Science.gov

Sample records for ad hoc models

  1. Ground-based observations and AD HOC models

    NASA Astrophysics Data System (ADS)

    Ground based observations of B stars in the visible, the infrared, and the radio region are described along with the ad hoc models proposed to interpret them. It is shown that these observations refer essentially to the photosphere and to the regions of the outer atmosphere where the gas is cool and at low velocity. The characteristics of the variability of the continuous and line spectrum are examined in general and in the cases of individual stars. Finally, linear polarization in the B stars is discussed.

  2. Realistic Mobility Modeling for Vehicular Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Akay, Hilal; Tugcu, Tuna

    2009-08-01

    Simulations used for evaluating the performance of routing protocols for Vehicular Ad Hoc Networks (VANET) are mostly based on random mobility and fail to consider individual behaviors of the vehicles. Unrealistic assumptions about mobility produce misleading results about the behavior of routing protocols in real deployments. In this paper, a realistic mobility modeling tool, Mobility for Vehicles (MOVE), which considers the basic mobility behaviors of vehicles, is proposed for a more accurate evaluation. The proposed model is tested against the Random Waypoint (RWP) model using AODV and OLSR protocols. The results show that the mobility model significantly affects the number of nodes within the transmission range of a node, the volume of control traffic, and the number of collisions. It is shown that number of intersections, grid size, and node density are important parameters when dealing with VANET performance.

  3. Preferential survival in models of complex ad hoc networks

    NASA Astrophysics Data System (ADS)

    Kong, Joseph S.; Roychowdhury, Vwani P.

    2008-05-01

    There has been a rich interplay in recent years between (i) empirical investigations of real-world dynamic networks, (ii) analytical modeling of the microscopic mechanisms that drive the emergence of such networks, and (iii) harnessing of these mechanisms to either manipulate existing networks, or engineer new networks for specific tasks. We continue in this vein, and study the deletion phenomenon in the web by the following two different sets of websites (each comprising more than 150,000 pages) over a one-year period. Empirical data show that there is a significant deletion component in the underlying web networks, but the deletion process is not uniform. This motivates us to introduce a new mechanism of preferential survival (PS), where nodes are removed according to the degree-dependent deletion kernel, D(k)∝k, with α≥0. We use the mean-field rate equation approach to study a general dynamic model driven by Preferential Attachment (PA), Double PA (DPA), and a tunable PS (i.e., with any α>0), where c nodes ( c<1) are deleted per node added to the network, and verify our predictions via large-scale simulations. One of our results shows that, unlike in the case of uniform deletion (i.e., where α=0), the PS kernel when coupled with the standard PA mechanism, can lead to heavy-tailed power-law networks even in the presence of extreme turnover in the network. Moreover, a weak DPA mechanism, coupled with PS, can help to make the network even more heavy-tailed, especially in the limit when deletion and insertion rates are almost equal, and the overall network growth is minimal. The dynamics reported in this work can be used to design and engineer stable ad hoc networks and explain the stability of the power-law exponents observed in real-world networks.

  4. Voice Communications over 802.11 Ad Hoc Networks: Modeling, Optimization and Call Admission Control

    NASA Astrophysics Data System (ADS)

    Xu, Changchun; Xu, Yanyi; Liu, Gan; Liu, Kezhong

    Supporting quality-of-service (QoS) of multimedia communications over IEEE 802.11 based ad hoc networks is a challenging task. This paper develops a simple 3-D Markov chain model for queuing analysis of IEEE 802.11 MAC layer. The model is applied for performance analysis of voice communications over IEEE 802.11 single-hop ad hoc networks. By using the model, we finish the performance optimization of IEEE MAC layer and obtain the maximum number of voice calls in IEEE 802.11 ad hoc networks as well as the statistical performance bounds. Furthermore, we design a fully distributed call admission control (CAC) algorithm which can provide strict statistical QoS guarantee for voice communications over IEEE 802.11 ad hoc networks. Extensive simulations indicate the accuracy of the analytical model and the CAC scheme.

  5. Developing a Conceptual Unmanned Aerial Vehicle Communications Mobile AD Hoc Network Simulation Model

    DTIC Science & Technology

    2002-06-01

    Elizabeth Royer described the Ad Hoc On-Demand Distance Vector (AODV) routing protocol as “providing quick and efficient route establishment between...Network.” Thesis, Naval Postgraduate School, December 2000. 8. Das, Samir R., Perkins, Charles E., and Royer, Elizabeth M. “ The Ad-hoc On-Demand...Lidong. “Securing Ad Hoc Networks.” Paper Cornell University, Itaca, New York, NY. 16. Corson , Scott S., and Macker, J. “Mobile Ad Hoc

  6. An Ad-Hoc Adaptive Pilot Model for Pitch Axis Gross Acquisition Tasks

    NASA Technical Reports Server (NTRS)

    Hanson, Curtis E.

    2012-01-01

    An ad-hoc algorithm is presented for real-time adaptation of the well-known crossover pilot model and applied to pitch axis gross acquisition tasks in a generic fighter aircraft. Off-line tuning of the crossover model to human pilot data gathered in a fixed-based high fidelity simulation is first accomplished for a series of changes in aircraft dynamics to provide expected values for model parameters. It is shown that in most cases, for this application, the traditional crossover model can be reduced to a gain and a time delay. The ad-hoc adaptive pilot gain algorithm is shown to have desirable convergence properties for most types of changes in aircraft dynamics.

  7. Modelling of Medium Access Control (MAC) Protocols for Mobile Ad-Hoc Networks

    DTIC Science & Technology

    2005-06-01

    Slot IP Internet Protocol LAN Local Area Network MAC Medium Access Control MACAW Medium Access Protocol for Wireless LANs MANET Mobile Ad-hoc...Unforced state – It waits after entering the state until it is invoked by another process or an interrupt. It is in dark grey on this report, and red ... green in OPNET. A MAC process model is built for general initialisations of the MAC module, and to invoke the selected MAC protocol process model

  8. A Leasing Model to Deal with Partial Failures in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Gonzalez Boix, Elisa; van Cutsem, Tom; Vallejos, Jorge; de Meuter, Wolfgang; D'Hondt, Theo

    In mobile ad hoc networks (MANETs) many partial failures are the result of temporary network partitions due to the intermittent connectivity of mobile devices. Some of these failures will be permanent and require application-level failure handling. However, it is impossible to distinguish a permanent from a transient failure. Leasing provides a solution to this problem based on the temporal restriction of resources. But to date no leasing model has been designed specifically for MANETs. In this paper, we identify three characteristics required for a leasing model to be usable in a MANET, discuss the issues with existing leasing models and then propose the leased object references model, which integrates leasing with remote object references. In addition, we describe an implementation of the model in the programming language AmbientTalk. Leased object references provide an extensible framework that allows programmers to express their own leasing patterns and enables both lease holders (clients) and lease grantors (services) to deal with permanent failures.

  9. How Gas-dynamic Flare Models Powered by Petschek Reconnection Differ from Those with Ad Hoc Energy Sources

    NASA Astrophysics Data System (ADS)

    Longcope, D. W.; Klimchuk, J. A.

    2015-11-01

    Aspects of solar flare dynamics, such as chromospheric evaporation and flare light curves, have long been studied using one-dimensional models of plasma dynamics inside a static flare loop, subjected to some energy input. While extremely successful at explaining the observed characteristics of flares, all such models so far have specified energy input ad hoc, rather than deriving it self-consistently. There is broad consensus that flares are powered by magnetic energy released through reconnection. Recent work has generalized Petschek’s basic reconnection scenario, topological change followed by field line retraction and shock heating, to permit its inclusion in a one-dimensional flare loop model. Here we compare the gas dynamics driven by retraction and shocking to those from more conventional static loop models energized by ad hoc source terms. We find significant differences during the first minute, when retraction leads to larger kinetic energies and produces higher densities at the loop top, while ad hoc heating tends to rarify the loop top. The loop-top density concentration is related to the slow magnetosonic shock, characteristic of Petschek’s model, but persists beyond the retraction phase occurring in the outflow jet. This offers an explanation for observed loop-top sources of X-ray and EUV emission, with advantages over that provided by ad hoc heating scenarios. The cooling phases of the two models are, however, notably similar to one another, suggesting that observations at that stage will yield little information on the nature of energy input.

  10. Ad Hoc modeling, expert problem solving, and R&T program evaluation

    NASA Technical Reports Server (NTRS)

    Silverman, B. G.; Liebowitz, J.; Moustakis, V. S.

    1983-01-01

    A simplified cost and time (SCAT) analysis program utilizing personal-computer technology is presented and demonstrated in the case of the NASA-Goddard end-to-end data system. The difficulties encountered in implementing complex program-selection and evaluation models in the research and technology field are outlined. The prototype SCAT system described here is designed to allow user-friendly ad hoc modeling in real time and at low cost. A worksheet constructed on the computer screen displays the critical parameters and shows how each is affected when one is altered experimentally. In the NASA case, satellite data-output and control requirements, ground-facility data-handling capabilities, and project priorities are intricately interrelated. Scenario studies of the effects of spacecraft phaseout or new spacecraft on throughput and delay parameters are shown. The use of a network of personal computers for higher-level coordination of decision-making processes is suggested, as a complement or alternative to complex large-scale modeling.

  11. HOW GAS-DYNAMIC FLARE MODELS POWERED BY PETSCHEK RECONNECTION DIFFER FROM THOSE WITH AD HOC ENERGY SOURCES

    SciTech Connect

    Longcope, D. W.; Klimchuk, J. A.

    2015-11-10

    Aspects of solar flare dynamics, such as chromospheric evaporation and flare light curves, have long been studied using one-dimensional models of plasma dynamics inside a static flare loop, subjected to some energy input. While extremely successful at explaining the observed characteristics of flares, all such models so far have specified energy input ad hoc, rather than deriving it self-consistently. There is broad consensus that flares are powered by magnetic energy released through reconnection. Recent work has generalized Petschek’s basic reconnection scenario, topological change followed by field line retraction and shock heating, to permit its inclusion in a one-dimensional flare loop model. Here we compare the gas dynamics driven by retraction and shocking to those from more conventional static loop models energized by ad hoc source terms. We find significant differences during the first minute, when retraction leads to larger kinetic energies and produces higher densities at the loop top, while ad hoc heating tends to rarify the loop top. The loop-top density concentration is related to the slow magnetosonic shock, characteristic of Petschek’s model, but persists beyond the retraction phase occurring in the outflow jet. This offers an explanation for observed loop-top sources of X-ray and EUV emission, with advantages over that provided by ad hoc heating scenarios. The cooling phases of the two models are, however, notably similar to one another, suggesting that observations at that stage will yield little information on the nature of energy input.

  12. Robust message routing for mobile (wireless) ad hoc networks.

    SciTech Connect

    Goldsby, Michael E.; Johnson, Michael M.; Kilman, Dominique Marie; Bierbaum, Neal Robert; Chen, Helen Y.; Ammerlahn, Heidi R.; Tsang, Rose P.; Nicol, David M.

    2004-01-01

    This report describes the results of research targeting improvements in the robustness of message transport in wireless ad hoc networks. The first section of the report provides an analysis of throughput and latency in the wireless medium access control (MAC) layer and relates the analysis to the commonly used 802.11 protocol. The second section describes enhancements made to several existing models of wireless MAC and ad hoc routing protocols; the models were used in support of the work described in the following section. The third section of the report presents a lightweight transport layer protocol that is superior to TCP for use in wireless networks. In addition, it introduces techniques that improve the performance of any ad hoc source routing protocol. The fourth section presents a novel, highly scalable ad hoc routing protocol that is based on geographic principles but requires no localization hardware.

  13. Distribution of Information in Ad Hoc Networks

    DTIC Science & Technology

    2007-09-01

    INTENTIONALLY LEFT BLANK v ABSTRACT Ad-hoc networks are distributed, self-organized networks which do not need a fixed infrastructure. Entities in...73 V . CONCLUSIONS AND FUTURE WORK ............................75 A. OVERVIEW ..........................................75 B. CONCLUSIONS...statistical analysis on the results. Finally, Chapter V concludes the research and provides suggestions for further research. 7 II. BACKGROUND A

  14. Anomaly Detection Techniques for Ad Hoc Networks

    ERIC Educational Resources Information Center

    Cai, Chaoli

    2009-01-01

    Anomaly detection is an important and indispensable aspect of any computer security mechanism. Ad hoc and mobile networks consist of a number of peer mobile nodes that are capable of communicating with each other absent a fixed infrastructure. Arbitrary node movements and lack of centralized control make them vulnerable to a wide variety of…

  15. Homoclinic chaos in axisymmetric Bianchi-IX cosmological models with an ad hoc quantum potential

    SciTech Connect

    Correa, G. C.; Stuchi, T. J.; Joras, S. E.

    2010-04-15

    In this work we study the dynamics of the axisymmetric Bianchi-IX cosmological model with a term of quantum potential added. As it is well known, this class of Bianchi-IX models is homogeneous and anisotropic with two scale factors, A(t) and B(t), derived from the solution of Einstein's equation for general relativity. The model we use in this work has a cosmological constant and the matter content is dust. To this model we add a quantum-inspired potential that is intended to represent short-range effects due to the general relativistic behavior of matter in small scales and play the role of a repulsive force near the singularity. We find that this potential restricts the dynamics of the model to positive values of A(t) and B(t) and alters some qualitative and quantitative characteristics of the dynamics studied previously by several authors. We make a complete analysis of the phase space of the model finding critical points, periodic orbits, stable/unstable manifolds using numerical techniques such as Poincare section, numerical continuation of orbits, and numerical globalization of invariant manifolds. We compare the classical and the quantum models. Our main result is the existence of homoclinic crossings of the stable and unstable manifolds in the physically meaningful region of the phase space [where both A(t) and B(t) are positive], indicating chaotic escape to inflation and bouncing near the singularity.

  16. Supporting Dynamic Ad hoc Collaboration Capabilities

    SciTech Connect

    Agarwal, Deborah A.; Berket, Karlo

    2003-07-14

    Modern HENP experiments such as CMS and Atlas involve as many as 2000 collaborators around the world. Collaborations this large will be unable to meet often enough to support working closely together. Many of the tools currently available for collaboration focus on heavy-weight applications such as videoconferencing tools. While these are important, there is a more basic need for tools that support connecting physicists to work together on an ad hoc or continuous basis. Tools that support the day-to-day connectivity and underlying needs of a group of collaborators are important for providing light-weight, non-intrusive, and flexible ways to work collaboratively. Some example tools include messaging, file-sharing, and shared plot viewers. An important component of the environment is a scalable underlying communication framework. In this paper we will describe our current progress on building a dynamic and ad hoc collaboration environment and our vision for its evolution into a HENP collaboration environment.

  17. Space-Time Processing for Tactical Mobile Ad Hoc Networks

    DTIC Science & Technology

    2008-08-01

    Maximization in Multi-User, MIMO Channels with Linear Processing...58 2.9 Using Feedback in Ad Hoc Networks....................................................................65 2.10 Feedback MIMO ...in MIMO Ad Hoc Interference Networks.......................................................................................................75 2.12

  18. AD Hoc Study on Human Robot Interface Issues

    DTIC Science & Technology

    2002-09-01

    ARMY SCIENCE BOARD AD HOC STUDY ON HUMAN ROBOT INTERFACE ISSUES FINAL REPORT SEPTEMBER 2002 Distribution: Approved for...conclusions contained in this report are those of the 2002 Ad Hoc Study Panel on “Human- Robot Interface Issues” and do not necessarily reflect the official...DATES COVERED Army Science Board – 2002 Ad Hoc Study 4. TITLE AND SUBTITLE AD HOC STUDY ON HUMAN ROBOT INTERFACE ISSUES 6. AUTHOR(S) Study

  19. 14 CFR 1203.903 - Ad hoc committees.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Ad hoc committees. 1203.903 Section 1203... NASA Information Security Program Committee § 1203.903 Ad hoc committees. The Chairperson is authorized to establish such ad hoc panels or subcommittees as may be necessary in the conduct of the...

  20. 14 CFR 1203.903 - Ad hoc committees.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Ad hoc committees. 1203.903 Section 1203.903... Information Security Program Committee § 1203.903 Ad hoc committees. The Chairperson is authorized to establish such ad hoc panels or subcommittees as may be necessary in the conduct of the Committee's work....

  1. 21 CFR 14.90 - Ad hoc advisory committee members.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 1 2011-04-01 2011-04-01 false Ad hoc advisory committee members. 14.90 Section... PUBLIC HEARING BEFORE A PUBLIC ADVISORY COMMITTEE Members of Advisory Committees § 14.90 Ad hoc advisory committee members. In selecting members of an ad hoc advisory committee, the Commissioner may use...

  2. 21 CFR 14.90 - Ad hoc advisory committee members.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Ad hoc advisory committee members. 14.90 Section... PUBLIC HEARING BEFORE A PUBLIC ADVISORY COMMITTEE Members of Advisory Committees § 14.90 Ad hoc advisory committee members. In selecting members of an ad hoc advisory committee, the Commissioner may use...

  3. Detailed OFDM Modeling in Network Simulation of Mobile Ad Hoc Networks

    DTIC Science & Technology

    2003-01-01

    Ptolemy II as the design environment, some of the widely used models of computation for control system design — continuous time...closer to reality. The Ptolemy approach is similar to the approach used in this thesis. Our method of integrating heterogeneous models to...errors by mapping it to a BER value. Notice that, the simulated receiver SINR from the model is used instead of the model BER because of the

  4. An Agent-based Model Simulation of Multiple Collaborating Mobile Ad Hoc Networks (MANET)

    DTIC Science & Technology

    2011-06-01

    RESULTS: Agent Learning Profiles Discounted Positive Reinforcement Learning Learning and Forgetting Forgetting is triggered by task conditions that...disable rational and deliberate mental models –forcing the agent to ignore (or forget) routine processes. Positive reinforcement is earned by an...deliberate behavior of agents as rational entities (model-based functions). 6.Experiment with positive reinforcement learning (with incremental gain over

  5. Use of Numerical Models as Data Proxies for Approximate Ad-Hoc Query Processing

    SciTech Connect

    Kamimura, R; Abdulla, G; Baldwin, C; Critchlow, T; Lee, B; Lozares, I; Musick, R; Tang, N

    2003-05-19

    As datasets grow beyond the gigabyte scale, there is an increasing demand to develop techniques for dealing/interacting with them. To this end, the DataFoundry team at the Lawrence Livermore National Laboratory has developed a software prototype called Approximate Adhoc Query Engine for Simulation Data (AQSim). The goal of AQSim is to provide a framework that allows scientists to interactively perform adhoc queries over terabyte scale datasets using numerical models as proxies for the original data. The advantages of this system are several. The first is that by storing only the model parameters, each dataset occupies a smaller footprint compared to the original, increasing the shelf-life of such datasets before they are sent to archival storage. Second, the models are geared towards approximate querying as they are built at different resolutions, allowing the user to make the tradeoff between model accuracy and query response time. This allows the user greater opportunities for exploratory data analysis. Lastly, several different models are allowed, each focusing on a different characteristic of the data thereby enhancing the interpretability of the data compared to the original. The focus of this paper is on the modeling aspects of the AQSim framework.

  6. A probabilistic dynamic energy model for ad-hoc wireless sensors network with varying topology

    NASA Astrophysics Data System (ADS)

    Al-Husseini, Amal

    In this dissertation we investigate the behavior of Wireless Sensor Networks (WSNs) from the degree distribution and evolution perspective. In specific, we focus on implementation of a scale-free degree distribution topology for energy efficient WSNs. WSNs is an emerging technology that finds its applications in different areas such as environment monitoring, agricultural crop monitoring, forest fire monitoring, and hazardous chemical monitoring in war zones. This technology allows us to collect data without human presence or intervention. Energy conservation/efficiency is one of the major issues in prolonging the active life WSNs. Recently, many energy aware and fault tolerant topology control algorithms have been presented, but there is dearth of research focused on energy conservation/efficiency of WSNs. Therefore, we study energy efficiency and fault-tolerance in WSNs from the degree distribution and evolution perspective. Self-organization observed in natural and biological systems has been directly linked to their degree distribution. It is widely known that scale-free distribution bestows robustness, fault-tolerance, and access efficiency to system. Fascinated by these properties, we propose two complex network theoretic self-organizing models for adaptive WSNs. In particular, we focus on adopting the Barabasi and Albert scale-free model to fit into the constraints and limitations of WSNs. We developed simulation models to conduct numerical experiments and network analysis. The main objective of studying these models is to find ways to reducing energy usage of each node and balancing the overall network energy disrupted by faulty communication among nodes. The first model constructs the wireless sensor network relative to the degree (connectivity) and remaining energy of every individual node. We observed that it results in a scale-free network structure which has good fault tolerance properties in face of random node failures. The second model considers

  7. Ad Hoc Technical Committee for Vocational Agriculture. Final Report.

    ERIC Educational Resources Information Center

    Indiana State Commission on Vocational and Technical Education, Indianapolis.

    The goal of the Ad Hoc Technical Committee for Vocational Agriculture in Indiana was to develop a model and recommendations that would result in improved student knowledge and skills for the present and future, address labor market needs, and promote program excellence at all levels of education. The committee developed recommendations for…

  8. Ad-hoc model acquisition for combat simulation in urban terrain

    NASA Astrophysics Data System (ADS)

    Bulatov, Dimitri; Solbrig, Peter; Wernerus, Peter

    2012-10-01

    Situation awareness in complex urban environments is an important component for a successful task fulfillment both in military and civil area of applications. In the first area, the fields of deployment of the members of the North Atlantic Alliance have been changed, in the past two decades, from the originally assigned task of acting as national and allied defense forces within the partners' own borders to out-of-area missions under conditions of an asymmetric conflict. Because of its complicated structure, urban terrain represents a particular difficulty of military missions such as patrolling. In the civil field of applications, police and rescue forces are also often strongly dependent on a local visibility and accessibility analysis. However, the process of decision-taking within a short time and under enormous pressure can be extensively trained in an environment that is tailored to the concrete situation. The contribution of this work consists of context-based modeling of urban terrain that can be then integrated into simulation software, for example, Virtual Battlespace 2 (VBS2). The input of our procedure is made up by the airborne sensor data, collected either by an active or a passive sensor. The latter is particularly important if the application is time-critical or the area to be explored is small. After description of our procedure for urban terrain modeling with a detailed focus on the recent innovations, the main steps of model integration into simulation software will be presented and two examples of missions for military and civil applications that can be easily created with VBS2 will be given.

  9. Decentralized Opportunistic Spectrum Resources Access Model and Algorithm toward Cooperative Ad-Hoc Networks

    PubMed Central

    Liu, Ming; Xu, Yang; Mohammed, Abdul-Wahid

    2016-01-01

    Limited communication resources have gradually become a critical factor toward efficiency of decentralized large scale multi-agent coordination when both system scales up and tasks become more complex. In current researches, due to the agent’s limited communication and observational capability, an agent in a decentralized setting can only choose a part of channels to access, but cannot perceive or share global information. Each agent’s cooperative decision is based on the partial observation of the system state, and as such, uncertainty in the communication network is unavoidable. In this situation, it is a major challenge working out cooperative decision-making under uncertainty with only a partial observation of the environment. In this paper, we propose a decentralized approach that allows agents cooperatively search and independently choose channels. The key to our design is to build an up-to-date observation for each agent’s view so that a local decision model is achievable in a large scale team coordination. We simplify the Dec-POMDP model problem, and each agent can jointly work out its communication policy in order to improve its local decision utilities for the choice of communication resources. Finally, we discuss an implicate resource competition game, and show that, there exists an approximate resources access tradeoff balance between agents. Based on this discovery, the tradeoff between real-time decision-making and the efficiency of cooperation using these channels can be well improved. PMID:26727504

  10. Cooperative Multi-Agent Systems in Mobile Ad Hoc Networks

    DTIC Science & Technology

    2006-01-01

    COOPERATIVE MULTI - AGENT SYSTEMS IN MOBILE AD HOC NETWORKS Joseph P. Macker William Chao Myriam Abramson Ian Downard Information Technology Division...are, mobile ad hoc networking (MANET) and Multi - Agent Systems (MAS). Despite their value in enabling more autonomous network system operation...2006 to 00-00-2006 4. TITLE AND SUBTITLE Cooperative Multi - Agent Systems in Mobile Ad Hoc Networks 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c

  11. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks

    PubMed Central

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV. PMID:27258013

  12. Spontaneous Ad Hoc Mobile Cloud Computing Network

    PubMed Central

    Lacuesta, Raquel; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes. PMID:25202715

  13. Spontaneous ad hoc mobile cloud computing network.

    PubMed

    Lacuesta, Raquel; Lloret, Jaime; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes.

  14. Distributed Reinforcement Learning Approach for Vehicular Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Wu, Celimuge; Kumekawa, Kazuya; Kato, Toshihiko

    In Vehicular Ad hoc Networks (VANETs), general purpose ad hoc routing protocols such as AODV cannot work efficiently due to the frequent changes in network topology caused by vehicle movement. This paper proposes a VANET routing protocol QLAODV (Q-Learning AODV) which suits unicast applications in high mobility scenarios. QLAODV is a distributed reinforcement learning routing protocol, which uses a Q-Learning algorithm to infer network state information and uses unicast control packets to check the path availability in a real time manner in order to allow Q-Learning to work efficiently in a highly dynamic network environment. QLAODV is favored by its dynamic route change mechanism, which makes it capable of reacting quickly to network topology changes. We present an analysis of the performance of QLAODV by simulation using different mobility models. The simulation results show that QLAODV can efficiently handle unicast applications in VANETs.

  15. Assured Resource Sharing in Ad-Hoc Collaboration

    SciTech Connect

    Ahn, Gail-Joon

    2015-12-19

    The project seeks an innovative framework to enable users to access and selectively share resources in distributed environments, enhancing the scalability of information sharing. We have investigated secure sharing & assurance approaches for ad-hoc collaboration, focused on Grids, Clouds, and ad-hoc network environments.

  16. 14 CFR 1203.903 - Ad hoc committees.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false Ad hoc committees. 1203.903 Section 1203.903 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.903 Ad hoc committees. The Chairperson is...

  17. 14 CFR § 1203.903 - Ad hoc committees.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false Ad hoc committees. § 1203.903 Section § 1203.903 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.903 Ad hoc committees. The Chairperson...

  18. 14 CFR 1203.903 - Ad hoc committees.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 5 2012-01-01 2012-01-01 false Ad hoc committees. 1203.903 Section 1203.903 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.903 Ad hoc committees. The Chairperson is...

  19. Space-Time Processing for Tactical Mobile Ad Hoc Networks

    DTIC Science & Technology

    2010-05-01

    Sagnik Ghosh, Bhaskar D. Rao, and James R. Zeidler; "Outage-Efficient Strategies for Multiuser MIMO Networks with Channel Distribution Information... Distributed cooperative routing and hybrid ARQ in MIMO -BLAST ad hoc networks”, submitted to IEEE Transactions on Communications, 2009. Davide...mobile ad hoc networks using polling techniques for MIMO nodes. Centralized and distributed topology control algorithms have been develop to

  20. Assured Information Sharing for Ad-Hoc Collaboration

    ERIC Educational Resources Information Center

    Jin, Jing

    2009-01-01

    Collaborative information sharing tends to be highly dynamic and often ad hoc among organizations. The dynamic natures and sharing patterns in ad-hoc collaboration impose a need for a comprehensive and flexible approach to reflecting and coping with the unique access control requirements associated with the environment. This dissertation…

  1. Enhanced Weight based DSR for Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Verma, Samant; Jain, Sweta

    2011-12-01

    Routing in ad hoc network is a great problematic, since a good routing protocol must ensure fast and efficient packet forwarding, which isn't evident in ad hoc networks. In literature there exists lot of routing protocols however they don't include all the aspects of ad hoc networks as mobility, device and medium constraints which make these protocols not efficient for some configuration and categories of ad hoc networks. Thus in this paper we propose an improvement of Weight Based DSR in order to include some of the aspects of ad hoc networks as stability, remaining battery power, load and trust factor and proposing a new approach Enhanced Weight Based DSR.

  2. Decentralized session initiation protocol solution in ad hoc networks

    NASA Astrophysics Data System (ADS)

    Han, Lu; Jin, Zhigang; Shu, Yantai; Dong, Linfang

    2006-10-01

    With the fast development of ad hoc networks, SIP has attracted more and more attention in multimedia service. This paper proposes a new architecture to provide SIP service for ad hoc users, although there is no centralized SIP server deployed. In this solution, we provide the SIP service by the introduction of two nodes: Designated SIP Server (DS) and its Backup Server (BDS). The nodes of ad hoc network designate DS and BDS when they join the session nodes set and when some pre-defined events occur. A new sip message type called REGISTRAR is presented so nodes can send others REGISTRAR message to declare they want to be DS. According to the IP information taken in the message, an algorithm works like the election of DR and BDR in OSPF protocol is used to vote DS and BDS SIP servers. Naturally, the DS will be replaced by BDS when the DS is down for predicable or unpredictable reasons. To facilitate this, the DS should register to the BDS and transfer a backup of the SIP users' database. Considering the possibility DS or BDS may abruptly go down, a special policy is given. When there is no DS and BDS, a new election procedure is triggered just like the startup phase. The paper also describes how SIP works normally in the decentralized model as well as the evaluation of its performance. All sessions based on SIP in ad hoc such as DS voting have been tested in the real experiments within a 500m*500m square area where about 30 random nodes are placed.

  3. A Survey on Trust Management for Mobile Ad Hoc Networks

    DTIC Science & Technology

    2011-11-01

    accumulate between these entities.” Capra [34] proposes to use a human trust model based on human interactions in a trust model for fully distributed...network environments such as MANETs. Capra defines trust as the degree of a belief about the behavior of other entities (or agents). Li and Singhal [35...2004. [34] L. Capra , “Toward a Human Trust Model for Mobile Ad-hoc Net- works,” Proc. 2nd UK-UbiNet Workshop, 5-7 May 2004, Cambridge University

  4. Approximate ad-hoc query engine for simulation data

    SciTech Connect

    Abdulla, G; Baldwin, C; Critchlow, T; Kamimura, R; Lozares, I; Musick, R; Tang, N; Lee, B S; Snapp, R

    2001-02-01

    In this paper, we describe AQSim, an ongoing effort to design and implement a system to manage terabytes of scientific simulation data. The goal of this project is to reduce data storage requirements and access times while permitting ad-hoc queries using statistical and mathematical models of the data. In order to facilitate data exchange between models based on different representations, we are evaluating using the ASCI common data model which is comprised of several layers of increasing semantic complexity. To support queries over the spatial-temporal mesh structured data we are in the process of defining and implementing a grammar for MeshSQL.

  5. Auto-configuration protocols in mobile ad hoc networks.

    PubMed

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity.

  6. Routing Protocol of Sparse Urban Vehicular Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Li, Huxiong

    Vehicular ad hoc network (VANET) is an application of mobile ad hoc technology in transportation systems, it has become an important part of ITS. Since multi-hop link is hard to set up in sparse VANET, a traffic-aware routing (TAR) protocol is proposed which estimates vehicle average neighbors (VAN) of roads by exchanging beacon messages between encounter vehicles. Road with high VAN is preferred to be selected as part of forwarding path at intersection. Packets are forwarded to the next intersection in road in a greedy manner. Simulations show that TAR outperforms the compared protocols in terms of both packet delivery ratio and average end-to-end delay.

  7. Global Coverage from Ad-Hoc Constellations in Rideshare Orbits

    NASA Technical Reports Server (NTRS)

    Ellis, Armin; Mercury, Michael; Brown, Shannon

    2012-01-01

    A promising area of small satellite development is in providing higher temporal resolution than larger satellites. Traditional constellations have required specific orbits and dedicated launch vehicles. In this paper we discuss an alternative architecture in which the individual elements of the constellation are launched as rideshare opportunities. We compare the coverage of such an ad-hoc constellation with more traditional constellations. Coverage analysis is based on actual historical data from rideshare opportunities. Our analysis includes ground coverage and temporal revisits for Polar, Tropics, Temperate, and Global regions, comparing ad-hoc and Walker constellation.

  8. How to Bootstrap Security for Ad-Hoc Network: Revisited

    NASA Astrophysics Data System (ADS)

    Shin, Wook; Gunter, Carl A.; Kiyomoto, Shinsaku; Fukushima, Kazuhide; Tanaka, Toshiaki

    There are various network-enabled and embedded computers deployed around us. Although we can get enormous conveniences by connecting them together, it is difficult to securely associate them in an ad-hoc manner. The difficulties originate from authentication and key distribution problems among devices that are strangers to each other. In this paper, we review the existing ways of initiating secure communication for ad-hoc network devices, and propose another solution. Exploiting Pairing-based cryptography and the notion of location-limited channel, the proposed solution bootstraps security conveniently and efficiently. Further, it supports ownership enforcement and key-escrow.

  9. Opportunistic Channel Scheduling for Ad Hoc Networks with Queue Stability

    NASA Astrophysics Data System (ADS)

    Dong, Lei; Wang, Yongchao

    2015-03-01

    In this paper, a distributed opportunistic channel access strategy in ad hoc network is proposed. We consider the multiple sources contend for the transmission opportunity, the winner source decides to transmit or restart contention based on the current channel condition. Owing to real data assumption at all links, the decision still needs to consider the stability of the queues. We formulate the channel opportunistic scheduling as a constrained optimization problem which maximizes the system average throughput with the constraints that the queues of all links are stable. The proposed optimization model is solved by Lyapunov stability in queueing theory. The successive channel access problem is decoupled into single optimal stopping problem at every frame and solved with Lyapunov algorithm. The threshold for every frame is different, and it is derived based on the instantaneous queue information. Finally, computer simulations are conducted to demonstrate the validity of the proposed strategy.

  10. 14 CFR § 1203.1002 - Ad hoc committees.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false Ad hoc committees. § 1203.1002 Section § 1203.1002 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Special Access Programs (SAP) and Sensitive Compartmented Information (SCI) Programs...

  11. Providing Location Security in Vehicular Ad Hoc Networks

    ERIC Educational Resources Information Center

    Yan, Gongjun

    2010-01-01

    Location is fundamental information in Vehicular Ad-hoc Networks (VANETs). Almost all VANET applications rely on location information. Therefore it is of importance to ensure location information integrity, meaning that location information is original (from the generator), correct (not bogus or fabricated) and unmodified (value not changed). We…

  12. Shuttle-run synchronization in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Ma, Sheng-Fei; Bi, Hong-Jie; Zou, Yong; Liu, Zong-Hua; Guan, Shu-Guang

    2015-06-01

    In this work, we study the collective dynamics of phase oscillators in a mobile ad hoc network whose topology changes dynamically. As the network size or the communication radius of individual oscillators increases, the topology of the ad hoc network first undergoes percolation, forming a giant cluster, and then gradually achieves global connectivity. It is shown that oscillator mobility generally enhances the coherence in such networks. Interestingly, we find a new type of phase synchronization/clustering, in which the phases of the oscillators are distributed in a certain narrow range, while the instantaneous frequencies change signs frequently, leading to shuttle-run-like motion of the oscillators in phase space. We conduct a theoretical analysis to explain the mechanism of this synchronization and obtain the critical transition point.

  13. MWAHCA: A Multimedia Wireless Ad Hoc Cluster Architecture

    PubMed Central

    Diaz, Juan R.; Jimenez, Jose M.; Sendra, Sandra

    2014-01-01

    Wireless Ad hoc networks provide a flexible and adaptable infrastructure to transport data over a great variety of environments. Recently, real-time audio and video data transmission has been increased due to the appearance of many multimedia applications. One of the major challenges is to ensure the quality of multimedia streams when they have passed through a wireless ad hoc network. It requires adapting the network architecture to the multimedia QoS requirements. In this paper we propose a new architecture to organize and manage cluster-based ad hoc networks in order to provide multimedia streams. Proposed architecture adapts the network wireless topology in order to improve the quality of audio and video transmissions. In order to achieve this goal, the architecture uses some information such as each node's capacity and the QoS parameters (bandwidth, delay, jitter, and packet loss). The architecture splits the network into clusters which are specialized in specific multimedia traffic. The real system performance study provided at the end of the paper will demonstrate the feasibility of the proposal. PMID:24737996

  14. MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm

    PubMed Central

    Elizarraras, Omar; Panduro, Marco; Méndez, Aldo L.

    2014-01-01

    The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR) and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC) protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access) for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15%) compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput. PMID:25140339

  15. MWAHCA: a multimedia wireless ad hoc cluster architecture.

    PubMed

    Diaz, Juan R; Lloret, Jaime; Jimenez, Jose M; Sendra, Sandra

    2014-01-01

    Wireless Ad hoc networks provide a flexible and adaptable infrastructure to transport data over a great variety of environments. Recently, real-time audio and video data transmission has been increased due to the appearance of many multimedia applications. One of the major challenges is to ensure the quality of multimedia streams when they have passed through a wireless ad hoc network. It requires adapting the network architecture to the multimedia QoS requirements. In this paper we propose a new architecture to organize and manage cluster-based ad hoc networks in order to provide multimedia streams. Proposed architecture adapts the network wireless topology in order to improve the quality of audio and video transmissions. In order to achieve this goal, the architecture uses some information such as each node's capacity and the QoS parameters (bandwidth, delay, jitter, and packet loss). The architecture splits the network into clusters which are specialized in specific multimedia traffic. The real system performance study provided at the end of the paper will demonstrate the feasibility of the proposal.

  16. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    PubMed Central

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  17. Fuzzy Multiple Metrics Link Assessment for Routing in Mobile Ad-Hoc Network

    NASA Astrophysics Data System (ADS)

    Soo, Ai Luang; Tan, Chong Eng; Tay, Kai Meng

    2011-06-01

    In this work, we investigate on the use of Sugeno fuzzy inference system (FIS) in route selection for mobile Ad-Hoc networks (MANETs). Sugeno FIS is introduced into Ad-Hoc On Demand Multipath Distance Vector (AOMDV) routing protocol, which is derived from its predecessor, Ad-Hoc On Demand Distance Vector (AODV). Instead of using the conventional way that considering only a single metric to choose the best route, our proposed fuzzy decision making model considers up to three metrics. In the model, the crisp inputs of the three parameters are fed into an FIS and being processed in stages, i.e., fuzzification, inference, and defuzzification. Finally, after experiencing all the stages, a single value score is generated from the combination metrics, which will be used to measure all the discovered routes credibility. Results obtained from simulations show a promising improvement as compared to AOMDV and AODV.

  18. 75 FR 15742 - NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-30

    ... SPACE ADMINISTRATION NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting AGENCY... Administration announces a meeting of the Ad-Hoc Task Force on Planetary Defense of the NASA Advisory Council... include: Ad-Hoc Task Force on Planetary Defense Terms of Reference. NASA Near Earth Object (NEO)...

  19. 29 CFR 1912.11 - Terms of ad hoc committee members.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 7 2011-07-01 2011-07-01 false Terms of ad hoc committee members. 1912.11 Section 1912.11..., DEPARTMENT OF LABOR (CONTINUED) ADVISORY COMMITTEES ON STANDARDS Organizational Matters § 1912.11 Terms of ad hoc committee members. Each member of an ad hoc advisory committee shall serve for such period as...

  20. 75 FR 43565 - NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ... SPACE ADMINISTRATION NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting AGENCY... Administration announces a two-part meeting of the Ad-Hoc Task Force on Planetary Defense of the NASA Advisory...@nasa.gov . SUPPLEMENTARY INFORMATION: The agenda topic is: Drafting of the Ad-Hoc Task Force...

  1. 29 CFR 1912.11 - Terms of ad hoc committee members.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 7 2010-07-01 2010-07-01 false Terms of ad hoc committee members. 1912.11 Section 1912.11..., DEPARTMENT OF LABOR (CONTINUED) ADVISORY COMMITTEES ON STANDARDS Organizational Matters § 1912.11 Terms of ad hoc committee members. Each member of an ad hoc advisory committee shall serve for such period as...

  2. Ubiquitous and Secure Certificate Service for Wireless Ad Hoc Network

    NASA Astrophysics Data System (ADS)

    Ge, Meng; Lam, Kwok-Yan; Li, Jianbin; Chung, Siu-Leung

    Wireless ad hoc network is one of the most suitable platforms for providing communication services to support mobile applications in public areas where no fixed communication infrastructure exists. However, due to the open nature of wireless links and lack of security infrastructure in an ad hoc network environment, applications operating on ad hoc network platforms are subjected to non-trivial security challenges. Asymmetric key management, which is widely adopted to be an effective basis for security services in an open network environment, typically plays a crucial role in meeting the security requirements of such applications. In this paper, we propose a secure asymmetric key management scheme, the Ubiquitous and Secure Certificate Service (USCS), which is based on a variant of the Distributed Certificate Authority (DCA) - the Fully Distributed Certificate Authority (FDCA). Similar to FDCA, USCS introduces the presence of 1-hop neighbors which hold shares of DCA's private signature key, and can collaborate to issue certificates, thereby providing asymmetric key management service. Both USCS and FDCA aim to achieve higher availability than the basic DCA scheme; however, USCS is more secure than FDCA in that the former achieves high availability by distributing existing shares to new members, rather than generating new shares as the FDCA scheme does. In order to realise the high availability potential of USCS, a share selection algorithm is also proposed. Experimental results demonstrated that USCS is a more secure approach of the DCA scheme in that it can achieve stronger security than FDCA while attaining high availability similar to that of FDCA. Experiments also showed that USCS incurs only moderate communication overheads.

  3. Scalable Architecture for Multihop Wireless ad Hoc Networks

    NASA Technical Reports Server (NTRS)

    Arabshahi, Payman; Gray, Andrew; Okino, Clayton; Yan, Tsun-Yee

    2004-01-01

    A scalable architecture for wireless digital data and voice communications via ad hoc networks has been proposed. Although the details of the architecture and of its implementation in hardware and software have yet to be developed, the broad outlines of the architecture are fairly clear: This architecture departs from current commercial wireless communication architectures, which are characterized by low effective bandwidth per user and are not well suited to low-cost, rapid scaling in large metropolitan areas. This architecture is inspired by a vision more akin to that of more than two dozen noncommercial community wireless networking organizations established by volunteers in North America and several European countries.

  4. Ad Hoc Selection of Voice over Internet Streams

    NASA Technical Reports Server (NTRS)

    Macha, Mitchell G. (Inventor); Bullock, John T. (Inventor)

    2008-01-01

    A method and apparatus for a communication system technique involving ad hoc selection of at least two audio streams is provided. Each of the at least two audio streams is a packetized version of an audio source. A data connection exists between a server and a client where a transport protocol actively propagates the at least two audio streams from the server to the client. Furthermore, software instructions executable on the client indicate a presence of the at least two audio streams, allow selection of at least one of the at least two audio streams, and direct the selected at least one of the at least two audio streams for audio playback.

  5. Ad Hoc Selection of Voice over Internet Streams

    NASA Technical Reports Server (NTRS)

    Macha, Mitchell G. (Inventor); Bullock, John T. (Inventor)

    2014-01-01

    A method and apparatus for a communication system technique involving ad hoc selection of at least two audio streams is provided. Each of the at least two audio streams is a packetized version of an audio source. A data connection exists between a server and a client where a transport protocol actively propagates the at least two audio streams from the server to the client. Furthermore, software instructions executable on the client indicate a presence of the at least two audio streams, allow selection of at least one of the at least two audio streams, and direct the selected at least one of the at least two audio streams for audio playback.

  6. Energy Efficient Probabilistic Broadcasting for Mobile Ad-Hoc Network

    NASA Astrophysics Data System (ADS)

    Kumar, Sumit; Mehfuz, Shabana

    2016-08-01

    In mobile ad-hoc network (MANETs) flooding method is used for broadcasting route request (RREQ) packet from one node to another node for route discovery. This is the simplest method of broadcasting of RREQ packets but it often results in broadcast storm problem, originating collisions and congestion of packets in the network. A probabilistic broadcasting is one of the widely used broadcasting scheme for route discovery in MANETs and provides solution for broadcasting storm problem. But it does not consider limited energy of the battery of the nodes. In this paper, a new energy efficient probabilistic broadcasting (EEPB) is proposed in which probability of broadcasting RREQs is calculated with respect to remaining energy of nodes. The analysis of simulation results clearly indicate that an EEPB route discovery scheme in ad-hoc on demand distance vector (AODV) can increase the network lifetime with a decrease in the average power consumption and RREQ packet overhead. It also decreases the number of dropped packets in the network, in comparison to other EEPB schemes like energy constraint gossip (ECG), energy aware gossip (EAG), energy based gossip (EBG) and network lifetime through energy efficient broadcast gossip (NEBG).

  7. Adaptive link-layer intelligence for enhanced ad hoc networking

    NASA Astrophysics Data System (ADS)

    MacLennan, James; Walburg, Bill; Nevins, Larry; Hartup, David

    2005-05-01

    Networked radio systems that utilize self-forming, fault tolerant techniques offer needed communication functions for Homeland Security and Law Enforcement agencies. The use of an ad hoc mesh network architecture solves some of the problems inherent to the wireless physical layer such as interferers, multi-path fading, shadowing, and loss of line-of-site. These effects severely limit the performance of current 802.11 wireless network implementations. This paper describes the use of Adaptive Link-layer Intelligence for Enhanced ad hoc Networking. This technology enhances recognition and characterization of sources of wireless channel perturbations and predicts their effects on wireless link quality. Identifying and predicting channel problems at the link level improves dynamic route discovery, circumvents channel disruptions before they cause a link failure, and increases communications reliability and data rate. First Responders, Homeland Security, and Law Enforcement agencies operating in locations lacking infrastructure, such as Urban Search and Rescue (USAR) operations, can benefit from increased communications reliability in highly impaired channels that are typical in disaster response scenarios.

  8. Intelligent routing protocol for ad hoc wireless network

    NASA Astrophysics Data System (ADS)

    Peng, Chaorong; Chen, Chang Wen

    2006-05-01

    A novel routing scheme for mobile ad hoc networks (MANETs), which combines hybrid and multi-inter-routing path properties with a distributed topology discovery route mechanism using control agents is proposed in this paper. In recent years, a variety of hybrid routing protocols for Mobile Ad hoc wireless networks (MANETs) have been developed. Which is proactively maintains routing information for a local neighborhood, while reactively acquiring routes to destinations beyond the global. The hybrid protocol reduces routing discovery latency and the end-to-end delay by providing high connectivity without requiring much of the scarce network capacity. On the other side the hybrid routing protocols in MANETs likes Zone Routing Protocol still need route "re-discover" time when a route between zones link break. Sine the topology update information needs to be broadcast routing request on local zone. Due to this delay, the routing protocol may not be applicable for real-time data and multimedia communication. We utilize the advantages of a clustering organization and multi-routing path in routing protocol to achieve several goals at the same time. Firstly, IRP efficiently saves network bandwidth and reduces route reconstruction time when a routing path fails. The IRP protocol does not require global periodic routing advertisements, local control agents will automatically monitor and repair broke links. Secondly, it efficiently reduces congestion and traffic "bottlenecks" for ClusterHeads in clustering network. Thirdly, it reduces significant overheads associated with maintaining clusters. Fourthly, it improves clusters stability due to dynamic topology changing frequently. In this paper, we present the Intelligent Routing Protocol. First, we discuss the problem of routing in ad hoc networks and the motivation of IRP. We describe the hierarchical architecture of IRP. We describe the routing process and illustrate it with an example. Further, we describe the control manage

  9. Topology for efficient information dissemination in ad-hoc networking

    NASA Technical Reports Server (NTRS)

    Jennings, E.; Okino, C. M.

    2002-01-01

    In this paper, we explore the information dissemination problem in ad-hoc wirless networks. First, we analyze the probability of successful broadcast, assuming: the nodes are uniformly distributed, the available area has a lower bould relative to the total number of nodes, and there is zero knowledge of the overall topology of the network. By showing that the probability of such events is small, we are motivated to extract good graph topologies to minimize the overall transmissions. Three algorithms are used to generate topologies of the network with guaranteed connectivity. These are the minimum radius graph, the relative neighborhood graph and the minimum spanning tree. Our simulation shows that the relative neighborhood graph has certain good graph properties, which makes it suitable for efficient information dissemination.

  10. Remote Upload of Evidence over Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Ray, Indrajit

    In this work, we report on one aspect of an autonomous robot-based digital evidence acquisition system that we are developing. When forensic investigators operate within a hostile environment they may use remotely operated unmanned devices to gather digital evidence. These systems periodically upload the evidence to a remote central server using a mobile ad hoc network. In such cases, large pieces of information need to be fragmented and transmitted in an appropriate manner. To support proper forensic analysis, certain properties must ensured for each fragment of evidence — confidentiality during communication, authenticity and integrity of the data, and, most importantly, strong evidence of membership for fragments. This paper describes a framework to provide these properties for the robot-based evidence acquisition system under development.

  11. Ad hoc committee on global climate issues: Annual report

    USGS Publications Warehouse

    Gerhard, L.C.; Hanson, B.M.B.

    2000-01-01

    The AAPG Ad Hoc Committee on Global Climate Issues has studied the supposition of human-induced climate change since the committee's inception in January 1998. This paper details the progress and findings of the committee through June 1999. At that time there had been essentially no geologic input into the global climate change debate. The following statements reflect the current state of climate knowledge from the geologic perspective as interpreted by the majority of the committee membership. The committee recognizes that new data could change its conclusions. The earth's climate is constantly changing owing to natural variability in earth processes. Natural climate variability over recent geological time is greater than reasonable estimates of potential human-induced greenhouse gas changes. Because no tool is available to test the supposition of human-induced climate change and the range of natural variability is so great, there is no discernible human influence on global climate at this time.

  12. Undilatable Stent Neoatherosclerosis Treated with Ad Hoc Rotational Atherectomy

    PubMed Central

    Koutouzis, Michael; Maniotis, Christos; Tsiafoutis, Ioannis; Argyriou, Mihalis

    2017-01-01

    A middle age woman with known ischemic heart disease and old stents in proximal left anterior descending coronary artery (LAD) was admitted to Coronary Care Unit with acute coronary syndrome. The coronary angiography showed one vessel disease with significant restenosis within the previously implanted stents. The lesion was tough and remained undilatable despite high pressure balloon inflation. Eventually, the balloon ruptured creating a massive dissection of the LAD beginning immediately after the distal part of the undilatable lesion. We proceeded with a challenging ad hoc rotational atherectomy of the lesion and finally stenting of the lesion. In-stent restenosis many years after stent implantation is considered to be mainly due to neoatheromatosis compared to intimal hyperplasia, making lesion treatment more difficult and unpredictable. PMID:28168062

  13. Effects of Data Replication on Data Exfiltration in Mobile Ad Hoc Networks Utilizing Reactive Protocols

    DTIC Science & Technology

    2015-03-01

    IN MOBILE AD HOC NETWORKS UTILIZING REACTIVE PROTOCOLS THESIS Presented to the Faculty Department of Electrical and Computer Engineering Graduate...EFFECTS OF DATA REPLICATION ON DATA EXFILTRATION IN MOBILE AD HOC NETWORKS UTILIZING REACTIVE PROTOCOLS THESIS Corey T. Willinger, Captain, USAF AFIT...APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. AFIT-ENG-MS-15-M-035 EFFECTS OF DATA REPLICATION ON DATA EXFILTRATION IN MOBILE AD HOC NETWORKS

  14. 32 CFR 2800.7 - Designation of chairperson for Ad Hoc Committees.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Designation of chairperson for Ad Hoc Committees... VICE PRESIDENT OF THE UNITED STATES SECURITY PROCEDURES § 2800.7 Designation of chairperson for Ad Hoc Committees. The Counsel to the Vice President is designated as the responsible official to chair Ad...

  15. 32 CFR 2800.7 - Designation of chairperson for Ad Hoc Committees.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Designation of chairperson for Ad Hoc Committees... VICE PRESIDENT OF THE UNITED STATES SECURITY PROCEDURES § 2800.7 Designation of chairperson for Ad Hoc Committees. The Counsel to the Vice President is designated as the responsible official to chair Ad...

  16. Ad-Hoc Queries over Document Collections - A Case Study

    NASA Astrophysics Data System (ADS)

    Löser, Alexander; Lutter, Steffen; Düssel, Patrick; Markl, Volker

    We discuss the novel problem of supporting analytical business intelligence queries over web-based textual content, e.g., BI-style reports based on 100.000's of documents from an ad-hoc web search result. Neither conventional search engines nor conventional Business Intelligence and ETL tools address this problem, which lies at the intersection of their capabilities. "Google Squared" or our system GOOLAP.info, are examples of these kinds of systems. They execute information extraction methods over one or several document collections at query time and integrate extracted records into a common view or tabular structure. Frequent extraction and object resolution failures cause incomplete records which could not be joined into a record answering the query. Our focus is the identification of join-reordering heuristics maximizing the size of complete records answering a structured query. With respect to given costs for document extraction we propose two novel join-operations: The multi-way CJ-operator joins records from multiple relationships extracted from a single document. The two-way join-operator DJ ensures data density by removing incomplete records from results. In a preliminary case study we observe that our join-reordering heuristics positively impact result size, record density and lower execution costs.

  17. Z306 molecular contamination ad hoc committee results

    NASA Technical Reports Server (NTRS)

    Golden, Johnny L.

    1992-01-01

    LDEF external surfaces which did not receive significant amounts of atomic oxygen were observed to be coated with a brown contamination, apparently the result of a condensed organic residue darkened due to UV radiation exposure. During the initial Materials Special Investigation Group (MSIG) Meeting after LDEF deintegration, held in Seattle - July 1990, this organic contamination was the subject of much discussion. The amount of contamination was thought to be significant and its source was immediately believed to be the Z306 black thermal control coating used to coat the entire inner surface of LDEF. Due to the size of the structure, it was not feasible to bake-out the coating. However, initial data on the contamination film was confusing in that significant amounts of silicon was observed by several different researchers. Silicon (from silicone) was not expected to be a potential outgassing product of the Z306 polyurethane coating. To investigate the connection between external contamination and the interior paint, a MSIG ad hoc committee was formed.

  18. Performance Improvement in Geographic Routing for Vehicular Ad Hoc Networks

    PubMed Central

    Kaiwartya, Omprakash; Kumar, Sushil; Lobiyal, D. K.; Abdullah, Abdul Hanan; Hassan, Ahmed Nazar

    2014-01-01

    Geographic routing is one of the most investigated themes by researchers for reliable and efficient dissemination of information in Vehicular Ad Hoc Networks (VANETs). Recently, different Geographic Distance Routing (GEDIR) protocols have been suggested in the literature. These protocols focus on reducing the forwarding region towards destination to select the Next Hop Vehicles (NHV). Most of these protocols suffer from the problem of elevated one-hop link disconnection, high end-to-end delay and low throughput even at normal vehicle speed in high vehicle density environment. This paper proposes a Geographic Distance Routing protocol based on Segment vehicle, Link quality and Degree of connectivity (SLD-GEDIR). The protocol selects a reliable NHV using the criteria segment vehicles, one-hop link quality and degree of connectivity. The proposed protocol has been simulated in NS-2 and its performance has been compared with the state-of-the-art protocols: P-GEDIR, J-GEDIR and V-GEDIR. The empirical results clearly reveal that SLD-GEDIR has lower link disconnection and end-to-end delay, and higher throughput as compared to the state-of-the-art protocols. It should be noted that the performance of the proposed protocol is preserved irrespective of vehicle density and speed. PMID:25429415

  19. Performance improvement in geographic routing for Vehicular Ad Hoc Networks.

    PubMed

    Kaiwartya, Omprakash; Kumar, Sushil; Lobiyal, D K; Abdullah, Abdul Hanan; Hassan, Ahmed Nazar

    2014-11-25

    Geographic routing is one of the most investigated themes by researchers for reliable and efficient dissemination of information in Vehicular Ad Hoc Networks (VANETs). Recently, different Geographic Distance Routing (GEDIR) protocols have been suggested in the literature. These protocols focus on reducing the forwarding region towards destination to select the Next Hop Vehicles (NHV). Most of these protocols suffer from the problem of elevated one-hop link disconnection, high end-to-end delay and low throughput even at normal vehicle speed in high vehicle density environment. This paper proposes a Geographic Distance Routing protocol based on Segment vehicle, Link quality and Degree of connectivity (SLD-GEDIR). The protocol selects a reliable NHV using the criteria segment vehicles, one-hop link quality and degree of connectivity. The proposed protocol has been simulated in NS-2 and its performance has been compared with the state-of-the-art protocols: P-GEDIR, J-GEDIR and V-GEDIR. The empirical results clearly reveal that SLD-GEDIR has lower link disconnection and end-to-end delay, and higher throughput as compared to the state-of-the-art protocols. It should be noted that the performance of the proposed protocol is preserved irrespective of vehicle density and speed.

