Sample records for ad-hoc task force

  1. 75 FR 33838 - NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-15

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (10-065)] NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting AGENCY: National Aeronautics and Space Administration. ACTION... amended, the National Aeronautics and Space Administration announces a meeting of the Ad-Hoc Task Force on...

  2. 75 FR 15742 - NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-30

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice: (10-035)] NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting AGENCY: National Aeronautics and Space Administration. ACTION... amended, the National Aeronautics and Space Administration announces a meeting of the Ad-Hoc Task Force on...

  3. 75 FR 43565 - NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice: (10-084)] NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting AGENCY: National Aeronautics and Space Administration. ACTION... amended, the National Aeronautics and Space Administration announces a two-part meeting of the Ad-Hoc Task...

  4. Interagency Task Forces: The Right Tools for the Job

    DTIC Science & Technology

    2011-01-01

    shortcomings. This analysis discusses four organizational reform models and recommends the interagency task force ( IATF ) as the preferred structure...model.64 Still others recommend creating and deploying ad hoc IATFs for crisis operations. These interagency task forces would be task- organized to...forces assigned for planning, exercises, and mission execution.65 A 2005 article in Policy Review recommended developing IATFs as needed for specific

  5. The Roles of the Federal Government in Telecommunications. President's Task Force on Communications Policy. Staff Paper Eight.

    ERIC Educational Resources Information Center

    Rostow, Eugene V.

    A staff paper to the President's Task Force on Communications Policy reviews the role played by the Federal Government in regulating the telecommunications industries and recommends broader federal jurisdiction. The history of federal action in telecommunications has been one of ad hoc responses to discrete problems, leading to an inefficient,…

  6. Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups

    NASA Astrophysics Data System (ADS)

    Desmedt, Yvo; Lange, Tanja; Burmester, Mike

    Task-specific groups are often formed in an ad-hoc manner within large corporate structures, such as companies. Take the following typical scenario: A director decides to set up a task force group for some specific project. An order is passed down the hierarchy where it finally reaches a manager who selects some employees to form the group. The members should communicate in a secure way and for efficiency, a symmetric encryption system is chosen. To establish a joint secret key for the group, a group key exchange (GKE) protocol is used. We show how to use an existing Public Key Infrastructure (PKI) to achieve authenticated GKE by modifying the protocol and particularly by including signatures.

  7. Telecommunications: A Paradigm for the Future of Illinois Higher Education.

    ERIC Educational Resources Information Center

    Illinois Community Coll. Board, Springfield.

    The Illinois Community College Board created the Telecommunications Ad Hoc Task Force (TAHTF) to examine the current status of telecommunications in the Illinois Community College System (ICCS), to determine the feasibility of establishing a statewide telecommunications network, and to recommend policies for the development and use of such a…

  8. NASA's Big Data Task Force

    NASA Astrophysics Data System (ADS)

    Holmes, C. P.; Kinter, J. L.; Beebe, R. F.; Feigelson, E.; Hurlburt, N. E.; Mentzel, C.; Smith, G.; Tino, C.; Walker, R. J.

    2017-12-01

    Two years ago NASA established the Ad Hoc Big Data Task Force (BDTF - https://science.nasa.gov/science-committee/subcommittees/big-data-task-force), an advisory working group with the NASA Advisory Council system. The scope of the Task Force included all NASA Big Data programs, projects, missions, and activities. The Task Force focused on such topics as exploring the existing and planned evolution of NASA's science data cyber-infrastructure that supports broad access to data repositories for NASA Science Mission Directorate missions; best practices within NASA, other Federal agencies, private industry and research institutions; and Federal initiatives related to big data and data access. The BDTF has completed its two-year term and produced several recommendations plus four white papers for NASA's Science Mission Directorate. This presentation will discuss the activities and results of the TF including summaries of key points from its focused study topics. The paper serves as an introduction to the papers following in this ESSI session.

  9. Nurturing Institutional Cultures of Caring

    ERIC Educational Resources Information Center

    Spano, David B.

    2008-01-01

    The aftershocks of the Virginia Tech incident have included numerous committee meetings, task forces, congressional hearings, and ad hoc debates focused on what went wrong and what educators can do to make their suddenly scary campuses safer. The issue of safety on their campuses has been thrust front and center. The author found it remarkable and…

  10. 76 FR 71308 - Codex Alimentarius Commission: Meeting of the Ad Hoc Intergovernmental Codex Task Force on Animal...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-17

    ... DEPARTMENT OF AGRICULTURE Food Safety and Inspection Service [Docket No. FSIS-2011-0026] Codex...: Office of the Under Secretary for Food Safety, USDA. ACTION: Notice of public meeting and request for comments. SUMMARY: The Office of the Under Secretary for Food Safety, U.S. Department of Agriculture (USDA...

  11. 78 FR 1196 - Codex Alimentarius Commission: Meeting of the Ad Hoc Codex Intergovernmental Task Force on Animal...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-08

    ... related to the 7th Session of the AFTF will be accessible via the World Wide Web at the following address... World Health Organization (WHO). Through adoption of food standards, codes of practice, and other... animals. The guidelines should include specific science-based risk assessment criteria to apply to feed...

  12. Task Force Butler: A Case Study in the Employment of an Ad Hoc Unit in Combat Operations, During Operation Dragoon, 1-30 August 1944

    DTIC Science & Technology

    2007-12-14

    13 It was not until 2 July 1944, that General Sir Henry Maitland Wilson, the Supreme Allied Commander, Mediterranean Theater, was ordered to launch...John. I Remember, Stories of a Combat Infantrymen in World War II. Livermore: Camino Press, 1993. Summer, Ian . The French Army 1939-45 (1). Men-at

  13. Initial Report of the Deans Cyber Warfare Ad Hoc Committee

    DTIC Science & Technology

    2011-12-22

    in a cyber warfare environment. Among the more notable recent developments have been the establishment of a new Cyber Warfare Command (USCYBERCOM) at...information-warfare-centric organization. Clearly, future Naval Academy graduates will be expected to know more about cyber warfare than those we have...graduated in the past. The Academic Dean and Provost tasked an ad hoc committeethe Cyber Warfare ad hoc Committeeto examine how USNA can best ensure that

  14. Implications of ICD-10 for Sarcopenia Clinical Practice and Clinical Trials: Report by the International Conference on Frailty and Sarcopenia Research Task Force.

    PubMed

    Vellas, B; Fielding, R A; Bens, C; Bernabei, R; Cawthon, P M; Cederholm, T; Cruz-Jentoft, A J; Del Signore, S; Donahue, S; Morley, J; Pahor, M; Reginster, J-Y; Rodriguez Mañas, L; Rolland, Y; Roubenoff, R; Sinclair, A; Cesari, M

    2018-01-01

    Establishment of an ICD-10-CM code for sarcopenia in 2016 was an important step towards reaching international consensus on the need for a nosological framework of age-related skeletal muscle decline. The International Conference on Frailty and Sarcopenia Research Task Force met in April 2017 to discuss the meaning, significance, and barriers to the implementation of the new code as well as strategies to accelerate development of new therapies. Analyses by the Sarcopenia Definitions and Outcomes Consortium are underway to develop quantitative definitions of sarcopenia. A consensus conference is planned to evaluate this analysis. The Task Force also discussed lessons learned from sarcopenia trials that could be applied to future trials, as well as lessons from the osteoporosis field, a clinical condition with many constructs similar to sarcopenia and for which ad hoc treatments have been developed and approved by regulatory agencies.

  15. An Ad-Hoc Adaptive Pilot Model for Pitch Axis Gross Acquisition Tasks

    NASA Technical Reports Server (NTRS)

    Hanson, Curtis E.

    2012-01-01

    An ad-hoc algorithm is presented for real-time adaptation of the well-known crossover pilot model and applied to pitch axis gross acquisition tasks in a generic fighter aircraft. Off-line tuning of the crossover model to human pilot data gathered in a fixed-based high fidelity simulation is first accomplished for a series of changes in aircraft dynamics to provide expected values for model parameters. It is shown that in most cases, for this application, the traditional crossover model can be reduced to a gain and a time delay. The ad-hoc adaptive pilot gain algorithm is shown to have desirable convergence properties for most types of changes in aircraft dynamics.

  16. A Fresh Look at Internet Protocol Version 6 (IPv6) for Department of Defense (DoD) Networks

    DTIC Science & Technology

    2010-08-01

    since system administration practices (such as the use of security appliances) depend heavily on tools for network management, diagnosis and protection...are mobile ad hoc networks (MANETs) and yet there is limited practical experience with MANETs and their performance. Further, the interaction between...Systems FCS Future Combat System IETF Internet Engineering Task Force ISAT Information Science and Technology BAST Board on Army Science and

  17. Analysis on Multicast Routing Protocols for Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Xiang, Ma

    As the Mobile Ad Hoc Networks technologies face a series of challenges like dynamic changes of topological structure, existence of unidirectional channel, limited wireless transmission bandwidth, the capability limitations of mobile termination and etc, therefore, the research to mobile Ad Hoc network routings inevitablely undertake a more important task than those to other networks. Multicast is a mode of communication transmission oriented to group computing, which sends the data to a group of host computers by using single source address. In a typical mobile Ad Hoc Network environment, multicast has a significant meaning. On the one hand, the users of mobile Ad Hoc Network usually need to form collaborative working groups; on the other hand, this is also an important means of fully using the broadcast performances of wireless communication and effectively using the limited wireless channel resources. This paper summarizes and comparatively analyzes the routing mechanisms of various existing multicast routing protocols according to the characteristics of mobile Ad Hoc network.

  18. The Copyright Law as it Relates to National Information Systems and National Programs; a Study by the Ad Hoc Task Group on Legal Aspects Involved in National Information Systems.

    ERIC Educational Resources Information Center

    Federal Council for Science and Technology, Washington, DC. Committee on Scientific and Technical Information.

    An ad hoc task group was constituted by the Committee on Scientific and Technical Information (COSATI) to: (1) delineate present and future issues issues for COSATI, (3) recommend additions or deletions in the present copyright law or in the pending revision now in Congress, and (4) recommend other short or long-term actions related to authorship…

  19. Effect of Our Nation's Housing Policy on Homelessness. Hearing before the Ad Hoc Task Force on the Homeless and Housing of the Committee on the Budget, House of Representatives. One Hundredth Congress, Second Session.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. House Committee on the Budget.

    According to Congressman Charles E. Schumer in his opening statement, the deqrease in Federal housing funds is inextricably linked to the increase in homelessness. Since 1981 the Reagan Administration has been systematically dismantling the nation's housing programs, leaving tens of thousands of low-income people homeless. In 1982 there were 1,088…

  20. Conflict Management in "Ad Hoc" Problem-Solving Groups: A Preliminary Investigation.

    ERIC Educational Resources Information Center

    Wallace, Les; Baxter, Leslie

    Full study of small group communication must include consideration of task and socio-emotional dimensions, especially in relation to group problem solving. Thirty small groups were tested for their reactions in various "ad hoc" conflict resolution situations. Instructions to the groups were (1) no problem-solving instructions (control),…

  1. Ad hoc versus standardized admixtures for continuous infusion drugs in neonatal intensive care: cognitive task analysis of safety at the bedside.

    PubMed

    Brannon, Timothy S

    2006-01-01

    Continuous infusion intravenous (IV) drugs in neonatal intensive care are usually prepared based on patient weight so that the dose is readable as a simple multiple of the infusion pump rate. New safety guidelines propose that hospitals switch to using standardized admixtures of these drugs to prevent calculation errors during ad hoc preparation. Extended hierarchical task analysis suggests that switching to standardized admixtures may lead to more errors in programming the pump at the bedside.

  2. Ad Hoc versus Standardized Admixtures for Continuous Infusion Drugs in Neonatal Intensive Care: Cognitive Task Analysis of Safety at the Bedside

    PubMed Central

    Brannon, Timothy S.

    2006-01-01

    Continuous infusion intravenous (IV) drugs in neonatal intensive care are usually prepared based on patient weight so that the dose is readable as a simple multiple of the infusion pump rate. New safety guidelines propose that hospitals switch to using standardized admixtures of these drugs to prevent calculation errors during ad hoc preparation. Extended hierarchical task analysis suggests that switching to standardized admixtures may lead to more errors in programming the pump at the bedside. PMID:17238482

  3. AAPM/SNMMI Joint Task Force: report on the current state of nuclear medicine physics training.

    PubMed

    Harkness, Beth A; Allison, Jerry D; Clements, Jessica B; Coffey, Charles W; Fahey, Frederic H; Gress, Dustin A; Kinahan, Paul E; Nickoloff, Edward L; Mawlawi, Osama R; MacDougall, Robert D; Pizzutiello, Robert J

    2015-09-08

    The American Association of Physicists in Medicine (AAPM) and the Society of Nuclear Medicine and Molecular Imaging (SNMMI) recognized the need for a review of the current state of nuclear  medicine physics training and the need to explore pathways for improving nuclear medicine physics training opportunities. For these reasons, the two organizations formed a joint AAPM/SNMMI Ad Hoc Task Force on Nuclear Medicine Physics  Training. The mission of this task force was to assemble a representative group of stakeholders to:• Estimate the demand for board-certified nuclear medicine physicists in the next 5-10 years,• Identify the critical issues related to supplying an adequate number of physicists who have received the appropriate level of training in nuclear medicine physics, and• Identify approaches that may be considered to facilitate the training of nuclear medicine physicists.As a result, a task force was appointed and chaired by an active member of both organizations that included representation from the AAPM, SNMMI, the American Board of Radiology (ABR), the American Board of Science in Nuclear Medicine (ABSNM), and the Commission for the Accreditation of Medical Physics Educational Programs (CAMPEP). The Task Force first met at the AAPM Annual Meeting in Charlotte in July 2012 and has met regularly face-to-face, online, and by conference calls. This manuscript reports the findings of the Task Force, as well as recommendations to achieve the stated mission.

  4. AAPM/SNMMI Joint Task Force: report on the current state of nuclear medicine physics training

    PubMed Central

    Allison, Jerry D.; Clements, Jessica B.; Coffey, Charles W.; Fahey, Frederic H.; Gress, Dustin A.; Kinahan, Paul E.; Nickoloff, Edward L.; Mawlawi, Osama R.; MacDougall, Robert D.; Pizzuitello, Robert J.

    2015-01-01

    The American Association of Physicists in Medicine (AAPM) and the Society of Nuclear Medicine and Molecular Imaging (SNMMI) recognized the need for a review of the current state of nuclear medicine physics training and the need to explore pathways for improving nuclear medicine physics training opportunities. For these reasons, the two organizations formed a joint AAPM/SNMMI Ad Hoc Task Force on Nuclear Medicine Physics Training. The mission of this task force was to assemble a representative group of stakeholders to: Estimate the demand for board‐certified nuclear medicine physicists in the next 5–10 years,Identify the critical issues related to supplying an adequate number of physicists who have received the appropriate level of training in nuclear medicine physics, andIdentify approaches that may be considered to facilitate the training of nuclear medicine physicists. As a result, a task force was appointed and chaired by an active member of both organizations that included representation from the AAPM, SNMMI, the American Board of Radiology (ABR), the American Board of Science in Nuclear Medicine (ABSNM), and the Commission for the Accreditation of Medical Physics Educational Programs (CAMPEP). The Task Force first met at the AAPM Annual Meeting in Charlotte in July 2012 and has met regularly face‐to‐face, online, and by conference calls. This manuscript reports the findings of the Task Force, as well as recommendations to achieve the stated mission. PACS number: 01.40.G‐ PMID:26699325

  5. A Feasible Approach for an Early Manned Lunar Landing. Part II: Detailed Report of Ad Hoc Task Group

    NASA Technical Reports Server (NTRS)

    Fleming, William A.

    1961-01-01

    This report, in two parts, presents a program development plan for attempting a first manned lunar landing in 1967. The two parts consist of a Summary Report and a Detailed Report representing the coordinated output of the Ad Hoc Task Group assigned to the study. The study was started in response to the request for such a study by the Associate Administrator in his memorandum of May 2, 1961 establishing the Ad Hoc Task Group. The purpose of the study was to take a first cut at the tasks associated with the design, development and construction of the equipment and facilities as well as the development of the crews, and to show the time phasing 6f these tasks. Included are the space sciences, life science and advanced technology tasks whose data and results are needed for designing and developing the systems required in carrying out the mission. The plan presented in the two reports does not presume to be a firm plan. Its basic purpose is, by choosing one feasible method, to size up the scope, schedule and cost of the job, discover the main problems, pacing items and major decisions and provide a threshold from which a firm and detailed project development plan can be jointly formulated by the various elements of NASA.

  6. Guidelines for the prevention and treatment of infection in patients with an absent or dysfunctional spleen. Working Party of the British Committee for Standards in Haematology Clinical Haematology Task Force.

    PubMed Central

    1996-01-01

    Overwhelming postsplenectomy infection should be preventable if simple precautions are taken. An ad hoc working party of the British Committee for Standards in Haematology has reviewed recommendations for patients without a spleen and drawn up a consensus. Members of the working party were selected for their personal expertise and to represent relevant professional bodies. The guidelines, which are set out below, include and extend the chief medical officer's 1994 update. PMID:8601117

  7. Overview of the TREC-2014 Microblog Track

    DTIC Science & Technology

    2014-11-01

    tweets as part of writing a retrospective piece about the impact of social media on the Egyptian revolution. The topic is temporally-anchored in the...imagined that participants would tackle the TTG task in a pipelined architecture that begins with ad hoc retrieval followed by summary generation...random selection of 100 tweets per topic from each TTG run. Although we envisioned a sys- tem architecture consisting of ad hoc retrieval followed by

  8. [The global harmonization task force : successes and challenges].

    PubMed

    Rotter, R G

    2009-06-01

    With the move towards globalized international commerce and trade, a call for harmonization of medical device regulatory requirements and practices has evolved. The purpose of the Global Harmonization Task Force (GHTF) is to encourage convergence of regulatory requirements and practices at a global level through consensus to achieve four principle goals: promote safety, quality and performance/effectiveness of medical devices; encourage technological innovation; foster international trade; and serve as a forum of information exchange - all in the interests of protecting and promoting public health. The GHTF is governed by a Steering Committee, and the principle development of the GHTF regulatory model has been, and continues to be, done through five working groups known as Study Groups and supplemented recently by the creation of several Ad Hoc Working Groups. Since its creation in 1992, the members of the GHTF have worked collaboratively to develop what is now ready to be called a global model for the regulation of medical devices.

  9. ARSENAL: A Cross Layer Architecture for Secure Resilient Tactical Mobile AdHoc Networks

    DTIC Science & Technology

    2016-01-21

    stations separated by 0.5 to 1 km can be coherently measured to a single mobile subscriber using LTE signaling. These are the first measurements of...undertake three parallel but inter-coupled tasks geared towards a) performing measurements via real deployments and enhancing our understanding of layer...dependencies and vulnerabilities in mobile ad hoc networks; these measurements will be on existing testbeds at The views, opinions and/or findings

  10. ARSENAL: A Cross Layer Architecture for SecureResilient Tactical Mobile AdHoc Networks

    DTIC Science & Technology

    2016-01-21

    stations separated by 0.5 to 1 km can be coherently measured to a single mobile subscriber using LTE signaling. These are the first measurements of...undertake three parallel but inter-coupled tasks geared towards a) performing measurements via real deployments and enhancing our understanding of layer...dependencies and vulnerabilities in mobile ad hoc networks; these measurements will be on existing testbeds at The views, opinions and/or findings

  11. Achieving Information Superiority Using Hastily Formed Networks and Emerging Technologies for the Royal Thai Armed Forces Counterinsurgency Operations in Southern Thailand

    DTIC Science & Technology

    2014-03-01

    38 2. Mobile Ad Hoc Networks ..................................................................39 3. Wireless Ad Hoc Sensor Networks...59 Figure 32. RENEWS with WiMAX and Wave Relay AP at C-IED Site.............................59 Figure 33. RENEWS Wind Turbine and Solar Panels at Hat...worldwide interoperability for microwave access WSN wireless sensor network xv ACKNOWLEDGMENTS We would like to express our sincerest gratitude

  12. Research priorities and plans for the International Space Station-results of the 'REMAP' Task Force

    NASA Technical Reports Server (NTRS)

    Kicza, M.; Erickson, K.; Trinh, E.

    2003-01-01

    Recent events in the International Space Station (ISS) Program have resulted in the necessity to re-examine the research priorities and research plans for future years. Due to both technical and fiscal resource constraints expected on the International Space Station, it is imperative that research priorities be carefully reviewed and clearly articulated. In consultation with OSTP and the Office of Management and budget (OMB), NASA's Office of Biological and Physical Research (OBPR) assembled an ad-hoc external advisory committee, the Biological and Physical Research Maximization and Prioritization (REMAP) Task Force. This paper describes the outcome of the Task Force and how it is being used to define a roadmap for near and long-term Biological and Physical Research objectives that supports NASA's Vision and Mission. Additionally, the paper discusses further prioritizations that were necessitated by budget and ISS resource constraints in order to maximize utilization of the International Space Station. Finally, a process has been developed to integrate the requirements for this prioritized research with other agency requirements to develop an integrated ISS assembly and utilization plan that maximizes scientific output. c2003 American Institute of Aeronautics and Astronautics. Published by Elsevier Science Ltd. All rights reserved.

  13. Awareness of Emerging Wireless Technologies: Ad-hoc and Personal Area Networks Standards and Emerging Technologies (Sensibilisation a l’emergence des technologies sans fil: technologies emergeantes et normes de reseaux personnels et ad-hoc)

    DTIC Science & Technology

    2007-04-01

    for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data...Control Organization NRL Navy Research Laboratory nrtPS Non-real- time Polling Services OFDM Orthogonal frequency division multiplex OFDMA...Routeur IDentifier RTG RTO Task Group RTO Research & Technology Organization rtPS Real- time Polling Services SC Single-carrier modulation

  14. Group Task Force on Satellite Rescue and Repair

    NASA Astrophysics Data System (ADS)

    1992-09-01

    The Group Task Force was chartered by the Administrator of NASA to recommend 'a policy outlining the criteria, the design standards, and the pricing model to guide NASA in assessing the responsibilities for government and nongovernment Satellite Rescue and Repair Missions.' Criteria for accepting such missions, risks, and benefits to all sectors of our economy involved in satellite services, adequacy of planning and training, and the impact on NASA's primary mission were reviewed. The Group began by asking a more fundamental question; is satellite rescue and repair a logical element of NASA's mission? Factors considered were: (1) the probability of rescue or repair opportunities arising; (2) the economic justification for such attempts; (3) the benefits to NASA, both from such ad hoc learning experiences in space operations and the impact on the public perception of NASA; (4) the effect of such unanticipated missions on NASA's scheduled activities; (5) any potential effect on NASA's technical capability to work in space; and (6) any potential effect on U.S. economic competitiveness.

  15. Group Task Force on Satellite Rescue and Repair

    NASA Technical Reports Server (NTRS)

    1992-01-01

    The Group Task Force was chartered by the Administrator of NASA to recommend 'a policy outlining the criteria, the design standards, and the pricing model to guide NASA in assessing the responsibilities for government and nongovernment Satellite Rescue and Repair Missions.' Criteria for accepting such missions, risks, and benefits to all sectors of our economy involved in satellite services, adequacy of planning and training, and the impact on NASA's primary mission were reviewed. The Group began by asking a more fundamental question; is satellite rescue and repair a logical element of NASA's mission? Factors considered were: (1) the probability of rescue or repair opportunities arising; (2) the economic justification for such attempts; (3) the benefits to NASA, both from such ad hoc learning experiences in space operations and the impact on the public perception of NASA; (4) the effect of such unanticipated missions on NASA's scheduled activities; (5) any potential effect on NASA's technical capability to work in space; and (6) any potential effect on U.S. economic competitiveness.

  16. Labor of love. A model for planning human resource needs.

    PubMed

    Brady, F J

    1989-01-01

    Typically, the annual budgeting process is the hospital's only attempt to forecast human resource requirements. In times of rapid change, this traditional ad hoc approach is incapable of satisfying either the Catholic hospital's ethical obligations as an employer or its responsibilities to provide healthcare to the poor and suffering. Assumptions about future activity, including volume projections on admissions, patient days, and other services, influence the budgeting process to a large degree. Because the amount of work to be done and the number of employees required to do it are related, changes in demand for service immediately and directly affect staffing requirements. A hospital cannot achieve ethical human resource management or provide high-quality healthcare if inadequate planning forces management into a cycle of crisis-coping--reacting to this year's nursing shortage with a major recruiting effort and next year's financial crunch with a traumatic reduction in force. The human resource planning approach outlined here helps the hospital meet legitimate business needs while satisfying its ethical obligations. The model has four phases and covers a charge to the planning committee; committee appointments; announcements; the establishment of ground rules, focus, and task forces; and the work of each task force.

  17. Functional Fixedness in Creative Thinking Tasks Depends on Stimulus Modality.

    PubMed

    Chrysikou, Evangelia G; Motyka, Katharine; Nigro, Cristina; Yang, Song-I; Thompson-Schill, Sharon L

    2016-11-01

    Pictorial examples during creative thinking tasks can lead participants to fixate on these examples and reproduce their elements even when yielding suboptimal creative products. Semantic memory research may illuminate the cognitive processes underlying this effect. Here, we examined whether pictures and words differentially influence access to semantic knowledge for object concepts depending on whether the task is close- or open-ended. Participants viewed either names or pictures of everyday objects, or a combination of the two, and generated common, secondary, or ad hoc uses for them. Stimulus modality effects were assessed quantitatively through reaction times and qualitatively through a novel coding system, which classifies creative output on a continuum from top-down-driven to bottom-up-driven responses. Both analyses revealed differences across tasks. Importantly, for ad hoc uses, participants exposed to pictures generated more top-down-driven responses than those exposed to object names. These findings have implications for accounts of functional fixedness in creative thinking, as well as theories of semantic memory for object concepts.

  18. Functional Fixedness in Creative Thinking Tasks Depends on Stimulus Modality

    PubMed Central

    Chrysikou, Evangelia G.; Motyka, Katharine; Nigro, Cristina; Yang, Song-I; Thompson-Schill, Sharon L.

    2015-01-01

    Pictorial examples during creative thinking tasks can lead participants to fixate on these examples and reproduce their elements even when yielding suboptimal creative products. Semantic memory research may illuminate the cognitive processes underlying this effect. Here, we examined whether pictures and words differentially influence access to semantic knowledge for object concepts depending on whether the task is close- or open-ended. Participants viewed either names or pictures of everyday objects, or a combination of the two, and generated common, secondary, or ad hoc uses for them. Stimulus modality effects were assessed quantitatively through reaction times and qualitatively through a novel coding system, which classifies creative output on a continuum from top-down-driven to bottom-up-driven responses. Both analyses revealed differences across tasks. Importantly, for ad hoc uses, participants exposed to pictures generated more top-down-driven responses than those exposed to object names. These findings have implications for accounts of functional fixedness in creative thinking, as well as theories of semantic memory for object concepts. PMID:28344724

  19. Ecology Based Decentralized Agent Management System

    NASA Technical Reports Server (NTRS)

    Peysakhov, Maxim D.; Cicirello, Vincent A.; Regli, William C.

    2004-01-01

    The problem of maintaining a desired number of mobile agents on a network is not trivial, especially if we want a completely decentralized solution. Decentralized control makes a system more r e bust and less susceptible to partial failures. The problem is exacerbated on wireless ad hoc networks where host mobility can result in significant changes in the network size and topology. In this paper we propose an ecology-inspired approach to the management of the number of agents. The approach associates agents with living organisms and tasks with food. Agents procreate or die based on the abundance of uncompleted tasks (food). We performed a series of experiments investigating properties of such systems and analyzed their stability under various conditions. We concluded that the ecology based metaphor can be successfully applied to the management of agent populations on wireless ad hoc networks.

  20. Infection prevention and control of the Ebola outbreak in Liberia, 2014-2015: key challenges and successes.

    PubMed

    Cooper, Catherine; Fisher, Dale; Gupta, Neil; MaCauley, Rose; Pessoa-Silva, Carmem L

    2016-01-05

    Prior to the 2014-2015 Ebola outbreak, infection prevention and control (IPC) activities in Liberian healthcare facilities were basic. There was no national IPC guidance, nor dedicated staff at any level of government or healthcare facility (HCF) to ensure the implementation of best practices. Efforts to improve IPC early in the outbreak were ad hoc and messaging was inconsistent. In September 2014, at the height of the outbreak, the national IPC Task Force was established with a Ministry of Health (MoH) mandate to coordinate IPC response activities. A steering group of the Task Force, including representatives of the World Health Organization (WHO) and the United States Centers for Disease Control and Prevention (CDC), supported MoH leadership in implementing standardized messaging and IPC training for the health workforce. This structure, and the activities implemented under this structure, played a crucial role in the implementation of IPC practices and successful containment of the outbreak. Moving forward, a nationwide culture of IPC needs to be maintained through this governance structure in Liberia's health system to prevent and respond to future outbreaks.

  1. Definition of drug resistant epilepsy: consensus proposal by the ad hoc Task Force of the ILAE Commission on Therapeutic Strategies.

    PubMed

    Kwan, Patrick; Arzimanoglou, Alexis; Berg, Anne T; Brodie, Martin J; Allen Hauser, W; Mathern, Gary; Moshé, Solomon L; Perucca, Emilio; Wiebe, Samuel; French, Jacqueline

    2010-06-01

    To improve patient care and facilitate clinical research, the International League Against Epilepsy (ILAE) appointed a Task Force to formulate a consensus definition of drug resistant epilepsy. The overall framework of the definition has two "hierarchical" levels: Level 1 provides a general scheme to categorize response to each therapeutic intervention, including a minimum dataset of knowledge about the intervention that would be needed; Level 2 provides a core definition of drug resistant epilepsy using a set of essential criteria based on the categorization of response (from Level 1) to trials of antiepileptic drugs. It is proposed as a testable hypothesis that drug resistant epilepsy is defined as failure of adequate trials of two tolerated, appropriately chosen and used antiepileptic drug schedules (whether as monotherapies or in combination) to achieve sustained seizure freedom. This definition can be further refined when new evidence emerges. The rationale behind the definition and the principles governing its proper use are discussed, and examples to illustrate its application in clinical practice are provided.

  2. An artificial immune system approach with secondary response for misbehavior detection in mobile ad hoc networks.

    PubMed

    Sarafijanović, Slavisa; Le Boudec, Jean-Yves

    2005-09-01

    In mobile ad hoc networks, nodes act both as terminals and information relays, and they participate in a common routing protocol, such as dynamic source routing (DSR). The network is vulnerable to routing misbehavior, due to faulty or malicious nodes. Misbehavior detection systems aim at removing this vulnerability. In this paper, we investigate the use of an artificial immune system (AIS) to detect node misbehavior in a mobile ad hoc network using DSR. The system is inspired by the natural immune system (IS) of vertebrates. Our goal is to build a system that, like its natural counterpart, automatically learns, and detects new misbehavior. We describe our solution for the classification task of the AIS; it employs negative selection and clonal selection, the algorithms for learning and adaptation used by the natural IS. We define how we map the natural IS concepts such as self, antigen, and antibody to a mobile ad hoc network and give the resulting algorithm for classifying nodes as misbehaving. We implemented the system in the network simulator Glomosim; we present detection results and discuss how the system parameters affect the performance of primary and secondary response. Further steps will extend the design by using an analogy to the innate system, danger signal, and memory cells.

  3. On Trust Evaluation in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Nguyen, Dang Quan; Lamont, Louise; Mason, Peter C.

    Trust has been considered as a social relationship between two individuals in human society. But, as computer science and networking have succeeded in using computers to automate many tasks, the concept of trust can be generalized to cover the reliability and relationships of non-human interaction, such as, for example, information gathering and data routing. This paper investigates the evaluation of trust in the context of ad hoc networks. Nodes evaluate each other’s behaviour based on observables. A node then decides whether to trust another node to have certain innate abilities. We show how accurate such an evaluation could be. We also provide the minimum number of observations required to obtain an accurate evaluation, a result that indicates that observation-based trust in ad hoc networks will remain a challenging problem. The impact of making networking decisions using trust evaluation on the network connectivity is also examined. In this manner, quantitative decisions can be made concerning trust-based routing with the knowledge of the potential impact on connectivity.

  4. Wikisearching and Wikilinking

    NASA Astrophysics Data System (ADS)

    Jenkinson, Dylan; Leung, Kai-Cheung; Trotman, Andrew

    The University of Otago submitted three element runs and three passage runs to the Relevance-in-Context task of the ad hoc track. The best Otago run was a whole-document run placing 7th. The best Otago passage run placed 13th while the best Otago element run placed 31st. There were a total of 40 runs submitted to the task. The ad hoc result reinforced our prior belief that passages are better answers than elements and that the most important aspect of the focused retrieval is the identification of relevant documents. Six runs were submitted to the Link-the-Wiki track. The best Otago run placed 1st (of 21) in file to file automatic assessment and 6th (of 28) with manual assessment. The Itakura & Clarke algorithm was used for outgoing links, with special attention paid to parsing and case sensitivity. For incoming links representative terms were selected from the document and used to find similar documents.

  5. Routing Protocols to Minimize the Number of Route Disconnections for Communication in Mobile Ad Hoc Networks

    DTIC Science & Technology

    2009-09-01

    Wireless Sensor Network (WSN) Simulator Research Personnel: Dr. Ali Abu-El Humos Task No. Task Current Status 1 Literature review and problem definition...networks.com/ [2] S. Dulman, P. Havinga, "A Simulation Template for Wireless Sensor Networks ," Supplement of the Sixth International Symposium on Autonomous... Sensor Network (WSN) Simulator 76 I Breakdown of the Research Activity to Tasks 76 II Description of the Tasks 76 Task 1 Literature Review and

  6. Beyond Line-of-Sight Information Dissemination for Force Protection

    DTIC Science & Technology

    2012-11-01

    utilize ad hoc, mesh networks to support data-in-motion and remote data storage and access. These types of sensors are common among Force Protection...Operations and Forward Operating Base security . Current Force Protection Kits include a rich set of sensors that can be monitored from a core operator...and tactical war fighters in tactical network environments . Marti has the potential to improve situation awareness and Force Protection for

  7. Report of the SSME assessment team

    NASA Technical Reports Server (NTRS)

    1993-01-01

    In response to a request from the House of Representatives Committee on Science, Space, and Technology in its Report No. 102-500 of April 22, 1992, the Aerospace Safety Advisory Panel (ASAP) created an ad hoc task force to conduct a thorough assessment of the Space Shuttle Main Engine (SSME). The membership was drawn mostly from organizations other than ASAP, and this report represents the views of that task force. Its task was to assess the risk that the SSME poses to the safe operation of the Space Shuttle, to identify and evaluate improvements to the engine that would reduce the risk, and to recommend a set of priorities for the implementation of these improvements. The SSME Assessment Team, as it opted to call itself, convened in mid-1992 and, subsequently, met with and gathered information from all the principal organizations involved in the SSME program. These included the Rocketdyne Division of Rockwell International, the Marshall Space Flight Center of NASA, and the Pratt & Whitney Division of United Technologies Corporation. The information in this report reflects the program status as of October 1992. From the information received, the Team formed its conclusions and recommendations. Changes in the program status have, of course, occurred since that time; however, they did not affect the Team's conclusions and recommendations.

  8. Ad hoc categories and false memories: Memory illusions for categories created on-the-spot.

    PubMed

    Soro, Jerônimo C; Ferreira, Mário B; Semin, Gün R; Mata, André; Carneiro, Paula

    2017-11-01

    Three experiments were designed to test whether experimentally created ad hoc associative networks evoke false memories. We used the DRM (Deese, Roediger, McDermott) paradigm with lists of ad hoc categories composed of exemplars aggregated toward specific goals (e.g., going for a picnic) that do not share any consistent set of features. Experiment 1 revealed considerable levels of false recognitions of critical words from ad hoc categories. False recognitions occurred even when the lists were presented without an organizing theme (i.e., the category's label). Experiments 1 and 2 tested whether (a) the ease of identifying the categories' themes, and (b) the lists' backward associative strength could be driving the effect. List identifiability did not correlate with false recognition, and the effect remained even when backward associative strength was controlled for. Experiment 3 manipulated the distractor items in the recognition task to address the hypothesis that the salience of unrelated items could be facilitating the occurrence of the phenomenon. The effect remained when controlling for this source of facilitation. These results have implications for assumptions made by theories of false memories, namely the preexistence of associations in the activation-monitoring framework and the central role of gist extraction in fuzzy-trace theory, while providing evidence of the occurrence of false memories for more dynamic and context-dependent knowledge structures. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  9. Cross-layer protocols optimized for real-time multimedia services in energy-constrained mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2003-07-01

    Mobile ad hoc networking (MANET) supports self-organizing, mobile infrastructures and enables an autonomous network of mobile nodes that can operate without a wired backbone. Ad hoc networks are characterized by multihop, wireless connectivity via packet radios and by the need for efficient dynamic protocols. All routers are mobile and can establish connectivity with other nodes only when they are within transmission range. Importantly, ad hoc wireless nodes are resource-constrained, having limited processing, memory, and battery capacity. Delivery of high quality-ofservice (QoS), real-time multimedia services from Internet-based applications over a MANET is a challenge not yet achieved by proposed Internet Engineering Task Force (IETF) ad hoc network protocols in terms of standard performance metrics such as end-to-end throughput, packet error rate, and delay. In the distributed operations of route discovery and maintenance, strong interaction occurs across MANET protocol layers, in particular, the physical, media access control (MAC), network, and application layers. The QoS requirements are specified for the service classes by the application layer. The cross-layer design must also satisfy the battery-limited energy constraints, by minimizing the distributed power consumption at the nodes and of selected routes. Interactions across the layers are modeled in terms of the set of concatenated design parameters including associated energy costs. Functional dependencies of the QoS metrics are described in terms of the concatenated control parameters. New cross-layer designs are sought that optimize layer interdependencies to achieve the "best" QoS available in an energy-constrained, time-varying network. The protocol design, based on a reactive MANET protocol, adapts the provisioned QoS to dynamic network conditions and residual energy capacities. The cross-layer optimization is based on stochastic dynamic programming conditions derived from time-dependent models of MANET packet flows. Regulation of network behavior is modeled by the optimal control of the conditional rates of multivariate point processes (MVPPs); these rates depend on the concatenated control parameters through a change of probability measure. The MVPP models capture behavior of many service applications, e.g., voice, video and the self-similar behavior of Internet data sessions. Performance verification of the cross-layer protocols, derived from the dynamic programming conditions, can be achieved by embedding the conditions in a reactive routing protocol for MANETs, in a simulation environment, such as the wireless extension of ns-2. A canonical MANET scenario consists of a distributed collection of battery-powered laptops or hand-held terminals, capable of hosting multimedia applications. Simulation details and performance tradeoffs, not presented, remain for a sequel to the paper.

  10. Reduced-order modeling for hyperthermia: an extended balanced-realization-based approach.

    PubMed

    Mattingly, M; Bailey, E A; Dutton, A W; Roemer, R B; Devasia, S

    1998-09-01

    Accurate thermal models are needed in hyperthermia cancer treatments for such tasks as actuator and sensor placement design, parameter estimation, and feedback temperature control. The complexity of the human body produces full-order models which are too large for effective execution of these tasks, making use of reduced-order models necessary. However, standard balanced-realization (SBR)-based model reduction techniques require a priori knowledge of the particular placement of actuators and sensors for model reduction. Since placement design is intractable (computationally) on the full-order models, SBR techniques must use ad hoc placements. To alleviate this problem, an extended balanced-realization (EBR)-based model-order reduction approach is presented. The new technique allows model order reduction to be performed over all possible placement designs and does not require ad hoc placement designs. It is shown that models obtained using the EBR method are more robust to intratreatment changes in the placement of the applied power field than those models obtained using the SBR method.

  11. Ad hoc vs. Non-ad hoc Percutaneous Coronary Intervention Strategies in Patients With Stable Coronary Artery Disease.

    PubMed

    Toyota, Toshiaki; Morimoto, Takeshi; Shiomi, Hiroki; Ando, Kenji; Ono, Koh; Shizuta, Satoshi; Kato, Takao; Saito, Naritatsu; Furukawa, Yutaka; Nakagawa, Yoshihisa; Horie, Minoru; Kimura, Takeshi

    2017-03-24

    Few studies have evaluated the prevalence and clinical outcomes of ad hoc percutaneous coronary intervention (PCI), performing diagnostic coronary angiography and PCI in the same session, in stable coronary artery disease (CAD) patients.Methods and Results:From the CREDO-Kyoto PCI/CABG registry cohort-2, 6,943 patients were analyzed as having stable CAD and undergoing first PCI. Ad hoc PCI and non-ad hoc PCI were performed in 1,722 (24.8%) and 5,221 (75.1%) patients, respectively. The cumulative 5-year incidence and adjusted risk for all-cause death were not significantly different between the 2 groups (15% vs. 15%, P=0.53; hazard ratio: 1.15, 95% confidence interval: 0.98-1.35, P=0.08). Ad hoc PCI relative to non-ad hoc PCI was associated with neutral risk for myocardial infarction, any coronary revascularization, and bleeding, but was associated with a trend towards lower risk for stroke (hazard ratio: 0.78, 95% confidence interval: 0.60-1.02, P=0.06). Ad hoc PCI in stable CAD patients was associated with at least comparable 5-year clinical outcomes as with non-ad hoc PCI. Considering patients' preference and the cost-saving, the ad hoc PCI strategy might be a safe and attractive option for patients with stable CAD, although the prevalence of ad hoc PCI was low in the current study population.

  12. The Future of Indigenous Security Force Training: Considerations for the Joint Operational Commander

    DTIC Science & Technology

    2007-11-06

    FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE The Future of Indigenous Security Force Training: 5a. CONTRACT NUMBER...focus on indigenous security force training and development (ISFTD) is unique to OIF or if it foreshadows a requirement that must be addressed in...operational plans using ad hoc capabilities. This research paper seeks to demonstrate that the U.S. military has an increased need to train indigenous

  13. Magnus force effect in optical manipulation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cipparrone, Gabriella; Pagliusi, Pasquale; Istituto per i Processi Chimici e Fisici, Consiglio Nazionale delle Ricerche, Ponte P. Bucci, Cubo 33B, I-87036 Rende

    2011-07-15

    The effect of the Magnus force in optical micromanipulation has been observed. An ad hoc experiment has been designed based on a one-dimensional optical trap that carries angular momentum. The observed particle dynamics reveals the occurrence of this hydrodynamic force, which is neglected in the common approach. Its measured value is larger than the one predicted by the existing theoretical models for micrometric particles and low Reynolds number, showing that the Magnus force can contribute to unconventional optohydrodynamic trapping and manipulation.

  14. Energy conservation in ad hoc multimedia networks using traffic-shaping mechanisms

    NASA Astrophysics Data System (ADS)

    Chandra, Surendar

    2003-12-01

    In this work, we explore network traffic shaping mechanisms that deliver packets at pre-determined intervals; allowing the network interface to transition to a lower power consuming sleep state. We focus our efforts on commodity devices, IEEE 802.11b ad hoc mode and popular streaming formats. We argue that factors such as the lack of scheduling clock phase synchronization among the participants and scheduling delays introduced by back ground tasks affect the potential energy savings. Increasing the periodic transmission delays to transmit data infrequently can offset some of these effects at the expense of flooding the wireless channel for longer periods of time; potentially increasing the time to acquire the channel for non-multimedia traffic. Buffering mechanisms built into media browsers can mitigate the effects of these added delays from being mis-interpreted as network congestion. We show that practical implementations of such traffic shaping mechanisms can offer significant energy savings.

  15. Enhanced Weight based DSR for Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Verma, Samant; Jain, Sweta

    2011-12-01

    Routing in ad hoc network is a great problematic, since a good routing protocol must ensure fast and efficient packet forwarding, which isn't evident in ad hoc networks. In literature there exists lot of routing protocols however they don't include all the aspects of ad hoc networks as mobility, device and medium constraints which make these protocols not efficient for some configuration and categories of ad hoc networks. Thus in this paper we propose an improvement of Weight Based DSR in order to include some of the aspects of ad hoc networks as stability, remaining battery power, load and trust factor and proposing a new approach Enhanced Weight Based DSR.

  16. A secure 3-way routing protocols for intermittently connected mobile ad hoc networks.

    PubMed

    Sekaran, Ramesh; Parasuraman, Ganesh Kumar

    2014-01-01

    The mobile ad hoc network may be partially connected or it may be disconnected in nature and these forms of networks are termed intermittently connected mobile ad hoc network (ICMANET). The routing in such disconnected network is commonly an arduous task. Many routing protocols have been proposed for routing in ICMANET since decades. The routing techniques in existence for ICMANET are, namely, flooding, epidemic, probabilistic, copy case, spray and wait, and so forth. These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth. Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters. The algorithm along with efficient routing ensures higher degree of security. The security level is cited testing with respect to possibility of malicious nodes into the network. This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET.

  17. A Secure 3-Way Routing Protocols for Intermittently Connected Mobile Ad Hoc Networks

    PubMed Central

    Parasuraman, Ganesh Kumar

    2014-01-01

    The mobile ad hoc network may be partially connected or it may be disconnected in nature and these forms of networks are termed intermittently connected mobile ad hoc network (ICMANET). The routing in such disconnected network is commonly an arduous task. Many routing protocols have been proposed for routing in ICMANET since decades. The routing techniques in existence for ICMANET are, namely, flooding, epidemic, probabilistic, copy case, spray and wait, and so forth. These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth. Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters. The algorithm along with efficient routing ensures higher degree of security. The security level is cited testing with respect to possibility of malicious nodes into the network. This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET. PMID:25136697

  18. Menopausal hormone therapy for primary prevention: why the USPSTF is wrong.

    PubMed

    Langer, R D; Simon, J A; Pines, A; Lobo, R A; Hodis, H N; Pickar, J H; Archer, D F; Sarrel, P M; Utian, W H

    2017-10-01

    The US Preventive Services Task Force (USPSTF) Draft Recommendation statement on Menopausal Hormone Therapy: Primary Prevention for Chronic Diseases, released in May 2017, perpetuates a major disconnect between the primary population affected, women within roughly 10 years of menopause, and the data cited. Furthermore, major elements of the evidence relied upon have been misinterpreted or misstated, particularly in regard to coronary heart disease and breast cancer, for which there is no statistically significant evidence of harm. As currently drafted, the recommendations reiterate the USPSTF statements of 2012, 2005 and 2002, and will perpetuate egregious harm to the public health. In an attempt to avoid that outcome and to facilitate a return to rational discourse regarding menopausal hormone therapy, an ad hoc group of experts in menopausal health submitted this comprehensive response to the USPSTF.

  19. Latency-Efficient Communication in Wireless Mesh Networks under Consideration of Large Interference Range

    NASA Astrophysics Data System (ADS)

    Xin, Qin; Yao, Xiaolan; Engelstad, Paal E.

    2010-09-01

    Wireless Mesh Networking is an emerging communication paradigm to enable resilient, cost-efficient and reliable services for the future-generation wireless networks. We study here the minimum-latency communication primitive of gossiping (all-to-all communication) in multi-hop ad-hoc Wireless Mesh Networks (WMNs). Each mesh node in the WMN is initially given a message and the objective is to design a minimum-latency schedule such that each mesh node distributes its message to all other mesh nodes. Minimum-latency gossiping problem is well known to be NP-hard even for the scenario in which the topology of the WMN is known to all mesh nodes in advance. In this paper, we propose a new latency-efficient approximation scheme that can accomplish gossiping task in polynomial time units in any ad-hoc WMN under consideration of Large Interference Range (LIR), e.g., the interference range is much larger than the transmission range. To the best of our knowledge, it is first time to investigate such a scenario in ad-hoc WMNs under LIR, our algorithm allows the labels (e.g., identifiers) of the mesh nodes to be polynomially large in terms of the size of the WMN, which is the first time that the scenario of large labels has been considered in ad-hoc WMNs under LIR. Furthermore, our gossiping scheme can be considered as a framework which can be easily implied to the scenario under consideration of mobility-related issues since we assume that the mesh nodes have no knowledge on the network topology even for its neighboring mesh nodes.

  20. Abbreviations for device names: a proposed methodology with specific examples.

    PubMed

    Alam, Murad; Dover, Jeffrey S; Alam, Murad; Goldman, Mitchel P; Kaminer, Michael S; Orringer, Jeffrey; Waldorf, Heidi; Alam, Murad; Avram, Mathew; Cohen, Joel L; Draelos, Zoe Diana; Dover, Jeffrey S; Hruza, George; Kilmer, Suzanne; Lawrence, Naomi; Lupo, Mary; Metelitsa, Andrei; Nestor, Mark; Ross, E Victor

    2013-04-01

    Many devices used in dermatology lack generic names. If investigators use commercial device names, they risk the appearance of bias. Alternatively, reliance on ad-hoc names and abbreviations may confuse readers who do not recognize these. To develop a system for assigning abbreviations to denote devices commonly used in dermatology. Secondarily, to use this system to create abbreviations for FDA-approved neurotoxins and prepackaged injectable soft-tissue augmentation materials. The American Society for Dermatologic Surgery convened a Lexicon Task Force in March 2012. One charge of this Task Force was to develop criteria for assigning abbreviations to medical devices. A modified consensus process was used. Abbreviations to denote devices were to be: based on a standardized approach; transparent to the casual reader; markedly brief; and in all cases, different than the commercial names. Three-letter all caps abbreviations, some with subscripts, were assigned to denote each of the approved neurotoxins and fillers. A common system of abbreviations for medical devices in dermatology may avoid the appearance of bias while ensuring effective communication. The proposed system may be expanded to name other devices, and the ensuing abbreviations may be suitable for journal articles, continuing medical education lectures, or other academic or clinical purposes. © 2013 by the American Society for Dermatologic Surgery, Inc. Published by Wiley Periodicals, Inc.

  1. How Does Creating a Concept Map Affect Item-Specific Encoding?

    ERIC Educational Resources Information Center

    Grimaldi, Phillip J.; Poston, Laurel; Karpicke, Jeffrey D.

    2015-01-01

    Concept mapping has become a popular learning tool. However, the processes underlying the task are poorly understood. In the present study, we examined the effect of creating a concept map on the processing of item-specific information. In 2 experiments, subjects learned categorized or ad hoc word lists by making pleasantness ratings, sorting…

  2. Life Cycles of Ad Hoc Task Groups

    DTIC Science & Technology

    1983-10-01

    Rick’s Cafe after work. . 25 Alexandra: You have connections? 26 Ken: Yes! ൣ Alexandra: You can be the industrial spy! (Pause) We don’t really need...with franchising --he could do a whole business strictly dealing with spare parts. We have to describe these packages and describe how to... (words

  3. The Eras and Trends of Automatic Short Answer Grading

    ERIC Educational Resources Information Center

    Burrows, Steven; Gurevych, Iryna; Stein, Benno

    2015-01-01

    Automatic short answer grading (ASAG) is the task of assessing short natural language responses to objective questions using computational methods. The active research in this field has increased enormously of late with over 80 papers fitting a definition of ASAG. However, the past efforts have generally been ad-hoc and non-comparable until…

  4. Labour Market Outcomes of Vocational Education in Europe: Evidence from the European Union Labour Force Survey. Research Paper No 32

    ERIC Educational Resources Information Center

    Cedefop - European Centre for the Development of Vocational Training, 2013

    2013-01-01

    This report focuses on the outcomes of vocational education and, in particular, on the transition from education to work in the current employment situation for young adults in the European Union. Using anonymised microdata from the EU labour force survey 2009 ad hoc module, this is one of the first studies to undertake a large cross-country…

  5. DAWN: Dynamic Ad-hoc Wireless Network

    DTIC Science & Technology

    2016-06-19

    DAWN: Dynamic Ad-hoc Wireless Network The DAWN (Dynamic Ad-hoc Wireless Networks) project is developing a general theory of complex and dynamic... wireless communication networks. To accomplish this, DAWN adopts a very different approach than those followed in the past and summarized above. DAWN... wireless communication networks. The members of DAWN investigated difference aspects of wireless mobile ad hoc networks (MANET). The views, opinions and/or

  6. Robotic disaster recovery efforts with ad-hoc deployable cloud computing

    NASA Astrophysics Data System (ADS)

    Straub, Jeremy; Marsh, Ronald; Mohammad, Atif F.

    2013-06-01

    Autonomous operations of search and rescue (SaR) robots is an ill posed problem, which is complexified by the dynamic disaster recovery environment. In a typical SaR response scenario, responder robots will require different levels of processing capabilities during various parts of the response effort and will need to utilize multiple algorithms. Placing these capabilities onboard the robot is a mediocre solution that precludes algorithm specific performance optimization and results in mediocre performance. Architecture for an ad-hoc, deployable cloud environment suitable for use in a disaster response scenario is presented. Under this model, each service provider is optimized for the task and maintains a database of situation-relevant information. This service-oriented architecture (SOA 3.0) compliant framework also serves as an example of the efficient use of SOA 3.0 in an actual cloud application.

  7. An octopus-bioinspired solution to movement and manipulation for soft robots.

    PubMed

    Calisti, M; Giorelli, M; Levy, G; Mazzolai, B; Hochner, B; Laschi, C; Dario, P

    2011-09-01

    Soft robotics is a challenging and promising branch of robotics. It can drive significant improvements across various fields of traditional robotics, and contribute solutions to basic problems such as locomotion and manipulation in unstructured environments. A challenging task for soft robotics is to build and control soft robots able to exert effective forces. In recent years, biology has inspired several solutions to such complex problems. This study aims at investigating the smart solution that the Octopus vulgaris adopts to perform a crawling movement, with the same limbs used for grasping and manipulation. An ad hoc robot was designed and built taking as a reference a biological hypothesis on crawling. A silicone arm with cables embedded to replicate the functionality of the arm muscles of the octopus was built. This novel arm is capable of pushing-based locomotion and object grasping, mimicking the movements that octopuses adopt when crawling. The results support the biological observations and clearly show a suitable way to build a more complex soft robot that, with minimum control, can perform diverse tasks.

  8. Integrated data lookup and replication scheme in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Chen, Kai; Nahrstedt, Klara

    2001-11-01

    Accessing remote data is a challenging task in mobile ad hoc networks. Two problems have to be solved: (1) how to learn about available data in the network; and (2) how to access desired data even when the original copy of the data is unreachable. In this paper, we develop an integrated data lookup and replication scheme to solve these problems. In our scheme, a group of mobile nodes collectively host a set of data to improve data accessibility for all members of the group. They exchange data availability information by broadcasting advertising (ad) messages to the group using an adaptive sending rate policy. The ad messages are used by other nodes to derive a local data lookup table, and to reduce data redundancy within a connected group. Our data replication scheme predicts group partitioning based on each node's current location and movement patterns, and replicates data to other partitions before partitioning occurs. Our simulations show that data availability information can quickly propagate throughout the network, and that the successful data access ratio of each node is significantly improved.

  9. Trust recovery model of Ad Hoc network based on identity authentication scheme

    NASA Astrophysics Data System (ADS)

    Liu, Jie; Huan, Shuiyuan

    2017-05-01

    Mobile Ad Hoc network trust model is widely used to solve mobile Ad Hoc network security issues. Aiming at the problem of reducing the network availability caused by the processing of malicious nodes and selfish nodes in mobile Ad Hoc network routing based on trust model, an authentication mechanism based on identity authentication mobile Ad Hoc network is proposed, which uses identity authentication to identify malicious nodes, And trust the recovery of selfish nodes in order to achieve the purpose of reducing network congestion and improving network quality. The simulation results show that the implementation of the mechanism can effectively improve the network availability and security.

