Sample records for ad hoc retrieval

  1. Strategies for generating multiple instances of common and ad hoc categories.

    PubMed

    Vallée-Tourangeau, F; Anthony, S H; Austin, N G

    1998-09-01

    In a free-emission procedure participants were asked to generate instances of a given category and to report, retrospectively, the strategies that they were aware of using in retrieving instances. In two studies reported here, participants generated instances for common categories (e.g. fruit) and for ad hoc categories (e.g., things people keep in their pockets) for 90 seconds and for each category described how they had proceeded in doing so. Analysis of the protocols identified three broad classes of strategy: (1) experiential, where memories of specific or generic personal experiences involving interactions with the category instances acted as cues; (2) semantic, where a consideration of abstract conceptual characteristics of a category were employed to retrieve category exemplars; (3) unmediated, where instances were effortlessly retrieved without mediating cognitions of which subjects were aware. Experiential strategies outnumbered semantic strategies (on average 4 to 1) not only for ad hoc categories but also for common categories. This pattern was noticeably reversed for ad hoc categories that subjects were unlikely to have experienced personally (e.g. things sold on the black market in Russia). Whereas more traditional accounts of semantic memory have favoured decontextualised abstract representations of category knowledge, to the extent that mode of access informs us of knowledge structures, our data suggest that category knowledge is significantly grounded in terms of everyday contexts where category instances are encountered.

  2. Ad hoc vs. Non-ad hoc Percutaneous Coronary Intervention Strategies in Patients With Stable Coronary Artery Disease.

    PubMed

    Toyota, Toshiaki; Morimoto, Takeshi; Shiomi, Hiroki; Ando, Kenji; Ono, Koh; Shizuta, Satoshi; Kato, Takao; Saito, Naritatsu; Furukawa, Yutaka; Nakagawa, Yoshihisa; Horie, Minoru; Kimura, Takeshi

    2017-03-24

    Few studies have evaluated the prevalence and clinical outcomes of ad hoc percutaneous coronary intervention (PCI), performing diagnostic coronary angiography and PCI in the same session, in stable coronary artery disease (CAD) patients.Methods and Results:From the CREDO-Kyoto PCI/CABG registry cohort-2, 6,943 patients were analyzed as having stable CAD and undergoing first PCI. Ad hoc PCI and non-ad hoc PCI were performed in 1,722 (24.8%) and 5,221 (75.1%) patients, respectively. The cumulative 5-year incidence and adjusted risk for all-cause death were not significantly different between the 2 groups (15% vs. 15%, P=0.53; hazard ratio: 1.15, 95% confidence interval: 0.98-1.35, P=0.08). Ad hoc PCI relative to non-ad hoc PCI was associated with neutral risk for myocardial infarction, any coronary revascularization, and bleeding, but was associated with a trend towards lower risk for stroke (hazard ratio: 0.78, 95% confidence interval: 0.60-1.02, P=0.06). Ad hoc PCI in stable CAD patients was associated with at least comparable 5-year clinical outcomes as with non-ad hoc PCI. Considering patients' preference and the cost-saving, the ad hoc PCI strategy might be a safe and attractive option for patients with stable CAD, although the prevalence of ad hoc PCI was low in the current study population.

  3. Ad Hoc Information Extraction for Clinical Data Warehouses.

    PubMed

    Dietrich, Georg; Krebs, Jonathan; Fette, Georg; Ertl, Maximilian; Kaspar, Mathias; Störk, Stefan; Puppe, Frank

    2018-05-01

    Clinical Data Warehouses (CDW) reuse Electronic health records (EHR) to make their data retrievable for research purposes or patient recruitment for clinical trials. However, much information are hidden in unstructured data like discharge letters. They can be preprocessed and converted to structured data via information extraction (IE), which is unfortunately a laborious task and therefore usually not available for most of the text data in CDW. The goal of our work is to provide an ad hoc IE service that allows users to query text data ad hoc in a manner similar to querying structured data in a CDW. While search engines just return text snippets, our systems also returns frequencies (e.g. how many patients exist with "heart failure" including textual synonyms or how many patients have an LVEF < 45) based on the content of discharge letters or textual reports for special investigations like heart echo. Three subtasks are addressed: (1) To recognize and to exclude negations and their scopes, (2) to extract concepts, i.e. Boolean values and (3) to extract numerical values. We implemented an extended version of the NegEx-algorithm for German texts that detects negations and determines their scope. Furthermore, our document oriented CDW PaDaWaN was extended with query functions, e.g. context sensitive queries and regex queries, and an extraction mode for computing the frequencies for Boolean and numerical values. Evaluations in chest X-ray reports and in discharge letters showed high F1-scores for the three subtasks: Detection of negated concepts in chest X-ray reports with an F1-score of 0.99 and in discharge letters with 0.97; of Boolean values in chest X-ray reports about 0.99, and of numerical values in chest X-ray reports and discharge letters also around 0.99 with the exception of the concept age. The advantages of an ad hoc IE over a standard IE are the low development effort (just entering the concept with its variants), the promptness of the results and the

  4. DAWN: Dynamic Ad-hoc Wireless Network

    DTIC Science & Technology

    2016-06-19

    DAWN: Dynamic Ad-hoc Wireless Network The DAWN (Dynamic Ad-hoc Wireless Networks) project is developing a general theory of complex and dynamic... wireless communication networks. To accomplish this, DAWN adopts a very different approach than those followed in the past and summarized above. DAWN... wireless communication networks. The members of DAWN investigated difference aspects of wireless mobile ad hoc networks (MANET). The views, opinions and/or

  5. Ad Hoc Access Gateway Selection Algorithm

    NASA Astrophysics Data System (ADS)

    Jie, Liu

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. For mobile nodes in Ad Hoc network to internet, internet communications in the peer nodes must be achieved through the gateway. Therefore, the key Ad Hoc Access Networks will focus on the discovery gateway, as well as gateway selection in the case of multi-gateway and handover problems between different gateways. This paper considers the mobile node and the gateway, based on the average number of hops from an average access time and the stability of routes, improved gateway selection algorithm were proposed. An improved gateway selection algorithm, which mainly considers the algorithm can improve the access time of Ad Hoc nodes and the continuity of communication between the gateways, were proposed. This can improve the quality of communication across the network.

  6. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks.

    PubMed

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV.

  7. Effective Ad-Hoc Committees.

    ERIC Educational Resources Information Center

    Young, David G.

    1983-01-01

    Ad-hoc committees may be symbolic, informational, or action committees. A literature survey indicates such committees' structural components include a suprasystem and three subsystems involving linkages, production, and implementation. Other variables include size, personal factors, and timing. All the factors carry implications about ad-hoc…

  8. Research of Ad Hoc Networks Access Algorithm

    NASA Astrophysics Data System (ADS)

    Xiang, Ma

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.

  9. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks

    PubMed Central

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV. PMID:27258013

  10. Enhanced Weight based DSR for Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Verma, Samant; Jain, Sweta

    2011-12-01

    Routing in ad hoc network is a great problematic, since a good routing protocol must ensure fast and efficient packet forwarding, which isn't evident in ad hoc networks. In literature there exists lot of routing protocols however they don't include all the aspects of ad hoc networks as mobility, device and medium constraints which make these protocols not efficient for some configuration and categories of ad hoc networks. Thus in this paper we propose an improvement of Weight Based DSR in order to include some of the aspects of ad hoc networks as stability, remaining battery power, load and trust factor and proposing a new approach Enhanced Weight Based DSR.

  11. 14 CFR 1203.903 - Ad hoc committees.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Ad hoc committees. 1203.903 Section 1203.903 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.903 Ad hoc committees. The Chairperson is authorized to...

  12. 14 CFR 1203.903 - Ad hoc committees.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Ad hoc committees. 1203.903 Section 1203.903 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.903 Ad hoc committees. The Chairperson is authorized...

  13. Assured Information Sharing for Ad-Hoc Collaboration

    ERIC Educational Resources Information Center

    Jin, Jing

    2009-01-01

    Collaborative information sharing tends to be highly dynamic and often ad hoc among organizations. The dynamic natures and sharing patterns in ad-hoc collaboration impose a need for a comprehensive and flexible approach to reflecting and coping with the unique access control requirements associated with the environment. This dissertation…

  14. Innovative research of AD HOC network mobility model

    NASA Astrophysics Data System (ADS)

    Chen, Xin

    2017-08-01

    It is difficult for researchers of AD HOC network to conduct actual deployment during experimental stage as the network topology is changeable and location of nodes is unfixed. Thus simulation still remains the main research method of the network. Mobility model is an important component of AD HOC network simulation. It is used to describe the movement pattern of nodes in AD HOC network (including location and velocity, etc.) and decides the movement trail of nodes, playing as the abstraction of the movement modes of nodes. Therefore, mobility model which simulates node movement is an important foundation for simulation research. In AD HOC network research, mobility model shall reflect the movement law of nodes as truly as possible. In this paper, node generally refers to the wireless equipment people carry. The main research contents include how nodes avoid obstacles during movement process and the impacts of obstacles on the mutual relation among nodes, based on which a Node Self Avoiding Obstacle, i.e. NASO model is established in AD HOC network.

  15. Topology Control and Routing in Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Carr-Motyckova, Lenka; Navarra, Alfredo; Johansson, Tomas; Unger, Walter

    Mobile nodes with the ability to communicate with radio signals may form an ad hoc network. In this chapter special problems arising for these ad hoc networks are considered. These include range control, the reduction of interferences, regulation of power consumption, and localization.

  16. CSR: Constrained Selfish Routing in Ad-Hoc Networks

    NASA Astrophysics Data System (ADS)

    Bassem, Christine; Bestavros, Azer

    Routing protocols for ad-hoc networks assume that the nodes forming the network are either under a single authority, or else that they would be altruistically forwarding data for other nodes with no expectation of a return. These assumptions are unrealistic since in ad-hoc networks, nodes are likely to be autonomous and rational (selfish), and thus unwilling to help unless they have an incentive to do so. Providing such incentives is an important aspect that should be considered when designing ad-hoc routing protocols. In this paper, we propose a dynamic, decentralized routing protocol for ad-hoc networks that provides incentives in the form of payments to intermediate nodes used to forward data for others. In our Constrained Selfish Routing (CSR) protocol, game-theoretic approaches are used to calculate payments (incentives) that ensure both the truthfulness of participating nodes and the fairness of the CSR protocol. We show through simulations that CSR is an energy efficient protocol and that it provides lower communication overhead in the best and average cases compared to existing approaches.

  17. Analysis of Pervasive Mobile Ad Hoc Routing Protocols

    NASA Astrophysics Data System (ADS)

    Qadri, Nadia N.; Liotta, Antonio

    Mobile ad hoc networks (MANETs) are a fundamental element of pervasive networks and therefore, of pervasive systems that truly support pervasive computing, where user can communicate anywhere, anytime and on-the-fly. In fact, future advances in pervasive computing rely on advancements in mobile communication, which includes both infrastructure-based wireless networks and non-infrastructure-based MANETs. MANETs introduce a new communication paradigm, which does not require a fixed infrastructure - they rely on wireless terminals for routing and transport services. Due to highly dynamic topology, absence of established infrastructure for centralized administration, bandwidth constrained wireless links, and limited resources in MANETs, it is challenging to design an efficient and reliable routing protocol. This chapter reviews the key studies carried out so far on the performance of mobile ad hoc routing protocols. We discuss performance issues and metrics required for the evaluation of ad hoc routing protocols. This leads to a survey of existing work, which captures the performance of ad hoc routing algorithms and their behaviour from different perspectives and highlights avenues for future research.

  18. Analysis on Multicast Routing Protocols for Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Xiang, Ma

    As the Mobile Ad Hoc Networks technologies face a series of challenges like dynamic changes of topological structure, existence of unidirectional channel, limited wireless transmission bandwidth, the capability limitations of mobile termination and etc, therefore, the research to mobile Ad Hoc network routings inevitablely undertake a more important task than those to other networks. Multicast is a mode of communication transmission oriented to group computing, which sends the data to a group of host computers by using single source address. In a typical mobile Ad Hoc Network environment, multicast has a significant meaning. On the one hand, the users of mobile Ad Hoc Network usually need to form collaborative working groups; on the other hand, this is also an important means of fully using the broadcast performances of wireless communication and effectively using the limited wireless channel resources. This paper summarizes and comparatively analyzes the routing mechanisms of various existing multicast routing protocols according to the characteristics of mobile Ad Hoc network.

  19. AD HOC Networks for the Autonomous Car

    NASA Astrophysics Data System (ADS)

    Ron, Davidescu; Negrus, Eugen

    2017-10-01

    The future of the vehicle is made of cars, roads and infrastructures connected in a two way automated communication in a holistic system. It is a mandatory to use Encryption to maintain Confidentiality, Integrity and Availability in an ad hoc vehicle network. Vehicle to Vehicle communication, requires multichannel interaction between mobile, moving and changing parties to insure the full benefit from data sharing and real time decision making, a network of such users referred as mobile ad hoc network (MANET), however as ad hoc networks were not implemented in such a scale, it is not clear what is the best method and protocol to apply. Furthermore the visibility of secure preferred asymmetric encrypted ad hoc networks in a real time environment of dense moving autonomous vehicles has to be demonstrated, In order to evaluate the performance of Ad Hoc networks in changing conditions a simulation of multiple protocols was performed on large number of mobile nodes. The following common routing protocols were tested, DSDV is a proactive protocol, every mobile station maintains a routing table with all available destinations, DSR is a reactive routing protocol which allows nodes in the MANET to dynamically discover a source route across multiple network hops, AODV is a reactive routing protocol Instead of being proactive. It minimizes the number of broadcasts by creating routes based on demand, SAODV is a secure version of AODV, requires heavyweight asymmetric cryptographic, ARIANDE is a routing protocol that relies on highly efficient symmetric cryptography the concept is primarily based on DSR. A methodical evolution was performed in a various density of transportation, based on known communication bench mark parameters including, Throughput Vs. time, Routing Load per packets and bytes. Out of the none encrypted protocols, It is clear that in terms of performance of throughput and routing load DSR protocol has a clear advantage the high node number mode. The encrypted

  20. Ad hoc Laser networks component technology for modular spacecraft

    NASA Astrophysics Data System (ADS)

    Huang, Xiujun; Shi, Dele; Ma, Zongfeng; Shen, Jingshi

    2016-03-01

    Distributed reconfigurable satellite is a new kind of spacecraft system, which is based on a flexible platform of modularization and standardization. Based on the module data flow analysis of the spacecraft, this paper proposes a network component of ad hoc Laser networks architecture. Low speed control network with high speed load network of Microwave-Laser communication mode, no mesh network mode, to improve the flexibility of the network. Ad hoc Laser networks component technology was developed, and carried out the related performance testing and experiment. The results showed that ad hoc Laser networks components can meet the demand of future networking between the module of spacecraft.

  1. Ad hoc laser networks component technology for modular spacecraft

    NASA Astrophysics Data System (ADS)

    Huang, Xiujun; Shi, Dele; Shen, Jingshi

    2017-10-01

    Distributed reconfigurable satellite is a new kind of spacecraft system, which is based on a flexible platform of modularization and standardization. Based on the module data flow analysis of the spacecraft, this paper proposes a network component of ad hoc Laser networks architecture. Low speed control network with high speed load network of Microwave-Laser communication mode, no mesh network mode, to improve the flexibility of the network. Ad hoc Laser networks component technology was developed, and carried out the related performance testing and experiment. The results showed that ad hoc Laser networks components can meet the demand of future networking between the module of spacecraft.

  2. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    PubMed Central

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  3. Sputnik: ad hoc distributed computation.

    PubMed

    Völkel, Gunnar; Lausser, Ludwig; Schmid, Florian; Kraus, Johann M; Kestler, Hans A

    2015-04-15

    In bioinformatic applications, computationally demanding algorithms are often parallelized to speed up computation. Nevertheless, setting up computational environments for distributed computation is often tedious. Aim of this project were the lightweight ad hoc set up and fault-tolerant computation requiring only a Java runtime, no administrator rights, while utilizing all CPU cores most effectively. The Sputnik framework provides ad hoc distributed computation on the Java Virtual Machine which uses all supplied CPU cores fully. It provides a graphical user interface for deployment setup and a web user interface displaying the current status of current computation jobs. Neither a permanent setup nor administrator privileges are required. We demonstrate the utility of our approach on feature selection of microarray data. The Sputnik framework is available on Github http://github.com/sysbio-bioinf/sputnik under the Eclipse Public License. hkestler@fli-leibniz.de or hans.kestler@uni-ulm.de Supplementary data are available at Bioinformatics online. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  4. Trust recovery model of Ad Hoc network based on identity authentication scheme

    NASA Astrophysics Data System (ADS)

    Liu, Jie; Huan, Shuiyuan

    2017-05-01

    Mobile Ad Hoc network trust model is widely used to solve mobile Ad Hoc network security issues. Aiming at the problem of reducing the network availability caused by the processing of malicious nodes and selfish nodes in mobile Ad Hoc network routing based on trust model, an authentication mechanism based on identity authentication mobile Ad Hoc network is proposed, which uses identity authentication to identify malicious nodes, And trust the recovery of selfish nodes in order to achieve the purpose of reducing network congestion and improving network quality. The simulation results show that the implementation of the mechanism can effectively improve the network availability and security.

  5. MWAHCA: A Multimedia Wireless Ad Hoc Cluster Architecture

    PubMed Central

    Diaz, Juan R.; Jimenez, Jose M.; Sendra, Sandra

    2014-01-01

    Wireless Ad hoc networks provide a flexible and adaptable infrastructure to transport data over a great variety of environments. Recently, real-time audio and video data transmission has been increased due to the appearance of many multimedia applications. One of the major challenges is to ensure the quality of multimedia streams when they have passed through a wireless ad hoc network. It requires adapting the network architecture to the multimedia QoS requirements. In this paper we propose a new architecture to organize and manage cluster-based ad hoc networks in order to provide multimedia streams. Proposed architecture adapts the network wireless topology in order to improve the quality of audio and video transmissions. In order to achieve this goal, the architecture uses some information such as each node's capacity and the QoS parameters (bandwidth, delay, jitter, and packet loss). The architecture splits the network into clusters which are specialized in specific multimedia traffic. The real system performance study provided at the end of the paper will demonstrate the feasibility of the proposal. PMID:24737996

  6. MWAHCA: a multimedia wireless ad hoc cluster architecture.

    PubMed

    Diaz, Juan R; Lloret, Jaime; Jimenez, Jose M; Sendra, Sandra

    2014-01-01

    Wireless Ad hoc networks provide a flexible and adaptable infrastructure to transport data over a great variety of environments. Recently, real-time audio and video data transmission has been increased due to the appearance of many multimedia applications. One of the major challenges is to ensure the quality of multimedia streams when they have passed through a wireless ad hoc network. It requires adapting the network architecture to the multimedia QoS requirements. In this paper we propose a new architecture to organize and manage cluster-based ad hoc networks in order to provide multimedia streams. Proposed architecture adapts the network wireless topology in order to improve the quality of audio and video transmissions. In order to achieve this goal, the architecture uses some information such as each node's capacity and the QoS parameters (bandwidth, delay, jitter, and packet loss). The architecture splits the network into clusters which are specialized in specific multimedia traffic. The real system performance study provided at the end of the paper will demonstrate the feasibility of the proposal.

  7. Hybrid Packet-Pheromone-Based Probabilistic Routing for Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Kashkouli Nejad, Keyvan; Shawish, Ahmed; Jiang, Xiaohong; Horiguchi, Susumu

    Ad-Hoc networks are collections of mobile nodes communicating using wireless media without any fixed infrastructure. Minimal configuration and quick deployment make Ad-Hoc networks suitable for emergency situations like natural disasters or military conflicts. The current Ad-Hoc networks can only support either high mobility or high transmission rate at a time because they employ static approaches in their routing schemes. However, due to the continuous expansion of the Ad-Hoc network size, node-mobility and transmission rate, the development of new adaptive and dynamic routing schemes has become crucial. In this paper we propose a new routing scheme to support high transmission rates and high node-mobility simultaneously in a big Ad-Hoc network, by combining a new proposed packet-pheromone-based approach with the Hint Based Probabilistic Protocol (HBPP) for congestion avoidance with dynamic path selection in packet forwarding process. Because of using the available feedback information, the proposed algorithm does not introduce any additional overhead. The extensive simulation-based analysis conducted in this paper indicates that the proposed algorithm offers small packet-latency and achieves a significantly higher delivery probability in comparison with the available Hint-Based Probabilistic Protocol (HBPP).

  8. Quantum load balancing in ad hoc networks

    NASA Astrophysics Data System (ADS)

    Hasanpour, M.; Shariat, S.; Barnaghi, P.; Hoseinitabatabaei, S. A.; Vahid, S.; Tafazolli, R.

    2017-06-01

    This paper presents a novel approach in targeting load balancing in ad hoc networks utilizing the properties of quantum game theory. This approach benefits from the instantaneous and information-less capability of entangled particles to synchronize the load balancing strategies in ad hoc networks. The quantum load balancing (QLB) algorithm proposed by this work is implemented on top of OLSR as the baseline routing protocol; its performance is analyzed against the baseline OLSR, and considerable gain is reported regarding some of the main QoS metrics such as delay and jitter. Furthermore, it is shown that QLB algorithm supports a solid stability gain in terms of throughput which stands a proof of concept for the load balancing properties of the proposed theory.

  9. Supporting Dynamic Ad hoc Collaboration Capabilities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Agarwal, Deborah A.; Berket, Karlo

    2003-07-14

    Modern HENP experiments such as CMS and Atlas involve as many as 2000 collaborators around the world. Collaborations this large will be unable to meet often enough to support working closely together. Many of the tools currently available for collaboration focus on heavy-weight applications such as videoconferencing tools. While these are important, there is a more basic need for tools that support connecting physicists to work together on an ad hoc or continuous basis. Tools that support the day-to-day connectivity and underlying needs of a group of collaborators are important for providing light-weight, non-intrusive, and flexible ways to work collaboratively.more » Some example tools include messaging, file-sharing, and shared plot viewers. An important component of the environment is a scalable underlying communication framework. In this paper we will describe our current progress on building a dynamic and ad hoc collaboration environment and our vision for its evolution into a HENP collaboration environment.« less

  10. A Decentralized VPN Service over Generalized Mobile Ad-Hoc Networks

    NASA Astrophysics Data System (ADS)

    Fujita, Sho; Shima, Keiichi; Uo, Yojiro; Esaki, Hiroshi

    We present a decentralized VPN service that can be built over generalized mobile ad-hoc networks (Generalized MANETs), in which topologies can be represented as a time-varying directed multigraph. We address wireless ad-hoc networks and overlay ad-hoc networks as instances of Generalized MANETs. We first propose an architecture to operate on various kinds of networks through a single set of operations. Then, we design and implement a decentralized VPN service on the proposed architecture. Through the development and operation of a prototype system we implemented, we found that the proposed architecture makes the VPN service applicable to each instance of Generalized MANETs, and that the VPN service makes it possible for unmodified applications to operate on the networks.

  11. Intelligent Sensing and Classification in DSR-Based Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Dempsey, Tae; Sahin, Gokhan; Morton, Yu T. (Jade

    Wireless ad hoc networks have fundamentally altered today's battlefield, with applications ranging from unmanned air vehicles to randomly deployed sensor networks. Security and vulnerabilities in wireless ad hoc networks have been considered at different layers, and many attack strategies have been proposed, including denial of service (DoS) through the intelligent jamming of the most critical packet types of flows in a network. This paper investigates the effectiveness of intelligent jamming in wireless ad hoc networks using the Dynamic Source Routing (DSR) and TCP protocols and introduces an intelligent classifier to facilitate the jamming of such networks. Assuming encrypted packet headers and contents, our classifier is based solely on the observable characteristics of size, inter-arrival timing, and direction and classifies packets with up to 99.4% accuracy in our experiments.

  12. Initial Report of the Deans Cyber Warfare Ad Hoc Committee

    DTIC Science & Technology

    2011-12-22

    in a cyber warfare environment. Among the more notable recent developments have been the establishment of a new Cyber Warfare Command (USCYBERCOM) at...information-warfare-centric organization. Clearly, future Naval Academy graduates will be expected to know more about cyber warfare than those we have...graduated in the past. The Academic Dean and Provost tasked an ad hoc committeethe Cyber Warfare ad hoc Committeeto examine how USNA can best ensure that

  13. Global Coverage from Ad-Hoc Constellations in Rideshare Orbits

    NASA Technical Reports Server (NTRS)

    Ellis, Armin; Mercury, Michael; Brown, Shannon

    2012-01-01

    A promising area of small satellite development is in providing higher temporal resolution than larger satellites. Traditional constellations have required specific orbits and dedicated launch vehicles. In this paper we discuss an alternative architecture in which the individual elements of the constellation are launched as rideshare opportunities. We compare the coverage of such an ad-hoc constellation with more traditional constellations. Coverage analysis is based on actual historical data from rideshare opportunities. Our analysis includes ground coverage and temporal revisits for Polar, Tropics, Temperate, and Global regions, comparing ad-hoc and Walker constellation.

  14. The effects of malicious nodes on performance of mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Li, Fanzhi; Shi, Xiyu; Jassim, Sabah; Adams, Christopher

    2006-05-01

    Wireless ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to security attacks. Unlike their wired counterpart, infrastructureless ad hoc networks do not have a clear line of defense, their topology is dynamically changing, and every mobile node can receive messages from its neighbors and can be contacted by all other nodes in its neighborhood. This poses a great danger to network security if some nodes behave in a malicious manner. The immediate concern about the security in this type of networks is how to protect the network and the individual mobile nodes against malicious act of rogue nodes from within the network. This paper is concerned with security aspects of wireless ad hoc networks. We shall present results of simulation experiments on ad hoc network's performance in the presence of malicious nodes. We shall investigate two types of attacks and the consequences will be simulated and quantified in terms of loss of packets and other factors. The results show that network performance, in terms of successful packet delivery ratios, significantly deteriorates when malicious nodes act according to the defined misbehaving characteristics.

  15. Packets Distributing Evolutionary Algorithm Based on PSO for Ad Hoc Network

    NASA Astrophysics Data System (ADS)

    Xu, Xiao-Feng

    2018-03-01

    Wireless communication network has such features as limited bandwidth, changeful channel and dynamic topology, etc. Ad hoc network has lots of difficulties in accessing control, bandwidth distribution, resource assign and congestion control. Therefore, a wireless packets distributing Evolutionary algorithm based on PSO (DPSO)for Ad Hoc Network is proposed. Firstly, parameters impact on performance of network are analyzed and researched to obtain network performance effective function. Secondly, the improved PSO Evolutionary Algorithm is used to solve the optimization problem from local to global in the process of network packets distributing. The simulation results show that the algorithm can ensure fairness and timeliness of network transmission, as well as improve ad hoc network resource integrated utilization efficiency.

  16. A Group Based Key Sharing and Management Algorithm for Vehicular Ad Hoc Networks

    PubMed Central

    Moharram, Mohammed Morsi; Azam, Farzana

    2014-01-01

    Vehicular ad hoc networks (VANETs) are one special type of ad hoc networks that involves vehicles on roads. Typically like ad hoc networks, broadcast approach is used for data dissemination. Blind broadcast to each and every node results in exchange of useless and irrelevant messages and hence creates an overhead. Unicasting is not preferred in ad-hoc networks due to the dynamic topology and the resource requirements as compared to broadcasting. Simple broadcasting techniques create several problems on privacy, disturbance, and resource utilization. In this paper, we propose media mixing algorithm to decide what information should be provided to each user and how to provide such information. Results obtained through simulation show that fewer number of keys are needed to share compared to simple broadcasting. Privacy is also enhanced through this approach. PMID:24587749

  17. Decentralized session initiation protocol solution in ad hoc networks

    NASA Astrophysics Data System (ADS)

    Han, Lu; Jin, Zhigang; Shu, Yantai; Dong, Linfang

    2006-10-01

    With the fast development of ad hoc networks, SIP has attracted more and more attention in multimedia service. This paper proposes a new architecture to provide SIP service for ad hoc users, although there is no centralized SIP server deployed. In this solution, we provide the SIP service by the introduction of two nodes: Designated SIP Server (DS) and its Backup Server (BDS). The nodes of ad hoc network designate DS and BDS when they join the session nodes set and when some pre-defined events occur. A new sip message type called REGISTRAR is presented so nodes can send others REGISTRAR message to declare they want to be DS. According to the IP information taken in the message, an algorithm works like the election of DR and BDR in OSPF protocol is used to vote DS and BDS SIP servers. Naturally, the DS will be replaced by BDS when the DS is down for predicable or unpredictable reasons. To facilitate this, the DS should register to the BDS and transfer a backup of the SIP users' database. Considering the possibility DS or BDS may abruptly go down, a special policy is given. When there is no DS and BDS, a new election procedure is triggered just like the startup phase. The paper also describes how SIP works normally in the decentralized model as well as the evaluation of its performance. All sessions based on SIP in ad hoc such as DS voting have been tested in the real experiments within a 500m*500m square area where about 30 random nodes are placed.

  18. Information Sharing Modalities for Mobile Ad-Hoc Networks

    NASA Astrophysics Data System (ADS)

    de Spindler, Alexandre; Grossniklaus, Michael; Lins, Christoph; Norrie, Moira C.

    Current mobile phone technologies have fostered the emergence of a new generation of mobile applications. Such applications allow users to interact and share information opportunistically when their mobile devices are in physical proximity or close to fixed installations. It has been shown how mobile applications such as collaborative filtering and location-based services can take advantage of ad-hoc connectivity to use physical proximity as a filter mechanism inherent to the application logic. We discuss the different modes of information sharing that arise in such settings based on the models of persistence and synchronisation. We present a platform that supports the development of applications that can exploit these modes of ad-hoc information sharing and, by means of an example, show how such an application can be realised based on the supported event model.

  19. Interference Drop Scheme: Enhancing QoS Provision in Multi-Hop Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Luo, Chang-Yi; Komuro, Nobuyoshi; Takahashi, Kiyoshi; Kasai, Hiroyuki; Ueda, Hiromi; Tsuboi, Toshinori

    Ad hoc networking uses wireless technologies to construct networks with no physical infrastructure and so are expected to provide instant networking in areas such as disaster recovery sites and inter-vehicle communication. Unlike conventional wired networks services, services in ad hoc networks are easily disrupted by the frequent changes in traffic and topology. Therefore, solutions to assure the Quality of Services (QoS) in ad hoc networks are different from the conventional ones used in wired networks. In this paper, we propose a new queue management scheme, Interference Drop Scheme (IDS) for ad hoc networks. In the conventional queue management approaches such as FIFO (First-in First-out) and RED (Random Early Detection), a queue is usually managed by a queue length limit. FIFO discards packets according to the queue limit, and RED discards packets in an early and random fashion. IDS, on the other hand, manages the queue according to wireless interference time, which increases as the number of contentions in the MAC layer increases. When there are many MAC contentions, IDS discards TCP data packets. By observing the interference time and discarding TCP data packets, our simulation results show that IDS improves TCP performance and reduces QoS violations in UDP in ad hoc networks with chain, grid, and random topologies. Our simulation results also demonstrate that wireless interference time is a better metric than queue length limit for queue management in multi-hop ad hoc networks.

  20. Anomaly Detection Techniques for Ad Hoc Networks

    ERIC Educational Resources Information Center

    Cai, Chaoli

    2009-01-01

    Anomaly detection is an important and indispensable aspect of any computer security mechanism. Ad hoc and mobile networks consist of a number of peer mobile nodes that are capable of communicating with each other absent a fixed infrastructure. Arbitrary node movements and lack of centralized control make them vulnerable to a wide variety of…

  1. MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm

    PubMed Central

    Elizarraras, Omar; Panduro, Marco; Méndez, Aldo L.

    2014-01-01

    The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR) and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC) protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access) for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15%) compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput. PMID:25140339

  2. 75 FR 43565 - NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice: (10-084)] NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting AGENCY: National Aeronautics and Space Administration. ACTION... amended, the National Aeronautics and Space Administration announces a two-part meeting of the Ad-Hoc Task...

  3. 75 FR 33838 - NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-15

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (10-065)] NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting AGENCY: National Aeronautics and Space Administration. ACTION... amended, the National Aeronautics and Space Administration announces a meeting of the Ad-Hoc Task Force on...

  4. 75 FR 15742 - NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-30

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice: (10-035)] NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting AGENCY: National Aeronautics and Space Administration. ACTION... amended, the National Aeronautics and Space Administration announces a meeting of the Ad-Hoc Task Force on...

  5. Providing Location Security in Vehicular Ad Hoc Networks

    ERIC Educational Resources Information Center

    Yan, Gongjun

    2010-01-01

    Location is fundamental information in Vehicular Ad-hoc Networks (VANETs). Almost all VANET applications rely on location information. Therefore it is of importance to ensure location information integrity, meaning that location information is original (from the generator), correct (not bogus or fabricated) and unmodified (value not changed). We…

  6. What Is the Problem of Ad Hoc Hypotheses?

    ERIC Educational Resources Information Center

    Bamford, Greg

    1999-01-01

    Philosophers' attempts to convincingly explicate the received view of an ad hoc hypothesis--that it accounts for only the observations it was designed to account for--have been unsuccessful. Familiar and firmer criteria for evaluating the hypotheses or modified theories so classified are characteristically available. Contains 41 references.…

  7. 29 CFR 1912.11 - Terms of ad hoc committee members.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 7 2011-07-01 2011-07-01 false Terms of ad hoc committee members. 1912.11 Section 1912.11 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR (CONTINUED) ADVISORY COMMITTEES ON STANDARDS Organizational Matters § 1912.11 Terms of ad...

  8. 29 CFR 1912.11 - Terms of ad hoc committee members.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 7 2010-07-01 2010-07-01 false Terms of ad hoc committee members. 1912.11 Section 1912.11 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR (CONTINUED) ADVISORY COMMITTEES ON STANDARDS Organizational Matters § 1912.11 Terms of ad...

  9. Data Mining of Extremely Large Ad Hoc Data Sets to Produce Inverted Indices

    DTIC Science & Technology

    2016-06-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited DATA MINING OF...COVERED Master’s Thesis 4. TITLE AND SUBTITLE DATA MINING OF EXTREMELY LARGE AD HOC DATA SETS TO PRODUCE INVERTED INDICES 5. FUNDING NUMBERS 6...INTENTIONALLY LEFT BLANK iii Approved for public release; distribution is unlimited DATA MINING OF EXTREMELY LARGE AD HOC DATA SETS TO PRODUCE

  10. Typicality Mediates Performance during Category Verification in Both Ad-Hoc and Well-Defined Categories

    ERIC Educational Resources Information Center

    Sandberg, Chaleece; Sebastian, Rajani; Kiran, Swathi

    2012-01-01

    Background: The typicality effect is present in neurologically intact populations for natural, ad-hoc, and well-defined categories. Although sparse, there is evidence of typicality effects in persons with chronic stroke aphasia for natural and ad-hoc categories. However, it is unknown exactly what influences the typicality effect in this…

  11. On Trust Evaluation in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Nguyen, Dang Quan; Lamont, Louise; Mason, Peter C.

    Trust has been considered as a social relationship between two individuals in human society. But, as computer science and networking have succeeded in using computers to automate many tasks, the concept of trust can be generalized to cover the reliability and relationships of non-human interaction, such as, for example, information gathering and data routing. This paper investigates the evaluation of trust in the context of ad hoc networks. Nodes evaluate each other’s behaviour based on observables. A node then decides whether to trust another node to have certain innate abilities. We show how accurate such an evaluation could be. We also provide the minimum number of observations required to obtain an accurate evaluation, a result that indicates that observation-based trust in ad hoc networks will remain a challenging problem. The impact of making networking decisions using trust evaluation on the network connectivity is also examined. In this manner, quantitative decisions can be made concerning trust-based routing with the knowledge of the potential impact on connectivity.

  12. Impact of network structure on the capacity of wireless multihop ad hoc communication

    NASA Astrophysics Data System (ADS)

    Krause, Wolfram; Glauche, Ingmar; Sollacher, Rudolf; Greiner, Martin

    2004-07-01

    As a representative of a complex technological system, the so-called wireless multihop ad hoc communication networks are discussed. They represent an infrastructure-less generalization of todays wireless cellular phone networks. Lacking a central control authority, the ad hoc nodes have to coordinate themselves such that the overall network performs in an optimal way. A performance indicator is the end-to-end throughput capacity. Various models, generating differing ad hoc network structure via differing transmission power assignments, are constructed and characterized. They serve as input for a generic data traffic simulation as well as some semi-analytic estimations. The latter reveal that due to the most-critical-node effect the end-to-end throughput capacity sensitively depends on the underlying network structure, resulting in differing scaling laws with respect to network size.

  13. Ad Hoc Categories and False Memories: Memory Illusions for Categories Created On-The-Spot

    ERIC Educational Resources Information Center

    Soro, Jerônimo C.; Ferreira, Mário B.; Semin, Gün R.; Mata, André; Carneiro, Paula

    2017-01-01

    Three experiments were designed to test whether experimentally created ad hoc associative networks evoke false memories. We used the DRM (Deese, Roediger, McDermott) paradigm with lists of ad hoc categories composed of exemplars aggregated toward specific goals (e.g., going for a picnic) that do not share any consistent set of features. Experiment…

  14. Distributed generation of shared RSA keys in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Liu, Yi-Liang; Huang, Qin; Shen, Ying

    2005-12-01

    Mobile Ad Hoc Networks is a totally new concept in which mobile nodes are able to communicate together over wireless links in an independent manner, independent of fixed physical infrastructure and centralized administrative infrastructure. However, the nature of Ad Hoc Networks makes them very vulnerable to security threats. Generation and distribution of shared keys for CA (Certification Authority) is challenging for security solution based on distributed PKI(Public-Key Infrastructure)/CA. The solutions that have been proposed in the literature and some related issues are discussed in this paper. The solution of a distributed generation of shared threshold RSA keys for CA is proposed in the present paper. During the process of creating an RSA private key share, every CA node only has its own private security. Distributed arithmetic is used to create the CA's private share locally, and that the requirement of centralized management institution is eliminated. Based on fully considering the Mobile Ad Hoc network's characteristic of self-organization, it avoids the security hidden trouble that comes by holding an all private security share of CA, with which the security and robustness of system is enhanced.

  15. Energy Efficient and QoS sensitive Routing Protocol for Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Saeed Tanoli, Tariq; Khalid Khan, Muhammad

    2013-12-01

    Efficient routing is an important part of wireless ad hoc networks. Since in ad hoc networks we have limited resources, there are many limitations like bandwidth, battery consumption, and processing cycle etc. Reliability is also necessary since there is no allowance for invalid or incomplete information (and expired data is useless). There are various protocols that perform routing by considering one parameter but ignoring other parameters. In this paper we present a protocol that finds route on the basis of bandwidth, energy and mobility of the nodes participating in the communication.

  16. Passive and Active Analysis in DSR-Based Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Dempsey, Tae; Sahin, Gokhan; Morton, Y. T. (Jade)

    Security and vulnerabilities in wireless ad hoc networks have been considered at different layers, and many attack strategies have been proposed, including denial of service (DoS) through the intelligent jamming of the most critical packet types of flows in a network. This paper investigates the effectiveness of intelligent jamming in wireless ad hoc networks using the Dynamic Source Routing (DSR) and TCP protocols and introduces an intelligent classifier to facilitate the jamming of such networks. Assuming encrypted packet headers and contents, our classifier is based solely on the observable characteristics of size, inter-arrival timing, and direction and classifies packets with up to 99.4% accuracy in our experiments. Furthermore, we investigate active analysis, which is the combination of a classifier and intelligent jammer to invoke specific responses from a victim network.

  17. Reputation-Based Internet Protocol Security: A Multilayer Security Framework for Mobile Ad Hoc Networks

    DTIC Science & Technology

    2010-09-01

    secure ad-hoc networks of mobile sensors deployed in a hostile environment . These sensors are normally small 86 and resource...Communications Magazine, 51, 2008. 45. Kumar, S.A. “Classification and Review of Security Schemes in Mobile Comput- ing”. Wireless Sensor Network , 2010... Networks ”. Wireless /Mobile Network Security , 2008. 85. Xiao, Y. “Accountability for Wireless LANs, Ad Hoc Networks , and Wireless

  18. Intelligent routing protocol for ad hoc wireless network

    NASA Astrophysics Data System (ADS)

    Peng, Chaorong; Chen, Chang Wen

    2006-05-01

    A novel routing scheme for mobile ad hoc networks (MANETs), which combines hybrid and multi-inter-routing path properties with a distributed topology discovery route mechanism using control agents is proposed in this paper. In recent years, a variety of hybrid routing protocols for Mobile Ad hoc wireless networks (MANETs) have been developed. Which is proactively maintains routing information for a local neighborhood, while reactively acquiring routes to destinations beyond the global. The hybrid protocol reduces routing discovery latency and the end-to-end delay by providing high connectivity without requiring much of the scarce network capacity. On the other side the hybrid routing protocols in MANETs likes Zone Routing Protocol still need route "re-discover" time when a route between zones link break. Sine the topology update information needs to be broadcast routing request on local zone. Due to this delay, the routing protocol may not be applicable for real-time data and multimedia communication. We utilize the advantages of a clustering organization and multi-routing path in routing protocol to achieve several goals at the same time. Firstly, IRP efficiently saves network bandwidth and reduces route reconstruction time when a routing path fails. The IRP protocol does not require global periodic routing advertisements, local control agents will automatically monitor and repair broke links. Secondly, it efficiently reduces congestion and traffic "bottlenecks" for ClusterHeads in clustering network. Thirdly, it reduces significant overheads associated with maintaining clusters. Fourthly, it improves clusters stability due to dynamic topology changing frequently. In this paper, we present the Intelligent Routing Protocol. First, we discuss the problem of routing in ad hoc networks and the motivation of IRP. We describe the hierarchical architecture of IRP. We describe the routing process and illustrate it with an example. Further, we describe the control manage

  19. UMDR: Multi-Path Routing Protocol for Underwater Ad Hoc Networks with Directional Antenna

    NASA Astrophysics Data System (ADS)

    Yang, Jianmin; Liu, Songzuo; Liu, Qipei; Qiao, Gang

    2018-01-01

    This paper presents a new routing scheme for underwater ad hoc networks based on directional antennas. Ad hoc networks with directional antennas have become a hot research topic because of space reuse may increase networks capacity. At present, researchers have applied traditional self-organizing routing protocols (such as DSR, AODV) [1] [2] on this type of networks, and the routing scheme is based on the shortest path metric. However, such routing schemes often suffer from long transmission delays and frequent link fragmentation along the intermediate nodes of the selected route. This is caused by a unique feature of directional transmission, often called as “deafness”. In this paper, we take a different approach to explore the advantages of space reuse through multipath routing. This paper introduces the validity of the conventional routing scheme in underwater ad hoc networks with directional antennas, and presents a special design of multipath routing algorithm for directional transmission. The experimental results show a significant performance improvement in throughput and latency.

  20. Two Phase Admission Control for QoS Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Chen, Chien-Sheng; Su, Yi-Wen; Liu, Wen-Hsiung; Chi, Ching-Lung

    In this paper a novel and effective two phase admission control (TPAC) for QoS mobile ad hoc networks is proposed that satisfies the real-time traffic requirements in mobile ad hoc networks. With a limited amount of extra overhead, TPAC can avoid network congestions by a simple and precise admission control which blocks most of the overloading flow-requests in the route discovery process. When compared with previous QoS routing schemes such as QoS-aware routing protocol and CACP protocols, it is shown from system simulations that the proposed scheme can increase the system throughput and reduce both the dropping rate and the end-to-end delay. Therefore, TPAC is surely an effective QoS-guarantee protocol to provide for real-time traffic.

  1. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks.

    PubMed

    Vara, M Isabel; Campo, Celeste

    2015-07-20

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead.

  2. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks

    PubMed Central

    Vara, M. Isabel; Campo, Celeste

    2015-01-01

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead. PMID:26205272

  3. Validity of using ad hoc methods to analyze secondary traits in case-control association studies.

    PubMed

    Yung, Godwin; Lin, Xihong

    2016-12-01

    Case-control association studies often collect from their subjects information on secondary phenotypes. Reusing the data and studying the association between genes and secondary phenotypes provide an attractive and cost-effective approach that can lead to discovery of new genetic associations. A number of approaches have been proposed, including simple and computationally efficient ad hoc methods that ignore ascertainment or stratify on case-control status. Justification for these approaches relies on the assumption of no covariates and the correct specification of the primary disease model as a logistic model. Both might not be true in practice, for example, in the presence of population stratification or the primary disease model following a probit model. In this paper, we investigate the validity of ad hoc methods in the presence of covariates and possible disease model misspecification. We show that in taking an ad hoc approach, it may be desirable to include covariates that affect the primary disease in the secondary phenotype model, even though these covariates are not necessarily associated with the secondary phenotype. We also show that when the disease is rare, ad hoc methods can lead to severely biased estimation and inference if the true disease model follows a probit model instead of a logistic model. Our results are justified theoretically and via simulations. Applied to real data analysis of genetic associations with cigarette smoking, ad hoc methods collectively identified as highly significant (P<10-5) single nucleotide polymorphisms from over 10 genes, genes that were identified in previous studies of smoking cessation. © 2016 WILEY PERIODICALS, INC.

  4. An Ad-Hoc Adaptive Pilot Model for Pitch Axis Gross Acquisition Tasks

    NASA Technical Reports Server (NTRS)

    Hanson, Curtis E.

    2012-01-01

    An ad-hoc algorithm is presented for real-time adaptation of the well-known crossover pilot model and applied to pitch axis gross acquisition tasks in a generic fighter aircraft. Off-line tuning of the crossover model to human pilot data gathered in a fixed-based high fidelity simulation is first accomplished for a series of changes in aircraft dynamics to provide expected values for model parameters. It is shown that in most cases, for this application, the traditional crossover model can be reduced to a gain and a time delay. The ad-hoc adaptive pilot gain algorithm is shown to have desirable convergence properties for most types of changes in aircraft dynamics.

  5. Energy Efficient Probabilistic Broadcasting for Mobile Ad-Hoc Network

    NASA Astrophysics Data System (ADS)

    Kumar, Sumit; Mehfuz, Shabana

    2017-06-01

    In mobile ad-hoc network (MANETs) flooding method is used for broadcasting route request (RREQ) packet from one node to another node for route discovery. This is the simplest method of broadcasting of RREQ packets but it often results in broadcast storm problem, originating collisions and congestion of packets in the network. A probabilistic broadcasting is one of the widely used broadcasting scheme for route discovery in MANETs and provides solution for broadcasting storm problem. But it does not consider limited energy of the battery of the nodes. In this paper, a new energy efficient probabilistic broadcasting (EEPB) is proposed in which probability of broadcasting RREQs is calculated with respect to remaining energy of nodes. The analysis of simulation results clearly indicate that an EEPB route discovery scheme in ad-hoc on demand distance vector (AODV) can increase the network lifetime with a decrease in the average power consumption and RREQ packet overhead. It also decreases the number of dropped packets in the network, in comparison to other EEPB schemes like energy constraint gossip (ECG), energy aware gossip (EAG), energy based gossip (EBG) and network lifetime through energy efficient broadcast gossip (NEBG).

  6. Information Fusion in Ad hoc Wireless Sensor Networks for Aircraft Health Monitoring

    NASA Astrophysics Data System (ADS)

    Fragoulis, Nikos; Tsagaris, Vassilis; Anastassopoulos, Vassilis

    In this paper the use of an ad hoc wireless sensor network for implementing a structural health monitoring system is discussed. The network is consisted of sensors deployed throughout the aircraft. These sensors being in the form of a microelectronic chip and consisted of sensing, data processing and communicating components could be easily embedded in any mechanical aircraft component. The established sensor network, due to its ad hoc nature is easily scalable, allowing adding or removing any number of sensors. The position of the sensor nodes need not necessarily to be engineered or predetermined, giving this way the ability to be deployed in inaccessible points. Information collected from various sensors of different modalities throughout the aircraft is then fused in order to provide a more comprehensive image of the aircraft structural health. Sensor level fusion along with decision quality information is used, in order to enhance detection performance.

  7. A fault-tolerant small world topology control model in ad hoc networks for search and rescue

    NASA Astrophysics Data System (ADS)

    Tan, Mian; Fang, Ling; Wu, Yue; Zhang, Bo; Chang, Bowen; Holme, Petter; Zhao, Jing

    2018-02-01

    Due to their self-organized, multi-hop and distributed characteristics, ad hoc networks are useful in search and rescue. Topology control models need to be designed for energy-efficient, robust and fast communication in ad hoc networks. This paper proposes a topology control model which specializes for search and rescue-Compensation Small World-Repeated Game (CSWRG)-which integrates mobility models, constructing small world networks and a game-theoretic approach to the allocation of resources. Simulation results show that our mobility models can enhance the communication performance of the constructed small-world networks. Our strategy, based on repeated game, can suppress selfish behavior and compensate agents that encounter selfish or faulty neighbors. This model could be useful for the design of ad hoc communication networks.

  8. Multicasting in Wireless Communications (Ad-Hoc Networks): Comparison against a Tree-Based Approach

    NASA Astrophysics Data System (ADS)

    Rizos, G. E.; Vasiliadis, D. C.

    2007-12-01

    We examine on-demand multicasting in ad hoc networks. The Core Assisted Mesh Protocol (CAMP) is a well-known protocol for multicast routing in ad-hoc networks, generalizing the notion of core-based trees employed for internet multicasting into multicast meshes that have much richer connectivity than trees. On the other hand, wireless tree-based multicast routing protocols use much simpler structures for determining route paths, using only parent-child relationships. In this work, we compare the performance of the CAMP protocol against the performance of wireless tree-based multicast routing protocols, in terms of two important factors, namely packet delay and ratio of dropped packets.

  9. Space-Time Processing for Tactical Mobile Ad Hoc Networks

    DTIC Science & Technology

    2007-08-01

    rates in mobile ad hoc networks. In addition, he has considered the design of a cross-layer multi-user resource allocation framework using a... framework for many-to-one communication. In this context, multiple nodes cooperate to transmit their packets simultaneously to a single node using multi...spatially multiplexed signals transmitted from multiple nodes. Our goal is to form a framework that activates different sets of communication links

  10. Space-Time Processing for Tactical Mobile Ad Hoc Networks

    DTIC Science & Technology

    2008-08-01

    vision for multiple concurrent communication settings, i.e., a many-to-many framework where multi-packet transmissions (MPTs) and multi-packet...modelling framework of capacity-delay tradeoffs We have introduced the first unified modeling framework for the computation of fundamental limits o We...dalities in wireless n twor i-packet modelling framework to account for the use of m lti-packet reception (MPR) f ad hoc networks with MPT under

  11. Taxonomic and ad hoc categorization within the two cerebral hemispheres.

    PubMed

    Shen, Yeshayahu; Aharoni, Bat-El; Mashal, Nira

    2015-01-01

    A typicality effect refers to categorization which is performed more quickly or more accurately for typical than for atypical members of a given category. Previous studies reported a typicality effect for category members presented in the left visual field/right hemisphere (RH), suggesting that the RH applies a similarity-based categorization strategy. However, findings regarding the typicality effect within the left hemisphere (LH) are less conclusive. The current study tested the pattern of typicality effects within each hemisphere for both taxonomic and ad hoc categories, using words presented to the left or right visual fields. Experiment 1 tested typical and atypical members of taxonomic categories as well as non-members, and Experiment 2 tested typical and atypical members of ad hoc categories as well as non-members. The results revealed a typicality effect in both hemispheres and in both types of categories. Furthermore, the RH categorized atypical stimuli more accurately than did the LH. Our findings suggest that both hemispheres rely on a similarity-based categorization strategy, but the coarse semantic coding of the RH seems to facilitate the categorization of atypical members.

  12. Dynamic autonomous routing technology for IP-based satellite ad hoc networks

    NASA Astrophysics Data System (ADS)

    Wang, Xiaofei; Deng, Jing; Kostas, Theresa; Rajappan, Gowri

    2014-06-01

    IP-based routing for military LEO/MEO satellite ad hoc networks is very challenging due to network and traffic heterogeneity, network topology and traffic dynamics. In this paper, we describe a traffic priority-aware routing scheme for such networks, namely Dynamic Autonomous Routing Technology (DART) for satellite ad hoc networks. DART has a cross-layer design, and conducts routing and resource reservation concurrently for optimal performance in the fluid but predictable satellite ad hoc networks. DART ensures end-to-end data delivery with QoS assurances by only choosing routing paths that have sufficient resources, supporting different packet priority levels. In order to do so, DART incorporates several resource management and innovative routing mechanisms, which dynamically adapt to best fit the prevailing conditions. In particular, DART integrates a resource reservation mechanism to reserve network bandwidth resources; a proactive routing mechanism to set up non-overlapping spanning trees to segregate high priority traffic flows from lower priority flows so that the high priority flows do not face contention from low priority flows; a reactive routing mechanism to arbitrate resources between various traffic priorities when needed; a predictive routing mechanism to set up routes for scheduled missions and for anticipated topology changes for QoS assurance. We present simulation results showing the performance of DART. We have conducted these simulations using the Iridium constellation and trajectories as well as realistic military communications scenarios. The simulation results demonstrate DART's ability to discriminate between high-priority and low-priority traffic flows and ensure disparate QoS requirements of these traffic flows.

  13. Ad Hoc Supervision of General Practice Registrars as a "Community of Practice": Analysis, Interpretation and Re-Presentation

    ERIC Educational Resources Information Center

    Clement, T.; Brown, J.; Morrison, J.; Nestel, D.

    2016-01-01

    General practice registrars in Australia undertake most of their vocational training in accredited general practices. They typically see patients alone from the start of their community-based training and are expected to seek timely ad hoc support from their supervisor. Such ad hoc encounters are a mechanism for ensuring patient safety, but also…

  14. Ad hoc instrumentation methods in ecological studies produce highly biased temperature measurements

    USGS Publications Warehouse

    Terando, Adam J.; Youngsteadt, Elsa; Meineke, Emily K.; Prado, Sara G.

    2017-01-01

    In light of global climate change, ecological studies increasingly address effects of temperature on organisms and ecosystems. To measure air temperature at biologically relevant scales in the field, ecologists often use small, portable temperature sensors. Sensors must be shielded from solar radiation to provide accurate temperature measurements, but our review of 18 years of ecological literature indicates that shielding practices vary across studies (when reported at all), and that ecologists often invent and construct ad hoc radiation shields without testing their efficacy. We performed two field experiments to examine the accuracy of temperature observations from three commonly used portable data loggers (HOBO Pro, HOBO Pendant, and iButton hygrochron) housed in manufactured Gill shields or ad hoc, custom‐fabricated shields constructed from everyday materials such as plastic cups. We installed this sensor array (five replicates of 11 sensor‐shield combinations) at weather stations located in open and forested sites. HOBO Pro sensors with Gill shields were the most accurate devices, with a mean absolute error of 0.2°C relative to weather stations at each site. Error in ad hoc shield treatments ranged from 0.8 to 3.0°C, with the largest errors at the open site. We then deployed one replicate of each sensor‐shield combination at five sites that varied in the amount of urban impervious surface cover, which presents a further shielding challenge. Bias in sensors paired with ad hoc shields increased by up to 0.7°C for every 10% increase in impervious surface. Our results indicate that, due to variable shielding practices, the ecological literature likely includes highly biased temperature data that cannot be compared directly across studies. If left unaddressed, these errors will hinder efforts to predict biological responses to climate change. We call for greater standardization in how temperature data are recorded in the field, handled in analyses, and

  15. Modeling and optimization of Quality of Service routing in Mobile Ad hoc Networks

    NASA Astrophysics Data System (ADS)

    Rafsanjani, Marjan Kuchaki; Fatemidokht, Hamideh; Balas, Valentina Emilia

    2016-01-01

    Mobile ad hoc networks (MANETs) are a group of mobile nodes that are connected without using a fixed infrastructure. In these networks, nodes communicate with each other by forming a single-hop or multi-hop network. To design effective mobile ad hoc networks, it is important to evaluate the performance of multi-hop paths. In this paper, we present a mathematical model for a routing protocol under energy consumption and packet delivery ratio of multi-hop paths. In this model, we use geometric random graphs rather than random graphs. Our proposed model finds effective paths that minimize the energy consumption and maximizes the packet delivery ratio of the network. Validation of the mathematical model is performed through simulation.

  16. Ad-Hoc Networks and the Mobile Application Security System (MASS)

    DTIC Science & Technology

    2006-01-01

    solution to this problem that addresses critical aspects of security in ad-hoc mobile application networks. This approach involves preventing unauthorized...modification of a mobile application , both by other applications and by hosts, and ensuring that mobile code is authentic and authorized. These...capabilities constitute the Mobile Application Security System (MASS). The MASS applies effective, robust security to mobile application -based systems

  17. Conflict Management in "Ad Hoc" Problem-Solving Groups: A Preliminary Investigation.

    ERIC Educational Resources Information Center

    Wallace, Les; Baxter, Leslie

    Full study of small group communication must include consideration of task and socio-emotional dimensions, especially in relation to group problem solving. Thirty small groups were tested for their reactions in various "ad hoc" conflict resolution situations. Instructions to the groups were (1) no problem-solving instructions (control),…

  18. T2AR: trust-aware ad-hoc routing protocol for MANET.

    PubMed

    Dhananjayan, Gayathri; Subbiah, Janakiraman

    2016-01-01

    Secure data transfer against the malicious attacks is an important issue in an infrastructure-less independent network called mobile ad-hoc network (MANET). Trust assurance between MANET nodes is the key parameter in the high-security provision under dynamic topology variations and open wireless constraints. But, the malicious behavior of nodes reduces the trust level of the nodes that leads to an insecure data delivery. The increase in malicious attacks causes the excessive energy consumption that leads to a reduction of network lifetime. The lack of positional information update of the nodes in ad-hoc on-demand vector (AODV) protocol during the connection establishment offers less trust level between the nodes. Hence, the trust rate computation using energy and mobility models and its update are the essential tasks for secure data delivery. This paper proposes a trust-aware ad-hoc routing (T2AR) protocol to improve the trust level between the nodes in MANET. The proposed method modifies the traditional AODV routing protocol with the constraints of trust rate, energy, mobility based malicious behavior prediction. The packet sequence ID matching from the log reports of neighbor nodes determine the trust rate that avoids the malicious report generation. Besides, the direct and indirect trust observation schemes utilization increases the trust level. Besides, the received signal strength indicator utilization determines the trusted node is within the communication range or not. The comparative analysis between the proposed T2AR with the existing methods such as TRUNCMAN, RBT, GR, FBR and DICOTIDS regarding the average end-to-end delay, throughput, false positives, packet delivery ratio shows the effectiveness of T2AR in the secure MANET environment design.

  19. Performance Analysis of Hierarchical Group Key Management Integrated with Adaptive Intrusion Detection in Mobile ad hoc Networks

    DTIC Science & Technology

    2016-04-05

    applications in wireless networks such as military battlefields, emergency response, mobile commerce , online gaming, and collaborative work are based on the...www.elsevier.com/locate/peva Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc...Accepted 19 September 2010 Available online 26 September 2010 Keywords: Mobile ad hoc networks Intrusion detection Group communication systems Group

  20. Protocols for Detection and Removal of Wormholes for Secure Routing and Neighborhood Creation in Wireless Ad Hoc Networks

    ERIC Educational Resources Information Center

    Hayajneh, Thaier Saleh

    2009-01-01

    Wireless ad hoc networks are suitable and sometimes the only solution for several applications. Many applications, particularly those in military and critical civilian domains (such as battlefield surveillance and emergency rescue) require that ad hoc networks be secure and stable. In fact, security is one of the main barriers to the extensive use…

  1. Cutting Corners: Provider Perceptions of Interpretation Services and Factors Related to Use of an Ad Hoc Interpreter.

    PubMed

    Mayo, Rachel; Parker, Veronica G; Sherrill, Windsor W; Coltman, Kinneil; Hudson, Matthew F; Nichols, Christina M; Yates, Adam M; Pribonic, Anne Paige

    2016-06-01

    This study assessed health providers' perceptions of factors related to professional interpretation services and the association between these factors and the potential use of ad hoc interpreters. Data were collected from a convenience sample of 150 health services providers at a large, regional health system in South Carolina. Providers rated "ability to communicate effectively during a clinical encounter" as paramount regarding the use of interpretation services. The most important factors related to the likely use of ad hoc interpreters (cutting corners) included locating a qualified interpreter, having to wait for a qualified interpreter, and technical difficulties regarding phone and video technology. Health care organizations may benefit from increasing staff awareness about patient safety and legal and regulatory risks involved with the use of ad hoc interpreters. © The Author(s) 2016.

  2. Capacity-Delay Trade-Off in Collaborative Hybrid Ad-Hoc Networks with Coverage Sensing.

    PubMed

    Chen, Lingyu; Luo, Wenbin; Liu, Chen; Hong, Xuemin; Shi, Jianghong

    2017-01-26

    The integration of ad hoc device-to-device (D2D) communications and open-access small cells can result in a networking paradigm called hybrid the ad hoc network, which is particularly promising in delivering delay-tolerant data. The capacity-delay performance of hybrid ad hoc networks has been studied extensively under a popular framework called scaling law analysis. These studies, however, do not take into account aspects of interference accumulation and queueing delay and, therefore, may lead to over-optimistic results. Moreover, focusing on the average measures, existing works fail to give finer-grained insights into the distribution of delays. This paper proposes an alternative analytical framework based on queueing theoretic models and physical interference models. We apply this framework to study the capacity-delay performance of a collaborative cellular D2D network with coverage sensing and two-hop relay. The new framework allows us to fully characterize the delay distribution in the transform domain and pinpoint the impacts of coverage sensing, user and base station densities, transmit power, user mobility and packet size on the capacity-delay trade-off. We show that under the condition of queueing equilibrium, the maximum throughput capacity per device saturates to an upper bound of 0.7239 λ b / λ u bits/s/Hz, where λ b and λ u are the densities of base stations and mobile users, respectively.

  3. Capacity-Delay Trade-Off in Collaborative Hybrid Ad-Hoc Networks with Coverage Sensing

    PubMed Central

    Chen, Lingyu; Luo, Wenbin; Liu, Chen; Hong, Xuemin; Shi, Jianghong

    2017-01-01

    The integration of ad hoc device-to-device (D2D) communications and open-access small cells can result in a networking paradigm called hybrid the ad hoc network, which is particularly promising in delivering delay-tolerant data. The capacity-delay performance of hybrid ad hoc networks has been studied extensively under a popular framework called scaling law analysis. These studies, however, do not take into account aspects of interference accumulation and queueing delay and, therefore, may lead to over-optimistic results. Moreover, focusing on the average measures, existing works fail to give finer-grained insights into the distribution of delays. This paper proposes an alternative analytical framework based on queueing theoretic models and physical interference models. We apply this framework to study the capacity-delay performance of a collaborative cellular D2D network with coverage sensing and two-hop relay. The new framework allows us to fully characterize the delay distribution in the transform domain and pinpoint the impacts of coverage sensing, user and base station densities, transmit power, user mobility and packet size on the capacity-delay trade-off. We show that under the condition of queueing equilibrium, the maximum throughput capacity per device saturates to an upper bound of 0.7239 λb/λu bits/s/Hz, where λb and λu are the densities of base stations and mobile users, respectively. PMID:28134769

  4. Work, Family, and Community: Summary Proceedings of an Ad Hoc Committee.

    ERIC Educational Resources Information Center

    Hayes, Cheryl D., Ed.