  20. Detecting and isolating malicious nodes in wireless ad hoc networks

    NASA Astrophysics Data System (ADS)

    Li, Fanzhi; Jassim, Sabah

    2007-04-01

    Malicious nodes can seriously impair the performance of wireless ad hoc networks as a result of different actions such as packet dropping. Secure routes are shortest paths on which every node on the route is trusted even if unknown. Secure route discovery requires the adoption of mechanisms of associating trust to nodes. Most existing secure route discovery mechanisms rely on shared keys and digital signature. In the absence of central nodes that act as certification authority, such protocols suffer from heavy computational burden and are vulnerable to malicious attacks. In this paper we shall review existing techniques for secure routing and propose to complement route finding with creditability scores. Each node would have a credit list for its neighbors. Each node monitors its neighbors' pattern of delivering packets and regularly credits are reviewed and updated accordingly. Unlike most existing schemes the focus of our work is based on post route discovery stage, i.e. when packets are transmitted on discovered routes. The level of trust in any route will be based on the credits associated with the neighbors belonging to the discovered route. We shall evaluate the performance of the proposed scheme by modifying our simulation system so that each node has a dynamic changing "credit list" for its neighbors' behavior. We shall conduct a series of simulations with and without the proposed scheme and compare the results. We will demonstrate that the proposed mechanism is capable of isolating malicious nodes and thereby counteracting black hole attacks.

  1. Random Time Identity Based Firewall In Mobile Ad hoc Networks

    NASA Astrophysics Data System (ADS)

    Suman, Patel, R. B.; Singh, Parvinder

    2010-11-01

    A mobile ad hoc network (MANET) is a self-organizing network of mobile routers and associated hosts connected by wireless links. MANETs are highly flexible and adaptable but at the same time are highly prone to security risks due to the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized control. Firewall is an effective means of protecting a local network from network-based security threats and forms a key component in MANET security architecture. This paper presents a review of firewall implementation techniques in MANETs and their relative merits and demerits. A new approach is proposed to select MANET nodes at random for firewall implementation. This approach randomly select a new node as firewall after fixed time and based on critical value of certain parameters like power backup. This approach effectively balances power and resource utilization of entire MANET because responsibility of implementing firewall is equally shared among all the nodes. At the same time it ensures improved security for MANETs from outside attacks as intruder will not be able to find out the entry point in MANET due to the random selection of nodes for firewall implementation.

  2. A Token Ring Protocol for Dynamic Ad-hoc Wireless Environments

    SciTech Connect

    Top, P; Kohlhepp, V; Dowla, F

    2005-09-30

    A wireless ad-hoc networking protocol is presented. The protocol is designed to be flexible, easy to use and adaptable to a wide variety of potential applications. The primary considerations in design are small code size, guaranteed bandwidth access, limited delay, and error resilience in a highly dynamic ad-hoc environment. These considerations are achieved through the use of token ring protocol.

  3. Typicality Mediates Performance during Category Verification in Both Ad-Hoc and Well-Defined Categories

    ERIC Educational Resources Information Center

    Sandberg, Chaleece; Sebastian, Rajani; Kiran, Swathi

    2012-01-01

    Background: The typicality effect is present in neurologically intact populations for natural, ad-hoc, and well-defined categories. Although sparse, there is evidence of typicality effects in persons with chronic stroke aphasia for natural and ad-hoc categories. However, it is unknown exactly what influences the typicality effect in this…

  4. Capacity-Delay Trade-Off in Collaborative Hybrid Ad-Hoc Networks with Coverage Sensing

    PubMed Central

    Chen, Lingyu; Luo, Wenbin; Liu, Chen; Hong, Xuemin; Shi, Jianghong

    2017-01-01

    The integration of ad hoc device-to-device (D2D) communications and open-access small cells can result in a networking paradigm called hybrid the ad hoc network, which is particularly promising in delivering delay-tolerant data. The capacity-delay performance of hybrid ad hoc networks has been studied extensively under a popular framework called scaling law analysis. These studies, however, do not take into account aspects of interference accumulation and queueing delay and, therefore, may lead to over-optimistic results. Moreover, focusing on the average measures, existing works fail to give finer-grained insights into the distribution of delays. This paper proposes an alternative analytical framework based on queueing theoretic models and physical interference models. We apply this framework to study the capacity-delay performance of a collaborative cellular D2D network with coverage sensing and two-hop relay. The new framework allows us to fully characterize the delay distribution in the transform domain and pinpoint the impacts of coverage sensing, user and base station densities, transmit power, user mobility and packet size on the capacity-delay trade-off. We show that under the condition of queueing equilibrium, the maximum throughput capacity per device saturates to an upper bound of 0.7239 λb/λu bits/s/Hz, where λb and λu are the densities of base stations and mobile users, respectively. PMID:28134769

  5. 32 CFR 2800.7 - Designation of chairperson for Ad Hoc Committees.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... VICE PRESIDENT OF THE UNITED STATES SECURITY PROCEDURES § 2800.7 Designation of chairperson for Ad Hoc Committees. The Counsel to the Vice President is designated as the responsible official to chair Ad...

  6. 32 CFR 2800.7 - Designation of chairperson for Ad Hoc Committees.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... VICE PRESIDENT OF THE UNITED STATES SECURITY PROCEDURES § 2800.7 Designation of chairperson for Ad Hoc Committees. The Counsel to the Vice President is designated as the responsible official to chair Ad...

  7. 32 CFR 2800.7 - Designation of chairperson for Ad Hoc Committees.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... VICE PRESIDENT OF THE UNITED STATES SECURITY PROCEDURES § 2800.7 Designation of chairperson for Ad Hoc Committees. The Counsel to the Vice President is designated as the responsible official to chair Ad...

  8. A Dirichlet reputation system in reliable routing of wireless ad hoc network

    SciTech Connect

    Yang, Dr. Li; Cui, Xiaohui; Cemerlic, Alma

    2010-01-01

    Ad hoc networks are very helpful in situations when no fixed network infrastructure is available, such as natural disasters and military conflicts. In such a network, all wireless nodes are equal peers simultaneously serving as both senders and routers for other nodes. Therefore, how to route packets through reliable paths becomes a fundamental problems when behaviors of certain nodes deviate from wireless ad hoc routing protocols. We proposed a novel Dirichlet reputation model based on Bayesian inference theory which evaluates reliability of each node in terms of packet delivery. Our system offers a way to predict and select a reliable path through combination of first-hand observation and second-hand reputation reports. We also proposed moving window mechanism which helps to adjust ours responsiveness of our system to changes of node behaviors. We integrated the Dirichlet reputation into routing protocol of wireless ad hoc networks. Our extensive simulation indicates that our proposed reputation system can improve good throughput of the network and reduce negative impacts caused by misbehaving nodes.

  9. Systematic lossy error protection for video transmission over wireless ad hoc networks

    NASA Astrophysics Data System (ADS)

    Zhu, Xiaoqing; Rane, Shantanu; Girod, Bernd

    2005-07-01

    Wireless ad hoc networks present a challenge for error-resilient video transmission, since node mobility and multipath fading result in time-varying link qualities in terms of packet loss ratio and available bandwidth. In this paper, we propose to use a systematic lossy error protection (SLEP) scheme for video transmission over wireless ad hoc networks. The transmitted video signal has two parts-a systematic portion consisting of a video sequence transmitted without channel coding over an error-prone channel, and error protection information consisting of a bitstream generated by Wyner-Ziv encoding of the video sequence. Using an end-to-end video distortion model in conjunction with online estimates of packet loss ratio and available bandwidth, the optimal Wyner-Ziv description can be selected dynamically according to current channel conditions. The scheme can also be applied to choose one path for transmission from amongst multiple candidate routes with varying available bandwidths and packet loss ratios, so that the expected end-to-end video distortion is maximized. Experimental results of video transmission over a simulated ad hoc wireless network shows that the proposed SLEP scheme outperforms the conventional application layer FEC approach in that it provides graceful degradation of received video quality over a wider range of packet loss ratios and is less susceptible to inaccuracy in the packet loss ratio estimation.

  10. Does Ad Hoc Coronary Intervention Reduce Radiation Exposure? – Analysis of 568 Patients

    PubMed Central

    Truffa, Márcio A. M.; Alves, Gustavo M.P.; Bernardi, Fernando; Esteves Filho, Antonio; Ribeiro, Expedito; Galon, Micheli Z.; Spadaro, André; Kajita, Luiz J.; Arrieta, Raul; Lemos, Pedro A.

    2015-01-01

    Background Advantages and disadvantages of ad hoc percutaneous coronary intervention have been described. However little is known about the radiation exposure of that procedure as compared with the staged intervention. Objective To compare the radiation dose of the ad hoc percutaneous coronary intervention with that of the staged procedure Methods The dose-area product and total Kerma were measured, and the doses of the diagnostic and therapeutic procedures were added. In addition, total fluoroscopic time and number of acquisitions were evaluated. Results A total of 568 consecutive patients were treated with ad hoc percutaneous coronary intervention (n = 320) or staged percutaneous coronary intervention (n = 248). On admission, the ad hoc group had less hypertension (74.1% vs 81.9%; p = 0.035), dyslipidemia (57.8% vs. 67.7%; p = 0.02) and three-vessel disease (38.8% vs. 50.4%; p = 0.015). The ad hoc group was exposed to significantly lower radiation doses, even after baseline characteristic adjustment between both groups. The ad hoc group was exposed to a total dose-area product of 119.7 ± 70.7 Gycm2, while the staged group, to 139.2 ± 75.3 Gycm2 (p < 0.001). Conclusion Ad hoc percutaneous coronary intervention reduced radiation exposure as compared with diagnostic and therapeutic procedures performed at two separate times. PMID:26351982

  11. A Group Based Key Sharing and Management Algorithm for Vehicular Ad Hoc Networks

    PubMed Central

    Moharram, Mohammed Morsi; Azam, Farzana

    2014-01-01

    Vehicular ad hoc networks (VANETs) are one special type of ad hoc networks that involves vehicles on roads. Typically like ad hoc networks, broadcast approach is used for data dissemination. Blind broadcast to each and every node results in exchange of useless and irrelevant messages and hence creates an overhead. Unicasting is not preferred in ad-hoc networks due to the dynamic topology and the resource requirements as compared to broadcasting. Simple broadcasting techniques create several problems on privacy, disturbance, and resource utilization. In this paper, we propose media mixing algorithm to decide what information should be provided to each user and how to provide such information. Results obtained through simulation show that fewer number of keys are needed to share compared to simple broadcasting. Privacy is also enhanced through this approach. PMID:24587749

  12. A group based key sharing and management algorithm for vehicular ad hoc networks.

    PubMed

    Khan, Zeeshan Shafi; Moharram, Mohammed Morsi; Alaraj, Abdullah; Azam, Farzana

    2014-01-01

    Vehicular ad hoc networks (VANETs) are one special type of ad hoc networks that involves vehicles on roads. Typically like ad hoc networks, broadcast approach is used for data dissemination. Blind broadcast to each and every node results in exchange of useless and irrelevant messages and hence creates an overhead. Unicasting is not preferred in ad-hoc networks due to the dynamic topology and the resource requirements as compared to broadcasting. Simple broadcasting techniques create several problems on privacy, disturbance, and resource utilization. In this paper, we propose media mixing algorithm to decide what information should be provided to each user and how to provide such information. Results obtained through simulation show that fewer number of keys are needed to share compared to simple broadcasting. Privacy is also enhanced through this approach.

  13. Performance Impacts of Lower-Layer Cryptographic Methods in Mobile Wireless Ad Hoc Networks

    SciTech Connect

    VAN LEEUWEN, BRIAN P.; TORGERSON, MARK D.

    2002-10-01

    In high consequence systems, all layers of the protocol stack need security features. If network and data-link layer control messages are not secured, a network may be open to adversarial manipulation. The open nature of the wireless channel makes mobile wireless mobile ad hoc networks (MANETs) especially vulnerable to control plane manipulation. The objective of this research is to investigate MANET performance issues when cryptographic processing delays are applied at the data-link layer. The results of analysis are combined with modeling and simulation experiments to show that network performance in MANETs is highly sensitive to the cryptographic overhead.

  14. Scalable Mobile Ad Hoc Network (MANET) to Enhance Situational Awareness in Distributed Small Unit Operations

    DTIC Science & Technology

    2015-06-01

    saying that he has called for “a network that would allow soldiers to tap their laptop or smart phone keyboards and obtain the information they need, as...AD HOC NETWORK (MANET) TO ENHANCE SITUATIONAL AWARENESS IN DISTRIBUTED SMALL UNIT OPERATIONS by Jonathan Clarke Driesslein June 2015...REPORT DATE June 2015 3. REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE SCALABLE MOBILE AD HOC NETWORK (MANET) TO

  15. Improving English and Chinese Ad-hoc Retrieval: Tipster Text Phase 3

    DTIC Science & Technology

    1998-10-01

    IMPROVING ENGLISH AND CHINESE AD-HOC RETRIEVAL: TIPSTER TEXT PHASE 3 FINAL REPORT Kui-Lam Kwok Computer Science Department, Queens College, CUNY...all past TREC experiments with consistently superior results. Since 1996, we have also participated in the TIPSTER Text Phase 3 program. This...COVERED 00-00-1998 to 00-00-1998 4. TITLE AND SUBTITLE Improving English and Chinese Ad-hoc Retrieval: TIPSTER Text Phase 3 Final Report 5a

  16. Typicality Mediates Performance during Category Verification in Both Ad-hoc and Well-defined Categories

    PubMed Central

    Sandberg, Chaleece; Sebastian, Rajani; Kiran, Swathi

    2012-01-01

    Background The typicality effect is present in neurologically intact populations for natural, ad-hoc, and well-defined categories. Although sparse, there is evidence of typicality effects in persons with chronic stroke aphasia for natural and ad-hoc categories. However, it is unknown exactly what influences the typicality effect in this population. Aims The present study explores the possible contributors to the typicality effect in persons with aphasia by analyzing and comparing data from both normal and language-disordered populations, from persons with aphasia with more semantic impairment versus those with less semantic impairment, and from two types of categories with very different boundary structure (ad-hoc vs. well-defined). Methods and procedures A total of 40 neurologically healthy adults (20 older, 20 younger) and 35 persons with aphasia (20 LSI (less-semantically impaired) patients, 15 MSI (more-semantically impaired) patients) participated in the study. Participants completed one of two tasks: either category verification for ad-hoc categories or category verification for well-defined categories. Outcomes and Results Neurologically healthy participants showed typicality effects for both ad-hoc and well-defined categories. MSI patients showed a typicality effect for well-defined categories, but not for ad-hoc categories, whereas LSI patients showed a typicality effect for ad-hoc categories, but not for well-defined categories. Conclusions These results suggest that the degree of semantic impairment mediates the typicality effect in persons with aphasia depending on the structure of the category. PMID:22261305

  17. Adaptation of mobile ad-hoc network protocols for sensor networks to vehicle control applications

    NASA Astrophysics Data System (ADS)

    Sato, Kenya; Matsui, Yosuke; Koita, Takahiro

    2005-12-01

    As sensor network applications to monitor and control the physical environment from remote locations, a mobile ad-hoc network (MANET) has been the focus of many recent research and development efforts. A MANET, autonomous system of mobile hosts, is characterized by multi-hop wireless links, absence of any cellular infrastructure, and frequent host mobility. Many kinds of routing protocols for ad-hoc network have been proposed and still actively updated, because each application has different characteristics and requirements. Since the current studies show it is almost impossible to design an efficient routing protocol to be adapted for all kinds of applications. We, therefore, have focused a certain application, inter-vehicle communication for ITS (Intelligent Transport Systems), to evaluate the routing protocols. In our experiment, we defined several traffic flow models for inter-vehicle communication applications. By using simulation, we evaluated end-to-end delay and throughput performance of data transmission for inter-vehicle communications with the existing routing protocols. The result confirms the feasibility of using some routing protocols for inter-vehicle communication services.

  18. Performance Evaluation of Ad Hoc Routing Protocols in a Swarm of Autonomous Unmanned Aerial Vehicles

    DTIC Science & Technology

    2007-03-01

    research in mobile, ad hoc routing protocols. Broch , et al. performed a simulation comparison of the DSDV, DSR, AODV and Temporally-Ordered...July 6, 2005. [Bel58] R. Bellman, “On a Routing Problem,” in Quarterly of Applied Mathematics, 16(1), pp.87-90, 1958. [BJM04] J. Broch , D. B...vol. AD- A404703, 2002. [BMJ98] J. Broch , D. A. Maltz, D. B. Johnson, Y. Hu and J. Jetcheva, “A performance comparison of multi-hop wireless ad hoc

  19. Performance Analysis of Ad Hoc Routing Protocols in City Scenario for VANET

    NASA Astrophysics Data System (ADS)

    Das, Sanjoy; Raw, Ram Shringar; Das, Indrani

    2011-12-01

    In this paper, performance analysis of Location Aided Routing (LAR), AODV and DSR protocol in city scenarios has been done. The mobility model considered is Manhattan model. This mobility model used to emulate the movement pattern of nodes i.e., vehicles on streets defined by maps. Our objective is to provide a comparative analysis among LAR, AODV and DSR protocol in city scenarios in Vehicular Ad hoc Networks. The simulation work has been conducted using the Glomosim 2.03 simulator. The results show that LAR1 protocol achieves maximum packet delivery ratio is 100% in the sparsely populated network. The delay is maximum in AODV 121.88 ms when the number of node is 10 in the network. The results show that LAR1 outperform DSR and AODV in term of packet delivery ratio and end to end delay.

  20. A Decentralized VPN Service over Generalized Mobile Ad-Hoc Networks

    NASA Astrophysics Data System (ADS)

    Fujita, Sho; Shima, Keiichi; Uo, Yojiro; Esaki, Hiroshi

    We present a decentralized VPN service that can be built over generalized mobile ad-hoc networks (Generalized MANETs), in which topologies can be represented as a time-varying directed multigraph. We address wireless ad-hoc networks and overlay ad-hoc networks as instances of Generalized MANETs. We first propose an architecture to operate on various kinds of networks through a single set of operations. Then, we design and implement a decentralized VPN service on the proposed architecture. Through the development and operation of a prototype system we implemented, we found that the proposed architecture makes the VPN service applicable to each instance of Generalized MANETs, and that the VPN service makes it possible for unmodified applications to operate on the networks.

  1. Reliable on-demand multicast routing with congestion control in wireless ad hoc networks

    NASA Astrophysics Data System (ADS)

    Tang, Ken; Gerla, Mario

    2001-07-01

    In this paper, we address the congestion control multicast routing problem in wireless ad hoc networks through the medium access control (MAC) layer. We first introduce the Broadcast Medium Window (BMW) MAC protocol, which provides reliable delivery to broadcast packets at the MAC layer. We then extend the wireless On-Demand Multicast Routing Protocol (ODMRP) to facilitate congestion control in ad hoc networks using BMW. Through simulation, we show that ODMRP with congestion control adapts well to multicast sources that are aggressive in data transmissions.

  2. Routing Protocols to Minimize the Number of Route Disconnections for Communication in Mobile Ad Hoc Networks

    DTIC Science & Technology

    2009-09-01

    Broch , "DSR: The Dynamic Source Routing Protocol for Multi-hop Wireless Ad hoc Networks," in Ad hoc Networking, Chapter 5, C. E. Perkins, Eds. Addison...Project Report: 09/23/2008 to 09/22/2009 W911NF-08-2-0061 References [I] J. Broch , D. A. Maltz, D. B. Johnson, Y. C. Hu and J. Jetcheva, "A...and Mobile Computing, Vol. 2, pp. 723 - 726, Sept. 2005. [4] D. B. Johnson, D. A. Maltz and J. Broch , "DSR: The Dynamic Source Routing Protocol for

  3. From Malicious Eyes: A Method for Concise Representation of Ad-Hoc Networks and Efficient Attack Survivability Analysis

    DTIC Science & Technology

    2012-07-01

    a modification of OSPF that is optimized for mobile ad-hoc networks . OSPFv3MDR uses IPv6 addressing. Topology. In attempts to achieve a suitable...From Malicious Eyes: A Method for Concise Representation of Ad-Hoc Networks and Efficient Attack Survivability Analysis by Jaime C. Acosta...White Sands Missile Range, NM 88002-5501 ARL-TR-6035 July 2012 From Malicious Eyes: A Method for Concise Representation of Ad-Hoc Networks

  4. Analysis of the Robustness Dynamics of Wireless Mobile Ad Hoc Networks via Time Varying Dual Basis Representation

    DTIC Science & Technology

    2015-01-08

    Analysis of the Robustness Dynamics of Wireless Mobile Ad Hoc Networks via Time Varying Dual Basis Representation Thomas Parker, Jamie Johnson...between nodes to analyze the robustness of a wireless mobile ad hoc network (MANET) with a time-varying wireless channel. This spectral analysis and...a single eigenvalue is evaluated. 1. Introduction Mobile ad hoc networks (MANETs) are complex systems that can be foreseen supporting

  5. Report of the ADE Ad Hoc Committee on Governance.

    ERIC Educational Resources Information Center

    ADE Bulletin, 2001

    2001-01-01

    Considers how decisions about curriculum, hiring, and institutional policies have changed due to increasing regulatory, legal, and financial pressures conflicting with ever-magnifying and multiplying sense of need. Identifies three dominant models of institutional governance--models that represent different emphases and that, for the purposes of…

  6. Report of the Ad Hoc Committee on Religious and Cultural Celebrations in the Library.

    ERIC Educational Resources Information Center

    Rathemacher, Andree; Grubman, Sheila Black; Lahiri, Amar; Gilton, Donna; Sharif, Mohammed

    The charge of the University of Rhode Island's Ad Hoc Committee on Religious and Cultural Celebrations in the Library was to: investigate all opportunities for the library to educate the campus community about religious and cultural holidays; consider all the major religions of the world and the possibility of having displays for the symbols of…

  7. The 5th Meeting of the Ad Hoc Panel on Terminal Configured Vehicles

    NASA Technical Reports Server (NTRS)

    1977-01-01

    A report of the fifth meeting of the NASA Research and Technology Advisory Council, Ad Hoc panel on Terminal Configured Vehicles is presented. Some of the following topics were discussed; (1) microwave landing systems; (2) whole word computer system status; (3) flight path angle control: (4) VTOL approaches and landing technology; and (5) simulation study in wind shear.

  8. A Comprehensive Performance Comparison of On-Demand Routing Protocols in Mobile Ad-Hoc Networks

    NASA Astrophysics Data System (ADS)

    Khan, Jahangir; Hayder, Syed Irfan

    Mobile ad hoc network is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves on a fly. In this paper we focus on the performance of the on-demand routing protocols such as DSR and AODV in ad-hoc networks. We have observed the performance change of each protocol through simulation with varying the data in intermediate nodes and to compare data throughput in each mobile modes of each protocol to analyze the packet fraction for application data. The objective of this work is to evaluate two routing protocols such as On-demand behavior, namely, Ad hoc Demand Distance vector (AODV) and Dynamic Source Routing (DSR), for wireless ad hoc networks based on performance of intermediate nodes for the delivery of data form source to destination and vice versa in order to compare the efficiency of throughput in the neighbors nodes. To overcome we have proposed OPNET simulator for performance comparison of hop to hop delivery of data packet in autonomous system.

  9. Using Dominating Sets to Improve the Performance of Mobile Ad Hoc Networks

    DTIC Science & Technology

    2005-09-01

    Communications Research Group (CCRG) directed by J.J., and students (Cintia, Nacho, Kumar and Venkatesh ) in Katia’s lab for their fellowship. I cannot...wireless conference, pages 156–162, 2002. [41] Katia Obraczka, Kumar Viswanath , and Gene Tsudik. Flooding for reliable multicast in multi-hop ad hoc

  10. Combining Infrastructure and Ad Hoc Collaboration for Data Management in Mobile Wireless Networks

    DTIC Science & Technology

    2005-01-01

    Elizabeth M. Royer. "Ad hoc On-Demand Distance Vector Routing." Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications...Charles Perkins, ACM SIGCOMM󈨢 Conference on Communications Architectures, Protocols and Applications 22. Vincent D. Park and M. Scott Corson , A

  11. Work, Family, and Community: Summary Proceedings of an Ad Hoc Committee.

    ERIC Educational Resources Information Center

    Hayes, Cheryl D., Ed.

    These proceedings contain summaries of five working group discussions and a discussion of suggestions for future research from an ad hoc meeting on Work, Family, and Community (Fedruary 21-22, 1980) in Washington, D.C. The meeting had these objectives: (1) to identify salient policy and research issues associated with changing patterns of labor…

  12. Attaining Realistic Simulations of Mobile Ad-hoc Networks

    DTIC Science & Technology

    2010-06-01

    Optimized 2-8 Network Engineering Tools ( OPNET ) [33], and Global Mobile Information Systems Simulation Library (GloMoSim) [30]. NS and GloMoSim are...both provided as open use software to researchers, whereas OPNET is a commercial simulation engine. While all of these engines can simulate MANETs, the...key environmental and technical aspects have yet to be accurately modeled in any of the major simulation engines such as OPNET Modeler, NS-2, or

  13. A Discovery Process for Initializing Ad Hoc Underwater Acoustic Networks

    DTIC Science & Technology

    2008-12-01

    Bay (near the Seaweb network gateway node). ..................................................................... 15 Figure 11. Bellhop eigenray ...compute the eigenray traces and channel impulse response using code from Torres [18] that employs a Bellhop Gaussian beam tracing acoustic propagation...model. Figure 11 depicts the eigenray traces and channel impulse response for the Halifax trial environment with a transmit frequency of 12 kHz, water

  14. Mobile Ad Hoc Networks: An Evaluation of Smartphone Technologies

    DTIC Science & Technology

    2011-10-01

    dans un tel environnement et offre une comparaison des diverses plateformes de téléphone intel- ligent disponibles à l’égard de leurs capacités et...CORA CR 2011-169 5 Networking and the Open System Interconnection Model The International Organization for Standardization (ISO) began working on a

  15. Credible Mobile and Ad Hoc Network Simulation-Based Studies

    DTIC Science & Technology

    2006-10-26

    packet radio. In Proceed- ings of the 9th ARRL /CRRL Amateur Radio Computer Networking Conference, pages 134-140, 1990. [45] H. Kee. NAM support for...Selected Areas in Communications (JSAC), pages 1335-1346, 2004. [102] P. Welch. The Computer Performance Modeling Handbook , chapter The Statis- tical

  16. Report of ad hoc OTEC cold water pipe committee

    SciTech Connect

    Barr, R.; Giannotti, J.; Deuchler, W.; Scotti, R.; Stadter, J.; Walsh, J. P.; Weiss, R.

    1980-02-01

    Now that the design work on the pilot plant is scheduled to start in the near future, DOE has considered it essential that an overall look be taken at the cold water pipe design process. The VSE Corporation, in its role as a support contractor to DOE, was tasked to organize a small study group to answer the question, Where do we stand on the verification of the computer models of the cold water pipe response by experimental measurements. The committee has studied all the available results of the cold water pipe development program. This report summarizes those results. The development and present capabilities of the computer programs used to calculate the response of a cold water pipe attached to a platform under known at-sea conditions are discussed. The various cold water pipe designs that have been done using the computer programs are summarized. The experiments that have been conducted up to the present time to measure the response of cold water pipes at-sea and in experimental tanks are described. The results of these experiments are presented. The experimental results are compared with the predictions made with the analytical computer programs. Conclusions drawn as a result of this analysis are presented and some recommendations are made. (WHK)

  17. Ad Hoc Supervision of General Practice Registrars as a "Community of Practice": Analysis, Interpretation and Re-Presentation

    ERIC Educational Resources Information Center

    Clement, T.; Brown, J.; Morrison, J.; Nestel, D.

    2016-01-01

    General practice registrars in Australia undertake most of their vocational training in accredited general practices. They typically see patients alone from the start of their community-based training and are expected to seek timely ad hoc support from their supervisor. Such ad hoc encounters are a mechanism for ensuring patient safety, but also…

  18. 76 FR 71308 - Codex Alimentarius Commission: Meeting of the Ad Hoc Intergovernmental Codex Task Force on Animal...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-17

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF AGRICULTURE Food Safety and Inspection Service Codex Alimentarius Commission: Meeting of the Ad Hoc... United States (U.S.) positions that will be discussed at the 6th Session of the Ad Hoc...

  19. Protocols for Detection and Removal of Wormholes for Secure Routing and Neighborhood Creation in Wireless Ad Hoc Networks

    ERIC Educational Resources Information Center

    Hayajneh, Thaier Saleh

    2009-01-01

    Wireless ad hoc networks are suitable and sometimes the only solution for several applications. Many applications, particularly those in military and critical civilian domains (such as battlefield surveillance and emergency rescue) require that ad hoc networks be secure and stable. In fact, security is one of the main barriers to the extensive use…

  20. Characterizing the Interaction Between Routing and MAC Protocols in Ad-Hoc Networks

    SciTech Connect

    Barrett, C. L.; Drozda, M.; Marathe, A.; Marathe, M. V.

    2002-01-01

    We empirically study the effect of mobility on the performance of protocols designed for wireless ad-hoc networks. An important objective is to study the interaction of the Routing and MAC layer protocols under different mobility parameters. We use three basic mobility models: grid mobility model, random waypoint model, and exponential correlated random model. The performance of protocols is measured in terms of (i) latency, (ii) throughput, (iii) number of packets received, (iv) long term fairness and (v) number of control packets at the MAC and routing layer level. Three different commonly studied routing protocols are used: AODV, DSR and LAR1. Similarly three well known MAC protocols are used: MACA, 802.1 1 and CSMA. Our main contribution is simulation based experiments coupled with rigorous statistical analysis to characterize the interaction of MAC layer protocols with routing layer protocols in ad-hoc networks. From the results, we can conclude the following: e No single MAC or Routing protocol dominated the other protocols in their class. Probably more interestingly, no MAURouting protocol combination was better than other combinations over all scenarios and response variables. 0 In general, it is not meaningful to speak about a MAC or a routing protocol in isolation. Presence of interaction leads to trade-offs between the amount of control packets generated by each layer. The results raise the possibility of improving the performance of a particular MAC layer protocol by using a cleverly designed routing protocol or vice-versa. Thus in order to improve the performanceof a communication network, it is important to study the entire protocol stack as a single algorithmic construct; optimizing individual layers in the seven layer OS1 stack will not yield performance improvements beyond a point. A methodological contribution of this paper is the use of statistical methods such as analysis of variance (ANOVA), to characterize the interaction between the protocols

  1. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks

    PubMed Central

    Vara, M. Isabel; Campo, Celeste

    2015-01-01

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead. PMID:26205272

  2. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks.

    PubMed

    Vara, M Isabel; Campo, Celeste

    2015-07-20

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead.

  3. Virtual machine-based simulation platform for mobile ad-hoc network-based cyber infrastructure

    SciTech Connect

    Yoginath, Srikanth B.; Perumalla, Kayla S.; Henz, Brian J.

    2015-09-29

    In modeling and simulating complex systems such as mobile ad-hoc networks (MANETs) in de-fense communications, it is a major challenge to reconcile multiple important considerations: the rapidity of unavoidable changes to the software (network layers and applications), the difficulty of modeling the critical, implementation-dependent behavioral effects, the need to sustain larger scale scenarios, and the desire for faster simulations. Here we present our approach in success-fully reconciling them using a virtual time-synchronized virtual machine(VM)-based parallel ex-ecution framework that accurately lifts both the devices as well as the network communications to a virtual time plane while retaining full fidelity. At the core of our framework is a scheduling engine that operates at the level of a hypervisor scheduler, offering a unique ability to execute multi-core guest nodes over multi-core host nodes in an accurate, virtual time-synchronized manner. In contrast to other related approaches that suffer from either speed or accuracy issues, our framework provides MANET node-wise scalability, high fidelity of software behaviors, and time-ordering accuracy. The design and development of this framework is presented, and an ac-tual implementation based on the widely used Xen hypervisor system is described. Benchmarks with synthetic and actual applications are used to identify the benefits of our approach. The time inaccuracy of traditional emulation methods is demonstrated, in comparison with the accurate execution of our framework verified by theoretically correct results expected from analytical models of the same scenarios. In the largest high fidelity tests, we are able to perform virtual time-synchronized simulation of 64-node VM-based full-stack, actual software behaviors of MANETs containing a mix of static and mobile (unmanned airborne vehicle) nodes, hosted on a 32-core host, with full fidelity of unmodified ad-hoc routing protocols, unmodified application

  4. Virtual machine-based simulation platform for mobile ad-hoc network-based cyber infrastructure

    DOE PAGES

    Yoginath, Srikanth B.; Perumalla, Kayla S.; Henz, Brian J.

    2015-09-29

    In modeling and simulating complex systems such as mobile ad-hoc networks (MANETs) in de-fense communications, it is a major challenge to reconcile multiple important considerations: the rapidity of unavoidable changes to the software (network layers and applications), the difficulty of modeling the critical, implementation-dependent behavioral effects, the need to sustain larger scale scenarios, and the desire for faster simulations. Here we present our approach in success-fully reconciling them using a virtual time-synchronized virtual machine(VM)-based parallel ex-ecution framework that accurately lifts both the devices as well as the network communications to a virtual time plane while retaining full fidelity. At themore » core of our framework is a scheduling engine that operates at the level of a hypervisor scheduler, offering a unique ability to execute multi-core guest nodes over multi-core host nodes in an accurate, virtual time-synchronized manner. In contrast to other related approaches that suffer from either speed or accuracy issues, our framework provides MANET node-wise scalability, high fidelity of software behaviors, and time-ordering accuracy. The design and development of this framework is presented, and an ac-tual implementation based on the widely used Xen hypervisor system is described. Benchmarks with synthetic and actual applications are used to identify the benefits of our approach. The time inaccuracy of traditional emulation methods is demonstrated, in comparison with the accurate execution of our framework verified by theoretically correct results expected from analytical models of the same scenarios. In the largest high fidelity tests, we are able to perform virtual time-synchronized simulation of 64-node VM-based full-stack, actual software behaviors of MANETs containing a mix of static and mobile (unmanned airborne vehicle) nodes, hosted on a 32-core host, with full fidelity of unmodified ad-hoc routing protocols, unmodified

  5. Ad Hoc Query Support For Very Large Simulation Mesh Data: The Metadata Approach

    SciTech Connect

    Lee, B; Snapp, R; Musick, R; Critchlow, T

    2001-12-17

    We present our approach to enabling approximate ad hoc queries on terabyte-scale mesh data generated from large scientific simulations through the extension and integration of database, statistical, and data mining techniques. There are several significant barriers to overcome in achieving this objective. First, large-scale simulation data is already at the multi-terabyte scale and growing quickly, thus rendering traditional forms of interactive data exploration and query processing untenable. Second, a priori knowledge of user queries is not available, making it impossible to tune special-purpose solutions. Third, the data has spatial and temporal aspects, as well as arbitrarily high dimensionality, which exacerbates the task of finding compact, accurate, and easy-to-compute data models. Our approach is to preprocess the mesh data to generate highly compressed, lossy models that are used in lieu of the original data to answer users' queries. This approach leads to interesting challenges. The model (equivalently, the content-oriented metadata) being generated must be smaller than the original data by at least an order of magnitude. Second, the metadata representation must contain enough information to support a broad class of queries. Finally, the accuracy and speed of the queries must be within the tolerances required by users. In this paper we give an overview of ongoing development efforts with an emphasis on extracting metadata and using it in query processing.

  6. Enhancements for distributed certificate authority approaches for mobile wireless ad hoc networks.

    SciTech Connect

    Van Leeuwen, Brian P.; Michalski, John T.; Anderson, William Erik

    2003-12-01

    Mobile wireless ad hoc networks that are resistant to adversarial manipulation are necessary for distributed systems used in military and security applications. Critical to the successful operation of these networks, which operate in the presence of adversarial stressors, are robust and efficient information assurance methods. In this report we describe necessary enhancements for a distributed certificate authority (CA) used in secure wireless network architectures. Necessary cryptographic algorithms used in distributed CAs are described and implementation enhancements of these algorithms in mobile wireless ad hoc networks are developed. The enhancements support a network's ability to detect compromised nodes and facilitate distributed CA services. We provide insights to the impacts the enhancements will have on network performance with timing diagrams and preliminary network simulation studies.

  7. PNNI routing support for ad hoc mobile networking: A flat architecture

    SciTech Connect

    Martinez, L.; Sholander, P.; Tolendino, L.

    1997-12-01

    This contribution extends the Outside Nodal Hierarchy List (ONHL) procedures described in ATM Form Contribution 97-0766. These extensions allow multiple mobile networks to form either an ad hoc network or an extension of a fixed PNNI infrastructure. This contribution covers the simplest case where the top-most Logical Group Nodes (LGNs), in those mobile networks, all reside at the same level in a PNNI hierarchy. Future contributions will cover the general case where those top-most LGNs reside at different hierarchy levels. This contribution considers a flat ad hoc network architecture--in the sense that each mobile network always participates in the PNNI hierarchy at the preconfigured level of its top-most LGN.

  8. Design of free patterns of nanocrystals with ad hoc features via templated dewetting

    NASA Astrophysics Data System (ADS)

    Aouassa, M.; Berbezier, I.; Favre, L.; Ronda, A.; Bollani, M.; Sordan, R.; Delobbe, A.; Sudraud, P.

    2012-07-01

    Design of monodisperse ultra-small nanocrystals (NCs) into large scale patterns with ad hoc features is demonstrated. The process makes use of solid state dewetting of a thin film templated through alloy liquid metal ion source focused ion beam (LMIS-FIB) nanopatterning. The solid state dewetting initiated at the edges of the patterns controllably creates the ordering of NCs with ad hoc placement and periodicity. The NC size is tuned by varying the nominal thickness of the film while their position results from the association of film retraction from the edges of the lay out and Rayleigh-like instability. The use of ultra-high resolution LMIS-FIB enables to produce monocrystalline NCs with size, periodicity, and placement tunable as well. It provides routes for the free design of nanostructures for generic applications in nanoelectronics.

  9. Forming an ad-hoc nearby storage, based on IKAROS and social networking services

    NASA Astrophysics Data System (ADS)

    Filippidis, Christos; Cotronis, Yiannis; Markou, Christos

    2014-06-01

    We present an ad-hoc "nearby" storage, based on IKAROS and social networking services, such as Facebook. By design, IKAROS is capable to increase or decrease the number of nodes of the I/O system instance on the fly, without bringing everything down or losing data. IKAROS is capable to decide the file partition distribution schema, by taking on account requests from the user or an application, as well as a domain or a Virtual Organization policy. In this way, it is possible to form multiple instances of smaller capacity higher bandwidth storage utilities capable to respond in an ad-hoc manner. This approach, focusing on flexibility, can scale both up and down and so can provide more cost effective infrastructures for both large scale and smaller size systems. A set of experiments is performed comparing IKAROS with PVFS2 by using multiple clients requests under HPC IOR benchmark and MPICH2.

  10. The Ad Hoc process to strengthen the framework convention on climate change

    SciTech Connect

    Ramakrishna, K.; Deutz, A.M.; Jacobsen, L.A.

    1995-11-01

    The Woods Hole Research Center convened an International Conference on The Ad Hoc Process to Strengthen the Framework Convention on Climate Change in Woods Hole, MA, on October 7-9, 1995. The conference was conducted to examine the prospects for successful adoption of a protocol to the Framework Convention on Climate Change by 1997. In preparation for the Second session of the Ad Hoc Group on the Berlin Mandate, several governmental and nongovernmental representatives met in Woods Hole to discuss the process and possible outcome of the Berlin Mandate negotiations for a protocol or other legal instrument to strengthen the Convention. The conference was by invitation and all participants attended in their personal capacities.

  11. PNNI routing support for ad hoc mobile networking: The multilevel case

    SciTech Connect

    Martinez, L.; Sholander, P.; Tolendino, L.

    1998-01-01

    This contribution extends the Outside Nodal Hierarchy List (ONHL) procedures described in ATM Forum Contributions 97-0766 and 97-0933. These extensions allow multiple mobile networks to form either an ad hoc network or an extension of a fixed PNNI infrastructure. A previous contribution (97-1073) covered the simplest case where the top-most Logical Group Nodes (LGNs), in those mobile networks, all resided at the same level in a PNNI hierarchy. This contribution covers the more general case wherein those top-most LGNs may reside at different PNNI hierarchy levels. Both of the SNL contributions consider flat ad hoc network architectures in the sense that each mobile network always participates in the PNNI hierarchy at the pre-configured level of its top-most LGN.

  12. Analysis and Proposal of Position-Based Routing Protocols for Vehicular Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Okada, Hiraku; Takano, Akira; Mase, Kenichi

    One of the most promising applications of a mobile ad hoc network is a vehicular ad hoc network (VANET). Each vehicle is aware of its position information by GPS or other methods, so position-based routing is a useful approach in VANET. The position-based routing protocol can be classified roughly into a next-hop forwarding method and a directed flooding method. We evaluate performance of both methods by analytic approach and compare them in this paper. From the evaluation results, we conclude that it is effective for the position-based routing to choose either the next-hop forwarding method or the directed flooding method according to the environment. Then we propose the hybrid transmission method which can select one of them according to the environment, and clarify that the proposed method can keep the packet delivery ratio at a high level and reduce the delay time.

  13. Vehicular ad hoc network for a surveillance system using multifrequency band enhancement

    NASA Astrophysics Data System (ADS)

    Bunruangses, Montree; Sunat, Khamron; Mitatha, Somsak; Yupapin, Preecha P.

    2010-09-01

    We present a new design of a surveillance system via a vehicular ad hoc network (VANET) integrated by a 3-G or 4-G cellular wireless network. We propose dense wavelength division multiplexing wavelength enhancement for increasing the channel capacity and signal security. Increase in the number of channels can be obtained by increasing the wavelength density. Signal security is introduced by a specific wavelength filter controlled by the central operator. Optical communication wavelength enhancement is reviewed. The advantage of this proposed system is that it can easily be implemented and incorporated into the existing communication link in either a cellular or ad hoc wireless system, where signal security and hence privacy can be provided.

  14. An Optimal CDS Construction Algorithm with Activity Scheduling in Ad Hoc Networks.

    PubMed

    Penumalli, Chakradhar; Palanichamy, Yogesh

    2015-01-01

    A new energy efficient optimal Connected Dominating Set (CDS) algorithm with activity scheduling for mobile ad hoc networks (MANETs) is proposed. This algorithm achieves energy efficiency by minimizing the Broadcast Storm Problem [BSP] and at the same time considering the node's remaining energy. The Connected Dominating Set is widely used as a virtual backbone or spine in mobile ad hoc networks [MANETs] or Wireless Sensor Networks [WSN]. The CDS of a graph representing a network has a significant impact on an efficient design of routing protocol in wireless networks. Here the CDS is a distributed algorithm with activity scheduling based on unit disk graph [UDG]. The node's mobility and residual energy (RE) are considered as parameters in the construction of stable optimal energy efficient CDS. The performance is evaluated at various node densities, various transmission ranges, and mobility rates. The theoretical analysis and simulation results of this algorithm are also presented which yield better results.

  15. EGPS: An Efficient Privacy Preserving Scheme for Vehicular ad hoc Networks

    NASA Astrophysics Data System (ADS)

    Zhao, Baokang; Su, Xiangyu; Su, Jinshu; Song, Ziming; Sun, Yipin; Tao, Jing; Tang, Yong; Chen, Shuhui; Zhao, Guohong; Chen, Yijiao

    2010-09-01

    In this paper, we propose EGPS, an efficient privacy preserving scheme for vehicular ad hoc networks. The EGPS scheme is based on a very efficient group signature and Identity Based Cryptography(IBC) techniques. Several security properties of EGPS, including the correctness and unforgeability have been proved. Furthermore, EGPS is also proved to be more efficient than GSIS, which is currently one of the best state-of-the-art VANET privacy preserving schemes.

  16. Adaptive Demand-Driven Multicast Routing in Multi-Hop Wireless Ad Hoc Networks

    DTIC Science & Technology

    2004-05-06

    16] L. Ji and M. S. Corson . A Lightweight Adaptive Multicast Algorithm. In Proceedings of IEEE GLOBECOM ’98, pages 1036–1042, December 1998. [17] L...Ji and M. S. Corson . Differential Destination Multicast (DDM) Specification. Internet- Draft, draft-ietf-manet-ddm-00.txt, July 2000. Work in...3 [30] Charles E. Perkins, Elizabeth M. Royer, and Samir R. Das. Ad Hoc On Demand Distance Vector (AODV) Routing. Internet-Draft, draft-ietf-manet

  17. A Performance Comparison of On-Demand Multicast Routing Protocols for Ad Hoc Networks

    DTIC Science & Technology

    2004-12-15

    33–44, October 2001. [10] L. Ji and M. S. Corson . A Lightweight Adaptive Multicast Algorithm. In Proceedings of IEEE GLOBECOM ’98, pages 1036–1042...December 1998. [11] L. Ji and M. S. Corson . Differential Destination Multicast (DDM) Specification. Internet- Draft, draft-ietf-manet-ddm-00.txt, July... Elizabeth M. Royer and Charles E. Perkins. Multicast Operation of the Ad-hoc On- Demand Distance Vector Routing Protocol. In Proceedings of the Fifth

  18. Ad Hoc Categories and False Memories: Memory Illusions for Categories Created On-the-Spot.

    PubMed

    Soro, Jerônimo C; Ferreira, Mário B; Semin, Gün R; Mata, André; Carneiro, Paula

    2017-04-06

    Three experiments were designed to test whether experimentally created ad hoc associative networks evoke false memories. We used the DRM (Deese, Roediger, McDermott) paradigm with lists of ad hoc categories composed of exemplars aggregated toward specific goals (e.g., going for a picnic) that do not share any consistent set of features. Experiment 1 revealed considerable levels of false recognitions of critical words from ad hoc categories. False recognitions occurred even when the lists were presented without an organizing theme (i.e., the category's label). Experiments 1 and 2 tested whether (a) the ease of identifying the categories' themes, and (b) the lists' backward associative strength could be driving the effect. List identifiability did not correlate with false recognition, and the effect remained even when backward associative strength was controlled for. Experiment 3 manipulated the distractor items in the recognition task to address the hypothesis that the salience of unrelated items could be facilitating the occurrence of the phenomenon. The effect remained when controlling for this source of facilitation. These results have implications for assumptions made by theories of false memories, namely the preexistence of associations in the activation-monitoring framework and the central role of gist extraction in fuzzy-trace theory, while providing evidence of the occurrence of false memories for more dynamic and context-dependent knowledge structures. (PsycINFO Database Record

  19. Real Time Semantic Interoperability in AD HOC Networks of Geospatial Data Sources: Challenges, Achievements and Perspectives

    NASA Astrophysics Data System (ADS)

    Mostafavi, M. A.; Bakillah, M.

    2012-07-01

    Recent advances in geospatial technologies have made available large amount of geospatial data. Meanwhile, new developments in Internet and communication technologies created a shift from isolated geospatial databases to ad hoc networks of geospatial data sources, where data sources can join or leave the network, and form groups to share data and services. However, effective integration and sharing of geospatial data among these data sources and their users are hampered by semantic heterogeneities. These heterogeneities affect the spatial, temporal and thematic aspects of geospatial concepts. There have been many efforts to address semantic interoperability issues in the geospatial domain. These efforts were mainly focused on resolving heterogeneities caused by different and implicit representations of the concepts. However, many approaches have focused on the thematic aspects, leaving aside the explicit representation of spatial and temporal aspects. Also, most semantic interoperability approaches for networks have focused on automating the semantic mapping process. However, the ad hoc network structure is continuously modified by source addition or removal, formation of groups, etc. This dynamic aspect is often neglected in those approaches. This paper proposes a conceptual framework for real time semantic interoperability in ad hoc networks of geospatial data sources. The conceptual framework presents the fundamental elements of real time semantic interoperability through a hierarchy of interrelated semantic states and processes. Then, we use the conceptual framework to set the discussion on the achievements that have already been made, the challenges that remain to be addressed and perspectives with respect to these challenges.

  20. A communication theoretical analysis of FRET-based mobile ad hoc molecular nanonetworks.

    PubMed

    Kuscu, Murat; Akan, Ozgur B

    2014-09-01

    Nanonetworks refer to a group of nanosized machines with very basic operational capabilities communicating to each other in order to accomplish more complex tasks such as in-body drug delivery, or chemical defense. Realizing reliable and high-rate communication between these nanomachines is a fundamental problem for the practicality of these nanonetworks. Recently, we have proposed a molecular communication method based on Förster Resonance Energy Transfer (FRET) which is a nonradiative excited state energy transfer phenomenon observed among fluorescent molecules, i.e., fluorophores. We have modeled the FRET-based communication channel considering the fluorophores as single-molecular immobile nanomachines, and shown its reliability at high rates, and practicality at the current stage of nanotechnology. In this study, for the first time in the literature, we investigate the network of mobile nanomachines communicating through FRET. We introduce two novel mobile molecular nanonetworks: FRET-based mobile molecular sensor/actor nanonetwork (FRET-MSAN) which is a distributed system of mobile fluorophores acting as sensor or actor node; and FRET-based mobile ad hoc molecular nanonetwork (FRET-MAMNET) which consists of fluorophore-based nanotransmitter, nanoreceivers and nanorelays. We model the single message propagation based on birth-death processes with continuous time Markov chains. We evaluate the performance of FRET-MSAN and FRET-MAMNET in terms of successful transmission probability and mean extinction time of the messages, system throughput, channel capacity and achievable communication rates.

  1. Ad hoc CubeSat constellations: Secondary launch coverage and distribution

    NASA Astrophysics Data System (ADS)

    Marinan, A.; Nicholas, A.; Cahoy, K.

    The primary purpose of a constellation is to obtain global measurements with improved spatial and temporal resolution. The small size, low cost, standardized form factor, and increasing availability of commercial parts for CubeSats make them ideal for use in constellations. However, without taking advantage of secondary payload opportunities, it would be costly to launch and distribute a CubeSat constellation into a specific configuration. A cost-effective way to launch a constellation of CubeSats is via consecutive secondary payload launch opportunities, but the resulting constellation would be an ad hoc mix of orbit parameters. We focus on the feasibility of cobbling together constellation-like functionality from multiple secondary payload opportunities. Each participating CubeSat (or set of CubeSats) per launch could have completely different orbital parameters, even without propulsion onboard the CubeSats or intermediate transfer carriers. We look at the ground coverages that could be obtained for a constellation of five to six orbital planes with one to six satellites in each plane. We analyze past and announced future launch opportunities for CubeSats, including launch platforms supported by the NASA Educational Launch of Nanosatellites (ELaNa). We consider combinations of possible launch locations and temporal spacings over the course of one year and simulate the resulting ground coverage patterns and revisit times for an ad hoc constellation using these launch opportunities. We perform this analysis for two separate case studies - one with only US launches and one with both US and non-US opportunities - and vary the number of satellites per orbital plane. Typical CubeSat mission lifetimes and deorbit times for low-altitude orbits are included in these analyses. The ad hoc constellation results are compared to coverage from uniformly-placed LEO constellations and are quantified in terms of revisit time, time to 100% global coverage, and response time. For mu

  2. A Game Theory Algorithm for Intra-Cluster Data Aggregation in a Vehicular Ad Hoc Network.

    PubMed

    Chen, Yuzhong; Weng, Shining; Guo, Wenzhong; Xiong, Naixue

    2016-02-19

    Vehicular ad hoc networks (VANETs) have an important role in urban management and planning. The effective integration of vehicle information in VANETs is critical to traffic analysis, large-scale vehicle route planning and intelligent transportation scheduling. However, given the limitations in the precision of the output information of a single sensor and the difficulty of information sharing among various sensors in a highly dynamic VANET, effectively performing data aggregation in VANETs remains a challenge. Moreover, current studies have mainly focused on data aggregation in large-scale environments but have rarely discussed the issue of intra-cluster data aggregation in VANETs. In this study, we propose a multi-player game theory algorithm for intra-cluster data aggregation in VANETs by analyzing the competitive and cooperative relationships among sensor nodes. Several sensor-centric metrics are proposed to measure the data redundancy and stability of a cluster. We then study the utility function to achieve efficient intra-cluster data aggregation by considering both data redundancy and cluster stability. In particular, we prove the existence of a unique Nash equilibrium in the game model, and conduct extensive experiments to validate the proposed algorithm. Results demonstrate that the proposed algorithm has advantages over typical data aggregation algorithms in both accuracy and efficiency.

  3. A DNA-Inspired Encryption Methodology for Secure, Mobile Ad Hoc Networks

    NASA Technical Reports Server (NTRS)

    Shaw, Harry

    2012-01-01

    Users are pushing for greater physical mobility with their network and Internet access. Mobile ad hoc networks (MANET) can provide an efficient mobile network architecture, but security is a key concern. A figure summarizes differences in the state of network security for MANET and fixed networks. MANETs require the ability to distinguish trusted peers, and tolerate the ingress/egress of nodes on an unscheduled basis. Because the networks by their very nature are mobile and self-organizing, use of a Public Key Infra structure (PKI), X.509 certificates, RSA, and nonce ex changes becomes problematic if the ideal of MANET is to be achieved. Molecular biology models such as DNA evolution can provide a basis for a proprietary security architecture that achieves high degrees of diffusion and confusion, and resistance to cryptanalysis. A proprietary encryption mechanism was developed that uses the principles of DNA replication and steganography (hidden word cryptography) for confidentiality and authentication. The foundation of the approach includes organization of coded words and messages using base pairs organized into genes, an expandable genome consisting of DNA-based chromosome keys, and a DNA-based message encoding, replication, and evolution and fitness. In evolutionary computing, a fitness algorithm determines whether candidate solutions, in this case encrypted messages, are sufficiently encrypted to be transmitted. The technology provides a mechanism for confidential electronic traffic over a MANET without a PKI for authenticating users.

  4. A Game Theory Algorithm for Intra-Cluster Data Aggregation in a Vehicular Ad Hoc Network

    PubMed Central

    Chen, Yuzhong; Weng, Shining; Guo, Wenzhong; Xiong, Naixue

    2016-01-01

    Vehicular ad hoc networks (VANETs) have an important role in urban management and planning. The effective integration of vehicle information in VANETs is critical to traffic analysis, large-scale vehicle route planning and intelligent transportation scheduling. However, given the limitations in the precision of the output information of a single sensor and the difficulty of information sharing among various sensors in a highly dynamic VANET, effectively performing data aggregation in VANETs remains a challenge. Moreover, current studies have mainly focused on data aggregation in large-scale environments but have rarely discussed the issue of intra-cluster data aggregation in VANETs. In this study, we propose a multi-player game theory algorithm for intra-cluster data aggregation in VANETs by analyzing the competitive and cooperative relationships among sensor nodes. Several sensor-centric metrics are proposed to measure the data redundancy and stability of a cluster. We then study the utility function to achieve efficient intra-cluster data aggregation by considering both data redundancy and cluster stability. In particular, we prove the existence of a unique Nash equilibrium in the game model, and conduct extensive experiments to validate the proposed algorithm. Results demonstrate that the proposed algorithm has advantages over typical data aggregation algorithms in both accuracy and efficiency. PMID:26907272

  5. An Ad-hoc Satellite Network to Measure Filamentary Current Structures in the Auroral Zone

    NASA Astrophysics Data System (ADS)

    Nabong, C.; Fritz, T. A.; Semeter, J. L.

    2014-12-01

    An ad-hoc cubesat-based satellite network project known as ANDESITE is under development at Boston University. It aims to develop a dense constellation of easy-to-use, rapidly-deployable low-cost wireless sensor nodes in space. The objectives of the project are threefold: 1) Demonstrate viability of satellite based sensor networks by deploying an 8-node miniature sensor network to study the filamentation of the field aligned currents in the auroral zones of the Earth's magnetosphere. 2) Test the scalability of proposed protocols, including localization techniques, tracking, data aggregation, and routing, for a 3 dimensional wireless sensor network using a "flock" of nodes. 3) Construct a 6U Cube-sat running the Android OS as an integrated constellation manager, data mule and sensor node deplorer. This small network of sensor nodes will resolve current densities at different spatial resolutions in the near-Earth magnetosphere using measurements from magnetometers with 1-nT sensitivities and 0.2 nT/√Hz self-noise. Mapping of these currents will provide new constraints for models of auroral particle acceleration, wave-particle interactions, ionospheric destabilization, and other kinetic processes operating in the low-beta plasma of the near Earth magnetosphere.

