely independent from each other, with both contributing about equally to the effects of combined treatment. We conclude that combined treatment appears to be more effective than treatment with antidepressant medication alone in major depression, panic disorder, and OCD. These effects remain strong and significant up to two years after treatment. Monotherapy with psychotropic medication may not constitute optimal care for common mental disorders. PMID:24497254

  9. DIS in AdS

    NASA Astrophysics Data System (ADS)

    Albacete, Javier L.; Kovchegov, Yuri V.; Taliotis, Anastasios

    2009-03-01

    We calculate the total cross section for the scattering of a quark-anti-quark dipole on a large nucleus at high energy for a strongly coupled N = 4 super Yang-Mills theory using AdS/CFT correspondence. We model the nucleus by a metric of a shock wave in AdS5. We then calculate the expectation value of the Wilson loop (the dipole) by finding the extrema of the Nambu-Goto action for an open string attached to the quark and antiquark lines of the loop in the background of an AdS5 shock wave. We find two physically meaningful extremal string configurations. For both solutions we obtain the forward scattering amplitude N for the quark dipole-nucleus scattering. We study the onset of unitarity with increasing center-of-mass energy and transverse size of the dipole: we observe that for both solutions the saturation scale Qs is independent of energy/Bjorken-x and depends on the atomic number of the nucleus as Qs˜A1/3. Finally we observe that while one of the solutions we found corresponds to the pomeron intercept of αP = 2 found earlier in the literature, when extended to higher energy or larger dipole sizes it violates the black disk limit. The other solution we found respects the black disk limit and yields the pomeron intercept of αP = 1.5. We thus conjecture that the right pomeron intercept in gauge theories at strong coupling may be αP = 1.5.

  10. Mineral and Melt Inclusion Analysis of the AD 1886 Tarawera, New Zealand Basaltic Plinian Eruption

    NASA Astrophysics Data System (ADS)

    Conger-Best, R.; Rowe, M. C.; Ellis, B. S.; Shane, P. A.

    2012-12-01

    Plinian eruptions represent a relatively rare endmember style of basaltic volcanism. While the mechanisms driving these eruptions are still not well understood, prior studies have focused on potentially high magmatic water/volatile contents as a source of their explosivity. In the present study, we examine the 1886 plinian eruption at Tarawera volcano, New Zealand. Earlier investigations focused on grain componentry and textures of the erupted material but have been unable to explain the inherent explosivity. Geochemical studies have been limited in that the 1886 basalt has largely been considered aphyric. Here we present mineral chemistry and preliminary melt inclusion data from phenocrysts and xenocrysts of the Tarawera 1886 eruption. Mineral phases (olivine, pyroxene, high-An feldspar, biotite, and quartz) have been separated and analyzed by electron microprobe analysis. Melt inclusions have been analyzed from ol, cpx, opx, fsps, and qtz, and are used to distinguish between phenocrysts and xenocrysts. The phenocryst mineral assemblage (containing melt inclusions which match the erupted whole rock) is determined as cpx + fsp (high-An) + ol. Opx, bio, fsp (low-An) and qtz are all xenocrystic components. Olivine compositions have a restricted compositional range of Fo 81.4-83.5. Olivine microphenocrysts are slightly more evolved, ranging from Fo 77.9-80.8. Clinopyroxene major element compositions have a slightly restricted range from En 45.6 +/- 1.2, Fs 45.1 +/-1.7, Wo 9.3 +/- 2.0 and a Mg# range of 70.4-85.4 (avg. 82.8 ± 3.4). High-An plagioclase range from An 92-94.6 with slight normal zoning observed at several high-An grain margins. Rim compositions of high-anorthite feldspar grains are similar to that of groundmass feldspar microlites (An 77-79). Sr isotopes measured by LA-MC-ICP-MS in high-An feldspar range from 0.7056 to 0.7059, compared to low-An feldspar which record a significantly larger isotopic range (0.7051 to 0.7060). Clinopyroxene-melt thermometry

  11. Possible association between phages, Hoc protein, and the immune system.

    PubMed

    Dabrowska, K; Switała-Jeleń, K; Opolski, A; Górski, A

    2006-02-01

    Mammals have become "an environment" for enterobacterial phage life cycles. Therefore it could be expected that bacteriophages adapt to them. This adaptation must comprise bacteriophage proteins. Gp Hoc seems to have significance neither for phage particle structure nor for phage antibacterial activity. It is evidently not necessary for the "typical" antibacterial actions of bacteriophages. But the rules of evolution make it improbable that gp Hoc really has no function, and non-essential genes of T4-type phages are probably important for phages' adaptation to their particular lifestyle. More interesting is the eukaryotic origin of gp Hoc: a resemblance to immunoglobulin-like proteins that reflects their evolutionary relation. Substantial differences in biological activity between T4 and a mutant that lacks gp Hoc were observed in a mammalian system. Hoc protein seems to be one of the molecules predicted to interact with mammalian organisms and/or modulate these interactions. PMID:16195787

  12. Thermal and mechanical analysis on the cold mass support assembly of test cryomodule for IMP ADS-injector-II

    NASA Astrophysics Data System (ADS)

    Guo, X. L.; Wang, L.; Wang, J.; Wang, S. Y.; Liu, Y. Y.; Sun, S.

    2014-01-01

    The Injector-II of ADS project will include two cryomodules, each of which consists of eight HWR cavities and nine SC solenoid magnets. A test cryomodule (TCM1) containing one HWR cavity and two SC magnets was developed for verification of related technique at the first stage. The TCM1 cryostat was designed by Shanghai Institute of Applied Physics of Chinese Academy of Sciences (SINAP, CAS). The cold mass support assembly in the test cryomodule should accommodate the unbalanced loads induced by each cold mass assembly, the deformation induced by thermal shrinkage, and the thermal stress between different materials. In order to validate the structure design, coupled thermal and mechanical analysis on the cold mass support assembly was performed. The temperature, deformation and stress of the cold mass support assembly were obtained. The results effectively provide the guideline for the design and improvement of the cold mass support assembly.

  13. Combination analysis of neuropsychological tests and structural MRI measures in differentiating AD, MCI and control groups--the AddNeuroMed study.

    PubMed

    Liu, Yawu; Paajanen, Teemu; Zhang, Yi; Westman, Eric; Wahlund, Lars-Olof; Simmons, Andrew; Tunnard, Catherine; Sobow, Tomasz; Mecocci, Patrizia; Tsolaki, Magda; Vellas, Bruno; Muehlboeck, Sebastian; Evans, Alan; Spenger, Christian; Lovestone, Simon; Soininen, Hilkka

    2011-07-01

    To study the ability of neuropsychological tests, manual MRI hippocampal volume measures, regional volume and cortical thickness measures to identify subjects with Alzheimer's disease (AD), mild cognitive impairment (MCI), and healthy age-matched controls. Neuropsychological tests, manual hippocampal volume, automated regional volume and regional cortical thickness measures were performed in 120 AD patients, 120 MCI subjects, and 111 controls. The regional cortical thickness and volumes in MCI subjects were significantly decreased in limbic/paralimbic areas and temporal lobe compared to controls. Atrophy was much more extensive in the AD patients compared to MCI subjects and controls. The combination of neuropsychological tests and volumes revealed the highest accuracy (82% AD vs. MCI; 94% AD vs. control; 83% MCI vs. control). Adding regional cortical thicknesses into the discriminate analysis did not improve accuracy. We conclude that regional cortical thickness and volume measures provide a panoramic view of brain atrophy in AD and MCI subjects. A combination of neuropsychological tests and regional volumes are important when discriminating AD from healthy controls and MCI. PMID:19683363

  14. DIS in AdS

    SciTech Connect

    Albacete, Javier L.; Kovchegov, Yuri V.; Taliotis, Anastasios

    2009-03-23

    We calculate the total cross section for the scattering of a quark-anti-quark dipole on a large nucleus at high energy for a strongly coupled N = 4 super Yang-Mills theory using AdS/CFT correspondence. We model the nucleus by a metric of a shock wave in AdS{sub 5}. We then calculate the expectation value of the Wilson loop (the dipole) by finding the extrema of the Nambu-Goto action for an open string attached to the quark and antiquark lines of the loop in the background of an AdS{sub 5} shock wave. We find two physically meaningful extremal string configurations. For both solutions we obtain the forward scattering amplitude N for the quark dipole-nucleus scattering. We study the onset of unitarity with increasing center-of-mass energy and transverse size of the dipole: we observe that for both solutions the saturation scale Q{sub s} is independent of energy/Bjorken-x and depends on the atomic number of the nucleus as Q{sub s}{approx}A{sup 1/3}. Finally we observe that while one of the solutions we found corresponds to the pomeron intercept of {alpha}{sub P} = 2 found earlier in the literature, when extended to higher energy or larger dipole sizes it violates the black disk limit. The other solution we found respects the black disk limit and yields the pomeron intercept of {alpha}{sub P} = 1.5. We thus conjecture that the right pomeron intercept in gauge theories at strong coupling may be {alpha}{sub P} = 1.5.

  15. Identification and expression analysis of a potential familial Alzheimer disease gene on chromosome 1 related to AD3.

    PubMed Central

    Li, J; Ma, J; Potter, H

    1995-01-01

    The inheritance of much early-onset Alzheimer disease (AD) has been linked to a dominant-acting locus on chromosome 14. Recently, the gene likely responsible for this genetic linkage has been identified and termed AD3. Five mutations have been found in AD3 that segregate with the disease phenotype in seven AD families and are not present in unaffected individuals. Here we report the existence of a gene encoding a seven transmembrane domain protein very similar to that encoded by AD3 in structure and sequence. This gene is located on chromosome 1, is expressed in a variety of tissues, including brain, and is predicted to harbor mutations causing nonchromosome 14 familial AD. The presence of several S/TPXX DNA binding motifs in both the AD3 protein and the AD3-like protein /AD4 protein suggests a possible role in intracellular signaling and gene expression or in linking chromatin to the nuclear membrane. Ways in which mutations in either gene could lead to AD are discussed. Images Fig. 3 PMID:8618867

  16. Postmodeling Sensitivity Analysis to Detect the Effect of Missing Data Mechanisms

    ERIC Educational Resources Information Center

    Jamshidian, Mortaza; Mata, Matthew

    2008-01-01

    Incomplete or missing data is a common problem in almost all areas of empirical research. It is well known that simple and ad hoc methods such as complete case analysis or mean imputation can lead to biased and/or inefficient estimates. The method of maximum likelihood works well; however, when the missing data mechanism is not one of missing…

  17. Toward an Understanding of the Variation in Approaches to Analysis and Design

    ERIC Educational Resources Information Center

    Box, Ilona

    2009-01-01

    This paper contributes to an understanding of the variation in approaches that information system analysts/designers use to do analysis and design. A qualitative, phenomenographic research method was used. Four categories were constituted from the data: an "ad hoc" strategy with the intention of solving the problem as quickly as possible; a…

  18. Effective Biology Teaching: A Value-Added Instructional Improvement Analysis Model. Research Watch. E&R Report No. 05.28

    ERIC Educational Resources Information Center

    Haynie, Glenda

    2006-01-01

    This research study developed a value-added instructional improvement analysis model. North Carolina state testing results were used in regression and residual analyses of student achievement. This analysis allowed for identification of the "most effective" and "least effective" biology teachers in Wake County Public Schools…

  19. Does Student Sorting Invalidate Value-Added Models of Teacher Effectiveness? An Extended Analysis of the Rothstein Critique

    ERIC Educational Resources Information Center

    Koedel, Cory; Betts, Julian R.

    2011-01-01

    Value-added modeling continues to gain traction as a tool for measuring teacher performance. However, recent research questions the validity of the value-added approach by showing that it does not mitigate student-teacher sorting bias (its presumed primary benefit). Our study explores this critique in more detail. Although we find that estimated…

  20. Proceedings of the AD HOC Workshop on Ceramics for Li/FeS{sub 2} batteries

    SciTech Connect

    Not Available

    1993-12-31

    Representatives from industry, the U.S. Advanced Battery Consortium (USABC), DOE, national laboratories, and other govt agencies met to develop recommendations and actions for accelerating the development of ceramic components critical to the successful introduction of the Li/FeS{sub 2} bipolar battery for electric vehicles. Most of the workshop is devoted to electrode materials, bipolar designs, separators, and bipolar plates. The bulk of this document is viewographs and is divided into: ceramics, USABC overview, SAFT`s Li/FeS{sub 2} USABC program, bipolar Li/FeS{sub 2} component development, design requirements for bipolar plates, separator design requirements, compatibility of ceramic insulators with lithium, characterization of MgO for use in separators, resistivity measurements of separators, sintered AlN separators for LiMS batteries, etc.

  1. Dynamic spectrum access in wireless ad hoc networks: issues and possible solutions

    NASA Astrophysics Data System (ADS)

    Zhang, Zhensheng; Soni, Tarun

    2010-04-01

    In this paper, we present a brief overview on the recent development of the dynamical spectrum access (DSA) techniques, focusing on the following areas: characteristics of the available bandwidth of the primary users, sensing technologies and sensing intervals to detect white spaces, spectrum allocation and management, reliability of the secondary user, tradeoff between spectrum/performance gain versus additional overhead used in implementing DSA, and cross layer optimization in spectrum sharing. Some of tradeoff studies are presented in terms of price of anarchy, which is defined as the price that a decentralized system should pay for not being coordinated. We will also discuss some of the open issues in deploying DSA.

  2. Informal, Incidental and Ad Hoc: The Information-Seeking and Learning Strategies of Health Care Patients

    ERIC Educational Resources Information Center

    Papen, Uta

    2012-01-01

    When people are ill, they want to know what is happening to them and how they can get better. Current health policies support patients' access to health information and encourage them to take part in decisions regarding their health. But little is known about how patients learn and the difficulties they may encounter in the process. This paper…

  3. Decentralized Opportunistic Spectrum Resources Access Model and Algorithm toward Cooperative Ad-Hoc Networks.

    PubMed

    Liu, Ming; Xu, Yang; Mohammed, Abdul-Wahid

    2016-01-01

    Limited communication resources have gradually become a critical factor toward efficiency of decentralized large scale multi-agent coordination when both system scales up and tasks become more complex. In current researches, due to the agent's limited communication and observational capability, an agent in a decentralized setting can only choose a part of channels to access, but cannot perceive or share global information. Each agent's cooperative decision is based on the partial observation of the system state, and as such, uncertainty in the communication network is unavoidable. In this situation, it is a major challenge working out cooperative decision-making under uncertainty with only a partial observation of the environment. In this paper, we propose a decentralized approach that allows agents cooperatively search and independently choose channels. The key to our design is to build an up-to-date observation for each agent's view so that a local decision model is achievable in a large scale team coordination. We simplify the Dec-POMDP model problem, and each agent can jointly work out its communication policy in order to improve its local decision utilities for the choice of communication resources. Finally, we discuss an implicate resource competition game, and show that, there exists an approximate resources access tradeoff balance between agents. Based on this discovery, the tradeoff between real-time decision-making and the efficiency of cooperation using these channels can be well improved. PMID:26727504

  4. Report of the "MLA Bibliography" Scope and Overlap Committee, an ACRL Ad Hoc Committee.

    ERIC Educational Resources Information Center

    Association of Coll. and Research Libraries, Chicago, IL.

    The "MLA Bibliography" Scope and Overlap Committee was formed in response to a request from the Modern Language Association for librarians' assistance in examining the coverage and overlap between the "MLA International Bibliography" and other reference tools. This report contains the following 20 papers, prepared by the committee between 1991 and…

  5. Medium Access in Spread-Spectrum Ad Hoc Networks with Multiuser Detection

    NASA Astrophysics Data System (ADS)

    Kusume, Katsutoshi; Vilzmann, Robert; Müller, Andreas; Hartmann, Christian; Bauch, Gerhard

    2008-12-01

    Conventional medium access control protocols are designed to avoid simultaneous transmissions, based on a simple collision model in the underlying physical layer. Recently, strong physical layer capabilities, enabled by multiuser detection techniques, have been studied in connection with simple medium access control protocols, for example, slotted ALOHA. We think that neither of these extreme approaches is optimum, particularly in general scenarios where network nodes with different signal processing capabilities coexist. Instead of dealing with interferences in either of the two layers alone, both medium access control and physical layer functionalities should be designed to cooperate and complement each other. We discuss several key aspects for designing such a protocol, especially with an emphasis on iterative multiuser detection, which can provide a good tradeoff between performance and complexity. We propose a new protocol called MUD-MAC which satisfies these key aspects. We analyze its throughput bound and also perform numerical simulations. The simulation results show excellent throughput improvements. It is also demonstrated that the MUD-MAC protocol provides certain fairness among network nodes with different signal processing capabilities.

  6. Peak sidelobe level distribution computation for ad hoc arrays using extreme value theory

    NASA Astrophysics Data System (ADS)

    Krishnamurthy, Siddhartha

    An equipment setup for manufacturing nanolaminates with potential applications as protective coatings and in transparent armor was designed and constructed to improve upon an existing system in place at UMass Lowell. The design modification was targeted at maximizing the area of the produced nanolaminates. The new design was successful in that the nanolaminates were approximatively 4.5 times larger in area than the ones produced on the previous design. Nanolaminates consisting of poly(1,4- cyclohexanedimethylene terephthalate-co-2,2,4,4-tetramethyl-1,3-cyclobutylene terephalate) (Tritan TX1000 and TX2000, Eastman Chemical) and dimethylditallowammonium montmorillonite clay nanofiller (Cloisite 20A, Southern Clay Products) were produced using the new setup. Nanolaminates with clay loadings of 0%, 10%, 30%, and 50% by volume were produced as freestanding films in the case of both grades of copolyester, while adherent films were produced at clay loadings of 70% and 90% by volume were in the case of Tritan TX2000. Finally, chemical and mechanical characterization of all freestanding films was attempted in order to develop preliminary structure-properties relations for these novel materials.

  7. Decentralized Opportunistic Spectrum Resources Access Model and Algorithm toward Cooperative Ad-Hoc Networks

    PubMed Central

    Liu, Ming; Xu, Yang; Mohammed, Abdul-Wahid

    2016-01-01

    Limited communication resources have gradually become a critical factor toward efficiency of decentralized large scale multi-agent coordination when both system scales up and tasks become more complex. In current researches, due to the agent’s limited communication and observational capability, an agent in a decentralized setting can only choose a part of channels to access, but cannot perceive or share global information. Each agent’s cooperative decision is based on the partial observation of the system state, and as such, uncertainty in the communication network is unavoidable. In this situation, it is a major challenge working out cooperative decision-making under uncertainty with only a partial observation of the environment. In this paper, we propose a decentralized approach that allows agents cooperatively search and independently choose channels. The key to our design is to build an up-to-date observation for each agent’s view so that a local decision model is achievable in a large scale team coordination. We simplify the Dec-POMDP model problem, and each agent can jointly work out its communication policy in order to improve its local decision utilities for the choice of communication resources. Finally, we discuss an implicate resource competition game, and show that, there exists an approximate resources access tradeoff balance between agents. Based on this discovery, the tradeoff between real-time decision-making and the efficiency of cooperation using these channels can be well improved. PMID:26727504

  8. Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks

    PubMed Central

    Madhusudhanan, B.; Chitra, S.; Rajan, C.