    These proceedings contain summaries of five working group discussions and a discussion of suggestions for future research from an ad hoc meeting on Work, Family, and Community (Fedruary 21-22, 1980) in Washington, D.C. The meeting had these objectives: (1) to identify salient policy and research issues associated with changing patterns of labor…

  5. A Survey on Trust Management for Mobile Ad Hoc Networks

    DTIC Science & Technology

    2011-11-01

    expects, trust is dangerous implying the possible betrayal of trust. In his comments on Lagerspetz’s book titled Trust: The Tacit Demand, Lahno [24...AODV Zouridaki et al. (2005 ) [79] (2006) [80] Secure routing Direct observation [79][80] Reputation by secondhand information [80] Packet dropping...areas of signal processing, wireless communications, sensor and mobile ad hoc networks. He is co-editor of the book Wireless Sensor Networks: Signal

  6. An Optimal CDS Construction Algorithm with Activity Scheduling in Ad Hoc Networks

    PubMed Central

    Penumalli, Chakradhar; Palanichamy, Yogesh

    2015-01-01

    A new energy efficient optimal Connected Dominating Set (CDS) algorithm with activity scheduling for mobile ad hoc networks (MANETs) is proposed. This algorithm achieves energy efficiency by minimizing the Broadcast Storm Problem [BSP] and at the same time considering the node's remaining energy. The Connected Dominating Set is widely used as a virtual backbone or spine in mobile ad hoc networks [MANETs] or Wireless Sensor Networks [WSN]. The CDS of a graph representing a network has a significant impact on an efficient design of routing protocol in wireless networks. Here the CDS is a distributed algorithm with activity scheduling based on unit disk graph [UDG]. The node's mobility and residual energy (RE) are considered as parameters in the construction of stable optimal energy efficient CDS. The performance is evaluated at various node densities, various transmission ranges, and mobility rates. The theoretical analysis and simulation results of this algorithm are also presented which yield better results. PMID:26221627

  7. On knowledge transfer management as a learning process for ad hoc teams

    NASA Astrophysics Data System (ADS)

    Iliescu, D.

    2017-08-01

    Knowledge management represents an emerging domain becoming more and more important. Concepts like knowledge codification and personalisation, knowledge life-cycle, social and technological dimensions, knowledge transfer and learning management are integral parts. Focus goes here in the process of knowledge transfer for the case of ad hoc teams. The social dimension of knowledge transfer plays an important role. No single individual actors involved in the process, but a collective one, representing the organisation. It is critically important for knowledge to be managed from the life-cycle point of view. A complex communication network needs to be in place to supports the process of knowledge transfer. Two particular concepts, the bridge tie and transactive memory, would eventually enhance the communication. The paper focuses on an informational communication platform supporting the collaborative work on knowledge transfer. The platform facilitates the creation of a topic language to be used in knowledge modelling, storage and reuse, by the ad hoc teams.

  8. Scalable Architecture for Multihop Wireless ad Hoc Networks

    NASA Technical Reports Server (NTRS)

    Arabshahi, Payman; Gray, Andrew; Okino, Clayton; Yan, Tsun-Yee

    2004-01-01

    A scalable architecture for wireless digital data and voice communications via ad hoc networks has been proposed. Although the details of the architecture and of its implementation in hardware and software have yet to be developed, the broad outlines of the architecture are fairly clear: This architecture departs from current commercial wireless communication architectures, which are characterized by low effective bandwidth per user and are not well suited to low-cost, rapid scaling in large metropolitan areas. This architecture is inspired by a vision more akin to that of more than two dozen noncommercial community wireless networking organizations established by volunteers in North America and several European countries.

  9. A Survey on Trust Management for Mobile Ad Hoc Networks

    DTIC Science & Technology

    2010-07-01

    betrayal of trust. In his comments on Lagerspetz’s book titled Trust: The Tacit Demand, Lahno [24] describes the author’s view on trust as a moral...extension of AODV Zouridaki et al. (2005 ) [79] (2006) [80] Secure routing Direct observation [79][80] Reputation by secondhand information [80...the broad areas of signal processing, wireless communications, sensor and mobile ad hoc networks. He is co-editor of the book Wireless Sensor Networks

  10. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  11. Design of free patterns of nanocrystals with ad hoc features via templated dewetting

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aouassa, M.; Berbezier, I.; Favre, L.

    Design of monodisperse ultra-small nanocrystals (NCs) into large scale patterns with ad hoc features is demonstrated. The process makes use of solid state dewetting of a thin film templated through alloy liquid metal ion source focused ion beam (LMIS-FIB) nanopatterning. The solid state dewetting initiated at the edges of the patterns controllably creates the ordering of NCs with ad hoc placement and periodicity. The NC size is tuned by varying the nominal thickness of the film while their position results from the association of film retraction from the edges of the lay out and Rayleigh-like instability. The use of ultra-highmore » resolution LMIS-FIB enables to produce monocrystalline NCs with size, periodicity, and placement tunable as well. It provides routes for the free design of nanostructures for generic applications in nanoelectronics.« less

  12. The impact of brief team communication, leadership and team behavior training on ad hoc team performance in trauma care settings.

    PubMed

    Roberts, Nicole K; Williams, Reed G; Schwind, Cathy J; Sutyak, John A; McDowell, Christopher; Griffen, David; Wall, Jarrod; Sanfey, Hilary; Chestnut, Audra; Meier, Andreas H; Wohltmann, Christopher; Clark, Ted R; Wetter, Nathan

    2014-02-01

    Communication breakdowns and care coordination problems often cause preventable adverse patient care events, which can be especially acute in the trauma setting, in which ad hoc teams have little time for advanced planning. Existing teamwork curricula do not address the particular issues associated with ad hoc emergency teams providing trauma care. Ad hoc trauma teams completed a preinstruction simulated trauma encounter and were provided with instruction on appropriate team behaviors and team communication. Teams completed a postinstruction simulated trauma encounter immediately afterward and 3 weeks later, then completed a questionnaire. Blinded raters rated videotapes of the simulations. Participants expressed high levels of satisfaction and intent to change practice after the intervention. Participants changed teamwork and communication behavior on the posttest, and changes were sustained after a 3-week interval, though there was some loss of retention. Brief training exercises can change teamwork and communication behaviors on ad hoc trauma teams. Copyright © 2014 Elsevier Inc. All rights reserved.

  13. Ad hoc categories and false memories: Memory illusions for categories created on-the-spot.

    PubMed

    Soro, Jerônimo C; Ferreira, Mário B; Semin, Gün R; Mata, André; Carneiro, Paula

    2017-11-01

    Three experiments were designed to test whether experimentally created ad hoc associative networks evoke false memories. We used the DRM (Deese, Roediger, McDermott) paradigm with lists of ad hoc categories composed of exemplars aggregated toward specific goals (e.g., going for a picnic) that do not share any consistent set of features. Experiment 1 revealed considerable levels of false recognitions of critical words from ad hoc categories. False recognitions occurred even when the lists were presented without an organizing theme (i.e., the category's label). Experiments 1 and 2 tested whether (a) the ease of identifying the categories' themes, and (b) the lists' backward associative strength could be driving the effect. List identifiability did not correlate with false recognition, and the effect remained even when backward associative strength was controlled for. Experiment 3 manipulated the distractor items in the recognition task to address the hypothesis that the salience of unrelated items could be facilitating the occurrence of the phenomenon. The effect remained when controlling for this source of facilitation. These results have implications for assumptions made by theories of false memories, namely the preexistence of associations in the activation-monitoring framework and the central role of gist extraction in fuzzy-trace theory, while providing evidence of the occurrence of false memories for more dynamic and context-dependent knowledge structures. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  14. Ad Hoc Selection of Voice over Internet Streams

    NASA Technical Reports Server (NTRS)

    Macha, Mitchell G. (Inventor); Bullock, John T. (Inventor)

    2014-01-01

    A method and apparatus for a communication system technique involving ad hoc selection of at least two audio streams is provided. Each of the at least two audio streams is a packetized version of an audio source. A data connection exists between a server and a client where a transport protocol actively propagates the at least two audio streams from the server to the client. Furthermore, software instructions executable on the client indicate a presence of the at least two audio streams, allow selection of at least one of the at least two audio streams, and direct the selected at least one of the at least two audio streams for audio playback.

  15. Ad Hoc Selection of Voice over Internet Streams

    NASA Technical Reports Server (NTRS)

    Macha, Mitchell G. (Inventor); Bullock, John T. (Inventor)

    2008-01-01

    A method and apparatus for a communication system technique involving ad hoc selection of at least two audio streams is provided. Each of the at least two audio streams is a packetized version of an audio source. A data connection exists between a server and a client where a transport protocol actively propagates the at least two audio streams from the server to the client. Furthermore, software instructions executable on the client indicate a presence of the at least two audio streams, allow selection of at least one of the at least two audio streams, and direct the selected at least one of the at least two audio streams for audio playback.

  16. Worm epidemics in wireless ad hoc networks

    NASA Astrophysics Data System (ADS)

    Nekovee, Maziar

    2007-06-01

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet.

  17. Dynamic fair node spectrum allocation for ad hoc networks using random matrices

    NASA Astrophysics Data System (ADS)

    Rahmes, Mark; Lemieux, George; Chester, Dave; Sonnenberg, Jerry

    2015-05-01

    Dynamic Spectrum Access (DSA) is widely seen as a solution to the problem of limited spectrum, because of its ability to adapt the operating frequency of a radio. Mobile Ad Hoc Networks (MANETs) can extend high-capacity mobile communications over large areas where fixed and tethered-mobile systems are not available. In one use case with high potential impact, cognitive radio employs spectrum sensing to facilitate the identification of allocated frequencies not currently accessed by their primary users. Primary users own the rights to radiate at a specific frequency and geographic location, while secondary users opportunistically attempt to radiate at a specific frequency when the primary user is not using it. We populate a spatial radio environment map (REM) database with known information that can be leveraged in an ad hoc network to facilitate fair path use of the DSA-discovered links. Utilization of high-resolution geospatial data layers in RF propagation analysis is directly applicable. Random matrix theory (RMT) is useful in simulating network layer usage in nodes by a Wishart adjacency matrix. We use the Dijkstra algorithm for discovering ad hoc network node connection patterns. We present a method for analysts to dynamically allocate node-node path and link resources using fair division. User allocation of limited resources as a function of time must be dynamic and based on system fairness policies. The context of fair means that first available request for an asset is not envied as long as it is not yet allocated or tasked in order to prevent cycling of the system. This solution may also save money by offering a Pareto efficient repeatable process. We use a water fill queue algorithm to include Shapley value marginal contributions for allocation.

  18. Cross-layer model design in wireless ad hoc networks for the Internet of Things.

    PubMed

    Yang, Xin; Wang, Ling; Xie, Jian; Zhang, Zhaolin

    2018-01-01

    Wireless ad hoc networks can experience extreme fluctuations in transmission traffic in the Internet of Things, which is widely used today. Currently, the most crucial issues requiring attention for wireless ad hoc networks are making the best use of low traffic periods, reducing congestion during high traffic periods, and improving transmission performance. To solve these problems, the present paper proposes a novel cross-layer transmission model based on decentralized coded caching in the physical layer and a content division multiplexing scheme in the media access control layer. Simulation results demonstrate that the proposed model effectively addresses these issues by substantially increasing the throughput and successful transmission rate compared to existing protocols without a negative influence on delay, particularly for large scale networks under conditions of highly contrasting high and low traffic periods.

  19. Cross-layer model design in wireless ad hoc networks for the Internet of Things

    PubMed Central

    Wang, Ling; Xie, Jian; Zhang, Zhaolin

    2018-01-01

    Wireless ad hoc networks can experience extreme fluctuations in transmission traffic in the Internet of Things, which is widely used today. Currently, the most crucial issues requiring attention for wireless ad hoc networks are making the best use of low traffic periods, reducing congestion during high traffic periods, and improving transmission performance. To solve these problems, the present paper proposes a novel cross-layer transmission model based on decentralized coded caching in the physical layer and a content division multiplexing scheme in the media access control layer. Simulation results demonstrate that the proposed model effectively addresses these issues by substantially increasing the throughput and successful transmission rate compared to existing protocols without a negative influence on delay, particularly for large scale networks under conditions of highly contrasting high and low traffic periods. PMID:29734355

  20. A game-theoretic approach to optimize ad hoc networks inspired by small-world network topology

    NASA Astrophysics Data System (ADS)

    Tan, Mian; Yang, Tinghong; Chen, Xing; Yang, Gang; Zhu, Guoqing; Holme, Petter; Zhao, Jing

    2018-03-01

    Nodes in ad hoc networks are connected in a self-organized manner. Limited communication radius makes information transmit in multi-hop mode, and each forwarding needs to consume the energy of nodes. Insufficient communication radius or exhaustion of energy may cause the absence of some relay nodes and links, further breaking network connectivity. On the other hand, nodes in the network may refuse to cooperate due to objective faulty or personal selfish, hindering regular communication in the network. This paper proposes a model called Repeated Game in Small World Networks (RGSWN). In this model, we first construct ad hoc networks with small-world feature by forming "communication shortcuts" between multiple-radio nodes. Small characteristic path length reduces average forwarding times in networks; meanwhile high clustering coefficient enhances network robustness. Such networks still maintain relative low global power consumption, which is beneficial to extend the network survival time. Then we use MTTFT strategy (Mend-Tolerance Tit-for-Tat) for repeated game as a rule for the interactions between neighbors in the small-world networks. Compared with other five strategies of repeated game, this strategy not only punishes the nodes' selfishness more reasonably, but also has the best tolerance to the network failure. This work is insightful for designing an efficient and robust ad hoc network.

  1. Engineering a Multi-Purpose Test Collection for Web Retrieval Experiments.

    ERIC Educational Resources Information Center

    Bailey, Peter; Craswell, Nick; Hawking, David

    2003-01-01

    Describes a test collection that was developed as a multi-purpose testbed for experiments on the Web in distributed information retrieval, hyperlink algorithms, and conventional ad hoc retrieval. Discusses inter-server connectivity, integrity of server holdings, inclusion of documents related to a wide spread of likely queries, and distribution of…

  2. Forming an ad-hoc nearby storage, based on IKAROS and social networking services

    NASA Astrophysics Data System (ADS)

    Filippidis, Christos; Cotronis, Yiannis; Markou, Christos

    2014-06-01

    We present an ad-hoc "nearby" storage, based on IKAROS and social networking services, such as Facebook. By design, IKAROS is capable to increase or decrease the number of nodes of the I/O system instance on the fly, without bringing everything down or losing data. IKAROS is capable to decide the file partition distribution schema, by taking on account requests from the user or an application, as well as a domain or a Virtual Organization policy. In this way, it is possible to form multiple instances of smaller capacity higher bandwidth storage utilities capable to respond in an ad-hoc manner. This approach, focusing on flexibility, can scale both up and down and so can provide more cost effective infrastructures for both large scale and smaller size systems. A set of experiments is performed comparing IKAROS with PVFS2 by using multiple clients requests under HPC IOR benchmark and MPICH2.

  3. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks

    PubMed Central

    Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J.; Segarra, Esteve Pallarès; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Gargallo, Emilio Sanvicente

    2015-01-01

    The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic.Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs. PMID:25897496

  4. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks.

    PubMed

    Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J; Pallarès Segarra, Esteve; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Sanvicente Gargallo, Emilio

    2015-04-17

    The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.

  5. Specialist availability in emergencies: contributions of response times and the use of ad hoc coverage in New York State.

    PubMed

    Rabin, Elaine; Patrick, Lisa

    2016-04-01

    Nationwide, hospitals struggle to maintain specialist on-call coverage for emergencies. We seek to further understand the issue by examining reliability of scheduled coverage and the role of ad hoc coverage when none is scheduled. An anonymous electronic survey of all emergency department (ED) directors of a large state. Overall and for 10 specialties, respondents were asked to estimate on-call coverage extent and "reliability" (frequency of emergency response in a clinically useful time frame: 2 hours), and use and effect of ad hoc emergency coverage to fill gaps. Descriptive statistics were performed using Fisher exact and Wilcoxon sign rank tests for significance. Contact information was obtained for 125 of 167 ED directors. Sixty responded (48%), representing 36% of EDs. Forty-six percent reported full on-call coverage scheduled for all specialties. Forty-six percent reported consistent reliability. Coverage and reliability were strongly related (P<.01; 33% reported both), and larger ED volume correlated with both (P<.01). Ninety percent of hospitals that had gaps in either employed ad hoc coverage, significantly improving coverage for 8 of 10 specialties. For all but 1 specialty, more than 20% of hospitals reported that specialists are "Never", "Rarely" or "Sometimes" reliable (more than 50% for cardiovascular surgery, hand surgery and ophthalmology). Significant holes in scheduled on-call specialist coverage are compounded by frequent unreliability of on-call specialists, but partially ameliorated by ad hoc specialist coverage. Regionalization may help because a 2-tiered system may exist: larger hospitals have more complete, reliable coverage. Better understanding of specialists' willingness to treat emergencies ad hoc without taking formal call will suggest additional remedies. Copyright © 2015 Elsevier Inc. All rights reserved.

  6. HOW GAS-DYNAMIC FLARE MODELS POWERED BY PETSCHEK RECONNECTION DIFFER FROM THOSE WITH AD HOC ENERGY SOURCES

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Longcope, D. W.; Klimchuk, J. A.

    Aspects of solar flare dynamics, such as chromospheric evaporation and flare light curves, have long been studied using one-dimensional models of plasma dynamics inside a static flare loop, subjected to some energy input. While extremely successful at explaining the observed characteristics of flares, all such models so far have specified energy input ad hoc, rather than deriving it self-consistently. There is broad consensus that flares are powered by magnetic energy released through reconnection. Recent work has generalized Petschek’s basic reconnection scenario, topological change followed by field line retraction and shock heating, to permit its inclusion in a one-dimensional flare loop model. Heremore » we compare the gas dynamics driven by retraction and shocking to those from more conventional static loop models energized by ad hoc source terms. We find significant differences during the first minute, when retraction leads to larger kinetic energies and produces higher densities at the loop top, while ad hoc heating tends to rarify the loop top. The loop-top density concentration is related to the slow magnetosonic shock, characteristic of Petschek’s model, but persists beyond the retraction phase occurring in the outflow jet. This offers an explanation for observed loop-top sources of X-ray and EUV emission, with advantages over that provided by ad hoc heating scenarios. The cooling phases of the two models are, however, notably similar to one another, suggesting that observations at that stage will yield little information on the nature of energy input.« less

  7. Smart border: ad-hoc wireless sensor networks for border surveillance

    NASA Astrophysics Data System (ADS)

    He, Jun; Fallahi, Mahmoud; Norwood, Robert A.; Peyghambarian, Nasser

    2011-06-01

    Wireless sensor networks have been proposed as promising candidates to provide automated monitoring, target tracking, and intrusion detection for border surveillance. In this paper, we demonstrate an ad-hoc wireless sensor network system for border surveillance. The network consists of heterogeneously autonomous sensor nodes that distributively cooperate with each other to enable a smart border in remote areas. This paper also presents energy-aware and sleeping algorithms designed to maximize the operating lifetime of the deployed sensor network. Lessons learned in building the network and important findings from field experiments are shared in the paper.

  8. Spontaneous ad hoc mobile cloud computing network.

    PubMed

    Lacuesta, Raquel; Lloret, Jaime; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes.

  9. On service differentiation in mobile Ad Hoc networks.

    PubMed

    Zhang, Shun-liang; Ye, Cheng-qing

    2004-09-01

    A network model is proposed to support service differentiation for mobile Ad Hoc networks by combining a fully distributed admission control approach and the DIFS based differentiation mechanism of IEEE802.11. It can provide different kinds of QoS (Quality of Service) for various applications. Admission controllers determine a committed bandwidth based on the reserved bandwidth of flows and the source utilization of networks. Packets are marked when entering into networks by markers according to the committed rate. By the mark in the packet header, intermediate nodes handle the received packets in different manners to provide applications with the QoS corresponding to the pre-negotiated profile. Extensive simulation experiments showed that the proposed mechanism can provide QoS guarantee to assured service traffic and increase the channel utilization of networks.

  10. An artificial immune system approach with secondary response for misbehavior detection in mobile ad hoc networks.

    PubMed

    Sarafijanović, Slavisa; Le Boudec, Jean-Yves

    2005-09-01

    In mobile ad hoc networks, nodes act both as terminals and information relays, and they participate in a common routing protocol, such as dynamic source routing (DSR). The network is vulnerable to routing misbehavior, due to faulty or malicious nodes. Misbehavior detection systems aim at removing this vulnerability. In this paper, we investigate the use of an artificial immune system (AIS) to detect node misbehavior in a mobile ad hoc network using DSR. The system is inspired by the natural immune system (IS) of vertebrates. Our goal is to build a system that, like its natural counterpart, automatically learns, and detects new misbehavior. We describe our solution for the classification task of the AIS; it employs negative selection and clonal selection, the algorithms for learning and adaptation used by the natural IS. We define how we map the natural IS concepts such as self, antigen, and antibody to a mobile ad hoc network and give the resulting algorithm for classifying nodes as misbehaving. We implemented the system in the network simulator Glomosim; we present detection results and discuss how the system parameters affect the performance of primary and secondary response. Further steps will extend the design by using an analogy to the innate system, danger signal, and memory cells.

  11. The Use of English as Ad Hoc Institutional Standard in the Belgian Asylum Interview

    ERIC Educational Resources Information Center

    Maryns, Katrijn

    2017-01-01

    In institutional settings of globalization, labelled languages are generally preferred over multilingual repertoires and mobile language resources. Drawing on linguistic-ethnographic analysis of the way English is treated as an invariable "ad hoc" idiom in the Belgian asylum interview, this article demonstrates how institutional measures…

  12. Assessing Clinical Microbiology Practice Guidelines: American Society for Microbiology Ad Hoc Committee on Evidence-Based Laboratory Medicine Practice Guidelines Assessment.

    PubMed

    Nachamkin, Irving; Kirn, Thomas J; Westblade, Lars F; Humphries, Romney

    2017-11-01

    As part of the American Society for Microbiology (ASM) Evidence-Based Laboratory Medicine Practice Guidelines Committee of the Professional Practice Committee, an ad hoc committee was formed in 2014 to assess guidelines published by the committee using an assessment tool, Appraisal of Guidelines for Research Evaluation II (AGREE II). The AGREE II assessment helps reviewers determine whether published guidelines are robust, transparent, and clear in presenting practice recommendations in a standardized manner. Identifying strengths and weaknesses of practice guidelines by ad hoc assessments helps with improving future guidelines through the participation of key stakeholders. This minireview describes the development of the ad hoc committee and results from their review of several ASM best practices guidelines and a non-ASM practice guideline from the Emergency Nurses Association. Copyright © 2017 American Society for Microbiology.

  13. Assessing Clinical Microbiology Practice Guidelines: American Society for Microbiology Ad Hoc Committee on Evidence-Based Laboratory Medicine Practice Guidelines Assessment

    PubMed Central

    Kirn, Thomas J.; Westblade, Lars F.; Humphries, Romney

    2017-01-01

    ABSTRACT As part of the American Society for Microbiology (ASM) Evidence-Based Laboratory Medicine Practice Guidelines Committee of the Professional Practice Committee, an ad hoc committee was formed in 2014 to assess guidelines published by the committee using an assessment tool, Appraisal of Guidelines for Research Evaluation II (AGREE II). The AGREE II assessment helps reviewers determine whether published guidelines are robust, transparent, and clear in presenting practice recommendations in a standardized manner. Identifying strengths and weaknesses of practice guidelines by ad hoc assessments helps with improving future guidelines through the participation of key stakeholders. This minireview describes the development of the ad hoc committee and results from their review of several ASM best practices guidelines and a non-ASM practice guideline from the Emergency Nurses Association. PMID:28835476

  14. Greedy data transportation scheme with hard packet deadlines for wireless ad hoc networks.

    PubMed

    Lee, HyungJune

    2014-01-01

    We present a greedy data transportation scheme with hard packet deadlines in ad hoc sensor networks of stationary nodes and multiple mobile nodes with scheduled trajectory path and arrival time. In the proposed routing strategy, each stationary ad hoc node en route decides whether to relay a shortest-path stationary node toward destination or a passing-by mobile node that will carry closer to destination. We aim to utilize mobile nodes to minimize the total routing cost as far as the selected route can satisfy the end-to-end packet deadline. We evaluate our proposed routing algorithm in terms of routing cost, packet delivery ratio, packet delivery time, and usability of mobile nodes based on network level simulations. Simulation results show that our proposed algorithm fully exploits the remaining time till packet deadline to turn into networking benefits of reducing the overall routing cost and improving packet delivery performance. Also, we demonstrate that the routing scheme guarantees packet delivery with hard deadlines, contributing to QoS improvement in various network services.

  15. Greedy Data Transportation Scheme with Hard Packet Deadlines for Wireless Ad Hoc Networks

    PubMed Central

    Lee, HyungJune

    2014-01-01

    We present a greedy data transportation scheme with hard packet deadlines in ad hoc sensor networks of stationary nodes and multiple mobile nodes with scheduled trajectory path and arrival time. In the proposed routing strategy, each stationary ad hoc node en route decides whether to relay a shortest-path stationary node toward destination or a passing-by mobile node that will carry closer to destination. We aim to utilize mobile nodes to minimize the total routing cost as far as the selected route can satisfy the end-to-end packet deadline. We evaluate our proposed routing algorithm in terms of routing cost, packet delivery ratio, packet delivery time, and usability of mobile nodes based on network level simulations. Simulation results show that our proposed algorithm fully exploits the remaining time till packet deadline to turn into networking benefits of reducing the overall routing cost and improving packet delivery performance. Also, we demonstrate that the routing scheme guarantees packet delivery with hard deadlines, contributing to QoS improvement in various network services. PMID:25258736

  16. The 5th Meeting of the Ad Hoc Panel on Terminal Configured Vehicles

    NASA Technical Reports Server (NTRS)

    1977-01-01

    A report of the fifth meeting of the NASA Research and Technology Advisory Council, Ad Hoc panel on Terminal Configured Vehicles is presented. Some of the following topics were discussed; (1) microwave landing systems; (2) whole word computer system status; (3) flight path angle control: (4) VTOL approaches and landing technology; and (5) simulation study in wind shear.

  17. Adaptive Reliable Routing Protocol Using Combined Link Stability Estimation for Mobile Ad hoc Networks

    NASA Astrophysics Data System (ADS)

    Vadivel, R.; Bhaskaran, V. Murali

    2010-10-01

    The main reason for packet loss in ad hoc networks is the link failure or node failure. In order to increase the path stability, it is essential to distinguish and moderate the failures. By knowing individual link stability along a path, path stability can be identified. In this paper, we develop an adaptive reliable routing protocol using combined link stability estimation for mobile ad hoc networks. The main objective of this protocol is to determine a Quality of Service (QoS) path along with prolonging the network life time and to reduce the packet loss. We calculate a combined metric for a path based on the parameters Link Expiration Time, Node Remaining Energy and Node Velocity and received signal strength to predict the link stability or lifetime. Then, a bypass route is established to retransmit the lost data, when a link failure occurs. By simulation results, we show that the proposed reliable routing protocol achieves high delivery ratio with reduced delay and packet drop.

  18. A multihop key agreement scheme for wireless ad hoc networks based on channel characteristics.

    PubMed

    Hao, Zhuo; Zhong, Sheng; Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks.

  19. A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics

    PubMed Central

    Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks. PMID:23766725

  20. Stochastic does not equal ad hoc. [theories of lunar origin

    NASA Technical Reports Server (NTRS)

    Hartmann, W. K.

    1984-01-01

    Some classes of influential events in solar system history are class-predictable but not event-predictable. Theories of lunar origin should not ignore class-predictable stochastic events. Impacts and close encounters with large objects during planet formation are class-predictable. These stochastic events, such as large impacts that triggered ejection of Earth-mantle material into a circum-Earth cloud, should not be rejected as ad hoc. A way to deal with such events scientifically is to investigate their consequences; if it can be shown that they might produce the Moon, they become viable concepts in theories of lunar origin.

  1. Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks

    DTIC Science & Technology

    2013-01-01

    high resiliency to malicious attacks and misbehaving nodes. Keywords—trust management; mobile ad hoc networks; QoS trust; social trust; trust...paper we address an importance issue of trust management protocol design for MANETs: trust bias minimization despite misbehaving nodes performing

  2. Topology for efficient information dissemination in ad-hoc networking

    NASA Technical Reports Server (NTRS)

    Jennings, E.; Okino, C. M.

    2002-01-01

    In this paper, we explore the information dissemination problem in ad-hoc wirless networks. First, we analyze the probability of successful broadcast, assuming: the nodes are uniformly distributed, the available area has a lower bould relative to the total number of nodes, and there is zero knowledge of the overall topology of the network. By showing that the probability of such events is small, we are motivated to extract good graph topologies to minimize the overall transmissions. Three algorithms are used to generate topologies of the network with guaranteed connectivity. These are the minimum radius graph, the relative neighborhood graph and the minimum spanning tree. Our simulation shows that the relative neighborhood graph has certain good graph properties, which makes it suitable for efficient information dissemination.

  3. Spontaneous Ad Hoc Mobile Cloud Computing Network

    PubMed Central

    Lacuesta, Raquel; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes. PMID:25202715

  4. Analytical Models of Cross-Layer Protocol Optimization in Real-Time Wireless Sensor Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    The real-time interactions among the nodes of a wireless sensor network (WSN) to cooperatively process data from multiple sensors are modeled. Quality-of-service (QoS) metrics are associated with the quality of fused information: throughput, delay, packet error rate, etc. Multivariate point process (MVPP) models of discrete random events in WSNs establish stochastic characteristics of optimal cross-layer protocols. Discrete-event, cross-layer interactions in mobile ad hoc network (MANET) protocols have been modeled using a set of concatenated design parameters and associated resource levels by the MVPPs. Characterization of the "best" cross-layer designs for a MANET is formulated by applying the general theory of martingale representations to controlled MVPPs. Performance is described in terms of concatenated protocol parameters and controlled through conditional rates of the MVPPs. Modeling limitations to determination of closed-form solutions versus explicit iterative solutions for ad hoc WSN controls are examined.

  5. A secure 3-way routing protocols for intermittently connected mobile ad hoc networks.

    PubMed

    Sekaran, Ramesh; Parasuraman, Ganesh Kumar

    2014-01-01

    The mobile ad hoc network may be partially connected or it may be disconnected in nature and these forms of networks are termed intermittently connected mobile ad hoc network (ICMANET). The routing in such disconnected network is commonly an arduous task. Many routing protocols have been proposed for routing in ICMANET since decades. The routing techniques in existence for ICMANET are, namely, flooding, epidemic, probabilistic, copy case, spray and wait, and so forth. These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth. Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters. The algorithm along with efficient routing ensures higher degree of security. The security level is cited testing with respect to possibility of malicious nodes into the network. This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET.

  6. A Secure 3-Way Routing Protocols for Intermittently Connected Mobile Ad Hoc Networks

    PubMed Central

    Parasuraman, Ganesh Kumar

    2014-01-01

    The mobile ad hoc network may be partially connected or it may be disconnected in nature and these forms of networks are termed intermittently connected mobile ad hoc network (ICMANET). The routing in such disconnected network is commonly an arduous task. Many routing protocols have been proposed for routing in ICMANET since decades. The routing techniques in existence for ICMANET are, namely, flooding, epidemic, probabilistic, copy case, spray and wait, and so forth. These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth. Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters. The algorithm along with efficient routing ensures higher degree of security. The security level is cited testing with respect to possibility of malicious nodes into the network. This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET. PMID:25136697

  7. An extended smart utilization medium access control (ESU-MAC) protocol for ad hoc wireless systems

    NASA Astrophysics Data System (ADS)

    Vashishtha, Jyoti; Sinha, Aakash

    2006-05-01

    The demand for spontaneous setup of a wireless communication system has increased in recent years for areas like battlefield, disaster relief operations etc., where a pre-deployment of network infrastructure is difficult or unavailable. A mobile ad-hoc network (MANET) is a promising solution, but poses a lot of challenges for all the design layers, specifically medium access control (MAC) layer. Recent existing works have used the concepts of multi-channel and power control in designing MAC layer protocols. SU-MAC developed by the same authors, efficiently uses the 'available' data and control bandwidth to send control information and results in increased throughput via decreasing contention on the control channel. However, SU-MAC protocol was limited for static ad-hoc network and also faced the busy-receiver node problem. We present the Extended SU-MAC (ESU-MAC) protocol which works mobile nodes. Also, we significantly improve the scheme of control information exchange in ESU-MAC to overcome the busy-receiver node problem and thus, further avoid the blockage of control channel for longer periods of time. A power control scheme is used as before to reduce interference and to effectively re-use the available bandwidth. Simulation results show that ESU-MAC protocol is promising for mobile, ad-hoc network in terms of reduced contention at the control channel and improved throughput because of channel re-use. Results show a considerable increase in throughput compared to SU-MAC which could be attributed to increased accessibility of control channel and improved utilization of data channels due to superior control information exchange scheme.

  8. Defense Acquisition and the Case of the Joint Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a Mechanism for Adaptive Change

    DTIC Science & Technology

    2013-04-01

    Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a Mechanism for Adaptive Change Kathryn Aten and John T. Dillard Naval...Defense Acquisition and the Case of the Joint Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a Mechanism for Adaptive Change...describes the preliminary analysis and findings of our study exploring what drives successful organizational adaptation in the context of technology

  9. An Energy Efficient Power Control Protocol for Ad Hoc Networks Using Directional Antennas

    NASA Astrophysics Data System (ADS)

    Quiroz-Perez, Carlos; Gulliver, T. Aaron

    A wireless ad hoc network is a collection of mobile nodes that can communicate with each other. Typically, nodes employ omnidirectional antennas. The use of directional antennas can increase spatial reuse, reduce the number of hops to a destination, reduce interference, and increase the transmission range in a specific direction. This is because omnidirectional antennas radiate equally in all directions, limiting the transmission range.

  10. Report of the Ad Hoc Committee on Religious and Cultural Celebrations in the Library.

    ERIC Educational Resources Information Center

    Rathemacher, Andree; Grubman, Sheila Black; Lahiri, Amar; Gilton, Donna; Sharif, Mohammed

    The charge of the University of Rhode Island's Ad Hoc Committee on Religious and Cultural Celebrations in the Library was to: investigate all opportunities for the library to educate the campus community about religious and cultural holidays; consider all the major religions of the world and the possibility of having displays for the symbols of…

  11. Defense Acquisition and the Case of the Joint Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a Mechanism for Adaptive Change

    DTIC Science & Technology

    2013-10-01

    pmlkploba=obmloq=pbofbp= Defense Acquisition and the Case of the Joint Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a...of the Joint Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a Mechanism for Adaptive Change 5a. CONTRACT NUMBER 5b. GRANT...findings of our study exploring what drives successful organizational adaptation in the context of technology transition and acquisition within the

  12. Data management issues in mobile ad hoc networks

    PubMed Central

    HARA, Takahiro

    2017-01-01

    Research on mobile ad hoc networks (MANETs) has become a hot research topic since the middle 1990’s. Over the first decade, most research focused on networking techniques, ignoring data management issues. We, however, realized early the importance of data management in MANETs, and have been conducting studies in this area for 15 years. In this review, we summarize some key technical issues related to data management in MANETs, and the studies we have done in addressing these issues, which include placement of data replicas, update management, and query processing with security management. The techniques proposed in our studies have been designed with deep considerations of MANET features including network partitioning, node participation/disappearance, limited network bandwidth, and energy efficiency. Our studies published in early 2000’s have developed a new research field as data management in MANETs. Also, our recent studies are expected to be significant guidelines of new research directions. We conclude the review by discussing some future directions for research. PMID:28496052

  13. Data management issues in mobile ad hoc networks.

    PubMed

    Hara, Takahiro

    2017-01-01

    Research on mobile ad hoc networks (MANETs) has become a hot research topic since the middle 1990's. Over the first decade, most research focused on networking techniques, ignoring data management issues. We, however, realized early the importance of data management in MANETs, and have been conducting studies in this area for 15 years. In this review, we summarize some key technical issues related to data management in MANETs, and the studies we have done in addressing these issues, which include placement of data replicas, update management, and query processing with security management. The techniques proposed in our studies have been designed with deep considerations of MANET features including network partitioning, node participation/disappearance, limited network bandwidth, and energy efficiency. Our studies published in early 2000's have developed a new research field as data management in MANETs. Also, our recent studies are expected to be significant guidelines of new research directions. We conclude the review by discussing some future directions for research.

  14. Integrated data lookup and replication scheme in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Chen, Kai; Nahrstedt, Klara

    2001-11-01

    Accessing remote data is a challenging task in mobile ad hoc networks. Two problems have to be solved: (1) how to learn about available data in the network; and (2) how to access desired data even when the original copy of the data is unreachable. In this paper, we develop an integrated data lookup and replication scheme to solve these problems. In our scheme, a group of mobile nodes collectively host a set of data to improve data accessibility for all members of the group. They exchange data availability information by broadcasting advertising (ad) messages to the group using an adaptive sending rate policy. The ad messages are used by other nodes to derive a local data lookup table, and to reduce data redundancy within a connected group. Our data replication scheme predicts group partitioning based on each node's current location and movement patterns, and replicates data to other partitions before partitioning occurs. Our simulations show that data availability information can quickly propagate throughout the network, and that the successful data access ratio of each node is significantly improved.

  15. ARSENAL: A Cross Layer Architecture for Secure Resilient Tactical Mobile AdHoc Networks

    DTIC Science & Technology

    2016-01-21

    stations separated by 0.5 to 1 km can be coherently measured to a single mobile subscriber using LTE signaling. These are the first measurements of...undertake three parallel but inter-coupled tasks geared towards a) performing measurements via real deployments and enhancing our understanding of layer...dependencies and vulnerabilities in mobile ad hoc networks; these measurements will be on existing testbeds at The views, opinions and/or findings

  16. ARSENAL: A Cross Layer Architecture for SecureResilient Tactical Mobile AdHoc Networks

    DTIC Science & Technology

    2016-01-21

    stations separated by 0.5 to 1 km can be coherently measured to a single mobile subscriber using LTE signaling. These are the first measurements of...undertake three parallel but inter-coupled tasks geared towards a) performing measurements via real deployments and enhancing our understanding of layer...dependencies and vulnerabilities in mobile ad hoc networks; these measurements will be on existing testbeds at The views, opinions and/or findings

  17. Panel Discussion : Report of the APS Ad-Hoc Committee on LGBT Issues

    NASA Astrophysics Data System (ADS)

    Atherton, Tim; Barthelemy, Ramon; Garmon, Savannah; Reeves, Kyle; APS Ad-Hoc Committee on LGBT Issues Team

    Following the presentation of the findings and recommendations of the APS Ad-Hoc Committee on LGBT Issues (C-LGBT) by Committee Chair Michael Falk, a panel discussion will be held featuring several members of the committee. The discussion will focus on how APS can best ensure the recommendations of the committee are carried out in a timely fashion and other ideas on future APS efforts toward LGBT inclusion in physics. Discussion topics will also include the research and other input that shaped the committee's findings and recommendations.

  18. Intelligent QoS routing algorithm based on improved AODV protocol for Ad Hoc networks

    NASA Astrophysics Data System (ADS)

    Huibin, Liu; Jun, Zhang

    2016-04-01

    Mobile Ad Hoc Networks were playing an increasingly important part in disaster reliefs, military battlefields and scientific explorations. However, networks routing difficulties are more and more outstanding due to inherent structures. This paper proposed an improved cuckoo searching-based Ad hoc On-Demand Distance Vector Routing protocol (CSAODV). It elaborately designs the calculation methods of optimal routing algorithm used by protocol and transmission mechanism of communication-package. In calculation of optimal routing algorithm by CS Algorithm, by increasing QoS constraint, the found optimal routing algorithm can conform to the requirements of specified bandwidth and time delay, and a certain balance can be obtained among computation spending, bandwidth and time delay. Take advantage of NS2 simulation software to take performance test on protocol in three circumstances and validate the feasibility and validity of CSAODV protocol. In results, CSAODV routing protocol is more adapt to the change of network topological structure than AODV protocol, which improves package delivery fraction of protocol effectively, reduce the transmission time delay of network, reduce the extra burden to network brought by controlling information, and improve the routing efficiency of network.

  19. Intelligent self-organization methods for wireless ad hoc sensor networks based on limited resources

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2006-05-01

    A wireless ad hoc sensor network (WSN) is a configuration for area surveillance that affords rapid, flexible deployment in arbitrary threat environments. There is no infrastructure support and sensor nodes communicate with each other only when they are in transmission range. To a greater degree than the terminals found in mobile ad hoc networks (MANETs) for communications, sensor nodes are resource-constrained, with limited computational processing, bandwidth, memory, and power, and are typically unattended once in operation. Consequently, the level of information exchange among nodes, to support any complex adaptive algorithms to establish network connectivity and optimize throughput, not only deplete those limited resources and creates high overhead in narrowband communications, but also increase network vulnerability to eavesdropping by malicious nodes. Cooperation among nodes, critical to the mission of sensor networks, can thus be disrupted by the inappropriate choice of the method for self-organization. Recent published contributions to the self-configuration of ad hoc sensor networks, e.g., self-organizing mapping and swarm intelligence techniques, have been based on the adaptive control of the cross-layer interactions found in MANET protocols to achieve one or more performance objectives: connectivity, intrusion resistance, power control, throughput, and delay. However, few studies have examined the performance of these algorithms when implemented with the limited resources of WSNs. In this paper, self-organization algorithms for the initiation, operation and maintenance of a network topology from a collection of wireless sensor nodes are proposed that improve the performance metrics significant to WSNs. The intelligent algorithm approach emphasizes low computational complexity, energy efficiency and robust adaptation to change, allowing distributed implementation with the actual limited resources of the cooperative nodes of the network. Extensions of the

  20. Ad hoc supervision of general practice registrars as a 'community of practice': analysis, interpretation and re-presentation.

    PubMed

    Clement, T; Brown, J; Morrison, J; Nestel, D

    2016-05-01

    General practice registrars in Australia undertake most of their vocational training in accredited general practices. They typically see patients alone from the start of their community-based training and are expected to seek timely ad hoc support from their supervisor. Such ad hoc encounters are a mechanism for ensuring patient safety, but also provide an opportunity for learning and teaching. Wenger's (Communities of practice: learning, meaning, and identity. Cambridge University Press, New York, 1998) social theory of learning ('communities of practice') guided a secondary analysis of audio-recordings of ad hoc encounters. Data from one encounter is re-presented as an extended sequence to maintain congruence with the theoretical perspective and enhance vicariousness. An interpretive commentary communicates key features of Wenger's theory and highlights the researchers' interpretations. We argue that one encounter can reveal universal understandings of clinical supervision and that the process of naturalistic generalisation allows readers to transfer others' experiences to their own contexts. The paper raises significant analytic, interpretive, and representational issues. We highlight that report writing is an important, but infrequently discussed, part of research design. We discuss the challenges of supporting the learning and teaching that arises from adopting a socio-cultural lens and argue that such a perspective importantly captures the complex range of issues that work-based practitioners have to grapple with. This offers a challenge to how we research and seek to influence work-based learning and teaching in health care settings.

  1. Mapping Ad Hoc Communications Network of a Large Number Fixed-Wing UAV Swarm

    DTIC Science & Technology

    2017-03-01

    partitioned sub-swarms. The work covered in this thesis is to build a model of the NPS swarm’s communication network in ns-3 simulation software and use...partitioned sub- swarms. The work covered in this thesis is to build a model of the NPS swarm’s communication network in ns-3 simulation software and...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS MAPPING AD HOC COMMUNICATIONS NETWORK OF A LARGE NUMBER FIXED-WING UAV SWARM by Alexis

  2. Energy conservation in ad hoc multimedia networks using traffic-shaping mechanisms

    NASA Astrophysics Data System (ADS)

    Chandra, Surendar

    2003-12-01

    In this work, we explore network traffic shaping mechanisms that deliver packets at pre-determined intervals; allowing the network interface to transition to a lower power consuming sleep state. We focus our efforts on commodity devices, IEEE 802.11b ad hoc mode and popular streaming formats. We argue that factors such as the lack of scheduling clock phase synchronization among the participants and scheduling delays introduced by back ground tasks affect the potential energy savings. Increasing the periodic transmission delays to transmit data infrequently can offset some of these effects at the expense of flooding the wireless channel for longer periods of time; potentially increasing the time to acquire the channel for non-multimedia traffic. Buffering mechanisms built into media browsers can mitigate the effects of these added delays from being mis-interpreted as network congestion. We show that practical implementations of such traffic shaping mechanisms can offer significant energy savings.

  3. Phase retrieval from local measurements in two dimensions

    NASA Astrophysics Data System (ADS)

    Iwen, Mark; Preskitt, Brian; Saab, Rayan; Viswanathan, Aditya

    2017-08-01

    The phase retrieval problem has appeared in a multitude of applications for decades. While ad hoc solutions have existed since the early 1970s, recent developments have provided algorithms that offer promising theoretical guarantees under increasingly realistic assumptions. Motivated by ptychographic imaging, we generalize a recent result on phase retrieval of a one dimensional objective vector x ∈ ℂd to recover a two dimensional sample Q ∈ ℂd x d from phaseless measurements, using a tensor product formulation to extend the previous work.

  4. Adaptive Flow Control for Enabling Quality of Service in Tactical Ad Hoc Wireless Networks

    DTIC Science & Technology

    2010-12-01

    environment in wireless networks , we use sensors in the network routers to detect and respond to congestion. We use backpressure techniques... wireless mesh network . In the current approach, we used OLSR as the routing scheme. However, B.A.T.M.A.N. offers the significant advantage of being based...Control and QoS Routing in Multi-Channel Wireless Mesh Networks ,” 68-77. ACM International Symposium on Mobile Ad Hoc Networking &

  5. Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups

    NASA Astrophysics Data System (ADS)

    Desmedt, Yvo; Lange, Tanja; Burmester, Mike

    Task-specific groups are often formed in an ad-hoc manner within large corporate structures, such as companies. Take the following typical scenario: A director decides to set up a task force group for some specific project. An order is passed down the hierarchy where it finally reaches a manager who selects some employees to form the group. The members should communicate in a secure way and for efficiency, a symmetric encryption system is chosen. To establish a joint secret key for the group, a group key exchange (GKE) protocol is used. We show how to use an existing Public Key Infrastructure (PKI) to achieve authenticated GKE by modifying the protocol and particularly by including signatures.

  6. Ad hoc committee on global climate issues: Annual report

    USGS Publications Warehouse

    Gerhard, L.C.; Hanson, B.M.B.

    2000-01-01

    The AAPG Ad Hoc Committee on Global Climate Issues has studied the supposition of human-induced climate change since the committee's inception in January 1998. This paper details the progress and findings of the committee through June 1999. At that time there had been essentially no geologic input into the global climate change debate. The following statements reflect the current state of climate knowledge from the geologic perspective as interpreted by the majority of the committee membership. The committee recognizes that new data could change its conclusions. The earth's climate is constantly changing owing to natural variability in earth processes. Natural climate variability over recent geological time is greater than reasonable estimates of potential human-induced greenhouse gas changes. Because no tool is available to test the supposition of human-induced climate change and the range of natural variability is so great, there is no discernible human influence on global climate at this time.

  7. Enhancement of Beaconless Location-Based Routing with Signal Strength Assistance for Ad-Hoc Networks

    NASA Astrophysics Data System (ADS)

    Chen, Guowei; Itoh, Kenichi; Sato, Takuro

    Routing in Ad-hoc networks is unreliable due to the mobility of the nodes. Location-based routing protocols, unlike other protocols which rely on flooding, excel in network scalability. Furthermore, new location-based routing protocols, like, e. g. BLR [1], IGF [2], & CBF [3] have been proposed, with the feature of not requiring beacons in MAC-layer, which improve more in terms of scalability. Such beaconless routing protocols can work efficiently in dense network areas. However, these protocols' algorithms have no ability to avoid from routing into sparse areas. In this article, historical signal strength has been added as a factor into the BLR algorithm, which avoids routing into sparse area, and consequently improves the global routing efficiency.

  8. Robotic disaster recovery efforts with ad-hoc deployable cloud computing

    NASA Astrophysics Data System (ADS)

    Straub, Jeremy; Marsh, Ronald; Mohammad, Atif F.

    2013-06-01

    Autonomous operations of search and rescue (SaR) robots is an ill posed problem, which is complexified by the dynamic disaster recovery environment. In a typical SaR response scenario, responder robots will require different levels of processing capabilities during various parts of the response effort and will need to utilize multiple algorithms. Placing these capabilities onboard the robot is a mediocre solution that precludes algorithm specific performance optimization and results in mediocre performance. Architecture for an ad-hoc, deployable cloud environment suitable for use in a disaster response scenario is presented. Under this model, each service provider is optimized for the task and maintains a database of situation-relevant information. This service-oriented architecture (SOA 3.0) compliant framework also serves as an example of the efficient use of SOA 3.0 in an actual cloud application.

  9. Trust Management in Mobile Ad Hoc Networks for Bias Minimization and Application Performance Maximization

    DTIC Science & Technology

    2014-02-26

    set of anomaly detection rules 62 I.-R. Chen et al. / Ad Hoc Networks 19 (2014) 59–74 Author’s personal copy including the interval rule (for...deficiencies in anomaly detection (e.g., imperfection of rules) by a false negative probability (PHfn) of misidentifying an unhealthy node as a...multimedia servers, Multimedia Syst. 8 (2) (2000) 83–91. [53] R. Mitchell, I.R. Chen, Adaptive intrusion detection for unmanned aircraft systems based on

  10. Clinician Ratings of Interpreter Mediated Visits in Underserved Primary Care Settings with Ad hoc, In-person Professional, and Video Conferencing Modes

    PubMed Central

    Nápoles, Anna M.; Santoyo-Olsson, Jasmine; Karliner, Leah S.; O’Brien, Helen; Gregorich, Steven E.; Pérez-Stable, Eliseo J.

    2013-01-01

    Language interpretation ameliorates health disparities among underserved limited English-proficient patients, yet few studies have compared clinician satisfaction with these services. Self-administered clinician post-visit surveys compared the quality of interpretation and communication, visit satisfaction, degree of patient engagement, and cultural competence of visits using untrained people acting as interpreters (ad hoc), in-person professional, or video conferencing professional interpretation for 283 visits. Adjusting for clinician and patient characteristics, the quality of interpretation of in-person and video conferencing modes were rated similarly (OR=1.79; 95% CI 0.74, 4.33). The quality of in-person (OR=5.55; 95% CI 1.50, 20.51) and video conferencing (OR=3.10; 95% CI 1.16, 8.31) were rated higher than ad hoc interpretation. Self-assessed cultural competence was better for in-person versus video conferencing interpretation (OR=2.32; 95% CI 1.11, 4.86). Video conferencing interpretation increases access without compromising quality, but cultural nuances may be better addressed by in-person interpreters. Professional interpretation is superior to ad hoc (OR=4.15; 95% CI 1.43, 12.09). PMID:20173271

  11. An adaptive density-based routing protocol for flying Ad Hoc networks

    NASA Astrophysics Data System (ADS)

    Zheng, Xueli; Qi, Qian; Wang, Qingwen; Li, Yongqiang

    2017-10-01

    An Adaptive Density-based Routing Protocol (ADRP) for Flying Ad Hoc Networks (FANETs) is proposed in this paper. The main objective is to calculate forwarding probability adaptively in order to increase the efficiency of forwarding in FANETs. ADRP dynamically fine-tunes the rebroadcasting probability of a node for routing request packets according to the number of neighbour nodes. Indeed, it is more interesting to privilege the retransmission by nodes with little neighbour nodes. We describe the protocol, implement it and evaluate its performance using NS-2 network simulator. Simulation results reveal that ADRP achieves better performance in terms of the packet delivery fraction, average end-to-end delay, normalized routing load, normalized MAC load and throughput, which is respectively compared with AODV.

  12. A Family of ACO Routing Protocols for Mobile Ad Hoc Networks

    PubMed Central

    Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-hoon

    2017-01-01

    In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads. PMID:28531159

  13. A Family of ACO Routing Protocols for Mobile Ad Hoc Networks.

    PubMed

    Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-Hoon

    2017-05-22

    In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads.

  14. Cross-layer protocols optimized for real-time multimedia services in energy-constrained mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2003-07-01

    Mobile ad hoc networking (MANET) supports self-organizing, mobile infrastructures and enables an autonomous network of mobile nodes that can operate without a wired backbone. Ad hoc networks are characterized by multihop, wireless connectivity via packet radios and by the need for efficient dynamic protocols. All routers are mobile and can establish connectivity with other nodes only when they are within transmission range. Importantly, ad hoc wireless nodes are resource-constrained, having limited processing, memory, and battery capacity. Delivery of high quality-ofservice (QoS), real-time multimedia services from Internet-based applications over a MANET is a challenge not yet achieved by proposed Internet Engineering Task Force (IETF) ad hoc network protocols in terms of standard performance metrics such as end-to-end throughput, packet error rate, and delay. In the distributed operations of route discovery and maintenance, strong interaction occurs across MANET protocol layers, in particular, the physical, media access control (MAC), network, and application layers. The QoS requirements are specified for the service classes by the application layer. The cross-layer design must also satisfy the battery-limited energy constraints, by minimizing the distributed power consumption at the nodes and of selected routes. Interactions across the layers are modeled in terms of the set of concatenated design parameters including associated energy costs. Functional dependencies of the QoS metrics are described in terms of the concatenated control parameters. New cross-layer designs are sought that optimize layer interdependencies to achieve the "best" QoS available in an energy-constrained, time-varying network. The protocol design, based on a reactive MANET protocol, adapts the provisioned QoS to dynamic network conditions and residual energy capacities. The cross-layer optimization is based on stochastic dynamic programming conditions derived from time-dependent models of

  15. Linking Satellites Via Earth "Hot Spots" and the Internet to Form Ad Hoc Constellations

    NASA Technical Reports Server (NTRS)

    Mandl, Dan; Frye, Stu; Grosvenor, Sandra; Ingram, Mary Ann; Langley, John; Miranda, Felix; Lee, Richard Q.; Romanofsky, Robert; Zaman, Afoz; Popovic, Zoya

    2004-01-01

    As more assets are placed in orbit, opportunities emerge to combine various sets of satellites in temporary constellations to perform collaborative image collections. Often, new operations concepts for a satellite or set of satellites emerge after launch. To the degree with which new space assets can be inexpensively and rapidly integrated into temporary or "ad hoc" constellations, will determine whether these new ideas will be implemented or not. On the Earth Observing 1 (EO-1) satellite, a New Millennium Program mission, a number of experiments were conducted and are being conducted to demonstrate various aspects of an architecture that, when taken as a whole, will enable progressive mission autonomy. In particular, the target architecture will use adaptive ground antenna arrays to form, as close as possible, the equivalent of wireless access points for low earth orbiting satellites. Coupled with various ground and flight software and the Internet. the architecture enables progressive mission autonomy. Thus, new collaborative sensing techniques can be implemented post-launch. This paper will outline the overall operations concept and highlight details of both the research effort being conducted in ad hoc constellations, mission autonomy and

  16. Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization in Mobile Ad Hoc Networks

    PubMed Central

    Robinson, Y. Harold; Rajaram, M.

    2015-01-01

    Mobile ad hoc network (MANET) is a collection of autonomous mobile nodes forming an ad hoc network without fixed infrastructure. Dynamic topology property of MANET may degrade the performance of the network. However, multipath selection is a great challenging task to improve the network lifetime. We proposed an energy-aware multipath routing scheme based on particle swarm optimization (EMPSO) that uses continuous time recurrent neural network (CTRNN) to solve optimization problems. CTRNN finds the optimal loop-free paths to solve link disjoint paths in a MANET. The CTRNN is used as an optimum path selection technique that produces a set of optimal paths between source and destination. In CTRNN, particle swarm optimization (PSO) method is primly used for training the RNN. The proposed scheme uses the reliability measures such as transmission cost, energy factor, and the optimal traffic ratio between source and destination to increase routing performance. In this scheme, optimal loop-free paths can be found using PSO to seek better link quality nodes in route discovery phase. PSO optimizes a problem by iteratively trying to get a better solution with regard to a measure of quality. The proposed scheme discovers multiple loop-free paths by using PSO technique. PMID:26819966

  17. Quality of service routing in wireless ad hoc networks

    NASA Astrophysics Data System (ADS)

    Sane, Sachin J.; Patcha, Animesh; Mishra, Amitabh

    2003-08-01

    An efficient routing protocol is essential to guarantee application level quality of service running on wireless ad hoc networks. In this paper we propose a novel routing algorithm that computes a path between a source and a destination by considering several important constraints such as path-life, availability of sufficient energy as well as buffer space in each of the nodes on the path between the source and destination. The algorithm chooses the best path from among the multiples paths that it computes between two endpoints. We consider the use of control packets that run at a priority higher than the data packets in determining the multiple paths. The paper also examines the impact of different schedulers such as weighted fair queuing, and weighted random early detection among others in preserving the QoS level guarantees. Our extensive simulation results indicate that the algorithm improves the overall lifetime of a network, reduces the number of dropped packets, and decreases the end-to-end delay for real-time voice application.

  18. Noise-Assisted Concurrent Multipath Traffic Distribution in Ad Hoc Networks

    PubMed Central

    Murata, Masayuki

    2013-01-01

    The concept of biologically inspired networking has been introduced to tackle unpredictable and unstable situations in computer networks, especially in wireless ad hoc networks where network conditions are continuously changing, resulting in the need of robustness and adaptability of control methods. Unfortunately, existing methods often rely heavily on the detailed knowledge of each network component and the preconfigured, that is, fine-tuned, parameters. In this paper, we utilize a new concept, called attractor perturbation (AP), which enables controlling the network performance using only end-to-end information. Based on AP, we propose a concurrent multipath traffic distribution method, which aims at lowering the average end-to-end delay by only adjusting the transmission rate on each path. We demonstrate through simulations that, by utilizing the attractor perturbation relationship, the proposed method achieves a lower average end-to-end delay compared to other methods which do not take fluctuations into account. PMID:24319375

  19. A memetic optimization algorithm for multi-constrained multicast routing in ad hoc networks

    PubMed Central

    Hammad, Karim; El Bakly, Ahmed M.

    2018-01-01

    A mobile ad hoc network is a conventional self-configuring network where the routing optimization problem—subject to various Quality-of-Service (QoS) constraints—represents a major challenge. Unlike previously proposed solutions, in this paper, we propose a memetic algorithm (MA) employing an adaptive mutation parameter, to solve the multicast routing problem with higher search ability and computational efficiency. The proposed algorithm utilizes an updated scheme, based on statistical analysis, to estimate the best values for all MA parameters and enhance MA performance. The numerical results show that the proposed MA improved the delay and jitter of the network, while reducing computational complexity as compared to existing algorithms. PMID:29509760

  20. A memetic optimization algorithm for multi-constrained multicast routing in ad hoc networks.

    PubMed

    Ramadan, Rahab M; Gasser, Safa M; El-Mahallawy, Mohamed S; Hammad, Karim; El Bakly, Ahmed M

    2018-01-01

    A mobile ad hoc network is a conventional self-configuring network where the routing optimization problem-subject to various Quality-of-Service (QoS) constraints-represents a major challenge. Unlike previously proposed solutions, in this paper, we propose a memetic algorithm (MA) employing an adaptive mutation parameter, to solve the multicast routing problem with higher search ability and computational efficiency. The proposed algorithm utilizes an updated scheme, based on statistical analysis, to estimate the best values for all MA parameters and enhance MA performance. The numerical results show that the proposed MA improved the delay and jitter of the network, while reducing computational complexity as compared to existing algorithms.

  1. BCDP: Budget Constrained and Delay-Bounded Placement for Hybrid Roadside Units in Vehicular Ad Hoc Networks

    PubMed Central

    Li, Peng; Huang, Chuanhe; Liu, Qin

    2014-01-01

    In vehicular ad hoc networks, roadside units (RSUs) placement has been proposed to improve the the overall network performance in many ITS applications. This paper addresses the budget constrained and delay-bounded placement problem (BCDP) for roadside units in vehicular ad hoc networks. There are two types of RSUs: cable connected RSU (c-RSU) and wireless RSU (w-RSU). c-RSUs are interconnected through wired lines, and they form the backbone of VANETs, while w-RSUs connect to other RSUs through wireless communication and serve as an economical extension of the coverage of c-RSUs. The delay-bounded coverage range and deployment cost of these two cases are totally different. We are given a budget constraint and a delay bound, the problem is how to find the optimal candidate sites with the maximal delay-bounded coverage to place RSUs such that a message from any c-RSU in the region can be disseminated to the more vehicles within the given budget constraint and delay bound. We first prove that the BCDP problem is NP-hard. Then we propose several algorithms to solve the BCDP problem. Simulation results show the heuristic algorithms can significantly improve the coverage range and reduce the total deployment cost, compared with other heuristic methods. PMID:25436656

  2. Context dependent off loading for cloudlet in mobile ad-hoc network

    NASA Astrophysics Data System (ADS)

    Bhatt, N.; Nadesh, R. K.; ArivuSelvan, K.

    2017-11-01

    Cloud Computing in Mobile Ad-hoc network is emerging part of research consideration as the demand and competency of mobile devices increased in last few years. To follow out operation within the remote cloud builds the postponement and influences the administration standard. To keep away from this trouble cloudlet is presented. Cloudlet gives identical support of the devices as cloud at low inactivity however at high transfer speed. Be that as it may, choice of a cloudlet for offloading calculation with flat energy is a noteworthy test if multiple cloud let is accessible adjacent. Here I proposed energy and bandwidth (Traffic overload for communication with cloud) aware cloudlet selection strategy based on the context dependency of the device location. It works on the basis of mobile device location and bandwidth availability of cloudlet. The cloudlet offloading and selection process using given solution is simulated in Cloud ~ Simulator.

  3. An enhanced performance through agent-based secure approach for mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Bisen, Dhananjay; Sharma, Sanjeev

    2018-01-01

    This paper proposes an agent-based secure enhanced performance approach (AB-SEP) for mobile ad hoc network. In this approach, agent nodes are selected through optimal node reliability as a factor. This factor is calculated on the basis of node performance features such as degree difference, normalised distance value, energy level, mobility and optimal hello interval of node. After selection of agent nodes, a procedure of malicious behaviour detection is performed using fuzzy-based secure architecture (FBSA). To evaluate the performance of the proposed approach, comparative analysis is done with conventional schemes using performance parameters such as packet delivery ratio, throughput, total packet forwarding, network overhead, end-to-end delay and percentage of malicious detection.

  4. Energy Aware Cluster-Based Routing in Flying Ad-Hoc Networks.

    PubMed

    Aadil, Farhan; Raza, Ali; Khan, Muhammad Fahad; Maqsood, Muazzam; Mehmood, Irfan; Rho, Seungmin

    2018-05-03

    Flying ad-hoc networks (FANETs) are a very vibrant research area nowadays. They have many military and civil applications. Limited battery energy and the high mobility of micro unmanned aerial vehicles (UAVs) represent their two main problems, i.e., short flight time and inefficient routing. In this paper, we try to address both of these problems by means of efficient clustering. First, we adjust the transmission power of the UAVs by anticipating their operational requirements. Optimal transmission range will have minimum packet loss ratio (PLR) and better link quality, which ultimately save the energy consumed during communication. Second, we use a variant of the K-Means Density clustering algorithm for selection of cluster heads. Optimal cluster heads enhance the cluster lifetime and reduce the routing overhead. The proposed model outperforms the state of the art artificial intelligence techniques such as Ant Colony Optimization-based clustering algorithm and Grey Wolf Optimization-based clustering algorithm. The performance of the proposed algorithm is evaluated in term of number of clusters, cluster building time, cluster lifetime and energy consumption.