  6. Awareness of Emerging Wireless Technologies: Ad-hoc and Personal Area Networks Standards and Emerging Technologies (Sensibilisation a l’emergence des technologies sans fil: technologies emergeantes et normes de reseaux personnels et ad-hoc)

    DTIC Science & Technology

    2007-04-01

    Projet Hipercom – INRIA Rocquencourt. [14] Performance analysis of OLSR Multipoint Relay flooding in two ad hoc wireless network models N°4260...comporter la dénomination « RTO » ou « AGARD » selon le cas, suivi du numéro de série. Des informations analogues, telles que le titre est la date de...RTO » ou « AGARD » selon le cas, suivie du numéro de série (par exemple AGARD-AG-315). Des informations analogues, telles que le titre et la date

  7. 78 FR 8145 - Sequence 24 Findings of the EISA 436(h) Ad-Hoc Review Group on Green Building Certification Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-05

    ... ADMINISTRATION Sequence 24 Findings of the EISA 436(h) Ad-Hoc Review Group on Green Building Certification... partners in the EISA 436(h) Ad-Hoc Discussion Group are seeking public input regarding possible approaches... certification of green Federal buildings. GSA is using the deliberations from the EISA 436(h) Ad-hoc...

  8. Dynamic fair node spectrum allocation for ad hoc networks using random matrices

    NASA Astrophysics Data System (ADS)

    Rahmes, Mark; Lemieux, George; Chester, Dave; Sonnenberg, Jerry

    2015-05-01

    Dynamic Spectrum Access (DSA) is widely seen as a solution to the problem of limited spectrum, because of its ability to adapt the operating frequency of a radio. Mobile Ad Hoc Networks (MANETs) can extend high-capacity mobile communications over large areas where fixed and tethered-mobile systems are not available. In one use case with high potential impact, cognitive radio employs spectrum sensing to facilitate the identification of allocated frequencies not currently accessed by their primary users. Primary users own the rights to radiate at a specific frequency and geographic location, while secondary users opportunistically attempt to radiate at a specific frequency when the primary user is not using it. We populate a spatial radio environment map (REM) database with known information that can be leveraged in an ad hoc network to facilitate fair path use of the DSA-discovered links. Utilization of high-resolution geospatial data layers in RF propagation analysis is directly applicable. Random matrix theory (RMT) is useful in simulating network layer usage in nodes by a Wishart adjacency matrix. We use the Dijkstra algorithm for discovering ad hoc network node connection patterns. We present a method for analysts to dynamically allocate node-node path and link resources using fair division. User allocation of limited resources as a function of time must be dynamic and based on system fairness policies. The context of fair means that first available request for an asset is not envied as long as it is not yet allocated or tasked in order to prevent cycling of the system. This solution may also save money by offering a Pareto efficient repeatable process. We use a water fill queue algorithm to include Shapley value marginal contributions for allocation.

  9. Dynamic autonomous routing technology for IP-based satellite ad hoc networks

    NASA Astrophysics Data System (ADS)

    Wang, Xiaofei; Deng, Jing; Kostas, Theresa; Rajappan, Gowri

    2014-06-01

    IP-based routing for military LEO/MEO satellite ad hoc networks is very challenging due to network and traffic heterogeneity, network topology and traffic dynamics. In this paper, we describe a traffic priority-aware routing scheme for such networks, namely Dynamic Autonomous Routing Technology (DART) for satellite ad hoc networks. DART has a cross-layer design, and conducts routing and resource reservation concurrently for optimal performance in the fluid but predictable satellite ad hoc networks. DART ensures end-to-end data delivery with QoS assurances by only choosing routing paths that have sufficient resources, supporting different packet priority levels. In order to do so, DART incorporates several resource management and innovative routing mechanisms, which dynamically adapt to best fit the prevailing conditions. In particular, DART integrates a resource reservation mechanism to reserve network bandwidth resources; a proactive routing mechanism to set up non-overlapping spanning trees to segregate high priority traffic flows from lower priority flows so that the high priority flows do not face contention from low priority flows; a reactive routing mechanism to arbitrate resources between various traffic priorities when needed; a predictive routing mechanism to set up routes for scheduled missions and for anticipated topology changes for QoS assurance. We present simulation results showing the performance of DART. We have conducted these simulations using the Iridium constellation and trajectories as well as realistic military communications scenarios. The simulation results demonstrate DART's ability to discriminate between high-priority and low-priority traffic flows and ensure disparate QoS requirements of these traffic flows.

  10. Smart border: ad-hoc wireless sensor networks for border surveillance

    NASA Astrophysics Data System (ADS)

    He, Jun; Fallahi, Mahmoud; Norwood, Robert A.; Peyghambarian, Nasser

    2011-06-01

    Wireless sensor networks have been proposed as promising candidates to provide automated monitoring, target tracking, and intrusion detection for border surveillance. In this paper, we demonstrate an ad-hoc wireless sensor network system for border surveillance. The network consists of heterogeneously autonomous sensor nodes that distributively cooperate with each other to enable a smart border in remote areas. This paper also presents energy-aware and sleeping algorithms designed to maximize the operating lifetime of the deployed sensor network. Lessons learned in building the network and important findings from field experiments are shared in the paper.

  11. Concept Detection and Using Concept in Ad-hoc of Microblog Search

    DTIC Science & Technology

    2012-11-01

    10,887,718 tweets with 200 tags and 2992055 tweets with 301 tags . We use character ASCII code to detect non-English tweets . In specifically, if a tweet ...hfang@ece.udel.edu Abstract: We report our system and experiments in TREC 2012 microblog Ad-hoc task. Our goal is to return most relevant tweets to...about 16 millions tweets over the period from Jan. 24th, 2011 to Feb. 8th, 2011. Each query is presented by short keywords and post time. Systems

  12. A cooperative MAC protocol with error-aware relay selection for wireless ad hoc networks

    NASA Astrophysics Data System (ADS)

    Liu, Shanzhi; Liu, Kai; Wang, Rui; Fang, Ruochen; Liu, Feng

    2017-01-01

    To solve performance degradation caused by channel fading, we propose a cooperative MAC protocol with error-aware relay selection for wireless ad hoc networks in this paper. In the protocol, the transmission error of data packet caused by channel fading are considered in order to achieve the best cooperative gain in the poor quality channel. In the relay selection process, potential relay nodes satisfying corresponding requirement can compete to sever as final relay node by means of priority selection and collision resolution process. Finally, simulation results show that the proposed protocol outperforms other protocol in terms of packet error rate and the saturation throughput.

  13. Panel Discussion : Report of the APS Ad-Hoc Committee on LGBT Issues

    NASA Astrophysics Data System (ADS)

    Atherton, Tim; Barthelemy, Ramon; Garmon, Savannah; Reeves, Kyle; APS Ad-Hoc Committee on LGBT Issues Team

    Following the presentation of the findings and recommendations of the APS Ad-Hoc Committee on LGBT Issues (C-LGBT) by Committee Chair Michael Falk, a panel discussion will be held featuring several members of the committee. The discussion will focus on how APS can best ensure the recommendations of the committee are carried out in a timely fashion and other ideas on future APS efforts toward LGBT inclusion in physics. Discussion topics will also include the research and other input that shaped the committee's findings and recommendations.

  14. A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics

    PubMed Central

    Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks. PMID:23766725

  15. Greedy data transportation scheme with hard packet deadlines for wireless ad hoc networks.

    PubMed

    Lee, HyungJune

    2014-01-01

    We present a greedy data transportation scheme with hard packet deadlines in ad hoc sensor networks of stationary nodes and multiple mobile nodes with scheduled trajectory path and arrival time. In the proposed routing strategy, each stationary ad hoc node en route decides whether to relay a shortest-path stationary node toward destination or a passing-by mobile node that will carry closer to destination. We aim to utilize mobile nodes to minimize the total routing cost as far as the selected route can satisfy the end-to-end packet deadline. We evaluate our proposed routing algorithm in terms of routing cost, packet delivery ratio, packet delivery time, and usability of mobile nodes based on network level simulations. Simulation results show that our proposed algorithm fully exploits the remaining time till packet deadline to turn into networking benefits of reducing the overall routing cost and improving packet delivery performance. Also, we demonstrate that the routing scheme guarantees packet delivery with hard deadlines, contributing to QoS improvement in various network services.

  16. Linking Satellites Via Earth "Hot Spots" and the Internet to Form Ad Hoc Constellations

    NASA Technical Reports Server (NTRS)

    Mandl, Dan; Frye, Stu; Grosvenor, Sandra; Ingram, Mary Ann; Langley, John; Miranda, Felix; Lee, Richard Q.; Romanofsky, Robert; Zaman, Afoz; Popovic, Zoya

    2004-01-01

    As more assets are placed in orbit, opportunities emerge to combine various sets of satellites in temporary constellations to perform collaborative image collections. Often, new operations concepts for a satellite or set of satellites emerge after launch. To the degree with which new space assets can be inexpensively and rapidly integrated into temporary or "ad hoc" constellations, will determine whether these new ideas will be implemented or not. On the Earth Observing 1 (EO-1) satellite, a New Millennium Program mission, a number of experiments were conducted and are being conducted to demonstrate various aspects of an architecture that, when taken as a whole, will enable progressive mission autonomy. In particular, the target architecture will use adaptive ground antenna arrays to form, as close as possible, the equivalent of wireless access points for low earth orbiting satellites. Coupled with various ground and flight software and the Internet. the architecture enables progressive mission autonomy. Thus, new collaborative sensing techniques can be implemented post-launch. This paper will outline the overall operations concept and highlight details of both the research effort being conducted in ad hoc constellations, mission autonomy and

  17. Intelligent QoS routing algorithm based on improved AODV protocol for Ad Hoc networks

    NASA Astrophysics Data System (ADS)

    Huibin, Liu; Jun, Zhang

    2016-04-01

    Mobile Ad Hoc Networks were playing an increasingly important part in disaster reliefs, military battlefields and scientific explorations. However, networks routing difficulties are more and more outstanding due to inherent structures. This paper proposed an improved cuckoo searching-based Ad hoc On-Demand Distance Vector Routing protocol (CSAODV). It elaborately designs the calculation methods of optimal routing algorithm used by protocol and transmission mechanism of communication-package. In calculation of optimal routing algorithm by CS Algorithm, by increasing QoS constraint, the found optimal routing algorithm can conform to the requirements of specified bandwidth and time delay, and a certain balance can be obtained among computation spending, bandwidth and time delay. Take advantage of NS2 simulation software to take performance test on protocol in three circumstances and validate the feasibility and validity of CSAODV protocol. In results, CSAODV routing protocol is more adapt to the change of network topological structure than AODV protocol, which improves package delivery fraction of protocol effectively, reduce the transmission time delay of network, reduce the extra burden to network brought by controlling information, and improve the routing efficiency of network.

  18. Opportunistic Hybrid Transport Protocol (OHTP) for Cognitive Radio Ad Hoc Sensor Networks.

    PubMed

    Bin Zikria, Yousaf; Nosheen, Summera; Ishmanov, Farruh; Kim, Sung Won

    2015-12-15

    The inefficient assignment of spectrum for different communications purposes, plus technology enhancements and ever-increasing usage of wireless technology is causing spectrum scarcity. To address this issue, one of the proposed solutions in the literature is to access the spectrum dynamically or opportunistically. Therefore, the concept of cognitive radio appeared, which opens up a new research paradigm. There is extensive research on the physical, medium access control and network layers. The impact of the transport layer on the performance of cognitive radio ad hoc sensor networks is still unknown/unexplored. The Internet's de facto transport protocol is not well suited to wireless networks because of its congestion control mechanism. We propose an opportunistic hybrid transport protocol for cognitive radio ad hoc sensor networks. We developed a new congestion control mechanism to differentiate true congestion from interruption loss. After such detection and differentiation, we propose methods to handle them opportunistically. There are several benefits to window- and rate-based protocols. To exploit the benefits of both in order to enhance overall system performance, we propose a hybrid transport protocol. We empirically calculate the optimal threshold value to switch between window- and rate-based mechanisms. We then compare our proposed transport protocol to Transmission Control Protocol (TCP)-friendly rate control, TCP-friendly rate control for cognitive radio, and TCP-friendly window-based control. We ran an extensive set of simulations in Network Simulator 2. The results indicate that the proposed transport protocol performs better than all the others.

  19. A Secure 3-Way Routing Protocols for Intermittently Connected Mobile Ad Hoc Networks

    PubMed Central

    Parasuraman, Ganesh Kumar

    2014-01-01

    The mobile ad hoc network may be partially connected or it may be disconnected in nature and these forms of networks are termed intermittently connected mobile ad hoc network (ICMANET). The routing in such disconnected network is commonly an arduous task. Many routing protocols have been proposed for routing in ICMANET since decades. The routing techniques in existence for ICMANET are, namely, flooding, epidemic, probabilistic, copy case, spray and wait, and so forth. These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth. Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters. The algorithm along with efficient routing ensures higher degree of security. The security level is cited testing with respect to possibility of malicious nodes into the network. This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET. PMID:25136697

  20. Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization in Mobile Ad Hoc Networks

    PubMed Central

    Robinson, Y. Harold; Rajaram, M.

    2015-01-01

    Mobile ad hoc network (MANET) is a collection of autonomous mobile nodes forming an ad hoc network without fixed infrastructure. Dynamic topology property of MANET may degrade the performance of the network. However, multipath selection is a great challenging task to improve the network lifetime. We proposed an energy-aware multipath routing scheme based on particle swarm optimization (EMPSO) that uses continuous time recurrent neural network (CTRNN) to solve optimization problems. CTRNN finds the optimal loop-free paths to solve link disjoint paths in a MANET. The CTRNN is used as an optimum path selection technique that produces a set of optimal paths between source and destination. In CTRNN, particle swarm optimization (PSO) method is primly used for training the RNN. The proposed scheme uses the reliability measures such as transmission cost, energy factor, and the optimal traffic ratio between source and destination to increase routing performance. In this scheme, optimal loop-free paths can be found using PSO to seek better link quality nodes in route discovery phase. PSO optimizes a problem by iteratively trying to get a better solution with regard to a measure of quality. The proposed scheme discovers multiple loop-free paths by using PSO technique. PMID:26819966

  1. A multihop key agreement scheme for wireless ad hoc networks based on channel characteristics.

    PubMed

    Hao, Zhuo; Zhong, Sheng; Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks.

  2. Energy conservation in ad hoc multimedia networks using traffic-shaping mechanisms

    NASA Astrophysics Data System (ADS)

    Chandra, Surendar

    2003-12-01

    In this work, we explore network traffic shaping mechanisms that deliver packets at pre-determined intervals; allowing the network interface to transition to a lower power consuming sleep state. We focus our efforts on commodity devices, IEEE 802.11b ad hoc mode and popular streaming formats. We argue that factors such as the lack of scheduling clock phase synchronization among the participants and scheduling delays introduced by back ground tasks affect the potential energy savings. Increasing the periodic transmission delays to transmit data infrequently can offset some of these effects at the expense of flooding the wireless channel for longer periods of time; potentially increasing the time to acquire the channel for non-multimedia traffic. Buffering mechanisms built into media browsers can mitigate the effects of these added delays from being mis-interpreted as network congestion. We show that practical implementations of such traffic shaping mechanisms can offer significant energy savings.

  3. Secure Adaptive Topology Control for Wireless Ad-Hoc Sensor Networks

    PubMed Central

    Hsueh, Ching-Tsung; Li, Yu-Wei; Wen, Chih-Yu; Ouyang, Yen-Chieh

    2010-01-01

    This paper presents a secure decentralized clustering algorithm for wireless ad-hoc sensor networks. The algorithm operates without a centralized controller, operates asynchronously, and does not require that the location of the sensors be known a priori. Based on the cluster-based topology, secure hierarchical communication protocols and dynamic quarantine strategies are introduced to defend against spam attacks, since this type of attacks can exhaust the energy of sensor nodes and will shorten the lifetime of a sensor network drastically. By adjusting the threshold of infected percentage of the cluster coverage, our scheme can dynamically coordinate the proportion of the quarantine region and adaptively achieve the cluster control and the neighborhood control of attacks. Simulation results show that the proposed approach is feasible and cost effective for wireless sensor networks. PMID:22205866

  4. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.

    PubMed

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-07-14

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.

  5. Effective Route Maintenance and Restoration Schemes in Mobile Ad Hoc Networks

    PubMed Central

    Kang, Byung-Seok; Ko, In-Young

    2010-01-01

    This study proposes a location-based hybrid routing protocol to improve data packet delivery and to reduce control message overhead in mobile ad hoc networks. In mobile environments, where nodes move continuously at a high speed, it is generally difficult to maintain and restore route paths. Therefore, this study suggests a new flooding mechanism to control route paths. The essence of the proposed scheme is its effective tracking of the destination’s location based on the beacon messages of the main route nodes. Through experiments based on an NS-2 simulator, the proposed scheme shows improvements in the data packet delivery ratio and reduces the amount of routing control message overhead compared with existing routing protocols such as AODV, LAR, ZRP and AODV-DFR. PMID:22315570

  6. Performance optimisation through EPT-WBC in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Agarwal, Ratish; Gupta, Roopam; Motwani, Mahesh

    2016-03-01

    Mobile ad hoc networks are self-organised, infrastructure-less networks in which each mobile host works as a router to provide connectivity within the network. Nodes out of reach to each other can communicate with the help of intermediate routers (nodes). Routing protocols are the rules which determine the way in which these routing activities are to be performed. In cluster-based architecture, some selected nodes (clusterheads) are identified to bear the extra burden of network activities like routing. Selection of clusterheads is a critical issue which significantly affects the performance of the network. This paper proposes an enhanced performance and trusted weight-based clustering approach in which a number of performance factors such as trust, load balancing, energy consumption, mobility and battery power are considered for the selection of clusterheads. Moreover, the performance of the proposed scheme is compared with other existing approaches to demonstrate the effectiveness of the work.

  7. Analysis of a distributed algorithm to determine multiple routes with path diversity in ad hoc networks.

    SciTech Connect

    Ghosal, Dipak; Mueller, Stephen Ng

    2005-04-01

    With multipath routing in mobile ad hoc networks (MANETs), a source can establish multiple routes to a destination for routing data. In MANETs, mulitpath routing can be used to provide route resilience, smaller end-to-end delay, and better load balancing. However, when the multiple paths are close together, transmissions of different paths may interfere with each other, causing degradation in performance. Besides interference, the physical diversity of paths also improves fault tolerance. We present a purely distributed multipath protocol based on the AODV-Multipath (AODVM) protocol called AODVM with Path Diversity (AODVM/PD) that finds multiple paths with a desired degree of correlation between paths specified as an input parameter to the algorithm. We demonstrate through detailed simulation analysis that multiple paths with low degree of correlation determined by AODVM/PD provides both smaller end-to-end delay than AODVM in networks with low mobility and better route resilience in the presence of correlated node failures.

  8. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks

    PubMed Central

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-01-01

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes. PMID:26184224

  9. A high performance, ad-hoc, fuzzy query processing system for relational databases

    NASA Technical Reports Server (NTRS)

    Mansfield, William H., Jr.; Fleischman, Robert M.

    1992-01-01

    Database queries involving imprecise or fuzzy predicates are currently an evolving area of academic and industrial research. Such queries place severe stress on the indexing and I/O subsystems of conventional database environments since they involve the search of large numbers of records. The Datacycle architecture and research prototype is a database environment that uses filtering technology to perform an efficient, exhaustive search of an entire database. It has recently been modified to include fuzzy predicates in its query processing. The approach obviates the need for complex index structures, provides unlimited query throughput, permits the use of ad-hoc fuzzy membership functions, and provides a deterministic response time largely independent of query complexity and load. This paper describes the Datacycle prototype implementation of fuzzy queries and some recent performance results.

  10. A time-slotted on-demand routing protocol for mobile ad hoc unmanned vehicle systems

    NASA Astrophysics Data System (ADS)

    Forsmann, J. Hope; Hiromoto, Robert E.; Svoboda, John

    2007-04-01

    Successful deployment of Unmanned Vehicle Systems (UVS) in military operations has increased their popularity and utility. The ability to sustain reliable mobile ad hoc formations dramatically enhances the usefulness and performance of UVS. Formation movement increases the amount of ground coverage in less time, decreases fuel consumption of the individual nodes, and provides an avenue for mission expansion through cooperative maneuvers such as refueling. In this paper, we study the wireless communication demands that arise from formation and maintenance of UVS within the context of a mobile ad hoc network (MANET). A MANET in formation is typically characterized by tradeoffs between network congestion and the ability to maintain useable communication bandwidth. Maintenance of UVS formations requires each node in the network to be peer-aware, which places a heavy demand on inner node communication. In order to mitigate the inner node network congestion, we introduce a time-slotted communication protocol. The protocol assigns time-slots and allows the designated nodes to communicate directly with other peer-nodes. This approach has been introduced within the context of the Time-Slotted Aloha protocol for station-to-station communication. The approach taken here is to embed the time-slotted reservation protocol into a standard on-demand routing protocol to also address the need to reactively and proactively respond to formation maintenance. The time-slotted on-demand routing protocol is shown to eliminate collisions due to route determination and, therefore, enhance quality of service as well as ensure necessary support for formation movement. A worst-case scenario is described and simulations performed to comparatively demonstrate the advantages of the new protocol.

  11. Integrated data lookup and replication scheme in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Chen, Kai; Nahrstedt, Klara

    2001-11-01

    Accessing remote data is a challenging task in mobile ad hoc networks. Two problems have to be solved: (1) how to learn about available data in the network; and (2) how to access desired data even when the original copy of the data is unreachable. In this paper, we develop an integrated data lookup and replication scheme to solve these problems. In our scheme, a group of mobile nodes collectively host a set of data to improve data accessibility for all members of the group. They exchange data availability information by broadcasting advertising (ad) messages to the group using an adaptive sending rate policy. The ad messages are used by other nodes to derive a local data lookup table, and to reduce data redundancy within a connected group. Our data replication scheme predicts group partitioning based on each node's current location and movement patterns, and replicates data to other partitions before partitioning occurs. Our simulations show that data availability information can quickly propagate throughout the network, and that the successful data access ratio of each node is significantly improved.

  12. A Performance Analysis of the Optimized Link State Routing Protocol Using Voice Traffic Over Mobile Ad Hoc Networks

    DTIC Science & Technology

    2012-03-22

    audio codec is best suited for MANETS. The MANET simulation environment is established using OPNET . Varying combinations of workloads are submitted...Appendix A. OPNET Simulation Setup .......................................................................... 69 A.1 Scenario Creation and Setup...6. OPNET Ad Hoc Node Wireless Suite Configuration ................................................. 44 7. OPNET OLSR Protocol Configuration

  13. The Impact of Using Item Parcels on ad hoc Goodness of Fit Indices in Confirmatory Factor Analysis: An Empirical Example.

    ERIC Educational Resources Information Center

    Takahashi, Tomone; Nasser, Fadia

    The Arabic version of I. G. Sarason's (1984) Reactions to Tests scale was used to examine the impact of using item parcels on ad hoc goodness of fit indices in confirmatory factor analysis. Item parcels with different numbers of items and different numbers of parcels per factor were used. Analyses were conducted on a sample of 420 tenth graders…

  14. The Role of Business in Education Reform: Blueprint for Action. Report of the Business Roundtable Ad Hoc Committee on Education.

    ERIC Educational Resources Information Center

    Business Roundtable, New York, NY.

    Because of the critical importance of education to the productivity and competitiveness of business, the Ad Hoc Committee on Education, comprised of senior executives from major corporations, was established in November 1987 to identify actions the Business Roundtable could take to improve the quality of elementary and secondary education in the…

  15. Sketching Awareness: A Participatory Study to Elicit Designs for Supporting Ad Hoc Emergency Medical Teamwork

    PubMed Central

    Kusunoki, Diana; Sarcevic, Aleksandra; Zhang, Zhan; Yala, Maria

    2014-01-01

    Prior CSCW research on awareness in clinical settings has mostly focused on higher-level team coordination spanning across longer-term trajectories at the department and inter-department levels. In this paper, we offer a perspective on what awareness means within the context of an ad hoc, time- and safety-critical medical setting by looking at teams treating severely ill patients with urgent needs. We report findings from four participatory design workshops conducted with emergency medicine clinicians at two regional emergency departments. Workshops were developed to elicit design ideas for information displays that support awareness in emergency medical situations. Through analysis of discussions and clinicians’ sketches of information displays, we identified five features of teamwork that can be used as a foundation for supporting awareness from the perspective of clinicians. Based on these findings, we contribute rich descriptions of four facets of awareness that teams manage during emergency medical situations: team member awareness, elapsed time awareness, teamwork-oriented and patient-driven task awareness, and overall progress awareness. We then discuss these four awareness types in relation to awareness facets found in the CSCW literature. PMID:25870498

  16. Energy Efficient Link Aware Routing with Power Control in Wireless Ad Hoc Networks

    PubMed Central

    Katiravan, Jeevaa; Sylvia, D.; Rao, D. Srinivasa

    2015-01-01

    In wireless ad hoc networks, the traditional routing protocols make the route selection based on minimum distance between the nodes and the minimum number of hop counts. Most of the routing decisions do not consider the condition of the network such as link quality and residual energy of the nodes. Also, when a link failure occurs, a route discovery mechanism is initiated which incurs high routing overhead. If the broadcast nature and the spatial diversity of the wireless communication are utilized efficiently it becomes possible to achieve improvement in the performance of the wireless networks. In contrast to the traditional routing scheme which makes use of a predetermined route for packet transmission, such an opportunistic routing scheme defines a predefined forwarding candidate list formed by using single network metrics. In this paper, a protocol is proposed which uses multiple metrics such as residual energy and link quality for route selection and also includes a monitoring mechanism which initiates a route discovery for a poor link, thereby reducing the overhead involved and improving the throughput of the network while maintaining network connectivity. Power control is also implemented not only to save energy but also to improve the network performance. Using simulations, we show the performance improvement attained in the network in terms of packet delivery ratio, routing overhead, and residual energy of the network. PMID:26167529

  17. Emergency Situation Prediction Mechanism: A Novel Approach for Intelligent Transportation System Using Vehicular Ad Hoc Networks.

    PubMed

    Ganeshkumar, P; Gokulakrishnan, P

    2015-01-01

    In Indian four-lane express highway, millions of vehicles are travelling every day. Accidents are unfortunate and frequently occurring in these highways causing deaths, increase in death toll, and damage to infrastructure. A mechanism is required to avoid such road accidents at the maximum to reduce the death toll. An Emergency Situation Prediction Mechanism, a novel and proactive approach, is proposed in this paper for achieving the best of Intelligent Transportation System using Vehicular Ad Hoc Network. ESPM intends to predict the possibility of occurrence of an accident in an Indian four-lane express highway. In ESPM, the emergency situation prediction is done by the Road Side Unit based on (i) the Status Report sent by the vehicles in the range of RSU and (ii) the road traffic flow analysis done by the RSU. Once the emergency situation or accident is predicted in advance, an Emergency Warning Message is constructed and disseminated to all vehicles in the area of RSU to alert and prevent the vehicles from accidents. ESPM performs well in emergency situation prediction in advance to the occurrence of an accident. ESPM predicts the emergency situation within 0.20 seconds which is comparatively less than the statistical value. The prediction accuracy of ESPM against vehicle density is found better in different traffic scenarios.

  18. Report of the APS Ad-Hoc Committee on LGBT Issues - Presentation of Findings and Recommendations

    NASA Astrophysics Data System (ADS)

    Falk, Michael

    In 2014 the Executive Officer of the American Physical Society (APS), Kate Kirby, created an Ad-Hoc Committee on LGBT Issues (C-LGBT) charged with reporting on the obstacles to inclusion of LGBT physicists, a term which for the purpose of this report refers to persons who self-identify as lesbian, gay, bisexual, transgender, queer, questioning, intersex, or asexual, as well as other sexual and gender minorities. The full charge was as follows: ``The committee will advise the APS on the current status of LGBT issues in physics, provide recommendations for greater inclusion, and engage physicists in laying the foundation for a more inclusive physics community. ?More specifically, the committee will investigate LGBT representation in physics, assess the educational and professional climate in physics, recommend changes in policies and practices that impact LGBT physicists, and address other issues that affect inclusion.'' We will present the findings and recommendations of the C-LGBT final report, and a panel discussion will be held following the presentation to discuss the future of APS efforts toward LGBT inclusion in physics.

  19. Report of the APS Ad-Hoc Committee on LGBT Issues - Presentation of Findings and Recommendations

    NASA Astrophysics Data System (ADS)

    Long, Elena

    2016-03-01

    In 2014 the Executive Officer of the American Physical Society (APS), Kate Kirby, created an Ad-Hoc Committee on LGBT Issues (C-LGBT) charged with reporting on the obstacles to inclusion of LGBT physicists, a term which for the purpose of this report refers to persons who self-identify as lesbian, gay, bisexual, transgender, queer, questioning, intersex, or asexual, as well as other sexual and gender minorities. The full charge was as follows: ``The committee will advise the APS on the current status of LGBT issues in physics, provide recommendations for greater inclusion, and engage physicists in laying the foundation for a more inclusive physics community? More specifically, the committee will investigate LGBT representation in physics, assess the educational and professional climate in physics, recommend changes in policies and practices that impact LGBT physicists, and address other issues that affect inclusion.'' We will present the findings and recommendations of the C-LGBT final report, and a panel discussion will be held following the presentation to discuss the future of APS efforts toward LGBT inclusion in physics.

  20. Energy Efficient Link Aware Routing with Power Control in Wireless Ad Hoc Networks.

    PubMed

    Katiravan, Jeevaa; Sylvia, D; Rao, D Srinivasa

    2015-01-01

    In wireless ad hoc networks, the traditional routing protocols make the route selection based on minimum distance between the nodes and the minimum number of hop counts. Most of the routing decisions do not consider the condition of the network such as link quality and residual energy of the nodes. Also, when a link failure occurs, a route discovery mechanism is initiated which incurs high routing overhead. If the broadcast nature and the spatial diversity of the wireless communication are utilized efficiently it becomes possible to achieve improvement in the performance of the wireless networks. In contrast to the traditional routing scheme which makes use of a predetermined route for packet transmission, such an opportunistic routing scheme defines a predefined forwarding candidate list formed by using single network metrics. In this paper, a protocol is proposed which uses multiple metrics such as residual energy and link quality for route selection and also includes a monitoring mechanism which initiates a route discovery for a poor link, thereby reducing the overhead involved and improving the throughput of the network while maintaining network connectivity. Power control is also implemented not only to save energy but also to improve the network performance. Using simulations, we show the performance improvement attained in the network in terms of packet delivery ratio, routing overhead, and residual energy of the network.

  1. Standardization of Negative Controls in Diagnostic Immunohistochemistry: Recommendations From the International Ad Hoc Expert Panel

    PubMed Central

    Torlakovic, Emina E.; Francis, Glenn; Garratt, John; Gilks, Blake; Hyjek, Elizabeth; Ibrahim, Merdol; Miller, Rodney; Nielsen, Søren; Petcu, Eugen B.; Swanson, Paul E.; Taylor, Clive R.; Vyberg, Mogens

    2014-01-01

    Standardization of controls, both positive and negative controls, is needed for diagnostic immunohistochemistry (dIHC). The use of IHC-negative controls, irrespective of type, although well established, is not standardized. As such, the relevance and applicability of negative controls continues to challenge both pathologists and laboratory budgets. Despite the clear theoretical notion that appropriate controls serve to demonstrate the sensitivity and specificity of the dIHC test, it remains unclear which types of positive and negative controls are applicable and/or useful in day-to-day clinical practice. There is a perceived need to provide “best practice recommendations” for the use of negative controls. This perception is driven not only by logistics and cost issues, but also by increased pressure for accurate IHC testing, especially when IHC is performed for predictive markers, the number of which is rising as personalized medicine continues to develop. Herein, an international ad hoc expert panel reviews classification of negative controls relevant to clinical practice, proposes standard terminology for negative controls, considers the total evidence of IHC specificity that is available to pathologists, and develops a set of recommendations for the use of negative controls in dIHC based on “fit-for-use” principles. PMID:24714041

  2. Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks

    PubMed Central

    Paramasivan, B.; Kaliappan, M.

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP. PMID:25143986

  3. A Threshold-Adaptive Reputation System on Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsai, Hsiao-Chien; Lo, Nai-Wei; Wu, Tzong-Chen

    In recent years huge potential benefits from novel applications in mobile ad hoc networks (MANET) have been discussed extensively. However, without robust security mechanisms and systems to provide safety shell through the MANET infrastructure, MANET applications can be vulnerable and hammered by malicious attackers easily. In order to detect misbehaved message routing and identify malicious attackers in MANET, schemes based on reputation concept have shown their advantages in this area in terms of good scalability and simple threshold-based detection strategy. We observed that previous reputation schemes generally use predefined thresholds which do not take into account the effect of behavior dynamics between nodes in a period of time. In this paper, we propose a Threshold-Adaptive Reputation System (TARS) to overcome the shortcomings of static threshold strategy and improve the overall MANET performance under misbehaved routing attack. A fuzzy-based inference engine is introduced to evaluate the trustiness of a node's one-hop neighbors. Malicious nodes whose trust values are lower than the adaptive threshold, will be detected and filtered out by their honest neighbors during trustiness evaluation process. The results of network simulation show that the TARS outperforms other compared schemes under security attacks in most cases and at the same time reduces the decrease of total packet delivery ratio by 67% in comparison with MANET without reputation system.

  4. A commentary on the disparate perspectives of clinical microbiologists and surgeons: ad hoc antimicrobial use.

    PubMed

    O'Connell, Nuala H; O'Connor, Ciara; O'Mahony, Jim; Lobo, Ronstan; Hayes, Maria; Masterson, Eric; Larvin, Michael; Coffey, J Calvin; Dunne, Colum

    2014-01-01

    Prosthetic joints and other orthopedic implants have improved quality of life for patients world-wide and the use of such devices is increasing. However, while infection rates subsequent to associated surgery are relatively low (<3%), the consequences of incidence are considerable, encompassing morbidity (including amputation) and mortality in addition to significant social and economic costs. Emphasis, therefore, has been placed on mitigating microbial risk, with clinical microbiologists and surgeons utilizing rapidly evolving molecular laboratory techniques in detection and diagnosis of infection, which still occurs despite sophisticated patient management. Multidisciplinary approaches are regularly adopted to achieve this. In this commentary, we describe an unusual case of Actinomyces infection in total hip arthroplasty and, in that context, describe the perspectives of the clinical microbiology and surgical teams and how they contrasted. More specifically, this case demonstrates an ad hoc approach to structured eradication of biofilms and intracellular bacteria related to biomaterials, as reflected in early usage of linezolid. This is a complex topic and, as described in this case, such accelerated treatment can be effective. This commentary focuses on the merits of such inadvisable use of potent antimicrobials amid the risk of diminishing valuable antimicrobial efficacy, albeit resulting in desirable patient outcomes.

  5. Linking satellites via Earth hot spots and the Internet to form ad hoc constellations

    NASA Astrophysics Data System (ADS)

    Mandl, Daniel; Frye, Stu; Grosvenor, Sandra; Ingram, Mary Ann; Langley, John; Miranda, Felix A.; Lee, Richard Q.; Romanofsky, Robert R.; Zaman, Afroz; Popovic, Zoya; Sherwood, Robert L.; Chien, Steve; Davies, Ashley

    2005-01-01

    As more assets are placed in orbit, opportunities emerge to combine various sets of satellites in temporary constellations to perform collaborative image collections. Often, new operations concepts for a satellite or set of satellites emerge after launch. To the degree with which new space assets can be inexpensively and rapidly integrated into temporary or "ad hoc" constellations, will determine whether these new ideas will be implemented or not. On the Earth Observing 1 (EO-1) satellite, a New Millennium Program mission, a number of experiments were conducted and are being conducted to demonstrate various aspects of an architecture that, when taken as a whole, will enable progressive mission autonomy. In particular, the target architecture will use adaptive ground antenna arrays to form, as close as possible, the equivalent of wireless access points for low earth orbiting satellites. Coupled with various ground and flight software and the Internet, the architecture enables progressive mission autonomy. Thus, new collaborative sensing techniques can be implemented post-launch. This paper will outline the overall operations concept and highlight details of both the research effort being conducted in the area of adaptive antenna arrays and some of the related successful autonomy software that has been implemented using EO-1 and other operational satellites.

  6. Integration of Body Sensor Networks and Vehicular Ad-hoc Networks for Traffic Safety.

    PubMed

    Reyes-Muñoz, Angelica; Domingo, Mari Carmen; López-Trinidad, Marco Antonio; Delgado, José Luis

    2016-01-15

    The emergence of Body Sensor Networks (BSNs) constitutes a new and fast growing trend for the development of daily routine applications. However, in the case of heterogeneous BSNs integration with Vehicular ad hoc Networks (VANETs) a large number of difficulties remain, that must be solved, especially when talking about the detection of human state factors that impair the driving of motor vehicles. The main contributions of this investigation are principally three: (1) an exhaustive review of the current mechanisms to detect four basic physiological behavior states (drowsy, drunk, driving under emotional state disorders and distracted driving) that may cause traffic accidents is presented; (2) A middleware architecture is proposed. This architecture can communicate with the car dashboard, emergency services, vehicles belonging to the VANET and road or street facilities. This architecture seeks on the one hand to improve the car driving experience of the driver and on the other hand to extend security mechanisms for the surrounding individuals; and (3) as a proof of concept, an Android real-time attention low level detection application that runs in a next-generation smartphone is developed. The application features mechanisms that allow one to measure the degree of attention of a driver on the base of her/his EEG signals, establish wireless communication links via various standard wireless means, GPRS, Bluetooth and WiFi and issue alarms of critical low driver attention levels.

  7. Adaptive Control Parameters for Dispersal of Multi-Agent Mobile Ad Hoc Network (MANET) Swarms

    SciTech Connect

    Kurt Derr; Milos Manic

    2013-11-01

    A mobile ad hoc network is a collection of independent nodes that communicate wirelessly with one another. This paper investigates nodes that are swarm robots with communications and sensing capabilities. Each robot in the swarm may operate in a distributed and decentralized manner to achieve some goal. This paper presents a novel approach to dynamically adapting control parameters to achieve mesh configuration stability. The presented approach to robot interaction is based on spring force laws (attraction and repulsion laws) to create near-optimal mesh like configurations. In prior work, we presented the extended virtual spring mesh (EVSM) algorithm for the dispersion of robot swarms. This paper extends the EVSM framework by providing the first known study on the effects of adaptive versus static control parameters on robot swarm stability. The EVSM algorithm provides the following novelties: 1) improved performance with adaptive control parameters and 2) accelerated convergence with high formation effectiveness. Simulation results show that 120 robots reach convergence using adaptive control parameters more than twice as fast as with static control parameters in a multiple obstacle environment.

  8. Energy-efficient algorithm for broadcasting in ad hoc wireless sensor networks.

    PubMed

    Xiong, Naixue; Huang, Xingbo; Cheng, Hongju; Wan, Zheng

    2013-04-12

    Broadcasting is a common and basic operation used to support various network protocols in wireless networks. To achieve energy-efficient broadcasting is especially important for ad hoc wireless sensor networks because sensors are generally powered by batteries with limited lifetimes. Energy consumption for broadcast operations can be reduced by minimizing the number of relay nodes based on the observation that data transmission processes consume more energy than data reception processes in the sensor nodes, and how to improve the network lifetime is always an interesting issue in sensor network research. The minimum-energy broadcast problem is then equivalent to the problem of finding the minimum Connected Dominating Set (CDS) for a connected graph that is proved NP-complete. In this paper, we introduce an Efficient Minimum CDS algorithm (EMCDS) with help of a proposed ordered sequence list. EMCDS does not concern itself with node energy and broadcast operations might fail if relay nodes are out of energy. Next we have proposed a Minimum Energy-consumption Broadcast Scheme (MEBS) with a modified version of EMCDS, and aimed at providing an efficient scheduling scheme with maximized network lifetime. The simulation results show that the proposed EMCDS algorithm can find smaller CDS compared with related works, and the MEBS can help to increase the network lifetime by efficiently balancing energy among nodes in the networks.

  9. The congestion control algorithm based on queue management of each node in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Wei, Yifei; Chang, Lin; Wang, Yali; Wang, Gaoping

    2016-12-01

    This paper proposes an active queue management mechanism, considering the node's own ability and its importance in the network to set the queue threshold. As the network load increases, local congestion of mobile ad hoc network may lead to network performance degradation, hot node's energy consumption increase even failure. If small energy nodes congested because of forwarding data packets, then when it is used as the source node will cause a lot of packet loss. This paper proposes an active queue management mechanism, considering the node's own ability and its importance in the network to set the queue threshold. Controlling nodes buffer queue in different levels of congestion area probability by adjusting the upper limits and lower limits, thus nodes can adjust responsibility of forwarding data packets according to their own situation. The proposed algorithm will slow down the send rate hop by hop along the data package transmission direction from congestion node to source node so that to prevent further congestion from the source node. The simulation results show that, the algorithm can better play the data forwarding ability of strong nodes, protect the weak nodes, can effectively alleviate the network congestion situation.

  10. Data Delivery Method Based on Neighbor Nodes' Information in a Mobile Ad Hoc Network

    PubMed Central

    Hayashi, Takuma; Taenaka, Yuzo; Okuda, Takeshi; Yamaguchi, Suguru

    2014-01-01

    This paper proposes a data delivery method based on neighbor nodes' information to achieve reliable communication in a mobile ad hoc network (MANET). In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE), Chachulski et al. (2007), improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow. PMID:24672371

  11. Standardization of negative controls in diagnostic immunohistochemistry: recommendations from the international ad hoc expert panel.

    PubMed

    Torlakovic, Emina E; Francis, Glenn; Garratt, John; Gilks, Blake; Hyjek, Elizabeth; Ibrahim, Merdol; Miller, Rodney; Nielsen, Søren; Petcu, Eugen B; Swanson, Paul E; Taylor, Clive R; Vyberg, Mogens

    2014-04-01

    Standardization of controls, both positive and negative controls, is needed for diagnostic immunohistochemistry (dIHC). The use of IHC-negative controls, irrespective of type, although well established, is not standardized. As such, the relevance and applicability of negative controls continues to challenge both pathologists and laboratory budgets. Despite the clear theoretical notion that appropriate controls serve to demonstrate the sensitivity and specificity of the dIHC test, it remains unclear which types of positive and negative controls are applicable and/or useful in day-to-day clinical practice. There is a perceived need to provide "best practice recommendations" for the use of negative controls. This perception is driven not only by logistics and cost issues, but also by increased pressure for accurate IHC testing, especially when IHC is performed for predictive markers, the number of which is rising as personalized medicine continues to develop. Herein, an international ad hoc expert panel reviews classification of negative controls relevant to clinical practice, proposes standard terminology for negative controls, considers the total evidence of IHC specificity that is available to pathologists, and develops a set of recommendations for the use of negative controls in dIHC based on "fit-for-use" principles.

  12. SVANET: A smart vehicular ad hoc network for efficient data transmission with wireless sensors.

    PubMed

    Sahoo, Prasan Kumar; Chiang, Ming-Jer; Wu, Shih-Lin

    2014-11-25

    Wireless sensors can sense any event, such as accidents, as well as icy roads, and can forward the rescue/warning messages through intermediate vehicles for any necessary help. In this paper, we propose a smart vehicular ad hoc network (SVANET) architecture that uses wireless sensors to detect events and vehicles to transmit the safety and non-safety messages efficiently by using different service channels and one control channel with different priorities. We have developed a data transmission protocol for the vehicles in the highway, in which data can be forwarded with the help of vehicles if they are connected with each other or data can be forwarded with the help of nearby wireless sensors. Our data transmission protocol is designed to increase the driving safety, to prevent accidents and to utilize channels efficiently by adjusting the control and service channel time intervals dynamically. Besides, our protocol can transmit information to vehicles in advance, so that drivers can decide an alternate route in case of traffic congestion. For various data sharing, we design a method that can select a few leader nodes among vehicles running along a highway to broadcast data efficiently. Simulation results show that our protocol can outperform the existing standard in terms of the end to end packet delivery ratio and latency.

  13. A Novel Approach to Overlay Multicasting Schemes for Multi-Hop Ad-Hoc Networks

    NASA Astrophysics Data System (ADS)

    Kang, Namhi; Oh, Jejun; Kim, Younghan

    Multicast is an efficient transport mechanism for group-based community communications and mobile ad-hoc networks (MANET) is recently regarded as a promising solution for supporting ubiquitous computing as an underlying network technology. However, it is challenging to deploy the multicast mechanism used in a wired network directly into MANET owing to scarce resources in wireless networks and unpredictable changes in network topology. Several multicast mechanisms have been proposed in the literature to overcome these limitations. In MANET, especially, overlay multicasting schemes present several advantages over network-based multicasting schemes. However we have observed a common limitation of previously proposed overlay multicasting schemes. They introduce redundant data transmissions that waste network bandwidth and the battery of relay nodes. The observation motivated us to propose an efficient way to create and maintain a “semi-overlay structure” that utilizes a few nonmember nodes selected as branch nodes. The proposed scheme, called “SOMRP (Semi-overlay multicast routing protocol),” has been evaluated by using extensive network simulation in two different scenarios, comparing the performance of SOMRP with two previously proposed schemes. Simulation results show that SOMRP outperforms the two schemes in terms of the packet delivery ratio, transmission cost and end-to-end delay.

  14. Emergency Situation Prediction Mechanism: A Novel Approach for Intelligent Transportation System Using Vehicular Ad Hoc Networks

    PubMed Central

    Gokulakrishnan, P.

    2015-01-01

    In Indian four-lane express highway, millions of vehicles are travelling every day. Accidents are unfortunate and frequently occurring in these highways causing deaths, increase in death toll, and damage to infrastructure. A mechanism is required to avoid such road accidents at the maximum to reduce the death toll. An Emergency Situation Prediction Mechanism, a novel and proactive approach, is proposed in this paper for achieving the best of Intelligent Transportation System using Vehicular Ad Hoc Network. ESPM intends to predict the possibility of occurrence of an accident in an Indian four-lane express highway. In ESPM, the emergency situation prediction is done by the Road Side Unit based on (i) the Status Report sent by the vehicles in the range of RSU and (ii) the road traffic flow analysis done by the RSU. Once the emergency situation or accident is predicted in advance, an Emergency Warning Message is constructed and disseminated to all vehicles in the area of RSU to alert and prevent the vehicles from accidents. ESPM performs well in emergency situation prediction in advance to the occurrence of an accident. ESPM predicts the emergency situation within 0.20 seconds which is comparatively less than the statistical value. The prediction accuracy of ESPM against vehicle density is found better in different traffic scenarios. PMID:26065014

  15. Road Accident Prevention with Instant Emergency Warning Message Dissemination in Vehicular Ad-Hoc Network.

    PubMed

    Gokulakrishnan, P; Ganeshkumar, P

    2015-01-01

    A Road Accident Prevention (RAP) scheme based on Vehicular Backbone Network (VBN) structure is proposed in this paper for Vehicular Ad-hoc Network (VANET). The RAP scheme attempts to prevent vehicles from highway road traffic accidents and thereby reduces death and injury rates. Once the possibility of an emergency situation (i.e. an accident) is predicted in advance, instantly RAP initiates a highway road traffic accident prevention scheme. The RAP scheme constitutes the following activities: (i) the Road Side Unit (RSU) constructs a Prediction Report (PR) based on the status of the vehicles and traffic in the highway roads, (ii) the RSU generates an Emergency Warning Message (EWM) based on an abnormal PR, (iii) the RSU forms a VBN structure and (iv) the RSU disseminates the EWM to the vehicles that holds the high Risk Factor (RF) and travels in High Risk Zone (HRZ). These vehicles might reside either within the RSU's coverage area or outside RSU's coverage area (reached using VBN structure). The RAP scheme improves the performance of EWM dissemination in terms of increase in notification and decrease in end-to-end delay. The RAP scheme also reduces infrastructure cost (number of RSUs) by formulating and deploying the VBN structure. The RAP scheme with VBN structure improves notification by 19 percent and end-to-end delay by 14.38 percent for a vehicle density of 160 vehicles. It is also proved from the simulation experiment that the performance of RAP scheme is promising in 4-lane highway roads.

  16. VehiHealth: An Emergency Routing Protocol for Vehicular Ad Hoc Network to Support Healthcare System.

    PubMed

    Bhoi, S K; Khilar, P M

    2016-03-01

    Survival of a patient depends on effective data communication in healthcare system. In this paper, an emergency routing protocol for Vehicular Ad hoc Network (VANET) is proposed to quickly forward the current patient status information from the ambulance to the hospital to provide pre-medical treatment. As the ambulance takes time to reach the hospital, ambulance doctor can provide sudden treatment to the patient in emergency by sending patient status information to the hospital through the vehicles using vehicular communication. Secondly, the experienced doctors respond to the information by quickly sending a treatment information to the ambulance. In this protocol, data is forwarded through that path which has less link breakage problem between the vehicles. This is done by calculating an intersection value I v a l u e for the neighboring intersections by using the current traffic information. Then the data is forwarded through that intersection which has minimum I v a l u e . Simulation results show VehiHealth performs better than P-GEDIR, GyTAR, A-STAR and GSR routing protocols in terms of average end-to-end delay, number of link breakage, path length, and average response time.

  17. SVANET: A Smart Vehicular Ad Hoc Network for Efficient Data Transmission with Wireless Sensors

    PubMed Central

    Sahoo, Prasan Kumar; Chiang, Ming-Jer; Wu, Shih-Lin

    2014-01-01

    Wireless sensors can sense any event, such as accidents, as well as icy roads, and can forward the rescue/warning messages through intermediate vehicles for any necessary help. In this paper, we propose a smart vehicular ad hoc network (SVANET) architecture that uses wireless sensors to detect events and vehicles to transmit the safety and non-safety messages efficiently by using different service channels and one control channel with different priorities. We have developed a data transmission protocol for the vehicles in the highway, in which data can be forwarded with the help of vehicles if they are connected with each other or data can be forwarded with the help of nearby wireless sensors. Our data transmission protocol is designed to increase the driving safety, to prevent accidents and to utilize channels efficiently by adjusting the control and service channel time intervals dynamically. Besides, our protocol can transmit information to vehicles in advance, so that drivers can decide an alternate route in case of traffic congestion. For various data sharing, we design a method that can select a few leader nodes among vehicles running along a highway to broadcast data efficiently. Simulation results show that our protocol can outperform the existing standard in terms of the end to end packet delivery ratio and latency. PMID:25429409

  18. Integration of Body Sensor Networks and Vehicular Ad-hoc Networks for Traffic Safety

    PubMed Central

    Reyes-Muñoz, Angelica; Domingo, Mari Carmen; López-Trinidad, Marco Antonio; Delgado, José Luis

    2016-01-01

    The emergence of Body Sensor Networks (BSNs) constitutes a new and fast growing trend for the development of daily routine applications. However, in the case of heterogeneous BSNs integration with Vehicular ad hoc Networks (VANETs) a large number of difficulties remain, that must be solved, especially when talking about the detection of human state factors that impair the driving of motor vehicles. The main contributions of this investigation are principally three: (1) an exhaustive review of the current mechanisms to detect four basic physiological behavior states (drowsy, drunk, driving under emotional state disorders and distracted driving) that may cause traffic accidents is presented; (2) A middleware architecture is proposed. This architecture can communicate with the car dashboard, emergency services, vehicles belonging to the VANET and road or street facilities. This architecture seeks on the one hand to improve the car driving experience of the driver and on the other hand to extend security mechanisms for the surrounding individuals; and (3) as a proof of concept, an Android real-time attention low level detection application that runs in a next-generation smartphone is developed. The application features mechanisms that allow one to measure the degree of attention of a driver on the base of her/his EEG signals, establish wireless communication links via various standard wireless means, GPRS, Bluetooth and WiFi and issue alarms of critical low driver attention levels. PMID:26784204

  19. Securing Mobile Ad Hoc Networks Using Danger Theory-Based Artificial Immune Algorithm

    PubMed Central

    2015-01-01

    A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs. PMID:25946001

  20. Enhancing the selection of backoff interval using fuzzy logic over wireless Ad Hoc networks.

    PubMed

    Ranganathan, Radha; Kannan, Kathiravan

    2015-01-01

    IEEE 802.11 is the de facto standard for medium access over wireless ad hoc network. The collision avoidance mechanism (i.e., random binary exponential backoff-BEB) of IEEE 802.11 DCF (distributed coordination function) is inefficient and unfair especially under heavy load. In the literature, many algorithms have been proposed to tune the contention window (CW) size. However, these algorithms make every node select its backoff interval between [0, CW] in a random and uniform manner. This randomness is incorporated to avoid collisions among the nodes. But this random backoff interval can change the optimal order and frequency of channel access among competing nodes which results in unfairness and increased delay. In this paper, we propose an algorithm that schedules the medium access in a fair and effective manner. This algorithm enhances IEEE 802.11 DCF with additional level of contention resolution that prioritizes the contending nodes according to its queue length and waiting time. Each node computes its unique backoff interval using fuzzy logic based on the input parameters collected from contending nodes through overhearing. We evaluate our algorithm against IEEE 802.11, GDCF (gentle distributed coordination function) protocols using ns-2.35 simulator and show that our algorithm achieves good performance.

  1. A Sensitive Secondary Users Selection Algorithm for Cognitive Radio Ad Hoc Networks

    PubMed Central

    Li, Aohan; Han, Guangjie; Wan, Liangtian; Shu, Lei

    2016-01-01

    Secondary Users (SUs) are allowed to use the temporarily unused licensed spectrum without disturbing Primary Users (PUs) in Cognitive Radio Ad Hoc Networks (CRAHNs). Existing architectures for CRAHNs impose energy-consuming Cognitive Radios (CRs) on SUs. However, the advanced CRs will increase energy cost for their cognitive functionalities, which is undesirable for the battery powered devices. A new architecture referred to as spectral Requirement-based CRAHN (RCRAHN) is proposed to enhance energy efficiency for CRAHNs in this paper. In RCRAHNs, only parts of SUs are equipped with CRs. SUs equipped with CRs are referred to as Cognitive Radio Users (CRUs). To further enhance energy efficiency of CRAHNs, we aim to select minimum CRUs to sense available spectrum. A non-linear programming problem is mathematically formulated under the constraints of energy efficiency and real-time. Considering the NP-hardness of the problem, a framework of a heuristic algorithm referred to as Sensitive Secondary Users Selection (SSUS) was designed to compute the near-optimal solutions. The simulation results demonstrate that SSUS not only improves the energy efficiency, but also achieves satisfied performances in end-to-end delay and communication reliability. PMID:27023562

  2. Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.

    PubMed

    Paramasivan, B; Kaliappan, M

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  3. Linear QoS goals of additive and concave metrics in ad hoc cognitive packet routing.

    PubMed

    Lent, Ricardo

    2006-12-01

    This paper addresses two scalability problems related to the cognitive map of packets in ad hoc cognitive packet networks and proposes a solution. Previous works have included latency as part of the routing goal of smart packets, which requires packets to collect their arrival time at each node in a path. Such a requirement resulted in a packet overhead proportional to the path length. The second problem is that the multiplicative form of path availability, which was employed to measure resources, loses accuracy in long paths. To solve these problems, new goals are proposed in this paper. These goals are linear functions of low-overhead metrics and can provide similar performance results with lower cost. One direct result shown in simulation is that smart packets driven by a linear function of path length and buffer occupancy can effectively balance the traffic of multiple flows without the large overhead that would be needed if round-trip delay was used. In addition, energy-aware routing is also studied under this scheme as well as link selection based on their expected level of security.