  10. Effects of Verbal Behavior within Curriculum Development Committees on the Curriculum Product.

    ERIC Educational Resources Information Center

    Talmage, Harriet

    An attempt was made to ascertain what type of verbal interaction behavior manifested by a group given a problem in curriculum development affects the quality of the product. Thirty ad hoc groups, selected randomly, were given curriculum development tasks to solve. Curriculum Guide Form (CGF) and Bales' Interaction Process Analysis (IPA) were used…

  11. Shifting Priorities: Print and Electronic Serials at the University of Montana

    ERIC Educational Resources Information Center

    Millet, Michelle S.; Mueller, Susan

    2005-01-01

    Following a library-wide brainstorming session and retreat, the Dean of the Maureen and Mike Mansfield Library tasked an ad-hoc committee to discuss implications for the library and its users if certain processes were implemented or eliminated in order to streamline the processing of serials. As the library's collection continues to shift from…

  12. ICTNET at Web Track 2012 Ad-hoc Task

    DTIC Science & Technology

    2012-11-01

    Model and use it as baseline this year. 3.2 Learning to rank Learning to rank (LTR) introduces machine learning to retrieval ranking problem. It...Yoram Singer. An efficient boosting algorithm  for  combining preferences [J]. The Journal of  Machine   Learning  Research. 2003. 

  13. Developing a Mission Statement for a Faculty Senate

    ERIC Educational Resources Information Center

    D'Souza, Derrick E.; Clower, Terry L.; Nimon, Kim F.; Oldmixon, Elizabeth A.; van Tassell, Frances S.

    2011-01-01

    The faculty senate is the agent of the faculty, and its mission statement stakes the faculty's claim in the institutional decision-making process. It is in this context that the chair of the faculty senate at a large southwestern state university tasked an ad hoc committee (comprised of the authors) with writing its inaugural mission statement.…

  14. Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization in Mobile Ad Hoc Networks

    PubMed Central

    Robinson, Y. Harold; Rajaram, M.

    2015-01-01

    Mobile ad hoc network (MANET) is a collection of autonomous mobile nodes forming an ad hoc network without fixed infrastructure. Dynamic topology property of MANET may degrade the performance of the network. However, multipath selection is a great challenging task to improve the network lifetime. We proposed an energy-aware multipath routing scheme based on particle swarm optimization (EMPSO) that uses continuous time recurrent neural network (CTRNN) to solve optimization problems. CTRNN finds the optimal loop-free paths to solve link disjoint paths in a MANET. The CTRNN is used as an optimum path selection technique that produces a set of optimal paths between source and destination. In CTRNN, particle swarm optimization (PSO) method is primly used for training the RNN. The proposed scheme uses the reliability measures such as transmission cost, energy factor, and the optimal traffic ratio between source and destination to increase routing performance. In this scheme, optimal loop-free paths can be found using PSO to seek better link quality nodes in route discovery phase. PSO optimizes a problem by iteratively trying to get a better solution with regard to a measure of quality. The proposed scheme discovers multiple loop-free paths by using PSO technique. PMID:26819966

  15. Recommendations for pacemaker implantation for the treatment of atrial tachyarrhythmias and resynchronisation therapy for heart failure: A report from the task force on pacemaker indications of the Dutch Working Group on Cardiac Pacing.

    PubMed

    van Hemel, N M; Dijkman, B; de Voogt, W G; Beukema, W P; Bosker, H A; de Cock, C C; Jordaens, L J L M; van Gelder, I C; van Gelder, L M; van Mechelen, R; Ruiter, J H; Sedney, M I; Slegers, L C

    2004-01-01

    Today, new pacing algorithms and stimulation methods for the prevention and interruption of atrial tachyarrhythmias can be applied on patients who need bradycardia pacing for conventional reasons. In addition, biventricular pacing as additive treatment for patients with severe congestive heart failure due to ventricular systolic dysfunction and prolonged intraventricular conduction has shown to improve symptoms and reduce hospital admissions. These new pacing technologies and the optimising of the pacing programmes are complex, expensive and time-consuming. Based on many clinical studies the indications for these devices are beginning to emerge. To support the cardiologist's decision-making and to prevent waste of effort and resources, the 'ad hoc committee' has provided preliminary recommendations for implantable devices to treat atrial tachyarrhythmias and to extend the treatment of congestive heart failure respectively.

  16. Dynamic fair node spectrum allocation for ad hoc networks using random matrices

    NASA Astrophysics Data System (ADS)

    Rahmes, Mark; Lemieux, George; Chester, Dave; Sonnenberg, Jerry

    2015-05-01

    Dynamic Spectrum Access (DSA) is widely seen as a solution to the problem of limited spectrum, because of its ability to adapt the operating frequency of a radio. Mobile Ad Hoc Networks (MANETs) can extend high-capacity mobile communications over large areas where fixed and tethered-mobile systems are not available. In one use case with high potential impact, cognitive radio employs spectrum sensing to facilitate the identification of allocated frequencies not currently accessed by their primary users. Primary users own the rights to radiate at a specific frequency and geographic location, while secondary users opportunistically attempt to radiate at a specific frequency when the primary user is not using it. We populate a spatial radio environment map (REM) database with known information that can be leveraged in an ad hoc network to facilitate fair path use of the DSA-discovered links. Utilization of high-resolution geospatial data layers in RF propagation analysis is directly applicable. Random matrix theory (RMT) is useful in simulating network layer usage in nodes by a Wishart adjacency matrix. We use the Dijkstra algorithm for discovering ad hoc network node connection patterns. We present a method for analysts to dynamically allocate node-node path and link resources using fair division. User allocation of limited resources as a function of time must be dynamic and based on system fairness policies. The context of fair means that first available request for an asset is not envied as long as it is not yet allocated or tasked in order to prevent cycling of the system. This solution may also save money by offering a Pareto efficient repeatable process. We use a water fill queue algorithm to include Shapley value marginal contributions for allocation.

  17. T2AR: trust-aware ad-hoc routing protocol for MANET.

    PubMed

    Dhananjayan, Gayathri; Subbiah, Janakiraman

    2016-01-01

    Secure data transfer against the malicious attacks is an important issue in an infrastructure-less independent network called mobile ad-hoc network (MANET). Trust assurance between MANET nodes is the key parameter in the high-security provision under dynamic topology variations and open wireless constraints. But, the malicious behavior of nodes reduces the trust level of the nodes that leads to an insecure data delivery. The increase in malicious attacks causes the excessive energy consumption that leads to a reduction of network lifetime. The lack of positional information update of the nodes in ad-hoc on-demand vector (AODV) protocol during the connection establishment offers less trust level between the nodes. Hence, the trust rate computation using energy and mobility models and its update are the essential tasks for secure data delivery. This paper proposes a trust-aware ad-hoc routing (T2AR) protocol to improve the trust level between the nodes in MANET. The proposed method modifies the traditional AODV routing protocol with the constraints of trust rate, energy, mobility based malicious behavior prediction. The packet sequence ID matching from the log reports of neighbor nodes determine the trust rate that avoids the malicious report generation. Besides, the direct and indirect trust observation schemes utilization increases the trust level. Besides, the received signal strength indicator utilization determines the trusted node is within the communication range or not. The comparative analysis between the proposed T2AR with the existing methods such as TRUNCMAN, RBT, GR, FBR and DICOTIDS regarding the average end-to-end delay, throughput, false positives, packet delivery ratio shows the effectiveness of T2AR in the secure MANET environment design.

  18. More tooth, Less Skull: Force Structure Changes for an Uncertain Future

    DTIC Science & Technology

    2012-05-17

    deployments in OIF and OEF are the archetypes for force employment and span of control, highlighting the limits of modularity and the creation of ad hoc...square miles in extent. There was a wider dispersion of formations to minimize the effect of an enemy’s tactical atomic weapons. At the same time, this...The sweeping reorganization to meet the requirements of the atomic battlefield became the Pentomic Division. The Pentomic Division, officially known

  19. Topology Control and Routing in Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Carr-Motyckova, Lenka; Navarra, Alfredo; Johansson, Tomas; Unger, Walter

    Mobile nodes with the ability to communicate with radio signals may form an ad hoc network. In this chapter special problems arising for these ad hoc networks are considered. These include range control, the reduction of interferences, regulation of power consumption, and localization.

  20. An advanced search engine for patent analytics in medicinal chemistry.

    PubMed

    Pasche, Emilie; Gobeill, Julien; Teodoro, Douglas; Gaudinat, Arnaud; Vishnykova, Dina; Lovis, Christian; Ruch, Patrick

    2012-01-01

    Patent collections contain an important amount of medical-related knowledge, but existing tools were reported to lack of useful functionalities. We present here the development of TWINC, an advanced search engine dedicated to patent retrieval in the domain of health and life sciences. Our tool embeds two search modes: an ad hoc search to retrieve relevant patents given a short query and a related patent search to retrieve similar patents given a patent. Both search modes rely on tuning experiments performed during several patent retrieval competitions. Moreover, TWINC is enhanced with interactive modules, such as chemical query expansion, which is of prior importance to cope with various ways of naming biomedical entities. While the related patent search showed promising performances, the ad-hoc search resulted in fairly contrasted results. Nonetheless, TWINC performed well during the Chemathlon task of the PatOlympics competition and experts appreciated its usability.

  1. A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs

    PubMed Central

    Wang, Lingling; Liu, Guozhu; Sun, Lijun

    2017-01-01

    Fog-based VANETs (Vehicular ad hoc networks) is a new paradigm of vehicular ad hoc networks with the advantages of both vehicular cloud and fog computing. Real-time navigation schemes based on fog-based VANETs can promote the scheme performance efficiently. In this paper, we propose a secure and privacy-preserving navigation scheme by using vehicular spatial crowdsourcing based on fog-based VANETs. Fog nodes are used to generate and release the crowdsourcing tasks, and cooperatively find the optimal route according to the real-time traffic information collected by vehicles in their coverage areas. Meanwhile, the vehicle performing the crowdsourcing task can get a reasonable reward. The querying vehicle can retrieve the navigation results from each fog node successively when entering its coverage area, and follow the optimal route to the next fog node until it reaches the desired destination. Our scheme fulfills the security and privacy requirements of authentication, confidentiality and conditional privacy preservation. Some cryptographic primitives, including the Elgamal encryption algorithm, AES, randomized anonymous credentials and group signatures, are adopted to achieve this goal. Finally, we analyze the security and the efficiency of the proposed scheme. PMID:28338620

  2. A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs.

    PubMed

    Wang, Lingling; Liu, Guozhu; Sun, Lijun

    2017-03-24

    Fog-based VANETs (Vehicular ad hoc networks) is a new paradigm of vehicular ad hoc networks with the advantages of both vehicular cloud and fog computing. Real-time navigation schemes based on fog-based VANETs can promote the scheme performance efficiently. In this paper, we propose a secure and privacy-preserving navigation scheme by using vehicular spatial crowdsourcing based on fog-based VANETs. Fog nodes are used to generate and release the crowdsourcing tasks, and cooperatively find the optimal route according to the real-time traffic information collected by vehicles in their coverage areas. Meanwhile, the vehicle performing the crowdsourcing task can get a reasonable reward. The querying vehicle can retrieve the navigation results from each fog node successively when entering its coverage area, and follow the optimal route to the next fog node until it reaches the desired destination. Our scheme fulfills the security and privacy requirements of authentication, confidentiality and conditional privacy preservation. Some cryptographic primitives, including the Elgamal encryption algorithm, AES, randomized anonymous credentials and group signatures, are adopted to achieve this goal. Finally, we analyze the security and the efficiency of the proposed scheme.

  3. 14 CFR 1203.903 - Ad hoc committees.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Ad hoc committees. 1203.903 Section 1203.903 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.903 Ad hoc committees. The Chairperson is authorized...

  4. Ad Hoc Access Gateway Selection Algorithm

    NASA Astrophysics Data System (ADS)

    Jie, Liu

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. For mobile nodes in Ad Hoc network to internet, internet communications in the peer nodes must be achieved through the gateway. Therefore, the key Ad Hoc Access Networks will focus on the discovery gateway, as well as gateway selection in the case of multi-gateway and handover problems between different gateways. This paper considers the mobile node and the gateway, based on the average number of hops from an average access time and the stability of routes, improved gateway selection algorithm were proposed. An improved gateway selection algorithm, which mainly considers the algorithm can improve the access time of Ad Hoc nodes and the continuity of communication between the gateways, were proposed. This can improve the quality of communication across the network.

  5. Innovative research of AD HOC network mobility model

    NASA Astrophysics Data System (ADS)

    Chen, Xin

    2017-08-01

    It is difficult for researchers of AD HOC network to conduct actual deployment during experimental stage as the network topology is changeable and location of nodes is unfixed. Thus simulation still remains the main research method of the network. Mobility model is an important component of AD HOC network simulation. It is used to describe the movement pattern of nodes in AD HOC network (including location and velocity, etc.) and decides the movement trail of nodes, playing as the abstraction of the movement modes of nodes. Therefore, mobility model which simulates node movement is an important foundation for simulation research. In AD HOC network research, mobility model shall reflect the movement law of nodes as truly as possible. In this paper, node generally refers to the wireless equipment people carry. The main research contents include how nodes avoid obstacles during movement process and the impacts of obstacles on the mutual relation among nodes, based on which a Node Self Avoiding Obstacle, i.e. NASO model is established in AD HOC network.

  6. Technologies for network-centric C4ISR

    NASA Astrophysics Data System (ADS)

    Dunkelberger, Kirk A.

    2003-07-01

    Three technologies form the heart of any network-centric command, control, communication, intelligence, surveillance, and reconnaissance (C4ISR) system: distributed processing, reconfigurable networking, and distributed resource management. Distributed processing, enabled by automated federation, mobile code, intelligent process allocation, dynamic multiprocessing groups, check pointing, and other capabilities creates a virtual peer-to-peer computing network across the force. Reconfigurable networking, consisting of content-based information exchange, dynamic ad-hoc routing, information operations (perception management) and other component technologies forms the interconnect fabric for fault tolerant inter processor and node communication. Distributed resource management, which provides the means for distributed cooperative sensor management, foe sensor utilization, opportunistic collection, symbiotic inductive/deductive reasoning and other applications provides the canonical algorithms for network-centric enterprises and warfare. This paper introduces these three core technologies and briefly discusses a sampling of their component technologies and their individual contributions to network-centric enterprises and warfare. Based on the implied requirements, two new algorithms are defined and characterized which provide critical building blocks for network centricity: distributed asynchronous auctioning and predictive dynamic source routing. The first provides a reliable, efficient, effective approach for near-optimal assignment problems; the algorithm has been demonstrated to be a viable implementation for ad-hoc command and control, object/sensor pairing, and weapon/target assignment. The second is founded on traditional dynamic source routing (from mobile ad-hoc networking), but leverages the results of ad-hoc command and control (from the contributed auctioning algorithm) into significant increases in connection reliability through forward prediction. Emphasis is placed on the advantages gained from the closed-loop interaction of the multiple technologies in the network-centric application environment.

  7. 14 CFR 1203.903 - Ad hoc committees.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Ad hoc committees. 1203.903 Section 1203.903 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.903 Ad hoc committees. The Chairperson is authorized to...

  8. Neural Correlates of Task Cost for Stance Control with an Additional Motor Task: Phase-Locked Electroencephalogram Responses

    PubMed Central

    Hwang, Ing-Shiou; Huang, Cheng-Ya

    2016-01-01

    With appropriate reallocation of central resources, the ability to maintain an erect posture is not necessarily degraded by a concurrent motor task. This study investigated the neural control of a particular postural-suprapostural procedure involving brain mechanisms to solve crosstalk between posture and motor subtasks. Participants completed a single posture task and a dual-task while concurrently conducting force-matching and maintaining a tilted stabilometer stance at a target angle. Stabilometer movements and event-related potentials (ERPs) were recorded. The added force-matching task increased the irregularity of postural response rather than the size of postural response prior to force-matching. In addition, the added force-matching task during stabilometer stance led to marked topographic ERP modulation, with greater P2 positivity in the frontal and sensorimotor-parietal areas of the N1-P2 transitional phase and in the sensorimotor-parietal area of the late P2 phase. The time-frequency distribution of the ERP primary principal component revealed that the dual-task condition manifested more pronounced delta (1–4 Hz) and beta (13–35 Hz) synchronizations but suppressed theta activity (4–8 Hz) before force-matching. The dual-task condition also manifested coherent fronto-parietal delta activity in the P2 period. In addition to a decrease in postural regularity, this study reveals spatio-temporal and temporal-spectral reorganizations of ERPs in the fronto-sensorimotor-parietal network due to the added suprapostural motor task. For a particular set of postural-suprapostural task, the behavior and neural data suggest a facilitatory role of autonomous postural response and central resource expansion with increasing interregional interactions for task-shift and planning the motor-suprapostural task. PMID:27010634

  9. Mapping Gender and Social Background Differences in Education and Youth Transitions across Europe

    ERIC Educational Resources Information Center

    Iannelli, Cristina; Smyth, Emer

    2008-01-01

    This paper uses data drawn from the European Union Labour Force Survey 2000 Ad Hoc Module on School to Work Transitions to explore the influence of gender and social background (measured in terms of parental education) on young people's educational and early labour market outcomes across 12 European countries. Our results show that social…

  10. Assured Information Sharing for Ad-Hoc Collaboration

    ERIC Educational Resources Information Center

    Jin, Jing

    2009-01-01

    Collaborative information sharing tends to be highly dynamic and often ad hoc among organizations. The dynamic natures and sharing patterns in ad-hoc collaboration impose a need for a comprehensive and flexible approach to reflecting and coping with the unique access control requirements associated with the environment. This dissertation…

  11. Research of Ad Hoc Networks Access Algorithm

    NASA Astrophysics Data System (ADS)

    Xiang, Ma

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.

  12. Ad Hoc Information Extraction for Clinical Data Warehouses.

    PubMed

    Dietrich, Georg; Krebs, Jonathan; Fette, Georg; Ertl, Maximilian; Kaspar, Mathias; Störk, Stefan; Puppe, Frank

    2018-05-01

    Clinical Data Warehouses (CDW) reuse Electronic health records (EHR) to make their data retrievable for research purposes or patient recruitment for clinical trials. However, much information are hidden in unstructured data like discharge letters. They can be preprocessed and converted to structured data via information extraction (IE), which is unfortunately a laborious task and therefore usually not available for most of the text data in CDW. The goal of our work is to provide an ad hoc IE service that allows users to query text data ad hoc in a manner similar to querying structured data in a CDW. While search engines just return text snippets, our systems also returns frequencies (e.g. how many patients exist with "heart failure" including textual synonyms or how many patients have an LVEF < 45) based on the content of discharge letters or textual reports for special investigations like heart echo. Three subtasks are addressed: (1) To recognize and to exclude negations and their scopes, (2) to extract concepts, i.e. Boolean values and (3) to extract numerical values. We implemented an extended version of the NegEx-algorithm for German texts that detects negations and determines their scope. Furthermore, our document oriented CDW PaDaWaN was extended with query functions, e.g. context sensitive queries and regex queries, and an extraction mode for computing the frequencies for Boolean and numerical values. Evaluations in chest X-ray reports and in discharge letters showed high F1-scores for the three subtasks: Detection of negated concepts in chest X-ray reports with an F1-score of 0.99 and in discharge letters with 0.97; of Boolean values in chest X-ray reports about 0.99, and of numerical values in chest X-ray reports and discharge letters also around 0.99 with the exception of the concept age. The advantages of an ad hoc IE over a standard IE are the low development effort (just entering the concept with its variants), the promptness of the results and the adaptability by the user to his or her particular question. Disadvantage are usually lower accuracy and confidence.This ad hoc information extraction approach is novel and exceeds existing systems: Roogle [1] extracts predefined concepts from texts at preprocessing and makes them retrievable at runtime. Dr. Warehouse [2] applies negation detection and indexes the produced subtexts which include affirmed findings. Our approach combines negation detection and the extraction of concepts. But the extraction does not take place during preprocessing, but at runtime. That provides an ad hoc, dynamic, interactive and adjustable information extraction of random concepts and even their values on the fly at runtime. We developed an ad hoc information extraction query feature for Boolean and numerical values within a CDW with high recall and precision based on a pipeline that detects and removes negations and their scope in clinical texts. Schattauer GmbH.

  13. A Group Based Key Sharing and Management Algorithm for Vehicular Ad Hoc Networks

    PubMed Central

    Moharram, Mohammed Morsi; Azam, Farzana

    2014-01-01

    Vehicular ad hoc networks (VANETs) are one special type of ad hoc networks that involves vehicles on roads. Typically like ad hoc networks, broadcast approach is used for data dissemination. Blind broadcast to each and every node results in exchange of useless and irrelevant messages and hence creates an overhead. Unicasting is not preferred in ad-hoc networks due to the dynamic topology and the resource requirements as compared to broadcasting. Simple broadcasting techniques create several problems on privacy, disturbance, and resource utilization. In this paper, we propose media mixing algorithm to decide what information should be provided to each user and how to provide such information. Results obtained through simulation show that fewer number of keys are needed to share compared to simple broadcasting. Privacy is also enhanced through this approach. PMID:24587749

  14. "I Am Teaching Some of the Boys:" Chaplain Robert Boston Dokes and Army Testing of Black Soldiers in World War II

    ERIC Educational Resources Information Center

    White, George, Jr.

    2012-01-01

    African Americans have served in the United States Armed Forces in nearly every conflict in the nation's history. However, the State--through official government policy, ad hoc decisions of military commanders, or statements by prominent civilians--was rarely comfortable with Black military service. Throughout most of American history, the various…

  15. Typicality Mediates Performance during Category Verification in Both Ad-Hoc and Well-Defined Categories

    ERIC Educational Resources Information Center

    Sandberg, Chaleece; Sebastian, Rajani; Kiran, Swathi

    2012-01-01

    Background: The typicality effect is present in neurologically intact populations for natural, ad-hoc, and well-defined categories. Although sparse, there is evidence of typicality effects in persons with chronic stroke aphasia for natural and ad-hoc categories. However, it is unknown exactly what influences the typicality effect in this…

  16. Coherence between harvest and habitat management -- Joint venture perspectives

    USGS Publications Warehouse

    Baxter, C.K.; Nelson, J.W.; Reinecke, K.J.; Stephens, S.E.

    2006-01-01

    Introduction: In recent months, an ad hoc group of waterfowl scientists, representing the International Association of Fish and Wildlife Agencies (IAFWA) Adaptive Harvest Management (ARM) Task Force and the North American Waterfowl Management Plan (NAWMP) Committee, have collaborated as a Joint Task Group (JTG) to assess options for unifying the population goals guiding waterfowl harvest management and habitat management. The JTG has been charged with bringing coherence to the population goals of the two programs. Characterizing the problem as one of coherence indicates value judgments exist regarding its significance or perhaps existence. For purposes of this paper, we characterize the lack of coherence as the absence of consistent population goals in the two related components of waterfowl conservation habitat and harvest management. Our purpose is to support continued dialogue on the respective goals of these programs and the possible implications of discordant goals to habitat joint ventures. Our objectives are two-fold: (1) illustrate how NAWMP habitat management goals and strategies have been interpreted and pursued in both breeding and wintering areas, and (2) provide perspectives on the linkages between regional habitat management programs and harvest management. The Lower Mississippi Valley and the Prairie Pothole joint ventures (LMVJV and PPJV, respectively) will be used as examples.

  17. Protocols for Detection and Removal of Wormholes for Secure Routing and Neighborhood Creation in Wireless Ad Hoc Networks

    ERIC Educational Resources Information Center

    Hayajneh, Thaier Saleh

    2009-01-01

    Wireless ad hoc networks are suitable and sometimes the only solution for several applications. Many applications, particularly those in military and critical civilian domains (such as battlefield surveillance and emergency rescue) require that ad hoc networks be secure and stable. In fact, security is one of the main barriers to the extensive use…

  18. Ad Hoc Supervision of General Practice Registrars as a "Community of Practice": Analysis, Interpretation and Re-Presentation

    ERIC Educational Resources Information Center

    Clement, T.; Brown, J.; Morrison, J.; Nestel, D.

    2016-01-01

    General practice registrars in Australia undertake most of their vocational training in accredited general practices. They typically see patients alone from the start of their community-based training and are expected to seek timely ad hoc support from their supervisor. Such ad hoc encounters are a mechanism for ensuring patient safety, but also…

  19. Ad Hoc Categories and False Memories: Memory Illusions for Categories Created On-The-Spot

    ERIC Educational Resources Information Center

    Soro, Jerônimo C.; Ferreira, Mário B.; Semin, Gün R.; Mata, André; Carneiro, Paula

    2017-01-01

    Three experiments were designed to test whether experimentally created ad hoc associative networks evoke false memories. We used the DRM (Deese, Roediger, McDermott) paradigm with lists of ad hoc categories composed of exemplars aggregated toward specific goals (e.g., going for a picnic) that do not share any consistent set of features. Experiment…

  20. Ad hoc Laser networks component technology for modular spacecraft

    NASA Astrophysics Data System (ADS)

    Huang, Xiujun; Shi, Dele; Ma, Zongfeng; Shen, Jingshi

    2016-03-01

    Distributed reconfigurable satellite is a new kind of spacecraft system, which is based on a flexible platform of modularization and standardization. Based on the module data flow analysis of the spacecraft, this paper proposes a network component of ad hoc Laser networks architecture. Low speed control network with high speed load network of Microwave-Laser communication mode, no mesh network mode, to improve the flexibility of the network. Ad hoc Laser networks component technology was developed, and carried out the related performance testing and experiment. The results showed that ad hoc Laser networks components can meet the demand of future networking between the module of spacecraft.

  1. Ad hoc laser networks component technology for modular spacecraft

    NASA Astrophysics Data System (ADS)

    Huang, Xiujun; Shi, Dele; Shen, Jingshi

    2017-10-01

    Distributed reconfigurable satellite is a new kind of spacecraft system, which is based on a flexible platform of modularization and standardization. Based on the module data flow analysis of the spacecraft, this paper proposes a network component of ad hoc Laser networks architecture. Low speed control network with high speed load network of Microwave-Laser communication mode, no mesh network mode, to improve the flexibility of the network. Ad hoc Laser networks component technology was developed, and carried out the related performance testing and experiment. The results showed that ad hoc Laser networks components can meet the demand of future networking between the module of spacecraft.

  2. The effects of malicious nodes on performance of mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Li, Fanzhi; Shi, Xiyu; Jassim, Sabah; Adams, Christopher

    2006-05-01

    Wireless ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to security attacks. Unlike their wired counterpart, infrastructureless ad hoc networks do not have a clear line of defense, their topology is dynamically changing, and every mobile node can receive messages from its neighbors and can be contacted by all other nodes in its neighborhood. This poses a great danger to network security if some nodes behave in a malicious manner. The immediate concern about the security in this type of networks is how to protect the network and the individual mobile nodes against malicious act of rogue nodes from within the network. This paper is concerned with security aspects of wireless ad hoc networks. We shall present results of simulation experiments on ad hoc network's performance in the presence of malicious nodes. We shall investigate two types of attacks and the consequences will be simulated and quantified in terms of loss of packets and other factors. The results show that network performance, in terms of successful packet delivery ratios, significantly deteriorates when malicious nodes act according to the defined misbehaving characteristics.

  3. Hybrid Packet-Pheromone-Based Probabilistic Routing for Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Kashkouli Nejad, Keyvan; Shawish, Ahmed; Jiang, Xiaohong; Horiguchi, Susumu

    Ad-Hoc networks are collections of mobile nodes communicating using wireless media without any fixed infrastructure. Minimal configuration and quick deployment make Ad-Hoc networks suitable for emergency situations like natural disasters or military conflicts. The current Ad-Hoc networks can only support either high mobility or high transmission rate at a time because they employ static approaches in their routing schemes. However, due to the continuous expansion of the Ad-Hoc network size, node-mobility and transmission rate, the development of new adaptive and dynamic routing schemes has become crucial. In this paper we propose a new routing scheme to support high transmission rates and high node-mobility simultaneously in a big Ad-Hoc network, by combining a new proposed packet-pheromone-based approach with the Hint Based Probabilistic Protocol (HBPP) for congestion avoidance with dynamic path selection in packet forwarding process. Because of using the available feedback information, the proposed algorithm does not introduce any additional overhead. The extensive simulation-based analysis conducted in this paper indicates that the proposed algorithm offers small packet-latency and achieves a significantly higher delivery probability in comparison with the available Hint-Based Probabilistic Protocol (HBPP).

  4. Nurse managers' decision-making in daily unit operation in peri-operative settings: a cross-sectional descriptive study.

    PubMed

    Siirala, Eriikka; Peltonen, Laura-Maria; Lundgrén-Laine, Heljä; Salanterä, Sanna; Junttila, Kristiina

    2016-09-01

    To describe the tactical and the operational decisions made by nurse managers when managing the daily unit operation in peri-operative settings. Management is challenging as situations change rapidly and decisions are constantly made. Understanding decision-making in this complex environment helps to develop decision support systems to support nurse managers' operative and tactical decision-making. Descriptive cross-sectional design. Data were collected from 20 nurse managers with the think-aloud method during the busiest working hours and analysed using thematic content analysis. Nurse managers made over 700 decisions; either ad hoc (n = 289), near future (n = 268) or long-term (n = 187) by nature. Decisions were often made simultaneously with many interruptions. Ad hoc decisions covered staff allocation, ensuring adequate staff, rescheduling surgical procedures, confirmation tangible resources and following-up the daily unit operation. Decisions in the near future were: planning of surgical procedures and tangible resources, and planning staff allocation. Long-term decisions were: human recourses, nursing development, supplies and equipment, and finances in the unit. Decision-making was vulnerable to interruptions, which sometimes complicated the managing tasks. The results can be used when planning decision support systems and when defining the nurse managers' tasks in peri-operative settings. © 2016 John Wiley & Sons Ltd.

  5. Interference Drop Scheme: Enhancing QoS Provision in Multi-Hop Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Luo, Chang-Yi; Komuro, Nobuyoshi; Takahashi, Kiyoshi; Kasai, Hiroyuki; Ueda, Hiromi; Tsuboi, Toshinori

    Ad hoc networking uses wireless technologies to construct networks with no physical infrastructure and so are expected to provide instant networking in areas such as disaster recovery sites and inter-vehicle communication. Unlike conventional wired networks services, services in ad hoc networks are easily disrupted by the frequent changes in traffic and topology. Therefore, solutions to assure the Quality of Services (QoS) in ad hoc networks are different from the conventional ones used in wired networks. In this paper, we propose a new queue management scheme, Interference Drop Scheme (IDS) for ad hoc networks. In the conventional queue management approaches such as FIFO (First-in First-out) and RED (Random Early Detection), a queue is usually managed by a queue length limit. FIFO discards packets according to the queue limit, and RED discards packets in an early and random fashion. IDS, on the other hand, manages the queue according to wireless interference time, which increases as the number of contentions in the MAC layer increases. When there are many MAC contentions, IDS discards TCP data packets. By observing the interference time and discarding TCP data packets, our simulation results show that IDS improves TCP performance and reduces QoS violations in UDP in ad hoc networks with chain, grid, and random topologies. Our simulation results also demonstrate that wireless interference time is a better metric than queue length limit for queue management in multi-hop ad hoc networks.

  6. An Energy-Efficient and Robust Multipath Routing Protocol for Cognitive Radio Ad Hoc Networks.

    PubMed

    Singh, Kishor; Moh, Sangman

    2017-09-04

    Routing in cognitive radio ad hoc networks (CRAHNs) is a daunting task owing to dynamic topology, intermittent connectivity, spectrum heterogeneity, and energy constraints. Other prominent aspects such as channel stability, path reliability, and route discovery frequency should also be exploited. Several routing protocols have been proposed for CRAHNs in the literature. By stressing on one of the aspects more than any other, however, they do not satisfy all requirements of throughput, energy efficiency, and robustness. In this paper, we propose an energy-efficient and robust multipath routing (ERMR) protocol for CRAHNs by considering all prominent aspects including residual energy and channel stability in design. Even when the current routing path fails, the alternative routing path is immediately utilized. In establishing primary and alternative routing paths, both residual energy and channel stability are exploited simultaneously. Our simulation study shows that the proposed ERMR outperforms the conventional protocol in terms of network throughput, packet delivery ratio, energy consumption, and end-to-end delay.

  7. An Energy-Efficient and Robust Multipath Routing Protocol for Cognitive Radio Ad Hoc Networks

    PubMed Central

    Singh, Kishor

    2017-01-01

    Routing in cognitive radio ad hoc networks (CRAHNs) is a daunting task owing to dynamic topology, intermittent connectivity, spectrum heterogeneity, and energy constraints. Other prominent aspects such as channel stability, path reliability, and route discovery frequency should also be exploited. Several routing protocols have been proposed for CRAHNs in the literature. By stressing on one of the aspects more than any other, however, they do not satisfy all requirements of throughput, energy efficiency, and robustness. In this paper, we propose an energy-efficient and robust multipath routing (ERMR) protocol for CRAHNs by considering all prominent aspects including residual energy and channel stability in design. Even when the current routing path fails, the alternative routing path is immediately utilized. In establishing primary and alternative routing paths, both residual energy and channel stability are exploited simultaneously. Our simulation study shows that the proposed ERMR outperforms the conventional protocol in terms of network throughput, packet delivery ratio, energy consumption, and end-to-end delay. PMID:28869551

  8. Mobile Security Enclaves

    DTIC Science & Technology

    2011-09-01

    LAI Location Area Identity MANET Mobile Ad - hoc Network MCC Mobile Country Code MCD Mobile Communications Device MNC Mobile Network Code ...tower or present within a geographical area. These conditions relate directly to users who often operate with mobile ad - hoc networks. These types of...infrastructures. First responders can use these mobile base stations to set up their own networks on the fly, similar to mobile ad - hoc networks

  9. Joint Experimentation on Scalable Parallel Processors (JESPP)

    DTIC Science & Technology

    2006-04-01

    made use of local embedded relational databases, implemented using sqlite on each node of an SPP to execute queries and return results via an ad hoc ...rl.af.mil 12a. DISTRIBUTION / AVAILABILITY STATEENT APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. 12b. DISTRIBUTION CODE 13. ABSTRACT...Experimentation Directorate (J9) required expansion of its joint semi-automated forces (JSAF) code capabilities; including number of entities, behavior complexity

  10. Constraint Optimization Literature Review

    DTIC Science & Technology

    2015-11-01

    COPs. 15. SUBJECT TERMS high-performance computing, mobile ad hoc network, optimization, constraint, satisfaction 16. SECURITY CLASSIFICATION OF: 17...Optimization Problems 1 2.1 Constraint Satisfaction Problems 1 2.2 Constraint Optimization Problems 3 3. Constraint Optimization Algorithms 9 3.1...Constraint Satisfaction Algorithms 9 3.1.1 Brute-Force search 9 3.1.2 Constraint Propagation 10 3.1.3 Depth-First Search 13 3.1.4 Local Search 18

  11. Software Acquisition Patterns of Failure and How to Recognize Them

    DTIC Science & Technology

    2013-04-01

    Acquisition Processes Danielle Worger and Teresa Wu, Arizona State University Eugene Rex Jalao, Arizona State University and University of the Philippines...Robert Wirthlin Air Force Institute of Technology The RITE Approach to Agile Acquisition Timothy Boyce, Iva Sherman, and Nicholas Roussel Space...the Joint Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a Mechanism for Adaptive Change Kathryn Aten and John T . Dillard

  12. Choosing Wisely: The Top-5 Recommendations from the Italian Panel of the National Guidelines for the Management of Acute Pharyngitis in Children.

    PubMed

    Chiappini, Elena; Bortone, Barbara; Di Mauro, Giuseppe; Esposito, Susanna; Galli, Luisa; Landi, Massimo; Novelli, Andrea; Marchisio, Paola; Marseglia, Gian Luigi; Principi, Nicola; de Martino, Maurizio

    2017-03-01

    With the aim to reduce waste in the health care system and avoid risks associated with unnecessary treatment, the Italian Panel of the National Guidelines for the Management of Acute Pharyngitis in Children joined the Choosing Wisely initiative. An ad hoc Choosing Wisely task force was selected to develop a candidate list of items for the top-5 list on pharyngitis medicine. Through a process of literature review and consensus, the final list of 5 items was chosen. Drafted recommendations were formulated and then reviewed by the task force members until a final consensus was reached. The 5 recommendations approved are: blood exams should not be performed; antibiotics should not be administrated unless microbiologic confirmation of streptococcal infection has been carried out; if a throat culture is performed, susceptibility tests on isolates should not be executed; antibiotic course should not be shortened; because penicillin V is not available in Italy, amoxicillin (50 mg/kg/d in 2-3 doses orally) for 10 days is the first choice treatment; and steroids should not be administered for the risk of masking possible underlying severe condition. This top-5 list can be a novel tool to spread the key messages of guidelines and to avoid unnecessary diagnostic procedures, and to promote a rational use of antibiotics in children. Copyright © 2017 Elsevier HS Journals, Inc. All rights reserved.

  13. Packets Distributing Evolutionary Algorithm Based on PSO for Ad Hoc Network

    NASA Astrophysics Data System (ADS)

    Xu, Xiao-Feng

    2018-03-01

    Wireless communication network has such features as limited bandwidth, changeful channel and dynamic topology, etc. Ad hoc network has lots of difficulties in accessing control, bandwidth distribution, resource assign and congestion control. Therefore, a wireless packets distributing Evolutionary algorithm based on PSO (DPSO)for Ad Hoc Network is proposed. Firstly, parameters impact on performance of network are analyzed and researched to obtain network performance effective function. Secondly, the improved PSO Evolutionary Algorithm is used to solve the optimization problem from local to global in the process of network packets distributing. The simulation results show that the algorithm can ensure fairness and timeliness of network transmission, as well as improve ad hoc network resource integrated utilization efficiency.

  14. Current guidelines for the evaluation and management of atopic dermatitis: A comparison of the Joint Task Force Practice Parameter and American Academy of Dermatology guidelines.

    PubMed

    Eichenfield, Lawrence F; Ahluwalia, Jusleen; Waldman, Andrea; Borok, Jenna; Udkoff, Jeremy; Boguniewicz, Mark

    2017-04-01

    Atopic dermatitis (AD) is a chronic pruritic inflammatory disease that commonly presents in the pediatric population. Although definitions and diagnosis of AD have largely been agreed upon, allergists and dermatologists have similar and divergent approaches to the management of AD. This review facilitated integration of the American Academy of Allergy, Asthma & Immunology/American College of Allergy, Asthma & Immunology Joint Task Force 2012 AD Practice Parameter and the 2014 American Academy of Dermatology guidelines to highlight the basic principles of AD management and discuss therapies and management of AD from the distinct perspectives of the allergist and dermatologist. Copyright © 2017 American Academy of Allergy, Asthma & Immunology. Published by Elsevier Inc. All rights reserved.

  15. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks

    PubMed Central

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV. PMID:27258013

  16. CSR: Constrained Selfish Routing in Ad-Hoc Networks

    NASA Astrophysics Data System (ADS)

    Bassem, Christine; Bestavros, Azer

    Routing protocols for ad-hoc networks assume that the nodes forming the network are either under a single authority, or else that they would be altruistically forwarding data for other nodes with no expectation of a return. These assumptions are unrealistic since in ad-hoc networks, nodes are likely to be autonomous and rational (selfish), and thus unwilling to help unless they have an incentive to do so. Providing such incentives is an important aspect that should be considered when designing ad-hoc routing protocols. In this paper, we propose a dynamic, decentralized routing protocol for ad-hoc networks that provides incentives in the form of payments to intermediate nodes used to forward data for others. In our Constrained Selfish Routing (CSR) protocol, game-theoretic approaches are used to calculate payments (incentives) that ensure both the truthfulness of participating nodes and the fairness of the CSR protocol. We show through simulations that CSR is an energy efficient protocol and that it provides lower communication overhead in the best and average cases compared to existing approaches.

  17. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks.

    PubMed

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV.

  18. Analysis of Pervasive Mobile Ad Hoc Routing Protocols

    NASA Astrophysics Data System (ADS)

    Qadri, Nadia N.; Liotta, Antonio

    Mobile ad hoc networks (MANETs) are a fundamental element of pervasive networks and therefore, of pervasive systems that truly support pervasive computing, where user can communicate anywhere, anytime and on-the-fly. In fact, future advances in pervasive computing rely on advancements in mobile communication, which includes both infrastructure-based wireless networks and non-infrastructure-based MANETs. MANETs introduce a new communication paradigm, which does not require a fixed infrastructure - they rely on wireless terminals for routing and transport services. Due to highly dynamic topology, absence of established infrastructure for centralized administration, bandwidth constrained wireless links, and limited resources in MANETs, it is challenging to design an efficient and reliable routing protocol. This chapter reviews the key studies carried out so far on the performance of mobile ad hoc routing protocols. We discuss performance issues and metrics required for the evaluation of ad hoc routing protocols. This leads to a survey of existing work, which captures the performance of ad hoc routing algorithms and their behaviour from different perspectives and highlights avenues for future research.

  19. The impact of brief team communication, leadership and team behavior training on ad hoc team performance in trauma care settings.

    PubMed

    Roberts, Nicole K; Williams, Reed G; Schwind, Cathy J; Sutyak, John A; McDowell, Christopher; Griffen, David; Wall, Jarrod; Sanfey, Hilary; Chestnut, Audra; Meier, Andreas H; Wohltmann, Christopher; Clark, Ted R; Wetter, Nathan

    2014-02-01

    Communication breakdowns and care coordination problems often cause preventable adverse patient care events, which can be especially acute in the trauma setting, in which ad hoc teams have little time for advanced planning. Existing teamwork curricula do not address the particular issues associated with ad hoc emergency teams providing trauma care. Ad hoc trauma teams completed a preinstruction simulated trauma encounter and were provided with instruction on appropriate team behaviors and team communication. Teams completed a postinstruction simulated trauma encounter immediately afterward and 3 weeks later, then completed a questionnaire. Blinded raters rated videotapes of the simulations. Participants expressed high levels of satisfaction and intent to change practice after the intervention. Participants changed teamwork and communication behavior on the posttest, and changes were sustained after a 3-week interval, though there was some loss of retention. Brief training exercises can change teamwork and communication behaviors on ad hoc trauma teams. Copyright © 2014 Elsevier Inc. All rights reserved.

  20. A Family of ACO Routing Protocols for Mobile Ad Hoc Networks.

    PubMed

    Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-Hoon

    2017-05-22

    In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads.

  1. Data Mining of Extremely Large Ad Hoc Data Sets to Produce Inverted Indices

    DTIC Science & Technology

    2016-06-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited DATA MINING OF...COVERED Master’s Thesis 4. TITLE AND SUBTITLE DATA MINING OF EXTREMELY LARGE AD HOC DATA SETS TO PRODUCE INVERTED INDICES 5. FUNDING NUMBERS 6...INTENTIONALLY LEFT BLANK iii Approved for public release; distribution is unlimited DATA MINING OF EXTREMELY LARGE AD HOC DATA SETS TO PRODUCE

  2. Reputation-Based Internet Protocol Security: A Multilayer Security Framework for Mobile Ad Hoc Networks

    DTIC Science & Technology

    2010-09-01

    secure ad-hoc networks of mobile sensors deployed in a hostile environment . These sensors are normally small 86 and resource...Communications Magazine, 51, 2008. 45. Kumar, S.A. “Classification and Review of Security Schemes in Mobile Comput- ing”. Wireless Sensor Network , 2010... Networks ”. Wireless /Mobile Network Security , 2008. 85. Xiao, Y. “Accountability for Wireless LANs, Ad Hoc Networks , and Wireless

  3. Performance Analysis of Hierarchical Group Key Management Integrated with Adaptive Intrusion Detection in Mobile ad hoc Networks

    DTIC Science & Technology

    2016-04-05

    applications in wireless networks such as military battlefields, emergency response, mobile commerce , online gaming, and collaborative work are based on the...www.elsevier.com/locate/peva Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc...Accepted 19 September 2010 Available online 26 September 2010 Keywords: Mobile ad hoc networks Intrusion detection Group communication systems Group

  4. Haptic force-feedback devices for the office computer: performance and musculoskeletal loading issues.

    PubMed

    Dennerlein, J T; Yang, M C

    2001-01-01

    Pointing devices, essential input tools for the graphical user interface (GUI) of desktop computers, require precise motor control and dexterity to use. Haptic force-feedback devices provide the human operator with tactile cues, adding the sense of touch to existing visual and auditory interfaces. However, the performance enhancements, comfort, and possible musculoskeletal loading of using a force-feedback device in an office environment are unknown. Hypothesizing that the time to perform a task and the self-reported pain and discomfort of the task improve with the addition of force feedback, 26 people ranging in age from 22 to 44 years performed a point-and-click task 540 times with and without an attractive force field surrounding the desired target. The point-and-click movements were approximately 25% faster with the addition of force feedback (paired t-tests, p < 0.001). Perceived user discomfort and pain, as measured through a questionnaire, were also smaller with the addition of force feedback (p < 0.001). However, this difference decreased as additional distracting force fields were added to the task environment, simulating a more realistic work situation. These results suggest that for a given task, use of a force-feedback device improves performance, and potentially reduces musculoskeletal loading during mouse use. Actual or potential applications of this research include human-computer interface design, specifically that of the pointing device extensively used for the graphical user interface.

  5. Query-Structure Based Web Page Indexing

    DTIC Science & Technology

    2012-11-01

    the massive amount of data present on the web. In our third participation in the web track at TREC 2012, we explore the idea of building an...the ad-hoc and diversity task. 1 INTRODUCTION The rapid growth and massive quantities of data on the Internet have increased the importance and...complexity of information retrieval systems. The amount and the diversity of the web data introduce shortcomings in the way search engines rank their

  6. Getting What You Want: Accurate Document Filtering in a Terabyte World

    DTIC Science & Technology

    2002-11-01

    models are used widely in speech recognition and have shown promise for ad-hoc information retrieval (Ponte and Croft, 1998; Lafferty and Zhai, 2001...tasks is focused on developing techniques similar to those used in speech recognition. However the differing requirements of speech recognition and...Conference on Research and Development in Information Retrieval. ACM. 6. T.Ault, and Y. Yang. (2001.) kNN at TREC-9: A failure analysis. In

  7. A Decentralized VPN Service over Generalized Mobile Ad-Hoc Networks

    NASA Astrophysics Data System (ADS)

    Fujita, Sho; Shima, Keiichi; Uo, Yojiro; Esaki, Hiroshi

    We present a decentralized VPN service that can be built over generalized mobile ad-hoc networks (Generalized MANETs), in which topologies can be represented as a time-varying directed multigraph. We address wireless ad-hoc networks and overlay ad-hoc networks as instances of Generalized MANETs. We first propose an architecture to operate on various kinds of networks through a single set of operations. Then, we design and implement a decentralized VPN service on the proposed architecture. Through the development and operation of a prototype system we implemented, we found that the proposed architecture makes the VPN service applicable to each instance of Generalized MANETs, and that the VPN service makes it possible for unmodified applications to operate on the networks.

  8. A closed-form trim solution yielding minimum trim drag for airplanes with multiple longitudinal-control effectors

    NASA Technical Reports Server (NTRS)

    Goodrich, Kenneth H.; Sliwa, Steven M.; Lallman, Frederick J.

    1989-01-01

    Airplane designs are currently being proposed with a multitude of lifting and control devices. Because of the redundancy in ways to generate moments and forces, there are a variety of strategies for trimming each airplane. A linear optimum trim solution (LOTS) is derived using a Lagrange formulation. LOTS enables the rapid calculation of the longitudinal load distribution resulting in the minimum trim drag in level, steady-state flight for airplanes with a mixture of three or more aerodynamic surfaces and propulsive control effectors. Comparisons of the trim drags obtained using LOTS, a direct constrained optimization method, and several ad hoc methods are presented for vortex-lattice representations of a three-surface airplane and two-surface airplane with thrust vectoring. These comparisons show that LOTS accurately predicts the results obtained from the nonlinear optimization and that the optimum methods result in trim drag reductions of up to 80 percent compared to the ad hoc methods.

  9. High Throughput via Cross-Layer Interference Alignment for Mobile Ad Hoc Networks

    DTIC Science & Technology

    2013-08-26

    MIMO zero-forcing receiver in the presence of channel estimation error,” IEEE Transactions on Wireless Communications , vol. 6 , no. 3, pp. 805–810, Mar...Robert W. Heath, Nachiappan Valliappan. Antenna Subset Modulation for Secure Millimeter-Wave Wireless Communication , IEEE Transactions on...in MIMO Interference Alignment Networks, IEEE Transactions on Wireless Communications , (02 2012): 0. doi: 10.1109/TWC.2011.120511.111088 TOTAL: 2

  10. Protein Folding Simulations Combining Self-Guided Langevin Dynamics and Temperature-Based Replica Exchange

    DTIC Science & Technology

    2010-01-01

    formulations of molecular dynamics (MD) and Langevin dynamics (LD) simulations for the prediction of thermodynamic folding observables of the Trp-cage...ad hoc force term in the SGLD model. Introduction Molecular dynamics (MD) simulations of small proteins provide insight into the mechanisms and... molecular dynamics (MD) and Langevin dynamics (LD) simulations for the prediction of thermodynamic folding observables of the Trp-cage mini-protein. All

  11. Fewer Mistakes on the First Day: Architectural Strategies and their Impacts on Acquisition Outcomes

    DTIC Science & Technology

    2013-04-01

    Acquisition Processes Danielle Worger and Teresa Wu, Arizona State University Eugene Rex Jalao, Arizona State University and University of the...and J. Robert Wirthlin Air Force Institute of Technology The RITE Approach to Agile Acquisition Timothy Boyce, Iva Sherman, and Nicholas Roussel...of the Joint Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a Mechanism for Adaptive Change Kathryn Aten and John T

  12. Effective Ad-Hoc Committees.

    ERIC Educational Resources Information Center

    Young, David G.

    1983-01-01

    Ad-hoc committees may be symbolic, informational, or action committees. A literature survey indicates such committees' structural components include a suprasystem and three subsystems involving linkages, production, and implementation. Other variables include size, personal factors, and timing. All the factors carry implications about ad-hoc…

  13. 42 CFR 422.2262 - Review and distribution of marketing materials.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... HUMAN SERVICES (CONTINUED) MEDICARE PROGRAM MEDICARE ADVANTAGE PROGRAM Medicare Advantage Marketing... model materials. (d) Ad hoc enrollee communication materials. Ad hoc enrollee communication materials...

  14. Defense Acquisition and the Case of the Joint Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a Mechanism for Adaptive Change

    DTIC Science & Technology

    2013-04-01

    Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a Mechanism for Adaptive Change Kathryn Aten and John T. Dillard Naval...Defense Acquisition and the Case of the Joint Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a Mechanism for Adaptive Change...describes the preliminary analysis and findings of our study exploring what drives successful organizational adaptation in the context of technology

  15. Defense Acquisition and the Case of the Joint Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a Mechanism for Adaptive Change

    DTIC Science & Technology

    2013-10-01

    pmlkploba=obmloq=pbofbp= Defense Acquisition and the Case of the Joint Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a...of the Joint Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a Mechanism for Adaptive Change 5a. CONTRACT NUMBER 5b. GRANT...findings of our study exploring what drives successful organizational adaptation in the context of technology transition and acquisition within the

  16. 42 CFR 423.2262 - Review and distribution of marketing materials.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... HUMAN SERVICES (CONTINUED) MEDICARE PROGRAM VOLUNTARY MEDICARE PRESCRIPTION DRUG BENEFIT Part D...) Ad hoc enrollee communication materials. Ad hoc enrollee communication materials may be reviewed by...

  17. A fault-tolerant small world topology control model in ad hoc networks for search and rescue

    NASA Astrophysics Data System (ADS)

    Tan, Mian; Fang, Ling; Wu, Yue; Zhang, Bo; Chang, Bowen; Holme, Petter; Zhao, Jing

    2018-02-01

    Due to their self-organized, multi-hop and distributed characteristics, ad hoc networks are useful in search and rescue. Topology control models need to be designed for energy-efficient, robust and fast communication in ad hoc networks. This paper proposes a topology control model which specializes for search and rescue-Compensation Small World-Repeated Game (CSWRG)-which integrates mobility models, constructing small world networks and a game-theoretic approach to the allocation of resources. Simulation results show that our mobility models can enhance the communication performance of the constructed small-world networks. Our strategy, based on repeated game, can suppress selfish behavior and compensate agents that encounter selfish or faulty neighbors. This model could be useful for the design of ad hoc communication networks.

  18. Intelligent Sensing and Classification in DSR-Based Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Dempsey, Tae; Sahin, Gokhan; Morton, Yu T. (Jade

    Wireless ad hoc networks have fundamentally altered today's battlefield, with applications ranging from unmanned air vehicles to randomly deployed sensor networks. Security and vulnerabilities in wireless ad hoc networks have been considered at different layers, and many attack strategies have been proposed, including denial of service (DoS) through the intelligent jamming of the most critical packet types of flows in a network. This paper investigates the effectiveness of intelligent jamming in wireless ad hoc networks using the Dynamic Source Routing (DSR) and TCP protocols and introduces an intelligent classifier to facilitate the jamming of such networks. Assuming encrypted packet headers and contents, our classifier is based solely on the observable characteristics of size, inter-arrival timing, and direction and classifies packets with up to 99.4% accuracy in our experiments.

  19. CNIPA, FUB and University of Rome Tor Vergata at TREC 2008 Legal Track

    DTIC Science & Technology

    2008-11-01

    We have only taken part in the automatic ad hoc task of the TREC Legal track 2008, and focused on the following issues: 1. Indexing. The CDIP test...Document Information Processing ( CDIP ) test collection is based on a snapshot of the Tobacco Master Settlement Agreement (MSA) sub-collection of the...unclassified b. ABSTRACT unclassified c. THIS PAGE unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 The CDIP collection

  20. Commission 5: Documentation and Astronomical Data

    NASA Astrophysics Data System (ADS)

    Norris, Raymond P.; Ohishi, Masatoshi; Genova, Françoise; Grothkopf, Uta; Malkov, Oleg Yu.; Pence, William D.; Schmitz, Marion; Hanisch, Robert J.; Zhou, Xu

    IAU Commission 5 deals with data management issues, and its working groups and task groups deal specifically with information handling, with data centres and networks, with technical aspects of collection, archiving, storage and dissemination of data, with designations and classification of astronomical objects, with library services, editorial policies, computer communications, ad hoc methodologies, and with various standards, reference frames, etc., FITS, astronomys Flexible Image Transport System, the major data exchange format, is controlled, maintained and updated by the Working Group FITS.

  1. Error-enhancing robot therapy to induce motor control improvement in childhood onset primary dystonia.

    PubMed

    Casellato, Claudia; Pedrocchi, Alessandra; Zorzi, Giovanna; Rizzi, Giorgio; Ferrigno, Giancarlo; Nardocci, Nardo

    2012-07-23

    Robot-generated deviating forces during multijoint reaching movements have been applied to investigate motor control and to tune neuromotor adaptation. Can the application of force to limbs improve motor learning? In this framework, the response to altered dynamic environments of children affected by primary dystonia has never been studied. As preliminary pilot study, eleven children with primary dystonia and eleven age-matched healthy control subjects were asked to perform upper limb movements, triangle-reaching (three directions) and circle-writing, using a haptic robot interacting with ad-hoc developed task-specific visual interfaces. Three dynamic conditions were provided, null additive external force (A), constant disturbing force (B) and deactivation of the additive external force again (C). The path length for each trial was computed, from the recorded position data and interaction events. The results show that the disturbing force affects significantly the movement outcomes in healthy but not in dystonic subjects, already compromised in the reference condition: the external alteration uncalibrates the healthy sensorimotor system, while the dystonic one is already strongly uncalibrated. The lack of systematic compensation for perturbation effects during B condition is reflected into the absence of after-effects in C condition, which would be the evidence that CNS generates a prediction of the perturbing forces using an internal model of the environment.The most promising finding is that in dystonic population the altered dynamic exposure seems to induce a subsequent improvement, i.e. a beneficial after-effect in terms of optimal path control, compared with the correspondent reference movement outcome. The short-time error-enhancing training in dystonia could represent an effective approach for motor performance improvement, since the exposure to controlled dynamic alterations induces a refining of the existing but strongly imprecise motor scheme and sensorimotor patterns.