    2015-01-01

    In MANET multicasting, forward and backward secrecy result in increased packet drop rate owing to mobility. Frequent rekeying causes large message overhead which increases energy consumption and end-to-end delay. Particularly, the prevailing group key management techniques cause frequent mobility and disconnections. So there is a need to design a multicast key management technique to overcome these problems. In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. A multicast tree is constructed such that for every weak node, there is a strong parent node. A session key-based encryption technique is utilized to transmit a multicast data. The rekeying process is performed periodically by the initiator node. The rekeying interval is fixed depending on the node category so that this technique greatly minimizes the rekeying overhead. By simulation results, we show that our proposed approach reduces the packet drop rate and improves the data confidentiality. PMID:25834838

  9. A Review of LIDAR Radiometric Processing: From Ad Hoc Intensity Correction to Rigorous Radiometric Calibration

    PubMed Central

    Kashani, Alireza G.; Olsen, Michael J.; Parrish, Christopher E.; Wilson, Nicholas

    2015-01-01

    In addition to precise 3D coordinates, most light detection and ranging (LIDAR) systems also record “intensity”, loosely defined as the strength of the backscattered echo for each measured point. To date, LIDAR intensity data have proven beneficial in a wide range of applications because they are related to surface parameters, such as reflectance. While numerous procedures have been introduced in the scientific literature, and even commercial software, to enhance the utility of intensity data through a variety of “normalization”, “correction”, or “calibration” techniques, the current situation is complicated by a lack of standardization, as well as confusing, inconsistent use of terminology. In this paper, we first provide an overview of basic principles of LIDAR intensity measurements and applications utilizing intensity information from terrestrial, airborne topographic, and airborne bathymetric LIDAR. Next, we review effective parameters on intensity measurements, basic theory, and current intensity processing methods. We define terminology adopted from the most commonly-used conventions based on a review of current literature. Finally, we identify topics in need of further research. Ultimately, the presented information helps lay the foundation for future standards and specifications for LIDAR radiometric calibration. PMID:26561813

  10. Energy Efficient and Stable Weight Based Clustering for Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Bouk, Safdar H.; Sasase, Iwao

    Recently several weighted clustering algorithms have been proposed, however, to the best of our knowledge; there is none that propagates weights to other nodes without weight message for leader election, normalizes node parameters and considers neighboring node parameters to calculate node weights. In this paper, we propose an Energy Efficient and Stable Weight Based Clustering (EE-SWBC) algorithm that elects cluster heads without sending any additional weight message. It propagates node parameters to its neighbors through neighbor discovery message (HELLO Message) and stores these parameters in neighborhood list. Each node normalizes parameters and efficiently calculates its own weight and the weights of neighboring nodes from that neighborhood table using Grey Decision Method (GDM). GDM finds the ideal solution (best node parameters in neighborhood list) and calculates node weights in comparison to the ideal solution. The node(s) with maximum weight (parameters closer to the ideal solution) are elected as cluster heads. In result, EE-SWBC fairly selects potential nodes with parameters closer to ideal solution with less overhead. Different performance metrics of EE-SWBC and Distributed Weighted Clustering Algorithm (DWCA) are compared through simulations. The simulation results show that EE-SWBC maintains fewer average numbers of stable clusters with minimum overhead, less energy consumption and fewer changes in cluster structure within network compared to DWCA.

  11. MSG Instant Messenger: Social Presence and Location for the "'Ad Hoc' Learning Experience"

    ERIC Educational Resources Information Center

    Little, Alex; Denham, Chris; Eisenstadt, Marc

    2008-01-01

    "Elearning2.0" promises to harness the power of three of today's most disruptive technologies: social software, elearning, and Web2.0. Our own work in this disruptive space takes as a starting premise that social networking is critical for learning: finding the right person can be more important than "scouring the web for an answer" particularly…

  12. Remote detection of riverine traffic using an ad hoc wireless sensor network

    NASA Astrophysics Data System (ADS)

    Athan, Stephan P.

    2005-05-01

    Trafficking of illegal drugs on riverine and inland waterways continues to proliferate in South America. While there has been a successful joint effort to cut off overland and air trafficking routes, there exists a vast river network and Amazon region consisting of over 13,000 water miles that remains difficult to adequately monitor, increasing the likelihood of narcotics moving along this extensive river system. Hence, an effort is underway to provide remote unattended riverine detection in lieu of manned or attended detection measures.

  13. Performance Evaluation of Mobile Ad Hoc Network Based Communications for Future Mobile Tele-Emergency System

    NASA Astrophysics Data System (ADS)

    Viswacheda, D. V.; Barukang, L.; Hamid, M. Y.; Arifianto, M. S.

    Sparked by awareness of the limitations to provide medical services in remote areas, researchers have perceived that developing telemedicine systems is inevitable. In most cases very remote areas and disaster struck areas lack telecommunication infrastructure. Telemedicine system operating in such areas must have advanced wireless technology supporting it in devastating situation, hence it is called as tele-emergency system. Our approach is on MANET combined with Mobile IP and MIPV6, is the basis of infrastructure for the mobile tele-emergency system. The tele-emergency system requires data, voice and video transmission in its network. In this investigation, evaluation is based on simulation of the various ITU-T standard CODECs of VoIP and video transmission over MANET using discrete event simulator NS-2. The results of simulation showed that ITU-T G723.1 worked well in the MANET environment than the other CODECs for VoIP in fixed and mobility tele-emergency environments. From the simulation of video CODEC performance evaluation, it was observed that H.263 performed to a great extent in random small scale environment and also in multiple video flow of 57.6kbps speed video transmission.

  14. Solar-powered ad-hoc wireless sensor network for border surveillance

    NASA Astrophysics Data System (ADS)

    He, Jun; Norwood, Robert A.; Fallahi, Mahmoud; Peyghambarian, Nasser

    2012-06-01

    Wireless sensor networks (WSNs) have emerged as means of providing automated monitoring, target tracking, and intrusion detection. Solar-powered WSNs that adopt innovative sensors with low power consumption and forefront networking technologies can provide rapidly deployable situational awareness and effective security control at the border at low cost. In our paper, we introduce the prototype of our new solar-powered WSN platform for Border Security. We consider practical issues in WSNs, including sensing environment classification, survivability under harsh weather conditions, and efficient solar energy harvesting. Experimental results demonstrate the performance of our new solar-powered WSN.

  15. A Review of LIDAR Radiometric Processing: From Ad Hoc Intensity Correction to Rigorous Radiometric Calibration.

    PubMed

    Kashani, Alireza G; Olsen, Michael J; Parrish, Christopher E; Wilson, Nicholas

    2015-01-01

    In addition to precise 3D coordinates, most light detection and ranging (LIDAR) systems also record "intensity", loosely defined as the strength of the backscattered echo for each measured point. To date, LIDAR intensity data have proven beneficial in a wide range of applications because they are related to surface parameters, such as reflectance. While numerous procedures have been introduced in the scientific literature, and even commercial software, to enhance the utility of intensity data through a variety of "normalization", "correction", or "calibration" techniques, the current situation is complicated by a lack of standardization, as well as confusing, inconsistent use of terminology. In this paper, we first provide an overview of basic principles of LIDAR intensity measurements and applications utilizing intensity information from terrestrial, airborne topographic, and airborne bathymetric LIDAR. Next, we review effective parameters on intensity measurements, basic theory, and current intensity processing methods. We define terminology adopted from the most commonly-used conventions based on a review of current literature. Finally, we identify topics in need of further research. Ultimately, the presented information helps lay the foundation for future standards and specifications for LIDAR radiometric calibration. PMID:26561813

  16. Inventory of Training Centers; Ad Hoc National Advisory Committee on Training Complexes. Final Report.

    ERIC Educational Resources Information Center

    Clark Univ., Worcester, MA.

    This is a report of a selective survey of training activities in the United States. Selection centered on the representative activities of a variety of institutions which served different audiences, had different goals, and different sources of funding. Most of the inventories were conducted in person by a committee member. The 14 reports are…

  17. Solving data-at-rest for the storage and retrieval of files in ad hoc networks

    NASA Astrophysics Data System (ADS)

    Knobler, Ron; Scheffel, Peter; Williams, Jonathan; Gaj, Kris; Kaps, Jens-Peter

    2013-05-01

    Based on current trends for both military and commercial applications, the use of mobile devices (e.g. smartphones and tablets) is greatly increasing. Several military applications consist of secure peer to peer file sharing without a centralized authority. For these military applications, if one or more of these mobile devices are lost or compromised, sensitive files can be compromised by adversaries, since COTS devices and operating systems are used. Complete system files cannot be stored on a device, since after compromising a device, an adversary can attack the data at rest, and eventually obtain the original file. Also after a device is compromised, the existing peer to peer system devices must still be able to access all system files. McQ has teamed with the Cryptographic Engineering Research Group at George Mason University to develop a custom distributed file sharing system to provide a complete solution to the data at rest problem for resource constrained embedded systems and mobile devices. This innovative approach scales very well to a large number of network devices, without a single point of failure. We have implemented the approach on representative mobile devices as well as developed an extensive system simulator to benchmark expected system performance based on detailed modeling of the network/radio characteristics, CONOPS, and secure distributed file system functionality. The simulator is highly customizable for the purpose of determining expected system performance for other network topologies and CONOPS.

  18. iScout low-cost ad-hoc networked sensor enhancements

    NASA Astrophysics Data System (ADS)

    Winston, Mark A.

    2007-04-01

    McQ has developed a family of state of the art miniaturized low cost unattended ground sensors (UGS). The iScout TM sensors are designed for indoor and outdoor intrusion detection and battle damage assessment. McQ has developed an enhanced version of the iScout TM sensor that is a very flexible platform capable of performing in a variety of applications. Sensors are equipped with mesh radios and integrated seismic, acoustic, infrared, and magnetic transducers. Typical sensor sizes are similar to that of a deck of playing cards. Intended for high volume production, these are tactically useful sensors that can be manufactured in high volumes at a low cost. This paper will provide an overview of the iScout TM sensor systems, features, and performance.

  19. Ad HOC Model Generation Using Multiscale LIDAR Data from a Geospatial Database

    NASA Astrophysics Data System (ADS)

    Gordon, M.; Borgmann, B.; Gehrung, J.; Hebel, M.; Arens, M.

    2015-08-01

    Due to the spread of economically priced laser scanning technology nowadays, especially in the field of topographic surveying and mapping, ever-growing amounts of data need to be handled. Depending on the requirements of the specific application, airborne, mobile or terrestrial laser scanners are commonly used. Since visualizing this flood of data is not feasible with classical approaches like raw point cloud rendering, real time decision making requires sophisticated solutions. In addition, the efficient storage and recovery of 3D measurements is a challenging task. Therefore we propose an approach for the intelligent storage of 3D point clouds using a spatial database. For a given region of interest, the database is queried for the data available. All resulting point clouds are fused in a model generation process, utilizing the fact that low density airborne measurements could be used to supplement higher density mobile or terrestrial laser scans. The octree based modeling approach divides and subdivides the world into cells of varying size and fits one plane per cell, once a specified amount of points is present. The resulting model exceeds the completeness and precision of every single data source and enables for real time visualization. This is especially supported by data compression ratios of about 90%.

  20. Ad Hoc Committee on NAEP Parent Engagement: Reaching Parents with NAEP Resources

    ERIC Educational Resources Information Center

    National Assessment Governing Board, 2012

    2012-01-01

    The National Assessment Governing Board, recognizing that National Assessment of Educational Progress (NAEP) report releases were not conveying a sense of urgency, began an initiative in May 2010 to see what the Board could do to "make a difference" in fostering concern and action about the need to improve achievement and reduce achievement gaps,…

  1. Rapid self-organised initiation of ad hoc sensor networks close above the percolation threshold

    NASA Astrophysics Data System (ADS)

    Korsnes, Reinert

    2010-07-01

    This work shows potentials for rapid self-organisation of sensor networks where nodes collaborate to relay messages to a common data collecting unit (sink node). The study problem is, in the sense of graph theory, to find a shortest path tree spanning a weighted graph. This is a well-studied problem where for example Dijkstra’s algorithm provides a solution for non-negative edge weights. The present contribution shows by simulation examples that simple modifications of known distributed approaches here can provide significant improvements in performance. Phase transition phenomena, which are known to take place in networks close to percolation thresholds, may explain these observations. An initial method, which here serves as reference, assumes the sink node starts organisation of the network (tree) by transmitting a control message advertising its availability for its neighbours. These neighbours then advertise their current cost estimate for routing a message to the sink. A node which in this way receives a message implying an improved route to the sink, advertises its new finding and remembers which neighbouring node the message came from. This activity proceeds until there are no more improvements to advertise to neighbours. The result is a tree network for cost effective transmission of messages to the sink (root). This distributed approach has potential for simple improvements which are of interest when minimisation of storage and communication of network information are a concern. Fast organisation of the network takes place when the number k of connections for each node ( degree) is close above its critical value for global network percolation and at the same time there is a threshold for the nodes to decide to advertise network route updates.

  2. Inter-Vehicular Ad Hoc Networks: From the Ground Truth to Algorithm Design and Testbed Architecture

    ERIC Educational Resources Information Center

    Giordano, Eugenio

    2011-01-01

    Many of the devices we interact with on a daily basis are currently equipped with wireless connectivity. Soon this will be extended to the vehicles we drive/ride every day. Wirelessly connected vehicles will form a new kind of network that will enable a wide set of innovative applications ranging from enhanced safety to entertainment. To…

  3. MUSIC algorithm DoA estimation for cooperative node location in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Warty, Chirag; Yu, Richard Wai; ElMahgoub, Khaled; Spinsante, Susanna

    In recent years the technological development has encouraged several applications based on distributed communications network without any fixed infrastructure. The problem of providing a collaborative early warning system for multiple mobile nodes against a fast moving object. The solution is provided subject to system level constraints: motion of nodes, antenna sensitivity and Doppler effect at 2.4 GHz and 5.8 GHz. This approach consists of three stages. The first phase consists of detecting the incoming object using a highly directive two element antenna at 5.0 GHz band. The second phase consists of broadcasting the warning message using a low directivity broad antenna beam using 2× 2 antenna array which then in third phase will be detected by receiving nodes by using direction of arrival (DOA) estimation technique. The DOA estimation technique is used to estimate the range and bearing of the incoming nodes. The position of fast arriving object can be estimated using the MUSIC algorithm for warning beam DOA estimation. This paper is mainly intended to demonstrate the feasibility of early detection and warning system using a collaborative node to node communication links. The simulation is performed to show the behavior of detecting and broadcasting antennas as well as performance of the detection algorithm. The idea can be further expanded to implement commercial grade detection and warning system

  4. The Ad Hoc Mars Airplane science working group. [remotely piloted airplane as a Mars exploration vehicle

    NASA Technical Reports Server (NTRS)

    Clarke, V. C., Jr.

    1978-01-01

    The capability of a remotely piloted airplane as a Mars exploration vehicle in the aerial survey mode is assessed. Specific experiment areas covered include: visual imaging; gamma ray and infrared reflectance spectroscopy; gravity field; magnetic field and electromagnetic sounding; and atmospheric composition and dynamics. It is concluded that (1) the most important use of a plane in the aerial survey mode would be in topical studies and returned sample site characterization; (2) the airplane offers the unique capability to do high resolution, oblique imaging, and repeated profile measurements in the atmospheric boundary layer; and (3) it offers the best platform from which to do electromagnetic sounding.

  5. Feeding the Preschool Child: Documents Issued by PAG Ad Hoc Working Group Meetings (1969-1975).

    ERIC Educational Resources Information Center

    United Nations Industrial Development Organization, Vienna (Austria).

    This document contains six papers prepared between 1969 and 1975 by the Protein-Calorie Advisory Group (PAG) of the United Nations on topics related to the feeding of preschool children in underdeveloped countries. Among the topics covered: (1) nutrition in utero; (2) nutritional aspects of breastfeeding; (3) infant mortality rates as indicators…

  6. Report and Recommendation of the Ad Hoc Committee to Review the College Calendar.

    ERIC Educational Resources Information Center

    San Joaquin Delta Coll., Stockton, CA.

    A study was conducted at San Joaquin Delta College (SJDC) to determine whether its present calendar, based on the traditional semester system, should be abandoned in favor of either the quarter or the early semester calendars. The study involved: (1) contacting employers to determine the effect of a calendar change on student employment, (2)…

  7. Simultaneous DNA-based diet analysis of breeding, non-breeding and chick Adélie penguins.

    PubMed

    McInnes, Julie C; Emmerson, Louise; Southwell, Colin; Faux, Cassandra; Jarman, Simon N

    2016-01-01

    As central place foragers, breeding penguins are restricted in foraging range by the need to return to the colony to feed chicks. Furthermore, breeding birds must balance energetic gain from self-feeding with the costs of returning to provision young. Non-breeding birds, however, are likely to be less restricted in foraging range and lack the high energy demands of provisioning, therefore may consume different prey to breeders. We used DNA dietary analysis to determine whether there was a difference in provisioning and self-feeding diet by identifying prey DNA in scat samples from breeding and chick Adélie penguins at two locations in East Antarctica. We also investigated diet differences between breeders and non-breeders at one site. Although previous work shows changing foraging behaviour between chick provisioning and self-feeding, our results suggest no significant differences in the main prey groups consumed by chicks and breeders at either site or between breeding stages. This may reflect the inability of penguins to selectively forage when provisioning, or resources were sufficient for all foraging needs. Conversely, non-breeders were found to consume different prey groups to breeders, which may reflect less restricted foraging ranges, breeders actively selecting particular prey during breeding or reduced foraging experience of non-breeders. PMID:26909171

  8. Simultaneous DNA-based diet analysis of breeding, non-breeding and chick Adélie penguins

    PubMed Central

    McInnes, Julie C.; Emmerson, Louise; Southwell, Colin; Faux, Cassandra; Jarman, Simon N.