  5. A high performance, ad-hoc, fuzzy query processing system for relational databases

    NASA Technical Reports Server (NTRS)

    Mansfield, William H., Jr.; Fleischman, Robert M.

    1992-01-01

    Database queries involving imprecise or fuzzy predicates are currently an evolving area of academic and industrial research. Such queries place severe stress on the indexing and I/O subsystems of conventional database environments since they involve the search of large numbers of records. The Datacycle architecture and research prototype is a database environment that uses filtering technology to perform an efficient, exhaustive search of an entire database. It has recently been modified to include fuzzy predicates in its query processing. The approach obviates the need for complex index structures, provides unlimited query throughput, permits the use of ad-hoc fuzzy membership functions, and provides a deterministic response time largely independent of query complexity and load. This paper describes the Datacycle prototype implementation of fuzzy queries and some recent performance results.

  6. Federal Government Printing and Publishing: Policy Issues. Report of the Ad Hoc Advisory Committee on Revision of Title 44.

    ERIC Educational Resources Information Center

    Joint Committee on Printing, Washington, DC.

    Designed to present a better understanding of the government's system of printing and distributing information and to highlight problems, alternatives, and important policy questions, this report synthesizes 13 weeks of the Ad Hoc Advisory Committee hearings on six topics: (1) Administration of policy--who should establish and administer policy in…

  7. Ad-Hoc Queries over Document Collections - A Case Study

    NASA Astrophysics Data System (ADS)

    Löser, Alexander; Lutter, Steffen; Düssel, Patrick; Markl, Volker

    We discuss the novel problem of supporting analytical business intelligence queries over web-based textual content, e.g., BI-style reports based on 100.000's of documents from an ad-hoc web search result. Neither conventional search engines nor conventional Business Intelligence and ETL tools address this problem, which lies at the intersection of their capabilities. "Google Squared" or our system GOOLAP.info, are examples of these kinds of systems. They execute information extraction methods over one or several document collections at query time and integrate extracted records into a common view or tabular structure. Frequent extraction and object resolution failures cause incomplete records which could not be joined into a record answering the query. Our focus is the identification of join-reordering heuristics maximizing the size of complete records answering a structured query. With respect to given costs for document extraction we propose two novel join-operations: The multi-way CJ-operator joins records from multiple relationships extracted from a single document. The two-way join-operator DJ ensures data density by removing incomplete records from results. In a preliminary case study we observe that our join-reordering heuristics positively impact result size, record density and lower execution costs.

  8. Ad Hoc modeling, expert problem solving, and R&T program evaluation

    NASA Technical Reports Server (NTRS)

    Silverman, B. G.; Liebowitz, J.; Moustakis, V. S.

    1983-01-01

    A simplified cost and time (SCAT) analysis program utilizing personal-computer technology is presented and demonstrated in the case of the NASA-Goddard end-to-end data system. The difficulties encountered in implementing complex program-selection and evaluation models in the research and technology field are outlined. The prototype SCAT system described here is designed to allow user-friendly ad hoc modeling in real time and at low cost. A worksheet constructed on the computer screen displays the critical parameters and shows how each is affected when one is altered experimentally. In the NASA case, satellite data-output and control requirements, ground-facility data-handling capabilities, and project priorities are intricately interrelated. Scenario studies of the effects of spacecraft phaseout or new spacecraft on throughput and delay parameters are shown. The use of a network of personal computers for higher-level coordination of decision-making processes is suggested, as a complement or alternative to complex large-scale modeling.

  9. Using the Weighted Keyword Model to Improve Information Retrieval for Answering Biomedical Questions

    PubMed Central

    Yu, Hong; Cao, Yong-gang

    2009-01-01

    Physicians ask many complex questions during the patient encounter. Information retrieval systems that can provide immediate and relevant answers to these questions can be invaluable aids to the practice of evidence-based medicine. In this study, we first automatically identify topic keywords from ad hoc clinical questions with a Condition Random Field model that is trained over thousands of manually annotated clinical questions. We then report on a linear model that assigns query weights based on their automatically identified semantic roles: topic keywords, domain specific terms, and their synonyms. Our evaluation shows that this weighted keyword model improves information retrieval from the Text Retrieval Conference Genomics track data. PMID:21347188

  10. Using the weighted keyword model to improve information retrieval for answering biomedical questions.

    PubMed

    Yu, Hong; Cao, Yong-Gang

    2009-03-01

    Physicians ask many complex questions during the patient encounter. Information retrieval systems that can provide immediate and relevant answers to these questions can be invaluable aids to the practice of evidence-based medicine. In this study, we first automatically identify topic keywords from ad hoc clinical questions with a Condition Random Field model that is trained over thousands of manually annotated clinical questions. We then report on a linear model that assigns query weights based on their automatically identified semantic roles: topic keywords, domain specific terms, and their synonyms. Our evaluation shows that this weighted keyword model improves information retrieval from the Text Retrieval Conference Genomics track data.

  11. Assessment of interbreeding and introgression of farm genes into a small Scottish Atlantic salmon Salmo salar stock: ad hoc samples - ad hoc results?

    PubMed

    Verspoor, E; Knox, D; Marshall, S

    2016-12-01

    An eclectic set of tissues and existing data, including purposely collected samples, spanning 1997-2006, was used in an ad hoc assessment of hybridization and introgression of farmed wild Atlantic salmon Salmo salar in the small Loch na Thull (LnT) catchment in north-west Scotland. The catchment is in an area of marine farm production and contains freshwater smolt rearing cages. The LnT S. salar stock was found to be genetically distinctive from stocks in neighbouring rivers and, despite regular reports of feral farm S. salar, there was no evidence of physical or genetic mixing. This cannot be completely ruled out, however, and low level mixing with other local wild stocks has been suggested. The LnT population appeared underpinned by relatively smaller effective number of breeders (N eb ) and showed relatively low levels of genetic diversity, consistent with a small effective population size. Small sample sizes, an incomplete farm baseline and the use of non-diagnostic molecular markers, constrain the power of the analysis but the findings strongly support the LnT catchment having a genetically distinct wild S. salar population little affected by interbreeding with feral farm escapes. © 2016 The Fisheries Society of the British Isles.

  12. An epidemic model for biological data fusion in ad hoc sensor networks

    NASA Astrophysics Data System (ADS)

    Chang, K. C.; Kotari, Vikas

    2009-05-01

    Bio terrorism can be a very refined and a catastrophic approach of attacking a nation. This requires the development of a complete architecture dedicatedly designed for this purpose which includes but is not limited to Sensing/Detection, Tracking and Fusion, Communication, and others. In this paper we focus on one such architecture and evaluate its performance. Various sensors for this specific purpose have been studied. The accent has been on use of Distributed systems such as ad-hoc networks and on application of epidemic data fusion algorithms to better manage the bio threat data. The emphasis has been on understanding the performance characteristics of these algorithms under diversified real time scenarios which are implemented through extensive JAVA based simulations. Through comparative studies on communication and fusion the performance of channel filter algorithm for the purpose of biological sensor data fusion are validated.

  13. Introduction to Blueweb: A Decentralized Scatternet Formation Algorithm for Bluetooth Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Yu, Chih-Min; Huang, Chia-Chi

    In this letter, a decentralized scatternet formation algorithm called Bluelayer is proposed. First, Bluelayer uses a designated root to construct a tree-shaped subnet and propagates an integer variable k1 called counter limit as well as a constant k in its downstream direction to determine new roots. Then each new root asks its upstream master to start a return connection procedure to convert the tree-shaped subnet into a web-shaped subnet for its immediate upstream root. At the same time, each new root repeats the same procedure as the root to build its own subnet until the whole scatternet is formed. Simulation results show that Bluelayer achieves good network scalability and generates an efficient scatternet configuration for various sizes of Bluetooth ad hoc network.

  14. Predicting impact of multi-paths on phase change in map-based vehicular ad hoc networks

    NASA Astrophysics Data System (ADS)

    Rahmes, Mark; Lemieux, George; Sonnenberg, Jerome; Chester, David B.

    2014-05-01

    Dynamic Spectrum Access, which through its ability to adapt the operating frequency of a radio, is widely believed to be a solution to the limited spectrum problem. Mobile Ad Hoc Networks (MANETs) can extend high capacity mobile communications over large areas where fixed and tethered-mobile systems are not available. In one use case with high potential impact cognitive radio employs spectrum sensing to facilitate identification of allocated frequencies not currently accessed by their primary users. Primary users own the rights to radiate at a specific frequency and geographic location, secondary users opportunistically attempt to radiate at a specific frequency when the primary user is not using it. We quantify optimal signal detection in map based cognitive radio networks with multiple rapidly varying phase changes and multiple orthogonal signals. Doppler shift occurs due to reflection, scattering, and rapid vehicle movement. Path propagation as well as vehicle movement produces either constructive or destructive interference with the incident wave. Our signal detection algorithms can assist the Doppler spread compensation algorithm by deciding how many phase changes in signals are present in a selected band of interest. Additionally we can populate a spatial radio environment map (REM) database with known information that can be leveraged in an ad hoc network to facilitate Dynamic Spectrum Access. We show how topography can help predict the impact of multi-paths on phase change, as well as about the prediction from dense traffic areas. Utilization of high resolution geospatial data layers in RF propagation analysis is directly applicable.

  15. Cooperative Education and the Academy. and Response to the Preliminary Report of the Ad Hoc Committee on Cooperative Education and the Curriculum.

    ERIC Educational Resources Information Center

    Heinemann, Harry N.; And Others

    1988-01-01

    Two articles describe the final report submitted by the Ad Hoc Committee on Cooperative Education and the Curriculum to the Cooperative Education Association and the reaction to that report by the person who established the committee. (JOW)

  16. History-based route selection for reactive ad hoc routing protocols

    NASA Astrophysics Data System (ADS)

    Medidi, Sirisha; Cappetto, Peter

    2007-04-01

    Ad hoc networks rely on cooperation in order to operate, but in a resource constrained environment not all nodes behave altruistically. Selfish nodes preserve their own resources and do not forward packets not in their own self interest. These nodes degrade the performance of the network, but judicious route selection can help maintain performance despite this behavior. Many route selection algorithms place importance on shortness of the route rather than its reliability. We introduce a light-weight route selection algorithm that uses past behavior to judge the quality of a route rather than solely on the length of the route. It draws information from the underlying routing layer at no extra cost and selects routes with a simple algorithm. This technique maintains this data in a small table, which does not place a high cost on memory. History-based route selection's minimalism suits the needs the portable wireless devices and is easy to implement. We implemented our algorithm and tested it in the ns2 environment. Our simulation results show that history-based route selection achieves higher packet delivery and improved stability than its length-based counterpart.

  17. Random Time Identity Based Firewall In Mobile Ad hoc Networks

    NASA Astrophysics Data System (ADS)

    Suman, Patel, R. B.; Singh, Parvinder

    2010-11-01

    A mobile ad hoc network (MANET) is a self-organizing network of mobile routers and associated hosts connected by wireless links. MANETs are highly flexible and adaptable but at the same time are highly prone to security risks due to the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized control. Firewall is an effective means of protecting a local network from network-based security threats and forms a key component in MANET security architecture. This paper presents a review of firewall implementation techniques in MANETs and their relative merits and demerits. A new approach is proposed to select MANET nodes at random for firewall implementation. This approach randomly select a new node as firewall after fixed time and based on critical value of certain parameters like power backup. This approach effectively balances power and resource utilization of entire MANET because responsibility of implementing firewall is equally shared among all the nodes. At the same time it ensures improved security for MANETs from outside attacks as intruder will not be able to find out the entry point in MANET due to the random selection of nodes for firewall implementation.

  18. Virtual machine-based simulation platform for mobile ad-hoc network-based cyber infrastructure

    DOE PAGES

    Yoginath, Srikanth B.; Perumalla, Kayla S.; Henz, Brian J.

    2015-09-29

    In modeling and simulating complex systems such as mobile ad-hoc networks (MANETs) in de-fense communications, it is a major challenge to reconcile multiple important considerations: the rapidity of unavoidable changes to the software (network layers and applications), the difficulty of modeling the critical, implementation-dependent behavioral effects, the need to sustain larger scale scenarios, and the desire for faster simulations. Here we present our approach in success-fully reconciling them using a virtual time-synchronized virtual machine(VM)-based parallel ex-ecution framework that accurately lifts both the devices as well as the network communications to a virtual time plane while retaining full fidelity. At themore » core of our framework is a scheduling engine that operates at the level of a hypervisor scheduler, offering a unique ability to execute multi-core guest nodes over multi-core host nodes in an accurate, virtual time-synchronized manner. In contrast to other related approaches that suffer from either speed or accuracy issues, our framework provides MANET node-wise scalability, high fidelity of software behaviors, and time-ordering accuracy. The design and development of this framework is presented, and an ac-tual implementation based on the widely used Xen hypervisor system is described. Benchmarks with synthetic and actual applications are used to identify the benefits of our approach. The time inaccuracy of traditional emulation methods is demonstrated, in comparison with the accurate execution of our framework verified by theoretically correct results expected from analytical models of the same scenarios. In the largest high fidelity tests, we are able to perform virtual time-synchronized simulation of 64-node VM-based full-stack, actual software behaviors of MANETs containing a mix of static and mobile (unmanned airborne vehicle) nodes, hosted on a 32-core host, with full fidelity of unmodified ad-hoc routing protocols, unmodified

  19. Virtual machine-based simulation platform for mobile ad-hoc network-based cyber infrastructure

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yoginath, Srikanth B.; Perumalla, Kayla S.; Henz, Brian J.

    In modeling and simulating complex systems such as mobile ad-hoc networks (MANETs) in de-fense communications, it is a major challenge to reconcile multiple important considerations: the rapidity of unavoidable changes to the software (network layers and applications), the difficulty of modeling the critical, implementation-dependent behavioral effects, the need to sustain larger scale scenarios, and the desire for faster simulations. Here we present our approach in success-fully reconciling them using a virtual time-synchronized virtual machine(VM)-based parallel ex-ecution framework that accurately lifts both the devices as well as the network communications to a virtual time plane while retaining full fidelity. At themore » core of our framework is a scheduling engine that operates at the level of a hypervisor scheduler, offering a unique ability to execute multi-core guest nodes over multi-core host nodes in an accurate, virtual time-synchronized manner. In contrast to other related approaches that suffer from either speed or accuracy issues, our framework provides MANET node-wise scalability, high fidelity of software behaviors, and time-ordering accuracy. The design and development of this framework is presented, and an ac-tual implementation based on the widely used Xen hypervisor system is described. Benchmarks with synthetic and actual applications are used to identify the benefits of our approach. The time inaccuracy of traditional emulation methods is demonstrated, in comparison with the accurate execution of our framework verified by theoretically correct results expected from analytical models of the same scenarios. In the largest high fidelity tests, we are able to perform virtual time-synchronized simulation of 64-node VM-based full-stack, actual software behaviors of MANETs containing a mix of static and mobile (unmanned airborne vehicle) nodes, hosted on a 32-core host, with full fidelity of unmodified ad-hoc routing protocols, unmodified

  20. Modern foreign language teachers - don't leave those kids alone! Linguistic-cultural "give and take" in an ad-hoc tutoring scheme

    NASA Astrophysics Data System (ADS)

    Leroy, Norah

    2017-08-01

    This paper addresses the theme of social inclusion through language learning. The focus is on an ad-hoc tutoring scheme set up between newly arrived British migrant pupils and French monolingual pupils in a small secondary school in the south-west of France. Though the original objective of this tutoring scheme was to improve the English skills of the younger pupils, feedback reports indicated that it also had a positive impact on the relationship between the British migrant pupils and their French peers. Teachers believed that those involved participated more fully in class, and appeared more self-assured and generally happy thanks to the interpersonal relationships this scheme helped to forge. This study demonstrates the necessity of analysing the socio-cultural context migrants may find themselves in, in order to identify potential challenges. The ad-hoc tutoring scheme described here is an example of how language learning can support the integration and inclusion of "new generation" migrants into everyday school life.

  1. A Feasible Approach for an Early Manned Lunar Landing. Part II: Detailed Report of Ad Hoc Task Group

    NASA Technical Reports Server (NTRS)

    Fleming, William A.

    1961-01-01

    This report, in two parts, presents a program development plan for attempting a first manned lunar landing in 1967. The two parts consist of a Summary Report and a Detailed Report representing the coordinated output of the Ad Hoc Task Group assigned to the study. The study was started in response to the request for such a study by the Associate Administrator in his memorandum of May 2, 1961 establishing the Ad Hoc Task Group. The purpose of the study was to take a first cut at the tasks associated with the design, development and construction of the equipment and facilities as well as the development of the crews, and to show the time phasing 6f these tasks. Included are the space sciences, life science and advanced technology tasks whose data and results are needed for designing and developing the systems required in carrying out the mission. The plan presented in the two reports does not presume to be a firm plan. Its basic purpose is, by choosing one feasible method, to size up the scope, schedule and cost of the job, discover the main problems, pacing items and major decisions and provide a threshold from which a firm and detailed project development plan can be jointly formulated by the various elements of NASA.

  2. On mobile wireless ad hoc IP video transports

    NASA Astrophysics Data System (ADS)

    Kazantzidis, Matheos

    2006-05-01

    Multimedia transports in wireless, ad-hoc, multi-hop or mobile networks must be capable of obtaining information about the network and adaptively tune sending and encoding parameters to the network response. Obtaining meaningful metrics to guide a stable congestion control mechanism in the transport (i.e. passive, simple, end-to-end and network technology independent) is a complex problem. Equally difficult is obtaining a reliable QoS metrics that agrees with user perception in a client/server or distributed environment. Existing metrics, objective or subjective, are commonly used after or before to test or report on a transmission and require access to both original and transmitted frames. In this paper, we propose that an efficient and successful video delivery and the optimization of overall network QoS requires innovation in a) a direct measurement of available and bottleneck capacity for its congestion control and b) a meaningful subjective QoS metric that is dynamically reported to video sender. Once these are in place, a binomial -stable, fair and TCP friendly- algorithm can be used to determine the sending rate and other packet video parameters. An adaptive mpeg codec can then continually test and fit its parameters and temporal-spatial data-error control balance using the perceived QoS dynamic feedback. We suggest a new measurement based on a packet dispersion technique that is independent of underlying network mechanisms. We then present a binomial control based on direct measurements. We implement a QoS metric that is known to agree with user perception (MPQM) in a client/server, distributed environment by using predetermined table lookups and characterization of video content.

  3. Hierarchical auto-configuration addressing in mobile ad hoc networks (HAAM)

    NASA Astrophysics Data System (ADS)

    Ram Srikumar, P.; Sumathy, S.

    2017-11-01

    Addressing plays a vital role in networking to identify devices uniquely. A device must be assigned with a unique address in order to participate in the data communication in any network. Different protocols defining different types of addressing are proposed in literature. Address auto-configuration is a key requirement for self organizing networks. Existing auto-configuration based addressing protocols require broadcasting probes to all the nodes in the network before assigning a proper address to a new node. This needs further broadcasts to reflect the status of the acquired address in the network. Such methods incur high communication overheads due to repetitive flooding. To address this overhead, a new partially stateful address allocation scheme, namely Hierarchical Auto-configuration Addressing (HAAM) scheme is extended and proposed. Hierarchical addressing basically reduces latency and overhead caused during address configuration. Partially stateful addressing algorithm assigns addresses without the need for flooding and global state awareness, which in turn reduces the communication overhead and space complexity respectively. Nodes are assigned addresses hierarchically to maintain the graph of the network as a spanning tree which helps in effectively avoiding the broadcast storm problem. Proposed algorithm for HAAM handles network splits and merges efficiently in large scale mobile ad hoc networks incurring low communication overheads.

  4. Performance Improvement in Geographic Routing for Vehicular Ad Hoc Networks

    PubMed Central

    Kaiwartya, Omprakash; Kumar, Sushil; Lobiyal, D. K.; Abdullah, Abdul Hanan; Hassan, Ahmed Nazar

    2014-01-01

    Geographic routing is one of the most investigated themes by researchers for reliable and efficient dissemination of information in Vehicular Ad Hoc Networks (VANETs). Recently, different Geographic Distance Routing (GEDIR) protocols have been suggested in the literature. These protocols focus on reducing the forwarding region towards destination to select the Next Hop Vehicles (NHV). Most of these protocols suffer from the problem of elevated one-hop link disconnection, high end-to-end delay and low throughput even at normal vehicle speed in high vehicle density environment. This paper proposes a Geographic Distance Routing protocol based on Segment vehicle, Link quality and Degree of connectivity (SLD-GEDIR). The protocol selects a reliable NHV using the criteria segment vehicles, one-hop link quality and degree of connectivity. The proposed protocol has been simulated in NS-2 and its performance has been compared with the state-of-the-art protocols: P-GEDIR, J-GEDIR and V-GEDIR. The empirical results clearly reveal that SLD-GEDIR has lower link disconnection and end-to-end delay, and higher throughput as compared to the state-of-the-art protocols. It should be noted that the performance of the proposed protocol is preserved irrespective of vehicle density and speed. PMID:25429415

  5. Performance improvement in geographic routing for Vehicular Ad Hoc Networks.

    PubMed

    Kaiwartya, Omprakash; Kumar, Sushil; Lobiyal, D K; Abdullah, Abdul Hanan; Hassan, Ahmed Nazar

    2014-11-25

    Geographic routing is one of the most investigated themes by researchers for reliable and efficient dissemination of information in Vehicular Ad Hoc Networks (VANETs). Recently, different Geographic Distance Routing (GEDIR) protocols have been suggested in the literature. These protocols focus on reducing the forwarding region towards destination to select the Next Hop Vehicles (NHV). Most of these protocols suffer from the problem of elevated one-hop link disconnection, high end-to-end delay and low throughput even at normal vehicle speed in high vehicle density environment. This paper proposes a Geographic Distance Routing protocol based on Segment vehicle, Link quality and Degree of connectivity (SLD-GEDIR). The protocol selects a reliable NHV using the criteria segment vehicles, one-hop link quality and degree of connectivity. The proposed protocol has been simulated in NS-2 and its performance has been compared with the state-of-the-art protocols: P-GEDIR, J-GEDIR and V-GEDIR. The empirical results clearly reveal that SLD-GEDIR has lower link disconnection and end-to-end delay, and higher throughput as compared to the state-of-the-art protocols. It should be noted that the performance of the proposed protocol is preserved irrespective of vehicle density and speed.

  6. Preserving Nevada's Environmental Heritage: A Report of the Ad Hoc Committee on Environmental Quality. Final Report to the Governor's Natural Resources Council.

    ERIC Educational Resources Information Center

    Nevada State Dept. of Conservation and Natural Resources, Carson City.

    The Environmental Quality Ad Hoc Committee has prepared this report for the Governor's Natural Resources Council (Nevada). It is a compilation of available factual data focusing attention on needed statutory and administrative changes to preserve Nevada's environmental heritage and from which recommendations for future budgetary and legislative…

  7. A novel unbalanced multiple description coder for robust video transmission over ad hoc wireless networks

    NASA Astrophysics Data System (ADS)

    Huang, Feng; Sun, Lifeng; Zhong, Yuzhuo

    2006-01-01

    Robust transmission of live video over ad hoc wireless networks presents new challenges: high bandwidth requirements are coupled with delay constraints; even a single packet loss causes error propagation until a complete video frame is coded in the intra-mode; ad hoc wireless networks suffer from bursty packet losses that drastically degrade the viewing experience. Accordingly, we propose a novel UMD coder capable of quickly recovering from losses and ensuring continuous playout. It uses 'peg' frames to prevent error propagation in the High-Resolution (HR) description and improve the robustness of key frames. The Low-Resolution (LR) coder works independent of the HR one, but they can also help each other recover from losses. Like many UMD coders, our UMD coder is drift-free, disruption-tolerant and able to make good use of the asymmetric available bandwidths of multiple paths. The simulation results under different conditions show that the proposed UMD coder has the highest decoded quality and lowest probability of pause when compared with concurrent UMDC techniques. The coder also has a comparable decoded quality, lower startup delay and lower probability of pause than a state-of-the-art FEC-based scheme. To provide robustness for video multicast applications, we propose non-end-to-end UMDC-based video distribution over a multi-tree multicast network. The multiplicity of parents decorrelates losses and the non-end-to-end feature increases the throughput of UMDC video data. We deploy an application-level service of LR description reconstruction in some intermediate nodes of the LR multicast tree. The principle behind this is to reconstruct the disrupted LR frames by the correctly received HR frames. As a result, the viewing experience at the downstream nodes benefits from the protection reconstruction at the upstream nodes.

  8. Modern Foreign Language Teachers--Don't Leave Those Kids Alone! Linguistic-Cultural "Give and Take" in an Ad-Hoc Tutoring Scheme

    ERIC Educational Resources Information Center

    Leroy, Norah

    2017-01-01

    This paper addresses the theme of social inclusion through language learning. The focus is on an ad-hoc tutoring scheme set up between newly arrived British migrant pupils and French monolingual pupils in a small secondary school in the south-west of France. Though the original objective of this tutoring scheme was to improve the English skills of…

  9. Impact of Beamforming on the Path Connectivity in Cognitive Radio Ad Hoc Networks

    PubMed Central

    Dung, Le The; Hieu, Tran Dinh; Choi, Seong-Gon; Kim, Byung-Seo; An, Beongku

    2017-01-01

    This paper investigates the impact of using directional antennas and beamforming schemes on the connectivity of cognitive radio ad hoc networks (CRAHNs). Specifically, considering that secondary users use two kinds of directional antennas, i.e., uniform linear array (ULA) and uniform circular array (UCA) antennas, and two different beamforming schemes, i.e., randomized beamforming and center-directed to communicate with each other, we study the connectivity of all combination pairs of directional antennas and beamforming schemes and compare their performances to those of omnidirectional antennas. The results obtained in this paper show that, compared with omnidirectional transmission, beamforming transmission only benefits the connectivity when the density of secondary user is moderate. Moreover, the combination of UCA and randomized beamforming scheme gives the highest path connectivity in all evaluating scenarios. Finally, the number of antenna elements and degree of path loss greatly affect path connectivity in CRAHNs. PMID:28346377

  10. Use of synthesized data to support complex ad-hoc queries in an enterprise information warehouse: a diabetes use case.

    PubMed

    Rogers, Patrick; Erdal, Selnur; Santangelo, Jennifer; Liu, Jianhua; Schuster, Dara; Kamal, Jyoti

    2008-11-06

    The Ohio State University Medical Center (OSUMC) Information Warehouse (IW) is a comprehensive data warehousing facility incorporating operational, clinical, and biological data sets from multiple enterprise system. It is common for users of the IW to request complex ad-hoc queries that often require significant intervention by data analyst. In response to this challenge, we have designed a workflow that leverages synthesized data elements to support such queries in an more timely, efficient manner.

  11. Securing mobile ad hoc networks using danger theory-based artificial immune algorithm.

    PubMed

    Abdelhaq, Maha; Alsaqour, Raed; Abdelhaq, Shawkat

    2015-01-01

    A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs.

  12. Securing Mobile Ad Hoc Networks Using Danger Theory-Based Artificial Immune Algorithm

    PubMed Central

    2015-01-01

    A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs. PMID:25946001

  13. Distributive routing and congestion control in wireless multihop ad hoc communication networks

    NASA Astrophysics Data System (ADS)

    Glauche, Ingmar; Krause, Wolfram; Sollacher, Rudolf; Greiner, Martin

    2004-10-01

    Due to their inherent complexity, engineered wireless multihop ad hoc communication networks represent a technological challenge. Having no mastering infrastructure the nodes have to selforganize themselves in such a way that for example network connectivity, good data traffic performance and robustness are guaranteed. In this contribution the focus is on routing and congestion control. First, random data traffic along shortest path routes is studied by simulations as well as theoretical modeling. Measures of congestion like end-to-end time delay and relaxation times are given. A scaling law of the average time delay with respect to network size is revealed and found to depend on the underlying network topology. In the second step, a distributive routing and congestion control is proposed. Each node locally propagates its routing cost estimates and information about its congestion state to its neighbors, which then update their respective cost estimates. This allows for a flexible adaptation of end-to-end routes to the overall congestion state of the network. Compared to shortest-path routing, the critical network load is significantly increased.

  14. Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey

    PubMed Central

    Islam, A. K. M. Muzahidul; Baharun, Sabariah; Mansoor, Nafees

    2017-01-01

    New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR) and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC) protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN). First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective. PMID:28926952

  15. 3VSR: Three Valued Secure Routing for Vehicular Ad Hoc Networks using Sensing Logic in Adversarial Environment

    PubMed Central

    Wang, Liangmin

    2018-01-01

    Today IoT integrate thousands of inter networks and sensing devices e.g., vehicular networks, which are considered to be challenging due to its high speed and network dynamics. The goal of future vehicular networks is to improve road safety, promote commercial or infotainment products and to reduce the traffic accidents. All these applications are based on the information exchange among nodes, so not only reliable data delivery but also the authenticity and credibility of the data itself are prerequisite. To cope with the aforementioned problem, trust management come up as promising candidate to conduct node’s transaction and interaction management, which requires distributed mobile nodes cooperation for achieving design goals. In this paper, we propose a trust-based routing protocol i.e., 3VSR (Three Valued Secure Routing), which extends the widely used AODV (Ad hoc On-demand Distance Vector) routing protocol and employs the idea of Sensing Logic-based trust model to enhance the security solution of VANET (Vehicular Ad-Hoc Network). The existing routing protocol are mostly based on key or signature-based schemes, which off course increases computation overhead. In our proposed 3VSR, trust among entities is updated frequently by means of opinion derived from sensing logic due to vehicles random topologies. In 3VSR the theoretical capabilities are based on Dirichlet distribution by considering prior and posterior uncertainty of the said event. Also by using trust recommendation message exchange, nodes are able to reduce computation and routing overhead. The simulated results shows that the proposed scheme is secure and practical. PMID:29538314

  16. 3VSR: Three Valued Secure Routing for Vehicular Ad Hoc Networks using Sensing Logic in Adversarial Environment.

    PubMed

    Sohail, Muhammad; Wang, Liangmin

    2018-03-14

    Today IoT integrate thousands of inter networks and sensing devices e.g., vehicular networks, which are considered to be challenging due to its high speed and network dynamics. The goal of future vehicular networks is to improve road safety, promote commercial or infotainment products and to reduce the traffic accidents. All these applications are based on the information exchange among nodes, so not only reliable data delivery but also the authenticity and credibility of the data itself are prerequisite. To cope with the aforementioned problem, trust management come up as promising candidate to conduct node's transaction and interaction management, which requires distributed mobile nodes cooperation for achieving design goals. In this paper, we propose a trust-based routing protocol i.e., 3VSR (Three Valued Secure Routing), which extends the widely used AODV (Ad hoc On-demand Distance Vector) routing protocol and employs the idea of Sensing Logic-based trust model to enhance the security solution of VANET (Vehicular Ad-Hoc Network). The existing routing protocol are mostly based on key or signature-based schemes, which off course increases computation overhead. In our proposed 3VSR, trust among entities is updated frequently by means of opinion derived from sensing logic due to vehicles random topologies. In 3VSR the theoretical capabilities are based on Dirichlet distribution by considering prior and posterior uncertainty of the said event. Also by using trust recommendation message exchange, nodes are able to reduce computation and routing overhead. The simulated results shows that the proposed scheme is secure and practical.

  17. Hop Optimization and Relay Node Selection in Multi-hop Wireless Ad-Hoc Networks

    NASA Astrophysics Data System (ADS)

    Li, Xiaohua(Edward)

    In this paper we propose an efficient approach to determine the optimal hops for multi-hop ad hoc wireless networks. Based on the assumption that nodes use successive interference cancellation (SIC) and maximal ratio combining (MRC) to deal with mutual interference and to utilize all the received signal energy, we show that the signal-to-interference-plus-noise ratio (SINR) of a node is determined only by the nodes before it, not the nodes after it, along a packet forwarding path. Based on this observation, we propose an iterative procedure to select the relay nodes and to calculate the path SINR as well as capacity of an arbitrary multi-hop packet forwarding path. The complexity of the algorithm is extremely low, and scaling well with network size. The algorithm is applicable in arbitrarily large networks. Its performance is demonstrated as desirable by simulations. The algorithm can be helpful in analyzing the performance of multi-hop wireless networks.

  18. Real-Time Support on IEEE 802.11 Wireless Ad-Hoc Networks: Reality vs. Theory

    NASA Astrophysics Data System (ADS)

    Kang, Mikyung; Kang, Dong-In; Suh, Jinwoo

    The usable throughput of an IEEE 802.11 system for an application is much less than the raw bandwidth. Although 802.11b has a theoretical maximum of 11Mbps, more than half of the bandwidth is consumed by overhead leaving at most 5Mbps of usable bandwidth. Considering this characteristic, this paper proposes and analyzes a real-time distributed scheduling scheme based on the existing IEEE 802.11 wireless ad-hoc networks, using USC/ISI's Power Aware Sensing Tracking and Analysis (PASTA) hardware platform. We compared the distributed real-time scheduling scheme with the real-time polling scheme to meet deadline, and compared a measured real bandwidth with a theoretical result. The theoretical and experimental results show that the distributed scheduling scheme can guarantee real-time traffic and enhances the performance up to 74% compared with polling scheme.

  19. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks

    PubMed Central

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-01-01

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes. PMID:26184224

  20. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.

    PubMed

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-07-14

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.

  1. An evidence-based unified definition of lifelong and acquired premature ejaculation: report of the second international society for sexual medicine ad hoc committee for the definition of premature ejaculation.

    PubMed

    Serefoglu, Ege Can; McMahon, Chris G; Waldinger, Marcel D; Althof, Stanley E; Shindel, Alan; Adaikan, Ganesh; Becher, Edgardo F; Dean, John; Giuliano, Francois; Hellstrom, Wayne Jg; Giraldi, Annamaria; Glina, Sidney; Incrocci, Luca; Jannini, Emmanuele; McCabe, Marita; Parish, Sharon; Rowland, David; Segraves, R Taylor; Sharlip, Ira; Torres, Luiz Otavio

    2014-06-01

    The International Society for Sexual Medicine (ISSM) Ad Hoc Committee for the Definition of Premature Ejaculation developed the first evidence-based definition for lifelong premature ejaculation (PE) in 2007 and concluded that there were insufficient published objective data at that time to develop a definition for acquired PE. The aim of this article is to review and critique the current literature and develop a contemporary, evidence-based definition for acquired PE and/or a unified definition for both lifelong and acquired PE. In April 2013, the ISSM convened a second Ad Hoc Committee for the Definition of Premature Ejaculation in Bangalore, India. The same evidence-based systematic approach to literature search, retrieval, and evaluation used by the original committee was adopted. The committee unanimously agreed that men with lifelong and acquired PE appear to share the dimensions of short ejaculatory latency, reduced or absent perceived ejaculatory control, and the presence of negative personal consequences. Men with acquired PE are older, have higher incidences of erectile dysfunction, comorbid disease, and cardiovascular risk factors, and have a longer intravaginal ejaculation latency time (IELT) as compared with men with lifelong PE. A self-estimated or stopwatch IELT of 3 minutes was identified as a valid IELT cut-off for diagnosing acquired PE. On this basis, the committee agreed on a unified definition of both acquired and lifelong PE as a male sexual dysfunction characterized by (i) ejaculation that always or nearly always occurs prior to or within about 1 minute of vaginal penetration from the first sexual experience (lifelong PE) or a clinically significant and bothersome reduction in latency time, often to about 3 minutes or less (acquired PE); (ii) the inability to delay ejaculation on all or nearly all vaginal penetrations; and (iii) negative personal consequences, such as distress, bother, frustration, and/or the avoidance of sexual intimacy. The

  2. An Evidence-Based Unified Definition of Lifelong and Acquired Premature Ejaculation: Report of the Second International Society for Sexual Medicine Ad Hoc Committee for the Definition of Premature Ejaculation

    PubMed Central

    Serefoglu, Ege Can; McMahon, Chris G; Waldinger, Marcel D; Althof, Stanley E; Shindel, Alan; Adaikan, Ganesh; Becher, Edgardo F; Dean, John; Giuliano, Francois; Hellstrom, Wayne JG; Giraldi, Annamaria; Glina, Sidney; Incrocci, Luca; Jannini, Emmanuele; McCabe, Marita; Parish, Sharon; Rowland, David; Segraves, R Taylor; Sharlip, Ira; Torres, Luiz Otavio

    2014-01-01

    Introduction The International Society for Sexual Medicine (ISSM) Ad Hoc Committee for the Definition of Premature Ejaculation developed the first evidence-based definition for lifelong premature ejaculation (PE) in 2007 and concluded that there were insufficient published objective data at that time to develop a definition for acquired PE. Aim The aim of this article is to review and critique the current literature and develop a contemporary, evidence-based definition for acquired PE and/or a unified definition for both lifelong and acquired PE. Methods In April 2013, the ISSM convened a second Ad Hoc Committee for the Definition of Premature Ejaculation in Bangalore, India. The same evidence-based systematic approach to literature search, retrieval, and evaluation used by the original committee was adopted. Results The committee unanimously agreed that men with lifelong and acquired PE appear to share the dimensions of short ejaculatory latency, reduced or absent perceived ejaculatory control, and the presence of negative personal consequences. Men with acquired PE are older, have higher incidences of erectile dysfunction, comorbid disease, and cardiovascular risk factors, and have a longer intravaginal ejaculation latency time (IELT) as compared with men with lifelong PE. A self-estimated or stopwatch IELT of 3 minutes was identified as a valid IELT cut-off for diagnosing acquired PE. On this basis, the committee agreed on a unified definition of both acquired and lifelong PE as a male sexual dysfunction characterized by (i) ejaculation that always or nearly always occurs prior to or within about 1 minute of vaginal penetration from the first sexual experience (lifelong PE) or a clinically significant and bothersome reduction in latency time, often to about 3 minutes or less (acquired PE); (ii) the inability to delay ejaculation on all or nearly all vaginal penetrations; and (iii) negative personal consequences, such as distress, bother, frustration, and/or the

  3. Pseudo-random dynamic address configuration (PRDAC) algorithm for mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Wu, Shaochuan; Tan, Xuezhi

    2007-11-01

    By analyzing all kinds of address configuration algorithms, this paper provides a new pseudo-random dynamic address configuration (PRDAC) algorithm for mobile ad hoc networks. Based on PRDAC, the first node that initials this network randomly chooses a nonlinear shift register that can generates an m-sequence. When another node joins this network, the initial node will act as an IP address configuration sever to compute an IP address according to this nonlinear shift register, and then allocates this address and tell the generator polynomial of this shift register to this new node. By this means, when other node joins this network, any node that has obtained an IP address can act as a server to allocate address to this new node. PRDAC can also efficiently avoid IP conflicts and deal with network partition and merge as same as prophet address (PA) allocation and dynamic configuration and distribution protocol (DCDP). Furthermore, PRDAC has less algorithm complexity, less computational complexity and more sufficient assumption than PA. In addition, PRDAC radically avoids address conflicts and maximizes the utilization rate of IP addresses. Analysis and simulation results show that PRDAC has rapid convergence, low overhead and immune from topological structures.

  4. On using multiple routing metrics with destination sequenced distance vector protocol for MultiHop wireless ad hoc networks

    NASA Astrophysics Data System (ADS)

    Mehic, M.; Fazio, P.; Voznak, M.; Partila, P.; Komosny, D.; Tovarek, J.; Chmelikova, Z.

    2016-05-01

    A mobile ad hoc network is a collection of mobile nodes which communicate without a fixed backbone or centralized infrastructure. Due to the frequent mobility of nodes, routes connecting two distant nodes may change. Therefore, it is not possible to establish a priori fixed paths for message delivery through the network. Because of its importance, routing is the most studied problem in mobile ad hoc networks. In addition, if the Quality of Service (QoS) is demanded, one must guarantee the QoS not only over a single hop but over an entire wireless multi-hop path which may not be a trivial task. In turns, this requires the propagation of QoS information within the network. The key to the support of QoS reporting is QoS routing, which provides path QoS information at each source. To support QoS for real-time traffic one needs to know not only minimum delay on the path to the destination but also the bandwidth available on it. Therefore, throughput, end-to-end delay, and routing overhead are traditional performance metrics used to evaluate the performance of routing protocol. To obtain additional information about the link, most of quality-link metrics are based on calculation of the lost probabilities of links by broadcasting probe packets. In this paper, we address the problem of including multiple routing metrics in existing routing packets that are broadcasted through the network. We evaluate the efficiency of such approach with modified version of DSDV routing protocols in ns-3 simulator.

  5. Optimal route discovery for soft QOS provisioning in mobile ad hoc multimedia networks

    NASA Astrophysics Data System (ADS)

    Huang, Lei; Pan, Feng

    2007-09-01

    In this paper, we propose an optimal routing discovery algorithm for ad hoc multimedia networks whose resource keeps changing, First, we use stochastic models to measure the network resource availability, based on the information about the location and moving pattern of the nodes, as well as the link conditions between neighboring nodes. Then, for a certain multimedia packet flow to be transmitted from a source to a destination, we formulate the optimal soft-QoS provisioning problem as to find the best route that maximize the probability of satisfying its desired QoS requirements in terms of the maximum delay constraints. Based on the stochastic network resource model, we developed three approaches to solve the formulated problem: A centralized approach serving as the theoretical reference, a distributed approach that is more suitable to practical real-time deployment, and a distributed dynamic approach that utilizes the updated time information to optimize the routing for each individual packet. Examples of numerical results demonstrated that using the route discovered by our distributed algorithm in a changing network environment, multimedia applications could achieve better QoS statistically.

  6. Energy-efficient algorithm for broadcasting in ad hoc wireless sensor networks.

    PubMed

    Xiong, Naixue; Huang, Xingbo; Cheng, Hongju; Wan, Zheng

    2013-04-12

    Broadcasting is a common and basic operation used to support various network protocols in wireless networks. To achieve energy-efficient broadcasting is especially important for ad hoc wireless sensor networks because sensors are generally powered by batteries with limited lifetimes. Energy consumption for broadcast operations can be reduced by minimizing the number of relay nodes based on the observation that data transmission processes consume more energy than data reception processes in the sensor nodes, and how to improve the network lifetime is always an interesting issue in sensor network research. The minimum-energy broadcast problem is then equivalent to the problem of finding the minimum Connected Dominating Set (CDS) for a connected graph that is proved NP-complete. In this paper, we introduce an Efficient Minimum CDS algorithm (EMCDS) with help of a proposed ordered sequence list. EMCDS does not concern itself with node energy and broadcast operations might fail if relay nodes are out of energy. Next we have proposed a Minimum Energy-consumption Broadcast Scheme (MEBS) with a modified version of EMCDS, and aimed at providing an efficient scheduling scheme with maximized network lifetime. The simulation results show that the proposed EMCDS algorithm can find smaller CDS compared with related works, and the MEBS can help to increase the network lifetime by efficiently balancing energy among nodes in the networks.

  7. A DNA-Inspired Encryption Methodology for Secure, Mobile Ad Hoc Networks

    NASA Technical Reports Server (NTRS)

    Shaw, Harry

    2012-01-01

    Users are pushing for greater physical mobility with their network and Internet access. Mobile ad hoc networks (MANET) can provide an efficient mobile network architecture, but security is a key concern. A figure summarizes differences in the state of network security for MANET and fixed networks. MANETs require the ability to distinguish trusted peers, and tolerate the ingress/egress of nodes on an unscheduled basis. Because the networks by their very nature are mobile and self-organizing, use of a Public Key Infra structure (PKI), X.509 certificates, RSA, and nonce ex changes becomes problematic if the ideal of MANET is to be achieved. Molecular biology models such as DNA evolution can provide a basis for a proprietary security architecture that achieves high degrees of diffusion and confusion, and resistance to cryptanalysis. A proprietary encryption mechanism was developed that uses the principles of DNA replication and steganography (hidden word cryptography) for confidentiality and authentication. The foundation of the approach includes organization of coded words and messages using base pairs organized into genes, an expandable genome consisting of DNA-based chromosome keys, and a DNA-based message encoding, replication, and evolution and fitness. In evolutionary computing, a fitness algorithm determines whether candidate solutions, in this case encrypted messages, are sufficiently encrypted to be transmitted. The technology provides a mechanism for confidential electronic traffic over a MANET without a PKI for authenticating users.

  8. Ad hoc versus standardized admixtures for continuous infusion drugs in neonatal intensive care: cognitive task analysis of safety at the bedside.

    PubMed

    Brannon, Timothy S

    2006-01-01

    Continuous infusion intravenous (IV) drugs in neonatal intensive care are usually prepared based on patient weight so that the dose is readable as a simple multiple of the infusion pump rate. New safety guidelines propose that hospitals switch to using standardized admixtures of these drugs to prevent calculation errors during ad hoc preparation. Extended hierarchical task analysis suggests that switching to standardized admixtures may lead to more errors in programming the pump at the bedside.

  9. Verifying Safety Messages Using Relative-Time and Zone Priority in Vehicular Ad Hoc Networks.

    PubMed

    Banani, Sam; Gordon, Steven; Thiemjarus, Surapa; Kittipiyakul, Somsak

    2018-04-13

    In high-density road networks, with each vehicle broadcasting multiple messages per second, the arrival rate of safety messages can easily exceed the rate at which digital signatures can be verified. Since not all messages can be verified, algorithms for selecting which messages to verify are required to ensure that each vehicle receives appropriate awareness about neighbouring vehicles. This paper presents a novel scheme to select important safety messages for verification in vehicular ad hoc networks (VANETs). The proposed scheme uses location and direction of the sender, as well as proximity and relative-time between vehicles, to reduce the number of irrelevant messages verified (i.e., messages from vehicles that are unlikely to cause an accident). Compared with other existing schemes, the analysis results show that the proposed scheme can verify messages from nearby vehicles with lower inter-message delay and reduced packet loss and thus provides high level of awareness of the nearby vehicles.

  10. An Energy-Efficient and Robust Multipath Routing Protocol for Cognitive Radio Ad Hoc Networks.

    PubMed

    Singh, Kishor; Moh, Sangman

    2017-09-04

    Routing in cognitive radio ad hoc networks (CRAHNs) is a daunting task owing to dynamic topology, intermittent connectivity, spectrum heterogeneity, and energy constraints. Other prominent aspects such as channel stability, path reliability, and route discovery frequency should also be exploited. Several routing protocols have been proposed for CRAHNs in the literature. By stressing on one of the aspects more than any other, however, they do not satisfy all requirements of throughput, energy efficiency, and robustness. In this paper, we propose an energy-efficient and robust multipath routing (ERMR) protocol for CRAHNs by considering all prominent aspects including residual energy and channel stability in design. Even when the current routing path fails, the alternative routing path is immediately utilized. In establishing primary and alternative routing paths, both residual energy and channel stability are exploited simultaneously. Our simulation study shows that the proposed ERMR outperforms the conventional protocol in terms of network throughput, packet delivery ratio, energy consumption, and end-to-end delay.

  11. Verifying Safety Messages Using Relative-Time and Zone Priority in Vehicular Ad Hoc Networks

    PubMed Central

    Banani, Sam; Thiemjarus, Surapa; Kittipiyakul, Somsak

    2018-01-01

    In high-density road networks, with each vehicle broadcasting multiple messages per second, the arrival rate of safety messages can easily exceed the rate at which digital signatures can be verified. Since not all messages can be verified, algorithms for selecting which messages to verify are required to ensure that each vehicle receives appropriate awareness about neighbouring vehicles. This paper presents a novel scheme to select important safety messages for verification in vehicular ad hoc networks (VANETs). The proposed scheme uses location and direction of the sender, as well as proximity and relative-time between vehicles, to reduce the number of irrelevant messages verified (i.e., messages from vehicles that are unlikely to cause an accident). Compared with other existing schemes, the analysis results show that the proposed scheme can verify messages from nearby vehicles with lower inter-message delay and reduced packet loss and thus provides high level of awareness of the nearby vehicles. PMID:29652840

  12. An Energy-Efficient and Robust Multipath Routing Protocol for Cognitive Radio Ad Hoc Networks

    PubMed Central

    Singh, Kishor

    2017-01-01

    Routing in cognitive radio ad hoc networks (CRAHNs) is a daunting task owing to dynamic topology, intermittent connectivity, spectrum heterogeneity, and energy constraints. Other prominent aspects such as channel stability, path reliability, and route discovery frequency should also be exploited. Several routing protocols have been proposed for CRAHNs in the literature. By stressing on one of the aspects more than any other, however, they do not satisfy all requirements of throughput, energy efficiency, and robustness. In this paper, we propose an energy-efficient and robust multipath routing (ERMR) protocol for CRAHNs by considering all prominent aspects including residual energy and channel stability in design. Even when the current routing path fails, the alternative routing path is immediately utilized. In establishing primary and alternative routing paths, both residual energy and channel stability are exploited simultaneously. Our simulation study shows that the proposed ERMR outperforms the conventional protocol in terms of network throughput, packet delivery ratio, energy consumption, and end-to-end delay. PMID:28869551

  13. Ad Hoc versus Standardized Admixtures for Continuous Infusion Drugs in Neonatal Intensive Care: Cognitive Task Analysis of Safety at the Bedside

    PubMed Central

    Brannon, Timothy S.

    2006-01-01

    Continuous infusion intravenous (IV) drugs in neonatal intensive care are usually prepared based on patient weight so that the dose is readable as a simple multiple of the infusion pump rate. New safety guidelines propose that hospitals switch to using standardized admixtures of these drugs to prevent calculation errors during ad hoc preparation. Extended hierarchical task analysis suggests that switching to standardized admixtures may lead to more errors in programming the pump at the bedside. PMID:17238482

  14. Ad Hoc Networking for Unmanned Ground Vehicles: Design and Evaluation at Command, Control, Communications, Intelligence, Surveillance and Reconnaissance On-the-Move

    DTIC Science & Technology

    2006-11-01

    software components used in the ad hoc nodes for the C4ISR OTM experiment were OLSRD, an open-source proactive MANET routing software, and OpenVPN , an...developed by Mike Baker (openwrt.org). 6OpenVPN is a trademark of OpenVPN Solutions LLC. 6 Secure communications in the MANET are achieved with...encryption provided by Wired Equivalent Privacy (WEP) and OpenVPN . The WEP protocol, which is part of the IEEE 802.11 wireless networking standard

  15. Ad Hoc working group on diurnal and semi-diurnal Earth Orientation variation.

    NASA Astrophysics Data System (ADS)

    Gipson, J. M.

    2017-12-01

    Diurnal and semi-diurnal Earth orientation ("HF-EOP") variation were detected in the early 1990s in SLR and VLBI data. Beginning in 1996 a model of HF-EOP variation based on ocean-tides derived from Topex data was included in the IERS standards. This model has not been updated since then with the exception of including libration for effects for polar motion (2003 IERS conventions) and UT1 (2010 IERS conventions). The accuracy of Space Geodesy has increased remarkably over the last 20 years and the 1996 IERS HF-EOP model is no longer adequate. At the conclusion of the 2017 GGOS/IERS Unified Analysis Workshop an ad hoc working group was formed including representatives of the IDS, IGS, ILRS, and IVS. The goal of the working group is to test several models of HF-EOP in the different space geodesy techniques and to make a recommendation to the IERS for the adoption of a new HF-EOP model. In this presentation I will give a summary of work on HF-EOP done to date by various scientists which demonstrate the inadequacy of the current IERS HF-EOP model. I will then describe the goals and the progress of the working group to date, with a preview of further work.

  16. An ultra-wide bandwidth-based range/GPS tight integration approach for relative positioning in vehicular ad hoc networks

    NASA Astrophysics Data System (ADS)

    Shen, Feng; Wayn Cheong, Joon; Dempster, Andrew G.

    2015-04-01

    Relative position awareness is a vital premise for the implementation of emerging intelligent transportation systems, such as collision warning. However, commercial global navigation satellite systems (GNSS) receivers do not satisfy the requirements of these applications. Fortunately, cooperative positioning (CP) techniques, through sharing the GNSS measurements between vehicles, can improve the performance of relative positioning in a vehicular ad hoc network (VANET). In this paper, while assuming there are no obstacles between vehicles, a new enhanced tightly coupled CP technique is presented by adding ultra-wide bandwidth (UWB)-based inter-vehicular range measurements. In the proposed CP method, each vehicle fuses the GPS measurements and the inter-vehicular range measurements. Based on analytical and experimental results, in the full GPS coverage environment, the new tight integration CP method outperforms the INS-aided tight CP method, tight CP method, and DGPS by 11%, 15%, and 24%, respectively; in the GPS outage scenario, the performance improvement achieves 60%, 65%, and 73%, respectively.

  17. Non-ad-hoc decision rule for the Dempster-Shafer method of evidential reasoning

    NASA Astrophysics Data System (ADS)

    Cheaito, Ali; Lecours, Michael; Bosse, Eloi

    1998-03-01

    This paper is concerned with the fusion of identity information through the use of statistical analysis rooted in Dempster-Shafer theory of evidence to provide automatic identification aboard a platform. An identity information process for a baseline Multi-Source Data Fusion (MSDF) system is defined. The MSDF system is applied to information sources which include a number of radars, IFF systems, an ESM system, and a remote track source. We use a comprehensive Platform Data Base (PDB) containing all the possible identity values that the potential target may take, and we use the fuzzy logic strategies which enable the fusion of subjective attribute information from sensor and the PDB to make the derivation of target identity more quickly, more precisely, and with statistically quantifiable measures of confidence. The conventional Dempster-Shafer lacks a formal basis upon which decision can be made in the face of ambiguity. We define a non-ad hoc decision rule based on the expected utility interval for pruning the `unessential' propositions which would otherwise overload the real-time data fusion systems. An example has been selected to demonstrate the implementation of our modified Dempster-Shafer method of evidential reasoning.

  18. An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks

    PubMed Central

    Tan, Guozhen; Yu, Chao

    2017-01-01

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment) applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS) support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access) have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC) protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications. PMID:28991217

  19. Adaptive Control Parameters for Dispersal of Multi-Agent Mobile Ad Hoc Network (MANET) Swarms

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurt Derr; Milos Manic

    A mobile ad hoc network is a collection of independent nodes that communicate wirelessly with one another. This paper investigates nodes that are swarm robots with communications and sensing capabilities. Each robot in the swarm may operate in a distributed and decentralized manner to achieve some goal. This paper presents a novel approach to dynamically adapting control parameters to achieve mesh configuration stability. The presented approach to robot interaction is based on spring force laws (attraction and repulsion laws) to create near-optimal mesh like configurations. In prior work, we presented the extended virtual spring mesh (EVSM) algorithm for the dispersionmore » of robot swarms. This paper extends the EVSM framework by providing the first known study on the effects of adaptive versus static control parameters on robot swarm stability. The EVSM algorithm provides the following novelties: 1) improved performance with adaptive control parameters and 2) accelerated convergence with high formation effectiveness. Simulation results show that 120 robots reach convergence using adaptive control parameters more than twice as fast as with static control parameters in a multiple obstacle environment.« less

  20. Data Delivery Method Based on Neighbor Nodes' Information in a Mobile Ad Hoc Network

    PubMed Central

    Hayashi, Takuma; Taenaka, Yuzo; Okuda, Takeshi; Yamaguchi, Suguru

    2014-01-01

    This paper proposes a data delivery method based on neighbor nodes' information to achieve reliable communication in a mobile ad hoc network (MANET). In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE), Chachulski et al. (2007), improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow. PMID:24672371

  1. Data delivery method based on neighbor nodes' information in a mobile ad hoc network.

    PubMed

    Kashihara, Shigeru; Hayashi, Takuma; Taenaka, Yuzo; Okuda, Takeshi; Yamaguchi, Suguru

    2014-01-01

    This paper proposes a data delivery method based on neighbor nodes' information to achieve reliable communication in a mobile ad hoc network (MANET). In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE), Chachulski et al. (2007), improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow.

  2. PCPA: A Practical Certificateless Conditional Privacy Preserving Authentication Scheme for Vehicular Ad Hoc Networks

    PubMed Central

    2018-01-01

    Vehicle ad hoc networks (VANETs) is a promising network scenario for greatly improving traffic efficiency and safety, in which smart vehicles can communicate with other vehicles or roadside units. For the availability of VANETs, it is very important to deal with the security and privacy problems for VANETs. In this paper, based on certificateless cryptography and elliptic curve cryptography, we present a certificateless signature with message recovery (CLS-MR), which we believe are of independent interest. Then, a practical certificateless conditional privacy preserving authentication (PCPA) scheme is proposed by incorporating the proposed CLS-MR scheme. Furthermore, the security analysis shows that PCPA satisfies all security and privacy requirements. The evaluation results indicate that PCPA achieves low computation and communication costs because there is no need to use the bilinear pairing and map-to-point hash operations. Moreover, extensive simulations show that PCPA is feasible and achieves prominent performances in terms of message delay and message loss ratio, and thus is more suitable for the deployment and adoption of VANETs. PMID:29762511

  3. Post Hoc Analyses of ApoE Genotype-Defined Subgroups in Clinical Trials.

    PubMed

    Kennedy, Richard E; Cutter, Gary R; Wang, Guoqiao; Schneider, Lon S

    2016-01-01

    Many post hoc analyses of clinical trials in Alzheimer's disease (AD) and mild cognitive impairment (MCI) are in small Phase 2 trials. Subject heterogeneity may lead to statistically significant post hoc results that cannot be replicated in larger follow-up studies. We investigated the extent of this problem using simulation studies mimicking current trial methods with post hoc analyses based on ApoE4 carrier status. We used a meta-database of 24 studies, including 3,574 subjects with mild AD and 1,171 subjects with MCI/prodromal AD, to simulate clinical trial scenarios. Post hoc analyses examined if rates of progression on the Alzheimer's Disease Assessment Scale-cognitive (ADAS-cog) differed between ApoE4 carriers and non-carriers. Across studies, ApoE4 carriers were younger and had lower baseline scores, greater rates of progression, and greater variability on the ADAS-cog. Up to 18% of post hoc analyses for 18-month trials in AD showed greater rates of progression for ApoE4 non-carriers that were statistically significant but unlikely to be confirmed in follow-up studies. The frequency of erroneous conclusions dropped below 3% with trials of 100 subjects per arm. In MCI, rates of statistically significant differences with greater progression in ApoE4 non-carriers remained below 3% unless sample sizes were below 25 subjects per arm. Statistically significant differences for ApoE4 in post hoc analyses often reflect heterogeneity among small samples rather than true differential effect among ApoE4 subtypes. Such analyses must be viewed cautiously. ApoE genotype should be incorporated into the design stage to minimize erroneous conclusions.

  4. Identifying strategy for ad hoc percutaneous coronary intervention in patients with anticipated unfavorable radial access: the Little Women study.

    PubMed

    Sgueglia, Gregory A; Todaro, Daniel; De Santis, Antonella; Conte, Micaela; Gioffrè, Gaetano; Di Giorgio, Angela; D'Errico, Fabrizio; Piccioni, Fabiana; Summaria, Francesco; Gaspardone, Achille

    2017-10-16

    Transradial percutaneous coronary intervention (PCI) offers important advantages over transfemoral PCI, including better outcomes. However, when there is indication to ad hoc PCI, a 6 French workflow is a common default strategy, hence potentially influencing vascular access selection in patients with anticipated small size radial artery. A multidimensional evaluation was performed to compare two ad hoc interventional strategies in women <160cm: a full 6 French workflow (namely 6 French introducer sheath, diagnostic catheters and guiding catheter) with a modified workflow consisting in the use of 5 French diagnostic catheters preceded by the placement of a 6 French sheath introducer and followed by a 6 French guiding catheter use for PCI. Overall 120 women (68±11years) were enrolled in the study. Coronary angiography has been performed using 5 French or 6 French diagnostic catheters in 57 (47.5%) and 63 (52.5%) cases, respectively. Radial spasm and switch to another access occurred more frequently among women who underwent coronary angiography with 6 French rather than 5 French diagnostic catheters (43% vs. 25%, p=0.03 and 2% vs. 11%, p=0.04, respectively). Total time to guidewire lesion crossing was also significantly higher when PCI has been preceded by 6 French rather than 5 French coronary angiography (23±11min vs 16±7min, p=0.013). In patients with anticipated unfavorable radial access, a workflow consisting in 6 French introducer sheath placement, 5 French coronary angiography, and 6 French coronary intervention is on multiple parameters the most straightforward and effective strategy. Copyright © 2017 Elsevier Inc. All rights reserved.

  5. A user-friendly tool for medical-related patent retrieval.

    PubMed

    Pasche, Emilie; Gobeill, Julien; Teodoro, Douglas; Gaudinat, Arnaud; Vishnyakova, Dina; Lovis, Christian; Ruch, Patrick

    2012-01-01

    Health-related information retrieval is complicated by the variety of nomenclatures available to name entities, since different communities of users will use different ways to name a same entity. We present in this report the development and evaluation of a user-friendly interactive Web application aiming at facilitating health-related patent search. Our tool, called TWINC, relies on a search engine tuned during several patent retrieval competitions, enhanced with intelligent interaction modules, such as chemical query, normalization and expansion. While the functionality of related article search showed promising performances, the ad hoc search results in fairly contrasted results. Nonetheless, TWINC performed well during the PatOlympics competition and was appreciated by intellectual property experts. This result should be balanced by the limited evaluation sample. We can also assume that it can be customized to be applied in corporate search environments to process domain and company-specific vocabularies, including non-English literature and patents reports.

  6. A communication theoretical analysis of FRET-based mobile ad hoc molecular nanonetworks.

    PubMed

    Kuscu, Murat; Akan, Ozgur B

    2014-09-01

    Nanonetworks refer to a group of nanosized machines with very basic operational capabilities communicating to each other in order to accomplish more complex tasks such as in-body drug delivery, or chemical defense. Realizing reliable and high-rate communication between these nanomachines is a fundamental problem for the practicality of these nanonetworks. Recently, we have proposed a molecular communication method based on Förster Resonance Energy Transfer (FRET) which is a nonradiative excited state energy transfer phenomenon observed among fluorescent molecules, i.e., fluorophores. We have modeled the FRET-based communication channel considering the fluorophores as single-molecular immobile nanomachines, and shown its reliability at high rates, and practicality at the current stage of nanotechnology. In this study, for the first time in the literature, we investigate the network of mobile nanomachines communicating through FRET. We introduce two novel mobile molecular nanonetworks: FRET-based mobile molecular sensor/actor nanonetwork (FRET-MSAN) which is a distributed system of mobile fluorophores acting as sensor or actor node; and FRET-based mobile ad hoc molecular nanonetwork (FRET-MAMNET) which consists of fluorophore-based nanotransmitter, nanoreceivers and nanorelays. We model the single message propagation based on birth-death processes with continuous time Markov chains. We evaluate the performance of FRET-MSAN and FRET-MAMNET in terms of successful transmission probability and mean extinction time of the messages, system throughput, channel capacity and achievable communication rates.