  2. Error-enhancing robot therapy to induce motor control improvement in childhood onset primary dystonia

    PubMed Central

    2012-01-01

    Background Robot-generated deviating forces during multijoint reaching movements have been applied to investigate motor control and to tune neuromotor adaptation. Can the application of force to limbs improve motor learning? In this framework, the response to altered dynamic environments of children affected by primary dystonia has never been studied. Methods As preliminary pilot study, eleven children with primary dystonia and eleven age-matched healthy control subjects were asked to perform upper limb movements, triangle-reaching (three directions) and circle-writing, using a haptic robot interacting with ad-hoc developed task-specific visual interfaces. Three dynamic conditions were provided, null additive external force (A), constant disturbing force (B) and deactivation of the additive external force again (C). The path length for each trial was computed, from the recorded position data and interaction events. Results The results show that the disturbing force affects significantly the movement outcomes in healthy but not in dystonic subjects, already compromised in the reference condition: the external alteration uncalibrates the healthy sensorimotor system, while the dystonic one is already strongly uncalibrated. The lack of systematic compensation for perturbation effects during B condition is reflected into the absence of after-effects in C condition, which would be the evidence that CNS generates a prediction of the perturbing forces using an internal model of the environment. The most promising finding is that in dystonic population the altered dynamic exposure seems to induce a subsequent improvement, i.e. a beneficial after-effect in terms of optimal path control, compared with the correspondent reference movement outcome. Conclusions The short-time error-enhancing training in dystonia could represent an effective approach for motor performance improvement, since the exposure to controlled dynamic alterations induces a refining of the existing but strongly imprecise motor scheme and sensorimotor patterns. PMID:22824547

  3. Making great leaps forward: Accounting for detectability in herpetological field studies

    USGS Publications Warehouse

    Mazerolle, Marc J.; Bailey, Larissa L.; Kendall, William L.; Royle, J. Andrew; Converse, Sarah J.; Nichols, James D.

    2007-01-01

    Detecting individuals of amphibian and reptile species can be a daunting task. Detection can be hindered by various factors such as cryptic behavior, color patterns, or observer experience. These factors complicate the estimation of state variables of interest (e.g., abundance, occupancy, species richness) as well as the vital rates that induce changes in these state variables (e.g., survival probabilities for abundance; extinction probabilities for occupancy). Although ad hoc methods (e.g., counts uncorrected for detection, return rates) typically perform poorly in the face of no detection, they continue to be used extensively in various fields, including herpetology. However, formal approaches that estimate and account for the probability of detection, such as capture-mark-recapture (CMR) methods and distance sampling, are available. In this paper, we present classical approaches and recent advances in methods accounting for detectability that are particularly pertinent for herpetological data sets. Through examples, we illustrate the use of several methods, discuss their performance compared to that of ad hoc methods, and we suggest available software to perform these analyses. The methods we discuss control for imperfect detection and reduce bias in estimates of demographic parameters such as population size, survival, or, at other levels of biological organization, species occurrence. Among these methods, recently developed approaches that no longer require marked or resighted individuals should be particularly of interest to field herpetologists. We hope that our effort will encourage practitioners to implement some of the estimation methods presented herein instead of relying on ad hoc methods that make more limiting assumptions.

  4. On using multiple routing metrics with destination sequenced distance vector protocol for MultiHop wireless ad hoc networks

    NASA Astrophysics Data System (ADS)

    Mehic, M.; Fazio, P.; Voznak, M.; Partila, P.; Komosny, D.; Tovarek, J.; Chmelikova, Z.

    2016-05-01

    A mobile ad hoc network is a collection of mobile nodes which communicate without a fixed backbone or centralized infrastructure. Due to the frequent mobility of nodes, routes connecting two distant nodes may change. Therefore, it is not possible to establish a priori fixed paths for message delivery through the network. Because of its importance, routing is the most studied problem in mobile ad hoc networks. In addition, if the Quality of Service (QoS) is demanded, one must guarantee the QoS not only over a single hop but over an entire wireless multi-hop path which may not be a trivial task. In turns, this requires the propagation of QoS information within the network. The key to the support of QoS reporting is QoS routing, which provides path QoS information at each source. To support QoS for real-time traffic one needs to know not only minimum delay on the path to the destination but also the bandwidth available on it. Therefore, throughput, end-to-end delay, and routing overhead are traditional performance metrics used to evaluate the performance of routing protocol. To obtain additional information about the link, most of quality-link metrics are based on calculation of the lost probabilities of links by broadcasting probe packets. In this paper, we address the problem of including multiple routing metrics in existing routing packets that are broadcasted through the network. We evaluate the efficiency of such approach with modified version of DSDV routing protocols in ns-3 simulator.

  5. History of the Standing Joint Force Headquarters for Elimination (SJFHQ-E): No More Ad Hoc

    DTIC Science & Technology

    2014-05-22

    on Max Weber’s organizational hierarchy or did it follow historical examples and Joint doctrine as exampled by Anthony Giddens’ structuration theory...way they do and how agency influences that formation. Max Weber’s theory of ideal bureaucracy defined how an organization could enable employees to...act rationally, serving their clients with impartiality and more efficiently. 35 According to Weber , “ bureaucracy must consist of neutral

  6. A Stitch in Time Saves Nine: A Comprehensive Conflict Prevention Strategy

    DTIC Science & Technology

    2010-04-02

    prevention plan, has led to ad-hoc conflict prevention. 1 Charles F. Wald , "The Phase Zero Campaign," JFQ: Joint Force Quarterly, no. 43 (10...14. 24 Joint Chiefs of Staff, Joint Operations, 2008), IV 27-28. 25 Wald , The Phase Zero Campaign, 73. 26 Ibid., 73. 27 secure...Unconventional Threats and Capabilities. Testimony of Michael Lund and Dr. Lisa Schrich on the Roles of Non-Military Programs within a Comprehensive

  7. Exploiting Task Constraints for Self-Calibrated Brain-Machine Interface Control Using Error-Related Potentials

    PubMed Central

    Iturrate, Iñaki; Grizou, Jonathan; Omedes, Jason; Oudeyer, Pierre-Yves; Lopes, Manuel; Montesano, Luis

    2015-01-01

    This paper presents a new approach for self-calibration BCI for reaching tasks using error-related potentials. The proposed method exploits task constraints to simultaneously calibrate the decoder and control the device, by using a robust likelihood function and an ad-hoc planner to cope with the large uncertainty resulting from the unknown task and decoder. The method has been evaluated in closed-loop online experiments with 8 users using a previously proposed BCI protocol for reaching tasks over a grid. The results show that it is possible to have a usable BCI control from the beginning of the experiment without any prior calibration. Furthermore, comparisons with simulations and previous results obtained using standard calibration hint that both the quality of recorded signals and the performance of the system were comparable to those obtained with a standard calibration approach. PMID:26131890

  8. 75 FR 20984 - Mid-Atlantic Fishery Management Council (MAFMC); Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-22

    ... Mid-Atlantic Fishery Management Council's (MAFMC) Ad Hoc Search Committee will hold a closed meeting... Executive Director. The Ad Hoc Search Committee will interview candidates for this position so as to...

  9. 78 FR 5190 - National Cancer Institute; Notice of Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-24

    ... Advisory Committee; Ad hoc Clinical Trials and Strategic Planning Subcommittee. Date: February 25, 2013... Group of the Ad hoc Clinical Trials Strategic Planning Subcommittee. Dial in number: 1-866-652-9542 and...

  10. 29 CFR 1912.11 - Terms of ad hoc committee members.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 7 2011-07-01 2011-07-01 false Terms of ad hoc committee members. 1912.11 Section 1912.11 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR (CONTINUED) ADVISORY COMMITTEES ON STANDARDS Organizational Matters § 1912.11 Terms of ad...

  11. 29 CFR 1912.11 - Terms of ad hoc committee members.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 7 2010-07-01 2010-07-01 false Terms of ad hoc committee members. 1912.11 Section 1912.11 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR (CONTINUED) ADVISORY COMMITTEES ON STANDARDS Organizational Matters § 1912.11 Terms of ad...

  12. Cutting Corners: Provider Perceptions of Interpretation Services and Factors Related to Use of an Ad Hoc Interpreter.

    PubMed

    Mayo, Rachel; Parker, Veronica G; Sherrill, Windsor W; Coltman, Kinneil; Hudson, Matthew F; Nichols, Christina M; Yates, Adam M; Pribonic, Anne Paige

    2016-06-01

    This study assessed health providers' perceptions of factors related to professional interpretation services and the association between these factors and the potential use of ad hoc interpreters. Data were collected from a convenience sample of 150 health services providers at a large, regional health system in South Carolina. Providers rated "ability to communicate effectively during a clinical encounter" as paramount regarding the use of interpretation services. The most important factors related to the likely use of ad hoc interpreters (cutting corners) included locating a qualified interpreter, having to wait for a qualified interpreter, and technical difficulties regarding phone and video technology. Health care organizations may benefit from increasing staff awareness about patient safety and legal and regulatory risks involved with the use of ad hoc interpreters. © The Author(s) 2016.

  13. Impact of network structure on the capacity of wireless multihop ad hoc communication

    NASA Astrophysics Data System (ADS)

    Krause, Wolfram; Glauche, Ingmar; Sollacher, Rudolf; Greiner, Martin

    2004-07-01

    As a representative of a complex technological system, the so-called wireless multihop ad hoc communication networks are discussed. They represent an infrastructure-less generalization of todays wireless cellular phone networks. Lacking a central control authority, the ad hoc nodes have to coordinate themselves such that the overall network performs in an optimal way. A performance indicator is the end-to-end throughput capacity. Various models, generating differing ad hoc network structure via differing transmission power assignments, are constructed and characterized. They serve as input for a generic data traffic simulation as well as some semi-analytic estimations. The latter reveal that due to the most-critical-node effect the end-to-end throughput capacity sensitively depends on the underlying network structure, resulting in differing scaling laws with respect to network size.

  14. Assessing Clinical Microbiology Practice Guidelines: American Society for Microbiology Ad Hoc Committee on Evidence-Based Laboratory Medicine Practice Guidelines Assessment

    PubMed Central

    Kirn, Thomas J.; Westblade, Lars F.; Humphries, Romney

    2017-01-01

    ABSTRACT As part of the American Society for Microbiology (ASM) Evidence-Based Laboratory Medicine Practice Guidelines Committee of the Professional Practice Committee, an ad hoc committee was formed in 2014 to assess guidelines published by the committee using an assessment tool, Appraisal of Guidelines for Research Evaluation II (AGREE II). The AGREE II assessment helps reviewers determine whether published guidelines are robust, transparent, and clear in presenting practice recommendations in a standardized manner. Identifying strengths and weaknesses of practice guidelines by ad hoc assessments helps with improving future guidelines through the participation of key stakeholders. This minireview describes the development of the ad hoc committee and results from their review of several ASM best practices guidelines and a non-ASM practice guideline from the Emergency Nurses Association. PMID:28835476

  15. COMPARISON OF LAPAROSCOPIC SKILLS PERFORMANCE USING SINGLE-SITE ACCESS (SSA) DEVICES VS. AN INDEPENDENT-PORT SSA APPROACH

    PubMed Central

    Schill, Matthew R.; Varela, J. Esteban; Frisella, Margaret M.; Brunt, L. Michael

    2015-01-01

    Background We compared performance of validated laparoscopic tasks on four commercially available single site access (SSA) access devices (AD) versus an independent port (IP) SSA set-up. Methods A prospective, randomized comparison of laparoscopic skills performance on four AD (GelPOINT™, SILS™ Port, SSL Access System™, TriPort™) and one IP SSA set-up was conducted. Eighteen medical students (2nd–4th year), four surgical residents, and five attending surgeons were trained to proficiency in multi-port laparoscopy using four laparoscopic drills (peg transfer, bean drop, pattern cutting, extracorporeal suturing) in a laparoscopic trainer box. Drills were then performed in random order on each IP-SSA and AD-SSA set-up using straight laparoscopic instruments. Repetitions were timed and errors recorded. Data are mean ± SD, and statistical analysis was by two-way ANOVA with Tukey HSD post-hoc tests. Results Attending surgeons had significantly faster total task times than residents or students (p< 0.001), but the difference between residents and students was NS. Pair-wise comparisons revealed significantly faster total task times for the IP-SSA set-up compared to all four AD-SSA’s within the student group only (p<0.05). Total task times for residents and attending surgeons showed a similar profile, but the differences were NS. When data for the three groups was combined, the total task time was less for the IP-SSA set-up than for each of the four AD-SSA set-ups (p < 0.001). Similarly,, the IP-SSA set-up was significantly faster than 3 of 4 AD-SSA set-ups for peg transfer, 3 of 4 for pattern cutting, and 2 of 4 for suturing. No significant differences in error rates between IP-SSA and AD-SSA set-ups were detected. Conclusions When compared to an IP-SSA laparoscopic set-up, single site access devices are associated with longer task performance times in a trainer box model, independent of level of training. Task performance was similar across different SSA devices. PMID:21993938

  16. A Family of ACO Routing Protocols for Mobile Ad Hoc Networks

    PubMed Central

    Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-hoon

    2017-01-01

    In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads. PMID:28531159

  17. Black-on-black homicide: Kansas City's response.

    PubMed Central

    Mitchell, M A; Daniels, S

    1989-01-01

    In many metropolitan areas, homicide continues to be the scourge of black Americans despite increasing awareness of the overrepresentation of blacks among victims and perpetrators. The risk of being a homicide victim among black males is so high that the Department of Health and Human Services has set a priority of reducing the risk to 60 per 100,000 by 1990. The recent escalation in the number of homicides in the United States associated with drugs makes attainment of that goal unlikely. In Kansas City, a black community grassroots organization, the Ad Hoc Group Against Crime, commissioned a multidisciplinary task force to study black-on-black homicide in 1986. The report generated by this task force identified factors placing Kansas Citians at high risk of being homicide victims or perpetrators, including being black, male, unemployed, between the ages 17-29, a high school nongraduate, frequently involved in or around violence, and having prior arrests on weapons charges. One hundred recommendations were made, of which 12 were targeted for immediate implementation. These included increasing public awareness of the incidence of black-on-black homicide, involvement of black men in role model programs for young black males, training in anger control and alternatives to violence for those identified as being at high risk for homicide, and providing a role for ex-offenders in violence prevention. Working with community organizations has inherent strengths and weaknesses for public health workers. However, such a group can successfully impact the affected community in ways which would be difficult for traditional resources. PMID:2511593

  18. On Alarm Protocol in Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Cichoń, Jacek; Kapelko, Rafał; Lemiesz, Jakub; Zawada, Marcin

    We consider the problem of efficient alarm protocol for ad-hoc radio networks consisting of devices that try to gain access for transmission through a shared radio communication channel. The problem arise in tasks that sensors have to quickly inform the target user about an alert situation such as presence of fire, dangerous radiation, seismic vibrations, and more. In this paper, we present a protocol which uses O(logn) time slots and show that Ω(logn/loglogn) is a lower bound for used time slots.

  19. Perspective: Semantic Data Management for the Home

    DTIC Science & Technology

    2008-05-01

    8 the more flexible policies found in many management tasks must be made in an ad - hoc fashion at the application level, leading to a loss of user...this mismatch as a significant source of disorganization: Aaron: “I’m very conscious about the way I name things; I have a coding system. But the...thing is, that doesn’t work if you have everything spread out. The coding system makes sense when there’s a lot of other things around, but not when it’s

  20. Spontaneous Group Learning in Ambient Learning Environments

    NASA Astrophysics Data System (ADS)

    Bick, Markus; Jughardt, Achim; Pawlowski, Jan M.; Veith, Patrick

    Spontaneous Group Learning is a concept to form and facilitate face-to-face, ad-hoc learning groups in collaborative settings. We show how to use Ambient Intelligence to identify, support, and initiate group processes. Learners' positions are determined by widely used technologies, e.g., Bluetooth and WLAN. As a second step, learners' positions, tasks, and interests are visualized. Finally, a group process is initiated supported by relevant documents and services. Our solution is a starting point to develop new didactical solutions for collaborative processes.

  1. Energy Efficient and QoS sensitive Routing Protocol for Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Saeed Tanoli, Tariq; Khalid Khan, Muhammad

    2013-12-01

    Efficient routing is an important part of wireless ad hoc networks. Since in ad hoc networks we have limited resources, there are many limitations like bandwidth, battery consumption, and processing cycle etc. Reliability is also necessary since there is no allowance for invalid or incomplete information (and expired data is useless). There are various protocols that perform routing by considering one parameter but ignoring other parameters. In this paper we present a protocol that finds route on the basis of bandwidth, energy and mobility of the nodes participating in the communication.

  2. Global Coverage from Ad-Hoc Constellations in Rideshare Orbits

    NASA Technical Reports Server (NTRS)

    Ellis, Armin; Mercury, Michael; Brown, Shannon

    2012-01-01

    A promising area of small satellite development is in providing higher temporal resolution than larger satellites. Traditional constellations have required specific orbits and dedicated launch vehicles. In this paper we discuss an alternative architecture in which the individual elements of the constellation are launched as rideshare opportunities. We compare the coverage of such an ad-hoc constellation with more traditional constellations. Coverage analysis is based on actual historical data from rideshare opportunities. Our analysis includes ground coverage and temporal revisits for Polar, Tropics, Temperate, and Global regions, comparing ad-hoc and Walker constellation.

  3. Task Oriented Evaluation of Module Extraction Techniques

    NASA Astrophysics Data System (ADS)

    Palmisano, Ignazio; Tamma, Valentina; Payne, Terry; Doran, Paul

    Ontology Modularization techniques identify coherent and often reusable regions within an ontology. The ability to identify such modules, thus potentially reducing the size or complexity of an ontology for a given task or set of concepts is increasingly important in the Semantic Web as domain ontologies increase in terms of size, complexity and expressivity. To date, many techniques have been developed, but evaluation of the results of these techniques is sketchy and somewhat ad hoc. Theoretical properties of modularization algorithms have only been studied in a small number of cases. This paper presents an empirical analysis of a number of modularization techniques, and the modules they identify over a number of diverse ontologies, by utilizing objective, task-oriented measures to evaluate the fitness of the modules for a number of statistical classification problems.

  4. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ahn, Gail-Joon

    The project seeks an innovative framework to enable users to access and selectively share resources in distributed environments, enhancing the scalability of information sharing. We have investigated secure sharing & assurance approaches for ad-hoc collaboration, focused on Grids, Clouds, and ad-hoc network environments.

  5. Assessing Clinical Microbiology Practice Guidelines: American Society for Microbiology Ad Hoc Committee on Evidence-Based Laboratory Medicine Practice Guidelines Assessment.

    PubMed

    Nachamkin, Irving; Kirn, Thomas J; Westblade, Lars F; Humphries, Romney

    2017-11-01

    As part of the American Society for Microbiology (ASM) Evidence-Based Laboratory Medicine Practice Guidelines Committee of the Professional Practice Committee, an ad hoc committee was formed in 2014 to assess guidelines published by the committee using an assessment tool, Appraisal of Guidelines for Research Evaluation II (AGREE II). The AGREE II assessment helps reviewers determine whether published guidelines are robust, transparent, and clear in presenting practice recommendations in a standardized manner. Identifying strengths and weaknesses of practice guidelines by ad hoc assessments helps with improving future guidelines through the participation of key stakeholders. This minireview describes the development of the ad hoc committee and results from their review of several ASM best practices guidelines and a non-ASM practice guideline from the Emergency Nurses Association. Copyright © 2017 American Society for Microbiology.

  6. MELOC - Memory and Location Optimized Caching for Mobile Ad Hoc Networks

    DTIC Science & Technology

    2011-01-01

    required for such environments. Moreover, nodes located at centre have to be chosen as cache location, since it reduces the chance of being attacked...Figure 1.1. MANET Formed by Armed Forces 47 Example 3: Sharing of music and videos are famous among mobile users. Instead of downloading...The two tier caching scheme discussed in this paper is acoustic . The characteristics of two-tier caching are as follows, the content of data to be

  7. Joint Force Quarterly. Number 33, Winter 2002-03

    DTIC Science & Technology

    2003-04-01

    by Richard B. Myers 9 A Quiet Revolution: Nuclear Strategy for the 21st Century by James J. Wirtz and James A. Russell 16 Army SOF in Afghanistan...warfighting strategies of attrition or annihilation. The Coalition commander would restrict enemy decisionmaking processes in order to take away options...highlighted the role of precision and ad hoc innovations in the area of time-sensitive targeting Winter 2002–03 / JFQ 5 F/A–18C taking off, Iraqi Freedom

  8. A quantum probability account of order effects in inference.

    PubMed

    Trueblood, Jennifer S; Busemeyer, Jerome R

    2011-01-01

    Order of information plays a crucial role in the process of updating beliefs across time. In fact, the presence of order effects makes a classical or Bayesian approach to inference difficult. As a result, the existing models of inference, such as the belief-adjustment model, merely provide an ad hoc explanation for these effects. We postulate a quantum inference model for order effects based on the axiomatic principles of quantum probability theory. The quantum inference model explains order effects by transforming a state vector with different sequences of operators for different orderings of information. We demonstrate this process by fitting the quantum model to data collected in a medical diagnostic task and a jury decision-making task. To further test the quantum inference model, a new jury decision-making experiment is developed. Using the results of this experiment, we compare the quantum inference model with two versions of the belief-adjustment model, the adding model and the averaging model. We show that both the quantum model and the adding model provide good fits to the data. To distinguish the quantum model from the adding model, we develop a new experiment involving extreme evidence. The results from this new experiment suggest that the adding model faces limitations when accounting for tasks involving extreme evidence, whereas the quantum inference model does not. Ultimately, we argue that the quantum model provides a more coherent account for order effects that was not possible before. Copyright © 2011 Cognitive Science Society, Inc.

  9. Validity of using ad hoc methods to analyze secondary traits in case-control association studies.

    PubMed

    Yung, Godwin; Lin, Xihong

    2016-12-01

    Case-control association studies often collect from their subjects information on secondary phenotypes. Reusing the data and studying the association between genes and secondary phenotypes provide an attractive and cost-effective approach that can lead to discovery of new genetic associations. A number of approaches have been proposed, including simple and computationally efficient ad hoc methods that ignore ascertainment or stratify on case-control status. Justification for these approaches relies on the assumption of no covariates and the correct specification of the primary disease model as a logistic model. Both might not be true in practice, for example, in the presence of population stratification or the primary disease model following a probit model. In this paper, we investigate the validity of ad hoc methods in the presence of covariates and possible disease model misspecification. We show that in taking an ad hoc approach, it may be desirable to include covariates that affect the primary disease in the secondary phenotype model, even though these covariates are not necessarily associated with the secondary phenotype. We also show that when the disease is rare, ad hoc methods can lead to severely biased estimation and inference if the true disease model follows a probit model instead of a logistic model. Our results are justified theoretically and via simulations. Applied to real data analysis of genetic associations with cigarette smoking, ad hoc methods collectively identified as highly significant (P<10-5) single nucleotide polymorphisms from over 10 genes, genes that were identified in previous studies of smoking cessation. © 2016 WILEY PERIODICALS, INC.

  10. Scaling of wet granular flows in a rotating drum

    NASA Astrophysics Data System (ADS)

    Jarray, Ahmed; Magnanimo, Vanessa; Ramaioli, Marco; Luding, Stefan

    2017-06-01

    In this work, we investigate the effect of capillary forces and particle size on wet granular flows and we propose a scaling methodology that ensures the conservation of the bed flow. We validate the scaling law experimentally by using different size glass beads with tunable capillary forces. The latter is obtained using mixtures of ethanol-water as interstitial liquid and by increasing the hydrophobicity of glass beads with an ad-hoc silanization procedure. The scaling methodology in the flow regimes considered (slipping, slumping and rolling) yields similar bed flow for different particle sizes including the angle of repose that normally increases when decreasing the particle size.

  11. Adaptive Control Parameters for Dispersal of Multi-Agent Mobile Ad Hoc Network (MANET) Swarms

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurt Derr; Milos Manic

    A mobile ad hoc network is a collection of independent nodes that communicate wirelessly with one another. This paper investigates nodes that are swarm robots with communications and sensing capabilities. Each robot in the swarm may operate in a distributed and decentralized manner to achieve some goal. This paper presents a novel approach to dynamically adapting control parameters to achieve mesh configuration stability. The presented approach to robot interaction is based on spring force laws (attraction and repulsion laws) to create near-optimal mesh like configurations. In prior work, we presented the extended virtual spring mesh (EVSM) algorithm for the dispersionmore » of robot swarms. This paper extends the EVSM framework by providing the first known study on the effects of adaptive versus static control parameters on robot swarm stability. The EVSM algorithm provides the following novelties: 1) improved performance with adaptive control parameters and 2) accelerated convergence with high formation effectiveness. Simulation results show that 120 robots reach convergence using adaptive control parameters more than twice as fast as with static control parameters in a multiple obstacle environment.« less

  12. The Evolution of General Education Requirements at Prince George's Community College.

    ERIC Educational Resources Information Center

    Barshay, Robert; Cant, Catherine

    In August 1981, a task force was created at Maryland's Prince George's Community College (PGCC) to analyze the college's General Education (GE) requirements in terms of their appropriateness as a major component of Associate Degree (AD) programs. Rather than increase the number of GE requirements, the task force sought to identify the skills,…

  13. 78 FR 47675 - Pacific Fishery Management Council; Public Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-06

    ... Pacific Fishery Management Council's (Pacific Council) Ad Hoc Groundfish Electronic Monitoring Committee and Ad Hoc Trawl Groundfish Electronic Monitoring Technical Advisory Committee (GEM Committees) will... meeting is to discuss and develop potential alternatives for electronic monitoring (EM) for vessels...

  14. Distributed policy based access to networked heterogeneous ISR data sources

    NASA Astrophysics Data System (ADS)

    Bent, G.; Vyvyan, D.; Wood, David; Zerfos, Petros; Calo, Seraphin

    2010-04-01

    Within a coalition environment, ad hoc Communities of Interest (CoI's) come together, perhaps for only a short time, with different sensors, sensor platforms, data fusion elements, and networks to conduct a task (or set of tasks) with different coalition members taking different roles. In such a coalition, each organization will have its own inherent restrictions on how it will interact with the others. These are usually stated as a set of policies, including security and privacy policies. The capability that we want to enable for a coalition operation is to provide access to information from any coalition partner in conformance with the policies of all. One of the challenges in supporting such ad-hoc coalition operations is that of providing efficient access to distributed sources of data, where the applications requiring the data do not have knowledge of the location of the data within the network. To address this challenge the International Technology Alliance (ITA) program has been developing the concept of a Dynamic Distributed Federated Database (DDFD), also know as a Gaian Database. This type of database provides a means for accessing data across a network of distributed heterogeneous data sources where access to the information is controlled by a mixture of local and global policies. We describe how a network of disparate ISR elements can be expressed as a DDFD and how this approach enables sensor and other information sources to be discovered autonomously or semi-autonomously and/or combined, fused formally defined local and global policies.

  15. Efficient routing for safety applications in vehicular networks.

    DOT National Transportation Integrated Search

    2009-03-01

    Vehicular ad hoc networks have received a lot of attention in recent years. This attention is due to two reasons. : First and foremost, there are a number of real-life applications that become possible in the presence of : such an ad-hoc infrastructu...

  16. Ad Hoc Subgroup on Threat of Aids on Operational Deployment of Army Forces to a Theater

    DTIC Science & Technology

    1990-08-01

    chaim ) Alexandier, Dr. Martin Barth, Dr. Delbert S.-(final chaiirman) (cont.) V* PERMOMNG ORGANIZATIN NAMIR AND ADORE-SN ESA. PERFORMING OROANIZAMlO...behavioral change requires a moral as well as a policy commitment from the senior Army leadership to keep soldiers from contracting this deadly illness. (R-29...for consideration by Army leadership . All of these options go beyond current Army policy. Option 1: The Army should immediately place each HIV-infected

  17. Control Based Mobile Ad Hoc Networking for Survivable, Dynamic, Mobile Special Operation Force Communications

    DTIC Science & Technology

    2009-09-01

    The second phase started in March 2008 and ended in July 2009 [40]. By the time this paper is complete, the contractor will be working on final steps... cinematic images we see on our televisions or movie theater screens. Sure, some of it is just as, if not more, thrilling than what we all have come to...ITMANET): Mission.‖ [Online]. Available: http://www.darpa.mil/ipto/programs/itmanet/itmanet.asp. [Accessed: March 5, 2009]. [8] ―ITMANET Solicitation

  18. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks.

    PubMed

    Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J; Pallarès Segarra, Esteve; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Sanvicente Gargallo, Emilio

    2015-04-17

    The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.

  19. Specialist availability in emergencies: contributions of response times and the use of ad hoc coverage in New York State.

    PubMed

    Rabin, Elaine; Patrick, Lisa

    2016-04-01

    Nationwide, hospitals struggle to maintain specialist on-call coverage for emergencies. We seek to further understand the issue by examining reliability of scheduled coverage and the role of ad hoc coverage when none is scheduled. An anonymous electronic survey of all emergency department (ED) directors of a large state. Overall and for 10 specialties, respondents were asked to estimate on-call coverage extent and "reliability" (frequency of emergency response in a clinically useful time frame: 2 hours), and use and effect of ad hoc emergency coverage to fill gaps. Descriptive statistics were performed using Fisher exact and Wilcoxon sign rank tests for significance. Contact information was obtained for 125 of 167 ED directors. Sixty responded (48%), representing 36% of EDs. Forty-six percent reported full on-call coverage scheduled for all specialties. Forty-six percent reported consistent reliability. Coverage and reliability were strongly related (P<.01; 33% reported both), and larger ED volume correlated with both (P<.01). Ninety percent of hospitals that had gaps in either employed ad hoc coverage, significantly improving coverage for 8 of 10 specialties. For all but 1 specialty, more than 20% of hospitals reported that specialists are "Never", "Rarely" or "Sometimes" reliable (more than 50% for cardiovascular surgery, hand surgery and ophthalmology). Significant holes in scheduled on-call specialist coverage are compounded by frequent unreliability of on-call specialists, but partially ameliorated by ad hoc specialist coverage. Regionalization may help because a 2-tiered system may exist: larger hospitals have more complete, reliable coverage. Better understanding of specialists' willingness to treat emergencies ad hoc without taking formal call will suggest additional remedies. Copyright © 2015 Elsevier Inc. All rights reserved.

  20. Analysis of interference performance of tactical radio network

    NASA Astrophysics Data System (ADS)

    Nie, Hao; Cai, Xiaoxia; Chen, Hong

    2017-08-01

    Mobile Ad hoc network has a strong military background for its development as the core technology of the backbone network of US tactical Internet. And which tactical radio network, is the war in today's tactical use of the Internet more mature form of networking, mainly used in brigade and brigade following forces. This paper analyzes the typical protocol AODV in the tactical radio network, and then carries on the networking. By adding the interference device to the whole network, the battlefield environment is simulated, and then the throughput, delay and packet loss rate are analyzed, and the performance of the whole network and the single node before and after the interference is obtained.

  1. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    PubMed Central

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  2. UMDR: Multi-Path Routing Protocol for Underwater Ad Hoc Networks with Directional Antenna

    NASA Astrophysics Data System (ADS)

    Yang, Jianmin; Liu, Songzuo; Liu, Qipei; Qiao, Gang

    2018-01-01

    This paper presents a new routing scheme for underwater ad hoc networks based on directional antennas. Ad hoc networks with directional antennas have become a hot research topic because of space reuse may increase networks capacity. At present, researchers have applied traditional self-organizing routing protocols (such as DSR, AODV) [1] [2] on this type of networks, and the routing scheme is based on the shortest path metric. However, such routing schemes often suffer from long transmission delays and frequent link fragmentation along the intermediate nodes of the selected route. This is caused by a unique feature of directional transmission, often called as “deafness”. In this paper, we take a different approach to explore the advantages of space reuse through multipath routing. This paper introduces the validity of the conventional routing scheme in underwater ad hoc networks with directional antennas, and presents a special design of multipath routing algorithm for directional transmission. The experimental results show a significant performance improvement in throughput and latency.

  3. MWAHCA: a multimedia wireless ad hoc cluster architecture.

    PubMed

    Diaz, Juan R; Lloret, Jaime; Jimenez, Jose M; Sendra, Sandra

    2014-01-01

    Wireless Ad hoc networks provide a flexible and adaptable infrastructure to transport data over a great variety of environments. Recently, real-time audio and video data transmission has been increased due to the appearance of many multimedia applications. One of the major challenges is to ensure the quality of multimedia streams when they have passed through a wireless ad hoc network. It requires adapting the network architecture to the multimedia QoS requirements. In this paper we propose a new architecture to organize and manage cluster-based ad hoc networks in order to provide multimedia streams. Proposed architecture adapts the network wireless topology in order to improve the quality of audio and video transmissions. In order to achieve this goal, the architecture uses some information such as each node's capacity and the QoS parameters (bandwidth, delay, jitter, and packet loss). The architecture splits the network into clusters which are specialized in specific multimedia traffic. The real system performance study provided at the end of the paper will demonstrate the feasibility of the proposal.

  4. Multicasting in Wireless Communications (Ad-Hoc Networks): Comparison against a Tree-Based Approach

    NASA Astrophysics Data System (ADS)

    Rizos, G. E.; Vasiliadis, D. C.

    2007-12-01

    We examine on-demand multicasting in ad hoc networks. The Core Assisted Mesh Protocol (CAMP) is a well-known protocol for multicast routing in ad-hoc networks, generalizing the notion of core-based trees employed for internet multicasting into multicast meshes that have much richer connectivity than trees. On the other hand, wireless tree-based multicast routing protocols use much simpler structures for determining route paths, using only parent-child relationships. In this work, we compare the performance of the CAMP protocol against the performance of wireless tree-based multicast routing protocols, in terms of two important factors, namely packet delay and ratio of dropped packets.

  5. Gemini: Extending Information Management for Real Time Tactical Environments

    DTIC Science & Technology

    2008-03-01

    Mobile,  Ad ‐ Hoc  Networks.......................................................................................................49  8.4  Wired...networks, such as  wireless  ad ‐ hoc  networks. This paper looked into the operating environments expected to be available to  Unmanned Aircraft Systems...decentralized,  ad ‐ hoc   networks. The total peering capability of these networks may be very large. And, each network or access  point may carry restrictions; for

  6. Printing system perceptual-based gloss and gloss uniformity standard (INCITS W1.1)

    NASA Astrophysics Data System (ADS)

    Ng, Yee S.; Cui, Luke C.; Kuo, Chung-Hui; Maggard, Eric; Mashtare, Dale; Morris, Peter; Viola, Michael

    2003-12-01

    To address the standarization issues of perceptually based image quality for printing systems, ISO/IEC JTC1/SC28, the standarization committee for office equipment charactered the W1.1 project with the responsibiltiy of drafting a proposal for an international standard for the evaluation of printed image quality. One of the W1.1 task teams is charactered to address the issue of 'Gloss and Gloss Uniformity". This paper summarizes the current status and technical progress of this ad hoc team in 2003.

  7. Commission 5: Documentation and Astronomical Data

    NASA Astrophysics Data System (ADS)

    Ohishi, Masatoshi; Hanisch, Robert J.; Norris, Ray P.; Andernach, Heinz; Bishop, Marsha; Griffin, Elizabeth; Kembhavi, Ajit; Murphy, Tara; Pasian, Fabio

    2012-04-01

    IAU Commission 5 (http://www.nao.ac.jp/IAU/Com5/) deals with data management issues, and its working groups and task group deal specifically with information handling, with data centers and networks, with technical aspects of collection, archiving, storage and dissemination of data, with designations and classification of astronomical objects, with library services, editorial policies, computer communications, ad hoc methodologies, and with various standards, reference frames, etc. FITS (Flexible Image Transport System), the major data exchange format in astronomy, has been standardized, maintained and updated by the FITS working group under Commission 5.

  8. Leading change in an organization.

    PubMed

    Lexa, Frank James

    2010-01-01

    Change leadership is a core function of your leadership role. Learning to do it better will help you in many of the other tasks you face in your position. Change and adapting to it are not optional; change is simply a fact in the environment. Ignoring it in your job is no less critical than trying to ignore an oncoming truck in the wrong lane. Change leadership will be easier for you and your organization if it is embedded in policies and smart practices rather than done in an ad hoc fashion.

  9. A Hierarchical Auction-Based Mechanism for Real-Time Resource Allocation in Cloud Robotic Systems.

    PubMed

    Wang, Lujia; Liu, Ming; Meng, Max Q-H

    2017-02-01

    Cloud computing enables users to share computing resources on-demand. The cloud computing framework cannot be directly mapped to cloud robotic systems with ad hoc networks since cloud robotic systems have additional constraints such as limited bandwidth and dynamic structure. However, most multirobotic applications with cooperative control adopt this decentralized approach to avoid a single point of failure. Robots need to continuously update intensive data to execute tasks in a coordinated manner, which implies real-time requirements. Thus, a resource allocation strategy is required, especially in such resource-constrained environments. This paper proposes a hierarchical auction-based mechanism, namely link quality matrix (LQM) auction, which is suitable for ad hoc networks by introducing a link quality indicator. The proposed algorithm produces a fast and robust method that is accurate and scalable. It reduces both global communication and unnecessary repeated computation. The proposed method is designed for firm real-time resource retrieval for physical multirobot systems. A joint surveillance scenario empirically validates the proposed mechanism by assessing several practical metrics. The results show that the proposed LQM auction outperforms state-of-the-art algorithms for resource allocation.

  10. Sketching Awareness: A Participatory Study to Elicit Designs for Supporting Ad Hoc Emergency Medical Teamwork

    PubMed Central

    Kusunoki, Diana; Sarcevic, Aleksandra; Zhang, Zhan; Yala, Maria

    2014-01-01

    Prior CSCW research on awareness in clinical settings has mostly focused on higher-level team coordination spanning across longer-term trajectories at the department and inter-department levels. In this paper, we offer a perspective on what awareness means within the context of an ad hoc, time- and safety-critical medical setting by looking at teams treating severely ill patients with urgent needs. We report findings from four participatory design workshops conducted with emergency medicine clinicians at two regional emergency departments. Workshops were developed to elicit design ideas for information displays that support awareness in emergency medical situations. Through analysis of discussions and clinicians’ sketches of information displays, we identified five features of teamwork that can be used as a foundation for supporting awareness from the perspective of clinicians. Based on these findings, we contribute rich descriptions of four facets of awareness that teams manage during emergency medical situations: team member awareness, elapsed time awareness, teamwork-oriented and patient-driven task awareness, and overall progress awareness. We then discuss these four awareness types in relation to awareness facets found in the CSCW literature. PMID:25870498

  11. Antiepileptic drugs and suicidality: an expert consensus statement from the Task Force on Therapeutic Strategies of the ILAE Commission on Neuropsychobiology.

    PubMed

    Mula, Marco; Kanner, Andres M; Schmitz, Bettina; Schachter, Steven

    2013-01-01

    In 2008, the U.S. Food and Drug Administration (FDA) issued an alert to health care professionals about an increased risk of suicide ideation and suicide behavior in people treated with antiepileptic drugs (AEDs). Since then, a number of retrospective cohort and case-control studies have been published that are trying to address this issue, but gathered results are contradictory. This report represents an expert consensus statement developed by an ad hoc task force of the Commission on Neuropsychobiology of the International League Against Epilepsy (ILAE). Although some (but not all) AEDs can be associated with treatment-emergent psychiatric problems that can lead to suicidal ideation and behavior, the actual suicidal risk is yet to be established, but it seems to be very low. The risk of stopping AEDs or refusing to start AEDs is significantly worse and can actually result in serious harm including death to the patient. Suicidality in epilepsy is multifactorial, and different variables are operant. Clinicians should investigate the existence of such risk factors and adopt appropriate screening instruments. If necessary, patients should be referred for a psychiatric evaluation, but AED treatment should not be withheld, even in patients with positive suicidal risks. When starting an AED or switching from one to other AEDs, patients should be advised to report to their treating physician any change in mood and suicidal ideation. Data on treatment-emergent psychiatric adverse events need to be collected, in addition to general safety information, during controlled studies in order to have meaningful information for patients and their relatives when a new drug is marketed. Wiley Periodicals, Inc. © 2012 International League Against Epilepsy.

  12. Cooperative Education and the Academy. and Response to the Preliminary Report of the Ad Hoc Committee on Cooperative Education and the Curriculum.

    ERIC Educational Resources Information Center

    Heinemann, Harry N.; And Others

    1988-01-01

    Two articles describe the final report submitted by the Ad Hoc Committee on Cooperative Education and the Curriculum to the Cooperative Education Association and the reaction to that report by the person who established the committee. (JOW)

  13. 78 FR 10564 - Proposed Modification of Class B Airspace; Minneapolis, MN

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-14

    ... about the proposed design. The Ad Hoc Committee was chaired by the Minnesota Soaring Club representative... Minnesota Soaring Club and Stanton Sport Aviation operations. The Ad Hoc Committee's report provided to the... indicate the proposed modifications would impact the Minnesota Soaring Club and Stanton Sport Aviation...

  14. What Is the Problem of Ad Hoc Hypotheses?

    ERIC Educational Resources Information Center

    Bamford, Greg

    1999-01-01

    Philosophers' attempts to convincingly explicate the received view of an ad hoc hypothesis--that it accounts for only the observations it was designed to account for--have been unsuccessful. Familiar and firmer criteria for evaluating the hypotheses or modified theories so classified are characteristically available. Contains 41 references.…

  15. Providing Location Security in Vehicular Ad Hoc Networks

    ERIC Educational Resources Information Center

    Yan, Gongjun

    2010-01-01

    Location is fundamental information in Vehicular Ad-hoc Networks (VANETs). Almost all VANET applications rely on location information. Therefore it is of importance to ensure location information integrity, meaning that location information is original (from the generator), correct (not bogus or fabricated) and unmodified (value not changed). We…

  16. 7 CFR 3400.14 - Proposal review.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... RESEARCH GRANTS PROGRAM Scientific Peer Review of Research Grant Applications § 3400.14 Proposal review. (a... review will be made for responsiveness to the request for proposals (e.g., relationship of application to... peer review group, and ad hoc reviewers, as required. Written comments will be solicited from ad hoc...

  17. Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks

    DTIC Science & Technology

    2013-01-01

    high resiliency to malicious attacks and misbehaving nodes. Keywords—trust management; mobile ad hoc networks; QoS trust; social trust; trust...paper we address an importance issue of trust management protocol design for MANETs: trust bias minimization despite misbehaving nodes performing

  18. The Use of English as Ad Hoc Institutional Standard in the Belgian Asylum Interview

    ERIC Educational Resources Information Center

    Maryns, Katrijn

    2017-01-01

    In institutional settings of globalization, labelled languages are generally preferred over multilingual repertoires and mobile language resources. Drawing on linguistic-ethnographic analysis of the way English is treated as an invariable "ad hoc" idiom in the Belgian asylum interview, this article demonstrates how institutional measures…

  19. Anomaly Detection Techniques for Ad Hoc Networks

    ERIC Educational Resources Information Center

    Cai, Chaoli

    2009-01-01

    Anomaly detection is an important and indispensable aspect of any computer security mechanism. Ad hoc and mobile networks consist of a number of peer mobile nodes that are capable of communicating with each other absent a fixed infrastructure. Arbitrary node movements and lack of centralized control make them vulnerable to a wide variety of…

  20. MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm

    PubMed Central

    Elizarraras, Omar; Panduro, Marco; Méndez, Aldo L.

    2014-01-01

    The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR) and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC) protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access) for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15%) compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput. PMID:25140339

  1. MWAHCA: A Multimedia Wireless Ad Hoc Cluster Architecture

    PubMed Central

    Diaz, Juan R.; Jimenez, Jose M.; Sendra, Sandra

    2014-01-01

    Wireless Ad hoc networks provide a flexible and adaptable infrastructure to transport data over a great variety of environments. Recently, real-time audio and video data transmission has been increased due to the appearance of many multimedia applications. One of the major challenges is to ensure the quality of multimedia streams when they have passed through a wireless ad hoc network. It requires adapting the network architecture to the multimedia QoS requirements. In this paper we propose a new architecture to organize and manage cluster-based ad hoc networks in order to provide multimedia streams. Proposed architecture adapts the network wireless topology in order to improve the quality of audio and video transmissions. In order to achieve this goal, the architecture uses some information such as each node's capacity and the QoS parameters (bandwidth, delay, jitter, and packet loss). The architecture splits the network into clusters which are specialized in specific multimedia traffic. The real system performance study provided at the end of the paper will demonstrate the feasibility of the proposal. PMID:24737996

  2. Distributed generation of shared RSA keys in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Liu, Yi-Liang; Huang, Qin; Shen, Ying

    2005-12-01

    Mobile Ad Hoc Networks is a totally new concept in which mobile nodes are able to communicate together over wireless links in an independent manner, independent of fixed physical infrastructure and centralized administrative infrastructure. However, the nature of Ad Hoc Networks makes them very vulnerable to security threats. Generation and distribution of shared keys for CA (Certification Authority) is challenging for security solution based on distributed PKI(Public-Key Infrastructure)/CA. The solutions that have been proposed in the literature and some related issues are discussed in this paper. The solution of a distributed generation of shared threshold RSA keys for CA is proposed in the present paper. During the process of creating an RSA private key share, every CA node only has its own private security. Distributed arithmetic is used to create the CA's private share locally, and that the requirement of centralized management institution is eliminated. Based on fully considering the Mobile Ad Hoc network's characteristic of self-organization, it avoids the security hidden trouble that comes by holding an all private security share of CA, with which the security and robustness of system is enhanced.

  3. [Computers in biomedical research: I. Analysis of bioelectrical signals].

    PubMed

    Vivaldi, E A; Maldonado, P

    2001-08-01

    A personal computer equipped with an analog-to-digital conversion card is able to input, store and display signals of biomedical interest. These signals can additionally be submitted to ad-hoc software for analysis and diagnosis. Data acquisition is based on the sampling of a signal at a given rate and amplitude resolution. The automation of signal processing conveys syntactic aspects (data transduction, conditioning and reduction); and semantic aspects (feature extraction to describe and characterize the signal and diagnostic classification). The analytical approach that is at the basis of computer programming allows for the successful resolution of apparently complex tasks. Two basic principles involved are the definition of simple fundamental functions that are then iterated and the modular subdivision of tasks. These two principles are illustrated, respectively, by presenting the algorithm that detects relevant elements for the analysis of a polysomnogram, and the task flow in systems that automate electrocardiographic reports.

  4. Post Hoc Analyses of ApoE Genotype-Defined Subgroups in Clinical Trials.

    PubMed

    Kennedy, Richard E; Cutter, Gary R; Wang, Guoqiao; Schneider, Lon S

    2016-01-01

    Many post hoc analyses of clinical trials in Alzheimer's disease (AD) and mild cognitive impairment (MCI) are in small Phase 2 trials. Subject heterogeneity may lead to statistically significant post hoc results that cannot be replicated in larger follow-up studies. We investigated the extent of this problem using simulation studies mimicking current trial methods with post hoc analyses based on ApoE4 carrier status. We used a meta-database of 24 studies, including 3,574 subjects with mild AD and 1,171 subjects with MCI/prodromal AD, to simulate clinical trial scenarios. Post hoc analyses examined if rates of progression on the Alzheimer's Disease Assessment Scale-cognitive (ADAS-cog) differed between ApoE4 carriers and non-carriers. Across studies, ApoE4 carriers were younger and had lower baseline scores, greater rates of progression, and greater variability on the ADAS-cog. Up to 18% of post hoc analyses for 18-month trials in AD showed greater rates of progression for ApoE4 non-carriers that were statistically significant but unlikely to be confirmed in follow-up studies. The frequency of erroneous conclusions dropped below 3% with trials of 100 subjects per arm. In MCI, rates of statistically significant differences with greater progression in ApoE4 non-carriers remained below 3% unless sample sizes were below 25 subjects per arm. Statistically significant differences for ApoE4 in post hoc analyses often reflect heterogeneity among small samples rather than true differential effect among ApoE4 subtypes. Such analyses must be viewed cautiously. ApoE genotype should be incorporated into the design stage to minimize erroneous conclusions.

  5. Monitoring and tracing of critical software systems: State of the work and project definition

    DTIC Science & Technology

    2008-12-01

    analysis, troubleshooting and debugging. Some of these subsystems already come with ad hoc tracers for events like wireless connections or SCSI disk... SQLite ). Additional synthetic events (e.g. states) are added to the database. The database thus consists in contexts (process, CPU, state), event...capability on a [operating] system-by-system basis. Additionally, the mechanics of querying the data in an ad - hoc manner outside the boundaries of the

  6. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks

    PubMed Central

    Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J.; Segarra, Esteve Pallarès; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Gargallo, Emilio Sanvicente

    2015-01-01

    The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic.Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs. PMID:25897496

  7. Handheld portable real-time tracking and communications device

    DOEpatents

    Wiseman, James M [Albuquerque, NM; Riblett, Jr., Loren E.; Green, Karl L [Albuquerque, NM; Hunter, John A [Albuquerque, NM; Cook, III, Robert N.; Stevens, James R [Arlington, VA

    2012-05-22

    Portable handheld real-time tracking and communications devices include; a controller module, communications module including global positioning and mesh network radio module, data transfer and storage module, and a user interface module enclosed in a water-resistant enclosure. Real-time tracking and communications devices can be used by protective force, security and first responder personnel to provide situational awareness allowing for enhance coordination and effectiveness in rapid response situations. Such devices communicate to other authorized devices via mobile ad-hoc wireless networks, and do not require fixed infrastructure for their operation.

  8. Toward a Model-Based Predictive Controller Design in Brain–Computer Interfaces

    PubMed Central

    Kamrunnahar, M.; Dias, N. S.; Schiff, S. J.

    2013-01-01

    A first step in designing a robust and optimal model-based predictive controller (MPC) for brain–computer interface (BCI) applications is presented in this article. An MPC has the potential to achieve improved BCI performance compared to the performance achieved by current ad hoc, nonmodel-based filter applications. The parameters in designing the controller were extracted as model-based features from motor imagery task-related human scalp electroencephalography. Although the parameters can be generated from any model-linear or non-linear, we here adopted a simple autoregressive model that has well-established applications in BCI task discriminations. It was shown that the parameters generated for the controller design can as well be used for motor imagery task discriminations with performance (with 8–23% task discrimination errors) comparable to the discrimination performance of the commonly used features such as frequency specific band powers and the AR model parameters directly used. An optimal MPC has significant implications for high performance BCI applications. PMID:21267657

  9. Toward a model-based predictive controller design in brain-computer interfaces.

    PubMed

    Kamrunnahar, M; Dias, N S; Schiff, S J

    2011-05-01

    A first step in designing a robust and optimal model-based predictive controller (MPC) for brain-computer interface (BCI) applications is presented in this article. An MPC has the potential to achieve improved BCI performance compared to the performance achieved by current ad hoc, nonmodel-based filter applications. The parameters in designing the controller were extracted as model-based features from motor imagery task-related human scalp electroencephalography. Although the parameters can be generated from any model-linear or non-linear, we here adopted a simple autoregressive model that has well-established applications in BCI task discriminations. It was shown that the parameters generated for the controller design can as well be used for motor imagery task discriminations with performance (with 8-23% task discrimination errors) comparable to the discrimination performance of the commonly used features such as frequency specific band powers and the AR model parameters directly used. An optimal MPC has significant implications for high performance BCI applications.

  10. Flow force and torque on submerged bodies in lattice-Boltzmann methods via momentum exchange.

    PubMed

    Giovacchini, Juan P; Ortiz, Omar E

    2015-12-01

    We review the momentum exchange method to compute the flow force and torque on a submerged body in lattice-Boltzmann methods by presenting an alternative derivation. Our derivation does not depend on a particular implementation of the boundary conditions at the body surface, and it relies on general principles. After the introduction of the momentum exchange method in lattice-Boltzmann methods, some formulations were introduced to compute the fluid force on static and moving bodies. These formulations were introduced in a rather intuitive, ad hoc way. In our derivation, we recover the proposals most frequently used, in some cases with minor corrections, gaining some insight into the two most used formulations. At the end, we present some numerical tests to compare different approaches on a well-known benchmark test that support the correctness of the formulas derived.

  11. Work, Family, and Community: Summary Proceedings of an Ad Hoc Committee.

    ERIC Educational Resources Information Center

    Hayes, Cheryl D., Ed.

    These proceedings contain summaries of five working group discussions and a discussion of suggestions for future research from an ad hoc meeting on Work, Family, and Community (Fedruary 21-22, 1980) in Washington, D.C. The meeting had these objectives: (1) to identify salient policy and research issues associated with changing patterns of labor…

  12. The American College of Surgeons Children's Surgery Verification and Quality Improvement Program: implications for anesthesiologists.

    PubMed

    Houck, Constance S; Deshpande, Jayant K; Flick, Randall P

    2017-06-01

    The Task Force for Children's Surgical Care, an ad-hoc multidisciplinary group of invited leaders in pediatric perioperative medicine, was assembled in May 2012 to consider approaches to optimize delivery of children's surgical care in today's competitive national healthcare environment. Over the subsequent 3 years, with support from the American College of Surgeons (ACS) and Children's Hospital Association (CHA), the group established principles regarding perioperative resource standards, quality improvement and safety processes, data collection, and verification that were used to develop an ACS-sponsored Children's Surgery Verification and Quality Improvement Program (ACS CSV). The voluntary ACS CSV was officially launched in January 2017 and more than 125 pediatric surgical programs have expressed interest in verification. ACS CSV-verified programs have specific requirements for pediatric anesthesia leadership, resources, and the availability of pediatric anesthesiologists or anesthesiologists with pediatric expertise to care for infants and young children. The present review outlines the history of the ACS CSV, key elements of the program, and the standards specific to pediatric anesthesiology. As with the pediatric trauma programs initiated more than 40 years ago, this program has the potential to significantly improve surgical care for infants and children in the United States and Canada.

  13. Modeling and optimization of Quality of Service routing in Mobile Ad hoc Networks

    NASA Astrophysics Data System (ADS)

    Rafsanjani, Marjan Kuchaki; Fatemidokht, Hamideh; Balas, Valentina Emilia

    2016-01-01

    Mobile ad hoc networks (MANETs) are a group of mobile nodes that are connected without using a fixed infrastructure. In these networks, nodes communicate with each other by forming a single-hop or multi-hop network. To design effective mobile ad hoc networks, it is important to evaluate the performance of multi-hop paths. In this paper, we present a mathematical model for a routing protocol under energy consumption and packet delivery ratio of multi-hop paths. In this model, we use geometric random graphs rather than random graphs. Our proposed model finds effective paths that minimize the energy consumption and maximizes the packet delivery ratio of the network. Validation of the mathematical model is performed through simulation.