    2016-01-01

    As central place foragers, breeding penguins are restricted in foraging range by the need to return to the colony to feed chicks. Furthermore, breeding birds must balance energetic gain from self-feeding with the costs of returning to provision young. Non-breeding birds, however, are likely to be less restricted in foraging range and lack the high energy demands of provisioning, therefore may consume different prey to breeders. We used DNA dietary analysis to determine whether there was a difference in provisioning and self-feeding diet by identifying prey DNA in scat samples from breeding and chick Adélie penguins at two locations in East Antarctica. We also investigated diet differences between breeders and non-breeders at one site. Although previous work shows changing foraging behaviour between chick provisioning and self-feeding, our results suggest no significant differences in the main prey groups consumed by chicks and breeders at either site or between breeding stages. This may reflect the inability of penguins to selectively forage when provisioning, or resources were sufficient for all foraging needs. Conversely, non-breeders were found to consume different prey groups to breeders, which may reflect less restricted foraging ranges, breeders actively selecting particular prey during breeding or reduced foraging experience of non-breeders. PMID:26909171

  9. Runway Incursion Prevention System ADS-B and DGPS Data Link Analysis Dallas-Fort Worth International Airport

    NASA Technical Reports Server (NTRS)

    Timmerman, J.; Jones, Denise R. (Technical Monitor)

    2001-01-01

    A Runway Incursion Prevention System (RIPS) was tested at the Dallas - Ft. Worth International Airport in October 2000. The system integrated airborne and ground components to provide both pilots and controllers with enhanced situational awareness, supplemental guidance cues, a real-time display of traffic information, and warning of runway incursions in order to prevent runway incidents while also improving operational capability. Rockwell Collins provided and supported a prototype Automatic Dependent Surveillance - Broadcast (ADS-B) system using 1090 MHz and a prototype Differential GPS (DGPS) system onboard the NASA Boeing 757 research aircraft. This report describes the Rockwell Collins contributions to the RIPS flight test, summarizes the development process, and analyzes both ADS-B and DGPS data collected during the flight test. In addition, results are report on interoperability tests conducted between the NASA Advanced General Aviation Transport Experiments (AGATE) ADS-B flight test system and the NASA Boeing 757 ADS-B system.

  10. How Teacher Evaluation Methods Matter for Accountability: A Comparative Analysis of Teacher Effectiveness Ratings by Principals and Teacher Value-Added Measures

    ERIC Educational Resources Information Center

    Harris, Douglas N.; Ingle, William K.; Rutledge, Stacey A.

    2014-01-01

    Policymakers are revolutionizing teacher evaluation by attaching greater stakes to student test scores and observation-based teacher effectiveness measures, but relatively little is known about why they often differ so much. Quantitative analysis of thirty schools suggests that teacher value-added measures and informal principal evaluations are…

  11. Value-Added and Other Methods for Measuring School Performance: An Analysis of Performance Measurement Strategies in Teacher Incentive Fund Proposals. Research Brief

    ERIC Educational Resources Information Center

    National Center on Performance Incentives, 2008

    2008-01-01

    In "Value-Added and Other Methods for Measuring School Performance: An Analysis of Performance Measurement Strategies in Teacher Incentive Fund Proposals"--a paper presented at the February 2008 National Center on Performance Incentives research to policy conference--Robert Meyer and Michael Christian examine select performance-pay plans used by…

  12. Effect of rAd5-Vector HIV-1 Preventive Vaccines on HIV-1 Acquisition: A Participant-Level Meta-Analysis of Randomized Trials

    PubMed Central

    Huang, Yunda; Follmann, Dean; Nason, Martha; Zhang, Lily; Huang, Ying; Mehrotra, Devan V.; Moodie, Zoe; Metch, Barbara; Janes, Holly; Keefer, Michael C.; Churchyard, Gavin; Robb, Merlin L.; Fast, Patricia E.; Duerr, Ann; McElrath, M. Juliana; Corey, Lawrence; Mascola, John R.; Graham, Barney S.; Sobieszczyk, Magdalena E.; Kublin, James G.; Robertson, Michael; Hammer, Scott M.; Gray, Glenda E.; Buchbinder, Susan P.; Gilbert, Peter B.

    2015-01-01

    Background Three phase 2b, double-blind, placebo-controlled, randomized efficacy trials have tested recombinant Adenovirus serotype-5 (rAd5)-vector preventive HIV-1 vaccines: MRKAd5 HIV-1 gag/pol/nef in Step and Phambili, and DNA/rAd5 HIV-1 env/gag/pol in HVTN505. Due to efficacy futility observed at the first interim analysis in Step and HVTN505, participants of all three studies were unblinded to their vaccination assignments during the study but continued follow–up. Rigorous meta-analysis can provide crucial information to advise the future utility of rAd5-vector vaccines. Methods We included participant-level data from all three efficacy trials, and three Phase 1–2 trials evaluating the HVTN505 vaccine regimen. We predefined two co-primary analysis cohorts for assessing the vaccine effect on HIV-1 acquisition. The modified-intention-to-treat (MITT) cohort included all randomly assigned participants HIV-1 uninfected at study entry, who received at least the first vaccine/placebo, and the Ad5 cohort included MITT participants who received at least one dose of rAd5-HIV vaccine or rAd5-placebo. Multivariable Cox regression models were used to estimate hazard ratios (HRs) of HIV-1 infection (vaccine vs. placebo) and evaluate HR variation across vaccine regimens, time since vaccination, and subgroups using interaction tests. Findings Results are similar for the MITT and Ad5 cohorts; we summarize MITT cohort results. Pooled across the efficacy trials, over all follow-up time 403 (n = 224 vaccine; n = 179 placebo) of 6266 MITT participants acquired HIV-1, with a non-significantly higher incidence in vaccine recipients (HR 1.21, 95% CI 0.99–1.48, P = 0.06). The HRs significantly differed by vaccine regimen (interaction P = 0.03; MRKAd5 HR 1.41, 95% CI 1.11–1.78, P = 0.005 vs. DNA/rAd5 HR 0.88, 95% CI 0.61–1.26, P = 0.48). Results were similar when including the Phase 1–2 trials. Exploratory analyses based on the efficacy trials supported that the MRKAd5

  13. Predictive Markers for AD in a Multi-Modality Framework: An Analysis of MCI Progression in the ADNI Population

    PubMed Central

    Hinrichs, Chris; Singh, Vikas; Xu, Guofan; Johnson, Sterling C.

    2011-01-01

    Alzheimer’s Disease (AD) and other neurodegenerative diseases affect over 20 million people worldwide, and this number is projected to significantly increase in the coming decades. Proposed imaging-based markers have shown steadily improving levels of sensitivity/specificity in classifying individual subjects as AD or normal. Several of these efforts have utilized statistical machine learning techniques, using brain images as input, as means of deriving such AD-related markers. A common characteristic of this line of research is a focus on either (1) using a single imaging modality for classification, or (2) incorporating several modalities, but reporting separate results for each. One strategy to improve on the success of these methods is to leverage all available imaging modalities together in a single automated learning framework. The rationale is that some subjects may show signs of pathology in one modality but not in another – by combining all available images a clearer view of the progression of disease pathology will emerge. Our method is based on the Multi-Kernel Learning (MKL) framework, which allows the inclusion of an arbitrary number of views of the data in a maximum margin, kernel learning framework. The principal innovation behind MKL is that it learns an optimal combination of kernel (similarity) matrices while simultaneously training a classifier. In classification experiments MKL outperformed an SVM trained on all available features by 3% – 4%. We are especially interested in whether such markers are capable of identifying early signs of the disease. To address this question, we have examined whether our multi-modal disease marker (MMDM) can predict conversion from Mild Cognitive Impairment (MCI) to AD. Our experiments reveal that this measure shows significant group differences between MCI subjects who progressed to AD, and those who remained stable for 3 years. These differences were most significant in MMDMs based on imaging data. We also

  14. A Primer on Value-Added Models: Towards a Better Understanding of the Quantitative Analysis of Student Achievement

    ERIC Educational Resources Information Center

    Nakamura, Yugo

    2013-01-01

    Value-added models (VAMs) have received considerable attention as a tool to transform our public education system. However, as VAMs are studied by researchers from a broad range of academic disciplines who remain divided over the best methods in analyzing the models and stakeholders without the extensive statistical background have been excluded…

  15. Adding Soft-Skills to the Hard Target of Adequacy: The Case for Rearticulation Based on a Multifocal Analysis

    ERIC Educational Resources Information Center

    Knoeppel, Robert C.; Brewer, Curtis A.; Lindle, Jane Clark; First, Patricia F.

    2009-01-01

    The purpose of this study is to expand the definition of adequacy by adding soft skills as a measure of school productivity. The singular focus on academic standards inherent in education policy has prevented scholars from seeing the concept of adequacy through myriad perspectives and has contributed to a resegregation of schools. Education policy…

  16. Formal analysis of device authentication applications in ubiquitous computing.

    SciTech Connect

    Shin, Dongwan; Claycomb, William R.

    2010-11-01

    Authentication between mobile devices in ad-hoc computing environments is a challenging problem. Without pre-shared knowledge, existing applications rely on additional communication methods, such as out-of-band or location-limited channels for device authentication. However, no formal analysis has been conducted to determine whether out-of-band channels are actually necessary. We answer this question through formal analysis, and use BAN logic to show that device authentication using a single channel is not possible.

  17. Supergravity at the boundary of AdS supergravity

    NASA Astrophysics Data System (ADS)

    Amsel, Aaron J.; Compère, Geoffrey

    2009-04-01

    We give a general analysis of AdS boundary conditions for spin-3/2 Rarita-Schwinger fields and investigate boundary conditions preserving supersymmetry for a graviton multiplet in AdS4. Linear Rarita-Schwinger fields in AdSd are shown to admit mixed Dirichlet-Neumann boundary conditions when their mass is in the range 0≤|m|<1/2lAdS. We also demonstrate that mixed boundary conditions are allowed for larger masses when the inner product is “renormalized” accordingly with the action. We then use the results obtained for |m|=1/lAdS to explore supersymmetric boundary conditions for N=1 AdS4 supergravity in which the metric and Rarita-Schwinger fields are fluctuating at the boundary. We classify boundary conditions that preserve boundary supersymmetry or superconformal symmetry. Under the AdS/CFT dictionary, Neumann boundary conditions in d=4 supergravity correspond to gauging the superconformal group of the three-dimensional CFT describing M2-branes, while N=1 supersymmetric mixed boundary conditions couple the CFT to N=1 superconformal topologically massive gravity.

  18. Synthetic light-curve analysis of the very short period binaries TY Bootis, AD Cancri, and V523 Cassiopeiae

    SciTech Connect

    Samec, R.G.; Van Hamme, W.; Bookmyer, B.B. Clemson Univ., SC South Carolina Univ., Conway Florida International Univ., Miami )

    1989-12-01

    New photometric observations of TY Boo, AD Cnc, and V523 Cas are subjected to synthetic light-curve analyses using the Wilson-Devinney code. Solutions for each of the systems, and the several competing theories of contact binary structure are discussed in light of the results. Both AD Cnc and V523 Cas are modeled with subluminous regions, and the resulting starspot parameters are reported. A simultaneous solution of the B, V light curves and the radial-velocity curves of V523 Cas is presented. Spectroscopic and photometric mass ratios were found to be discordant for both TY Boo and V523 Cas. However, recent spectroscopic work by Groissman seems to remove the discordancy for TY Boo. Absolute parameters are derived for V523 Cas. 43 refs.

  19. Synthetic light-curve analysis of the very short period binaries TY Bootis, AD Cancri, and V523 Cassiopeiae

    NASA Astrophysics Data System (ADS)

    Samec, Ronald G.; van Hamme, Walter; Bookmyer, Beverly B.

    1989-12-01

    New photometric observations of TY Boo, AD Cnc, and V523 Cas are subjected to synthetic light-curve analyses using the Wilson-Devinney code. Solutions for each of the systems, and the several competing theories of contact binary structure are discussed in light of the results. Both AD Cnc and V523 Cas are modeled with subluminous regions, and the resulting starspot parameters are reported. A simultaneous solution of the B, V light curves and the radial-velocity curves of V523 Cas is presented. Spectroscopic and photometric mass ratios were found to be discordant for both TY Boo and V523 Cas. However, recent spectroscopic work by Groissman seems to remove the discordancy for TY Boo. Absolute parameters are derived for V523 Cas.

  20. Tolerance analysis and variational solid geometry

    SciTech Connect

    Watterberg, P.

    1998-01-01

    The fields of tolerancing and assembly analysis have depended for decades on ad hoc, shop floor methods. This causes serious problems when subjected toleranced designs to automated, analytical methods. This project attempted to further the formalization and mathematization of tolerancing by extending the concept of the Maximum Material Part. A software system was envisioned that would guide designers in the use of appropriate tolerance specifications and then create software models of Maximum Material Parts from the toleranced nominal parts.

  1. Polarised black holes in AdS

    NASA Astrophysics Data System (ADS)

    Costa, Miguel S.; Greenspan, Lauren; Oliveira, Miguel; Penedones, João; Santos, Jorge E.

    2016-06-01

    We consider solutions in Einstein-Maxwell theory with a negative cosmological constant that asymptote to global AdS 4 with conformal boundary {S}2× {{{R}}}t. At the sphere at infinity we turn on a space-dependent electrostatic potential, which does not destroy the asymptotic AdS behaviour. For simplicity we focus on the case of a dipolar electrostatic potential. We find two new geometries: (i) an AdS soliton that includes the full backreaction of the electric field on the AdS geometry; (ii) a polarised neutral black hole that is deformed by the electric field, accumulating opposite charges in each hemisphere. For both geometries we study boundary data such as the charge density and the stress tensor. For the black hole we also study the horizon charge density and area, and further verify a Smarr formula. Then we consider this system at finite temperature and compute the Gibbs free energy for both AdS soliton and black hole phases. The corresponding phase diagram generalizes the Hawking-Page phase transition. The AdS soliton dominates the low temperature phase and the black hole the high temperature phase, with a critical temperature that decreases as the external electric field increases. Finally, we consider the simple case of a free charged scalar field on {S}2× {{{R}}}t with conformal coupling. For a field in the SU(N ) adjoint representation we compare the phase diagram with the above gravitational system.

  2. Effusion of hydrophobic organic compounds (HOCs) from fog droplets

    SciTech Connect

    Lee, W.M.; Tsay, C.

    1998-12-31

    In this study, the effects of surface-active substances, pH and salt on the effusion of HOCs from droplets were investigated. An HOCs-effusion reactor was established for experiments. N-octane was used for the HOCs and Sodium Dodecyl Sulfate (SDS) was selected as the surface-active substance. A correction factor to mass exchange constant, defined as the deviation of exchange constant of n-octane in fog phase from that in planar aqueous phase was used to quantify the effects of surface-active substance, pH, and salt concentration on the effusion rate of HOCs from fog droplets by a modified double-layer diffusion model. The results showed that surface-active substances, SDS cab decrease the effusion rate of n-octane from fog droplets by about 40%--62% and the values of were in the range of 0.382 to 0.609. The salt, sodium chloride, at the concentration of 1.00 {times} 10{sup {minus}3} [M] can further decrease the mass transfer rate of n-octane from fog droplets because the values changed from 0.590 to 0.368, so that the effusion rate was further decrease by salt. When pH values were between 5.60 and 2.00, values varied from 0.609 to 0.367 at SDS concentration of 1.00 x 10{sup 3}[M]. This indicated that the effusion rate of HOCs from fog droplets decreased with decreasing pH value.

  3. Evaluating marine diets through radiocarbon dating and stable isotope analysis of victims of the AD79 eruption of Vesuvius.

    PubMed

    Craig, Oliver E; Bondioli, Luca; Fattore, Luciano; Higham, Tom; Hedges, Robert

    2013-11-01

    The stable carbon (δ(13) C) and nitrogen (δ(15) N) isotope values of bone collagen are frequently used in paleodietary studies to assess the marine contribution to an individual's diet. Surprisingly, the relationship between stable isotope these values characteristics and the percentage of marine foods in diet has never been effectively demonstrated. To clarify this relationship, the stable isotope values and radiocarbon dates of nine humans and one sheep from Herculaneum, all who perished simultaneously during the AD 79 eruption of Vesuvius, were determined. Significant differences were found in the radiocarbon dates which are attributable to the incorporation of "old" carbon from the marine reservoir. The magnitude of the observed differences was linearly correlated with both δ(13) C and δ(15) N values allowing the response of each isotope to increasing marine carbon in collagen to be independently verified. Regression analyses showed that for every 1‰ enrichment in δ(13) C and δ(15) N, 56 years and 34 years were added to the radiocarbon age, respectively. Predictions of the maximum marine reservoir age differed considerably depending on which stable isotope was considered. This discrepancy is attributed to some degree of macronutrient scrambling whereby nitrogen from marine protein is preferentially incorporated in collagen over marine carbon. It is suggested that the macronutrient scrambling explains the observed relationship between δ(13) C and δ(15) N from Roman coastal sites and should be considered when interpreting any diet which is not dominated by protein. Nevertheless, without knowing the degree of macronutrient scrambling in different dietary scenarios, the accuracy of dietary reconstructions is severely compromised. PMID:24000142

  4. Using Personal Ads and Online Self-Help Groups to Teach Content Analysis in a Research Methods Course

    ERIC Educational Resources Information Center

    Finn, Jerry; Dillon, Caroline

    2007-01-01

    This paper describes methods for teaching content analysis as part of the Research sequence in social work education. Teaching content analysis is used to develop research skills as well as to promote students' knowledge and critical thinking and about new information technology resources that are being increasingly used by the general public. The…

  5. Efficacy and safety of liraglutide, a once-daily human glucagon-like peptide-1 analogue, in Latino/Hispanic patients with type 2 diabetes: post hoc analysis of data from four phase III trials.

    PubMed

    Davidson, J A; Ørsted, D D; Campos, C

    2016-07-01

    The aim of the present analysis was to evaluate the efficacy of the glucagon-like peptide-1 receptor agonist liraglutide in Latino/Hispanic individuals with type 2 diabetes, in addition to comparing its treatment effects with those observed in non-Latino/Hispanic individuals. Analyses were performed on patient-level data from a subset of individuals self-defined as Latino/Hispanic from four phase III studies, the LEAD-3, LEAD-4, LEAD-6 and 1860-LIRA-DPP-4 trials. Endpoints included change in glycated haemoglobin (HbA1c) and body weight from baseline. In Latino/Hispanic patients (n = 505; 323 treated with liraglutide) after 26 weeks, mean HbA1c reductions were significantly greater with both liraglutide 1.2 and 1.8 mg versus comparator or placebo in the LEAD-3 and LEAD-4 studies, and with 1.8 mg liraglutide in the 1860-LIRA-DPP-4 trial. In LEAD-3 both doses led to significant differences in body weight change among Latino/Hispanic patients versus the comparator. With 1.8 mg liraglutide, difference in weight change was significant only in the 1860-LIRA-DPP-4 trial versus sitagliptin. For both endpoints Latino/Hispanic and non-Latino/Hispanic patients responded to liraglutide similarly. In summary, liraglutide is efficacious for treatment of type 2 diabetes in Latino/Hispanic patients, with a similar efficacy to that seen in non-Latino/Hispanic patients. PMID:26936426

  6. Can the spinal instability neoplastic score prior to spinal radiosurgery predict compression fractures following stereotactic spinal radiosurgery for metastatic spinal tumor?: a post hoc analysis of prospective phase II single-institution trials.