  4. An adaptive neural swarm approach for intrusion defense in ad hoc networks

    NASA Astrophysics Data System (ADS)

    Cannady, James

    2011-06-01

    Wireless sensor networks (WSN) and mobile ad hoc networks (MANET) are being increasingly deployed in critical applications due to the flexibility and extensibility of the technology. While these networks possess numerous advantages over traditional wireless systems in dynamic environments they are still vulnerable to many of the same types of host-based and distributed attacks common to those systems. Unfortunately, the limited power and bandwidth available in WSNs and MANETs, combined with the dynamic connectivity that is a defining characteristic of the technology, makes it extremely difficult to utilize traditional intrusion detection techniques. This paper describes an approach to accurately and efficiently detect potentially damaging activity in WSNs and MANETs. It enables the network as a whole to recognize attacks, anomalies, and potential vulnerabilities in a distributive manner that reflects the autonomic processes of biological systems. Each component of the network recognizes activity in its local environment and then contributes to the overall situational awareness of the entire system. The approach utilizes agent-based swarm intelligence to adaptively identify potential data sources on each node and on adjacent nodes throughout the network. The swarm agents then self-organize into modular neural networks that utilize a reinforcement learning algorithm to identify relevant behavior patterns in the data without supervision. Once the modular neural networks have established interconnectivity both locally and with neighboring nodes the analysis of events within the network can be conducted collectively in real-time. The approach has been shown to be extremely effective in identifying distributed network attacks.

  5. Bringing Ad-Hoc Analytics to Big Earth Data: the EarthServer Experience

    NASA Astrophysics Data System (ADS)

    Baumann, Peter

    2014-05-01

    From the commonly accepted Vs defining the Big Data challenge - volume, velocity, variety - we more and more learn that the sheer volume is not the only, and often not even the decisive factor inhibiting access and analytics. In particular variety of data is a frequent core issue, posing manifold issues. Based on this observation we claim that a key aspect to analytics is the freedom to ask any questions, simple or complex, anytime and combining any choice of data structures, whatever diverging they may be. Actually, techniques for such "ad-hoc queries" we can learn from classical databases. Their concept of high-level query languages brings along several benefits: a uniform semantic, allowing machine-to-machine communication, including automatic generation of queries; massive server-side optimization and parallelization; and building attractive client interfaces hiding the query syntax from casual users while allowing power users to utilize it. However, these benefits used to be available only on tabular and set oriented data, text, and - more recently - graph data. With the advent of Array Databases, they become available on large multidimensional raster data assets as well, getting one step closer to the Holy Grail of itnegrated, uniform retrieval for users. ErthServer is a transatlantic initiative setting up operationa linfrastructures based on this paradigm. In our talk, we present core EarthServer technology concepts as well as a spectrum of Earth Science applications utilizing the EarthServer platform for versatile, visualisation supported analytics services. Further, we discuss the substantial impact EarthServer is having on Big Geo Data standardization in OGC and ISO. Time and Internet connection permitting a live demo can be presented.

  6. Exploring the Role of Ad Hoc Grassroots Organizations Providing Humanitarian Aid on Lesvos, Greece

    PubMed Central

    Kitching, George Tjensvoll; J. Haavik, Hanne; Tandstad, Birgit J.; Zaman, Muhammad; Darj, Elisabeth

    2016-01-01

    Introduction: Syrian refugees displaced into Turkey have attempted high-risk sea migrations to reach safer destinations in Europe, most often initially arriving on the Greek island of Lesvos. These refugees were often in need of basic humanitarian assistance that has been provided in part by a new category of ad hoc grassroots organizations (AHGOs). The aim of this study was to understand the internal and external operations of these AHGOs and their role on Lesvos. Methods: The experiences of AHGOs were investigated through a qualitative research design utilizing semi-structured interviews with organization leaders and spokespersons. AHGOs identified through media and social media sources as new Lesvos-specific organizations were purposively invited to complete an interview over phone, Skype or email. Data analysis of the transcribed interviews was performed by Systematic Text Condensation. Results: Forty-one organizations were contacted and 13 interviews were conducted. Most organizations were formed in autumn 2015 responding to the greater influx of refugees and migrants at that time and reported an absence of professional humanitarian agencies providing aid on Lesvos. Three categories emerged from the material. Features of organizations; Features of volunteers and; Evolution of AHGOs. The organizations perceived themselves capable of evaluating needs, mobilizing resources, funding and providing quick response. The volunteers came with limited humanitarian experience and from a wide variety of nationalities and professional backgrounds, and the organizations developed while on Lesvos. Discussion: Knowledge from our findings of AHGOs response to this complex disaster on Lesvos could be utilized in future catastrophes. We conclude that AHGOs may prove effective at providing humanitarian aid in a surge response when international non-governmental organizations are unable to respond quickly. In future complex disasters AHGOs should be recognized as new humanitarian

  7. Road Accident Prevention with Instant Emergency Warning Message Dissemination in Vehicular Ad-Hoc Network

    PubMed Central

    P, Gokulakrishnan; P, Ganeshkumar

    2015-01-01

    A Road Accident Prevention (RAP) scheme based on Vehicular Backbone Network (VBN) structure is proposed in this paper for Vehicular Ad-hoc Network (VANET). The RAP scheme attempts to prevent vehicles from highway road traffic accidents and thereby reduces death and injury rates. Once the possibility of an emergency situation (i.e. an accident) is predicted in advance, instantly RAP initiates a highway road traffic accident prevention scheme. The RAP scheme constitutes the following activities: (i) the Road Side Unit (RSU) constructs a Prediction Report (PR) based on the status of the vehicles and traffic in the highway roads, (ii) the RSU generates an Emergency Warning Message (EWM) based on an abnormal PR, (iii) the RSU forms a VBN structure and (iv) the RSU disseminates the EWM to the vehicles that holds the high Risk Factor (RF) and travels in High Risk Zone (HRZ). These vehicles might reside either within the RSU’s coverage area or outside RSU’s coverage area (reached using VBN structure). The RAP scheme improves the performance of EWM dissemination in terms of increase in notification and decrease in end-to-end delay. The RAP scheme also reduces infrastructure cost (number of RSUs) by formulating and deploying the VBN structure. The RAP scheme with VBN structure improves notification by 19 percent and end-to-end delay by 14.38 percent for a vehicle density of 160 vehicles. It is also proved from the simulation experiment that the performance of RAP scheme is promising in 4-lane highway roads. PMID:26636576

  8. Use of synthesized data to support complex ad-hoc queries in an enterprise information warehouse: a diabetes use case.

    PubMed

    Rogers, Patrick; Erdal, Selnur; Santangelo, Jennifer; Liu, Jianhua; Schuster, Dara; Kamal, Jyoti

    2008-11-06

    The Ohio State University Medical Center (OSUMC) Information Warehouse (IW) is a comprehensive data warehousing facility incorporating operational, clinical, and biological data sets from multiple enterprise system. It is common for users of the IW to request complex ad-hoc queries that often require significant intervention by data analyst. In response to this challenge, we have designed a workflow that leverages synthesized data elements to support such queries in an more timely, efficient manner.

  9. Report of the Ad Hoc Subgroup on the Impact of Competition in Contracting on Research and Development

    DTIC Science & Technology

    1988-06-01

    NUMBER(O LTG Robert Lunn (US Army Ret), Dr. Barbara Glacel, Ms. Naomi J. McAfee, Mr. John Moore, Mr. Edward A. Miller, Dr. Leon Riebman, Mr. Harrison H...Comments on Terms of Reference and Panel Questions 11. Paper dated 20 Jun 88 submitted by Mr. John R. Moore, Subject: Considerations and Issues... Sculley Assistant Secretary of the Army (Research, Development and Acquisition) I September 1987 PARTICIPANTS LIST ARMY SCIENCE BOARD AD HOC SUBGROUP ON

  10. Ad hoc supervision of general practice registrars as a 'community of practice': analysis, interpretation and re-presentation.

    PubMed

    Clement, T; Brown, J; Morrison, J; Nestel, D

    2016-05-01

    General practice registrars in Australia undertake most of their vocational training in accredited general practices. They typically see patients alone from the start of their community-based training and are expected to seek timely ad hoc support from their supervisor. Such ad hoc encounters are a mechanism for ensuring patient safety, but also provide an opportunity for learning and teaching. Wenger's (Communities of practice: learning, meaning, and identity. Cambridge University Press, New York, 1998) social theory of learning ('communities of practice') guided a secondary analysis of audio-recordings of ad hoc encounters. Data from one encounter is re-presented as an extended sequence to maintain congruence with the theoretical perspective and enhance vicariousness. An interpretive commentary communicates key features of Wenger's theory and highlights the researchers' interpretations. We argue that one encounter can reveal universal understandings of clinical supervision and that the process of naturalistic generalisation allows readers to transfer others' experiences to their own contexts. The paper raises significant analytic, interpretive, and representational issues. We highlight that report writing is an important, but infrequently discussed, part of research design. We discuss the challenges of supporting the learning and teaching that arises from adopting a socio-cultural lens and argue that such a perspective importantly captures the complex range of issues that work-based practitioners have to grapple with. This offers a challenge to how we research and seek to influence work-based learning and teaching in health care settings.

  11. Design and Analysis of A Beacon-Less Routing Protocol for Large Volume Content Dissemination in Vehicular Ad Hoc Networks.

    PubMed

    Hu, Miao; Zhong, Zhangdui; Ni, Minming; Baiocchi, Andrea

    2016-11-01

    Large volume content dissemination is pursued by the growing number of high quality applications for Vehicular Ad hoc NETworks(VANETs), e.g., the live road surveillance service and the video-based overtaking assistant service. For the highly dynamical vehicular network topology, beacon-less routing protocols have been proven to be efficient in achieving a balance between the system performance and the control overhead. However, to the authors' best knowledge, the routing design for large volume content has not been well considered in the previous work, which will introduce new challenges, e.g., the enhanced connectivity requirement for a radio link. In this paper, a link Lifetime-aware Beacon-less Routing Protocol (LBRP) is designed for large volume content delivery in VANETs. Each vehicle makes the forwarding decision based on the message header information and its current state, including the speed and position information. A semi-Markov process analytical model is proposed to evaluate the expected delay in constructing one routing path for LBRP. Simulations show that the proposed LBRP scheme outperforms the traditional dissemination protocols in providing a low end-to-end delay. The analytical model is shown to exhibit a good match on the delay estimation with Monte Carlo simulations, as well.

  12. Dynamic Cooperative Clustering Based Power Assignment: Network Capacity and Lifetime Efficient Topology Control in Cooperative Ad Hoc Networks

    PubMed Central

    Xiao, Ling

    2014-01-01

    Cooperative communication (CC) is used in topology control as it can reduce the transmission power and expand the transmission range. However, all previous research on topology control under the CC model focused on maintaining network connectivity and minimizing the total energy consumption, which would lead to low network capacity, transmission interruption, or even network paralysis. Meanwhile, without considering the balance of energy consumption in the network, it would reduce the network lifetime and greatly affect the network performance. This paper tries to solve the above problems existing in the research on topology control under the CC model by proposing a power assignment (DCCPA) algorithm based on dynamic cooperative clustering in cooperative ad hoc networks. The new algorithm clusters the network to maximize network capacity and makes the clusters communicate with each other by CC. To reduce the number of redundant links between clusters, we design a static clustering method by using Kruskal algorithm. To maximize the network lifetime, we also propose a cluster head rotating method which can reach a good tradeoff between residual energy and distance for the cluster head reselection. Experimental results show that DCCPA can improve 80% network capacity with Cooperative Bridges algorithm; meanwhile, it can improve 20% network lifetime. PMID:24757413

  13. Design and Analysis of A Beacon-Less Routing Protocol for Large Volume Content Dissemination in Vehicular Ad Hoc Networks

    PubMed Central

    Hu, Miao; Zhong, Zhangdui; Ni, Minming; Baiocchi, Andrea

    2016-01-01

    Large volume content dissemination is pursued by the growing number of high quality applications for Vehicular Ad hoc NETworks(VANETs), e.g., the live road surveillance service and the video-based overtaking assistant service. For the highly dynamical vehicular network topology, beacon-less routing protocols have been proven to be efficient in achieving a balance between the system performance and the control overhead. However, to the authors’ best knowledge, the routing design for large volume content has not been well considered in the previous work, which will introduce new challenges, e.g., the enhanced connectivity requirement for a radio link. In this paper, a link Lifetime-aware Beacon-less Routing Protocol (LBRP) is designed for large volume content delivery in VANETs. Each vehicle makes the forwarding decision based on the message header information and its current state, including the speed and position information. A semi-Markov process analytical model is proposed to evaluate the expected delay in constructing one routing path for LBRP. Simulations show that the proposed LBRP scheme outperforms the traditional dissemination protocols in providing a low end-to-end delay. The analytical model is shown to exhibit a good match on the delay estimation with Monte Carlo simulations, as well. PMID:27809285

  14. Dynamic cooperative clustering based power assignment: network capacity and lifetime efficient topology control in cooperative ad hoc networks.

    PubMed

    Li, Xiao-Hong; Xiao, Ling; Wang, Dong

    2014-01-01

    Cooperative communication (CC) is used in topology control as it can reduce the transmission power and expand the transmission range. However, all previous research on topology control under the CC model focused on maintaining network connectivity and minimizing the total energy consumption, which would lead to low network capacity, transmission interruption, or even network paralysis. Meanwhile, without considering the balance of energy consumption in the network, it would reduce the network lifetime and greatly affect the network performance. This paper tries to solve the above problems existing in the research on topology control under the CC model by proposing a power assignment (DCCPA) algorithm based on dynamic cooperative clustering in cooperative ad hoc networks. The new algorithm clusters the network to maximize network capacity and makes the clusters communicate with each other by CC. To reduce the number of redundant links between clusters, we design a static clustering method by using Kruskal algorithm. To maximize the network lifetime, we also propose a cluster head rotating method which can reach a good tradeoff between residual energy and distance for the cluster head reselection. Experimental results show that DCCPA can improve 80% network capacity with Cooperative Bridges algorithm; meanwhile, it can improve 20% network lifetime.

  15. A Security Solution for IEEE 802.11's Ad-hoc Mode:Password-Authentication and Group Diffie-Hellman Key Exchange

    SciTech Connect

    Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval

    2005-10-01

    The IEEE 802 standards ease the deployment of networkinginfrastructures and enable employers to accesscorporate networks whiletraveling. These standards provide two modes of communication calledinfrastructure and ad-hoc modes. A security solution for the IEEE802.11's infrastructure mode took several years to reach maturity andfirmware are still been upgraded, yet a solution for the ad-hoc modeneeds to be specified. The present paper is a first attempt in thisdirection. It leverages the latest developments in the area ofpassword-based authentication and (group) Diffie-Hellman key exchange todevelop a provably-secure key-exchange protocol for IEEE 802.11's ad-hocmode. The protocol allows users to securely join and leave the wirelessgroup at time, accommodates either a single-shared password orpairwise-shared passwords among the group members, or at least with acentral server; achieves security against dictionary attacks in theideal-hash model (i.e. random-oracles). This is, to the best of ourknowledge, the first such protocol to appear in the cryptographicliterature.

  16. BCDP: Budget Constrained and Delay-Bounded Placement for Hybrid Roadside Units in Vehicular Ad Hoc Networks

    PubMed Central

    Li, Peng; Huang, Chuanhe; Liu, Qin

    2014-01-01

    In vehicular ad hoc networks, roadside units (RSUs) placement has been proposed to improve the the overall network performance in many ITS applications. This paper addresses the budget constrained and delay-bounded placement problem (BCDP) for roadside units in vehicular ad hoc networks. There are two types of RSUs: cable connected RSU (c-RSU) and wireless RSU (w-RSU). c-RSUs are interconnected through wired lines, and they form the backbone of VANETs, while w-RSUs connect to other RSUs through wireless communication and serve as an economical extension of the coverage of c-RSUs. The delay-bounded coverage range and deployment cost of these two cases are totally different. We are given a budget constraint and a delay bound, the problem is how to find the optimal candidate sites with the maximal delay-bounded coverage to place RSUs such that a message from any c-RSU in the region can be disseminated to the more vehicles within the given budget constraint and delay bound. We first prove that the BCDP problem is NP-hard. Then we propose several algorithms to solve the BCDP problem. Simulation results show the heuristic algorithms can significantly improve the coverage range and reduce the total deployment cost, compared with other heuristic methods. PMID:25436656

  17. Modeling Terrain Impact on Mobile Ad Hoc Networks (MANET) Connectivity

    DTIC Science & Technology

    2014-05-01

    O R D E F E N S E A N A L Y S E S INSTITUTE FOR DEFENSE ANALYSES 4850 Mark Center Drive Alexandria, Virginia 22311-1882 IDA Document NS D-5246 Log: H...AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Institute for Defense Analyses ...Institute for Defense Analyses 4850 Mark Center Drive, Alexandria, Virginia 22311-1882 • (703) 845-2000. This material may be reproduced by or for the

  18. Improving the signal-to-noise ratio of an ECL-based sensor using ad hoc carbon nanotube electrodes

    NASA Astrophysics Data System (ADS)

    Sanginario, A.; Giorcelli, M.; Tagliaferro, A.; Demarchi, D.

    2012-07-01

    In this paper, we demonstrate that mechanically modified cylinder-shaped carbon nanotube (CNT) working electrodes (WEs), combined with an averaging processing algorithm, can increase electrogenerated chemiluminescence (ECL) limit of detection by more than one order of magnitude, compared to gold electrodes. With CNT WEs, we obtained a stable light emission that lasts for hundreds of voltammetric cycles. This stability was further exploited to increase the detection limit with a simple algorithm, based on mean calculation. Ad hoc fabricated sensors are characterized with a full-custom potentiostat testbed and software platform, using tris(2,2-bipyridyl)ruthenium (II) as ECL labels. Our measurement results show that the signal-to-noise ratio (SNR) improves by a factor of larger than 20 compared to standard gold WEs to reach a detection limit up to 40 pg μl-1.

  19. Evaluating the Importance of Image-related Text for Ad-hoc and Case-based Biomedical Article Retrieval.

    PubMed

    Simpson, Matthew S; Demner-Fushman, Dina; Thoma, George R

    2010-11-13

    Images and their associated text are an essential source of information in biomedical articles. However, their use in providing evidence for clinical case descriptions has yet to be evaluated in the context of information retrieval. Given the complexity of case-based document retrieval, understanding the importance of images and image-related text is critical for future research into text- and content-based approaches to this problem. In this study, we compare the extent to which image-related text is useful in facilitating document retrieval for both case-based information requests and ad-hoc clinical questions in the domain of family practice. We show that case-based document retrieval is significantly improved with the use of image-related text whereas retrieval for clinical questions is largely unaffected. This suggests that visual evidence is more relevant for the case descriptions used in our study than the clinical questions.

  20. Potentials, Limitations and Applications of long-term and mobile ad-hoc Wireless Sensor Networks for Environmental Monitoring

    NASA Astrophysics Data System (ADS)

    Bumberger, Jan; Mollenhauer, Hannes; Lapteva, Yulia; Hutschenreuther, Tino; Toepfer, Hannes; Dietrich, Peter

    2014-05-01

    To characterize environmental systems it is necessary to identify and describe processes with suitable methods. Environmental systems are often characterized by their high heterogeneity, so individual measurements for their complete representation are often not sufficient. The application of wireless sensor networks in terrestrial and aquatic ecosystems offer significant benefits as a better consideration of the local test conditions becomes possible. This can be essential for the monitoring of heterogeneous environmental systems. Significant advantages in the application of mobile ad-hoc wireless sensor networks are their self-organizing behavior, resulting in a major reduction in installation and operation costs and time. In addition, a point measurement with a sensor is significantly improved by measuring at several points. It is also possible to perform analog and digital signal processing and computation on the basis of the measured data close to the sensor. Hence, a significant reduction of the data to be transmitted can be achieved which leads to a better energy management of sensor nodes. Furthermore, their localization via satellite, the miniaturization of the nodes and long-term energy self-sufficiency are current topics under investigation. The possibilities and limitations of the applicability of wireless sensor networks for long-term and mobile environmental monitoring are presented. A concepts and realization example are given in the field of micrometeorology and soil parameters for the interaction of biotic and abiotic processes .This long term monitoring is part of the Global Change Experimental Facility (GCEF), a large field-based experimental platform to assess the effects of climate change on ecosystem functions and processes under different land-use scenarios. Furthermore a mobile ad-hoc sensor network is presented for the monitoring of water induced mass wasting processes.

  1. A Discussion of Metrics for Parallelized Army Mobile ad hoc Network Simulations

    DTIC Science & Technology

    2011-09-01

    years including Yet Another Network Simulator (YANS), ns-2 and ns-3, OPNET , and ROSS (4–8). All of these approaches employ a discrete event simulator (DES...adding NetDMF awareness to the COMPOSER toolkit. Commercial tools, such as OPNET , also maintain a suite of tools for analysis of network simulation...Network Simulator-3 (ns-3). [6] Chang, X. Network Simulations with OPNET . In Winter Simulation Conference, 1999. [7] Khosa, I.; Haider, U.; Mosood, H

  2. Assessment of methods for amino acid matrix selection and their use on empirical data shows that ad hoc assumptions for choice of matrix are not justified

    PubMed Central

    Keane, Thomas M; Creevey, Christopher J; Pentony, Melissa M; Naughton, Thomas J; Mclnerney, James O

    2006-01-01

    Background In recent years, model based approaches such as maximum likelihood have become the methods of choice for constructing phylogenies. A number of authors have shown the importance of using adequate substitution models in order to produce accurate phylogenies. In the past, many empirical models of amino acid substitution have been derived using a variety of different methods and protein datasets. These matrices are normally used as surrogates, rather than deriving the maximum likelihood model from the dataset being examined. With few exceptions, selection between alternative matrices has been carried out in an ad hoc manner. Results We start by highlighting the potential dangers of arbitrarily choosing protein models by demonstrating an empirical example where a single alignment can produce two topologically different and strongly supported phylogenies using two different arbitrarily-chosen amino acid substitution models. We demonstrate that in simple simulations, statistical methods of model selection are indeed robust and likely to be useful for protein model selection. We have investigated patterns of amino acid substitution among homologous sequences from the three Domains of life and our results show that no single amino acid matrix is optimal for any of the datasets. Perhaps most interestingly, we demonstrate that for two large datasets derived from the proteobacteria and archaea, one of the most favored models in both datasets is a model that was originally derived from retroviral Pol proteins. Conclusion This demonstrates that choosing protein models based on their source or method of construction may not be appropriate. PMID:16563161

  3. A Time-Slotted On-Demand Routing Protocol for Mobile Ad Hoc Unmanned Vehicle Systems

    SciTech Connect

    Hope Forsmann; Robert Hiromoto; John Svoboda

    2007-04-01

    The popularity of UAVs has increased dramatically because of their successful deployment in military operations, their ability to preserve human life, and the continual improvements in wireless communication that serves to increase their capabilities. We believe the usefulness of UAVs would be dramatically increased if formation flight were added to the list of capabilities. Currently, sustained formation flight with a cluster of UAVs has only been achieved with two nodes by the Multi-UAV Testbed at the Massachusetts Institute of Technology. (Park, 2004) Formation flight is a complex operation requiring the ability to adjust the flight patterns on the fly and correct for wind gusts, terrain, and differences in node equipment. All of which increases the amount of inner node communication. Since one of the problems with MANET communication is network congestion, we believe a first step towards formation flight can be made through improved inner node communication. We have investigated current communication routing protocols and developed an altered hybrid routing protocol in order to provide communication with less network congestion.

  4. A maintenance scheme of communication link in mobile robot ad hoc networks based on potential field

    NASA Astrophysics Data System (ADS)

    Jiang, Hong; Jin, WenPing; Yang, GyoYing; Li, LeiMin

    2007-12-01

    Maintaining communication link in mobile robot networks between task robots and a control center is very important in some urgent application occasions such as remote danger detections. To offer a reliable multi-hop communication link, a link maintaining scheme based on artificial potential field is presented. The scheme is achieved by a task robot and communication relay ones. The task robot performs predefined tasks, and relay ones are simple robots which form a communication relay chain. When robots move towards destination in formation, a kind of attractive force created by communication quality is added to traditional potential field, and relay robots follow the task robot and automatically stop at adequate locations to form a relay chain from the control station to the task robot. In order to increase relay usage efficiency, when some relays are replaced by other short cut relays, the redundant relays can be reused by initiating another moving toward specified location. Simulation results show that the scheme can provide a reliable multi-hop communication link, and that the communication connection can be obtained through minimal number of relays.

  5. Preserving Nevada's Environmental Heritage: A Report of the Ad Hoc Committee on Environmental Quality. Final Report to the Governor's Natural Resources Council.

    ERIC Educational Resources Information Center

    Nevada State Dept. of Conservation and Natural Resources, Carson City.

    The Environmental Quality Ad Hoc Committee has prepared this report for the Governor's Natural Resources Council (Nevada). It is a compilation of available factual data focusing attention on needed statutory and administrative changes to preserve Nevada's environmental heritage and from which recommendations for future budgetary and legislative…

  6. Meeting the Needs of CALS Students for Computing Capabilities. Final Report of the Ad Hoc Committee on College of Agriculture and Life Sciences Student Computing Competencies.

    ERIC Educational Resources Information Center

    Monk, David; And Others

    The Ad Hoc Committee on the Cornell University (New York) College of Agriculture and Life Sciences (CALS) Student Computing Competencies was appointed in the fall of 1995 to determine (1) what all CALS undergraduate students should know about computing and related technologies; (2) how the college can make it possible for students to develop these…

  7. Report on Counseling Evaluation Guidelines Developed by the Ad Hoc Counseling Task Force and Endorsed by the Illinois Community College Board.

    ERIC Educational Resources Information Center

    Illinois Community Coll. Board, Springfield.

    Three years of cooperative effort by participating Illinois community colleges and the Ad Hoc Counseling Task Force resulted in the 1977 approval, by the Illinois Community College Board (ICCB), of a position paper on comprehensive counseling services and in the endorsement of guidelines in four student service areas. The ICCB supports counseling…

  8. Space-Time Processing for Tactical Mobile Ad-Hoc Networks

    DTIC Science & Technology

    2005-08-01

    electrical engineering of antenna array design and electronics; computer science of networking; and the mathematics of information and control theory...MIMO networks at this time. The COST 259 model does provide improvements over the GSM model since it adds direction of arrival statistics to the...an open research issue especially because the channel statistics are not yet known for mobile MIMO networks. Physical and network diversity could be

  9. Army Science Board Ad Hoc Study Group Report on Human Issues.

    DTIC Science & Technology

    1980-03-01

    capability. Improved force effectiveness and force composition models should result from formation of a center of modeling expertise in the Army. 1 V...top level attention on human issues research and to formulate human issues programs to meet future needs. A concept paper was presented to the Army...establish terms of reference (TOR) for a personnel council. 3. Establish a study group to review and evaluate the quality and breadth of Army human issues

  10. Ad Hoc Influenza Vaccination During Years of Significant Antigenic Drift in a Tropical City With 2 Seasonal Peaks

    PubMed Central

    Wong, Martin C.S.; Nelson, E. Anthony S.; Leung, Czarina; Lee, Nelson; Chan, Martin C.W.; Choi, Kin Wing; Rainer, Timothy H.; Cheng, Frankie W.T.; Wong, Samuel Y.S.; Lai, Christopher K.C.; Lam, Bosco; Cheung, Tak Hong; Leung, Ting Fan; Chan, Paul K.S.

    2016-01-01

    Abstract We evaluated the acceptability of an additional ad hoc influenza vaccination among the health care professionals following seasons with significant antigenic drift. Self-administered, anonymous surveys were performed by hard copy questionnaires in public hospitals, and by an on-line platform available to all healthcare professionals, from April 1st to May 31st, 2015. A total of 1290 healthcare professionals completed the questionnaires, including doctors, nurses, and allied health professionals working in both the public and private systems. Only 31.8% of participating respondents expressed an intention to receive the additional vaccine, despite that the majority of them agreed or strongly agreed that it would bring benefit to the community (88.9%), save lives (86.7%), reduce medical expenses (76.3%), satisfy public expectation (82.8%), and increase awareness of vaccination (86.1%). However, a significant proportion expressed concern that the vaccine could disturb the normal immunization schedule (45.5%); felt uncertain what to do in the next vaccination round (66.0%); perceived that the summer peak might not occur (48.2%); and believed that the summer peak might not be of the same virus (83.5%). Furthermore, 27.8% of all respondents expected that the additional vaccination could weaken the efficacy of previous vaccinations; 51.3% was concerned about side effects; and 61.3% estimated that there would be a low uptake rate. If the supply of vaccine was limited, higher priority groups were considered to include the elderly aged ≥65 years with chronic medical conditions (89.2%), the elderly living in residential care homes (87.4%), and long-stay residents of institutions for the disabled (80.7%). The strongest factors associated with accepting the additional vaccine included immunization with influenza vaccines in the past 3 years, higher perceived risk of contracting influenza, and higher perceived severity of the disease impact. The acceptability to an

  11. An Analysis Platform for Mobile Ad Hoc Network (MANET) Scenario Execution Log Data

    DTIC Science & Technology

    2016-01-01

    Case The SEDAP web interface has been tested with, and is compatible with, the following browsers: Internet Explorer, Google Chrome, and Iceweasel...a plugin-based platform that provides a flexible and efficient mechanism for the model generation process. This platform consists of a web portal...Fig. 8 SEDAP backend module diagram .......................................................18 Fig. 9 SEDAP web service diagram

  12. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks

    PubMed Central

    Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J.; Segarra, Esteve Pallarès; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Gargallo, Emilio Sanvicente

    2015-01-01

    The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic.Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs. PMID:25897496

  13. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks.

    PubMed

    Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J; Pallarès Segarra, Esteve; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Sanvicente Gargallo, Emilio

    2015-04-17

    The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.

  14. EFFECT OF MOBILITY ON PERFORMANCE OF WIRELESS AD-HOC NETWORK PROTOCOLS.

    SciTech Connect

    Barrett, C. L.; Drozda, M.; Marathe, M. V.; Marathe, A.

    2001-01-01

    We empirically study the effect of mobility on the performance of protocols designed for wireless adhoc networks. An important ohjective is to study the interaction of the Routing and MAC layer protocols under different mobility parameters. We use three basic mobility models: grid mobility model, random waypoint model, and exponential correlated random model. The performance of protocols was measured in terms of (i) latency, (ii) throughput, (iii) number of packels received, (iv) long term fairness and (v) number of control packets at the MAC layer level. Three different commonly studied routing protocols were used: AODV, DSR and LAR1. Similarly three well known MAC protocols were used: MACA, 802.1 1 and CSMA. The inair1 conclusion of our study include the following: 1. 'I'he performance of the: network varies widely with varying mobility models, packet injection rates and speeds; and can ba in fact characterized as fair to poor depending on the specific situation. Nevertheless, in general, it appears that the combination of AODV and 802.1 I is far better than other combination of routing and MAC protocols. 2. MAC layer protocols interact with routing layer protocols. This concept which is formalized using statistics implies that in general it is not meaningful to speak about a MAC or a routing protocol in isolation. Such an interaction leads to trade-offs between the amount of control packets generated by each layer. More interestingly, the results wise the possibility of improving the performance of a particular MAC layer protocol by using a cleverly designed routing protocol or vice-versa. 3. Routing prolocols with distributed knowledge about routes are more suitable for networks with mobility. This is seen by comparing the performance of AODV with DSR or LAR scheme 1. In DSli and IAR scheme 1, information about a computed path is being stored in the route query control packct. 4. MAC layer protocols have varying performance with varying mobility models. It is

  15. International survey of vestibular rehabilitation therapists by the Barany Society Ad Hoc Committee on Vestibular Rehabilitation Therapy.

    PubMed

    Cohen, Helen S; Gottshall, Kim R; Graziano, Mariella; Malmstrom, Eva-Maj; Sharpe, Margaret H

    2009-01-01

    The goal of this study was to determine how occupational and physical therapists learn about vestibular rehabilitation therapy, their educational backgrounds, referral patterns, and their ideas about entry-level and advanced continuing education in vestibular rehabilitation therapy. The Barany Society Ad Hoc Committee for Vestibular Rehabilitation Therapy invited therapists around the world to complete an E-mail survey. Participants were either known to committee members or other Barany Society members, known to other participants, identified from their self-listings on the Internet, or volunteered after reading notices published in publications read by therapists. Responses were received from 133 therapists in 19 countries. They had a range of educational backgrounds, practice settings, and referral patterns. Few respondents had had any training about vestibular rehabilitation during their professional entry-level education. Most respondents learned about vestibular rehabilitation from continuing education courses, interactions with their colleagues, and reading. All of them endorsed the concept of developing standards and educating therapists about vestibular anatomy and physiology, vestibular diagnostic testing, vestibular disorders and current intervention strategies. Therefore, the Committee recommends the development of international standards for education and practice in vestibular rehabilitation therapy.

  16. Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsaur, Woei-Jiunn; Pai, Haw-Tyng

    2008-11-01

    The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.

  17. Extended Virtual Spring Mesh (EVSM): The Distributed Self-Organizing Mobile Ad Hoc Network for Area Exploration

    SciTech Connect

    Kurt Derr

    2011-12-01

    Mobile Ad hoc NETworks (MANETs) are distributed self-organizing networks that can change locations and configure themselves on the fly. This paper focuses on an algorithmic approach for the deployment of a MANET within an enclosed area, such as a building in a disaster scenario, which can provide a robust communication infrastructure for search and rescue operations. While a virtual spring mesh (VSM) algorithm provides scalable, self-organizing, and fault-tolerant capabilities required by aMANET, the VSM lacks the MANET's capabilities of deployment mechanisms for blanket coverage of an area and does not provide an obstacle avoidance mechanism. This paper presents a new technique, an extended VSM (EVSM) algorithm that provides the following novelties: (1) new control laws for exploration and expansion to provide blanket coverage, (2) virtual adaptive springs enabling the mesh to expand as necessary, (3) adapts to communications disturbances by varying the density and movement of mobile nodes, and (4) new metrics to assess the performance of the EVSM algorithm. Simulation results show that EVSM provides up to 16% more coverage and is 3.5 times faster than VSM in environments with eight obstacles.

  18. Solving data-at-rest for the storage and retrieval of files in ad hoc networks

    NASA Astrophysics Data System (ADS)

    Knobler, Ron; Scheffel, Peter; Williams, Jonathan; Gaj, Kris; Kaps, Jens-Peter

    2013-05-01

    Based on current trends for both military and commercial applications, the use of mobile devices (e.g. smartphones and tablets) is greatly increasing. Several military applications consist of secure peer to peer file sharing without a centralized authority. For these military applications, if one or more of these mobile devices are lost or compromised, sensitive files can be compromised by adversaries, since COTS devices and operating systems are used. Complete system files cannot be stored on a device, since after compromising a device, an adversary can attack the data at rest, and eventually obtain the original file. Also after a device is compromised, the existing peer to peer system devices must still be able to access all system files. McQ has teamed with the Cryptographic Engineering Research Group at George Mason University to develop a custom distributed file sharing system to provide a complete solution to the data at rest problem for resource constrained embedded systems and mobile devices. This innovative approach scales very well to a large number of network devices, without a single point of failure. We have implemented the approach on representative mobile devices as well as developed an extensive system simulator to benchmark expected system performance based on detailed modeling of the network/radio characteristics, CONOPS, and secure distributed file system functionality. The simulator is highly customizable for the purpose of determining expected system performance for other network topologies and CONOPS.

  19. Ad Hoc Rural Regionalism

    ERIC Educational Resources Information Center

    Hamin, Elisabeth M.; Marcucci, Daniel J.

    2008-01-01

    A new regionalism has been much documented and researched for metropolitan areas; this article documents that there is a new rural regionalism as well. In the United States, these groups appear most likely to emerge in areas that are challenged by outcomes characterizing globalization's effects on the rural condition: namely, exurban or…

  20. Adaptive Wireless Ad-hoc Sensor Networks for Long-term and Event-oriented Environmental Monitoring

    NASA Astrophysics Data System (ADS)

    Bumberger, Jan; Mollenhauer, Hannes; Remmler, Paul; Schaedler, Martin; Schima, Robert; Mollenhauer, Olaf; Hutschenreuther, Tino; Toepfer, Hannes; Dietrich, Peter

    2015-04-01

    Ecosystems are often characterized by their high heterogeneity, complexity and dynamic. Hence, single point measurements are often not sufficient for their complete representation. The application of wireless sensor networks in terrestrial and aquatic environmental systems offer significant benefits as a better consideration to the local test conditions, due to the simple adjustment of the sensor distribution, the sensor types and the sample rate. Another advantage of wireless ad-hoc sensor networks is their self-organizing behavior, resulting in a major reduction in installation and operation costs and time. In addition, individual point measurements with a sensor are significantly improved by measuring at several points continuously. In this work a concept and realization for Long-term ecosystem research is given in the field monitoring of micrometeorology and soil parameters for the interaction of biotic and abiotic processes. This long term analyses are part of the Global Change Experimental Facility (GCEF), a large field-based experimental platform to assess the effects of climate change on ecosystem functions and processes under different land-use scenarios. Regarding to the adaptive behavior of the network, also a mobile version was developed to overcome the lack of information of temporally and spatially fixed measurements for the detection and recording of highly dynamic or time limited processes. First results of different field campaigns are given to present the potentials and limitations of this application in environmental science, especially for the monitoring of the interaction of biotic and abiotic processes, soil-atmosphere interaction and the validation of remote sensing data.

  1. Adaptive Wireless Ad-hoc Sensor Networks for Long-term and Event-oriented Environmental Monitoring

    NASA Astrophysics Data System (ADS)

    Bumberger, Jan; Mollenhauer, Hannes; Remmler, Paul; Chirila, Andrei Marian; Mollenhauer, Olaf; Hutschenreuther, Tino; Toepfer, Hannes; Dietrich, Peter

    2016-04-01

    Ecosystems are often characterized by their high heterogeneity, complexity and dynamic. Hence, single point measurements are often not sufficient for their complete representation. The application of wireless sensor networks in terrestrial and aquatic environmental systems offer significant benefits as a better consideration to the local test conditions, due to the simple adjustment of the sensor distribution, the sensor types and the sample rate. Another advantage of wireless ad-hoc sensor networks is their self-organizing behavior, resulting in a major reduction in installation and operation costs and time. In addition, individual point measurements with a sensor are significantly improved by measuring at several points continuously. In this work a concept and realization for Long-term ecosystem research is given in the field monitoring of micrometeorology and soil parameters for the interaction of biotic and abiotic processes. This long term analyses are part of the Global Change Experimental Facility (GCEF), a large field-based experimental platform to assess the effects of climate change on ecosystem functions and processes under different land-use scenarios. Regarding to the adaptive behavior of the network, also a mobile version was developed to overcome the lack of information of temporally and spatially fixed measurements for the detection and recording of highly dynamic or time limited processes. First results of different field campaigns are given to present the potentials and limitations of this application in environmental science, especially for the monitoring of the interaction of biotic and abiotic processes, soil-atmosphere interaction and the validation of remote sensing data.

  2. Comparison of two commonly practiced atropinization regimens in acute organophosphorus and carbamate poisoning, doubling doses vs. ad hoc: a prospective observational study.

    PubMed

    Perera, P M S; Shahmy, S; Gawarammana, I; Dawson, A H

    2008-06-01

    There is a wide variation and lack of evidence in current recommendations for atropine dosing schedules leading to subsequent variation in clinical practice. Therefore, we sought to examine the safety and effectiveness of a titrated vs. ad hoc atropine treatment regimen in a cohort of patients with acute cholinesterase inhibitor pesticide poisoning. A prospective cohort study was conducted in three district secondary referral hospitals in Sri Lanka using a structured data collection form that collected details of clinical symptoms and outcomes of cholinesterase inhibitor pesticide poisoning, atropine doses, and signs of atropinization. We compared two hospitals that used a titrated dosing protocol based on a structured monitoring sheet for atropine infusion with another hospital using an ad hoc regime. During the study, 272 symptomatic patients with anticholinesterase poisoning requiring atropine were admitted to the three hospitals. Outcomes of death and ventilation were analyzed for all patients, 226 patients were prospectively assessed for atropine toxicity. At baseline, patients in the titrated dose cohort had clinical signs consistent with greater toxicity. This in part may be due to ingestion of more toxic organophosphates. They received less pralidoxime and atropine, and were less likely to develop features of atropine toxicity, such as delirium (1% vs. 17%), hallucinations (1% vs. 35%), or either (1% vs. 35%) and need for patient restraint (3% vs. 48%) compared with the ad hoc dose regime. After adjusting for the pesticides ingested, there was no difference in mortality and ventilatory rates between protocols. Ad hoc high dose atropine regimens are associated with more frequent atropine toxicity without any obvious improvement in patient outcome compared with doses titrated to clinical effect. Atropine doses should be titrated against response and toxicity. Further education and the use of a structured monitoring sheet may assist in more appropriate

  3. Clinician Ratings of Interpreter Mediated Visits in Underserved Primary Care Settings with Ad hoc, In-person Professional, and Video Conferencing Modes

    PubMed Central

    Nápoles, Anna M.; Santoyo-Olsson, Jasmine; Karliner, Leah S.; O’Brien, Helen; Gregorich, Steven E.; Pérez-Stable, Eliseo J.

    2013-01-01

    Language interpretation ameliorates health disparities among underserved limited English-proficient patients, yet few studies have compared clinician satisfaction with these services. Self-administered clinician post-visit surveys compared the quality of interpretation and communication, visit satisfaction, degree of patient engagement, and cultural competence of visits using untrained people acting as interpreters (ad hoc), in-person professional, or video conferencing professional interpretation for 283 visits. Adjusting for clinician and patient characteristics, the quality of interpretation of in-person and video conferencing modes were rated similarly (OR=1.79; 95% CI 0.74, 4.33). The quality of in-person (OR=5.55; 95% CI 1.50, 20.51) and video conferencing (OR=3.10; 95% CI 1.16, 8.31) were rated higher than ad hoc interpretation. Self-assessed cultural competence was better for in-person versus video conferencing interpretation (OR=2.32; 95% CI 1.11, 4.86). Video conferencing interpretation increases access without compromising quality, but cultural nuances may be better addressed by in-person interpreters. Professional interpretation is superior to ad hoc (OR=4.15; 95% CI 1.43, 12.09). PMID:20173271

  4. Heavy quark potential from deformed AdS5 models

    NASA Astrophysics Data System (ADS)

    Zhang, Zi-qiang; Hou, De-fu; Chen, Gang

    2017-04-01

    In this paper, we investigate the heavy quark potential in some holographic QCD models. The calculation relies on a modified renormalization scheme mentioned in a previous work of Albacete et al. After studying the heavy quark potential in Pirner-Galow model and Andreev-Zakharov model, we extend the discussion to a general deformed AdS5 case. It is shown that the obtained potential is negative definite for all quark-antiquark separations, differs from that using the usual renormalization scheme.

  5. Ad-hoc and context-dependent adjustments of selective attention in conflict control: an ERP study with visual probes.

    PubMed

    Nigbur, R; Schneider, J; Sommer, W; Dimigen, O; Stürmer, B

    2015-02-15

    Cognitive conflict control in flanker tasks has often been described using the zoom-lens metaphor of selective attention. However, whether and how selective attention - in terms of suppression and enhancement - operates in this context has remained unclear. To examine the dynamic interplay of selective attention and cognitive control we used electrophysiological measures and presented task-irrelevant visual probe stimuli at foveal, parafoveal, and peripheral display positions. Target-flanker congruency varied either randomly from trial to trial (mixed-block) or block-wise (fixed-block) in order to induce reactive versus proactive control modes, respectively. Three EEG measures were used to capture ad-hoc adjustments within trials as well as effects of context-based predictions: the N1 component of the visual evoked potential (VEP) to probes, the VEP to targets, and the conflict-related midfrontal N2 component. Results from probe-VEPs indicate that enhanced processing of the foveal target rather than suppression of the peripheral flankers supports interference control. In incongruent mixed-block trials VEPs were larger to probes near the targets. In the fixed-blocks probe-VEPs were not modulated, but contrary to the mixed-block the preceding target-related VEP was affected by congruency. Results of the control-related N2 reveal largest amplitudes in the unpredictable context, which did not differentiate for stimulus and response incongruency. In contrast, in the predictable context, N2 amplitudes were reduced overall and differentiated between stimulus and response incongruency. Taken together these results imply that predictability alters interference control by a reconfiguration of stimulus processing. During unpredictable sequences participants adjust their attentional focus dynamically on a trial-by-trial basis as reflected in congruency-dependent probe-VEP-modulation. This reactive control mode also elicits larger N2 amplitudes. In contrast, when task demands

  6. Development of Innovative and Inexpensive Optical Sensors in Wireless Ad-hoc Sensor Networks for Environmental Monitoring

    NASA Astrophysics Data System (ADS)

    Mollenhauer, Hannes; Schima, Robert; Assing, Martin; Mollenhauer, Olaf; Dietrich, Peter; Bumberger, Jan

    2015-04-01

    Due to the heterogeneity and dynamic of ecosystems, the observation and monitoring of natural processes necessitate a high temporal and spatial resolution. This also requires inexpensive and adaptive measurements as well as innovative monitoring strategies. To this end, the application of ad-hoc wireless sensor networks holds the potential of creating an adequate monitoring platform. In order to achieve a comprehensive monitoring in space and time with affordability, it is necessary to reduce the sensor costs. Common investigation methods, especially with regard to vegetation processes, are based on optical measurements. In particular, different wavelengths correspond to specific properties of the plants and preserve the possibility to derive information about the ecosystem, e.g. photosynthetic performance or nutrient content. In this context, photosynthetically active radiation (PAR) sensors and hyperspectral sensors are in major use. This work aims the development, evaluation and application of inexpensive but high performance optical sensors for the implementation in wireless sensor networks. Photosynthetically active radiation designates the spectral range from 400 to 700 nanometers that photosynthetic organisms are able to use in the process of photosynthesis. PAR sensors enable the detection of the reflected solar light of the vegetation in the whole PAR wave band. The amount of absorption indicates photosynthetic activity of the plant, with good approximation. Hyperspectral sensors observe specific parts or rather distinct wavelengths of the solar light spectrum and facilitate the determination of the main pigment classes, e.g. Chlorophyll, Carotenoid and Anthocyanin. Due to the specific absorption of certain pigments, a characteristic spectral signature can be seen in the visible part of the electromagnetic spectrum, known as narrow-band peaks. In an analogous manner, also the presence and concentration of different nutrients cause a characteristic spectral

  7. Evaluation of absorbent materials for use as ad hoc dry decontaminants during mass casualty incidents as part of the UK’s Initial Operational Response (IOR)

    PubMed Central

    Kassouf, Nick; Syed, Sara; Larner, Joanne; Amlôt, Richard

    2017-01-01

    The UK’s Initial Operational Response (IOR) is a revised process for the medical management of mass casualties potentially contaminated with hazardous materials. A critical element of the IOR is the introduction of immediate, on-scene disrobing and decontamination of casualties to limit the adverse health effects of exposure. Ad hoc cleansing of the skin with dry absorbent materials has previously been identified as a potential means of facilitating emergency decontamination. The purpose of this study was to evaluate the in vitro oil and water absorbency of a range of materials commonly found in the domestic and clinical environments and to determine the effectiveness of a small, but representative selection of such materials in skin decontamination, using an established ex vivo model. Five contaminants were used in the study: methyl salicylate, parathion, diethyl malonate, phorate and potassium cyanide. In vitro measurements of water and oil absorbency did not correlate with ex vivo measurements of skin decontamination. When measured ex vivo, dry decontamination was consistently more effective than a standard wet decontamination method (“rinse-wipe-rinse”) for removing liquid contaminants. However, dry decontamination was ineffective against particulate contamination. Collectively, these data confirm that absorbent materials such as wound dressings and tissue paper provide an effective, generic capability for emergency removal of liquid contaminants from the skin surface, but that wet decontamination should be used for non-liquid contaminants. PMID:28152053

  8. Evaluation of absorbent materials for use as ad hoc dry decontaminants during mass casualty incidents as part of the UK's Initial Operational Response (IOR).

    PubMed

    Kassouf, Nick; Syed, Sara; Larner, Joanne; Amlôt, Richard; Chilcott, Robert P

    2017-01-01

    The UK's Initial Operational Response (IOR) is a revised process for the medical management of mass casualties potentially contaminated with hazardous materials. A critical element of the IOR is the introduction of immediate, on-scene disrobing and decontamination of casualties to limit the adverse health effects of exposure. Ad hoc cleansing of the skin with dry absorbent materials has previously been identified as a potential means of facilitating emergency decontamination. The purpose of this study was to evaluate the in vitro oil and water absorbency of a range of materials commonly found in the domestic and clinical environments and to determine the effectiveness of a small, but representative selection of such materials in skin decontamination, using an established ex vivo model. Five contaminants were used in the study: methyl salicylate, parathion, diethyl malonate, phorate and potassium cyanide. In vitro measurements of water and oil absorbency did not correlate with ex vivo measurements of skin decontamination. When measured ex vivo, dry decontamination was consistently more effective than a standard wet decontamination method ("rinse-wipe-rinse") for removing liquid contaminants. However, dry decontamination was ineffective against particulate contamination. Collectively, these data confirm that absorbent materials such as wound dressings and tissue paper provide an effective, generic capability for emergency removal of liquid contaminants from the skin surface, but that wet decontamination should be used for non-liquid contaminants.

  9. Analysis of location-aware QoS-routing protocols based on partial temporal and spatial topology for real-time multimedia in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2004-08-01

    In the distributed operations of route discovery and maintenance, strong interaction occurs across mobile ad hoc network (MANET) protocol layers in the transport of service packets between source and destination nodes. Quality of service (QoS) requirements are specified for multimedia service classes by the application layer. Due to node mobility, knowledge of their locations is inherently incomplete. Network topology is thus only partially known in time and in space. Cross-layer interactions in the protocol are modeled in terms of a set of concatenated design parameters, updates on node positions and associated energy costs. Functional dependencies of the QoS metrics on the concatenated parameters are described. An analytical framework is established for development of new cross-layer designs that optimize layer interdependencies to achieve the "best" QoS available in the MANET given a partially known, time-varying topology. The designs, based on a reactive MANET protocol, adapt provisioned QoS to dynamic network conditions and residual energy capacities. Cross-layer optimization, given partially known topology, is based on stochastic dynamic programming and predictive estimation conditions derived from time-dependent models of MANET behavior. Models of real-time behavior are based on the control of conditional rates of multivariate point processes (MVPPs). These rates depend on the concatenated protocol and resource parameters. The analytical framework supports predictive models to estimate node mobility in addition to measurement-based estimates of probability distributions for voice, video, data, and other Internet traffic. Estimates of QoS metrics are given in terms of recursive stochastic filters of the network state, based on complete or partial observations of topology and events.

  10. Ad Hoc Networking for Unmanned Ground Vehicles: Design and Evaluation at Command, Control, Communications, Intelligence, Surveillance and Reconnaissance On-the-Move

    DTIC Science & Technology

    2006-11-01

    software components used in the ad hoc nodes for the C4ISR OTM experiment were OLSRD, an open-source proactive MANET routing software, and OpenVPN , an...developed by Mike Baker (openwrt.org). 6OpenVPN is a trademark of OpenVPN Solutions LLC. 6 Secure communications in the MANET are achieved with...encryption provided by Wired Equivalent Privacy (WEP) and OpenVPN . The WEP protocol, which is part of the IEEE 802.11 wireless networking standard

  11. Adding immigrants to microsimulation models.

    PubMed

    Duleep, Harriet Orcutt; Dowhan, Daniel J

    2008-01-01

    Forecasts of the financial status of Social Security's Old-Age, Survivors, and Disability Insurance (OASDI) programs and forecasts of the effects of various OASDI policy options on Americans would be improved if information about the earnings and labor force behavior of various population subgroups were included in projection models. Focusing on the projection of immigrant earnings, this article proffers a conceptual basis for incorporating immigration into microsimulation models. Key results from research on immigrant earnings, as described in the first article in this trilogy--"Research on Immigrant Earnings"--are linked to methods for forecasting individual earnings in microsimulation models. The research on immigrant earnings also inspires new methods for forecasting earnings in microsimulation models as well as the projection of immigrant emigration. Forecasting immigrant earnings and emigration is discussed in the context of a "closed system"--that is, forecasts are only made for a given population, which is represented in the base sample of the microsimulation model. The third article in our trilogy--"Incorporating Immigrant Flows into Microsimulation Models"--explores how to project immigrant earnings in the context of an "open system," which includes future immigrants.

  12. 78 FR 1196 - Codex Alimentarius Commission: Meeting of the Ad Hoc Codex Intergovernmental Task Force on Animal...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-08

    ...; ] DEPARTMENT OF AGRICULTURE Food Safety and Inspection Service Codex Alimentarius Commission: Meeting of the Ad... agenda items and draft United States (U.S.) positions that will be discussed at the 7th Session of the...

  13. Revisiting the thermodynamic relations in AdS /CMT models

    NASA Astrophysics Data System (ADS)

    Hyun, Seungjoon; Park, Sang-A.; Yi, Sang-Heon

    2017-03-01

    Motivated by the recent unified approach to the Smarr-like relation of anti-de Sitter (AdS) planar black holes in conjunction with the quasilocal formalism on conserved charges, we revisit the quantum statistical and thermodynamic relations of hairy AdS planar black holes. By extending the previous results, we identify the hairy contribution in the bulk and show that the holographic computation can be improved so that it is consistent with the bulk computation. We argue that the first law can be retained in its universal form and that the relation between the on-shell renormalized Euclidean action and its free energy interpretation in gravity may also be undeformed even with the hairy contribution in hairy AdS black holes.

  14. An ultra-wide bandwidth-based range/GPS tight integration approach for relative positioning in vehicular ad hoc networks

    NASA Astrophysics Data System (ADS)

    Shen, Feng; Wayn Cheong, Joon; Dempster, Andrew G.

    2015-04-01

    Relative position awareness is a vital premise for the implementation of emerging intelligent transportation systems, such as collision warning. However, commercial global navigation satellite systems (GNSS) receivers do not satisfy the requirements of these applications. Fortunately, cooperative positioning (CP) techniques, through sharing the GNSS measurements between vehicles, can improve the performance of relative positioning in a vehicular ad hoc network (VANET). In this paper, while assuming there are no obstacles between vehicles, a new enhanced tightly coupled CP technique is presented by adding ultra-wide bandwidth (UWB)-based inter-vehicular range measurements. In the proposed CP method, each vehicle fuses the GPS measurements and the inter-vehicular range measurements. Based on analytical and experimental results, in the full GPS coverage environment, the new tight integration CP method outperforms the INS-aided tight CP method, tight CP method, and DGPS by 11%, 15%, and 24%, respectively; in the GPS outage scenario, the performance improvement achieves 60%, 65%, and 73%, respectively.

  15. Performance Analysis of Hierarchical Group Key Management Integrated with Adaptive Intrusion Detection in Mobile ad hoc Networks

    DTIC Science & Technology

    2016-04-05

    key management Region-voting-based IDS Host-based IDS Stochastic Petri net Performance analysis a b s t r a c t We develop a mathematical model to...performance metric. We analyze the tradeoff of security versus performance properties of a GCS system by means of a mathematical model and identify optimal...attack/failure. Lastly, we develop a mathematical model based on stochastic Petri nets (SPN) [5] to quantitatively identify optimal settings in terms

  16. Ad Hoc Influenza Vaccination During Years of Significant Antigenic Drift in a Tropical City With 2 Seasonal Peaks: A Cross-Sectional Survey Among Health Care Practitioners.

    PubMed

    Wong, Martin C S; Nelson, E Anthony S; Leung, Czarina; Lee, Nelson; Chan, Martin C W; Choi, Kin Wing; Rainer, Timothy H; Cheng, Frankie W T; Wong, Samuel Y S; Lai, Christopher K C; Lam, Bosco; Cheung, Tak Hong; Leung, Ting Fan; Chan, Paul K S

    2016-05-01

    We evaluated the acceptability of an additional ad hoc influenza vaccination among the health care professionals following seasons with significant antigenic drift.Self-administered, anonymous surveys were performed by hard copy questionnaires in public hospitals, and by an on-line platform available to all healthcare professionals, from April 1st to May 31st, 2015. A total of 1290 healthcare professionals completed the questionnaires, including doctors, nurses, and allied health professionals working in both the public and private systems.Only 31.8% of participating respondents expressed an intention to receive the additional vaccine, despite that the majority of them agreed or strongly agreed that it would bring benefit to the community (88.9%), save lives (86.7%), reduce medical expenses (76.3%), satisfy public expectation (82.8%), and increase awareness of vaccination (86.1%). However, a significant proportion expressed concern that the vaccine could disturb the normal immunization schedule (45.5%); felt uncertain what to do in the next vaccination round (66.0%); perceived that the summer peak might not occur (48.2%); and believed that the summer peak might not be of the same virus (83.5%). Furthermore, 27.8% of all respondents expected that the additional vaccination could weaken the efficacy of previous vaccinations; 51.3% was concerned about side effects; and 61.3% estimated that there would be a low uptake rate. If the supply of vaccine was limited, higher priority groups were considered to include the elderly aged ≥65 years with chronic medical conditions (89.2%), the elderly living in residential care homes (87.4%), and long-stay residents of institutions for the disabled (80.7%). The strongest factors associated with accepting the additional vaccine included immunization with influenza vaccines in the past 3 years, higher perceived risk of contracting influenza, and higher perceived severity of the disease impact.The acceptability to an additional ad

  17. Inclusive practices for children and youths with communication disorders. Ad Hoc Committee on Inclusion for students with Communication Disorders.