  14. Identification and Forecasting in Mortality Models

    PubMed Central

    Nielsen, Jens P.

    2014-01-01

    Mortality models often have inbuilt identification issues challenging the statistician. The statistician can choose to work with well-defined freely varying parameters, derived as maximal invariants in this paper, or with ad hoc identified parameters which at first glance seem more intuitive, but which can introduce a number of unnecessary challenges. In this paper we describe the methodological advantages from using the maximal invariant parameterisation and we go through the extra methodological challenges a statistician has to deal with when insisting on working with ad hoc identifications. These challenges are broadly similar in frequentist and in Bayesian setups. We also go through a number of examples from the literature where ad hoc identifications have been preferred in the statistical analyses. PMID:24987729

  15. Quantum load balancing in ad hoc networks

    NASA Astrophysics Data System (ADS)

    Hasanpour, M.; Shariat, S.; Barnaghi, P.; Hoseinitabatabaei, S. A.; Vahid, S.; Tafazolli, R.

    2017-06-01

    This paper presents a novel approach in targeting load balancing in ad hoc networks utilizing the properties of quantum game theory. This approach benefits from the instantaneous and information-less capability of entangled particles to synchronize the load balancing strategies in ad hoc networks. The quantum load balancing (QLB) algorithm proposed by this work is implemented on top of OLSR as the baseline routing protocol; its performance is analyzed against the baseline OLSR, and considerable gain is reported regarding some of the main QoS metrics such as delay and jitter. Furthermore, it is shown that QLB algorithm supports a solid stability gain in terms of throughput which stands a proof of concept for the load balancing properties of the proposed theory.

  16. Quadriceps force and anterior tibial force occur obviously later than vertical ground reaction force: a simulation study.

    PubMed

    Ueno, Ryo; Ishida, Tomoya; Yamanaka, Masanori; Taniguchi, Shohei; Ikuta, Ryohei; Samukawa, Mina; Saito, Hiroshi; Tohyama, Harukazu

    2017-11-18

    Although it is well known that quadriceps force generates anterior tibial force, it has been unclear whether quadriceps force causes great anterior tibial force during the early phase of a landing task. The purpose of the present study was to examine whether the quadriceps force induced great anterior tibial force during the early phase of a landing task. Fourteen young, healthy, female subjects performed a single-leg landing task. Muscle force and anterior tibial force were estimated from motion capture data and synchronized force data from the force plate. One-way repeated measures analysis of variance and the post hoc Bonferroni test were conducted to compare the peak time of the vertical ground reaction force, quadriceps force and anterior tibial force during the single-leg landing. In addition, we examined the contribution of vertical and posterior ground reaction force, knee flexion angle and moment to peak quadriceps force using multiple linear regression. The peak times of the estimated quadriceps force (96.0 ± 23.0 ms) and anterior tibial force (111.9 ± 18.9 ms) were significantly later than that of the vertical ground reaction force (63.5 ± 6.8 ms) during the single-leg landing. The peak quadriceps force was positively correlated with the peak anterior tibial force (R = 0.953, P < 0.001). Multiple linear regression analysis showed that the peak knee flexion moment contributed significantly to the peak quadriceps force (R 2  = 0.778, P < 0.001). The peak times of the quadriceps force and the anterior tibial force were obviously later than that of the vertical ground reaction force for the female athletes during successful single-leg landings. Studies have reported that the peak time of the vertical ground reaction force was close to the time of anterior cruciate ligament (ACL) disruption in ACL injury cases. It is possible that early contraction of the quadriceps during landing might induce ACL disruption as a result of excessive anterior tibial force in unanticipated situations in ACL injury cases.

  17. Information Fusion in Ad hoc Wireless Sensor Networks for Aircraft Health Monitoring

    NASA Astrophysics Data System (ADS)

    Fragoulis, Nikos; Tsagaris, Vassilis; Anastassopoulos, Vassilis

    In this paper the use of an ad hoc wireless sensor network for implementing a structural health monitoring system is discussed. The network is consisted of sensors deployed throughout the aircraft. These sensors being in the form of a microelectronic chip and consisted of sensing, data processing and communicating components could be easily embedded in any mechanical aircraft component. The established sensor network, due to its ad hoc nature is easily scalable, allowing adding or removing any number of sensors. The position of the sensor nodes need not necessarily to be engineered or predetermined, giving this way the ability to be deployed in inaccessible points. Information collected from various sensors of different modalities throughout the aircraft is then fused in order to provide a more comprehensive image of the aircraft structural health. Sensor level fusion along with decision quality information is used, in order to enhance detection performance.

  18. Automatically assessing properties of dynamic cameras for camera selection and rapid deployment of video content analysis tasks in large-scale ad-hoc networks

    NASA Astrophysics Data System (ADS)

    den Hollander, Richard J. M.; Bouma, Henri; van Rest, Jeroen H. C.; ten Hove, Johan-Martijn; ter Haar, Frank B.; Burghouts, Gertjan J.

    2017-10-01

    Video analytics is essential for managing large quantities of raw data that are produced by video surveillance systems (VSS) for the prevention, repression and investigation of crime and terrorism. Analytics is highly sensitive to changes in the scene, and for changes in the optical chain so a VSS with analytics needs careful configuration and prompt maintenance to avoid false alarms. However, there is a trend from static VSS consisting of fixed CCTV cameras towards more dynamic VSS deployments over public/private multi-organization networks, consisting of a wider variety of visual sensors, including pan-tilt-zoom (PTZ) cameras, body-worn cameras and cameras on moving platforms. This trend will lead to more dynamic scenes and more frequent changes in the optical chain, creating structural problems for analytics. If these problems are not adequately addressed, analytics will not be able to continue to meet end users' developing needs. In this paper, we present a three-part solution for managing the performance of complex analytics deployments. The first part is a register containing meta data describing relevant properties of the optical chain, such as intrinsic and extrinsic calibration, and parameters of the scene such as lighting conditions or measures for scene complexity (e.g. number of people). A second part frequently assesses these parameters in the deployed VSS, stores changes in the register, and signals relevant changes in the setup to the VSS administrator. A third part uses the information in the register to dynamically configure analytics tasks based on VSS operator input. In order to support the feasibility of this solution, we give an overview of related state-of-the-art technologies for autocalibration (self-calibration), scene recognition and lighting estimation in relation to person detection. The presented solution allows for rapid and robust deployment of Video Content Analysis (VCA) tasks in large scale ad-hoc networks.

  19. HOW GAS-DYNAMIC FLARE MODELS POWERED BY PETSCHEK RECONNECTION DIFFER FROM THOSE WITH AD HOC ENERGY SOURCES

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Longcope, D. W.; Klimchuk, J. A.

    Aspects of solar flare dynamics, such as chromospheric evaporation and flare light curves, have long been studied using one-dimensional models of plasma dynamics inside a static flare loop, subjected to some energy input. While extremely successful at explaining the observed characteristics of flares, all such models so far have specified energy input ad hoc, rather than deriving it self-consistently. There is broad consensus that flares are powered by magnetic energy released through reconnection. Recent work has generalized Petschek’s basic reconnection scenario, topological change followed by field line retraction and shock heating, to permit its inclusion in a one-dimensional flare loop model. Heremore » we compare the gas dynamics driven by retraction and shocking to those from more conventional static loop models energized by ad hoc source terms. We find significant differences during the first minute, when retraction leads to larger kinetic energies and produces higher densities at the loop top, while ad hoc heating tends to rarify the loop top. The loop-top density concentration is related to the slow magnetosonic shock, characteristic of Petschek’s model, but persists beyond the retraction phase occurring in the outflow jet. This offers an explanation for observed loop-top sources of X-ray and EUV emission, with advantages over that provided by ad hoc heating scenarios. The cooling phases of the two models are, however, notably similar to one another, suggesting that observations at that stage will yield little information on the nature of energy input.« less

  20. Decentralized session initiation protocol solution in ad hoc networks

    NASA Astrophysics Data System (ADS)

    Han, Lu; Jin, Zhigang; Shu, Yantai; Dong, Linfang

    2006-10-01

    With the fast development of ad hoc networks, SIP has attracted more and more attention in multimedia service. This paper proposes a new architecture to provide SIP service for ad hoc users, although there is no centralized SIP server deployed. In this solution, we provide the SIP service by the introduction of two nodes: Designated SIP Server (DS) and its Backup Server (BDS). The nodes of ad hoc network designate DS and BDS when they join the session nodes set and when some pre-defined events occur. A new sip message type called REGISTRAR is presented so nodes can send others REGISTRAR message to declare they want to be DS. According to the IP information taken in the message, an algorithm works like the election of DR and BDR in OSPF protocol is used to vote DS and BDS SIP servers. Naturally, the DS will be replaced by BDS when the DS is down for predicable or unpredictable reasons. To facilitate this, the DS should register to the BDS and transfer a backup of the SIP users' database. Considering the possibility DS or BDS may abruptly go down, a special policy is given. When there is no DS and BDS, a new election procedure is triggered just like the startup phase. The paper also describes how SIP works normally in the decentralized model as well as the evaluation of its performance. All sessions based on SIP in ad hoc such as DS voting have been tested in the real experiments within a 500m*500m square area where about 30 random nodes are placed.

  1. That Sounds Easy Enough: An Exploration of Data Management Challenges

    NASA Astrophysics Data System (ADS)

    Rosati, A.; Advanced Cooperative Arctic Data; Information Service (Acadis)

    2013-05-01

    Creating an infrastructure that is not ad hoc or ephemeral when much of technology today is itself ad hoc and ephemeral is not an easy task. This paper examines the collaboration process between various stakeholders within the Advanced Cooperative Arctic Data and Information Service (ACADIS) in order to provide insight into data management, data preservation, and data discovery. Specifically, this paper addresses the partnership of Arctic Research Mapping Application Program (ARMAP) and ACADIS. This partnership shows that what may seem like an easy or straight forward request can, in fact, prove challenging. These challenges can only be met through collaboration and good communication. The ACADIS project fosters scientific synthesis and discovery by providing services that make data freely available for access and analysis across multiple disciplines. The goals of ACADIS are to bring together experts to create tools at the forefront of how science will be done. Essentially, we improve the usability and interdisciplinary reuse of arctic data. ACADIS is a joint effort by the National Snow and Ice Data Center (NSIDC), the University Corporation for Atmospheric Research (UCAR), Unidata, and the National Center for Atmospheric Research (NCAR) to provide data archival services, preservation, and access for all projects funded by the National Science Foundation's (NSF) Arctic Science Program (ARC).

  2. Mechanical discrete simulator of the electro-mechanical lift with n:1 roping

    NASA Astrophysics Data System (ADS)

    Alonso, F. J.; Herrera, I.

    2016-05-01

    The design process of new products in lift engineering is a difficult task due to, mainly, the complexity and slenderness of the lift system, demanding a predictive tool for the lift mechanics. A mechanical ad-hoc discrete simulator, as an alternative to ‘general purpose’ mechanical simulators is proposed. Firstly, the synthesis and experimentation process that has led to establish a suitable model capable of simulating accurately the response of the electromechanical lift is discussed. Then, the equations of motion are derived. The model comprises a discrete system of 5 vertically displaceable masses (car, counterweight, car frame, passengers/loads and lift drive), an inertial mass of the assembly tension pulley-rotor shaft which can rotate about the machine axis and 6 mechanical connectors with 1:1 suspension layout. The model is extended to any n:1 roping lift by setting 6 equivalent mechanical components (suspension systems for car and counterweight, lift drive silent blocks, tension pulley-lift drive stator and passengers/load equivalent spring-damper) by inductive inference from 1:1 and generalized 2:1 roping system. The application to simulate real elevator systems is proposed by numeric time integration of the governing equations using the Kutta-Meden algorithm and implemented in a computer program for ad-hoc elevator simulation called ElevaCAD.

  3. Efficient Byzantine Fault Tolerance for Scalable Storage and Services

    DTIC Science & Technology

    2009-07-01

    most critical applications must survive in ever harsher environments. Less synchronous networking delivers packets unreliably and unpredictably, and... synchronous environments to allowing asynchrony, and from tolerating crashes to tolerating some corruptions through ad-hoc consistency checks. Ad-hoc...servers are responsive. To support this thesis statement, this disseration takes the following steps. First, it develops a new cryptographic primitive

  4. Preserving Nevada's Environmental Heritage: A Report of the Ad Hoc Committee on Environmental Quality. Final Report to the Governor's Natural Resources Council.

    ERIC Educational Resources Information Center

    Nevada State Dept. of Conservation and Natural Resources, Carson City.

    The Environmental Quality Ad Hoc Committee has prepared this report for the Governor's Natural Resources Council (Nevada). It is a compilation of available factual data focusing attention on needed statutory and administrative changes to preserve Nevada's environmental heritage and from which recommendations for future budgetary and legislative…

  5. Report of the Ad Hoc Committee on Religious and Cultural Celebrations in the Library.

    ERIC Educational Resources Information Center

    Rathemacher, Andree; Grubman, Sheila Black; Lahiri, Amar; Gilton, Donna; Sharif, Mohammed

    The charge of the University of Rhode Island's Ad Hoc Committee on Religious and Cultural Celebrations in the Library was to: investigate all opportunities for the library to educate the campus community about religious and cultural holidays; consider all the major religions of the world and the possibility of having displays for the symbols of…

  6. Federal Government Printing and Publishing: Policy Issues. Report of the Ad Hoc Advisory Committee on Revision of Title 44.

    ERIC Educational Resources Information Center

    Joint Committee on Printing, Washington, DC.

    Designed to present a better understanding of the government's system of printing and distributing information and to highlight problems, alternatives, and important policy questions, this report synthesizes 13 weeks of the Ad Hoc Advisory Committee hearings on six topics: (1) Administration of policy--who should establish and administer policy in…

  7. The 5th Meeting of the Ad Hoc Panel on Terminal Configured Vehicles

    NASA Technical Reports Server (NTRS)

    1977-01-01

    A report of the fifth meeting of the NASA Research and Technology Advisory Council, Ad Hoc panel on Terminal Configured Vehicles is presented. Some of the following topics were discussed; (1) microwave landing systems; (2) whole word computer system status; (3) flight path angle control: (4) VTOL approaches and landing technology; and (5) simulation study in wind shear.

  8. Clinician Ratings of Interpreter Mediated Visits in Underserved Primary Care Settings with Ad hoc, In-person Professional, and Video Conferencing Modes

    PubMed Central

    Nápoles, Anna M.; Santoyo-Olsson, Jasmine; Karliner, Leah S.; O’Brien, Helen; Gregorich, Steven E.; Pérez-Stable, Eliseo J.

    2013-01-01

    Language interpretation ameliorates health disparities among underserved limited English-proficient patients, yet few studies have compared clinician satisfaction with these services. Self-administered clinician post-visit surveys compared the quality of interpretation and communication, visit satisfaction, degree of patient engagement, and cultural competence of visits using untrained people acting as interpreters (ad hoc), in-person professional, or video conferencing professional interpretation for 283 visits. Adjusting for clinician and patient characteristics, the quality of interpretation of in-person and video conferencing modes were rated similarly (OR=1.79; 95% CI 0.74, 4.33). The quality of in-person (OR=5.55; 95% CI 1.50, 20.51) and video conferencing (OR=3.10; 95% CI 1.16, 8.31) were rated higher than ad hoc interpretation. Self-assessed cultural competence was better for in-person versus video conferencing interpretation (OR=2.32; 95% CI 1.11, 4.86). Video conferencing interpretation increases access without compromising quality, but cultural nuances may be better addressed by in-person interpreters. Professional interpretation is superior to ad hoc (OR=4.15; 95% CI 1.43, 12.09). PMID:20173271

  9. Scalability enhancement of AODV using local link repairing

    NASA Astrophysics Data System (ADS)

    Jain, Jyoti; Gupta, Roopam; Bandhopadhyay, T. K.

    2014-09-01

    Dynamic change in the topology of an ad hoc network makes it difficult to design an efficient routing protocol. Scalability of an ad hoc network is also one of the important criteria of research in this field. Most of the research works in ad hoc network focus on routing and medium access protocols and produce simulation results for limited-size networks. Ad hoc on-demand distance vector (AODV) is one of the best reactive routing protocols. In this article, modified routing protocols based on local link repairing of AODV are proposed. Method of finding alternate routes for next-to-next node is proposed in case of link failure. These protocols are beacon-less, means periodic hello message is removed from the basic AODV to improve scalability. Few control packet formats have been changed to accommodate suggested modification. Proposed protocols are simulated to investigate scalability performance and compared with basic AODV protocol. This also proves that local link repairing of proposed protocol improves scalability of the network. From simulation results, it is clear that scalability performance of routing protocol is improved because of link repairing method. We have tested protocols for different terrain area with approximate constant node densities and different traffic load.

  10. An Adaptive Approach for Precise Underwater Vehicle Control in Combined Robot-Diver Operations

    DTIC Science & Technology

    2015-03-01

    addressing rigid body and added mass, Coriolis effects , damping and restoring forces. 3. System Modeling for THAUS-like Platforms Yuh [3] presents...term, ( )C  is the rigid body and added mass Coriolis effects , ( )D  is the damping term, and )(g  is the reactionary force term. The second...operations potentially increase the efficiency, effectiveness and safety of the tasks they perfonn. The utilization of an autonomous unde1water vehicle

  11. Two Phase Admission Control for QoS Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Chen, Chien-Sheng; Su, Yi-Wen; Liu, Wen-Hsiung; Chi, Ching-Lung

    In this paper a novel and effective two phase admission control (TPAC) for QoS mobile ad hoc networks is proposed that satisfies the real-time traffic requirements in mobile ad hoc networks. With a limited amount of extra overhead, TPAC can avoid network congestions by a simple and precise admission control which blocks most of the overloading flow-requests in the route discovery process. When compared with previous QoS routing schemes such as QoS-aware routing protocol and CACP protocols, it is shown from system simulations that the proposed scheme can increase the system throughput and reduce both the dropping rate and the end-to-end delay. Therefore, TPAC is surely an effective QoS-guarantee protocol to provide for real-time traffic.

  12. Passive and Active Analysis in DSR-Based Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Dempsey, Tae; Sahin, Gokhan; Morton, Y. T. (Jade)

    Security and vulnerabilities in wireless ad hoc networks have been considered at different layers, and many attack strategies have been proposed, including denial of service (DoS) through the intelligent jamming of the most critical packet types of flows in a network. This paper investigates the effectiveness of intelligent jamming in wireless ad hoc networks using the Dynamic Source Routing (DSR) and TCP protocols and introduces an intelligent classifier to facilitate the jamming of such networks. Assuming encrypted packet headers and contents, our classifier is based solely on the observable characteristics of size, inter-arrival timing, and direction and classifies packets with up to 99.4% accuracy in our experiments. Furthermore, we investigate active analysis, which is the combination of a classifier and intelligent jammer to invoke specific responses from a victim network.

  13. Information Sharing Modalities for Mobile Ad-Hoc Networks

    NASA Astrophysics Data System (ADS)

    de Spindler, Alexandre; Grossniklaus, Michael; Lins, Christoph; Norrie, Moira C.

    Current mobile phone technologies have fostered the emergence of a new generation of mobile applications. Such applications allow users to interact and share information opportunistically when their mobile devices are in physical proximity or close to fixed installations. It has been shown how mobile applications such as collaborative filtering and location-based services can take advantage of ad-hoc connectivity to use physical proximity as a filter mechanism inherent to the application logic. We discuss the different modes of information sharing that arise in such settings based on the models of persistence and synchronisation. We present a platform that supports the development of applications that can exploit these modes of ad-hoc information sharing and, by means of an example, show how such an application can be realised based on the supported event model.

  14. [Reporting echocardiography exams with the G8-Cardio ANMCO software].

    PubMed

    Badano, L P; Marchesini, A; Pizzuti, A; Mantero, A; Cianflone, D; Neri, E; Caira, P; Tubaro, M

    2001-03-01

    The availability of a common computerized program for echocardiographic study archiving and reporting at national and/or international level could make it possible to standardize the echo reports of different echocardiographic laboratories, and to use the wealth of data thus obtainable with echocardiography, and to exploit its capillary territorial distribution, with the aim of collecting echocardiographic data in a standard format for epidemiological, scientific and administrative purposes. To develop such a software, an ad hoc joint National Association of Hospital Cardiologists and Italian Society of Echocardiography task force worked in conjunction with the Italian Branch of Agilent Technologies to standardize the phraseology of accepted echocardiographic terms and of the quantitative parameters derived from transthoracic and transesophageal echocardiographic examination at rest as well as during exercise and pharmacological stress, and to develop an ad hoc software. This echocardiographic study archiving and reporting program is part of the whole G8-Cardio ANMCO software developed to computerize the whole cardiological chart. The software has been developed by Agilent Technologies to provide a fast, easy-access and easy to use report generator for the non-computer specialist using DBMS Oracle 7.3 database and Power Builder 5.0 to develop a user-friendly interface. The number of qualitative and quantitative variables contained in the program is 733 for echocardiography at rest, while it depends on the stressor and on the length of the examination for the stress echo (dipyridamole 214-384, dobutamine 236-406, exercise 198-392). The program was tested and refined in our laboratory between November 1999 and May 2000. During this time period, 291 resting and 56 stress echocardiographic studies were reported and recorded in a database. On average, each resting echocardiographic study lasting 10 +/- 4 (range 5-17) min was recorded using 50 +/- 11 (range 33-67) variables and 41,566 bytes of hard-disk memory space. Stress echocardiographic studies, each lasting 7 +/- 5 (range 5-21) min, were recorded using 143 +/- 74 (range 38-194) variables and 38,531 bytes of hard-disk memory space. To our knowledge this software represents the first experience of a common computerized program for echo archiving and reporting carried out at national level.

  15. Ad-Hoc Networks and the Mobile Application Security System (MASS)

    DTIC Science & Technology

    2006-01-01

    solution to this problem that addresses critical aspects of security in ad-hoc mobile application networks. This approach involves preventing unauthorized...modification of a mobile application , both by other applications and by hosts, and ensuring that mobile code is authentic and authorized. These...capabilities constitute the Mobile Application Security System (MASS). The MASS applies effective, robust security to mobile application -based systems

  16. ARO PECASE: Information Assurance for Energy-Constrained Wireless Sensor Networks

    DTIC Science & Technology

    2011-12-21

    Distribution, 18th Annual IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), September 2007. 2. 2010 IEEE...received the following awards: Student Best Paper Award at the IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC...Localization in Wireless Ad Hoc Networks – Many current and future appli- cations of mobile ad hoc networks, including disaster response and event

  17. AD HOC Networks for the Autonomous Car

    NASA Astrophysics Data System (ADS)

    Ron, Davidescu; Negrus, Eugen

    2017-10-01

    The future of the vehicle is made of cars, roads and infrastructures connected in a two way automated communication in a holistic system. It is a mandatory to use Encryption to maintain Confidentiality, Integrity and Availability in an ad hoc vehicle network. Vehicle to Vehicle communication, requires multichannel interaction between mobile, moving and changing parties to insure the full benefit from data sharing and real time decision making, a network of such users referred as mobile ad hoc network (MANET), however as ad hoc networks were not implemented in such a scale, it is not clear what is the best method and protocol to apply. Furthermore the visibility of secure preferred asymmetric encrypted ad hoc networks in a real time environment of dense moving autonomous vehicles has to be demonstrated, In order to evaluate the performance of Ad Hoc networks in changing conditions a simulation of multiple protocols was performed on large number of mobile nodes. The following common routing protocols were tested, DSDV is a proactive protocol, every mobile station maintains a routing table with all available destinations, DSR is a reactive routing protocol which allows nodes in the MANET to dynamically discover a source route across multiple network hops, AODV is a reactive routing protocol Instead of being proactive. It minimizes the number of broadcasts by creating routes based on demand, SAODV is a secure version of AODV, requires heavyweight asymmetric cryptographic, ARIANDE is a routing protocol that relies on highly efficient symmetric cryptography the concept is primarily based on DSR. A methodical evolution was performed in a various density of transportation, based on known communication bench mark parameters including, Throughput Vs. time, Routing Load per packets and bytes. Out of the none encrypted protocols, It is clear that in terms of performance of throughput and routing load DSR protocol has a clear advantage the high node number mode. The encrypted protocols show lower performance with ARIANDE being superior to SAODV and SRP. Nevertheless all protocol simulation proved it to match required real time performance.

  18. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks.

    PubMed

    Vara, M Isabel; Campo, Celeste

    2015-07-20

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead.

  19. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks

    PubMed Central

    Vara, M. Isabel; Campo, Celeste

    2015-01-01

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead. PMID:26205272

  20. A change of heart and a change of mind? Technology and the redefinition of death in 1968.

    PubMed

    Giacomini, M

    1997-05-01

    In 1968, an ad hoc committee of Harvard faculty publicly redefined death as "brain death". What interests and issues compelled the redefinition of death, and formed the "spirit" of this precedent-setting policy? This paper reports on an historical study of the files of the Harvard ad hoc committee, the proceedings of an international conference on ethical issues in organ transplantation, and a review of the medical literature and media in the decades preceding the redefinition of death. This analysis of the technological and professional forces involved in the redefinition of death in 1968 questions two common theses: that technological "progress", primarily in the areas of life support and electroencephalography, literally created brain-dead bodies and dictated their defining features (respectively), and that Harvard's definition of brain death by committee constituted a net loss of autonomy for medicine. In fact, medical researchers through the 1960s disputed and negotiated many features of the brain death syndrome, and transplantation interests-perhaps more kidney than heart-played a particularly influential role in tailoring the final criteria put forth by Harvard in 1968. It is also doubtful whether Harvard's definition of brain death by multidisciplinary committee undermined medical privilege and autonomy. The Harvard Ad Hoc Committee may not have succeeded in establishing definitive, indisputable brain death criteria and ensuring their consistent application to all clinical cases of brain death. However, it did gain significant ground for transplant and other medical interests by (1) establishing brain death as a technical "fact" and the definition of brain death as an exercise for medical theorists, (2) involving non-medical ethics and humanities experts in supporting the technical redefinition of death, and, (3) successfully involving transplant surgeons in the redefinition of death and attempting (albeit unsuccessfully) not to exclude them from the actual diagnosis of death in individual cases.

  1. The use of Spanish language skills by physicians and nurses: policy implications for teaching and testing.

    PubMed

    Diamond, Lisa C; Tuot, Delphine S; Karliner, Leah S

    2012-01-01

    Language barriers present a substantial communication challenge in the hospital setting. To describe how clinicians with various levels of Spanish language proficiency work with interpreters or their own Spanish skills in common clinical scenarios. Survey of physicians and nurses who report ever speaking Spanish with patients on a general medicine hospital floor. Spanish proficiency rated on a 5-point scale, self-reported use of specific strategies (own Spanish skills, professional or ad-hoc interpreters) to overcome the language barrier. Sixty-eight physicians and 65 nurses participated. Physicians with low-level Spanish proficiency reported frequent use of ad-hoc interpreters for all information-based scenarios, except pre-rounding in the morning when most reported using their own Spanish skills. For difficult conversations and procedural consent, most used professional interpreters. Comparatively, physicians with medium proficiency reported higher rates of using their own Spanish skills for information-based scenarios, lower rates of professional interpreter use, and little use of ad-hoc interpreters. They rarely used their own Spanish skills or ad-hoc interpreters for difficult conversations. Physicians with high-level Spanish proficiency almost uniformly reported using their own Spanish skills. The majority (82%) of nurses had low-level Spanish proficiency, and frequently worked with professional interpreters for educating patients, but more often used ad hoc interpreters and their own Spanish skills for information-based scenarios, including medication administration. Physicians and nurses with limited Spanish proficiency use these skills, even in important clinical circumstances in the hospital. Health-care organizations should evaluate clinicians' non-English language proficiency and set policies about use of language skills in clinical care.

  2. Proceedings of the International Conference on Cooperative Security and Defense Assistance (6th) Held in Washington, DC on June 18-19, 1981,

    DTIC Science & Technology

    1981-01-01

    Air Force, whereas the Army is still in the middle of its program. This means , with reference to the Army, we will either have a surplus or we will ...an ad hoc basis. Somebody had the bright idea, makes some progress, and then needs help in evaluating how that particular new materi- al will stand up...countries? I won’t ask how many of you think that this affects your businesses. I will read a few of the key phrases from the German MOU. Even those of you

  3. Cross-layer model design in wireless ad hoc networks for the Internet of Things.

    PubMed

    Yang, Xin; Wang, Ling; Xie, Jian; Zhang, Zhaolin

    2018-01-01

    Wireless ad hoc networks can experience extreme fluctuations in transmission traffic in the Internet of Things, which is widely used today. Currently, the most crucial issues requiring attention for wireless ad hoc networks are making the best use of low traffic periods, reducing congestion during high traffic periods, and improving transmission performance. To solve these problems, the present paper proposes a novel cross-layer transmission model based on decentralized coded caching in the physical layer and a content division multiplexing scheme in the media access control layer. Simulation results demonstrate that the proposed model effectively addresses these issues by substantially increasing the throughput and successful transmission rate compared to existing protocols without a negative influence on delay, particularly for large scale networks under conditions of highly contrasting high and low traffic periods.

  4. Cross-layer model design in wireless ad hoc networks for the Internet of Things

    PubMed Central

    Wang, Ling; Xie, Jian; Zhang, Zhaolin

    2018-01-01

    Wireless ad hoc networks can experience extreme fluctuations in transmission traffic in the Internet of Things, which is widely used today. Currently, the most crucial issues requiring attention for wireless ad hoc networks are making the best use of low traffic periods, reducing congestion during high traffic periods, and improving transmission performance. To solve these problems, the present paper proposes a novel cross-layer transmission model based on decentralized coded caching in the physical layer and a content division multiplexing scheme in the media access control layer. Simulation results demonstrate that the proposed model effectively addresses these issues by substantially increasing the throughput and successful transmission rate compared to existing protocols without a negative influence on delay, particularly for large scale networks under conditions of highly contrasting high and low traffic periods. PMID:29734355

  5. A novel Smart Routing Protocol for remote health monitoring in Medical Wireless Networks.

    PubMed

    Sundararajan, T V P; Sumithra, M G; Maheswar, R

    2014-01-01

    In a Medical Wireless Network (MWN), sensors constantly monitor patient's physiological condition and movement. Inter-MWN communications are set up between the Patient Server and one or more Centralized Coordinators. However, MWNs require protocols with little energy consumption and the self-organizing attribute perceived in ad-hoc networks. The proposed Smart Routing Protocol (SRP) selects only the nodes with a higher residual energy and lower traffic density for routing. This approach enhances cooperation among the nodes of a Mobile Ad Hoc Network. Consequently, SRP produces better results than the existing protocols, namely Conditional Min-Max Battery Cost Routing, Min-Max Battery Cost Routing and AdHoc On-demand Distance Vector in terms of network parameters. The performance of the erstwhile schemes for routing protocols is evaluated using the network simulator Qualnet v 4.5.

  6. Performance evaluation of a six-axis generalized force-reflecting teleoperator

    NASA Technical Reports Server (NTRS)

    Hannaford, B.; Wood, L.; Guggisberg, B.; Mcaffee, D.; Zak, H.

    1989-01-01

    Work in real-time distributed computation and control has culminated in a prototype force-reflecting telemanipulation system having a dissimilar master (cable-driven, force-reflecting hand controller) and a slave (PUMA 560 robot with custom controller), an extremely high sampling rate (1000 Hz), and a low loop computation delay (5 msec). In a series of experiments with this system and five trained test operators covering over 100 hours of teleoperation, performance was measured in a series of generic and application-driven tasks with and without force feedback, and with control shared between teleoperation and local sensor referenced control. Measurements defining task performance included 100-Hz recording of six-axis force/torque information from the slave manipulator wrist, task completion time, and visual observation of predefined task errors. The task consisted of high precision peg-in-hole insertion, electrical connectors, velcro attach-de-attach, and a twist-lock multi-pin connector. Each task was repeated three times under several operating conditions: normal bilateral telemanipulation, forward position control without force feedback, and shared control. In shared control, orientation was locally servo controlled to comply with applied torques, while translation was under operator control. All performance measures improved as capability was added along a spectrum of capabilities ranging from pure position control through force-reflecting teleoperation and shared control. Performance was optimal for the bare-handed operator.

  7. A Survey on Trust Management for Mobile Ad Hoc Networks

    DTIC Science & Technology

    2011-11-01

    expects, trust is dangerous implying the possible betrayal of trust. In his comments on Lagerspetz’s book titled Trust: The Tacit Demand, Lahno [24...AODV Zouridaki et al. (2005 ) [79] (2006) [80] Secure routing Direct observation [79][80] Reputation by secondhand information [80] Packet dropping...areas of signal processing, wireless communications, sensor and mobile ad hoc networks. He is co-editor of the book Wireless Sensor Networks: Signal

  8. Space-Time Processing for Tactical Mobile Ad Hoc Networks

    DTIC Science & Technology

    2007-08-01

    rates in mobile ad hoc networks. In addition, he has considered the design of a cross-layer multi-user resource allocation framework using a... framework for many-to-one communication. In this context, multiple nodes cooperate to transmit their packets simultaneously to a single node using multi...spatially multiplexed signals transmitted from multiple nodes. Our goal is to form a framework that activates different sets of communication links

  9. Space-Time Processing for Tactical Mobile Ad Hoc Networks

    DTIC Science & Technology

    2008-08-01

    vision for multiple concurrent communication settings, i.e., a many-to-many framework where multi-packet transmissions (MPTs) and multi-packet...modelling framework of capacity-delay tradeoffs We have introduced the first unified modeling framework for the computation of fundamental limits o We...dalities in wireless n twor i-packet modelling framework to account for the use of m lti-packet reception (MPR) f ad hoc networks with MPT under

  10. An Experimental Investigation of Computer Program Development Approaches and Computer Programming Metrics.

    DTIC Science & Technology

    1979-12-01

    team progranming in reducing software dleveloup- ment costs relative to ad hoc approaches and improving software product quality relative to...are interpreted as demonstrating the advantages of disciplined team programming in reducing software development costs relative to ad hoc approaches...is due oartialty to the cost and imoracticality of a valiI experimental setup within a oroauct ion environment. Thus the question remains, are

  11. An Energy Efficient Power Control Protocol for Ad Hoc Networks Using Directional Antennas

    NASA Astrophysics Data System (ADS)

    Quiroz-Perez, Carlos; Gulliver, T. Aaron

    A wireless ad hoc network is a collection of mobile nodes that can communicate with each other. Typically, nodes employ omnidirectional antennas. The use of directional antennas can increase spatial reuse, reduce the number of hops to a destination, reduce interference, and increase the transmission range in a specific direction. This is because omnidirectional antennas radiate equally in all directions, limiting the transmission range.

  12. Modern Foreign Language Teachers--Don't Leave Those Kids Alone! Linguistic-Cultural "Give and Take" in an Ad-Hoc Tutoring Scheme

    ERIC Educational Resources Information Center

    Leroy, Norah

    2017-01-01

    This paper addresses the theme of social inclusion through language learning. The focus is on an ad-hoc tutoring scheme set up between newly arrived British migrant pupils and French monolingual pupils in a small secondary school in the south-west of France. Though the original objective of this tutoring scheme was to improve the English skills of…

  13. A game-theoretic approach to optimize ad hoc networks inspired by small-world network topology

    NASA Astrophysics Data System (ADS)

    Tan, Mian; Yang, Tinghong; Chen, Xing; Yang, Gang; Zhu, Guoqing; Holme, Petter; Zhao, Jing

    2018-03-01

    Nodes in ad hoc networks are connected in a self-organized manner. Limited communication radius makes information transmit in multi-hop mode, and each forwarding needs to consume the energy of nodes. Insufficient communication radius or exhaustion of energy may cause the absence of some relay nodes and links, further breaking network connectivity. On the other hand, nodes in the network may refuse to cooperate due to objective faulty or personal selfish, hindering regular communication in the network. This paper proposes a model called Repeated Game in Small World Networks (RGSWN). In this model, we first construct ad hoc networks with small-world feature by forming "communication shortcuts" between multiple-radio nodes. Small characteristic path length reduces average forwarding times in networks; meanwhile high clustering coefficient enhances network robustness. Such networks still maintain relative low global power consumption, which is beneficial to extend the network survival time. Then we use MTTFT strategy (Mend-Tolerance Tit-for-Tat) for repeated game as a rule for the interactions between neighbors in the small-world networks. Compared with other five strategies of repeated game, this strategy not only punishes the nodes' selfishness more reasonably, but also has the best tolerance to the network failure. This work is insightful for designing an efficient and robust ad hoc network.

  14. How does creating a concept map affect item-specific encoding?

    PubMed

    Grimaldi, Phillip J; Poston, Laurel; Karpicke, Jeffrey D

    2015-07-01

    Concept mapping has become a popular learning tool. However, the processes underlying the task are poorly understood. In the present study, we examined the effect of creating a concept map on the processing of item-specific information. In 2 experiments, subjects learned categorized or ad hoc word lists by making pleasantness ratings, sorting words into categories, or creating a concept map. Memory was tested using a free recall test and a recognition memory test, which is considered to be especially sensitive to item-specific processing. Typically, tasks that promote item-specific processing enhance free recall of categorized lists, relative to category sorting. Concept mapping resulted in lower recall performance than both the pleasantness rating and category sorting condition for categorized words. Moreover, concept mapping resulted in lower recognition memory performance than the other 2 tasks. These results converge on the conclusion that creating a concept map disrupts the processing of item-specific information. (c) 2015 APA, all rights reserved.

  15. IMSF: Infinite Methodology Set Framework

    NASA Astrophysics Data System (ADS)

    Ota, Martin; Jelínek, Ivan

    Software development is usually an integration task in enterprise environment - few software applications work autonomously now. It is usually a collaboration of heterogeneous and unstable teams. One serious problem is lack of resources, a popular result being outsourcing, ‘body shopping’, and indirectly team and team member fluctuation. Outsourced sub-deliveries easily become black boxes with no clear development method used, which has a negative impact on supportability. Such environments then often face the problems of quality assurance and enterprise know-how management. The used methodology is one of the key factors. Each methodology was created as a generalization of a number of solved projects, and each methodology is thus more or less connected with a set of task types. When the task type is not suitable, it causes problems that usually result in an undocumented ad-hoc solution. This was the motivation behind formalizing a simple process for collaborative software engineering. Infinite Methodology Set Framework (IMSF) defines the ICT business process of adaptive use of methods for classified types of tasks. The article introduces IMSF and briefly comments its meta-model.

  16. A Survey on Trust Management for Mobile Ad Hoc Networks

    DTIC Science & Technology

    2010-07-01

    betrayal of trust. In his comments on Lagerspetz’s book titled Trust: The Tacit Demand, Lahno [24] describes the author’s view on trust as a moral...extension of AODV Zouridaki et al. (2005 ) [79] (2006) [80] Secure routing Direct observation [79][80] Reputation by secondhand information [80...the broad areas of signal processing, wireless communications, sensor and mobile ad hoc networks. He is co-editor of the book Wireless Sensor Networks

  17. Dynamic Data Driven Applications Systems (DDDAS)

    DTIC Science & Technology

    2013-03-06

    INS •  Chip-scale atomic clocks •  Ad hoc networks •  Polymorphic networks •  Agile networks •  Laser communications •  Frequency-agile RF...atomi clocks •  Ad hoc networks •  Polymorphic networks •  Agile networks •  Laser co munications •  Frequency-agile RF systems...Real-Time Doppler Wind Wind field Sensor observations Energy Estimation Atmospheric Models for On-line Planning Planning and Control

  18. Analysis of Soldier Radio Waveform Performance in Operational Test

    DTIC Science & Technology

    2015-05-01

    different frequencies based on carrier, uplink/downlink, and generation. In general, 2G and 3G cellular phones operate at 850 MHz uplink, and 1,900 MHz...spectrum management that may not be operationally feasible. These issues are not unique to SRW, but rather have plagued the mobile ad-hoc network... mobile ad-hoc network (MANET), enabling communication through a self-configuring, infrastructure-less network of mobile nodes. In the SS domain, these

  19. Analytical Models of Cross-Layer Protocol Optimization in Real-Time Wireless Sensor Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    The real-time interactions among the nodes of a wireless sensor network (WSN) to cooperatively process data from multiple sensors are modeled. Quality-of-service (QoS) metrics are associated with the quality of fused information: throughput, delay, packet error rate, etc. Multivariate point process (MVPP) models of discrete random events in WSNs establish stochastic characteristics of optimal cross-layer protocols. Discrete-event, cross-layer interactions in mobile ad hoc network (MANET) protocols have been modeled using a set of concatenated design parameters and associated resource levels by the MVPPs. Characterization of the "best" cross-layer designs for a MANET is formulated by applying the general theory of martingale representations to controlled MVPPs. Performance is described in terms of concatenated protocol parameters and controlled through conditional rates of the MVPPs. Modeling limitations to determination of closed-form solutions versus explicit iterative solutions for ad hoc WSN controls are examined.

  20. Temporal patterns of scientific information-seeking on Google and Wikipedia.

    PubMed

    Segev, Elad; Sharon, Aviv J

    2017-11-01

    In response to the news coverage of scientific events and to science education, people increasingly go online to get more information. This study investigates how patterns of science and technology information-seeking on Google and Wikipedia change over time, in ways that differ between "ad hoc" terms that correspond to news coverage and "cyclic" terms that correspond to the academic period. Findings show that the science and technology activity in Google and Wikipedia was significantly associated with ad hoc and cyclic patterns. While the peak activity in Google and Wikipedia largely overlapped for ad hoc terms, it mismatched for cyclic terms. The findings indicate the importance of external cues such as news media and education, and also of the online engagement process, and particularly the crucial but different role played by Google and Wikipedia in gaining science and technology knowledge. Educators and policy makers could benefit from taking into account those different patterns.

  1. Adaptive MANET multipath routing algorithm based on the simulated annealing approach.

    PubMed

    Kim, Sungwook

    2014-01-01

    Mobile ad hoc network represents a system of wireless mobile nodes that can freely and dynamically self-organize network topologies without any preexisting communication infrastructure. Due to characteristics like temporary topology and absence of centralized authority, routing is one of the major issues in ad hoc networks. In this paper, a new multipath routing scheme is proposed by employing simulated annealing approach. The proposed metaheuristic approach can achieve greater and reciprocal advantages in a hostile dynamic real world network situation. Therefore, the proposed routing scheme is a powerful method for finding an effective solution into the conflict mobile ad hoc network routing problem. Simulation results indicate that the proposed paradigm adapts best to the variation of dynamic network situations. The average remaining energy, network throughput, packet loss probability, and traffic load distribution are improved by about 10%, 10%, 5%, and 10%, respectively, more than the existing schemes.

  2. Hybrid Radio Frequency/Free-Space Optics (RF/FSO) Wireless Sensor Network: Security Concerns and Protective Measures

    NASA Astrophysics Data System (ADS)

    Banerjee, Koushik; Sharma, Hemant; Sengupta, Anasuya

    Wireless sensor networks (WSNs) are ad hoc wireless networks that are written off as spread out structure and ad hoc deployment. Sensor networks have all the rudimentary features of ad hoc networks but to altered points—for instance, considerably lesser movement and far more energy necessities. Commonly used technology for communication is radio frequency (RF) communications. Free-space optics (FSO) is relatively new technology which has the prospective to deliver remarkable increases in network lifetime of WSN. Hybrid RF/FSO communications has been suggested to decrease power consumption by a single sensor node. It is observed that security plays a very important role for either RF WSN or hybrid RF/FSO WSN as those are vulnerable to numerous threats. In this paper, various possible attacks in RF/FSO WSN are discussed and aimed to propose some way out from those attacks.

  3. Design of free patterns of nanocrystals with ad hoc features via templated dewetting

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aouassa, M.; Berbezier, I.; Favre, L.

    Design of monodisperse ultra-small nanocrystals (NCs) into large scale patterns with ad hoc features is demonstrated. The process makes use of solid state dewetting of a thin film templated through alloy liquid metal ion source focused ion beam (LMIS-FIB) nanopatterning. The solid state dewetting initiated at the edges of the patterns controllably creates the ordering of NCs with ad hoc placement and periodicity. The NC size is tuned by varying the nominal thickness of the film while their position results from the association of film retraction from the edges of the lay out and Rayleigh-like instability. The use of ultra-highmore » resolution LMIS-FIB enables to produce monocrystalline NCs with size, periodicity, and placement tunable as well. It provides routes for the free design of nanostructures for generic applications in nanoelectronics.« less

  4. Forming an ad-hoc nearby storage, based on IKAROS and social networking services

    NASA Astrophysics Data System (ADS)

    Filippidis, Christos; Cotronis, Yiannis; Markou, Christos

    2014-06-01

    We present an ad-hoc "nearby" storage, based on IKAROS and social networking services, such as Facebook. By design, IKAROS is capable to increase or decrease the number of nodes of the I/O system instance on the fly, without bringing everything down or losing data. IKAROS is capable to decide the file partition distribution schema, by taking on account requests from the user or an application, as well as a domain or a Virtual Organization policy. In this way, it is possible to form multiple instances of smaller capacity higher bandwidth storage utilities capable to respond in an ad-hoc manner. This approach, focusing on flexibility, can scale both up and down and so can provide more cost effective infrastructures for both large scale and smaller size systems. A set of experiments is performed comparing IKAROS with PVFS2 by using multiple clients requests under HPC IOR benchmark and MPICH2.

  5. ACR-SNM Task Force on Nuclear Medicine Training: report of the task force.

    PubMed

    Guiberteau, Milton J; Graham, Michael M

    2011-06-01

    The expansion of knowledge and technological advances in nuclear medicine and radiology require physicians to have more expertise in functional and anatomic imaging. The convergence of these two specialties into the new discipline of molecular imaging has also begun to place demands on residency training programs for additional instruction in physiology and molecular biology. These changes have unmasked weaknesses in current nuclear medicine and radiology training programs. Adding to the impetus for change are the attendant realities of the job market and uncertain employment prospects for physicians trained in nuclear medicine but not also trained in diagnostic radiology. With this background, the ACR and the Society of Nuclear Medicine convened the Task Force on Nuclear Medicine Training to define the issues and develop recommendations for resident training.

  6. A communication theoretical analysis of FRET-based mobile ad hoc molecular nanonetworks.

    PubMed

    Kuscu, Murat; Akan, Ozgur B

    2014-09-01

    Nanonetworks refer to a group of nanosized machines with very basic operational capabilities communicating to each other in order to accomplish more complex tasks such as in-body drug delivery, or chemical defense. Realizing reliable and high-rate communication between these nanomachines is a fundamental problem for the practicality of these nanonetworks. Recently, we have proposed a molecular communication method based on Förster Resonance Energy Transfer (FRET) which is a nonradiative excited state energy transfer phenomenon observed among fluorescent molecules, i.e., fluorophores. We have modeled the FRET-based communication channel considering the fluorophores as single-molecular immobile nanomachines, and shown its reliability at high rates, and practicality at the current stage of nanotechnology. In this study, for the first time in the literature, we investigate the network of mobile nanomachines communicating through FRET. We introduce two novel mobile molecular nanonetworks: FRET-based mobile molecular sensor/actor nanonetwork (FRET-MSAN) which is a distributed system of mobile fluorophores acting as sensor or actor node; and FRET-based mobile ad hoc molecular nanonetwork (FRET-MAMNET) which consists of fluorophore-based nanotransmitter, nanoreceivers and nanorelays. We model the single message propagation based on birth-death processes with continuous time Markov chains. We evaluate the performance of FRET-MSAN and FRET-MAMNET in terms of successful transmission probability and mean extinction time of the messages, system throughput, channel capacity and achievable communication rates.

  7. NATO Human View Architecture and Human Networks

    NASA Technical Reports Server (NTRS)

    Handley, Holly A. H.; Houston, Nancy P.

    2010-01-01

    The NATO Human View is a system architectural viewpoint that focuses on the human as part of a system. Its purpose is to capture the human requirements and to inform on how the human impacts the system design. The viewpoint contains seven static models that include different aspects of the human element, such as roles, tasks, constraints, training and metrics. It also includes a Human Dynamics component to perform simulations of the human system under design. One of the static models, termed Human Networks, focuses on the human-to-human communication patterns that occur as a result of ad hoc or deliberate team formation, especially teams distributed across space and time. Parameters of human teams that effect system performance can be captured in this model. Human centered aspects of networks, such as differences in operational tempo (sense of urgency), priorities (common goal), and team history (knowledge of the other team members), can be incorporated. The information captured in the Human Network static model can then be included in the Human Dynamics component so that the impact of distributed teams is represented in the simulation. As the NATO militaries transform to a more networked force, the Human View architecture is an important tool that can be used to make recommendations on the proper mix of technological innovations and human interactions.

  8. Low-frequency periodicity in the coordination of progressive handwriting.

    PubMed

    Thomassen, A J; Meulenbroek, R G

    1998-11-01

    The paper addresses the question how the effector segments are coordinated during handwriting, in particular as a function of the left-to-right progression within words. It studies the phase relations between wrist and finger-joint rotations during a repetitive graphic task (long words consisting of letters 'e'), and it subjects the resulting continuous phase-relation plots to autocorrelation analysis. A novel phenomenon, viz. that of low-frequency (1-Hz) periodicity, is observed which presumably reflects adjustments of the coordination pattern about once per second, i.e., after every three or four letters 'e'. Moreover, word length and word position are found to affect this periodicity in a predictable manner. These results are related to those of an earlier study which used an ad-hoc method of analysing wrist-finger coordination adjustments. The paper underlines the value of phase-relation analysis for certain graphic tasks, but it also points out its limitations for this purpose.

  9. Assessing Situational Awareness in Task Force XXI.

    DTIC Science & Technology

    1997-06-01

    information dominance over the enemy and that units equipped with greater situational awareness will fight more successfully than units without the added capability. In an effort to test this hypothesis the Army conducted an Advanced Warfighter Experiment (AWE) which began at Ft. Hood, TX and culminated in a focused rotation at the National Training Center, Ft. Irwin, CA. Although many initiatives in the area of information dominance were tested in the AWE, the centerpiece of the program was a test case unit designated as Task Force Twenty-One (TF

  10. Coverage in Heterogeneous Sensor Networks

    DTIC Science & Technology

    2006-01-01

    and S. Banerjee, “Node Placement for Connected Coverage in Sensor Networks,” in Proceedings of WiOpt ’03, March 2003. [10] F. Koushanfar, S...Meguerdichian, M. Potkonjak, and M. Srivastava, Cov- erage Problems in Wireless Ad-Hoc Sensor Networks, in Proceedings of the IEEE INFOCOM 01, March 2001, pp...Coverage and Connectivity of Ad Hoc Networks in Presence of Channel Randomness,” in Proceedings of the IEEE INFOCOM 05, March 2005, pp. 491–502. [16] S

  11. Secure Mobile Distributed File System (MDFS)

    DTIC Science & Technology

    2011-03-01

    dissemination of data. In a mobile ad - hoc network, there are two classes of devices: content generators and content consumers. One im- plementation of...use of infrastructure mode is necessary because current Android implemen- tations do not support Mobile Ad - Hoc network without modification of the...NUMBER (include area code ) Standard Form 298 (Rev. 8–98) Prescribed by ANSI Std. Z39.18 24–3–2011 Master’s Thesis 2009-03-01—2011-03-31 Secure Mobile

  12. Anomaly Detection for Data Reduction in an Unattended Ground Sensor (UGS) Field

    DTIC Science & Technology

    2014-09-01

    information (shown with solid lines in the diagram). Typically, this would be a mobile ad - hoc network (MANET). The clusters are connected to other nodes...interquartile ranges MANET mobile ad - hoc network OSUS Open Standards for Unattended Sensors TOC tactical operations center UAVs unmanned aerial vehicles...19b. TELEPHONE NUMBER (Include area code ) 301-394-1221 Standard Form 298 (Rev. 8/98) Prescribed by ANSI Std. Z39.18 iii Contents List of

  13. Adaptive Flow Control for Enabling Quality of Service in Tactical Ad Hoc Wireless Networks

    DTIC Science & Technology

    2010-12-01

    environment in wireless networks , we use sensors in the network routers to detect and respond to congestion. We use backpressure techniques... wireless mesh network . In the current approach, we used OLSR as the routing scheme. However, B.A.T.M.A.N. offers the significant advantage of being based...Control and QoS Routing in Multi-Channel Wireless Mesh Networks ,” 68-77. ACM International Symposium on Mobile Ad Hoc Networking &

  14. Capacity-Delay Trade-Off in Collaborative Hybrid Ad-Hoc Networks with Coverage Sensing.

    PubMed

    Chen, Lingyu; Luo, Wenbin; Liu, Chen; Hong, Xuemin; Shi, Jianghong

    2017-01-26

    The integration of ad hoc device-to-device (D2D) communications and open-access small cells can result in a networking paradigm called hybrid the ad hoc network, which is particularly promising in delivering delay-tolerant data. The capacity-delay performance of hybrid ad hoc networks has been studied extensively under a popular framework called scaling law analysis. These studies, however, do not take into account aspects of interference accumulation and queueing delay and, therefore, may lead to over-optimistic results. Moreover, focusing on the average measures, existing works fail to give finer-grained insights into the distribution of delays. This paper proposes an alternative analytical framework based on queueing theoretic models and physical interference models. We apply this framework to study the capacity-delay performance of a collaborative cellular D2D network with coverage sensing and two-hop relay. The new framework allows us to fully characterize the delay distribution in the transform domain and pinpoint the impacts of coverage sensing, user and base station densities, transmit power, user mobility and packet size on the capacity-delay trade-off. We show that under the condition of queueing equilibrium, the maximum throughput capacity per device saturates to an upper bound of 0.7239 λ b / λ u bits/s/Hz, where λ b and λ u are the densities of base stations and mobile users, respectively.

  15. Strategies for generating multiple instances of common and ad hoc categories.

    PubMed

    Vallée-Tourangeau, F; Anthony, S H; Austin, N G

    1998-09-01

    In a free-emission procedure participants were asked to generate instances of a given category and to report, retrospectively, the strategies that they were aware of using in retrieving instances. In two studies reported here, participants generated instances for common categories (e.g. fruit) and for ad hoc categories (e.g., things people keep in their pockets) for 90 seconds and for each category described how they had proceeded in doing so. Analysis of the protocols identified three broad classes of strategy: (1) experiential, where memories of specific or generic personal experiences involving interactions with the category instances acted as cues; (2) semantic, where a consideration of abstract conceptual characteristics of a category were employed to retrieve category exemplars; (3) unmediated, where instances were effortlessly retrieved without mediating cognitions of which subjects were aware. Experiential strategies outnumbered semantic strategies (on average 4 to 1) not only for ad hoc categories but also for common categories. This pattern was noticeably reversed for ad hoc categories that subjects were unlikely to have experienced personally (e.g. things sold on the black market in Russia). Whereas more traditional accounts of semantic memory have favoured decontextualised abstract representations of category knowledge, to the extent that mode of access informs us of knowledge structures, our data suggest that category knowledge is significantly grounded in terms of everyday contexts where category instances are encountered.