    PubMed

    Lee, Sun-Ho; Tatsui, Claudio E; Ghia, Amol J; Amini, Behrang; Li, Jing; Zavarella, Salvatore M; Tannir, Nizar M; Brown, Paul D; Rhines, Laurence D

    2016-02-01

    The aim of this study was to determine the predictability of vertebral compression fracture (VCF) development applying the spinal instability neoplastic score (SINS) prior to delivery of stereotactic spinal radiosurgery (SSRS) for spinal metastases. From two prospective cohorts of SSRS for spinal metastases, we selected patients with a low degree of cord compression or cauda equine from C3 to S1 and analyzed 79 patients enrolled according to binary SINS criteria. The primary endpoint was the development of a de novo VCF or progression of an existing fracture after SSRS. We identified 32 fractures (40.5 %): 19 de novo and 13 progressive. The mean time to fracture after SSRT was 3.3 months (range, 0.4-34.1 months). In 41 patients with low SINS (0-6), 7 patients (17.1 %) developed a fracture after SSRS. In 38 patients with high SINS (7-12), 25 (65.8 %) developed a fracture. Among the 32 fractures, 15 were symptomatic. Patients with high SINS were more likely to experience symptomatic fractures (31.6 %) than were patients with lower SINS (7.4 %). On univariate and multivariate analysis, 24-month fracture-free rates were 78.7 and 33.7 % in low and high SINS group, respectively and high SINS was found to be a significant risk factor for VCFs and symptomatic fractures (respectively, HR 5.6, p = 0.04; HR 5.3, p = 0.01). SINS is a useful tool for predicting the development of VCF after SSRS for spinal metastases. Prophylactic cement augmentation should not be considered for patients with lower SINS, since the risk of fracture is low. PMID:26643804

  7. Randomised comparison of zofenopril and ramipril plus acetylsalicylic acid in postmyocardial infarction patients with left ventricular systolic dysfunction: a post hoc analysis of the SMILE-4 Study in patients according to levels of left ventricular ejection fraction at entry

    PubMed Central

    Borghi, Claudio; Omboni, Stefano; Cicero, Arrigo FG; Bacchelli, Stefano; Degli Esposti, Daniela; Novo, Salvatore; Vinereanu, Dragos; Ambrosio, Giuseppe; Ambrosioni, Ettore

    2015-01-01

    Objective Conflicting evidence exists on the benefits of treating patients with coronary artery disease and preserved left ventricular ejection fraction (LVEF) with an ACE inhibitor. This retrospective analysis of the SMILE-4 Study sought to compare the efficacy of zofenopril 60 mg plus acetylsalicylic acid (ASA) versus ramipril 10 mg plus ASA 100 mg in patients with acute myocardial infarction (AMI) and heart failure, according to an impaired or preserved LVEF. Methods The primary study end point was 1-year combined occurrence of death or hospitalisation for cardiovascular causes. A preserved LVEF was defined by a baseline LVEF >40% and an impaired one by an LVEF ≤40%. Results 448 patients (63%) had preserved and 262 (37%) had impaired LVEF. The primary end point occurred in 125 patients with preserved (28%) and 106 patients with impaired LVEF (41%, p=0.001). In the first group, the rate of major cardiovascular events was significantly lower under zofenopril than under ramipril (23% vs 33%; OR and 95% CI 0.60, 0.39 to 0.91; p=0.016). This was also the case for patients with impaired LVEF, though between-group difference was not statistically significant (38% zofenopril vs 44% ramipril; OR 0.77, 0.47 to 1.26; p=0.297). LVEF values significantly (p<0.0001) increased during the follow-up in both subsets with no between-treatment differences. However, improvement rates in LVEF (increase ≥5%) were higher in patients with impaired LVEF (72% vs 61%, p=0.006). Conclusions In the SMILE-4 Study, the cardiovascular outcome of patients with post-AMI with preserved LVEF was more favourable in the zofenopril than in the ramipril treatment group. Trial registration number EudraCT Number: 2004-001150-88 (http://www.clinicaltrialsregister.eu); Italian Ministry of Health Code: GUIDOTT_III_2004_001 (https://oss-sper-clin.agenziafarmaco.it). PMID:26288740

  8. Smeared antibranes polarise in AdS

    NASA Astrophysics Data System (ADS)

    Gautason, Fridrik Freyr; Truijen, Brecht; Van Riet, Thomas

    2015-07-01

    In the recent literature it has been questioned whether the local backreaction of antibranes in flux throats can induce a perturbative brane-flux decay. Most evidence for this can be gathered for D6 branes and D p branes smeared over 6 - p compact directions, in line with the absence of finite temperature solutions for these cases. The solutions in the literature have flat worldvolume geometries and non-compact transversal spaces. In this paper we consider what happens when the worldvolume is AdS and the transversal space is compact. We show that in these circumstances brane polarisation smoothens out the flux singularity, which is an indication that brane-flux decay is prevented. This is consistent with the fact that the cosmological constant would be less negative after brane-flux decay. Our results extend recent results on AdS7 solutions from D6 branes to AdS p+1 solutions from D p branes. We show that supersymmetry of the AdS solutions depend on p non-trivially.

  9. AdS orbifolds and Penrose limits

    SciTech Connect

    Alishahiha, Mohsen; Sheikh-Jabbari, Mohammad M.; Tatar, Radu

    2002-12-09

    In this paper we study the Penrose limit of AdS{sub 5} orbifolds. The orbifold can be either in the pure spatial directions or space and time directions. For the AdS{sub 5}/{Lambda} x S{sup 5} spatial orbifold we observe that after the Penrose limit we obtain the same result as the Penrose limit of AdS{sub 5} x S{sup 5}/{Lambda}. We identify the corresponding BMN operators in terms of operators of the gauge theory on R x S{sup 3}/{Lambda}. The semi-classical description of rotating strings in these backgrounds have also been studied. For the spatial AdS orbifold we show that in the quadratic order the obtained action for the fluctuations is the same as that in S{sup 5} orbifold, however, the higher loop correction can distinguish between two cases.

  10. Cloning and genetic analysis of the UV resistance determinant (uvr) encoded on the Enterococcus faecalis pheromone-responsive conjugative plasmid pAD1.

    PubMed Central

    Ozawa, Y; Tanimoto, K; Fujimoto, S; Tomita, H; Ike, Y

    1997-01-01

    The conjugative pheromone-responsive plasmid pAD1 (59.6 kb) of Enterococcus faecalis encodes a UV resistance determinant (uvr) in addition to the hemolysin-bacteriocin determinant. pAD1 enhances the UV resistance of wild-type E. faecalis FA2-2 and E. faecalis UV202, which is a UV-sensitive derivative of E. faecalis JH2-2. A 2.972-kb fragment cloned from between 27.7 and 30.6 kb of the pAD1 map conferred UV resistance function on UV202. Sequence analysis showed that the cloned fragment contained three open reading frames designated uvrA, uvrB, and uvrC. The uvrA gene is located on the pAD1 map between 28.1 and 29.4 kb. uvrB is located between 30.1 and 30.3 kb, and uvrC is located between 30.4 and 30.6 kb on the pAD1 map. The uvrA, uvrB, and uvrC genes encode sequences of 442, 60, and 74 amino acids, respectively. The deduced amino acid sequence of the uvrA-encoded protein showed 20% homology of the identical residues with the E. coli UmuC protein. Tn917 insertion mutagenesis and deletion mutant analysis of the cloned fragment showed that uvrA conferred UV resistance. A palindromic sequence, 5'-GAACNGTTC-3', which is identical to the consensus sequence found within the putative promoter region of the Bacillus subtilis DNA damage-inducible genes, was located within the promoter region of uvrA. Two uvrA transcripts of different lengths (i.e., 1.54 and 2.14 kb) which terminate at different points downstream of uvrA were detected in UV202 carrying the deletion mutant containing uvrA. The longer transcript, 2.14 kb, was not detected in UV202 carrying the deletion mutant containing both uvrA and uvrB, which suggests that uvrB encodes a terminator for the uvrA transcript. The uvrA transcript was not detected in any significant quantity in UV202 carrying the cloned fragment containing uvrA, uvrB, and uvrC; on the other hand, the 1.54-kb uvrA transcript was detected in the strain exposed to mitomycin C, which suggests that the UvrC protein functions as a regulator of uvr

  11. A Principal Component Analysis Noise Filter Value-Added Procedure to Remove Uncorrelated Noise from Atmospheric Emitted Radiance Interferometer (AERI) Observations

    SciTech Connect

    C. Lo D. D. Turner R. O. Knuteson

    2006-01-31

    This technical report provide a short description of the application of the principle component analysis techniques to remove uncorrelated random noise from ground-based high spectral resolution infrared radiance observations collected by the atmospheric emitted radiance interferometers (AERIs) deployed by the Atmospheric Radiation Measurement (ARM) Program. A general overview of the technique, the input, and output datastreams of the newly generated value-added product, and the data quality checks used are provided. A more complete discussion of the theory and results is given in Turner et al. (2006).

  12. The choice of product indicators in latent variable interaction models: post hoc analyses.

    PubMed

    Foldnes, Njål; Hagtvet, Knut Arne

    2014-09-01

    The unconstrained product indicator (PI) approach is a simple and popular approach for modeling nonlinear effects among latent variables. This approach leaves the practitioner to choose the PIs to be included in the model, introducing arbitrariness into the modeling. In contrast to previous Monte Carlo studies, we evaluated the PI approach by 3 post hoc analyses applied to a real-world case adopted from a research effort in social psychology. The measurement design applied 3 and 4 indicators for the 2 latent 1st-order variables, leaving the researcher with a choice among more than 4,000 possible PI configurations. Sixty so-called matched-pair configurations that have been recommended in previous literature are of special interest. In the 1st post hoc analysis we estimated the interaction effect for all PI configurations, keeping the real-world sample fixed. The estimated interaction effect was substantially affected by the choice of PIs, also across matched-pair configurations. Subsequently, a post hoc Monte Carlo study was conducted, with varying sample sizes and data distributions. Convergence, bias, Type I error and power of the interaction test were investigated for each matched-pair configuration and the all-pairs configuration. Variation in estimates across matched-pair configurations for a typical sample was substantial. The choice of specific configuration significantly affected convergence and the interaction test's outcome. The all-pairs configuration performed overall better than the matched-pair configurations. A further advantage of the all-pairs over the matched-pairs approach is its unambiguity. The final study evaluates the all-pairs configuration for small sample sizes and compares it to the non-PI approach of latent moderated structural equations. PMID:24773360

  13. An Investigation of U.S. Undergraduate Business School Rankings Using Data Envelopment Analysis with Value-Added Performance Indicators

    ERIC Educational Resources Information Center

    Palocsay, Susan W.; Wood, William C.

    2014-01-01

    "Bloomberg Businessweek" ranks U.S. undergraduate business programs annually. These rankings provide a convenient overall measure of quality, which is important in today's environment of concern about higher education costs and employment after graduation. Data envelopment analysis (DEA) has advantages over previous regression…

  14. Lorentzian AdS geometries, wormholes, and holography

    SciTech Connect

    Arias, Raul E.; Silva, Guillermo A.; Botta Cantcheff, Marcelo

    2011-03-15

    We investigate the structure of two-point functions for the quantum field theory dual to an asymptotically Lorentzian Anti de Sitter (AdS) wormhole. The bulk geometry is a solution of five-dimensional second-order Einstein-Gauss-Bonnet gravity and causally connects two asymptotically AdS spacetimes. We revisit the Gubser-Klebanov-Polyakov-Witten prescription for computing two-point correlation functions for dual quantum field theories operators O in Lorentzian signature and we propose to express the bulk fields in terms of the independent boundary values {phi}{sub 0}{sup {+-}} at each of the two asymptotic AdS regions; along the way we exhibit how the ambiguity of normalizable modes in the bulk, related to initial and final states, show up in the computations. The independent boundary values are interpreted as sources for dual operators O{sup {+-}} and we argue that, apart from the possibility of entanglement, there exists a coupling between the degrees of freedom living at each boundary. The AdS{sub 1+1} geometry is also discussed in view of its similar boundary structure. Based on the analysis, we propose a very simple geometric criterion to distinguish coupling from entanglement effects among two sets of degrees of freedom associated with each of the disconnected parts of the boundary.

  15. Electroconvulsive Therapy Added to Non-Clozapine Antipsychotic Medication for Treatment Resistant Schizophrenia: Meta-Analysis of Randomized Controlled Trials.

    PubMed

    Zheng, Wei; Cao, Xiao-Lan; Ungvari, Gabor S; Xiang, Ying-Qiang; Guo, Tong; Liu, Zheng-Rong; Wang, Yuan-Yuan; Forester, Brent P; Seiner, Stephen J; Xiang, Yu-Tao

    2016-01-01

    This meta-analysis of randomized controlled trials (RCTs) examined the efficacy and safety of the combination of electroconvulsive therapy (ECT) and antipsychotic medication (except for clozapine) versus the same antipsychotic monotherapy for treatment-resistant schizophrenia (TRS). Two independent investigators extracted data for a random effects meta-analysis and pre-specified subgroup and meta-regression analyses. Weighted and standard mean difference (WMD/SMD), risk ratio (RR) ±95% confidence intervals (CIs), number needed to treat (NNT), and number needed to harm (NNH) were calculated. Eleven studies (n = 818, duration = 10.2±5.5 weeks) were identified for meta-analysis. Adjunctive ECT was superior to antipsychotic monotherapy regarding (1) symptomatic improvement at last-observation endpoint with an SMD of -0.67 (p<0.00001; I(2) = 62%), separating the two groups as early as weeks 1-2 with an SMD of -0.58 (p<0.00001; I(2) = 0%); (2) study-defined response (RR = 1.48, p<0.0001) with an NNT of 6 (CI = 4-9) and remission rate (RR = 2.18, p = 0.0002) with an NNT of 8 (CI = 6-16); (3) PANSS positive and general symptom sub-scores at endpoint with a WMD between -3.48 to -1.32 (P = 0.01 to 0.009). Subgroup analyses were conducted comparing double blind/rater-masked vs. open RCTs, those with and without randomization details, and high quality (Jadad≥adadup analyses were Jadad<3) studies. The ECT-antipsychotic combination caused more headache (p = 0.02) with an NNH of 6 (CI = 4-11) and memory impairment (p = 0.001) with an NNH of 3 (CI = 2-5). The use of ECT to augment antipsychotic treatment (clozapine excepted) can be an effective treatment option for TRS, with increased frequency of self-reported memory impairment and headache. PMID:27285996

  16. GLSENS: A Generalized Extension of LSENS Including Global Reactions and Added Sensitivity Analysis for the Perfectly Stirred Reactor

    NASA Technical Reports Server (NTRS)

    Bittker, David A.

    1996-01-01

    A generalized version of the NASA Lewis general kinetics code, LSENS, is described. The new code allows the use of global reactions as well as molecular processes in a chemical mechanism. The code also incorporates the capability of performing sensitivity analysis calculations for a perfectly stirred reactor rapidly and conveniently at the same time that the main kinetics calculations are being done. The GLSENS code has been extensively tested and has been found to be accurate and efficient. Nine example problems are presented and complete user instructions are given for the new capabilities. This report is to be used in conjunction with the documentation for the original LSENS code.

  17. Detection of adulteration in honey samples added various sugar syrups with 13C/12C isotope ratio analysis method.

    PubMed

    Tosun, Murat

    2013-06-01

    Honey can be adulterated in various ways. One of the adulteration methods is the addition of different sugar syrups during or after honey production. Starch-based sugar syrups, high fructose corn syrup (HFCS), glucose syrup (GS) and saccharose syrups (SS), which are produced from beet or canes, can be used for adulterating honey. In this study, adulterated honey samples were prepared with the addition of HFCS, GS and SS (beet sugar) at a ratio of 0%, 10%, 20%, 40% and 50% by weight. (13)C/(12)C analysis was conducted on these adulterated honey samples using an isotope ratio mass spectrometer in combination with an elemental analyser (EA-IRMS). As a result, adulteration using C(4) sugar syrups (HFCS and GS) could be detected to a certain extent while adulteration of honey using C(3) sugar syrups (beet sugar) could not be detected. Adulteration by using SS (beet sugar) still has a serious detection problem, especially in countries in which beet is used in manufacturing sugar. For this reason, practice and analysis methods are needed to meet this deficit and to detect the adulterations precisely in the studies that will be conducted. PMID:23411291

  18. PCard Data Analysis Tool

    2005-04-01

    The Procurement Card data analysis and monitoring tool enables due-diligence review using predefined user-created queries and reports. The system tracks individual compliance emails. More specifically, the tool: - Helps identify exceptions or questionable and non-compliant purchases, - Creates audit random sample on request, - Allows users to create and run new or ad-hoc queries and reports, - Monitors disputed charges, - Creates predefined Emails to Cardholders requesting documentation and/or clarification, - Tracks audit status, notes,more » Email status (date sent, response), audit resolution.« less

  19. Bayesian Exploratory Factor Analysis

    PubMed Central

    Conti, Gabriella; Frühwirth-Schnatter, Sylvia; Heckman, James J.; Piatek, Rémi

    2014-01-01

    This paper develops and applies a Bayesian approach to Exploratory Factor Analysis that improves on ad hoc classical approaches. Our framework relies on dedicated factor models and simultaneously determines the number of factors, the allocation of each measurement to a unique factor, and the corresponding factor loadings. Classical identification criteria are applied and integrated into our Bayesian procedure to generate models that are stable and clearly interpretable. A Monte Carlo study confirms the validity of the approach. The method is used to produce interpretable low dimensional aggregates from a high dimensional set of psychological measurements. PMID:25431517

  20. PCard Data Analysis Tool

    SciTech Connect

    Hilts, Jim

    2005-04-01

    The Procurement Card data analysis and monitoring tool enables due-diligence review using predefined user-created queries and reports. The system tracks individual compliance emails. More specifically, the tool: - Helps identify exceptions or questionable and non-compliant purchases, - Creates audit random sample on request, - Allows users to create and run new or ad-hoc queries and reports, - Monitors disputed charges, - Creates predefined Emails to Cardholders requesting documentation and/or clarification, - Tracks audit status, notes, Email status (date sent, response), audit resolution.