    PubMed

    1996-01-01

    An array of inclusive service delivery models is recommended for the implementation of services to children and youths with communication disorders. Inclusive practices are intervention services that are based on the unique and specific needs of the individual, and provided in a context that is least restrictive. There are a variety of models through which inclusive practices can be provided, including a direct (pull-out) program, in classroom-based service delivery, community-based models, and consultative interventions. These models should be seen as flexible options that may change depending on student needs. The speech-language pathologist, in collaboration with parents, the student, teachers, support personnel, and administrators, is in the ideal position to decide the model or combination of models that best serves each individual student's communication needs. Implementation of inclusive practices requires consideration of multiple issues, including general education reform, cost effectiveness, and program efficacy. In addition, administrative and school system support, personnel qualifications, staff development, flexible scheduling, and the effects of inclusive practices on all learners need to be considered. At present, available research suggests guarded optimism for the effectiveness of inclusive practices. However, many critical questions have not yet been addressed and additional research is needed to assess the full impact of inclusive practices for students with communication disorders.

  18. AdS5×S(5) mirror model as a string sigma model.

    PubMed

    Arutyunov, Gleb; van Tongeren, Stijn J

    2014-12-31

    Doing a double Wick rotation in the world sheet theory of the light cone AdS5×S(5) superstring results in an inequivalent, so-called mirror theory that plays a central role in the field of integrability in the AdS-CFT correspondence. We show that this mirror theory can be interpreted as the light cone theory of a free string on a different background. This background is related to dS5×H(5) by a double T-duality, and has hidden supersymmetry. The geometry can also be extracted from an integrable deformation of the AdS5×S(5) sigma model, and we prove the observed mirror duality of these deformed models at the bosonic level as a byproduct. While we focus on AdS5×S(5), our results apply more generally.

  19. Revision of the venous clinical severity score: venous outcomes consensus statement: special communication of the American Venous Forum Ad Hoc Outcomes Working Group.

    PubMed

    Vasquez, Michael A; Rabe, Eberhard; McLafferty, Robert B; Shortell, Cynthia K; Marston, William A; Gillespie, David; Meissner, Mark H; Rutherford, Robert B

    2010-11-01

    In response to the need for a disease severity measurement, the American Venous Forum committee on outcomes assessment developed the Venous Severity Scoring system in 2000. There are three components of this scoring system, the Venous Disability Score, the Venous Segmental Disease Score, and the Venous Clinical Severity Score (VCSS). The VCSS was developed from elements of the CEAP classification (clinical grade, etiology, anatomy, pathophysiology), which is the worldwide standard for describing the clinical features of chronic venous disease. However, as a descriptive instrument, the CEAP classification responds poorly to change. The VCSS was subsequently developed as an evaluative instrument that would be responsive to changes in disease severity over time and in response to treatment. Based on initial experiences with the VCSS, an international ad hoc working group of the American Venous Forum was charged with updating the instrument. This revision of the VCSS is focused on clarifying ambiguities, updating terminology, and simplifying application. The specific language of proven quality-of-life instruments was used to better address the issues of patients at the lower end of the venous disease spectrum. Periodic review and revision are necessary for generating more universal applicability and for comparing treatment outcomes in a meaningful way.

  20. Estimating HIV Incidence during Pregnancy and Knowledge of Prevention of Mother-to-Child Transmission with an Ad Hoc Analysis of Potential Cofactors

    PubMed Central

    Egbe, Thomas Obinchemti; Tazinya, Rose-Mary Asong; Halle-Ekane, Gregory Edie; Egbe, Eta-Nkongho; Achidi, Eric Akum

    2016-01-01

    Background. We determined the incidence of HIV seroconversion during the second and third trimesters of pregnancy and ad hoc potential cofactors associated with HIV seroconversion after having an HIV-negative result antenatally. We also studied knowledge of PMTCT among pregnant women in seven health facilities in Fako Division, South West Region, Cameroon. Method. During the period between September 12 and December 4, 2011, we recruited a cohort of 477 HIV-negative pregnant women by cluster sampling. Data collection was with a pretested interviewer-administered questionnaire. Sociodemographic information, knowledge of PMTCT, and methods of HIV prevention were obtained from the study population and we did Voluntary Counselling and Testing (VCT) for HIV. Results. The incidence rate of HIV seroconversion during pregnancy was 6.8/100 woman-years. Ninety percent of the participants did not use condoms throughout pregnancy but had a good knowledge of PMTCT of HIV. Only 31.9% of participants knew their HIV status before the booking visit and 33% did not know the HIV status of their partners. Conclusion. The incidence rate of HIV seroconversion in the Fako Division, Cameroon, was 6.8/100 woman-years. No risk factors associated with HIV seroconversion were identified among the study participants because of lack of power to do so. PMID:27127653

  1. [Multimodal pain therapy for treatment of chronic pain syndrome. Consensus paper of the ad hoc commission on multimodal interdisciplinary pain management of the German Pain Society on treatment contents].

    PubMed

    Arnold, B; Brinkschmidt, T; Casser, H-R; Diezemann, A; Gralow, I; Irnich, D; Kaiser, U; Klasen, B; Klimczyk, K; Lutz, J; Nagel, B; Pfingsten, M; Sabatowski, R; Schesser, R; Schiltenwolf, M; Seeger, D; Söllner, W

    2014-10-01

    Multimodal pain management is a comprehensive treatment of complex chronic pain syndromes. In addition to medical therapy various other specialized therapeutic interventions based on the biopsychosocial model of pain origin and chronic pain development, are added. During the last few years treatment centers for chronic pain have been established throughout Germany. Multimodal pain management has been included in the official catalogue of the recognized medical procedures for day clinic units as well as for inpatient pain management. In daily practice there is, however, still a lack of clarity and of consistency about the components that multimodal pain management should contain. This is the reason for the ad hoc commission on multimodal interdisciplinary pain management of the German Pain Society to propose the following position paper that has been worked out in a multilevel and interdisciplinary consensus process. The paper describes the mandatory treatment measures in the four core disciplines of multimodal pain management, pain medicine, psychotherapy, exercise therapy including physiotherapy and assistant medical professions including nurses.

  2. Intelligent algorithms for persistent and pervasive sensing in systems comprised of wireless ad hoc networks of ground-based sensors and mobile infrastructures

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2007-04-01

    With the development of low-cost, durable unmanned aerial vehicles (UAVs), it is now practical to perform persistent sensing and target tracking autonomously over broad surveillance areas. These vehicles can sense the environment directly through onboard active sensors, or indirectly when aimed toward ground targets in a mission environment by ground-based passive sensors operating wirelessly as an ad hoc network in the environment. The combination of the swarm intelligence of the airborne infrastructure comprised of UAVs with the ant-like collaborative behavior of the unattended ground sensors creates a system capable of both persistent and pervasive sensing of mission environment, such that, the continuous collection, analysis and tracking of targets from sensor data received from the ground can be achieved. Mobile software agents are used to implement intelligent algorithms for the communications, formation control and sensor data processing in this composite configuration. The enabling mobile agents are organized in a hierarchy for the three stages of processing in the distributed system: target detection, location and recognition from the collaborative data processing among active ground-sensor nodes; transfer of the target information processed on the ground to the UAV swarm overhead; and formation control and sensor activation of the UAV swarm for sustained ground-target surveillance and tracking. Intelligent algorithms are presented that can adapt to the operation of the composite system to target dynamics and system resources. Established routines, appropriate to the processing needs of each stage, are selected as preferred based on their published use in similar scenarios, ability to be distributively implemented over the set of processors at system nodes, and ability to conserve the limited resources at the ground nodes to extend the lifetime of the pervasive network. In this paper, the performance of this distributed, collaborative system concept for

  3. Enhancing the Effectiveness of Ad Hoc Units: A Revised Training Model

    DTIC Science & Technology

    2009-06-01

    1965, when Bruce Tuckman developed a unitary sequence to describe group dynamics, that the field really developed. The sequence which Tuckman ...described is the same for every group, consisting of forming, storming, norming, and performing.40 Tuckman postulates that as the team develops maturity...producing a successor leader so that the previous leader can move on to develop a new team. Tuckman and Mary Ann Jensen further amended the

  4. A Black Hole Attack Model for Reactive Ad-Hoc Protocols

    DTIC Science & Technology

    2012-03-01

    Technology Conference. IEEE, 2003. pp. 2286-2290. [BhS09] N. Bhalaji, and A. Shanmugam. "Association Between Nodes to Combat Blackhole Attack in DSR...2012. 102 [PSA09] A. Prathapani, L. Santhanam, and P. Agrawal. "Intelligent Honeypot Agent for Blackhole Attack Detection in Wireless Mesh

  5. Building a Simulation Toolkit for Wireless Mesh Clusters and Evaluating the Suitability of Different Families of Ad Hoc Protocols for the Tactical Network Topology

    DTIC Science & Technology

    2005-03-01

    we are going to highlight some of the most important studies and analyze their conclusions. Broch et al (1998) used the ns-2 simulator to compare...delay and routing load. The authors concluded that their results are very similar with the work of Broch et al (1998). Johansson et al (1999) focused...Hoc Networking, ed. S. Basagni, M. Conti, S. Giordano and I. Stojmenovic, 373-409, John Wiley & Sons, Inc. Broch , J., D.A. Maltz, D.B. Johnson, Y.-C

  6. [Guide values for 1-butanol in indoor air. Report of the German Ad Hoc Working Group on Indoor Guidelines of the Indoor Air Hygiene Committee and of the States' Supreme Health Authorities].

    PubMed

    2014-06-01

    The German Ad Hoc Working Group on Indoor Guidelines of the Indoor Air Hygiene Committee and the States' Supreme Health Authorities is issuing indoor air guide values to protect public health. No human studies of sufficient quality are available for the evaluation of 1-butanol in indoor air. In a well-documented oral study on reproduction toxicity in rats, assessed as reliable, impairment of embryo development was observed. Benchmark modeling of the study data by US-EPA revealed a BMDL10 of 26.1 mg/kg b.w. per day. The working group used this BMDL10 as the point of departure for the derivation of the guide value II. Considering a human respiration rate of 20 m(3) per day and a human body weight of 70 kg, this dose was converted into an inhalative concentration. Applying a factor of 0.6 to account for the inhalative absorption rate, an allometric extrapolation factor from rat to human (factor 4), an interspecies factor of 2.5 for toxicodynamics, and a factor of 10 to account for individual differences (intraspecies factor), results in a health hazard guide value (RW II) of 2 mg 1-butanol/m(3). The benchmark dose calculation of the same study generated a BMDL05 of 12.4 mg/kg b.w. per day. Applying the same assessment factors as for RW II, a precautionary guide value (RW I) of 0.7 mg 1-butanol/m(3) indoor air is calculated.

  7. Massive quiver matrix models for massive charged particles in AdS

    SciTech Connect

    Asplund, Curtis T.; Denef, Frederik; Dzienkowski, Eric

    2016-01-11

    Here, we present a new class of N = 4 supersymmetric quiver matrix models and argue that it describes the stringy low-energy dynamics of internally wrapped D-branes in four-dimensional anti-de Sitter (AdS) flux compactifications. The Lagrangians of these models differ from previously studied quiver matrix models by the presence of mass terms, associated with the AdS gravitational potential, as well as additional terms dictated by supersymmetry. These give rise to dynamical phenomena typically associated with the presence of fluxes, such as fuzzy membranes, internal cyclotron motion and the appearance of confining strings. We also show how these models can be obtained by dimensional reduction of four-dimensional supersymmetric quiver gauge theories on a three-sphere.

  8. Massive quiver matrix models for massive charged particles in AdS

    DOE PAGES

    Asplund, Curtis T.; Denef, Frederik; Dzienkowski, Eric

    2016-01-11

    Here, we present a new class of N = 4 supersymmetric quiver matrix models and argue that it describes the stringy low-energy dynamics of internally wrapped D-branes in four-dimensional anti-de Sitter (AdS) flux compactifications. The Lagrangians of these models differ from previously studied quiver matrix models by the presence of mass terms, associated with the AdS gravitational potential, as well as additional terms dictated by supersymmetry. These give rise to dynamical phenomena typically associated with the presence of fluxes, such as fuzzy membranes, internal cyclotron motion and the appearance of confining strings. We also show how these models can bemore » obtained by dimensional reduction of four-dimensional supersymmetric quiver gauge theories on a three-sphere.« less

  9. Monitoring of slope-instabilities and deformations with Micro-Electro-Mechanical-Systems (MEMS) in wireless ad-hoc Sensor Networks

    NASA Astrophysics Data System (ADS)

    Arnhardt, C.; Fernández-Steeger, T. M.; Azzam, R.

    2009-04-01

    In most mountainous regions, landslides represent a major threat to human life, properties and infrastructures. Nowadays existing landslide monitoring systems are often characterized by high efforts in terms of purchase, installation, maintenance, manpower and material. In addition (or because of this) only small areas or selective points of the endangered zone can be observed by the system. Therefore the improvement of existing and the development of new monitoring and warning systems are of high relevance. The joint project "Sensor based Landslide Early Warning Systems" (SLEWS) deals with the development of a prototypic Alarm- and Early Warning system (EWS) for different types of landslides using low-cost micro-sensors (MEMS) integrated in a wireless sensor network (WSN). Modern so called Ad-Hoc, Multi-Hop wireless sensor networks (WSN) are characterized by a self organizing and self-healing capacity of the system (autonomous systems). The network consists of numerous individual and own energy-supply operating sensor nodes, that can send data packages from their measuring devices (here: MEMS) over other nodes (Multi-Hop) to a collection point (gateway). The gateway provides the interface to central processing and data retrieval units (PC, Laptop or server) outside the network. In order to detect and monitor the different landslide processes (like fall, topple, spreading or sliding) 3D MEMS capacitive sensors made from single silicon crystals and glass were chosen to measure acceleration, tilting and altitude changes. Based on the so called MEMS (Micro-Electro-Mechanical Systems) technology, the sensors combine very small mechanical and electronic units, sensing elements and transducers on a small microchip. The mass production of such type of sensors allows low cost applications in different areas (like automobile industries, medicine, and automation technology). Apart from the small and so space saving size and the low costs another advantage is the energy

  10. AdS black disk model for small-x DIS

    NASA Astrophysics Data System (ADS)

    Cornalba, Lorenzo; Costa, Miguel S.; Penedones, João

    2011-05-01

    Using the approximate conformal invariance of QCD at high energies we consider a simple AdS black disk model to describe saturation in DIS. Deep inside saturation the structure functions have the same power law scaling, FT˜FL˜x-ω, where ω is related to the expansion rate of the black disk with energy. Furthermore, the ratio FL/FT is given by the universal value 1+ω/3+ω, independently of the target.

  11. Measuring Teacher Quality with Value-Added Modeling

    ERIC Educational Resources Information Center

    Marder, Michael

    2012-01-01

    Using computers to evaluate teachers based on student test scores is more difficult than it seems. Value-added modeling is a genuinely serious attempt to grapple with the difficulties. Value-added modeling carries the promise of measuring teacher quality automatically and objectively, and improving school systems at minimal cost. The essence of…

  12. Using School Lotteries to Evaluate the Value-Added Model

    ERIC Educational Resources Information Center

    Deutsch, Jonah

    2013-01-01

    There has been an active debate in the literature over the validity of value-added models. In this study, the author tests the central assumption of value-added models that school assignment is random relative to expected test scores conditional on prior test scores, demographic variables, and other controls. He uses a Chicago charter school's…

  13. An Evidence-Based Unified Definition of Lifelong and Acquired Premature Ejaculation: Report of the Second International Society for Sexual Medicine Ad Hoc Committee for the Definition of Premature Ejaculation

    PubMed Central

    Serefoglu, Ege Can; McMahon, Chris G; Waldinger, Marcel D; Althof, Stanley E; Shindel, Alan; Adaikan, Ganesh; Becher, Edgardo F; Dean, John; Giuliano, Francois; Hellstrom, Wayne JG; Giraldi, Annamaria; Glina, Sidney; Incrocci, Luca; Jannini, Emmanuele; McCabe, Marita; Parish, Sharon; Rowland, David; Segraves, R Taylor; Sharlip, Ira; Torres, Luiz Otavio

    2014-01-01

    Introduction The International Society for Sexual Medicine (ISSM) Ad Hoc Committee for the Definition of Premature Ejaculation developed the first evidence-based definition for lifelong premature ejaculation (PE) in 2007 and concluded that there were insufficient published objective data at that time to develop a definition for acquired PE. Aim The aim of this article is to review and critique the current literature and develop a contemporary, evidence-based definition for acquired PE and/or a unified definition for both lifelong and acquired PE. Methods In April 2013, the ISSM convened a second Ad Hoc Committee for the Definition of Premature Ejaculation in Bangalore, India. The same evidence-based systematic approach to literature search, retrieval, and evaluation used by the original committee was adopted. Results The committee unanimously agreed that men with lifelong and acquired PE appear to share the dimensions of short ejaculatory latency, reduced or absent perceived ejaculatory control, and the presence of negative personal consequences. Men with acquired PE are older, have higher incidences of erectile dysfunction, comorbid disease, and cardiovascular risk factors, and have a longer intravaginal ejaculation latency time (IELT) as compared with men with lifelong PE. A self-estimated or stopwatch IELT of 3 minutes was identified as a valid IELT cut-off for diagnosing acquired PE. On this basis, the committee agreed on a unified definition of both acquired and lifelong PE as a male sexual dysfunction characterized by (i) ejaculation that always or nearly always occurs prior to or within about 1 minute of vaginal penetration from the first sexual experience (lifelong PE) or a clinically significant and bothersome reduction in latency time, often to about 3 minutes or less (acquired PE); (ii) the inability to delay ejaculation on all or nearly all vaginal penetrations; and (iii) negative personal consequences, such as distress, bother, frustration, and/or the

  14. Value-Added Models for the Pittsburgh Public Schools

    ERIC Educational Resources Information Center

    Johnson, Matthew; Lipscomb, Stephen; Gill, Brian; Booker, Kevin; Bruch, Julie

    2012-01-01

    At the request of Pittsburgh Public Schools (PPS) and the Pittsburgh Federation of Teachers (PFT), Mathematica has developed value-added models (VAMs) that aim to estimate the contributions of individual teachers, teams of teachers, and schools to the achievement growth of their students. The authors' work in estimating value-added in Pittsburgh…

  15. Expression profiles for macrophage alternative activation genes in AD and in mouse models of AD

    PubMed Central

    Colton, Carol A; Mott, Ryan T; Sharpe, Hayley; Xu, Qing; Van Nostrand, William E; Vitek, Michael P

    2006-01-01

    Background Microglia are associated with neuritic plaques in Alzheimer disease (AD) and serve as a primary component of the innate immune response in the brain. Neuritic plaques are fibrous deposits composed of the amyloid beta-peptide fragments (Abeta) of the amyloid precursor protein (APP). Numerous studies have shown that the immune cells in the vicinity of amyloid deposits in AD express mRNA and proteins for pro-inflammatory cytokines, leading to the hypothesis that microglia demonstrate classical (Th-1) immune activation in AD. Nonetheless, the complex role of microglial activation has yet to be fully explored since recent studies show that peripheral macrophages enter an "alternative" activation state. Methods To study alternative activation of microglia, we used quantitative RT-PCR to identify genes associated with alternative activation in microglia, including arginase I (AGI), mannose receptor (MRC1), found in inflammatory zone 1 (FIZZ1), and chitinase 3-like 3 (YM1). Results Our findings confirmed that treatment of microglia with anti-inflammatory cytokines such as IL-4 and IL-13 induces a gene profile typical of alternative activation similar to that previously observed in peripheral macrophages. We then used this gene expression profile to examine two mouse models of AD, the APPsw (Tg-2576) and Tg-SwDI, models for amyloid deposition and for cerebral amyloid angiopathy (CAA) respectively. AGI, MRC1 and YM1 mRNA levels were significantly increased in the Tg-2576 mouse brains compared to age-matched controls while TNFα and NOS2 mRNA levels, genes commonly associated with classical activation, increased or did not change, respectively. Only TNFα mRNA increased in the Tg-SwDI mouse brain. Alternative activation genes were also identified in brain samples from individuals with AD and were compared to age-matched control individuals. In AD brain, mRNAs for TNFα, AGI, MRC1 and the chitinase-3 like 1 and 2 genes (CHI3L1; CHI3L2) were significantly increased

  16. Teacher Effects, Value-Added Models, and Accountability

    ERIC Educational Resources Information Center

    Konstantopoulos, Spyros

    2014-01-01

    Background: In the last decade, the effects of teachers on student performance (typically manifested as state-wide standardized tests) have been re-examined using statistical models that are known as value-added models. These statistical models aim to compute the unique contribution of the teachers in promoting student achievement gains from grade…

  17. Matrix model maps and reconstruction of AdS supergravity interactions

    SciTech Connect

    Cremonini, Sera; Mello Koch, Robert de; Jevicki, Antal

    2008-05-15

    We consider the question of reconstructing (cubic) SUGRA interactions in AdS/CFT. The method we introduce is based on the matrix model maps (MMP) which were previously successfully employed at the linearized level. The strategy is to start with the map for 1/2 BPS configurations, which is exactly known (to all orders) in the Hamiltonian framework. We then use the extension of the matrix model map with the corresponding Ward identities to completely specify the interaction. A central point in this construction is the nonvanishing of off-shell interactions (even for highest-weight states)

  18. Matrix model maps in AdS/CFT correspondence

    SciTech Connect

    Donos, Aristomenis; Jevicki, Antal; Rodrigues, Joao P.

    2005-12-15

    We discuss an extension of a map between BPS states and free fermions. The extension involves states associated with a full two matrix problem which are constructed using a sequence of integral equations. A two parameter set of matrix model eigenstates is then related to states in SUGRA. Their wave functions are characterized by nontrivial dependence on the radial coordinate of AdS and of the Sphere, respectively. A kernel defining a one to one map between these states is then constructed.

  19. Report of the ad-hoc consultation on aging and immunization for a future WHO research agenda on life-course immunization.

    PubMed

    Thomas-Crusells, Judith; McElhaney, Janet E; Aguado, M Teresa

    2012-09-14

    WHO convened a meeting of around 30 experts to address the topic of aging and immunization in March 2011 in Geneva. The purpose of the meeting was to develop a global research agenda to eventually inform WHO policy recommendations regarding immunization beyond childhood and into old age. This issue is becoming more critical, since the population aged 60 and above will reach two billion people - three-quarters of whom will be in developing countries - in the next 40 years. The meeting reviewed current knowledge and gaps in information about: (1) the epidemiology of infectious diseases in the elderly in developed and developing countries and their contribution to disability in old age; (2) the deterioration of the immune system with age ("immune senescence") and possible ways to measure and counteract it; and (3) immunization approaches to maintain or improve health in older persons. These approaches include the concept of a "life-course vaccination" schedule to help sustain immunity to vaccine-preventable diseases beyond childhood and into old age; strategies to strengthen older persons' responses to vaccines (e.g., by adding adjuvants to vaccines, increasing vaccine dosage, and intradermal vaccine administration); and the possible development of new vaccines targeted specifically for older adults. Participants proposed priority research topics as well as strategies to facilitate and coordinate the research, including the establishment of networks of collaborators, with WHO playing a key coordinating role.

  20. Hearings before the Ad Hoc Committee on Maritime Education and Training of the Committee on Merchant Marine and Fisheries, Ninety-Third Congress; Second Session on Officer Requirements, and Session on Maritime Education Regarding Safety at Sea. Serial No. 93-44.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. House Committee on Merchant Marine and Fisheries.

    The publication consists of Congressional hearings before the Ad Hoc Committee on Maritime Education and Training: (1) June 26, 1974 hearing pertaining to officer requirements and (2) November 19, 1974 hearing on maritime education regarding safety at sea. Estimated cost per graduate for the U. S. Merchant Marine 1973 class was $31,100. Supply and…

  1. Soil Parameter Mapping and Ad Hoc Power Analysis to Increase Blocking Efficiency Prior to Establishing a Long-Term Field Experiment.

    PubMed

    Collins, Doug; Benedict, Chris; Bary, Andy; Cogger, Craig

    2015-01-01

    The spatial heterogeneity of soil and weed populations poses a challenge to researchers. Unlike aboveground variability, below-ground variability is more difficult to discern without a strategic soil sampling pattern. While blocking is commonly used to control environmental variation, this strategy is rarely informed by data about current soil conditions. Fifty georeferenced sites were located in a 0.65 ha area prior to establishing a long-term field experiment. Soil organic matter (OM) and weed seed bank populations were analyzed at each site and the spatial structure was modeled with semivariograms and interpolated with kriging to map the surface. These maps were used to formulate three strategic blocking patterns and the efficiency of each pattern was compared to a completely randomized design and a west to east model not informed by soil variability. Compared to OM, weeds were more variable across the landscape and had a shorter range of autocorrelation, and models to increase blocking efficiency resulted in less increase in power. Weeds and OM were not correlated, so no model examined improved power equally for both parameters. Compared to the west to east blocking pattern, the final blocking pattern chosen resulted in a 7-fold increase in power for OM and a 36% increase in power for weeds.

  2. Criteria for the diagnosis of heat-related deaths: National Association of Medical Examiners. Position paper. National Association of Medical Examiners Ad Hoc Committee on the Definition of Heat-Related Fatalities.

    PubMed

    Donoghue, E R; Graham, M A; Jentzen, J M; Lifschultz, B D; Luke, J L; Mirchandani, H G

    1997-03-01

    The National Association of Medical Examiners Ad Hoc Committee on the Definition of Heat-Related Fatalities recommends the following definition of "heat-related death": a death in which exposure to high ambient temperature either caused the death or significantly contributed to it. The committee also recommends that the diagnosis of heat-related death be based on a history of exposure to high ambient temperature and the reasonable exclusion of other causes of hyperthermia. The diagnosis may be established from the circumstances surrounding the death, investigative reports concerning environmental temperature, and/or measured antemortem body temperature at the time of collapse. In cases where the measured antemortem body temperature at the time of collapse was > or = 105 degrees F (> or = 40.6 degrees C), the cause of death should be certified as heat stroke or hyperthermia. Deaths may also be certified as heat stroke or hyperthermia with lower body temperatures when cooling has been attempted prior to arrival at the hospital and/or when there is a clinical history of mental status changes and elevated liver and muscle enzymes. In cases where the antemortem body temperature cannot be established but the environmental temperature at the time of collapse was high, an appropriate heat-related diagnosis should be listed as the cause of death or as a significant contributing condition.

  3. [Health evaluation of trichloroethylene in indoor air : communication from the German ad-hoc working group on indoor guidelines of the Indoor Air Hygiene Committee and of the states' supreme health authorities].

    PubMed

    2015-07-01

    In the European Hazardous Substances Regulation No 1272/2008 trichloroethylene has been classified as a probable human carcinogen and a suspected mutagen. According to several Committees (German Committee on Hazardous Substances, European Scientific Committee on Occupational Exposure Limits, European Chemicals Agency´s Committee for Risk Assessment (ECHA-RAC)) concentrations of trichloroethylene cytotoxic to renal tubuli may increase the risk to develop renal cancer. At non-cytotoxic concentrations of trichloroethylene a much lower cancer risk may be assumed. Therefore, evaluating the cancer risk to the public following inhalation of trichloroethylene ECHA-RAC has assumed a sublinear exposure-response relationship for carcinogenicity of trichloroethylene. Specifically, ECHA-RAC assessed a cancer risk of 6.4 × 10(- 5) (mg/m(3))(- 1) following life time exposure to trichloroethylene below a NOAEC for renal cytotoxicity of 6 mg trichloroethylene/m(3). Further evaluation yields a life-time risk of 10(- 6) corresponding to 0.02 mg trichloroethylene/m(3). This concentration is well above the reference (e.g. background) concentration of trichloroethylene in indoor air. Consequently the Ad-hoc Working Group on Indoor Guidelines recommends 0.02 mg trichloroethylene/m(3) as a risk-related guideline for indoor air. Measures to reduce exposure are considered inappropriate at concentrations below this guideline.

  4. [Indoor air guide values for acetaldehyde. Announcement of the German Ad-hoc Working Group on Indoor Guidelines of the Indoor Air Hygiene Committee and of the States' Supreme Health Authorities].

    PubMed

    2013-10-01

    The German Ad-hoc Working Group on Indoor Guidelines of the Indoor Air Hygiene Committee and the States' Supreme Health Authorities is issuing indoor air guide values to protect public health. No suitable human studies are available for health evaluation of acetaldehyde in indoor air. In a well-documented subchronic inhalation animal study with rats assessed as reliable, local irritation effects were observed in nasal epithelia, most prominently in the olfactory epithelium with loss of olfactory neuronal cells. This study leads to a LOAEC of 48 mg acetaldehyde/m3 for continuous exposure for the endpoint nasal epithelium degeneration. By applying an interspecies factor of 1, a factor of 10 for interindividual variability, and a factor of 2 to account for the higher respiratory rate of children compared to adults, a health hazard guide value (RW II) of 1 mg acetaldehyde/m3 is obtained. A health precaution guide value (RW I) of 0.1 mg acetaldehyde/m3 is recommended.

  5. Evaluating Value-Added Models for Teacher Accountability. Monograph

    ERIC Educational Resources Information Center

    McCaffrey, Daniel F.; Lockwood, J. R.; Koretz, Daniel M.; Hamilton, Laura S.

    2003-01-01

    Value-added modeling (VAM) to estimate school and teacher effects is currently of considerable interest to researchers and policymakers. Recent reports suggest that VAM demonstrates the importance of teachers as a source of variance in student outcomes. Policymakers see VAM as a possible component of education reform through improved teacher…

  6. Value-Added Models: What the Experts Say

    ERIC Educational Resources Information Center

    Amrein-Beardsley, Audrey; Pivovarova, Margarita; Geiger, Tray J.

    2016-01-01

    Being an expert involves explaining how things are supposed to work, and, perhaps more important, why things might not work as supposed. In this study, researchers surveyed scholars with expertise in value-added models (VAMs) to solicit their opinions about the uses and potential of VAMs for teacher-level accountability purposes (for example, in…

  7. Ad-Hoc Implicature in Preschool Children

    ERIC Educational Resources Information Center

    Stiller, Alex J.; Goodman, Noah D.; Frank, Michael C.

    2015-01-01

    If a speaker tells us that "some guests were late to the party," we typically infer that not all were. Implicatures, in which an ambiguous statement ("some and possibly all") is strengthened pragmatically (to "some and not all"), are a paradigm case of pragmatic reasoning. Inferences of this sort are difficult for…

  8. Swift Trust in Distributed Ad Hoc Teams

    DTIC Science & Technology

    2007-10-04

    team at risk. Questionnaires assessed the impact of regimental identity and potential trust violations on levels of team trust before the mission...personnellement. Cette notion est de plus en plus utilisée dans les ouvrages spécialisés pour expliquer comment les membres des équipes spéciales... questionnaires distribués aux participants ont permis d’évaluer l’impact de l’identité régimentaire et des abus de confiance sur le niveau de confiance

  9. Life Cycles of Ad Hoc Task Groups

    DTIC Science & Technology

    1983-10-01

    internal group dynamics, and external influence on the group . Time pressure . Members’ first comments about time pressure appeared at transition meetings...organizational supports and management behavior can influence team effectiveness. Yet it is unclear how such factors may affect the group "_.3...on members’ ability to work together, yet little is known about how the gradual creation of work products influences groups ’ social development. The

  10. DAWN: Dynamic Ad-hoc Wireless Network

    DTIC Science & Technology

    2016-06-19

    none) (c) Presentations 03/15/2007 03/15/2007 27.00 28.00 Received Paper Ning Li, Jennifer C. Hou. A Scalable, Power-Efficient Broadcast Algorithm for...Wireless Networks, , ( ): . doi: Ning Li, Jennifer C. Hou. Localized Topology Control Algorithms for Heterogeneous Wireless Networks, IEEE

  11. Mobile Ad Hoc Network Emulation Environment

    DTIC Science & Technology

    2009-10-01

    and debugging information in both real-time and post-test-run playback modes. Display characteristics are controlled by the test nodes, which pass...2007. MILCOM 2007. IEEE , vol., no., pp.I-6, 29-31 Oct. 2007. [IS] http ://cs.itd.nrl.navy.mil /work/rapr/index, php [16] http ://www.alionscience.com

  12. Modeling and Analysis of Energy Conservation Scheme Based on Duty Cycling in Wireless Ad Hoc Sensor Network

    PubMed Central

    Chung, Yun Won; Hwang, Ho Young

    2010-01-01

    In sensor network, energy conservation is one of the most critical issues since sensor nodes should perform a sensing task for a long time (e.g., lasting a few years) but the battery of them cannot be replaced in most practical situations. For this purpose, numerous energy conservation schemes have been proposed and duty cycling scheme is considered the most suitable power conservation technique, where sensor nodes alternate between states having different levels of power consumption. In order to analyze the energy consumption of energy conservation scheme based on duty cycling, it is essential to obtain the probability of each state. In this paper, we analytically derive steady state probability of sensor node states, i.e., sleep, listen, and active states, based on traffic characteristics and timer values, i.e., sleep timer, listen timer, and active timer. The effect of traffic characteristics and timer values on the steady state probability and energy consumption is analyzed in detail. Our work can provide sensor network operators guideline for selecting appropriate timer values for efficient energy conservation. The analytical methodology developed in this paper can be extended to other energy conservation schemes based on duty cycling with different sensor node states, without much difficulty. PMID:22219676

  13. Modeling and Analysis of Intrusion Detection Integrated with Batch Rekeying for Dynamic Group Communication Systems in Mobile Ad Hoc Networks

    DTIC Science & Technology

    2010-05-01

    Diffie - Hellman Key Distribution Extended to Group Communication,” Proc. of 3rd ACM Conf. on Computer and Communications Security, New Delhi, India, Jan... Diffie -Hallman (GDH) algorithm [23] as the CKA protocol for group members to generate and distribute a new group key upon a group membership change event

  14. Modeling and analysis of energy conservation scheme based on duty cycling in wireless ad hoc sensor network.

    PubMed

    Chung, Yun Won; Hwang, Ho Young

    2010-01-01

    In sensor network, energy conservation is one of the most critical issues since sensor nodes should perform a sensing task for a long time (e.g., lasting a few years) but the battery of them cannot be replaced in most practical situations. For this purpose, numerous energy conservation schemes have been proposed and duty cycling scheme is considered the most suitable power conservation technique, where sensor nodes alternate between states having different levels of power consumption. In order to analyze the energy consumption of energy conservation scheme based on duty cycling, it is essential to obtain the probability of each state. In this paper, we analytically derive steady state probability of sensor node states, i.e., sleep, listen, and active states, based on traffic characteristics and timer values, i.e., sleep timer, listen timer, and active timer. The effect of traffic characteristics and timer values on the steady state probability and energy consumption is analyzed in detail. Our work can provide sensor network operators guideline for selecting appropriate timer values for efficient energy conservation. The analytical methodology developed in this paper can be extended to other energy conservation schemes based on duty cycling with different sensor node states, without much difficulty.

  15. In silico strain optimization by adding reactions to metabolic models.

    PubMed

    Correia, Sara; Rocha, Miguel

    2012-07-24

    Nowadays, the concerns about the environment and the needs to increase the productivity at low costs, demand for the search of new ways to produce compounds with industrial interest. Based on the increasing knowledge of biological processes, through genome sequencing projects, and high-throughput experimental techniques as well as the available computational tools, the use of microorganisms has been considered as an approach to produce desirable compounds. However, this usually requires to manipulate these organisms by genetic engineering and/ or changing the enviromental conditions to make the production of these compounds possible. In many cases, it is necessary to enrich the genetic material of those microbes with hereologous pathways from other species and consequently adding the potential to produce novel compounds. This paper introduces a new plug-in for the OptFlux Metabolic Engineering platform, aimed at finding suitable sets of reactions to add to the genomes of selected microbes (wild type strain), as well as finding complementary sets of deletions, so that the mutant becomes able to overproduce compounds with industrial interest, while preserving their viability. The necessity of adding reactions to the metabolic model arises from existing gaps in the original model or motivated by the productions of new compounds by the organism. The optimization methods used are metaheuristics such as Evolutionary Algorithms and Simulated Annealing. The usefulness of this plug-in is demonstrated by a case study, regarding the production of vanillin by the bacterium E. coli.

  16. Syrian hamster tumor model to study oncolytic Ad5-based vectors.

    PubMed

    Dhar, Debanjan; Toth, Karoly; Wold, William S M

    2012-01-01

    Oncolytic (replicating) adenovirus (Ad) vectors are emerging as a promising form of a cancer therapy agent. There has been a need for an appropriate animal model to study oncolytic Ad since human Ad -replication is usually species specific. We have shown that Syrian (golden) hamsters are an appropriate animal model to study human Ad5-based vectors. Syrian hamsters are immunocompetent, and they allow human Ad5 replication in normal tissues as well as in Syrian hamster cancer cells. The development of the Syrian hamster as a model to study oncolytic Ad vectors has opened avenues to explore the role of host immune response and preexisting immunity in Ad vector efficacy and toxicity/biodistribution following Ad vector administration. Since most of the normal tissues in the Syrian hamster are permissive for human Ad5 replication, Ad vectors can be studied in the context of orthotopic cancer model developed in Syrian hamsters.

  17. Model of the world oil market with an OPEC cartel. [1980 AD to 2040 AD

    SciTech Connect

    Alsmiller, R.G. Jr.; Horwedel, J.E.; Marshalla, R.A.; Nesbitt, D.M.; Haas, S.M.

    1984-08-01

    A world oil market model (WOM) with OPEC treated as a Stackelberg cartel has been developed within the framework of the Generalized Equilibrium Modeling System (GEMS) that is available from Decision Focus, Inc. The US sector of the model is represented by a Liquid Fuels Supply model that was presented previously. The WOM model is described and results obtained with the model for the period 1980 to 2040 are presented. For comparative purposes, results obtained with the model when OPEC is treated as a competitive producer are also presented. By comparing the world oil price as a function of time from the two calculations, the influence that OPEC may have on the oil market by exploiting all of its market power is quantified. The world oil price as obtained with the WOM model is also compared with world oil price projections from a variety of sources. 22 references, 9 figures, 2 tables.

  18. Assessing the TARES as an ethical model for antismoking ads.

    PubMed

    Lee, Seow Ting; Cheng, I-Huei

    2010-01-01

    This study examines the ethical dimensions of public health communication, with a focus on antismoking public service announcements (PSAs). The content analysis of 826 television ads from the U.S. Centers for Disease Control and Prevention's (CDC) Media Campaign Resource Center is an empirical testing of Baker and Martinson's (2001) TARES Test that directly examines persuasive messages for truthfulness, authenticity, respect, equity, and social responsibility. In general, the antismoking ads score highly on ethicality. There are significant relationships between ethicality and message attributes (thematic frame, emotion appeal, source, and target audience). Ads that portrayed smoking as damaging to health and socially unacceptable score lower in ethicality than ads that focus on tobacco industry manipulation, addiction, dangers of secondhand smoke, and cessation. Emotion appeals of anger and sadness are associated with higher ethicality than shame and humor appeals. Ads targeting teen/youth audiences score lower on ethicality than ads targeting adult and general audiences. There are significant differences in ethicality based on source; ads produced by the CDC rate higher in ethicality than other sources. Theoretical implications and practical recommendations are discussed.

  19. AdS Black Disk Model for Small-x Deep Inelastic Scattering

    NASA Astrophysics Data System (ADS)

    Cornalba, Lorenzo; Costa, Miguel S.; Penedones, João

    2010-08-01

    Using the approximate conformal invariance of QCD at high energies we consider a simple anti-de Sitter black disk model to describe saturation in deep inelastic scattering. Deep inside saturation the structure functions have the same power law scaling, FT˜FL˜x-ω, where ω is related to the expansion rate of the black disk with energy. Furthermore, the ratio FL/FT is given by the universal value (1+ω)/(3+ω), independently of the target. For γ*-γ* scattering at high energies we obtain explicit expressions and ratios for the total cross sections of transverse and longitudinal photons in terms of the single parameter ω.

  20. Lifshitz from AdS at finite temperature and top down models

    NASA Astrophysics Data System (ADS)

    Korovin, Yegor; Skenderis, Kostas; Taylor, Marika

    2013-11-01

    We construct analytically an asymptotically Lifshitz black brane with dynamical exponent z = 1 + ∈ 2 in an Einstein-Proca model, where ∈ is a small parameter. In previous work we showed that the holographic dual QFT is a deformation of a CFT by the time component of a vector operator and the parameter ∈ is the corresponding deformation parameter. In the black brane background this operator additionally acquires a vacuum expectation value. We explain how the QFT Ward identity associated with Lifshitz invariance leads to a conserved mass and compute analytically the thermodynamic quantities showing that they indeed take the form implied by Lifshitz invariance. In the second part of the paper we consider top down Lifshitz models with dynamical exponent close to one and show that they can be understood in terms of vector deformations of conformal field theories. However, in all known cases, both the conformal field theory and its Lifshitz deformations have modes that violate the Breitenlohner-Freedman bound.

  1. Value-Added Models of Assessment: Implications for Motivation and Accountability

    ERIC Educational Resources Information Center

    Anderman, Eric M.; Anderman, Lynley H.; Yough, Michael S.; Gimbert, Belinda G.

    2010-01-01

    In this article, we examine the relations of value-added models of measuring academic achievement to student motivation. Using an achievement goal orientation theory perspective, we argue that value-added models, which focus on the progress of individual students over time, are more closely aligned with research on student motivation than are more…

  2. Interpreting incremental value of markers added to risk prediction models.

    PubMed

    Pencina, Michael J; D'Agostino, Ralph B; Pencina, Karol M; Janssens, A Cecile J W; Greenland, Philip

    2012-09-15

    The discrimination of a risk prediction model measures that model's ability to distinguish between subjects with and without events. The area under the receiver operating characteristic curve (AUC) is a popular measure of discrimination. However, the AUC has recently been criticized for its insensitivity in model comparisons in which the baseline model has performed well. Thus, 2 other measures have been proposed to capture improvement in discrimination for nested models: the integrated discrimination improvement and the continuous net reclassification improvement. In the present study, the authors use mathematical relations and numerical simulations to quantify the improvement in discrimination offered by candidate markers of different strengths as measured by their effect sizes. They demonstrate that the increase in the AUC depends on the strength of the baseline model, which is true to a lesser degree for the integrated discrimination improvement. On the other hand, the continuous net reclassification improvement depends only on the effect size of the candidate variable and its correlation with other predictors. These measures are illustrated using the Framingham model for incident atrial fibrillation. The authors conclude that the increase in the AUC, integrated discrimination improvement, and net reclassification improvement offer complementary information and thus recommend reporting all 3 alongside measures characterizing the performance of the final model.

  3. Strategies for fitting nonlinear ecological models in R, AD Model Builder, and BUGS

    USGS Publications Warehouse

    Bolker, Benjamin M.; Gardner, Beth; Maunder, Mark; Berg, Casper W.; Brooks, Mollie; Comita, Liza; Crone, Elizabeth; Cubaynes, Sarah; Davies, Trevor; de Valpine, Perry; Ford, Jessica; Gimenez, Olivier; Kéry, Marc; Kim, Eun Jung; Lennert-Cody, Cleridy; Magunsson, Arni; Martell, Steve; Nash, John; Nielson, Anders; Regentz, Jim; Skaug, Hans; Zipkin, Elise

    2013-01-01

    1. Ecologists often use nonlinear fitting techniques to estimate the parameters of complex ecological models, with attendant frustration. This paper compares three open-source model fitting tools and discusses general strategies for defining and fitting models. 2. R is convenient and (relatively) easy to learn, AD Model Builder is fast and robust but comes with a steep learning curve, while BUGS provides the greatest flexibility at the price of speed. 3. Our model-fitting suggestions range from general cultural advice (where possible, use the tools and models that are most common in your subfield) to specific suggestions about how to change the mathematical description of models to make them more amenable to parameter estimation. 4. A companion web site (https://groups.nceas.ucsb.edu/nonlinear-modeling/projects) presents detailed examples of application of the three tools to a variety of typical ecological estimation problems; each example links both to a detailed project report and to full source code and data.

  4. Adding ecosystem function to agent-based land use models

    PubMed Central

    Yadav, V.; Del Grosso, S.J.; Parton, W.J.; Malanson, G.P.

    2015-01-01

    The objective of this paper is to examine issues in the inclusion of simulations of ecosystem functions in agent-based models of land use decision-making. The reasons for incorporating these simulations include local interests in land fertility and global interests in carbon sequestration. Biogeochemical models are needed in order to calculate such fluxes. The Century model is described with particular attention to the land use choices that it can encompass. When Century is applied to a land use problem the combinatorial choices lead to a potentially unmanageable number of simulation runs. Century is also parameter-intensive. Three ways of including Century output in agent-based models, ranging from separately calculated look-up tables to agents running Century within the simulation, are presented. The latter may be most efficient, but it moves the computing costs to where they are most problematic. Concern for computing costs should not be a roadblock. PMID:26191077

  5. ASC-AD penetration modeling FY05 status report.

    SciTech Connect

    Kistler, Bruce L.; Ostien, Jakob T.; Chiesa, Michael L.; Bhutani, Nipun; Ohashi, Yuki; Marin, Esteban B.; Korellis, John S.; Settgast, Randy; Antoun, Bonnie R.

    2006-04-01

    Sandia currently lacks a high fidelity method for predicting loads on and subsequent structural response of earth penetrating weapons. This project seeks to test, debug, improve and validate methodologies for modeling earth penetration. Results of this project will allow us to optimize and certify designs for the B61-11, Robust Nuclear Earth Penetrator (RNEP), PEN-X and future nuclear and conventional penetrator systems. Since this is an ASC Advanced Deployment project the primary goal of the work is to test, debug, verify and validate new Sierra (and Nevada) tools. Also, since this project is part of the V&V program within ASC, uncertainty quantification (UQ), optimization using DAKOTA [1] and sensitivity analysis are an integral part of the work. This project evaluates, verifies and validates new constitutive models, penetration methodologies and Sierra/Nevada codes. In FY05 the project focused mostly on PRESTO [2] using the Spherical Cavity Expansion (SCE) [3,4] and PRESTO Lagrangian analysis with a preformed hole (Pen-X) methodologies. Modeling penetration tests using PRESTO with a pilot hole was also attempted to evaluate constitutive models. Future years work would include the Alegra/SHISM [5] and AlegrdEP (Earth Penetration) methodologies when they are ready for validation testing. Constitutive models such as Soil-and-Foam, the Sandia Geomodel [6], and the K&C Concrete model [7] were also tested and evaluated. This report is submitted to satisfy annual documentation requirements for the ASC Advanced Deployment program. This report summarizes FY05 work performed in the Penetration Mechanical Response (ASC-APPS) and Penetration Mechanics (ASC-V&V) projects. A single report is written to document the two projects because of the significant amount of technical overlap.

  6. The Politics and Statistics of Value-Added Modeling for Accountability of Teacher Preparation Programs

    ERIC Educational Resources Information Center

    Lincove, Jane Arnold; Osborne, Cynthia; Dillon, Amanda; Mills, Nicholas

    2014-01-01

    Despite questions about validity and reliability, the use of value-added estimation methods has moved beyond academic research into state accountability systems for teachers, schools, and teacher preparation programs (TPPs). Prior studies of value-added measurement for TPPs test the validity of researcher-designed models and find that measuring…

  7. Rethinking Teacher Evaluation: A Conversation about Statistical Inferences and Value-Added Models

    ERIC Educational Resources Information Center

    Callister Everson, Kimberlee; Feinauer, Erika; Sudweeks, Richard R.

    2013-01-01

    In this article, the authors provide a methodological critique of the current standard of value-added modeling forwarded in educational policy contexts as a means of measuring teacher effectiveness. Conventional value-added estimates of teacher quality are attempts to determine to what degree a teacher would theoretically contribute, on average,…

  8. Adding Missing-Data-Relevant Variables to FIML-Based Structural Equation Models

    ERIC Educational Resources Information Center

    Graham, John W.

    2003-01-01

    Conventional wisdom in missing data research dictates adding variables to the missing data model when those variables are predictive of (a) missingness and (b) the variables containing missingness. However, it has recently been shown that adding variables that are correlated with variables containing missingness, whether or not they are related to…

  9. Bifurcation and Spike Adding Transition in Chay-Keizer Model

    NASA Astrophysics Data System (ADS)

    Lu, Bo; Liu, Shenquan; Liu, Xuanliang; Jiang, Xiaofang; Wang, Xiaohui

    Electrical bursting is an activity which is universal in excitable cells such as neurons and various endocrine cells, and it encodes rich physiological information. As burst delay identifies that the signal integration has reached the threshold at which it can generate an action potential, the number of spikes in a burst may have essential physiological implications, and the transition of bursting in excitable cells is associated with the bifurcation phenomenon closely. In this paper, we focus on the transition of the spike count per burst of the pancreatic β-cells within a mathematical model and bifurcation phenomenon in the Chay-Keizer model, which is utilized to simulate the pancreatic β-cells. By the fast-slow dynamical bifurcation analysis and the bi-parameter bifurcation analysis, the local dynamics of the Chay-Keizer system around the Bogdanov-Takens bifurcation is illustrated. Then the variety of the number of spikes per burst is discussed by changing the settings of a single parameter and bi-parameter. Moreover, results on the number of spikes within a burst are summarized in ISIs (interspike intervals) sequence diagrams, maximum and minimum, and the number of spikes under bi-parameter value changes.

  10. Brain and Plasma Molecular Characterization of the Pathogenic TBI-AD Interrelationship in Mouse Models

    DTIC Science & Technology

    2015-10-01

    AWARD NUMBER: W81XWH-13-1-0253 TITLE: Brain and Plasma Molecular Characterization of the Pathogenic TBI-AD Interrelationship in Mouse Models ... brain and plasma responses in mouse models of TBI, AD and other neurodegenerative conditions (Abdullah et al., 2014; Abdullah et al., 2013; Crawford...identify age/time-dependent expression of brain proteins and lipids in mouse models of AD (PSAPP and hTau) and of mTBI (single and repetitive mTBI in hTau

  11. Autoimmune Manifestations in the 3xTg-AD Model of Alzheimer's Disease

    PubMed Central

    Marchese, Monica; Cowan, David; Head, Elizabeth; Ma, Donglai; Karimi, Khalil; Ashthorpe, Vanessa; Kapadia, Minesh; Zhao, Hui; Davis, Paulina; Sakic, Boris

    2015-01-01

    Background Immune system activation is frequently reported in patients with Alzheimer's disease (AD). However, it remains unknown whether this is a cause, a consequence, or an epiphenomenon of brain degeneration. Objective The present study examines whether immunological abnormalities occur in a well-established murine AD model and if so, how they relate temporally to behavioral deficits and neuropathology. Methods A broad battery of tests was employed to assess behavioral performance and autoimmune/inflammatory markers in 3xTg-AD (AD) mice and wild type controls from 1.5 to 12 months of age. Results Aged AD mice displayed severe manifestations of systemic autoimmune/inflammatory disease, as evidenced by splenomegaly, hepatomegaly, elevated serum levels of anti-nuclear/anti-dsDNA antibodies, low hematocrit, and increased number of double-negative T splenocytes. However, anxiety-related behavior and altered spleen function were evident as early as 2 months of age, thus preceding typical AD-like brain pathology. Moreover, AD mice showed altered olfaction and impaired “cognitive” flexibility in the first 6 months of life, suggesting mild cognitive impairment-like manifestations before general learning/memory impairments emerged at an older age. Interestingly, all of these features were present in 3xTg-AD mice prior to significant amyloid-β or tau pathology. Conclusion The results indicate that behavioral deficits in AD mice develop in parallel with systemic autoimmune/inflammatory disease. These changes antedate AD-like neuropathology, thus supporting a causal link between autoimmunity and aberrant behavior. Consequently, 3xTg-AD mice may be a useful model in elucidating the role of immune system in the etiology of AD. PMID:24150111

  12. Battery Performance Modelling ad Simulation: a Neural Network Based Approach

    NASA Astrophysics Data System (ADS)

    Ottavianelli, Giuseppe; Donati, Alessandro

    2002-01-01

    This project has developed on the background of ongoing researches within the Control Technology Unit (TOS-OSC) of the Special Projects Division at the European Space Operations Centre (ESOC) of the European Space Agency. The purpose of this research is to develop and validate an Artificial Neural Network tool (ANN) able to model, simulate and predict the Cluster II battery system's performance degradation. (Cluster II mission is made of four spacecraft flying in tetrahedral formation and aimed to observe and study the interaction between sun and earth by passing in and out of our planet's magnetic field). This prototype tool, named BAPER and developed with a commercial neural network toolbox, could be used to support short and medium term mission planning in order to improve and maximise the batteries lifetime, determining which are the future best charge/discharge cycles for the batteries given their present states, in view of a Cluster II mission extension. This study focuses on the five Silver-Cadmium batteries onboard of Tango, the fourth Cluster II satellite, but time restrains have allowed so far to perform an assessment only on the first battery. In their most basic form, ANNs are hyper-dimensional curve fits for non-linear data. With their remarkable ability to derive meaning from complicated or imprecise history data, ANN can be used to extract patterns and detect trends that are too complex to be noticed by either humans or other computer techniques. ANNs learn by example, and this is why they can be described as an inductive, or data-based models for the simulation of input/target mappings. A trained ANN can be thought of as an "expert" in the category of information it has been given to analyse, and this expert can then be used, as in this project, to provide projections given new situations of interest and answer "what if" questions. The most appropriate algorithm, in terms of training speed and memory storage requirements, is clearly the Levenberg

  13. Quercetin ameliorates Aβ toxicity in Drosophila AD model by modulating cell cycle-related protein expression

    PubMed Central

    Kong, Yan; Li, Ke; Fu, Tingting; Wan, Chao; Zhang, Dongdong; Song, Hang; Zhang, Yao; Liu, Na; Gan, Zhenji; Yuan, Liudi

    2016-01-01

    Alzheimer's disease (AD) is a prevalent neurodegenerative disorder characterized by β amyloid (Aβ) deposition and neurofibril tangles. It has been reported that a bioflavonoid, quercetin, could ameliorate AD phenotypes in C. elegans and mice. However, the mechanism underlying the ameliorative effect of quercetin is not fully understood yet. Drosophila models could recapitulate AD-like phenotypes, such as shortened lifespan, impaired locomotive ability as well as defects in learning and memory. So in this study, we investigated the effects of quercetin on AD in Drosophila model and explored the underlying mechanisms. We found quercetin could effectively intervene in AD pathogenesis in vivo. Mechanism study showed quercetin could restore the expression of genes perturbed by Aβ accumulation, such as those involved in cell cycle and DNA replication. Cyclin B, an important cell cycle protein, was chosen to test whether it participated in the AD ameliorative effects of quercetin. We found that cyclin B RNAi in the brain could alleviate AD phenotypes. Taken together, the current study suggested that the neuroprotective effects of quercetin were mediated at least partially by targeting cell cycle-related proteins. PMID:27626494

  14. Quercetin ameliorates Aβ toxicity in Drosophila AD model by modulating cell cycle-related protein expression.

    PubMed

    Kong, Yan; Li, Ke; Fu, Tingting; Wan, Chao; Zhang, Dongdong; Song, Hang; Zhang, Yao; Liu, Na; Gan, Zhenji; Yuan, Liudi

    2016-10-18

    Alzheimer's disease (AD) is a prevalent neurodegenerative disorder characterized by β amyloid (Aβ) deposition and neurofibril tangles. It has been reported that a bioflavonoid, quercetin, could ameliorate AD phenotypes in C. elegans and mice. However, the mechanism underlying the ameliorative effect of quercetin is not fully understood yet. Drosophila models could recapitulate AD-like phenotypes, such as shortened lifespan, impaired locomotive ability as well as defects in learning and memory. So in this study, we investigated the effects of quercetin on AD in Drosophila model and explored the underlying mechanisms. We found quercetin could effectively intervene in AD pathogenesis in vivo. Mechanism study showed quercetin could restore the expression of genes perturbed by Aβ accumulation, such as those involved in cell cycle and DNA replication. Cyclin B, an important cell cycle protein, was chosen to test whether it participated in the AD ameliorative effects of quercetin. We found that cyclin B RNAi in the brain could alleviate AD phenotypes. Taken together, the current study suggested that the neuroprotective effects of quercetin were mediated at least partially by targeting cell cycle-related proteins.