  7. Optimal JPWL Forward Error Correction Rate Allocation for Robust JPEG 2000 Images and Video Streaming over Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Agueh, Max; Diouris, Jean-François; Diop, Magaye; Devaux, François-Olivier; De Vleeschouwer, Christophe; Macq, Benoit

    2008-12-01

    Based on the analysis of real mobile ad hoc network (MANET) traces, we derive in this paper an optimal wireless JPEG 2000 compliant forward error correction (FEC) rate allocation scheme for a robust streaming of images and videos over MANET. The packet-based proposed scheme has a low complexity and is compliant to JPWL, the 11th part of the JPEG 2000 standard. The effectiveness of the proposed method is evaluated using a wireless Motion JPEG 2000 client/server application; and the ability of the optimal scheme to guarantee quality of service (QoS) to wireless clients is demonstrated.

  8. ICTNET at Web Track 2012 Ad-hoc Task

    DTIC Science & Technology

    2012-11-01

    Model and use it as baseline this year. 3.2 Learning to rank Learning to rank (LTR) introduces machine learning to retrieval ranking problem. It...Yoram Singer. An efficient boosting algorithm  for  combining preferences [J]. The Journal of  Machine   Learning  Research. 2003. 

  9. An Ad-hoc Satellite Network to Measure Filamentary Current Structures in the Auroral Zone

    NASA Astrophysics Data System (ADS)

    Nabong, C.; Fritz, T. A.; Semeter, J. L.

    2014-12-01

    An ad-hoc cubesat-based satellite network project known as ANDESITE is under development at Boston University. It aims to develop a dense constellation of easy-to-use, rapidly-deployable low-cost wireless sensor nodes in space. The objectives of the project are threefold: 1) Demonstrate viability of satellite based sensor networks by deploying an 8-node miniature sensor network to study the filamentation of the field aligned currents in the auroral zones of the Earth's magnetosphere. 2) Test the scalability of proposed protocols, including localization techniques, tracking, data aggregation, and routing, for a 3 dimensional wireless sensor network using a "flock" of nodes. 3) Construct a 6U Cube-sat running the Android OS as an integrated constellation manager, data mule and sensor node deplorer. This small network of sensor nodes will resolve current densities at different spatial resolutions in the near-Earth magnetosphere using measurements from magnetometers with 1-nT sensitivities and 0.2 nT/√Hz self-noise. Mapping of these currents will provide new constraints for models of auroral particle acceleration, wave-particle interactions, ionospheric destabilization, and other kinetic processes operating in the low-beta plasma of the near Earth magnetosphere.

  10. Report of the APS Ad-Hoc Committee on LGBT Issues - Presentation of Findings and Recommendations

    NASA Astrophysics Data System (ADS)

    Falk, Michael

    In 2014 the Executive Officer of the American Physical Society (APS), Kate Kirby, created an Ad-Hoc Committee on LGBT Issues (C-LGBT) charged with reporting on the obstacles to inclusion of LGBT physicists, a term which for the purpose of this report refers to persons who self-identify as lesbian, gay, bisexual, transgender, queer, questioning, intersex, or asexual, as well as other sexual and gender minorities. The full charge was as follows: ``The committee will advise the APS on the current status of LGBT issues in physics, provide recommendations for greater inclusion, and engage physicists in laying the foundation for a more inclusive physics community. ?More specifically, the committee will investigate LGBT representation in physics, assess the educational and professional climate in physics, recommend changes in policies and practices that impact LGBT physicists, and address other issues that affect inclusion.'' We will present the findings and recommendations of the C-LGBT final report, and a panel discussion will be held following the presentation to discuss the future of APS efforts toward LGBT inclusion in physics.

  11. Report of the APS Ad-Hoc Committee on LGBT Issues - Presentation of Findings and Recommendations

    NASA Astrophysics Data System (ADS)

    Long, Elena

    2016-03-01

    In 2014 the Executive Officer of the American Physical Society (APS), Kate Kirby, created an Ad-Hoc Committee on LGBT Issues (C-LGBT) charged with reporting on the obstacles to inclusion of LGBT physicists, a term which for the purpose of this report refers to persons who self-identify as lesbian, gay, bisexual, transgender, queer, questioning, intersex, or asexual, as well as other sexual and gender minorities. The full charge was as follows: ``The committee will advise the APS on the current status of LGBT issues in physics, provide recommendations for greater inclusion, and engage physicists in laying the foundation for a more inclusive physics community? More specifically, the committee will investigate LGBT representation in physics, assess the educational and professional climate in physics, recommend changes in policies and practices that impact LGBT physicists, and address other issues that affect inclusion.'' We will present the findings and recommendations of the C-LGBT final report, and a panel discussion will be held following the presentation to discuss the future of APS efforts toward LGBT inclusion in physics.

  12. An evidence-based unified definition of lifelong and acquired premature ejaculation: report of the second International Society for Sexual Medicine Ad Hoc Committee for the Definition of Premature Ejaculation.

    PubMed

    Serefoglu, Ege Can; McMahon, Chris G; Waldinger, Marcel D; Althof, Stanley E; Shindel, Alan; Adaikan, Ganesh; Becher, Edgardo F; Dean, John; Giuliano, Francois; Hellstrom, Wayne J G; Giraldi, Annamaria; Glina, Sidney; Incrocci, Luca; Jannini, Emmanuele; McCabe, Marita; Parish, Sharon; Rowland, David; Segraves, R Taylor; Sharlip, Ira; Torres, Luiz Otavio

    2014-06-01

    The International Society for Sexual Medicine (ISSM) Ad Hoc Committee for the Definition of Premature Ejaculation developed the first evidence-based definition for lifelong premature ejaculation (PE) in 2007 and concluded that there were insufficient published objective data at that time to develop a definition for acquired PE. The aim of this article is to review and critique the current literature and develop a contemporary, evidence-based definition for acquired PE and/or a unified definition for both lifelong and acquired PE. In April 2013, the ISSM convened a second Ad Hoc Committee for the Definition of Premature Ejaculation in Bangalore, India. The same evidence-based systematic approach to literature search, retrieval, and evaluation used by the original committee was adopted. The committee unanimously agreed that men with lifelong and acquired PE appear to share the dimensions of short ejaculatory latency, reduced or absent perceived ejaculatory control, and the presence of negative personal consequences. Men with acquired PE are older, have higher incidences of erectile dysfunction, comorbid disease, and cardiovascular risk factors, and have a longer intravaginal ejaculation latency time (IELT) as compared with men with lifelong PE. A self-estimated or stopwatch IELT of 3 minutes was identified as a valid IELT cut-off for diagnosing acquired PE. On this basis, the committee agreed on a unified definition of both acquired and lifelong PE as a male sexual dysfunction characterized by (i) ejaculation that always or nearly always occurs prior to or within about 1 minute of vaginal penetration from the first sexual experience (lifelong PE) or a clinically significant and bothersome reduction in latency time, often to about 3 minutes or less (acquired PE); (ii) the inability to delay ejaculation on all or nearly all vaginal penetrations; and (iii) negative personal consequences, such as distress, bother, frustration, and/or the avoidance of sexual intimacy. The

  13. Energy Efficient Link Aware Routing with Power Control in Wireless Ad Hoc Networks.

    PubMed

    Katiravan, Jeevaa; Sylvia, D; Rao, D Srinivasa

    2015-01-01

    In wireless ad hoc networks, the traditional routing protocols make the route selection based on minimum distance between the nodes and the minimum number of hop counts. Most of the routing decisions do not consider the condition of the network such as link quality and residual energy of the nodes. Also, when a link failure occurs, a route discovery mechanism is initiated which incurs high routing overhead. If the broadcast nature and the spatial diversity of the wireless communication are utilized efficiently it becomes possible to achieve improvement in the performance of the wireless networks. In contrast to the traditional routing scheme which makes use of a predetermined route for packet transmission, such an opportunistic routing scheme defines a predefined forwarding candidate list formed by using single network metrics. In this paper, a protocol is proposed which uses multiple metrics such as residual energy and link quality for route selection and also includes a monitoring mechanism which initiates a route discovery for a poor link, thereby reducing the overhead involved and improving the throughput of the network while maintaining network connectivity. Power control is also implemented not only to save energy but also to improve the network performance. Using simulations, we show the performance improvement attained in the network in terms of packet delivery ratio, routing overhead, and residual energy of the network.

  14. Integration of Body Sensor Networks and Vehicular Ad-hoc Networks for Traffic Safety.

    PubMed

    Reyes-Muñoz, Angelica; Domingo, Mari Carmen; López-Trinidad, Marco Antonio; Delgado, José Luis

    2016-01-15

    The emergence of Body Sensor Networks (BSNs) constitutes a new and fast growing trend for the development of daily routine applications. However, in the case of heterogeneous BSNs integration with Vehicular ad hoc Networks (VANETs) a large number of difficulties remain, that must be solved, especially when talking about the detection of human state factors that impair the driving of motor vehicles. The main contributions of this investigation are principally three: (1) an exhaustive review of the current mechanisms to detect four basic physiological behavior states (drowsy, drunk, driving under emotional state disorders and distracted driving) that may cause traffic accidents is presented; (2) A middleware architecture is proposed. This architecture can communicate with the car dashboard, emergency services, vehicles belonging to the VANET and road or street facilities. This architecture seeks on the one hand to improve the car driving experience of the driver and on the other hand to extend security mechanisms for the surrounding individuals; and (3) as a proof of concept, an Android real-time attention low level detection application that runs in a next-generation smartphone is developed. The application features mechanisms that allow one to measure the degree of attention of a driver on the base of her/his EEG signals, establish wireless communication links via various standard wireless means, GPRS, Bluetooth and WiFi and issue alarms of critical low driver attention levels.

  15. Energy Efficient Link Aware Routing with Power Control in Wireless Ad Hoc Networks

    PubMed Central

    Katiravan, Jeevaa; Sylvia, D.; Rao, D. Srinivasa

    2015-01-01

    In wireless ad hoc networks, the traditional routing protocols make the route selection based on minimum distance between the nodes and the minimum number of hop counts. Most of the routing decisions do not consider the condition of the network such as link quality and residual energy of the nodes. Also, when a link failure occurs, a route discovery mechanism is initiated which incurs high routing overhead. If the broadcast nature and the spatial diversity of the wireless communication are utilized efficiently it becomes possible to achieve improvement in the performance of the wireless networks. In contrast to the traditional routing scheme which makes use of a predetermined route for packet transmission, such an opportunistic routing scheme defines a predefined forwarding candidate list formed by using single network metrics. In this paper, a protocol is proposed which uses multiple metrics such as residual energy and link quality for route selection and also includes a monitoring mechanism which initiates a route discovery for a poor link, thereby reducing the overhead involved and improving the throughput of the network while maintaining network connectivity. Power control is also implemented not only to save energy but also to improve the network performance. Using simulations, we show the performance improvement attained in the network in terms of packet delivery ratio, routing overhead, and residual energy of the network. PMID:26167529

  16. Dynamic Agent Classification and Tracking Using an Ad Hoc Mobile Acoustic Sensor Network

    NASA Astrophysics Data System (ADS)

    Friedlander, David; Griffin, Christopher; Jacobson, Noah; Phoha, Shashi; Brooks, Richard R.

    2003-12-01

    Autonomous networks of sensor platforms can be designed to interact in dynamic and noisy environments to determine the occurrence of specified transient events that define the dynamic process of interest. For example, a sensor network may be used for battlefield surveillance with the purpose of detecting, identifying, and tracking enemy activity. When the number of nodes is large, human oversight and control of low-level operations is not feasible. Coordination and self-organization of multiple autonomous nodes is necessary to maintain connectivity and sensor coverage and to combine information for better understanding the dynamics of the environment. Resource conservation requires adaptive clustering in the vicinity of the event. This paper presents methods for dynamic distributed signal processing using an ad hoc mobile network of microsensors to detect, identify, and track targets in noisy environments. They seamlessly integrate data from fixed and mobile platforms and dynamically organize platforms into clusters to process local data along the trajectory of the targets. Local analysis of sensor data is used to determine a set of target attribute values and classify the target. Sensor data from a field test in the Marine base at Twentynine Palms, Calif, was analyzed using the techniques described in this paper. The results were compared to "ground truth" data obtained from GPS receivers on the vehicles.

  17. An adaptive neural swarm approach for intrusion defense in ad hoc networks

    NASA Astrophysics Data System (ADS)

    Cannady, James

    2011-06-01

    Wireless sensor networks (WSN) and mobile ad hoc networks (MANET) are being increasingly deployed in critical applications due to the flexibility and extensibility of the technology. While these networks possess numerous advantages over traditional wireless systems in dynamic environments they are still vulnerable to many of the same types of host-based and distributed attacks common to those systems. Unfortunately, the limited power and bandwidth available in WSNs and MANETs, combined with the dynamic connectivity that is a defining characteristic of the technology, makes it extremely difficult to utilize traditional intrusion detection techniques. This paper describes an approach to accurately and efficiently detect potentially damaging activity in WSNs and MANETs. It enables the network as a whole to recognize attacks, anomalies, and potential vulnerabilities in a distributive manner that reflects the autonomic processes of biological systems. Each component of the network recognizes activity in its local environment and then contributes to the overall situational awareness of the entire system. The approach utilizes agent-based swarm intelligence to adaptively identify potential data sources on each node and on adjacent nodes throughout the network. The swarm agents then self-organize into modular neural networks that utilize a reinforcement learning algorithm to identify relevant behavior patterns in the data without supervision. Once the modular neural networks have established interconnectivity both locally and with neighboring nodes the analysis of events within the network can be conducted collectively in real-time. The approach has been shown to be extremely effective in identifying distributed network attacks.

  18. Enhancing the Selection of Backoff Interval Using Fuzzy Logic over Wireless Ad Hoc Networks

    PubMed Central

    Ranganathan, Radha; Kannan, Kathiravan

    2015-01-01

    IEEE 802.11 is the de facto standard for medium access over wireless ad hoc network. The collision avoidance mechanism (i.e., random binary exponential backoff—BEB) of IEEE 802.11 DCF (distributed coordination function) is inefficient and unfair especially under heavy load. In the literature, many algorithms have been proposed to tune the contention window (CW) size. However, these algorithms make every node select its backoff interval between [0, CW] in a random and uniform manner. This randomness is incorporated to avoid collisions among the nodes. But this random backoff interval can change the optimal order and frequency of channel access among competing nodes which results in unfairness and increased delay. In this paper, we propose an algorithm that schedules the medium access in a fair and effective manner. This algorithm enhances IEEE 802.11 DCF with additional level of contention resolution that prioritizes the contending nodes according to its queue length and waiting time. Each node computes its unique backoff interval using fuzzy logic based on the input parameters collected from contending nodes through overhearing. We evaluate our algorithm against IEEE 802.11, GDCF (gentle distributed coordination function) protocols using ns-2.35 simulator and show that our algorithm achieves good performance. PMID:25879066

  19. SVANET: A smart vehicular ad hoc network for efficient data transmission with wireless sensors.

    PubMed

    Sahoo, Prasan Kumar; Chiang, Ming-Jer; Wu, Shih-Lin

    2014-11-25

    Wireless sensors can sense any event, such as accidents, as well as icy roads, and can forward the rescue/warning messages through intermediate vehicles for any necessary help. In this paper, we propose a smart vehicular ad hoc network (SVANET) architecture that uses wireless sensors to detect events and vehicles to transmit the safety and non-safety messages efficiently by using different service channels and one control channel with different priorities. We have developed a data transmission protocol for the vehicles in the highway, in which data can be forwarded with the help of vehicles if they are connected with each other or data can be forwarded with the help of nearby wireless sensors. Our data transmission protocol is designed to increase the driving safety, to prevent accidents and to utilize channels efficiently by adjusting the control and service channel time intervals dynamically. Besides, our protocol can transmit information to vehicles in advance, so that drivers can decide an alternate route in case of traffic congestion. For various data sharing, we design a method that can select a few leader nodes among vehicles running along a highway to broadcast data efficiently. Simulation results show that our protocol can outperform the existing standard in terms of the end to end packet delivery ratio and latency.

  20. Frame Transmission Efficiency-Based Cross-Layer Congestion Notification Scheme in Wireless Ad Hoc Networks.

    PubMed

    He, Huaguang; Li, Taoshen; Feng, Luting; Ye, Jin

    2017-07-15

    Different from the traditional wired network, the fundamental cause of transmission congestion in wireless ad hoc networks is medium contention. How to utilize the congestion state from the MAC (Media Access Control) layer to adjust the transmission rate is core work for transport protocol design. However, recent works have shown that the existing cross-layer congestion detection solutions are too complex to be deployed or not able to characterize the congestion accurately. We first propose a new congestion metric called frame transmission efficiency (i.e., the ratio of successful transmission delay to the frame service delay), which describes the medium contention in a fast and accurate manner. We further present the design and implementation of RECN (ECN and the ratio of successful transmission delay to the frame service delay in the MAC layer, namely, the frame transmission efficiency), a general supporting scheme that adjusts the transport sending rate through a standard ECN (Explicit Congestion Notification) signaling method. Our method can be deployed on commodity switches with small firmware updates, while making no modification on end hosts. We integrate RECN transparently (i.e., without modification) with TCP on NS2 simulation. The experimental results show that RECN remarkably improves network goodput across multiple concurrent TCP flows.

  1. Direct trust-based security scheme for RREQ flooding attack in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Kumar, Sunil; Dutta, Kamlesh

    2017-06-01

    The routing algorithms in MANETs exhibit distributed and cooperative behaviour which makes them easy target for denial of service (DoS) attacks. RREQ flooding attack is a flooding-type DoS attack in context to Ad hoc On Demand Distance Vector (AODV) routing protocol, where the attacker broadcasts massive amount of bogus Route Request (RREQ) packets to set up the route with the non-existent or existent destination in the network. This paper presents direct trust-based security scheme to detect and mitigate the impact of RREQ flooding attack on the network, in which, every node evaluates the trust degree value of its neighbours through analysing the frequency of RREQ packets originated by them over a short period of time. Taking the node's trust degree value as the input, the proposed scheme is smoothly extended for suppressing the surplus RREQ and bogus RREQ flooding packets at one-hop neighbours during the route discovery process. This scheme distinguishes itself from existing techniques by not directly blocking the service of a normal node due to increased amount of RREQ packets in some unusual conditions. The results obtained throughout the simulation experiments clearly show the feasibility and effectiveness of the proposed defensive scheme.

  2. Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks

    PubMed Central

    Paramasivan, B.; Kaliappan, M.

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP. PMID:25143986

  3. Sketching Awareness: A Participatory Study to Elicit Designs for Supporting Ad Hoc Emergency Medical Teamwork

    PubMed Central

    Kusunoki, Diana; Sarcevic, Aleksandra; Zhang, Zhan; Yala, Maria

    2014-01-01

    Prior CSCW research on awareness in clinical settings has mostly focused on higher-level team coordination spanning across longer-term trajectories at the department and inter-department levels. In this paper, we offer a perspective on what awareness means within the context of an ad hoc, time- and safety-critical medical setting by looking at teams treating severely ill patients with urgent needs. We report findings from four participatory design workshops conducted with emergency medicine clinicians at two regional emergency departments. Workshops were developed to elicit design ideas for information displays that support awareness in emergency medical situations. Through analysis of discussions and clinicians’ sketches of information displays, we identified five features of teamwork that can be used as a foundation for supporting awareness from the perspective of clinicians. Based on these findings, we contribute rich descriptions of four facets of awareness that teams manage during emergency medical situations: team member awareness, elapsed time awareness, teamwork-oriented and patient-driven task awareness, and overall progress awareness. We then discuss these four awareness types in relation to awareness facets found in the CSCW literature. PMID:25870498

  4. VehiHealth: An Emergency Routing Protocol for Vehicular Ad Hoc Network to Support Healthcare System.

    PubMed

    Bhoi, S K; Khilar, P M

    2016-03-01

    Survival of a patient depends on effective data communication in healthcare system. In this paper, an emergency routing protocol for Vehicular Ad hoc Network (VANET) is proposed to quickly forward the current patient status information from the ambulance to the hospital to provide pre-medical treatment. As the ambulance takes time to reach the hospital, ambulance doctor can provide sudden treatment to the patient in emergency by sending patient status information to the hospital through the vehicles using vehicular communication. Secondly, the experienced doctors respond to the information by quickly sending a treatment information to the ambulance. In this protocol, data is forwarded through that path which has less link breakage problem between the vehicles. This is done by calculating an intersection value I v a l u e for the neighboring intersections by using the current traffic information. Then the data is forwarded through that intersection which has minimum I v a l u e . Simulation results show VehiHealth performs better than P-GEDIR, GyTAR, A-STAR and GSR routing protocols in terms of average end-to-end delay, number of link breakage, path length, and average response time.

  5. Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.

    PubMed

    Paramasivan, B; Kaliappan, M

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  6. Integration of Body Sensor Networks and Vehicular Ad-hoc Networks for Traffic Safety

    PubMed Central

    Reyes-Muñoz, Angelica; Domingo, Mari Carmen; López-Trinidad, Marco Antonio; Delgado, José Luis

    2016-01-01

    The emergence of Body Sensor Networks (BSNs) constitutes a new and fast growing trend for the development of daily routine applications. However, in the case of heterogeneous BSNs integration with Vehicular ad hoc Networks (VANETs) a large number of difficulties remain, that must be solved, especially when talking about the detection of human state factors that impair the driving of motor vehicles. The main contributions of this investigation are principally three: (1) an exhaustive review of the current mechanisms to detect four basic physiological behavior states (drowsy, drunk, driving under emotional state disorders and distracted driving) that may cause traffic accidents is presented; (2) A middleware architecture is proposed. This architecture can communicate with the car dashboard, emergency services, vehicles belonging to the VANET and road or street facilities. This architecture seeks on the one hand to improve the car driving experience of the driver and on the other hand to extend security mechanisms for the surrounding individuals; and (3) as a proof of concept, an Android real-time attention low level detection application that runs in a next-generation smartphone is developed. The application features mechanisms that allow one to measure the degree of attention of a driver on the base of her/his EEG signals, establish wireless communication links via various standard wireless means, GPRS, Bluetooth and WiFi and issue alarms of critical low driver attention levels. PMID:26784204

  7. Ad Hoc Influenza Vaccination During Years of Significant Antigenic Drift in a Tropical City With 2 Seasonal Peaks

    PubMed Central

    Wong, Martin C.S.; Nelson, E. Anthony S.; Leung, Czarina; Lee, Nelson; Chan, Martin C.W.; Choi, Kin Wing; Rainer, Timothy H.; Cheng, Frankie W.T.; Wong, Samuel Y.S.; Lai, Christopher K.C.; Lam, Bosco; Cheung, Tak Hong; Leung, Ting Fan; Chan, Paul K.S.

    2016-01-01

    Abstract We evaluated the acceptability of an additional ad hoc influenza vaccination among the health care professionals following seasons with significant antigenic drift. Self-administered, anonymous surveys were performed by hard copy questionnaires in public hospitals, and by an on-line platform available to all healthcare professionals, from April 1st to May 31st, 2015. A total of 1290 healthcare professionals completed the questionnaires, including doctors, nurses, and allied health professionals working in both the public and private systems. Only 31.8% of participating respondents expressed an intention to receive the additional vaccine, despite that the majority of them agreed or strongly agreed that it would bring benefit to the community (88.9%), save lives (86.7%), reduce medical expenses (76.3%), satisfy public expectation (82.8%), and increase awareness of vaccination (86.1%). However, a significant proportion expressed concern that the vaccine could disturb the normal immunization schedule (45.5%); felt uncertain what to do in the next vaccination round (66.0%); perceived that the summer peak might not occur (48.2%); and believed that the summer peak might not be of the same virus (83.5%). Furthermore, 27.8% of all respondents expected that the additional vaccination could weaken the efficacy of previous vaccinations; 51.3% was concerned about side effects; and 61.3% estimated that there would be a low uptake rate. If the supply of vaccine was limited, higher priority groups were considered to include the elderly aged ≥65 years with chronic medical conditions (89.2%), the elderly living in residential care homes (87.4%), and long-stay residents of institutions for the disabled (80.7%). The strongest factors associated with accepting the additional vaccine included immunization with influenza vaccines in the past 3 years, higher perceived risk of contracting influenza, and higher perceived severity of the disease impact. The acceptability to an

  8. The Copyright Law as it Relates to National Information Systems and National Programs; a Study by the Ad Hoc Task Group on Legal Aspects Involved in National Information Systems.

    ERIC Educational Resources Information Center

    Federal Council for Science and Technology, Washington, DC. Committee on Scientific and Technical Information.

    An ad hoc task group was constituted by the Committee on Scientific and Technical Information (COSATI) to: (1) delineate present and future issues issues for COSATI, (3) recommend additions or deletions in the present copyright law or in the pending revision now in Congress, and (4) recommend other short or long-term actions related to authorship…

  9. Overview of the TREC-2014 Microblog Track

    DTIC Science & Technology

    2014-11-01

    tweets as part of writing a retrospective piece about the impact of social media on the Egyptian revolution. The topic is temporally-anchored in the...imagined that participants would tackle the TTG task in a pipelined architecture that begins with ad hoc retrieval followed by summary generation...random selection of 100 tweets per topic from each TTG run. Although we envisioned a sys- tem architecture consisting of ad hoc retrieval followed by

  10. Concurrent Transmission Based on Channel Quality in Ad Hoc Networks: A Game Theoretic Approach

    NASA Astrophysics Data System (ADS)

    Chen, Chen; Gao, Xinbo; Li, Xiaoji; Pei, Qingqi

    In this paper, a decentralized concurrent transmission strategy in shared channel in Ad Hoc networks is proposed based on game theory. Firstly, a static concurrent transmissions game is used to determine the candidates for transmitting by channel quality threshold and to maximize the overall throughput with consideration of channel quality variation. To achieve NES (Nash Equilibrium Solution), the selfish behaviors of node to attempt to improve the channel gain unilaterally are evaluated. Therefore, this game allows each node to be distributed and to decide whether to transmit concurrently with others or not depending on NES. Secondly, as there are always some nodes with lower channel gain than NES, which are defined as hunger nodes in this paper, a hunger suppression scheme is proposed by adjusting the price function with interferences reservation and forward relay, to fairly give hunger nodes transmission opportunities. Finally, inspired by stock trading, a dynamic concurrent transmission threshold determination scheme is implemented to make the static game practical. Numerical results show that the proposed scheme is feasible to increase concurrent transmission opportunities for active nodes, and at the same time, the number of hunger nodes is greatly reduced with the least increase of threshold by interferences reservation. Also, the good performance on network goodput of the proposed model can be seen from the results.

  11. SVANET: A Smart Vehicular Ad Hoc Network for Efficient Data Transmission with Wireless Sensors

    PubMed Central

    Sahoo, Prasan Kumar; Chiang, Ming-Jer; Wu, Shih-Lin

    2014-01-01

    Wireless sensors can sense any event, such as accidents, as well as icy roads, and can forward the rescue/warning messages through intermediate vehicles for any necessary help. In this paper, we propose a smart vehicular ad hoc network (SVANET) architecture that uses wireless sensors to detect events and vehicles to transmit the safety and non-safety messages efficiently by using different service channels and one control channel with different priorities. We have developed a data transmission protocol for the vehicles in the highway, in which data can be forwarded with the help of vehicles if they are connected with each other or data can be forwarded with the help of nearby wireless sensors. Our data transmission protocol is designed to increase the driving safety, to prevent accidents and to utilize channels efficiently by adjusting the control and service channel time intervals dynamically. Besides, our protocol can transmit information to vehicles in advance, so that drivers can decide an alternate route in case of traffic congestion. For various data sharing, we design a method that can select a few leader nodes among vehicles running along a highway to broadcast data efficiently. Simulation results show that our protocol can outperform the existing standard in terms of the end to end packet delivery ratio and latency. PMID:25429409

  12. Standardization of Negative Controls in Diagnostic Immunohistochemistry: Recommendations From the International Ad Hoc Expert Panel

    PubMed Central

    Torlakovic, Emina E.; Francis, Glenn; Garratt, John; Gilks, Blake; Hyjek, Elizabeth; Ibrahim, Merdol; Miller, Rodney; Nielsen, Søren; Petcu, Eugen B.; Swanson, Paul E.; Taylor, Clive R.; Vyberg, Mogens

    2014-01-01

    Standardization of controls, both positive and negative controls, is needed for diagnostic immunohistochemistry (dIHC). The use of IHC-negative controls, irrespective of type, although well established, is not standardized. As such, the relevance and applicability of negative controls continues to challenge both pathologists and laboratory budgets. Despite the clear theoretical notion that appropriate controls serve to demonstrate the sensitivity and specificity of the dIHC test, it remains unclear which types of positive and negative controls are applicable and/or useful in day-to-day clinical practice. There is a perceived need to provide “best practice recommendations” for the use of negative controls. This perception is driven not only by logistics and cost issues, but also by increased pressure for accurate IHC testing, especially when IHC is performed for predictive markers, the number of which is rising as personalized medicine continues to develop. Herein, an international ad hoc expert panel reviews classification of negative controls relevant to clinical practice, proposes standard terminology for negative controls, considers the total evidence of IHC specificity that is available to pathologists, and develops a set of recommendations for the use of negative controls in dIHC based on “fit-for-use” principles. PMID:24714041

  13. A Game Theory Algorithm for Intra-Cluster Data Aggregation in a Vehicular Ad Hoc Network

    PubMed Central

    Chen, Yuzhong; Weng, Shining; Guo, Wenzhong; Xiong, Naixue

    2016-01-01

    Vehicular ad hoc networks (VANETs) have an important role in urban management and planning. The effective integration of vehicle information in VANETs is critical to traffic analysis, large-scale vehicle route planning and intelligent transportation scheduling. However, given the limitations in the precision of the output information of a single sensor and the difficulty of information sharing among various sensors in a highly dynamic VANET, effectively performing data aggregation in VANETs remains a challenge. Moreover, current studies have mainly focused on data aggregation in large-scale environments but have rarely discussed the issue of intra-cluster data aggregation in VANETs. In this study, we propose a multi-player game theory algorithm for intra-cluster data aggregation in VANETs by analyzing the competitive and cooperative relationships among sensor nodes. Several sensor-centric metrics are proposed to measure the data redundancy and stability of a cluster. We then study the utility function to achieve efficient intra-cluster data aggregation by considering both data redundancy and cluster stability. In particular, we prove the existence of a unique Nash equilibrium in the game model, and conduct extensive experiments to validate the proposed algorithm. Results demonstrate that the proposed algorithm has advantages over typical data aggregation algorithms in both accuracy and efficiency. PMID:26907272

  14. A Game Theory Algorithm for Intra-Cluster Data Aggregation in a Vehicular Ad Hoc Network.

    PubMed

    Chen, Yuzhong; Weng, Shining; Guo, Wenzhong; Xiong, Naixue

    2016-02-19

    Vehicular ad hoc networks (VANETs) have an important role in urban management and planning. The effective integration of vehicle information in VANETs is critical to traffic analysis, large-scale vehicle route planning and intelligent transportation scheduling. However, given the limitations in the precision of the output information of a single sensor and the difficulty of information sharing among various sensors in a highly dynamic VANET, effectively performing data aggregation in VANETs remains a challenge. Moreover, current studies have mainly focused on data aggregation in large-scale environments but have rarely discussed the issue of intra-cluster data aggregation in VANETs. In this study, we propose a multi-player game theory algorithm for intra-cluster data aggregation in VANETs by analyzing the competitive and cooperative relationships among sensor nodes. Several sensor-centric metrics are proposed to measure the data redundancy and stability of a cluster. We then study the utility function to achieve efficient intra-cluster data aggregation by considering both data redundancy and cluster stability. In particular, we prove the existence of a unique Nash equilibrium in the game model, and conduct extensive experiments to validate the proposed algorithm. Results demonstrate that the proposed algorithm has advantages over typical data aggregation algorithms in both accuracy and efficiency.

  15. The congestion control algorithm based on queue management of each node in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Wei, Yifei; Chang, Lin; Wang, Yali; Wang, Gaoping

    2016-12-01

    This paper proposes an active queue management mechanism, considering the node's own ability and its importance in the network to set the queue threshold. As the network load increases, local congestion of mobile ad hoc network may lead to network performance degradation, hot node's energy consumption increase even failure. If small energy nodes congested because of forwarding data packets, then when it is used as the source node will cause a lot of packet loss. This paper proposes an active queue management mechanism, considering the node's own ability and its importance in the network to set the queue threshold. Controlling nodes buffer queue in different levels of congestion area probability by adjusting the upper limits and lower limits, thus nodes can adjust responsibility of forwarding data packets according to their own situation. The proposed algorithm will slow down the send rate hop by hop along the data package transmission direction from congestion node to source node so that to prevent further congestion from the source node. The simulation results show that, the algorithm can better play the data forwarding ability of strong nodes, protect the weak nodes, can effectively alleviate the network congestion situation.

  16. MWRRET Value-Added Product: The Retrieval of Liquid Water Path and Precipitable Water Vapor from Microwave Radiometer (MWR) Datasets

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    KL Gaustad; DD Turner

    2007-09-30

    This report provides a short description of the Atmospheric Radiation Measurement (ARM) microwave radiometer (MWR) RETrievel (MWRRET) Value-Added Product (VAP) algorithm. This algorithm utilizes complimentary physical and statistical retrieval methods and applies brightness temperature offsets to reduce spurious liquid water path (LWP) bias in clear skies resulting in significantly improved precipitable water vapor (PWV) and LWP retrievals. We present a general overview of the technique, input parameters, output products, and describe data quality checks. A more complete discussion of the theory and results is given in Turner et al. (2007b).

  17. MWRRET Value-Added Product: The Retrieval of Liquid Water Path and Precipitable Water Vapor from Microwave Radiometer (MWR) Data Sets (Revision 2)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gaustad, KL; Turner, DD; McFarlane, SA

    2011-07-25

    This report provides a short description of the Atmospheric Radiation Measurement (ARM) Climate Research Facility microwave radiometer (MWR) Retrieval (MWRRET) value-added product (VAP) algorithm. This algorithm utilizes a complementary physical retrieval method and applies brightness temperature offsets to reduce spurious liquid water path (LWP) bias in clear skies resulting in significantly improved precipitable water vapor (PWV) and LWP retrievals. We present a general overview of the technique, input parameters, output products, and describe data quality checks. A more complete discussion of the theory and results is given in Turner et al. (2007b).

  18. DCU@TRECMed 2012: Using Ad-Hoc Baselines for Domain-Specific Retrieval

    DTIC Science & Technology

    2012-11-01

    description to extend the query, for example: Patients with complicated GERD who receive endoscopy will be extended with Gastroesophageal reflux disease ... Diseases and Related Health Problems, version 9) for the patient’s admission or discharge status [1, 5]; treating negation (e.g. negative test results or...codes were mapped to a description of the code, usually a short phrase/sentence. For instance, the ICD9 code 253.5 corresponds to the disease Diabetes

  19. Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks

    PubMed Central

    2017-01-01

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle’s safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given. PMID:29231882

  20. Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks.

    PubMed

    Song, Caixia

    2017-12-12

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle's safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given.

  1. International survey of vestibular rehabilitation therapists by the Barany Society Ad Hoc Committee on Vestibular Rehabilitation Therapy.

    PubMed

    Cohen, Helen S; Gottshall, Kim R; Graziano, Mariella; Malmstrom, Eva-Maj; Sharpe, Margaret H

    2009-01-01

    The goal of this study was to determine how occupational and physical therapists learn about vestibular rehabilitation therapy, their educational backgrounds, referral patterns, and their ideas about entry-level and advanced continuing education in vestibular rehabilitation therapy. The Barany Society Ad Hoc Committee for Vestibular Rehabilitation Therapy invited therapists around the world to complete an E-mail survey. Participants were either known to committee members or other Barany Society members, known to other participants, identified from their self-listings on the Internet, or volunteered after reading notices published in publications read by therapists. Responses were received from 133 therapists in 19 countries. They had a range of educational backgrounds, practice settings, and referral patterns. Few respondents had had any training about vestibular rehabilitation during their professional entry-level education. Most respondents learned about vestibular rehabilitation from continuing education courses, interactions with their colleagues, and reading. All of them endorsed the concept of developing standards and educating therapists about vestibular anatomy and physiology, vestibular diagnostic testing, vestibular disorders and current intervention strategies. Therefore, the Committee recommends the development of international standards for education and practice in vestibular rehabilitation therapy.

  2. Road Accident Prevention with Instant Emergency Warning Message Dissemination in Vehicular Ad-Hoc Network.

    PubMed

    Gokulakrishnan, P; Ganeshkumar, P

    2015-01-01

    A Road Accident Prevention (RAP) scheme based on Vehicular Backbone Network (VBN) structure is proposed in this paper for Vehicular Ad-hoc Network (VANET). The RAP scheme attempts to prevent vehicles from highway road traffic accidents and thereby reduces death and injury rates. Once the possibility of an emergency situation (i.e. an accident) is predicted in advance, instantly RAP initiates a highway road traffic accident prevention scheme. The RAP scheme constitutes the following activities: (i) the Road Side Unit (RSU) constructs a Prediction Report (PR) based on the status of the vehicles and traffic in the highway roads, (ii) the RSU generates an Emergency Warning Message (EWM) based on an abnormal PR, (iii) the RSU forms a VBN structure and (iv) the RSU disseminates the EWM to the vehicles that holds the high Risk Factor (RF) and travels in High Risk Zone (HRZ). These vehicles might reside either within the RSU's coverage area or outside RSU's coverage area (reached using VBN structure). The RAP scheme improves the performance of EWM dissemination in terms of increase in notification and decrease in end-to-end delay. The RAP scheme also reduces infrastructure cost (number of RSUs) by formulating and deploying the VBN structure. The RAP scheme with VBN structure improves notification by 19 percent and end-to-end delay by 14.38 percent for a vehicle density of 160 vehicles. It is also proved from the simulation experiment that the performance of RAP scheme is promising in 4-lane highway roads.

  3. Road Accident Prevention with Instant Emergency Warning Message Dissemination in Vehicular Ad-Hoc Network

    PubMed Central

    P, Gokulakrishnan; P, Ganeshkumar

    2015-01-01

    A Road Accident Prevention (RAP) scheme based on Vehicular Backbone Network (VBN) structure is proposed in this paper for Vehicular Ad-hoc Network (VANET). The RAP scheme attempts to prevent vehicles from highway road traffic accidents and thereby reduces death and injury rates. Once the possibility of an emergency situation (i.e. an accident) is predicted in advance, instantly RAP initiates a highway road traffic accident prevention scheme. The RAP scheme constitutes the following activities: (i) the Road Side Unit (RSU) constructs a Prediction Report (PR) based on the status of the vehicles and traffic in the highway roads, (ii) the RSU generates an Emergency Warning Message (EWM) based on an abnormal PR, (iii) the RSU forms a VBN structure and (iv) the RSU disseminates the EWM to the vehicles that holds the high Risk Factor (RF) and travels in High Risk Zone (HRZ). These vehicles might reside either within the RSU’s coverage area or outside RSU’s coverage area (reached using VBN structure). The RAP scheme improves the performance of EWM dissemination in terms of increase in notification and decrease in end-to-end delay. The RAP scheme also reduces infrastructure cost (number of RSUs) by formulating and deploying the VBN structure. The RAP scheme with VBN structure improves notification by 19 percent and end-to-end delay by 14.38 percent for a vehicle density of 160 vehicles. It is also proved from the simulation experiment that the performance of RAP scheme is promising in 4-lane highway roads. PMID:26636576

  4. Ad Hoc Conference on the Education of Migrants: Introductory Report on Theme I, "The Position of the Immigrant and His Family on Arrival in the Host Country" (Strasbourg, France, November 5-8, 1974).

    ERIC Educational Resources Information Center

    Morin, Emma

    Theme I of the Ad Hoc Conference on the Education of Migrants was "measures to improve the position of the immigrant and his family at the time of arrival in the host country (including measures taken in the sending country on behalf of those intending to emigrate), primarily in respect of their educational circumstances". This report…

  5. MWRRET Value-Added Product: The Retrieval of Liquid Water Path and Precipitable Water Vapor from Microwave Radiometer (MWR) Datasets May 2009

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gaustad, KL; Turner, DD

    2009-05-30

    This report provides a short description of the Atmospheric Radiation Measurement (ARM) Climate Research Facility (ACRF) microwave radiometer (MWR) RETrievel (MWRRET) value-added product (VAP) algorithm. This algorithm utilizes a complementary physical retrieval method and applies brightness temperature offsets to reduce spurious liquid water path (LWP) bias in clear skies resulting in significantly improved precipitable water vapor (PWV) and LWP retrievals. We present a general overview of the technique, input parameters, output products, and describe data quality checks. A more complete discussion of the theory and results is given in Turner et al. (2007b).

  6. Emergency Situation Prediction Mechanism: A Novel Approach for Intelligent Transportation System Using Vehicular Ad Hoc Networks

    PubMed Central

    Gokulakrishnan, P.

    2015-01-01

    In Indian four-lane express highway, millions of vehicles are travelling every day. Accidents are unfortunate and frequently occurring in these highways causing deaths, increase in death toll, and damage to infrastructure. A mechanism is required to avoid such road accidents at the maximum to reduce the death toll. An Emergency Situation Prediction Mechanism, a novel and proactive approach, is proposed in this paper for achieving the best of Intelligent Transportation System using Vehicular Ad Hoc Network. ESPM intends to predict the possibility of occurrence of an accident in an Indian four-lane express highway. In ESPM, the emergency situation prediction is done by the Road Side Unit based on (i) the Status Report sent by the vehicles in the range of RSU and (ii) the road traffic flow analysis done by the RSU. Once the emergency situation or accident is predicted in advance, an Emergency Warning Message is constructed and disseminated to all vehicles in the area of RSU to alert and prevent the vehicles from accidents. ESPM performs well in emergency situation prediction in advance to the occurrence of an accident. ESPM predicts the emergency situation within 0.20 seconds which is comparatively less than the statistical value. The prediction accuracy of ESPM against vehicle density is found better in different traffic scenarios. PMID:26065014

  7. AD Hoc Study on Human Robot Interface Issues

    DTIC Science & Technology

    2002-09-01

    of joint range of motion limits on strength. When the angle of a fully deflected aircraft rudder/ brake pedal is beyond the limit of ankle...mobility, the pedal will seem to have excessive resistance. In addition, this will prevent the pilot from fully utilizing the brakes of the aircraft...importance and value added of HE efforts. 34 Center High-Mounted Brake Lights. In 1985, after extensive HE studies showing positive

  8. Neuroprotection as initial therapy in acute stroke. Third Report of an Ad Hoc Consensus Group Meeting. The European Ad Hoc Consensus Group.

    PubMed

    1998-01-01

    Although a considerable body of scientific data is now available on neuroprotection in acute ischaemic stroke, this field is not yet established in clinical practice. At its third meeting, the European Ad Hoc Consensus Group considered the potential for neuroprotection in acute stroke and the practical problems attendant on the existence of a very limited therapeutic window before irreversible brain damage occurs, and came to the following conclusions. NEUROPROTECTANTS IN CLINICAL DEVELOPMENT: Convincing clinical evidence for an efficacious neuroprotective treatment in acute stroke is still required. Caution should be exercised in interpreting and extrapolating experimental results to stroke patients, who are a very heterogeneous group. The limitations of the time windows and the outcome measures chosen in trials of acute stroke therapy have an important influence on the results. The overall distribution of functional outcomes provides more statistical information than the proportion above a threshold outcome value. Neurological outcome should also be assessed. Neuroprotectants should not be tested clinically in phase II or phase III trials in a time window that exceeds those determined in experimental studies. The harmful effects of a drug in humans may override its neuroprotective potential determined in animals. Agents that act at several different levels in the ischaemic cascade may be more effective than those with a single mechanism of action. CURRENT IN-HOSPITAL MANAGEMENT OF ACUTE STROKE: The four major physiological variables that must be monitored and managed are blood pressure, arterial blood gas levels, body temperature, and glycaemia. The effects of controlling these physiological variables have not been studied in prospective trials, though they may all contribute to the outcome of acute ischaemic stroke and affect the duration of the therapeutic window. Optimal physiological parameters are inherently neuroprotective. Trials of new agents for the

  9. Services oriented architectures and rapid deployment of ad-hoc health surveillance systems: lessons from Katrina relief efforts.

    PubMed

    Mirhaji, Parsa; Casscells, S Ward; Srinivasan, Arunkumar; Kunapareddy, Narendra; Byrne, Sean; Richards, David Mark; Arafat, Raouf

    2006-01-01

    During the Hurricane Katrina relief efforts, a new city was born overnight within the City of Houston to provide accommodation and health services for thousands of evacuees deprived of food, rest, medical attention, and sanitation. The hurricane victims had been exposed to flood water, toxic materials, physical injury, and mental stress. This scenario was an invitation for a variety of public health hazards, primarily infectious disease outbreaks. Early detection and monitoring of morbidity and mortality among evacuees due to unattended health conditions was an urgent priority and called for deployment of real-time surveillance to collect and analyze data at the scene, and to enable and guide appropriate response and planning activities. The University of Texas Health Science Center at Houston (UTHSC) and the Houston Department of Health and Human Services (HDHHS) deployed an ad hoc surveillance system overnight by leveraging Internet-based technologies and Services Oriented Architecture (SOA). The system was post-coordinated through the orchestration of Web Services such as information integration, natural language processing, syndromic case finding, and online analytical processing (OLAP). Here we will report the use of Internet-based and distributed architectures in providing timely, novel, and customizable solutions on demand for unprecedented events such as natural disasters.

  10. Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsaur, Woei-Jiunn; Pai, Haw-Tyng

    2008-11-01

    The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.

  11. Cluster Based Location-Aided Routing Protocol for Large Scale Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Wang, Yi; Dong, Liang; Liang, Taotao; Yang, Xinyu; Zhang, Deyun

    Routing algorithms with low overhead, stable link and independence of the total number of nodes in the network are essential for the design and operation of the large-scale wireless mobile ad hoc networks (MANET). In this paper, we develop and analyze the Cluster Based Location-Aided Routing Protocol for MANET (C-LAR), a scalable and effective routing algorithm for MANET. C-LAR runs on top of an adaptive cluster cover of the MANET, which can be created and maintained using, for instance, the weight-based distributed algorithm. This algorithm takes into consideration the node degree, mobility, relative distance, battery power and link stability of mobile nodes. The hierarchical structure stabilizes the end-to-end communication paths and improves the networks' scalability such that the routing overhead does not become tremendous in large scale MANET. The clusterheads form a connected virtual backbone in the network, determine the network's topology and stability, and provide an efficient approach to minimizing the flooding traffic during route discovery and speeding up this process as well. Furthermore, it is fascinating and important to investigate how to control the total number of nodes participating in a routing establishment process so as to improve the network layer performance of MANET. C-LAR is to use geographical location information provided by Global Position System to assist routing. The location information of destination node is used to predict a smaller rectangle, isosceles triangle, or circle request zone, which is selected according to the relative location of the source and the destination, that covers the estimated region in which the destination may be located. Thus, instead of searching the route in the entire network blindly, C-LAR confines the route searching space into a much smaller estimated range. Simulation results have shown that C-LAR outperforms other protocols significantly in route set up time, routing overhead, mean delay and packet

  12. Exploring the Role of Ad Hoc Grassroots Organizations Providing Humanitarian Aid on Lesvos, Greece

    PubMed Central

    Kitching, George Tjensvoll; J. Haavik, Hanne; Tandstad, Birgit J.; Zaman, Muhammad; Darj, Elisabeth

    2016-01-01

    Introduction: Syrian refugees displaced into Turkey have attempted high-risk sea migrations to reach safer destinations in Europe, most often initially arriving on the Greek island of Lesvos. These refugees were often in need of basic humanitarian assistance that has been provided in part by a new category of ad hoc grassroots organizations (AHGOs). The aim of this study was to understand the internal and external operations of these AHGOs and their role on Lesvos. Methods: The experiences of AHGOs were investigated through a qualitative research design utilizing semi-structured interviews with organization leaders and spokespersons. AHGOs identified through media and social media sources as new Lesvos-specific organizations were purposively invited to complete an interview over phone, Skype or email. Data analysis of the transcribed interviews was performed by Systematic Text Condensation. Results: Forty-one organizations were contacted and 13 interviews were conducted. Most organizations were formed in autumn 2015 responding to the greater influx of refugees and migrants at that time and reported an absence of professional humanitarian agencies providing aid on Lesvos. Three categories emerged from the material. Features of organizations; Features of volunteers and; Evolution of AHGOs. The organizations perceived themselves capable of evaluating needs, mobilizing resources, funding and providing quick response. The volunteers came with limited humanitarian experience and from a wide variety of nationalities and professional backgrounds, and the organizations developed while on Lesvos. Discussion: Knowledge from our findings of AHGOs response to this complex disaster on Lesvos could be utilized in future catastrophes. We conclude that AHGOs may prove effective at providing humanitarian aid in a surge response when international non-governmental organizations are unable to respond quickly. In future complex disasters AHGOs should be recognized as new humanitarian

  13. Exploring the Role of Ad Hoc Grassroots Organizations Providing Humanitarian Aid on Lesvos, Greece.

    PubMed

    Kitching, George Tjensvoll; J Haavik, Hanne; Tandstad, Birgit J; Zaman, Muhammad; Darj, Elisabeth

    2016-11-17

    Syrian refugees displaced into Turkey have attempted high-risk sea migrations to reach safer destinations in Europe, most often initially arriving on the Greek island of Lesvos. These refugees were often in need of basic humanitarian assistance that has been provided in part by a new category of ad hoc grassroots organizations (AHGOs). The aim of this study was to understand the internal and external operations of these AHGOs and their role on Lesvos. The experiences of AHGOs were investigated through a qualitative research design utilizing semi-structured interviews with organization leaders and spokespersons. AHGOs identified through media and social media sources as new Lesvos-specific organizations were purposively invited to complete an interview over phone, Skype or email. Data analysis of the transcribed interviews was performed by Systematic Text Condensation. Forty-one organizations were contacted and 13 interviews were conducted. Most organizations were formed in autumn 2015 responding to the greater influx of refugees and migrants at that time and reported an absence of professional humanitarian agencies providing aid on Lesvos. Three categories emerged from the material. Features of organizations; Features of volunteers and; Evolution of AHGOs. The organizations perceived themselves capable of evaluating needs, mobilizing resources, funding and providing quick response. The volunteers came with limited humanitarian experience and from a wide variety of nationalities and professional backgrounds, and the organizations developed while on Lesvos. Knowledge from our findings of AHGOs response to this complex disaster on Lesvos could be utilized in future catastrophes. We conclude that AHGOs may prove effective at providing humanitarian aid in a surge response when international non-governmental organizations are unable to respond quickly. In future complex disasters AHGOs should be recognized as new humanitarian actors and conditions should be made

  14. Obtaining appropriate interval estimates for age when multiple indicators are used: evaluation of an ad-hoc procedure.

    PubMed

    Fieuws, Steffen; Willems, Guy; Larsen-Tangmose, Sara; Lynnerup, Niels; Boldsen, Jesper; Thevissen, Patrick

    2016-03-01

    When an estimate of age is needed, typically multiple indicators are present as found in skeletal or dental information. There exists a vast literature on approaches to estimate age from such multivariate data. Application of Bayes' rule has been proposed to overcome drawbacks of classical regression models but becomes less trivial as soon as the number of indicators increases. Each of the age indicators can lead to a different point estimate ("the most plausible value for age") and a prediction interval ("the range of possible values"). The major challenge in the combination of multiple indicators is not the calculation of a combined point estimate for age but the construction of an appropriate prediction interval. Ignoring the correlation between the age indicators results in intervals being too small. Boldsen et al. (2002) presented an ad-hoc procedure to construct an approximate confidence interval without the need to model the multivariate correlation structure between the indicators. The aim of the present paper is to bring under attention this pragmatic approach and to evaluate its performance in a practical setting. This is all the more needed since recent publications ignore the need for interval estimation. To illustrate and evaluate the method, Köhler et al. (1995) third molar scores are used to estimate the age in a dataset of 3200 male subjects in the juvenile age range.

  15. Performance analysis of multi-radio routing protocol in cognitive radio ad hoc networks under different path failure rate

    NASA Astrophysics Data System (ADS)

    Che-Aron, Z.; Abdalla, A. H.; Abdullah, K.; Hassan, W. H.

    2013-12-01

    In recent years, Cognitive Radio (CR) technology has largely attracted significant studies and research. Cognitive Radio Ad Hoc Network (CRAHN) is an emerging self-organized, multi-hop, wireless network which allows unlicensed users to opportunistically access available licensed spectrum bands for data communication under an intelligent and cautious manner. However, in CRAHNs, a lot of failures can easily occur during data transmission caused by PU (Primary User) activity, topology change, node fault, or link degradation. In this paper, an attempt has been made to evaluate the performance of the Multi-Radio Link-Quality Source Routing (MR-LQSR) protocol in CRAHNs under different path failure rate. In the MR-LQSR protocol, the Weighted Cumulative Expected Transmission Time (WCETT) is used as the routing metric. The simulations are carried out using the NS-2 simulator. The protocol performance is evaluated with respect to performance metrics like average throughput, packet loss, average end-to-end delay and average jitter. From the simulation results, it is observed that the number of path failures depends on the PUs number and mobility rate of SUs (Secondary Users). Moreover, the protocol performance is greatly affected when the path failure rate is high, leading to major service outages.

  16. Ad hoc posterior tibial vessels perforator propeller flaps for the reconstruction of lower third leg soft- tissue defects.

    PubMed

    Balakrishnan, Thalaivirithan Margabandu; Ramkumar, Jayagosh; Jaganmohan, Janardhanan

    2017-01-01

    Lower third leg soft tissue defects with anatomical and pathological constraints are posing formidable challenges to reconstructive surgeon. This retrospective study was conducted to assess the effectiveness of ad hoc posterior tibial vessels perforator-propeller flaps for the reconstruction of small and medium sized soft tissue defects in the lower third leg. 22 patients (16 were males and 6 were females) were involved in this study between period of January 2012 and December 2016.We followed the protocol of initial non delineating exploratory incision made to find out single best perforator in all patients. All the defects in leg reconstructed with adhoc posterior tibial vessel propeller flaps. All 22 flaps survived well. All in an average of 13 months follow up period, had pain free walking, with minimal scarring and acceptable aesthesis at the reconstruction sites with no need for any secondary procedure. With inability of preoperatively dopplering the perforators in the lower third leg region, the exploratory posterior nondelineating incision was used in all cases to secure the single best perforator for the propeller flaps. Thus adhoc posterior tibial vessel propeller flaps are dependable, easily adoptable for the reconstruction of soft tissue defects of the lower third leg region.

  17. Ad hoc posterior tibial vessels perforator propeller flaps for the reconstruction of lower third leg soft- tissue defects

    PubMed Central

    Balakrishnan, Thalaivirithan Margabandu; Ramkumar, Jayagosh; Jaganmohan, Janardhanan

    2017-01-01

    Introduction: Lower third leg soft tissue defects with anatomical and pathological constraints are posing formidable challenges to reconstructive surgeon. Aim: This retrospective study was conducted to assess the effectiveness of ad hoc posterior tibial vessels perforator-propeller flaps for the reconstruction of small and medium sized soft tissue defects in the lower third leg. Patients and Methods: 22 patients (16 were males and 6 were females) were involved in this study between period of January 2012 and December 2016.We followed the protocol of initial non delineating exploratory incision made to find out single best perforator in all patients. All the defects in leg reconstructed with adhoc posterior tibial vessel propeller flaps. Results: All 22 flaps survived well. All in an average of 13 months follow up period, had pain free walking, with minimal scarring and acceptable aesthesis at the reconstruction sites with no need for any secondary procedure. Conclusion: With inability of preoperatively dopplering the perforators in the lower third leg region, the exploratory posterior nondelineating incision was used in all cases to secure the single best perforator for the propeller flaps. Thus adhoc posterior tibial vessel propeller flaps are dependable, easily adoptable for the reconstruction of soft tissue defects of the lower third leg region. PMID:29618863

  18. SPAR: a security- and power-aware routing protocol for wireless ad hoc and sensor networks

    NASA Astrophysics Data System (ADS)

    Oberoi, Vikram; Chigan, Chunxiao

    2005-05-01

    Wireless Ad Hoc and Sensor Networks (WAHSNs) are vulnerable to extensive attacks as well as severe resource constraints. To fulfill the security needs, many security enhancements have been proposed. Like wise, from resource constraint perspective, many power aware schemes have been proposed to save the battery power. However, we observe that for the severely resource limited and extremely vulnerable WAHSNs, taking security or power (or any other resource) alone into consideration for protocol design is rather inadequate toward the truly "secure-and-useful" WAHSNs. For example, from resource constraint perspective, we identify one of the potential problems, the Security-Capable-Congestion (SCC) behavior, for the WAHSNs routing protocols where only the security are concerned. On the other hand, the design approach where only scarce resource is concerned, such as many power-aware WAHSNs protocols, leaves security unconsidered and is undesirable to many WAHSNs application scenarios. Motivated by these observations, we propose a co-design approach, where both the high security and effective resource consumption are targeted for WAHSNs protocol design. Specifically, we propose a novel routing protocol, Security- and Power- Aware Routing (SPAR) protocol based on this co-design approach. In SPAR, the routing decisions are made based on both security and power as routing criteria. The idea of the SPAR mechanism is routing protocol independent and therefore can be broadly integrated into any of the existing WAHSNs routing protocols. The simulation results show that SPAR outperforms the WAHSNs routing protocols where security or power alone is considered, significantly. This research finding demonstrates the proposed security- and resource- aware co-design approach is promising towards the truly "secure-and-useful" WAHSNs.

  19. An advanced search engine for patent analytics in medicinal chemistry.

    PubMed

    Pasche, Emilie; Gobeill, Julien; Teodoro, Douglas; Gaudinat, Arnaud; Vishnykova, Dina; Lovis, Christian; Ruch, Patrick

    2012-01-01

    Patent collections contain an important amount of medical-related knowledge, but existing tools were reported to lack of useful functionalities. We present here the development of TWINC, an advanced search engine dedicated to patent retrieval in the domain of health and life sciences. Our tool embeds two search modes: an ad hoc search to retrieve relevant patents given a short query and a related patent search to retrieve similar patents given a patent. Both search modes rely on tuning experiments performed during several patent retrieval competitions. Moreover, TWINC is enhanced with interactive modules, such as chemical query expansion, which is of prior importance to cope with various ways of naming biomedical entities. While the related patent search showed promising performances, the ad-hoc search resulted in fairly contrasted results. Nonetheless, TWINC performed well during the Chemathlon task of the PatOlympics competition and experts appreciated its usability.

  20. Unsupervised algorithms for intrusion detection and identification in wireless ad hoc sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2009-05-01

    In previous work by the author, parameters across network protocol layers were selected as features in supervised algorithms that detect and identify certain intrusion attacks on wireless ad hoc sensor networks (WSNs) carrying multisensor data. The algorithms improved the residual performance of the intrusion prevention measures provided by any dynamic key-management schemes and trust models implemented among network nodes. The approach of this paper does not train algorithms on the signature of known attack traffic, but, instead, the approach is based on unsupervised anomaly detection techniques that learn the signature of normal network traffic. Unsupervised learning does not require the data to be labeled or to be purely of one type, i.e., normal or attack traffic. The approach can be augmented to add any security attributes and quantified trust levels, established during data exchanges among nodes, to the set of cross-layer features from the WSN protocols. A two-stage framework is introduced for the security algorithms to overcome the problems of input size and resource constraints. The first stage is an unsupervised clustering algorithm which reduces the payload of network data packets to a tractable size. The second stage is a traditional anomaly detection algorithm based on a variation of support vector machines (SVMs), whose efficiency is improved by the availability of data in the packet payload. In the first stage, selected algorithms are adapted to WSN platforms to meet system requirements for simple parallel distributed computation, distributed storage and data robustness. A set of mobile software agents, acting like an ant colony in securing the WSN, are distributed at the nodes to implement the algorithms. The agents move among the layers involved in the network response to the intrusions at each active node and trustworthy neighborhood, collecting parametric values and executing assigned decision tasks. This minimizes the need to move large amounts

  1. Performance evaluation of reactive and proactive routing protocol in IEEE 802.11 ad hoc network

    NASA Astrophysics Data System (ADS)

    Hamma, Salima; Cizeron, Eddy; Issaka, Hafiz; Guédon, Jean-Pierre

    2006-10-01

    Wireless technology based on the IEEE 802.11 standard is widely deployed. This technology is used to support multiple types of communication services (data, voice, image) with different QoS requirements. MANET (Mobile Adhoc NETwork) does not require a fixed infrastructure. Mobile nodes communicate through multihop paths. The wireless communication medium has variable and unpredictable characteristics. Furthermore, node mobility creates a continuously changing communication topology in which paths break and new one form dynamically. The routing table of each router in an adhoc network must be kept up-to-date. MANET uses Distance Vector or Link State algorithms which insure that the route to every host is always known. However, this approach must take into account the adhoc networks specific characteristics: dynamic topologies, limited bandwidth, energy constraints, limited physical security, ... Two main routing protocols categories are studied in this paper: proactive protocols (e.g. Optimised Link State Routing - OLSR) and reactive protocols (e.g. Ad hoc On Demand Distance Vector - AODV, Dynamic Source Routing - DSR). The proactive protocols are based on periodic exchanges that update the routing tables to all possible destinations, even if no traffic goes through. The reactive protocols are based on on-demand route discoveries that update routing tables only for the destination that has traffic going through. The present paper focuses on study and performance evaluation of these categories using NS2 simulations. We have considered qualitative and quantitative criteria. The first one concerns distributed operation, loop-freedom, security, sleep period operation. The second are used to assess performance of different routing protocols presented in this paper. We can list end-to-end data delay, jitter, packet delivery ratio, routing load, activity distribution. Comparative study will be presented with number of networking context consideration and the results show

  2. Design and Analysis of A Beacon-Less Routing Protocol for Large Volume Content Dissemination in Vehicular Ad Hoc Networks.

    PubMed

    Hu, Miao; Zhong, Zhangdui; Ni, Minming; Baiocchi, Andrea

    2016-11-01

    Large volume content dissemination is pursued by the growing number of high quality applications for Vehicular Ad hoc NETworks(VANETs), e.g., the live road surveillance service and the video-based overtaking assistant service. For the highly dynamical vehicular network topology, beacon-less routing protocols have been proven to be efficient in achieving a balance between the system performance and the control overhead. However, to the authors' best knowledge, the routing design for large volume content has not been well considered in the previous work, which will introduce new challenges, e.g., the enhanced connectivity requirement for a radio link. In this paper, a link Lifetime-aware Beacon-less Routing Protocol (LBRP) is designed for large volume content delivery in VANETs. Each vehicle makes the forwarding decision based on the message header information and its current state, including the speed and position information. A semi-Markov process analytical model is proposed to evaluate the expected delay in constructing one routing path for LBRP. Simulations show that the proposed LBRP scheme outperforms the traditional dissemination protocols in providing a low end-to-end delay. The analytical model is shown to exhibit a good match on the delay estimation with Monte Carlo simulations, as well.