  16. Capacity-Delay Trade-Off in Collaborative Hybrid Ad-Hoc Networks with Coverage Sensing

    PubMed Central

    Chen, Lingyu; Luo, Wenbin; Liu, Chen; Hong, Xuemin; Shi, Jianghong

    2017-01-01

    The integration of ad hoc device-to-device (D2D) communications and open-access small cells can result in a networking paradigm called hybrid the ad hoc network, which is particularly promising in delivering delay-tolerant data. The capacity-delay performance of hybrid ad hoc networks has been studied extensively under a popular framework called scaling law analysis. These studies, however, do not take into account aspects of interference accumulation and queueing delay and, therefore, may lead to over-optimistic results. Moreover, focusing on the average measures, existing works fail to give finer-grained insights into the distribution of delays. This paper proposes an alternative analytical framework based on queueing theoretic models and physical interference models. We apply this framework to study the capacity-delay performance of a collaborative cellular D2D network with coverage sensing and two-hop relay. The new framework allows us to fully characterize the delay distribution in the transform domain and pinpoint the impacts of coverage sensing, user and base station densities, transmit power, user mobility and packet size on the capacity-delay trade-off. We show that under the condition of queueing equilibrium, the maximum throughput capacity per device saturates to an upper bound of 0.7239 λb/λu bits/s/Hz, where λb and λu are the densities of base stations and mobile users, respectively. PMID:28134769

  17. Department of Defense Sustainability: Progress and Plans for the Future

    DTIC Science & Technology

    2011-11-02

    Teleworking DoDI (Oct 2010) •Sulfur Hexafluoride Risk Management (Oct 2010) •Integrated Solid Waste Management DoDI (being prepared) •Sustainable Ranges (being...electronically track compliance •Air Force stormwater hydrology  analysis  tool to estimate pre‐ and post‐hydrology IN PROGRESS Teleworking   •Coding employees...as:  ineligible  eligible/regular eligible/ad hoc •Accurately capturing actual time  teleworked – still figuring out the best way Sustainable Planning

  18. Simple Peer-to-Peer SIP Privacy

    NASA Astrophysics Data System (ADS)

    Koskela, Joakim; Tarkoma, Sasu

    In this paper, we introduce a model for enhancing privacy in peer-to-peer communication systems. The model is based on data obfuscation, preventing intermediate nodes from tracking calls, while still utilizing the shared resources of the peer network. This increases security when moving between untrusted, limited and ad-hoc networks, when the user is forced to rely on peer-to-peer schemes. The model is evaluated using a Host Identity Protocol-based prototype on mobile devices, and is found to provide good privacy, especially when combined with a source address hiding scheme. The contribution of this paper is to present the model and results obtained from its use, including usability considerations.

  19. The Time-Course of Sentence Meaning Composition. N400 Effects of the Interaction between Context-Induced and Lexically Stored Affordances

    PubMed Central

    Cosentino, Erica; Baggio, Giosuè; Kontinen, Jarmo; Werning, Markus

    2017-01-01

    Contemporary semantic theories can be classified along two dimensions: (i) the way and time-course in which contextual factors influence sentence truth-conditions; and (ii) whether and to what extent comprehension involves sensory, motor and emotional processes. In order to explore this theoretical space, our ERP study investigates the time-course of the interaction between the lexically specified telic component of a noun (the function of the object to which the noun refers to, e.g., a funnel is generally used to pour liquids into containers) and an ad-hoc affordance contextually induced by the situation described in the discourse. We found that, if preceded by a neutral discourse context, a verb incongruent with the noun's telic component as in “She uses the funnel to hang her coat” elicited an enhanced N400 compared to a congruent verb as in “She uses the funnel to pour water into a container.” However, if the situation introduced in the preceding discourse induced a new function for the object as an ad-hoc affordance (e.g., the funnel is glued to the wall and the agent wants to hang the coat), we observed a crossing-over regarding the direction of the N400 effect: comparing the ad-hoc affordance-inducing context with the neutral context, the N400 for the incongruent verb was significantly reduced, whereas the N400 for the congruent verb was significantly enhanced. We explain these results as a consequence of the incorporation of the contextually triggered ad-hoc affordance into the meaning of the noun. Combining these results with an analysis of semantic similarity values between test sentences and contexts, we argue that one possibility is that the incorporation of an ad-hoc affordance may be explained on the basis of the mental simulation of concurrent motor information. PMID:28603506

  20. The Time-Course of Sentence Meaning Composition. N400 Effects of the Interaction between Context-Induced and Lexically Stored Affordances.

    PubMed

    Cosentino, Erica; Baggio, Giosuè; Kontinen, Jarmo; Werning, Markus

    2017-01-01

    Contemporary semantic theories can be classified along two dimensions: (i) the way and time-course in which contextual factors influence sentence truth-conditions; and (ii) whether and to what extent comprehension involves sensory, motor and emotional processes. In order to explore this theoretical space, our ERP study investigates the time-course of the interaction between the lexically specified telic component of a noun (the function of the object to which the noun refers to, e.g., a funnel is generally used to pour liquids into containers) and an ad-hoc affordance contextually induced by the situation described in the discourse. We found that, if preceded by a neutral discourse context, a verb incongruent with the noun's telic component as in "She uses the funnel to hang her coat" elicited an enhanced N400 compared to a congruent verb as in "She uses the funnel to pour water into a container." However, if the situation introduced in the preceding discourse induced a new function for the object as an ad-hoc affordance (e.g., the funnel is glued to the wall and the agent wants to hang the coat), we observed a crossing-over regarding the direction of the N400 effect: comparing the ad-hoc affordance-inducing context with the neutral context, the N400 for the incongruent verb was significantly reduced, whereas the N400 for the congruent verb was significantly enhanced. We explain these results as a consequence of the incorporation of the contextually triggered ad-hoc affordance into the meaning of the noun. Combining these results with an analysis of semantic similarity values between test sentences and contexts, we argue that one possibility is that the incorporation of an ad-hoc affordance may be explained on the basis of the mental simulation of concurrent motor information.

  1. Ad hoc instrumentation methods in ecological studies produce highly biased temperature measurements

    USGS Publications Warehouse

    Terando, Adam J.; Youngsteadt, Elsa; Meineke, Emily K.; Prado, Sara G.

    2017-01-01

    In light of global climate change, ecological studies increasingly address effects of temperature on organisms and ecosystems. To measure air temperature at biologically relevant scales in the field, ecologists often use small, portable temperature sensors. Sensors must be shielded from solar radiation to provide accurate temperature measurements, but our review of 18 years of ecological literature indicates that shielding practices vary across studies (when reported at all), and that ecologists often invent and construct ad hoc radiation shields without testing their efficacy. We performed two field experiments to examine the accuracy of temperature observations from three commonly used portable data loggers (HOBO Pro, HOBO Pendant, and iButton hygrochron) housed in manufactured Gill shields or ad hoc, custom‐fabricated shields constructed from everyday materials such as plastic cups. We installed this sensor array (five replicates of 11 sensor‐shield combinations) at weather stations located in open and forested sites. HOBO Pro sensors with Gill shields were the most accurate devices, with a mean absolute error of 0.2°C relative to weather stations at each site. Error in ad hoc shield treatments ranged from 0.8 to 3.0°C, with the largest errors at the open site. We then deployed one replicate of each sensor‐shield combination at five sites that varied in the amount of urban impervious surface cover, which presents a further shielding challenge. Bias in sensors paired with ad hoc shields increased by up to 0.7°C for every 10% increase in impervious surface. Our results indicate that, due to variable shielding practices, the ecological literature likely includes highly biased temperature data that cannot be compared directly across studies. If left unaddressed, these errors will hinder efforts to predict biological responses to climate change. We call for greater standardization in how temperature data are recorded in the field, handled in analyses, and reported in publications.

  2. Ad-hoc and context-dependent adjustments of selective attention in conflict control: an ERP study with visual probes.

    PubMed

    Nigbur, R; Schneider, J; Sommer, W; Dimigen, O; Stürmer, B

    2015-02-15

    Cognitive conflict control in flanker tasks has often been described using the zoom-lens metaphor of selective attention. However, whether and how selective attention - in terms of suppression and enhancement - operates in this context has remained unclear. To examine the dynamic interplay of selective attention and cognitive control we used electrophysiological measures and presented task-irrelevant visual probe stimuli at foveal, parafoveal, and peripheral display positions. Target-flanker congruency varied either randomly from trial to trial (mixed-block) or block-wise (fixed-block) in order to induce reactive versus proactive control modes, respectively. Three EEG measures were used to capture ad-hoc adjustments within trials as well as effects of context-based predictions: the N1 component of the visual evoked potential (VEP) to probes, the VEP to targets, and the conflict-related midfrontal N2 component. Results from probe-VEPs indicate that enhanced processing of the foveal target rather than suppression of the peripheral flankers supports interference control. In incongruent mixed-block trials VEPs were larger to probes near the targets. In the fixed-blocks probe-VEPs were not modulated, but contrary to the mixed-block the preceding target-related VEP was affected by congruency. Results of the control-related N2 reveal largest amplitudes in the unpredictable context, which did not differentiate for stimulus and response incongruency. In contrast, in the predictable context, N2 amplitudes were reduced overall and differentiated between stimulus and response incongruency. Taken together these results imply that predictability alters interference control by a reconfiguration of stimulus processing. During unpredictable sequences participants adjust their attentional focus dynamically on a trial-by-trial basis as reflected in congruency-dependent probe-VEP-modulation. This reactive control mode also elicits larger N2 amplitudes. In contrast, when task demands are predictable, participants focus selective attention earlier as reflected in the target-related VEPs. This proactive control mode leads to smaller N2 amplitudes and absent probe effects. Copyright © 2014 Elsevier Inc. All rights reserved.

  3. Trust Management in Mobile Ad Hoc Networks for Bias Minimization and Application Performance Maximization

    DTIC Science & Technology

    2014-02-26

    set of anomaly detection rules 62 I.-R. Chen et al. / Ad Hoc Networks 19 (2014) 59–74 Author’s personal copy including the interval rule (for...deficiencies in anomaly detection (e.g., imperfection of rules) by a false negative probability (PHfn) of misidentifying an unhealthy node as a...multimedia servers, Multimedia Syst. 8 (2) (2000) 83–91. [53] R. Mitchell, I.R. Chen, Adaptive intrusion detection for unmanned aircraft systems based on

  4. Hearings before the Ad Hoc Committee on Maritime Education and Training of the Committee on Merchant Marine and Fisheries, Ninety-Third Congress; Second Session on Officer Requirements, and Session on Maritime Education Regarding Safety at Sea. Serial No. 93-44.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. House Committee on Merchant Marine and Fisheries.

    The publication consists of Congressional hearings before the Ad Hoc Committee on Maritime Education and Training: (1) June 26, 1974 hearing pertaining to officer requirements and (2) November 19, 1974 hearing on maritime education regarding safety at sea. Estimated cost per graduate for the U. S. Merchant Marine 1973 class was $31,100. Supply and…

  5. Mapping Ad Hoc Communications Network of a Large Number Fixed-Wing UAV Swarm

    DTIC Science & Technology

    2017-03-01

    partitioned sub-swarms. The work covered in this thesis is to build a model of the NPS swarm’s communication network in ns-3 simulation software and use...partitioned sub- swarms. The work covered in this thesis is to build a model of the NPS swarm’s communication network in ns-3 simulation software and...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS MAPPING AD HOC COMMUNICATIONS NETWORK OF A LARGE NUMBER FIXED-WING UAV SWARM by Alexis

  6. Use of synthesized data to support complex ad-hoc queries in an enterprise information warehouse: a diabetes use case.

    PubMed

    Rogers, Patrick; Erdal, Selnur; Santangelo, Jennifer; Liu, Jianhua; Schuster, Dara; Kamal, Jyoti

    2008-11-06

    The Ohio State University Medical Center (OSUMC) Information Warehouse (IW) is a comprehensive data warehousing facility incorporating operational, clinical, and biological data sets from multiple enterprise system. It is common for users of the IW to request complex ad-hoc queries that often require significant intervention by data analyst. In response to this challenge, we have designed a workflow that leverages synthesized data elements to support such queries in an more timely, efficient manner.

  7. GAPR2: A DTN Routing Protocol for Communications in Challenged, Degraded, and Denied Environments

    DTIC Science & Technology

    2015-09-01

    Transmission Speed Vs. Latency Figure 4.7: Helsinki Simulation Set 2, High Network Load and Small Buffers Analysis of Delivery Ratio in Helsinki Simulation...ipnsig.org/. [17] MANET routing, class notes for CS4554: Network modeling and analysis . 119 [18] S. Basagni et al. Mobile ad hoc networking . John...Wiley & Sons, 2004. [19] E. Royer et al. A review of current routing protocols for ad hoc mobile wireless networks . Personal Communications, IEEE, 6(2

  8. Ad Hoc Conference on the Education of Migrants: Introductory Report on Theme I, "The Position of the Immigrant and His Family on Arrival in the Host Country" (Strasbourg, France, November 5-8, 1974).

    ERIC Educational Resources Information Center

    Morin, Emma

    Theme I of the Ad Hoc Conference on the Education of Migrants was "measures to improve the position of the immigrant and his family at the time of arrival in the host country (including measures taken in the sending country on behalf of those intending to emigrate), primarily in respect of their educational circumstances". This report…

  9. Impact of cognitive task on the posture of elderly subjects with Alzheimer's disease compared to healthy elderly subjects.

    PubMed

    Manckoundia, Patrick; Pfitzenmeyer, Pierre; d'Athis, Philippe; Dubost, Véronique; Mourey, France

    2006-02-01

    The aims of this study were to analyze the effects of cognitive task on static posture in Alzheimer's disease (AD) and in healthy elderly (HE) subjects and to evaluate whether those effects were greater in AD subjects than in HE subjects. We performed a posturographic analysis on 13 subjects with mild AD (mean age, 79.7+/-5.1 years, Mini-Mental State Examination scores between 18 and 23) and on 17 HE subjects (mean age, 78.5+/-4.4 years). After watching a video sequence, the subjects were asked to maintain a stable upright posture while standing on a force platform. Then, the postural sway was measured during the following two conditions: (1) quiet standing and (2) both standing and answering questions about the video sequence. We were interested in the center of pressure (CoP) area and path. For each group, the single task was compared to the dual task for the CoP area and path. We also compared the variability of both CoP area (variation of the CoP area between the single and the dual task) and path (variation of the CoP path between the single and the dual task) between the two groups. We showed that there was no significant difference between the single and the dual task in HE subjects concerning the CoP area and path, in contrast to the AD group, and that variability of both the CoP area and path were significantly greater in the AD subjects than in the HE subjects. This finding may contribute to the risk of falls in AD patients. Copyright (c) 2005 Movement Disorder Society.

  10. Requiem for the max rule?

    PubMed Central

    Ma, Wei Ji; Shen, Shan; Dziugaite, Gintare; van den Berg, Ronald

    2015-01-01

    In tasks such as visual search and change detection, a key question is how observers integrate noisy measurements from multiple locations to make a decision. Decision rules proposed to model this process haven fallen into two categories: Bayes-optimal (ideal observer) rules and ad-hoc rules. Among the latter, the maximum-of-outputs (max) rule has been most prominent. Reviewing recent work and performing new model comparisons across a range of paradigms, we find that in all cases except for one, the optimal rule describes human data as well as or better than every max rule either previously proposed or newly introduced here. This casts doubt on the utility of the max rule for understanding perceptual decision-making. PMID:25584425

  11. Transactive memory in organizational groups: the effects of content, consensus, specialization, and accuracy on group performance.

    PubMed

    Austin, John R

    2003-10-01

    Previous research on transactive memory has found a positive relationship between transactive memory system development and group performance in single project laboratory and ad hoc groups. Closely related research on shared mental models and expertise recognition supports these findings. In this study, the author examined the relationship between transactive memory systems and performance in mature, continuing groups. A group's transactive memory system, measured as a combination of knowledge stock, knowledge specialization, transactive memory consensus, and transactive memory accuracy, is positively related to group goal performance, external group evaluations, and internal group evaluations. The positive relationship with group performance was found to hold for both task and external relationship transactive memory systems.

  12. Experimental and numerical analysis of clamped joints in front motorbike suspensions

    NASA Astrophysics Data System (ADS)

    Croccolo, D.; de Agostinis, M.; Vincenzi, N.

    2010-06-01

    Clamped joints are shaft-hub connections used, as an instance, in front motorbike suspensions to lock the steering plates with the legs and the legs with the wheel pin, by means of one or two bolts. The preloading force, produced during the tightening process, should be evaluated accurately, since it must lock safely the shaft, without overcoming the yielding point of the hub. Firstly, friction coefficients have been evaluated on “ad-hoc designed” specimens, by applying the Design of Experiment approach: the applied tightening torque has been precisely related to the imposed preloading force. Then, the tensile state of clamps have been evaluated both via FEM and by leveraging some design formulae proposed by the Authors as function of the preloading force and of the clamp geometry. Finally, the results have been compared to those given by some strain gauges applied on the tested clamps: the discrepancies between numerical analyses, the design formulae and the experimental results remains under a threshold of 10%.

  13. Supporting Dynamic Ad hoc Collaboration Capabilities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Agarwal, Deborah A.; Berket, Karlo

    2003-07-14

    Modern HENP experiments such as CMS and Atlas involve as many as 2000 collaborators around the world. Collaborations this large will be unable to meet often enough to support working closely together. Many of the tools currently available for collaboration focus on heavy-weight applications such as videoconferencing tools. While these are important, there is a more basic need for tools that support connecting physicists to work together on an ad hoc or continuous basis. Tools that support the day-to-day connectivity and underlying needs of a group of collaborators are important for providing light-weight, non-intrusive, and flexible ways to work collaboratively.more » Some example tools include messaging, file-sharing, and shared plot viewers. An important component of the environment is a scalable underlying communication framework. In this paper we will describe our current progress on building a dynamic and ad hoc collaboration environment and our vision for its evolution into a HENP collaboration environment.« less

  14. Adaptive Reliable Routing Protocol Using Combined Link Stability Estimation for Mobile Ad hoc Networks

    NASA Astrophysics Data System (ADS)

    Vadivel, R.; Bhaskaran, V. Murali

    2010-10-01

    The main reason for packet loss in ad hoc networks is the link failure or node failure. In order to increase the path stability, it is essential to distinguish and moderate the failures. By knowing individual link stability along a path, path stability can be identified. In this paper, we develop an adaptive reliable routing protocol using combined link stability estimation for mobile ad hoc networks. The main objective of this protocol is to determine a Quality of Service (QoS) path along with prolonging the network life time and to reduce the packet loss. We calculate a combined metric for a path based on the parameters Link Expiration Time, Node Remaining Energy and Node Velocity and received signal strength to predict the link stability or lifetime. Then, a bypass route is established to retransmit the lost data, when a link failure occurs. By simulation results, we show that the proposed reliable routing protocol achieves high delivery ratio with reduced delay and packet drop.

  15. An Optimal CDS Construction Algorithm with Activity Scheduling in Ad Hoc Networks

    PubMed Central

    Penumalli, Chakradhar; Palanichamy, Yogesh

    2015-01-01

    A new energy efficient optimal Connected Dominating Set (CDS) algorithm with activity scheduling for mobile ad hoc networks (MANETs) is proposed. This algorithm achieves energy efficiency by minimizing the Broadcast Storm Problem [BSP] and at the same time considering the node's remaining energy. The Connected Dominating Set is widely used as a virtual backbone or spine in mobile ad hoc networks [MANETs] or Wireless Sensor Networks [WSN]. The CDS of a graph representing a network has a significant impact on an efficient design of routing protocol in wireless networks. Here the CDS is a distributed algorithm with activity scheduling based on unit disk graph [UDG]. The node's mobility and residual energy (RE) are considered as parameters in the construction of stable optimal energy efficient CDS. The performance is evaluated at various node densities, various transmission ranges, and mobility rates. The theoretical analysis and simulation results of this algorithm are also presented which yield better results. PMID:26221627

  16. On knowledge transfer management as a learning process for ad hoc teams

    NASA Astrophysics Data System (ADS)

    Iliescu, D.

    2017-08-01

    Knowledge management represents an emerging domain becoming more and more important. Concepts like knowledge codification and personalisation, knowledge life-cycle, social and technological dimensions, knowledge transfer and learning management are integral parts. Focus goes here in the process of knowledge transfer for the case of ad hoc teams. The social dimension of knowledge transfer plays an important role. No single individual actors involved in the process, but a collective one, representing the organisation. It is critically important for knowledge to be managed from the life-cycle point of view. A complex communication network needs to be in place to supports the process of knowledge transfer. Two particular concepts, the bridge tie and transactive memory, would eventually enhance the communication. The paper focuses on an informational communication platform supporting the collaborative work on knowledge transfer. The platform facilitates the creation of a topic language to be used in knowledge modelling, storage and reuse, by the ad hoc teams.

  17. Evaluation and development the routing protocol of a fully functional simulation environment for VANETs

    NASA Astrophysics Data System (ADS)

    Ali, Azhar Tareq; Warip, Mohd Nazri Mohd; Yaakob, Naimah; Abduljabbar, Waleed Khalid; Atta, Abdu Mohammed Ali

    2017-11-01

    Vehicular Ad-hoc Networks (VANETs) is an area of wireless technologies that is attracting a great deal of interest. There are still several areas of VANETS, such as security and routing protocols, medium access control, that lack large amounts of research. There is also a lack of freely available simulators that can quickly and accurately simulate VANETs. The main goal of this paper is to develop a freely available VANETS simulator and to evaluate popular mobile ad-hoc network routing protocols in several VANETS scenarios. The VANETS simulator consisted of a network simulator, traffic (mobility simulator) and used a client-server application to keep the two simulators in sync. The VANETS simulator also models buildings to create a more realistic wireless network environment. Ad-Hoc Distance Vector routing (AODV), Dynamic Source Routing (DSR) and Dynamic MANET On-demand (DYMO) were initially simulated in a city, country, and highway environment to provide an overall evaluation.

  18. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, Dr. Li; Cui, Xiaohui; Cemerlic, Alma

    Ad hoc networks are very helpful in situations when no fixed network infrastructure is available, such as natural disasters and military conflicts. In such a network, all wireless nodes are equal peers simultaneously serving as both senders and routers for other nodes. Therefore, how to route packets through reliable paths becomes a fundamental problems when behaviors of certain nodes deviate from wireless ad hoc routing protocols. We proposed a novel Dirichlet reputation model based on Bayesian inference theory which evaluates reliability of each node in terms of packet delivery. Our system offers a way to predict and select a reliablemore » path through combination of first-hand observation and second-hand reputation reports. We also proposed moving window mechanism which helps to adjust ours responsiveness of our system to changes of node behaviors. We integrated the Dirichlet reputation into routing protocol of wireless ad hoc networks. Our extensive simulation indicates that our proposed reputation system can improve good throughput of the network and reduce negative impacts caused by misbehaving nodes.« less

  19. Sputnik: ad hoc distributed computation.

    PubMed

    Völkel, Gunnar; Lausser, Ludwig; Schmid, Florian; Kraus, Johann M; Kestler, Hans A

    2015-04-15

    In bioinformatic applications, computationally demanding algorithms are often parallelized to speed up computation. Nevertheless, setting up computational environments for distributed computation is often tedious. Aim of this project were the lightweight ad hoc set up and fault-tolerant computation requiring only a Java runtime, no administrator rights, while utilizing all CPU cores most effectively. The Sputnik framework provides ad hoc distributed computation on the Java Virtual Machine which uses all supplied CPU cores fully. It provides a graphical user interface for deployment setup and a web user interface displaying the current status of current computation jobs. Neither a permanent setup nor administrator privileges are required. We demonstrate the utility of our approach on feature selection of microarray data. The Sputnik framework is available on Github http://github.com/sysbio-bioinf/sputnik under the Eclipse Public License. hkestler@fli-leibniz.de or hans.kestler@uni-ulm.de Supplementary data are available at Bioinformatics online. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  20. A multihop key agreement scheme for wireless ad hoc networks based on channel characteristics.

    PubMed

    Hao, Zhuo; Zhong, Sheng; Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks.

  1. Modern foreign language teachers - don't leave those kids alone! Linguistic-cultural "give and take" in an ad-hoc tutoring scheme

    NASA Astrophysics Data System (ADS)

    Leroy, Norah

    2017-08-01

    This paper addresses the theme of social inclusion through language learning. The focus is on an ad-hoc tutoring scheme set up between newly arrived British migrant pupils and French monolingual pupils in a small secondary school in the south-west of France. Though the original objective of this tutoring scheme was to improve the English skills of the younger pupils, feedback reports indicated that it also had a positive impact on the relationship between the British migrant pupils and their French peers. Teachers believed that those involved participated more fully in class, and appeared more self-assured and generally happy thanks to the interpersonal relationships this scheme helped to forge. This study demonstrates the necessity of analysing the socio-cultural context migrants may find themselves in, in order to identify potential challenges. The ad-hoc tutoring scheme described here is an example of how language learning can support the integration and inclusion of "new generation" migrants into everyday school life.

  2. Performance Evaluation of AODV with Blackhole Attack

    NASA Astrophysics Data System (ADS)

    Dara, Karuna

    2010-11-01

    A Mobile Ad Hoc Network (MANET) is a temporary network set up by a wireless mobile computers moving arbitrary in the places that have no network infrastructure. These nodes maintain connectivity in a decentralized manner. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, mobile ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper, we simulated the black hole attack in various mobile ad-hoc network scenarios using AODV routing protocol of MANET and have tried to find a effect if number of nodes are increased with increase in malicious nodes.

  3. A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics

    PubMed Central

    Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks. PMID:23766725

  4. 76 FR 70984 - National Assessment Governing Board; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-16

    ... be discussed/disclosed in an open meeting. Premature disclosure of these secure test items and... Education, National Assessment Governing Board. ACTION: Notice of Open and Closed Meeting Sessions. SUMMARY... Hoc, Assessment Development, and Executive Committee. Meetings Ad Hoc Committee: Open Session: 8:30 a...

  5. Organizational culture during the accident response process

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shurberg, D.A.; Haber, S.B.

    1992-01-01

    The ability of an organization to effectively move from an anticipatory to an ad hoc strategy may well depend on the organization having the ability to balance these two apparently dichotomous cultural styles. The organization which is most capable of making the necessary transition in an optimal manner may well exhibit some aspects of both cultural styles during normal operations. Data collected at one NPP does exhibit this pattern of results, with the organization exhibiting a clear hierarchical chain of command and perceived conventional behavioral expectations as well as exhibiting a more decentralized and collegial approach to decisionmaking, a teammore » work orientation, and informal communications. Thus, it is expected that this organization possesses the capabilities to make a successful transition from an anticipatory to an ad hoc strategy. Data collected at a second NPP more strongly exhibits the traditional style suggested as being important during the anticipatory strategy, with more formal communications and bureaucratically controlled decision-making. This organization may experience difficulty if faced with the need to make a transition from an anticipatory to an ad hoc strategy. These conclusions are further validated based on observation of Emergency Preparedness Exercise Inspections, which suggest that the more anticipatory types of behaviors actually inhibit successful performance during an ad hoc response. The final validation of these hypotheses needs to be demonstrated with cultural data collected during emergency simulations. The mechanism to obtain such data during these types of situations is an area for future research.« less

  6. Organizational culture during the accident response process

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shurberg, D.A.; Haber, S.B.

    1992-08-01

    The ability of an organization to effectively move from an anticipatory to an ad hoc strategy may well depend on the organization having the ability to balance these two apparently dichotomous cultural styles. The organization which is most capable of making the necessary transition in an optimal manner may well exhibit some aspects of both cultural styles during normal operations. Data collected at one NPP does exhibit this pattern of results, with the organization exhibiting a clear hierarchical chain of command and perceived conventional behavioral expectations as well as exhibiting a more decentralized and collegial approach to decisionmaking, a teammore » work orientation, and informal communications. Thus, it is expected that this organization possesses the capabilities to make a successful transition from an anticipatory to an ad hoc strategy. Data collected at a second NPP more strongly exhibits the traditional style suggested as being important during the anticipatory strategy, with more formal communications and bureaucratically controlled decision-making. This organization may experience difficulty if faced with the need to make a transition from an anticipatory to an ad hoc strategy. These conclusions are further validated based on observation of Emergency Preparedness Exercise Inspections, which suggest that the more anticipatory types of behaviors actually inhibit successful performance during an ad hoc response. The final validation of these hypotheses needs to be demonstrated with cultural data collected during emergency simulations. The mechanism to obtain such data during these types of situations is an area for future research.« less

  7. Ad hoc supervision of general practice registrars as a 'community of practice': analysis, interpretation and re-presentation.

    PubMed

    Clement, T; Brown, J; Morrison, J; Nestel, D

    2016-05-01

    General practice registrars in Australia undertake most of their vocational training in accredited general practices. They typically see patients alone from the start of their community-based training and are expected to seek timely ad hoc support from their supervisor. Such ad hoc encounters are a mechanism for ensuring patient safety, but also provide an opportunity for learning and teaching. Wenger's (Communities of practice: learning, meaning, and identity. Cambridge University Press, New York, 1998) social theory of learning ('communities of practice') guided a secondary analysis of audio-recordings of ad hoc encounters. Data from one encounter is re-presented as an extended sequence to maintain congruence with the theoretical perspective and enhance vicariousness. An interpretive commentary communicates key features of Wenger's theory and highlights the researchers' interpretations. We argue that one encounter can reveal universal understandings of clinical supervision and that the process of naturalistic generalisation allows readers to transfer others' experiences to their own contexts. The paper raises significant analytic, interpretive, and representational issues. We highlight that report writing is an important, but infrequently discussed, part of research design. We discuss the challenges of supporting the learning and teaching that arises from adopting a socio-cultural lens and argue that such a perspective importantly captures the complex range of issues that work-based practitioners have to grapple with. This offers a challenge to how we research and seek to influence work-based learning and teaching in health care settings.

  8. Wireless Sensor Network Quality of Service Improvement on Flooding Attack Condition

    NASA Astrophysics Data System (ADS)

    Hartono, R.; Widyawan; Wibowo, S. B.; Purnomo, A.; Hartatik

    2018-03-01

    There are two methods of building communication using wireless media. The first method is building a base infrastructure as an intermediary between users. Problems that arise on this type of network infrastructure is limited space to build any network physical infrastructure and also the cost factor. The second method is to build an ad hoc network between users who will communicate. On ad hoc network, each user must be willing to send data from source to destination for the occurrence of a communication. One of network protocol in Ad Hoc, Ad hoc on demand Distance Vector (AODV), has the smallest overhead value, easier to adapt to dynamic network and has small control message. One AODV protocol’s drawback is route finding process’ security for sending the data. In this research, AODV protocol is optimized by determining Expanding Ring Search (ERS) best value. Random topology is used with variation in the number of nodes: 25, 50, 75, 100, 125 and 150 with node’s speed of 10m/s in the area of 1000m x 1000m on flooding network condition. Parameters measured are Throughput, Packet Delivery Ratio, Average Delay and Normalized Routing Load. From the test results of AODV protocol optimization with best value of Expanding Ring Search (ERS), throughput increased by 5.67%, packet delivery ratio increased by 5.73%, and as for Normalized Routing Load decreased by 4.66%. ERS optimal value for each node’s condition depending on the number of nodes on the network.

  9. Alzheimer's disease can spare local metacognition despite global anosognosia: revisiting the confidence-accuracy relationship in episodic memory.

    PubMed

    Gallo, David A; Cramer, Stefanie J; Wong, Jessica T; Bennett, David A

    2012-07-01

    Alzheimer's disease (AD) can impair metacognition in addition to more basic cognitive functions like memory. However, while global metacognitive inaccuracies are well documented (i.e., low deficit awareness, or anosognosia), the evidence is mixed regarding the effects of AD on local or task-based metacognitive judgments. Here we investigated local metacognition with respect to the confidence-accuracy relationship in episodic memory (i.e., metamemory). AD and control participants studied pictures of common objects and their verbal labels, and then took forced-choice picture recollection tests using the verbal labels as retrieval cues. We found that item-based confidence judgments discriminated between accurate and inaccurate recollection responses in both groups, implicating relatively spared metamemory in AD. By contrast, there was evidence for global metacognitive deficiencies, as AD participants underestimated the severity of their everyday problems compared to an informant's assessment. Within the AD group, individual differences in global metacognition were related to recollection accuracy, and global metacognition for everyday memory problems was related to task-based metacognitive accuracy. These findings suggest that AD can spare the confidence-accuracy relationship in recollection tasks, and that global and local metacognition measures tap overlapping neuropsychological processes. Copyright © 2012 Elsevier Ltd. All rights reserved.

  10. Sensor Data Distribution With Robustness and Reliability: Toward Distributed Components Model

    NASA Technical Reports Server (NTRS)

    Alena, Richard L.; Lee, Charles

    2005-01-01

    In planetary surface exploration mission, sensor data distribution is required in many aspects, for example, in navigation, scheduling, planning, monitoring, diagnostics, and automation of the field tasks. The challenge is to distribute such data in the robust and reliable way so that we can minimize the errors caused by miscalculations, and misjudgments that based on the error data input in the mission. The ad-hoc wireless network on planetary surface is not constantly connected because of the nature of the rough terrain and lack of permanent establishments on the surface. There are some disconnected moments that the computation nodes will re-associate with different repeaters or access points until connections are reestablished. Such a nature requires our sensor data distribution software robust and reliable with ability to tolerant disconnected moments. This paper presents a distributed components model as a framework to accomplish such tasks. The software is written in Java and utilized the available Java Message Services schema and the Boss implementation. The results of field experimentations show that the model is very effective in completing the tasks.

  11. Influence of Thermal Contact Resistance of Aluminum Foams in Forced Convection: Experimental Analysis

    PubMed Central

    Venettacci, Simone

    2017-01-01

    In this paper, the heat transfer performances of aluminum metal foams, placed on horizontal plane surface, was evaluated in forced convection conditions. Three different types of contacts between the sample and the heated base plate have been investigated: simple contact, brazed contact and grease paste contact. First, in order to perform the study, an ad hoc experimental set-up was built. Second, the value of thermal contact resistance was estimated. The results show that both the use of a conductive paste and the brazing contact, realized by means of a copper electro-deposition, allows a great reduction of the global thermal resistance, increasing de facto the global heat transfer coefficient of almost 80%, compared to the simple contact case. Finally, it was shown that, while the contribution of thermal resistance is negligible for the cases of brazed and grease paste contact, it is significantly high for the case of simple contact. PMID:28783052

  12. The development of contact force construction in the dynamic-contact task of cycling [corrected].

    PubMed

    Brown, Nicholas A T; Jensen, Jody L

    2003-01-01

    Purposeful movement requires that an individual produce appropriate joint torques to accelerate segments, and when environmental contact is involved, to develop task-appropriate contact forces. Developmental research has been confined largely to the mastery of unconstrained movement skills (pointing, kicking). The purpose of this study was to study the developmental progression that characterizes the interaction of muscular and non-muscular forces in tasks constrained by contact with the environment. Seven younger children (YC, 6-8 years), 7 older children (OC, 9-11 years) and 7 adults (AD) pedaled an ergometer (80 rpm) at an anthropometrically scaled cycling power. Resultant forces measured at the pedal's surface were decomposed into muscle, inertia and gravity components. Muscle pedal forces were further examined in terms of the underlying lower extremity joint torques and kinematic weights that constitute the muscular component of the pedal force. Data showed children applied muscle forces to the pedal in a significantly different manner compared to adults, and that this was due to the children's lower segmental mass and inertia. The children adjusted the contribution of the proximal joint muscle torques to compensate for reduced contributions to the resultant pedal force by gravitational and inertial components. These data show that smaller segmental mass and inertia limit younger children's ability to construct the dynamic-contact task of cycling in an adult-like form. On the basis of these results, however, the children's response was not "immature". Rather, the results show a task-appropriate adaptation to lower segmental mass and inertia. Copyright 2002 Elsevier Science Ltd.

  13. Ad Hoc Networking for Unmanned Ground Vehicles: Design and Evaluation at Command, Control, Communications, Intelligence, Surveillance and Reconnaissance On-the-Move

    DTIC Science & Technology

    2006-11-01

    software components used in the ad hoc nodes for the C4ISR OTM experiment were OLSRD, an open-source proactive MANET routing software, and OpenVPN , an...developed by Mike Baker (openwrt.org). 6OpenVPN is a trademark of OpenVPN Solutions LLC. 6 Secure communications in the MANET are achieved with...encryption provided by Wired Equivalent Privacy (WEP) and OpenVPN . The WEP protocol, which is part of the IEEE 802.11 wireless networking standard

  14. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  15. Panel Discussion : Report of the APS Ad-Hoc Committee on LGBT Issues

    NASA Astrophysics Data System (ADS)

    Atherton, Tim; Barthelemy, Ramon; Garmon, Savannah; Reeves, Kyle; APS Ad-Hoc Committee on LGBT Issues Team

    Following the presentation of the findings and recommendations of the APS Ad-Hoc Committee on LGBT Issues (C-LGBT) by Committee Chair Michael Falk, a panel discussion will be held featuring several members of the committee. The discussion will focus on how APS can best ensure the recommendations of the committee are carried out in a timely fashion and other ideas on future APS efforts toward LGBT inclusion in physics. Discussion topics will also include the research and other input that shaped the committee's findings and recommendations.

  16. Mathematical representation of joint time-chroma distributions

    NASA Astrophysics Data System (ADS)

    Wakefield, Gregory H.

    1999-11-01

    Originally coined by the sensory psychologist Roger Shepard in the 1960s, chroma transforms frequency into octave equivalence classes. By extending the concept of chroma to chroma strength and how it varies over time, we have demonstrated the utility of chroma in simplifying the processing and representation of signals dominated by harmonically-related narrowband components. These investigations have utilized an ad hoc procedure for calculating the chromagram from a given time-frequency distribution. The present paper is intended to put this ad hoc procedure on more sound mathematical ground.

  17. Deep Potential Molecular Dynamics: A Scalable Model with the Accuracy of Quantum Mechanics

    NASA Astrophysics Data System (ADS)

    Zhang, Linfeng; Han, Jiequn; Wang, Han; Car, Roberto; E, Weinan

    2018-04-01

    We introduce a scheme for molecular simulations, the deep potential molecular dynamics (DPMD) method, based on a many-body potential and interatomic forces generated by a carefully crafted deep neural network trained with ab initio data. The neural network model preserves all the natural symmetries in the problem. It is first-principles based in the sense that there are no ad hoc components aside from the network model. We show that the proposed scheme provides an efficient and accurate protocol in a variety of systems, including bulk materials and molecules. In all these cases, DPMD gives results that are essentially indistinguishable from the original data, at a cost that scales linearly with system size.

  18. Jungle Computing: Distributed Supercomputing Beyond Clusters, Grids, and Clouds

    NASA Astrophysics Data System (ADS)

    Seinstra, Frank J.; Maassen, Jason; van Nieuwpoort, Rob V.; Drost, Niels; van Kessel, Timo; van Werkhoven, Ben; Urbani, Jacopo; Jacobs, Ceriel; Kielmann, Thilo; Bal, Henri E.

    In recent years, the application of high-performance and distributed computing in scientific practice has become increasingly wide spread. Among the most widely available platforms to scientists are clusters, grids, and cloud systems. Such infrastructures currently are undergoing revolutionary change due to the integration of many-core technologies, providing orders-of-magnitude speed improvements for selected compute kernels. With high-performance and distributed computing systems thus becoming more heterogeneous and hierarchical, programming complexity is vastly increased. Further complexities arise because urgent desire for scalability and issues including data distribution, software heterogeneity, and ad hoc hardware availability commonly force scientists into simultaneous use of multiple platforms (e.g., clusters, grids, and clouds used concurrently). A true computing jungle.

  19. The Effect of Global and Local Damping on the Perception of Hardness.

    PubMed

    van Beek, Femke Elise; Heck, Dennis J F; Nijmeijer, Henk; Bergmann Tiest, Wouter M; Kappers, Astrid M L

    2016-01-01

    In tele-operation systems, damping is often injected to guarantee system stability during contact with hard objects. In this study, we used psychophysical experiments to assess the effect of adding damping on the user's perception of object hardness. In Experiments 1 and 2, combinations of stiffness and damping were tested to assess their effect on perceived hardness. In both experiments, two tasks were used: an in-contact task, starting at the object's surface, and a contact-transition task, including a free-air movement. In Experiment 3, the difference between inserting damping globally (equally throughout the workspace) and locally (inside the object only) was tested. In all experiments, the correlation between the participant's perceptual decision and force and position data was also investigated. Experiments 1 and 2 show that when injecting damping globally, perceived hardness slightly increased for an in-contact task, while it decreased considerably for a contact-transition task. Experiment 3 shows that this effect was mainly due to inserting damping globally, since there was a large perceptual difference between inserting damping globally and locally. The force and position parameters suggest that participants used the same force profile during the two movements of one trial and assessed the system's reaction to this force to perceive hardness.

  20. Dynamic autonomous routing technology for IP-based satellite ad hoc networks

    NASA Astrophysics Data System (ADS)

    Wang, Xiaofei; Deng, Jing; Kostas, Theresa; Rajappan, Gowri

    2014-06-01

    IP-based routing for military LEO/MEO satellite ad hoc networks is very challenging due to network and traffic heterogeneity, network topology and traffic dynamics. In this paper, we describe a traffic priority-aware routing scheme for such networks, namely Dynamic Autonomous Routing Technology (DART) for satellite ad hoc networks. DART has a cross-layer design, and conducts routing and resource reservation concurrently for optimal performance in the fluid but predictable satellite ad hoc networks. DART ensures end-to-end data delivery with QoS assurances by only choosing routing paths that have sufficient resources, supporting different packet priority levels. In order to do so, DART incorporates several resource management and innovative routing mechanisms, which dynamically adapt to best fit the prevailing conditions. In particular, DART integrates a resource reservation mechanism to reserve network bandwidth resources; a proactive routing mechanism to set up non-overlapping spanning trees to segregate high priority traffic flows from lower priority flows so that the high priority flows do not face contention from low priority flows; a reactive routing mechanism to arbitrate resources between various traffic priorities when needed; a predictive routing mechanism to set up routes for scheduled missions and for anticipated topology changes for QoS assurance. We present simulation results showing the performance of DART. We have conducted these simulations using the Iridium constellation and trajectories as well as realistic military communications scenarios. The simulation results demonstrate DART's ability to discriminate between high-priority and low-priority traffic flows and ensure disparate QoS requirements of these traffic flows.

  1. An extended smart utilization medium access control (ESU-MAC) protocol for ad hoc wireless systems

    NASA Astrophysics Data System (ADS)

    Vashishtha, Jyoti; Sinha, Aakash

    2006-05-01

    The demand for spontaneous setup of a wireless communication system has increased in recent years for areas like battlefield, disaster relief operations etc., where a pre-deployment of network infrastructure is difficult or unavailable. A mobile ad-hoc network (MANET) is a promising solution, but poses a lot of challenges for all the design layers, specifically medium access control (MAC) layer. Recent existing works have used the concepts of multi-channel and power control in designing MAC layer protocols. SU-MAC developed by the same authors, efficiently uses the 'available' data and control bandwidth to send control information and results in increased throughput via decreasing contention on the control channel. However, SU-MAC protocol was limited for static ad-hoc network and also faced the busy-receiver node problem. We present the Extended SU-MAC (ESU-MAC) protocol which works mobile nodes. Also, we significantly improve the scheme of control information exchange in ESU-MAC to overcome the busy-receiver node problem and thus, further avoid the blockage of control channel for longer periods of time. A power control scheme is used as before to reduce interference and to effectively re-use the available bandwidth. Simulation results show that ESU-MAC protocol is promising for mobile, ad-hoc network in terms of reduced contention at the control channel and improved throughput because of channel re-use. Results show a considerable increase in throughput compared to SU-MAC which could be attributed to increased accessibility of control channel and improved utilization of data channels due to superior control information exchange scheme.

  2. American Thyroid Association Guidelines on the Management of Thyroid Nodules and Differentiated Thyroid Cancer Task Force Review and Recommendation on the Proposed Renaming of Encapsulated Follicular Variant Papillary Thyroid Carcinoma Without Invasion to Noninvasive Follicular Thyroid Neoplasm with Papillary-Like Nuclear Features.

    PubMed

    Haugen, Bryan R; Sawka, Anna M; Alexander, Erik K; Bible, Keith C; Caturegli, Patrizio; Doherty, Gerard M; Mandel, Susan J; Morris, John C; Nassar, Aziza; Pacini, Furio; Schlumberger, Martin; Schuff, Kathryn; Sherman, Steven I; Somerset, Hilary; Sosa, Julie Ann; Steward, David L; Wartofsky, Leonard; Williams, Michelle D

    2017-04-01

    American Thyroid Association (ATA) leadership asked the ATA Thyroid Nodules and Differentiated Thyroid Cancer Guidelines Task Force to review, comment on, and make recommendations related to the suggested new classification of encapsulated follicular variant papillary thyroid carcinoma (eFVPTC) without capsular or vascular invasion to noninvasive follicular thyroid neoplasm with papillary-like nuclear features (NIFTP). The task force consists of members from the 2015 guidelines task force with the recusal of three members who were authors on the paper under review. Four pathologists and one endocrinologist were added for this specific review. The manuscript proposing the new classification and related literature were assessed. It is recommended that the histopathologic nomenclature for eFVPTC without invasion be reclassified as a NIFTP, given the excellent prognosis of this neoplastic variant. This is a weak recommendation based on moderate-quality evidence. It is also noted that prospective studies are needed to validate the observed patient outcomes (and test performance in predicting thyroid cancer outcomes), as well as implications on patients' psychosocial health and economics.

  3. A Naval Task Force Performance Assessment Methodology

    DTIC Science & Technology

    1991-11-01

    methodology combines two fundamental and intuitively appealing approaches to problem solving: (1) the systems approach with its focus on a system as a whole...Naval Coastal Systems Center AD-A242 915 Panama City, Florida 32407-5000 IlhIIiRjjq TECHNICAL MEMORANDUM NCSC TM 592-91 NOVEMBER 1991 A NAVAL TASK... SYSTEMS CENTER PANAMA CITY, FLORIDA 32407-5000 CAPT DAVID P. FITCH, USN MR. TED C. BUCKLEY Commanding Officer Technical Director ADMINISTRATIVE

  4. Ankle Bracing, Fatigue, and Time to Stabilization in Collegiate Volleyball Athletes

    PubMed Central

    Shaw, Megan Y; Gribble, Phillip A; Frye, Jamie L

    2008-01-01

    Context: Fatigue has been shown to disrupt dynamic stability in healthy volunteers. It is not known if wearing prophylactic ankle supports can improve dynamic stability in fatigued athletes. Objective: To determine the type of ankle brace that may be more effective at providing dynamic stability after a jump-landing task during normal and fatigued conditions. Design: Two separate repeated-measures analyses of variance with 2 within-subjects factors (condition and time) were performed for each dependent variable. Setting: Research laboratory. Patients or Other Participants: Ten healthy female collegiate volleyball athletes participated (age  =  19.5 ± 1.27 years, height  =  179.07 ± 7.6 cm, mass  =  69.86 ± 5.42 kg). Intervention(s): Athletes participated in 3 separate testing sessions, applying a different bracing condition at each session: no brace (NB), Swede-O Universal lace-up ankle brace (AB), and Active Ankle brace (AA). Three trials of a jump-landing task were performed under each condition before and after induced functional fatigue. The jump-landing task consisted of a single-leg landing onto a force plate from a height equivalent to 50% of each participant's maximal jump height and from a starting position 70 cm from the center of the force plate. Main Outcome Measure(s): Time to stabilization in the anterior-posterior (APTTS) and medial-lateral (MLTTS) directions. Results: For APTTS, a condition-by-time interaction existed (F2,18  =  5.55, P  =  .013). For the AA condition, Tukey post hoc testing revealed faster pretest (2.734 ± 0.331 seconds) APTTS than posttest (3.817 ± 0.263 seconds). Post hoc testing also revealed that the AB condition provided faster APTTS (2.492 ± 0.271 seconds) than AA (3.817 ± 0.263 seconds) and NB (3.341 ± 0.339 seconds) conditions during posttesting. No statistically significant findings were associated with MLTTS. Conclusions: Fatigue increased APTTS for the AA condition. Because the AB condition was more effective than the other 2 conditions during the posttesting, the AB appears to be the best option for providing dynamic stability in the anterior-posterior direction during a landing task. PMID:18345341

  5. [Experiences from terminal care. Anthropological principles in human practice].

    PubMed

    Helle-Feldmann, A

    1995-01-01

    Paper gives the personal account by physiotherapist working in hospitals and geriatric care centers compelled to give moral assistance to old people engaged in the process of dying without being prepared for it. Moral assistance ad hoc is necessitated by compassion and by patient's struggle to come to terms with an extreme situation. To grasp the real meaning of some main topics of philosophical and theological anthropology is advocated here as a means to prepare assisting person effectively and practically for this task. Topics discussed are: Personal presence of a human being, the human soul, vital activity vs. higher life; experiences of good and evil in one's life time; success and loss in terms of social values; human dignity.

  6. Requiem for the max rule?

    PubMed

    Ma, Wei Ji; Shen, Shan; Dziugaite, Gintare; van den Berg, Ronald

    2015-11-01

    In tasks such as visual search and change detection, a key question is how observers integrate noisy measurements from multiple locations to make a decision. Decision rules proposed to model this process have fallen into two categories: Bayes-optimal (ideal observer) rules and ad-hoc rules. Among the latter, the maximum-of-outputs (max) rule has been the most prominent. Reviewing recent work and performing new model comparisons across a range of paradigms, we find that in all cases except for one, the optimal rule describes human data as well as or better than every max rule either previously proposed or newly introduced here. This casts doubt on the utility of the max rule for understanding perceptual decision-making. Copyright © 2015 Elsevier Ltd. All rights reserved.

  7. Who needs inpatient detox? Development and implementation of a hospitalist protocol for the evaluation of patients for alcohol detoxification.

    PubMed

    Stephens, John R; Liles, E Allen; Dancel, Ria; Gilchrist, Michael; Kirsch, Jonathan; DeWalt, Darren A

    2014-04-01

    Clinicians caring for patients seeking alcohol detoxification face many challenges, including lack of evidence-based guidelines for treatment and high recidivism rates. To develop a standardized protocol for determining which alcohol dependent patients seeking detoxification need inpatient versus outpatient treatment, and to study the protocol's implementation. Review of best evidence by ad hoc task force and subsequent creation of standardized protocol. Prospective observational evaluation of initial protocol implementation. Patients presenting for alcohol detoxification. Development and implementation of a protocol for evaluation and treatment of patients requesting alcohol detoxification. Number of admissions per month with primary alcohol related diagnosis (DRG), 30-day readmission rate, and length of stay, all measured before and after protocol implementation. We identified one randomized clinical trial and three cohort studies to inform the choice of inpatient versus outpatient detoxification, along with one prior protocol in this population, and combined that data with clinical experience to create an institutional protocol. After implementation, the average number of alcohol related admissions was 15.9 per month, compared with 18.9 per month before implementation (p = 0.037). There was no difference in readmission rate or length of stay. Creation and utilization of a protocol led to standardization of care for patients requesting detoxification from alcohol. Initial evaluation of protocol implementation showed a decrease in number of admissions.

  8. Periodic components of hand acceleration/deceleration impulses during telemanipulation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Draper, J.V.; Handel, S.

    1994-01-01

    Responsiveness is the ability of a telemanipulator to recreate user trajectories and impedance in time and space. For trajectory production, a key determinant of responsiveness is the ability of the system to accept user inputs, which are forces on the master handle generated by user hand acceleration/deceleration (a/d) impulses, and translate them into slave arm acceleration/deceleration. This paper presents observations of master controller a/d impulses during completion of a simple target acquisition task. Power spectral density functions (PSDF`s) calculated from hand controller a/d impulses were used to assess impulse waveform. The relative contributions of frequency intervals ranging up to 25more » Hz for three spatially different versions of the task were used to determine which frequencies were most important. The highest relative power was observed in frequencies between 1 Hz and 6 Hz. The key frequencies related to task difficulty were in the range from 2 Hz to 8 Hz. the results provide clues to the source of the performance inhibition.« less

  9. Greedy data transportation scheme with hard packet deadlines for wireless ad hoc networks.

    PubMed

    Lee, HyungJune

    2014-01-01

    We present a greedy data transportation scheme with hard packet deadlines in ad hoc sensor networks of stationary nodes and multiple mobile nodes with scheduled trajectory path and arrival time. In the proposed routing strategy, each stationary ad hoc node en route decides whether to relay a shortest-path stationary node toward destination or a passing-by mobile node that will carry closer to destination. We aim to utilize mobile nodes to minimize the total routing cost as far as the selected route can satisfy the end-to-end packet deadline. We evaluate our proposed routing algorithm in terms of routing cost, packet delivery ratio, packet delivery time, and usability of mobile nodes based on network level simulations. Simulation results show that our proposed algorithm fully exploits the remaining time till packet deadline to turn into networking benefits of reducing the overall routing cost and improving packet delivery performance. Also, we demonstrate that the routing scheme guarantees packet delivery with hard deadlines, contributing to QoS improvement in various network services.

  10. Greedy Data Transportation Scheme with Hard Packet Deadlines for Wireless Ad Hoc Networks

    PubMed Central

    Lee, HyungJune

    2014-01-01

    We present a greedy data transportation scheme with hard packet deadlines in ad hoc sensor networks of stationary nodes and multiple mobile nodes with scheduled trajectory path and arrival time. In the proposed routing strategy, each stationary ad hoc node en route decides whether to relay a shortest-path stationary node toward destination or a passing-by mobile node that will carry closer to destination. We aim to utilize mobile nodes to minimize the total routing cost as far as the selected route can satisfy the end-to-end packet deadline. We evaluate our proposed routing algorithm in terms of routing cost, packet delivery ratio, packet delivery time, and usability of mobile nodes based on network level simulations. Simulation results show that our proposed algorithm fully exploits the remaining time till packet deadline to turn into networking benefits of reducing the overall routing cost and improving packet delivery performance. Also, we demonstrate that the routing scheme guarantees packet delivery with hard deadlines, contributing to QoS improvement in various network services. PMID:25258736

  11. Taxonomic and ad hoc categorization within the two cerebral hemispheres.

    PubMed

    Shen, Yeshayahu; Aharoni, Bat-El; Mashal, Nira

    2015-01-01

    A typicality effect refers to categorization which is performed more quickly or more accurately for typical than for atypical members of a given category. Previous studies reported a typicality effect for category members presented in the left visual field/right hemisphere (RH), suggesting that the RH applies a similarity-based categorization strategy. However, findings regarding the typicality effect within the left hemisphere (LH) are less conclusive. The current study tested the pattern of typicality effects within each hemisphere for both taxonomic and ad hoc categories, using words presented to the left or right visual fields. Experiment 1 tested typical and atypical members of taxonomic categories as well as non-members, and Experiment 2 tested typical and atypical members of ad hoc categories as well as non-members. The results revealed a typicality effect in both hemispheres and in both types of categories. Furthermore, the RH categorized atypical stimuli more accurately than did the LH. Our findings suggest that both hemispheres rely on a similarity-based categorization strategy, but the coarse semantic coding of the RH seems to facilitate the categorization of atypical members.

  12. Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version

    PubMed Central

    Babu, M. Rajesh; Dian, S. Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan

    2015-01-01

    The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things. PMID:26495430

  13. Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version.

    PubMed

    Babu, M Rajesh; Dian, S Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan

    2015-01-01

    The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things.

  14. Enhancement of Beaconless Location-Based Routing with Signal Strength Assistance for Ad-Hoc Networks

    NASA Astrophysics Data System (ADS)

    Chen, Guowei; Itoh, Kenichi; Sato, Takuro

    Routing in Ad-hoc networks is unreliable due to the mobility of the nodes. Location-based routing protocols, unlike other protocols which rely on flooding, excel in network scalability. Furthermore, new location-based routing protocols, like, e. g. BLR [1], IGF [2], & CBF [3] have been proposed, with the feature of not requiring beacons in MAC-layer, which improve more in terms of scalability. Such beaconless routing protocols can work efficiently in dense network areas. However, these protocols' algorithms have no ability to avoid from routing into sparse areas. In this article, historical signal strength has been added as a factor into the BLR algorithm, which avoids routing into sparse area, and consequently improves the global routing efficiency.