  15. Leptonic color models from Z{sub 8} orbifolded AdS/CFT

    SciTech Connect

    Babu, K. S.; Kephart, Thomas W.; Paes, Heinrich

    2008-06-01

    We study orbifold compactifications of the type IIB superstring on AdS{sub 5}xS{sup 5}/{gamma}, where {gamma} is the Abelian group Z{sub 8}, which can lead to non-supersymmetric three and four family models based on quartification. In particular, we focus on two models, one fully quartified model and one a model with two trinification families and one quartification family, which reduces to the standard model with a minimal leptonic color sector.

  16. Teaching and learning the Hodgkin-Huxley model based on software developed in NEURON’s programming language hoc

    PubMed Central

    2013-01-01

    Background We present a software tool called SENB, which allows the geometric and biophysical neuronal properties in a simple computational model of a Hodgkin-Huxley (HH) axon to be changed. The aim of this work is to develop a didactic and easy-to-use computational tool in the NEURON simulation environment, which allows graphical visualization of both the passive and active conduction parameters and the geometric characteristics of a cylindrical axon with HH properties. Results The SENB software offers several advantages for teaching and learning electrophysiology. First, SENB offers ease and flexibility in determining the number of stimuli. Second, SENB allows immediate and simultaneous visualization, in the same window and time frame, of the evolution of the electrophysiological variables. Third, SENB calculates parameters such as time and space constants, stimuli frequency, cellular area and volume, sodium and potassium equilibrium potentials, and propagation velocity of the action potentials. Furthermore, it allows the user to see all this information immediately in the main window. Finally, with just one click SENB can save an image of the main window as evidence. Conclusions The SENB software is didactic and versatile, and can be used to improve and facilitate the teaching and learning of the underlying mechanisms in the electrical activity of an axon using the biophysical properties of the squid giant axon. PMID:23675833

  17. Ocular Changes in TgF344-AD Rat Model of Alzheimer's Disease

    PubMed Central

    Tsai, Yuchun; Lu, Bin; Ljubimov, Alexander V.; Girman, Sergey; Ross-Cisneros, Fred N.; Sadun, Alfredo A.; Svendsen, Clive N.; Cohen, Robert M.; Wang, Shaomei

    2014-01-01

    Purpose. Alzheimer's disease (AD) is the most common neurodegenerative disorder characterized by progressive decline in learning, memory, and executive functions. In addition to cognitive and behavioral deficits, vision disturbances have been reported in early stage of AD, well before the diagnosis is clearly established. To further investigate ocular abnormalities, a novel AD transgenic rat model was analyzed. Methods. Transgenic (Tg) rats (TgF344-AD) heterozygous for human mutant APPswe/PS1ΔE9 and age-matched wild type (WT) rats, as well as 20 human postmortem retinal samples from both AD and healthy donors were used. Visual function in the rodent was analyzed using the optokinetic response. Immunohistochemistry on retinal and brain sections was used to detect various markers including amyloid-β (Aβ) plaques. Results. As expected, Aβ plaques were detected in the hippocampus, cortex, and retina of Tg rats. Plaque-like structures were also found in two AD human whole-mount retinas. The choroidal thickness was significantly reduced in both Tg rat and in AD human eyes when compared with age-matched controls. Tg rat eyes also showed hypertrophic retinal pigment epithelial cells, inflammatory cells, and upregulation of complement factor C3. Although visual acuity was lower in Tg than in WT rats, there was no significant difference in the retinal ganglion cell number and retinal vasculature. Conclusions. Further studies are needed to elucidate the significance and mechanisms of this pathological change and luminance threshold recording from the superior colliculus. PMID:24398104

  18. The Promise and Peril of Using Value-Added Modeling to Measure Teacher Effectiveness. Research Brief

    ERIC Educational Resources Information Center

    RAND Corporation, 2004

    2004-01-01

    Value-added modeling offers the possibility of estimating the effects of teachers and schools on student performance, a potentially important contribution in the current environment of concern for accountability in education. These techniques, however, are susceptible to a number of sources of bias, depending on decisions about how the modeling is…

  19. Giving a Structural Framework for Ohio's Value-Added Model: What All Educators Should Know?

    ERIC Educational Resources Information Center

    Quattrochi, David P.; Chapman, Paul E.

    2010-01-01

    A qualitative case study of one rural elementary school in Ohio examined how faculty, administrators, students, and parents experienced Ohio's Value-added model. The findings generated from looking at planning and professional development to implementation of the model generated a close- up of a successful approach to helping teachers use multiple…

  20. Value-Added Models for Teacher Preparation Programs: Validity and Reliability Threats, and a Manageable Alternative

    ERIC Educational Resources Information Center

    Brady, Michael P.; Heiser, Lawrence A.; McCormick, Jazarae K.; Forgan, James

    2016-01-01

    High-stakes standardized student assessments are increasingly used in value-added evaluation models to connect teacher performance to P-12 student learning. These assessments are also being used to evaluate teacher preparation programs, despite validity and reliability threats. A more rational model linking student performance to candidates who…

  1. Concise review: no breakthroughs for human mesenchymal and embryonic stem cell culture: conditioned medium, feeder layer, or feeder-free; medium with fetal calf serum, human serum, or enriched plasma; serum-free, serum replacement nonconditioned medium, or ad hoc formula? All that glitters is not gold!

    PubMed

    Mannello, Ferdinando; Tonti, Gaetana A

    2007-07-01

    The choice of an optimal strategy of stem cell culture is at the moment an impossible task, and the elaboration of a culture medium adapted to the production of embryonic and adult mesenchymal stem cells for the clinical application of cell therapy remains a crucial matter. To make an informed choice, it is crucial to not underestimate the theoretical health risk of using xenogenic compounds, to limit the immunological reactions once stem cells are transplanted, to not overestimate the controversial results obtained with human serum, plasma, and blood derivatives, as well as to carefully examine the pros and cons of serum-free and ad hoc formulation strategies; besides that, to also maintain multipotentiality, self-renewal, and transplantability. The extent to which we are able to achieve effective cell therapies will depend on assimilating a rapidly developing base of scientific knowledge with the practical considerations of design, delivery, and host response. Although clinical studies have already started, many questions remain unsolved, and concomitantly even more evidence on suitable and safe off-the-shelf products (mainly xeno-free) for embryonic and mesenchymal stem cells is cropping up, even though there should be no rush to enter the clinical stage while the underlying basic research is still not so solid; this solely will lead to high-quality translational research, without making blunders stemming from the assumption that all that glitters is not gold. Disclosure of potential conflicts of interest is found at the end of this article.

  2. A model-driven approach to qualitatively assessing the added value of community coalitions.

    PubMed

    Herman, Elizabeth Jane; Keller, Adrienne; Davis, Adam; Ehrensberger, Ryan; Telleen, Sharon; Kurz, Richard; Nesvold, Jill Heins; Findley, Sally; Bryant-Stephens, Tyra; Benson, Mindy; Fierro, Leslie

    2011-02-01

    Community-based coalitions are commonly formed to plan and to carry out public health interventions. The literature includes evaluations of coalition structure, composition, and functioning; evaluations of community-level changes achieved through coalition activities; and the association between coalition characteristics and various indicators of success. Little information is available on the comparative advantage or "added value" of conducting public health interventions through coalitions as opposed to less structured collaborative mechanisms. This paper describes a qualitative, iterative process carried out with site representatives of the Controlling Asthma in American Cities Project (CAACP) to identify outcomes directly attributable to coalitions. The process yielded 2 complementary sets of results. The first were criteria that articulated and limited the concept of "added value of coalitions". The criteria included consensus definitions, an organizing figure, a logic model, and inclusion/exclusion criteria. The second set of results identified site-specific activities that met the definitional criteria and were, by agreement, examples of CAACP coalitions' added value. Beyond the specific findings relevant to the added value of coalitions in this project, the use of a social ecological model to identify the components of added value and the placement of those components within a logic model specific to coalitions should provide useful tools for those planning and assessing coalition-based projects.

  3. Functional expression of a proton-coupled organic cation (H+/OC) antiporter in human brain capillary endothelial cell line hCMEC/D3, a human blood–brain barrier model

    PubMed Central

    2013-01-01

    Background Knowledge of the molecular basis and transport function of the human blood–brain barrier (BBB) is important for not only understanding human cerebral physiology, but also development of new central nervous system (CNS)-acting drugs. However, few studies have been done using human brain capillary endothelial cells, because human brain materials are difficult to obtain. The purpose of this study is to clarify the functional expression of a proton-coupled organic cation (H+/OC) antiporter in human brain capillary endothelial cell line hCMEC/D3, which has been recently developed as an in vitro human BBB model. Methods Diphenhydramine, [3H]pyrilamine and oxycodone were used as cationic drugs that proved to be H+/OC antiporter substrates. The in vitro uptake experiments by hCMEC/D3 cells were carried out under several conditions. Results Diphenhydramine and [3H]pyrilamine were both transported into hCMEC/D3 cells in a time- and concentration-dependent manner with Km values of 59 μM and 19 μM, respectively. Each inhibited uptake of the other in a competitive manner, suggesting that a common mechanism is involved in their transport. The diphenhydramine uptake was significantly inhibited by amantadine and quinidine, but not tetraethylammonium and 1-methyl-4-phenylpyridinium (substrates for well-known organic cation transporters). The uptake was inhibited by metabolic inhibitors, but was insensitive to extracellular sodium and membrane potential. Further, the uptake was increased by extracellular alkalization and intracellular acidification. These transport properties are completely consistent with those of previously characterized H+/OC antiporter in rat BBB. Conclusions The present results suggest that H+/OC antiporter is functionally expressed in hCMEC/D3 cells. PMID:23351963

  4. The Guinea Pig as a Model for Sporadic Alzheimer’s Disease (AD): The Impact of Cholesterol Intake on Expression of AD-Related Genes

    PubMed Central

    Ong, Daniel; Wijaya, Linda; Laws, Simon M.; Taddei, Kevin; Newman, Morgan; Lardelli, Michael; Martins, Ralph N.; Verdile, Giuseppe

    2013-01-01

    We investigated the guinea pig, Cavia porcellus, as a model for Alzheimer’s disease (AD), both in terms of the conservation of genes involved in AD and the regulatory responses of these to a known AD risk factor - high cholesterol intake. Unlike rats and mice, guinea pigs possess an Aβ peptide sequence identical to human Aβ. Consistent with the commonality between cardiovascular and AD risk factors in humans, we saw that a high cholesterol diet leads to up-regulation of BACE1 (β-secretase) transcription and down-regulation of ADAM10 (α-secretase) transcription which should increase release of Aβ from APP. Significantly, guinea pigs possess isoforms of AD-related genes found in humans but not present in mice or rats. For example, we discovered that the truncated PS2V isoform of human PSEN2, that is found at raised levels in AD brains and that increases γ-secretase activity and Aβ synthesis, is not uniquely human or aberrant as previously believed. We show that PS2V formation is up-regulated by hypoxia and a high-cholesterol diet while, consistent with observations in humans, Aβ concentrations are raised in some brain regions but not others. Also like humans, but unlike mice, the guinea pig gene encoding tau, MAPT, encodes isoforms with both three and four microtubule binding domains, and cholesterol alters the ratio of these isoforms. We conclude that AD-related genes are highly conserved and more similar to human than the rat or mouse. Guinea pigs represent a superior rodent model for analysis of the impact of dietary factors such as cholesterol on the regulation of AD-related genes. PMID:23805206

  5. Value-Added Model (VAM) Research for Educational Policy: Framing the Issue

    ERIC Educational Resources Information Center

    Amrein-Beardsley, Audrey; Collins, Clarin; Polasky, Sarah A.; Sloat, Edward F.

    2013-01-01

    In this manuscript, the guest editors of the EPAA Special Issue on "Value-Added Model (VAM) Research for Educational Policy" (1) introduce the background and policy context surrounding the increased use of VAMs for teacher evaluation and accountability purposes across the United States; (2) summarize the five research papers and one…

  6. Elementary School Data Issues for Value-Added Models: Implications for Research

    ERIC Educational Resources Information Center

    Isenberg, Eric; Teh, Bing-ru; Walsh, Elias

    2015-01-01

    Researchers often presume that it is better to use administrative data from grades 4 and 5 than data from grades 6 through 8 for conducting research on teacher effectiveness that uses value-added models because (1) elementary school teachers teach all subjects to their students in self-contained classrooms and (2) classrooms are more homogenous at…

  7. Accounting for Co-Teaching: A Guide for Policymakers and Developers of Value-Added Models

    ERIC Educational Resources Information Center

    Isenberg, Eric; Walsh, Elias

    2015-01-01

    We outline the options available to policymakers for addressing co-teaching in a value-added model. Building on earlier work, we propose an improvement to a method of accounting for co-teaching that treats co-teachers as teams, with each teacher receiving equal credit for co-taught students. Hock and Isenberg (2012) described a method known as the…

  8. The Sensitivity of Value-Added Modeling to the Creation of a Vertical Score Scale

    ERIC Educational Resources Information Center

    Briggs, Derek C.; Weeks, Jonathan P.

    2009-01-01

    The purpose of this study was to evaluate the sensitivity of growth and value-added modeling to the way an underlying vertical score scale has been created. Longitudinal item-level data were analyzed with both student- and school-level identifiers for the entire state of Colorado between 2003 and 2006. Eight different vertical scales were…

  9. Methods for Accounting for Co-Teaching in Value-Added Models. Working Paper

    ERIC Educational Resources Information Center

    Hock, Heinrich; Isenberg, Eric

    2012-01-01

    Isolating the effect of a given teacher on student achievement (value-added modeling) is complicated when the student is taught the same subject by more than one teacher. We consider three methods, which we call the Partial Credit Method, Teacher Team Method, and Full Roster Method, for estimating teacher effects in the presence of co-teaching.…

  10. What Are Error Rates for Classifying Teacher and School Performance Using Value-Added Models?

    ERIC Educational Resources Information Center

    Schochet, Peter Z.; Chiang, Hanley S.

    2013-01-01

    This article addresses likely error rates for measuring teacher and school performance in the upper elementary grades using value-added models applied to student test score gain data. Using a realistic performance measurement system scheme based on hypothesis testing, the authors develop error rate formulas based on ordinary least squares and…

  11. Adding thermal and granularity effects to the effective density fluid model.

    PubMed

    Williams, Kevin L

    2013-05-01

    Previously, an effective density fluid model (EDFM) was developed by the author [J. Acoust. Soc. Am. 110, 2276-2281 (2001)] for unconsolidated granular sediments and applied to sand. The model is a simplification of the full Biot porous media model. Here two additional effects are added to the EDFM model: heat transfer between the liquid and solid at low frequencies and the granularity of the medium at high frequencies. The frequency range studied is 100 Hz-1 MHz. The analytical sound speed and attenuation expressions obtained have no free parameters. The resulting model is compared to ocean data.

  12. Sensor Sharing in Mobile Ad-Hoc Networks

    ERIC Educational Resources Information Center

    Mitra, Pramita

    2013-01-01

    Today's modern mobile devices (such as smartphones and tablets) present great potential for growth of many novel, powerful, but also highly demanding applications. However, most mobile devices/users operate in isolation from one another, i.e., they are not aware of the presence of other devices in their proximity. There are numerous situations…

  13. Applying Ad Hoc Institutional Research Findings to College Strategic Planning

    ERIC Educational Resources Information Center

    Clagett, Craig A.

    2004-01-01

    Environmental scanning, enrollment forecasting, budget analyses, and institutional effectiveness assessment are examples of the explicit contributions institutional research offices make to campus strategic planning.

  14. Report of the AD HOC Committee on Patent Documentation.

    ERIC Educational Resources Information Center

    Urbach, Peter; And Others

    The Committee was established in September 1967 to study and make recommendations on Recommendation XXIX and XXX of the Report of the President's Commission on the Patent System. Based on interviews with Patent Office officials, patent examiners and classifiers and a review of Patent Office studies and documents, the Committee concluded that the…

  15. Report of the Ad Hoc Group for Irradiated Food Program

    DTIC Science & Technology

    1975-05-01

    food irradiation technology. The last briefer of this session was from the Energy Research and Development Administration, who monitors the...34remnants" of the Atomic Energy Commissions low-dosti irradiation program (Memoranduum For Record at Appendix F). In addition to inputs from these meetings...Agriculture, and State; the Energy Research and Development Administration; the National Science Foundation; the International Congress of Radiation

  16. Space-Time Processing for Tactical Mobile Ad Hoc Networks

    DTIC Science & Technology

    2007-08-01

    In both cases the impact of jamming and hostile intercept is being considered. The possibility of hostile action to deny services or exploit the...network accessing to a common access point. We see that the ace-only scheme is ur future plan includes orks under partial loading (as opposed to...time scheme and the sp remarkable. Future plan : O • Effect of channel estimation errors on throughput of large networks • Fundamental understanding

  17. Reinforcement learning for routing in cognitive radio ad hoc networks.

    PubMed

    Al-Rawi, Hasan A A; Yau, Kok-Lim Alvin; Mohamad, Hafizal; Ramli, Nordin; Hashim, Wahidah

    2014-01-01

    Cognitive radio (CR) enables unlicensed users (or secondary users, SUs) to sense for and exploit underutilized licensed spectrum owned by the licensed users (or primary users, PUs). Reinforcement learning (RL) is an artificial intelligence approach that enables a node to observe, learn, and make appropriate decisions on action selection in order to maximize network performance. Routing enables a source node to search for a least-cost route to its destination node. While there have been increasing efforts to enhance the traditional RL approach for routing in wireless networks, this research area remains largely unexplored in the domain of routing in CR networks. This paper applies RL in routing and investigates the effects of various features of RL (i.e., reward function, exploitation, and exploration, as well as learning rate) through simulation. New approaches and recommendations are proposed to enhance the features in order to improve the network performance brought about by RL to routing. Simulation results show that the RL parameters of the reward function, exploitation, and exploration, as well as learning rate, must be well regulated, and the new approaches proposed in this paper improves SUs' network performance without significantly jeopardizing PUs' network performance, specifically SUs' interference to PUs.

  18. IPv6 Autoconfiguration for Mobile Ad-Hoc Networks: AUTOLSR

    DTIC Science & Technology

    2010-09-01

    these are the MANET border routers ( MBR ). Each network partition is characterized by a network parameter set (NPS) which includes sufficient...of time ; and depending on operative conditions, later may be joined. MBR ware gateways for communication between tactical MANETs and command centers...list have already been applied, a random suffix is generated. 1.4 MANET border router The MBR (MANET Border Router) has two roles: it serves as a

  19. Army Science Board Ad Hoc Subgroup Report, Manning Army Systems

    DTIC Science & Technology

    1982-09-01

    Jr. (USMC-Ret) Dr. K. C. Emerson Dr. P. Phillip Sidwell Dr. John R. Tooley SECURITY CLASSIFICATION OF THIS PAGEOWi"! Data Et .1 I DEPARTMENT OF...Drive Sanibel, FL 33957 (813) 472-9156 Dr. P. Phillip Sidwell Post Office Box 88531 Atlanta, GA 30338 (404) 394-2548 Dr. John R. Tooley ...30338 . Dr. John R. Tooley * Dean, School of Engineering and Applied Science University of Evansvllle Post Office Box 329 Evansvllle, IN 47702 DIST-4 1 •I

  20. Secure Ad Hoc Networking on an Android Platform

    DTIC Science & Technology

    2014-05-01

    Haselsteiner, E. & Breitfuß, K. (2006) Security in near field communication (nfc), in Workshop on RFID Security RFIDSec. Khan, S., Banuri, S. H. K...security on mobile phones, in Workshop on RFID Security–RFIDSec09. UNCLASSIFIED 21 DSTO–TN–1390 UNCLASSIFIED Appendix A Certificate Authority Key

  1. Enabling Secure High-Performance Wireless Ad Hoc Networking

    DTIC Science & Technology

    2003-05-29

    destinations, consuming energy and available bandwidth. An attacker may similarly create a routing black hole , in which all packets are dropped: by sending...all nodes in an area of the network to point “into” that area when in fact the destination is outside the area. As a special case of a black hole , an...may attempt the following attacks: • Create a gray hole or black hole by removing nodes in a ROUTE REQUEST; however, the per- hop hash mechanism in

  2. Cross-Layered Security Analysis of Wireless Ad Hoc Networks

    DTIC Science & Technology

    2004-12-01

    considerations. Some possible attacks include route disruption attacks such as routing loops, sink holes ( black holes , grey holes , etc.), sub optimal...attempt to jam the communications channel, they can create a wormhole , and as an extreme attack, we assume they can eliminate nodes from the network...spectrum technology and codes resilient to malicious interference. On the other side, a wormhole is very difficult to prevent. However, when the MAC

  3. Ad hoc methods for accurate determination of Bader's atomic boundary

    NASA Astrophysics Data System (ADS)

    Polestshuk, Pavel M.

    2013-08-01

    In addition to the recently published triangulation method [P. M. Polestshuk, J. Comput. Chem. 34, 206 (2013)], 10.1002/jcc.23121, two new highly accurate approaches, ZFSX and SINTY, for the integration over an atomic region covered by a zero-flux surface (zfs) were developed and efficiently interfaced into the TWOE program. ZFSX method was realized as three independent modules (ZFSX-1, ZFSX-3, and ZFSX-5) handling interatomic surfaces of a different complexity. Details of algorithmic implementation of ZFSX and SINTY are discussed. A special attention to an extended analysis of errors in calculations of atomic properties is paid. It was shown that uncertainties in zfs determination caused by ZFSX and SINTY approaches contribute negligibly (less than 10-6 a.u.) to the total atomic integration errors. Moreover, the new methods are able to evaluate atomic integrals with a reasonable time and can be universally applied for the systems of any complexity. It is suggested, therefore, that ZFSX and SINTY can be regarded as benchmark methods for the computation of any Quantum Theory of Atoms in Molecules atomic property.

  4. Space-Time Processing for Tactical Mobile Ad Hoc Networks

    DTIC Science & Technology

    2009-08-01

    transmissions. a) Average SEP/ BEP analysis with Channel Estimation Errors and Feedback Delay In this work, we analyze average symbol error probability...packet has to be re-transmitted. 64 Extensive analytical results quantifying the impact of fading on average symbol and error probability (SEP/ BEP ...are available for various modulation schemes. However, in slow fading situations, there is no mapping between the average SEP/ BEP and the average PEP

  5. Network Management System for Tactical Mobile Ad Hoc Network Segments

    DTIC Science & Technology

    2011-09-01

    Protocol UFO UHF Follow-On UHF Ultra High Frequency USB Universal Serial Bus VHF Very High Frequency VIRT Valuable Information at the Right Time...military satellite system known as the UHF Follow-on system ( UFO ) only provides capacity for 600 concurrent users. DoD users also have commercial

  6. Flow Control in Wireless Ad-Hoc Networks

    DTIC Science & Technology

    2009-01-01

    these mechanisms can be improved in order to fine-tune TCP under various networking environments. Low, Paganini and Doyle [36] study TCP from a control...Derivative Securities, M. A. H. Dempster and S. R. Pliska, Eds., vol. 16. Cambridge University Press , 1997, pp. 504–527. [30] KUSHNER, H. J., AND DIMASI...wireless networks: Optimality and stability. IEEE Trans- actions on Information Theory 55, 9 (Sept. 2009), 4087–4098. 76 [36] LOW, S. H., PAGANINI , F

  7. Mobile Ad-Hoc Networking on Android Devices

    DTIC Science & Technology

    2014-03-01

    2012 Android and iOS devices dominated the market share with 75.0% and 14.9%, respectively (5). This strongly suggested Android devices as our platform...networks, it lacks the ability to create them. This lack of ability and the fact that the Android operating system is open source, while iOS is very...Battlefield Scenarios; U.S. Army Research Laboratory: Aberdeen Proving Ground, MD To be published in 2014. 4. Kerr, D. Android beats iOS 5-to-1 in Q3

  8. Device Discovery in Frequency Hopping Wireless Ad Hoc Networks

    DTIC Science & Technology

    2004-09-01

    Thesis, Blekinge Institute of Technology, Available: http://www.inst-informatica.pt/v20/cid/ biblioteca digital /telecomunicacoes...Single-Channel Ground And Airborne Radio System,” Available: http://www.fas.org/man/dod-101/sys/land/docs/sincgars.pdf, 1996. Skl01. B. Sklar, Digital

  9. Reinforcement Learning for Routing in Cognitive Radio Ad Hoc Networks

    PubMed Central

    Al-Rawi, Hasan A. A.; Mohamad, Hafizal; Hashim, Wahidah

    2014-01-01

    Cognitive radio (CR) enables unlicensed users (or secondary users, SUs) to sense for and exploit underutilized licensed spectrum owned by the licensed users (or primary users, PUs). Reinforcement learning (RL) is an artificial intelligence approach that enables a node to observe, learn, and make appropriate decisions on action selection in order to maximize network performance. Routing enables a source node to search for a least-cost route to its destination node. While there have been increasing efforts to enhance the traditional RL approach for routing in wireless networks, this research area remains largely unexplored in the domain of routing in CR networks. This paper applies RL in routing and investigates the effects of various features of RL (i.e., reward function, exploitation, and exploration, as well as learning rate) through simulation. New approaches and recommendations are proposed to enhance the features in order to improve the network performance brought about by RL to routing. Simulation results show that the RL parameters of the reward function, exploitation, and exploration, as well as learning rate, must be well regulated, and the new approaches proposed in this paper improves SUs' network performance without significantly jeopardizing PUs' network performance, specifically SUs' interference to PUs. PMID:25140350

  10. Ad Hoc Network Architecture for Multi-Media Networks

    DTIC Science & Technology

    2007-12-01

    Ethernet traffic while 1.9On  characterizes video traffic. These four parameters are in the range of self-similarity (i.e. , H is the Hurst ...For self-similar traffic,  falls in the range of 1 2  [24], which is related to . H is the Hurst parameter given in Equation 0.5 1H  (3.4...2y x , which is the exponent of  1 r , can be separated into 1 2y x     . Thus, Equation (4.2) is the new equation used to compute and . In

  11. A Survey on Trust Management for Mobile Ad Hoc Networks

    DTIC Science & Technology

    2010-07-01

    negative consequences if the expectation is not conrmed than positive consequences if it is conrmed. In addition, Hardin [27] and Rotter [28...insights provided by our internal ARL staff including Eliza- beth Bowman, Kevin Chan, Natalie Ivanic, and Brian Rivera. The authors also give special...Processes, Carl Hovland Memorial Lectures Series, New Haven and London: Yale University Press, 1973. [27] R. Hardin , “The Street-Level Epistemology of

  12. Resource Management in Multi-hop Ad Hoc Networks

    DTIC Science & Technology

    1999-11-21

    Communications Review, 27(5), 1996. Read from http://www.ece.orst.edu/s̃ingh/papers.html. [8] M. Scott Corson and Anthony Ephremides. A Distributed Routing...France, October 1997. [32] Vincent D. Park and M. Scott Corson . A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks. In...Proceedings of INFOCOM’97, pages 1405–1413, April 1997. [33] Vincent D. Park and M. Scott Corson . A Performance Comparison of TORA and Ideal Link State

  13. Performance Analysis of Mobile Ad Hoc Networking Routing Protocols

    DTIC Science & Technology

    2004-12-01

    process of establishing the DAG is similar to the query and reply process as proposed in a light-weight mobile routing (LMR) [ Corson 1995]. Upon link...2004. [RIP RFC] RIP Version 2 RFC Website. http://www.faqs.org/rfcs/rfc2453.html accessed on 1 October 2004. [Royer 1999] Elizabeth M. Royer & C

  14. Robust Connectivity in Sensory and Ad Hoc Network

    DTIC Science & Technology

    2011-02-01

    known that, for a scalar Gaussian MAC, orthogonal transmissions, e.g., frequency division multiple access ( FDMA ) or time division multiple access...TDMA) under an average power constraint, can achieve the sum capacity [11]. As such, although FDMA and TDMA is suboptimal in terms of the entire...proportional singular values, well aligned singular vectors and appropriate power constraints in order for FDMA /TDMA to achieve the sum capacity

  15. Ad hoc methods for accurate determination of Bader's atomic boundary.

    PubMed

    Polestshuk, Pavel M

    2013-08-07

    In addition to the recently published triangulation method [P. M. Polestshuk, J. Comput. Chem. 34, 206 (2013)], two new highly accurate approaches, ZFSX and SINTY, for the integration over an atomic region covered by a zero-flux surface (zfs) were developed and efficiently interfaced into the TWOE program. ZFSX method was realized as three independent modules (ZFSX-1, ZFSX-3, and ZFSX-5) handling interatomic surfaces of a different complexity. Details of algorithmic implementation of ZFSX and SINTY are discussed. A special attention to an extended analysis of errors in calculations of atomic properties is paid. It was shown that uncertainties in zfs determination caused by ZFSX and SINTY approaches contribute negligibly (less than 10(-6) a.u.) to the total atomic integration errors. Moreover, the new methods are able to evaluate atomic integrals with a reasonable time and can be universally applied for the systems of any complexity. It is suggested, therefore, that ZFSX and SINTY can be regarded as benchmark methods for the computation of any Quantum Theory of Atoms in Molecules atomic property.

  16. Self-organized Anonymous Authentication in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Freudiger, Julien; Raya, Maxim; Hubaux, Jean-Pierre

    Pervasive communications bring along new privacy challenges, fueled by the capability of mobile devices to communicate with, and thus “sniff on”, each other directly. We design a new mechanism that aims at achieving location privacy in these forthcoming mobile networks, whereby mobile nodes collect the pseudonyms of the nodes they encounter to generate their own privacy cloaks. Thus, privacy emerges from the mobile network and users gain control over the disclosure of their locations. We call this new paradigm self-organized location privacy. In this work, we focus on the problem of self-organized anonymous authentication that is a necessary prerequisite for location privacy. We investigate, using graph theory, the optimality of different cloak constructions and evaluate with simulations the achievable anonymity in various network topologies. We show that peer-to-peer wireless communications and mobility help in the establishment of self-organized anonymous authentication in mobile networks.

  17. Diffractive deep inelastic scattering in an AdS/CFT inspired model: A phenomenological study

    SciTech Connect

    Betemps, M. A.; Goncalves, V. P.; Santana Amaral, J. T. de

    2010-05-01

    The analytical treatment of the nonperturbative QCD dynamics is one of the main open questions of the strong interactions. Currently, it is only possible to get some qualitative information about this regime considering other QCD-like theories, as, for example, the N=4 super Yang-Mills theory, where one can perform calculations in the nonperturbative limit of large 't Hooft coupling using the anti-de Sitter space/conformal field theory (AdS/CFT). Recently, the high energy scattering amplitude was calculated in the AdS/CFT approach, applied to deep-inelastic scattering and confronted with the F{sub 2} HERA data. In this work we extend the nonperturbative AdS/CFT inspired model for diffractive processes and compare its predictions with a perturbative approach based on the Balitsky-Kovchegov equation. We demonstrate that the AdS/CFT inspired model is not able to describe the current F{sub 2}{sup D(3)} HERA data and predicts a similar behavior to that from the Balitsky-Kovchegov equation in the range 10{sup -7} < or approx. x{sub P} < or approx. 10{sup -4}. At smaller values of x{sub P} the diffractive structure function is predicted to be energy independent.

  18. Effectiveness Measures for Cross-Sectional Studies: A Comparison of Value-Added Models and Contextualised Attainment Models

    ERIC Educational Resources Information Center

    Lenkeit, Jenny

    2013-01-01

    Educational effectiveness research often appeals to "value-added models (VAM)" to gauge the impact of schooling on student learning net of the effect of student background variables. A huge amount of cross-sectional studies do not, however, meet VAM's requirement for longitudinal data. "Contextualised attainment models (CAM)"…

  19. Full vector archaeomagnetic data and Bayesian modelling for 1300 to 1750 AD

    NASA Astrophysics Data System (ADS)

    Schnepp, E.; Lanos, P.; Chauvin, A.

    2009-04-01

    The data base of geomagnetic palaeointensities obtained from archaeological artefacts is poor and very scattered for Western and Central Europe. High precision palaeointensities have been determined from a single archaeological site in Lübeck (Germany) where a sequence of 25 bread-oven-floors has been preserved in a bakery from medieval times until today. Age dating confines the time interval from about 1300 AD to about 1750 AD. Palaeomagnetic directions have been determined from each oven-floor (Schnepp et al., JGR, 2003). Palaeointensity was measured from selected specimens with the double-heating Thellier method and reliable palaeointensity results have been obtained. Tests for thermoremanent magnetisation anisotropy have been performed, but did not show a significant change, while a cooling rate correction was not necessary. 22 mean palaeointensity values derived from the oven-floors show maxima in the 15th and early 17th century AD, followed by a decrease of palaeointensity of about 25% until 1750 AD. The Thellier experiments provided also new characteristic remanent magnetisation directions which were included in the data set. Mean directions have been recalculated. Palaeointensity together with the directions represent a record of about 450 years full vector secular variation. From this full vector data set a secular variation curve has been calculated using a Bayesian modelling taking dating errors, all errors on the field vector and stratigraphy into account. A smooth curve with an error envelope was obtained which compares very well with the gufm1 geomagnetic model (Jackson et al., Phil. Trans. R. Soc. Lond. A, 2000) obtained from historical observations starting at 1600 AD. Comparison of the marginal curve obtained for palaeointensity with a selected data set of archaeomagnetic intensities from Western and Central Europe will be discussed.

  20. Modelling tsunami sedimentation associated with the AD 1755 event in Algarve (Portugal)

    NASA Astrophysics Data System (ADS)

    Costa, P. J. M.; Gelfenbaum, G. R.; La Selle, S.; Costas, S.; Andrade, C.; Cascalho, J.; Freitas, M. C.

    2015-12-01

    Numerical models of tsunami inundation and sedimentation can provide useful insights into the dynamics of palaeotsunamis. We applied a coupled field data and numerical modelling approach for the AD1755 tsunami, the most destructive tsunami to affect the Atlantic coast of Europe in historical times. At Salgados, a lowland on the south coast of Portugal, tsunami deposits from AD1755 mostly consist of massive or normally-graded, landward thinning layers of shell-rich sand with an erosive base within the mud-dominated lowlands. Landward of the foredune, the AD1755 deposit is roughly 10cm thick and thins in the landward and alongshore directions. It is possible to ascribe the sediment source of this deposit to the dune and/or beach based on mineralogical and grain-size comparisons with modern surface samples. The present dune crest height is 6 m above MSL (mean sea level) near the seasonally-closed inlet of the lagoon, and rises alongshore towards the west up to 17m above MSL. From the combination of the spatial distribution of the deposit thickness landward of the sloping dune, and GPR data, which shows an erosional surface at approximately 6m above MSL, we infer that the maximum tsunami water level at the coast was between 6 and 10m. Regional tsunami historical records, however, suggest higher heights, up to 12m above MSL at the coast. We simulated tsunami inundation and sediment transport using Delft3D to examine these discrepancies. A 1D cross shore model was used to test flow height controls on deposit thickness and also to identify the sediment source of the AD1755 deposit. Four possible sediment sources were tested (nearshore, beach, dune and lagoon) using synthetic, long-period waves to simulate the AD1755 tsunami. The combination of geological studies with numerical modeling of inundation and sediment transport produces a better description of the AD1755 tsunami and its effects in coastal areas in the Algarve that will contribute to better hazard assessments.

  1. Value-Added Modeling of Teacher Effectiveness: An Exploration of Stability across Models and Contexts

    ERIC Educational Resources Information Center

    Newton, Xiaoxia A.; Darling-Hammond, Linda; Haertel, Edward; Thomas, Ewart

    2010-01-01

    Recent policy interest in tying student learning to teacher evaluation has led to growing use of value-added methods for assessing student learning gains linked to individual teachers. VAM analyses rely on complex assumptions about the roles of schools, multiple teachers, student aptitudes and efforts, homes and families in producing measured…

  2. The VIS-AD data model: Integrating metadata and polymorphic display with a scientific programming language

    NASA Technical Reports Server (NTRS)

    Hibbard, William L.; Dyer, Charles R.; Paul, Brian E.

    1994-01-01

    The VIS-AD data model integrates metadata about the precision of values, including missing data indicators and the way that arrays sample continuous functions, with the data objects of a scientific programming language. The data objects of this data model form a lattice, ordered by the precision with which they approximate mathematical objects. We define a similar lattice of displays and study visualization processes as functions from data lattices to display lattices. Such functions can be applied to visualize data objects of all data types and are thus polymorphic.

  3. Homoclinic Spike adding in a neuronal model in the presence of noise

    NASA Astrophysics Data System (ADS)

    Fuwape, Ibiyinka; Neiman, Alexander; Shilnikov, Andrey

    2008-03-01

    We study the influence of noise on a spike adding transitions within the bursting activity in a Hodgkin-Huxley-type model of the leech heart interneuron. Spike adding in this model occur via homoclinic bifurcation of a saddle periodic orbit. Although narrow chaotic regions are observed near bifurcation transition, overall bursting dynamics is regular and is characterized by a constant number of spikes per burst. Experimental studies, however, show variability of bursting patterns whereby number of spikes per burst varies randomly. Thus, introduction of external synaptic noise is a necessary step to account for variability of burst durations observed experimentally. We show that near every such transition the neuron is highly sensitive to random perturbations that lead to and enhance broadly the regions of chaotic dynamics of the cell. For each spike adding transition there is a critical noise level beyond which the dynamics of the neuron becomes chaotic throughout the entire region of the given transition. Noise-induced chaotic dynamics is characterized in terms of the Lyapunov exponents and the Shannon entropy and reflects variability of firing patterns with various numbers of spikes per burst, traversing wide range of the neuron's parameters

  4. Constraints on tachyon inflationary models with an AdS/CFT correspondence

    NASA Astrophysics Data System (ADS)

    Bouabdallaoui, Zahra; Errahmani, Ahmed; Bouhmadi-López, Mariam; Ouali, Taoufik

    2016-12-01

    To study the effect of the anti-de Sitter/conformal field theory correspondence (AdS/CFT) on the primordial inflationary era, we consider a universe filled with a tachyon field in a slow-roll regime. In this context, the background and perturbative parameters characterizing the inflationary era are related to the standard one by correction terms. We show a clear agreement between the theoretical prediction and the observational data for the above-mentioned model. The main results of our work are illustrated for an exponential potential. We show that, for a suitable conformal anomaly coefficient, AdS/CFT correspondence might leave its imprints on the spectrum of the gravitational waves amplitude with a tensor to scalar ratio, r , of the perturbations compatible with Planck data.

  5. Spin Matrix theory: a quantum mechanical model of the AdS/CFT correspondence

    NASA Astrophysics Data System (ADS)

    Harmark, Troels; Orselli, Marta

    2014-11-01

    We introduce a new quantum mechanical theory called Spin Matrix theory (SMT). The theory is interacting with a single coupling constant g and is based on a Hilbert space of harmonic oscillators with a spin index taking values in a Lie (super)algebra representation as well as matrix indices for the adjoint representation of U( N). We show that SMT describes super-Yang-Mills theory (SYM) near zero-temperature critical points in the grand canonical phase diagram. Equivalently, SMT arises from non-relativistic limits of SYM. Even though SMT is a non-relativistic quantum mechanical theory it contains a variety of phases mimicking the AdS/CFT correspondence. Moreover, the g → ∞ limit of SMT can be mapped to the supersymmetric sector of string theory on AdS5 × S 5. We study SU(2) SMT in detail. At large N and low temperatures it is a theory of spin chains that for small g resembles planar gauge theory and for large g a non-relativistic string theory. When raising the temperature a partial deconfinement transition occurs due to finite- N effects. For sufficiently high temperatures the partially deconfined phase has a classical regime. We find a matrix model description of this regime at any coupling g. Setting g = 0 it is a theory of N 2 + 1 harmonic oscillators while for large g it becomes 2 N harmonic oscillators.

  6. Inverse magnetic catalysis in the soft-wall model of AdS/QCD

    NASA Astrophysics Data System (ADS)

    Li, Danning; Huang, Mei; Yang, Yi; Yuan, Pei-Hung

    2017-02-01

    Magnetic effects on chiral phase transition have been investigated in a modified soft-wall AdS/QCD model, in which the dilaton field is taken to be negative at the ultraviolet region and positive at the infrared region as in Phys. Rev. D 93 (2016) 101901 and JHEP 04 (2016) 036. The magnetic field is introduced into the background geometry by solving the Einstein-Maxwell system. After embedding the magnetized background geometry into the modified soft-wall model, the magnetic field dependent behavior of chiral condensate is worked out numerically. It is found that, in the chiral limit, the chiral phase transition remains as a second order at finite magnetic field B, while the symmetry restoration temperature and chiral condensate decrease with the increasing of magnetic field in small B region. When including finite quark mass effect, the phase transition turns to be a crossover one, and the transition temperature still decreases with increasing magnetic field B when B is not very large. In this sense, inverse magnetic catalysis effect is observed in this modified soft-wall AdS/QCD model.

  7. The value of adding optics to ecosystem models: a case study

    NASA Astrophysics Data System (ADS)

    Fujii, M.; Boss, E.; Chai, F.

    2007-05-01

    matter to the modeled properties. Coupling explicit optics to an ecosystem model provides several advantages in generating: (1) a more accurate subsurface light-field, which is important for light sensitive biogeochemical processes such as photosynthesis and photo-oxidation, (2) added constraints on model parameters that help to reduce uncertainties in ecosystem model simulations, and (3) model output which is comparable to basic remotely-sensed properties. In addition, the coupling of biogeochemical models and optics paves the road for future assimilation of ocean color and in-situ measured optical properties into the models.

  8. Discounting testimony with the argument ad hominem and a Bayesian congruent prior model.

    PubMed

    Bhatia, Jaydeep-Singh; Oaksford, Mike

    2015-09-01

    When directed to ignore evidence of a witness's previous bad character because of a violation of the rules of evidence, are jurors' beliefs still affected? The intuition is that they will be because in everyday argumentation, fallacies, like the ad hominem, are effective argumentative strategies. An ad hominem argument (against the person) undermines a conclusion by questioning the character of the proposer. This intuition divides current theories of argumentation. According to pragmadialectical theory (e.g., Van Eemeren & Grootendorst, 2004), procedural rules exactly like the rules of evidence are part of our cognitive resources for evaluating arguments. If one of these rules is violated, an argument should be treated as a fallacy and so it should not alter someone's belief in the conclusion. Some recent experiments investigating how reasonable these arguments are perceived to be seem to support this account (van Eemeren, Garssen, & Meuffels, 2009). These experiments are critiqued from the perspective of the relevance (Walton, 2009, 2010) and epistemic (Hahn & Oaksford, 2006, 2007; Oaksford & Hahn, 2004) approaches to argumentation. An experiment investigates the predictions of these approaches for a graded belief change version of van Eemeren et al.'s (2009) experiment, and the results are modeled using a Bayesian congruent prior model. These results cannot be explained by the pragmadialectical approach and show that in everyday argument people are extremely sensitive to the epistemic relevance of evidence. Moreover, it seems highly unlikely that this can be switched off in more formal contexts such as the courtroom.

  9. Naringenin ameliorates Alzheimer's disease (AD)-type neurodegeneration with cognitive impairment (AD-TNDCI) caused by the intracerebroventricular-streptozotocin in rat model.

    PubMed

    Khan, M Badruzzaman; Khan, Mohd Moshahid; Khan, Andleeb; Ahmed, Md Ejaz; Ishrat, Tauheed; Tabassum, Rizwana; Vaibhav, Kumar; Ahmad, Ajmal; Islam, Fakhrul

    2012-12-01

    Oxidative stress is involved in Alzheimer's disease (AD)-type neurodegeneration with cognitive impairment (AD-TNDCI) as well as age related cognitive deficit. The present study was designed to investigate the pre-treatment effects of naringenin (NAR), a polyphenolic compound on cognitive dysfunction, oxidative stress in the hippocampus, and hippocampal neuron injury in a rat model of AD-TNDCI. The rats were pre-treated with NAR at a selective dose (50mg/kg, orally) for 2 weeks followed by intracerebroventricular-streptozotocin (ICV-STZ) (3mg/kg; 5μl per site) injection bilaterally. Behavioral alterations were monitored after 2 weeks from the lesion using passive avoidance test and Morris water maze paradigm. Three weeks after the lesion, the rats were sacrificed for measuring non-enzymatic [4-hydroxynonenal (4-HNE), malonaldehyde (MDA), thiobarbituric reactive substances (TBARS), hydrogen peroxide (H(2)O(2)), protein carbonyl (PC), reduced glutathione (GSH)] content and enzymatic [glutathione peroxidase (GPx), glutathione reductase (GR), glutathione-S-transferase (GST), superoxide dismutase (SOD), catalase (CAT) and Na(+)/K(+)-ATPase] activity in the hippocampus, and expression of choline acetyltransferase (ChAT) positive neuron, and histopathology of hippocampal neurons. The non-enzymatic level and enzymatic activity was significantly increased and decreased, respectively, with striking impairments in spatial learning and memory, loss of ChAT positive neuron and severe damage to hippocampal neurons in the rat induced by ICV-STZ. These abnormalities were significantly improved by NAR pre-treatment. The study suggests that NAR can protect against cognitive deficits, neuronal injury and oxidative stress induced by ICV-STZ, and may be used as a potential agent in treatment of neurodegenerative diseases such as AD-TNDCI.

  10. Assessing State Models of Value-Added Teacher Evaluations: Alignment of Policy, Instruments, and Literature-Based Concepts

    ERIC Educational Resources Information Center

    Hutchison-Lupardus, Tammy R.; Hatfield, Timothy E.; Snyder, Jennifer E.

    2012-01-01

    This problem-based learning project addressed the need to improve the construction and implementation of value-added teacher evaluation policies and instruments. State officials are constructing value-added teacher evaluation models due to accountability initiatives, while ignoring the holes and problems in its implementation. The team's…

  11. Does Student Sorting Invalidate Value-Added Models of Teacher Effectiveness? An Extended Analysis of the Rothstein Critique

    ERIC Educational Resources Information Center

    Koedel, Cory; Betts, Julian R.

    2011-01-01

    Value-added modeling continues to gain traction as a tool for measuring teacher performance. However, recent research questions the validity of the value-added approach by showing that it does not mitigate student-teacher sorting bias (its presumed primary benefit). Our study explores this critique in more detail. Although we find that estimated…

  12. A Correlated Random Effects Model for Nonignorable Missing Data in Value-Added Assessment of Teacher Effects

    ERIC Educational Resources Information Center

    Karl, Andrew T.; Yang, Yan; Lohr, Sharon L.

    2013-01-01

    Value-added models have been widely used to assess the contributions of individual teachers and schools to students' academic growth based on longitudinal student achievement outcomes. There is concern, however, that ignoring the presence of missing values, which are common in longitudinal studies, can bias teachers' value-added scores.…

  13. The added value of high-resolution climate modeling of the Greenland Ice Sheet

    NASA Astrophysics Data System (ADS)

    van de Berg, Willem Jan; van Meijgaard, Erik; van Ulft, Bert; Machguth, Horst; Noël, Brice; van den Broeke, Michiel

    2016-04-01

    The local surface mass balance (SMB) of glaciers and ice sheets is to a very high extent related to topography. Subsequently, spatial variability in the SMB is also related to the spatial scales in the topography. The typical topographic length scales on the Greenland Ice Sheet are from several to over hundred kilometers. Therefore, regional climate models with resolutions between 5 and 25 kilometers normally capture the SMB of the Greenland Ice Sheet well. In this study, we analyze the added value of high-resolution regional climate simulations compared to statistical downscaling. For this aim, the regional climate model RACMO2 has been run for South Greenland for the period 2007-2014 using resolutions of 60, 20, 6.6 and 2.2 kilometer. Modeled and downscaled SMB from these four simulations are analyzed and evaluated against ablation observations. Our results show that the strong correlation of runoff to elevation makes statistical downscaling a robust tool to refine modeled spatial SMB patterns. However, only high-resolution climate modeling can improve the physical representation of the SMB in lower ablation zone, because the summertime interaction between the warm air over the tundra and the colder air over the ice sheet starts to be resolved. As a result, the runoff in the lower ablation zone is more enhanced compared to lower resolution simulations and statistical downscaled SMB.

  14. SOA-based model for value-added ITS services delivery.

    PubMed

    Herrera-Quintero, Luis Felipe; Maciá-Pérez, Francisco; Marcos-Jorquera, Diego; Gilart-Iglesias, Virgilio

    2014-01-01

    Integration is currently a key factor in intelligent transportation systems (ITS), especially because of the ever increasing service demands originating from the ITS industry and ITS users. The current ITS landscape is made up of multiple technologies that are tightly coupled, and its interoperability is extremely low, which limits ITS services generation. Given this fact, novel information technologies (IT) based on the service-oriented architecture (SOA) paradigm have begun to introduce new ways to address this problem. The SOA paradigm allows the construction of loosely coupled distributed systems that can help to integrate the heterogeneous systems that are part of ITS. In this paper, we focus on developing an SOA-based model for integrating information technologies (IT) into ITS to achieve ITS service delivery. To develop our model, the ITS technologies and services involved were identified, catalogued, and decoupled. In doing so, we applied our SOA-based model to integrate all of the ITS technologies and services, ranging from the lowest-level technical components, such as roadside unit as a service (RSUAAS), to the most abstract ITS services that will be offered to ITS users (value-added services). To validate our model, a functionality case study that included all of the components of our model was designed.

  15. SOA-Based Model for Value-Added ITS Services Delivery

    PubMed Central

    Herrera-Quintero, Luis Felipe; Maciá-Pérez, Francisco; Marcos-Jorquera, Diego; Gilart-Iglesias, Virgilio

    2014-01-01

    Integration is currently a key factor in intelligent transportation systems (ITS), especially because of the ever increasing service demands originating from the ITS industry and ITS users. The current ITS landscape is made up of multiple technologies that are tightly coupled, and its interoperability is extremely low, which limits ITS services generation. Given this fact, novel information technologies (IT) based on the service-oriented architecture (SOA) paradigm have begun to introduce new ways to address this problem. The SOA paradigm allows the construction of loosely coupled distributed systems that can help to integrate the heterogeneous systems that are part of ITS. In this paper, we focus on developing an SOA-based model for integrating information technologies (IT) into ITS to achieve ITS service delivery. To develop our model, the ITS technologies and services involved were identified, catalogued, and decoupled. In doing so, we applied our SOA-based model to integrate all of the ITS technologies and services, ranging from the lowest-level technical components, such as roadside unit as a service (RSUAAS), to the most abstract ITS services that will be offered to ITS users (value-added services). To validate our model, a functionality case study that included all of the components of our model was designed. PMID:25019101

  16. AdS and stabilized extra dimensions in multi-dimensional gravitational models with nonlinear scalar curvature terms R-1 and R4

    NASA Astrophysics Data System (ADS)

    Günther, Uwe; Zhuk, Alexander; Bezerra, Valdir B.; Romero, Carlos

    2005-08-01

    We study multi-dimensional gravitational models with scalar curvature nonlinearities of types R-1 and R4. It is assumed that the corresponding higher dimensional spacetime manifolds undergo a spontaneous compactification to manifolds with a warped product structure. Special attention has been paid to the stability of the extra-dimensional factor spaces. It is shown that for certain parameter regions the systems allow for a freezing stabilization of these spaces. In particular, we find for the R-1 model that configurations with stabilized extra dimensions do not provide a late-time acceleration (they are AdS), whereas the solution branch which allows for accelerated expansion (the dS branch) is incompatible with stabilized factor spaces. In the case of the R4 model, we obtain that the stability region in parameter space depends on the total dimension D = dim(M) of the higher dimensional spacetime M. For D > 8 the stability region consists of a single (absolutely stable) sector which is shielded from a conformal singularity (and an antigravity sector beyond it) by a potential barrier of infinite height and width. This sector is smoothly connected with the stability region of a curvature-linear model. For D < 8 an additional (metastable) sector exists which is separated from the conformal singularity by a potential barrier of finite height and width so that systems in this sector are prone to collapse into the conformal singularity. This second sector is not smoothly connected with the first (absolutely stable) one. Several limiting cases and the possibility of inflation are discussed for the R4 model.

  17. Assessing the effect of adding interactive modeling to the geoscience curriculum

    NASA Astrophysics Data System (ADS)

    Castillo, A.; Marshall, J.; Cardenas, M.

    2013-12-01

    Technology and computer models enhance the learning experience when appropriately utilized. Moreover, learning is significantly improved when effective visualization is combined with models of processes allowing for inquiry-based problem solving. Still, hands-on experiences in real scenarios result in better contextualization of related problems compared to virtual laboratories. Therefore, the role of scientific visualization, technology, and computer modeling is to enhance, not displace, the learning experience by supplementing real-world problem solving and experiences, although in some circumstances, they can adequately serve to take the place of reality. The key to improving scientific education is to embrace an inquiry-based approach that favorably uses technology. This study will attempt to evaluate the effect of adding interactive modeling to the geological sciences curriculum. An assessment tool, designed to assess student understanding of physical hydrology, was used to evaluate a curriculum intervention based on student learning with a data- and modeling-driven approach using COMSOL Multiphysics software. This intervention was implemented in an upper division and graduate physical hydrology course in fall 2012. Students enrolled in the course in fall 2011 served as the control group. Interactive modeling was added to the curriculum in fall 2012 to replace the analogous mathematical modeling done by hand in fall 2011. Pre- and post-test results were used to assess and report its effectiveness. Student interviews were also used to probe student reactions to both the experimental and control curricula. The pre- and post-tests asked students to describe the significant processes in the hydrological cycle and describe the laws governing these processes. Their ability to apply their knowledge in a real-world problem was also assessed. Since the pre- and post-test data failed to meet the assumption of normality, a non-parametric Kruskal-Wallis test was run to

  18. How One School Implements and Experiences Ohio's Value-Added Model: A Case Study

    ERIC Educational Resources Information Center

    Quattrochi, David

    2009-01-01

    Ohio made value-added law in 2003 and incorporated value-added assessment to its operating standards for teachers and administrators in 2006. Value-added data is used to determine if students are making a year's growth at the end of each school year. Schools and districts receive a rating of "Below Growth, Met Growth, or Above Growth" on…

  19. The Will, Skill, Tool Model of Technology Integration: Adding Pedagogy as a New Model Construct

    ERIC Educational Resources Information Center

    Knezek, Gerald; Christensen, Rhonda

    2015-01-01

    An expansion of the Will, Skill, Tool Model of Technology Integration to include teacher's pedagogical style is proposed by the authors as a means of advancing the predictive power for level of classroom technology integration to beyond 90%. Suggested advantages to this expansion include more precise identification of areas to be targeted for…

  20. Adding local components to global functions for continuous covariates in multivariable regression modeling.

    PubMed

    Binder, H; Sauerbrei, W

    2010-03-30

    When global techniques, based on fractional polynomials (FPs), are employed for modeling potentially nonlinear effects of several continuous covariates on a response, accessible model equations are obtained. However, local features might be missed. Therefore, a procedure is introduced, which systematically checks model fits, obtained by the multivariable fractional polynomial (MFP) approach, for overlooked local features. Statistically significant local polynomials are then parsimoniously added. This approach, called MFP + L, is seen to result in an effective control of the Type I error with respect to the addition of local components in a small simulation study with univariate and multivariable settings. Prediction performance is compared with that of a penalized regression spline technique. In a setting unfavorable for FPs, the latter outperforms the MFP approach, if there is much information in the data. However, the addition of local features reduces this performance difference. There is only a small detrimental effect in settings where the MFP approach performs better. In an application example with children's respiratory health data, fits from the spline-based approach indicate many local features, but MFP + L adds only few significant features, which seem to have good support in the data. The proposed approach may be expected to be superior in settings with local features, but retains the good properties of the MFP approach in a large number of settings where global functions are sufficient.