  3. Design and Analysis of A Beacon-Less Routing Protocol for Large Volume Content Dissemination in Vehicular Ad Hoc Networks

    PubMed Central

    Hu, Miao; Zhong, Zhangdui; Ni, Minming; Baiocchi, Andrea

    2016-01-01

    Large volume content dissemination is pursued by the growing number of high quality applications for Vehicular Ad hoc NETworks(VANETs), e.g., the live road surveillance service and the video-based overtaking assistant service. For the highly dynamical vehicular network topology, beacon-less routing protocols have been proven to be efficient in achieving a balance between the system performance and the control overhead. However, to the authors’ best knowledge, the routing design for large volume content has not been well considered in the previous work, which will introduce new challenges, e.g., the enhanced connectivity requirement for a radio link. In this paper, a link Lifetime-aware Beacon-less Routing Protocol (LBRP) is designed for large volume content delivery in VANETs. Each vehicle makes the forwarding decision based on the message header information and its current state, including the speed and position information. A semi-Markov process analytical model is proposed to evaluate the expected delay in constructing one routing path for LBRP. Simulations show that the proposed LBRP scheme outperforms the traditional dissemination protocols in providing a low end-to-end delay. The analytical model is shown to exhibit a good match on the delay estimation with Monte Carlo simulations, as well. PMID:27809285

  4. Autobiographical Memory Performance in Alzheimer's Disease Depends on Retrieval Frequency.

    PubMed

    Müller, Stephan; Mychajliw, Christian; Reichert, Carolin; Melcher, Tobias; Leyhe, Thomas

    2016-04-18

    Alzheimer's disease (AD) is characterized by memory disturbances primarily caused by pathogenic mechanisms affecting medial temporal lobe structures. As proposed by current theories of memory formation, this decrease is mediated by the age of the acquired knowledge. However, they cannot fully explain specific patterns of retrograde amnesia in AD. In the current study we examined an alternative approach and investigated whether the extent and severity of retrograde amnesia in AD is mediated by the frequency of memory retrieval or whether it depends on the mere age of knowledge. We compared recall of autobiographical incidents from three life periods in patients with amnestic mild cognitive impairment (aMCI), patients with early dementia of Alzheimer type (eDAT), and healthy control (HC) individuals using the Autobiographical Memory Interview. Retrieval frequency was operationalized by a paired comparison analysis. In contrast to HC individuals, recall of autobiographical incidents was impaired in patients with aMCI and eDAT following Ribot's gradient, with a reduced memory loss for remote compared to more recent life events. However, there was a strong effect of retrieval frequency on memory performance with frequently retrieved incidents memorized in more detail than less frequently retrieved episodes. Remote memories were recalled more often than recent ones. These findings suggest that more frequently retrieved autobiographical memories generally become more independent of the hippocampal complex and might thus be better protected against early hippocampal damage related to AD. Hence, the extent of retrograde amnesia in AD appears mainly mediated by the frequency of memory retrieval, which could plausibly explain why cognitive activity can effectively delay the onset of memory decline in AD.

  5. The Kuroshio Extension low-frequency variability analyzed with altimeter data through an ad hoc composite index

    NASA Astrophysics Data System (ADS)

    Pierini, Stefano; Gentile, Vittorio; de Ruggiero, Paola; Pietranera, Luca

    2017-04-01

    The Kuroshio Extension (KE) low-frequency variability (LFV) is analyzed with the satellite altimeter data distributed by AVISO from January 1993 to November 2015 through a new ad hoc composite index [1] that links the mean latitudinal position L of the KE jet and an integrated wavelet amplitude A measuring the high-frequency variability (HFV) of the KE path. This approach allows one to follow the KE evolution as an orbit in the (L,A) plane, as typically done in dynamical systems theory. Three intervals, I1 (1993-1998), I2 (1998-2006) and I3 (2006-November 2015) are separately analyzed also with sea surface height (SSH) maps. In I1 and I3, L and A are mostly anti-correlated and a recharging phase (characterized by a weak convoluted jet experiencing a rapid increase of the HFV) begins when negative SSH anomalies, remotely generated by the Pacific Decadal Oscillation, reach the KE region. On the other hand, in I2 the KE evolution is described by a hysteresis loop: this starts with a weak jet state followed by a recharging phase leading, in turn, to a persistent two-meander state, to its progressive and rapid erosion and, eventually, to the reestablishment of a weak jet state. This loop is found to correspond quite closely to the highly nonlinear intrinsic relaxation oscillation obtained in numerical process studies [1,2]. This supports the hypothesis that the KE LFV may have been controlled, during I2, by an intrinsic oceanic mode of variability. [1] Pierini S., 2015. J. Climate, 28, 5873-5881. [2] Pierini S., 2006. J. Phys. Oceanogr., 36, 1605-1625.

  6. Hearings before the Ad Hoc Committee on Maritime Education and Training of the Committee on Merchant Marine and Fisheries, Ninety-Third Congress; Second Session on Officer Requirements, and Session on Maritime Education Regarding Safety at Sea. Serial No. 93-44.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. House Committee on Merchant Marine and Fisheries.

    The publication consists of Congressional hearings before the Ad Hoc Committee on Maritime Education and Training: (1) June 26, 1974 hearing pertaining to officer requirements and (2) November 19, 1974 hearing on maritime education regarding safety at sea. Estimated cost per graduate for the U. S. Merchant Marine 1973 class was $31,100. Supply and…

  7. Retrieval monitoring and anosognosia in Alzheimer's disease.

    PubMed

    Gallo, David A; Chen, Jennifer M; Wiseman, Amy L; Schacter, Daniel L; Budson, Andrew E

    2007-09-01

    This study explored the relationship between episodic memory and anosognosia (a lack of deficit awareness) among patients with mild Alzheimer's disease (AD). Participants studied words and pictures for subsequent memory tests. Healthy older adults made fewer false recognition errors when trying to remember pictures compared with words, suggesting that the perceptual distinctiveness of picture memories enhanced retrieval monitoring (the distinctiveness heuristic). In contrast, although participants with AD could discriminate between studied and nonstudied items, they had difficulty recollecting the specific presentation formats (words or pictures), and they had limited use of the distinctiveness heuristic. Critically, the demands of the memory test modulated the relationship between memory accuracy and anosognosia. Greater anosognosia was associated with impaired memory accuracy when participants with AD tried to remember words but not when they tried to remember pictures. These data further delineate the retrieval monitoring difficulties among individuals with AD and suggest that anosognosia measures are most likely to correlate with memory tests that require the effortful retrieval of nondistinctive information. (PsycINFO Database Record (c) 2007 APA, all rights reserved).

  8. Fuzzy Logic-based Intelligent Scheme for Enhancing QoS of Vertical Handover Decision in Vehicular Ad-hoc Networks

    NASA Astrophysics Data System (ADS)

    Azzali, F.; Ghazali, O.; Omar, M. H.

    2017-08-01

    The design of next generation networks in various technologies under the “Anywhere, Anytime” paradigm offers seamless connectivity across different coverage. A conventional algorithm such as RSSThreshold algorithm, that only uses the received strength signal (RSS) as a metric, will decrease handover performance regarding handover latency, delay, packet loss, and handover failure probability. Moreover, the RSS-based algorithm is only suitable for horizontal handover decision to examine the quality of service (QoS) compared to the vertical handover decision in advanced technologies. In the next generation network, vertical handover can be started based on the user’s convenience or choice rather than connectivity reasons. This study proposes a vertical handover decision algorithm that uses a Fuzzy Logic (FL) algorithm, to increase QoS performance in heterogeneous vehicular ad-hoc networks (VANET). The study uses network simulator 2.29 (NS 2.29) along with the mobility traffic network and generator to implement simulation scenarios and topologies. This helps the simulation to achieve a realistic VANET mobility scenario. The required analysis on the performance of QoS in the vertical handover can thus be conducted. The proposed Fuzzy Logic algorithm shows improvement over the conventional algorithm (RSSThreshold) in the average percentage of handover QoS whereby it achieves 20%, 21% and 13% improvement on handover latency, delay, and packet loss respectively. This is achieved through triggering a process in layer two and three that enhances the handover performance.

  9. Foundations for statistical-physical precipitation retrieval from passive microwave satellite measurements. I - Brightness-temperature properties of a time-dependent cloud-radiation model

    NASA Technical Reports Server (NTRS)

    Smith, Eric A.; Mugnai, Alberto; Cooper, Harry J.; Tripoli, Gregory J.; Xiang, Xuwu

    1992-01-01

    The relationship between emerging microwave brightness temperatures (T(B)s) and vertically distributed mixtures of liquid and frozen hydrometeors was investigated, using a cloud-radiation model, in order to establish the framework for a hybrid statistical-physical rainfall retrieval algorithm. Although strong relationships were found between the T(B) values and various rain parameters, these correlations are misleading in that the T(B)s are largely controlled by fluctuations in the ice-particle mixing ratios, which in turn are highly correlated to fluctuations in liquid-particle mixing ratios. However, the empirically based T(B)-rain-rate (T(B)-RR) algorithms can still be used as tools for estimating precipitation if the hydrometeor profiles used for T(B)-RR algorithms are not specified in an ad hoc fashion.

  10. Lentiviral haemopoietic stem-cell gene therapy in early-onset metachromatic leukodystrophy: an ad-hoc analysis of a non-randomised, open-label, phase 1/2 trial.

    PubMed

    Sessa, Maria; Lorioli, Laura; Fumagalli, Francesca; Acquati, Serena; Redaelli, Daniela; Baldoli, Cristina; Canale, Sabrina; Lopez, Ignazio D; Morena, Francesco; Calabria, Andrea; Fiori, Rossana; Silvani, Paolo; Rancoita, Paola M V; Gabaldo, Michela; Benedicenti, Fabrizio; Antonioli, Gigliola; Assanelli, Andrea; Cicalese, Maria Pia; Del Carro, Ubaldo; Sora, Maria Grazia Natali; Martino, Sabata; Quattrini, Angelo; Montini, Eugenio; Di Serio, Clelia; Ciceri, Fabio; Roncarolo, Maria Grazia; Aiuti, Alessandro; Naldini, Luigi; Biffi, Alessandra

    2016-07-30

    Metachromatic leukodystrophy (a deficiency of arylsulfatase A [ARSA]) is a fatal demyelinating lysosomal disease with no approved treatment. We aimed to assess the long-term outcomes in a cohort of patients with early-onset metachromatic leukodystrophy who underwent haemopoietic stem-cell gene therapy (HSC-GT). This is an ad-hoc analysis of data from an ongoing, non-randomised, open-label, single-arm phase 1/2 trial, in which we enrolled patients with a molecular and biochemical diagnosis of metachromatic leukodystrophy (presymptomatic late-infantile or early-juvenile disease or early-symptomatic early-juvenile disease) at the Paediatric Clinical Research Unit, Ospedale San Raffaele, in Milan. Trial participants received HSC-GT, which consisted of the infusion of autologous HSCs transduced with a lentiviral vector encoding ARSA cDNA, after exposure-targeted busulfan conditioning. The primary endpoints of the trial are safety (toxicity, absence of engraftment failure or delayed haematological reconstitution, and safety of lentiviral vector-tranduced cell infusion) and efficacy (improvement in Gross Motor Function Measure [GMFM] score relative to untreated historical controls, and ARSA activity, 24 months post-treatment) of HSC-GT. For this ad-hoc analysis, we assessed safety and efficacy outcomes in all patients who had received treatment and been followed up for at least 18 months post-treatment on June 1, 2015. This trial is registered with ClinicalTrials.gov, number NCT01560182. Between April, 2010, and February, 2013, we had enrolled nine children with a diagnosis of early-onset disease (six had late-infantile disease, two had early-juvenile disease, and one had early-onset disease that could not be definitively classified). At the time of analysis all children had survived, with a median follow-up of 36 months (range 18-54). The most commonly reported adverse events were cytopenia (reported in all patients) and mucositis of different grades of severity (in five

  11. Ad Hoc Influenza Vaccination During Years of Significant Antigenic Drift in a Tropical City With 2 Seasonal Peaks: A Cross-Sectional Survey Among Health Care Practitioners.

    PubMed

    Wong, Martin C S; Nelson, E Anthony S; Leung, Czarina; Lee, Nelson; Chan, Martin C W; Choi, Kin Wing; Rainer, Timothy H; Cheng, Frankie W T; Wong, Samuel Y S; Lai, Christopher K C; Lam, Bosco; Cheung, Tak Hong; Leung, Ting Fan; Chan, Paul K S

    2016-05-01

    We evaluated the acceptability of an additional ad hoc influenza vaccination among the health care professionals following seasons with significant antigenic drift.Self-administered, anonymous surveys were performed by hard copy questionnaires in public hospitals, and by an on-line platform available to all healthcare professionals, from April 1st to May 31st, 2015. A total of 1290 healthcare professionals completed the questionnaires, including doctors, nurses, and allied health professionals working in both the public and private systems.Only 31.8% of participating respondents expressed an intention to receive the additional vaccine, despite that the majority of them agreed or strongly agreed that it would bring benefit to the community (88.9%), save lives (86.7%), reduce medical expenses (76.3%), satisfy public expectation (82.8%), and increase awareness of vaccination (86.1%). However, a significant proportion expressed concern that the vaccine could disturb the normal immunization schedule (45.5%); felt uncertain what to do in the next vaccination round (66.0%); perceived that the summer peak might not occur (48.2%); and believed that the summer peak might not be of the same virus (83.5%). Furthermore, 27.8% of all respondents expected that the additional vaccination could weaken the efficacy of previous vaccinations; 51.3% was concerned about side effects; and 61.3% estimated that there would be a low uptake rate. If the supply of vaccine was limited, higher priority groups were considered to include the elderly aged ≥65 years with chronic medical conditions (89.2%), the elderly living in residential care homes (87.4%), and long-stay residents of institutions for the disabled (80.7%). The strongest factors associated with accepting the additional vaccine included immunization with influenza vaccines in the past 3 years, higher perceived risk of contracting influenza, and higher perceived severity of the disease impact.The acceptability to an additional ad

  12. Infrared spectra of two isomers of protonated carbonyl sulfide (HOCS+ and HSCO+) and t-HOCS in solid para-hydrogen.

    PubMed

    Tsuge, Masashi; Lee, Yuan-Pern

    2016-10-28

    We report infrared (IR) spectra of HOCS + , HSCO + , t-HOCS, and other species produced on electron bombardment of a mixture of carbonyl sulfide (OCS) and para-hydrogen (p-H 2 ) during deposition at 3.2 K. After maintenance of the matrix in darkness for 15 h, the intensities of absorption features of HOCS + at 2945.9 (ν 1 ), 1875.3 (ν 2 ), and 1041.9 (ν 3 ) cm -1 and those of HSCO + at 2506.9 (ν 1 ) and 2074.2 (ν 2 ) cm -1 decreased through neutralization with trapped electrons. Lines observed at 3563.4, 1394.8, and 1199.0 cm -1 , which decreased slightly in intensity after maintenance in darkness and were nearly depleted after irradiation at 373 nm, are assigned to a t-HOCS radical. The corresponding spectra of their 13 C- and D-isotopologues were observed. The IR spectra of HSCO + and t-HOCS and those of modes ν 2 and ν 3 of HOCS + are new. The assignments were made according to the expected chemical behavior and a comparison of experimental and calculated wavenumbers and 13 C- and D-isotopic shifts. The wavenumber of the OH stretching mode (2945.9 cm -1 ) of HOCS + in solid p-H 2 is significantly red-shifted from that (3435.16 cm -1 ) reported for gaseous HOCS + ; this shift is attributed to partial sharing of a proton between OCS and H 2 . The corresponding p-H 2 induced shift is small in HSCO + because of a much weaker interaction between HSCO + and H 2 .

  13. IDMA: improving the defense against malicious attack for mobile ad hoc networks based on ARIP protocol

    NASA Astrophysics Data System (ADS)

    Peng, Chaorong; Chen, Chang Wen

    2008-04-01

    Malicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks (MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes. However, the defense against malicious attack can be improved when a new layer of network architecture can be developed to separate true IP address from disclosing to the malicious nodes. In this paper, we propose a new algorithm to improve the defense against malicious attack (IDMA) that is based on a recently developed Assignment Router Identify Protocol (ARIP) for the clustering-based MANET management. In the ARIP protocol, we design the ARIP architecture based on the new Identity instead of the vulnerable IP addresses to provide the required security that is embedded seamlessly into the overall network architecture. We make full use of ARIP's special property to monitor gateway forward packets by Reply Request Route Packets (RREP) without additional intrusion detection layer. We name this new algorithm IDMA because of its inherent capability to improve the defense against malicious attacks. Through IDMA, a watching algorithm can be established so as to counterattack the malicious node in the routing path when it unusually drops up packets. We provide analysis examples for IDMA for the defense against a malicious node that disrupts the route discovery by impersonating the destination, or by responding with state of corrupted routing information, or by disseminating forged control traffic. The IDMA algorithm is able to counterattack the malicious node in the cases when the node lunch DoS attack by broadcast a large number of route requests, or make Target traffic congestion by delivering huge mount of data; or spoof the IP addresses and send forge packets with a fake ID to the same Target causing traffic congestion at that destination. We have implemented IDMA algorism using the GloMoSim simulator and have demonstrated its performance under a variety of

  14. MScanner: a classifier for retrieving Medline citations

    PubMed Central

    Poulter, Graham L; Rubin, Daniel L; Altman, Russ B; Seoighe, Cathal

    2008-01-01

    Background Keyword searching through PubMed and other systems is the standard means of retrieving information from Medline. However, ad-hoc retrieval systems do not meet all of the needs of databases that curate information from literature, or of text miners developing a corpus on a topic that has many terms indicative of relevance. Several databases have developed supervised learning methods that operate on a filtered subset of Medline, to classify Medline records so that fewer articles have to be manually reviewed for relevance. A few studies have considered generalisation of Medline classification to operate on the entire Medline database in a non-domain-specific manner, but existing applications lack speed, available implementations, or a means to measure performance in new domains. Results MScanner is an implementation of a Bayesian classifier that provides a simple web interface for submitting a corpus of relevant training examples in the form of PubMed IDs and returning results ranked by decreasing probability of relevance. For maximum speed it uses the Medical Subject Headings (MeSH) and journal of publication as a concise document representation, and takes roughly 90 seconds to return results against the 16 million records in Medline. The web interface provides interactive exploration of the results, and cross validated performance evaluation on the relevant input against a random subset of Medline. We describe the classifier implementation, cross validate it on three domain-specific topics, and compare its performance to that of an expert PubMed query for a complex topic. In cross validation on the three sample topics against 100,000 random articles, the classifier achieved excellent separation of relevant and irrelevant article score distributions, ROC areas between 0.97 and 0.99, and averaged precision between 0.69 and 0.92. Conclusion MScanner is an effective non-domain-specific classifier that operates on the entire Medline database, and is suited to

  15. Estimating HIV Incidence during Pregnancy and Knowledge of Prevention of Mother-to-Child Transmission with an Ad Hoc Analysis of Potential Cofactors.

    PubMed

    Egbe, Thomas Obinchemti; Tazinya, Rose-Mary Asong; Halle-Ekane, Gregory Edie; Egbe, Eta-Nkongho; Achidi, Eric Akum

    2016-01-01

    We determined the incidence of HIV seroconversion during the second and third trimesters of pregnancy and ad hoc potential cofactors associated with HIV seroconversion after having an HIV-negative result antenatally. We also studied knowledge of PMTCT among pregnant women in seven health facilities in Fako Division, South West Region, Cameroon. During the period between September 12 and December 4, 2011, we recruited a cohort of 477 HIV-negative pregnant women by cluster sampling. Data collection was with a pretested interviewer-administered questionnaire. Sociodemographic information, knowledge of PMTCT, and methods of HIV prevention were obtained from the study population and we did Voluntary Counselling and Testing (VCT) for HIV. The incidence rate of HIV seroconversion during pregnancy was 6.8/100 woman-years. Ninety percent of the participants did not use condoms throughout pregnancy but had a good knowledge of PMTCT of HIV. Only 31.9% of participants knew their HIV status before the booking visit and 33% did not know the HIV status of their partners. The incidence rate of HIV seroconversion in the Fako Division, Cameroon, was 6.8/100 woman-years. No risk factors associated with HIV seroconversion were identified among the study participants because of lack of power to do so.

  16. Potential Retrieval of Aerosol Microphysics From Multistatic Space-Borne Lidar

    NASA Astrophysics Data System (ADS)

    Levitan, Nathaniel; Gross, Barry; Moshary, Fred; Wu, Yonghua

    2018-04-01

    HSRL lidars are being considered for deployment to space to retrieve aerosol microphysics. The literature is mostly focused on the monostatic configuration; but, in this paper, we explore whether additional information for the retrieval of microphysics can be obtained by adding a second detector in a bistatic configuration. The information gained from the additional measurements can under certain conditions reduce the ill-posed nature of aerosol microphysics retrieval and reducing the uncertainty in the retrievals.

  17. Ad-hoc surface-enhanced Raman spectroscopy methodologies for the detection of artist dyestuffs: thin layer chromatography-surface enhanced Raman spectroscopy and in situ on the fiber analysis.

    PubMed

    Brosseau, Christa L; Gambardella, Alessa; Casadio, Francesca; Grzywacz, Cecily M; Wouters, Jan; Van Duyne, Richard P

    2009-04-15

    Tailored ad-hoc methods must be developed for successful identification of minute amounts of natural dyes on works of art using Surface-Enhanced Raman Spectroscopy (SERS). This article details two of these successful approaches using silver film over nanosphere (AgFON) substrates and silica gel coupled with citrate-reduced Ag colloids. The latter substrate functions as the test system for the coupling of thin-layer chromatography and SERS (TLC-SERS), which has been used in the current research to separate and characterize a mixture of several artists' dyes. The poor limit of detection of TLC is overcome by coupling with SERS, and dyes which co-elute to nearly the same spot can be distinguished from each other. In addition, in situ extractionless non-hydrolysis SERS was used to analyze dyed reference fibers, as well as historical textile fibers. Colorants such as alizarin, purpurin, carminic acid, lac dye, crocin, and Cape jasmine were thus successfully identified.

  18. Word retrieval in picture descriptions produced by individuals with Alzheimer's disease

    PubMed Central

    Kavé, Gitit; Goral, Mira

    2016-01-01

    What can tests of single-word production tell us about word retrieval in connected speech? We examined this question in 20 people with Alzheimer's disease (AD) and in 20 cognitively intact individuals. All participants completed tasks of picture naming and semantic fluency, and provided connected speech through picture descriptions. Picture descriptions were analyzed for total word output, percentages of content words, percentages of nouns, and percentages of pronouns out of all words, type-token ratio of all words and type-token ratio of nouns alone, mean frequency of all words and mean frequency of nouns alone, and mean word length. Individuals with AD performed worse than did cognitively intact individuals on the picture naming and semantic fluency tasks. They also produced a lower proportion of content words overall, a lower proportion of nouns, and a higher proportion of pronouns, as well as more frequent and shorter words on picture descriptions. Group differences in total word output and type-token ratios did not reach significance. Correlations between scores on tasks of single-word retrieval and measures of retrieval in picture descriptions emerged in the AD group but not in the control group. Scores on a picture naming task were associated with difficulties in word retrieval in connected speech in AD, while scores on a task of semantic verbal fluency were less useful in predicting measures of retrieval in context in this population. PMID:27171756

  19. Ad Hoc Rural Regionalism

    ERIC Educational Resources Information Center

    Hamin, Elisabeth M.; Marcucci, Daniel J.

    2008-01-01

    A new regionalism has been much documented and researched for metropolitan areas; this article documents that there is a new rural regionalism as well. In the United States, these groups appear most likely to emerge in areas that are challenged by outcomes characterizing globalization's effects on the rural condition: namely, exurban or…

  20. Factors affecting the effectiveness of biomedical document indexing and retrieval based on terminologies.

    PubMed

    Dinh, Duy; Tamine, Lynda; Boubekeur, Fatiha

    2013-02-01

    The aim of this work is to evaluate a set of indexing and retrieval strategies based on the integration of several biomedical terminologies on the available TREC Genomics collections for an ad hoc information retrieval (IR) task. We propose a multi-terminology based concept extraction approach to selecting best concepts from free text by means of voting techniques. We instantiate this general approach on four terminologies (MeSH, SNOMED, ICD-10 and GO). We particularly focus on the effect of integrating terminologies into a biomedical IR process, and the utility of using voting techniques for combining the extracted concepts from each document in order to provide a list of unique concepts. Experimental studies conducted on the TREC Genomics collections show that our multi-terminology IR approach based on voting techniques are statistically significant compared to the baseline. For example, tested on the 2005 TREC Genomics collection, our multi-terminology based IR approach provides an improvement rate of +6.98% in terms of MAP (mean average precision) (p<0.05) compared to the baseline. In addition, our experimental results show that document expansion using preferred terms in combination with query expansion using terms from top ranked expanded documents improve the biomedical IR effectiveness. We have evaluated several voting models for combining concepts issued from multiple terminologies. Through this study, we presented many factors affecting the effectiveness of biomedical IR system including term weighting, query expansion, and document expansion models. The appropriate combination of those factors could be useful to improve the IR performance. Copyright © 2012 Elsevier B.V. All rights reserved.

  1. Impacts of Mass-dimension and Area-dimension relationships on retrieval ice particle effective radius from radar and lidar measurements

    NASA Astrophysics Data System (ADS)

    Ham, S. H.; Kato, S.; Rose, F. G.

    2016-12-01

    In the retrieval of ice clouds from Radar and Lidar Measurements, mass-Dimension (m-D) and Area-Dimension (A-D) relationships are often used to describe nonspherical ice particle shapes. This study analytically investigates how the assumption of m-D and A-D relationships affects retrieval of ice effective radius. We use gamma and lognormal particle distributions and integrate optical parameters over the size distribution. The effective radius is expressed as a function of radar reflectivity factor, visible extinction coefficient, and parameters describing m-D and A-D relationships. The analytic expressions are used for converting effective radius retrieved from one set of m-D and A-D relationships into that with another set of m-D and A-D, including plates, solid columns, bullets, and mixture of different habits. The conversion method can be used for consistent radiative transfer simulation with cloud retrieval algorithms. In addition, when we want to merge cloud effective radii retrieved from different m-D and A-D, the conversion method can be efficiently used to remove undesired biases caused by m-D and A-D assumptions. Furthermore, the sensitivity of the effective radius to m-D and A-D relationships can be quantified by taking the first derivative of the effective radius with respect to parameters expressing the m-D and A-D relationships.

  2. Getting What You Want: Accurate Document Filtering in a Terabyte World

    DTIC Science & Technology

    2002-11-01

    models are used widely in speech recognition and have shown promise for ad-hoc information retrieval (Ponte and Croft, 1998; Lafferty and Zhai, 2001...tasks is focused on developing techniques similar to those used in speech recognition. However the differing requirements of speech recognition and...Conference on Research and Development in Information Retrieval. ACM. 6. T.Ault, and Y. Yang. (2001.) kNN at TREC-9: A failure analysis. In

  3. Solving data-at-rest for the storage and retrieval of files in ad hoc networks

    NASA Astrophysics Data System (ADS)

    Knobler, Ron; Scheffel, Peter; Williams, Jonathan; Gaj, Kris; Kaps, Jens-Peter

    2013-05-01

    Based on current trends for both military and commercial applications, the use of mobile devices (e.g. smartphones and tablets) is greatly increasing. Several military applications consist of secure peer to peer file sharing without a centralized authority. For these military applications, if one or more of these mobile devices are lost or compromised, sensitive files can be compromised by adversaries, since COTS devices and operating systems are used. Complete system files cannot be stored on a device, since after compromising a device, an adversary can attack the data at rest, and eventually obtain the original file. Also after a device is compromised, the existing peer to peer system devices must still be able to access all system files. McQ has teamed with the Cryptographic Engineering Research Group at George Mason University to develop a custom distributed file sharing system to provide a complete solution to the data at rest problem for resource constrained embedded systems and mobile devices. This innovative approach scales very well to a large number of network devices, without a single point of failure. We have implemented the approach on representative mobile devices as well as developed an extensive system simulator to benchmark expected system performance based on detailed modeling of the network/radio characteristics, CONOPS, and secure distributed file system functionality. The simulator is highly customizable for the purpose of determining expected system performance for other network topologies and CONOPS.

  4. Retrieval of constituent mixing ratios from limb thermal emission spectra

    NASA Technical Reports Server (NTRS)

    Shaffer, William A.; Kunde, Virgil G.; Conrath, Barney J.

    1988-01-01

    An onion-peeling iterative, least-squares relaxation method to retrieve mixing ratio profiles from limb thermal emission spectra is presented. The method has been tested on synthetic data, containing various amounts of added random noise for O3, HNO3, and N2O. The retrieval method is used to obtain O3 and HNO3 mixing ratio profiles from high-resolution thermal emission spectra. Results of the retrievals compare favorably with those obtained previously.

  5. Ad-hoc and context-dependent adjustments of selective attention in conflict control: an ERP study with visual probes.

    PubMed

    Nigbur, R; Schneider, J; Sommer, W; Dimigen, O; Stürmer, B

    2015-02-15

    Cognitive conflict control in flanker tasks has often been described using the zoom-lens metaphor of selective attention. However, whether and how selective attention - in terms of suppression and enhancement - operates in this context has remained unclear. To examine the dynamic interplay of selective attention and cognitive control we used electrophysiological measures and presented task-irrelevant visual probe stimuli at foveal, parafoveal, and peripheral display positions. Target-flanker congruency varied either randomly from trial to trial (mixed-block) or block-wise (fixed-block) in order to induce reactive versus proactive control modes, respectively. Three EEG measures were used to capture ad-hoc adjustments within trials as well as effects of context-based predictions: the N1 component of the visual evoked potential (VEP) to probes, the VEP to targets, and the conflict-related midfrontal N2 component. Results from probe-VEPs indicate that enhanced processing of the foveal target rather than suppression of the peripheral flankers supports interference control. In incongruent mixed-block trials VEPs were larger to probes near the targets. In the fixed-blocks probe-VEPs were not modulated, but contrary to the mixed-block the preceding target-related VEP was affected by congruency. Results of the control-related N2 reveal largest amplitudes in the unpredictable context, which did not differentiate for stimulus and response incongruency. In contrast, in the predictable context, N2 amplitudes were reduced overall and differentiated between stimulus and response incongruency. Taken together these results imply that predictability alters interference control by a reconfiguration of stimulus processing. During unpredictable sequences participants adjust their attentional focus dynamically on a trial-by-trial basis as reflected in congruency-dependent probe-VEP-modulation. This reactive control mode also elicits larger N2 amplitudes. In contrast, when task demands

  6. Calculations concerning the HCO(+)/HOC(+) abundance ratio in dense interstellar clouds

    NASA Technical Reports Server (NTRS)

    Defrees, D. J.; Mclean, A. D.; Herbst, E.

    1984-01-01

    Calculations have been performed to determine the rate coefficients of several reactions involved in both the formation and depletion of interstellar HCO(+) and HOC(+). The abundance of HOC(+) deduced from these calculations is consistent with the tentative identification of HOC(+) in Sgr B2 by Woods et al. (1983). The large HCO(+)/HOC(+) abundance ratio observed by Woods et al. is due at least in part to a more rapid formation rate for HCO(+) and probably due as well to a more rapid depletion rate for HOC(+).

  7. Memory for past public events depends on retrieval frequency but not memory age in Alzheimer's disease.

    PubMed

    Müller, Stephan; Mychajliw, Christian; Hautzinger, Martin; Fallgatter, Andreas J; Saur, Ralf; Leyhe, Thomas

    2014-01-01

    Alzheimer's disease (AD) is characterized by retrograde memory deficits primarily caused by dysfunction of the hippocampal complex. Unresolved questions exist concerning the time course of hippocampal involvement in conscious recollection of declarative knowledge, as reports of temporal gradients of retrograde amnesia have been inconclusive. The aim of this study was to examine whether the extent and severity of retrograde amnesia is mediated by retrieval frequency or, in contrast, whether it depends on the age of the memory according to the assumptions of the main current theories of memory formation. We compared recall of past public events in patients with AD and healthy control (HC) individuals using the Historic Events Test (HET). The HET assesses knowledge about famous public events of the past 60 years divided into four time segments and consists of subjective memory rating, dating accuracy, and contextual memory tasks. Although memory for public events was impaired in AD patients, there was a strong effect of retrieval frequency across all time segments and both groups. As AD and HC groups derived similar benefits from greater retrieval frequency, cortical structures other than the hippocampal complex may mediate memory retrieval. These findings suggest that more frequently retrieved events and facts become more independent of the hippocampal complex and thus better protected against early damage of AD. This could explain why cognitive activity may delay the onset of memory decline in persons who develop AD.

  8. Impact of auditory-visual bimodality on lexical retrieval in Alzheimer's disease patients.

    PubMed

    Simoes Loureiro, Isabelle; Lefebvre, Laurent

    2015-01-01

    The aim of this study was to generalize the positive impact of auditory-visual bimodality on lexical retrieval in Alzheimer's disease (AD) patients. In practice, the naming skills of healthy elderly persons improve when additional sensory signals are included. The hypothesis of this study was that the same influence would be observable in AD patients. Sixty elderly patients separated into three groups (healthy subjects, stage 1 AD patients, and stage 2 AD patients) were tested with a battery of naming tasks comprising three different modalities: a visual modality, an auditory modality, and a visual and auditory modality (bimodality). Our results reveal the positive influence of bimodality on the accuracy with which bimodal items are named (when compared with unimodal items) and their latency (when compared with unimodal auditory items). These results suggest that multisensory enrichment can improve lexical retrieval in AD patients.

  9. Sea Training at Maritime Academies Oversight. Hearings Before the Ad Hoc Select Subcommittee on Maritime Education and Training of the Committee on Merchant Marine and Fisheries, House of Representatives, Ninety-Sixth Congress, Second Session on Sea Training of United States Merchant Marine Officers and Different Ways of Satisfying This Requirement at the Various Maritime Academies.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. House Committee on Merchant Marine and Fisheries.

    Recorded are minutes of hearings before the House Ad Hoc Select Subcommittee on Maritime Education and Training regarding the sea training of United States Merchant Marine officers. Examined are various approaches to meeting the sea training requirement, especially the options of maritime academy training vessels, sailing on U.S.-flag merchant…

  10. Examining impacts of mass-diameter (m-D) and area-diameter (A-D) relationships of ice particles on retrievals of effective radius and ice water content from radar and lidar measurements

    NASA Astrophysics Data System (ADS)

    Ham, Seung-Hee; Kato, Seiji; Rose, Fred G.

    2017-03-01

    Mass-diameter (m-D) and projected area-diameter (A-D) relations are often used to describe the shape of nonspherical ice particles. This study analytically investigates how retrieved effective radius (reff) and ice water content (IWC) from radar and lidar measurements depend on the assumption of m-D [m(D) = a Db] and A-D [A(D) = γ Dδ] relationships. We assume that unattenuated reflectivity factor (Z) and visible extinction coefficient (kext) by cloud particles are available from the radar and lidar measurements, respectively. A sensitivity test shows that reff increases with increasing a, decreasing b, decreasing γ, and increasing δ. It also shows that a 10% variation of a, b, γ, and δ induces more than a 100% change of reff. In addition, we consider both gamma and lognormal particle size distributions (PSDs) and examine the sensitivity of reff to the assumption of PSD. It is shown that reff increases by up to 10% with increasing dispersion (μ) of the gamma PSD by 2, when large ice particles are predominant. Moreover, reff decreases by up to 20% with increasing the width parameter (ω) of the lognormal PSD by 0.1. We also derive an analytic conversion equation between two effective radii when different particle shapes and PSD assumptions are used. When applying the conversion equation to nine types of m-D and A-D relationships, reff easily changes up to 30%. The proposed reff conversion method can be used to eliminate the inconsistency of assumptions that made in a cloud retrieval algorithm and a forward radiative transfer model.

  11. Lexical retrieval in discourse: An early indicator of Alzheimer's dementia

    PubMed Central

    Pekkala, Seija; Wiener, Debra; Himali, Jayandra J.J.; Beiser, Alexa S.; Obler, Loraine K.; Liu, Yulin; McKee, Ann; Auerbach, Sanford; Seshadri, Sudha; Wolf, Philip A.; Au, Rhoda

    2014-01-01

    We examined the progression of lexical-retrieval deficits in individuals with neuropathologically determined Alzheimer's disease (AD; n = 23) and a comparison group without criteria for AD (n = 24) to determine whether linguistic changes were a significant marker of the disease. Our participants underwent multiple administrations of a neuropsychological battery, with initial administration occurring on average 16 years prior to death. The battery included the Boston Naming Test (BNT), a letter fluency task (FAS), and written description of the Cookie Theft Picture (CTP). Repeated measures analysis revealed that the AD-group showed progressively greater decline in FAS and CTP lexical performance than the comparison group. Cross-sectional time-specific group comparisons indicated that the CTP differentiated performance between the two groups at 7–9 years prior to death and FAS and BNT only at 2–4 years. These results suggest that lexical-retrieval deficits in written discourse serve as an early indicator of AD. PMID:23985011

  12. Lexical retrieval in discourse: an early indicator of Alzheimer's dementia.

    PubMed

    Pekkala, Seija; Wiener, Debra; Himali, Jayandra J; Beiser, Alexa S; Obler, Loraine K; Liu, Yulin; McKee, Ann; Auerbach, Sanford; Seshadri, Sudha; Wolf, Philip A; Au, Rhoda

    2013-12-01

    We examined the progression of lexical-retrieval deficits in individuals with neuropathologically determined Alzheimer's disease (AD; n = 23) and a comparison group without criteria for AD (n = 24) to determine whether linguistic changes were a significant marker of the disease. Our participants underwent multiple administrations of a neuropsychological battery, with initial administration occurring on average 16 years prior to death. The battery included the Boston Naming Test (BNT), a letter fluency task (FAS) and written description of the Cookie Theft Picture (CTP). Repeated measures analysis revealed that the AD-group showed progressively greater decline in FAS and CTP lexical performance than the comparison group. Cross-sectional time-specific group comparisons indicated that the CTP differentiated performance between the two groups at 7-9 years prior to death and FAS and BNT only at 2-4 years. These results suggest that lexical-retrieval deficits in written discourse serve as an early indicator of AD.

  13. A Theory of Term Importance in Automatic Text Analysis.

    ERIC Educational Resources Information Center

    Salton, G.; And Others

    Most existing automatic content analysis and indexing techniques are based on work frequency characteristics applied largely in an ad hoc manner. Contradictory requirements arise in this connection, in that terms exhibiting high occurrence frequencies in individual documents are often useful for high recall performance (to retrieve many relevant…

  14. Achieving Congestion Mitigation Using Distributed Power Control for Spectrum Sensor Nodes in Sensor Network-Aided Cognitive Radio Ad Hoc Networks

    PubMed Central

    Zhuo, Fan; Duan, Hucai

    2017-01-01

    The data sequence of spectrum sensing results injected from dedicated spectrum sensor nodes (SSNs) and the data traffic from upstream secondary users (SUs) lead to unpredictable data loads in a sensor network-aided cognitive radio ad hoc network (SN-CRN). As a result, network congestion may occur at a SU acting as fusion center when the offered data load exceeds its available capacity, which degrades network performance. In this paper, we present an effective approach to mitigate congestion of bottlenecked SUs via a proposed distributed power control framework for SSNs over a rectangular grid based SN-CRN, aiming to balance resource load and avoid excessive congestion. To achieve this goal, a distributed power control framework for SSNs from interior tier (IT) and middle tier (MT) is proposed to achieve the tradeoff between channel capacity and energy consumption. In particular, we firstly devise two pricing factors by considering stability of local spectrum sensing and spectrum sensing quality for SSNs. By the aid of pricing factors, the utility function of this power control problem is formulated by jointly taking into account the revenue of power reduction and the cost of energy consumption for IT or MT SSN. By bearing in mind the utility function maximization and linear differential equation constraint of energy consumption, we further formulate the power control problem as a differential game model under a cooperation or noncooperation scenario, and rigorously obtain the optimal solutions to this game model by employing dynamic programming. Then the congestion mitigation for bottlenecked SUs is derived by alleviating the buffer load over their internal buffers. Simulation results are presented to show the effectiveness of the proposed approach under the rectangular grid based SN-CRN scenario. PMID:28914803

  15. Dual-Retrieval Models and Neurocognitive Impairment

    ERIC Educational Resources Information Center

    Brainerd, C. J.; Reyna, V. F.; Gomes, C. F. A.; Kenney, A. E.; Gross, C. J.; Taub, E. S.; Spreng, R. N.

    2014-01-01

    Advances in dual-retrieval models of recall make it possible to use clinical data to test theoretical hypotheses about mild cognitive impairment (MCI) and Alzheimer's dementia (AD), the most common forms of neurocognitive impairment. Hypotheses about the nature of the episodic memory declines in these diseases, about decline versus sparing of…

  16. Treatment of category generation and retrieval in aphasia: Effect of typicality of category items.

    PubMed Central

    Kiran, Swathi; Sandberg, Chaleece; Sebastian, Rajani

    2011-01-01

    Purpose: Kiran and colleagues (Kiran, 2007, 2008; Kiran & Johnson, 2008; Kiran & Thompson, 2003) have previously suggested that training atypical examples within a semantic category is a more efficient treatment approach to facilitating generalization within the category than training typical examples. The present study extended our previous work examining the notion of semantic complexity within goal-derived (ad-hoc) categories in individuals with aphasia. Methods: Six individuals with fluent aphasia (range = 39-84 years) and varying degrees of naming deficits and semantic impairments were involved. Thirty typical and atypical items each from two categories were selected after an extensive stimulus norming task. Generative naming for the two categories was tested during baseline and treatment. Results: As predicted, training atypical examples in the category resulted in generalization to untrained typical examples in five out the five patient-treatment conditions. In contrast, training typical examples (which was in examined three conditions) produced mixed results. One patient showed generalization to untrained atypical examples, whereas two patients did not show generalization to untrained atypical examples. Conclusions: Results of the present study supplement our existing data on the effect of a semantically based treatment for lexical retrieval by manipulating the typicality of category exemplars. PMID:21173393

  17. Cross-layer design for intrusion detection and data security in wireless ad hoc sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2007-09-01

    A wireless ad hoc sensor network is a configuration for area surveillance that affords rapid, flexible deployment in arbitrary threat environments. There is no infrastructure support and sensor nodes communicate with each other only when they are in transmission range. The nodes are severely resource-constrained, with limited processing, memory and power capacities and must operate cooperatively to fulfill a common mission in typically unattended modes. In a wireless sensor network (WSN), each sensor at a node can observe locally some underlying physical phenomenon and sends a quantized version of the observation to sink (destination) nodes via wireless links. Since the wireless medium can be easily eavesdropped, links can be compromised by intrusion attacks from nodes that may mount denial-of-service attacks or insert spurious information into routing packets, leading to routing loops, long timeouts, impersonation, and node exhaustion. A cross-layer design based on protocol-layer interactions is proposed for detection and identification of various intrusion attacks on WSN operation. A feature set is formed from selected cross-layer parameters of the WSN protocol to detect and identify security threats due to intrusion attacks. A separate protocol is not constructed from the cross-layer design; instead, security attributes and quantified trust levels at and among nodes established during data exchanges complement customary WSN metrics of energy usage, reliability, route availability, and end-to-end quality-of-service (QoS) provisioning. Statistical pattern recognition algorithms are applied that use observed feature-set patterns observed during network operations, viewed as security audit logs. These algorithms provide the "best" network global performance in the presence of various intrusion attacks. A set of mobile (software) agents distributed at the nodes implement the algorithms, by moving among the layers involved in the network response at each active node

  18. Evaluation of absorbent materials for use as ad hoc dry decontaminants during mass casualty incidents as part of the UK’s Initial Operational Response (IOR)

    PubMed Central

    Kassouf, Nick; Syed, Sara; Larner, Joanne; Amlôt, Richard

    2017-01-01

    The UK’s Initial Operational Response (IOR) is a revised process for the medical management of mass casualties potentially contaminated with hazardous materials. A critical element of the IOR is the introduction of immediate, on-scene disrobing and decontamination of casualties to limit the adverse health effects of exposure. Ad hoc cleansing of the skin with dry absorbent materials has previously been identified as a potential means of facilitating emergency decontamination. The purpose of this study was to evaluate the in vitro oil and water absorbency of a range of materials commonly found in the domestic and clinical environments and to determine the effectiveness of a small, but representative selection of such materials in skin decontamination, using an established ex vivo model. Five contaminants were used in the study: methyl salicylate, parathion, diethyl malonate, phorate and potassium cyanide. In vitro measurements of water and oil absorbency did not correlate with ex vivo measurements of skin decontamination. When measured ex vivo, dry decontamination was consistently more effective than a standard wet decontamination method (“rinse-wipe-rinse”) for removing liquid contaminants. However, dry decontamination was ineffective against particulate contamination. Collectively, these data confirm that absorbent materials such as wound dressings and tissue paper provide an effective, generic capability for emergency removal of liquid contaminants from the skin surface, but that wet decontamination should be used for non-liquid contaminants. PMID:28152053

  19. Memory retrieval by activating engram cells in mouse models of early Alzheimer's disease.

    PubMed

    Roy, Dheeraj S; Arons, Autumn; Mitchell, Teryn I; Pignatelli, Michele; Ryan, Tomás J; Tonegawa, Susumu

    2016-03-24

    Alzheimer's disease (AD) is a neurodegenerative disorder characterized by progressive memory decline and subsequent loss of broader cognitive functions. Memory decline in the early stages of AD is mostly limited to episodic memory, for which the hippocampus has a crucial role. However, it has been uncertain whether the observed amnesia in the early stages of AD is due to disrupted encoding and consolidation of episodic information, or an impairment in the retrieval of stored memory information. Here we show that in transgenic mouse models of early AD, direct optogenetic activation of hippocampal memory engram cells results in memory retrieval despite the fact that these mice are amnesic in long-term memory tests when natural recall cues are used, revealing a retrieval, rather than a storage impairment. Before amyloid plaque deposition, the amnesia in these mice is age-dependent, which correlates with a progressive reduction in spine density of hippocampal dentate gyrus engram cells. We show that optogenetic induction of long-term potentiation at perforant path synapses of dentate gyrus engram cells restores both spine density and long-term memory. We also demonstrate that an ablation of dentate gyrus engram cells containing restored spine density prevents the rescue of long-term memory. Thus, selective rescue of spine density in engram cells may lead to an effective strategy for treating memory loss in the early stages of AD.

  20. Monitoring of slope-instabilities and deformations with Micro-Electro-Mechanical-Systems (MEMS) in wireless ad-hoc Sensor Networks

    NASA Astrophysics Data System (ADS)

    Arnhardt, C.; Fernández-Steeger, T. M.; Azzam, R.

    2009-04-01

    In most mountainous regions, landslides represent a major threat to human life, properties and infrastructures. Nowadays existing landslide monitoring systems are often characterized by high efforts in terms of purchase, installation, maintenance, manpower and material. In addition (or because of this) only small areas or selective points of the endangered zone can be observed by the system. Therefore the improvement of existing and the development of new monitoring and warning systems are of high relevance. The joint project "Sensor based Landslide Early Warning Systems" (SLEWS) deals with the development of a prototypic Alarm- and Early Warning system (EWS) for different types of landslides using low-cost micro-sensors (MEMS) integrated in a wireless sensor network (WSN). Modern so called Ad-Hoc, Multi-Hop wireless sensor networks (WSN) are characterized by a self organizing and self-healing capacity of the system (autonomous systems). The network consists of numerous individual and own energy-supply operating sensor nodes, that can send data packages from their measuring devices (here: MEMS) over other nodes (Multi-Hop) to a collection point (gateway). The gateway provides the interface to central processing and data retrieval units (PC, Laptop or server) outside the network. In order to detect and monitor the different landslide processes (like fall, topple, spreading or sliding) 3D MEMS capacitive sensors made from single silicon crystals and glass were chosen to measure acceleration, tilting and altitude changes. Based on the so called MEMS (Micro-Electro-Mechanical Systems) technology, the sensors combine very small mechanical and electronic units, sensing elements and transducers on a small microchip. The mass production of such type of sensors allows low cost applications in different areas (like automobile industries, medicine, and automation technology). Apart from the small and so space saving size and the low costs another advantage is the energy

  1. Comparison between two lidar methods to retrieve microphysical properties of liquid-water clouds

    NASA Astrophysics Data System (ADS)

    Jimenez, Cristofer; Ansmann, Albert; Donovan, David; Engelmann, Ronny; Schmidt, Jörg; Wandinger, Ulla

    2018-04-01

    Since 2010, the Raman dual-FOV lidar system permits the retrieval of microphysical properties of liquid-water clouds during nighttime. A new robust lidar depolarization approach was recently introduced, which permits the retrieval of these properties as well, with high temporal resolution and during daytime. To implement this approach, the lidar system was upgraded, by adding a three channel depolarization receiver. The first preliminary retrieval results and a comparison between both methods is presented.

  2. Post hoc analyses: after the facts.

    PubMed

    Srinivas, Titte R; Ho, Bing; Kang, Joseph; Kaplan, Bruce

    2015-01-01

    Prospective clinical trials are constructed with high levels of internal validity. Sample size and power considerations usually address primary endpoints. Primary endpoints have traditionally included events that are becoming increasingly less common and thus have led to growing use of composite endpoints and noninferiority trial designs in transplantation. This approach may mask real clinical benefit in one or the other domain with regard to either clinically relevant secondary endpoints or other unexpected findings. In addition, endpoints solely chosen based on power considerations are prone to misjudgment of actual treatment effect size as well as consistency of that effect. In the instances where treatment effects may have been underestimated, valuable information may be lost if buried within a composite endpoint. In all these cases, analyses and post hoc analyses of data become relevant in informing practitioners about clinical benefits or safety signals that may not be captured by the primary endpoint. On the other hand, there are many pitfalls in using post hoc determined endpoints. This short review is meant to allow readers to appreciate post hoc analysis not as an entity with a single approach, but rather as an analysis with unique limitations and strengths that often raise new questions to be addressed in further inquiries.

  3. On the Post Hoc Power in Testing Mean Differences

    ERIC Educational Resources Information Center

    Yuan, Ke-Hai; Maxwell, Scott

    2005-01-01

    Retrospective or post hoc power analysis is recommended by reviewers and editors of many journals. Little literature has been found that gave a serious study of the post hoc power. When the sample size is large, the observed effect size is a good estimator of the true power. This article studies whether such a power estimator provides valuable…

  4. Robust keyword retrieval method for OCRed text

    NASA Astrophysics Data System (ADS)

    Fujii, Yusaku; Takebe, Hiroaki; Tanaka, Hiroshi; Hotta, Yoshinobu

    2011-01-01

    Document management systems have become important because of the growing popularity of electronic filing of documents and scanning of books, magazines, manuals, etc., through a scanner or a digital camera, for storage or reading on a PC or an electronic book. Text information acquired by optical character recognition (OCR) is usually added to the electronic documents for document retrieval. Since texts generated by OCR generally include character recognition errors, robust retrieval methods have been introduced to overcome this problem. In this paper, we propose a retrieval method that is robust against both character segmentation and recognition errors. In the proposed method, the insertion of noise characters and dropping of characters in the keyword retrieval enables robustness against character segmentation errors, and character substitution in the keyword of the recognition candidate for each character in OCR or any other character enables robustness against character recognition errors. The recall rate of the proposed method was 15% higher than that of the conventional method. However, the precision rate was 64% lower.

  5. Spaced-retrieval effects on name-face recognition in older adults with probable Alzheimer's disease.

    PubMed

    Hawley, Karri S; Cherry, Katie E

    2004-03-01

    Six older adults with probable Alzheimer's disease (AD) were trained to recall a name-face association using the spaced-retrieval method. We administered six training sessions over a 2-week period. On each trial, participants selected a target photograph and stated the target name, from eight other photographs, at increasingly longer retention intervals. Results yielded a positive effect of spaced-retrieval training for name-face recognition. All participants were able to select the target photograph and state the target's name for longer periods of time within and across training sessions. A live-person transfer task was administered to determine whether the name-face association, trained by spaced-retrieval, would transfer to a live person. Half of the participants were able to call the live person by the correct name. These data provide initial evidence that spaced-retrieval training can aid older adults with probable AD in recall of a name-face association and in transfer of that association to an actual person.

  6. Comparative evaluation of polarimetric and bi-spectral cloud microphysics retrievals: Retrieval closure experiments and comparisons based on idealized and LES case studies

    NASA Astrophysics Data System (ADS)

    Miller, D. J.; Zhang, Z.; Ackerman, A. S.; Platnick, S. E.; Cornet, C.

    2016-12-01

    A remote sensing cloud retrieval simulator, created by coupling an LES cloud model with vector radiative transfer (RT) models is the ideal framework for assessing cloud remote sensing techniques. This simulator serves as a tool for understanding bi-spectral and polarimetric retrievals by comparing them directly to LES cloud properties (retrieval closure comparison) and for comparing the retrieval techniques to one another. Our simulator utilizes the DHARMA LES [Ackerman et al., 2004] with cloud properties based on marine boundary layer (MBL) clouds observed during the DYCOMS-II and ATEX field campaigns. The cloud reflectances are produced by the vectorized RT models based on polarized doubling adding and monte carlo techniques (PDA, MCPOL). Retrievals are performed utilizing techniques as similar as possible to those implemented on their corresponding well known instruments; polarimetric retrievals are based on techniques implemented for polarimeters (POLDER, AirMSPI, and RSP) and bi-spectral retrievals are performed using the Nakajima-King LUT method utilized on a number of spectral instruments (MODIS and VIIRS). Retrieval comparisons focus on cloud droplet effective radius (re), effective variance (ve), and cloud optical thickness (τ). This work explores the sensitivities of these two retrieval techniques to various observation limitations, such as spatial resolution/cloud inhomogeneity, impact of 3D radiative effects, and angular resolution requirements. With future remote sensing missions like NASA's Aerosols/Clouds/Ecosystems (ACE) planning to feature advanced polarimetric instruments it is important to understand how these retrieval techniques compare to one another. The cloud retrieval simulator we've developed allows us to probe these important questions in a realistically relevant test bed.

  7. A reanalysis of the HCO(+)/HOC(+) abundance ratio in dense interstellar clouds

    NASA Technical Reports Server (NTRS)

    Jarrold, M. F.; Bowers, M. T.; Defrees, D. J.; Mclean, A. D.; Herbst, E.

    1986-01-01

    New theoretical and experimental results have prompted a reinvestigation of the HCO(+)/HOC(+) abundance ratio in dense interstellar clouds. These results pertain principally but not exclusively to the reaction between HOC(+) and H2, which was previously calculated by DeFrees et al. (1984) to possess a large activation energy barrier. New calculations, reported here, indicate that this activation energy barrier is quite small and may well be zero. In addition, experimental results at higher energy and temperature indicate strongly that the reaction proceeds efficiently at interstellar temperatures. If HOC(+) does indeed react efficiently with H2 in interstellar clouds, the calculated HCO(+)/HOC(+) abundance ratio rises to a substantially greater value under standard dense cloud conditions than is deduced via the tentative observation of HOC(+) in Sgr B2.

  8. Volcanic Ash Retrievals Using ORAC and Satellite Measurements in the Visible and IR

    NASA Astrophysics Data System (ADS)

    Mcgarragh, Gregory R.; Thomas, Gareth E.; Povey, Adam C.; Poulsen, Caroline A.; Grainger, Roy G.

    2015-11-01

    The Optimal Retrieval of Aerosol and Cloud (ORAC) is a generalized optimal estimation system that uses visible to infrared measurements from a wide range of instruments including AATSR, AVHRR, MODIS and SEVIRI. Recently, support to retrieve volcanic ash has been added for which it retrieves optical thickness, effective radius and cloud top pressure. In this proceeding we discuss the implementation of the volcanic ash retrieval in ORAC including the retrieval methodology, forward model, sources of uncertainty and the discrimination of ash from aerosol and cloud. Results are presented that are consistent with a well know eruption from both AATSR and MODIS while results of a full SEVIRI retrieval of ash, aerosol and cloud properties relative to the ash is are discussed.

  9. Combining Passive Microwave Sounders with CYGNSS information for improved retrievals: Observations during Hurricane Harvey

    NASA Astrophysics Data System (ADS)

    Schreier, M. M.

    2017-12-01

    The launch of CYGNSS (Cyclone Global Navigation Satellite System) has added an interesting component to satellite observations: it can provide wind speeds in the tropical area with a high repetition rate. Passive microwave sounders that are overpassing the same region can benefit from this information, when it comes to the retrieval of temperature or water profiles: the uncertainty about wind speeds has a strong impact on emissivity and reflectivity calculations with respect to surface temperature. This has strong influences on the uncertainty of retrieval of temperature and water content, especially under extreme weather conditions. Adding CYGNSS information to the retrieval can help to reduce errors and provide a significantly better sounder retrieval. Based on observations during Hurricane Harvey, we want to show the impact of CYGNSS data on the retrieval of passive microwave sensors. We will show examples on the impact on the retrieval from polar orbiting instruments, like the Advanced Technology Microwave Sounder (ATMS) and AMSU-A/B on NOAA-18 and 19. In addition we will also show the impact on retrievals from HAMSR (High Altitude MMIC Sounding Radiometer), which was flying on the Global Hawk during the EPOCH campaign. We will compare the results with other observations and estimate the impact of additional CYGNSS information on the microwave retrieval, especially on the impact in error and uncertainty reduction. We think, that a synergetic use of these different data sources could significantly help to produce better assimilation products for forecast assimilation.

  10. Ten Years of Cloud Optical and Microphysical Retrievals from MODIS

    NASA Technical Reports Server (NTRS)

    Platnick, Steven; King, Michael D.; Wind, Galina; Hubanks, Paul; Arnold, G. Thomas; Amarasinghe, Nandana

    2010-01-01

    The MODIS cloud optical properties algorithm (MOD06/MYD06 for Terra and Aqua MODIS, respectively) has undergone extensive improvements and enhancements since the launch of Terra. These changes have included: improvements in the cloud thermodynamic phase algorithm; substantial changes in the ice cloud light scattering look up tables (LUTs); a clear-sky restoral algorithm for flagging heavy aerosol and sunglint; greatly improved spectral surface albedo maps, including the spectral albedo of snow by ecosystem; inclusion of pixel-level uncertainty estimates for cloud optical thickness, effective radius, and water path derived for three error sources that includes the sensitivity of the retrievals to solar and viewing geometries. To improve overall retrieval quality, we have also implemented cloud edge removal and partly cloudy detection (using MOD35 cloud mask 250m tests), added a supplementary cloud optical thickness and effective radius algorithm over snow and sea ice surfaces and over the ocean, which enables comparison with the "standard" 2.1 11m effective radius retrieval, and added a multi-layer cloud detection algorithm. We will discuss the status of the MOD06 algorithm and show examples of pixellevel (Level-2) cloud retrievals for selected data granules, as well as gridded (Level-3) statistics, notably monthly means and histograms (lD and 2D, with the latter giving correlations between cloud optical thickness and effective radius, and other cloud product pairs).

  11. Sex effects on spatial learning but not on spatial memory retrieval in healthy young adults.

    PubMed

    Piber, Dominique; Nowacki, Jan; Mueller, Sven C; Wingenfeld, Katja; Otte, Christian

    2018-01-15

    Sex differences have been found in spatial learning and spatial memory, with several studies indicating that males outperform females. We tested in the virtual Morris Water Maze (vMWM) task, whether sex differences in spatial cognitive processes are attributable to differences in spatial learning or spatial memory retrieval in a large student sample. We tested 90 healthy students (45 women and 45 men) with a mean age of 23.5 years (SD=3.5). Spatial learning and spatial memory retrieval were measured by using the vMWM task, during which participants had to search a virtual pool for a hidden platform, facilitated by visual cues surrounding the pool. Several learning trials assessed spatial learning, while a separate probe trial assessed spatial memory retrieval. We found a significant sex effect during spatial learning, with males showing shorter latency and shorter path length, as compared to females (all p<0.001). Yet, there was no significant sex effect in spatial memory retrieval (p=0.615). Furthermore, post-hoc analyses revealed significant sex differences in spatial search strategies (p<0.05), but no difference in the number of platform crossings (p=0.375). Our results indicate that in healthy young adults, males show faster spatial learning in a virtual environment, as compared to females. Interestingly, we found no significant sex differences during spatial memory retrieval. Our study raises the question, whether men and women use different learning strategies, which nevertheless result in equal performances of spatial memory retrieval. Copyright © 2017 Elsevier B.V. All rights reserved.

  12. Paged GIRS (Graph Information Retrieval System) Users Manual.

    DTIC Science & Technology

    1981-05-01

    AD-Ag" in DAVID W TAYLOR NAVAL SHIP RESEARCH AND OEVELOPMENT CE--ETC F/9 5/2 PAGED GIRS (GRAPWN ZORM4ATION RETRIEVAL SYSTEM) USERS MANUAL.(U) MAY 61...PERFORMING ORGANIZATION NAME AND ADDRESS 10. PROGRAM ELEMENT. PROJECT. TASK AREA A WORK UNIT MBESS David W . Taylor Naval Ship Research and Development...CURAG(2) - 1 0060 J =0 0061 CALL LVFPEX(J,: ’,J,J) C C NO MORE CONTINUANTS " 0062 IF(MSARET ,IE. O) GO TO S0 90 AD-A*" &1*5 DAVID W TAYLOR NAVAL. SHIP

  13. Co-adding techniques for image-based wavefront sensing for segmented-mirror telescopes

    NASA Astrophysics Data System (ADS)

    Smith, J. S.; Aronstein, David L.; Dean, Bruce H.; Acton, D. S.

    2007-09-01

    Image-based wavefront sensing algorithms are being used to characterize the optical performance for a variety of current and planned astronomical telescopes. Phase retrieval recovers the optical wavefront that correlates to a series of diversity-defocused point-spread functions (PSFs), where multiple frames can be acquired at each defocus setting. Multiple frames of data can be co-added in different ways; two extremes are in "image-plane space," to average the frames for each defocused PSF and use phase retrieval once on the averaged images, or in "pupil-plane space," to use phase retrieval on each PSF frame individually and average the resulting wavefronts. The choice of co-add methodology is particularly noteworthy for segmented-mirror telescopes that are subject to noise that causes uncorrelated motions between groups of segments. Using models and data from the James Webb Space Telescope (JWST) Testbed Telescope (TBT), we show how different sources of noise (uncorrelated segment jitter, turbulence, and common-mode noise) and different parts of the optical wavefront, segment and global aberrations, contribute to choosing the co-add method. Of particular interest, segment piston is more accurately recovered in "image-plane space" co-adding, while segment tip/tilt is recovered in "pupil-plane space" co-adding.

  14. The Advantages of Using Planned Comparisons over Post Hoc Tests.

    ERIC Educational Resources Information Center

    Kuehne, Carolyn C.

    There are advantages to using a priori or planned comparisons rather than omnibus multivariate analysis of variance (MANOVA) tests followed by post hoc or a posteriori testing. A small heuristic data set is used to illustrate these advantages. An omnibus MANOVA test was performed on the data followed by a post hoc test (discriminant analysis). A…

  15. Algorithmic, LOCS and HOCS (chemistry) exam questions: performance and attitudes of college students

    NASA Astrophysics Data System (ADS)

    Zoller, Uri

    2002-02-01

    The performance of freshmen biology and physics-mathematics majors and chemistry majors as well as pre- and in-service chemistry teachers in two Israeli universities on algorithmic (ALG), lower-order cognitive skills (LOCS), and higher-order cognitive skills (HOCS) chemistry exam questions were studied. The driving force for the study was an interest in moving science and chemistry instruction from an algorithmic and factual recall orientation dominated by LOCS, to a decision-making, problem-solving and critical system thinking approach, dominated by HOCS. College students' responses to the specially designed ALG, LOCS and HOCS chemistry exam questions were scored and analysed for differences and correlation between the performance means within and across universities by the questions' category. This was followed by a combined student interview - 'speaking aloud' problem solving session for assessing the thinking processes involved in solving these types of questions and the students' attitudes towards them. The main findings were: (1) students in both universities performed consistently in each of the three categories in the order of ALG > LOCS > HOCS; their 'ideological' preference, was HOCS > algorithmic/LOCS, - referred to as 'computational questions', but their pragmatic preference was the reverse; (2) success on algorithmic/LOCS does not imply success on HOCS questions; algorithmic questions constitute a category on its own as far as students success in solving them is concerned. Our study and its results support the effort being made, worldwide, to integrate HOCS-fostering teaching and assessment strategies and, to develop HOCS-oriented science-technology-environment-society (STES)-type curricula within science and chemistry education.