  15. Can we understand structural and tectonic processes and their products without appeal to a complete mechanics?

    NASA Astrophysics Data System (ADS)

    Fletcher, Raymond C.; Pollard, David D.

    1999-08-01

    Our answer is `no'. Throughout the 20th century, the majority of structural geologists have worked with a conceptual basis that includes only isolated fragments of continuum mechanics (e.g. strain analysis, constitutive laws, force balance, Mohr's circles, or conservation of volume), and this has resulted in the proliferation of ad hoc models of structural and tectonic processes and their products. Furthermore, at a more abstract level, the possibility that mechanical quantities of interest (e.g. displacement, velocity, stress, or temperature) vary continuously in the spatial coordinates and time is largely ignored. These two conceptual oversights are related: without the mathematical concept of partial differentiation (as in the biharmonic equation of elasticity theory that brings strain compatability, Hooke's law, and stress equilibrium together) these spatial and temporal variations cannot be accounted for explicitly. Thus, the mechanical concept of boundary- and initial-value problems, formulated in terms of partial differential equations, has not been adopted as a necessary tool by most practitioners of structural geology and tectonics. We illustrate our case with two examples: the development of chevron folds and of échelon veins. We show how the ad hoc approach, while successful at one level, lacks predictive capability and possesses a low degree of refutability. Further progress in understanding these (and other) products of structural and tectonic processes can be made through an integrative approach using a complete and self-consistent mechanics.

  16. ACOSS-16 (Active Control of Space Structures)

    DTIC Science & Technology

    1982-10-01

    RADC-TR-82-225 Final Technical Report October 1982 SACOSS- 16 (ACTIVE CONTROL OF SPACE ~ STRUCTURES) Honeywell Sponsored by Defense Advanced Research ...Defense Ad. vanced Research Projects Agency or the U.S. Government. ROME AIR DEVELOPMENT CENTER Air Force Systems Command Griffiss Air Force Base, NY 13441...ELEMENT. PROJECT, TASK lo, .’ H _onevwell Systems & Research Center AREA & WORK UNIT NUMBERS 2600 Ridgway Parkway, P0 Box 312 62301E Minneapolis MN

  17. Mechanisms of cognitive control in cadet pilots.

    PubMed

    Gordon, Shirley; Getter, Nir; Oz, Idit; Garbi, Dror; Todder, Doron

    2016-01-01

    Optimizing performance of aviators while minimizing risks arising from the exposure to extreme environment, both external and internal, is one of the principles guiding the Israeli Air Force. Young cadets in particular are considered an "at risk" population due to the fact that they have no experience in flight in the first stages of training and are therefore subjects for investigation. In this study, we investigated the cognitive performance of young cadet pilots across different hours of the day. 39 cadets were randomly divided into 3 groups: morning, late afternoon, and late evening groups and then tested on a cognitive battery that contained both simple performance measures but also complex measures like dual-tasking and mental rotation test. The analysis indicated a significant effect of 'time of day' on the participants' accuracy [ F (2, 32) = 3.4, p  < 0.05]. In a post hoc pairwise t-tests, we found a near significant ( p  = 0.52) increase in participants' accuracy and a significant increase [ F (2, 32) = 4.5, p  < 0.05] in participants' reaction time in the late evening group as compared to the morning group. We also found a differential effect of dual tasking on accuracy in the different daytimes [ F (2, 33) = 5.6, p  < 0.01]. In a post hoc analysis, we found that accuracy in the 1-back task deteriorates from single task condition to the dual task condition only in the morning group ( p  < 0.05), but not in the late evening or late-afternoon group. This 'trade-off' behavior, slowing down in order to perform better, in the late evening group may be a result of a voluntary control mechanism (top-down processes) activated at night, in this group. The combination of feeling fatigue, along with the understanding that complex tasks are more resource consuming, caused the cadets to check and double-check before answering, whereas in the morning group, they felt alert and vital, and acted more reactively, ended in an impulsive manner that caused to inaccurate performance.

  18. Sea Training at Maritime Academies Oversight. Hearings Before the Ad Hoc Select Subcommittee on Maritime Education and Training of the Committee on Merchant Marine and Fisheries, House of Representatives, Ninety-Sixth Congress, Second Session on Sea Training of United States Merchant Marine Officers and Different Ways of Satisfying This Requirement at the Various Maritime Academies.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. House Committee on Merchant Marine and Fisheries.

    Recorded are minutes of hearings before the House Ad Hoc Select Subcommittee on Maritime Education and Training regarding the sea training of United States Merchant Marine officers. Examined are various approaches to meeting the sea training requirement, especially the options of maritime academy training vessels, sailing on U.S.-flag merchant…

  19. Smart border: ad-hoc wireless sensor networks for border surveillance

    NASA Astrophysics Data System (ADS)

    He, Jun; Fallahi, Mahmoud; Norwood, Robert A.; Peyghambarian, Nasser

    2011-06-01

    Wireless sensor networks have been proposed as promising candidates to provide automated monitoring, target tracking, and intrusion detection for border surveillance. In this paper, we demonstrate an ad-hoc wireless sensor network system for border surveillance. The network consists of heterogeneously autonomous sensor nodes that distributively cooperate with each other to enable a smart border in remote areas. This paper also presents energy-aware and sleeping algorithms designed to maximize the operating lifetime of the deployed sensor network. Lessons learned in building the network and important findings from field experiments are shared in the paper.

  20. Stochastic does not equal ad hoc. [theories of lunar origin

    NASA Technical Reports Server (NTRS)

    Hartmann, W. K.

    1984-01-01

    Some classes of influential events in solar system history are class-predictable but not event-predictable. Theories of lunar origin should not ignore class-predictable stochastic events. Impacts and close encounters with large objects during planet formation are class-predictable. These stochastic events, such as large impacts that triggered ejection of Earth-mantle material into a circum-Earth cloud, should not be rejected as ad hoc. A way to deal with such events scientifically is to investigate their consequences; if it can be shown that they might produce the Moon, they become viable concepts in theories of lunar origin.

  1. Organization model for Mobile Wireless Sensor Networks inspired in Artificial Bee Colony

    NASA Astrophysics Data System (ADS)

    Freire Roberto, Guilherme; Castilho Maschi, Luis Fernando; Pigatto, Daniel Fernando; Jaquie Castelo Branco, Kalinka Regina Lucas; Alves Neves, Leandro; Montez, Carlos; Sandro Roschildt Pinto, Alex

    2015-01-01

    The purpose of this study is to find a self-organizing model for MWSN based on bee colonies in order to reduce the number of messages transmitted among nodes, and thus reduce the overall consumption energy while maintaining the efficiency of message delivery. The results obtained in this article are originated from simulations carried out with SINALGO software, which demonstrates the effectiveness of the proposed approach. The BeeAODV (Bee Ad-Hoc On Demand Distance Vector) proposed in this paper allows to considerably reduce message exchanges whether compared to AODV (Ad-Hoc On Demand Distance Vector).

  2. Influence of sports flooring and shoes on impact forces and performance during jump tasks.

    PubMed

    Malisoux, Laurent; Gette, Paul; Urhausen, Axel; Bomfim, Joao; Theisen, Daniel

    2017-01-01

    We aim to determine the influence of sports floorings and sports shoes on impact mechanics and performance during standardised jump tasks. Twenty-one male volunteers performed ankle jumps (four consecutive maximal bounds with very dynamic ankle movements) and multi-jumps (two consecutive maximal counter-movement jumps) on force plates using minimalist and cushioned shoes under 5 sports flooring (SF) conditions. The shock absorption properties of the SF, defined as the proportion of peak impact force absorbed by the tested flooring when compared with a concrete hard surface, were: SF0 = 0% (no flooring), SF1 = 19%, SF2 = 26%, SF3 = 37% and SF4 = 45%. Shoe and flooring effects were compared using 2x5 repeated-measures ANOVA with post-hoc Bonferroni-corrected comparisons. A significant interaction between SF and shoe conditions was found for VILR only (p = 0.003). In minimalist shoes, SF influenced Vertical Instantaneous Loading Rate (VILR) during ankle jumps (p = 0.006) and multi-jumps (p<0.001), in accordance with shock absorption properties. However, in cushioned shoes, SF influenced VILR during ankle jumps only (p<0.001). Contact Time was the only additional variable affected by SF, but only during multi-jumps in minimalist shoes (p = 0.037). Cushioned shoes induced lower VILR (p<0.001) and lower Contact Time (p≤0.002) during ankle jumps and multi-jumps compared to minimalist shoes. During ankle jumps, cushioned shoes induced greater Peak Vertical Ground Reaction Force (PVGRF, p = 0.002), greater Vertical Average Loading Rate (p<0.001), and lower eccentric (p = 0.008) and concentric (p = 0.004) work. During multi-jumps, PVGRF was lower (p<0.001) and jump height was higher (p<0.001) in cushioned compared to minimalist shoes. In conclusion, cushioning influenced impact forces during standardised jump tasks, whether it was provided by the shoes or the sports flooring. VILR is the variable that was the most affected.

  3. Influence of sports flooring and shoes on impact forces and performance during jump tasks

    PubMed Central

    Urhausen, Axel; Bomfim, Joao

    2017-01-01

    We aim to determine the influence of sports floorings and sports shoes on impact mechanics and performance during standardised jump tasks. Twenty-one male volunteers performed ankle jumps (four consecutive maximal bounds with very dynamic ankle movements) and multi-jumps (two consecutive maximal counter-movement jumps) on force plates using minimalist and cushioned shoes under 5 sports flooring (SF) conditions. The shock absorption properties of the SF, defined as the proportion of peak impact force absorbed by the tested flooring when compared with a concrete hard surface, were: SF0 = 0% (no flooring), SF1 = 19%, SF2 = 26%, SF3 = 37% and SF4 = 45%. Shoe and flooring effects were compared using 2x5 repeated-measures ANOVA with post-hoc Bonferroni-corrected comparisons. A significant interaction between SF and shoe conditions was found for VILR only (p = 0.003). In minimalist shoes, SF influenced Vertical Instantaneous Loading Rate (VILR) during ankle jumps (p = 0.006) and multi-jumps (p<0.001), in accordance with shock absorption properties. However, in cushioned shoes, SF influenced VILR during ankle jumps only (p<0.001). Contact Time was the only additional variable affected by SF, but only during multi-jumps in minimalist shoes (p = 0.037). Cushioned shoes induced lower VILR (p<0.001) and lower Contact Time (p≤0.002) during ankle jumps and multi-jumps compared to minimalist shoes. During ankle jumps, cushioned shoes induced greater Peak Vertical Ground Reaction Force (PVGRF, p = 0.002), greater Vertical Average Loading Rate (p<0.001), and lower eccentric (p = 0.008) and concentric (p = 0.004) work. During multi-jumps, PVGRF was lower (p<0.001) and jump height was higher (p<0.001) in cushioned compared to minimalist shoes. In conclusion, cushioning influenced impact forces during standardised jump tasks, whether it was provided by the shoes or the sports flooring. VILR is the variable that was the most affected. PMID:29020108

  4. Financial Literacy: Getting beyond the Markets

    ERIC Educational Resources Information Center

    Stanford, Jim

    2010-01-01

    Recently, several Canadian provinces have added financial literacy into core curriculum for high school students, and in his 2009 budget, federal Finance Minister Jim Flaherty announced the creation of a Task Force to evaluate current financial literacy initiatives. Typically, these initiatives focus on "individual responsibility",…

  5. Kinesthetic Force Feedback and Belt Control for the Treadport Locomotion Interface.

    PubMed

    Hejrati, Babak; Crandall, Kyle L; Hollerbach, John M; Abbott, Jake J

    2015-01-01

    This paper describes an improved control system for the Treadport immersive locomotion interface, with results that generalize to any treadmill that utilizes an actuated tether to enable self-selected walking speed. A new belt controller is implemented to regulate the user's position; when combined with the user's own volition, this controller also enables the user to naturally self-select their walking speed as they would when walking over ground. A new kinesthetic-force-feedback controller is designed for the tether that applies forces to the user's torso. This new controller is derived based on maintaining the user's sense of balance during belt acceleration, rather than by rendering an inertial force as was done in our prior work. Based on the results of a human-subjects study, the improvements in both controllers significantly contribute to an improved perception of realistic walking on the Treadport. The improved control system uses intuitive dynamic-system and anatomical parameters and requires no ad hoc gain tuning. The control system simply requires three measurements to be made for a given user: the user's mass, the user's height, and the height of the tether attachment point on the user's torso.

  6. a 3d Information System for the Documentation of Archaeologica L Excavations

    NASA Astrophysics Data System (ADS)

    Ardissone, P.; Bornaz, L.; Degattis, G.; Domaine, R.

    2013-07-01

    Documentation of archaeological and cultural heritage sites is at the heart of the archaeological process and an important component in cultural heritage research, presentation and restorations. In 2012 the Superintendence of Cultural Heritage of Aosta Valley - IT (Soprintendenza per i Beni e le Attività Culturali della Region e Autonoma Valle d'Aosta) carried out a complex archaeological excavation in a composite archaeological context, situated an urban background: the Aosta city centre. This archaeological excavation has been characterized by the classical urban archaeological issues: little space, short time, complex stratigraphy. Moreover the investigations have come out several structures and walls that required safety and conservation measures. Ad hoc 3D solutions carried out a complete 3D survey of the area in 10 different time/situations of the Archaeological digs, chosen in collaborations with the archaeological staff. In this way a multi temporal 3D description of the site has been provided for the archaeological analysis and for the project of the restorations activities. The 3D surveys has been carried out integrating GPS, laser scanner technology and photogrammetry. In order to meet the needs of the site, and its complex logistics and to obtain products that guarantee the high quality and detail required for archaeological analysis, we have developed different procedures and methodologies: hdr imaging for 3D model with correct, consistent and uniform colours, noise filtering and people filtering, for the removal of interference between laser instrument and object of the survey, Advanced laser scanner triangulation, in order to consider both artificial and natural tie points, for a correct registration of a huge amount of scans. Single image orientation on 3D data, in order to integrate the laser data with data coming from digital photogrammetry (faster on the field than the laser scanner survey, than used in certain situations). The results of all these methodologies and procedures will be presented and described in the article. For the documentation of the archaeological excavations and for the management of the conservation activities (condition assessment, planning, and conservation work). Ad Hoc 3D solutions has costumized 2 special plug-ins of its own software platform Ad Hoc: Ad Hoc Archaeology and Ad Hoc Conservation. The software platform integrates a 3D database management system. All information (measurements, plotting, areas of interests…) are organized according to their correct 3D position. They can be queried using attributes, geometric characteristics or their spatial position. The Ad Hoc Archaeology plug-in allows archeologists to fill out UUSS sheets in an internal database, put them in the correct location within the 3D model of the site, define the mutual relations between the UUSS, divide the different archaeological phases. A simple interface will facilitate the construction of the stratigraphic chart (matrix), in a 3D environment as well (matrix 3D). The Ad Hoc Conservation plug-in permits conservators and restorers to create relationships between the different approaches and descriptions of the same parts of the monument, i.e.: between stratigraphyc units or historical phases and architectural components and/or decay pathologies. The 3D DBMS conservation module uses a codified terminology based on "ICOMOS illustrated glossary of stone deterioration" and other glossary. Specific tools permits restorers to compute correctly surfaces and volumes. In this way decay extension and intensity can be measured with high precision and with an high level of detail, for a correct time and costs estimation of each conservation step.

  7. Management of Energy Consumption on Cluster Based Routing Protocol for MANET

    NASA Astrophysics Data System (ADS)

    Hosseini-Seno, Seyed-Amin; Wan, Tat-Chee; Budiarto, Rahmat; Yamada, Masashi

    The usage of light-weight mobile devices is increasing rapidly, leading to demand for more telecommunication services. Consequently, mobile ad hoc networks and their applications have become feasible with the proliferation of light-weight mobile devices. Many protocols have been developed to handle service discovery and routing in ad hoc networks. However, the majority of them did not consider one critical aspect of this type of network, which is the limited of available energy in each node. Cluster Based Routing Protocol (CBRP) is a robust/scalable routing protocol for Mobile Ad hoc Networks (MANETs) and superior to existing protocols such as Ad hoc On-demand Distance Vector (AODV) in terms of throughput and overhead. Therefore, based on this strength, methods to increase the efficiency of energy usage are incorporated into CBRP in this work. In order to increase the stability (in term of life-time) of the network and to decrease the energy consumption of inter-cluster gateway nodes, an Enhanced Gateway Cluster Based Routing Protocol (EGCBRP) is proposed. Three methods have been introduced by EGCBRP as enhancements to the CBRP: improving the election of cluster Heads (CHs) in CBRP which is based on the maximum available energy level, implementing load balancing for inter-cluster traffic using multiple gateways, and implementing sleep state for gateway nodes to further save the energy. Furthermore, we propose an Energy Efficient Cluster Based Routing Protocol (EECBRP) which extends the EGCBRP sleep state concept into all idle member nodes, excluding the active nodes in all clusters. The experiment results show that the EGCBRP decreases the overall energy consumption of the gateway nodes up to 10% and the EECBRP reduces the energy consumption of the member nodes up to 60%, both of which in turn contribute to stabilizing the network.

  8. Treatment of canine atopic dermatitis: 2010 clinical practice guidelines from the International Task Force on Canine Atopic Dermatitis.

    PubMed

    Olivry, Thierry; DeBoer, Douglas J; Favrot, Claude; Jackson, Hilary A; Mueller, Ralf S; Nuttall, Tim; Prélaud, Pascal

    2010-06-01

    Atopic dermatitis (AD) is a common chronic relapsing pruritic skin disease of dogs for which treatment has varied over time and geographical location. Recent high quality randomized controlled trials and systematic reviews have established which drugs are likely to offer consistent benefit. The International Task Force for Canine AD currently recommends a multi-faceted approach to treat dogs with AD. Acute flares should be treated with a combination of nonirritating baths and topical glucocorticoids, once an attempt has been made to identify and remove the suspected causes of the flare. Oral glucocorticoids and antimicrobial therapy must be added when needed. In dogs with chronic AD, a combination of interventions should be considered. Again, factors that trigger flares of AD must be identified and, if possible, avoided. Currently recognized flare factors include food, flea and environmental allergens, Staphylococcus bacteria and Malassezia yeast. Skin and coat hygiene and care must be improved by bathing with nonirritating shampoos and dietary supplementation with essential fatty acids. The severity of pruritus and skin lesions can be reduced with a combination of anti-inflammatory drugs. Currently, medications with good evidence of high efficacy include topical and oral glucocorticoids, and calcineurin inhibitors such as oral ciclosporin and topical tacrolimus. The dose and frequency of administration of these drugs should be tailored to each patient considering each drug's efficacy, adverse effects and cost. Allergen-specific immunotherapy should be offered, whenever feasible, in an attempt to prevent recurrence of clinical signs upon further exposure to environmental allergens to which the patient is hypersensitive.

  9. Defense Science Board Task Force on Military Satellite Communication and Tactical Networking. Executive Summary

    DTIC Science & Technology

    2017-03-01

    Communications SMC Space and Missile Systems Center SEV Space Enterprise Vision SHF Super High Frequency SINCGARS Single Channel Ground-Air Radio...Appendix D:Acronyms A2/AD Anti-Access/Area Denial ADNS Automated Digital Network System AEHF Advanced Extremely High Frequency AFSPC Air Force Space ...medium-rate modes of defense extremely high frequency (EHF) SATCOM. This reality should be considered a crisis to be dealt with immediately. In

  10. Three-axis force sensor with fiber Bragg grating.

    PubMed

    Hyundo Choi; Yoan Lim; Junhyung Kim

    2017-07-01

    Haptic feedback is critical for many surgical tasks, and it replicates force reflections at the surgical site. To meet the force reflection requirements, we propose a force sensor with an optical fiber Bragg grating (FBG) for robotic surgery. The force sensor can calculate three directional forces of an instrument from the strain of three FBGs, even under electromagnetic interference. A flexible ring-shape structure connects an instrument tip and fiber strain gages to sense three directional force. And a stopper mechanism is added in the structure to avoid plastic deformation under unexpected large force on the instrument tip. The proposed sensor is experimentally verified to have a sensing range from -12 N to 12 N, and its sensitivity was less than 0.06 N.

  11. A Variational Approach to the Analysis of Dissipative Electromechanical Systems

    PubMed Central

    Allison, Andrew; Pearce, Charles E. M.; Abbott, Derek

    2014-01-01

    We develop a method for systematically constructing Lagrangian functions for dissipative mechanical, electrical, and electromechanical systems. We derive the equations of motion for some typical electromechanical systems using deterministic principles that are strictly variational. We do not use any ad hoc features that are added on after the analysis has been completed, such as the Rayleigh dissipation function. We generalise the concept of potential, and define generalised potentials for dissipative lumped system elements. Our innovation offers a unified approach to the analysis of electromechanical systems where there are energy and power terms in both the mechanical and electrical parts of the system. Using our novel technique, we can take advantage of the analytic approach from mechanics, and we can apply these powerful analytical methods to electrical and to electromechanical systems. We can analyse systems that include non-conservative forces. Our methodology is deterministic, and does does require any special intuition, and is thus suitable for automation via a computer-based algebra package. PMID:24586221

  12. Face recognition: database acquisition, hybrid algorithms, and human studies

    NASA Astrophysics Data System (ADS)

    Gutta, Srinivas; Huang, Jeffrey R.; Singh, Dig; Wechsler, Harry

    1997-02-01

    One of the most important technologies absent in traditional and emerging frontiers of computing is the management of visual information. Faces are accessible `windows' into the mechanisms that govern our emotional and social lives. The corresponding face recognition tasks considered herein include: (1) Surveillance, (2) CBIR, and (3) CBIR subject to correct ID (`match') displaying specific facial landmarks such as wearing glasses. We developed robust matching (`classification') and retrieval schemes based on hybrid classifiers and showed their feasibility using the FERET database. The hybrid classifier architecture consist of an ensemble of connectionist networks--radial basis functions-- and decision trees. The specific characteristics of our hybrid architecture include (a) query by consensus as provided by ensembles of networks for coping with the inherent variability of the image formation and data acquisition process, and (b) flexible and adaptive thresholds as opposed to ad hoc and hard thresholds. Experimental results, proving the feasibility of our approach, yield (i) 96% accuracy, using cross validation (CV), for surveillance on a data base consisting of 904 images (ii) 97% accuracy for CBIR tasks, on a database of 1084 images, and (iii) 93% accuracy, using CV, for CBIR subject to correct ID match tasks on a data base of 200 images.

  13. The biomarker-based diagnosis of Alzheimer's disease. 1-ethical and societal issues.

    PubMed

    Porteri, Corinna; Albanese, Emiliano; Scerri, Charles; Carrillo, Maria C; Snyder, Heather M; Martensson, Birgitta; Baker, Mark; Giacobini, Ezio; Boccardi, Marina; Winblad, Bengt; Frisoni, Giovanni B; Hurst, Samia

    2017-04-01

    There is great interest in the use of biomarkers to assist in the timely identification of Alzheimer's disease (AD) in individuals with mild symptoms. However, the inclusion of AD biomarkers in clinical criteria poses socioethical challenges. The Geneva Task Force for the Roadmap of Alzheimer's Biomarkers was established to deliver a systematic strategic research agenda (aka roadmap) to promote efficient and effective validation of AD biomarkers and to foster their uptake in clinical practice. In this article, we summarize the workshop discussion of the Geneva Task Force "ethical and societal issues" working group, which comprised bioethicists, clinicians, health economists, and representatives of those affected by AD. The working group identified the following key issues that need to be included in the roadmap: improving access to services through timely diagnosis, the need for a diagnostic research protocol before moving to clinical routine, recruitment in diagnostic research protocols in the absence of effective therapy, respect for the autonomy of the individual with mild cognitive impairment in information and consent process and the right not to know biomarkers results, need for counseling programs, disclosure of the diagnosis in a structured environment and the involvement of family members, health policies including the individuals' views and the protection of their interests, and the economic costs for society. Copyright © 2016 Elsevier Inc. All rights reserved.

  14. Accurate ab initio quartic force fields for the ions HCO(+) and HOC(+)

    NASA Technical Reports Server (NTRS)

    Martin, J. M. L.; Taylor, Peter R.; Lee, Timothy J.

    1993-01-01

    The quartic force fields of HCO(+) and HOC(+) have been computed using augmented coupled cluster methods and basis sets of spdf and spdfg quality. Calculations on HCN, CO, and N2 have been performed to assist in calibrating the computed results. Going from an spdf to an spdfg basis shortens triple bonds by about 0.004 A, and increases the corresponding harmonic frequency by 10-20/cm, leaving bond distances about 0.003 A too long and triple bond stretching frequencies about 5/cm too low. Accurate estimates for the bond distances, fundamental frequencies, and thermochemical quantities are given. HOC(+) lies 37.8 +/- 0.5 kcal/mol (0 K) above HCO(+); the classical barrier height for proton exchange is 76.7 +/- 1.0 kcal/mol.

  15. The worker of the future. A system outlines the competencies its employees will need.

    PubMed

    Hill, K; Meyer, B

    1998-01-01

    In 1993, Sisters of Mercy Health System-St. Louis (SMHS), having asked itself what kind of employees it would need in the twenty-first century, established a Worker of the Future Task Force to develop tentative answers. The task force began by making projections concerning healthcare, studying the strategic plans of SMHS's members, and surveying its employees. It learned that the system should help workers see how change could benefit them. Next, the task force studied the cultural history of the Sisters of Mercy, developing from it Six Guiding Principles for the evaluation of employee performance. From these principles, the task force derived Twelve Competencies that SMHS will seek in future workers. In 1995 the system's education leaders, with the aid of an internal training organization, decided to develop 17 training modules based on these guiding principles and competencies. Since then, more than 85 SMHS employees have been trained to help coworkers develop customer service skills and other competencies. SMHS has also incorporated the competencies in its job descriptions and performance evaluations, added the Worker of the Future curriculum to its orientation program for new employees, and is currently developing Worker of the Future training sessions for human resources personnel who interview prospective employees.

  16. Harmonised investigation of the occurrence of human enteric viruses in the leafy green vegetable supply chain in three European countries.

    PubMed

    Kokkinos, P; Kozyra, I; Lazic, S; Bouwknegt, M; Rutjes, S; Willems, K; Moloney, R; de Roda Husman, A M; Kaupke, A; Legaki, E; D'Agostino, M; Cook, N; Rzeżutka, A; Petrovic, T; Vantarakis, A

    2012-12-01

    Numerous outbreaks have been attributed to the consumption of raw or minimally processed leafy green vegetables contaminated with enteric viral pathogens. The aim of the present study was an integrated virological monitoring of the salad vegetables supply chain in Europe, from production, processing and point-of-sale. Samples were collected and analysed in Greece, Serbia and Poland, from 'general' and 'ad hoc' sampling points, which were perceived as critical points for virus contamination. General sampling points were identified through the analysis of background information questionnaires based on HACCP audit principles, and they were sampled during each sampling occasion where as-ad hoc sampling points were identified during food safety fact-finding visits and samples were only collected during the fact-finding visits. Human (hAdV) and porcine (pAdV) adenovirus, hepatitis A (HAV) and E (HEV) virus, norovirus GI and GII (NoV) and bovine polyomavirus (bPyV) were detected by means of real-time (RT-) PCR-based protocols. General samples were positive for hAdV, pAdV, HAV, HEV, NoV GI, NoV GII and bPyV at 20.09 % (134/667), 5.53 % (13/235), 1.32 % (4/304), 3.42 % (5/146), 2 % (6/299), 2.95 % (8/271) and 0.82 % (2/245), respectively. Ad hoc samples were positive for hAdV, pAdV, bPyV and NoV GI at 9 % (3/33), 9 % (2/22), 4.54 % (1/22) and 7.14 % (1/14), respectively. These results demonstrate the existence of viral contamination routes from human and animal sources to the salad vegetable supply chain and more specifically indicate the potential for public health risks due to the virus contamination of leafy green vegetables at primary production.

  17. Optimal JPWL Forward Error Correction Rate Allocation for Robust JPEG 2000 Images and Video Streaming over Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Agueh, Max; Diouris, Jean-François; Diop, Magaye; Devaux, François-Olivier; De Vleeschouwer, Christophe; Macq, Benoit

    2008-12-01

    Based on the analysis of real mobile ad hoc network (MANET) traces, we derive in this paper an optimal wireless JPEG 2000 compliant forward error correction (FEC) rate allocation scheme for a robust streaming of images and videos over MANET. The packet-based proposed scheme has a low complexity and is compliant to JPWL, the 11th part of the JPEG 2000 standard. The effectiveness of the proposed method is evaluated using a wireless Motion JPEG 2000 client/server application; and the ability of the optimal scheme to guarantee quality of service (QoS) to wireless clients is demonstrated.

  18. Scalable Architecture for Multihop Wireless ad Hoc Networks

    NASA Technical Reports Server (NTRS)

    Arabshahi, Payman; Gray, Andrew; Okino, Clayton; Yan, Tsun-Yee

    2004-01-01

    A scalable architecture for wireless digital data and voice communications via ad hoc networks has been proposed. Although the details of the architecture and of its implementation in hardware and software have yet to be developed, the broad outlines of the architecture are fairly clear: This architecture departs from current commercial wireless communication architectures, which are characterized by low effective bandwidth per user and are not well suited to low-cost, rapid scaling in large metropolitan areas. This architecture is inspired by a vision more akin to that of more than two dozen noncommercial community wireless networking organizations established by volunteers in North America and several European countries.

  19. Intelligent QoS routing algorithm based on improved AODV protocol for Ad Hoc networks

    NASA Astrophysics Data System (ADS)

    Huibin, Liu; Jun, Zhang

    2016-04-01

    Mobile Ad Hoc Networks were playing an increasingly important part in disaster reliefs, military battlefields and scientific explorations. However, networks routing difficulties are more and more outstanding due to inherent structures. This paper proposed an improved cuckoo searching-based Ad hoc On-Demand Distance Vector Routing protocol (CSAODV). It elaborately designs the calculation methods of optimal routing algorithm used by protocol and transmission mechanism of communication-package. In calculation of optimal routing algorithm by CS Algorithm, by increasing QoS constraint, the found optimal routing algorithm can conform to the requirements of specified bandwidth and time delay, and a certain balance can be obtained among computation spending, bandwidth and time delay. Take advantage of NS2 simulation software to take performance test on protocol in three circumstances and validate the feasibility and validity of CSAODV protocol. In results, CSAODV routing protocol is more adapt to the change of network topological structure than AODV protocol, which improves package delivery fraction of protocol effectively, reduce the transmission time delay of network, reduce the extra burden to network brought by controlling information, and improve the routing efficiency of network.

  20. Energy Efficient Probabilistic Broadcasting for Mobile Ad-Hoc Network

    NASA Astrophysics Data System (ADS)

    Kumar, Sumit; Mehfuz, Shabana

    2017-06-01

    In mobile ad-hoc network (MANETs) flooding method is used for broadcasting route request (RREQ) packet from one node to another node for route discovery. This is the simplest method of broadcasting of RREQ packets but it often results in broadcast storm problem, originating collisions and congestion of packets in the network. A probabilistic broadcasting is one of the widely used broadcasting scheme for route discovery in MANETs and provides solution for broadcasting storm problem. But it does not consider limited energy of the battery of the nodes. In this paper, a new energy efficient probabilistic broadcasting (EEPB) is proposed in which probability of broadcasting RREQs is calculated with respect to remaining energy of nodes. The analysis of simulation results clearly indicate that an EEPB route discovery scheme in ad-hoc on demand distance vector (AODV) can increase the network lifetime with a decrease in the average power consumption and RREQ packet overhead. It also decreases the number of dropped packets in the network, in comparison to other EEPB schemes like energy constraint gossip (ECG), energy aware gossip (EAG), energy based gossip (EBG) and network lifetime through energy efficient broadcast gossip (NEBG).

  1. A framework for streamlining research workflow in neuroscience and psychology

    PubMed Central

    Kubilius, Jonas

    2014-01-01

    Successful accumulation of knowledge is critically dependent on the ability to verify and replicate every part of scientific conduct. However, such principles are difficult to enact when researchers continue to resort on ad-hoc workflows and with poorly maintained code base. In this paper I examine the needs of neuroscience and psychology community, and introduce psychopy_ext, a unifying framework that seamlessly integrates popular experiment building, analysis and manuscript preparation tools by choosing reasonable defaults and implementing relatively rigid patterns of workflow. This structure allows for automation of multiple tasks, such as generated user interfaces, unit testing, control analyses of stimuli, single-command access to descriptive statistics, and publication quality plotting. Taken together, psychopy_ext opens an exciting possibility for a faster, more robust code development and collaboration for researchers. PMID:24478691

  2. Game-Theoretical Design of an Adaptive Distributed Dissemination Protocol for VANETs.

    PubMed

    Iza-Paredes, Cristhian; Mezher, Ahmad Mohamad; Aguilar Igartua, Mónica; Forné, Jordi

    2018-01-19

    Road safety applications envisaged for Vehicular Ad Hoc Networks (VANETs) depend largely on the dissemination of warning messages to deliver information to concerned vehicles. The intended applications, as well as some inherent VANET characteristics, make data dissemination an essential service and a challenging task in this kind of networks. This work lays out a decentralized stochastic solution for the data dissemination problem through two game-theoretical mechanisms. Given the non-stationarity induced by a highly dynamic topology, diverse network densities, and intermittent connectivity, a solution for the formulated game requires an adaptive procedure able to exploit the environment changes. Extensive simulations reveal that our proposal excels in terms of number of transmissions, lower end-to-end delay and reduced overhead while maintaining high delivery ratio, compared to other proposals.

  3. Game-Theoretical Design of an Adaptive Distributed Dissemination Protocol for VANETs

    PubMed Central

    Mezher, Ahmad Mohamad; Aguilar Igartua, Mónica

    2018-01-01

    Road safety applications envisaged for Vehicular Ad Hoc Networks (VANETs) depend largely on the dissemination of warning messages to deliver information to concerned vehicles. The intended applications, as well as some inherent VANET characteristics, make data dissemination an essential service and a challenging task in this kind of networks. This work lays out a decentralized stochastic solution for the data dissemination problem through two game-theoretical mechanisms. Given the non-stationarity induced by a highly dynamic topology, diverse network densities, and intermittent connectivity, a solution for the formulated game requires an adaptive procedure able to exploit the environment changes. Extensive simulations reveal that our proposal excels in terms of number of transmissions, lower end-to-end delay and reduced overhead while maintaining high delivery ratio, compared to other proposals. PMID:29351255

  4. Between land and sea: divergent data stewardship practices in deep-sea biosphere research

    NASA Astrophysics Data System (ADS)

    Cummings, R.; Darch, P.

    2013-12-01

    Data in deep-sea biosphere research often live a double life. While the original data generated on IODP expeditions are highly structured, professionally curated, and widely shared, the downstream data practices of deep-sea biosphere laboratories are far more localized and ad hoc. These divergent data practices make it difficult to track the provenance of datasets from the cruise ships to the laboratory or to integrate IODP data with laboratory data. An in-depth study of the divergent data practices in deep-sea biosphere research allows us to: - Better understand the social and technical forces that shape data stewardship throughout the data lifecycle; - Develop policy, infrastructure, and best practices to improve data stewardship in small labs; - Track provenance of datasets from IODP cruises to labs and publications; - Create linkages between laboratory findings, cruise data, and IODP samples. In this paper, we present findings from the first year of a case study of the Center for Dark Energy Biosphere Investigations (C-DEBI), an NSF Science and Technology Center that studies life beneath the seafloor. Our methods include observation in laboratories, interviews, document analysis, and participation in scientific meetings. Our research uncovers the data stewardship norms of geologists, biologists, chemists, and hydrologists conducting multi-disciplinary research. Our research team found that data stewardship on cruises is a clearly defined task performed by an IODP curator, while downstream it is a distributed task that develops in response to local need and to the extent necessary for the immediate research team. IODP data are expensive to collect and challenging to obtain, often costing $50,000/day and requiring researchers to work twelve hours a day onboard the ships. To maximize this research investment, a highly trained IODP data curator controls data stewardship on the cruise and applies best practices such as standardized formats, proper labeling, and centralized storage. In the laboratory, a scientist is his or her own curator. In contrast to the IODP research parties, laboratory research teams analyze diverse datasets, share them internally, implement ad hoc data management practices, optimize methods for their specific research questions, and release data on request through personal transactions. We discovered that while these workflows help small research teams retain flexibility and local control - crucial in exploratory deep-sea biosphere research - they also hinder data interoperability, discoverability, and consistency of methods from one research team to the next. Additional consequences of this contrast between IODP and lab practices are that it is difficult to track the provenance of data and to create linkages between laboratory findings, cruise data, and archived IODP samples. The ability to track provenance would add value to datasets and provide a clearer picture of the decisions made throughout the data lifecycle. Better linkages between the original data, laboratory data, and samples would allow secondary researchers to locate IODP data that may be useful to their research after laboratory findings are published. Our case study is funded by the Sloan Foundation and NSF.

  5. In Flight Evaluation of Active Inceptor Force-Feel Characteristics and Handling Qualities

    NASA Technical Reports Server (NTRS)

    Lusardi, Jeff A.; Blanken, Chris L.; Ott, Carl Raymond; Malpica, Carlos A.; von Gruenhagen, Wolfgang

    2012-01-01

    The effect of inceptor feel-system characteristics on piloted handling qualities has been a research topic of interest for many years. Most of the research efforts have focused on advanced fly-by-wire fixed-wing aircraft with only a few studies investigating the effects on rotorcraft. Consequently, only limited guidance is available on how cyclic force-feel characteristics should be set to obtain optimal handling qualities for rotorcraft. To study this effect, the U.S. Army Aeroflightdynamics Directorate working with the DLR Institute of Flight Systems in Germany under Task X of the U.S. German Memorandum of Understanding have been conducting flight test evaluations. In the U.S., five experimental test pilots have completed evaluations of two Mission Task Elements (MTEs) from ADS-33E-PRF and two command/response types for a matrix of center-stick cyclic force-feel characteristics at Moffett Field. In Germany, three experimental test Pilots have conducted initial evaluations of the two MTEs with two command/response types for a parallel matrix of side-stick cyclic force-feel characteristics at WTD-61 in Manching. The resulting data set is used to correlate the effect of changes in natural frequency and damping ratio of the cyclic inceptor on the piloted handling qualities. Existing criteria in ADS-33E and a proposed Handling Qualities Sensitivity Function that includes the effects of the cyclic force-feel characteristics are also evaluated against the data set and discussed.

  6. DataSpread: Unifying Databases and Spreadsheets.

    PubMed

    Bendre, Mangesh; Sun, Bofan; Zhang, Ding; Zhou, Xinyan; Chang, Kevin ChenChuan; Parameswaran, Aditya

    2015-08-01

    Spreadsheet software is often the tool of choice for ad-hoc tabular data management, processing, and visualization, especially on tiny data sets. On the other hand, relational database systems offer significant power, expressivity, and efficiency over spreadsheet software for data management, while lacking in the ease of use and ad-hoc analysis capabilities. We demonstrate DataSpread, a data exploration tool that holistically unifies databases and spreadsheets. It continues to offer a Microsoft Excel-based spreadsheet front-end, while in parallel managing all the data in a back-end database, specifically, PostgreSQL. DataSpread retains all the advantages of spreadsheets, including ease of use, ad-hoc analysis and visualization capabilities, and a schema-free nature, while also adding the advantages of traditional relational databases, such as scalability and the ability to use arbitrary SQL to import, filter, or join external or internal tables and have the results appear in the spreadsheet. DataSpread needs to reason about and reconcile differences in the notions of schema, addressing of cells and tuples, and the current "pane" (which exists in spreadsheets but not in traditional databases), and support data modifications at both the front-end and the back-end. Our demonstration will center on our first and early prototype of the DataSpread, and will give the attendees a sense for the enormous data exploration capabilities offered by unifying spreadsheets and databases.

  7. DataSpread: Unifying Databases and Spreadsheets

    PubMed Central

    Bendre, Mangesh; Sun, Bofan; Zhang, Ding; Zhou, Xinyan; Chang, Kevin ChenChuan; Parameswaran, Aditya

    2015-01-01

    Spreadsheet software is often the tool of choice for ad-hoc tabular data management, processing, and visualization, especially on tiny data sets. On the other hand, relational database systems offer significant power, expressivity, and efficiency over spreadsheet software for data management, while lacking in the ease of use and ad-hoc analysis capabilities. We demonstrate DataSpread, a data exploration tool that holistically unifies databases and spreadsheets. It continues to offer a Microsoft Excel-based spreadsheet front-end, while in parallel managing all the data in a back-end database, specifically, PostgreSQL. DataSpread retains all the advantages of spreadsheets, including ease of use, ad-hoc analysis and visualization capabilities, and a schema-free nature, while also adding the advantages of traditional relational databases, such as scalability and the ability to use arbitrary SQL to import, filter, or join external or internal tables and have the results appear in the spreadsheet. DataSpread needs to reason about and reconcile differences in the notions of schema, addressing of cells and tuples, and the current “pane” (which exists in spreadsheets but not in traditional databases), and support data modifications at both the front-end and the back-end. Our demonstration will center on our first and early prototype of the DataSpread, and will give the attendees a sense for the enormous data exploration capabilities offered by unifying spreadsheets and databases. PMID:26900487

  8. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tang, J. Y.; Riley, W. J.

    We present a generic flux limiter to account for mass limitations from an arbitrary number of substrates in a biogeochemical reaction network. The flux limiter is based on the observation that substrate (e.g., nitrogen, phosphorus) limitation in biogeochemical models can be represented as to ensure mass conservative and non-negative numerical solutions to the governing ordinary differential equations. Application of the flux limiter includes two steps: (1) formulation of the biogeochemical processes with a matrix of stoichiometric coefficients and (2) application of Liebig's law of the minimum using the dynamic stoichiometric relationship of the reactants. This approach contrasts with the ad hoc down-regulationmore » approaches that are implemented in many existing models (such as CLM4.5 and the ACME (Accelerated Climate Modeling for Energy) Land Model (ALM)) of carbon and nutrient interactions, which are error prone when adding new processes, even for experienced modelers. Through an example implementation with a CENTURY-like decomposition model that includes carbon, nitrogen, and phosphorus, we show that our approach (1) produced almost identical results to that from the ad hoc down-regulation approaches under non-limiting nutrient conditions, (2) properly resolved the negative solutions under substrate-limited conditions where the simple clipping approach failed, (3) successfully avoided the potential conceptual ambiguities that are implied by those ad hoc down-regulation approaches. We expect our approach will make future biogeochemical models easier to improve and more robust.« less

  9. Action Direction of Muscle Synergies in Three-Dimensional Force Space

    PubMed Central

    Hagio, Shota; Kouzaki, Motoki

    2015-01-01

    Redundancy in the musculoskeletal system was supposed to be simplified by muscle synergies, which modularly organize muscles. To clarify the underlying mechanisms of motor control using muscle synergies, it is important to examine the spatiotemporal contribution of muscle synergies in the task space. In this study, we quantified the mechanical contribution of muscle synergies as considering spatiotemporal correlation between the activation of muscle synergies and endpoint force fluctuations. Subjects performed isometric force generation in the three-dimensional force space. The muscle-weighting vectors of muscle synergies and their activation traces across different trials were extracted from electromyogram data using decomposing technique. We then estimated mechanical contribution of muscle synergies across each trial based on cross-correlation analysis. The contributing vectors were averaged for all trials, and the averaging was defined as action direction (AD) of muscle synergies. As a result, we extracted approximately five muscle synergies. The ADs of muscle synergies mainly depended on the anatomical functions of their weighting muscles. Furthermore, the AD of each muscle indicated the synchronous activation of muscles, which composed of the same muscle synergy. These results provide the spatiotemporal characteristics of muscle synergies as neural basis. PMID:26618156

  10. Action Direction of Muscle Synergies in Three-Dimensional Force Space.

    PubMed

    Hagio, Shota; Kouzaki, Motoki

    2015-01-01

    Redundancy in the musculoskeletal system was supposed to be simplified by muscle synergies, which modularly organize muscles. To clarify the underlying mechanisms of motor control using muscle synergies, it is important to examine the spatiotemporal contribution of muscle synergies in the task space. In this study, we quantified the mechanical contribution of muscle synergies as considering spatiotemporal correlation between the activation of muscle synergies and endpoint force fluctuations. Subjects performed isometric force generation in the three-dimensional force space. The muscle-weighting vectors of muscle synergies and their activation traces across different trials were extracted from electromyogram data using decomposing technique. We then estimated mechanical contribution of muscle synergies across each trial based on cross-correlation analysis. The contributing vectors were averaged for all trials, and the averaging was defined as action direction (AD) of muscle synergies. As a result, we extracted approximately five muscle synergies. The ADs of muscle synergies mainly depended on the anatomical functions of their weighting muscles. Furthermore, the AD of each muscle indicated the synchronous activation of muscles, which composed of the same muscle synergy. These results provide the spatiotemporal characteristics of muscle synergies as neural basis.

  11. Effects of static fingertip loading on carpal tunnel pressure

    NASA Technical Reports Server (NTRS)

    Rempel, D.; Keir, P. J.; Smutz, W. P.; Hargens, A.

    1997-01-01

    The purpose of this study was to explore the relationship between carpal tunnel pressure and fingertip force during a simple pressing task. Carpal tunnel pressure was measured in 15 healthy volunteers by means of a saline-filled catheter inserted percutaneously into the carpal tunnel of the nondominant hand. The subjects pressed on a load cell with the tip of the index finger and with 0, 6, 9, and 12 N of force. The task was repeated in 10 wrist postures: neutral; 10 and 20 degrees of ulnar deviation; 10 degrees of radial deviation; and 15, 30, and 45 degrees of both flexion and extension. Fingertip loading significantly increased carpal tunnel pressure for all wrist angles (p = 0.0001). Post hoc analyses identified significant increase (p < 0.05) in carpal tunnel pressure between unloaded (0 N) and all loaded conditions, as well as between the 6 and 12 N load conditions. This study demonstrates that the process whereby fingertip loading elevates carpal tunnel pressure is independent of wrist posture and that relatively small fingertip loads have a large effect on carpal tunnel pressure. It also reveals the response characteristics of carpal tunnel pressure to fingertip loading, which is one step in understanding the relationship between sustained grip and pinch activities and the aggravation or development of median neuropathy at the wrist.

  12. Classes in the Balance: Latent Class Analysis and the Balance Scale Task

    ERIC Educational Resources Information Center

    Boom, Jan; ter Laak, Jan

    2007-01-01

    Latent class analysis (LCA) has been successfully applied to tasks measuring higher cognitive functioning, suggesting the existence of distinct strategies used in such tasks. With LCA it became possible to classify post hoc. This important step forward in modeling and analyzing cognitive strategies is relevant to the overlapping waves model for…

  13. Maintaining Limited-Range Connectivity Among Second-Order Agents

    DTIC Science & Technology

    2016-07-07

    we consider ad-hoc networks of robotic agents with double integrator dynamics. For such networks, the connectivity maintenance problems are: (i) do...hoc networks of mobile autonomous agents. This loose ter- minology refers to groups of robotic agents with limited mobility and communica- tion...connectivity can be preserved. 3.1. Networks of robotic agents with second-order dynamics and the connectivity maintenance problem. We begin by

  14. Modelling multi-rotor UAVs swarm deployment using virtual pheromones

    PubMed Central

    Pujol, Mar; Rizo, Ramón; Rizo, Carlos

    2018-01-01

    In this work, a swarm behaviour for multi-rotor Unmanned Aerial Vehicles (UAVs) deployment will be presented. The main contribution of this behaviour is the use of a virtual device for quantitative sematectonic stigmergy providing more adaptable behaviours in complex environments. It is a fault tolerant highly robust behaviour that does not require prior information of the area to be covered, or to assume the existence of any kind of information signals (GPS, mobile communication networks …), taking into account the specific features of UAVs. This behaviour will be oriented towards emergency tasks. Their main goal will be to cover an area of the environment for later creating an ad-hoc communication network, that can be used to establish communications inside this zone. Although there are several papers on robotic deployment it is more difficult to find applications with UAV systems, mainly because of the existence of various problems that must be overcome including limitations in available sensory and on-board processing capabilities and low flight endurance. In addition, those behaviours designed for UAVs often have significant limitations on their ability to be used in real tasks, because they assume specific features, not easily applicable in a general way. Firstly, in this article the characteristics of the simulation environment will be presented. Secondly, a microscopic model for deployment and creation of ad-hoc networks, that implicitly includes stigmergy features, will be shown. Then, the overall swarm behaviour will be modeled, providing a macroscopic model of this behaviour. This model can accurately predict the number of agents needed to cover an area as well as the time required for the deployment process. An experimental analysis through simulation will be carried out in order to verify our models. In this analysis the influence of both the complexity of the environment and the stigmergy system will be discussed, given the data obtained in the simulation. In addition, the macroscopic and microscopic models will be compared verifying the number of predicted individuals for each state regarding the simulation. PMID:29370203

  15. Where Do Community Colleges Stand?

    ERIC Educational Resources Information Center

    Pietak, Raymond

    1971-01-01

    Traditional clubs and structures continue to serve needs of interested students. However, more socially aware students must have operational vehicles to meet their dynamic needs. The identification of problem areas and the creation of ad hoc interest groups should be added to the college activity programs. (Author)

  16. EFNS guidelines for the diagnosis and management of Alzheimer's disease.

    PubMed

    Hort, J; O'Brien, J T; Gainotti, G; Pirttila, T; Popescu, B O; Rektorova, I; Sorbi, S; Scheltens, P

    2010-10-01

    In 2008 a task force was set up to develop a revision of the European Federation of the Neurological Societies (EFNS) guideline for the diagnosis and management of Alzheimer's disease (AD) and other disorders associated with dementia, published in early 2007. The aim of this revised international guideline was to present a peer-reviewed evidence-based statement for the guidance of practice for clinical neurologists, geriatricians, psychiatrists, and other specialist physicians responsible for the care of patients with AD. Mild cognitive impairment and non-Alzheimer dementias are not included in this guideline. The task force working group reviewed evidence from original research articles, meta-analysis, and systematic reviews, published before May 2009. The evidence was classified and consensus recommendations graded (A, B, or C) according to the EFNS guidance. Where there was a lack of evidence, but clear consensus, good practice points were provided. The recommendations for clinical diagnosis, blood tests, neuropsychology, neuroimaging, electroencephalography, cerebrospinal fluid (CSF) analysis, genetic testing, disclosure of diagnosis, treatment of AD, behavioural and psychological symptoms in dementia, legal issues, counselling and support for caregivers were all revised as compared with the previous EFNS guideline. A number of new recommendations and good practice points are made, namely in CSF, neuropsychology, neuroimaging and reviewing non-evidence based therapies. The assessment, interpretation, and treatment of symptoms, disability, needs, and caregiver stress during the course of AD require the contribution of many different professionals. These professionals should adhere to these guideline to improve the diagnosis and management of AD. © 2010 The Author(s). European Journal of Neurology © 2010 EFNS.

  17. Interactive MPEG-4 low-bit-rate speech/audio transmission over the Internet

    NASA Astrophysics Data System (ADS)

    Liu, Fang; Kim, JongWon; Kuo, C.-C. Jay

    1999-11-01

    The recently developed MPEG-4 technology enables the coding and transmission of natural and synthetic audio-visual data in the form of objects. In an effort to extend the object-based functionality of MPEG-4 to real-time Internet applications, architectural prototypes of multiplex layer and transport layer tailored for transmission of MPEG-4 data over IP are under debate among Internet Engineering Task Force (IETF), and MPEG-4 systems Ad Hoc group. In this paper, we present an architecture for interactive MPEG-4 speech/audio transmission system over the Internet. It utilities a framework of Real Time Streaming Protocol (RTSP) over Real-time Transport Protocol (RTP) to provide controlled, on-demand delivery of real time speech/audio data. Based on a client-server model, a couple of low bit-rate bit streams (real-time speech/audio, pre- encoded speech/audio) are multiplexed and transmitted via a single RTP channel to the receiver. The MPEG-4 Scene Description (SD) and Object Descriptor (OD) bit streams are securely sent through the RTSP control channel. Upon receiving, an initial MPEG-4 audio- visual scene is constructed after de-multiplexing, decoding of bit streams, and scene composition. A receiver is allowed to manipulate the initial audio-visual scene presentation locally, or interactively arrange scene changes by sending requests to the server. A server may also choose to update the client with new streams and list of contents for user selection.

  18. A memetic optimization algorithm for multi-constrained multicast routing in ad hoc networks

    PubMed Central

    Hammad, Karim; El Bakly, Ahmed M.

    2018-01-01

    A mobile ad hoc network is a conventional self-configuring network where the routing optimization problem—subject to various Quality-of-Service (QoS) constraints—represents a major challenge. Unlike previously proposed solutions, in this paper, we propose a memetic algorithm (MA) employing an adaptive mutation parameter, to solve the multicast routing problem with higher search ability and computational efficiency. The proposed algorithm utilizes an updated scheme, based on statistical analysis, to estimate the best values for all MA parameters and enhance MA performance. The numerical results show that the proposed MA improved the delay and jitter of the network, while reducing computational complexity as compared to existing algorithms. PMID:29509760

  19. A memetic optimization algorithm for multi-constrained multicast routing in ad hoc networks.

    PubMed

    Ramadan, Rahab M; Gasser, Safa M; El-Mahallawy, Mohamed S; Hammad, Karim; El Bakly, Ahmed M

    2018-01-01

    A mobile ad hoc network is a conventional self-configuring network where the routing optimization problem-subject to various Quality-of-Service (QoS) constraints-represents a major challenge. Unlike previously proposed solutions, in this paper, we propose a memetic algorithm (MA) employing an adaptive mutation parameter, to solve the multicast routing problem with higher search ability and computational efficiency. The proposed algorithm utilizes an updated scheme, based on statistical analysis, to estimate the best values for all MA parameters and enhance MA performance. The numerical results show that the proposed MA improved the delay and jitter of the network, while reducing computational complexity as compared to existing algorithms.

  20. Evolution of Geometric Sensitivity Derivatives from Computer Aided Design Models

    NASA Technical Reports Server (NTRS)

    Jones, William T.; Lazzara, David; Haimes, Robert

    2010-01-01

    The generation of design parameter sensitivity derivatives is required for gradient-based optimization. Such sensitivity derivatives are elusive at best when working with geometry defined within the solid modeling context of Computer-Aided Design (CAD) systems. Solid modeling CAD systems are often proprietary and always complex, thereby necessitating ad hoc procedures to infer parameter sensitivity. A new perspective is presented that makes direct use of the hierarchical associativity of CAD features to trace their evolution and thereby track design parameter sensitivity. In contrast to ad hoc methods, this method provides a more concise procedure following the model design intent and determining the sensitivity of CAD geometry directly to its respective defining parameters.

  1. Ad Hoc Selection of Voice over Internet Streams

    NASA Technical Reports Server (NTRS)

    Macha, Mitchell G. (Inventor); Bullock, John T. (Inventor)

    2014-01-01

    A method and apparatus for a communication system technique involving ad hoc selection of at least two audio streams is provided. Each of the at least two audio streams is a packetized version of an audio source. A data connection exists between a server and a client where a transport protocol actively propagates the at least two audio streams from the server to the client. Furthermore, software instructions executable on the client indicate a presence of the at least two audio streams, allow selection of at least one of the at least two audio streams, and direct the selected at least one of the at least two audio streams for audio playback.