  1. Improving Accuracy in Arrhenius Models of Cell Death: Adding a Temperature-Dependent Time Delay.

    PubMed

    Pearce, John A

    2015-12-01

    The Arrhenius formulation for single-step irreversible unimolecular reactions has been used for many decades to describe the thermal damage and cell death processes. Arrhenius predictions are acceptably accurate for structural proteins, for some cell death assays, and for cell death at higher temperatures in most cell lines, above about 55 °C. However, in many cases--and particularly at hyperthermic temperatures, between about 43 and 55 °C--the particular intrinsic cell death or damage process under study exhibits a significant "shoulder" region that constant-rate Arrhenius models are unable to represent with acceptable accuracy. The primary limitation is that Arrhenius calculations always overestimate the cell death fraction, which leads to severely overoptimistic predictions of heating effectiveness in tumor treatment. Several more sophisticated mathematical model approaches have been suggested and show much-improved performance. But simpler models that have adequate accuracy would provide useful and practical alternatives to intricate biochemical analyses. Typical transient intrinsic cell death processes at hyperthermic temperatures consist of a slowly developing shoulder region followed by an essentially constant-rate region. The shoulder regions have been demonstrated to arise chiefly from complex functional protein signaling cascades that generate delays in the onset of the constant-rate region, but may involve heat shock protein activity as well. This paper shows that acceptably accurate and much-improved predictions in the simpler Arrhenius models can be obtained by adding a temperature-dependent time delay. Kinetic coefficients and the appropriate time delay are obtained from the constant-rate regions of the measured survival curves. The resulting predictions are seen to provide acceptably accurate results while not overestimating cell death. The method can be relatively easily incorporated into numerical models. Additionally, evidence is presented

  2. A non-transgenic mouse model (icv-STZ mouse) of Alzheimer's disease: similarities to and differences from the transgenic model (3xTg-AD mouse).

    PubMed

    Chen, Yanxing; Liang, Zhihou; Blanchard, Julie; Dai, Chun-Ling; Sun, Shenggang; Lee, Moon H; Grundke-Iqbal, Inge; Iqbal, Khalid; Liu, Fei; Gong, Cheng-Xin

    2013-04-01

    Alzheimer's disease (AD) can be divided into sporadic AD (SAD) and familial AD (FAD). Most AD cases are sporadic and result from multiple etiologic factors, including environmental, genetic, and metabolic factors, whereas FAD is caused by mutations in the presenilins or amyloid-β (Aβ) precursor protein (APP) genes. A commonly used animal model for AD is the 3xTg-AD transgenic mouse model, which harbors mutated presenilin 1, APP, and tau genes and thus represents a model of FAD. There is an unmet need in the field to characterize animal models representing different AD mechanisms, so that potential drugs for SAD can be evaluated preclinically in these animal models. A mouse model generated by intracerebroventricular (icv) administration of streptozocin (STZ), the icv-STZ mouse, shows many aspects of SAD. In this study, we compared the non-cognitive and cognitive behaviors as well as biochemical and immunohistochemical alterations between the icv-STZ mouse and the 3xTg-AD mouse. We found that both mouse models showed increased exploratory activity as well as impaired learning and spatial memory. Both models also demonstrated neuroinflammation, altered synaptic proteins and insulin/IGF-1 (insulin-like growth factor-1) signaling, and increased hyperphosphorylated tau in the brain. The most prominent brain abnormality in the icv-STZ mouse was neuroinflammation, and in the 3xTg-AD mouse it was elevation of hyperphosphorylated tau. These observations demonstrate the behavioral and neuropathological similarities and differences between the icv-STZ mouse and the 3xTg-AD mouse models and will help guide future studies using these two mouse models for the development of AD drugs.

  3. Impaired thermoregulation and beneficial effects of thermoneutrality in the 3×Tg-AD model of Alzheimer's disease.

    PubMed

    Vandal, Milene; White, Philip J; Tournissac, Marine; Tremblay, Cyntia; St-Amour, Isabelle; Drouin-Ouellet, Janelle; Bousquet, Melanie; Traversy, Marie-Thérèse; Planel, Emmanuel; Marette, Andre; Calon, Frederic

    2016-07-01

    The sharp rise in the incidence of Alzheimer's disease (AD) at an old age coincides with a reduction in energy metabolism and core body temperature. We found that the triple-transgenic mouse model of AD (3×Tg-AD) spontaneously develops a lower basal body temperature and is more vulnerable to a cold environment compared with age-matched controls. This was despite higher nonshivering thermogenic activity, as evidenced by brown adipose tissue norepinephrine content and uncoupling protein 1 expression. A 24-hour exposure to cold (4 °C) aggravated key neuropathologic markers of AD such as: tau phosphorylation, soluble amyloid beta concentrations, and synaptic protein loss in the cortex of 3×Tg-AD mice. Strikingly, raising the body temperature of aged 3×Tg-AD mice via exposure to a thermoneutral environment improved memory function and reduced amyloid and synaptic pathologies within a week. Our results suggest the presence of a vicious cycle between impaired thermoregulation and AD-like neuropathology, and it is proposed that correcting thermoregulatory deficits might be therapeutic in AD.

  4. Quantum self-consistency of AdS×Σ brane models

    NASA Astrophysics Data System (ADS)

    Flachi, Antonino; Pujolàs, Oriol

    2003-07-01

    Continuing our previous work, we consider a class of higher dimensional brane models with the topology of AdSD1+1×Σ, where Σ is a one-parameter compact manifold and two branes of codimension one are located at the orbifold fixed points. We consider a setup where such a solution arises from Einstein-Yang-Mills theory and evaluate the one-loop effective potential induced by gauge fields and by a generic bulk scalar field. We show that this type of brane model resolves the gauge hierarchy between the Planck and electroweak scales through redshift effects due to the warp factor a=e-πkr. The value of a is then fixed by minimizing the effective potential. We find that, as in the Randall-Sundrum case, the gauge field contribution to the effective potential stabilizes the hierarchy without fine-tuning as long as the Laplacian ΔΣ on Σ has a zero eigenvalue. Scalar fields can stabilize the hierarchy depending on the mass and the nonminimal coupling. We also address the quantum self-consistency of the solution, showing that the classical brane solution is not spoiled by quantum effects.

  5. Modeling Rich Interactions in Session Search - Georgetown University at TREC 2014 Session Track

    DTIC Science & Technology

    2014-11-01

    iterations triggered by query reformulations to accomplish a complex search task. In our groups’ 2013 work [1], we model this interactive process of session...algorithm is set as Language Modeling with Dirichlet smoothing. The smoothing parameter mu is set as 5000. In RL2, we adopt QCM algorithm [1] where we...hoc Retrieval Model (Ad-hoc) Our RL1 approach directly uses the current query of each session as search terms. The retrieval algorithm is Language

  6. Discounting Testimony with the Argument Ad Hominem and a Bayesian Congruent Prior Model

    ERIC Educational Resources Information Center

    Bhatia, Jaydeep-Singh; Oaksford, Mike

    2015-01-01

    When directed to ignore evidence of a witness's previous bad character because of a violation of the rules of evidence, are jurors' beliefs still affected? The intuition is that they will be because in everyday argumentation, fallacies, like the ad hominem, are effective argumentative strategies. An ad hominem argument (against the person)…

  7. Adding-point strategy for reduced-order hypersonic aerothermodynamics modeling based on fuzzy clustering

    NASA Astrophysics Data System (ADS)

    Chen, Xin; Liu, Li; Zhou, Sida; Yue, Zhenjiang

    2016-09-01

    Reduced order models(ROMs) based on the snapshots on the CFD high-fidelity simulations have been paid great attention recently due to their capability of capturing the features of the complex geometries and flow configurations. To improve the efficiency and precision of the ROMs, it is indispensable to add extra sampling points to the initial snapshots, since the number of sampling points to achieve an adequately accurate ROM is generally unknown in prior, but a large number of initial sampling points reduces the parsimony of the ROMs. A fuzzy-clustering-based adding-point strategy is proposed and the fuzzy clustering acts an indicator of the region in which the precision of ROMs is relatively low. The proposed method is applied to construct the ROMs for the benchmark mathematical examples and a numerical example of hypersonic aerothermodynamics prediction for a typical control surface. The proposed method can achieve a 34.5% improvement on the efficiency than the estimated mean squared error prediction algorithm and shows same-level prediction accuracy.

  8. Effusion of hydrophobic organic compounds (HOCs) from fog droplets

    SciTech Connect

    Lee, W.M.; Tsay, C.

    1998-12-31

    In this study, the effects of surface-active substances, pH and salt on the effusion of HOCs from droplets were investigated. An HOCs-effusion reactor was established for experiments. N-octane was used for the HOCs and Sodium Dodecyl Sulfate (SDS) was selected as the surface-active substance. A correction factor to mass exchange constant, defined as the deviation of exchange constant of n-octane in fog phase from that in planar aqueous phase was used to quantify the effects of surface-active substance, pH, and salt concentration on the effusion rate of HOCs from fog droplets by a modified double-layer diffusion model. The results showed that surface-active substances, SDS cab decrease the effusion rate of n-octane from fog droplets by about 40%--62% and the values of were in the range of 0.382 to 0.609. The salt, sodium chloride, at the concentration of 1.00 {times} 10{sup {minus}3} [M] can further decrease the mass transfer rate of n-octane from fog droplets because the values changed from 0.590 to 0.368, so that the effusion rate was further decrease by salt. When pH values were between 5.60 and 2.00, values varied from 0.609 to 0.367 at SDS concentration of 1.00 x 10{sup 3}[M]. This indicated that the effusion rate of HOCs from fog droplets decreased with decreasing pH value.

  9. A Robust Deep Model for Improved Classification of AD/MCI Patients

    PubMed Central

    Li, Feng; Tran, Loc; Thung, Kim-Han; Ji, Shuiwang; Shen, Dinggang; Li, Jiang

    2015-01-01

    Accurate classification of Alzheimer’s Disease (AD) and its prodromal stage, Mild Cognitive Impairment (MCI), plays a critical role in possibly preventing progression of memory impairment and improving quality of life for AD patients. Among many research tasks, it is of particular interest to identify noninvasive imaging biomarkers for AD diagnosis. In this paper, we present a robust deep learning system to identify different progression stages of AD patients based on MRI and PET scans. We utilized the dropout technique to improve classical deep learning by preventing its weight co-adaptation, which is a typical cause of over-fitting in deep learning. In addition, we incorporated stability selection, an adaptive learning factor, and a multi-task learning strategy into the deep learning framework. We applied the proposed method to the ADNI data set and conducted experiments for AD and MCI conversion diagnosis. Experimental results showed that the dropout technique is very effective in AD diagnosis, improving the classification accuracies by 5.9% on average as compared to the classical deep learning methods. PMID:25955998

  10. AERA Statement on Use of Value-Added Models (VAM) for the Evaluation of Educators and Educator Preparation Programs

    ERIC Educational Resources Information Center

    Educational Researcher, 2015

    2015-01-01

    The purpose of this statement is to inform those using or considering the use of value-added models (VAM) about their scientific and technical limitations in the evaluation of educators and programs that prepare teachers. The statement briefly reviews the background and current context of using VAM for evaluations, enumerates specific psychometric…

  11. Propensity Score Methods as Alternatives to Value-Added Modeling for the Estimation of Teacher Contributions to Student Achievement

    ERIC Educational Resources Information Center

    Davison, Kimberlee Kaye Callister

    2012-01-01

    The purpose of this study was to examine the potential for using propensity score-based matching methods to estimate teacher contributions to student learning. Value-added models are increasingly used in teacher accountability systems in the United States in spite of ongoing qualms about the validity of teacher quality estimates resulting from…

  12. Hairy AdS solitons

    NASA Astrophysics Data System (ADS)

    Anabalón, Andrés; Astefanesei, Dumitru; Choque, David

    2016-11-01

    We construct exact hairy AdS soliton solutions in Einstein-dilaton gravity theory. We examine their thermodynamic properties and discuss the role of these solutions for the existence of first order phase transitions for hairy black holes. The negative energy density associated to hairy AdS solitons can be interpreted as the Casimir energy that is generated in the dual filed theory when the fermions are antiperiodic on the compact coordinate.

  13. Beyond Traditional School Value-Added Models: A Multilevel Analysis of Complex School Effects in Chile

    ERIC Educational Resources Information Center

    Troncoso, Patricio; Pampaka, Maria; Olsen, Wendy

    2016-01-01

    School value-added studies have largely demonstrated the effects of socioeconomic and demographic characteristics of the schools and the pupils on performance in standardised tests. Traditionally, these studies have assessed the variation coming only from the schools and the pupils. However, recent studies have shown that the analysis of academic…

  14. Intraplacental gene therapy with Ad-IGF-1 corrects naturally occurring rabbit model of intrauterine growth restriction.

    PubMed

    Keswani, Sundeep G; Balaji, Swathi; Katz, Anna B; King, Alice; Omar, Khaled; Habli, Mounira; Klanke, Charles; Crombleholme, Timothy M

    2015-03-01

    Intrauterine growth restriction (IUGR) due to placental insufficiency is a leading cause of perinatal complications for which there is no effective prenatal therapy. We have previously demonstrated that intraplacental injection of adenovirus-mediated insulin-like growth factor-1 (Ad-IGF-1) corrects fetal weight in a murine IUGR model induced by mesenteric uterine artery branch ligation. This study investigated the effect of intraplacental Ad-IGF-1 gene therapy in a rabbit model of naturally occurring IUGR (runt) due to placental insufficiency, which is similar to the human IUGR condition with onset in the early third trimester, brain sparing, and a reduction in liver weight. Laparotomy was performed on New Zealand White rabbits on day 21 of 30 days of gestation and litters were divided into five groups: Control (first position)+phosphate-buffered saline (PBS), control+Ad-IGF-1, runt (third position)+PBS, runt+Ad-IGF-1, and runt+Ad-LacZ. The effect of IGF-1 gene therapy on fetal, placental, liver, heart, lung, and musculoskeletal weights of the growth-restricted pups was examined. Protein expression after gene transfer was seen along the maternal-fetal placenta interface (n=12) 48 hr after gene therapy. There was minimal gene transfer detected in the pups or maternal organs. At term, compared with the normally grown first-position control, the runted third-position pups demonstrated significantly lower fetal, placental, liver, lung, and musculoskeletal weights. The fetal, liver, and musculoskeletal weights were restored to normal by intraplacental Ad-IGF-1 gene therapy (p<0.01), with no change in the placental weight. Intraplacental gene therapy is a novel strategy for the treatment of IUGR caused by placental insufficiency that takes advantage of an organ that will be discarded at birth. Development of nonviral IGF-1 gene delivery using placenta-specific promoters can potentially minimize toxicity to the mother and fetus and facilitate clinical translation of

  15. The Use of a School Value-Added Model for Educational Improvement: A Case Study from the Portuguese Primary Education System

    ERIC Educational Resources Information Center

    Ferrão, Maria Eugénia; Couto, Alcino Pinto

    2014-01-01

    This article focuses on the use of a value-added approach for promoting school improvement. It presents yearly value-added estimates, analyses their stability over time, and discusses the contribution of this methodological approach for promoting school improvement programmes in the Portuguese system of evaluation. The value-added model is applied…

  16. Added Sugars

    MedlinePlus

    ... need sugar to function properly. Added sugars contribute zero nutrients but many added calories that can lead to extra pounds or even obesity, thereby reducing heart health. If you think of your daily calorie needs as a budget, you want to “spend” ...

  17. Value Added?

    ERIC Educational Resources Information Center

    UCLA IDEA, 2012

    2012-01-01

    Value added measures (VAM) uses changes in student test scores to determine how much "value" an individual teacher has "added" to student growth during the school year. Some policymakers, school districts, and educational advocates have applauded VAM as a straightforward measure of teacher effectiveness: the better a teacher,…

  18. Identification and Forecasting in Mortality Models

    PubMed Central

    Nielsen, Jens P.

    2014-01-01

    Mortality models often have inbuilt identification issues challenging the statistician. The statistician can choose to work with well-defined freely varying parameters, derived as maximal invariants in this paper, or with ad hoc identified parameters which at first glance seem more intuitive, but which can introduce a number of unnecessary challenges. In this paper we describe the methodological advantages from using the maximal invariant parameterisation and we go through the extra methodological challenges a statistician has to deal with when insisting on working with ad hoc identifications. These challenges are broadly similar in frequentist and in Bayesian setups. We also go through a number of examples from the literature where ad hoc identifications have been preferred in the statistical analyses. PMID:24987729

  19. Chronic copper exposure exacerbates both amyloid and tau pathology and selectively dysregulates cdk5 in a mouse model of AD.

    PubMed

    Kitazawa, Masashi; Cheng, David; Laferla, Frank M

    2009-03-01

    Excess copper exposure is thought to be linked to the development of Alzheimer's disease (AD) neuropathology. However, the mechanism by which copper affects the CNS remains unclear. To investigate the effect of chronic copper exposure on both beta-amyloid and tau pathologies, we treated young triple transgenic (3xTg-AD) mice with 250 ppm copper-containing water for a period of 3 or 9 months. Copper exposure resulted in altered amyloid precursor protein processing; increased accumulation of the amyloid precursor protein and its proteolytic product, C99 fragment, along with increased generation of amyloid-beta peptides and oligomers. These changes were found to be mediated via up-regulation of BACE1 as significant increases in BACE1 levels and deposits were detected around plaques in mice following copper exposure. Furthermore, tau pathology within hippocampal neurons was exacerbated in copper-exposed 3xTg-AD group. Increased tau phosphorylation was closely correlated with aberrant cdk5/p25 activation, suggesting a role for this kinase in the development of copper-induced tau pathology. Taken together, our data suggest that chronic copper exposure accelerates not only amyloid pathology but also tau pathology in a mouse model of AD.

  20. Simulation of the blowing snow flux in Adélie Land, Antarctica, by a regional climate model

    NASA Astrophysics Data System (ADS)

    Gallée, Hubert; Amory, Charles; Agosta, Cécile

    2016-04-01

    The parameterization of blowing snow in the regional climate model MAR (Modèle Atmosphérique Régional) has been tested. The model is set-up over Adélie Land, Antarctica, with a fine horizontal resolution (5 km) and an improved vertical resolution near the surface (lowest level is now situated 0.15 m above the surface). The domain of the model covers the steepest slopes of Adélie Land, on an area of 500 times 500 km2. Simulations last 2 summer months (December 2010 and January 2011). The influence of model parameterizations on the simulated wind speed, relative humidity and horizontal blowing snow flux near the surface is assessed. It is found that model parameters influencing turbulence and in particular the parameterization of the roughness length are the main contributors to the sensitivity of the above-mentioned model variables. Therefore model sensitivity tests to various parameterizations of the roughness length are performed, allowing to define a new parameterization of the roughness length depending on snow erosion by the wind.

  1. The value of adding optics to ecosystem models: a case study

    NASA Astrophysics Data System (ADS)

    Fujii, M.; Boss, E.; Chai, F.

    2007-10-01

    Many ecosystem models have been developed to study the ocean's biogeochemical properties, but most of these models use simple formulations to describe light penetration and spectral quality. Here, an optical model is coupled with a previously published ecosystem model that explicitly represents two phytoplankton (picoplankton and diatoms) and two zooplankton functional groups, as well as multiple nutrients and detritus. Surface ocean color fields and subsurface light fields are calculated by coupling the ecosystem model with an optical model that relates biogeochemical standing stocks with inherent optical properties (absorption, scattering); this provides input to a commercially available radiative transfer model (Ecolight). We apply this bio-optical model to the equatorial Pacific upwelling region, and find the model to be capable of reproducing many measured optical properties and key biogeochemical processes in this region. Our model results suggest that non-algal particles largely contribute to the total scattering or attenuation (>50% at 660 nm) but have a much smaller contribution to particulate absorption (<20% at 440 nm), while picoplankton dominate the total phytoplankton absorption (>95% at 440 nm). These results are consistent with the field observations. In order to achieve such good agreement between data and model results, however, key model parameters, for which no field data are available, have to be constrained. Sensitivity analysis of the model results to optical parameters reveals a significant role played by colored dissolved organic matter through its influence on the quantity and quality of the ambient light. Coupling explicit optics to an ecosystem model provides advantages in generating: (1) a more accurate subsurface light-field, which is important for light sensitive biogeochemical processes such as photosynthesis and photo-oxidation, (2) additional constraints on model parameters that help to reduce uncertainties in ecosystem model

  2. Accuracy Assessment of Digital Surface Models Based on WorldView-2 and ADS80 Stereo Remote Sensing Data

    PubMed Central

    Hobi, Martina L.; Ginzler, Christian

    2012-01-01

    Digital surface models (DSMs) are widely used in forest science to model the forest canopy. Stereo pairs of very high resolution satellite and digital aerial images are relatively new and their absolute accuracy for DSM generation is largely unknown. For an assessment of these input data two DSMs based on a WorldView-2 stereo pair and a ADS80 DSM were generated with photogrammetric instruments. Rational polynomial coefficients (RPCs) are defining the orientation of the WorldView-2 satellite images, which can be enhanced with ground control points (GCPs). Thus two WorldView-2 DSMs were distinguished: a WorldView-2 RPCs-only DSM and a WorldView-2 GCP-enhanced RPCs DSM. The accuracy of the three DSMs was estimated with GPS measurements, manual stereo-measurements, and airborne laser scanning data (ALS). With GCP-enhanced RPCs the WorldView-2 image orientation could be optimised to a root mean square error (RMSE) of 0.56 m in planimetry and 0.32 m in height. This improvement in orientation allowed for a vertical median error of −0.24 m for the WorldView-2 GCP-enhanced RPCs DSM in flat terrain. Overall, the DSM based on ADS80 images showed the highest accuracy of the three models with a median error of 0.08 m over bare ground. As the accuracy of a DSM varies with land cover three classes were distinguished: herb and grass, forests, and artificial areas. The study suggested the ADS80 DSM to best model actual surface height in all three land cover classes, with median errors <1.1 m. The WorldView-2 GCP-enhanced RPCs model achieved good accuracy, too, with median errors of −0.43 m for the herb and grass vegetation and −0.26 m for artificial areas. Forested areas emerged as the most difficult land cover type for height modelling; still, with median errors of −1.85 m for the WorldView-2 GCP-enhanced RPCs model and −1.12 m for the ADS80 model, the input data sets evaluated here are quite promising for forest canopy modelling. PMID:22778645

  3. Intraplacental Gene Therapy with Ad-IGF-1 Corrects Naturally Occurring Rabbit Model of Intrauterine Growth Restriction

    PubMed Central

    Keswani, Sundeep G.; Balaji, Swathi; Katz, Anna B.; King, Alice; Omar, Khaled; Habli, Mounira; Klanke, Charles

    2015-01-01

    Abstract Intrauterine growth restriction (IUGR) due to placental insufficiency is a leading cause of perinatal complications for which there is no effective prenatal therapy. We have previously demonstrated that intraplacental injection of adenovirus-mediated insulin-like growth factor-1 (Ad-IGF-1) corrects fetal weight in a murine IUGR model induced by mesenteric uterine artery branch ligation. This study investigated the effect of intraplacental Ad-IGF-1 gene therapy in a rabbit model of naturally occurring IUGR (runt) due to placental insufficiency, which is similar to the human IUGR condition with onset in the early third trimester, brain sparing, and a reduction in liver weight. Laparotomy was performed on New Zealand White rabbits on day 21 of 30 days of gestation and litters were divided into five groups: Control (first position)+phosphate-buffered saline (PBS), control+Ad-IGF-1, runt (third position)+PBS, runt+Ad-IGF-1, and runt+Ad-LacZ. The effect of IGF-1 gene therapy on fetal, placental, liver, heart, lung, and musculoskeletal weights of the growth-restricted pups was examined. Protein expression after gene transfer was seen along the maternal–fetal placenta interface (n=12) 48 hr after gene therapy. There was minimal gene transfer detected in the pups or maternal organs. At term, compared with the normally grown first-position control, the runted third-position pups demonstrated significantly lower fetal, placental, liver, lung, and musculoskeletal weights. The fetal, liver, and musculoskeletal weights were restored to normal by intraplacental Ad-IGF-1 gene therapy (p<0.01), with no change in the placental weight. Intraplacental gene therapy is a novel strategy for the treatment of IUGR caused by placental insufficiency that takes advantage of an organ that will be discarded at birth. Development of nonviral IGF-1 gene delivery using placenta-specific promoters can potentially minimize toxicity to the mother and fetus and facilitate clinical

  4. ApoE-directed therapeutics rapidly clear β-amyloid and reverse deficits in AD mouse models.

    PubMed

    Cramer, Paige E; Cirrito, John R; Wesson, Daniel W; Lee, C Y Daniel; Karlo, J Colleen; Zinn, Adriana E; Casali, Brad T; Restivo, Jessica L; Goebel, Whitney D; James, Michael J; Brunden, Kurt R; Wilson, Donald A; Landreth, Gary E

    2012-03-23

    Alzheimer's disease (AD) is associated with impaired clearance of β-amyloid (Aβ) from the brain, a process normally facilitated by apolipoprotein E (apoE). ApoE expression is transcriptionally induced through the action of the nuclear receptors peroxisome proliferator-activated receptor gamma and liver X receptors in coordination with retinoid X receptors (RXRs). Oral administration of the RXR agonist bexarotene to a mouse model of AD resulted in enhanced clearance of soluble Aβ within hours in an apoE-dependent manner. Aβ plaque area was reduced more than 50% within just 72 hours. Furthermore, bexarotene stimulated the rapid reversal of cognitive, social, and olfactory deficits and improved neural circuit function. Thus, RXR activation stimulates physiological Aβ clearance mechanisms, resulting in the rapid reversal of a broad range of Aβ-induced deficits.

  5. Multiscale Snow/Icemelt Discharge Simulations into Alpine Reservoirs: adding Glacier Dynamics to a Hydrological Model

    NASA Astrophysics Data System (ADS)

    Schueller, Felix; Förster, Kristian; Hanzer, Florian; Huttenlau, Matthias; Marzeion, Ben; Strasser, Ulrich; Achleitner, Stefan; Kirnbauer, Robert

    2015-04-01

    Glacier and snow runoff in high alpine regions is an essential process in hydrological research for its high relevance on lower altitude areas and hydro-power generation. MUSICALS II (Multiscale Snow/Icemelt Discharge Simulations into Alpine Reservoirs) seeks to identify and quantify water availability and runoff in alpine headwater catchments. The focus is on future changes due to glacier retreat, altering the multi-day and seasonal runoff available for hydropower operations. Our aim is to investigate and improve runoff forecasts by coupling the semi-distributed hydrological model HQSim with a simple glacier evolution model. The glacier model MMBM (Marzeion Mass Balance Model) with its statistical nature allows for fast modelling of the dynamical properties of glaciers. We present the design of the coupled hydrological application for different hydro power headwater catchments in Tyrol. The capabilities of the glacier model to simulate the selected glaciers is shown. Simulated discharge with the original and the coupled model are compared to downstream gauge measurements. Using the multi-objective optimization algorithm AMALGAM (A Multi-ALgorithm, Genetically Adaptive Multiobjective model), we optimize the glacier module parameters fully automatically. The results show the improvements in runoff modelling for past periods, when altering of glaciated catchment parts is considered. This indicates consideration of this process is mandatory for simulating future developments.

  6. An experimental seasonal hydrological forecasting system over the Yellow River basin - Part 2: The added value from climate forecast models

    NASA Astrophysics Data System (ADS)

    Yuan, Xing

    2016-06-01

    This is the second paper of a two-part series on introducing an experimental seasonal hydrological forecasting system over the Yellow River basin in northern China. While the natural hydrological predictability in terms of initial hydrological conditions (ICs) is investigated in a companion paper, the added value from eight North American Multimodel Ensemble (NMME) climate forecast models with a grand ensemble of 99 members is assessed in this paper, with an implicit consideration of human-induced uncertainty in the hydrological models through a post-processing procedure. The forecast skill in terms of anomaly correlation (AC) for 2 m air temperature and precipitation does not necessarily decrease over leads but is dependent on the target month due to a strong seasonality for the climate over the Yellow River basin. As there is more diversity in the model performance for the temperature forecasts than the precipitation forecasts, the grand NMME ensemble mean forecast has consistently higher skill than the best single model up to 6 months for the temperature but up to 2 months for the precipitation. The NMME climate predictions are downscaled to drive the variable infiltration capacity (VIC) land surface hydrological model and a global routing model regionalized over the Yellow River basin to produce forecasts of soil moisture, runoff and streamflow. And the NMME/VIC forecasts are compared with the Ensemble Streamflow Prediction method (ESP/VIC) through 6-month hindcast experiments for each calendar month during 1982-2010. As verified by the VIC offline simulations, the NMME/VIC is comparable to the ESP/VIC for the soil moisture forecasts, and the former has higher skill than the latter only for the forecasts at long leads and for those initialized in the rainy season. The forecast skill for runoff is lower for both forecast approaches, but the added value from NMME/VIC is more obvious, with an increase of the average AC by 0.08-0.2. To compare with the observed

  7. Adding Abstraction and Reuse to a Network Modelling Tool Using the Reuseware Composition Framework

    NASA Astrophysics Data System (ADS)

    Johannes, Jendrik; Fernández, Miguel A.

    Domain-specific modelling (DSM) environments enable experts in a certain domain to actively participate in model-driven development. Developing DSM environments need to be cost-efficient, since they are only used by a limited group of domain experts. Different model-driven technologies promise to allow this cost-efficient development. [1] presented experiences in developing a DSM environment for telecommunication network modelling. There, challenges were identified that need to be addressed by other new modelling technologies. In this paper, we now present the results of addressing one of theses challenges - abstraction and reuse support - with the Reuseware Composition Framework. We show how we identified the abstraction and reuse features required in the telecommunication DSM environment in a case study and extended the existing environment with these features using Reuseware. We discuss the advantages of using this technology and propose a process for further improving the abstraction and reuse capabilities of the DSM environment in the future.

  8. A dynamic CSTT model for the effects of added nutrients in Loch Creran, a shallow fjord

    NASA Astrophysics Data System (ADS)

    Laurent, Céline; Tett, Paul; Fernandes, Teresa; Gilpin, Linda; Jones, Ken

    2006-07-01

    Despite a tendency for the complexity of physical-biological models to increase, simple coupled models remain useful for some applications and can provide insights into crucial links between physical and biological processes. This argument is illustrated with an account of a simple 3-box model intended to help assess the capacity of fjords to assimilate nutrients from fish farms. The model, a dynamic version of the UK "Comprehensive Studies Task Team" (CSTT) steady-state model for eutrophication, was applied to Loch Creran (Scottish Western Highlands) and was implemented using Stella 8 and tested using historical data from 1975 (before the installation of a salmon farm) and field data collected in 2003, during the period of operation of the farm. The model's biological state variables are chlorophyll, dissolved inorganic nitrogen (DIN) and dissolved inorganic phosphorus (DIP), and it includes a simple run-off model to convert rainfall into river discharge. The physical processes involved in exchange between the loch and the adjacent waters of the Firth of Lorne were parameterised as a constant daily exchange rate. Between 1975 and 2003, local inputs of nutrient increased but, despite this, there was little apparent increase in nutrient concentrations in the loch, and observed chlorophyll concentrations decreased substantially. Model simulations of chlorophyll and DIN agreed well with observations in 1975, as did DIN simulations in 2003. However, simulated chlorophyll was overestimated in 2003. Some of the agreement between observations and simulations come from the use of observed boundary conditions to force the model. However, even when boundary conditions are subtracted from simulations and observations, the simulations in most cases retain a significant correlation with observations, demonstrating that the model's 'interior' processes do add to its ability to replicate conditions in the loch.

  9. Are the numbers adding up? Exploiting discrepancies among complementary population models

    PubMed Central

    Stenglein, Jennifer L; Zhu, Jun; Clayton, Murray K; Van Deelen, Timothy R

    2015-01-01

    Large carnivores are difficult to monitor because they tend to be sparsely distributed, sensitive to human activity, and associated with complex life histories. Consequently, understanding population trend and viability requires conservationists to cope with uncertainty and bias in population data. Joint analysis of combined data sets using multiple models (i.e., integrated population model) can improve inference about mechanisms (e.g., habitat heterogeneity and food distribution) affecting population dynamics. However, unobserved or unobservable processes can also introduce bias and can be difficult to quantify. We developed a Bayesian hierarchical modeling approach for inference on an integrated population model that reconciles annual population counts with recruitment and survival data (i.e., demographic processes). Our modeling framework is flexible and enables a realistic form of population dynamics by fitting separate density-dependent responses for each demographic process. Discrepancies estimated from shared parameters among different model components represent unobserved additions (i.e., recruitment or immigration) or removals (i.e., death or emigration) when annual population counts are reliable. In a case study of gray wolves in Wisconsin (1980–2011), concordant with policy changes, we estimated that a discrepancy of 0% (1980–1995), −2% (1996–2002), and 4% (2003–2011) in the annual mortality rate was needed to explain annual growth rate. Additional mortality in 2003–2011 may reflect density-dependent mechanisms, changes in illegal killing with shifts in wolf management, and nonindependent censoring in survival data. Integrated population models provide insights into unobserved or unobservable processes by quantifying discrepancies among data sets. Our modeling approach is generalizable to many population analysis needs and allows for identifying dynamic differences due to external drivers, such as management or policy changes. PMID:25691964

  10. Deconfinement and chiral transition in AdS/QCD wall models supplemented with a magnetic field

    NASA Astrophysics Data System (ADS)

    Dudal, David; Granado, Diego R.; Mertens, Thomas G.

    2017-03-01

    We discuss the phenomenon of (inverse) magnetic catalysis for both the deconfinement and chiral transition. We discriminate between the hard and soft wall model, which we suitably generalize to include a magnetic field. Our findings show a critical deconfinement temperature going down, in contrast with the chiral restoration temperature growing with increasing magnetic field. This is at odds with contemporary lattice data, so the quest for a holographic QCD model capable of capturing inverse magnetic catalysis in the chiral sector remains open.

  11. Are the numbers adding up? Exploiting discrepancies among complementary population models.

    PubMed

    Stenglein, Jennifer L; Zhu, Jun; Clayton, Murray K; Van Deelen, Timothy R

    2015-01-01

    Large carnivores are difficult to monitor because they tend to be sparsely distributed, sensitive to human activity, and associated with complex life histories. Consequently, understanding population trend and viability requires conservationists to cope with uncertainty and bias in population data. Joint analysis of combined data sets using multiple models (i.e., integrated population model) can improve inference about mechanisms (e.g., habitat heterogeneity and food distribution) affecting population dynamics. However, unobserved or unobservable processes can also introduce bias and can be difficult to quantify. We developed a Bayesian hierarchical modeling approach for inference on an integrated population model that reconciles annual population counts with recruitment and survival data (i.e., demographic processes). Our modeling framework is flexible and enables a realistic form of population dynamics by fitting separate density-dependent responses for each demographic process. Discrepancies estimated from shared parameters among different model components represent unobserved additions (i.e., recruitment or immigration) or removals (i.e., death or emigration) when annual population counts are reliable. In a case study of gray wolves in Wisconsin (1980-2011), concordant with policy changes, we estimated that a discrepancy of 0% (1980-1995), -2% (1996-2002), and 4% (2003-2011) in the annual mortality rate was needed to explain annual growth rate. Additional mortality in 2003-2011 may reflect density-dependent mechanisms, changes in illegal killing with shifts in wolf management, and nonindependent censoring in survival data. Integrated population models provide insights into unobserved or unobservable processes by quantifying discrepancies among data sets. Our modeling approach is generalizable to many population analysis needs and allows for identifying dynamic differences due to external drivers, such as management or policy changes.

  12. Enhancement and modeling of microparticle-added Rhizopus oryzae lactic acid production.

    PubMed

    Coban, Hasan Bugra; Demirci, Ali

    2016-02-01

    Lactic acid has a wide industrial application area and can be produced by fungal strains. However, excessive bulk growth form of fungi during the fermentations is a major problem, which limits the fermentation performance. Microparticles are excellent tools to prevent bulk fungal growth and provide homogenized fermentation broth to increase uniformity and the prediction performance of the models. Therefore, in this study, addition of aluminum oxide and talcum microparticles into fermentations was evaluated to enhance the production of lactic acid by Rhizopus oryzae. The results showed that the bulk fungal growth was prevented and the lactic acid concentration increased from 6.02 to 13.88 and 24.01 g/L, when 15 g/L of aluminum oxide or 10 g/L of talcum was used, respectively, in the shake-flask fermentations. Additionally, substrate concentration, pH, and agitation were optimized in the bioreactors using response surface methodology, and optimum values were determined as 126 g/L of glucose, 6.22 pH, and 387 rpm, respectively. Under these conditions, lactic acid production further increased to 75.1 ± 1.5 g/L with 10 g/L of talcum addition. Also, lactic acid production and glucose consumption in the batch fermentation were successfully modeled with modified Gompertz model and modified logistic model. RMSE and MAE values for lactic acid production were calculated as 2.279 and 1.498 for the modified Gompertz model; 3.6 and 4.056 for the modified logistic model. Additionally, modified logistic model predicted glucose consumption with -2.088 MAE and 2.868 RMSE, whereas these values were calculated as 2.035 and 3.946 for the modified Gompertz model.

  13. Adding Value.

    ERIC Educational Resources Information Center

    Orsini, Larry L.; Hudack, Lawrence R.; Zekan, Donald L.

    1999-01-01

    The value-added statement (VAS), relatively unknown in the United States, is used in financial reports by many European companies. Saint Bonaventure University (New York) has adapted a VAS to make it appropriate for not-for-profit universities by identifying stakeholder groups (students, faculty, administrators/support personnel, creditors, the…

  14. Cold temperature improves mobility and survival in Drosophila models of autosomal-dominant hereditary spastic paraplegia (AD-HSP).

    PubMed

    Baxter, Sally L; Allard, Denise E; Crowl, Christopher; Sherwood, Nina Tang

    2014-08-01

    Autosomal-dominant hereditary spastic paraplegia (AD-HSP) is a crippling neurodegenerative disease for which effective treatment or cure remains unknown. Victims experience progressive mobility loss due to degeneration of the longest axons in the spinal cord. Over half of AD-HSP cases arise from loss-of-function mutations in spastin, which encodes a microtubule-severing AAA ATPase. In Drosophila models of AD-HSP, larvae lacking Spastin exhibit abnormal motor neuron morphology and function, and most die as pupae. Adult survivors display impaired mobility, reminiscent of the human disease. Here, we show that rearing pupae or adults at reduced temperature (18°C), compared with the standard temperature of 24°C, improves the survival and mobility of adult spastin mutants but leaves wild-type flies unaffected. Flies expressing human spastin with pathogenic mutations are similarly rescued. Additionally, larval cooling partially rescues the larval synaptic phenotype. Cooling thus alleviates known spastin phenotypes for each developmental stage at which it is administered and, notably, is effective even in mature adults. We find further that cold treatment rescues larval synaptic defects in flies with mutations in Flower (a protein with no known relation to Spastin) and mobility defects in flies lacking Kat60-L1, another microtubule-severing protein enriched in the CNS. Together, these data support the hypothesis that the beneficial effects of cold extend beyond specific alleviation of Spastin dysfunction, to at least a subset of cellular and behavioral neuronal defects. Mild hypothermia, a common neuroprotective technique in clinical treatment of acute anoxia, might thus hold additional promise as a therapeutic approach for AD-HSP and, potentially, for other neurodegenerative diseases.

  15. Investigation of modified AD/RANS models for wind turbine wake predictions in large wind farm

    NASA Astrophysics Data System (ADS)

    Tian, L. L.; Zhu, W. J.; Shen, W. Z.; Sørensen, J. N.; Zhao, N.

    2014-06-01

    Average power losses due to multiple wind turbine wakes in the large offshore wind farm is studied in this paper using properly modified k-ω SST turbulence models. The numerical simulations are carried out by the actuator disc methodology implemented in the flow solver EllipSys3D. In these simulations, the influence of different inflow conditions such as wind direction sectors are considered and discussed. Comparisons with measurements in terms of wake speed ratio and the corresponding power outputs show that the modified turbulence models had significant improvements; especially the SST-Csust model reflects the best ability in predicting the wake defect. The investigations of various inflow angles reveal that the agreement between predicted and measured data is improved for the wider sector case than the narrow case because of the wind direction uncertainty.

  16. Adding Value through Program Integration: A Kayaking Model (Rental, Retail, Repair, Clinics and Outings).

    ERIC Educational Resources Information Center

    Poff, Raymond

    Outdoor programs can offset initial investment costs in services and products by developing integrated program areas. The experience of Outdoors Unlimited, a recently created kayaking program at Brigham Young University (Utah), is provided as a model. The purchase of 11 kayaks for rental was followed by the introduction of retail sales, repair…

  17. Energy and time modelling of kerbside waste collection: Changes incurred when adding source separated food waste.

    PubMed

    Edwards, Joel; Othman, Maazuza; Burn, Stewart; Crossin, Enda

    2016-10-01

    The collection of source separated kerbside municipal FW (SSFW) is being incentivised in Australia, however such a collection is likely to increase the fuel and time a collection truck fleet requires. Therefore, waste managers need to determine whether the incentives outweigh the cost. With literature scarcely describing the magnitude of increase, and local parameters playing a crucial role in accurately modelling kerbside collection; this paper develops a new general mathematical model that predicts the energy and time requirements of a collection regime whilst incorporating the unique variables of different jurisdictions. The model, Municipal solid waste collect (MSW-Collect), is validated and shown to be more accurate at predicting fuel consumption and trucks required than other common collection models. When predicting changes incurred for five different SSFW collection scenarios, results show that SSFW scenarios require an increase in fuel ranging from 1.38% to 57.59%. There is also a need for additional trucks across most SSFW scenarios tested. All SSFW scenarios are ranked and analysed in regards to fuel consumption; sensitivity analysis is conducted to test key assumptions.

  18. Historic Building Information Modelling - Adding intelligence to laser and image based surveys of European classical architecture

    NASA Astrophysics Data System (ADS)

    Murphy, Maurice; McGovern, Eugene; Pavia, Sara

    2013-02-01

    Historic Building Information Modelling (HBIM) is a novel prototype library of parametric objects, based on historic architectural data and a system of cross platform programmes for mapping parametric objects onto point cloud and image survey data. The HBIM process begins with remote collection of survey data using a terrestrial laser scanner combined with digital photo modelling. The next stage involves the design and construction of a parametric library of objects, which are based on the manuscripts ranging from Vitruvius to 18th century architectural pattern books. In building parametric objects, the problem of file format and exchange of data has been overcome within the BIM ArchiCAD software platform by using geometric descriptive language (GDL). The plotting of parametric objects onto the laser scan surveys as building components to create or form the entire building is the final stage in the reverse engineering process. The final HBIM product is the creation of full 3D models including detail behind the object's surface concerning its methods of construction and material make-up. The resultant HBIM can automatically create cut sections, details and schedules in addition to the orthographic projections and 3D models (wire frame or textured) for both the analysis and conservation of historic objects, structures and environments.

  19. Historic Building Information Modelling - Adding Intelligence to Laser and Image Based Surveys

    NASA Astrophysics Data System (ADS)

    Murphy, M.; McGovern, E.; Pavia, S.

    2011-09-01

    Historic Building Information Modelling (HBIM) is a novel prototype library of parametric objects based on historic data and a system of cross platform programmes for mapping parametric objects onto a point cloud and image survey data. The HBIM process begins with remote collection of survey data using a terrestrial laser scanner combined with digital photo modelling. The next stage involves the design and construction of a parametric library of objects, which are based on the manuscripts ranging from Vitruvius to 18th century architectural pattern books. In building parametric objects, the problem of file format and exchange of data has been overcome within the BIM ArchiCAD software platform by using geometric descriptive language (GDL). The plotting of parametric objects onto the laser scan surveys as building components to create or form the entire building is the final stage in the reverse engin- eering process. The final HBIM product is the creation of full 3D models including detail behind the object's surface concerning its methods of construction and material make-up. The resultant HBIM can automatically create cut sections, details and schedules in addition to the orthographic projections and 3D models (wire frame or textured).

  20. Adding ecology to particle capture models: numerical simulations of capture on a moving cylinder in crossflow.

    PubMed

    Krick, Julian; Ackerman, Josef Daniel

    2015-03-07

    The particle capture efficiency, η, of systems that remove suspended particles from ambient flow (e.g. suspension feeding, abiotic pollination) has been studied using static collectors in steady flows. Particle deposition on collectors moving due to fluid flow remains largely unknown, despite its ecological relevance. We used numerical modeling to simulate particle deposition on a 2D circular cylinder subject to flow-induced oscillation in a cross flow. Using parameter values relevant to wind pollination and other natural biological systems, we examined the influence of the direction, amplitude and frequency of the oscillation, the Stokes number (Stk=0.01-5, characterizing particle behavior), as well as the Reynolds number (Re=662 and 3309, characterizing flow regime) in steady and unsteady flow, on η. The numerical model was validated with empirical results for parts of the parameter space. Particle capture occurred via "inertial impaction", "direct interception" and "leeward deposition", as well as via a new mechanism, "collector chasing" for moving collectors. The η of an oscillating cylinder varied significantly relative to a static cylinder, depending on the parameters used, and on the magnitude of a numerical error that caused loss of particles. This variance of η was due to a change in relative momentum between the particle and the moving collector, which depends on Re, Stk and the oscillation parameters. Collector oscillation transverse to oncoming flow direction strongly increased η, whereas collector motion parallel to flow had little effect on capture efficiency. The oscillation also changed leeward capture significantly in some cases. For most conditions, however, leeward deposition was small. Results suggest that collector motion could have significant influence on the particle capture efficiency of natural systems, which indicates the need to incorporate these ecologically more relevant findings into current models. Empirical studies, however

  1. Adding Biotic Interactions into Paleodistribution Models: A Host-Cleptoparasite Complex of Neotropical Orchid Bees

    PubMed Central

    Silva, Daniel Paiva; Varela, Sara; Nemésio, André; De Marco, Paulo

    2015-01-01

    Orchid bees compose an exclusive Neotropical pollinators group, with bright body coloration. Several of those species build their own nests, while others are reported as nest cleptoparasites. Here, the objective was to evaluate whether the inclusion of a strong biotic interaction, such as the presence of a host species, improved the ability of species distribution models (SDMs) to predict the geographic range of the cleptoparasite species. The target species were Aglae caerulea and its host species Eulaema nigrita. Additionally, since A. caerulea is more frequently found in the Amazon rather than the Cerrado areas, a secondary objective was to evaluate whether this species is increasing or decreasing its distribution given South American past and current climatic conditions. SDMs methods (Maxent and Bioclim), in addition with current and past South American climatic conditions, as well as the occurrences for A. caerulea and E. nigrita were used to generate the distribution models. The distribution of A. caerulea was generated with and without the inclusion of the distribution of E. nigrita as a predictor variable. The results indicate A. caerulea was barely affected by past climatic conditions and the populations from the Cerrado savanna could be at least 21,000 years old (the last glacial maximum), as well as the Amazonian ones. On the other hand, in this study, the inclusion of the host-cleptoparasite interaction complex did not statistically improve the quality of the produced models, which means that the geographic range of this cleptoparasite species is mainly constrained by climate and not by the presence of the host species. Nonetheless, this could also be caused by unknown complexes of other Euglossini hosts with A. caerulea, which still are still needed to be described by science. PMID:26069956

  2. Pion Form Factor in Chiral Limit of Hard-Wall AdS/QCD Model

    SciTech Connect

    Anatoly Radyushkin; Hovhannes Grigoryan

    2007-12-01

    We develop a formalism to calculate form factor and charge density distribution of pion in the chiral limit using the holographic dual model of QCD with hard-wall cutoff. We introduce two conjugate pion wave functions and present analytic expressions for these functions and for the pion form factor. They allow to relate such observables as the pion decay constant and the pion charge electric radius to the values of chiral condensate and hard-wall cutoff scale. The evolution of the pion form factor to large values of the momentum transfer is discussed, and results are compared to existing experimental data.

  3. Design of Value-Added Models for IMPACT and TEAM in DC Public Schools, 2010-2011 School Year. Final Report

    ERIC Educational Resources Information Center

    Isenberg, Eric; Hock, Heinrich

    2011-01-01

    This report presents the value-added models that will be used to measure school and teacher effectiveness in the District of Columbia Public Schools (DCPS) in the 2010-2011 school year. It updates the earlier technical report, "Measuring Value Added for IMPACT and TEAM in DC Public Schools." The earlier report described the methods used…

  4. Small molecule LX2343 ameliorates cognitive deficits in AD model mice by targeting both amyloid β production and clearance

    PubMed Central

    Guo, Xiao-dan; Sun, Guang-long; Zhou, Ting-ting; Xu, Xin; Zhu, Zhi-yuan; Rukachaisirikul, Vatcharin; Hu, Li-hong; Shen, Xu

    2016-01-01

    Aim: Streptozotocin (STZ) is widely used to induce oxidative damage and to impair glucose metabolism, apoptosis, and tau/Aβ pathology, eventually leading to cognitive deficits in both in vitro and in vivo models of Alzheimer's disease (AD). In this study, we constructed a cell-based platform using STZ to induce stress conditions mimicking the complicated pathologies of AD in vitro, and evaluated the anti-amyloid effects of a small molecule, N-(1,3-benzodioxol-5-yl)-2-[5-chloro-2-methoxy(phenylsulfonyl)anilino]acetamide (LX2343) in the amelioration of cognitive deficits in AD model mice. Methods: Cell-based assays for screening anti-amyloid compounds were established by assessing Aβ accumulation in HEK293-APPsw and CHO-APP cells, and Aβ clearance in primary astrocytes and SH-SY5Y cells after the cells were treated with STZ in the presence of the test compounds. Autophagic flux was observed using confocal laser scanning microscopy. APP/PS1 transgenic mice were administered LX2343 (10 mg·kg−1·d−1, ip) for 100 d. After LX2343 administration, cognitive ability of the mice was evaluated using Morris water maze test, and senile plaques in the brains were detected using Thioflavine S staining. ELISA assay was used to evaluate Aβ and sAPPβ levels, while Western blot analysis was used to measure the signaling proteins in both cell and animal brains. Results: LX2343 (5–20 μmol/L) dose-dependently decreased Aβ accumulation in HEK293-APPsw and CHO-APP cells, and promoted Aβ clearance in SH-SY5Y cells and primary astrocytes. The anti-amyloid effects of LX2343 were attributed to suppressing JNK-mediated APPThr668 phosphorylation, thus inhibiting APP cleavage on one hand, and inhibiting BACE1 enzymatic activity with an IC50 value of 11.43±0.36 μmol/L, on the other hand. Furthermore, LX2343 acted as a non-ATP competitive PI3K inhibitor to negatively regulate AKT/mTOR signaling, thus promoting autophagy, and increasing Aβ clearance. Administration of LX2343 in APP

  5. An assessment of the added value from data assimilation on modelled Nordic Seas hydrography and ocean transports

    NASA Astrophysics Data System (ADS)

    Lien, Vidar S.; Hjøllo, Solfrid S.; Skogen, Morten D.; Svendsen, Einar; Wehde, Henning; Bertino, Laurent; Counillon, Francois; Chevallier, Matthieu; Garric, Gilles

    2016-03-01

    The Nordic Seas is a hotspot both in terms of climate related processes, such as Atlantic-Arctic heat exchange, and natural marine resources. A sustainable management of the marine resources within the Nordic Seas, including the co-existence between fisheries and petroleum industries, requires detailed information on the state of the ocean within an operational framework and beyond what is obtainable from observations only. Numerical ocean models applying data assimilation techniques are utilized to address this need. Subsequently, comprehensive comparisons between model results and observations are required in order to assess the model performance. Here, we apply a set of objective statistics to quantitatively assess the added value of data assimilation in numerical ocean models that are currently used operationally. The results indicate that the inclusion of data assimilation improves the model performance both in terms of hydrographic properties and volume and heat transports. Furthermore, we find that increasing the resolution towards eddy resolving resolution performs similarly to coarser resolution models applying data assimilation in shelf areas.

  6. Extending JAGS: a tutorial on adding custom distributions to JAGS (with a diffusion model example).

    PubMed

    Wabersich, Dominik; Vandekerckhove, Joachim

    2014-03-01

    We demonstrate how to add a custom distribution into the general-purpose, open-source, cross-platform graphical modeling package JAGS ("Just Another Gibbs Sampler"). JAGS is intended to be modular and extensible, and modules written in the way laid out here can be loaded at runtime as needed and do not interfere with regular JAGS functionality when not loaded. Writing custom extensions requires knowledge of C++, but installing a new module can be highly automatic, depending on the operating system. As a basic example, we implement a Bernoulli distribution in JAGS. We further present our implementation of the Wiener diffusion first-passage time distribution, which is freely available at https://sourceforge.net/projects/jags-wiener/ .

  7. Evaluation of GCM Column Radiation Models Under Cloudy Conditions with The Arm BBHRP Value Added Product

    SciTech Connect

    Oreopoulos, Lazaros; Norris, Peter M.

    2010-03-14

    The overarching goal of the project was to improve the transfer of solar and thermal radiation in the most sophisticated computer tools that are currently available for climate studies, namely Global Climate Models (GCMs). This transfer can be conceptually separated into propagation of radiation under cloudy and under cloudless conditions. For cloudless conditions, the factors that affect radiation propagation are gaseous absorption and scattering, aerosol particle absorption and scattering and surface albedo and emissivity. For cloudy atmospheres the factors are the various cloud properties such as cloud fraction, amount of cloud condensate, the size of the cloud particles, and morphological cloud features such as cloud vertical location, cloud horizontal and vertical inhomogeneity and cloud shape and size. The project addressed various aspects of the influence of the above contributors to atmospheric radiative transfer variability. In particular, it examined: (a) the quality of radiative transfer for cloudless and non-complex cloudy conditions for a substantial number of radiation algorithms used in current GCMs; (b) the errors in radiative fluxes from neglecting the horizontal variabiity of cloud extinction; (c) the statistical properties of cloud horizontal and vertical cloud inhomogeneity that can be incorporated into radiative transfer codes; (d) the potential albedo effects of changes in the particle size of liquid clouds; (e) the gaseous radiative forcing in the presence of clouds; and (f) the relative contribution of clouds of different sizes to the reflectance of a cloud field. To conduct the research in the various facets of the project, data from both the DOE ARM project and other sources were used. The outcomes of the project will have tangible effects on how the calculation of radiative energy will be approached in future editions of GCMs. With better calculations of radiative energy in GCMs more reliable predictions of future climate states will be

  8. Final report for the ASC gas-powder two-phase flow modeling project AD2006-09.

    SciTech Connect

    Evans, Gregory Herbert; Winters, William S.

    2007-01-01

    This report documents activities performed in FY2006 under the ''Gas-Powder Two-Phase Flow Modeling Project'', ASC project AD2006-09. Sandia has a need to understand phenomena related to the transport of powders in systems. This report documents a modeling strategy inspired by powder transport experiments conducted at Sandia in 2002. A baseline gas-powder two-phase flow model, developed under a companion PEM project and implemented into the Sierra code FUEGO, is presented and discussed here. This report also documents a number of computational tests that were conducted to evaluate the accuracy and robustness of the new model. Although considerable progress was made in implementing the complex two-phase flow model, this project has identified two important areas that need further attention. These include the need to compute robust compressible flow solutions for Mach numbers exceeding 0.35 and the need to improve conservation of mass for the powder phase. Recommendations for future work in the area of gas-powder two-phase flow are provided.