  16. Initial retrieval shields against retrieval-induced forgetting

    PubMed Central

    Racsmány, Mihály; Keresztes, Attila

    2015-01-01

    Testing, as a form of retrieval, can enhance learning but it can also induce forgetting of related memories, a phenomenon known as retrieval-induced forgetting (RIF). In four experiments we explored whether selective retrieval and selective restudy of target memories induce forgetting of related memories with or without initial retrieval of the entire learning set. In Experiment 1, subjects studied category-exemplar associations, some of which were then either restudied or retrieved. RIF occurred on a delayed final test only when memories were retrieved and not when they were restudied. In Experiment 2, following the study phase of category-exemplar associations, subjects attempted to recall all category-exemplar associations, then they selectively retrieved or restudied some of the exemplars. We found that, despite the huge impact on practiced items, selective retrieval/restudy caused no decrease in final recall of related items. In Experiment 3, we replicated the main result of Experiment 2 by manipulating initial retrieval as a within-subject variable. In Experiment 4 we replicated the main results of the previous experiments with non-practiced (Nrp) baseline items. These findings suggest that initial retrieval of the learning set shields against the forgetting effect of later selective retrieval. Together, our results support the context shift theory of RIF. PMID:26052293

  17. Initial retrieval shields against retrieval-induced forgetting.

    PubMed

    Racsmány, Mihály; Keresztes, Attila

    2015-01-01

    Testing, as a form of retrieval, can enhance learning but it can also induce forgetting of related memories, a phenomenon known as retrieval-induced forgetting (RIF). In four experiments we explored whether selective retrieval and selective restudy of target memories induce forgetting of related memories with or without initial retrieval of the entire learning set. In Experiment 1, subjects studied category-exemplar associations, some of which were then either restudied or retrieved. RIF occurred on a delayed final test only when memories were retrieved and not when they were restudied. In Experiment 2, following the study phase of category-exemplar associations, subjects attempted to recall all category-exemplar associations, then they selectively retrieved or restudied some of the exemplars. We found that, despite the huge impact on practiced items, selective retrieval/restudy caused no decrease in final recall of related items. In Experiment 3, we replicated the main result of Experiment 2 by manipulating initial retrieval as a within-subject variable. In Experiment 4 we replicated the main results of the previous experiments with non-practiced (Nrp) baseline items. These findings suggest that initial retrieval of the learning set shields against the forgetting effect of later selective retrieval. Together, our results support the context shift theory of RIF.

  18. The Effectiveness of the Thesaurus Method in Automatic Information Retrieval. Technical Report No. 75-261.

    ERIC Educational Resources Information Center

    Yu, C. T.; Salton, G.

    Formal proofs are given of the effectiveness under well-defined conditions of the thesaurus method in information retrieval. It is shown, in particular, that when certain semantically related terms are added to the information queries originally submitted by the user population, a superior retrieval system is obtained in the sense that for every…

  19. Stress at work: development of the Stress Perception Questionnaire of Rome (SPQR), an ad hoc questionnaire for multidimensional assessment of work related stress.

    PubMed

    Cinti, M E; Cannavò, M; Fioravanti, M

    2017-01-01

    Stress is an emotional condition, mostly experienced as negative, initially identified and defined by Selye in the mid-thirties of the last Century. Since the first definition, stress concerns the adaptation pro- cess mostly related to environmental changes. An application of stress focuses on the evaluation of its interference on work conditions, and the scientific evidence on work related stress is very ample and rich. We are proposing a new ad hoc questionnaire for the multidimensional assessment of work related stress, called Stress Perception Question- naire of Rome (SPQR) composed of 50 items. The development of this questionnaire is based on a multi-step process: a) Identification of all the relevant topics to work related stress and areas in the scientific evidence and their transformation on specific contents of 60 tentative items; b) Exploratory factor analysis aimed to identify the best items (50) which could guarantee the maximum convergence on single scales (8), and the minimum redundancy between scales; c) Validation of the 8 scales' structure by a confirmatory factor analysis (fully achieved); d) Factor analysis for a second level factor resulting in a single factor identified as the questionnaire total score (Stress Score); d) Reliability analysis of the questionnaire total score and the single scale scores (at optimum level); e) Validation by external criteria of work related stress identified in the presence of personal violence episodes experienced by a group of health workers with different professional profiles and from two different hospitals in Rome. Our results show that the SPQR is a useful and sensitive tool for assessing the presence of emotional stress related problems identifiable in a work environment. The advantage of this questionnaire is that it allows for a multidimensional description of the different components of this problematic area besides its ability to quantify the overall stress level of those who have been administered

  20. Automatically assessing properties of dynamic cameras for camera selection and rapid deployment of video content analysis tasks in large-scale ad-hoc networks

    NASA Astrophysics Data System (ADS)

    den Hollander, Richard J. M.; Bouma, Henri; van Rest, Jeroen H. C.; ten Hove, Johan-Martijn; ter Haar, Frank B.; Burghouts, Gertjan J.

    2017-10-01

    Video analytics is essential for managing large quantities of raw data that are produced by video surveillance systems (VSS) for the prevention, repression and investigation of crime and terrorism. Analytics is highly sensitive to changes in the scene, and for changes in the optical chain so a VSS with analytics needs careful configuration and prompt maintenance to avoid false alarms. However, there is a trend from static VSS consisting of fixed CCTV cameras towards more dynamic VSS deployments over public/private multi-organization networks, consisting of a wider variety of visual sensors, including pan-tilt-zoom (PTZ) cameras, body-worn cameras and cameras on moving platforms. This trend will lead to more dynamic scenes and more frequent changes in the optical chain, creating structural problems for analytics. If these problems are not adequately addressed, analytics will not be able to continue to meet end users' developing needs. In this paper, we present a three-part solution for managing the performance of complex analytics deployments. The first part is a register containing meta data describing relevant properties of the optical chain, such as intrinsic and extrinsic calibration, and parameters of the scene such as lighting conditions or measures for scene complexity (e.g. number of people). A second part frequently assesses these parameters in the deployed VSS, stores changes in the register, and signals relevant changes in the setup to the VSS administrator. A third part uses the information in the register to dynamically configure analytics tasks based on VSS operator input. In order to support the feasibility of this solution, we give an overview of related state-of-the-art technologies for autocalibration (self-calibration), scene recognition and lighting estimation in relation to person detection. The presented solution allows for rapid and robust deployment of Video Content Analysis (VCA) tasks in large scale ad-hoc networks.

  1. Influence of controlled encoding and retrieval facilitation on memory performance in patients with different profiles of mild cognitive impairment.

    PubMed

    Perri, Roberta; Monaco, Marco; Fadda, Lucia; Serra, Laura; Marra, Camillo; Caltagirone, Carlo; Bruni, Amalia C; Curcio, Sabrina; Bozzali, M; Carlesimo, Giovanni A

    2015-01-01

    Memory tests able to differentiate encoding and retrieval processes from the memoranda storing ones should be used to differentiate patients in a very early phase of AD. In fact, individuals with mild cognitive impairment (MCI) can be characterized by two different memory profiles: a pure amnestic one (with poor learning and retrieval and poor improvement when encoding is assisted and retrieval is facilitated) and a dysexecutive one (with inefficient encoding and/or poor retrieval strategies and improvement with assisted encoding and retrieval). The amnestic profile characterizes subjects affected by medio-temporal atrophy typical of AD. In this study, a Grober-Buschke memory procedure was used to evaluate normal controls and MCI patients with different cognitive profiles: pure amnestic (aMCIsd), amnestic plus other cognitive impairments (aMCImd) and non-amnestic (naMCI). An index of sensitivity of cueing (ISC) measured the advantage passing from free to cued recall. Results showed that both strategic and consolidation abilities were impaired in the aMCIsd and aMCImd groups and were preserved in the naMCI group. aMCImd, however, compensated the memory deficit with assisted encoding and retrieval, but aMCIsd performed very poorly. When MCI subjects were defined according to the ISC value, subjects with poor ISC were primarily in the aMCIsd group and, to a lesser extent, in the aMCImd group and the naMCI group. Finally, patients with a poor ISC showed cerebral atrophy documented in the precocious phase of AD and the retrosplenial cerebral areas seemed to be the most useful areas for identifying patients in the early phase of AD.

  2. The HOCS paradigm shift from disciplinary knowledge (LOCS)--to interdisciplinary evaluative, system thinking (HOCS): what should it take in science-technology-environment-society oriented courses, curricula and assessment?

    PubMed

    Zoller, U; Scholz, R W

    2004-01-01

    Given the current world state of affairs, striving for sustainability and the consequent paradigm shift: growth-to-sustainable development, correction-to-prevention and options selection-to-options generation: the corresponding paradigm shift in science-technology-environment-society (STES) education is unavoidable. Accordingly, the essence of the current reform in STES education, worldwide, is a purposed effort to develop students' higher-order cognitive skills (HOCS) capability; i.e., question-asking, critical system thinking, decision making and problem solving, at the expense of the "delivery" of lower-order cognitive skills (LOCS)-oriented knowledge. This means a paradigm shift from the contemporary prevalent LOCS algorithmic teaching to HOCS evaluative learning and HOCS-promoting courses, curricula, teaching strategies and assessment methodologies, leading, hopefully to evaluative thinking and transfer. Following the formulation of selected relevant axioms, major paradigm shift in STES research and education for sustainability have been identified. The consequent shift, in the STES context, from disciplinary to inter- and transdisciplinary learning, in science technology and environmental engineering education is discussed, followed by selected examples of successfully implemented HOCS-promoting courses, and assessment methodologies. It is argued, that transferable "HOCS learning" for sustainability can and should be done.

  3. The impact of conventional surface data upon VAS regression retrievals in the lower troposphere

    NASA Technical Reports Server (NTRS)

    Lee, T. H.; Chesters, D.; Mostek, A.

    1983-01-01

    Surface temperature and dewpoint reports are added to the infrared radiances from the VISSR Atmospheric Sounder (VAS) in order to improve the retrieval of temperature and moisture profiles in the lower troposphere. The conventional (airways) surface data are combined with the twelve VAS channels as additional predictors in a ridge regression retrieval scheme, with the aim of using all available data to make high resolution space-time interpolations of the radiosonde network. For one day of VAS observations, retrievals using only VAS radiances are compared with retrievals using VAS radiances plus surface data. Temperature retrieval accuracy evaluated at coincident radiosonde sites shows a significant impact within the boundary layer. Dewpoint retrieval accuracy shows a broader improvement within the lowest tropospheric layers. The most dramatic impact of surface data is observed in the improved relative spatial and temporal continuity of low-level fields retrieved over the Midwestern United States.

  4. Category cued recall evokes a generate-recognize retrieval process.

    PubMed

    Hunt, R Reed; Smith, Rebekah E; Toth, Jeffrey P

    2016-03-01

    The experiments reported here were designed to replicate and extend McCabe, Roediger, and Karpicke's (2011) finding that retrieval in category cued recall involves both controlled and automatic processes. The extension entailed identifying whether distinctive encoding affected 1 or both of these 2 processes. The first experiment successfully replicated McCabe et al., but the second, which added a critical baseline condition, produced data inconsistent with a 2 independent process model of recall. The third experiment provided evidence that retrieval in category cued recall reflects a generate-recognize strategy, with the effect of distinctive processing being localized to recognition. Overall, the data suggest that category cued recall evokes a generate-recognize retrieval strategy and that the subprocesses underlying this strategy can be dissociated as a function of distinctive versus relational encoding processes. (c) 2016 APA, all rights reserved).

  5. Category Cued Recall Evokes a Generate-Recognize Retrieval Process

    PubMed Central

    Hunt, R. Reed; Smith, Rebekah E.; Toth, Jeffrey P.

    2015-01-01

    The experiments reported here were designed to replicate and extend McCabe, Roediger, and Karpicke’s (2011) finding that retrieval in category cued recall involves both controlled and automatic processes. The extension entailed identifying whether distinctive encoding affected one or both of these two processes. The first experiment successfully replicated McCabe et al., but the second, which added a critical baseline condition, produced data inconsistent with a two independent process model of recall. The third experiment provided evidence that retrieval in category cued recall reflects a generate-recognize strategy, with the effect of distinctive processing being localized to recognition. Overall, the data suggest that category cued recall evokes a generate-recognize retrieval strategy and that the sub-processes underlying this strategy can be dissociated as a function of distinctive versus relational encoding processes. PMID:26280355

  6. Retrieving atmospheric turbulence information from regular commercial aircraft using Mode-S and ADS-B

    NASA Astrophysics Data System (ADS)

    Kopeć, Jacek M.; Kwiatkowski, Kamil; de Haan, Siebren; Malinowski, Szymon P.

    2016-05-01

    Navigational information broadcast by commercial aircraft in the form of Mode-S EHS (Mode-S Enhanced Surveillance) and ADS-B (Automatic Dependent Surveillance-Broadcast) messages can be considered a new source of upper tropospheric and lower stratospheric turbulence estimates. A set of three processing methods is proposed and analysed using a quality record of turbulence encounters made by a research aircraft.The proposed methods are based on processing the vertical acceleration or the background wind into the eddy dissipation rate. Turbulence intensity can be estimated using the standard content of the Mode-S EHS/ADS-B.The results are based on a Mode-S EHS/ADS-B data set generated synthetically based on the transmissions from the research aircraft. This data set was validated using the overlapping record of the Mode-S EHS/ADS-B received from the same research aircraft. The turbulence intensity, meaning the eddy dissipation rate, obtained from the proposed methods based on the Mode-S EHS/ADS-B is compared with the value obtained using on-board accelerometer. The results of the comparison indicate the potential of the methods. The advantages and limitation of the presented approaches are discussed.

  7. Implementing MANETS in Android based environment using Wi-Fi direct

    NASA Astrophysics Data System (ADS)

    Waqas, Muhammad; Babar, Mohammad Inayatullah Khan; Zafar, Mohammad Haseeb

    2015-05-01

    Packet loss occurs in real-time voice transmission over wireless broadcast Ad-hoc network which creates disruptions in sound. Basic objective of this research is to design a wireless Ad-hoc network based on two Android devices by using the Wireless Fidelity (WIFI) Direct Application Programming Interface (API) and apply the Network Codec, Reed Solomon Code. The network codec is used to encode the data of a music wav file and recover the lost packets if any, packets are dropped using a loss module at the transmitter device to analyze the performance with the objective of retrieving the original file at the receiver device using the network codec. This resulted in faster transmission of the files despite dropped packets. In the end both files had the original formatted music files with complete performance analysis based on the transmission delay.

  8. Arabic Information Retrieval at UMass in TREC-10

    DTIC Science & Technology

    2006-01-01

    electronic bilingual dictionaries , and stemmers, and our unfamiliarity with Arabic, we had our hands full carrying out some standard approaches to... monolingual and cross-lan- guage Arabic retrieval, and did not submit any runs based on novel approaches. We submitted three monolingual runs and one... dictionary construction, expanded Arabic queries, improved estimation and smoothing in language models, and added combination of evidence, increasing

  9. Valid randomization-based p-values for partially post hoc subgroup analyses.

    PubMed

    Lee, Joseph J; Rubin, Donald B

    2015-10-30

    By 'partially post-hoc' subgroup analyses, we mean analyses that compare existing data from a randomized experiment-from which a subgroup specification is derived-to new, subgroup-only experimental data. We describe a motivating example in which partially post hoc subgroup analyses instigated statistical debate about a medical device's efficacy. We clarify the source of such analyses' invalidity and then propose a randomization-based approach for generating valid posterior predictive p-values for such partially post hoc subgroups. Lastly, we investigate the approach's operating characteristics in a simple illustrative setting through a series of simulations, showing that it can have desirable properties under both null and alternative hypotheses. Copyright © 2015 John Wiley & Sons, Ltd.

  10. Improving information retrieval with multiple health terminologies in a quality-controlled gateway.

    PubMed

    Soualmia, Lina F; Sakji, Saoussen; Letord, Catherine; Rollin, Laetitia; Massari, Philippe; Darmoni, Stéfan J

    2013-01-01

    The Catalog and Index of French-language Health Internet resources (CISMeF) is a quality-controlled health gateway, primarily for Web resources in French (n=89,751). Recently, we achieved a major improvement in the structure of the catalogue by setting-up multiple terminologies, based on twelve health terminologies available in French, to overcome the potential weakness of the MeSH thesaurus, which is the main and pivotal terminology we use for indexing and retrieval since 1995. The main aim of this study was to estimate the added-value of exploiting several terminologies and their semantic relationships to improve Web resource indexing and retrieval in CISMeF, in order to provide additional health resources which meet the users' expectations. Twelve terminologies were integrated into the CISMeF information system to set up multiple-terminologies indexing and retrieval. The same sets of thirty queries were run: (i) by exploiting the hierarchical structure of the MeSH, and (ii) by exploiting the additional twelve terminologies and their semantic links. The two search modes were evaluated and compared. The overall coverage of the multiple-terminologies search mode was improved by comparison to the coverage of using the MeSH (16,283 vs. 14,159) (+15%). These additional findings were estimated at 56.6% relevant results, 24.7% intermediate results and 18.7% irrelevant. The multiple-terminologies approach improved information retrieval. These results suggest that integrating additional health terminologies was able to improve recall. Since performing the study, 21 other terminologies have been added which should enable us to make broader studies in multiple-terminologies information retrieval.

  11. Mobile object retrieval in server-based image databases

    NASA Astrophysics Data System (ADS)

    Manger, D.; Pagel, F.; Widak, H.

    2013-05-01

    The increasing number of mobile phones equipped with powerful cameras leads to huge collections of user-generated images. To utilize the information of the images on site, image retrieval systems are becoming more and more popular to search for similar objects in an own image database. As the computational performance and the memory capacity of mobile devices are constantly increasing, this search can often be performed on the device itself. This is feasible, for example, if the images are represented with global image features or if the search is done using EXIF or textual metadata. However, for larger image databases, if multiple users are meant to contribute to a growing image database or if powerful content-based image retrieval methods with local features are required, a server-based image retrieval backend is needed. In this work, we present a content-based image retrieval system with a client server architecture working with local features. On the server side, the scalability to large image databases is addressed with the popular bag-of-word model with state-of-the-art extensions. The client end of the system focuses on a lightweight user interface presenting the most similar images of the database highlighting the visual information which is common with the query image. Additionally, new images can be added to the database making it a powerful and interactive tool for mobile contentbased image retrieval.

  12. Automatic Evidence Retrieval for Systematic Reviews

    PubMed Central

    Choong, Miew Keen; Galgani, Filippo; Dunn, Adam G

    2014-01-01

    Background Snowballing involves recursively pursuing relevant references cited in the retrieved literature and adding them to the search results. Snowballing is an alternative approach to discover additional evidence that was not retrieved through conventional search. Snowballing’s effectiveness makes it best practice in systematic reviews despite being time-consuming and tedious. Objective Our goal was to evaluate an automatic method for citation snowballing’s capacity to identify and retrieve the full text and/or abstracts of cited articles. Methods Using 20 review articles that contained 949 citations to journal or conference articles, we manually searched Microsoft Academic Search (MAS) and identified 78.0% (740/949) of the cited articles that were present in the database. We compared the performance of the automatic citation snowballing method against the results of this manual search, measuring precision, recall, and F1 score. Results The automatic method was able to correctly identify 633 (as proportion of included citations: recall=66.7%, F1 score=79.3%; as proportion of citations in MAS: recall=85.5%, F1 score=91.2%) of citations with high precision (97.7%), and retrieved the full text or abstract for 490 (recall=82.9%, precision=92.1%, F1 score=87.3%) of the 633 correctly retrieved citations. Conclusions The proposed method for automatic citation snowballing is accurate and is capable of obtaining the full texts or abstracts for a substantial proportion of the scholarly citations in review articles. By automating the process of citation snowballing, it may be possible to reduce the time and effort of common evidence surveillance tasks such as keeping trial registries up to date and conducting systematic reviews. PMID:25274020

  13. Automatic evidence retrieval for systematic reviews.

    PubMed

    Choong, Miew Keen; Galgani, Filippo; Dunn, Adam G; Tsafnat, Guy

    2014-10-01

    Snowballing involves recursively pursuing relevant references cited in the retrieved literature and adding them to the search results. Snowballing is an alternative approach to discover additional evidence that was not retrieved through conventional search. Snowballing's effectiveness makes it best practice in systematic reviews despite being time-consuming and tedious. Our goal was to evaluate an automatic method for citation snowballing's capacity to identify and retrieve the full text and/or abstracts of cited articles. Using 20 review articles that contained 949 citations to journal or conference articles, we manually searched Microsoft Academic Search (MAS) and identified 78.0% (740/949) of the cited articles that were present in the database. We compared the performance of the automatic citation snowballing method against the results of this manual search, measuring precision, recall, and F1 score. The automatic method was able to correctly identify 633 (as proportion of included citations: recall=66.7%, F1 score=79.3%; as proportion of citations in MAS: recall=85.5%, F1 score=91.2%) of citations with high precision (97.7%), and retrieved the full text or abstract for 490 (recall=82.9%, precision=92.1%, F1 score=87.3%) of the 633 correctly retrieved citations. The proposed method for automatic citation snowballing is accurate and is capable of obtaining the full texts or abstracts for a substantial proportion of the scholarly citations in review articles. By automating the process of citation snowballing, it may be possible to reduce the time and effort of common evidence surveillance tasks such as keeping trial registries up to date and conducting systematic reviews.

  14. Ad-Hoc Implicature in Preschool Children

    ERIC Educational Resources Information Center

    Stiller, Alex J.; Goodman, Noah D.; Frank, Michael C.

    2015-01-01

    If a speaker tells us that "some guests were late to the party," we typically infer that not all were. Implicatures, in which an ambiguous statement ("some and possibly all") is strengthened pragmatically (to "some and not all"), are a paradigm case of pragmatic reasoning. Inferences of this sort are difficult for…

  15. Analyzing Document Retrievability in Patent Retrieval Settings

    NASA Astrophysics Data System (ADS)

    Bashir, Shariq; Rauber, Andreas

    Most information retrieval settings, such as web search, are typically precision-oriented, i.e. they focus on retrieving a small number of highly relevant documents. However, in specific domains, such as patent retrieval or law, recall becomes more relevant than precision: in these cases the goal is to find all relevant documents, requiring algorithms to be tuned more towards recall at the cost of precision. This raises important questions with respect to retrievability and search engine bias: depending on how the similarity between a query and documents is measured, certain documents may be more or less retrievable in certain systems, up to some documents not being retrievable at all within common threshold settings. Biases may be oriented towards popularity of documents (increasing weight of references), towards length of documents, favour the use of rare or common words; rely on structural information such as metadata or headings, etc. Existing accessibility measurement techniques are limited as they measure retrievability with respect to all possible queries. In this paper, we improve accessibility measurement by considering sets of relevant and irrelevant queries for each document. This simulates how recall oriented users create their queries when searching for relevant information. We evaluate retrievability scores using a corpus of patents from US Patent and Trademark Office.

  16. Neural Correlates of Verbal Episodic Memory and Lexical Retrieval in Logopenic Variant Primary Progressive Aphasia.

    PubMed

    Win, Khaing T; Pluta, John; Yushkevich, Paul; Irwin, David J; McMillan, Corey T; Rascovsky, Katya; Wolk, David; Grossman, Murray

    2017-01-01

    Objective: Logopenic variant primary progressive aphasia (lvPPA) is commonly associated with Alzheimer's disease (AD) pathology. But lvPPA patients display different cognitive and anatomical profile from the common clinical AD patients, whose verbal episodic memory is primarily affected. Reports of verbal episodic memory difficulty in lvPPA are inconsistent, and we hypothesized that their lexical retrieval impairment contributes to verbal episodic memory performance and is associated with left middle temporal gyrus atrophy. Methods: We evaluated patients with lvPPA ( n = 12) displaying prominent word-finding and repetition difficulties, and a demographically-matched cohort of clinical Alzheimer's disease (AD, n = 26), and healthy seniors ( n = 16). We assessed lexical retrieval with confrontation naming and verbal episodic memory with delayed free recall. Whole-brain regressions related naming and delayed free recall to gray matter atrophy. Medial temporal lobe (MTL) subfields were examined using high in-plane resolution imaging. Results: lvPPA patients had naming and delayed free recall impairments, but intact recognition memory. In lvPPA, delayed free recall was related to naming; both were associated with left middle temporal gyrus atrophy but not MTL atrophy. Despite cerebrospinal fluid evidence consistent with AD pathology, examination of MTL subfields revealed no atrophy in lvPPA. While AD patients displayed impaired delayed free recall, this deficit did not correlate with naming. Regression analyses related delayed free recall deficits in clinical AD patients to MTL subfield atrophy, and naming to left middle temporal gyrus atrophy. Conclusion: Unlike amnestic AD patients, MTL subfields were not affected in lvPPA patients. Verbal episodic memory deficit observed in lvPPA was unlikely to be due to a hippocampal-mediated mechanism but appeared to be due to poor lexical retrieval. Relative sparing of MTL volume and intact recognition memory are consistent with

  17. Aerosol Correction for Improving OMPS/LP Ozone Retrieval

    NASA Technical Reports Server (NTRS)

    Chen, Zhong; Bhartia, Pawan K.; Loughman, Robert

    2015-01-01

    The Ozone Mapping and Profiler Suite Limb Profiler (OMPS-LP) on board the Suomi National Polar-orbiting Partnership (SNPP) satellite was launched on Oct. 28, 2011. Limb profilers measures the radiance scattered from the Earth's atmospheric in limb viewing mode from 290 to 1000 nm and infer ozone profiles from tropopause to 60 km. The recently released OMPS-LP Version 2 data product contains the first publicly released ozone profiles retrievals, and these are now available for the entire OMPS mission, which extends from April, 2012. The Version 2 data product retrievals incorporate several important improvements to the algorithm. One of the primary changes is to turn off the aerosol retrieval module. The aerosol profiles retrieved inside the ozone code was not helping the ozone retrieval and was adding noise and other artifacts. Aerosols including polar stratospheric cloud (PSC) and polar mesospheric clouds (PMC) have a detectable effect on OMPS-LP data. Our results show that ignoring the aerosol contribution would produce an ozone density bias of up to 10 percent in the region of maximum aerosol extinction. Therefore, aerosol correction is needed to improve the quality of the retrieved ozone concentration profile. We provide Aerosol Scattering Index (ASI) for detecting aerosols-PMC-PSC, defined as ln(Im-Ic) normalized at 45km, where Im is the measured radiance and Ic is the calculated radiance assuming no aerosols. Since ASI varies with wavelengths, latitude and altitude, we can start by assuming no aerosol profiles in calculating the ASIs and then use the aerosol profile to see if it significantly reduces the residuals. We also discuss the effect of aerosol size distribution on the ozone profile retrieval process. Finally, we present an aerosol-PMC-PSC correction scheme.

  18. Added sugars in kids' meals from chain restaurants.

    PubMed

    Scourboutakos, Mary J; Semnani-Azad, Zhila; L'Abbé, Mary R

    2016-06-01

    To analyze the added sugars in kids' meals from Canadian chain restaurants in relation to the World Health Organization's proposed sugar recommendation (less than 5% of total daily calories should come from added sugars) and current recommendation (less than 10% of total daily calories should come from added sugars). Total sugar levels were retrieved from the websites of 10 fast-food and 7 sit-down restaurants in 2010. The added sugar levels in 3178 kids' meals from Canadian chain restaurants were calculated in 2014 (in Toronto, Canada) by subtracting all naturally occurring sugars from the total sugar level. The average amount of added sugars in restaurant kids' meals (25 ± 0.36 g) exceeded the WHO's proposed daily recommendation for sugar intake. There was a wide range of added sugar levels in kids' meals ranging from 0 g to 114 g. 50% of meals exceeded the WHO's proposed daily sugar recommendation, and 19% exceeded the WHO's current daily sugar recommendation. There is a wide range of sugar levels in kids' meals from restaurants, and many contain more than a day's worth of sugar.

  19. [Implementation of interdisciplinary multimodal pain therapy according to OPS 8‑918 : Recommendations of the ad hoc commission for interdisciplinary multimodal pain therapy of the German Pain Association].

    PubMed

    Arnold, B; Böger, A; Brinkschmidt, T; Casser, H-R; Irnich, D; Kaiser, U; Klimczyk, K; Lutz, J; Pfingsten, M; Sabatowski, R; Schiltenwolf, M; Söllner, W

    2018-02-01

    With the implementation of the German diagnosis-related groups (DRG) reimbursement system in hospitals, interdisciplinary multimodal pain therapy was incorporated into the associated catalogue of procedures (OPS 8‑918). Yet, the presented criteria describing the procedure of interdisciplinary multimodal pain therapy are neither precise nor unambiguous. This has led to discrepancies in the interpretation regarding the handling of the procedure-making it difficult for medical services of health insurance companies to evaluate the accordance between the delivered therapy and the required criteria. Since the number of pain units has increased in recent years, the number of examinations by the medical service of health insurance companies has increased. This article, published by the ad hoc commission for interdisciplinary multimodal pain therapy of the German Pain Association, provides specific recommendations for correct implementation of interdisciplinary multimodal pain therapy in routine care. The aim is to achieve a maximum level of accordance between health care providers and the requirements of the medical examiners from health insurance companies. More extensive criteria regarding interdisciplinary multimodal pain treatment in an in-patient setting, especially for patients with chronic and complex pain, are obviously needed. Thus, the authors further discuss specific aspects towards further development of the OPS-code. However, the application of the OPS-code still leaves room regarding treatment intensity and process quality. Therefore, the delivery of pain management in sufficient quantity and quality still remains the responsibility of each health care provider.

  20. EM-21 Retrieval Knowledge Center: Waste Retrieval Challenges

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fellinger, Andrew P.; Rinker, Michael W.; Berglin, Eric J.

    EM-21 is the Waste Processing Division of the Office of Engineering and Technology, within the U.S. Department of Energy’s (DOE) Office of Environmental Management (EM). In August of 2008, EM-21 began an initiative to develop a Retrieval Knowledge Center (RKC) to provide the DOE, high level waste retrieval operators, and technology developers with centralized and focused location to share knowledge and expertise that will be used to address retrieval challenges across the DOE complex. The RKC is also designed to facilitate information sharing across the DOE Waste Site Complex through workshops, and a searchable database of waste retrieval technology information.more » The database may be used to research effective technology approaches for specific retrieval tasks and to take advantage of the lessons learned from previous operations. It is also expected to be effective for remaining current with state-of-the-art of retrieval technologies and ongoing development within the DOE Complex. To encourage collaboration of DOE sites with waste retrieval issues, the RKC team is co-led by the Savannah River National Laboratory (SRNL) and the Pacific Northwest National Laboratory (PNNL). Two RKC workshops were held in the Fall of 2008. The purpose of these workshops was to define top level waste retrieval functional areas, exchange lessons learned, and develop a path forward to support a strategic business plan focused on technology needs for retrieval. The primary participants involved in these workshops included retrieval personnel and laboratory staff that are associated with Hanford and Savannah River Sites since the majority of remaining DOE waste tanks are located at these sites. This report summarizes and documents the results of the initial RKC workshops. Technology challenges identified from these workshops and presented here are expected to be a key component to defining future RKC-directed tasks designed to facilitate tank waste retrieval solutions.« less

  1. GOME-2 Tropospheric Ozone Profile Retrievals from Joint UV/Visible Measurement

    NASA Astrophysics Data System (ADS)

    Liu, X.; Zoogman, P.; Chance, K.; Cai, Z.; Nowlan, C. R.; Huang, G.; Gonzalez Abad, G.

    2016-12-01

    It has been shown from sensitivity studies that adding visible measurements in the Chappuis ozone band to UV measurements in the Hartley/Huggins ozone bands can significantly enhance retrieval sensitivity to lower tropospheric ozone from backscattered solar radiances due to deeper photon penetration in the visible to the surface than in the ultraviolet. The first NASA EVI (Earth Venture Instrument) TEMPO (Tropospheric Emissions: Monitoring of Pollution) instrument is being developed to measure backscattered solar radiation in two channels ( 290-490 and 540-740 nm) and make atmospheric pollution measurements over North America from the Geostationary orbit. However, this retrieval enhancement has yet to be demonstrated from existing measurements due to the weak ozone absorption in the visible and strong interferences from surface reflectance and aerosols and the requirement of accurate radiometric calibration across different spectral channels. We present GOME-2 retrievals from joint UV/visible measurements using the SAO ozone profile retrieval algorithm, to directly explore the retrieval improvement in lower tropospheric ozone from additional visible measurements. To reduce the retrieval interference from surface reflectance, we add characterization of surface spectral reflectance in the visible based on combining EOFs (Empirical Orthogonal Functions) derived from ASTER and other surface reflectance spectra with MODIS BRDF climatology into the ozone profile algorithm. The impacts of various types of aerosols and surface BRDF on the retrievals will be investigated. In addition, we will also perform empirical radiometric calibration of the GOME-2 data based on radiative transfer simulations. We will evaluate the retrieval improvement of joint UV/visible retrieval over the UV retrieval based on fitting quality and validation against ozonesonde observations.

  2. Guenter Tulip Filter Retrieval Experience: Predictors of Successful Retrieval

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Turba, Ulku Cenk, E-mail: uct5d@virginia.edu; Arslan, Bulent, E-mail: ba6e@virginia.edu; Meuse, Michael, E-mail: mm5tz@virginia.edu

    We report our experience with Guenter Tulip filter placement indications, retrievals, and procedural problems, with emphasis on alternative retrieval techniques. We have identified 92 consecutive patients in whom a Guenter Tulip filter was placed and filter removal attempted. We recorded patient demographic information, filter placement and retrieval indications, procedures, standard and nonstandard filter retrieval techniques, complications, and clinical outcomes. The mean time to retrieval for those who experienced filter strut penetration was statistically significant [F(1,90) = 8.55, p = 0.004]. Filter strut(s) IVC penetration and successful retrieval were found to be statistically significant (p = 0.043). The filter hook-IVC relationshipmore » correlated with successful retrieval. A modified guidewire loop technique was applied in 8 of 10 cases where the hook appeared to penetrate the IVC wall and could not be engaged with a loop snare catheter, providing additional technical success in 6 of 8 (75%). Therefore, the total filter retrieval success increased from 88 to 95%. In conclusion, the Guenter Tulip filter has high successful retrieval rates with low rates of complication. Additional maneuvers such as a guidewire loop method can be used to improve retrieval success rates when the filter hook is endothelialized.« less

  3. Enhanced Antigen Retrieval of Amyloid β Immunohistochemistry

    PubMed Central

    Kai, Hideaki; Ogino, Koichi; Hatsuta, Hiroyuki; Murayama, Shigeo; Kitamoto, Tetsuyuki

    2012-01-01

    Senile plaques, extracellular deposits of amyloid β peptide (Aβ), are one of the pathological hallmarks of Alzheimer disease (AD). As the standard immunohistochemical detection method for Aβ deposits, anti-Aβ immunohistochemistry combined with antigen retrieval (AR) by formic acid (FA) has been generally used. Here, we present a more efficient AR for Aβ antigen. On brain sections of AD and its mouse model, a double combination of either autoclave heating in EDTA buffer or digestion with proteinase K plus FA treatment reinforced Aβ immunoreactivity. A further triple combination of digestion with proteinase K (P), autoclave heating in EDTA buffer (A), and FA treatment (F), when employed in this order, gave a more enhanced immunoreactivity. Our PAF method prominently visualized various forms of Aβ deposits in AD that have not been clearly detected previously and revealed numerous minute-sized plaques both in AD and the mouse model. Quantification of Aβ loads showed that the AR effect by the PAF method was 1.86-fold (in the aged human brain) and 4.64-fold (in the mouse brain) higher than that by the FA method. Thus, the PAF method could have the potential to be the most sensitive tool so far to study Aβ pathology in AD and its mouse model. PMID:22821668

  4. Item-method directed forgetting: Effects at retrieval?

    PubMed

    Taylor, Tracy L; Cutmore, Laura; Pries, Lotta

    2018-02-01

    In an item-method directed forgetting paradigm, words are presented one at a time, each followed by an instruction to Remember or Forget; a directed forgetting effect is measured as better subsequent memory for Remember words than Forget words. The dominant view is that the directed forgetting effect arises during encoding due to selective rehearsal of Remember over Forget items. In three experiments we attempted to falsify a strong view that directed forgetting effects in recognition are due only to encoding mechanisms when an item method is used. Across 3 experiments we tested for retrieval-based processes by colour-coding the recognition test items. Black colour provided no information; green colour cued a potential Remember item; and, red colour cued a potential Forget item. Recognition cues were mixed within-blocks in Experiment 1 and between-blocks in Experiments 2 and 3; Experiment 3 added explicit feedback on the accuracy of the recognition decision. Although overall recognition improved with cuing when explicit test performance feedback was added in Experiment 3, in no case was the magnitude of the directed forgetting effect influenced by recognition cueing. Our results argue against a role for retrieval-based strategies that limit recognition of Forget items at test and posit a role for encoding intentions only. Copyright © 2017 Elsevier B.V. All rights reserved.

  5. Query-Structure Based Web Page Indexing

    DTIC Science & Technology

    2012-11-01

    the massive amount of data present on the web. In our third participation in the web track at TREC 2012, we explore the idea of building an...the ad-hoc and diversity task. 1 INTRODUCTION The rapid growth and massive quantities of data on the Internet have increased the importance and...complexity of information retrieval systems. The amount and the diversity of the web data introduce shortcomings in the way search engines rank their

  6. Retrievable Inferior Vena Cava Filters: Factors that Affect Retrieval Success

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Geisbuesch, Philipp, E-mail: philippgeisbuesch@gmx.de; Benenati, James F.; Pena, Constantino S.

    Purpose: To report and analyze the indications, procedural success, and complications of retrievable inferior vena cava filters (rIVCF) placement and to identify parameters that influence retrieval attempt and failure. Methods: Between January 2005 and December 2010, a total of 200 patients (80 men, median age 67 years, range 11-95 years) received a rIVCF with the clinical possibility that it could be removed. All patients with rIVCF were prospectively entered into a database and followed until retrieval or a decision not to retrieve the filter was made. A retrospective analysis of this database was performed. Results: Sixty-one percent of patients hadmore » an accepted indication for filter placement; 39% of patients had a relative indication. There was a tendency toward a higher retrieval rate in patients with relative indications (40% vs. 55%, P = 0.076). Filter placement was technically successful in all patients, with no procedure-related mortality. The retrieval rate was 53%. Patient age of >80 years (odds ratio [OR] 0.056, P > 0.0001) and presence of malignancy (OR 0.303, P = 0.003) was associated with a significantly reduced probability for attempted retrieval. Retrieval failure occurred in 7% (6 of 91) of all retrieval attempts. A time interval of > 90 days between implantation and attempted retrieval was associated with retrieval failure (OR 19.8, P = 0.009). Conclusions: Patient age >80 years and a history of malignancy are predictors of a reduced probability for retrieval attempt. The rate of retrieval failure is low and seems to be associated with a time interval of >90 days between filter placement and retrieval.« less

  7. Functional-anatomic study of episodic retrieval using fMRI. I. Retrieval effort versus retrieval success.

    PubMed

    Buckner, R L; Koutstaal, W; Schacter, D L; Wagner, A D; Rosen, B R

    1998-04-01

    A number of recent functional imaging studies have identified brain areas activated during tasks involving episodic memory retrieval. The identification of such areas provides a foundation for targeted hypotheses regarding the more specific contributions that these areas make to episodic retrieval. As a beginning effort toward such an endeavor, whole-brain functional magnetic resonance imaging (fMRI) was used to examine 14 subjects during episodic word recognition in a block-designed fMRI experiment. Study conditions were manipulated by presenting either shallow or deep encoding tasks. This manipulation yielded two recognition conditions that differed with regard to retrieval effort and retrieval success: shallow encoding yielded low levels of recognition success with high levels of retrieval effort, and deep encoding yielded high levels of recognition success with low levels of effort. Many brain areas were activated in common by these two recognition conditions compared to a low-level fixation condition, including left and right prefrontal regions often detected during PET episodic retrieval paradigms (e.g., R. L. Buckner et al., 1996, J. Neurosci. 16, 6219-6235) thereby generalizing these findings to fMRI. Characterization of the activated regions in relation to the separate recognition conditions showed (1) bilateral anterior insular regions and a left dorsal prefrontal region were more active after shallow encoding, when retrieval demanded greatest effort, and (2) right anterior prefrontal cortex, which has been implicated in episodic retrieval, was most active during successful retrieval after deep encoding. We discuss these findings in relation to component processes involved in episodic retrieval and in the context of a companion study using event-related fMRI.

  8. Leaf Level Chlorophyll Fluorescence Emission Spectra: Narrow Band versus Full 650-800 nm Retrievals

    NASA Astrophysics Data System (ADS)

    Middleton, E.; Zhang, Q.; Campbell, P. K.; Huemmrich, K. F.; Corp, L.; Cheng, Y.

    2012-12-01

    nm (r2 = 0.88, RMSE = 7.54 x 107). When perfect retrievals were assumed (0% noise), retrievals remained good in the low emission regions on either side of the peaks-- those associated with the H alpha line at 655 nm (r2 = 0.83, RMSE =8.87 x 107) and the far-NIR wavelengths recently utilized for satellite retrievals: a K line at 770 nm (r2 = 0.85, RMSE = 8.36 x 107) and the 750-770 nm interval (r2 = 0.88, RMSE = 6.92 x 107). However, the atmosphere and satellite observations are expected to add noise to retrievals. Adding 5% random error to these relationships did not seriously impair the retrieval successes in the red and far-red peaks (r2 ~ 0.85, RMSEs = 6.31 x 107). A greater impact occurred (reducing retrieval success by ~10%) when adding 5% noise for the far-NIR narrow band at 770 nm (r2 ~ 0.70, RMSE ~ 8.5 x 107). When a 10% random error was added, the retrieval successes fell to ~68 ± 7% for all retrieval wavebands, and RMSEs increased by a factor of 10. This laboratory approach will be critical to calibrate space borne retrievals, but additional information across plant species is needed. Furthermore, this experiment indicates that ChlF retrievals from space should include information from the red and far-red peak emission regions, since the true total fluorescence signal is the desired parameter for Earth carbon and energy budgets.

  9. Skill in Retrievals

    NASA Technical Reports Server (NTRS)

    Aumann, Hartmut H.; Manning, Evan

    2008-01-01

    Retrieval Skill quantifies the ability of one retrieval from a sounder to be more accurate than the best forecast relative to another with the same of another sounder. This is summarized using a Retrieval Anomaly Skill Score (RASS) which is the cor (retrieved-background, truth-background) * sqrt(f), Where f is defined as the ratio of accepted to the possible retrievals. Charts show various features and comparisons of RASS to other methods of retrieval.

  10. Are retrievable vena cava filters placed in trauma patients really retrievable?

    PubMed

    Leeper, W R; Murphy, P B; Vogt, K N; Leeper, T J; Kribs, S W; Gray, D K; Parry, N G

    2016-08-01

    Concerns have arisen regarding the use of retrievable inferior vena cava filters (rIVCFs) in trauma patients due to increasing reports of low retrieval rates. We hypothesized that complete follow-up with a dedicated trauma nurse practitioner would be associated with a higher rate of retrievability. This study was undertaken to determine the rate of retrievability of rIVCFs placed in a Canadian Lead Trauma Centre, and to compare the rate of retrievability in our trauma population to our non-trauma patients. We performed a retrospective cohort study of all patients with rIVCF placed between Jan 1 2000 and June 30 2014. Data were collected on demographics, indication for filter placement, retrieval status, and reasons for non-retrieval. Comparison was made between trauma patients and non-trauma patients. A total of 374 rIVCFs were placed (61 in trauma patients and 313 in non-trauma patients) and follow-up was complete for the entire cohort. Filter retrieval was achieved in 86.9 % of trauma patients. Reasons for non-retrieval were technical in two patients, and death before retrieval in six patients. Retrieval was successful in 48.9 % of non-trauma patients. This study demonstrates that rIVCFs can be successfully retrieved amongst trauma patients. We demonstrated a higher rate of successful retrieval amongst trauma patients than non-trauma patients in our institution. Careful patient follow-up may play a role in successful retrieval of rIVCFs.

  11. A multimetric, map-aware routing protocol for VANETs in urban areas.

    PubMed

    Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Aguilar Igartua, Mónica; Rebollo-Monedero, David; de la Cruz Llopis, Luis J; Mezher, Ahmad Mohamad; Aguilar-Calderón, José Alfonso

    2014-01-28

    In recent years, the general interest in routing for vehicular ad hoc networks (VANETs) has increased notably. Many proposals have been presented to improve the behavior of the routing decisions in these very changeable networks. In this paper, we propose a new routing protocol for VANETs that uses four different metrics. which are the distance to destination, the vehicles' density, the vehicles' trajectory and the available bandwidth, making use of the information retrieved by the sensors of the vehicle, in order to make forwarding decisions, minimizing packet losses and packet delay. Through simulation, we compare our proposal to other protocols, such as AODV (Ad hoc On-Demand Distance Vector), GPSR (Greedy Perimeter Stateless Routing), I-GPSR (Improvement GPSR) and to our previous proposal, GBSR-B (Greedy Buffer Stateless Routing Building-aware). Besides, we present a performance evaluation of the individual importance of each metric to make forwarding decisions. Experimental results show that our proposed forwarding decision outperforms existing solutions in terms of packet delivery.

  12. Wikisearching and Wikilinking

    NASA Astrophysics Data System (ADS)

    Jenkinson, Dylan; Leung, Kai-Cheung; Trotman, Andrew

    The University of Otago submitted three element runs and three passage runs to the Relevance-in-Context task of the ad hoc track. The best Otago run was a whole-document run placing 7th. The best Otago passage run placed 13th while the best Otago element run placed 31st. There were a total of 40 runs submitted to the task. The ad hoc result reinforced our prior belief that passages are better answers than elements and that the most important aspect of the focused retrieval is the identification of relevant documents. Six runs were submitted to the Link-the-Wiki track. The best Otago run placed 1st (of 21) in file to file automatic assessment and 6th (of 28) with manual assessment. The Itakura & Clarke algorithm was used for outgoing links, with special attention paid to parsing and case sensitivity. For incoming links representative terms were selected from the document and used to find similar documents.

  13. The Vehicular Information Space Framework

    NASA Astrophysics Data System (ADS)

    Prinz, Vivian; Schlichter, Johann; Schweiger, Benno

    Vehicular networks are distributed, self-organizing and highly mobile ad hoc networks. They allow for providing drivers with up-to-the-minute information about their environment. Therefore, they are expected to be a decisive future enabler for enhancing driving comfort and safety. This article introduces the Vehicular Information Space framework (VIS). Vehicles running the VIS form a kind of distributed database. It enables them to provide information like existing hazards, parking spaces or traffic densities in a location aware and fully distributed manner. In addition, vehicles can retrieve, modify and delete these information items. The underlying algorithm is based on features derived from existing structured Peer-to-Peer algorithms and extended to suit the specific characteristics of highly mobile ad hoc networks. We present, implement and simulate the VIS using a motorway and an urban traffic environment. Simulation studies on VIS message occurrence show that the VIS implies reasonable traffic overhead. Also, overall VIS message traffic is independent from the number of information items provided.

  14. Selective memory retrieval can impair and improve retrieval of other memories.

    PubMed

    Bäuml, Karl-Heinz T; Samenieh, Anuscheh

    2012-03-01

    Research from the past decades has shown that retrieval of a specific memory (e.g., retrieving part of a previous vacation) typically attenuates retrieval of other memories (e.g., memories for other details of the event), causing retrieval-induced forgetting. More recently, however, it has been shown that retrieval can both attenuate and aid recall of other memories (K.-H. T. Bäuml & A. Samenieh, 2010). To identify the circumstances under which retrieval aids recall, the authors examined retrieval dynamics in listwise directed forgetting, context-dependent forgetting, proactive interference, and in the absence of any induced memory impairment. They found beneficial effects of selective retrieval in listwise directed forgetting and context-dependent forgetting but detrimental effects in all the other conditions. Because context-dependent forgetting and listwise directed forgetting arguably reflect impaired context access, the results suggest that memory retrieval aids recall of memories that are subject to impaired context access but attenuates recall in the absence of such circumstances. The findings are consistent with a 2-factor account of memory retrieval and suggest the existence of 2 faces of memory retrieval. 2012 APA, all rights reserved

  15. [Health evaluation of trichloroethylene in indoor air : communication from the German ad-hoc working group on indoor guidelines of the Indoor Air Hygiene Committee and of the states' supreme health authorities].

    PubMed

    2015-07-01

    In the European Hazardous Substances Regulation No 1272/2008 trichloroethylene has been classified as a probable human carcinogen and a suspected mutagen. According to several Committees (German Committee on Hazardous Substances, European Scientific Committee on Occupational Exposure Limits, European Chemicals Agency´s Committee for Risk Assessment (ECHA-RAC)) concentrations of trichloroethylene cytotoxic to renal tubuli may increase the risk to develop renal cancer. At non-cytotoxic concentrations of trichloroethylene a much lower cancer risk may be assumed. Therefore, evaluating the cancer risk to the public following inhalation of trichloroethylene ECHA-RAC has assumed a sublinear exposure-response relationship for carcinogenicity of trichloroethylene. Specifically, ECHA-RAC assessed a cancer risk of 6.4 × 10(- 5) (mg/m(3))(- 1) following life time exposure to trichloroethylene below a NOAEC for renal cytotoxicity of 6 mg trichloroethylene/m(3). Further evaluation yields a life-time risk of 10(- 6) corresponding to 0.02 mg trichloroethylene/m(3). This concentration is well above the reference (e.g. background) concentration of trichloroethylene in indoor air. Consequently the Ad-hoc Working Group on Indoor Guidelines recommends 0.02 mg trichloroethylene/m(3) as a risk-related guideline for indoor air. Measures to reduce exposure are considered inappropriate at concentrations below this guideline.

  16. The role of retrieval mode and retrieval orientation in retrieval practice: insights from comparing recognition memory testing formats and restudying.

    PubMed

    Gao, Chuanji; Rosburg, Timm; Hou, Mingzhu; Li, Bingbing; Xiao, Xin; Guo, Chunyan

    2016-12-01

    The effectiveness of retrieval practice for aiding long-term memory, referred to as the testing effect, has been widely demonstrated. However, the specific neurocognitive mechanisms underlying this phenomenon remain unclear. In the present study, we sought to explore the role of pre-retrieval processes at initial testing on later recognition performance by using event-related potentials (ERPs). Subjects studied two lists of words (Chinese characters) and then performed a recognition task or a source memory task, or restudied the word lists. At the end of the experiment, subjects received a final recognition test based on the remember-know paradigm. Behaviorally, initial testing (active retrieval) enhanced memory retention relative to restudying (passive retrieval). The retrieval mode at initial testing was indexed by more positive-going ERPs for unstudied items in the active-retrieval tasks than in passive retrieval from 300 to 900 ms. Follow-up analyses showed that the magnitude of the early ERP retrieval mode effect (300-500 ms) was predictive of the behavioral testing effect later on. In addition, the ERPs for correctly rejected new items during initial testing differed between the two active-retrieval tasks from 500 to 900 ms, and this ERP retrieval orientation effect predicted differential behavioral testing gains between the two active-retrieval conditions. Our findings confirm that initial testing promotes later retrieval relative to restudying, and they further suggest that adopting pre-retrieval processing in the forms of retrieval mode and retrieval orientation might contribute to these memory enhancements.

  17. Retrieval attempts enhance learning, but retrieval success (versus failure) does not matter.

    PubMed

    Kornell, Nate; Klein, Patricia Jacobs; Rawson, Katherine A

    2015-01-01

    Retrieving information from memory enhances learning. We propose a 2-stage framework to explain the benefits of retrieval. Stage 1 takes place as one attempts to retrieve an answer, which activates knowledge related to the retrieval cue. Stage 2 begins when the answer becomes available, at which point appropriate connections are strengthened and inappropriate connections may be weakened. This framework raises a basic question: Does it matter whether Stage 2 is initiated via successful retrieval or via an external presentation of the answer? To test this question, we asked participants to attempt retrieval and then randomly assigned items (which were equivalent otherwise) to be retrieved successfully or to be copied (i.e., not retrieved). Experiments 1, 2, 4, and 5 tested assumptions necessary for interpreting Experiments 3a, 3b, and 6. Experiments 3a, 3b, and 6 did not support the hypothesis that retrieval success produces more learning than does retrieval failure followed by feedback. It appears that retrieval attempts promote learning but retrieval success per se does not. PsycINFO Database Record (c) 2015 APA, all rights reserved.

  18. Developing A Web-based User Interface for Semantic Information Retrieval

    NASA Technical Reports Server (NTRS)

    Berrios, Daniel C.; Keller, Richard M.

    2003-01-01

    While there are now a number of languages and frameworks that enable computer-based systems to search stored data semantically, the optimal design for effective user interfaces for such systems is still uncle ar. Such interfaces should mask unnecessary query detail from users, yet still allow them to build queries of arbitrary complexity without significant restrictions. We developed a user interface supporting s emantic query generation for Semanticorganizer, a tool used by scient ists and engineers at NASA to construct networks of knowledge and dat a. Through this interface users can select node types, node attribute s and node links to build ad-hoc semantic queries for searching the S emanticOrganizer network.

  19. Design-of-Experiments Approach to Improving Inferior Vena Cava Filter Retrieval Rates.

    PubMed

    Makary, Mina S; Shah, Summit H; Warhadpande, Shantanu; Vargas, Ivan G; Sarbinoff, James; Dowell, Joshua D

    2017-01-01

    The association of retrievable inferior vena cava filters (IVCFs) with adverse events has led to increased interest in prompt retrieval, particularly in younger patients given the progressive nature of these complications over time. This study takes a design-of-experiments (DOE) approach to investigate methods to best improve filter retrieval rates, with a particular focus on younger (<60 years) patients. A DOE approach was executed in which combinations of variables were tested to best improve retrieval rates. The impact of a virtual IVCF clinic, primary care physician (PCP) letters, and discharge instructions was investigated. The decision for filter retrieval in group 1 was determined solely by the referring physician. Group 2 included those patients prospectively followed in an IVCF virtual clinic in which filter retrieval was coordinated by the interventional radiologist when clinically appropriate. In group 3, in addition to being followed through the IVCF clinic, each patient's PCP was faxed a follow-up letter, and information regarding IVCF retrieval was added to the patient's discharge instructions. A total of 10 IVCFs (8.4%) were retrieved among 119 retrievable IVCFs placed in group 1. Implementation of the IVCF clinic in group 2 significantly improved the retrieval rate to 25.3% (23 of 91 retrievable IVCFs placed, P < .05). The addition of discharge instructions and PCP letters to the virtual clinic (group 3) resulted in a retrieval rate of 33.3% (17 of 51). The retrieval rates demonstrated more pronounced improvement when examining only younger patients, with retrieval rates of 11.3% (7 of 62), 29.5% (13 of 44, P < .05), and 45.2% (14 of 31) for groups 1, 2, and 3, respectively. DOE methodology is not routinely executed in health care, but it is an effective approach to evaluating clinical practice behavior and patient quality measures. In this study, implementation of the combination of a virtual clinic, PCP letters, and discharge instructions improved

  20. Memory retrieval in response to partial cues requires NMDA receptor-dependent neurotransmission in the medial prefrontal cortex.

    PubMed

    Jo, Yong Sang; Choi, June-Seek

    2014-03-01

    The medial prefrontal cortex (mPFC) has been suggested to play a crucial role in retrieving detailed contextual information about a previous learning episode in response to a single retrieval cue. However, few studies investigated the neurochemical mechanisms that mediate the prefrontal retrieval process. In the current study, we examined whether N-methyl-D-aspartate receptors (NMDARs) in the mPFC were necessary for retrieval of a well-learned spatial location on the basis of partial or degraded spatial cues. Rats were initially trained to find a hidden platform in the Morris water maze using four extramaze cues in the surrounding environment. Their retrieval performance was subsequently tested under different cue conditions. Infusions of DL-2-amino-5-phosphonovaleric acid (APV), a NMDAR antagonist, significantly disrupted memory retrieval when three of the original cues were removed. By contrast, APV injections into the mPFC did not affect animals' retrieval performance when the original cues were presented or when three novels landmarks were added alongside the original cues. These results indicate that prefrontal NMDARs are required for memory retrieval when allocentric spatial information is degraded. NMDAR-dependent neurotransmission in the mPFC may facilitate an active retrieval process to reactivate complete contextual representations associated with partial retrieval cues. Copyright © 2013 Elsevier Inc. All rights reserved.

  1. Retrieval attempts enhance learning regardless of time spent trying to retrieve.

    PubMed

    Vaughn, Kalif E; Hausman, Hannah; Kornell, Nate

    2017-03-01

    Attempting to retrieve information from memory is an engaging cognitive activity. We predicted that people would learn more when they had spent more time attempting to retrieve. In experiments 1a and 1b, participants were shown trivia questions for 0, 5, 10, or 30 seconds and then the answer was revealed. They took a final test immediately or after 48 hours. Retrieval enhanced learning, but the length of the retrieval attempt had no effect (i.e., final test performance was equivalent in the 5-, 10-, and 30-second conditions and worse in the 0-second condition). During the initial retrieval attempt, more time did increase recall, suggesting that participants continued to engage in productive retrieval activities when given more time. Showing the answer for longer (7 versus 2 seconds) increased learning in Experiments 2a and 2b. Experiment 3 examined the effect of retrieval success and Experiment 4 replicated the results using different materials. These results have direct implications for current theories of retrieval.

  2. An evidence-based definition of lifelong premature ejaculation: report of the International Society for Sexual Medicine Ad Hoc Committee for the Definition of Premature Ejaculation.

    PubMed

    McMahon, Chris G; Althof, Stanley; Waldinger, Marcel D; Porst, Hartmut; Dean, John; Sharlip, Ira; Adaikan, P G; Becher, Edgardo; Broderick, Gregory A; Buvat, Jacques; Dabees, Khalid; Giraldi, Annamaria; Giuliano, François; Hellstrom, Wayne J G; Incrocci, Luca; Laan, Ellen; Meuleman, Eric; Perelman, Michael A; Rosen, Raymond; Rowland, David; Segraves, Robert

    2008-08-01

    To develop a contemporary, evidence-based definition of premature ejaculation (PE). There are several definitions of PE; the most commonly quoted, the American Psychiatric Association's Diagnostic and Statistical Manual of Mental Disorders - 4th Edition - Text Revision, and other definitions of PE, are all authority-based rather than evidence-based, and have no support from controlled clinical and/or epidemiological studies. Thus in August 2007, the International Society for Sexual Medicine (ISSM) appointed several international experts in PE to an Ad Hoc Committee for the Definition of PE. The committee met in Amsterdam in October 2007 to evaluate the strengths and weaknesses of current definitions of PE, to critically assess the evidence in support of the constructs of ejaculatory latency, ejaculatory control, sexual satisfaction and personal/interpersonal distress, and to propose a new evidence-based definition of PE. The Committee unanimously agreed that the constructs which are necessary to define PE are rapidity of ejaculation, perceived self-efficacy, and control and negative personal consequences from PE. The Committee proposed that lifelong PE be defined as a male sexual dysfunction characterized by ejaculation which always or nearly always occurs before or within about one minute of vaginal penetration, and the inability to delay ejaculation on all or nearly all vaginal penetrations, and negative personal consequences, such as distress, bother, frustration and/or the avoidance of sexual intimacy. This definition is limited to men with lifelong PE who engage in vaginal intercourse. The panel concluded that there are insufficient published objective data to propose an evidence-based definition of acquired PE. The ISSM definition of lifelong PE represents the first evidence-based definition of PE. This definition will hopefully lead to the development of new tools and patient-reported outcome measures for diagnosing and assessing the efficacy of treatment

  3. A web-based electronic patient record (ePR) system for data integration in movement analysis research on wheel-chair users to minimize shoulder pain

    NASA Astrophysics Data System (ADS)

    Deshpande, Ruchi R.; Requejo, Philip; Sutisna, Erry; Wang, Ximing; Liu, Margaret; McNitt-Gray, Sarah; Ruparel, Puja; Liu, Brent J.

    2012-02-01

    Patients confined to manual wheel-chairs are at an added risk of shoulder injury. There is a need for developing optimal bio-mechanical techniques for wheel-chair propulsion through movement analysis. Data collected is diverse and in need of normalization and integration. Current databases are ad-hoc and do not provide flexibility, extensibility and ease of access. The need for an efficient means to retrieve specific trial data, display it and compare data from multiple trials is unmet through lack of data association and synchronicity. We propose the development of a robust web-based ePR system that will enhance workflow and facilitate efficient data management.

  4. Distribution of Information in Ad Hoc Networks

    DTIC Science & Technology

    2007-09-01

    2.4. MACA Protocol...................................20 Figure 2.5. Route discovery in AODV (From [32]).............28 Figure 2.6. Creation of a...19 Figure 2.3. Exposed terminal Problem (From [20]) (3) MACA and MACAW Protocols. One of the first protocols conceived for wireless local area...networks is MACA [21] (Multiple Accesses with Collision Avoidance). The transmitter sends a small packet, or RTS (Request To Send), which has little

  5. Life Cycles of Ad Hoc Task Groups

    DTIC Science & Technology

    1983-10-01

    Rick’s Cafe after work. . 25 Alexandra: You have connections? 26 Ken: Yes! ൣ Alexandra: You can be the industrial spy! (Pause) We don’t really need...with franchising --he could do a whole business strictly dealing with spare parts. We have to describe these packages and describe how to... (words

  6. Distributed Trust Evaluation in Ad-Hoc Networks

    DTIC Science & Technology

    2004-01-01

    of money that the issuer will pay to anyone who is misled because of the certificate. Being misled means falsely authenticating the certified entity...Alice to Bob. This is the minimum amount of money for which Alice is insured in the case of her being misled by Bob’s key. Note that if all edges are...confidence gets to vote first. Moreover, some paths are pruned which means that fewer messages are exchanged, thus saving bandwidth, but also some of the

  7. Swift Trust in Distributed Ad Hoc Teams

    DTIC Science & Technology

    2007-10-04

    individus sont perçus. Et les abus de confiance commis pendant la mission ont nui temporairement à la réputation de leurs auteurs , mais ils n’ont...of theory and research argue that trust may emerge in teams even when the development of conventional person-based trust is challenged. 1.3.1 Swift...good deal of theory (and some research) espouses the importance of “swift trust” in environments where conventional trust would otherwise be

  8. Realtime multiprocessor for mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Jungeblut, T.; Grünewald, M.; Porrmann, M.; Rückert, U.

    2008-05-01

    This paper introduces a real-time Multiprocessor System-On-Chip (MPSoC) for low power wireless applications. The multiprocessor is based on eight 32bit RISC processors that are connected via an Network-On-Chip (NoC). The NoC follows a novel approach with guaranteed bandwidth to the application that meets hard realtime requirements. At a clock frequency of 100 MHz the total power consumption of the MPSoC that has been fabricated in 180 nm UMC standard cell technology is 772 mW.