  2. Ad Hoc Selection of Voice over Internet Streams

    NASA Technical Reports Server (NTRS)

    Macha, Mitchell G. (Inventor); Bullock, John T. (Inventor)

    2008-01-01

    A method and apparatus for a communication system technique involving ad hoc selection of at least two audio streams is provided. Each of the at least two audio streams is a packetized version of an audio source. A data connection exists between a server and a client where a transport protocol actively propagates the at least two audio streams from the server to the client. Furthermore, software instructions executable on the client indicate a presence of the at least two audio streams, allow selection of at least one of the at least two audio streams, and direct the selected at least one of the at least two audio streams for audio playback.

  3. Pupil diameter, working distance and illumination during habitual tasks. Implications for simultaneous vision contact lenses for presbyopia.

    PubMed

    Cardona, Genís; López, Sílvia

    2016-01-01

    To determine working distance, pupil diameter and illumination in real life conditions in a sample of presbyopic participants performing habitual tasks. A total of 59 presbyopic subjects (aged between 45 and 63 years) with different occupational backgrounds participated in the study. Participants were first interviewed regarding their habitual tasks with the aid of an ad hoc questionnaire, following which in-office photopic and mesopic pupil diameter was determined. Pupil diameter was also evaluated while participants conducted each of the self-reported habitual tasks by taking a photograph, which was later submitted to image analysis. In addition, working distance was determined with a measuring tape and the illumination that reached the pupil during each of the different tasks was measured, in lux, with a light meter. The four most common habitual tasks were computer use, reading, sewing and sports. A high intersubject variability was found in pupil diameter, working distance and illumination conditions while conducting the same task. Statistically significant differences were found between the in-office measured photopic and mesopic pupil diameters and those obtained while participants were conducting their habitual tasks in real life conditions (all p<0.001). Potential multifocal contact lens users may present with different ages, different jobs or hobbies and different preferences regarding lighting conditions and working distances. This results in different pupil size, even within the same task. This information may be critical when selecting a particular lens design and add power. Eye care practitioners are therefore advised to assess pupil diameter in real life conditions. Copyright © 2015 Spanish General Council of Optometry. Published by Elsevier Espana. All rights reserved.

  4. Inertial Mass Viewed as Reaction of the Vacuum to Accelerated Motion

    NASA Technical Reports Server (NTRS)

    Rueda, Alfonso; Haisch, Bernhard

    1999-01-01

    Preliminary analysis of the momentum flux (or of the Poynting vector) of the classical electromagnetic version of the quantum vacuum consisting of zero-point radiation impinging on accelerated objects as viewed by an inertial observer suggests that the resistance to acceleration attributed to inertia may be a force of opposition originating in the vacuum. This analysis avoids the ad hoc modeling of particle-field interaction dynamics used previously by Haisck Rueda and Puthoff (1994) to derive a similar result. This present approach is not dependent upon what happens at the particle point but on how an external observer assesses the kinematical characteristics of the zero-point radiation impinging on the accelerated object. A relativistic form of the equation of motion results from the present analysis.

  5. Claims and Identity: On-Premise and Cloud Solutions

    NASA Astrophysics Data System (ADS)

    Bertocci, Vittorio

    Today's identity-management practices are often a patchwork of partial solutions, which somehow accommodate but never really integrate applications and entities separated by technology and organizational boundaries. The rise of Software as a Service (SaaS) and cloud computing, however, will force organizations to cross such boundaries so often that ad hoc solutions will simply be untenable. A new approach that tears down identity silos and supports a de-perimiterized IT by design is in order.This article will walk you through the principles of claims-based identity management, a model which addresses both traditional and cloud scenarios with the same efficacy. We will explore the most common token exchange patterns, highlighting the advantages and opportunities they offer when applied on cloud computing solutions and generic distributed systems.

  6. Correlation between Cognition and Function across the Spectrum of Alzheimer's Disease.

    PubMed

    Liu-Seifert, H; Siemers, E; Selzler, K; Sundell, K; Aisen, P; Cummings, J; Raskin, J; Mohs, R

    2016-01-01

    Both cognitive and functional deterioration are characteristic of the clinical progression of Alzheimer's disease (AD). To systematically assess correlations between widely used measures of cognition and function across the spectrum of AD. Spearman rank correlations were calculated for cognitive and functional measures across datasets from various AD patient populations. Post-hoc analysis from existing databases. Pooled data from placebo-treated patients with mild (MMSE score ≥20 and ≤26) and moderate (MMSE score ≥16 and ≤19) AD dementia from two Phase 3 solanezumab (EXPEDITION/2) and two semagecesatat (IDENTITY/2) studies and normal, late mild cognitive impairment (LMCI) and mild AD patients from the Alzheimer's Disease Neuroimaging Initiative 2-Grand Opportunity (ADNI-2/GO). Intervention (if any): Placebo (EXPEDITION/2 and IDENTITY/2 subjects). Cognitive and functional abilities were measured in all datasets. Data were collected at baseline and every three months for 18 months in EXPEDITION and IDENTITY studies; and at baseline, 6, 12, and 24 months in the ADNI dataset. The relationship of cognition and function became stronger over time as AD patients progressed from preclinical to moderate dementia disease stages, with the magnitude of correlations dependent on disease stage and the complexity of functional task. The correlations were minimal in the normal control population, but became stronger with disease progression. This analysis found that measures of cognition and function become more strongly correlated with disease progression from preclinical to moderate dementia across multiple datasets. These findings improve the understanding of the relationship between cognitive and functional clinical measures during the course of AD progression and how cognition and function measures relate to each other in AD clinical trials.

  7. Working memory binding and episodic memory formation in aging, mild cognitive impairment, and Alzheimer's dementia.

    PubMed

    van Geldorp, Bonnie; Heringa, Sophie M; van den Berg, Esther; Olde Rikkert, Marcel G M; Biessels, Geert Jan; Kessels, Roy P C

    2015-01-01

    Recent studies indicate that in both normal and pathological aging working memory (WM) performance deteriorates, especially when associations have to be maintained. However, most studies typically do not assess the relationship between WM and episodic memory formation. In the present study, we examined WM and episodic memory formation in normal aging and in patients with early Alzheimer's disease (mild cognitive impairment, MCI; and Alzheimer's dementia, AD). In the first study, 26 young adults (mean age 29.6 years) were compared to 18 middle-aged adults (mean age 52.2 years) and 25 older adults (mean age 72.8 years). We used an associative delayed-match-to-sample WM task, which requires participants to maintain two pairs of faces and houses presented on a computer screen for short (3 s) or long (6 s) maintenance intervals. After the WM task, an unexpected subsequent associative memory task was administered (two-alternative forced choice). In the second study, 27 patients with AD and 19 patients with MCI were compared to 25 older controls, using the same paradigm as that in Experiment 1. Older adults performed worse than both middle-aged and young adults. No effect of delay was observed in the healthy adults, and pairs that were processed during long maintenance intervals were not better remembered in the subsequent memory task. In the MCI and AD patients, longer maintenance intervals hampered the task performance. Also, both patient groups performed significantly worse than controls on the episodic memory task as well as the associative WM task. Aging and AD present with a decline in WM binding, a finding that extends similar results in episodic memory. Longer delays in the WM task did not affect episodic memory formation. We conclude that WM deficits are found when WM capacity is exceeded, which may occur during associative processing.

  8. Biomarker and Clinical Trial Design Support for Disease-Modifying Therapies: Report of a Survey of the EU/US: Alzheimer's Disease Task Force.

    PubMed

    Cummings, J; Fox, N; Vellas, B; Aisen, P; Shan, G

    2018-01-01

    Disease-modifying therapies are urgently needed for the treatment of Alzheimer's disease (AD). The European Union/United States (EU/US) Task Force represents a broad range of stakeholders including biopharma industry personnel, academicians, and regulatory authorities. The EU/US Task Force represents a community of knowledgeable individuals who can inform views of evidence supporting disease modification and the development of disease-modifying therapies (DMTs). We queried their attitudes toward clinical trial design and biomarkers in support of DMTs. A survey of members of the EU/US Alzheimer's Disease Task Force was conducted. Ninety-three members (87%) responded. The details were analyzed to understand what clinical trial design and biomarker data support disease modification. Task Force members favored the parallel group design compared to delayed start or staggered withdrawal clinical trial designs to support disease modification. Amyloid biomarkers were regarded as providing mild support for disease modification while tau biomarkers were regarded as providing moderate support. Combinations of biomarkers, particularly combinations of tau and neurodegeneration, were regarded as providing moderate to marked support for disease modification and combinations of all three classes of biomarkers were regarded by a majority as providing marked support for disease modification. Task Force members considered that evidence derived from clinical trials and biomarkers supports clinical meaningfulness of an intervention, and when combined with a single clinical trial outcome, nearly all regarded the clinical trial design or biomarker evidence as supportive of disease modification. A minority considered biomarker evidence by itself as indicative of disease modification in prevention trials. Levels of evidence (A,B,C) were constructed based on these observations. The survey indicates the view of knowledgeable stakeholders regarding evidence derived from clinical trial design and biomarkers in support of disease modification. Results of this survey can assist in designing clinical trials of DMTs.

  9. Operational Monitoring of GOME-2 and IASI Level 1 Product Processing at EUMETSAT

    NASA Astrophysics Data System (ADS)

    Livschitz, Yakov; Munro, Rosemary; Lang, Rüdiger; Fiedler, Lars; Dyer, Richard; Eisinger, Michael

    2010-05-01

    The growing complexity of operational level 1 radiance products from Low Earth Orbiting (LEO) platforms like EUMETSATs Metop series makes near-real-time monitoring of product quality a challenging task. The main challenge is to provide a monitoring system which is flexible and robust enough to identify and to react to anomalies which may be previously unknown to the system, as well as to provide all means and parameters necessary in order to support efficient ad-hoc analysis of the incident. The operational monitoring system developed at EUMETSAT for monitoring of GOME-2 and IASI level 1 data allows to perform near-real-time monitoring of operational products and instrument's health in a robust and flexible fashion. For effective information management, the system is based on a relational database (Oracle). An Extract, Transform, Load (ETL) process transforms products in EUMETSAT Polar System (EPS) format into relational data structures. The identification of commonalities between products and instruments allows for a database structure design in such a way that different data can be analyzed using the same business intelligence functionality. An interactive analysis software implementing modern data mining techniques is also provided for a detailed look into the data. The system is effectively used for day-to-day monitoring, long-term reporting, instrument's degradation analysis as well as for ad-hoc queries in case of an unexpected instrument or processing behaviour. Having data from different sources on a single instrument and even from different instruments, platforms or numerical weather prediction within the same database allows effective cross-comparison and looking for correlated parameters. Automatic alarms raised by checking for deviation of certain parameters, for data losses and other events significantly reduce time, necessary to monitor the processing on a day-to-day basis.

  10. Operational Monitoring of GOME-2 and IASI Level 1 Product Processing at EUMETSAT

    NASA Astrophysics Data System (ADS)

    Livschitz, Y.; Munro, R.; Lang, R.; Fiedler, L.; Dyer, R.; Eisinger, M.

    2009-12-01

    The growing complexity of operational level 1 radiance products from Low Earth Orbiting (LEO) platforms like EUMETSATs Metop series makes near-real-time monitoring of product quality a challenging task. The main challenge is to provide a monitoring system which is flexible and robust enough to identify and to react to anomalies which may be previously unknown to the system, as well as to provide all means and parameters necessary in order to support efficient ad-hoc analysis of the incident. The operational monitoring system developed at EUMETSAT for monitoring of GOME-2 and IASI level 1 data allows to perform near-real-time monitoring of operational products and instrument’s health in a robust and flexible fashion. For effective information management, the system is based on a relational database (Oracle). An Extract, Transform, Load (ETL) process transforms products in EUMETSAT Polar System (EPS) format into relational data structures. The identification of commonalities between products and instruments allows for a database structure design in such a way that different data can be analyzed using the same business intelligence functionality. An interactive analysis software implementing modern data mining techniques is also provided for a detailed look into the data. The system is effectively used for day-to-day monitoring, long-term reporting, instrument’s degradation analysis as well as for ad-hoc queries in case of an unexpected instrument or processing behaviour. Having data from different sources on a single instrument and even from different instruments, platforms or numerical weather prediction within the same database allows effective cross-comparison and looking for correlated parameters. Automatic alarms raised by checking for deviation of certain parameters, for data losses and other events significantly reduce time, necessary to monitor the processing on a day-to-day basis.

  11. A Game Theory Based Solution for Security Challenges in CRNs

    NASA Astrophysics Data System (ADS)

    Poonam; Nagpal, Chander Kumar

    2018-03-01

    Cognitive radio networks (CRNs) are being envisioned to drive the next generation Ad hoc wireless networks due to their ability to provide communications resilience in continuously changing environments through the use of dynamic spectrum access. Conventionally CRNs are dependent upon the information gathered by other secondary users to ensure the accuracy of spectrum sensing making them vulnerable to security attacks leading to the need of security mechanisms like cryptography and trust. However, a typical cryptography based solution is not a viable security solution for CRNs owing to their limited resources. Effectiveness of trust based approaches has always been, in question, due to credibility of secondary trust resources. Game theory with its ability to optimize in an environment of conflicting interests can be quite a suitable tool to manage an ad hoc network in the presence of autonomous selfish/malevolent/malicious and attacker nodes. The literature contains several theoretical proposals for augmenting game theory in the ad hoc networks without explicit/detailed implementation. This paper implements a game theory based solution in MATLAB-2015 to secure the CRN environment and compares the obtained results with the traditional approaches of trust and cryptography. The simulation result indicates that as the time progresses the game theory performs much better with higher throughput, lower jitter and better identification of selfish/malicious nodes.

  12. Provision of out-of-hours interventional radiology services in the London strategic health authority.

    PubMed

    Illing, R O; Clark, C L Ingham; Allum, C

    2010-04-01

    To review the provision of out-of-hours interventional radiology (IR) services in the London Strategic Health Authority (SHA). All 29 acute hospitals in the London SHA were contacted between November 2008 and January 2009. A questionnaire based on the Royal College of Radiologists (RCR) guidelines assessed the provision of out-of-hours IR services. An "ad-hoc" service was defined as on-call provision where not all the radiologists could perform intervention: If IR was required out of hours, an interventionalist came in when off-duty or the patient was transferred. Seventeen out of the 29 (59%) hospitals provided ad-hoc out-of-hours services, eight (28%) provided a 24-hour rota, and four (14%) provide no out-of-hours cover. No ad-hoc service had formal transfer arrangements to a centre providing a 24h service. Only two hospitals providing a 24h service had six radiologists on the rota. Strategic planning for out-of-hours IR across London is recommended. This is likely to be welcomed by the hospitals involved, allowing informal arrangements to be formalized, and collaboration to provide comprehensive regional networks, provided appropriate funding is made available. A national audit is recommended; it is unlikely these findings are unique to London.

  13. BCDP: Budget Constrained and Delay-Bounded Placement for Hybrid Roadside Units in Vehicular Ad Hoc Networks

    PubMed Central

    Li, Peng; Huang, Chuanhe; Liu, Qin

    2014-01-01

    In vehicular ad hoc networks, roadside units (RSUs) placement has been proposed to improve the the overall network performance in many ITS applications. This paper addresses the budget constrained and delay-bounded placement problem (BCDP) for roadside units in vehicular ad hoc networks. There are two types of RSUs: cable connected RSU (c-RSU) and wireless RSU (w-RSU). c-RSUs are interconnected through wired lines, and they form the backbone of VANETs, while w-RSUs connect to other RSUs through wireless communication and serve as an economical extension of the coverage of c-RSUs. The delay-bounded coverage range and deployment cost of these two cases are totally different. We are given a budget constraint and a delay bound, the problem is how to find the optimal candidate sites with the maximal delay-bounded coverage to place RSUs such that a message from any c-RSU in the region can be disseminated to the more vehicles within the given budget constraint and delay bound. We first prove that the BCDP problem is NP-hard. Then we propose several algorithms to solve the BCDP problem. Simulation results show the heuristic algorithms can significantly improve the coverage range and reduce the total deployment cost, compared with other heuristic methods. PMID:25436656

  14. Reliable Geographical Forwarding in Cognitive Radio Sensor Networks Using Virtual Clusters

    PubMed Central

    Zubair, Suleiman; Fisal, Norsheila

    2014-01-01

    The need for implementing reliable data transfer in resource-constrained cognitive radio ad hoc networks is still an open issue in the research community. Although geographical forwarding schemes are characterized by their low overhead and efficiency in reliable data transfer in traditional wireless sensor network, this potential is still yet to be utilized for viable routing options in resource-constrained cognitive radio ad hoc networks in the presence of lossy links. In this paper, a novel geographical forwarding technique that does not restrict the choice of the next hop to the nodes in the selected route is presented. This is achieved by the creation of virtual clusters based on spectrum correlation from which the next hop choice is made based on link quality. The design maximizes the use of idle listening and receiver contention prioritization for energy efficiency, the avoidance of routing hot spots and stability. The validation result, which closely follows the simulation result, shows that the developed scheme can make more advancement to the sink as against the usual decisions of relevant ad hoc on-demand distance vector route select operations, while ensuring channel quality. Further simulation results have shown the enhanced reliability, lower latency and energy efficiency of the presented scheme. PMID:24854362

  15. Designing integrated computational biology pipelines visually.

    PubMed

    Jamil, Hasan M

    2013-01-01

    The long-term cost of developing and maintaining a computational pipeline that depends upon data integration and sophisticated workflow logic is too high to even contemplate "what if" or ad hoc type queries. In this paper, we introduce a novel application building interface for computational biology research, called VizBuilder, by leveraging a recent query language called BioFlow for life sciences databases. Using VizBuilder, it is now possible to develop ad hoc complex computational biology applications at throw away costs. The underlying query language supports data integration and workflow construction almost transparently and fully automatically, using a best effort approach. Users express their application by drawing it with VizBuilder icons and connecting them in a meaningful way. Completed applications are compiled and translated as BioFlow queries for execution by the data management system LifeDB, for which VizBuilder serves as a front end. We discuss VizBuilder features and functionalities in the context of a real life application after we briefly introduce BioFlow. The architecture and design principles of VizBuilder are also discussed. Finally, we outline future extensions of VizBuilder. To our knowledge, VizBuilder is a unique system that allows visually designing computational biology pipelines involving distributed and heterogeneous resources in an ad hoc manner.

  16. Assessment of interbreeding and introgression of farm genes into a small Scottish Atlantic salmon Salmo salar stock: ad hoc samples - ad hoc results?

    PubMed

    Verspoor, E; Knox, D; Marshall, S

    2016-12-01

    An eclectic set of tissues and existing data, including purposely collected samples, spanning 1997-2006, was used in an ad hoc assessment of hybridization and introgression of farmed wild Atlantic salmon Salmo salar in the small Loch na Thull (LnT) catchment in north-west Scotland. The catchment is in an area of marine farm production and contains freshwater smolt rearing cages. The LnT S. salar stock was found to be genetically distinctive from stocks in neighbouring rivers and, despite regular reports of feral farm S. salar, there was no evidence of physical or genetic mixing. This cannot be completely ruled out, however, and low level mixing with other local wild stocks has been suggested. The LnT population appeared underpinned by relatively smaller effective number of breeders (N eb ) and showed relatively low levels of genetic diversity, consistent with a small effective population size. Small sample sizes, an incomplete farm baseline and the use of non-diagnostic molecular markers, constrain the power of the analysis but the findings strongly support the LnT catchment having a genetically distinct wild S. salar population little affected by interbreeding with feral farm escapes. © 2016 The Fisheries Society of the British Isles.

  17. Technical Note: A generic law-of-the-minimum flux limiter for simulating substrate limitation in biogeochemical models

    DOE PAGES

    Tang, J. Y.; Riley, W. J.

    2016-02-05

    We present a generic flux limiter to account for mass limitations from an arbitrary number of substrates in a biogeochemical reaction network. The flux limiter is based on the observation that substrate (e.g., nitrogen, phosphorus) limitation in biogeochemical models can be represented as to ensure mass conservative and non-negative numerical solutions to the governing ordinary differential equations. Application of the flux limiter includes two steps: (1) formulation of the biogeochemical processes with a matrix of stoichiometric coefficients and (2) application of Liebig's law of the minimum using the dynamic stoichiometric relationship of the reactants. This approach contrasts with the ad hoc down-regulationmore » approaches that are implemented in many existing models (such as CLM4.5 and the ACME (Accelerated Climate Modeling for Energy) Land Model (ALM)) of carbon and nutrient interactions, which are error prone when adding new processes, even for experienced modelers. Through an example implementation with a CENTURY-like decomposition model that includes carbon, nitrogen, and phosphorus, we show that our approach (1) produced almost identical results to that from the ad hoc down-regulation approaches under non-limiting nutrient conditions, (2) properly resolved the negative solutions under substrate-limited conditions where the simple clipping approach failed, (3) successfully avoided the potential conceptual ambiguities that are implied by those ad hoc down-regulation approaches. We expect our approach will make future biogeochemical models easier to improve and more robust.« less

  18. Vibrational Frequencies and Spectroscopic Constants for 1(sup 3)A' HNC and 1(sup 3)A' HOC+ from High-Accuracy Quartic Force Fields

    NASA Technical Reports Server (NTRS)

    Fortenberry, Ryan C.; Crawford, T. Daniel; Lee, Timothy J.

    2014-01-01

    The spectroscopic constants and vibrational frequencies for the 1(sup 3)A' states of HNC, DNC, HOC+, and DOC+ are computed and discussed in this work. The reliable CcCR quartic force field based on high-level coupled cluster ab initio quantum chemical computations is exclusively utilized to provide the anharmonic potential. Then, second order vibrational perturbation theory and vibrational configuration interaction methods are employed to treat the nuclear Schroedinger equation. Second-order perturbation theory is also employed to provide spectroscopic data for all molecules examined. The relationship between these molecules and the corresponding 1(sup 3)A' HCN and HCO+ isomers is further developed here. These data are applicable to laboratory studies involving formation of HNC and HOC+ as well as astronomical observations of chemically active astrophysical environments.

  19. Visual Literacy in Preservice Teachers: a Case Study in Biology

    NASA Astrophysics Data System (ADS)

    Ruiz-Gallardo, José Reyes; García Fernández, Beatriz; Mateos Jiménez, Antonio

    2017-07-01

    In this study, we explore the competence of preservice teachers (n = 161) in labelling and creating new cross-sectional human diagrams, based on anatomy knowledge depicted in longitudinal sections. Using educational standards to assess visual literacy and ad hoc open questions, results indicate limited skills for both tasks. However, their competence is particularly poor creating diagrams, where shortcomings were observed not only in visual literacy but in content knowledge. We discuss the misconceptions detected during these assessments. Visual literacy training should be strengthened for these students, as it is a skill that is especially important for future teachers to use in learning, assessing, and reflecting on content in science education. This is particularly important in preservice teachers since they should be fluent in the use of visual teaching tools in teaching anatomy and other content in the biology curriculum.

  20. Intelligent routing protocol for ad hoc wireless network

    NASA Astrophysics Data System (ADS)

    Peng, Chaorong; Chen, Chang Wen

    2006-05-01

    A novel routing scheme for mobile ad hoc networks (MANETs), which combines hybrid and multi-inter-routing path properties with a distributed topology discovery route mechanism using control agents is proposed in this paper. In recent years, a variety of hybrid routing protocols for Mobile Ad hoc wireless networks (MANETs) have been developed. Which is proactively maintains routing information for a local neighborhood, while reactively acquiring routes to destinations beyond the global. The hybrid protocol reduces routing discovery latency and the end-to-end delay by providing high connectivity without requiring much of the scarce network capacity. On the other side the hybrid routing protocols in MANETs likes Zone Routing Protocol still need route "re-discover" time when a route between zones link break. Sine the topology update information needs to be broadcast routing request on local zone. Due to this delay, the routing protocol may not be applicable for real-time data and multimedia communication. We utilize the advantages of a clustering organization and multi-routing path in routing protocol to achieve several goals at the same time. Firstly, IRP efficiently saves network bandwidth and reduces route reconstruction time when a routing path fails. The IRP protocol does not require global periodic routing advertisements, local control agents will automatically monitor and repair broke links. Secondly, it efficiently reduces congestion and traffic "bottlenecks" for ClusterHeads in clustering network. Thirdly, it reduces significant overheads associated with maintaining clusters. Fourthly, it improves clusters stability due to dynamic topology changing frequently. In this paper, we present the Intelligent Routing Protocol. First, we discuss the problem of routing in ad hoc networks and the motivation of IRP. We describe the hierarchical architecture of IRP. We describe the routing process and illustrate it with an example. Further, we describe the control manage mechanisms, which are used to control active route and reduce the traffic amount in the route discovery procedure. Finial, the numerical experiments are given to show the effectiveness of IRP routing protocol.

  1. Familiarity and face emotion recognition in patients with schizophrenia.

    PubMed

    Lahera, Guillermo; Herrera, Sara; Fernández, Cristina; Bardón, Marta; de los Ángeles, Victoria; Fernández-Liria, Alberto

    2014-01-01

    To assess the emotion recognition in familiar and unknown faces in a sample of schizophrenic patients and healthy controls. Face emotion recognition of 18 outpatients diagnosed with schizophrenia (DSM-IVTR) and 18 healthy volunteers was assessed with two Emotion Recognition Tasks using familiar faces and unknown faces. Each subject was accompanied by 4 familiar people (parents, siblings or friends), which were photographed by expressing the 6 Ekman's basic emotions. Face emotion recognition in familiar faces was assessed with this ad hoc instrument. In each case, the patient scored (from 1 to 10) the subjective familiarity and affective valence corresponding to each person. Patients with schizophrenia not only showed a deficit in the recognition of emotions on unknown faces (p=.01), but they also showed an even more pronounced deficit on familiar faces (p=.001). Controls had a similar success rate in the unknown faces task (mean: 18 +/- 2.2) and the familiar face task (mean: 17.4 +/- 3). However, patients had a significantly lower score in the familiar faces task (mean: 13.2 +/- 3.8) than in the unknown faces task (mean: 16 +/- 2.4; p<.05). In both tests, the highest number of errors was with emotions of anger and fear. Subjectively, the patient group showed a lower level of familiarity and emotional valence to their respective relatives (p<.01). The sense of familiarity may be a factor involved in the face emotion recognition and it may be disturbed in schizophrenia. © 2013.

  2. Perception of force and stiffness in the presence of low-frequency haptic noise

    PubMed Central

    Gurari, Netta; Okamura, Allison M.; Kuchenbecker, Katherine J.

    2017-01-01

    Objective This work lays the foundation for future research on quantitative modeling of human stiffness perception. Our goal was to develop a method by which a human’s ability to perceive suprathreshold haptic force stimuli and haptic stiffness stimuli can be affected by adding haptic noise. Methods Five human participants performed a same-different task with a one-degree-of-freedom force-feedback device. Participants used the right index finger to actively interact with variations of force (∼5 and ∼8 N) and stiffness (∼290 N/m) stimuli that included one of four scaled amounts of haptically rendered noise (None, Low, Medium, High). The haptic noise was zero-mean Gaussian white noise that was low-pass filtered with a 2 Hz cut-off frequency; the resulting low-frequency signal was added to the force rendered while the participant interacted with the force and stiffness stimuli. Results We found that the precision with which participants could identify the magnitude of both the force and stiffness stimuli was affected by the magnitude of the low-frequency haptically rendered noise added to the haptic stimulus, as well as the magnitude of the haptic stimulus itself. The Weber fraction strongly correlated with the standard deviation of the low-frequency haptic noise with a Pearson product-moment correlation coefficient of ρ > 0.83. The mean standard deviation of the low-frequency haptic noise in the haptic stimuli ranged from 0.184 N to 1.111 N across the four haptically rendered noise levels, and the corresponding mean Weber fractions spanned between 0.042 and 0.101. Conclusions The human ability to perceive both suprathreshold haptic force and stiffness stimuli degrades in the presence of added low-frequency haptic noise. Future work can use the reported methods to investigate how force perception and stiffness perception may relate, with possible applications in haptic watermarking and in the assessment of the functionality of peripheral pathways in individuals with haptic impairments. PMID:28575068

  3. Effective connectivity of visual word recognition and homophone orthographic errors

    PubMed Central

    Guàrdia-Olmos, Joan; Peró-Cebollero, Maribel; Zarabozo-Hurtado, Daniel; González-Garrido, Andrés A.; Gudayol-Ferré, Esteve

    2015-01-01

    The study of orthographic errors in a transparent language like Spanish is an important topic in relation to writing acquisition. The development of neuroimaging techniques, particularly functional magnetic resonance imaging (fMRI), has enabled the study of such relationships between brain areas. The main objective of the present study was to explore the patterns of effective connectivity by processing pseudohomophone orthographic errors among subjects with high and low spelling skills. Two groups of 12 Mexican subjects each, matched by age, were formed based on their results in a series of ad hoc spelling-related out-scanner tests: a high spelling skills (HSSs) group and a low spelling skills (LSSs) group. During the f MRI session, two experimental tasks were applied (spelling recognition task and visuoperceptual recognition task). Regions of Interest and their signal values were obtained for both tasks. Based on these values, structural equation models (SEMs) were obtained for each group of spelling competence (HSS and LSS) and task through maximum likelihood estimation, and the model with the best fit was chosen in each case. Likewise, dynamic causal models (DCMs) were estimated for all the conditions across tasks and groups. The HSS group’s SEM results suggest that, in the spelling recognition task, the right middle temporal gyrus, and, to a lesser extent, the left parahippocampal gyrus receive most of the significant effects, whereas the DCM results in the visuoperceptual recognition task show less complex effects, but still congruent with the previous results, with an important role in several areas. In general, these results are consistent with the major findings in partial studies about linguistic activities but they are the first analyses of statistical effective brain connectivity in transparent languages. PMID:26042070

  4. Analysis of Pseudohomophone Orthographic Errors through Functional Magnetic Resonance Imaging (fMRI).

    PubMed

    Guardia-Olmos, Joan; Zarabozo-Hurtado, Daniel; Peró-Cebollero, Maribe; Gudayol-Farré, Esteban; Gómez-Velázquez, Fabiola R; González-Garrido, Andrés

    2017-12-04

    The study of orthographic errors in a transparent language such as Spanish is an important topic in relation to writing acquisition because in Spanish it is common to write pseudohomophones as valid words. The main objective of the present study was to explore the possible differences in activation patterns in brain areas while processing pseudohomophone orthographic errors between participants with high (High Spelling Skills (HSS)) and low (Low Spelling Skills (LSS)) spelling orthographic abilities. We hypothesize that (a) the detection of orthographic errors will activate bilateral inferior frontal gyri, and that (b) this effect will be greater in the HSS group. Two groups of 12 Mexican participants, each matched by age, were formed based on their results in a group of spelling-related ad hoc tests: HSS and LSS groups. During the fMRI session, two experimental tasks were applied involving correct and pseudohomophone substitution of Spanish words. First, a spelling recognition task and second a letter searching task. The LSS group showed, as expected, a lower number of correct responses (F(1, 21) = 52.72, p <.001, η2 = .715) and higher reaction times compared to the HSS group for the spelling task (F(1, 21) = 60.03, p <.001, η2 = .741). However, this pattern was reversed when the participants were asked to decide on the presence of a vowel in the words, regardless of spelling. The fMRI data showed an engagement of the right inferior frontal gyrus in HSS group during the spelling task. However, temporal, frontal, and subcortical brain regions of the LSS group were activated during the same task.

  5. An adaptive density-based routing protocol for flying Ad Hoc networks

    NASA Astrophysics Data System (ADS)

    Zheng, Xueli; Qi, Qian; Wang, Qingwen; Li, Yongqiang

    2017-10-01

    An Adaptive Density-based Routing Protocol (ADRP) for Flying Ad Hoc Networks (FANETs) is proposed in this paper. The main objective is to calculate forwarding probability adaptively in order to increase the efficiency of forwarding in FANETs. ADRP dynamically fine-tunes the rebroadcasting probability of a node for routing request packets according to the number of neighbour nodes. Indeed, it is more interesting to privilege the retransmission by nodes with little neighbour nodes. We describe the protocol, implement it and evaluate its performance using NS-2 network simulator. Simulation results reveal that ADRP achieves better performance in terms of the packet delivery fraction, average end-to-end delay, normalized routing load, normalized MAC load and throughput, which is respectively compared with AODV.

  6. Topology for efficient information dissemination in ad-hoc networking

    NASA Technical Reports Server (NTRS)

    Jennings, E.; Okino, C. M.

    2002-01-01

    In this paper, we explore the information dissemination problem in ad-hoc wirless networks. First, we analyze the probability of successful broadcast, assuming: the nodes are uniformly distributed, the available area has a lower bould relative to the total number of nodes, and there is zero knowledge of the overall topology of the network. By showing that the probability of such events is small, we are motivated to extract good graph topologies to minimize the overall transmissions. Three algorithms are used to generate topologies of the network with guaranteed connectivity. These are the minimum radius graph, the relative neighborhood graph and the minimum spanning tree. Our simulation shows that the relative neighborhood graph has certain good graph properties, which makes it suitable for efficient information dissemination.

  7. An enhanced performance through agent-based secure approach for mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Bisen, Dhananjay; Sharma, Sanjeev

    2018-01-01

    This paper proposes an agent-based secure enhanced performance approach (AB-SEP) for mobile ad hoc network. In this approach, agent nodes are selected through optimal node reliability as a factor. This factor is calculated on the basis of node performance features such as degree difference, normalised distance value, energy level, mobility and optimal hello interval of node. After selection of agent nodes, a procedure of malicious behaviour detection is performed using fuzzy-based secure architecture (FBSA). To evaluate the performance of the proposed approach, comparative analysis is done with conventional schemes using performance parameters such as packet delivery ratio, throughput, total packet forwarding, network overhead, end-to-end delay and percentage of malicious detection.

  8. Application of Game Theory Approaches in Routing Protocols for Wireless Networks

    NASA Astrophysics Data System (ADS)

    Javidi, Mohammad M.; Aliahmadipour, Laya

    2011-09-01

    An important and essential issue for wireless networks is routing protocol design that is a major technical challenge due to the function of the network. Game theory is a powerful mathematical tool that analyzes the strategic interactions among multiple decision makers and the results of researches show that applied game theory in routing protocol lead to improvement the network performance through reduce overhead and motivates selfish nodes to collaborate in the network. This paper presents a review and comparison for typical representatives of routing protocols designed that applied game theory approaches for various wireless networks such as ad hoc networks, mobile ad hoc networks and sensor networks that all of them lead to improve the network performance.

  9. Protocol Independent Adaptive Route Update for VANET

    PubMed Central

    Rasheed, Asim; Qayyum, Amir

    2014-01-01

    High relative node velocity and high active node density have presented challenges to existing routing approaches within highly scaled ad hoc wireless networks, such as Vehicular Ad hoc Networks (VANET). Efficient routing requires finding optimum route with minimum delay, updating it on availability of a better one, and repairing it on link breakages. Current routing protocols are generally focused on finding and maintaining an efficient route, with very less emphasis on route update. Adaptive route update usually becomes impractical for dense networks due to large routing overheads. This paper presents an adaptive route update approach which can provide solution for any baseline routing protocol. The proposed adaptation eliminates the classification of reactive and proactive by categorizing them as logical conditions to find and update the route. PMID:24723807

  10. Increasing the reliability of ecological models using modern software engineering techniques

    Treesearch

    Robert M. Scheller; Brian R. Sturtevant; Eric J. Gustafson; Brendan C. Ward; David J. Mladenoff

    2009-01-01

    Modern software development techniques are largely unknown to ecologists. Typically, ecological models and other software tools are developed for limited research purposes, and additional capabilities are added later, usually in an ad hoc manner. Modern software engineering techniques can substantially increase scientific rigor and confidence in ecological models and...

  11. Applying Ad Hoc Institutional Research Findings to College Strategic Planning

    ERIC Educational Resources Information Center

    Clagett, Craig A.

    2004-01-01

    Environmental scanning, enrollment forecasting, budget analyses, and institutional effectiveness assessment are examples of the explicit contributions institutional research offices make to campus strategic planning.

  12. Effects of Grip-Force, Contact, and Acceleration Feedback on a Teleoperated Pick-and-Place Task.

    PubMed

    Khurshid, Rebecca P; Fitter, Naomi T; Fedalei, Elizabeth A; Kuchenbecker, Katherine J

    2017-01-01

    The multifaceted human sense of touch is fundamental to direct manipulation, but technical challenges prevent most teleoperation systems from providing even a single modality of haptic feedback, such as force feedback. This paper postulates that ungrounded grip-force, fingertip-contact-and-pressure, and high-frequency acceleration haptic feedback will improve human performance of a teleoperated pick-and-place task. Thirty subjects used a teleoperation system consisting of a haptic device worn on the subject's right hand, a remote PR2 humanoid robot, and a Vicon motion capture system to move an object to a target location. Each subject completed the pick-and-place task 10 times under each of the eight haptic conditions obtained by turning on and off grip-force feedback, contact feedback, and acceleration feedback. To understand how object stiffness affects the utility of the feedback, half of the subjects completed the task with a flexible plastic cup, and the others used a rigid plastic block. The results indicate that the addition of grip-force feedback with gain switching enables subjects to hold both the flexible and rigid objects more stably, and it also allowed subjects who manipulated the rigid block to hold the object more delicately and to better control the motion of the remote robot's hand. Contact feedback improved the ability of subjects who manipulated the flexible cup to move the robot's arm in space, but it deteriorated this ability for subjects who manipulated the rigid block. Contact feedback also caused subjects to hold the flexible cup less stably, but the rigid block more securely. Finally, adding acceleration feedback slightly improved the subject's performance when setting the object down, as originally hypothesized; interestingly, it also allowed subjects to feel vibrations produced by the robot's motion, causing them to be more careful when completing the task. This study supports the utility of grip-force and high-frequency acceleration feedback in teleoperation systems and motivates further improvements to fingertip-contact-and-pressure feedback.

  13. An efficient and accurate framework for calculating lattice thermal conductivity of solids: AFLOW—AAPL Automatic Anharmonic Phonon Library

    NASA Astrophysics Data System (ADS)

    Plata, Jose J.; Nath, Pinku; Usanmaz, Demet; Carrete, Jesús; Toher, Cormac; de Jong, Maarten; Asta, Mark; Fornari, Marco; Nardelli, Marco Buongiorno; Curtarolo, Stefano

    2017-10-01

    One of the most accurate approaches for calculating lattice thermal conductivity, , is solving the Boltzmann transport equation starting from third-order anharmonic force constants. In addition to the underlying approximations of ab-initio parameterization, two main challenges are associated with this path: high computational costs and lack of automation in the frameworks using this methodology, which affect the discovery rate of novel materials with ad-hoc properties. Here, the Automatic Anharmonic Phonon Library (AAPL) is presented. It efficiently computes interatomic force constants by making effective use of crystal symmetry analysis, it solves the Boltzmann transport equation to obtain , and allows a fully integrated operation with minimum user intervention, a rational addition to the current high-throughput accelerated materials development framework AFLOW. An "experiment vs. theory" study of the approach is shown, comparing accuracy and speed with respect to other available packages, and for materials characterized by strong electron localization and correlation. Combining AAPL with the pseudo-hybrid functional ACBN0 is possible to improve accuracy without increasing computational requirements.

  14. Effects of interactive technology, teacher scaffolding and feedback on university students' conceptual development in motion and force concepts

    NASA Astrophysics Data System (ADS)

    Stecklein, Jason Jeffrey

    The utilization of interactive technologies will affect learning in science classrooms of the future. And although these technologies have improved in form and function, their effective employment in university science classrooms has lagged behind the rapid development of new constructivist pedagogies and means of instruction. This dissertation examines the enlistment of instructional technologies, in particular tablet PCs and DyKnow Interactive Software, in a technologically enhanced, university-level, introductory physics course. Results of this qualitative case study of three university students indicate that (1) the use of interactive technology positively affects both student learning within force and motion and self-reported beliefs about physics, (2) ad hoc use of instructional technologies may not sufficient for effective learning in introductory physics, (3) student learners dictate the leveraging of technology in any classroom, and (4) that purposeful teacher structuring of classroom activities with technologies are essential for student construction of knowledge. This includes designing activities to elicit attention and make knowledge visible for low-level content, while augmenting student interactions and modelling procedural steps for higher-level content.

  15. Compatibility Conditions of Structural Mechanics

    NASA Technical Reports Server (NTRS)

    Patnaik, Surya N.; Coroneos, Rula M.; Hopkins, Dale A.

    1999-01-01

    The theory of elasticity has camouflaged a deficiency in the compatibility formulation since 1860. In structures the ad hoc compatibility conditions through virtual "cuts" and closing "gaps" are not parallel to the strain formulation in elasticity. This deficiency in the compatibility conditions has prevented the development of a direct stress determination method in structures and in elasticity. We have addressed this deficiency and attempted to unify the theory of compatibility. This work has led to the development of the integrated force method for structures and the completed Beltrami-Michell formulation for elasticity. The improved accuracy observed in the solution of numerical examples by the integrated force method can be attributed to the compliance of the compatibility conditions. Using the compatibility conditions allows mapping of variables and facile movement among different structural analysis formulations. This paper reviews and illustrates the requirement of compatibility in structures and in elasticity. It also describes the generation of the conditions and quantifies the benefits of their use. The traditional analysis methods and available solutions (which have been obtained bypassing the missed conditions) should be verified for compliance of the compatibility conditions.

  16. Semantic querying of relational data for clinical intelligence: a semantic web services-based approach

    PubMed Central

    2013-01-01

    Background Clinical Intelligence, as a research and engineering discipline, is dedicated to the development of tools for data analysis for the purposes of clinical research, surveillance, and effective health care management. Self-service ad hoc querying of clinical data is one desirable type of functionality. Since most of the data are currently stored in relational or similar form, ad hoc querying is problematic as it requires specialised technical skills and the knowledge of particular data schemas. Results A possible solution is semantic querying where the user formulates queries in terms of domain ontologies that are much easier to navigate and comprehend than data schemas. In this article, we are exploring the possibility of using SADI Semantic Web services for semantic querying of clinical data. We have developed a prototype of a semantic querying infrastructure for the surveillance of, and research on, hospital-acquired infections. Conclusions Our results suggest that SADI can support ad-hoc, self-service, semantic queries of relational data in a Clinical Intelligence context. The use of SADI compares favourably with approaches based on declarative semantic mappings from data schemas to ontologies, such as query rewriting and RDFizing by materialisation, because it can easily cope with situations when (i) some computation is required to turn relational data into RDF or OWL, e.g., to implement temporal reasoning, or (ii) integration with external data sources is necessary. PMID:23497556

  17. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET

    PubMed Central

    Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei

    2017-01-01

    Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV’s research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV. PMID:28629142

  18. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET.

    PubMed

    Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei

    2017-06-17

    Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV's research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV.

  19. Linking Satellites Via Earth "Hot Spots" and the Internet to Form Ad Hoc Constellations

    NASA Technical Reports Server (NTRS)

    Mandl, Dan; Frye, Stu; Grosvenor, Sandra; Ingram, Mary Ann; Langley, John; Miranda, Felix; Lee, Richard Q.; Romanofsky, Robert; Zaman, Afoz; Popovic, Zoya

    2004-01-01

    As more assets are placed in orbit, opportunities emerge to combine various sets of satellites in temporary constellations to perform collaborative image collections. Often, new operations concepts for a satellite or set of satellites emerge after launch. To the degree with which new space assets can be inexpensively and rapidly integrated into temporary or "ad hoc" constellations, will determine whether these new ideas will be implemented or not. On the Earth Observing 1 (EO-1) satellite, a New Millennium Program mission, a number of experiments were conducted and are being conducted to demonstrate various aspects of an architecture that, when taken as a whole, will enable progressive mission autonomy. In particular, the target architecture will use adaptive ground antenna arrays to form, as close as possible, the equivalent of wireless access points for low earth orbiting satellites. Coupled with various ground and flight software and the Internet. the architecture enables progressive mission autonomy. Thus, new collaborative sensing techniques can be implemented post-launch. This paper will outline the overall operations concept and highlight details of both the research effort being conducted in

  20. Age-Related Differences in Contribution of Rule-Based Thinking toward Moral Evaluations.

    PubMed

    Caravita, Simona C S; De Silva, Lindamulage N; Pagani, Vera; Colombo, Barbara; Antonietti, Alessandro

    2017-01-01

    This study aims to investigate the interplay of different criteria of moral evaluation, related to the type of the rule and context characteristics, in moral reasoning of children, early, and late adolescents. Students attending to fourth, seventh, and tenth grade were asked to evaluate the acceptability of rule breaking actions using ad hoc scenarios. Results suggest that the role of different moral evaluation criteria changes by age. During adolescence a greater integration of the moral criteria emerged. Moreover, adolescents also prioritized the evaluation of moral rule (forbidding to harm others) violations as non-acceptable when the perpetrator harms an innocent victim by applying a direct personal force. The relevance of these findings to increase the understanding of how moral reasoning changes by age for the assessment of impairments in moral reasoning of non-normative groups is also discussed.

  1. A web-based platform for virtual screening.

    PubMed

    Watson, Paul; Verdonk, Marcel; Hartshorn, Michael J

    2003-09-01

    A fully integrated, web-based, virtual screening platform has been developed to allow rapid virtual screening of large numbers of compounds. ORACLE is used to store information at all stages of the process. The system includes a large database of historical compounds from high throughput screenings (HTS) chemical suppliers, ATLAS, containing over 3.1 million unique compounds with their associated physiochemical properties (ClogP, MW, etc.). The database can be screened using a web-based interface to produce compound subsets for virtual screening or virtual library (VL) enumeration. In order to carry out the latter task within ORACLE a reaction data cartridge has been developed. Virtual libraries can be enumerated rapidly using the web-based interface to the cartridge. The compound subsets can be seamlessly submitted for virtual screening experiments, and the results can be viewed via another web-based interface allowing ad hoc querying of the virtual screening data stored in ORACLE.

  2. IVAN: Intelligent Van for the Distribution of Pharmaceutical Drugs

    PubMed Central

    Moreno, Asier; Angulo, Ignacio; Perallos, Asier; Landaluce, Hugo; Zuazola, Ignacio Julio García; Azpilicueta, Leire; Astrain, José Javier; Falcone, Francisco; Villadangos, Jesús

    2012-01-01

    This paper describes a telematic system based on an intelligent van which is capable of tracing pharmaceutical drugs over delivery routes from a warehouse to pharmacies, without altering carriers' daily conventional tasks. The intelligent van understands its environment, taking into account its location, the assets and the predefined delivery route; with the capability of reporting incidences to carriers in case of failure according to the established distribution plan. It is a non-intrusive solution which represents a successful experience of using smart environments and an optimized Radio Frequency Identification (RFID) embedded system in a viable way to resolve a real industrial need in the pharmaceutical industry. The combination of deterministic modeling of the indoor vehicle, the implementation of an ad-hoc radiating element and an agile software platform within an overall system architecture leads to a competitive, flexible and scalable solution. PMID:22778659

  3. Research opportunities in cardiovascular deconditioning, phase 1

    NASA Technical Reports Server (NTRS)

    Levy, M. N. (Editor); Talbot, J. M. (Editor)

    1983-01-01

    The deconditioning of the cardiovascular system that occurs during spaceflight, NASA's current and projected research program, and the conclusions and suggestions of the ad hoc Working Group are summarized.

  4. On service differentiation in mobile Ad Hoc networks.

    PubMed

    Zhang, Shun-liang; Ye, Cheng-qing

    2004-09-01

    A network model is proposed to support service differentiation for mobile Ad Hoc networks by combining a fully distributed admission control approach and the DIFS based differentiation mechanism of IEEE802.11. It can provide different kinds of QoS (Quality of Service) for various applications. Admission controllers determine a committed bandwidth based on the reserved bandwidth of flows and the source utilization of networks. Packets are marked when entering into networks by markers according to the committed rate. By the mark in the packet header, intermediate nodes handle the received packets in different manners to provide applications with the QoS corresponding to the pre-negotiated profile. Extensive simulation experiments showed that the proposed mechanism can provide QoS guarantee to assured service traffic and increase the channel utilization of networks.

  5. Immune Inspired Security Approach for Manets: a Case Study

    NASA Astrophysics Data System (ADS)

    Mohamed, Yasir Abdelgadir

    2011-06-01

    This paper extends the work that has earlier been established. Immune inspired approach for securing mobile ad hoc networks is specified there. Although it is clearly indicated there that the research scope is the wireless networks in general and hybrid mobile ad hoc networks in particular, we have seen that specifying the security system in one of the communications applications that need further security approach may help to understand how effectively the system can contribute to this vital and important networks sector. Security in this type of networks is important and controversial as it plays a key role in users' eagerness or reluctance for the services provided by these networks. In this paper, the immune inspired security system is specified to secure web services in converged networks.

  6. A high performance, ad-hoc, fuzzy query processing system for relational databases

    NASA Technical Reports Server (NTRS)

    Mansfield, William H., Jr.; Fleischman, Robert M.

    1992-01-01

    Database queries involving imprecise or fuzzy predicates are currently an evolving area of academic and industrial research. Such queries place severe stress on the indexing and I/O subsystems of conventional database environments since they involve the search of large numbers of records. The Datacycle architecture and research prototype is a database environment that uses filtering technology to perform an efficient, exhaustive search of an entire database. It has recently been modified to include fuzzy predicates in its query processing. The approach obviates the need for complex index structures, provides unlimited query throughput, permits the use of ad-hoc fuzzy membership functions, and provides a deterministic response time largely independent of query complexity and load. This paper describes the Datacycle prototype implementation of fuzzy queries and some recent performance results.

  7. Introduction to Blueweb: A Decentralized Scatternet Formation Algorithm for Bluetooth Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Yu, Chih-Min; Huang, Chia-Chi

    In this letter, a decentralized scatternet formation algorithm called Bluelayer is proposed. First, Bluelayer uses a designated root to construct a tree-shaped subnet and propagates an integer variable k1 called counter limit as well as a constant k in its downstream direction to determine new roots. Then each new root asks its upstream master to start a return connection procedure to convert the tree-shaped subnet into a web-shaped subnet for its immediate upstream root. At the same time, each new root repeats the same procedure as the root to build its own subnet until the whole scatternet is formed. Simulation results show that Bluelayer achieves good network scalability and generates an efficient scatternet configuration for various sizes of Bluetooth ad hoc network.

  8. An ultra-wide bandwidth-based range/GPS tight integration approach for relative positioning in vehicular ad hoc networks

    NASA Astrophysics Data System (ADS)

    Shen, Feng; Wayn Cheong, Joon; Dempster, Andrew G.

    2015-04-01

    Relative position awareness is a vital premise for the implementation of emerging intelligent transportation systems, such as collision warning. However, commercial global navigation satellite systems (GNSS) receivers do not satisfy the requirements of these applications. Fortunately, cooperative positioning (CP) techniques, through sharing the GNSS measurements between vehicles, can improve the performance of relative positioning in a vehicular ad hoc network (VANET). In this paper, while assuming there are no obstacles between vehicles, a new enhanced tightly coupled CP technique is presented by adding ultra-wide bandwidth (UWB)-based inter-vehicular range measurements. In the proposed CP method, each vehicle fuses the GPS measurements and the inter-vehicular range measurements. Based on analytical and experimental results, in the full GPS coverage environment, the new tight integration CP method outperforms the INS-aided tight CP method, tight CP method, and DGPS by 11%, 15%, and 24%, respectively; in the GPS outage scenario, the performance improvement achieves 60%, 65%, and 73%, respectively.

  9. Design and Implementation of Secure Area Expansion Scheme for Public Wireless LAN Services

    NASA Astrophysics Data System (ADS)

    Watanabe, Ryu; Tanaka, Toshiaki

    Recently, wireless LAN (WLAN) technology has become a major wireless communication method. The communication bandwidth is increasing and speeds have attained rates exceeding 100 Mbps. Therefore, WLAN technology is regarded as one of the promising communication methods for future networks. In addition, public WLAN connection services can be used in many locations. However, the number of the access points (AP) is insufficient for seamless communication and it cannot be said that users can use the service ubiquitously. An ad-hoc network style connection can be used to expand the coverage area of a public WLAN service. By relaying the user messages among the user nodes, a node can obtain an Internet connection via an AP, even though the node is located outside the AP's direct wireless connection area. Such a coverage area extending technology has many advantages thanks to the feature that no additional infrastructure is required. Therefore, there is a strong demand for this technology as it allows the cost-effective construction of future networks. When a secure ad-hoc routing protocol is used for message exchange in the WLAN service, the message routes are protected from malicious behavior such as route forging and can be maintained appropriately. To do this, however, a new node that wants to join the WLAN service has to obtain information such as the public key certificate and IP address in order to start secure ad-hoc routing. In other words, an initial setup is required for every network node to join the WLAN service properly. Ordinarily, such information should be assigned from the AP. However, new nodes cannot always contact an AP directly. Therefore, there are problems about information delivery in the initial setup of a network node. These problems originate in the multi hop connection based on the ad-hoc routing protocols. In order to realize an expanded area WLAN service, in this paper, the authors propose a secure public key certificate and address provision scheme during the initial setup phase on mobile nodes for the service. The proposed scheme also considers the protection of user privacy. Accordingly, none of the user nodes has to reveal their unique and persistent information to other nodes. Instead of using such information, temporary values are sent by an AP to mobile nodes and used for secure ad-hoc routing operations. Therefore, our proposed scheme prevents tracking by malicious parties by avoiding the use of unique information. Moreover, a test bed was also implemented based on the proposal and an evaluation was carried out in order to confirm performance. In addition, the authors describe a countermeasure against denial of service (DoS) attacks based on the approach to privacy protection described in our proposal.

  10. Measuring mental disorders: The failed commensuration project of DSM-5.

    PubMed

    Whooley, Owen

    2016-10-01

    Commensuration - the comparison of entities according to a common quantitative metric - is a key process in efforts to rationalize medicine. The push toward evidence-based medicine and quantitative assessment has led to the proliferation of metrics in healthcare. While social scientific attention has revealed the effects of these metrics once institutionalized - on clinical practice, on medical expertise, on outcome assessment, on valuations of medical services, and on experiences of illness - less attention has been paid to the process of developing metrics. This article examines the attempt to create severity scales during the revision to the fifth edition of the Diagnostic and Statistical Manual of Mental Disorders (DSM-5) as a case of failed commensuration. Using data from interviews with participants in the DSM-5 revision (n = 30), I reconstruct the problems that emerged in the DSM-5 Task Force's effort to develop viable psychometric instruments to measure severity. Framed as a part of a "paradigm shift" in psychiatry, the revision produced ad hoc, heterogeneous severity scales with divergent logics. I focus on two significant issues of metric construction in this case - diagnostic validity and clinical utility. Typically perceived as technical and conceptual challenges of design, I show how these issues were infused with, and undermined by, professional political dynamics, specifically tensions between medical researchers and clinicians. This case reveals that, despite its association with objectivity and transparency, commensuration encompasses more than identifying, operationalizing, and measuring an entity; it demands the negotiation of extra-scientific, non-empirical concerns that get written into medical metrics themselves. Copyright © 2016 Elsevier Ltd. All rights reserved.

  11. 76 FR 43987 - Pacific Fishery Management Council; Public Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-22

    ... Pacific Fishery Management Council's (Pacific Council) ad hoc groundfish Essential Fish Habitat Review... of groundfish Essential Fish Habitat (EFH). DATES: The work session will be held Thursday, October 6...