  1. Electroconvulsive Therapy Added to Non-Clozapine Antipsychotic Medication for Treatment Resistant Schizophrenia: Meta-Analysis of Randomized Controlled Trials

    PubMed Central

    Zheng, Wei; Cao, Xiao-Lan; Ungvari, Gabor S.; Xiang, Ying-Qiang; Guo, Tong; Liu, Zheng-Rong; Wang, Yuan-Yuan; Forester, Brent P.; Seiner, Stephen J.; Xiang, Yu-Tao

    2016-01-01

    This meta-analysis of randomized controlled trials (RCTs) examined the efficacy and safety of the combination of electroconvulsive therapy (ECT) and antipsychotic medication (except for clozapine) versus the same antipsychotic monotherapy for treatment-resistant schizophrenia (TRS). Two independent investigators extracted data for a random effects meta-analysis and pre-specified subgroup and meta-regression analyses. Weighted and standard mean difference (WMD/SMD), risk ratio (RR) ±95% confidence intervals (CIs), number needed to treat (NNT), and number needed to harm (NNH) were calculated. Eleven studies (n = 818, duration = 10.2±5.5 weeks) were identified for meta-analysis. Adjunctive ECT was superior to antipsychotic monotherapy regarding (1) symptomatic improvement at last-observation endpoint with an SMD of -0.67 (p<0.00001; I2 = 62%), separating the two groups as early as weeks 1–2 with an SMD of -0.58 (p<0.00001; I2 = 0%); (2) study-defined response (RR = 1.48, p<0.0001) with an NNT of 6 (CI = 4–9) and remission rate (RR = 2.18, p = 0.0002) with an NNT of 8 (CI = 6–16); (3) PANSS positive and general symptom sub-scores at endpoint with a WMD between -3.48 to -1.32 (P = 0.01 to 0.009). Subgroup analyses were conducted comparing double blind/rater-masked vs. open RCTs, those with and without randomization details, and high quality (Jadad≥adadup analyses were Jadad<3) studies. The ECT-antipsychotic combination caused more headache (p = 0.02) with an NNH of 6 (CI = 4–11) and memory impairment (p = 0.001) with an NNH of 3 (CI = 2–5). The use of ECT to augment antipsychotic treatment (clozapine excepted) can be an effective treatment option for TRS, with increased frequency of self-reported memory impairment and headache. Trial registration CRD42014006689 (PROSPERO). PMID:27285996

  2. Precision of radiostereometric analysis (RSA) of acetabular cup stability and polyethylene wear improved by adding tantalum beads to the liner

    PubMed Central

    Nebergall, Audrey K; Rader, Kevin; Palm, Henrik; Malchau, Henrik; Greene, Meridith E

    2015-01-01

    Background and purpose In traditional radiostereometric analysis (RSA), 1 segment defines both the acetabular shell and the polyethylene liner. However, inserting beads into the polyethylene liner permits employment of the shell and liner as 2 separate segments, enabling distinct analysis of the precision of 3 measurement methods in determining femoral head penetration and shell migration. Patients and methods The UmRSA program was used to analyze the double examinations of 51 hips to determine if there was a difference in using the shell-only segment, the liner-only segment, or the shell + liner segment to measure wear and acetabular cup stability. The standard deviation multiplied by the critical value (from a t distribution) established the precision of each method. Results Due to the imprecision of the automated edge detection, the shell-only method was least desirable. The shell + liner and liner-only methods had a precision of 0.115 mm and 0.086 mm, respectively, when measuring head penetration. For shell migration, the shell + liner had a precision of 0.108 mm, which was better than the precision of the shell-only method. In both the penetration and migration analyses, the shell + liner condition number was statistically significantly lower and the bead count was significantly higher than for the other methods. Interpretation Insertion of beads in the polyethylene improves the precision of femoral head penetration and shell migration measurements. A greater dispersion and number of beads when combining the liner with the shell generated more reliable results in both analyses, by engaging a larger portion of the radiograph. PMID:26012546

  3. Analysis of volatiles in porcine liver pâtés with added sage and rosemary essential oils by using SPME-GC-MS.

    PubMed

    Estévez, Mario; Ventanas, Sonia; Ramírez, Rosario; Cava, Ramón

    2004-08-11

    The effect of the addition of two natural antioxidant extracts (sage and rosemary essential oils) and one synthetic (BHT) on the generation of volatile compounds in liver pâtés from Iberian and white pigs was analyzed using SPME-GC-MS. Lipid-derived volatiles such as aldehydes [hexanal, octanal, nonanal, hept-(Z)-4-enal, oct-(E)-2-enal, non-(Z)-2-enal, dec-(E)-2-enal, deca-(E,Z)-2,4-dienal] and alcohols (pentan-1-ol, hexan-1-ol, oct-1-en-3-ol) were the most abundant compounds in the headspace of porcine liver pâtés. Pâtés from different pig breeds presented different volatiles profiles due to their different oxidation susceptibilities as a probable result of their fatty acid profiles and vitamin E content. Regardless of the origin of the pâtés, the addition of BHT successfully reduced the amount of volatiles derived from PUFA oxidation. Added essential oils showed a different effect on the generation of volatiles whether they were added in pâtés from Iberian or white pigs because they inhibited lipid oxidation in the former and enhanced oxidative instability in the latter. SPME successfully allowed the isolation and analysis of 41 volatile terpenes from pâtés with added sage and rosemary essential oils including alpha-pinene, beta-myrcene, 1-limonene, (E)-caryophyllene, linalool, camphor, and 1,8-cineole, which might contribute to the aroma characteristics of liver pâtés. PMID:15291492

  4. Density analysis of magmatic and phreatomagmatic phases of the 934 AD Eldgjá Eruption, southern Iceland

    NASA Astrophysics Data System (ADS)

    Moreland, William; Thordarson, Thorvaldur

    2014-05-01

    Eldgjá is a ~75 km long volcanic fissure vent system associated with the Katla volcanic system in southern Iceland, formed during an eruption in the mid-tenth century. The fissure is of the mixed-cone row type and produced both large lava fields and a widespread basaltic tephra deposit. Proximal tephra fall deposits are up to 4 m thick and contain numerous fall units of varying thickness which run parallel to the fissure, indicating many sources of eruption. The lower-most fall units thicken towards Mýrdalsjökull, demonstrating that the initial explosive phases took place within the glacier. Later fall units generally thicken towards the northeast with dispersal axes indicating origin at the more easterly segments of the Eldgjá vent system and a stepwise migration in an easterly direction. Both magmatic and phreatomagmatic explosive activity occurred along the vent system, where phreatomagmatic activity is confined to fissure segments within the Mýrdalsjökull glacier. Two key sections, chosen to represent magmatic and phreatomagmatic deposits, were logged and sampled for density analysis. A section at Skælingar, half a kilometre southeast of Eldgjá Proper was chosen to represent the magmatic products. It is 3.70 m thick and contains 9 fall-units including a distinct bomb-layer. The phreatomagmatic products are represented by a section from Stóragil, 20 km north-northeast of the Katla caldera and the sampled section is 1.12 m thick. Density analysis involves selecting 100 clasts 8-32 mm in diameter from <5 cm layers within the sub-units of each section. These clasts are then weighed, sealed and then weighed again in water to calculate their volume by Archimedes' principle and therefore their density, from which vesicularity can be calculated. The results were then plotted as histograms and compared with the section logs. The magmatic samples have unimodal, normal vesicularity distributions with typical modal values of 60-70% and a span of ~40%. Several of

  5. A natural autonomous force added in the restricted problem and explored via stability analysis and discrete variational mechanics

    NASA Astrophysics Data System (ADS)

    Bosanac, Natasha; Howell, Kathleen C.; Fischbach, Ephraim

    2016-02-01

    With improved observational capabilities, an increasing number of binary systems have been discovered both within the solar system and beyond. By characterizing the gravitational environment near a binary star, for example, potential motions of a nearby exoplanet may be explored. The path of this comparatively small body is influenced by an underlying dynamical structure of periodic orbits which can attract, bound or repel trajectories in their vicinity. In this investigation, stability analysis is employed to examine the evolution of selected families of periodic orbits near large mass ratio binary systems in two dynamical models: the circular restricted three-body problem and an expanded model that incorporates an additional autonomous force to examine theories for three-body gravitational interactions. Discrete variational mechanics is employed to determine the natural parameters corresponding to the existence of a given orbit geometry, facilitating exploration of the effect of an additional three-body interaction on nearby periodic orbits and the conditions for reproducibility in the natural gravitational environment. Any unique effects of the additional autonomous force contribution may impact the potential motion of an exoplanet as it orbits a binary star system.

  6. Efficacy of adding a supporting implant in stress distribution of long-span fixed partial dentures: a 3D finite element analysis

    PubMed Central

    Shurbaji Mozayek, Rami; Allaf, Mirza; B. Abuharb, Mohammad

    2016-01-01

    Background. Long span is seen in many clinical situations. Treatmentplanning options of these cases are difficult and may require FPD, RPD or ISP. Each option has its own disadvantages, including mechanical problems, patient comfort and cost. This article will evaluate the stress distribution of a different treatment option, which consists of adding a single sup-porting implant to the FPD by using 3D finite element analysis. Methods. Three models, each consisting of 5 units, were created as follows: 1. Tooth Pontic Pontic Pontic Tooth; 2. Tooth Pontic Implant Pontic Tooth; 3. Tooth Pontic Pontic Implant Tooth. An axial force was applied to the prostheses by using 3D finite element method and stresses were evaluated. Results. The maximum stress was found in the prostheses in all the models; the highest stress values in all the shared components of the models were almost similar. Stress in implants was lower in the second model than the third one. Conclusion. Adding a supporting implant in long-span FPD has no advantages while it has the disadvantages of complicating treatment and the complications that may occur to the implant and surrounding bone. PMID:27429723

  7. Efficacy of adding a supporting implant in stress distribution of long-span fixed partial dentures: a 3D finite element analysis.

    PubMed

    Shurbaji Mozayek, Rami; Allaf, Mirza; B Abuharb, Mohammad

    2016-01-01

    Background. Long span is seen in many clinical situations. Treatmentplanning options of these cases are difficult and may require FPD, RPD or ISP. Each option has its own disadvantages, including mechanical problems, patient comfort and cost. This article will evaluate the stress distribution of a different treatment option, which consists of adding a single sup-porting implant to the FPD by using 3D finite element analysis. Methods. Three models, each consisting of 5 units, were created as follows: 1. Tooth Pontic Pontic Pontic Tooth; 2. Tooth Pontic Implant Pontic Tooth; 3. Tooth Pontic Pontic Implant Tooth. An axial force was applied to the prostheses by using 3D finite element method and stresses were evaluated. Results. The maximum stress was found in the prostheses in all the models; the highest stress values in all the shared components of the models were almost similar. Stress in implants was lower in the second model than the third one. Conclusion. Adding a supporting implant in long-span FPD has no advantages while it has the disadvantages of complicating treatment and the complications that may occur to the implant and surrounding bone. PMID:27429723

  8. The AdS particle [rapid communication

    NASA Astrophysics Data System (ADS)

    Ghosh, Subir

    2005-09-01

    In this Letter we have considered a relativistic Nambu-Goto model for a particle in AdS metric. With appropriate gauge choice to fix the reparameterization invariance, we recover the previously discussed [S. Ghosh, P. Pal, Phys. Lett. B 618 (2005) 243, arxiv:hep-th/0502192] "exotic oscillator". The Snyder algebra and subsequently the κ-Minkowski spacetime are also derived. Lastly we comment on the impossibility of constructing a non-commutative spacetime in the context of open string where only a curved target space is introduced.

  9. Post Hoc Analysis of the PATRICIA Randomized Trial of the Efficacy of Human Papillomavirus Type 16 (HPV-16)/HPV-18 AS04-Adjuvanted Vaccine against Incident and Persistent Infection with Nonvaccine Oncogenic HPV Types Using an Alternative Multiplex Type-Specific PCR Assay for HPV DNA

    PubMed Central

    Colau, Brigitte; Wheeler, Cosette M.; Naud, Paulo; Garland, Suzanne; Quint, Wim; Chow, Song-Nan; Salmerón, Jorge; Lehtinen, Matti; Del Rosario-Raymundo, M. Rowena; Paavonen, Jorma; Teixeira, Júlio C.; Germar, Maria Julieta; Peters, Klaus; Skinner, S. Rachel; Limson, Genara; Castellsagué, Xavier; Poppe, Willy A. J.; Ramjattan, Brian; Klein, Terry D.; Schwarz, Tino F.; Chatterjee, Archana; Tjalma, Wiebren A. A.; Diaz-Mitoma, Francisco; Lewis, David J. M.; Harper, Diane M.; Molijn, Anco; van Doorn, Leen-Jan; David, Marie-Pierre; Dubin, Gary

    2014-01-01

    The efficacy of the human papillomavirus type 16 (HPV-16)/HPV-18 AS04-adjuvanted vaccine against cervical infections with HPV in the Papilloma Trial against Cancer in Young Adults (PATRICIA) was evaluated using a combination of the broad-spectrum L1-based SPF10 PCR-DNA enzyme immunoassay (DEIA)/line probe assay (LiPA25) system with type-specific PCRs for HPV-16 and -18. Broad-spectrum PCR assays may underestimate the presence of HPV genotypes present at relatively low concentrations in multiple infections, due to competition between genotypes. Therefore, samples were retrospectively reanalyzed using a testing algorithm incorporating the SPF10 PCR-DEIA/LiPA25 plus a novel E6-based multiplex type-specific PCR and reverse hybridization assay (MPTS12 RHA), which permits detection of a panel of nine oncogenic HPV genotypes (types 16, 18, 31, 33, 35, 45, 52, 58, and 59). For the vaccine against HPV types 16 and 18, there was no major impact on estimates of vaccine efficacy (VE) for incident or 6-month or 12-month persistent infections when the MPTS12 RHA was included in the testing algorithm versus estimates with the protocol-specified algorithm. However, the alternative testing algorithm showed greater sensitivity than the protocol-specified algorithm for detection of some nonvaccine oncogenic HPV types. More cases were gained in the control group than in the vaccine group, leading to higher point estimates of VE for 6-month and 12-month persistent infections for the nonvaccine oncogenic types included in the MPTS12 RHA assay (types 31, 33, 35, 45, 52, 58, and 59). This post hoc analysis indicates that the per-protocol testing algorithm used in PATRICIA underestimated the VE against some nonvaccine oncogenic HPV types and that the choice of the HPV DNA testing methodology is important for the evaluation of VE in clinical trials. (This study has been registered at ClinicalTrials.gov under registration no. NCT00122681.) PMID:25540273

  10. Post hoc analysis of the PATRICIA randomized trial of the efficacy of human papillomavirus type 16 (HPV-16)/HPV-18 AS04-adjuvanted vaccine against incident and persistent infection with nonvaccine oncogenic HPV types using an alternative multiplex type-specific PCR assay for HPV DNA.

    PubMed

    Struyf, Frank; Colau, Brigitte; Wheeler, Cosette M; Naud, Paulo; Garland, Suzanne; Quint, Wim; Chow, Song-Nan; Salmerón, Jorge; Lehtinen, Matti; Del Rosario-Raymundo, M Rowena; Paavonen, Jorma; Teixeira, Júlio C; Germar, Maria Julieta; Peters, Klaus; Skinner, S Rachel; Limson, Genara; Castellsagué, Xavier; Poppe, Willy A J; Ramjattan, Brian; Klein, Terry D; Schwarz, Tino F; Chatterjee, Archana; Tjalma, Wiebren A A; Diaz-Mitoma, Francisco; Lewis, David J M; Harper, Diane M; Molijn, Anco; van Doorn, Leen-Jan; David, Marie-Pierre; Dubin, Gary

    2015-02-01

    The efficacy of the human papillomavirus type 16 (HPV-16)/HPV-18 AS04-adjuvanted vaccine against cervical infections with HPV in the Papilloma Trial against Cancer in Young Adults (PATRICIA) was evaluated using a combination of the broad-spectrum L1-based SPF10 PCR-DNA enzyme immunoassay (DEIA)/line probe assay (LiPA25) system with type-specific PCRs for HPV-16 and -18. Broad-spectrum PCR assays may underestimate the presence of HPV genotypes present at relatively low concentrations in multiple infections, due to competition between genotypes. Therefore, samples were retrospectively reanalyzed using a testing algorithm incorporating the SPF10 PCR-DEIA/LiPA25 plus a novel E6-based multiplex type-specific PCR and reverse hybridization assay (MPTS12 RHA), which permits detection of a panel of nine oncogenic HPV genotypes (types 16, 18, 31, 33, 35, 45, 52, 58, and 59). For the vaccine against HPV types 16 and 18, there was no major impact on estimates of vaccine efficacy (VE) for incident or 6-month or 12-month persistent infections when the MPTS12 RHA was included in the testing algorithm versus estimates with the protocol-specified algorithm. However, the alternative testing algorithm showed greater sensitivity than the protocol-specified algorithm for detection of some nonvaccine oncogenic HPV types. More cases were gained in the control group than in the vaccine group, leading to higher point estimates of VE for 6-month and 12-month persistent infections for the nonvaccine oncogenic types included in the MPTS12 RHA assay (types 31, 33, 35, 45, 52, 58, and 59). This post hoc analysis indicates that the per-protocol testing algorithm used in PATRICIA underestimated the VE against some nonvaccine oncogenic HPV types and that the choice of the HPV DNA testing methodology is important for the evaluation of VE in clinical trials. (This study has been registered at ClinicalTrials.gov under registration no. NCT00122681.). PMID:25540273

  11. Probing crunching AdS cosmologies

    NASA Astrophysics Data System (ADS)

    Kumar, S. Prem; Vaganov, Vladislav

    2016-02-01

    Holographic gravity duals of deformations of CFTs formulated on de Sitter spacetime contain FRW geometries behind a horizon, with cosmological big crunch singularities. Using a specific analytically tractable solution within a particular single scalar truncation of {N}=8 supergravity on AdS4, we first probe such crunching cosmologies with spacelike radial geodesics that compute spatially antipodal correlators of large dimension boundary operators. At late times, the geodesics lie on the FRW slice of maximal expansion behind the horizon. The late time two-point functions factorise, and when transformed to the Einstein static universe, they exhibit a temporal non-analyticity determined by the maximal value of the scale factor ã max. Radial geodesics connecting antipodal points necessarily have de Sitter energy Ɛ ≲ ã max, while geodesics with Ɛ > ã max terminate at the crunch, the two categories of geodesics being separated by the maximal expansion slice. The spacelike crunch singularity is curved "outward" in the Penrose diagram for the deformed AdS backgrounds, and thus geodesic limits of the antipodal correlators do not directly probe the crunch. Beyond the geodesic limit, we point out that the scalar wave equation, analytically continued into the FRW patch, has a potential which is singular at the crunch along with complex WKB turning points in the vicinity of the FRW crunch. We then argue that the frequency space Green's function has a branch point determined by ã max which corresponds to the lowest quasinormal frequency.

  12. The added value of a water footprint approach: Micro- and macroeconomic analysis of cotton production, processing and export in water bound Uzbekistan

    NASA Astrophysics Data System (ADS)

    Rudenko, I.; Bekchanov, M.; Djanibekov, U.; Lamers, J. P. A.