  9. Sensor Sharing in Mobile Ad-Hoc Networks

    ERIC Educational Resources Information Center

    Mitra, Pramita

    2013-01-01

    Today's modern mobile devices (such as smartphones and tablets) present great potential for growth of many novel, powerful, but also highly demanding applications. However, most mobile devices/users operate in isolation from one another, i.e., they are not aware of the presence of other devices in their proximity. There are numerous situations…

  10. Bayesian aerosol retrieval algorithm for MODIS AOD retrieval over land

    NASA Astrophysics Data System (ADS)

    Lipponen, Antti; Mielonen, Tero; Pitkänen, Mikko R. A.; Levy, Robert C.; Sawyer, Virginia R.; Romakkaniemi, Sami; Kolehmainen, Ville; Arola, Antti

    2018-03-01

    We have developed a Bayesian aerosol retrieval (BAR) algorithm for the retrieval of aerosol optical depth (AOD) over land from the Moderate Resolution Imaging Spectroradiometer (MODIS). In the BAR algorithm, we simultaneously retrieve all dark land pixels in a granule, utilize spatial correlation models for the unknown aerosol parameters, use a statistical prior model for the surface reflectance, and take into account the uncertainties due to fixed aerosol models. The retrieved parameters are total AOD at 0.55 µm, fine-mode fraction (FMF), and surface reflectances at four different wavelengths (0.47, 0.55, 0.64, and 2.1 µm). The accuracy of the new algorithm is evaluated by comparing the AOD retrievals to Aerosol Robotic Network (AERONET) AOD. The results show that the BAR significantly improves the accuracy of AOD retrievals over the operational Dark Target (DT) algorithm. A reduction of about 29 % in the AOD root mean square error and decrease of about 80 % in the median bias of AOD were found globally when the BAR was used instead of the DT algorithm. Furthermore, the fraction of AOD retrievals inside the ±(0.05+15 %) expected error envelope increased from 55 to 76 %. In addition to retrieving the values of AOD, FMF, and surface reflectance, the BAR also gives pixel-level posterior uncertainty estimates for the retrieved parameters. The BAR algorithm always results in physical, non-negative AOD values, and the average computation time for a single granule was less than a minute on a modern personal computer.

  11. Nursing home placement in the Donepezil and Memantine in Moderate to Severe Alzheimer's Disease (DOMINO-AD) trial: secondary and post-hoc analyses.

    PubMed

    Howard, Robert; McShane, Rupert; Lindesay, James; Ritchie, Craig; Baldwin, Ashley; Barber, Robert; Burns, Alistair; Dening, Tom; Findlay, David; Holmes, Clive; Jones, Robert; Jones, Roy; McKeith, Ian; Macharouthu, Ajay; O'Brien, John; Sheehan, Bart; Juszczak, Edmund; Katona, Cornelius; Hills, Robert; Knapp, Martin; Ballard, Clive; Brown, Richard G; Banerjee, Sube; Adams, Jessica; Johnson, Tony; Bentham, Peter; Phillips, Patrick P J

    2015-12-01

    Findings from observational studies have suggested a delay in nursing home placement with dementia drug treatment, but findings from a previous randomised trial of patients with mild-to-moderate Alzheimer's disease showed no effect. We investigated the effects of continuation or discontinuation of donepezil and starting of memantine on subsequent nursing home placement in patients with moderate-to-severe Alzheimer's disease. In the randomised, double-blind, placebo-controlled Donepezil and Memantine in Moderate to Severe Alzheimer's Disease (DOMINO-AD) trial, community-living patients with moderate-to-severe Alzheimer's disease (who had been prescribed donepezil continuously for at least 3 months at a dose of 10 mg for at least the previous 6 weeks and had a score of between 5 and 13 on the Standardised Mini-Mental State Examination) were recruited from 15 secondary care memory centres in England and Scotland and randomly allocated to continue donepezil 10 mg per day without memantine, discontinue donepezil without memantine, discontinue donepezil and start memantine 20 mg per day, or continue donepezil 10 mg per day and start memantine 20 mg per day, for 52 weeks. After 52 weeks, choice of treatment was left to participants and their physicians. Place of residence was recorded during the first 52 weeks of the trial and then every 26 weeks for a further 3 years. A secondary outcome of the trial, reported in this study, was nursing home placement: an irreversible move from independent accommodation to a residential caring facility. Analyses restricted to risk of placement in the first year of follow-up after the patients had completed the double-blind phase of the trial were post-hoc. The DOMINO-AD trial is registered with the ISRCTN Registry, number ISRCTN49545035. Between Feb 11, 2008, and March 5, 2010, 73 (25%) patients were randomly assigned to continue donepezil without memantine, 73 (25%) to discontinue donepezil without memantine, 76 (26%) to discontinue

  12. Retrieval with Clustering in a Case-Based Reasoning System for Radiotherapy Treatment Planning

    NASA Astrophysics Data System (ADS)

    Khussainova, Gulmira; Petrovic, Sanja; Jagannathan, Rupa

    2015-05-01

    Radiotherapy treatment planning aims to deliver a sufficient radiation dose to cancerous tumour cells while sparing healthy organs in the tumour surrounding area. This is a trial and error process highly dependent on the medical staff's experience and knowledge. Case-Based Reasoning (CBR) is an artificial intelligence tool that uses past experiences to solve new problems. A CBR system has been developed to facilitate radiotherapy treatment planning for brain cancer. Given a new patient case the existing CBR system retrieves a similar case from an archive of successfully treated patient cases with the suggested treatment plan. The next step requires adaptation of the retrieved treatment plan to meet the specific demands of the new case. The CBR system was tested by medical physicists for the new patient cases. It was discovered that some of the retrieved cases were not suitable and could not be adapted for the new cases. This motivated us to revise the retrieval mechanism of the existing CBR system by adding a clustering stage that clusters cases based on their tumour positions. A number of well-known clustering methods were investigated and employed in the retrieval mechanism. Results using real world brain cancer patient cases have shown that the success rate of the new CBR retrieval is higher than that of the original system.

  13. Retrieval Attempts Enhance Learning, but Retrieval Success (versus Failure) Does Not Matter

    ERIC Educational Resources Information Center

    Kornell, Nate; Klein, Patricia Jacobs; Rawson, Katherine A.

    2015-01-01

    Retrieving information from memory enhances learning. We propose a 2-stage framework to explain the benefits of retrieval. Stage 1 takes place as one attempts to retrieve an answer, which activates knowledge related to the retrieval cue. Stage 2 begins when the answer becomes available, at which point appropriate connections are strengthened and…

  14. New Features in the ADS Abstract Service

    NASA Astrophysics Data System (ADS)

    Eichhorn, G.; Accomazzi, A.; Grant, C. S.; Kurtz, M. J.; ReyBacaicoa, V.; Murray, S. S.

    2001-11-01

    The ADS Abstract Service contains over 2.3 million references in four databases: Astronomy/Astrophysics/Planetary Sciences, Instrumentation, Physics/Geophysics, and Preprints. We provide abstracts and articles free to the astronomical community for all major and many smaller astronomy journals, PhD theses, conference proceedings, and technical reports. These four databases can be queried either separately of jointly. The ADS also has scanned 1.3 million pages in 180,000 articles in the ADS Article Service. This literature archive contains all major Astronomy journals and many smaller journals, as well as conference proceedings, including the abstract books from all the LPSCs back to volume 2. A new feature gives our users the ability to see list of articles that were also read by the readers of a given article. This is a powerful tool to find out what current articles are relevant in a particular field of study. We have recently expanded the citation and reference query capabilities. It allows our users to select papers for which they want to see references or citations and then retrieve these citations/references. Another new capability is the ability to sort a list of articles by their citation count. As usual, users should be reminded that the citations in ADS are incomplete because we do not obtain reference lists from all publishers. In addition, we cannot match all references (e.g. in press, private communications, author errors, some conference papers, etc.). Anyone using the citations for analysis of publishing records should keep this in mind. More work on expanding the citation and reference features is planned over the next year. ADS Home Page http://ads.harvard.edu/

  15. An evidence-based definition of lifelong premature ejaculation: report of the International Society for Sexual Medicine (ISSM) ad hoc committee for the definition of premature ejaculation.

    PubMed

    McMahon, Chris G; Althof, Stanley E; Waldinger, Marcel D; Porst, Hartmut; Dean, John; Sharlip, Ira D; Adaikan, P G; Becher, Edgardo; Broderick, Gregory A; Buvat, Jacques; Dabees, Khalid; Giraldi, Annamaria; Giuliano, François; Hellstrom, Wayne J G; Incrocci, Luca; Laan, Ellen; Meuleman, Eric; Perelman, Michael A; Rosen, Raymond C; Rowland, David L; Segraves, Robert

    2008-07-01

    The medical literature contains several definitions of premature ejaculation (PE). The most commonly quoted definition, the American Psychiatric Association's Diagnostic and Statistical Manual of Mental Disorders-Fourth Edition-Text Revision, and other definitions of PE are all authority based rather than evidence based, and have no support from controlled clinical and/or epidemiological studies. The aim of this article is to develop a contemporary, evidence-based definition of PE. In August 2007, the International Society for Sexual Medicine (ISSM) appointed several international experts in PE to an Ad Hoc Committee for the Definition of Premature Ejaculation. The committee met in Amsterdam in October 2007 to evaluate the strengths and weaknesses of current definitions of PE, to critique the evidence in support of the constructs of ejaculatory latency, ejaculatory control, sexual satisfaction, and personal/interpersonal distress, and to propose a new evidence-based definition of PE. The committee unanimously agreed that the constructs that are necessary to define PE are rapidity of ejaculation, perceived self-efficacy and control, and negative personal consequences from PE. The committee proposed that lifelong PE be defined as ". . . a male sexual dysfunction characterized by ejaculation which always or nearly always occurs prior to or within about one minute of vaginal penetration, and the inability to delay ejaculation on all or nearly all vaginal penetrations, and negative personal consequences, such as distress, bother, frustration and/or the avoidance of sexual intimacy." This definition is limited to men with lifelong PE who engage in vaginal intercourse. The panel concluded that there are insufficient published objective data to propose an evidence-based definition of acquired PE. The ISSM definition of lifelong PE represents the first evidence-based definition of PE. This definition will hopefully lead to the development of new tools and Patient Reported

  16. Less we forget: retrieval cues and release from retrieval-induced forgetting.

    PubMed

    Jonker, Tanya R; Seli, Paul; Macleod, Colin M

    2012-11-01

    Retrieving some items from memory can impair the subsequent recall of other related but not retrieved items, a phenomenon called retrieval-induced forgetting (RIF). The dominant explanation of RIF-the inhibition account-asserts that forgetting occurs because related items are suppressed during retrieval practice to reduce retrieval competition. This item inhibition persists, making it more difficult to recall the related items on a later test. In our set of experiments, each category was designed such that each exemplar belonged to one of two subcategories (e.g., each BIRD exemplar was either a bird of prey or a pet bird), but this subcategory information was not made explicit during study or retrieval practice. Practicing retrieval of items from only one subcategory led to RIF for items from the other subcategory when cued only with the overall category label (BIRD) at test. However, adapting the technique of Gardiner, Craik, and Birtwistle (Journal of Learning and Verbal Behavior 11:778-783, 1972), providing subcategory cues during the final test eliminated RIF. The results challenge the inhibition account's fundamental assumption of cue independence but are consistent with a cue-based interference account.

  17. A short cut to the past: Cueing via concrete objects improves autobiographical memory retrieval in Alzheimer's disease patients.

    PubMed

    Kirk, Marie; Berntsen, Dorthe

    2018-02-01

    Older adults diagnosed with Alzheimer's disease (AD) have difficulties accessing autobiographical memories. However, this deficit tends to spare memories dated to earlier parts of their lives, and may partially reflect retrieval deficits rather than complete memory loss. Introducing a novel paradigm, the present study examines whether autobiographical memory recall can be improved in AD by manipulating the sensory richness, concreteness and cultural dating of the memory cues. Specifically, we examine whether concrete everyday objects historically dated to the participants' youth (e.g., a skipping rope), relative to verbal cues (i.e., the verbal signifiers for the objects) facilitate access to autobiographical memories. The study includes 49 AD patients, and 50 healthy, older matched control participants, all tested on word versus object-cued recall. Both groups recalled significantly more memories, when cued by objects relative to words, but the advantage was significantly larger in the AD group. In both groups, memory descriptions were longer and significantly more episodic in nature in response to object-cued recall. Together these findings suggest that the multimodal nature of the object cues (i.e. vision, olfaction, audition, somatic sensation) along with specific cue characteristics, such as time reference, texture, shape, may constrain the retrieval search, potentially minimizing executive function demands, and hence strategic processing requirements, thus easing access to autobiographical memories in AD. Copyright © 2017 Elsevier Ltd. All rights reserved.

  18. Gunther Tulip Retrievable Inferior Vena Caval Filters: Indications, Efficacy, Retrieval, and Complications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Looby, S.; Given, M.F.; Geoghegan, T.

    Purpose. We evaluated the Gunther Tulip (GT) retrievable inferior vena cava (IVC) filter with regard to indications, filtration efficacy, complications, retrieval window, and use of anticoagulation. Method. A retrospective study was performed of 147 patients (64 men, 83 women; mean age 58.8 years) who underwent retrievable GT filter insertion between 2001 and 2005. The indications for placement included a diagnosis of pulmonary embolism or deep venous thrombosis with a contraindication to anticoagulation (n = 68), pulmonary embolism or deep venous thrombosis while on anticoagulation (n = 49), prophylactic filter placement for high-risk surgical patients with a past history of pulmonarymore » embolism or deep venous thrombosis (n = 20), and a high risk of pulmonary embolism or deep venous thrombosis (n = 10). Forty-nine of the 147 patients did not receive anticoagulation (33.7%) while 96 of 147 patients did, 82 of these receiving warfarin (56.5%), 11 receiving low-molecular weight heparins (7.58%), and 3 receiving antiplatelet agents alone (2.06%). Results. Filter placement was successful in 147 patients (100%). Two patients had two filters inserted. Of the 147 patients, filter deployment was on a permanent basis in 102 and with an intention to retrieve in 45 patients. There were 36 (80%) successful retrievals and 9 (20%) failed retrievals. The mean time to retrieval was 33.6 days. The reasons for failed retrieval included filter struts tightly adherent to the IVC wall (5/9), extreme filter tilt (2/9), and extensive filter thrombus (2/9). Complications included pneumothorax (n = 4), failure of filter expansion (n = 1), and breakthrough pulmonary embolism (n = 1). No IVC thrombotic episodes were recorded. Discussion. The Gunther Tulip retrievable filter can be used as a permanent or a retrievable filter. It is safe and efficacious. GT filters can be safely retrieved at a mean time interval of 33.6 days. The newly developed Celect filter may extend the retrieval

  19. New Data in the ADS Abstract and Article Service

    NASA Astrophysics Data System (ADS)

    Eichhorn, G.; Accomazzi, A.; Grant, C. S.; Kurtz, M. J.; Murray, S. S.

    1996-05-01

    In the last few months the data holdings in the ADS have been considerably expanded. In the abstracts databases we have included over 50,000 abstracts from SPIE conference proceedings (provided by SPIE), a complete set of references for lunar and planetary sciences, and abstracts from recent Lunar and Planetary Institute sponsored conferences (both provided by the Lunar and Planetary Institute). We also extended our cooperation with the CDS in Strasbourg, France by providing a link to the list of objects that are in the SIMBAD database for each reference. The ADS article service now holds full-text articles for 20 years of the Astrophysical Journal Letters, the Astronomical Journal, and the Publications of the Astronomical Society of the Pacific, and 5 years of the Astrophysical Journal on-line. The following journals are being processed and some may be on-line for this AAS meeting: Astrophysical Journal (1975-1989), Astronomy and Astrophysics, Proceedings of the Astronomical Society of Australia, Publications of the Astronomical Society of Japan, Revista Mexicana, Bulletin of the Astronomical Society of India, Obs. Reports of Skalnate Pleso, and Baltic Astronomy. We are now working with two scanning companies to speed up the scanning process and hope that by the end of the year we have all of these journals completely on-line for at least the period 1975 - 1995. Usage statistics for Jan - March 1996: Users Queries References Full Abstracts retrieved retrieved ------------------------------------------- 13,823 365,812 7,953,930 309,866

  20. Implementation of Cloud Retrievals for Tropospheric Emission Spectrometer (TES) Atmospheric Retrievals: Part 1. Description and Characterization of Errors on Trace Gas Retrievals

    NASA Technical Reports Server (NTRS)

    Kulawik, Susan S.; Worden, John; Eldering, Annmarie; Bowman, Kevin; Gunson, Michael; Osterman, Gregory B.; Zhang, Lin; Clough, Shepard A.; Shephard, Mark W.; Beer, Reinhard

    2006-01-01

    We develop an approach to estimate and characterize trace gas retrievals in the presence of clouds in high spectral measurements of upwelling radiance in the infrared spectral region (650-2260/cm). The radiance contribution of clouds is parameterized in terms of a set of frequency-dependent nonscattering optical depths and a cloud height. These cloud parameters are retrieved jointly with surface temperature, emissivity, atmospheric temperature, and trace gases such as ozone from spectral data. We demonstrate the application of this approach using data from the Tropospheric Emission Spectrometer (TES) and test data simulated with a scattering radiative transfer model. We show the value of this approach in that it results in accurate estimates of errors for trace gas retrievals, and the retrieved values improve over the initial guess for a wide range of cloud conditions. Comparisons are made between TES retrievals of ozone, temperature, and water to model fields from the Global Modeling and Assimilation Office (GMAO), temperature retrievals from the Atmospheric Infrared Sounder (AIRS), tropospheric ozone columns from the Goddard Earth Observing System (GEOS) GEOS-Chem, and ozone retrievals from the Total Ozone Mapping Spectrometer (TOMS). In each of these cases, this cloud retrieval approach does not introduce observable biases into TES retrievals.

  1. Probabilistic and machine learning-based retrieval approaches for biomedical dataset retrieval

    PubMed Central

    Karisani, Payam; Qin, Zhaohui S; Agichtein, Eugene

    2018-01-01

    Abstract The bioCADDIE dataset retrieval challenge brought together different approaches to retrieval of biomedical datasets relevant to a user’s query, expressed as a text description of a needed dataset. We describe experiments in applying a data-driven, machine learning-based approach to biomedical dataset retrieval as part of this challenge. We report on a series of experiments carried out to evaluate the performance of both probabilistic and machine learning-driven techniques from information retrieval, as applied to this challenge. Our experiments with probabilistic information retrieval methods, such as query term weight optimization, automatic query expansion and simulated user relevance feedback, demonstrate that automatically boosting the weights of important keywords in a verbose query is more effective than other methods. We also show that although there is a rich space of potential representations and features available in this domain, machine learning-based re-ranking models are not able to improve on probabilistic information retrieval techniques with the currently available training data. The models and algorithms presented in this paper can serve as a viable implementation of a search engine to provide access to biomedical datasets. The retrieval performance is expected to be further improved by using additional training data that is created by expert annotation, or gathered through usage logs, clicks and other processes during natural operation of the system. Database URL: https://github.com/emory-irlab/biocaddie PMID:29688379

  2. Added Value of Far-Infrared Radiometry for Ice Cloud Remote Sensing

    NASA Astrophysics Data System (ADS)

    Libois, Q.; Blanchet, J. P.; Ivanescu, L.; S Pelletier, L.; Laurence, C.

    2017-12-01

    Several cloud retrieval algorithms based on satellite observations in the infrared have been developed in the last decades. However, most of these observations only cover the midinfrared (MIR, λ < 15 μm) part of the spectrum, and none are available in the far-infrared (FIR, λ ≥ 15 μm). Recent developments in FIR sensors technology, though, now make it possible to consider spaceborne remote sensing in the FIR. Here we show that adding a few FIR channels with realistic radiometric performances to existing spaceborne narrowband radiometers would significantly improve their ability to retrieve ice cloud radiative properties. For clouds encountered in the polar regions and the upper troposphere, where the atmosphere above clouds is sufficiently transparent in the FIR, using FIR channels would reduce by more than 50% the uncertainties on retrieved values of optical thickness, effective particle diameter, and cloud top altitude. This would somehow extend the range of applicability of current infrared retrieval methods to the polar regions and to clouds with large optical thickness, where MIR algorithms perform poorly. The high performance of solar reflection-based algorithms would thus be reached in nighttime conditions. Using FIR observations is a promising venue for studying ice cloud microphysics and precipitation processes, which is highly relevant for cirrus clouds and convective towers, and for investigating the water cycle in the driest regions of the atmosphere.

  3. Monetary rewards influence retrieval orientations.

    PubMed

    Halsband, Teresa M; Ferdinand, Nicola K; Bridger, Emma K; Mecklinger, Axel

    2012-09-01

    Reward anticipation during learning is known to support memory formation, but its role in retrieval processes is so far unclear. Retrieval orientations, as a reflection of controlled retrieval processing, are one aspect of retrieval that might be modulated by reward. These processes can be measured using the event-related potentials (ERPs) elicited by retrieval cues from tasks with different retrieval requirements, such as via changes in the class of targeted memory information. To determine whether retrieval orientations of this kind are modulated by reward during learning, we investigated the effects of high and low reward expectancy on the ERP correlates of retrieval orientation in two separate experiments. The reward manipulation at study in Experiment 1 was associated with later memory performance, whereas in Experiment 2, reward was directly linked to accuracy in the study task. In both studies, the participants encoded mixed lists of pictures and words preceded by high- or low-reward cues. After 24 h, they performed a recognition memory exclusion task, with words as the test items. In addition to a previously reported material-specific effect of retrieval orientation, a frontally distributed, reward-associated retrieval orientation effect was found in both experiments. These findings suggest that reward motivation during learning leads to the adoption of a reward-associated retrieval orientation to support the retrieval of highly motivational information. Thus, ERP retrieval orientation effects not only reflect retrieval processes related to the sought-for materials, but also relate to the reward conditions with which items were combined during encoding.

  4. Retrieval of Emotional Memories

    PubMed Central

    Buchanan, Tony W.

    2008-01-01

    Long-term memories are influenced by the emotion experienced during learning as well as by the emotion experienced during memory retrieval. The present article reviews the literature addressing the effects of emotion on retrieval, focusing on the cognitive and neurological mechanisms that have been revealed. The reviewed research suggests that the amygdala, in combination with the hippocampus and prefrontal cortex, plays an important role in the retrieval of memories for emotional events. The neural regions necessary for online emotional processing also influence emotional memory retrieval, perhaps through the reexperience of emotion during the retrieval process. PMID:17723029

  5. A Preliminary ZEUS Lightning Location Error Analysis Using a Modified Retrieval Theory

    NASA Technical Reports Server (NTRS)

    Elander, Valjean; Koshak, William; Phanord, Dieudonne

    2004-01-01

    The ZEUS long-range VLF arrival time difference lightning detection network now covers both Europe and Africa, and there are plans for further expansion into the western hemisphere. In order to fully optimize and assess ZEUS lightning location retrieval errors and to determine the best placement of future receivers expected to be added to the network, a software package is being developed jointly between the NASA Marshall Space Flight Center (MSFC) and the University of Nevada Las Vegas (UNLV). The software package, called the ZEUS Error Analysis for Lightning (ZEAL), will be used to obtain global scale lightning location retrieval error maps using both a Monte Carlo approach and chi-squared curvature matrix theory. At the core of ZEAL will be an implementation of an Iterative Oblate (IO) lightning location retrieval method recently developed at MSFC. The IO method will be appropriately modified to account for variable wave propagation speed, and the new retrieval results will be compared with the current ZEUS retrieval algorithm to assess potential improvements. In this preliminary ZEAL work effort, we defined 5000 source locations evenly distributed across the Earth. We then used the existing (as well as potential future ZEUS sites) to simulate arrival time data between source and ZEUS site. A total of 100 sources were considered at each of the 5000 locations, and timing errors were selected from a normal distribution having a mean of 0 seconds and a standard deviation of 20 microseconds. This simulated "noisy" dataset was analyzed using the IO algorithm to estimate source locations. The exact locations were compared with the retrieved locations, and the results are summarized via several color-coded "error maps."

  6. Sembragiline in Moderate Alzheimer’s Disease: Results of a Randomized, Double-Blind, Placebo-Controlled Phase II Trial (MAyflOwer RoAD)

    PubMed Central

    Nave, Stephane; Doody, Rachelle S.; Boada, Mercè; Grimmer, Timo; Savola, Juha-Matti; Delmar, Paul; Pauly-Evers, Meike; Nikolcheva, Tania; Czech, Christian; Borroni, Edilio; Ricci, Benedicte; Dukart, Juergen; Mannino, Marie; Carey, Tracie; Moran, Emma; Gilaberte, Inma; Muelhardt, Nicoletta Milani; Gerlach, Irene; Santarelli, Luca; Ostrowitzki, Susanne; Fontoura, Paulo

    2017-01-01

    Background: Sembragiline is a potent, selective, long-acting, and reversible MAO-B inhibitor developed as a potential treatment for Alzheimer’s disease (AD). Objective: To evaluate the safety, tolerability, and efficacy of sembragiline in patients with moderate AD. Methods: In this Phase II study (NCT01677754), 542 patients with moderate dementia (MMSE 13–20) on background acetylcholinesterase inhibitors with/without memantine were randomized (1:1:1) to sembragiline 1 mg, 5 mg, or placebo once daily orally for 52 weeks. Results: No differences between treated groups and placebo in adverse events or in study completion. The primary endpoint, change from baseline in ADAS-Cog11, was not met. At Week 52, the difference between sembragiline and placebo in ADAS-Cog11 change from baseline was – 0.15 (p = 0.865) and 0.90 (p = 0.312) for 1 and 5 mg groups, respectively. Relative to placebo at Week 52 (but not at prior assessment times), the 1 mg and 5 mg sembragiline groups showed differences in ADCS-ADL of 2.64 (p = 0.051) and 1.89 (p = 0.160), respectively. A treatment effect in neuropsychiatric symptoms (as assessed by the difference between sembragiline and placebo on BEHAVE-AD-FW) was also seen at Week 52 only: – 2.80 (p = 0.014; 1 mg) and – 2.64 (p = 0.019; 5 mg), respectively. A post hoc subgroup analysis revealed greater treatment effects on behavior and functioning in patients with more severe baseline behavioral symptoms (above the median). Conclusions: This study showed that sembragiline was well-tolerated in patients with moderate AD. The study missed its primary and secondary endpoints. Post hoc analyses suggested potential effect on neuropsychiatric symptoms and functioning in more behaviorally impaired study population at baseline. PMID:28550255

  7. Competitive retrieval is not a prerequisite for forgetting in the retrieval practice paradigm.

    PubMed

    Camp, Gino; Dalm, Sander

    2016-09-01

    Retrieving information from memory can lead to forgetting of other, related information. The inhibition account of this retrieval-induced forgetting effect predicts that this form of forgetting occurs when competition arises between the practiced information and the related information, leading to inhibition of the related information. In the standard retrieval practice paradigm, a retrieval practice task is used in which participants retrieve the items based on a category-plus-stem cue (e.g., FRUIT-or___). In the current experiment, participants instead generated the target based on a cue in which the first 2 letters of the target were transposed (e.g., FRUIT-roange). This noncompetitive task also induced forgetting of unpracticed items from practiced categories. This finding is inconsistent with the inhibition account, which asserts that the forgetting effect depends on competitive retrieval. We argue that interference-based accounts of forgetting and the context-based account of retrieval-induced forgetting can account for this result. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  8. Retrieval-practice task affects relationship between working memory capacity and retrieval-induced forgetting.

    PubMed

    Storm, Benjamin C; Bui, Dung C

    2016-11-01

    Retrieving a subset of items from memory can cause forgetting of other items in memory, a phenomenon referred to as retrieval-induced forgetting (RIF). Individuals who exhibit greater amounts of RIF have been shown to also exhibit superior working memory capacity (WMC) and faster stop-signal reaction times (SSRTs), results which have been interpreted as suggesting that RIF reflects an inhibitory process that is mediated by the processes of executive control. Across four experiments, we sought to further elucidate this issue by manipulating the way in which participants retrieved items during retrieval practice and examining how the resulting effects of forgetting correlated with WMC (Experiments 1-3) and SSRT (Experiment 4). Significant correlations were observed when participants retrieved items from an earlier study phase (within-list retrieval practice), but not when participants generated items from semantic memory (extra-list retrieval practice). These results provide important new insight into the role of executive-control processes in RIF.

  9. An incremental DPMM-based method for trajectory clustering, modeling, and retrieval.

    PubMed

    Hu, Weiming; Li, Xi; Tian, Guodong; Maybank, Stephen; Zhang, Zhongfei

    2013-05-01

    Trajectory analysis is the basis for many applications, such as indexing of motion events in videos, activity recognition, and surveillance. In this paper, the Dirichlet process mixture model (DPMM) is applied to trajectory clustering, modeling, and retrieval. We propose an incremental version of a DPMM-based clustering algorithm and apply it to cluster trajectories. An appropriate number of trajectory clusters is determined automatically. When trajectories belonging to new clusters arrive, the new clusters can be identified online and added to the model without any retraining using the previous data. A time-sensitive Dirichlet process mixture model (tDPMM) is applied to each trajectory cluster for learning the trajectory pattern which represents the time-series characteristics of the trajectories in the cluster. Then, a parameterized index is constructed for each cluster. A novel likelihood estimation algorithm for the tDPMM is proposed, and a trajectory-based video retrieval model is developed. The tDPMM-based probabilistic matching method and the DPMM-based model growing method are combined to make the retrieval model scalable and adaptable. Experimental comparisons with state-of-the-art algorithms demonstrate the effectiveness of our algorithm.

  10. Homoclinic chaos in axisymmetric Bianchi-IX cosmological models with an ad hoc quantum potential

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Correa, G. C.; Stuchi, T. J.; Joras, S. E.

    2010-04-15

    In this work we study the dynamics of the axisymmetric Bianchi-IX cosmological model with a term of quantum potential added. As it is well known, this class of Bianchi-IX models is homogeneous and anisotropic with two scale factors, A(t) and B(t), derived from the solution of Einstein's equation for general relativity. The model we use in this work has a cosmological constant and the matter content is dust. To this model we add a quantum-inspired potential that is intended to represent short-range effects due to the general relativistic behavior of matter in small scales and play the role of amore » repulsive force near the singularity. We find that this potential restricts the dynamics of the model to positive values of A(t) and B(t) and alters some qualitative and quantitative characteristics of the dynamics studied previously by several authors. We make a complete analysis of the phase space of the model finding critical points, periodic orbits, stable/unstable manifolds using numerical techniques such as Poincare section, numerical continuation of orbits, and numerical globalization of invariant manifolds. We compare the classical and the quantum models. Our main result is the existence of homoclinic crossings of the stable and unstable manifolds in the physically meaningful region of the phase space [where both A(t) and B(t) are positive], indicating chaotic escape to inflation and bouncing near the singularity.« less

  11. Group differences in adult simple arithmetic: good retrievers, not-so-good retrievers, and perfectionists.

    PubMed

    Hecht, Steven A

    2006-01-01

    We used the choice/no-choice methodology in two experiments to examine patterns of strategy selection and execution in groups of undergraduates. Comparisons between choice and no-choice trials revealed three groups. Some participants good retrievers) were consistently able to use retrieval to solve almost all arithmetic problems. Other participants (perfectionists) successfully used retrieval substantially less often in choice-allowed trials than when strategy choices were prohibited. Not-so-good retrievers retrieved correct answers less often than the other participants in both the choice-allowed and no-choice conditions. No group differences emerged with respect to time needed to search and access answers from long-term memory; however, not-so-good retrievers were consistently slower than the other subgroups at executing fact-retrieval processes that are peripheral to memory search and access. Theoretical models of simple arithmetic, such as the Strategy Choice and Discovery Simulation (Shrager & Siegler, 1998), should be updated to include the existence of both perfectionist and not-so-good retriever adults.

  12. Toward an Episodic Context Account of Retrieval-Based Learning: Dissociating Retrieval Practice and Elaboration

    ERIC Educational Resources Information Center

    Lehman, Melissa; Smith, Megan A.; Karpicke, Jeffrey D.

    2014-01-01

    We tested the predictions of 2 explanations for retrieval-based learning; while the elaborative retrieval hypothesis assumes that the retrieval of studied information promotes the generation of semantically related information, which aids in later retrieval (Carpenter, 2009), the episodic context account proposed by Karpicke, Lehman, and Aue (in…

  13. Can We Retrieve the Information Which Was Intentionally Forgotten? Electrophysiological Correlates of Strategic Retrieval in Directed Forgetting.

    PubMed

    Mao, Xinrui; Tian, Mengxi; Liu, Yi; Li, Bingcan; Jin, Yan; Wu, Yanhong; Guo, Chunyan

    2017-01-01

    Retrieval inhibition hypothesis of directed forgetting effects assumed TBF (to-be-forgotten) items were not retrieved intentionally, while selective rehearsal hypothesis assumed the memory representation of retrieved TBF (to-be-forgotten) items was weaker than TBR (to-be-remembered) items. Previous studies indicated that directed forgetting effects of item-cueing method resulted from selective rehearsal at encoding, but the mechanism of retrieval inhibition that affected directed forgetting of TBF (to-be-forgotten) items was not clear. Strategic retrieval is a control process allowing the selective retrieval of target information, which includes retrieval orientation and strategic recollection. Retrieval orientation via the comparison of tasks refers to the specific form of processing resulted by retrieval efforts. Strategic recollection is the type of strategies to recollect studied items for the retrieval success of targets. Using a "directed forgetting" paradigm combined with a memory exclusion task, our investigation of strategic retrieval in directed forgetting assisted to explore how retrieval inhibition played a role on directed forgetting effects. When TBF items were targeted, retrieval orientation showed more positive ERPs to new items, indicating that TBF items demanded more retrieval efforts. The results of strategic recollection indicated that: (a) when TBR items were retrieval targets, late parietal old/new effects were only evoked by TBR items but not TBF items, indicating the retrieval inhibition of TBF items; (b) when TBF items were retrieval targets, the late parietal old/new effect were evoked by both TBR items and TBF items, indicating that strategic retrieval could overcome retrieval inhibition of TBF items. These findings suggested the modulation of strategic retrieval on retrieval inhibition of directed forgetting, supporting that directed forgetting effects were not only caused by selective rehearsal, but also retrieval inhibition.

  14. Can We Retrieve the Information Which Was Intentionally Forgotten? Electrophysiological Correlates of Strategic Retrieval in Directed Forgetting

    PubMed Central

    Mao, Xinrui; Tian, Mengxi; Liu, Yi; Li, Bingcan; Jin, Yan; Wu, Yanhong; Guo, Chunyan

    2017-01-01

    Retrieval inhibition hypothesis of directed forgetting effects assumed TBF (to-be-forgotten) items were not retrieved intentionally, while selective rehearsal hypothesis assumed the memory representation of retrieved TBF (to-be-forgotten) items was weaker than TBR (to-be-remembered) items. Previous studies indicated that directed forgetting effects of item-cueing method resulted from selective rehearsal at encoding, but the mechanism of retrieval inhibition that affected directed forgetting of TBF (to-be-forgotten) items was not clear. Strategic retrieval is a control process allowing the selective retrieval of target information, which includes retrieval orientation and strategic recollection. Retrieval orientation via the comparison of tasks refers to the specific form of processing resulted by retrieval efforts. Strategic recollection is the type of strategies to recollect studied items for the retrieval success of targets. Using a “directed forgetting” paradigm combined with a memory exclusion task, our investigation of strategic retrieval in directed forgetting assisted to explore how retrieval inhibition played a role on directed forgetting effects. When TBF items were targeted, retrieval orientation showed more positive ERPs to new items, indicating that TBF items demanded more retrieval efforts. The results of strategic recollection indicated that: (a) when TBR items were retrieval targets, late parietal old/new effects were only evoked by TBR items but not TBF items, indicating the retrieval inhibition of TBF items; (b) when TBF items were retrieval targets, the late parietal old/new effect were evoked by both TBR items and TBF items, indicating that strategic retrieval could overcome retrieval inhibition of TBF items. These findings suggested the modulation of strategic retrieval on retrieval inhibition of directed forgetting, supporting that directed forgetting effects were not only caused by selective rehearsal, but also retrieval inhibition. PMID

  15. Joint aerosol and water-leaving radiance retrieval from Airborne Multi-angle SpectroPolarimeter Imager

    NASA Astrophysics Data System (ADS)

    Xu, F.; Dubovik, O.; Zhai, P.; Kalashnikova, O. V.; Diner, D. J.

    2015-12-01

    The Airborne Multiangle SpectroPolarimetric Imager (AirMSPI) [1] has been flying aboard the NASA ER-2 high altitude aircraft since October 2010. In step-and-stare operation mode, AirMSPI typically acquires observations of a target area at 9 view angles between ±67° off the nadir. Its spectral channels are centered at 355, 380, 445, 470*, 555, 660*, and 865* nm, where the asterisk denotes the polarimetric bands. In order to retrieve information from the AirMSPI observations, we developed a efficient and flexible retrieval code that can jointly retrieve aerosol and water leaving radiance simultaneously. The forward model employs a coupled Markov Chain (MC) [2] and adding/doubling [3] radiative transfer method which is fully linearized and integrated with a multi-patch retrieval algorithm to obtain aerosol and water leaving radiance/Chl-a information. Various constraints are imposed to improve convergence and retrieval stability. We tested the aerosol and water leaving radiance retrievals using the AirMSPI radiance and polarization measurements by comparing to the retrieved aerosol concentration, size distribution, water-leaving radiance, and chlorophyll concentration to the values reported by the USC SeaPRISM AERONET-OC site off the coast of Southern California. In addition, the MC-based retrievals of aerosol properties were compared with GRASP ([4-5]) retrievals for selected cases. The MC-based retrieval approach was then used to systematically explore the benefits of AirMSPI's ultraviolet and polarimetric channels, the use of multiple view angles, and constraints provided by inclusion of bio-optical models of the water-leaving radiance. References [1]. D. J. Diner, et al. Atmos. Meas. Tech. 6, 1717 (2013). [2]. F. Xu et al. Opt. Lett. 36, 2083 (2011). [3]. J. E. Hansen and L.D. Travis. Space Sci. Rev. 16, 527 (1974). [4]. O. Dubovik et al. Atmos. Meas. Tech., 4, 975 (2011). [5]. O. Dubovik et al. SPIE: Newsroom, DOI:10.1117/2.1201408.005558 (2014).

  16. Phase retrieval in annulus sector domain by non-iterative methods

    NASA Astrophysics Data System (ADS)

    Wang, Xiao; Mao, Heng; Zhao, Da-zun

    2008-03-01

    Phase retrieval could be achieved by solving the intensity transport equation (ITE) under the paraxial approximation. For the case of uniform illumination, Neumann boundary condition is involved and it makes the solving process more complicated. The primary mirror is usually designed segmented in the telescope with large aperture, and the shape of a segmented piece is often like an annulus sector. Accordingly, It is necessary to analyze the phase retrieval in the annulus sector domain. Two non-iterative methods are considered for recovering the phase. The matrix method is based on the decomposition of the solution into a series of orthogonalized polynomials, while the frequency filtering method depends on the inverse computation process of ITE. By the simulation, it is found that both methods can eliminate the effect of Neumann boundary condition, save a lot of computation time and recover the distorted phase well. The wavefront error (WFE) RMS can be less than 0.05 wavelength, even when some noise is added.

  17. Connectionist Interaction Information Retrieval.

    ERIC Educational Resources Information Center

    Dominich, Sandor

    2003-01-01

    Discussion of connectionist views for adaptive clustering in information retrieval focuses on a connectionist clustering technique and activation spreading-based information retrieval model using the interaction information retrieval method. Presents theoretical as well as simulation results as regards computational complexity and includes…

  18. Noncompetitive retrieval practice causes retrieval-induced forgetting in cued recall but not in recognition.

    PubMed

    Grundgeiger, Tobias

    2014-04-01

    Retrieving a subset of learned items can lead to the forgetting of related items. Such retrieval-induced forgetting (RIF) can be explained by the inhibition of irrelevant items in order to overcome retrieval competition when the target item is retrieved. According to the retrieval inhibition account, such retrieval competition is a necessary condition for RIF. However, research has indicated that noncompetitive retrieval practice can also cause RIF by strengthening cue-item associations. According to the strength-dependent competition account, the strengthened items interfere with the retrieval of weaker items, resulting in impaired recall of weaker items in the final memory test. The aim of this study was to replicate RIF caused by noncompetitive retrieval practice and to determine whether this forgetting is also observed in recognition tests. In the context of RIF, it has been assumed that recognition tests circumvent interference and, therefore, should not be sensitive to forgetting due to strength-dependent competition. However, this has not been empirically tested, and it has been suggested that participants may reinstate learned cues as retrieval aids during the final test. In the present experiments, competitive practice or noncompetitive practice was followed by either final cued-recall tests or recognition tests. In cued-recall tests, RIF was observed in both competitive and noncompetitive conditions. However, in recognition tests, RIF was observed only in the competitive condition and was absent in the noncompetitive condition. The result underscores the contribution of strength-dependent competition to RIF. However, recognition tests seem to be a reliable way of distinguishing between RIF due to retrieval inhibition or strength-dependent competition.

  19. Constructing the AdS dual of a Fermi liquid: AdS black holes with Dirac hair

    NASA Astrophysics Data System (ADS)

    Čubrović, Mihailo; Zaanen, Jan; Schalm, Koenraad

    2011-10-01

    We provide evidence that the holographic dual to a strongly coupled charged Fermi liquid has a non-zero fermion density in the bulk. We show that the pole-strength of the stable quasiparticle characterizing the Fermi surface is encoded in the AdS probability density of a single normalizable fermion wavefunction in AdS. Recalling Migdal's theorem which relates the pole strength to the Fermi-Dirac characteristic discontinuity in the number density at ω F , we conclude that the AdS dual of a Fermi liquid is described by occupied on-shell fermionic modes in AdS. Encoding the occupied levels in the total spatially averaged probability density of the fermion field directly, we show that an AdS Reissner-Nordström black holein a theory with charged fermions has a critical temperature, at which the system undergoes a first-order transition to a black hole with a non-vanishing profile for the bulk fermion field. Thermodynamics and spectral analysis support that the solution with non-zero AdS fermion-profile is the preferred ground state at low temperatures.

  20. Chinese Herbal Medicine Image Recognition and Retrieval by Convolutional Neural Network

    PubMed Central

    Sun, Xin; Qian, Huinan

    2016-01-01

    Chinese herbal medicine image recognition and retrieval have great potential of practical applications. Several previous studies have focused on the recognition with hand-crafted image features, but there are two limitations in them. Firstly, most of these hand-crafted features are low-level image representation, which is easily affected by noise and background. Secondly, the medicine images are very clean without any backgrounds, which makes it difficult to use in practical applications. Therefore, designing high-level image representation for recognition and retrieval in real world medicine images is facing a great challenge. Inspired by the recent progress of deep learning in computer vision, we realize that deep learning methods may provide robust medicine image representation. In this paper, we propose to use the Convolutional Neural Network (CNN) for Chinese herbal medicine image recognition and retrieval. For the recognition problem, we use the softmax loss to optimize the recognition network; then for the retrieval problem, we fine-tune the recognition network by adding a triplet loss to search for the most similar medicine images. To evaluate our method, we construct a public database of herbal medicine images with cluttered backgrounds, which has in total 5523 images with 95 popular Chinese medicine categories. Experimental results show that our method can achieve the average recognition precision of 71% and the average retrieval precision of 53% over all the 95 medicine categories, which are quite promising given the fact that the real world images have multiple pieces of occluded herbal and cluttered backgrounds. Besides, our proposed method achieves the state-of-the-art performance by improving previous studies with a large margin. PMID:27258404

  1. Exploring the Effects of Cloud Vertical Structure on Cloud Microphysical Retrievals based on Polarized Reflectances

    NASA Astrophysics Data System (ADS)

    Miller, D. J.; Zhang, Z.; Platnick, S. E.; Ackerman, A. S.; Cornet, C.; Baum, B. A.

    2013-12-01

    A polarized cloud reflectance simulator was developed by coupling an LES cloud model with a polarized radiative transfer model to assess the capabilities of polarimetric cloud retrievals. With future remote sensing campaigns like NASA's Aerosols/Clouds/Ecosystems (ACE) planning to feature advanced polarimetric instruments it is important for the cloud remote sensing community to understand the retrievable information available and the related systematic/methodical limitations. The cloud retrieval simulator we have developed allows us to probe these important questions in a realistically relevant test bed. Our simulator utilizes a polarized adding-doubling radiative transfer model and an LES cloud field from a DHARMA simulation (Ackerman et al. 2004) with cloud properties based on the stratocumulus clouds observed during the DYCOMS-II field campaign. In this study we will focus on how the vertical structure of cloud microphysics can influence polarized cloud effective radius retrievals. Numerous previous studies have explored how retrievals based on total reflectance are affected by cloud vertical structure (Platnick 2000, Chang and Li 2002) but no such studies about the effects of vertical structure on polarized retrievals exist. Unlike the total cloud reflectance, which is predominantly multiply scattered light, the polarized reflectance is primarily the result of singly scattered photons. Thus the polarized reflectance is sensitive to only the uppermost region of the cloud (tau~<1) where photons can scatter once and still escape before being scattered again. This means that retrievals based on polarized reflectance have the potential to reveal behaviors specific to the cloud top. For example cloud top entrainment of dry air, a major influencer on the microphysical development of cloud droplets, can be potentially studied with polarimetric retrievals.

  2. [Competition-dependence on retrieval-induced forgetting: the influence of the amount of retrieval cues].

    PubMed

    Yamada, Yohei; Tsukimoto, Takashi; Hirano, Tetsuji

    2010-02-01

    Remembering some of the studied (target) items impairs subsequent remembrance of relevant (non-target) items. This phenomenon, retrieval-induced forgetting (RIF), occurs when non-targets actively compete with the retrieval of a target. Researchers suggest that suppression mechanisms reduce interference from relevant items to facilitate the retrieval of target items (Anderson, 2003). Competition-dependence is one of the properties that support the suppression hypothesis (Anderson, Bjork, & Bjork, 1994). In the present study, we manipulated the type of retrieval practice (normal, last-letter, or category-name) in order to vary the degree of competition between the target and the non-targets. For the high-scoring retrieval practice group, RIF occurred in the normal retrieval condition, but not in the last-letter or in the category-name conditions. For the low-scoring retrieval practice group, RIF did not occur in any of the conditions. These findings provide new evidence that the occurrence of RIF depends on the degree of competition between a target item and related non-target items during retrieval practice.

  3. Mathematics and Information Retrieval.

    ERIC Educational Resources Information Center

    Salton, Gerald

    1979-01-01

    Examines the main mathematical approaches to information retrieval, including both algebraic and probabilistic models, and describes difficulties which impede formalization of information retrieval processes. A number of developments are covered where new theoretical understandings have directly led to improved retrieval techniques and operations.…

  4. The present status and problems in document retrieval system : document input type retrieval system

    NASA Astrophysics Data System (ADS)

    Inagaki, Hirohito

    The office-automation (OA) made many changes. Many documents were begun to maintained in an electronic filing system. Therefore, it is needed to establish efficient document retrieval system to extract useful information. Current document retrieval systems are using simple word-matching, syntactic-matching, semantic-matching to obtain high retrieval efficiency. On the other hand, the document retrieval systems using special hardware devices, such as ISSP, were developed for aiming high speed retrieval. Since these systems can accept a single sentence or keywords as input, it is difficult to explain searcher's request. We demonstrated document input type retrieval system, which can directly accept document as an input, and can search similar documents from document data-base.

  5. Visual associations to retrieve episodic memory across healthy elderly, mild cognitive impairment, and patients with Alzheimer's disease.

    PubMed

    Meyer, Sascha R A; De Jonghe, Jos F M; Schmand, Ben; Ponds, Rudolf W H M

    2018-05-16

    Episodic memory tests need to determine the degree to which patients with moderate to severe memory deficits can still benefit from retrieval support. Especially in the case of Alzheimer's disease (AD), this may support health care to be more closely aligned with patients' memory capacities. We investigated whether the different measures of episodic memory of the Visual Association Test-Extended (VAT-E) can provide a more detailed and informative assessment on memory disturbances across a broad range of cognitive decline, from normal to severe impairment as seen in AD, by examining differences in floor effects. The VAT-E consists of 24 pairs of black-and-white line drawings. In a within-group design, we compared score distributions of VAT-E subtests in healthy elderly controls, mild cognitive impairment (MCI), and AD (n = 144), as well as in relation to global cognitive impairment. Paired associate recall showed a floor effect in 41% of MCI patients and 62% of AD patients. Free recall showed a floor effect in 73% of MCI patients and 84% of AD patients. Multiple-choice cued recognition did not show a floor effect in either of the patient groups. We conclude that the VAT-E covers a broad range of episodic memory decline in patients. As expected, paired associate recall was of intermediate difficulty, free recall was most difficult, and multiple-choice cued recognition was least difficult for patients. These varying levels of difficulty enable a more accurate determination of the level of retrieval support that can still benefit patients across a broad range of cognitive decline.

  6. User-oriented evaluation of a medical image retrieval system for radiologists.

    PubMed

    Markonis, Dimitrios; Holzer, Markus; Baroz, Frederic; De Castaneda, Rafael Luis Ruiz; Boyer, Célia; Langs, Georg; Müller, Henning

    2015-10-01

    This article reports the user-oriented evaluation of a text- and content-based medical image retrieval system. User tests with radiologists using a search system for images in the medical literature are presented. The goal of the tests is to assess the usability of the system, identify system and interface aspects that need improvement and useful additions. Another objective is to investigate the system's added value to radiology information retrieval. The study provides an insight into required specifications and potential shortcomings of medical image retrieval systems through a concrete methodology for conducting user tests. User tests with a working image retrieval system of images from the biomedical literature were performed in an iterative manner, where each iteration had the participants perform radiology information seeking tasks and then refining the system as well as the user study design itself. During these tasks the interaction of the users with the system was monitored, usability aspects were measured, retrieval success rates recorded and feedback was collected through survey forms. In total, 16 radiologists participated in the user tests. The success rates in finding relevant information were on average 87% and 78% for image and case retrieval tasks, respectively. The average time for a successful search was below 3 min in both cases. Users felt quickly comfortable with the novel techniques and tools (after 5 to 15 min), such as content-based image retrieval and relevance feedback. User satisfaction measures show a very positive attitude toward the system's functionalities while the user feedback helped identifying the system's weak points. The participants proposed several potentially useful new functionalities, such as filtering by imaging modality and search for articles using image examples. The iterative character of the evaluation helped to obtain diverse and detailed feedback on all system aspects. Radiologists are quickly familiar with the

  7. EVA Retriever Demonstration

    NASA Technical Reports Server (NTRS)

    1988-01-01

    The EVA retriever is demonstrated in the Manipulator Development Facility (MDF). The retriever moves on the air bearing table 'searching' for its target, in this case tools 'dropped' by astronauts on orbit.

  8. Segmented strings in AdS 3

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Callebaut, Nele; Gubser, Steven S.; Samberg, Andreas

    We study segmented strings in flat space and in AdS 3. In flat space, these well known classical motions describe strings which at any instant of time are piecewise linear. In AdS 3, the worldsheet is composed of faces each of which is a region bounded by null geodesics in an AdS 2 subspace of AdS 3. The time evolution can be described by specifying the null geodesic motion of kinks in the string at which two segments are joined. The outcome of collisions of kinks on the worldsheet can be worked out essentially using considerations of causality. We studymore » several examples of closed segmented strings in AdS 3 and find an unexpected quasi-periodic behavior. Here, we also work out a WKB analysis of quantum states of yo-yo strings in AdS 5 and find a logarithmic term reminiscent of the logarithmic twist of string states on the leading Regge trajectory.« less

  9. Segmented strings in AdS 3

    DOE PAGES

    Callebaut, Nele; Gubser, Steven S.; Samberg, Andreas; ...

    2015-11-17

    We study segmented strings in flat space and in AdS 3. In flat space, these well known classical motions describe strings which at any instant of time are piecewise linear. In AdS 3, the worldsheet is composed of faces each of which is a region bounded by null geodesics in an AdS 2 subspace of AdS 3. The time evolution can be described by specifying the null geodesic motion of kinks in the string at which two segments are joined. The outcome of collisions of kinks on the worldsheet can be worked out essentially using considerations of causality. We studymore » several examples of closed segmented strings in AdS 3 and find an unexpected quasi-periodic behavior. Here, we also work out a WKB analysis of quantum states of yo-yo strings in AdS 5 and find a logarithmic term reminiscent of the logarithmic twist of string states on the leading Regge trajectory.« less

  10. Effects of Spaced Retrieval Training on Semantic Memory in Alzheimer's Disease: A Systematic Review

    ERIC Educational Resources Information Center

    Oren, Shiri; Willerton, Charlene; Small, Jeff

    2014-01-01

    Purpose: This article reports on a systematic review and meta-analysis of the effects of spaced retrieval training (SRT) on semantic memory in people with Alzheimer's disease (AD) or related disorder. Method: An initial systematic database search identified 454 potential studies. After screening and de-duplication, 35 studies that used SRT…

  11. Retrieving self-vocalized information: An event-related potential (ERP) study on the effect of retrieval orientation.

    PubMed

    Rosburg, Timm; Johansson, Mikael; Sprondel, Volker; Mecklinger, Axel

    2014-11-18

    Retrieval orientation refers to a pre-retrieval process and conceptualizes the specific form of processing that is applied to a retrieval cue. In the current event-related potential (ERP) study, we sought to find evidence for an involvement of the auditory cortex when subjects attempt to retrieve vocalized information, and hypothesized that adopting retrieval orientation would be beneficial for retrieval accuracy. During study, participants saw object words that they subsequently vocalized or visually imagined. At test, participants had to identify object names of one study condition as targets and to reject object names of the second condition together with new items. Target category switched after half of the test trials. Behaviorally, participants responded less accurately and more slowly to targets of the vocalize condition than to targets of the imagine condition. ERPs to new items varied at a single left electrode (T7) between 500 and 800ms, indicating a moderate retrieval orientation effect in the subject group as a whole. However, whereas the effect was strongly pronounced in participants with high retrieval accuracy, it was absent in participants with low retrieval accuracy. A current source density (CSD) mapping of the retrieval orientation effect indicated a source over left temporal regions. Independently from retrieval accuracy, the ERP retrieval orientation effect was surprisingly also modulated by test order. Findings are suggestive for an involvement of the auditory cortex in retrieval attempts of vocalized information and confirm that adopting retrieval orientation is potentially beneficial for retrieval accuracy. The effects of test order on retrieval-related processes might reflect a stronger focus on the newness of items in the more difficult test condition when participants started with this condition. Copyright © 2014 Elsevier Inc. All rights reserved.

  12. Optimization of Photospheric Electric Field Estimates for Accurate Retrieval of Total Magnetic Energy Injection

    NASA Astrophysics Data System (ADS)

    Lumme, E.; Pomoell, J.; Kilpua, E. K. J.

    2017-12-01

    Estimates of the photospheric magnetic, electric, and plasma velocity fields are essential for studying the dynamics of the solar atmosphere, for example through the derivative quantities of Poynting and relative helicity flux and using the fields to obtain the lower boundary condition for data-driven coronal simulations. In this paper we study the performance of a data processing and electric field inversion approach that requires only high-resolution and high-cadence line-of-sight or vector magnetograms, which we obtain from the Helioseismic and Magnetic Imager (HMI) onboard Solar Dynamics Observatory (SDO). The approach does not require any photospheric velocity estimates, and the lacking velocity information is compensated for using ad hoc assumptions. We show that the free parameters of these assumptions can be optimized to reproduce the time evolution of the total magnetic energy injection through the photosphere in NOAA AR 11158, when compared to recent state-of-the-art estimates for this active region. However, we find that the relative magnetic helicity injection is reproduced poorly, reaching at best a modest underestimation. We also discuss the effect of some of the data processing details on the results, including the masking of the noise-dominated pixels and the tracking method of the active region, neither of which has received much attention in the literature so far. In most cases the effect of these details is small, but when the optimization of the free parameters of the ad hoc assumptions is considered, a consistent use of the noise mask is required. The results found in this paper imply that the data processing and electric field inversion approach that uses only the photospheric magnetic field information offers a flexible and straightforward way to obtain photospheric magnetic and electric field estimates suitable for practical applications such as coronal modeling studies.

  13. Feedback increases benefits but not costs of retrieval practice: Retrieval-induced forgetting is strength independent.

    PubMed

    Tempel, Tobias; Frings, Christian

    2018-04-01

    We examined how the provision of feedback affected two separate effects of retrieval practice: strengthening of practiced information and forgetting of related, unpracticed information. Feedback substantially increased recall of retrieval-practiced items. This unsurprising result shows once again that restudy opportunities boost the benefits of testing. In contrast, retrieval-induced forgetting was unaffected by the manipulation and occurred in equal size with or without feedback. These findings demonstrate strength independence of retrieval-induced forgetting and thus support a theoretical account assuming that an inhibitory mechanism causes retrieval-induced forgetting. According to this theory, inhibition resolves competition that arises during retrieval attempts but is unrelated to the consequences of retrieval practice concerning practiced items. The present results match these assumptions and contradict the theoretical alternative that blocking by strengthened information might explain retrieval-induced forgetting. We discuss our findings against the background of previous studies.

  14. FHWA White Paper on Mobile Ad Hoc Networks

    DOT National Transportation Integrated Search

    2018-01-01

    Advanced next generation communications technologies offer the potential to greatly improve safety, system efficiency, and mobility across our Nations roadways. These new technologies and processes can address both traditionally difficult as well ...

  15. Supporting Secure, AD HOC Joins for Tactical Networks

    DTIC Science & Technology

    2002-05-07

    ftp.isi.edu/in-notes/ rfc2501.txt (20SEP01). [4] Deitel , Harvery M. and Paul J. Deitel . Java: How to Program 3rd Edition. (Prentice Hall: New...produce a complete product, to include the construction of TTNT hardware. The TTNT program is concerned with frequency hopping schemes, error correcting...Configuration To create the digital certificates needed for the client authentication, we modified a hybrid file encryption program that used a Rivest-Shamir

  16. Enabling Secure High-Performance Wireless Ad Hoc Networking

    DTIC Science & Technology

    2003-05-29

    destinations, consuming energy and available bandwidth. An attacker may similarly create a routing black hole, in which all packets are dropped: by sending...of the vertex cut, for example by forwarding only routing packets and not data packets, such that the nodes waste energy forwarding packets to the...with limited resources, including network bandwidth and the CPU processing capacity, memory, and battery power ( energy ) of each individual node in the

  17. Secure Ad Hoc Networking on an Android Platform

    DTIC Science & Technology

    2014-05-01

    Once the device is provisioned, connections can be initiated by tapping two devices together, this uses NFC to bootstrap a Bluetooth connection. Once...4 2.2 Residual Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 3 Device Provisioning 5 3.1...the inclusion of SE Android’s Install-time Mandatory Access Control (MAC) feature. Some knowledge of Android is required to understand the system

  18. Ad Hoc Network Architecture for Multi-Media Networks

    DTIC Science & Technology

    2007-12-01

    sensor network . Video traffic is modeled and simulations are performed via the use of the Sun Small Programmable Object Technology (Sun SPOT) Java...characteristics of video traffic must be studied and understood. This thesis focuses on evaluating the possibility of routing video images over a wireless

  19. Robust Connectivity in Sensory and Ad Hoc Network

    DTIC Science & Technology

    2011-02-01

    as the prior probability is π0 = 0.8, the error probability should be capped at 0.2. This seemingly pathological result is due to the fact that the...publications and is the author of the book Multirate and Wavelet Signal Processing (Academic Press, 1998). His research interests include multiscale signal and

  20. Accurate ab initio quartic force fields for the ions HCO(+) and HOC(+)

    NASA Technical Reports Server (NTRS)

    Martin, J. M. L.; Taylor, Peter R.; Lee, Timothy J.

    1993-01-01

    The quartic force fields of HCO(+) and HOC(+) have been computed using augmented coupled cluster methods and basis sets of spdf and spdfg quality. Calculations on HCN, CO, and N2 have been performed to assist in calibrating the computed results. Going from an spdf to an spdfg basis shortens triple bonds by about 0.004 A, and increases the corresponding harmonic frequency by 10-20/cm, leaving bond distances about 0.003 A too long and triple bond stretching frequencies about 5/cm too low. Accurate estimates for the bond distances, fundamental frequencies, and thermochemical quantities are given. HOC(+) lies 37.8 +/- 0.5 kcal/mol (0 K) above HCO(+); the classical barrier height for proton exchange is 76.7 +/- 1.0 kcal/mol.

  1. Relational information processing of novel unrelated actions by infants.

    PubMed

    Knopf, Monika; Kraus, Uta; Kressley-Mba, Regina A

    2006-01-01

    Declarative memory in infants is often assessed via deferred imitation. Not much is known about the information processing basis of the memory effect found in these experiments. While in the typical deferred imitation study the order of actions remains the same during demonstration and retrieval, in two experiments with n=30 respective n=25, 10- and 11-month-old infants, the order of novel unrelated actions in demonstration and retrieval was varied (same, reversed, mixed). This allowed a separation of item-specific from item-relational information processing. In both experiments best memory performance was found when the order of target actions remained the same during encoding and recall, demonstrating that infants seem to rely on item-specific as well as item-relational information which has to be ad hoc constructed while encoding.

  2. Multisensor Retrieval of Atmospheric Properties.

    NASA Astrophysics Data System (ADS)

    Boba Stankov, B.

    1998-09-01

    A new method, Multisensor Retrieval of Atmospheric Properties (MRAP), is presented for deriving vertical profiles of atmospheric parameters throughout the troposphere. MRAP integrates measurements from multiple, diverse, remote sensing, and in situ instruments, the combination of which provides better capabilities than any instrument alone. Since remote sensors can deliver measurements automatically and continuously with high time resolution, MRAP provides better coverage than traditional rawinsondes. MRAP's design is flexible, being capable of incorporating measurements from different instruments in order to take advantage of new or developing advanced sensor technology. Furthermore, new or alternative atmospheric parameters for a variety of applications may be easily added as products of MRAP.A combination of passive radiometric, active radar, and in situ observations provide the best temperature and humidity profile measurements. Therefore, MRAP starts with a traditional, radiometer-based, physical retrieval algorithm provided by the International TOVS (TIROS-N Operational Vertical Sounder) Processing Package (ITPP) that constrains the retrieved profiles to agree with brightness temperature measurements. The first-guess profiles required by the ITPP's iterative retrieval algorithm are obtained by using a statistical inversion technique and ground-based remote sensing measurements. Because the individual ground-based remote sensing measurements are usually of sufficiently high quality, the first-guess profiles by themselves provide a satisfactory solution to establish the atmospheric water vapor and temperature state, and the TOVS data are included to provide profiles with better accuracy at higher levels, MRAP provides a physically consistent mechanism for combining the ground- and space-based humidity and temperature profiles.Data that have been used successfully to retrieve humidity and temperature profiles with MRAP are the following: temperature profiles in

  3. Synergistic atmospheric retrievals: Using OMEGA and PFS to retrieve martian CO

    NASA Astrophysics Data System (ADS)

    Robert, S.; Aoki, S.; Piccialli, A.; Audouard, J.; Montmessin, F.; Ferron, S.; Altieri, F.; Bellucci, G.; Geminale, A.; Giuranna, M.; Sindoni, G.; Vandaele, A. C.