  9. On the added value of the regional climate model REMO in the assessment of climate change signal over Central Africa

    NASA Astrophysics Data System (ADS)

    Fotso-Nguemo, Thierry C.; Vondou, Derbetini A.; Pokam, Wilfried M.; Djomou, Zéphirin Yepdo; Diallo, Ismaïla; Haensler, Andreas; Tchotchou, Lucie A. Djiotang; Kamsu-Tamo, Pierre H.; Gaye, Amadou T.; Tchawoua, Clément

    2017-02-01

    In this paper, the regional climate model REMO is used to investigate the added value of downscaling low resolutions global climate models (GCMs) and the climate change projections over Central Africa. REMO was forced by two GCMs (EC-Earth and MPI-ESM), for the period from 1950 to 2100 under the Representative Concentration Pathway 8.5 scenario. The performance of the REMO simulations for current climate is compared first with REMO simulation driven by ERA-Interim reanalysis, then by the corresponding GCMs in order to determine whether REMO outputs are able to effectively lead to added value at local scale. We found that REMO is generally able to better represent some aspects of the rainfall inter-annual variability, the daily rainfall intensity distribution as well as the intra-seasonal variability of the Central African monsoon, though few biases are still evident. It is also found that the boundary conditions strongly influences the spatial distribution of seasonal 2-m temperature and rainfall. From the analysis of the climate change signal from the present period 1976-2005 to the future 2066-2095, we found that all models project a warming at the end of the twenty-first century although the details of the climate change differ between REMO and the driving GCMs, specifically in REMO where we observe a general decrease in rainfall. This rainfall decrease is associated with delayed onset and anticipated recession of the Central African monsoon and a shortening of the rainy season. Small-scales variability of the climate change signal for 2-m temperature are usually smaller than that of the large-scales climate change part. For rainfall however, small-scales induce change of about 70% compared to the present climate statistics.

  10. Chronic treatment with the GLP1 analogue liraglutide increases cell proliferation and differentiation into neurons in an AD mouse model.

    PubMed

    Parthsarathy, Vadivel; Hölscher, Christian

    2013-01-01

    Neurogenesis is a life long process, but the rate of cell proliferation and differentiation decreases with age. In Alzheimer's patients, along with age, the presence of Aβ in the brain inhibits this process by reducing stem cell proliferation and cell differentiation. GLP-1 is a growth factor that has neuroprotective properties. GLP1 receptors are present on neuronal progenitor cells, and the GLP-1 analogue liraglutide has been shown to increase cell proliferation in an Alzheimer's disease (AD) mouse model. Here we investigated acute and chronic effects of liraglutide on progenitor cell proliferation, neuroblast differentiation and their subsequent differentiation into neurons in wild type and APP/PS-1 mice at different ages. APP/PS1 and their littermate controls, aged 3, 6, 12, 15 months were injected acutely or chronically with 25 nmol/kg liraglutide. Acute treatment with liraglutide showed an increase in cell proliferation in APP/PS1 mice, but not in controls whereas chronic treatment increased cell proliferation at all ages (BrdU and Ki67 markers). Moreover, numbers of immature neurons (DCX) were increased in both acute and chronic treated animals at all ages. Most newly generated cells differentiated into mature neurons (NeuN marker). A significant increase was observed with chronically treated 6, 12, 15 month APP/PS1 and WT groups. These results demonstrate that liraglutide, which is currently on the market as a treatment for type 2 diabetes (Victoza(TM)), increases neurogenesis, which may have beneficial effects in neurodegenerative disorders like AD.

  11. RC Model-based Comparison Tests of the Added Compliance Method with Computer Simulations and a Standard Method

    NASA Astrophysics Data System (ADS)

    Pałko, Krzysztof J.; Rogalski, Andrzej; Zieliński, Krzysztof; Glapiński, Jarosław; Kozarski, Maciej; Pałko, Tadeusz; Darowski, Marek

    2007-01-01

    Ventilation of the lungs involves the exchange of gases during inhalation and exhalation causing the movement of respiratory gases between alveolars and the atmosphere as a result of a pressure drop between alveolars and the atmosphere. During artificial ventilation what is most important is to keep specific mechanical parameters of the lungs such as total compliance of the respiratory system Cp (consisting of the lung and the thorax compliances) and the airway resistance Rp when the patient is ventilated. Therefore, as the main goal of this work and as the first step to use our earlier method of added lung compliance in clinical practice was: 1) to carry out computer simulations to compare the application of this method during different expiratory phases, and 2) to compare this method with the standard method for its accuracy. The primary tests of the added-compliance method of the main lung parameters measurement have been made using the RC mechanical model of the lungs.

  12. Mesenchymal Stem Cells Preserve Working Memory in the 3xTg-AD Mouse Model of Alzheimer's Disease.

    PubMed

    Ruzicka, Jiri; Kulijewicz-Nawrot, Magdalena; Rodrigez-Arellano, Jose Julio; Jendelova, Pavla; Sykova, Eva

    2016-01-25

    The transplantation of stem cells may have a therapeutic effect on the pathogenesis and progression of neurodegenerative disorders. In the present study, we transplanted human mesenchymal stem cells (MSCs) into the lateral ventricle of a triple transgenic mouse model of Alzheimer's disease (3xTg-AD) at the age of eight months. We evaluated spatial reference and working memory after MSC treatment and the possible underlying mechanisms, such as the influence of transplanted MSCs on neurogenesis in the subventricular zone (SVZ) and the expression levels of a 56 kDa oligomer of amyloid β (Aβ*56), glutamine synthetase (GS) and glutamate transporters (Glutamate aspartate transporter (GLAST) and Glutamate transporter-1 (GLT-1)) in the entorhinal and prefrontal cortices and the hippocampus. At 14 months of age we observed the preservation of working memory in MSC-treated 3xTg-AD mice, suggesting that such preservation might be due to the protective effect of MSCs on GS levels and the considerable downregulation of Aβ*56 levels in the entorhinal cortex. These changes were observed six months after transplantation, accompanied by clusters of proliferating cells in the SVZ. Since the grafted cells did not survive for the whole experimental period, it is likely that the observed effects could have been transiently more pronounced at earlier time points than at six months after cell application.

  13. Constraining the Kinematics of the A.D. 900 Seattle Fault Earthquake With Geomechanical Modeling and LIDAR Surface Elevation Data

    NASA Astrophysics Data System (ADS)

    Muller, J. R.; Harding, D. J.

    2005-05-01

    Within the Puget Sound region of Washington State, several lines of geological evidence suggest that the largest upper-crustal earthquake within the past 2500 years occurred on the Seattle fault system in A.D. 900. Constraining the rupture characteristics of this event is of singular importance in evaluating the upper-bound seismic hazard and tsunami threat posed by upper-crustal (non-subduction) earthquakes to the Puget Lowland region. It is only possible to model the fault geometry, slip distribution, and moment magnitude of this earthquake with a data set of the surface elevation changes caused by this event. Due to the historic age of this earthquake, we use elevations of an uplifted marine terrace, digitally extracted from LIDAR images, as a novel source of coseismic surface deformation data for this event. Ideal for this forested region, LIDAR images, acquired via airborne laser swath mapping (ALSM), offer a drastic improvement over earlier topographic mapping techniques due to its improved resolution and its ability to measure the ground surface beneath dense vegetative cover. The LIDAR images reveal a single uplifted terrace, dated to 1000 cal yr B.P. near Restoration Point, that is morphologically continuous along the southern shoreline of Bainbridge Island and is visible at comparable elevations within a 25 km by 12 km region encompassing coastlines of West Seattle, Bremerton, East Bremerton, Port Orchard, and Waterman Point. Considering sea level changes since A.D. 900, the maximum uplift magnitudes of shoreline inner edges approach nine meters and are located at the southernmost coastline of Bainbridge Island and the northern tip of Waterman Point, while tilt magnitudes are modest - approaching 0.1 degrees. Although the terrace is locally offset and tilted near the Toe Jam Hill and Waterman north-dipping, reverse fault scarps, the regional uplift pattern is a doubly-plunging antiform with steepened north limb, consistent with its location directly above

  14. ENSEMBLE and AMET: Two Systems and Approaches to a Harmonized, Simplified and Efficient Facility for Air Quality Models Development and Evaluation

    EPA Science Inventory

    The complexity of air quality modeling systems, air quality monitoring data make ad-hoc systems for model evaluation important aids to the modeling community. Among those are the ENSEMBLE system developed by the EC-Joint Research Center, and the AMET software developed by the US-...

  15. Model-Driven Design: Systematically Building Integrated Blended Learning Experiences

    ERIC Educational Resources Information Center

    Laster, Stephen

    2010-01-01

    Developing and delivering curricula that are integrated and that use blended learning techniques requires a highly orchestrated design. While institutions have demonstrated the ability to design complex curricula on an ad-hoc basis, these projects are generally successful at a great human and capital cost. Model-driven design provides a…

  16. Nobiletin, a citrus flavonoid, improves cognitive impairment and reduces soluble Aβ levels in a triple transgenic mouse model of Alzheimer's disease (3XTg-AD).

    PubMed

    Nakajima, Akira; Aoyama, Yuki; Shin, Eun-Joo; Nam, Yunsung; Kim, Hyoung-Chun; Nagai, Taku; Yokosuka, Akihito; Mimaki, Yoshihiro; Yokoi, Tsuyoshi; Ohizumi, Yasushi; Yamada, Kiyofumi

    2015-08-01

    Alzheimer's disease (AD), the most common form of dementia among the elderly, is characterized by the progressive decline of cognitive function. Increasing evidence indicates that the production and accumulation of amyloid β (Aβ), particularly soluble Aβ oligomers, is central to the pathogenesis of AD. Our recent studies have demonstrated that nobiletin, a polymethoxylated flavone from citrus peels, ameliorates learning and memory impairment in olfactory-bulbectomized mice, amyloid precursor protein transgenic mice, NMDA receptor antagonist-treated mice, and senescence-accelerated mouse prone 8. Here, we present evidence that this natural compound improves cognitive impairment and reduces soluble Aβ levels in a triple transgenic mouse model of AD (3XTg-AD) that progressively develops amyloid plaques, neurofibrillary tangles, and cognitive impairments. Treatment with nobiletin (30 mg/kg) for 3 months reversed the impairment of short-term memory and recognition memory in 3XTg-AD mice. Our ELISA analysis also showed that nobiletin reduced the levels of soluble Aβ1-40 in the brain of 3XTg-AD mice. Furthermore, nobiletin reduced ROS levels in the hippocampus of 3XTg-AD as well as wild-type mice. These results suggest that this natural compound has potential to become a novel drug for the treatment and prevention of AD.

  17. Adding Multiple Adipokines into the Model do not Improve Weight Gain Prediction by Leptin Levels in Newborns

    PubMed Central

    Treviño-Garza, Consuelo; Estrada-Zúñiga, Cynthia M.; Mancillas-Adame, Leonardo; Villarreal-Martínez, Laura; Villarreal-Pérez, Jesús Z.; Rodríguez-Balderrama, Isaías; Montes-Tapia, Fernando F.; de la O. Cavazos, Manuel E.

    2016-01-01

    Objective: Most adipose tissue programming is realized in early life. Also, the postnatal three months, rather than the later phases of infancy, may be more relevant in the development of an adverse cardiometabolic risk profile. The adipokines phenotype, as a predictor of early-life weight gain, has been recently explored in cord blood. To determine whether in addition to leptin levels in cord samples, adiponectin, interleukin-6 (IL-6), monocyte chemoattractant protein-1 (MCP-1), resistin, plasminogen activator inhibitor-1 (PAI-1), and tumor necrosis factor alpha (TNF-α) levels improve weight gain prediction during the first three months of life. Methods: Adiponectin, IL-6, MCP-1, leptin, resistin, PAI-1, and TNF-α were measured by multiplex immunoassay in a subsample of 86 healthy term newborns. Results: Leptin levels significantly predicted weight gain at 3 months of follow-up (r2=0.09, p=0.006). In the multivariate analysis, including additional adipokines in the model, stepwise or all at once, did not increase the prediction of weight gain after the first three months of life. Conclusion: Adding adiponectin, IL-6, MCP-1, resistin, PAI-1, and TNF-α to the prediction model of weight gain in healthy newborns did not prove to be useful. It is probable that their relative contribution to weight gain is not important. Only leptin was relevant as a predictor of weight gain at the 3-month endpoint. PMID:27087431

  18. Added value of regional climate modeling over areas characterized by complex terrain—Precipitation over the Alps

    NASA Astrophysics Data System (ADS)

    Torma, Csaba; Giorgi, Filippo; Coppola, Erika

    2015-05-01

    We present an analysis of the added value (AV) of downscaling via regional climate model (RCM) nesting with respect to the driving global climate models (GCMs). We analyze ensembles of driving GCM and nested RCM (two resolutions, 0.44° and 0.11°) simulations for the late 20th and late 21st centuries from the CMIP5, EURO-CORDEX, and MED-CORDEX experiments, with a focus on the Alpine region. Different metrics of AV are investigated, measuring aspects of precipitation where substantial AV can be expected in mountainous terrains: spatial pattern of mean precipitation, daily precipitation intensity distribution, and daily precipitation extremes tails. Comparison with a high-quality, fine-scale (5 km) gridded observational data set shows substantial AV of RCM downscaling for all metrics selected, and results are mostly improved compared to the driving GCMs also when the RCM fields are upscaled at the scale of the GCM resolution. We also find consistent improvements in the high-resolution (0.11°) versus medium-resolution (0.44°) RCM simulations. Finally, we find that the RCM downscaling substantially modulates the GCM-produced precipitation change signal in future climate projections, particularly in terms of fine-scale spatial pattern associated with the complex topography of the region. Our results thus point to the important role that high-resolution nested RCMs can play in the study of climate change over areas characterized by complex topographical features.

  19. Geospatial modeling approach to monument construction using Michigan from A.D. 1000–1600 as a case study

    PubMed Central

    Howey, Meghan C. L.; Palace, Michael W.; McMichael, Crystal H.

    2016-01-01

    Building monuments was one way that past societies reconfigured their landscapes in response to shifting social and ecological factors. Understanding the connections between those factors and monument construction is critical, especially when multiple types of monuments were constructed across the same landscape. Geospatial technologies enable past cultural activities and environmental variables to be examined together at large scales. Many geospatial modeling approaches, however, are not designed for presence-only (occurrence) data, which can be limiting given that many archaeological site records are presence only. We use maximum entropy modeling (MaxEnt), which works with presence-only data, to predict the distribution of monuments across large landscapes, and we analyze MaxEnt output to quantify the contributions of spatioenvironmental variables to predicted distributions. We apply our approach to co-occurring Late Precontact (ca. A.D. 1000–1600) monuments in Michigan: (i) mounds and (ii) earthwork enclosures. Many of these features have been destroyed by modern development, and therefore, we conducted archival research to develop our monument occurrence database. We modeled each monument type separately using the same input variables. Analyzing variable contribution to MaxEnt output, we show that mound and enclosure landscape suitability was driven by contrasting variables. Proximity to inland lakes was key to mound placement, and proximity to rivers was key to sacred enclosures. This juxtaposition suggests that mounds met local needs for resource procurement success, whereas enclosures filled broader regional needs for intergroup exchange and shared ritual. Our study shows how MaxEnt can be used to develop sophisticated models of past cultural processes, including monument building, with imperfect, limited, presence-only data. PMID:27330115

  20. Value Added in English Schools

    ERIC Educational Resources Information Center

    Ray, Andrew; McCormack, Tanya; Evans, Helen

    2009-01-01

    Value-added indicators are now a central part of school accountability in England, and value-added information is routinely used in school improvement at both the national and the local levels. This article describes the value-added models that are being used in the academic year 2007-8 by schools, parents, school inspectors, and other…

  1. Modeling of the thermal state of Mount Vesuvius from 1631 A.D. to present and the role of CO2 degassing on the volcanic conduit closure after the 1944 A.D. eruption

    NASA Astrophysics Data System (ADS)

    Quareni, Francesca; Moretti, Roberto; Piochi, Monica; Chiodini, Giovanni

    2007-03-01

    The last eruptive event at Mount Vesuvius occurred in 1944 A.D., ending a cycle of continuous eruptive activity started with the sub-Plinian event of 1631 A.D. The aim of this research is (1) to model the thermal evolution of the volcanic system from 1631 A.D. up to the present and (2) to investigate the possible process leading the volcano to the current state of quiescence. A finite element software is employed to solve the time-dependent energy equation and obtain the thermal field in the volcanic edifice and the surrounding medium. Volcanological, petrological, and geophysical constraints are used to define the crustal structure beneath the volcanic edifice, the magma supply system active since 1631 A.D., and the physico-chemical conditions of magma. Thermodynamic properties of magma and wall rocks have been evaluated from well-established thermo-chemical compilations and data from the literature. It is shown that heat transfer due to magma degassing is required in addition to the heat conduction in order to obtain transient depth-temperature fields consistent with geochemical observations, high crustal magnetization, and rigid behavior of the shallow crust as indicated by geophysical data. Surface data of carbon dioxide soil flux coming out from the Mount Vesuvius crater are taken to constrain such an additional heat flux. The agreement between modeled and measured temperatures at the crater since 1944 A.D. proves the consistency of the model. It is concluded that the present state of quiescence of Mount Vesuvius is mostly a consequence of the absence of magma supply from the deep reservoir into the shallower system. This allows the cooling of residual magma left within the volcanic conduit and the transition from continuous eruptive activity to the condition of conduit obstruction. In this scenario, the hydrothermal system may have developed subsequent to the cooling of the magma within the conduit. Our findings are a direct consequence of the high

  2. AdS2 holographic dictionary

    NASA Astrophysics Data System (ADS)

    Cvetič, Mirjam; Papadimitriou, Ioannis

    2016-12-01

    We construct the holographic dictionary for both running and constant dilaton solutions of the two dimensional Einstein-Maxwell-Dilaton theory that is obtained by a circle reduction from Einstein-Hilbert gravity with negative cosmological constant in three dimensions. This specific model ensures that the dual theory has a well defined ultraviolet completion in terms of a two dimensional conformal field theory, but our results apply qualitatively to a wider class of two dimensional dilaton gravity theories. For each type of solutions we perform holographic renormalization, compute the exact renormalized one-point functions in the presence of arbitrary sources, and derive the asymptotic symmetries and the corresponding conserved charges. In both cases we find that the scalar operator dual to the dilaton plays a crucial role in the description of the dynamics. Its source gives rise to a matter conformal anomaly for the running dilaton solutions, while its expectation value is the only non trivial observable for constant dilaton solutions. The role of this operator has been largely overlooked in the literature. We further show that the only non trivial conserved charges for running dilaton solutions are the mass and the electric charge, while for constant dilaton solutions only the electric charge is non zero. However, by uplifting the solutions to three dimensions we show that constant dilaton solutions can support non trivial extended symmetry algebras, including the one found by Compère, Song and Strominger [1], in agreement with the results of Castro and Song [2]. Finally, we demonstrate that any solution of this specific dilaton gravity model can be uplifted to a family of asymptotically AdS2 × S 2 or conformally AdS2 × S 2 solutions of the STU model in four dimensions, including non extremal black holes. The four dimensional solutions obtained by uplifting the running dilaton solutions coincide with the so called `subtracted geometries', while those obtained

  3. Linear and Nonlinear Growth Models for Value-Added Assessment: An Application to Spanish Primary and Secondary Schools' Progress in Reading Comprehension

    ERIC Educational Resources Information Center

    Lopez-Martin, Esther; Kuosmanen, Timo; Gaviria, Jose Luis

    2014-01-01

    Value-added models are considered one of the best alternatives not only for accountability purposes but also to improve the school system itself. The estimates provided by these models measure the contribution of schools to students' academic progress, once the effect of other factors outside school control are eliminated. The functional form for…

  4. Item analysis of ADAS-Cog: effect of baseline cognitive impairment in a clinical AD trial.

    PubMed

    Sevigny, Jeffrey J; Peng, Yahong; Liu, Lian; Lines, Christopher R

    2010-03-01

    We explored the association of Alzheimer's disease (AD) Assessment Scale (ADAS-Cog) item scores with AD severity using cross-sectional and longitudinal data from the same study. Post hoc analyses were performed using placebo data from a 12-month trial of patients with mild-to-moderate AD (N =281 randomized, N =209 completed). Baseline distributions of ADAS-Cog item scores by Mini-Mental State Examination (MMSE) score and Clinical Dementia Rating (CDR) sum of boxes score (measures of dementia severity) were estimated using local and nonparametric regressions. Mixed-effect models were used to characterize ADAS-Cog item score changes over time by dementia severity (MMSE: mild =21-26, moderate =14-20; global CDR: mild =0.5-1, moderate =2). In the cross-sectional analysis of baseline ADAS-Cog item scores, orientation was the most sensitive item to differentiate patients across levels of cognitive impairment. Several items showed a ceiling effect, particularly in milder AD. In the longitudinal analysis of change scores over 12 months, orientation was the only item with noticeable decline (8%-10%) in mild AD. Most items showed modest declines (5%-20%) in moderate AD.

  5. Numerical considerations for Lagrangian stochastic dispersion models: Eliminating rogue trajectories, and the importance of numerical accuracy

    Technology Transfer Automated Retrieval System (TEKTRAN)

    When Lagrangian stochastic models for turbulent dispersion are applied to complex flows, some type of ad hoc intervention is almost always necessary to eliminate unphysical behavior in the numerical solution. This paper discusses numerical considerations when solving the Langevin-based particle velo...

  6. An Associative Index Model for the Results List Based on Vannevar Bush's Selection Concept

    ERIC Educational Resources Information Center

    Cole, Charles; Julien, Charles-Antoine; Leide, John E.

    2010-01-01

    Introduction: We define the results list problem in information search and suggest the "associative index model", an ad-hoc, user-derived indexing solution based on Vannevar Bush's description of an associative indexing approach for his memex machine. We further define what selection means in indexing terms with reference to Charles…

  7. A Model for Evaluating the Extent to Which an Institution Reaches Stated Goals and Objectives.

    ERIC Educational Resources Information Center

    Groff, Warren H.

    The components and objectives of North Central Technical College's Planning, Management, and Evaluation System (PME) are presented as a model upon which college administrators can relate institutional goals with societal needs. The report first describes the two-year planning process through which ad hoc committees made up of students, faculty,…

  8. The Performance of the Full Information Maximum Likelihood Estimator in Multiple Regression Models with Missing Data.

    ERIC Educational Resources Information Center

    Enders, Craig K.

    2001-01-01

    Examined the performance of a recently available full information maximum likelihood (FIML) estimator in a multiple regression model with missing data using Monte Carlo simulation and considering the effects of four independent variables. Results indicate that FIML estimation was superior to that of three ad hoc techniques, with less bias and less…

  9. Orientifolded locally AdS3 geometries

    NASA Astrophysics Data System (ADS)

    Loran, F.; Sheikh-Jabbari, M. M.

    2011-01-01

    Continuing the analysis of [Loran F and Sheikh-Jabbari M M 2010 Phys. Lett. B 693 184-7], we classify all locally AdS3 stationary axi-symmetric unorientable solutions to AdS3 Einstein gravity and show that they are obtained by applying certain orientifold projection on AdS3, BTZ or AdS3 self-dual orbifold, respectively, O-AdS3, O-BTZ and O-SDO geometries. Depending on the orientifold fixed surface, the O-surface, which is either a space-like 2D plane or a cylinder, or a light-like 2D plane or a cylinder, one can distinguish four distinct cases. For the space-like orientifold plane or cylinder cases, these geometries solve AdS3 Einstein equations and are hence locally AdS3 everywhere except at the O-surface, where there is a delta-function source. For the light-like cases, the geometry is a solution to Einstein equations even at the O-surface. We discuss the causal structure for static, extremal and general rotating O-BTZ and O-SDO cases as well as the geodesic motion on these geometries. We also discuss orientifolding Poincaré patch AdS3 and AdS2 geometries as a way to geodesic completion of these spaces and comment on the 2D CFT dual to the O-geometries.

  10. ModObs: Atmospheric modelling for wind energy, climate and environment applications : exploring added value from new observation technique

    NASA Astrophysics Data System (ADS)

    Sempreviva, A. M.

    2009-04-01

    The EC FP6 Marie Curie Training Network "ModObs" http://www.modobs.windeng.net addresses the improvement of atmospheric boundary layer (ABL) models to investigate the interplay of processes at different temporal and spatial scales, and to explore the added value from new observation techniques. The overall goal is to bring young scientists to work together with experienced researchers in developing a better interaction amongst scientific communities of modelers and experimentalists, using a comprehensive approach to "Climate Change", "Clean Energy assessment" and "Environmental Policies", issues. This poster describes the work in progress of ten students, funded by the network, under the supervision of a team of scientists within atmospheric physics, engineering and satellite remote sensing and end-users such as companies in the private sector, all with the appropriate expertise to integrate the most advanced research methods and techniques in the following topics. MODELING: GLOBAL-TO-MESO SCALE: Analytical and process oriented numerical models will be used to study the interaction between the atmosphere and the ocean on a regional scale. Initial results indicate an interaction between the intensity of polar lows and the subsurface warm core often present in the Nordic Seas (11). The presence of waves, mainly swell, influence the MABL fluxes and turbulence structure. The regional and global wave effect on the atmosphere will be also studied and quantified (7) MESO-SCALE: Applicability of the planetary boundary layer (PBL) parametrizations in the meso-scale WRF model to marine atmospheric boundary layer (MABL) over the North Sea is investigated. The most suitable existing PBL parametrization will be additionally improved and used for downscaling North Sea past and future climates (2). Application of the meso-scale model (MM5 and WRF) for the wind energy in off-shore and coastal area. Set-up of the meso-scale model, post-processing and verification of the data from

  11. Ad-Hoc Sensor Networks for Maritime Interdiction Operations and Regional Security

    DTIC Science & Technology

    2012-09-01

    which results in the coverage of every location of interest while other sensors of the network that do not possess vital data can hibernate to conserve...perform “sleep and wake up” and “ hibernation ” modes when there is no operational requirement. ARTEMIS has two platforms where sensors can be

  12. Towards Trust-based Cognitive Networks: A Survey of Trust Management for Mobile Ad Hoc Networks

    DTIC Science & Technology

    2009-06-01

    destination.  Wormhole attack: A group of cooperating malicious nodes can pretend to connect two distant points in the network with a low-latency...communication link called wormhole link, causing disruptions in normal traffic load and flow.  Black hole attack: A malicious node, the so called

  13. Providing Effective Security in Mobile Ad Hoc Networks Without Affecting Bandwidth or Interoperability

    DTIC Science & Technology

    2008-12-01

    attacker access to a side-channel. 1.1 Wormhole Attacks Among the most difficult attacks to defend against in a MANET is the wormhole attack (Hu...Rev. 8-98) Prescribed by ANSI Std Z39-18 shown in Fig. 1, a wormhole attack consists of two colluding attackers acting in tandem to distort the...neighbours, and much of the traffic in their local areas, is now sent through a wormhole created by the attackers. Once implemented, the attackers

  14. Mission-Dependent Trust Management in Heterogeneous Military Mobile Ad Hoc Networks

    DTIC Science & Technology

    2010-06-01

    mission requirements. Bertocco and Ferrari [2] proposed a reputation system for a centralized system where an agent can join a group with particular...IPCCC’05), Phoenix, AX, 7-9 Apr. 2005, pp. 303-307. [2] C. Bertocco and C. Ferrari , “Context-Dependent Reputation Management for Soft Security in...Cologne, Germanu, 30 June – 3 July 2008, pp. 1-8. [19] A. Preece, M. Gomez , G. de Mel, W. Vasconcelos, D. Sleeman, S. Colley, G. Pearson, T. Pham

  15. MUSIC algorithm DoA estimation for cooperative node location in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Warty, Chirag; Yu, Richard Wai; ElMahgoub, Khaled; Spinsante, Susanna

    In recent years the technological development has encouraged several applications based on distributed communications network without any fixed infrastructure. The problem of providing a collaborative early warning system for multiple mobile nodes against a fast moving object. The solution is provided subject to system level constraints: motion of nodes, antenna sensitivity and Doppler effect at 2.4 GHz and 5.8 GHz. This approach consists of three stages. The first phase consists of detecting the incoming object using a highly directive two element antenna at 5.0 GHz band. The second phase consists of broadcasting the warning message using a low directivity broad antenna beam using 2× 2 antenna array which then in third phase will be detected by receiving nodes by using direction of arrival (DOA) estimation technique. The DOA estimation technique is used to estimate the range and bearing of the incoming nodes. The position of fast arriving object can be estimated using the MUSIC algorithm for warning beam DOA estimation. This paper is mainly intended to demonstrate the feasibility of early detection and warning system using a collaborative node to node communication links. The simulation is performed to show the behavior of detecting and broadcasting antennas as well as performance of the detection algorithm. The idea can be further expanded to implement commercial grade detection and warning system

  16. Benchmarking of Whole Exome Sequencing and Ad Hoc Designed Panels for Genetic Testing of Hereditary Cancer.

    PubMed

    Feliubadaló, Lídia; Tonda, Raúl; Gausachs, Mireia; Trotta, Jean-Rémi; Castellanos, Elisabeth; López-Doriga, Adriana; Teulé, Àlex; Tornero, Eva; Del Valle, Jesús; Gel, Bernat; Gut, Marta; Pineda, Marta; González, Sara; Menéndez, Mireia; Navarro, Matilde; Capellá, Gabriel; Gut, Ivo; Serra, Eduard; Brunet, Joan; Beltran, Sergi; Lázaro, Conxi

    2017-01-04

    Next generation sequencing panels have been developed for hereditary cancer, although there is some debate about their cost-effectiveness compared to exome sequencing. The performance of two panels is compared to exome sequencing. Twenty-four patients were selected: ten with identified mutations (control set) and fourteen suspicious of hereditary cancer but with no mutation (discovery set). TruSight Cancer (94 genes) and a custom panel (122 genes) were assessed alongside exome sequencing. Eighty-three genes were targeted by the two panels and exome sequencing. More than 99% of bases had a read depth of over 30x in the panels, whereas exome sequencing covered 94%. Variant calling with standard settings identified the 10 mutations in the control set, with the exception of MSH6 c.255dupC using TruSight Cancer. In the discovery set, 240 unique non-silent coding and canonic splice-site variants were identified in the panel genes, 7 of them putatively pathogenic (in ATM, BARD1, CHEK2, ERCC3, FANCL, FANCM, MSH2). The three approaches identified a similar number of variants in the shared genes. Exomes were more expensive than panels but provided additional data. In terms of cost and depth, panels are a suitable option for genetic diagnostics, although exomes also identify variants in non-targeted genes.

  17. Remote detection of riverine traffic using an ad hoc wireless sensor network

    NASA Astrophysics Data System (ADS)

    Athan, Stephan P.

    2005-05-01

    Trafficking of illegal drugs on riverine and inland waterways continues to proliferate in South America. While there has been a successful joint effort to cut off overland and air trafficking routes, there exists a vast river network and Amazon region consisting of over 13,000 water miles that remains difficult to adequately monitor, increasing the likelihood of narcotics moving along this extensive river system. Hence, an effort is underway to provide remote unattended riverine detection in lieu of manned or attended detection measures.

  18. On-Demand Routing in Multi-hop Wireless Mobile Ad Hoc Networks

    DTIC Science & Technology

    2001-05-01

    6.1.1 Link Layer Emulation : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 68 6.1.2 Doppelganger Emulation...74 6.4 Implementing Doppelganger Emulation Via Direct Emulation : : : : : : : : : : : : : : : : 76 6.5 Validation of Direct Emulation...layers or filtering them out, depending on what the current emulated topology is. 6.1.2. Doppelganger Emulation Figure 6.5 depicts a network where

  19. Simultaneous Localization, Calibration, and Tracking in an ad Hoc Sensor Network

    DTIC Science & Technology

    2005-04-26

    4] J. J. Leonard and P. M. Newman, “Consistent, convergent, and constant-time SLAM,” in IJCAI, 2003. [5] Y. Liu , R. Emery, D . Chakrabarti, W. Burgard...2001. [6] S. Thrun, Y. Liu , D . Koller, A.Y. Ng, Z. Ghahramani, and H. Durrant-Whyte, “Simultaneous localiza- tion and mapping with sparse extended...b r i d g e , m a 0 213 9 u s a — w w w. c s a i l . m i t . e d u April 26, 2005MIT-CSAIL-TR-2005-029 AIM-2005-016 Report Documentation Page

  20. Simultaneous Localization and Tracking in Wireless Ad-hoc Sensor Networks

    DTIC Science & Technology

    2005-05-31

    Technical report, MIT Computer Science and AI Lab, http:// nms.lcs.mit.edu/projects/ cricket /#papers, 2003. [2] D . P. Bertsekas and J. T. Tsitsiklis. Parallel...spatial relationships in robotics. In Uncertainity in Artificial Intelligence, 1988. [34] S. Thrun, Y. Liu , D . Koller, A.Y. Ng, Z. Ghahramani, and H...Taylor Technical Report m a s s a c h u s e t t s i n s t i t u t e o f t e c h n o l o g y, c a m b r i d g e , m a 0 213 9 u s a — w w w. c s a

  1. Probabilistic monitoring in intrusion detection module for energy efficiency in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    De Rango, Floriano; Lupia, Andrea

    2016-05-01

    MANETs allow mobile nodes communicating to each other using the wireless medium. A key aspect of these kind of networks is the security, because their setup is done without an infrastructure, so external nodes could interfere in the communication. Mobile nodes could be compromised, misbehaving during the multi-hop transmission of data, or they could have a selfish behavior to save energy, which is another important constraint in MANETs. The detection of these behaviors need a framework that takes into account the latest interactions among nodes, so malicious or selfish nodes could be detected also if their behavior is changed over time. The monitoring activity increases the energy consumption, so our proposal takes into account this issue reducing the energy required by the monitoring system, keeping the effectiveness of the intrusion detection system. The results show an improvement in the saved energy, improving the detection performance too.

  2. On the Connectivity and Multihop Delay of Ad Hoc Cognitive Radio Networks

    DTIC Science & Technology

    2010-05-01

    depends on the density of SUs and the traffic load of PUs. 9 Connectivity: Static Case When PTxs/ PRxs are static over time: PSfrag replacements λ P T...Connectivity: Dynamic Case When temporal dynamics of PTxs/ PRxs are sufficiently rich: PSfrag replacements λ P T (D en si ty of P T xs ) λS (Density of SUs)λ

  3. In-drilling alignment scheme for borehole assembly trajectory tracking over a wireless ad hoc network

    NASA Astrophysics Data System (ADS)

    Odei-Lartey, E.; Hartmann, K.

    2016-05-01

    This paper describes the feasibility and implementation of an In-drilling alignment method for an inertia navigation system based measurement while drilling system as applied to the vertical drilling process, where there is seldom direct access to a reference measurement due the communication network architecture and telemetry framework constraints. It involves the sequential measurement update of multiple nodes by the propagation of the reference measurement sequentially over nodes, each of which has an integrated inertia measurement unit sensor and runs the extended Kalman filter based signal processing unit, until the final measurement update of the main sensor node embedded in the borehole assembly is done. This is done particularly to keep track of the yaw angle position during the drilling process.

  4. 75 FR 33838 - NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-15

    .... Asteroid detection, warning, response, and concepts for deflection. International coordination on planetary..., Advisory Committee Management Officer, National Aeronautics and Space Administration. BILLING CODE P...

  5. Wireless Ad-Hoc Networks with Receiver Multipacket Reception: Performance Analysis and Signal Processing

    DTIC Science & Technology

    2007-11-02

    estimation and symbol detection algorithms are developed for long code wide-band CDMA systems , including systems with multirate and multicode...CDMA systems . If the spreading codes have good cross- and auto-correlation properties, the matched filter front- end suppresses multiaccess...selective fading, however, code orthogonality can not be guaranteed, and the conventional RAKE receiver that uses a bank of matched filters may perform

  6. Receiver-Initiated Channel-Hopping for Ad-Hoc Networks

    DTIC Science & Technology

    2000-01-01

    SRMA (split-channel reservation multiple access) was first proposed by Kleinrock and Tobagi [15], including MACA [12], MACAW [2], IEEE 802.11 [1], and...Physical Layer (PHY) Specifications. IEEE, July 1996. [2] Bharghavan, V. and Demers, A. and Shenker, S. and Zhang, L. MACAW : A Media Access Protocol for

  7. Sender- and Receiver-Initiated Multiple Access Protocols for Ad-Hoc Networks

    DTIC Science & Technology

    2000-12-01

    including MACA [55], MACAW [13], IEEE 802.11 [3], and FAMA [36]. These examples, and most protocols based on collision-avoidance handshakes to date are...used in protocols like MACA [55], MACAW [13] and FAMA [35, 36]. In RIMA with simple polling (RIMA-SP), the receiver sends a Ready-to-Receive (RTR...used the OPNET simulation tool to implement the protocols. Table 2.2 presents the results for RIMA-DP, FAMA-NCS, and MACAW ; the results for MACAW are

  8. Hop-Reservation Multiple Access (HRMA) for Ad-Hoc Networks

    DTIC Science & Technology

    1999-01-01

    5] and MACAW [6]. III. CORRECTNESS OF HRMA The following theorem proves that HRMA eliminates hidden- terminal interference problems. To prove this...Bharghavan, A. Demers, S. Shenker, and L. Zhang, “ MACAW : A Me- dia Access Protocol for Wireless LAN’s,” in Proc. ACM SIGCOMM ’94, pp. 212–25, London

  9. On Some Challenges and Design Choices in AD-HOC Communications

    DTIC Science & Technology

    2000-01-25

    were proposed - the Multi-hop Access Collision Avoidance (MACA) [Karn90] protocol and the Media Access Protocol for Wireless LANs ( MACAW ) protocol...stations are avoided. MACAW is an improvement of MACA in the sense that it solves some of the fairness problems in MACA; i.e., in MACA some nodes can...be denied access for a long time. FAMA [Fullmer95] further improves the MACAW performance by including a non-persistent CDMA mechanism at the beginning

  10. Performance of Floor Acquisition Multiple Access in Ad-Hoc Networks

    DTIC Science & Technology

    1998-01-01

    collision avoidance dialogues (e.g., MACA, MACAW , and IEEE 802.11 DFWMAC) in the presence of hidden terminals. Simulations experiments are used to confirm...connected. Section IV compares by simulation the performance of FAMA-NCS with MACAW and DFWMAC. Our results show very clearly that carrier sensing at...strategies can be adopted (e.g., see those proposed for MACAW [1]). To simplify our analysis and description of FAMA-NCS, we do not address the effect of

  11. Probabilistic Neural Network-Based Sensor Configuration in a Wireless Ad Hoc Network

    DTIC Science & Technology

    2004-12-20

    This paper describes a novel application of a probabilistic neural network for overcoming the computational complexity involved in performing sensor...overcome the computational complexity, we propose the use of a probabilistic neural network (PNN). The task for the PNN is to produce a distance

  12. On the Connectivity and Multihop Delay of Ad Hoc Cognitive Radio Networks

    DTIC Science & Technology

    2011-04-01

    that we can move fast enough such that the driving time on the road is negligible. When the secondary network is instantaneously connected, there...and receiving activities of the primary users. Without loss of generality, we set TS = 1. At the beginning of each slot, the primary transmitters are...the transmission/interference range is a function of the pass- loss exponent. Thus, the pass- loss exponent affects the topology of the secondary

  13. Characterizing Data Streams Over IEEE 802.11b AD-HOC Wireless Networks

    DTIC Science & Technology

    2003-03-01

    system should correctly identify both as HTTP traffic. Also, if one text based e - mail is sent and one image... based e - mail is sent, the system should correctly classify both as e - mail . If the size of the time interval increases, more traffic is captured and...The IIS SMTP service only allows for the configuration of SMTP , not POP3 . Outlook Express requires the SMTP service to send an e - mail message

  14. Army Science Board Ad Hoc Subgroup on Testing of Electronic Systems.

    DTIC Science & Technology

    1981-09-07

    WARREN MORRISON DR. IRENE C. PEDEN MR. JUAN SANDOVAL DR. JOHN R. TOOLEY DR. ANDREW J. VITERBI CONTRIBUTING ARMY MEMBERS COL ROGER W...DIRECTOR OF ENGINEERING AEROJET ELECTRO SYSTEMS COMPANY 1100 W. HOLLYVALE STREET AZUSA, CA 91702 (213) 334-6211 X4214 DR. JOHN R. TOOLEY DEAN...Systems Company 1100 W. Hollyvale St. Azusa, CA 91702 Dr. John R. Tooley 1 Dean of Engineering University of Evansville Post Office Box 329

  15. A Review of LIDAR Radiometric Processing: From Ad Hoc Intensity Correction to Rigorous Radiometric Calibration

    PubMed Central

    Kashani, Alireza G.; Olsen, Michael J.; Parrish, Christopher E.; Wilson, Nicholas

    2015-01-01

    In addition to precise 3D coordinates, most light detection and ranging (LIDAR) systems also record “intensity”, loosely defined as the strength of the backscattered echo for each measured point. To date, LIDAR intensity data have proven beneficial in a wide range of applications because they are related to surface parameters, such as reflectance. While numerous procedures have been introduced in the scientific literature, and even commercial software, to enhance the utility of intensity data through a variety of “normalization”, “correction”, or “calibration” techniques, the current situation is complicated by a lack of standardization, as well as confusing, inconsistent use of terminology. In this paper, we first provide an overview of basic principles of LIDAR intensity measurements and applications utilizing intensity information from terrestrial, airborne topographic, and airborne bathymetric LIDAR. Next, we review effective parameters on intensity measurements, basic theory, and current intensity processing methods. We define terminology adopted from the most commonly-used conventions based on a review of current literature. Finally, we identify topics in need of further research. Ultimately, the presented information helps lay the foundation for future standards and specifications for LIDAR radiometric calibration. PMID:26561813

  16. Spread Spectrum Signal Characteristic Estimation Using Exponential Averaging and an AD-HOC Chip rate Estimator

    DTIC Science & Technology

    2007-03-01

    books.nips.cc/papers/files/nips19/NIPS2006_0137.pdf, last accessed 28 December 2006. [58] D. E. Knuth , The Art of Computer Programming Vol. 2, 2nd ed...potential for parallel processing, resulting in dramatically decreased computational time, without loss of performance. 15. NUMBER OF PAGES 156 14...Clark Robertson David C. Jenn Professor of Electrical Professor of Electrical & Computer

  17. The Ad Hoc Mars Airplane science working group. [remotely piloted airplane as a Mars exploration vehicle

    NASA Technical Reports Server (NTRS)

    Clarke, V. C., Jr.

    1978-01-01

    The capability of a remotely piloted airplane as a Mars exploration vehicle in the aerial survey mode is assessed. Specific experiment areas covered include: visual imaging; gamma ray and infrared reflectance spectroscopy; gravity field; magnetic field and electromagnetic sounding; and atmospheric composition and dynamics. It is concluded that (1) the most important use of a plane in the aerial survey mode would be in topical studies and returned sample site characterization; (2) the airplane offers the unique capability to do high resolution, oblique imaging, and repeated profile measurements in the atmospheric boundary layer; and (3) it offers the best platform from which to do electromagnetic sounding.

  18. An AD HOC hypothesis on the pulsation of Delta Scuti stars

    NASA Astrophysics Data System (ADS)

    Antonello, E.

    It is proposed that the stars in the lower part of the instability strip are pulsating if they have sufficiently high rotational velocity and/or if they are in an appropriate binary system that provides some sort of nonradial hard excitation to pulsate. This should be valid at least for the low amplitude variables. The results of various studies on the Delta Scuti stars do not show a clear confirmation or rejection of this hypothesis, but for the stars in the well-studied Hyades cluster, the rotational velocity has some importance for the discrimination between variable and nonvariable stars in the sense of the hypothesis. The different incidence of spectroscopid binaries among variable and nonvariable stars also supports the hypothesis, at least for dwarfs.

  19. Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks

    PubMed Central

    Madhusudhanan, B.; Chitra, S.; Rajan, C.

    2015-01-01

    In MANET multicasting, forward and backward secrecy result in increased packet drop rate owing to mobility. Frequent rekeying causes large message overhead which increases energy consumption and end-to-end delay. Particularly, the prevailing group key management techniques cause frequent mobility and disconnections. So there is a need to design a multicast key management technique to overcome these problems. In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. A multicast tree is constructed such that for every weak node, there is a strong parent node. A session key-based encryption technique is utilized to transmit a multicast data. The rekeying process is performed periodically by the initiator node. The rekeying interval is fixed depending on the node category so that this technique greatly minimizes the rekeying overhead. By simulation results, we show that our proposed approach reduces the packet drop rate and improves the data confidentiality. PMID:25834838

  20. History of the Standing Joint Force Headquarters for Elimination (SJFHQ-E): No More Ad Hoc

    DTIC Science & Technology

    2014-05-22

    for a Standing Joint Force Headquarters (SJFHQ) - Core Element (CE). Washington, DC: Joint Chiefs of Staff, 2008. Creswell , John W. Qualitative...reduce the threat to the United States and its allies from nuclear, biological, chemical (NBC) weapons … as well as provide research and development...that were known and available for this research project. Project 31 Due to lack of official

  1. Constraints and Approaches for Distributed Mobile AD-HOC Network Security

    DTIC Science & Technology

    2005-11-01

    sizes, and scenarios. Protocols such as Identity- Based Symmetric Keying and Rich Uncle have limited application until the network’s routing...optimized group determination algorithm – The algorithm we are currently using is sub -optimal since it simply finds the largest group available, whereas a...that may result in sub -optimal configurations. • Integration of routing and keying protocols – Despite the additional complexity of integrating

  2. DCU@TRECMed 2012: Using Ad-Hoc Baselines for Domain-Specific Retrieval

    DTIC Science & Technology

    2012-11-01

    description to extend the query, for example: Patients with complicated GERD who receive endoscopy will be extended with Gastroesophageal reflux disease...Clinic / Center - Endoscopy 3.5 Result filtering Initial retrieval results were filtered with respect to constraints given in the query regarding the

  3. Beamspace Multiple Input Multiple Output. Part II: Steerable Antennas in Mobile Ad Hoc Networks

    DTIC Science & Technology

    2016-09-01

    reconfigurable antenna in- cluding the electronically steerable parasitic array radiator (ESPAR) promises a low form-factor steerable antenna with a single RF...MIMO that, in theory, approaches MIMO capacity using a single transceiver and an electronically steerable directional antenna. Standard MIMO transmits...Beamspace MIMO requires electronically steerable antennas. One such antenna is the Elec- tronically Steerable Parasitic Antenna Radiator (ESPAR). The initial

  4. Ultra-Wideband Impulse Radio for Tactical Ad-Hoc Military Communications

    DTIC Science & Technology

    2010-09-02

    21], [23]. Rather than using simulations to show the bit-error- probability ( BEP ) performance with MAI as found in [14] and [15], we incorporate...the power 4 delay profile (PDP) of the channel, inspired by the work in [13], to derive the variance of the MAI, enabling theoretical BEP analysis. Our...an upper bound on the BEP , the number of equal-power users that the system can support is evaluated for different modulation order M. The network

  5. High Throughput via Cross-Layer Interference Alignment for Mobile Ad Hoc Networks

    DTIC Science & Technology

    2013-08-26

    minimized, e.g. all the signals are to be received within the cyclic prefix of orthogonal frequency division multiplexing ( OFDM ) system. For frequency...transmission [77]. In [77], the master continuously sends its OFDM -based training to the slaves via a dedicated synchronization channel, and the phase rotation...of OFDM subcarriers caused by time and frequency offset from the master is measured and compensated by the slaves before they send their own data

  6. Army Science Board: Report of the Ad Hoc Subgroup on the Army Community and Their Families

    DTIC Science & Technology

    1989-05-01

    used, poor location on base from housing, and problems with transportation from housing to gym after school. Have moved in travel agency into...net from travel agency - which should amount to an additional $50,000 a year for youth programs. The present gym is under-used because of

  7. Frequent Itemset Mining for Query Expansion in Microblog Ad-hoc Search

    DTIC Science & Technology

    2012-11-01

    captin, @rayhattersley, #rhythm, almond, #lift, #white, rhythm, #blues, #sci- ence, loss*, you, #eating, #beauty, ambria, #with, weight*, diets , white...puwisdom, sci- ence, #and, @pulistbook, lift, dingle, @mir- acleweight, @tweettraffic4u, # diets , oranges, #of, @aase25, and*, berries*, #no...and, it, is, daily* MB055 benefits, with, acai, their, diet , on, of, wt, health, plans, ber, for, first, how, are, loss*, you, this, mt, lose, weight

  8. Information Potential Fields Navigation in Wireless Ad-Hoc Sensor Networks

    PubMed Central

    Wei, Wei; Qi, Yong

    2011-01-01

    As wireless sensor networks (WSNs) are increasingly being deployed in some important applications, it becomes imperative that we consider application requirements in in-network processes. We intend to use a WSN to aid information querying and navigation within a dynamic and real-time environment. We propose a novel method that relies on the heat diffusion equation to finish the navigation process conveniently and easily. From the perspective of theoretical analysis, our proposed work holds the lower constraint condition. We use multiple scales to reach the goal of accurate navigation. We present a multi-scale gradient descent method to satisfy users’ requirements in WSNs. Formula derivations and simulations show that the method is accurately and efficiently able to solve typical sensor network configuration information navigation problems. Simultaneously, the structure of heat diffusion equation allows more flexibility and adaptability in searching algorithm designs. PMID:22163876

  9. JTP: An Energy-conscious Transport Protocol for Wireless Ad Hoc Networks

    DTIC Science & Technology

    2006-01-01

    notification (eten) for error-prone wireless and satellite networks,” Comput. Networks, vol. 46, no. 3, pp. 343–362, 2004. [19] D. Barman and I. Matta...Communication,” Wireless Networks, vol. 6, pp. 263–277, 2000. [24] D. Barman , I. Matta, E. Altman, and R. E. Azouzi, “TCP Optimization through FEC

  10. MELOC - Memory and Location Optimized Caching for Mobile Ad Hoc Networks

    DTIC Science & Technology

    2011-01-01

    locations PZID, CZID, <CD> list O/P: Cache Reallocation Operation Notations: PZ Previous Zone CZ Current Zone NCD List of nodes whose original...zone C Cache location crossing the zone CD[C] Cached data of C Trigger :( Cache Location moving from PZ to CZ) if (( NCD minus NPZ)> NCD /2) then...Insert CD[C] into H [PZ] Else No operation if (( NCD minus NCZ)> NCD /2) then No operation Else Delete CD[C] from C

  11. Army Science Board 2001 AD HOC Study "Knowledge Management"

    DTIC Science & Technology

    2001-11-01

    dissemination, Army, Army culture, information dominance , knowledge dominance, information sharing, situational awareness, network-centric, infosphere...proposed effort and the emerging Army ICT for Information Dominance are all excellent foundation efforts for KM and Information Assurance. The panel’s...level is critical to survivability and lethality. – Unreliable information will quickly reverse the advantages of “ Information Dominance ” essential to

  12. Towards Optimization of Macrocognitive Processes: Automating Analysis of the Emergence of Leadership in Ad Hoc Teams

    DTIC Science & Technology

    2014-04-21

    X ...tasks. To use multiple representations (more than two) to link information across artifacts during decision making processes X X X X X X X X ... X team. The goal should be to maximize cognitive power through specialization. Team 2 Common X X X X X X X X X X X X X X

  13. Inter-Vehicular Ad Hoc Networks: From the Ground Truth to Algorithm Design and Testbed Architecture

    ERIC Educational Resources Information Center

    Giordano, Eugenio

    2011-01-01

    Many of the devices we interact with on a daily basis are currently equipped with wireless connectivity. Soon this will be extended to the vehicles we drive/ride every day. Wirelessly connected vehicles will form a new kind of network that will enable a wide set of innovative applications ranging from enhanced safety to entertainment. To…

  14. Ad Hoc Conference on the Education of Migrants. Country Report (Sweden).

    ERIC Educational Resources Information Center

    Standing Conference of European Ministers of Education, Strasbourg (France).

    Sweden, like most European countries, never set out to be an immigration country. Since its Government and Parliament have subscribed to the principle of maximum mobility across national frontiers, more than 400,000 foreign citizens and 200,000 former aliens reside in Sweden today. Immigration to Sweden is not completely free, though. A policy of…

  15. Energy Efficient and Stable Weight Based Clustering for Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Bouk, Safdar H.; Sasase, Iwao

    Recently several weighted clustering algorithms have been proposed, however, to the best of our knowledge; there is none that propagates weights to other nodes without weight message for leader election, normalizes node parameters and considers neighboring node parameters to calculate node weights. In this paper, we propose an Energy Efficient and Stable Weight Based Clustering (EE-SWBC) algorithm that elects cluster heads without sending any additional weight message. It propagates node parameters to its neighbors through neighbor discovery message (HELLO Message) and stores these parameters in neighborhood list. Each node normalizes parameters and efficiently calculates its own weight and the weights of neighboring nodes from that neighborhood table using Grey Decision Method (GDM). GDM finds the ideal solution (best node parameters in neighborhood list) and calculates node weights in comparison to the ideal solution. The node(s) with maximum weight (parameters closer to the ideal solution) are elected as cluster heads. In result, EE-SWBC fairly selects potential nodes with parameters closer to ideal solution with less overhead. Different performance metrics of EE-SWBC and Distributed Weighted Clustering Algorithm (DWCA) are compared through simulations. The simulation results show that EE-SWBC maintains fewer average numbers of stable clusters with minimum overhead, less energy consumption and fewer changes in cluster structure within network compared to DWCA.

  16. Ad Hoc Committee on NAEP Parent Engagement: Reaching Parents with NAEP Resources

    ERIC Educational Resources Information Center

    National Assessment Governing Board, 2012

    2012-01-01

    The National Assessment Governing Board, recognizing that National Assessment of Educational Progress (NAEP) report releases were not conveying a sense of urgency, began an initiative in May 2010 to see what the Board could do to "make a difference" in fostering concern and action about the need to improve achievement and reduce…

  17. MSG Instant Messenger: Social Presence and Location for the "'Ad Hoc' Learning Experience"

    ERIC Educational Resources Information Center

    Little, Alex; Denham, Chris; Eisenstadt, Marc

    2008-01-01

    "Elearning2.0" promises to harness the power of three of today's most disruptive technologies: social software, elearning, and Web2.0. Our own work in this disruptive space takes as a starting premise that social networking is critical for learning: finding the right person can be more important than "scouring the web for an answer" particularly…

  18. Ad-hoc KEEN-type Waves and their Occasional Resemblance to KdV Waveforms

    NASA Astrophysics Data System (ADS)

    Tyshetskiy, Yuriy; Afeyan, Bedros

    2005-10-01

    Nonlinear kinetic waves of the KEEN type [1] but constructed with two BGK recipes are tested with 1D Vlasov-Poisson simulation (1DVPS). One is that of Allis [2] as modified by Johnston (unpublished), the other is that of Eliasson and Shukla [3]. Strong kinetic waves survive well, but not weaker ones. The potential wave trains resemble those from the Korteweg-deVries equation. This proves to be natural when charge density variation with electrostatic potential is like a quadratic polynomial. For expositions on the physics of ponderomotively driven KEEN waves, consult presentations by Afeyan and Savchenko, this conference. (Part of this work was performed under the auspices of the U.S. Department of Energy under grant number DE-FG03-NA00059.) [1] B. Afeyan et al., ``Kinetic Electrostatic Electron Nonlinear (KEEN) Waves and their interactions driven by the ponderomotive force of crossing laser beams'', Proc. IFSA (Inertial Fusion Sciences and Applications 2003, Monterey, CA), 213, B. Hammel, D. Meyerhofer, J. Meyer-ter-Vehn and H. Azechi, editors, American Nuclear Society, 2004. [2] W.P. Allis, paper 3 (pp.21-42), in ``In Honor of Philip M. Morse'', ed. H. Feshbach and K. Ingard, MIT Press (1969). [3] B. Eliasson and P.K. Shukla, Phys. Rev. E 71, 046402 (2005)

  19. Report of the Army Scientific Advisory Panel Ad Hoc Group on Fire Suppression

    DTIC Science & Technology

    1975-07-01

    the human sensory process. Combining analyses of the signal 26 Gil .{MM***■•*- «■ m »»*»« B !|»jf^ J-titMihi M ■ i m -’ fcaa^fe mm~MmiMm...34% ^ *. *> *% > *% <*■ 4 1 m m 2. Internal a. individual b . group This categorization identifies what appear to be the major classes of...a. w> •i b »» •i \\ — V» o - M 111 ::> v »1 <c IA «C u. w u. ii 0 r> W> VI r» »- Ul A. * o J ui er 0 5 r » tol 1«- K

  20. Ad Hoc Subgroup on Threat of Aids on Operational Deployment of Army Forces to a Theater

    DTIC Science & Technology

    1990-08-01

    possible through: (I) behavior modification ; (2) vaccines; or (3) prophylactic drugs. The need to influence personal behavior is of paramount importance...22 at behavior modification , since no methods exist to cure HIV-infected individuals, no prophylactic drugs or vaccines are available, and current...Research and Behavior Modification . The Army HIV educational effort for behavior modification must receive finarcial backing and personnel resources