    2013-11-01

    Since independence from the former Soviet Union in 1991, Uzbekistan is challenged to consolidate its efforts and identify and introduce suitable agricultural policies to ease the threat of advancing land, water and ecosystem deterioration. On the one hand, irrigated cotton production provides income, food and energy sources for a large part of the rural households, which accounts for about 70% of the total population. On the other hand, this sector is considered a major driver of the on-going environmental degradation. Due to this dual nature, an integrated approach is needed that allows the analyses of the cotton sector at different stages and, consequently, deriving comprehensive options for action. The findings of the economic based value chain analysis and ecologically-oriented water footprint analysis on regional level were complemented with the findings of an input-output model on national level. This combination gave an added value for better-informed decision-making to reach land, water and ecosystem sustainability, compared to the individual results of each approach. The synergy of approaches pointed at various options for actions, such as to (i) promote the shift of water use from the high water consuming agricultural sector to a less water consuming cotton processing sector, (ii) increase overall water use efficiency by expanding the highly water productive industrial sectors and concurrently decreasing sectors with inefficient water use, and (iii) reduce agricultural water use by improving irrigation and conveyance efficiencies. The findings showed that increasing water use efficiency, manufacturing products with higher value added and raising water users' awareness of the real value of water are essential for providing water security in Uzbekistan.

  13. The efficiency and safety of trastuzumab and lapatinib added to neoadjuvant chemotherapy in Her2-positive breast cancer patients: a randomized meta-analysis

    PubMed Central

    Chen, Zhe-Ling; Shen, Yan-Wei; Li, Shu-Ting; Li, Chun-Li; Zhang, Ling-Xiao; Yang, Jiao; Lv, Meng; Lin, Ya-Yun; Wang, Xin; Yang, Jin

    2016-01-01

    Background The addition of human epidermal growth factor receptor 2 (Her2) therapies to neoadjuvant chemotherapy (NAC) during treatment of Her2-positive breast cancer has been proposed as an effective way to improve the prognosis. However, the treatment outcomes of adding trastuzumab, lapatinib, or both to NAC were not unequivocal in randomized clinical trials. Based on these data, a meta-analysis was performed. Objective The main objective was to evaluate the efficiency and safety of trastuzumab and lapatinib added to NAC for treatment of Her2-positive breast cancer. Methods ClinicalTrials.gov and PubMed were searched for randomized clinical trials that compared trastuzumab, lapatinib, or both, added to NAC. The main endpoint was a pathologically complete response (pCR) rate, in breast only or in breast and lymph nodes. The drug safety and the influence of hormone-receptor status, comparing the clinical response and the rate of breast conservation, were evaluated. Results A total of eight publications were included in the primary analysis, designed as two or three subgroups. The cumulative cases were 2,349 and the analyses of all the clinical trials showed that the pCR rate was significantly higher in the group receiving trastuzumab than that in the group with lapatinib, either in breast only (P=0.001) or in breast and lymph nodes (P=0.0001). Similar results could be seen in comparisons of the combination versus trastuzumab group. Further studies of subgroups divided into hormone receptor-positive or-negative patients showed that the addition of trastuzumab or dual Her2-targeted therapy significantly improved the pCR rate in patients who were hormone-insensitive. Regarding the toxic effects, we found more grade 3 and 4 toxic effects, such as diarrhea, skin disorder, and hepatic biochemical changes in the lapatinib and combination groups. No temporally significant differences were found when the clinical response and the rate of breast conservation in the groups

  14. New Features in ADS Labs

    NASA Astrophysics Data System (ADS)

    Accomazzi, Alberto; Kurtz, M. J.; Henneken, E. A.; Grant, C. S.; Thompson, D.; Di Milia, G.; Luker, J.; Murray, S. S.

    2013-01-01

    The NASA Astrophysics Data System (ADS) has been working hard on updating its services and interfaces to better support our community's research needs. ADS Labs is a new interface built on the old tried-and-true ADS Abstract Databases, so all of ADS's content is available through it. In this presentation we highlight the new features that have been developed in ADS Labs over the last year: new recommendations, metrics, a citation tool and enhanced fulltext search. ADS Labs has long been providing article-level recommendations based on keyword similarity, co-readership and co-citation analysis of its corpus. We have now introduced personal recommendations, which provide a list of articles to be considered based on a individual user's readership history. A new metrics interface provides a summary of the basic impact indicators for a list of records. These include the total and normalized number of papers, citations, reads, and downloads. Also included are some of the popular indices such as the h, g and i10 index. The citation helper tool allows one to submit a set of records and obtain a list of top 10 papers which cite and/or are cited by papers in the original list (but which are not in it). The process closely resembles the network approach of establishing "friends of friends" via an analysis of the citation network. The full-text search service now covers more than 2.5 million documents, including all the major astronomy journals, as well as physics journals published by Springer, Elsevier, the American Physical Society, the American Geophysical Union, and all of the arXiv eprints. The full-text search interface interface allows users and librarians to dig deep and find words or phrases in the body of the indexed articles. ADS Labs is available at http://adslabs.org

  15. Introducing ADS 2.0

    NASA Astrophysics Data System (ADS)

    Accomazzi, Alberto; Kurtz, M. J.; Henneken, E. A.; Grant, C. S.; Thompson, D.; Luker, J.; Chyla, R.; Murray, S. S.

    2014-01-01

    In the spring of 1993, the Smithsonian/NASA Astrophysics Data System (ADS) first launched its bibliographic search system. It was known then as the ADS Abstract Service, a component of the larger Astrophysics Data System effort which had developed an interoperable data system now seen as a precursor of the Virtual Observatory. As a result of the massive technological and sociological changes in the field of scholarly communication, the ADS is now completing the most ambitious technological upgrade in its twenty-year history. Code-named ADS 2.0, the new system features: an IT platform built on web and digital library standards; a new, extensible, industrial strength search engine; a public API with various access control capabilities; a set of applications supporting search, export, visualization, analysis; a collaborative, open source development model; and enhanced indexing of content which includes the full-text of astronomy and physics publications. The changes in the ADS platform affect all aspects of the system and its operations, including: the process through which data and metadata are harvested, curated and indexed; the interface and paradigm used for searching the database; and the follow-up analysis capabilities available to the users. This poster describes the choices behind the technical overhaul of the system, the technology stack used, and the opportunities which the upgrade is providing us with, namely gains in productivity and enhancements in our system capabilities.

  16. AdS3: the NHEK generation

    NASA Astrophysics Data System (ADS)

    Bena, Iosif; Heurtier, Lucien; Puhm, Andrea

    2016-05-01

    It was argued in [1] that the five-dimensional near-horizon extremal Kerr (NHEK) geometry can be embedded in String Theory as the infrared region of an infinite family of non-supersymmetric geometries that have D1, D5, momentum and KK monopole charges. We show that there exists a method to embed these geometries into asymptotically- {AdS}_3× {S}^3/{{Z}}_N solutions, and hence to obtain infinite families of flows whose infrared is NHEK. This indicates that the CFT dual to the NHEK geometry is the IR fixed point of a Renormalization Group flow from a known local UV CFT and opens the door to its explicit construction.

  17. An analysis of clinical risks in vaccine transportation.

    PubMed

    Fernando, Martina

    2004-10-01

    'Cold chain' transport is an integral part of a system of vaccine transportation that assures the potency of vaccines. If the temperature of vaccines is not kept between the ranges of 2 and 8 degrees C, this can lead to adverse effects especially for the recipients of first time immunization, as no protection is offered. This investigation has shown that there is considerable risk of vaccines being rendered impotent due to ad hoc collection of vaccines by healthcare professionals from pharmacy services, outside of the cold chain transport agreement with the vaccine supplier. This is because at present there are no guidelines for ad hoc collection of either vaccines or the approved cold chain equipment provided to transport the vaccine. The root cause analysis has shown that the general practice can manage this risk by making changes to its system for vaccine ordering, stock control and maintenance. A number of changes are proposed, including the appointment of a vaccine coordinator and the development of a protocol for ad hoc collection of vaccines from pharmacy. By focusing on improving the quality of the process, the practice can improve the care and safety of its immunization programme. PMID:15577715

  18. Impact of the AD 79 explosive eruption on Pompeii, II. Causes of death of the inhabitants inferred by stratigraphic analysis and areal distribution of the human casualties

    NASA Astrophysics Data System (ADS)

    Luongo, Giuseppe; Perrotta, Annamaria; Scarpati, Claudio; De Carolis, Ernesto; Patricelli, Giovanni; Ciarallo, Annamaria

    2003-08-01

    Detailed descriptions of the effects of explosive eruptions on urban settlements available to volcanologists are relatively rare. Apart from disease and starvation, the largest number of human deaths caused by explosive eruptions in the twentieth century are due to pyroclastic flows. The relationship between the number of victims related to a specific hazard and the presence of urban settlements in the area covered by the eruption has been shown. However, pyroclastic falls are also extremely dangerous under certain conditions. These conclusions are based on archaeological and volcanological studies carried out on the victims of the well-known AD 79 eruption of Vesuvius that destroyed and buried the Roman city of Pompeii. The stratigraphic level in the pyroclastic deposit and the location of all the casualties found are described and discussed. The total number of victims recovered during the archaeological excavations amounts to 1150. Of these, 1044 well recognisable bodies plus an additional group of 100 individuals were identified based on the analysis of several groups of scattered bones. Of the former, 394 were found in the lower pumice lapilli fall deposit and 650 in the upper stratified ash and pumice lapilli pyroclastic density currents (PDCs) deposits. In addition, a tentative evaluation suggests that 464 corpses may still be buried in the unexcavated part of the city. According to the reconstruction presented in this paper, during the first phase of the eruption (August 24, AD 79) a huge quantity of pumice lapilli fell on Pompeii burying the city under 3 m of pyroclastic material. During this eruptive phase, most of the inhabitants managed to leave the city. However, 38% of the known victims were killed during this phase mainly as a consequence of roofs and walls collapsing under the increasing weight of the pumice lapilli deposit. During the second phase of the eruption (August 25, AD 79) 49% of the total victims were on the roadways and 51% inside

  19. Shadows, currents, and AdS fields

    SciTech Connect

    Metsaev, R. R.

    2008-11-15

    Conformal totally symmetric arbitrary spin currents and shadow fields in flat space-time of dimension greater than or equal to four are studied. A gauge invariant formulation for such currents and shadow fields is developed. Gauge symmetries are realized by involving the Stueckelberg fields. A realization of global conformal boost symmetries is obtained. Gauge invariant differential constraints for currents and shadow fields are obtained. AdS/CFT correspondence for currents and shadow fields and the respective normalizable and non-normalizable solutions of massless totally symmetric arbitrary spin AdS fields are studied. The bulk fields are considered in a modified de Donder gauge that leads to decoupled equations of motion. We demonstrate that leftover on shell gauge symmetries of bulk fields correspond to gauge symmetries of boundary currents and shadow fields, while the modified de Donder gauge conditions for bulk fields correspond to differential constraints for boundary conformal currents and shadow fields. Breaking conformal symmetries, we find interrelations between the gauge invariant formulation of the currents and shadow fields, and the gauge invariant formulation of massive fields.

  20. The efficacy and safety of liraglutide added to metformin in patients with diabetes: a meta-analysis of randomized controlled trials.

    PubMed

    Gu, Jianqiu; Meng, Xin; Guo, Yan; Wang, Lei; Zheng, Hongzhi; Liu, Yixuan; Wu, Bingshu; Wang, Difei

    2016-01-01

    Liraglutide, a glucagon-like peptide (GLP-1) receptor agonist, has showed favorable effects in the glycaemic control and weight reduction in patients with type 2 diabetes mellitus (T2DM). The meta-analysis was to compare the efficacy and safety of liraglutide added to metformin with other treatments in patients with T2DM. A systematic literature search on PubMed, Embase, Web of Science and the Cochrane library databases were performed. Eligible studies were randomized controlled trials (RCTs) of patients with T2DM who received the combination treatment of liraglutide and metformin. Pooled estimates were performed using a fixed-effects model or random-effects model. A total of nine RCTs met the inclusion criteria. Compared with control (placebo, sitagliptin, glimepiride, dulaglutide, insulin glargine, and NPH), liraglutide in combination with metformin resulted in significant reductions in HbA1c, bodyweight, FPG, and PPG, and similar reductions in SBP, and DBP. Moreover, liraglutide combined with metformin did not increase the risk of hypoglycemia, but induced a higher incidence of gastrointestinal disorders. In conclusion, this meta-analysis confirmed the use of liraglutide as add-on to metformin appeared to be effective and safe for patients with T2DM. However, considering the potential limitations in this study, more large-scale, well-conducted RCTs are needed to identify our findings. PMID:27600499

  1. The efficacy and safety of liraglutide added to metformin in patients with diabetes: a meta-analysis of randomized controlled trials

    PubMed Central

    Gu, Jianqiu; Meng, Xin; Guo, Yan; Wang, Lei; Zheng, Hongzhi; Liu, Yixuan; Wu, Bingshu; Wang, Difei

    2016-01-01

    Liraglutide, a glucagon-like peptide (GLP-1) receptor agonist, has showed favorable effects in the glycaemic control and weight reduction in patients with type 2 diabetes mellitus (T2DM). The meta-analysis was to compare the efficacy and safety of liraglutide added to metformin with other treatments in patients with T2DM. A systematic literature search on PubMed, Embase, Web of Science and the Cochrane library databases were performed. Eligible studies were randomized controlled trials (RCTs) of patients with T2DM who received the combination treatment of liraglutide and metformin. Pooled estimates were performed using a fixed-effects model or random-effects model. A total of nine RCTs met the inclusion criteria. Compared with control (placebo, sitagliptin, glimepiride, dulaglutide, insulin glargine, and NPH), liraglutide in combination with metformin resulted in significant reductions in HbA1c, bodyweight, FPG, and PPG, and similar reductions in SBP, and DBP. Moreover, liraglutide combined with metformin did not increase the risk of hypoglycemia, but induced a higher incidence of gastrointestinal disorders. In conclusion, this meta-analysis confirmed the use of liraglutide as add-on to metformin appeared to be effective and safe for patients with T2DM. However, considering the potential limitations in this study, more large-scale, well-conducted RCTs are needed to identify our findings. PMID:27600499

  2. Inhibition of Hepatitis C Virus in Chimeric Mice by Short Synthetic Hairpin RNAs: Sequence Analysis of Surviving Virus Shows Added Selective Pressure of Combination Therapy

    PubMed Central

    Dallas, Anne; Ilves, Heini; Ma, Han; Chin, Daniel J.; MacLachlan, Ian; Klumpp, Klaus

    2014-01-01

    ABSTRACT We have recently shown that a cocktail of two short synthetic hairpin RNAs (sshRNAs), targeting the internal ribosome entry site of hepatitis C virus (HCV) formulated with lipid nanoparticles, was able to suppress viral replication in chimeric mice infected with HCV GT1a by up to 2.5 log10 (H. Ma et al., Gastroenterology 146:63–66.e5, http://dx.doi.org/10.1053/j.gastro.2013.09.049) Viral load remained about 1 log10 below pretreatment levels 21 days after the end of dosing. We have now sequenced the HCV viral RNA amplified from serum of treated mice after the 21-day follow-up period. Viral RNA from the HCV sshRNA-treated groups was altered in sequences complementary to the sshRNAs and nowhere else in the 500-nucleotide sequenced region, while the viruses from the control group that received an irrelevant sshRNA had no mutations in that region. The ability of the most commonly selected mutations to confer resistance to the sshRNAs was confirmed in vitro by introducing those mutations into HCV-luciferase reporters. The mutations most frequently selected by sshRNA treatment within the sshRNA target sequence occurred at the most polymorphic residues, as identified from an analysis of available clinical isolates. These results demonstrate a direct antiviral activity with effective HCV suppression, demonstrate the added selective pressure of combination therapy, and confirm an RNA interference (RNAi) mechanism of action. IMPORTANCE This study presents a detailed analysis of the impact of treating a hepatitis C virus (HCV)-infected animal with synthetic hairpin-shaped RNAs that can degrade the virus's RNA genome. These RNAs can reduce the viral load in these animals by over 99% after 1 to 2 injections. The study results confirm that the viral rebound that often occurred a few weeks after treatment is due to emergence of a virus whose genome is mutated in the sequences targeted by the RNAs. The use of two RNA inhibitors, which is more effective than use of either

  3. Pastoralism in Northern Peru during Pre-Hispanic Times: Insights from the Mochica Period (100–800 AD) Based on Stable Isotopic Analysis of Domestic Camelids

    PubMed Central

    Dufour, Elise; Goepfert, Nicolas; Gutiérrez Léon, Belkys; Chauchat, Claude; Franco Jordán, Régulo; Sánchez, Segundo Vásquez

    2014-01-01

    Llama (Lama glama) and alpaca (Vicugna pacos) are the only large domesticated animals indigenous to the Americas. Pastoralism occupies a fundamental economic, social and religious role in Andean life. Today, camelid livestock are confined to the ecozone of the puna (above 3,500 masl), while their presence on the Pacific coast during pre-Hispanic times is attested by archaeological skeletal remains. This study aims to document herding practices on the northern Peruvian coast during the Early Intermediate Period (200 BC-600 AD) by gaining insights into diet, location of breeding and mobility of archaeological camelids from the funerary and ritual contexts of two Mochica sites, Uhle Platform in Huacas de Moche and El Brujo. The three first early years and the long-term life histories of the animals were documented by the combined bulk analysis of bone collagen (δ13Ccol and δ15Ncol) and bone structural carbonate (δ13Cbone and δ18Obone) and the serial analysis of structural carbonate of molar tooth enamel (δ13Cenamel and δ18Oenamel). Mochica camelids were bred in the low and/or middle valleys, unlike their modern counterparts, who are restricted to highland puna C3 pastures. Archaeological camelids had diverse and complex life histories, usually with substantial maize foddering. An ontogenetic switch in diet and possible residential mobility during the course of life were identified for some specimens. Although the inference of geographic origin from δ18Obone and δ18Oenamel values was limited because of the lack of understanding of the influence of environmental and biological factors, tooth enamel analysis has great potential for exploring camelid herding practices and Andean pastoralism. Our study suggested that Mochica herders adapted their practices to the difficult lowland environment and that herding practices were varied and not restricted to breeding at higher altitudes. The role of maize in different aspects of the economic life of the Mochicas is also

  4. Aspects of warped AdS3/CFT2 correspondence

    NASA Astrophysics Data System (ADS)

    Chen, Bin; Zhang, Jia-Ju; Zhang, Jian-Dong; Zhong, De-Liang

    2013-04-01

    In this paper we apply the thermodynamics method to investigate the holographic pictures for the BTZ black hole, the spacelike and the null warped black holes in three-dimensional topologically massive gravity (TMG) and new massive gravity (NMG). Even though there are higher derivative terms in these theories, the thermodynamics method is still effective. It gives consistent results with the ones obtained by using asymptotical symmetry group (ASG) analysis. In doing the ASG analysis we develop a brute-force realization of the Barnich-Brandt-Compere formalism with Mathematica code, which also allows us to calculate the masses and the angular momenta of the black holes. In particular, we propose the warped AdS3/CFT2 correspondence in the new massive gravity, which states that quantum gravity in the warped spacetime could holographically dual to a two-dimensional CFT with {c_R}={c_L}=24 /{Gm{β^2√{{2( {21-4{β^2}} )}}}}.

  5. Ad-hoc design of temporally shaped fs laser pulses based on plasma dynamics for deep ablation in fused silica

    NASA Astrophysics Data System (ADS)

    Hernandez-Rueda, J.; Siegel, J.; Puerto, D.; Galvan-Sosa, M.; Gawelda, W.; Solis, J.