    2017-09-01

    Recently, a theoretical study was published showing how science return can benefit from synergistic retrievals [Robert et al., 2017]. The same approach is here applied to experimental data. OMEGA and PFS instruments, both on Mars Express spacecraft, have collected high-quality data enabling us to retrieve CO volume mixing ratio, among others. The synergy between OMEGA and PFS channels will be presented and the benefits of the synergy will be described by comparing synergistic spectral retrievals and non-synergistic ones.

  4. Warped AdS3 black holes

    NASA Astrophysics Data System (ADS)

    Song, Wei; Anninos, Dionysios; Li, Wei; Padi, Megha; Strominger, Andrew

    2009-03-01

    Three dimensional topologically massive gravity (TMG) with a negative cosmological constant -ell-2 and positive Newton constant G admits an AdS3 vacuum solution for any value of the graviton mass μ. These are all known to be perturbatively unstable except at the recently explored chiral point μell = 1. However we show herein that for every value of μell ≠ 3 there are two other (potentially stable) vacuum solutions given by SL(2,Bbb R) × U(1)-invariant warped AdS3 geometries, with a timelike or spacelike U(1) isometry. Critical behavior occurs at μell = 3, where the warping transitions from a stretching to a squashing, and there are a pair of warped solutions with a null U(1) isometry. For μell > 3, there are known warped black hole solutions which are asymptotic to warped AdS3. We show that these black holes are discrete quotients of warped AdS3 just as BTZ black holes are discrete quotients of ordinary AdS3. Moreover new solutions of this type, relevant to any theory with warped AdS3 solutions, are exhibited. Finally we note that the black hole thermodynamics is consistent with the hypothesis that, for μell > 3, the warped AdS3 ground state of TMG is holographically dual to a 2D boundary CFT with central charges c_R-formula and c_L-formula.

  5. Warped AdS3 black holes

    NASA Astrophysics Data System (ADS)

    Anninos, Dionysios; Li, Wei; Padi, Megha; Song, Wei; Strominger, Andrew

    2009-03-01

    Three dimensional topologically massive gravity (TMG) with a negative cosmological constant -l-2 and positive Newton constant G admits an AdS3 vacuum solution for any value of the graviton mass μ. These are all known to be perturbatively unstable except at the recently explored chiral point μl = 1. However we show herein that for every value of μl ≠ 3 there are two other (potentially stable) vacuum solutions given by SL(2,Bbb R) × U(1)-invariant warped AdS3 geometries, with a timelike or spacelike U(1) isometry. Critical behavior occurs at μl = 3, where the warping transitions from a stretching to a squashing, and there are a pair of warped solutions with a null U(1) isometry. For μl > 3, there are known warped black hole solutions which are asymptotic to warped AdS3. We show that these black holes are discrete quotients of warped AdS3 just as BTZ black holes are discrete quotients of ordinary AdS3. Moreover new solutions of this type, relevant to any theory with warped AdS3 solutions, are exhibited. Finally we note that the black hole thermodynamics is consistent with the hypothesis that, for μl > 3, the warped AdS3 ground state of TMG is holographically dual to a 2D boundary CFT with central charges c_R-formula and c_L-formula.

  6. Retrieval feedback in MEDLINE.

    PubMed Central

    Srinivasan, P

    1996-01-01

    OBJECTIVE: To investigate a new approach for query expansion based on retrieval feedback. The first objective in this study was to examine alternative query-expansion methods within the same retrieval-feedback framework. The three alternatives proposed are: expansion on the MeSH query field alone, expansion on the free-text field alone, and expansion on both the MeSH and the free-text fields. The second objective was to gain further understanding of retrieval feedback by examining possible dependencies on relevant documents during the feedback cycle. DESIGN: Comparative study of retrieval effectiveness using the original unexpanded and the alternative expanded user queries on a MEDLINE test collection of 75 queries and 2,334 MEDLINE citations. MEASUREMENTS: Retrieval effectivenesses of the original unexpanded and the alternative expanded queries were compared using 11-point-average precision scores (11-AvgP). These are averages of precision scores obtained at 11 standard recall points. RESULTS: All three expansion strategies significantly improved the original queries in terms of retrieval effectiveness. Expansion on MeSH alone was equivalent to expansion on both MeSH and the free-text fields. Expansion on the free-text field alone improved the queries significantly less than did the other two strategies. The second part of the study indicated that retrieval-feedback-based expansion yields significant performance improvements independent of the availability of relevant documents for feedback information. CONCLUSIONS: Retrieval feedback offers a robust procedure for query expansion that is most effective for MEDLINE when applied to the MeSH field. PMID:8653452

  7. Trial-to-trial dynamics of selective long-term-memory retrieval with continuously changing retrieval targets.

    PubMed

    Kizilirmak, Jasmin M; Rösler, Frank; Khader, Patrick H

    2014-10-01

    How do we control the successive retrieval of behaviorally relevant information from long-term memory (LTM) without being distracted by other potential retrieval targets associated to the same retrieval cues? Here, we approach this question by investigating the nature of trial-by-trial dynamics of selective LTM retrieval, i.e., in how far retrieval in one trial has detrimental or facilitatory effects on selective retrieval in the following trial. Participants first learned associations between retrieval cues and targets, with one cue always being linked to three targets, forming small associative networks. In successive trials, participants had to access either the same or a different target belonging to either the same or a different cue. We found that retrieval times were faster for targets that had already been relevant in the previous trial, with this facilitatory effect being substantially weaker when the associative network changed in which the targets were embedded. Moreover, staying within the same network still had a facilitatory effect even if the target changed, which became evident in a relatively higher memory performance in comparison to a network change. Furthermore, event-related brain potentials (ERPs) showed topographically and temporally dissociable correlates of these effects, suggesting that they result from combined influences of distinct processes that aid memory retrieval when relevant and irrelevant targets change their status from trial to trial. Taken together, the present study provides insight into the different processing stages of memory retrieval when fast switches between retrieval targets are required. Copyright © 2014 Elsevier Inc. All rights reserved.

  8. Retrieving clear-air turbulence information from regular commercial aircraft using Mode-S and ADS-B broadcast

    NASA Astrophysics Data System (ADS)

    Kopeć, J. M.; Kwiatkowski, K.; de Haan, S.; Malinowski, S. P.

    2015-11-01

    Navigational information broadcast by commercial aircraft in the form of Mode-S and ADS-B messages can be considered a new and valid source of upper air turbulence measurements. A set of three processing methods is proposed and analysed using a quality record of turbulence encounters made by a research aircraft. The proposed methods are based on processing the vertical acceleration or the background wind into the eddy dissipation rate. All the necessary parameters are conveyed in the Mode-S/ADS-B messages. The comparison of the results of application of the processing against a reference eddy dissipation rate obtained using on-board accelerometer indicate a significant potential of those methods. The advantages and limitation of the presented approaches are discussed.

  9. CDAPubMed: a browser extension to retrieve EHR-based biomedical literature.

    PubMed

    Perez-Rey, David; Jimenez-Castellanos, Ana; Garcia-Remesal, Miguel; Crespo, Jose; Maojo, Victor

    2012-04-05

    of HL7-CDA documents, returning significantly fewer citations since queries are focused on characteristics identified within the EHR. For instance, compared with more than 200,000 citations retrieved by breast neoplasm, fewer than ten citations were retrieved when ten patient features were added using CDAPubMed. This is an open source tool that can be freely used for non-profit purposes and integrated with other existing systems.

  10. The Traffic Adaptive Data Dissemination (TrAD) Protocol for both Urban and Highway Scenarios.

    PubMed

    Tian, Bin; Hou, Kun Mean; Zhou, Haiying

    2016-06-21

    The worldwide economic cost of road crashes and injuries is estimated to be US$518 billion per year and the annual congestion cost in France is estimated to be €5.9 billion. Vehicular Ad hoc Networks (VANETs) are one solution to improve transport features such as traffic safety, traffic jam and infotainment on wheels, where a great number of event-driven messages need to be disseminated in a timely way in a region of interest. In comparison with traditional wireless networks, VANETs have to consider the highly dynamic network topology and lossy links due to node mobility. Inter-Vehicle Communication (IVC) protocols are the keystone of VANETs. According to our survey, most of the proposed IVC protocols focus on either highway or urban scenarios, but not on both. Furthermore, too few protocols, considering both scenarios, can achieve high performance. In this paper, an infrastructure-less Traffic Adaptive data Dissemination (TrAD) protocol which takes into account road traffic and network traffic status for both highway and urban scenarios will be presented. TrAD has double broadcast suppression techniques and is designed to adapt efficiently to the irregular road topology. The performance of the TrAD protocol was evaluated quantitatively by means of realistic simulations taking into account different real road maps, traffic routes and vehicular densities. The obtained simulation results show that TrAD is more efficient in terms of packet delivery ratio, number of transmissions and delay in comparison with the performance of three well-known reference protocols. Moreover, TrAD can also tolerate a reasonable degree of GPS drift and still achieve efficient data dissemination.

  11. The Traffic Adaptive Data Dissemination (TrAD) Protocol for both Urban and Highway Scenarios

    PubMed Central

    Tian, Bin; Hou, Kun Mean; Zhou, Haiying

    2016-01-01

    The worldwide economic cost of road crashes and injuries is estimated to be US$518 billion per year and the annual congestion cost in France is estimated to be €5.9 billion. Vehicular Ad hoc Networks (VANETs) are one solution to improve transport features such as traffic safety, traffic jam and infotainment on wheels, where a great number of event-driven messages need to be disseminated in a timely way in a region of interest. In comparison with traditional wireless networks, VANETs have to consider the highly dynamic network topology and lossy links due to node mobility. Inter-Vehicle Communication (IVC) protocols are the keystone of VANETs. According to our survey, most of the proposed IVC protocols focus on either highway or urban scenarios, but not on both. Furthermore, too few protocols, considering both scenarios, can achieve high performance. In this paper, an infrastructure-less Traffic Adaptive data Dissemination (TrAD) protocol which takes into account road traffic and network traffic status for both highway and urban scenarios will be presented. TrAD has double broadcast suppression techniques and is designed to adapt efficiently to the irregular road topology. The performance of the TrAD protocol was evaluated quantitatively by means of realistic simulations taking into account different real road maps, traffic routes and vehicular densities. The obtained simulation results show that TrAD is more efficient in terms of packet delivery ratio, number of transmissions and delay in comparison with the performance of three well-known reference protocols. Moreover, TrAD can also tolerate a reasonable degree of GPS drift and still achieve efficient data dissemination. PMID:27338393

  12. Knowledge Retrieval Solutions.

    ERIC Educational Resources Information Center

    Khan, Kamran

    1998-01-01

    Excalibur RetrievalWare offers true knowledge retrieval solutions. Its fundamental technologies, Adaptive Pattern Recognition Processing and Semantic Networks, have capabilities for knowledge discovery and knowledge management of full-text, structured and visual information. The software delivers a combination of accuracy, extensibility,…

  13. Alzheimer Disease Biomarkers, Attentional Control and Semantic Memory Retrieval: Synergistic and Mediational Effects of Biomarkers on a Sensitive Cognitive Measure

    PubMed Central

    Aschenbrenner, Andrew J.; Balota, David A.; Tse, Chi-Shing; Fagan, Anne M.; Holtzman, David M.; Benzinger, Tammie L.S.; Morris, John C.

    2014-01-01

    Objective Past studies have shown that measures of attentional control and semantic memory are sensitive markers of Alzheimer disease (AD). The effects of established biomarkers of AD (cerebrospinal fluid tau and amyloid-beta42, PET-PIB, and APOE genotype) on concurrent cognitive performance in cognitively normal individuals have been mixed. The present study examined the utility of combining attentional control with semantic retrieval as a sensitive correlate of AD biomarkers and used mediation analyses to examine possible mechanisms by which the biomarkers influence cognition. Method 363 participants completed a category verification task (CVT) and 113 of them concurrently underwent biomarker assessments. On each trial, participants viewed a category (e.g. “unit of time”) and verified whether a subsequent target item was an exemplar of the category (“hour”) or not (“clock”). Importantly, the nonmembers of the category were associatively related to the category (e.g., “clock” is not “a unit of time”, but is highly related), and demanded attentional control to reject. Results Accuracy to the foil items was the strongest discriminator between healthy aging and very mild symptomatic AD. CSF biomarkers had independent yet synergistic influence on CVT performance in cognitively healthy older adults. Furthermore, the influence of the biomarkers and APOE genotype was mediated primarily through increased levels of PIB. Conclusion The combined influence of attentional control with semantic retrieval is a marker of symptomatic AD and a sensitive correlate of established biomarkers for AD risk in cognitively healthy participants. The biomarkers influenced cognition primarily through increased levels of amyloid in the brain. PMID:25222200

  14. Accuracy of retrieving temperature and humidity profiles by ground-based microwave radiometry in truly complex terrain

    NASA Astrophysics Data System (ADS)

    Massaro, G.; Stiperski, I.; Pospichal, B.; Rotach, M. W.

    2015-03-01

    Within the Innsbruck Box project, a ground-based microwave radiometer (RPG-HATPRO) was operated in the Inn Valley (Austria), in very complex terrain, between September 2012 and May 2013 to obtain temperature and humidity vertical profiles of the full troposphere with a specific focus on the valley boundary layer. The profiles obtained by the radiometer with different retrieval algorithms based on different climatologies, are compared to local radiosonde data. A retrieval that is improved with respect to the one provided by the manufacturer, based on better resolved data, shows a significantly smaller root mean square error (RMSE), both for the temperature and humidity profiles. The improvement is particularly substantial at the heights close to the mountaintop level and in the upper troposphere. Lower level inversions, common in an alpine valley, are resolved to a satisfactory degree. On the other hand, upper level inversions (above 1200 m) still pose a significant challenge for retrieval. For this purpose, specialized retrieval algorithms were developed by classifying the radiosonde climatologies into specialized categories according to different criteria (seasons, daytime, nighttime) and using additional regressors (e.g., measurements from mountain stations). The training and testing on the radiosonde data for these specialized categories suggests that a classification of profiles that reproduces meaningful physical characteristics can yield improved targeted specialized retrievals. A really new and very promising method of improving the profile retrieval in a mountain region is adding further information in the retrieval, such as the surface temperature at fixed levels along a topographic slope or from nearby mountain tops.

  15. A Hierarchical Auction-Based Mechanism for Real-Time Resource Allocation in Cloud Robotic Systems.

    PubMed

    Wang, Lujia; Liu, Ming; Meng, Max Q-H

    2017-02-01

    Cloud computing enables users to share computing resources on-demand. The cloud computing framework cannot be directly mapped to cloud robotic systems with ad hoc networks since cloud robotic systems have additional constraints such as limited bandwidth and dynamic structure. However, most multirobotic applications with cooperative control adopt this decentralized approach to avoid a single point of failure. Robots need to continuously update intensive data to execute tasks in a coordinated manner, which implies real-time requirements. Thus, a resource allocation strategy is required, especially in such resource-constrained environments. This paper proposes a hierarchical auction-based mechanism, namely link quality matrix (LQM) auction, which is suitable for ad hoc networks by introducing a link quality indicator. The proposed algorithm produces a fast and robust method that is accurate and scalable. It reduces both global communication and unnecessary repeated computation. The proposed method is designed for firm real-time resource retrieval for physical multirobot systems. A joint surveillance scenario empirically validates the proposed mechanism by assessing several practical metrics. The results show that the proposed LQM auction outperforms state-of-the-art algorithms for resource allocation.

  16. A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs

    PubMed Central

    Wang, Lingling; Liu, Guozhu; Sun, Lijun

    2017-01-01

    Fog-based VANETs (Vehicular ad hoc networks) is a new paradigm of vehicular ad hoc networks with the advantages of both vehicular cloud and fog computing. Real-time navigation schemes based on fog-based VANETs can promote the scheme performance efficiently. In this paper, we propose a secure and privacy-preserving navigation scheme by using vehicular spatial crowdsourcing based on fog-based VANETs. Fog nodes are used to generate and release the crowdsourcing tasks, and cooperatively find the optimal route according to the real-time traffic information collected by vehicles in their coverage areas. Meanwhile, the vehicle performing the crowdsourcing task can get a reasonable reward. The querying vehicle can retrieve the navigation results from each fog node successively when entering its coverage area, and follow the optimal route to the next fog node until it reaches the desired destination. Our scheme fulfills the security and privacy requirements of authentication, confidentiality and conditional privacy preservation. Some cryptographic primitives, including the Elgamal encryption algorithm, AES, randomized anonymous credentials and group signatures, are adopted to achieve this goal. Finally, we analyze the security and the efficiency of the proposed scheme. PMID:28338620

  17. A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs.

    PubMed

    Wang, Lingling; Liu, Guozhu; Sun, Lijun

    2017-03-24

    Fog-based VANETs (Vehicular ad hoc networks) is a new paradigm of vehicular ad hoc networks with the advantages of both vehicular cloud and fog computing. Real-time navigation schemes based on fog-based VANETs can promote the scheme performance efficiently. In this paper, we propose a secure and privacy-preserving navigation scheme by using vehicular spatial crowdsourcing based on fog-based VANETs. Fog nodes are used to generate and release the crowdsourcing tasks, and cooperatively find the optimal route according to the real-time traffic information collected by vehicles in their coverage areas. Meanwhile, the vehicle performing the crowdsourcing task can get a reasonable reward. The querying vehicle can retrieve the navigation results from each fog node successively when entering its coverage area, and follow the optimal route to the next fog node until it reaches the desired destination. Our scheme fulfills the security and privacy requirements of authentication, confidentiality and conditional privacy preservation. Some cryptographic primitives, including the Elgamal encryption algorithm, AES, randomized anonymous credentials and group signatures, are adopted to achieve this goal. Finally, we analyze the security and the efficiency of the proposed scheme.

  18. Topological Aspects of Information Retrieval.

    ERIC Educational Resources Information Center

    Egghe, Leo; Rousseau, Ronald

    1998-01-01

    Discusses topological aspects of theoretical information retrieval, including retrieval topology; similarity topology; pseudo-metric topology; document spaces as topological spaces; Boolean information retrieval as a subsystem of any topological system; and proofs of theorems. (LRW)

  19. Retrieving autobiographical memories: How different retrieval strategies associated with different cues explain reaction time differences.

    PubMed

    Uzer, Tugba

    2016-02-01

    Previous research has shown that memories cued by concrete concepts, such as objects, are retrieved faster than those cued by more abstract concepts, such as emotions. This effect has been explained by the fact that more memories are directly retrieved from object versus emotion cues. In the present study, we tested whether RT differences between memories cued by emotion versus object terms occur not only because object cues elicit direct retrieval of more memories (Uzer, Lee, & Brown, 2012), but also because of differences in memory generation in response to emotions versus objects. One hundred university students retrieved memories in response to basic-level (e.g. orange), superordinate-level (e.g. plant), and emotion (e.g. surprised) cues. Retrieval speed was measured and participants reported whether memories were directly retrieved or generated on each trial. Results showed that memories were retrieved faster in response to basic-level versus superordinate-level and emotion cues because a) basic-level cues elicited more directly retrieved memories, and b) generating memories was more difficult when cues were abstract versus concrete. These results suggest that generative retrieval is a cue generation process in which additional cues that provide contextual information including the target event are produced. Memories are retrieved more slowly in response to emotion cues in part because emotion labels are less effective cues of appropriate contextual information. This particular finding is inconsistent with the idea that emotion is a primary organizational unit for autobiographical memories. In contrast, the difficulty of emotional memory generation implies that emotions represent low-level event information in the organization of autobiographical memory. Copyright © 2016 Elsevier B.V. All rights reserved.

  20. Recollection-Based Retrieval Is Influenced by Contextual Variation at Encoding but Not at Retrieval

    PubMed Central

    Rosenstreich, Eyal; Goshen-Gottstein, Yonatan

    2015-01-01

    In this article, we investigated the effects of variations at encoding and retrieval on recollection. We argue that recollection is more likely to be affected by the processing that information undergoes at encoding than at retrieval. To date, manipulations shown to affect recollection were typically carried out at encoding. Therefore, an open question is whether these same manipulations would also affect recollection when carried out at retrieval, or whether there is an inherent connection between their effects on recollection and the encoding stage. We therefore manipulated, at either encoding or retrieval, fluency of processing (Experiment 1)—typically found not to affect recollection—and the amount of attentional resources available for processing (Experiments 2 and 3)—typically reported to affect recollection. We found that regardless of the type of manipulation, recollection was affected more by manipulations carried out at encoding and was essentially unaffected when these manipulations were carried out at retrieval. These findings suggest an inherent dependency between recollection-based retrieval and the encoding stage. It seems that because recollection is a contextual-based retrieval process, it is determined by the processing information undergoes at encoding—at the time when context is bound with the items—but not at retrieval—when context is only recovered. PMID:26135583

  1. Retrieval-induced forgetting without competition: testing the retrieval specificity assumption of the inhibition theory.

    PubMed

    Raaijmakers, Jeroen G W; Jakab, Emoke

    2012-01-01

    According to the inhibition theory of forgetting (Anderson, Journal of Memory and Language 49:415-445, 2003; Anderson, Bjork, & Bjork, Psychonomic Bulletin & Review 7:522-530, 2000), retrieval practice on a subset of target items leads to forgetting for the other, nontarget items, due to the fact that these other items interfere during the retrieval process and have to be inhibited in order to resolve the interference. In this account, retrieval-induced forgetting occurs only when competition takes place between target and nontarget items during target item practice, since only in such a case is inhibition of the nontarget items necessary. Strengthening of the target item without active retrieval should not lead to such an impairment. In two experiments, we investigated this assumption by using noncompetitive retrieval during the practice phase. We strengthened the cue-target item association during practice by recall of the category name instead of the target item, and thus eliminated competition between the different item types (as in Anderson et al., Psychonomic Bulletin & Review 7:522-530 2000). In contrast to the expectations of the inhibition theory, retrieval-induced forgetting occurred even without competition, and thus the present study does not support the retrieval specificity assumption.

  2. Booster Sessions Enhance the Long-Term Effectiveness of Spaced Retrieval in Older Adults with Probable Alzheimer's Disease

    ERIC Educational Resources Information Center

    Cherry, Katie E.; Hawley, Karri S.; Jackson, Erin M.; Boudreaux, Emily O.

    2009-01-01

    Six older adults with probable Alzheimer's disease (AD) were trained to recall a name-face association using the spaced retrieval technique. In this study, we retested these persons in a 6-month follow-up program. For half of the participants, three booster sessions were administered at 6, 12, and 18 weeks after original training to promote…

  3. Information Retrieval: A Sequential Learning Process.

    ERIC Educational Resources Information Center

    Bookstein, Abraham

    1983-01-01

    Presents decision-theoretic models which intrinsically include retrieval of multiple documents whereby system responds to request by presenting documents to patron in sequence, gathering feedback, and using information to modify future retrievals. Document independence model, set retrieval model, sequential retrieval model, learning model,…

  4. DORS: DDC Online Retrieval System.

    ERIC Educational Resources Information Center

    Liu, Songqiao; Svenonius, Elaine

    1991-01-01

    Describes the Dewey Online Retrieval System (DORS), which was developed at the University of California, Los Angeles (UCLA), to experiment with classification-based search strategies in online catalogs. Classification structures in automated information retrieval are discussed; and specifications for a classification retrieval interface are…

  5. Validity of a semantically cued recall procedure for the mini-mental state examination.

    PubMed

    Yuspeh, R L; Vanderploeg, R D; Kershaw, D A

    1998-10-01

    The validity of supplementing the three-item recall portion of the Mini-Mental State Examination (MMSE) with a cued recall procedure to help specify the nature of patients' memory problems was examined. Subjects were 247 individuals representing three diagnostic groups: Alzheimer's disease (AD), subcortical vascular ischemic dementia (SVaD), and normal controls. Individuals were administered a battery of neuropsychological tests, including the MMSE, as part of a comprehensive evaluation for the presence of dementia or other neurologic disorder. MMSE performance differed among groups. The three-item free recall performance also differed among groups, with post hoc analyses revealing the AD and SVaD groups were more impaired than controls but did not differ significantly from each other. Following a cued recall procedure of the MMSE three-items, groups differed, with post hoc analyses showing that AD patients failed to benefit from cues, whereas SVaD patients performed significantly better and comparable to control subjects. Significant correlations between the MMSE three-item cued recall performance and other memory measures demonstrated concurrent validity. Consistent with previous research indicating that SVaD is associated with memory encoding and retrieval deficits, whereas AD is associated with consolidation and storage problems, the present study supported the validity of the cued recall procedure of the three items on the MMSE in helping to distinguish between patients with AD and those with a vascular dementia with primarily subcortical pathology; however, despite these findings, a more extensive battery of neuropsychological measures is still recommended to consistently assess subtle diagnostic differences in these memory processes.

  6. Accuracy of retrieving temperature and humidity profiles by ground-based microwave radiometry in truly complex terrain

    NASA Astrophysics Data System (ADS)

    Massaro, G.; Stiperski, I.; Pospichal, B.; Rotach, M. W.

    2015-08-01

    Within the Innsbruck Box project, a ground-based microwave radiometer (RPG-HATPRO) was operated in the Inn Valley (Austria), in very complex terrain, between September 2012 and May 2013 to obtain temperature and humidity vertical profiles of the full troposphere with a specific focus on the valley boundary layer. In order to assess its performance in a deep alpine valley, the profiles obtained by the radiometer with different retrieval algorithms based on different climatologies are compared to local radiosonde data. A retrieval that is improved with respect to the one provided by the manufacturer, based on better resolved data, shows a significantly smaller root mean square error (RMSE), both for the temperature and humidity profiles. The improvement is particularly substantial at the heights close to the mountaintop level and in the upper troposphere. Lower-level inversions, common in an alpine valley, are resolved to a satisfactory degree. On the other hand, upper-level inversions (above 1200 m) still pose a significant challenge for retrieval. For this purpose, specialized retrieval algorithms were developed by classifying the radiosonde climatologies into specialized categories according to different criteria (seasons, daytime, nighttime) and using additional regressors (e.g., measurements from mountain stations). The training and testing on the radiosonde data for these specialized categories suggests that a classification of profiles that reproduces meaningful physical characteristics can yield improved targeted specialized retrievals. A novel and very promising method of improving the profile retrieval in a mountainous region is adding further information in the retrieval, such as the surface temperature at fixed levels along a topographic slope or from nearby mountaintops.

  7. Coupled retrieval of aerosol properties and land surface reflection using the Airborne Multiangle SpectroPolarimetric Imager

    NASA Astrophysics Data System (ADS)

    Xu, Feng; van Harten, Gerard; Diner, David J.; Kalashnikova, Olga V.; Seidel, Felix C.; Bruegge, Carol J.; Dubovik, Oleg

    2017-07-01

    The Airborne Multiangle SpectroPolarimetric Imager (AirMSPI) has been flying aboard the NASA ER-2 high-altitude aircraft since October 2010. In step-and-stare operation mode, AirMSPI acquires radiance and polarization data in bands centered at 355, 380, 445, 470*, 555, 660*, 865*, and 935 nm (* denotes polarimetric bands). The imaged area covers about 10 km by 11 km and is typically observed from nine viewing angles between ±66° off nadir. For a simultaneous retrieval of aerosol properties and surface reflection using AirMSPI, an efficient and flexible retrieval algorithm has been developed. It imposes multiple types of physical constraints on spectral and spatial variations of aerosol properties as well as spectral and temporal variations of surface reflection. Retrieval uncertainty is formulated by accounting for both instrumental errors and physical constraints. A hybrid Markov-chain/adding-doubling radiative transfer (RT) model is developed to combine the computational strengths of these two methods in modeling polarized RT in vertically inhomogeneous and homogeneous media, respectively. Our retrieval approach is tested using 27 AirMSPI data sets with low to moderately high aerosol loadings, acquired during four NASA field campaigns plus one AirMSPI preengineering test flight. The retrieval results including aerosol optical depth, single-scattering albedo, aerosol size and refractive index are compared with Aerosol Robotic Network reference data. We identify the best angular combinations for 2, 3, 5, and 7 angle observations from the retrieval quality assessment of various angular combinations. We also explore the benefits of polarimetric and multiangular measurements and target revisits in constraining aerosol property and surface reflection retrieval.

  8. Enhanced Information Retrieval Using AJAX

    NASA Astrophysics Data System (ADS)

    Kachhwaha, Rajendra; Rajvanshi, Nitin

    2010-11-01

    Information Retrieval deals with the representation, storage, organization of, and access to information items. The representation and organization of information items should provide the user with easy access to the information with the rapid development of Internet, large amounts of digitally stored information is readily available on the World Wide Web. This information is so huge that it becomes increasingly difficult and time consuming for the users to find the information relevant to their needs. The explosive growth of information on the Internet has greatly increased the need for information retrieval systems. However, most of the search engines are using conventional information retrieval systems. An information system needs to implement sophisticated pattern matching tools to determine contents at a faster rate. AJAX has recently emerged as the new tool such the of information retrieval process of information retrieval can become fast and information reaches the use at a faster pace as compared to conventional retrieval systems.

  9. Identification of risk conditions for the development of adrenal disorders: how optimized PubMed search strategies makes the difference.

    PubMed

    Guaraldi, Federica; Parasiliti-Caprino, Mirko; Goggi, Riccardo; Beccuti, Guglielmo; Grottoli, Silvia; Arvat, Emanuela; Ghizzoni, Lucia; Ghigo, Ezio; Giordano, Roberta; Gori, Davide

    2014-12-01

    The exponential growth of scientific literature available through electronic databases (namely PubMed) has increased the chance of finding interesting articles. At the same time, search has become more complicated, time consuming, and at risk of missing important information. Therefore, optimized strategies have to be adopted to maximize searching impact. The aim of this study was to formulate efficient strings to search PubMed for etiologic associations between adrenal disorders (ADs) and other conditions. A comprehensive list of terms identifying endogenous conditions primarily affecting adrenals was compiled. An ad hoc analysis was performed to find the best way to express each term in order to find the highest number of potentially pertinent articles in PubMed. A predefined number of retrieved abstracts were read to assess their association with ADs' etiology. A more sensitive (providing the largest literature coverage) and a more specific (including only those terms retrieving >40 % of potentially pertinent articles) string were formulated. Various researches were performed to assess strings' ability to identify articles of interest in comparison with non-optimized literature searches. We formulated optimized, ready applicable tools for the identification of the literature assessing etiologic associations in the field of ADs using PubMed, and demonstrated the advantages deriving from their application. Detailed description of the methodological process is also provided, so that this work can easily be translated to other fields of practice.

  10. Soil moisture retrieval from Sentinel-1 satellite data

    NASA Astrophysics Data System (ADS)

    Benninga, Harm-Jan; van der Velde, Rogier; Su, Zhongbo

    2016-04-01

    Reliable up-to-date information on the current water availability and models to evaluate management scenarios are indispensable for skilful water management. The Sentinel-1 radar satellite programme provides an opportunity to monitor water availability (as surface soil moisture) from space on an operational basis at unprecedented fine spatial and temporal resolutions. However, the influences of soil roughness and vegetation cover complicate the retrieval of soil moisture states from radar data. In this contribution, we investigate the sensitivity of Sentinel-1 radar backscatter to soil moisture states and vegetation conditions. The analyses are based on 105 Sentinel-1 images in the period from October 2014 to January 2016 covering the Twente region in the Netherlands. This area is almost flat and has a heterogeneous landscape, including agricultural (mainly grass, cereal and corn), forested and urban land covers. In-situ measurements at 5 cm depth collected from the Twente soil moisture monitoring network are used as reference. This network consists of twenty measurement stations (most of them at agricultural fields) distributed across an area of 50 km × 40 km. The Normalized Difference Vegetation Index (NDVI) derived from optical images is adopted as proxy to represent seasonal variability in vegetation conditions. The results from this sensitivity study provide insight into the potential capability of Sentinel-1 data for the estimation of soil moisture states and they will facilitate the further development of operational retrieval methods. An operationally applicable soil moisture retrieval method requires an algorithm that is usable without the need for area specific model calibration with detailed field information (regarding roughness and vegetation). Because it is not yet clear which method provides the most reliable soil moisture retrievals from Sentinel-1 data, multiple soil moisture retrieval methods will be studied in which the fine spatiotemporal

  11. Hypnotherapeutic olfactory conditioning (HOC): case studies of needle phobia, panic disorder, and combat-induced PTSD.

    PubMed

    Abramowitz, Eitan G; Lichtenberg, Pesach

    2009-04-01

    The authors developed a technique, which they call hypnotherapeutic olfactory conditioning (HOC), for exploiting the ability of scents to arouse potent emotional reactions. During hypnosis, the patient learns to associate pleasant scents with a sense of security and self-control. The patient can subsequently use this newfound association to overcome phobias and prevent panic attacks. This may be especially effective for posttraumatic stress disorder (PTSD) with episodes of anxiety, flashbacks, and dissociation triggered by smells. The authors present 3 cases, patients with needle phobia, panic disorder, and combat-induced PTSD who were successfully treated with the HOC technique.

  12. A comparison of Boolean-based retrieval to the WAIS system for retrieval of aeronautical information

    NASA Technical Reports Server (NTRS)

    Marchionini, Gary; Barlow, Diane

    1994-01-01

    An evaluation of an information retrieval system using a Boolean-based retrieval engine and inverted file architecture and WAIS, which uses a vector-based engine, was conducted. Four research questions in aeronautical engineering were used to retrieve sets of citations from the NASA Aerospace Database which was mounted on a WAIS server and available through Dialog File 108 which served as the Boolean-based system (BBS). High recall and high precision searches were done in the BBS and terse and verbose queries were used in the WAIS condition. Precision values for the WAIS searches were consistently above the precision values for high recall BBS searches and consistently below the precision values for high precision BBS searches. Terse WAIS queries gave somewhat better precision performance than verbose WAIS queries. In every case, a small number of relevant documents retrieved by one system were not retrieved by the other, indicating the incomplete nature of the results from either retrieval system. Relevant documents in the WAIS searches were found to be randomly distributed in the retrieved sets rather than distributed by ranks. Advantages and limitations of both types of systems are discussed.

  13. Use of information-retrieval languages in automated retrieval of experimental data from long-term storage

    NASA Technical Reports Server (NTRS)

    Khovanskiy, Y. D.; Kremneva, N. I.

    1975-01-01

    Problems and methods are discussed of automating information retrieval operations in a data bank used for long term storage and retrieval of data from scientific experiments. Existing information retrieval languages are analyzed along with those being developed. The results of studies discussing the application of the descriptive 'Kristall' language used in the 'ASIOR' automated information retrieval system are presented. The development and use of a specialized language of the classification-descriptive type, using universal decimal classification indices as the main descriptors, is described.

  14. Water sprays in space retrieval operations. [for despinning or detumbling disabled spacecraft

    NASA Technical Reports Server (NTRS)

    Freesland, D. C.

    1977-01-01

    Recent experiments involving liquid jets exhausting into a vacuum have led to significant conclusions regarding techniques for detumbling and despinning disabled spacecraft during retrieval operations. A fine water spray directed toward a tumbling or spinning object may quickly form ice over its surface. The added mass of water will absorb angular momentum and slow the vehicle. As this ice sublimes it carries momentum away with it. Thus, a complete detumble or despin is possible by simply spraying water at a disabled vehicle. Experiments were conducted in a ground based vacuum chamber to determine physical properties of water-ice in a space-like environment. Additional ices, alcohol and ammonia, were also studied. An analytical analysis based on the conservation of angular momentum, resulted in despin performance parameters, i.e., total water mass requirements and despin times. The despin and retrieval of a disabled spacecraft was considered to illustrate a potential application of the water spray technique.

  15. Episodic Memory in Alzheimer Disease, Frontotemporal Dementia, and Dementia With Lewy Bodies/Parkinson Disease Dementia: Disentangling Retrieval From Consolidation.

    PubMed

    Economou, Alexandra; Routsis, Christopher; Papageorgiou, Sokratis G

    2016-01-01

    Differences in episodic memory performance in patients with Alzheimer disease (AD), frontotemporal dementia (FTD), dementia with Lewy bodies (DLB)/Parkinson disease with dementia (PDD) are inconsistent and task dependent. The inconsistencies may be attributed to the different tasks drawing on different memory processes. Few studies have examined episodic memory impairment in the above groups using memory tests that facilitate encoding, to distinguish memory deficits due to impairment of specific processes. We examined the memory performance of 106 AD patients, 51 FTD patients, 26 DLB/PDD patients, and 37 controls using the Five-Words Test, a 5-item memory test that facilitates encoding. The patient groups did not differ in modified Mini Mental State Examination scores. AD patients scored lowest on the Five-Words Test overall, and showed the greatest reduction from immediate total recall to delayed free recall relative to the other 2 groups, consistent with a predominantly consolidation deficit. DLB/PDD patients showed the largest improvement from delayed free to delayed total recall relative to the other 2 groups, consistent with a predominantly retrieval deficit. Deficits in both consolidation and retrieval underlie the memory impairment of the patients, to different extents, and contribute to the theoretical understanding of the nature of the memory impairment of the patient groups.

  16. 42 CFR 422.2262 - Review and distribution of marketing materials.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... HUMAN SERVICES (CONTINUED) MEDICARE PROGRAM MEDICARE ADVANTAGE PROGRAM Medicare Advantage Marketing... model materials. (d) Ad hoc enrollee communication materials. Ad hoc enrollee communication materials...

  17. Using Induction to Refine Information Retrieval Strategies

    NASA Technical Reports Server (NTRS)

    Baudin, Catherine; Pell, Barney; Kedar, Smadar

    1994-01-01

    Conceptual information retrieval systems use structured document indices, domain knowledge and a set of heuristic retrieval strategies to match user queries with a set of indices describing the document's content. Such retrieval strategies increase the set of relevant documents retrieved (increase recall), but at the expense of returning additional irrelevant documents (decrease precision). Usually in conceptual information retrieval systems this tradeoff is managed by hand and with difficulty. This paper discusses ways of managing this tradeoff by the application of standard induction algorithms to refine the retrieval strategies in an engineering design domain. We gathered examples of query/retrieval pairs during the system's operation using feedback from a user on the retrieved information. We then fed these examples to the induction algorithm and generated decision trees that refine the existing set of retrieval strategies. We found that (1) induction improved the precision on a set of queries generated by another user, without a significant loss in recall, and (2) in an interactive mode, the decision trees pointed out flaws in the retrieval and indexing knowledge and suggested ways to refine the retrieval strategies.

  18. CDAPubMed: a browser extension to retrieve EHR-based biomedical literature

    PubMed Central

    2012-01-01

    been tested on a public dataset of HL7-CDA documents, returning significantly fewer citations since queries are focused on characteristics identified within the EHR. For instance, compared with more than 200,000 citations retrieved by breast neoplasm, fewer than ten citations were retrieved when ten patient features were added using CDAPubMed. This is an open source tool that can be freely used for non-profit purposes and integrated with other existing systems. PMID:22480327

  19. Activities of information retrieval in Daicel Corporation : The roles and efforts of information retrieval team

    NASA Astrophysics Data System (ADS)

    Yamazaki, Towako

    In order to stabilize and improve quality of information retrieval service, the information retrieval team of Daicel Corporation has given some efforts on standard operating procedures, interview sheet for information retrieval, structured format for search report, and search expressions for some technological fields of Daicel. These activities and efforts will also lead to skill sharing and skill tradition between searchers. In addition, skill improvements are needed not only for a searcher individually, but also for the information retrieval team totally when playing searcher's new roles.

  20. Semantic-based surveillance video retrieval.

    PubMed

    Hu, Weiming; Xie, Dan; Fu, Zhouyu; Zeng, Wenrong; Maybank, Steve

    2007-04-01

    Visual surveillance produces large amounts of video data. Effective indexing and retrieval from surveillance video databases are very important. Although there are many ways to represent the content of video clips in current video retrieval algorithms, there still exists a semantic gap between users and retrieval systems. Visual surveillance systems supply a platform for investigating semantic-based video retrieval. In this paper, a semantic-based video retrieval framework for visual surveillance is proposed. A cluster-based tracking algorithm is developed to acquire motion trajectories. The trajectories are then clustered hierarchically using the spatial and temporal information, to learn activity models. A hierarchical structure of semantic indexing and retrieval of object activities, where each individual activity automatically inherits all the semantic descriptions of the activity model to which it belongs, is proposed for accessing video clips and individual objects at the semantic level. The proposed retrieval framework supports various queries including queries by keywords, multiple object queries, and queries by sketch. For multiple object queries, succession and simultaneity restrictions, together with depth and breadth first orders, are considered. For sketch-based queries, a method for matching trajectories drawn by users to spatial trajectories is proposed. The effectiveness and efficiency of our framework are tested in a crowded traffic scene.

  1. The Stability of Post Hoc Model Modifications in Covariance Structure Models.

    ERIC Educational Resources Information Center

    Hutchinson, Susan R.

    The work of R. MacCallum et al. (1992) was extended by examining chance modifications through a Monte Carlo simulation. The stability of post hoc model modifications was examined under varying sample size, model complexity, and severity of misspecification using 2- and 4-factor oblique confirmatory factor analysis (CFA) models with four and eight…

  2. Abnormal functional connectivity of hippocampus during episodic memory retrieval processing network in amnestic mild cognitive impairment.

    PubMed

    Bai, Feng; Zhang, Zhijun; Watson, David R; Yu, Hui; Shi, Yongmei; Yuan, Yonggui; Zang, Yufeng; Zhu, Chaozhe; Qian, Yun

    2009-06-01

    Functional connectivity magnetic resonance imaging technique has revealed the importance of distributed network structures in higher cognitive processes in the human brain. The hippocampus has a key role in a distributed network supporting memory encoding and retrieval. Hippocampal dysfunction is a recurrent finding in memory disorders of aging such as amnestic mild cognitive impairment (aMCI) in which learning- and memory-related cognitive abilities are the predominant impairment. The functional connectivity method provides a novel approach in our attempts to better understand the changes occurring in this structure in aMCI patients. Functional connectivity analysis was used to examine episodic memory retrieval networks in vivo in twenty 28 aMCI patients and 23 well-matched control subjects, specifically between the hippocampal structures and other brain regions. Compared with control subjects, aMCI patients showed significantly lower hippocampus functional connectivity in a network involving prefrontal lobe, temporal lobe, parietal lobe, and cerebellum, and higher functional connectivity to more diffuse areas of the brain than normal aging control subjects. In addition, those regions associated with increased functional connectivity with the hippocampus demonstrated a significantly negative correlation to episodic memory performance. aMCI patients displayed altered patterns of functional connectivity during memory retrieval. The degree of this disturbance appears to be related to level of impairment of processes involved in memory function. Because aMCI is a putative prodromal syndrome to Alzheimer's disease (AD), these early changes in functional connectivity involving the hippocampus may yield important new data to predict whether a patient will eventually develop AD.

  3. Hilar GABAergic Interneuron Activity Controls Spatial Learning and Memory Retrieval

    PubMed Central

    Andrews-Zwilling, Yaisa; Gillespie, Anna K.; Kravitz, Alexxai V.; Nelson, Alexandra B.; Devidze, Nino; Lo, Iris; Yoon, Seo Yeon; Bien-Ly, Nga; Ring, Karen; Zwilling, Daniel; Potter, Gregory B.; Rubenstein, John L. R.; Kreitzer, Anatol C.; Huang, Yadong

    2012-01-01

    Background Although extensive research has demonstrated the importance of excitatory granule neurons in the dentate gyrus of the hippocampus in normal learning and memory and in the pathogenesis of amnesia in Alzheimer's disease (AD), the role of hilar GABAergic inhibitory interneurons, which control the granule neuron activity, remains unclear. Methodology and Principal Findings We explored the function of hilar GABAergic interneurons in spatial learning and memory by inhibiting their activity through Cre-dependent viral expression of enhanced halorhodopsin (eNpHR3.0)—a light-driven chloride pump. Hilar GABAergic interneuron-specific expression of eNpHR3.0 was achieved by bilaterally injecting adeno-associated virus containing a double-floxed inverted open-reading frame encoding eNpHR3.0 into the hilus of the dentate gyrus of mice expressing Cre recombinase under the control of an enhancer specific for GABAergic interneurons. In vitro and in vivo illumination with a yellow laser elicited inhibition of hilar GABAergic interneurons and consequent activation of dentate granule neurons, without affecting pyramidal neurons in the CA3 and CA1 regions of the hippocampus. We found that optogenetic inhibition of hilar GABAergic interneuron activity impaired spatial learning and memory retrieval, without affecting memory retention, as determined in the Morris water maze test. Importantly, optogenetic inhibition of hilar GABAergic interneuron activity did not alter short-term working memory, motor coordination, or exploratory activity. Conclusions and Significance Our findings establish a critical role for hilar GABAergic interneuron activity in controlling spatial learning and memory retrieval and provide evidence for the potential contribution of GABAergic interneuron impairment to the pathogenesis of amnesia in AD. PMID:22792368

  4. The GRAPE aerosol retrieval algorithm

    NASA Astrophysics Data System (ADS)

    Thomas, G. E.; Poulsen, C. A.; Sayer, A. M.; Marsh, S. H.; Dean, S. M.; Carboni, E.; Siddans, R.; Grainger, R. G.; Lawrence, B. N.

    2009-11-01

    The aerosol component of the Oxford-Rutherford Aerosol and Cloud (ORAC) combined cloud and aerosol retrieval scheme is described and the theoretical performance of the algorithm is analysed. ORAC is an optimal estimation retrieval scheme for deriving cloud and aerosol properties from measurements made by imaging satellite radiometers and, when applied to cloud free radiances, provides estimates of aerosol optical depth at a wavelength of 550 nm, aerosol effective radius and surface reflectance at 550 nm. The aerosol retrieval component of ORAC has several incarnations - this paper addresses the version which operates in conjunction with the cloud retrieval component of ORAC (described by Watts et al., 1998), as applied in producing the Global Retrieval of ATSR Cloud Parameters and Evaluation (GRAPE) data-set. The algorithm is described in detail and its performance examined. This includes a discussion of errors resulting from the formulation of the forward model, sensitivity of the retrieval to the measurements and a priori constraints, and errors resulting from assumptions made about the atmospheric/surface state.

  5. The GRAPE aerosol retrieval algorithm

    NASA Astrophysics Data System (ADS)

    Thomas, G. E.; Poulsen, C. A.; Sayer, A. M.; Marsh, S. H.; Dean, S. M.; Carboni, E.; Siddans, R.; Grainger, R. G.; Lawrence, B. N.

    2009-04-01

    The aerosol component of the Oxford-Rutherford Aerosol and Cloud (ORAC) combined cloud and aerosol retrieval scheme is described and the theoretical performance of the algorithm is analysed. ORAC is an optimal estimation retrieval scheme for deriving cloud and aerosol properties from measurements made by imaging satellite radiometers and, when applied to cloud free radiances, provides estimates of aerosol optical depth at a wavelength of 550 nm, aerosol effective radius and surface reflectance at 550 nm. The aerosol retrieval component of ORAC has several incarnations - this paper addresses the version which operates in conjunction with the cloud retrieval component of ORAC (described by Watts et al., 1998), as applied in producing the Global Retrieval of ATSR Cloud Parameters and Evaluation (GRAPE) data-set. The algorithm is described in detail and its performance examined. This includes a discussion of errors resulting from the formulation of the forward model, sensitivity of the retrieval to the measurements and a priori constraints, and errors resulting from assumptions made about the atmospheric/surface state.

  6. Mobile Security Enclaves

    DTIC Science & Technology

    2011-09-01

    LAI Location Area Identity MANET Mobile Ad - hoc Network MCC Mobile Country Code MCD Mobile Communications Device MNC Mobile Network Code ...tower or present within a geographical area. These conditions relate directly to users who often operate with mobile ad - hoc networks. These types of...infrastructures. First responders can use these mobile base stations to set up their own networks on the fly, similar to mobile ad - hoc networks

  7. Dissociating retrieval success from incidental encoding activity during emotional memory retrieval, in the medial temporal lobe

    PubMed Central

    Shafer, Andrea T.; Dolcos, Florin

    2014-01-01

    The memory-enhancing effect of emotion has been linked to the engagement of emotion- and memory-related medial temporal lobe (MTL) regions (amygdala-AMY; hippocampus-HC; parahippocampus-PHC), during both encoding and retrieval. However, recognition tasks used to investigate the neural correlates of retrieval make it difficult to distinguish MTL engagement linked to retrieval success (RS) from that linked to incidental encoding success (ES) during retrieval. This issue has been investigated for retrieval of non-emotional memories, but not for emotional memory retrieval. To address this, we used event-related functional MRI in conjunction with an emotional distraction and two episodic memory tasks (one testing memory for distracter items and the other testing memory for new/lure items presented in the first memory task). This paradigm allowed for dissociation of MTL activity specifically linked to RS from that linked to both RS and incidental ES during retrieval. There were two novel findings regarding the neural correlates of emotional memory retrieval. First, greater emotional RS was identified bilaterally in AMY, HC, and PHC. However, AMY activity was most impacted when accounting for ES activity, as only RS activity in left AMY was dissociated from ES activity during retrieval, whereas portions of HC and PHC showing greater emotional RS were largely uninvolved in ES. Second, an earlier and more anteriorly spread response (left AMY and bilateral HC, PHC) was linked to greater emotional RS activity, whereas a later and more posteriorly localized response (right posterior PHC) was linked to greater neutral RS activity. These findings shed light on MTL mechanisms subserving the memory-enhancing effect of emotion at retrieval. PMID:24917798

  8. Initial retrieval sequence and blending strategy

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pemwell, D.L.; Grenard, C.E.

    1996-09-01

    This report documents the initial retrieval sequence and the methodology used to select it. Waste retrieval, storage, pretreatment and vitrification were modeled for candidate single-shell tank retrieval sequences. Performance of the sequences was measured by a set of metrics (for example,high-level waste glass volume, relative risk and schedule).Computer models were used to evaluate estimated glass volumes,process rates, retrieval dates, and blending strategy effects.The models were based on estimates of component inventories and concentrations, sludge wash factors and timing, retrieval annex limitations, etc.

  9. 42 CFR 423.2262 - Review and distribution of marketing materials.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... HUMAN SERVICES (CONTINUED) MEDICARE PROGRAM VOLUNTARY MEDICARE PRESCRIPTION DRUG BENEFIT Part D...) Ad hoc enrollee communication materials. Ad hoc enrollee communication materials may be reviewed by...

  10. Impact of an inferior vena cava filter retrieval algorithm on filter retrieval rates in a cancer population.

    PubMed

    Litwin, Robert J; Huang, Steven Y; Sabir, Sharjeel H; Hoang, Quoc B; Ahrar, Kamran; Ahrar, Judy; Tam, Alda L; Mahvash, Armeen; Ensor, Joe E; Kroll, Michael; Gupta, Sanjay

    2017-09-01

    Our primary purpose was to assess the impact of an inferior vena cava filter retrieval algorithm in a cancer population. Because cancer patients are at persistently elevated risk for development of venous thromboembolism (VTE), our secondary purpose was to assess the incidence of recurrent VTE in patients who underwent filter retrieval. Patients with malignant disease who had retrievable filters placed at a tertiary care cancer hospital from August 2010 to July 2014 were retrospectively studied. A filter retrieval algorithm was established in August 2012. Patients and referring physicians were contacted in the postintervention period when review of the medical record indicated that filter retrieval was clinically appropriate. Patients were classified into preintervention (August 2010-July 2012) and postintervention (August 2012-July 2014) study cohorts. Retrieval rates and clinical pathologic records were reviewed. Filter retrieval was attempted in 34 (17.4%) of 195 patients in the preintervention cohort and 66 (32.8%) of 201 patients in the postintervention cohort (P < .01). The median time to filter retrieval in the preintervention and postintervention cohorts was 60 days (range, 20-428 days) and 107 days (range, 9-600 days), respectively (P = .16). In the preintervention cohort, 49 of 195 (25.1%) patients were lost to follow-up compared with 24 of 201 (11.9%) patients in the postintervention cohort (P < .01). Survival was calculated from the date of filter placement to death, when available. The overall survival for patients whose filters were retrieved was longer compared with the overall survival for patients whose filters were not retrieved (P < .0001). Of the 80 patients who underwent successful filter retrieval, two patients (2.5%) suffered from recurrent VTE (n = 1 nonfatal pulmonary embolism; n = 1 deep venous thrombosis). Both patients were treated with anticoagulation without filter replacement. Inferior vena cava filter retrieval rates can be

  11. Application of Rough Sets to Information Retrieval.

    ERIC Educational Resources Information Center

    Miyamoto, Sadaaki

    1998-01-01

    Develops a method of rough retrieval, an application of the rough set theory to information retrieval. The aim is to: (1) show that rough sets are naturally applied to information retrieval in which categorized information structure is used; and (2) show that a fuzzy retrieval scheme is induced from the rough retrieval. (AEF)

  12. Added value of far-infrared radiometry for remote sensing of ice clouds

    NASA Astrophysics Data System (ADS)

    Libois, Quentin; Blanchet, Jean-Pierre

    2017-06-01

    Several cloud retrieval algorithms based on satellite observations in the infrared have been developed in the last decades. However, these observations only cover the midinfrared (MIR, λ < 15 μm) part of the spectrum, and none are available in the far-infrared (FIR, λ≥ 15 μm). Using the optimal estimation method, we show that adding a few FIR channels to existing spaceborne radiometers would significantly improve their ability to retrieve ice cloud radiative properties. For clouds encountered in the polar regions and the upper troposphere, where the atmosphere is sufficiently transparent in the FIR, using FIR channels would reduce by more than 50% the uncertainties on retrieved values of optical thickness, effective particle diameter, and cloud top altitude. Notably, this would extend the range of applicability of current retrieval methods to the polar regions and to clouds with large optical thickness, where MIR algorithms perform poorly. The high performance of solar reflection-based algorithms would thus be reached in nighttime conditions. Since the sensitivity of ice cloud thermal emission to effective particle diameter is approximately 5 times larger in the FIR than in the MIR, using FIR observations is a promising venue for studying ice cloud microphysics and precipitation processes. This is highly relevant for cirrus clouds and convective towers. This is also essential to study precipitation in the driest regions of the atmosphere, where strong feedbacks are at play between clouds and water vapor. The deployment in the near future of a FIR spaceborne radiometer is technologically feasible and should be strongly supported.

  13. On-Line Retrieval System Design; Part V of Scientific Report No. ISR-18, Information Storage and Retrieval...

    ERIC Educational Resources Information Center

    Cornell Univ., Ithaca, NY. Dept. of Computer Science.

    On-line retrieval system design is discussed in the two papers which make up Part Five of this report on Salton's Magical Automatic Retriever of Texts (SMART) project report. The first paper: "A Prototype On-Line Document Retrieval System" by D. Williamson and R. Williamson outlines a design for a SMART on-line document retrieval system…

  14. Extinction learning, which consists of the inhibition of retrieval, can be learned without retrieval.

    PubMed

    de Carvalho Myskiw, Jociane; Furini, Cristiane Regina Guerino; Schmidt, Bianca; Ferreira, Flávia; Izquierdo, Ivan

    2015-01-13

    In the present study we test the hypothesis that extinction is not a consequence of retrieval in unreinforced conditioned stimulus (CS) presentation but the mere perception of the CS in the absence of a conditioned response. Animals with cannulae implanted in the CA1 region of hippocampus were subjected to extinction of contextual fear conditioning. Muscimol infused intra-CA1 before an extinction training session of contextual fear conditioning (CFC) blocks retrieval but not consolidation of extinction measured 24 h later. Additionally, this inhibition of retrieval does not affect early persistence of extinction when tested 7 d later or its spontaneous recovery after 2 wk. Furthermore, both anisomycin, an inhibitor of ribosomal protein synthesis, and rapamycin, an inhibitor of extraribosomal protein synthesis, given into the CA1, impair extinction of CFC regardless of whether its retrieval was blocked by muscimol. Therefore, retrieval performance in the first unreinforced session is not necessary for the installation, maintenance, or spontaneous recovery of extinction of CFC.

  15. Anti-Vascular Endothelial Growth Factor Comparative Effectiveness Trial for Diabetic Macular Edema: Additional Efficacy Post Hoc Analyses of a Randomized Clinical Trial.

    PubMed

    Jampol, Lee M; Glassman, Adam R; Bressler, Neil M; Wells, John A; Ayala, Allison R

    2016-12-01

    Post hoc analyses from the Diabetic Retinopathy Clinical Research Network randomized clinical trial comparing aflibercept, bevacizumab, and ranibizumab for diabetic macular edema (DME) might influence interpretation of study results. To provide additional outcomes comparing 3 anti-vascular endothelial growth factor (VEGF) agents for DME. Post hoc analyses performed from May 3, 2016, to June 21, 2016, of a randomized clinical trial performed from August 22, 2012, to September 23, 2015, of 660 participants comparing 3 anti-VEGF treatments in eyes with center-involved DME causing vision impairment. Randomization to intravitreous aflibercept (2.0 mg), bevacizumab (1.25 mg), or ranibizumab (0.3 mg) administered up to monthly based on a structured retreatment regimen. Focal/grid laser treatment was added after 6 months for the treatment of persistent DME. Change in visual acuity (VA) area under the curve and change in central subfield thickness (CST) within subgroups based on whether an eye received laser treatment for DME during the study. Post hoc analyses were performed for 660 participants (mean [SD] age, 61 [10] years; 47% female, 65% white, 16% black or African American, 16% Hispanic, and 3% other). For eyes with an initial VA of 20/50 or worse, VA improvement was greater with aflibercept than the other agents at 1 year but superior only to bevacizumab at 2 years. Mean (SD) letter change in VA over 2 years (area under curve) was greater with aflibercept (+17.1 [9.7]) than with bevacizumab (+12.1 [9.4]; 95% CI, +1.6 to +7.3; P < .001) or ranibizumab (+13.6 [8.5]; 95% CI, +0.7 to +6.0; P = .009). When VA was 20/50 or worse at baseline, bevacizumab reduced CST less than the other agents at 1 year, but at 2 years the differences had diminished. In subgroups stratified by baseline VA, anti-VEGF agent, and whether focal/grid laser treatment was performed for DME, the only participants to have a substantial reduction in mean CST between 1 and 2 years were those

  16. Striatal contributions to declarative memory retrieval

    PubMed Central

    Scimeca, Jason M.; Badre, David

    2012-01-01

    Declarative memory is known to depend on the medial temporal lobe memory system. Recently, there has been renewed focus on the relationship between the basal ganglia and declarative memory, including the involvement of striatum. However, the contribution of striatum to declarative memory retrieval remains unknown. Here, we review neuroimaging and neuropsychological evidence for the involvement of the striatum in declarative memory retrieval. From this review, we propose that, along with the prefrontal cortex (PFC), the striatum primarily supports cognitive control of memory retrieval. We conclude by proposing three hypotheses for the specific role of striatum in retrieval: (1) Striatum modulates the re-encoding of retrieved items in accord with their expected utility (adaptive encoding), (2) striatum selectively admits information into working memory that is expected to increase the likelihood of successful retrieval (adaptive gating), and (3) striatum enacts adjustments in cognitive control based on the outcome of retrieval (reinforcement learning). PMID:22884322

  17. Retrieval-Induced vs. Context-Induced Forgetting: Does Retrieval-Induced Forgetting Depend on Context Shifts?

    PubMed Central

    Soares, Julia S.; Polack, Cody W.; Miller, Ralph R.

    2015-01-01

    Retrieval-induced forgetting (RIF) is the observation that retrieval of target information causes forgetting of related non-target information. A number of accounts of this phenomenon have been proposed, including a context-shift based account (Jonker, Seli, & Macleod, 2013). This account proposes that RIF occurs due to the context shift from study to retrieval practice, provided there is little context shift between retrieval practice and test phases. We tested both claims put forth by this context account. In Experiment 1, we degraded the context shift between study and retrieval practice by implementing a generative study condition that was highly similar to retrieval practice. We observed no degradation of RIF for these generated exemplars relative to a conventional study control. In Experiment 2, we conceptually replicated the finding of RIF following generative study, and tested whether context differences between each of the three phases affected the size of RIF. Our findings were again contrary to the predictions of the context account. Conjointly, the two experiments refute arguments about the potential inadequacy of our context shifts that could be used to explain either result alone. Overall, our results are most consistent with an inhibitory account of RIF (e.g., Anderson, 2003). PMID:26389628

  18. Infrared Retrievals of Ice Cloud Properties and Uncertainties with an Optimal Estimation Retrieval Method

    NASA Astrophysics Data System (ADS)

    Wang, C.; Platnick, S. E.; Meyer, K.; Zhang, Z.

    2014-12-01

    We developed an optimal estimation (OE)-based method using infrared (IR) observations to retrieve ice cloud optical thickness (COT), cloud effective radius (CER), and cloud top height (CTH) simultaneously. The OE-based retrieval is coupled with a fast IR radiative transfer model (RTM) that simulates observations of different sensors, and corresponding Jacobians in cloudy atmospheres. Ice cloud optical properties are calculated using the MODIS Collection 6 (C6) ice crystal habit (severely roughened hexagonal column aggregates). The OE-based method can be applied to various IR space-borne and airborne sensors, such as the Moderate Resolution Imaging Spectroradiometer (MODIS) and the enhanced MODIS Airborne Simulator (eMAS), by optimally selecting IR bands with high information content. Four major error sources (i.e., the measurement error, fast RTM error, model input error, and pre-assumed ice crystal habit error) are taken into account in our OE retrieval method. We show that measurement error and fast RTM error have little impact on cloud retrievals, whereas errors from the model input and pre-assumed ice crystal habit significantly increase retrieval uncertainties when the cloud is optically thin. Comparisons between the OE-retrieved ice cloud properties and other operational cloud products (e.g., the MODIS C6 and CALIOP cloud products) are shown.

  19. Does retrieval intentionality really matter? Similarities and differences between involuntary memories and directly and generatively retrieved voluntary memories.

    PubMed

    Barzykowski, Krystian; Staugaard, Søren Risløv

    2016-08-01

    Theories of autobiographical memory distinguish between involuntary and voluntary retrieval as a consequence of conscious intention (i.e., wanting to remember). Another distinction can be made between direct and generative retrieval, which reflects the effort involved (i.e., trying to remember). However, it is unclear how intention and effort interacts. For example, involuntary memories and directly retrieved memories have been used interchangeably in the literature to refer to the same phenomenon of effortless, non-strategic retrieval. More recent theoretical advances suggest that they are separate types of retrieval, one unintentional (involuntary), another intentional and effortless (direct voluntary retrieval), and a third intentional and effortful (generative voluntary retrieval). Whether this also entails differing phenomenological characteristics, such as vividness, rehearsal, or emotional valence, has not been previously investigated. In the current study, participants reported memories in an experimental paradigm designed to elicit voluntary and involuntary memories and rated them on a number of characteristics. If intention affects the retrieval process, then we should expect differences between the characteristics of involuntary and directly retrieved memories. The results imply that retrieval intention seems to differentiate how a memory appears in a person's mind. Furthermore, we argue that these differences in part could result from differences in encoding and consolidation. © 2015 The British Psychological Society.

  20. Retrieval Cues on Tests: A Strategy for Helping Students Overcome Retrieval Failure

    ERIC Educational Resources Information Center

    Gallagher, Kristel M.

    2017-01-01

    Students often struggle to recall information on tests, frequently claiming to experience a "retrieval failure" of learned information. Thus, the retrieval of information from memory may be a roadblock to student success. I propose a relatively simple adjustment to the wording of test items to help eliminate this potential barrier.…