    2013-07-01

    We have analyzed the ablation depth yield of fused silica irradiated with shaped pulse trains with a separation of 500 fs and increasing or decreasing intensity envelopes. This temporal separation value is extracted from previous studies on ablation dynamics upon irradiation with transform-limited 100 fs laser pulses. The use of decreasing intensity pulse trains leads to a strong increase of the induced ablation depth when compared to the behavior, at the same pulse fluence, of intensity increasing pulse trains. In addition, we have studied the material response under stretched (500 fs, FWHM) and transform-limited (100 fs, FWHM) pulses, for which avalanche or multiphoton ionization respectively dominates the carrier generation process. The comparison of the corresponding evolution of the ablated depth vs. fluence suggests that the use of pulse trains with decreasing intensity at high fluences should lead to enhanced single exposure ablation depths, beyond the limits corresponding to MPI- or AI-alone dominated processes.

  6. Satellites for distress alerting and locating: Report by Interagency Committee for Search and Rescue Ad Hoc Working Group

    NASA Technical Reports Server (NTRS)

    Ehrlich, E.

    1976-01-01

    The background behind the congressional legislation that led to the requirement for the Emergency Locator Transmitter (ELT) and the Emergency Position-Indicating Radio Beacon (EPIRB) to be installed on certain types of aircraft and inspected marine vessels respectively is discussed. The DAL problem is discussed for existing ELT and EPIRB equipped aircraft and ships. It is recognized that the DAL requirement for CONUS and Alaska and the maritime regions are not identical. In order to address the serious DAL problem which currently exists in CONUS and Alaska, a low orbiting satellite system evolves as the most viable and cost effective alternative that satisfies the overall SAR system design requirements. A satellite system designed to meet the needs of the maritime regions could be either low orbiting or geostationary. The conclusions drawn from this report support the recommendation to proceed with the implementation of a SAR orbiting satellite system.

  7. Immunization coverage among splenectomized patients: Results of an ad hoc survey in Puglia Region (South of Italy).

    PubMed

    Martino, Carmen; Gallone, Maria Serena; Quarto, Michele; Germinario, Cinzia; Tafuri, Silvio

    2016-05-01

    Patients with anatomic or functional asplenia have a 10-50 times higher risk than general population to develop Overwhelming Post-Splenectomy Infection. Evidences are unanimous in recommending splenectomised patients to receive meningococcal, antipneumococcal and Haemophilus influenzae type B vaccinations according to a specific timing. In Italy there are no current data on the immunisation coverage in these patients. This study aims to investigate immunisation coverage in patients undergoing elective or urgent splenectomy for 2012-2013 in the 3 Apulian hospitals. The patients discharged with the code ICD-9-CM 41.5 - "Total splenectomy" were enrolled. The administration of vaccines was verified through consultation of medical records, archives of general practitioners and vaccination offices. In the study period, 166 subjects underwent splenectomy and none of them received vaccinations during hospitalization. 25 splenectomised patients (15.1%) received at least one of the recommended vaccinations. 21 patients (12.6%) received vaccine against Streptococcus pneumonia, 13 (7.8%) meningococcal vaccine, 10 patients (6%) Haemophilus influenzae type B vaccine. The low vaccination coverage could be due both to poor perception of the risk of infection and to a lack of knowledge on vaccinations by surgeons. For this reason it is necessary to draw up and share operational protocols that establish the administration of vaccines. PMID:26890256

  8. Select algorithm for local certificate repository of self-organized key management scheme in ad hoc networks

    NASA Astrophysics Data System (ADS)

    Liu, Shizhong; Zhang, Zongyun

    2013-07-01

    Based on the Maximum Degree Construction algorithm, a new select algorithm is proposed in this paper. In the algorithm, each node and its neighbors issue the certificates each other to generate the local In-degree and Out-degree certificate repository. Similar to the ant colony algorithm, it finds the certificate chain between the source node and destination node by selecting the node of the maximum certificated times from the beginning. The algorithm reduces the complexity of the selection, provides a guarantee to find the certificate chain, and saves the spending of space as well. Next, this paper gives the simulation of the algorithm and the simulated results show that this is an optimized select algorithm for local certificate repository.

  9. Greater Caribbean Energy and Environment Future. Ad hoc working group report, Key Biscayne, Florida, October 26-28, 1980

    SciTech Connect

    Thorhaug, A.

    1980-01-01

    This report of Workshop I (presented in outline form) by the Greater Caribbean Energy and Environment Foundation begin an intensive focus on the energy problems of the Caribbean. The process by which environmental assessments by tropical experts can be successfully integrated into energy decisions is by: (1) international loan institutions requiring or strongly recommending excellent assessments; (2) engineering awareness of total effects of energy projects; (3) governmental environmental consciousness-raising with regard to natural resource value and potential inadvertent and unnecessary resource losses during energy development; and (4) media participation. Section headings in the outline are: preamble; introduction; research tasks: today and twenty years hence; needed research, demonstration and information dissemination projects to get knowledge about Caribbean energy-environment used; summary; recommendations; generalized conclusions; and background literature. (JGB)

  10. Critical gaps in the world's largest electronic medical record: Ad Hoc nursing narratives and invisible adverse drug events.

    PubMed

    Hurdle, John F; Weir, Charlene R; Roth, Beverly; Hoffman, Jennifer; Nebeker, Jonathan R

    2003-01-01

    The Veterans Health Administration (VHA), of the U.S. Department of Veteran Affairs, operates one of the largest healthcare networks in the world. Its electronic medical record (EMR) is fully integrated into clinical practice, having evolved over several decades of design, testing, trial, and error. It is unarguably the world's largest EMR, and as such it makes an important case study for a host of timely informatics issues. The VHA consistently has been at the vanguard of patient safety, especially in its provider-oriented EMR. We describe here a study of a large set of adverse drug events (ADEs) that eluded a rigorous ADE survey based on prospective EMR chart review. These numerous ADEs were undetected (and hence invisible) in the EMR, missed by an otherwise sophisticated ADE detection scheme. We speculate how these invisible nursing ADE narratives persist and what they portend for safety re-engineering. PMID:14728184

  11. The Role of Reading in a Japanese Language Program: A Response to the MLA Ad Hoc Committee's Report (2007)

    ERIC Educational Resources Information Center

    Marcus, Ginger

    2010-01-01

    Reading is defined as a socio-cultural act negotiated between text and reader, and the act of reading is considered to be a cognitive process that involves knowledge not only of symbols/letters, vocabulary and structure, but also of culture. In other words, in order to understand the intentions of the author and to formulate meaning, the second…

  12. Gas-kinetic theory and Boltzmann equation of share price within an equilibrium market hypothesis and ad hoc strategy

    NASA Astrophysics Data System (ADS)

    Ausloos, M.

    2000-09-01

    Recent observations have indicated that the traditional equilibrium market hypothesis (EMH; also known as Efficient Market Hypothesis) is unrealistic. It is shown here that it is the analog of a Boltzmann equation in physics, thus having some bad properties of mean-field approximations like a Gaussian distribution of price fluctuations. A kinetic theory for prices can be simply derived, considering in a first approach that market actors have all identical relaxation times, and solved within a Chapman-Enskog like formalism. In closing the set of equations, (i) an equation of state with a pressure and (ii) the equilibrium (isothermal) equation for the price (taken as the order parameter) of a stock as a function of the volume of money available are obtained.

  13. 76 FR 71308 - Codex Alimentarius Commission: Meeting of the Ad Hoc Intergovernmental Codex Task Force on Animal...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-17

    ... all its programs and activities on the basis of race, color, national origin, gender, religion, age, disability, political beliefs, sexual orientation, and marital or family status (Not all prohibited...

  14. 78 FR 1196 - Codex Alimentarius Commission: Meeting of the Ad Hoc Codex Intergovernmental Task Force on Animal...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-08

    ... discrimination in all its programs and activities on the basis of race, color, national origin, gender, religion, age, disability, political beliefs, sexual orientation, and marital or family status. (Not...

  15. Unsupervised learning in persistent sensing for target recognition by wireless ad hoc networks of ground-based sensors

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2008-04-01

    In previous work by the author, effective persistent and pervasive sensing for recognition and tracking of battlefield targets were seen to be achieved, using intelligent algorithms implemented by distributed mobile agents over a composite system of unmanned aerial vehicles (UAVs) for persistence and a wireless network of unattended ground sensors for pervasive coverage of the mission environment. While simulated performance results for the supervised algorithms of the composite system are shown to provide satisfactory target recognition over relatively brief periods of system operation, this performance can degrade by as much as 50% as target dynamics in the environment evolve beyond the period of system operation in which the training data are representative. To overcome this limitation, this paper applies the distributed approach using mobile agents to the network of ground-based wireless sensors alone, without the UAV subsystem, to provide persistent as well as pervasive sensing for target recognition and tracking. The supervised algorithms used in the earlier work are supplanted by unsupervised routines, including competitive-learning neural networks (CLNNs) and new versions of support vector machines (SVMs) for characterization of an unknown target environment. To capture the same physical phenomena from battlefield targets as the composite system, the suite of ground-based sensors can be expanded to include imaging and video capabilities. The spatial density of deployed sensor nodes is increased to allow more precise ground-based location and tracking of detected targets by active nodes. The "swarm" mobile agents enabling WSN intelligence are organized in a three processing stages: detection, recognition and sustained tracking of ground targets. Features formed from the compressed sensor data are down-selected according to an information-theoretic algorithm that reduces redundancy within the feature set, reducing the dimension of samples used in the target recognition and tracking routines. Target tracking is based on simplified versions of Kalman filtration. Accuracy of recognition and tracking of implemented versions of the proposed suite of unsupervised algorithms is somewhat degraded from the ideal. Target recognition and tracking by supervised routines and by unsupervised SVM and CLNN routines in the ground-based WSN is evaluated in simulations using published system values and sensor data from vehicular targets in ground-surveillance scenarios. Results are compared with previously published performance for the system of the ground-based sensor network (GSN) and UAV swarm.

  16. Vehicle monitoring under Vehicular Ad-Hoc Networks (VANET) parameters employing illumination invariant correlation filters for the Pakistan motorway police

    NASA Astrophysics Data System (ADS)

    Gardezi, A.; Umer, T.; Butt, F.; Young, R. C. D.; Chatwin, C. R.

    2016-04-01

    A spatial domain optimal trade-off Maximum Average Correlation Height (SPOT-MACH) filter has been previously developed and shown to have advantages over frequency domain implementations in that it can be made locally adaptive to spatial variations in the input image background clutter and normalised for local intensity changes. The main concern for using the SPOT-MACH is its computationally intensive nature. However in the past enhancements techniques were proposed for the SPOT-MACH to make its execution time comparable to its frequency domain counterpart. In this paper a novel approach is discussed which uses VANET parameters coupled with the SPOT-MACH in order to minimise the extensive processing of the large video dataset acquired from the Pakistan motorways surveillance system. The use of VANET parameters gives us an estimation criterion of the flow of traffic on the Pakistan motorway network and acts as a precursor to the training algorithm. The use of VANET in this scenario would contribute heavily towards the computational complexity minimization of the proposed monitoring system.

  17. Using Surveillance of Mental Health to Increase Understanding of Youth Involvement in High-Risk Behaviors: A Value-Added Analysis

    ERIC Educational Resources Information Center

    Dowdy, Erin; Furlong, Michael J.; Sharkey, Jill D.

    2013-01-01

    This study examined the potential utility of adding items that assessed youths' emotional and behavioral disorders to a commonly used surveillance survey. The goal was to evaluate whether the added items could enhance understanding of youths' involvement in high-risk behaviors. A sample of 3,331 adolescents in Grades 8, 10, and 12 from four…

  18. Does Student Sorting Invalidate Value-Added Models of Teacher Effectiveness? An Extended Analysis of the Rothstein Critique. Working Paper 2009-01

    ERIC Educational Resources Information Center

    Koedel, Cory; Betts, Julian R.

    2009-01-01

    Value-added modeling continues to gain traction as a tool for measuring teacher performance. However, recent research (Rothstein, 2009a, 2009b) questions the validity of the value-added approach by showing that it does not mitigate student teacher sorting bias (its presumed primary benefit). Our study explores this critique in more detail.…

  19. Detection of adulteration in mulberry pekmez samples added various sugar syrups with ¹³C/¹²C isotope ratio analysis method.

    PubMed

    Tosun, Murat

    2014-12-15

    Mulberry pekmez can be adulterated in different ways either during the production process or after production is completed. To identify these adulterations, stable carbon isotope ratio analysis (SCIRA) was performed on the model examples prepared by adding saccharose syrup (SS), glucose syrup (GS) and high fructose corn syrup (HFCS) into two different pure mulberry pekmez samples in the ratios of 0%, 10%, 30% and 50%. The δ(13)C ratio of the pure mulberry pekmez was determined as -26.60‰ on average, the saccharose syrup as -24.80‰, the glucose syrup as -11.20‰ and the high-fructose corn syrup as -11.40‰. In identifying the adulteration made to pekmez, especially with the high-fructose corn syrup, which is obtained from corn starch, and with the glucose syrup, the δ(13)C ratio comes into prominence. However it remains impossible identify the adulterations made with the saccharose, which is obtained from beet sugar, or invert sugar syrups. PMID:25038711

  20. Critical gravity on AdS2 spacetimes

    NASA Astrophysics Data System (ADS)

    Myung, Yun Soo; Kim, Yong-Wan; Park, Young-Jai

    2011-09-01

    We study the critical gravity in two-dimensional anti-de Sitter (AdS2) spacetimes, which was obtained from the cosmological topologically massive gravity (TMGΛ) in three dimensions by using the Kaluza-Klein dimensional reduction. We perform the perturbation analysis around AdS2, which may correspond to the near-horizon geometry of the extremal Banados, Teitelboim, and Zanelli (BTZ) black hole obtained from the TMGΛ with identification upon uplifting three dimensions. A massive propagating scalar mode δF satisfies the second-order differential equation away from the critical point of K=l, whose solution is given by the Bessel functions. On the other hand, δF satisfies the fourth-order equation at the critical point. We exactly solve the fourth-order equation, and compare it with the log gravity in two dimensions. Consequently, the critical gravity in two dimensions could not be described by a massless scalar δFml and its logarithmic partner δFlog⁡4th.

  1. ADS pilot program Plan

    NASA Technical Reports Server (NTRS)

    Clauson, J.; Heuser, J.

    1981-01-01

    The Applications Data Service (ADS) is a system based on an electronic data communications network which will permit scientists to share the data stored in data bases at universities and at government and private installations. It is designed to allow users to readily locate and access high quality, timely data from multiple sources. The ADS Pilot program objectives and the current plans for accomplishing those objectives are described.

  2. Analysis of the improvement in sky coverage for multiconjugate adaptive optics systems obtained using minimum variance split tomography.

    PubMed

    Wang, Lianqi; Gilles, Luc; Ellerbroek, Brent

    2011-06-20

    The scientific utility of laser-guide-star-based multiconjugate adaptive optics systems depends upon high sky coverage. Previously we reported a high-fidelity sky coverage analysis of an ad hoc split tomography control algorithm and a postprocessing simulation technique. In this paper, we present the performance of a newer minimum variance split tomography algorithm, and we show that it brings a median improvement at zenith of 21 nm rms optical path difference error over the ad hoc split tomography control algorithm for our system, the Narrow Field Infrared Adaptive Optics System for the Thirty Meter Telescope. In order to make the comparison, we also validated our previously developed sky coverage postprocessing software using an integrated simulation of both high- (laser guide star) and low-order (natural guide star) loops. A new term in the noise model is also identified that improves the performance of both algorithms by more properly regularizing the reconstructor. PMID:21691367

  3. Meta-analysis of the efficacy and safety of adding an angiotensin receptor blocker (ARB) to a calcium channel blocker (CCB) following ineffective CCB monotherapy

    PubMed Central

    Ma, Jin; Wang, Xiao-Yan; Hu, Zhi-De; Zhou, Zhi-Rui; Schoenhagen, Paul

    2015-01-01

    Background We conducted this meta-analysis to systematically review and analyze the clinical benefits of angiotensin receptor blocker (ARB) combined with calcium channel blocker (CCB) following ineffective CCB monotherapy. Methods PubMed was searched for articles published until August 2015. Randomized controlled trials (RCTs) evaluating the clinical benefits of ARB combined with CCB following ineffective CCB monotherapy were included. The primary efficacy endpoint of the studies was normal rate of blood pressure, the secondary efficacy endpoints were the response rate and change in blood pressure from baseline. The safety endpoint of the studies was incidence of adverse events. Differences are expressed as relative risks (RRs) with 95% confidence intervals (CIs) for dichotomous outcomes and weighted mean differences (WMDs) with 95% CIs for continuous outcomes. Heterogeneity across studies was tested by using the I2 statistic. Results Seven RCTs were included and had sample sizes ranging from 185 to 1,183 subjects (total: 3,909 subjects). The pooled analysis showed that the on-target rate of hypertension treatment was significantly higher in the amlodipine + ARB group than in the amlodipine monotherapy group (RR =1.59; 95% CI, 1.31–1.91; P<0.01). The response rate of systolic blood pressure (SBP) (RR =1.28; 95% CI, 1.04–1.58; P<0.01) and diastolic blood pressure (DBP) (RR =1.27; 95% CI, 1.12–1.44; P=0.04) were significantly higher in the amlodipine + ARB group than in the amlodipine monotherapy group. The change in SBP (RR =−3.56; 95% CI, −7.76–0.63; P=0.10) and DBP (RR =−3.03; 95% CI, −6.51–0.45; P=0.09) were higher in hypertensive patients receiving amlodipine + ARB but the difference did not reach statistical significance. ARB + amlodipine treatment carried a lower risk of adverse events relative to amlodipine monotherapy (RR =0.88; 95% CI, 0.80-0.96; P<0.01). Conclusions The results of our meta-analysis demonstrate that adding an ARB to CCB

  4. Resistivity tomography of Pointe du Hoc cliffs for stability assessment

    NASA Astrophysics Data System (ADS)

    Udphuay, S.; Everett, M. E.; Warden, R.

    2008-12-01

    Pointe du Hoc WWII battlefield overlooking the English Channel in western Normandy, France, is an important cultural resource, being an integral component of the June 6 1944 D-Day invasion. Two major buildings, the forward observation post (OP) and Col. Rudder's command post (RCP), are now perched perilously close to the cliff's edge owing to six decades of cliff retreat. Geophysical surveys were carried out in March 2008 to investigate the risk of cliff failure and to inform possible geotechnical remediation strategies with a final goal toward re-opening the observation post that is now closed to visitors. The geophysical surveying is accomplished by high-resolution resistivity tomography, conducted in extreme topography and in the midst of dense cultural clutter. The results of the OP tomography indicate that the highest mass movement hazard is associated with the marine caverns at the base of the cliff at the point of strongest wave attack. These caverns occupy the future site of a sea arch which will threaten the OP building. There is a high probability of a soil wedge failure on the east facing cliff edge close to the OP building. Such a failure could damage or destroy the building. The possibility of a sudden catastrophic failure along any one of these fractures cannot be ruled out. The greatest risk at the RCP site, which is under less immediate threat, is associated with soil wedge failures at the top of the cliffs.

  5. Functional Analysis of Amorpha-4,11-Diene Synthase (ADS) Homologs from Non-Artemisinin-Producing Artemisia Species: The Discovery of Novel Koidzumiol and (+)-α-Bisabolol Synthases.

    PubMed

    Muangphrom, Paskorn; Seki, Hikaru; Suzuki, Munenori; Komori, Aya; Nishiwaki, Mika; Mikawa, Ryota; Fukushima, Ery Odette; Muranaka, Toshiya

    2016-08-01

    The production of artemisinin, the most effective antimalarial compound, is limited to Artemisia annua. Enzymes involved in artemisinin biosynthesis include amorpha-4,11-diene synthase (ADS), amorpha-4,11-diene 12-monooxygenase (CYP71AV1) and artemisinic aldehyde Δ(11)13 reductase (DBR2). Although artemisinin and its specific intermediates are not detected in other Artemisia species, we reported previously that CYP71AV1 and DBR2 homologs were expressed in some non-artemisinin-producing Artemisia plants. These homologous enzymes showed similar functions to their counterparts in A. annua and can convert fed intermediates into the following products along the artemisinin biosynthesis in planta These findings suggested a partial artemisinin-producing ability in those species. In this study, we examined genes highly homologous to ADS, the first committed gene in the pathway, in 13 Artemisia species. We detected ADS homologs in A. absinthium, A. kurramensis and A. maritima. We analyzed the enzymatic functions of all of the ADS homologs after obtaining their cDNA. We found that the ADS homolog from A. absinthium exhibited novel activity in the cyclization of farnesyl pyrophosphate (FPP) to koidzumiol, a rare natural sesquiterpenoid. Those from A. kurramensis and A. maritima showed similar, but novel, activities in the cyclization of FPP to (+)-α-bisabolol. The unique functions of the novel sesquiterpene synthases highly homologous to ADS found in this study could provide insight into the molecular basis of the exceptional artemisinin-producing ability in A. annua. PMID:27273626

  6. Sequencing and Phylogenetic Analysis of Near Full-Length HIV-1 Subtypes A, B, G and Unique Recombinant AC and AD Viral Strains Identified in South Africa

    PubMed Central

    Wilkinson, Eduan; Holzmayer, Vera; Jacobs, Graeme B.; de Oliveira, Tulio; Brennan, Catherine A.; Hackett, John; van Rensburg, Estrelita Janse

    2015-01-01

    Abstract By the end of 2012, more than 6.1 million people were infected with HIV-1 in South Africa. Subtype C was responsible for the majority of these infections and more than 300 near full-length genomes (NFLGs) have been published. Currently very few non-subtype C isolates have been identified and characterized within the country, particularly full genome non-C isolates. Seven patients from the Tygerberg Virology (TV) cohort were previously identified as possible non-C subtypes and were selected for further analyses. RNA was isolated from five individuals (TV047, TV096, TV101, TV218, and TV546) and DNA from TV016 and TV1057. The NFLGs of these samples were amplified in overlapping fragments and sequenced. Online subtyping tools REGA version 3 and jpHMM were used to screen for subtypes and recombinants. Maximum likelihood (ML) phylogenetic analysis (phyML) was used to infer subtypes and SimPlot was used to confirm possible intersubtype recombinants. We identified three subtype B (TV016, TV047, and TV1057) isolates, one subtype A1 (TV096), one subtype G (TV546), one unique AD (TV101), and one unique AC (TV218) recombinant form. This is the first NFLG of subtype G that has been described in South Africa. The subtype B sequences described also increased the NFLG subtype B sequences in Africa from three to six. There is a need for more NFLG sequences, as partial HIV-1 sequences may underrepresent viral recombinant forms. It is also necessary to continue monitoring the evolution and spread of HIV-1 in South Africa, because understanding viral diversity may play an important role in HIV-1 prevention strategies. PMID:25492033

  7. Innovations Without Added Costs

    ERIC Educational Resources Information Center

    Cereghino, Edward

    1974-01-01

    There is no question that we are in a tight money market, and schools are among the first institutions to feel the squeeze. Therefore, when a plan is offered that provides for innovations without added costs, its something worth noting. (Editor)

  8. What Value "Value Added"?

    ERIC Educational Resources Information Center

    Richards, Andrew

    2015-01-01

    Two quantitative measures of school performance are currently used, the average points score (APS) at Key Stage 2 and value-added (VA), which measures the rate of academic improvement between Key Stage 1 and 2. These figures are used by parents and the Office for Standards in Education to make judgements and comparisons. However, simple…

  9. Introducing ADS Labs

    NASA Astrophysics Data System (ADS)

    Accomazzi, Alberto; Henneken, E.; Grant, C. S.; Kurtz, M. J.; Di Milia, G.; Luker, J.; Thompson, D. M.; Bohlen, E.; Murray, S. S.

    2011-05-01

    ADS Labs is a platform that ADS is introducing in order to test and receive feedback from the community on new technologies and prototype services. Currently, ADS Labs features a new interface for abstract searches, faceted filtering of results, visualization of co-authorship networks, article-level recommendations, and a full-text search service. The streamlined abstract search interface provides a simple, one-box search with options for ranking results based on a paper relevancy, freshness, number of citations, and downloads. In addition, it provides advanced rankings based on collaborative filtering techniques. The faceted filtering interface allows users to narrow search results based on a particular property or set of properties ("facets"), allowing users to manage large lists and explore the relationship between them. For any set or sub-set of records, the co-authorship network can be visualized in an interactive way, offering a view of the distribution of contributors and their inter-relationships. This provides an immediate way to detect groups and collaborations involved in a particular research field. For a majority of papers in Astronomy, our new interface will provide a list of related articles of potential interest. The recommendations are based on a number of factors, including text similarity, citations, and co-readership information. The new full-text search interface allows users to find all instances of particular words or phrases in the body of the articles in our full-text archive. This includes all of the scanned literature in ADS as well as a select portion of the current astronomical literature, including ApJ, ApJS, AJ, MNRAS, PASP, A&A, and soon additional content from Springer journals. Fulltext search results include a list of the matching papers as well as a list of "snippets" of text highlighting the context in which the search terms were found. ADS Labs is available at http://adslabs.org

  10. The forecaster's added value

    NASA Astrophysics Data System (ADS)

    Turco, M.; Milelli, M.

    2009-09-01

    skill scores of two competitive forecast. It is important to underline that the conclusions refer to the analysis of the Piemonte operational alert system, so they cannot be directly taken as universally true. But we think that some of the main lessons that can be derived from this study could be useful for the meteorological community. In details, the main conclusions are the following: - despite the overall improvement in global scale and the fact that the resolution of the limited area models has increased considerably over recent years, the QPF produced by the meteorological models involved in this study has not improved enough to allow its direct use, that is, the subjective HQPF continues to offer the best performance; - in the forecast process, the step where humans have the largest added value with respect to mathematical models, is the communication. In fact the human characterisation and communication of the forecast uncertainty to end users cannot be replaced by any computer code; - eventually, although there is no novelty in this study, we would like to show that the correct application of appropriated statistical techniques permits a better definition and quantification of the errors and, mostly important, allows a correct (unbiased) communication between forecasters and decision makers.

  11. Exploratory data analysis using set operations and ordinal mapping.

    PubMed

    Churches, Tim

    2003-05-01

    Exploratory data analysis requires the ability to issue ad hoc queries to filter and summarise data sets. As the sizes of health data sets grow, traditional methods of processing data have difficulty in providing acceptable response times for such queries. An alternative method is described which combines complete vertical partitioning of data with set operations on ordinal mappings (SOOM). An initial implementation of the technique provides significantly better performance than a conventional SQL database on typical exploratory data analysis queries. The use of parallel, distributed computation to further increase the performance of the technique appears to be feasible. PMID:12725961

  12. Ockham's razor and Bayesian analysis. [statistical theory for systems evaluation

    NASA Technical Reports Server (NTRS)

    Jefferys, William H.; Berger, James O.

    1992-01-01

    'Ockham's razor', the ad hoc principle enjoining the greatest possible simplicity in theoretical explanations, is presently shown to be justifiable as a consequence of Bayesian inference; Bayesian analysis can, moreover, clarify the nature of the 'simplest' hypothesis consistent with the given data. By choosing the prior probabilities of hypotheses, it becomes possible to quantify the scientific judgment that simpler hypotheses are more likely to be correct. Bayesian analysis also shows that a hypothesis with fewer adjustable parameters intrinsically possesses an enhanced posterior probability, due to the clarity of its predictions.

  13. Algorithmic, LOCS and HOCS (chemistry) exam questions: performance and attitudes of college students

    NASA Astrophysics Data System (ADS)

    Zoller, Uri

    2002-02-01

    The performance of freshmen biology and physics-mathematics majors and chemistry majors as well as pre- and in-service chemistry teachers in two Israeli universities on algorithmic (ALG), lower-order cognitive skills (LOCS), and higher-order cognitive skills (HOCS) chemistry exam questions were studied. The driving force for the study was an interest in moving science and chemistry instruction from an algorithmic and factual recall orientation dominated by LOCS, to a decision-making, problem-solving and critical system thinking approach, dominated by HOCS. College students' responses to the specially designed ALG, LOCS and HOCS chemistry exam questions were scored and analysed for differences and correlation between the performance means within and across universities by the questions' category. This was followed by a combined student interview - 'speaking aloud' problem solving session for assessing the thinking processes involved in solving these types of questions and the students' attitudes towards them. The main findings were: (1) students in both universities performed consistently in each of the three categories in the order of ALG > LOCS > HOCS; their 'ideological' preference, was HOCS > algorithmic/LOCS, - referred to as 'computational questions', but their pragmatic preference was the reverse; (2) success on algorithmic/LOCS does not imply success on HOCS questions; algorithmic questions constitute a category on its own as far as students success in solving them is concerned. Our study and its results support the effort being made, worldwide, to integrate HOCS-fostering teaching and assessment strategies and, to develop HOCS-oriented science-technology-environment-society (STES)-type curricula within science and chemistry education.

  14. A high resolution method for 14C analysis of a coral from South China Sea: Implication for "AD 775" 14C event

    NASA Astrophysics Data System (ADS)

    Ding, Ping; Shen, Chengde; Yi, Weixi; Wang, Ning; Ding, Xingfang; Liu, Kexin; Fu, Dongpo; Liu, Weiguo; Liu, Yi

    2015-10-01

    A pre-heating method that improves the background and precision of 14C dating significantly was applied for fossil coral dating with high resolution in our lab in Guangzhou Institute of Geochemistry, Chinese Academy of Sciences (GIGCAS). The reaction tube is heated under 300 °C in a vacuum line before it is used for graphitization. The method can reduce the contamination absorbed in TiH2, Zn and Fe power placed in the graphitization tube. With the pre-heating and average drilling method, bi-weekly resolution 14C dating in a fossil coral is carried out to investigate the "AD 775 14C spike event". Different from the tree ring 14C archives with the 14C spike of ∼15‰ (Δ14C), the 14C spike in the coral shows an abrupt peak of 45‰ and two smaller spikes of Δ14C > 20‰ in half a year in AD 776. And then, the 14C content in coral decreases gradually in AD 777. The peak time of the 14C spike event likely occurs in the summer of AD 776 according to the δ18O variation in coral. High-resolution dating of 14C in coral provides not only a more detail process of the event than that from tree rings, but also the first report of the event from sea ecosystem. Both of them suggest an extraterrestrial origin of the event cause.

  15. Two Virasoro symmetries in stringy warped AdS3

    NASA Astrophysics Data System (ADS)

    Compère, Geoffrey; Guica, Monica; Rodriguez, Maria J.

    2014-12-01

    We study three-dimensional consistent truncations of type IIB supergravity which admit warped AdS3 solutions. These theories contain subsectors that have no bulk dynamics. We show that the symplectic form for these theories, when restricted to the non-dynamical subsectors, equals the symplectic form for pure Einstein gravity in AdS3. Consequently, for each consistent choice of boundary conditions in AdS3, we can define a consistent phase space in warped AdS3 with identical conserved charges. This way, we easily obtain a Virasoro × Virasoro asymptotic symmetry algebra in warped AdS3; two different types of Virasoro × Kač-Moody symmetries are also consistent alternatives.

  16. Leading Change, Adding Value.

    PubMed

    Evans, Nick

    2016-09-12

    Essential facts Leading Change, Adding Value is NHS England's new nursing and midwifery framework. It is designed to build on Compassion in Practice (CiP), which was published 3 years ago and set out the 6Cs: compassion, care, commitment, courage, competence and communication. CiP established the values at the heart of nursing and midwifery, while the new framework sets out how staff can help transform the health and care sectors to meet the aims of the NHS England's Five Year Forward View. PMID:27615573

  17. An EEG–MEG Dissociation between Online Syntactic Comprehension and Post Hoc Reanalysis

    PubMed Central

    Meltzer, Jed A.; Braun, Allen R.

    2011-01-01

    Successful comprehension of syntactically complex sentences depends on online language comprehension mechanisms as well as reanalysis in working memory. To differentiate the neural substrates of these processes, we recorded electroencephalography and magnetoencephalography (MEG) during sentence-picture-matching in healthy subjects, assessing the effects of two difficulty factors: syntactic complexity (object-embedded vs. subject-embedded relative clauses) and semantic reversibility on neuronal oscillations during sentence presentation, and during a subsequent memory delay prior to picture onset. Synthetic Aperture magnetometry analysis of MEG showed that semantic reversibility induced left lateralized perisylvian power decreases in a broad frequency range, approximately 8–30 Hz. This effect followed the relative clause presentation and persisted throughout the remainder of the sentence and the subsequent memory delay period, shifting to a more frontal distribution during the delay. In contrast, syntactic complexity induced enhanced power decreases only during the delay period, in bilateral frontal and anterior temporal regions. These results indicate that detailed syntactic parsing of auditory language input may be augmented in the absence of alternative cues for thematic role assignment, as reflected by selective perisylvian engagement for reversible sentences, compared with irreversible sentences in which world knowledge constrains possible thematic roles. Furthermore, comprehension of complex syntax appears to depend on post hoc reanalysis in working memory implemented by frontal regions in both hemispheres. PMID:21331355

  18. An EEG-MEG Dissociation between Online Syntactic Comprehension and Post Hoc Reanalysis.

    PubMed

    Meltzer, Jed A; Braun, Allen R

    2011-01-01

    Successful comprehension of syntactically complex sentences depends on online language comprehension mechanisms as well as reanalysis in working memory. To differentiate the neural substrates of these processes, we recorded electroencephalography and magnetoencephalography (MEG) during sentence-picture-matching in healthy subjects, assessing the effects of two difficulty factors: syntactic complexity (object-embedded vs. subject-embedded relative clauses) and semantic reversibility on neuronal oscillations during sentence presentation, and during a subsequent memory delay prior to picture onset. Synthetic Aperture magnetometry analysis of MEG showed that semantic reversibility induced left lateralized perisylvian power decreases in a broad frequency range, approximately 8-30 Hz. This effect followed the relative clause presentation and persisted throughout the remainder of the sentence and the subsequent memory delay period, shifting to a more frontal distribution during the delay. In contrast, syntactic complexity induced enhanced power decreases only during the delay period, in bilateral frontal and anterior temporal regions. These results indicate that detailed syntactic parsing of auditory language input may be augmented in the absence of alternative cues for thematic role assignment, as reflected by selective perisylvian engagement for reversible sentences, compared with irreversible sentences in which world knowledge constrains possible thematic roles. Furthermore, comprehension of complex syntax appears to depend on post hoc reanalysis in working memory implemented by frontal regions in both hemispheres. PMID:21331355

  19. A web-based electronic patient record (ePR) system for data integration in movement analysis research on wheel-chair users to minimize shoulder pain

    NASA Astrophysics Data System (ADS)

    Deshpande, Ruchi R.; Requejo, Philip; Sutisna, Erry; Wang, Ximing; Liu, Margaret; McNitt-Gray, Sarah; Ruparel, Puja; Liu, Brent J.

    2012-02-01

    Patients confined to manual wheel-chairs are at an added risk of shoulder injury. There is a need for developing optimal bio-mechanical techniques for wheel-chair propulsion through movement analysis. Data collected is diverse and in need of normalization and integration. Current databases are ad-hoc and do not provide flexibility, extensibility and ease of access. The need for an efficient means to retrieve specific trial data, display it and compare data from multiple trials is unmet through lack of data association and synchronicity. We propose the development of a robust web-based ePR system that will enhance workflow and facilitate efficient data management.

  20. Effect of adding gefitinib to neoadjuvant chemotherapy in estrogen receptor negative early breast cancer in a randomized phase II trial.

    PubMed

    Bernsdorf, Mogens; Ingvar, Christian; Jörgensen, Leif; Tuxen, Malgorzata K; Jakobsen, Erik H; Saetersdal, Anna; Kimper-Karl, Marie Louise; Kroman, Niels; Balslev, Eva; Ejlertsen, Bent

    2011-04-01

    Gefitinib, an epidermal growth factor receptor tyrosine kinase inhibitor, has shown both anti-proliferative and anti-tumoral activity in breast cancer. This study was designed to determine the effect of adding gefitinib to neoadjuvant epirubicin and cyclophosphamide (EC) on tumor response rates. Women with unilateral, primary operable, estrogen receptor negative invasive breast cancer ≥ 2 cm were eligible for inclusion. Randomized patients were to receive four cycles of neoadjuvant EC plus 12 weeks of either gefitinib (250 mg daily) or placebo. Primary endpoint was pathologic complete response (pCR), and secondary endpoints were complete response (CR) and overall objective response (OR). 181 patients were randomized. A pCR was observed in 17% (12/71) of patients treated with gefitinib and in 12% (9/73) of patients treated with placebo (4.57% difference, 95% CI -7.19 to 6.33; P = 0.44). CR was observed in 10% of patients in both the gefitinib (7/71) and the placebo group (7/73) (0.27% difference, 95% CI -9.6 to 10.2; P = 0.96). There was no significant difference in OR (5.96%; 95% CI -9.9 to 21.9; P = 0.45) between the two groups. Post hoc subgroup analysis showed a significant difference in pCR between triple negative breast cancer (TNBC) and non-TNBC tumors (P = 0.03). More patients in the gefitinib arm had hematological toxicity (P = 0.15) and discontinued treatment (9/94 vs. 2/86) because of adverse events (AE). Tumor response rates were similar in the two groups. A significantly higher pCR rate was observed post hoc in TNBC versus non-TNBC independent of treatment. More patients in the gefitinib group discontinued treatment because of AE. PMID:21234672