  12. Intelligent self-organization methods for wireless ad hoc sensor networks based on limited resources

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2006-05-01

    A wireless ad hoc sensor network (WSN) is a configuration for area surveillance that affords rapid, flexible deployment in arbitrary threat environments. There is no infrastructure support and sensor nodes communicate with each other only when they are in transmission range. To a greater degree than the terminals found in mobile ad hoc networks (MANETs) for communications, sensor nodes are resource-constrained, with limited computational processing, bandwidth, memory, and power, and are typically unattended once in operation. Consequently, the level of information exchange among nodes, to support any complex adaptive algorithms to establish network connectivity and optimize throughput, not only deplete those limited resources and creates high overhead in narrowband communications, but also increase network vulnerability to eavesdropping by malicious nodes. Cooperation among nodes, critical to the mission of sensor networks, can thus be disrupted by the inappropriate choice of the method for self-organization. Recent published contributions to the self-configuration of ad hoc sensor networks, e.g., self-organizing mapping and swarm intelligence techniques, have been based on the adaptive control of the cross-layer interactions found in MANET protocols to achieve one or more performance objectives: connectivity, intrusion resistance, power control, throughput, and delay. However, few studies have examined the performance of these algorithms when implemented with the limited resources of WSNs. In this paper, self-organization algorithms for the initiation, operation and maintenance of a network topology from a collection of wireless sensor nodes are proposed that improve the performance metrics significant to WSNs. The intelligent algorithm approach emphasizes low computational complexity, energy efficiency and robust adaptation to change, allowing distributed implementation with the actual limited resources of the cooperative nodes of the network. Extensions of the algorithms from flat topologies to two-tier hierarchies of sensor nodes are presented. Results from a few simulations of the proposed algorithms are compared to the published results of other approaches to sensor network self-organization in common scenarios. The estimated network lifetime and extent under static resource allocations are computed.

  13. Proposal for Re-Usable TODO Knowledge Management System RESTER

    NASA Astrophysics Data System (ADS)

    Saga, Ryosuke; Kageyama, Akinori; Tsuji, Hiroshi

    This paper describes how to reuse a series of ad-hoc tasks such as special meeting arrangement and equipment procurement. Our RESTER (Reusable TODO Synthesizer) allows a group to reuse a series of tasks which are recorded in case database. Given a specific event, RESTER repairs the retrieved similar case by the ontology which describes the relationship of concept in the organization. A user has chance to check the modified case and to update it if he finds that there are incorrect repair because of deficient ontology. The user is also requested to judge if the retrieved case works or not. If he judges it is useful, the case becomes to be reused more frequently. Thus, RESTER works under the premise of human-computer collaboration. Based on the presented framework, this paper has identified several desirable attributes: (1) RESTER allows a group to externalize its experience on jobs, (2) Externalized experience are connected in case database, (3) A case is internalized by other group when it is retrieved and repaired for a new event, (4) New job generated from the previous similar job of one group is socialized by the other group.

  14. New public dataset for spotting patterns in medieval document images

    NASA Astrophysics Data System (ADS)

    En, Sovann; Nicolas, Stéphane; Petitjean, Caroline; Jurie, Frédéric; Heutte, Laurent

    2017-01-01

    With advances in technology, a large part of our cultural heritage is becoming digitally available. In particular, in the field of historical document image analysis, there is now a growing need for indexing and data mining tools, thus allowing us to spot and retrieve the occurrences of an object of interest, called a pattern, in a large database of document images. Patterns may present some variability in terms of color, shape, or context, making the spotting of patterns a challenging task. Pattern spotting is a relatively new field of research, still hampered by the lack of available annotated resources. We present a new publicly available dataset named DocExplore dedicated to spotting patterns in historical document images. The dataset contains 1500 images and 1464 queries, and allows the evaluation of two tasks: image retrieval and pattern localization. A standardized benchmark protocol along with ad hoc metrics is provided for a fair comparison of the submitted approaches. We also provide some first results obtained with our baseline system on this new dataset, which show that there is room for improvement and that should encourage researchers of the document image analysis community to design new systems and submit improved results.

  15. 75 FR 67688 - Pacific Fishery Management Council; Public Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-03

    ... Pacific Fishery Management Council's (Council's) Ad Hoc Groundfish Essential Fish Habitat Review Committee... groundfish Essential Fish Habitat (EFH). DATES: The work session will be held Monday, December 20, 2010 from...

  16. Intentional forgetting diminishes memory for continuous events.

    PubMed

    Fawcett, Jonathan M; Taylor, Tracy L; Nadel, Lynn

    2013-01-01

    In a novel event method directed forgetting task, instructions to Remember (R) or Forget (F) were integrated throughout the presentation of four videos depicting common events (e.g., baking cookies). Participants responded more accurately to cued recall questions (E1) and true/false statements (E2-4) regarding R segments than F segments. This was true even when forced to attend to F segments by virtue of having to perform concurrent discrimination (E2) or conceptual segmentation (E3) tasks. The final experiment (E5) demonstrated a larger R >F difference for specific true/false statements (the woman added three cups of flour) than for general true/false statements (the woman added flour) suggesting that participants likely encoded and retained at least a general representation of the events they had intended to forget, even though this representation was not as specific as the representation of events they had intended to remember.

  17. Holistic Contract Administration in Army Forces Abroad

    DTIC Science & Technology

    2016-10-01

    Defense (DoD) civil- ian personnel—i.e., 1910 Quality Assurance Specialist, 1102 Contract Specialist, and 1103 Industrial Property Management Specialist... 1103 -series civilian property ad- ministrators throughout ACC, the battalion experienced diffi- culties hiring for these positions during its deployment...tasks. Counting on 1103 support, ACOs received minimal property training prior to deploy- ment. This proved to be a major setback as ACOs struggled

  18. Cerebrospinal fluid and blood biomarkers for neurodegenerative dementias: An update of the Consensus of the Task Force on Biological Markers in Psychiatry of the World Federation of Societies of Biological Psychiatry.

    PubMed

    Lewczuk, Piotr; Riederer, Peter; O'Bryant, Sid E; Verbeek, Marcel M; Dubois, Bruno; Visser, Pieter Jelle; Jellinger, Kurt A; Engelborghs, Sebastiaan; Ramirez, Alfredo; Parnetti, Lucilla; Jack, Clifford R; Teunissen, Charlotte E; Hampel, Harald; Lleó, Alberto; Jessen, Frank; Glodzik, Lidia; de Leon, Mony J; Fagan, Anne M; Molinuevo, José Luis; Jansen, Willemijn J; Winblad, Bengt; Shaw, Leslie M; Andreasson, Ulf; Otto, Markus; Mollenhauer, Brit; Wiltfang, Jens; Turner, Martin R; Zerr, Inga; Handels, Ron; Thompson, Alexander G; Johansson, Gunilla; Ermann, Natalia; Trojanowski, John Q; Karaca, Ilker; Wagner, Holger; Oeckl, Patrick; van Waalwijk van Doorn, Linda; Bjerke, Maria; Kapogiannis, Dimitrios; Kuiperij, H Bea; Farotti, Lucia; Li, Yi; Gordon, Brian A; Epelbaum, Stéphane; Vos, Stephanie J B; Klijn, Catharina J M; Van Nostrand, William E; Minguillon, Carolina; Schmitz, Matthias; Gallo, Carla; Lopez Mato, Andrea; Thibaut, Florence; Lista, Simone; Alcolea, Daniel; Zetterberg, Henrik; Blennow, Kaj; Kornhuber, Johannes

    2018-06-01

    In the 12 years since the publication of the first Consensus Paper of the WFSBP on biomarkers of neurodegenerative dementias, enormous advancement has taken place in the field, and the Task Force takes now the opportunity to extend and update the original paper. New concepts of Alzheimer's disease (AD) and the conceptual interactions between AD and dementia due to AD were developed, resulting in two sets for diagnostic/research criteria. Procedures for pre-analytical sample handling, biobanking, analyses and post-analytical interpretation of the results were intensively studied and optimised. A global quality control project was introduced to evaluate and monitor the inter-centre variability in measurements with the goal of harmonisation of results. Contexts of use and how to approach candidate biomarkers in biological specimens other than cerebrospinal fluid (CSF), e.g. blood, were precisely defined. Important development was achieved in neuroimaging techniques, including studies comparing amyloid-β positron emission tomography results to fluid-based modalities. Similarly, development in research laboratory technologies, such as ultra-sensitive methods, raises our hopes to further improve analytical and diagnostic accuracy of classic and novel candidate biomarkers. Synergistically, advancement in clinical trials of anti-dementia therapies energises and motivates the efforts to find and optimise the most reliable early diagnostic modalities. Finally, the first studies were published addressing the potential of cost-effectiveness of the biomarkers-based diagnosis of neurodegenerative disorders.

  19. First-order and higher order sequence learning in specific language impairment.

    PubMed

    Clark, Gillian M; Lum, Jarrad A G

    2017-02-01

    A core claim of the procedural deficit hypothesis of specific language impairment (SLI) is that the disorder is associated with poor implicit sequence learning. This study investigated whether implicit sequence learning problems in SLI are present for first-order conditional (FOC) and higher order conditional (HOC) sequences. Twenty-five children with SLI and 27 age-matched, nonlanguage-impaired children completed 2 serial reaction time tasks. On 1 version, the sequence to be implicitly learnt comprised a FOC sequence and on the other a HOC sequence. Results showed that the SLI group learned the HOC sequence (η p ² = .285, p = .005) but not the FOC sequence (η p ² = .099, p = .118). The control group learned both sequences (FOC η p ² = .497, HOC η p 2= .465, ps < .001). The SLI group's difficulty learning the FOC sequence is consistent with the procedural deficit hypothesis. However, the study provides new evidence that multiple mechanisms may underpin the learning of FOC and HOC sequences. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  20. The influence of black carbon on the sorption and desorption of two model PAHs in natural soils.

    PubMed

    Chi, Fung-Hwa

    2014-01-01

    Black carbons (BC) which result from the incomplete combustion of farm waste [man-made (burned) BC] are highly absorbent. In Taiwan, the burning of farm waste known as slash and burn is common. The BCs from the burning may present an environmental challenge. Little is known about the effect of BCs on the transport of hydrophobic organic contaminants (HOC). This study investigates the sorption of anthracene and naphthalene to BCs in soil and efficiency of the surfactants Tween 80 and Triton X-100 in their removal. Both surfactants demonstrated 2-6 times increased solubility in the soils with the addiction of BC. Column experiments were performed to imitate the transportation of these contaminants in groundwater through soils before and after adding BC produced by burning farm waste in the lab. We found significantly increased sorption of anthracene in soil added with BCs produced in the lab, suggesting that fraction of organic carbon (foc) can contribute to sorption of such HOCs. Sorption of naphthalene was increased but not significantly. Comparing the concentrations of contaminants, we found the soil containing BC from burned farm waste absorbed HOC more efficiently than the organic BC (naturally-occurring) in the original soil. Therefore, sorption capacity and influence on the transport of HOC cannot be estimated simply by the foc of the soil because the two BCs differ greatly in their sorption ability. BC from farm waste absorbs more contaminants than naturally occurring BC in the soil.

  1. Cognitive Factors Affecting Free Recall, Cued Recall, and Recognition Tasks in Alzheimer's Disease

    PubMed Central

    Yamagishi, Takashi; Sato, Takuya; Sato, Atsushi; Imamura, Toru

    2012-01-01

    Background/Aims Our aim was to identify cognitive factors affecting free recall, cued recall, and recognition tasks in patients with Alzheimer's disease (AD). Subjects: We recruited 349 consecutive AD patients who attended a memory clinic. Methods Each patient was assessed using the Alzheimer's Disease Assessment Scale (ADAS) and the extended 3-word recall test. In this task, each patient was asked to freely recall 3 previously presented words. If patients could not recall 1 or more of the target words, the examiner cued their recall by providing the category of the target word and then provided a forced-choice recognition of the target word with 2 distracters. The patients were divided into groups according to the results of the free recall, cued recall, and recognition tasks. Multivariate logistic regression analysis for repeated measures was carried out to evaluate the net effects of cognitive factors on the free recall, cued recall, and recognition tasks after controlling for the effects of age and recent memory deficit. Results Performance on the ADAS Orientation task was found to be related to performance on the free and cued recall tasks, performance on the ADAS Following Commands task was found to be related to performance on the cued recall task, and performance on the ADAS Ideational Praxis task was found to be related to performance on the free recall, cued recall, and recognition tasks. Conclusion The extended 3-word recall test reflects deficits in a wider range of memory and other cognitive processes, including memory retention after interference, divided attention, and executive functions, compared with word-list recall tasks. The characteristics of the extended 3-word recall test may be advantageous for evaluating patients’ memory impairments in daily living. PMID:22962551

  2. Cognitive factors affecting free recall, cued recall, and recognition tasks in Alzheimer's disease.

    PubMed

    Yamagishi, Takashi; Sato, Takuya; Sato, Atsushi; Imamura, Toru

    2012-01-01

    Our aim was to identify cognitive factors affecting free recall, cued recall, and recognition tasks in patients with Alzheimer's disease (AD). We recruited 349 consecutive AD patients who attended a memory clinic. Each patient was assessed using the Alzheimer's Disease Assessment Scale (ADAS) and the extended 3-word recall test. In this task, each patient was asked to freely recall 3 previously presented words. If patients could not recall 1 or more of the target words, the examiner cued their recall by providing the category of the target word and then provided a forced-choice recognition of the target word with 2 distracters. The patients were divided into groups according to the results of the free recall, cued recall, and recognition tasks. Multivariate logistic regression analysis for repeated measures was carried out to evaluate the net effects of cognitive factors on the free recall, cued recall, and recognition tasks after controlling for the effects of age and recent memory deficit. Performance on the ADAS Orientation task was found to be related to performance on the free and cued recall tasks, performance on the ADAS Following Commands task was found to be related to performance on the cued recall task, and performance on the ADAS Ideational Praxis task was found to be related to performance on the free recall, cued recall, and recognition tasks. The extended 3-word recall test reflects deficits in a wider range of memory and other cognitive processes, including memory retention after interference, divided attention, and executive functions, compared with word-list recall tasks. The characteristics of the extended 3-word recall test may be advantageous for evaluating patients' memory impairments in daily living.

  3. Air Force Operational Medicine: Using the Estimating Supplies Program to Develop Materiel Solutions for the Operational Clinical Requirements for the U.S. Air Force Otolaryngology Team (FFENT)

    DTIC Science & Technology

    2007-10-10

    Nose and Throat UTC self -sufficient for a 7-day period, and will support tasks like OR Team Preparation and Patient Assessment. Category Weight Cube...These line items would need to be added to the FFENT AS for the FFENT to be self -sufficient for 7 days, as discussed in the current FFENT CONOPS...additions enable the Ear, Nose and Throat UTC to be self -sufficient for a 7-day period and meet its capabilities as stated in the CONOPS. Discussion

  4. Coherent Multimodal Sensory Information Allows Switching between Gravitoinertial Contexts

    PubMed Central

    Barbiero, Marie; Rousseau, Célia; Papaxanthis, Charalambos; White, Olivier

    2017-01-01

    Whether the central nervous system is capable to switch between contexts critically depends on experimental details. Motor control studies regularly adopt robotic devices to perturb the dynamics of a certain task. Other approaches investigate motor control by altering the gravitoinertial context itself as in parabolic flights and human centrifuges. In contrast to conventional robotic experiments, where only the hand is perturbed, these gravitoinertial or immersive settings coherently plunge participants into new environments. However, radically different they are, perfect adaptation of motor responses are commonly reported. In object manipulation tasks, this translates into a good matching of the grasping force or grip force to the destabilizing load force. One possible bias in these protocols is the predictability of the forthcoming dynamics. Here we test whether the successful switching and adaptation processes observed in immersive environments are a consequence of the fact that participants can predict the perturbation schedule. We used a short arm human centrifuge to decouple the effects of space and time on the dynamics of an object manipulation task by adding an unnatural explicit position-dependent force. We created different dynamical contexts by asking 20 participants to move the object at three different paces. These contextual sessions were interleaved such that we could simulate concurrent learning. We assessed adaptation by measuring how grip force was adjusted to this unnatural load force. We found that the motor system can switch between new unusual dynamical contexts, as reported by surprisingly well-adjusted grip forces, and that this capacity is not a mere consequence of the ability to predict the time course of the upcoming dynamics. We posit that a coherent flow of multimodal sensory information born in a homogeneous milieu allows switching between dynamical contexts. PMID:28553233

  5. FHWA White Paper on Mobile Ad Hoc Networks

    DOT National Transportation Integrated Search

    2018-01-01

    Advanced next generation communications technologies offer the potential to greatly improve safety, system efficiency, and mobility across our Nations roadways. These new technologies and processes can address both traditionally difficult as well ...

  6. 44 CFR 351.10 - Establishment of committees.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... appropriate and on an ad hoc basis, other Federal departments and agencies. In chairing the committee, FEMA... guidance and orientation to other agency members to assist them in carrying out their functions. 1 I...

  7. 76 FR 2084 - Pacific Fishery Management Council; Public Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-12

    ... Pacific Fishery Management Council's (Council) Ad Hoc Groundfish Process Improvement Committee (PIC) will... the PIC work session is to develop an optimum detailed process and schedule for the 2013-14 groundfish...

  8. American Association of Tissue Banks

    MedlinePlus

    ... Committees Accreditation American Board of Tissue Banking Bylaws / Ethics Communications Donor Family Services Ad Hoc Committee Education Finance ... Bureau Accredited Bank Search Bookstore Bulletins Global Topics Communications & Media Job Center News Releases Patients and Community Useful ...

  9. Sailing ships for research

    NASA Astrophysics Data System (ADS)

    Richman, Barbara T.

    Motor-assisted sailing ships for ocean research could perform as well as or better than many existing research vessels and could cut fuel consumption by 50-80%, according to a preliminary study by an ad hoc panel of the National Research Council's Ocean Sciences Board (OSB).Rising fuel costs plague ship owners and operators. For example, 2 years ago the U.S. oceanographic fleet had a $6 million overrun in fuel costs. Furthermore, the price of marine diesel fuel skyrocketed from $3 per barrel in 1972 to about $38 per barrel in late 1980. Cutting these costs would be welcome if the savings were not made at the expense of additional crew, longer transit times, or less efficient scientific operations. A sailing ship with auxiliary motor propulsion is a promising prospect, according to the Ad Hoc Panel on the Use of Sailing Ships for Oceanography.

  10. Studying the complex spectral line profiles in the spectra of hot emission stars and quasars .

    NASA Astrophysics Data System (ADS)

    Danezis, E.; Lyratzi, E.; Antoniou, A.; Popović, L. Č.; Dimitrijević, M. S.

    Some Hot Emission Stars and AGNs present peculiar spectral line profiles which are due to DACs and SACs phenomena. The origin and the mechanisms which are responsible for the creation of DACs/SACs is an important problem that has been studied by many researchers. This paper is a review of our efforts to study the origin and the mechanisms of these phenomena. At first we present a theoretic ad hoc picture for the structure of the plasma that surrounds the specific category of hot emission stars that present DACs or SACs. Then we present the mathematical model that we constructed, which is based on the properties of the above ad hoc theoretical structure. Finally, we present some results from our statistical studies that prove the consistency of our model with the classical physical theory.

  11. Implementing MANETS in Android based environment using Wi-Fi direct

    NASA Astrophysics Data System (ADS)

    Waqas, Muhammad; Babar, Mohammad Inayatullah Khan; Zafar, Mohammad Haseeb

    2015-05-01

    Packet loss occurs in real-time voice transmission over wireless broadcast Ad-hoc network which creates disruptions in sound. Basic objective of this research is to design a wireless Ad-hoc network based on two Android devices by using the Wireless Fidelity (WIFI) Direct Application Programming Interface (API) and apply the Network Codec, Reed Solomon Code. The network codec is used to encode the data of a music wav file and recover the lost packets if any, packets are dropped using a loss module at the transmitter device to analyze the performance with the objective of retrieving the original file at the receiver device using the network codec. This resulted in faster transmission of the files despite dropped packets. In the end both files had the original formatted music files with complete performance analysis based on the transmission delay.

  12. Worm epidemics in wireless ad hoc networks

    NASA Astrophysics Data System (ADS)

    Nekovee, Maziar

    2007-06-01

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet.

  13. The dynamical origin of multiple populations in intermediate-age clusters in the Magellanic Clouds

    NASA Astrophysics Data System (ADS)

    Hong, Jongsuk; de Grijs, Richard; Askar, Abbas; Berczik, Peter; Li, Chengyuan; Wang, Long; Deng, Licai; Kouwenhoven, M. B. N.; Giersz, Mirek; Spurzem, Rainer

    2017-11-01

    Numerical simulations were carried out to study the origin of multiple stellar populations in the intermediate-age clusters NGC 411 and NGC 1806 in the Magellanic Clouds. We performed NBODY6++ simulations based on two different formation scenarios, an ad hoc formation model where second-generation (SG) stars are formed inside a cluster of first-generation (FG) stars using the gas accumulated from the external intergalactic medium and a minor merger model of unequal mass (MSG/MFG ∼ 5-10 per cent) clusters with an age difference of a few hundred million years. We compared our results such as the radial profile of the SG-to-FG number ratio with observations on the assumption that the SG stars in the observations are composed of cluster members, and confirmed that both the ad hoc formation and merger scenarios reproduce the observed radial trend of the SG-to-FG number ratio, which shows less centrally concentrated SG than FG stars. It is difficult to constrain the formation scenario for the multiple populations by only using the spatial distribution of the SG stars. SG stars originating from the merger scenario show a significant velocity anisotropy and rotational features compared to those from the ad hoc formation scenario. Thus, observations aimed at kinematic properties like velocity anisotropy or rotational velocities for SG stars should be obtained to better understand the formation of the multiple populations in these clusters. This is, however, beyond current instrumentation capabilities.

  14. A Computational Method to Determine Glucose Infusion Rates for Isoglycemic Intravenous Glucose Infusion Study.

    PubMed

    Choi, Karam; Lee, Jung Chan; Oh, Tae Jung; Kim, Myeungseon; Kim, Hee Chan; Cho, Young Min; Kim, Sungwan

    2016-01-01

    The results of the isoglycemic intravenous glucose infusion (IIGI) study need to mimic the dynamic glucose profiles during the oral glucose tolerance test (OGTT) to accurately calculate the incretin effect. The glucose infusion rates during IIGI studies have historically been determined by experienced research personnel using the manual ad-hoc method. In this study, a computational method was developed to automatically determine the infusion rates for IIGI study based on a glucose-dynamics model. To evaluate the computational method, 18 subjects with normal glucose tolerance underwent a 75 g OGTT. One-week later, Group 1 (n = 9) and Group 2 (n = 9) underwent IIGI studies using the ad-hoc method and the computational method, respectively. Both methods were evaluated using correlation coefficient, mean absolute relative difference (MARD), and root mean square error (RMSE) between the glucose profiles from the OGTT and the IIGI study. The computational method exhibited significantly higher correlation (0.95 ± 0.03 versus 0.86 ± 0.10, P = 0.019), lower MARD (8.72 ± 1.83% versus 13.11 ± 3.66%, P = 0.002), and lower RMSE (10.33 ± 1.99 mg/dL versus 16.84 ± 4.43 mg/dL, P = 0.002) than the ad-hoc method. The computational method can facilitate IIGI study, and enhance its accuracy and stability. Using this computational method, a high-quality IIGI study can be accomplished without the need for experienced personnel.

  15. Higher-Order Extended Lagrangian Born–Oppenheimer Molecular Dynamics for Classical Polarizable Models

    DOE PAGES

    Albaugh, Alex; Head-Gordon, Teresa; Niklasson, Anders M. N.

    2018-01-09

    Generalized extended Lagrangian Born−Oppenheimer molecular dynamics (XLBOMD) methods provide a framework for fast iteration-free simulations of models that normally require expensive electronic ground state optimizations prior to the force evaluations at every time step. XLBOMD uses dynamically driven auxiliary degrees of freedom that fluctuate about a variationally optimized ground state of an approximate “shadow” potential which approximates the true reference potential. While the requirements for such shadow potentials are well understood, constructing such potentials in practice has previously been ad hoc, and in this work, we present a systematic development of XLBOMD shadow potentials that match the reference potential tomore » any order. We also introduce a framework for combining friction-like dissipation for the auxiliary degrees of freedom with general-order integration, a combination that was not previously possible. These developments are demonstrated with a simple fluctuating charge model and point induced dipole polarization models.« less

  16. Special class of nonlinear damping models in flexible space structures

    NASA Technical Reports Server (NTRS)

    Hu, Anren; Singh, Ramendra P.; Taylor, Lawrence W.

    1991-01-01

    A special class of nonlinear damping models is investigated in which the damping force is proportional to the product of positive integer or the fractional power of the absolute values of displacement and velocity. For a one-degree-of-freedom system, the classical Krylov-Bogoliubov 'averaging' method is used, whereas for a distributed system, both an ad hoc perturbation technique and the finite difference method are employed to study the effects of nonlinear damping. The results are compared with linear viscous damping models. The amplitude decrement of free vibration for a single mode system with nonlinear models depends not only on the damping ratio but also on the initial amplitude, the time to measure the response, the frequency of the system, and the powers of displacement and velocity. For the distributed system, the action of nonlinear damping is found to reduce the energy of the system and to pass energy to lower modes.

  17. LinkMind: link optimization in swarming mobile sensor networks.

    PubMed

    Ngo, Trung Dung

    2011-01-01

    A swarming mobile sensor network is comprised of a swarm of wirelessly connected mobile robots equipped with various sensors. Such a network can be applied in an uncertain environment for services such as cooperative navigation and exploration, object identification and information gathering. One of the most advantageous properties of the swarming wireless sensor network is that mobile nodes can work cooperatively to organize an ad-hoc network and optimize the network link capacity to maximize the transmission of gathered data from a source to a target. This paper describes a new method of link optimization of swarming mobile sensor networks. The new method is based on combination of the artificial potential force guaranteeing connectivities of the mobile sensor nodes and the max-flow min-cut theorem of graph theory ensuring optimization of the network link capacity. The developed algorithm is demonstrated and evaluated in simulation.

  18. Higher-Order Extended Lagrangian Born-Oppenheimer Molecular Dynamics for Classical Polarizable Models.

    PubMed

    Albaugh, Alex; Head-Gordon, Teresa; Niklasson, Anders M N

    2018-02-13

    Generalized extended Lagrangian Born-Oppenheimer molecular dynamics (XLBOMD) methods provide a framework for fast iteration-free simulations of models that normally require expensive electronic ground state optimizations prior to the force evaluations at every time step. XLBOMD uses dynamically driven auxiliary degrees of freedom that fluctuate about a variationally optimized ground state of an approximate "shadow" potential which approximates the true reference potential. While the requirements for such shadow potentials are well understood, constructing such potentials in practice has previously been ad hoc, and in this work, we present a systematic development of XLBOMD shadow potentials that match the reference potential to any order. We also introduce a framework for combining friction-like dissipation for the auxiliary degrees of freedom with general-order integration, a combination that was not previously possible. These developments are demonstrated with a simple fluctuating charge model and point induced dipole polarization models.

  19. On the equilibrium structures of self-gravitating masses of gas containing axisymmetric magnetic fields

    NASA Technical Reports Server (NTRS)

    Lerche, I.; Low, B. C.

    1980-01-01

    The general equations describing the equilibrium shapes of self-gravitating gas clouds containing axisymmetric magnetic fields are presented. The general equations admit of a large class of solutions. It is shown that if one additional (ad hoc) asumption is made that the mass be spherically symmetrically distributed, then the gas pressure and the boundary conditions are sufficiently constraining that the general topological structure of the solution is effectively determined. The further assumption of isothermal conditions for this case demands that all solutions possess force-free axisymmetric magnetic fields. It is also shown how the construction of aspherical (but axisymmetric) configurations can be achieved in some special cases, and it is demonstrated that the detailed form of the possible equilibrium shapes depends upon the arbitrary choice of the functional form of the variation of the gas pressure along the field lines.

  20. LinkMind: Link Optimization in Swarming Mobile Sensor Networks

    PubMed Central

    Ngo, Trung Dung

    2011-01-01

    A swarming mobile sensor network is comprised of a swarm of wirelessly connected mobile robots equipped with various sensors. Such a network can be applied in an uncertain environment for services such as cooperative navigation and exploration, object identification and information gathering. One of the most advantageous properties of the swarming wireless sensor network is that mobile nodes can work cooperatively to organize an ad-hoc network and optimize the network link capacity to maximize the transmission of gathered data from a source to a target. This paper describes a new method of link optimization of swarming mobile sensor networks. The new method is based on combination of the artificial potential force guaranteeing connectivities of the mobile sensor nodes and the max-flow min-cut theorem of graph theory ensuring optimization of the network link capacity. The developed algorithm is demonstrated and evaluated in simulation. PMID:22164070

  1. Age-Related Differences in Contribution of Rule-Based Thinking toward Moral Evaluations

    PubMed Central

    Caravita, Simona C. S.; De Silva, Lindamulage N.; Pagani, Vera; Colombo, Barbara; Antonietti, Alessandro

    2017-01-01

    This study aims to investigate the interplay of different criteria of moral evaluation, related to the type of the rule and context characteristics, in moral reasoning of children, early, and late adolescents. Students attending to fourth, seventh, and tenth grade were asked to evaluate the acceptability of rule breaking actions using ad hoc scenarios. Results suggest that the role of different moral evaluation criteria changes by age. During adolescence a greater integration of the moral criteria emerged. Moreover, adolescents also prioritized the evaluation of moral rule (forbidding to harm others) violations as non-acceptable when the perpetrator harms an innocent victim by applying a direct personal force. The relevance of these findings to increase the understanding of how moral reasoning changes by age for the assessment of impairments in moral reasoning of non-normative groups is also discussed. PMID:28473788

  2. Higher-Order Extended Lagrangian Born–Oppenheimer Molecular Dynamics for Classical Polarizable Models

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Albaugh, Alex; Head-Gordon, Teresa; Niklasson, Anders M. N.

    Generalized extended Lagrangian Born−Oppenheimer molecular dynamics (XLBOMD) methods provide a framework for fast iteration-free simulations of models that normally require expensive electronic ground state optimizations prior to the force evaluations at every time step. XLBOMD uses dynamically driven auxiliary degrees of freedom that fluctuate about a variationally optimized ground state of an approximate “shadow” potential which approximates the true reference potential. While the requirements for such shadow potentials are well understood, constructing such potentials in practice has previously been ad hoc, and in this work, we present a systematic development of XLBOMD shadow potentials that match the reference potential tomore » any order. We also introduce a framework for combining friction-like dissipation for the auxiliary degrees of freedom with general-order integration, a combination that was not previously possible. These developments are demonstrated with a simple fluctuating charge model and point induced dipole polarization models.« less

  3. Texture Analysis and Cartographic Feature Extraction.

    DTIC Science & Technology

    1985-01-01

    Investigations into using various image descriptors as well as developing interactive feature extraction software on the Digital Image Analysis Laboratory...system. Originator-supplied keywords: Ad-Hoc image descriptor; Bayes classifier; Bhattachryya distance; Clustering; Digital Image Analysis Laboratory

  4. Research opportunities in space motion sickness, phase 2

    NASA Technical Reports Server (NTRS)

    Talbot, J. M.

    1983-01-01

    Space and motion sickness, the current and projected NASA research program, and the conclusions and suggestions of the ad hoc Working Group are summarized. The frame of reference for the report is ground-based research.

  5. Crowdsourcing innovation at Caltrans.

    DOT National Transportation Integrated Search

    2016-09-19

    This report documents the first year experience in launching and sustaining a web-based, crowdsourcing innovation management tool at the California Department of Transportation (Caltrans). In March 2015 an ad-hoc team of Caltrans managers and staff b...

  6. Unplanned gait termination in individuals with multiple sclerosis.

    PubMed

    Roeing, Kathleen L; Moon, Yaejin; Sosnoff, Jacob J

    2017-03-01

    Despite the pervasive nature of gait impairment in multiple sclerosis (MS), there is limited information concerning the control of gait termination in individuals with MS. The purpose of this investigation was to examine unplanned gait termination with and without cognitive distractors in individuals with MS compared to healthy controls. Thirty-one individuals with MS and 14 healthy controls completed a series of unplanned gait termination tasks over a pressure sensitive walkway under distracting and non-distracting conditions. Individuals with MS were further broken down into groups based on assistive device use: (no assistive device (MS noAD ) n=18; and assistive device (MS AD ) n=13). Individuals with MS who walked with an assistive device (MS AD : 67.8±15.1cm/s) walked slower than individuals without an assistive device (MS noAD : 110.4±32.3cm/s, p<0.01) and controls (120.0±30.0cm/s; p<0.01). There was a significant reduction in velocity in the cognitively distracting condition (93.4±32.1cm/s) compared to the normal condition [108.8±36.2cm/s; F(1,43)=3.4, p=0.04]. All participants took longer to stop during the distracting condition (1.7±0.6s) than the non-distracting condition (1.4±0.4s; U=673.0 p<0.01). After controlling for gait velocity, post-hoc analysis revealed the MS AD group took significantly longer to stop compared to the control group (p=0.05). Further research investigating the control of unplanned gait termination in MS is warranted. Copyright © 2017 Elsevier B.V. All rights reserved.

  7. 2013 Review and Update of the Genetic Counseling Practice Based Competencies by a Task Force of the Accreditation Council for Genetic Counseling.

    PubMed

    Doyle, Debra Lochner; Awwad, Rawan I; Austin, Jehannine C; Baty, Bonnie J; Bergner, Amanda L; Brewster, Stephanie J; Erby, Lori A H; Franklin, Cathi Rubin; Greb, Anne E; Grubs, Robin E; Hooker, Gillian W; Noblin, Sarah Jane; Ormond, Kelly E; Palmer, Christina G; Petty, Elizabeth M; Singletary, Claire N; Thomas, Matthew J; Toriello, Helga; Walton, Carol S; Uhlmann, Wendy R

    2016-10-01

    The first practice based competencies (PBCs) for the field of genetic counseling were adopted by the American Board of Genetic Counseling (ABGC), 1996. Since that time, there has been significant growth in established and new work settings (clinical and non-clinical) and changes in service delivery models and the roles of genetic counselors. These changes prompted the ABGC to appoint a PBC Task Force in 2011 to review the PBCs with respect to their current relevance and to revise and update them as necessary. There are four domains in the revised PBCs: (I) Genetics Expertise and Analysis (II) Interpersonal, Psychosocial and Counseling Skills (III) Education and (IV) Professional Development and Practice. There are 22 competencies, each clarified with learning objectives or samples of activities and skills; a glossary is included. New competencies were added that address genomics, genetic testing and genetic counselors' roles in risk assessment, education, supervision, conducting research and presenting research options to patients. With PBCs serving as the pre-defined abilities or outcomes of training, graduating genetic counselors will be well prepared to enter the field with a minimum level of skills and abilities. A description of the Task Force's work, key changes and the 2013 PBCs are presented herein.

  8. Fluid Analysis of Network Content Dissemination and Cloud Systems

    DTIC Science & Technology

    2017-03-06

    orchestration of multiple transfers , within the constraints of the communication substrate. In unstructured or aggressive environments where wireless ad...previous AFOSR/SOARD project, concerns peer-to-peer dissemination in wireless ad-hoc networks. We focus on the necessary tradeoff between an efficient...use of the network substrate, and the necessary reciprocity between peers, aspects that may be in conflict in the wireless setting. Our results

  9. Maximum Grasping Reach of Operators Possessing Functional Impairments of the Upper Extremities.

    DTIC Science & Technology

    1978-12-01

    ADDRESS 10. PROGRAM ELEMENT, PROJECT, TASK AFITStudent at: Texas A&M University AREA & WORK UNIT NUMBERS II. CONTROLLING OFFICENA E AND AD_. . 12...RELEASE AFR 190.172 Ja e I 10, t USAF 23 SEP 1980 , ’ 1"lic Aar* e IS. SUPPLEMENTARY NOTES Approved for public release; IAW AFR 190-17 Air Force...C .. .... ..... ..... .... 141 APPENDIX D .. ... ...... ..... .... 184 APPENDIX E .. ... ..... ...... .... 187 APPENDIX F .. .... ..... ..... .... 189

  10. Canadian Light Infantry in Adaptive Dispersed Operations

    DTIC Science & Technology

    2012-05-17

    participated directly or indirectly under the leadership of Combined Joint Task Force (CJTF) MOUNTAIN, which was mostly built around the 10th Mountain...unique and possesses its own characteristics. It has its own ethic which is obtained from its distinctive tactical style , special attitude toward the...it is not organization that determines their light nature but their characteristics and fighting style . He added: “The historical tendency for light

  11. Canadian Light Infantry in Adaptive Dispersed Operations

    DTIC Science & Technology

    2012-05-22

    participated directly or indirectly under the leadership of Combined Joint Task Force (CJTF) MOUNTAIN, which was mostly built around the 10th Mountain...unique and possesses its own characteristics. It has its own ethic which is obtained from its distinctive tactical style , special attitude toward the...it is not organization that determines their light nature but their characteristics and fighting style . He added: “The historical tendency for light

  12. Fire Fighting Task Force (FIRE)

    DTIC Science & Technology

    1989-04-01

    and fdenify by block number) ~’This study is part of ~a contining effort to develop soldier data and performance algorithms (pergorithus) needed to...similar to combat, results will be useful in developing algorithms and data for use in US Army Concepts Analysis Agency (CAA) combat models. THE...dimensions. The US Army Concepts Analysis Agency (CAA) is committed to adding the soldier variables and algorithms that are necessary to fully represent

  13. Training Analyses Supporting the Land Warrior and Ground Soldier Systems

    DTIC Science & Technology

    2009-07-01

    unit with LW and MW expressed in terms of unit force effectiveness, impacts to the DOTMLPF domains, life cycle cost, and ability to mitigate Joint...other individual tasks, Soldier and/or leader, be added to NET; should any be eliminated? What methods of instruction/resources should remain the...presentation of the training observation results from the nine-day NET. Terminal Learning Objectives The NET POI ( Omega Training Group, 2006

  14. Algorithmic, LOCS and HOCS (chemistry) exam questions: performance and attitudes of college students

    NASA Astrophysics Data System (ADS)

    Zoller, Uri

    2002-02-01

    The performance of freshmen biology and physics-mathematics majors and chemistry majors as well as pre- and in-service chemistry teachers in two Israeli universities on algorithmic (ALG), lower-order cognitive skills (LOCS), and higher-order cognitive skills (HOCS) chemistry exam questions were studied. The driving force for the study was an interest in moving science and chemistry instruction from an algorithmic and factual recall orientation dominated by LOCS, to a decision-making, problem-solving and critical system thinking approach, dominated by HOCS. College students' responses to the specially designed ALG, LOCS and HOCS chemistry exam questions were scored and analysed for differences and correlation between the performance means within and across universities by the questions' category. This was followed by a combined student interview - 'speaking aloud' problem solving session for assessing the thinking processes involved in solving these types of questions and the students' attitudes towards them. The main findings were: (1) students in both universities performed consistently in each of the three categories in the order of ALG > LOCS > HOCS; their 'ideological' preference, was HOCS > algorithmic/LOCS, - referred to as 'computational questions', but their pragmatic preference was the reverse; (2) success on algorithmic/LOCS does not imply success on HOCS questions; algorithmic questions constitute a category on its own as far as students success in solving them is concerned. Our study and its results support the effort being made, worldwide, to integrate HOCS-fostering teaching and assessment strategies and, to develop HOCS-oriented science-technology-environment-society (STES)-type curricula within science and chemistry education.

  15. Fast incorporation of optical flow into active polygons.

    PubMed

    Unal, Gozde; Krim, Hamid; Yezzi, Anthony

    2005-06-01

    In this paper, we first reconsider, in a different light, the addition of a prediction step to active contour-based visual tracking using an optical flow and clarify the local computation of the latter along the boundaries of continuous active contours with appropriate regularizers. We subsequently detail our contribution of computing an optical flow-based prediction step directly from the parameters of an active polygon, and of exploiting it in object tracking. This is in contrast to an explicitly separate computation of the optical flow and its ad hoc application. It also provides an inherent regularization effect resulting from integrating measurements along polygon edges. As a result, we completely avoid the need of adding ad hoc regularizing terms to the optical flow computations, and the inevitably arbitrary associated weighting parameters. This direct integration of optical flow into the active polygon framework distinguishes this technique from most previous contour-based approaches, where regularization terms are theoretically, as well as practically, essential. The greater robustness and speed due to a reduced number of parameters of this technique are additional and appealing features.

  16. Endpoints for Pre-Dementia AD Trials: A Report from the EU/US/CTAD Task Force

    PubMed Central

    Vellas, B.; Bateman, R.; Blennow, K.; Frisoni, G.; Johnson, K.; Katz, R.; Langbaum, J.; Marson, D.; Sperling, R.; Wessels, A.; Salloway, S.; Doody, R.; Aisen, P.

    2015-01-01

    For Alzheimer’s disease treatment trials that focus on the pre-dementia stage of disease, outcome measures are needed that will enable assessment of disease progression in patients who are clinically normal. The EU/US CTAD Task Force, an international collaboration of investigators from industry, academia, non-profit foundations, and regulatory agencies, met in Philadelphia, Pennsylvania, USA, on November 19, 2014 to discuss existing and novel outcome assessments that may be useful in pre-dementia trials. Composite measures that assess changes in episodic memory, executive function, global cognition, and global function have recently been developed by a number of groups and appear to be sensitive at this stage. Functional measures that involve real-life complex tasks also appear to capture early subtle changes in pre-dementia subjects and have the advantage of representing clinically meaningful change. Patient reported outcomes and novel CSF and imaging biomarkers have also shown promise. More studies are needed to validate all of these tests in the pre-dementia population. Many of them have been incorporated as exploratory measures in ongoing or planned trials. PMID:26247004

  17. Critical review of expert system validation in transportation

    DOT National Transportation Integrated Search

    1997-01-01

    Expert system validationthat is, testing systems to ascertain whether they achieve acceptable performance levelshas with few exceptions been ad hoc, informal, and of dubious value. Very few efforts have been made in this regard in the transport...

  18. Effectiveness of AODV Protocol under Hidden Node Environment

    NASA Astrophysics Data System (ADS)

    Garg, Ruchi; Sharma, Himanshu; Kumar, Sumit

    IEEE 802.11 is a standard for mobile ad hoc networks (MANET), implemented with various different protocols. Ad Hoc on Demand Distance Vector Routing (AODV) is one of the several protocols of IEEE 802.11, intended to provide various Quality of Service (QOS) parameters under acceptable range. To avoid the collision and interference the MAC protocol has only two solutions, one, to sense the physical carrier and second, to use the RTS/CTS handshake mechanism. But with the help of these methods AODV is not free from the problem of hidden nodes like other several protocols. Under the hidden node environment, performance of AODV depends upon various factors. The position of receiver and sender among the other nodes is very crucial and it affects the performance. Under the various situations the AODV is simulated with the help of NS2 and the outcomes are discussed.

  19. Efficient Proximity Computation Techniques Using ZIP Code Data for Smart Cities †

    PubMed Central

    Murdani, Muhammad Harist; Hong, Bonghee

    2018-01-01

    In this paper, we are interested in computing ZIP code proximity from two perspectives, proximity between two ZIP codes (Ad-Hoc) and neighborhood proximity (Top-K). Such a computation can be used for ZIP code-based target marketing as one of the smart city applications. A naïve approach to this computation is the usage of the distance between ZIP codes. We redefine a distance metric combining the centroid distance with the intersecting road network between ZIP codes by using a weighted sum method. Furthermore, we prove that the results of our combined approach conform to the characteristics of distance measurement. We have proposed a general and heuristic approach for computing Ad-Hoc proximity, while for computing Top-K proximity, we have proposed a general approach only. Our experimental results indicate that our approaches are verifiable and effective in reducing the execution time and search space. PMID:29587366

  20. Noise-Assisted Concurrent Multipath Traffic Distribution in Ad Hoc Networks

    PubMed Central

    Murata, Masayuki

    2013-01-01

    The concept of biologically inspired networking has been introduced to tackle unpredictable and unstable situations in computer networks, especially in wireless ad hoc networks where network conditions are continuously changing, resulting in the need of robustness and adaptability of control methods. Unfortunately, existing methods often rely heavily on the detailed knowledge of each network component and the preconfigured, that is, fine-tuned, parameters. In this paper, we utilize a new concept, called attractor perturbation (AP), which enables controlling the network performance using only end-to-end information. Based on AP, we propose a concurrent multipath traffic distribution method, which aims at lowering the average end-to-end delay by only adjusting the transmission rate on each path. We demonstrate through simulations that, by utilizing the attractor perturbation relationship, the proposed method achieves a lower average end-to-end delay compared to other methods which do not take fluctuations into account. PMID:24319375

  1. Assessment of the 802.11g Wireless Protocol for Lunar Surface Communications

    NASA Technical Reports Server (NTRS)

    Chelmins, David T.; Bguyen, Hung D.; Foore, Lawrence R.

    2009-01-01

    Future lunar surface missions supporting the NASA Vision for Space Exploration will rely on wireless networks to transmit voice and data. The ad hoc network architecture is of particular interest since it does not require a complex infrastructure. In this report, we looked at data performance over an ad hoc network with varying distances between Apple AirPort wireless cards. We developed a testing program to transmit data packets at precise times and then monitored the receive time to characterize connection delay, packet loss, and data rate. Best results were received for wireless links of less than 75 ft, and marginally acceptable (25-percent) packet loss was received at 150 ft. It is likely that better results will be obtained on the lunar surface because of reduced radiofrequency interference; however, higher power transmitters or receivers will be needed for significant performance gains.

  2. Impact of Beamforming on the Path Connectivity in Cognitive Radio Ad Hoc Networks

    PubMed Central

    Dung, Le The; Hieu, Tran Dinh; Choi, Seong-Gon; Kim, Byung-Seo; An, Beongku

    2017-01-01

    This paper investigates the impact of using directional antennas and beamforming schemes on the connectivity of cognitive radio ad hoc networks (CRAHNs). Specifically, considering that secondary users use two kinds of directional antennas, i.e., uniform linear array (ULA) and uniform circular array (UCA) antennas, and two different beamforming schemes, i.e., randomized beamforming and center-directed to communicate with each other, we study the connectivity of all combination pairs of directional antennas and beamforming schemes and compare their performances to those of omnidirectional antennas. The results obtained in this paper show that, compared with omnidirectional transmission, beamforming transmission only benefits the connectivity when the density of secondary user is moderate. Moreover, the combination of UCA and randomized beamforming scheme gives the highest path connectivity in all evaluating scenarios. Finally, the number of antenna elements and degree of path loss greatly affect path connectivity in CRAHNs. PMID:28346377

  3. Ad hoc committee on global climate issues: Annual report

    USGS Publications Warehouse

    Gerhard, L.C.; Hanson, B.M.B.

    2000-01-01

    The AAPG Ad Hoc Committee on Global Climate Issues has studied the supposition of human-induced climate change since the committee's inception in January 1998. This paper details the progress and findings of the committee through June 1999. At that time there had been essentially no geologic input into the global climate change debate. The following statements reflect the current state of climate knowledge from the geologic perspective as interpreted by the majority of the committee membership. The committee recognizes that new data could change its conclusions. The earth's climate is constantly changing owing to natural variability in earth processes. Natural climate variability over recent geological time is greater than reasonable estimates of potential human-induced greenhouse gas changes. Because no tool is available to test the supposition of human-induced climate change and the range of natural variability is so great, there is no discernible human influence on global climate at this time.

  4. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks

    PubMed Central

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-01-01

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes. PMID:26184224

  5. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.

    PubMed

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-07-14

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.

  6. Is heart transplantation after circulatory death compatible with the dead donor rule?

    PubMed

    Nair-Collins, Michael; Miller, Franklin G

    2016-05-01

    Dalle Ave et al (2016) provide a valuable overview of several protocols for heart transplantation after circulatory death. However, their analysis of the compatibility of heart donation after circulatory death (DCD) with the dead donor rule (DDR) is flawed. Their permanence-based criteria for death, which depart substantially from established law and bioethics, are ad hoc and unfounded. Furthermore, their analysis is self-defeating, because it undercuts the central motivation for DDR as both a legal and a moral constraint, rendering the DDR vacuous and trivial. Rather than devise new and ad hoc criteria for death for the purpose of rendering DCD nominally consistent with DDR, we contend that the best approach is to explicitly abandon DDR. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  7. Space Station Engineering and Technology Development: Proceedings of the Panel on In-Space Engineering Research and Technology Development

    NASA Technical Reports Server (NTRS)

    1985-01-01

    In 1984 the ad hoc committee on Space Station Engineering and Technology Development of the Aeronautics and Space Engineering Board (ASEB) conducted a review of the National Aeronautics and Space Administration's (NASA's) space station program planning. The review addressed the initial operating configuration (IOC) of the station. The ASEB has reconstituted the ad hoc committee which then established panels to address each specific related subject. The participants of the panels come from the committee, industry, and universities. The proceedings of the Panel on In Space Engineering Research and Technology Development are presented in this report. Activities, and plans for identifying and developing R&T programs to be conducted by the space station and related in space support needs including module requirements are addressed. Consideration is given to use of the station for R&T for other government agencies, universities, and industry.

  8. Some new ideas for the study of the complex spectral line profiles of hot emission stars and quasars

    NASA Astrophysics Data System (ADS)

    Danezis, E.

    2013-01-01

    Some Hot Emission Stars and AGNs present peculiar spectral line profiles which are due to DACs and SACs phenomena. The origin and the mechanisms which are responsible for the creation of DACs/SACs is an important problem that has been studied by many researchers. This paper is a review of our efforts to study the origin and the mechanisms of these phenomena. At first we present a theoretic ad hoc picture for the structure of the plasma that surrounds the specific category of hot emission stars that present DACs or SACs. Then we present the mathematical model that we constructed, which is based on the properties of the above ad hoc theoretical structure. Finally, we present some results from our statistical studies that prove the consistency of our model with the classical physical theory.

  9. Software Architecture of Sensor Data Distribution In Planetary Exploration

    NASA Technical Reports Server (NTRS)

    Lee, Charles; Alena, Richard; Stone, Thom; Ossenfort, John; Walker, Ed; Notario, Hugo

    2006-01-01

    Data from mobile and stationary sensors will be vital in planetary surface exploration. The distribution and collection of sensor data in an ad-hoc wireless network presents a challenge. Irregular terrain, mobile nodes, new associations with access points and repeaters with stronger signals as the network reconfigures to adapt to new conditions, signal fade and hardware failures can cause: a) Data errors; b) Out of sequence packets; c) Duplicate packets; and d) Drop out periods (when node is not connected). To mitigate the effects of these impairments, a robust and reliable software architecture must be implemented. This architecture must also be tolerant of communications outages. This paper describes such a robust and reliable software infrastructure that meets the challenges of a distributed ad hoc network in a difficult environment and presents the results of actual field experiments testing the principles and actual code developed.

  10. A critical examination of community-based responses to household food insecurity in Canada.

    PubMed

    Tarasuk, V

    2001-08-01

    Over the past two decades, household food insecurity has emerged as a significant social problem and serious public health concern in the "First World." In Canada, communities initially responded by establishing ad hoc charitable food assistance programs, but the programs have become institutionalized. In the quest for more appropriate and effective responses, a variety of community development programs have recently been initiated. Some are designed to foster personal empowerment through self-help and mutual support; others promote community-level strategies to strengthen local control over food production. The capacity of current initiatives to improve household food security appears limited by their inability to overcome or alter the poverty that under-pins this problem. This may relate to the continued focus on food-based responses, the ad hoc and community-based nature of the initiatives, and their origins in publicly funded health and social service sectors.

  11. Real-Time Support on IEEE 802.11 Wireless Ad-Hoc Networks: Reality vs. Theory

    NASA Astrophysics Data System (ADS)

    Kang, Mikyung; Kang, Dong-In; Suh, Jinwoo

    The usable throughput of an IEEE 802.11 system for an application is much less than the raw bandwidth. Although 802.11b has a theoretical maximum of 11Mbps, more than half of the bandwidth is consumed by overhead leaving at most 5Mbps of usable bandwidth. Considering this characteristic, this paper proposes and analyzes a real-time distributed scheduling scheme based on the existing IEEE 802.11 wireless ad-hoc networks, using USC/ISI's Power Aware Sensing Tracking and Analysis (PASTA) hardware platform. We compared the distributed real-time scheduling scheme with the real-time polling scheme to meet deadline, and compared a measured real bandwidth with a theoretical result. The theoretical and experimental results show that the distributed scheduling scheme can guarantee real-time traffic and enhances the performance up to 74% compared with polling scheme.

  12. Context dependent off loading for cloudlet in mobile ad-hoc network

    NASA Astrophysics Data System (ADS)

    Bhatt, N.; Nadesh, R. K.; ArivuSelvan, K.

    2017-11-01

    Cloud Computing in Mobile Ad-hoc network is emerging part of research consideration as the demand and competency of mobile devices increased in last few years. To follow out operation within the remote cloud builds the postponement and influences the administration standard. To keep away from this trouble cloudlet is presented. Cloudlet gives identical support of the devices as cloud at low inactivity however at high transfer speed. Be that as it may, choice of a cloudlet for offloading calculation with flat energy is a noteworthy test if multiple cloud let is accessible adjacent. Here I proposed energy and bandwidth (Traffic overload for communication with cloud) aware cloudlet selection strategy based on the context dependency of the device location. It works on the basis of mobile device location and bandwidth availability of cloudlet. The cloudlet offloading and selection process using given solution is simulated in Cloud ~ Simulator.

  13. Efficient Proximity Computation Techniques Using ZIP Code Data for Smart Cities †.

    PubMed

    Murdani, Muhammad Harist; Kwon, Joonho; Choi, Yoon-Ho; Hong, Bonghee

    2018-03-24

    In this paper, we are interested in computing ZIP code proximity from two perspectives, proximity between two ZIP codes ( Ad-Hoc ) and neighborhood proximity ( Top-K ). Such a computation can be used for ZIP code-based target marketing as one of the smart city applications. A naïve approach to this computation is the usage of the distance between ZIP codes. We redefine a distance metric combining the centroid distance with the intersecting road network between ZIP codes by using a weighted sum method. Furthermore, we prove that the results of our combined approach conform to the characteristics of distance measurement. We have proposed a general and heuristic approach for computing Ad-Hoc proximity, while for computing Top-K proximity, we have proposed a general approach only. Our experimental results indicate that our approaches are verifiable and effective in reducing the execution time and search space.

  14. An epidemic model for biological data fusion in ad hoc sensor networks

    NASA Astrophysics Data System (ADS)

    Chang, K. C.; Kotari, Vikas

    2009-05-01

    Bio terrorism can be a very refined and a catastrophic approach of attacking a nation. This requires the development of a complete architecture dedicatedly designed for this purpose which includes but is not limited to Sensing/Detection, Tracking and Fusion, Communication, and others. In this paper we focus on one such architecture and evaluate its performance. Various sensors for this specific purpose have been studied. The accent has been on use of Distributed systems such as ad-hoc networks and on application of epidemic data fusion algorithms to better manage the bio threat data. The emphasis has been on understanding the performance characteristics of these algorithms under diversified real time scenarios which are implemented through extensive JAVA based simulations. Through comparative studies on communication and fusion the performance of channel filter algorithm for the purpose of biological sensor data fusion are validated.

  15. Implementation of Satellite Techniques in the Air Transport

    NASA Astrophysics Data System (ADS)

    Fellner, Andrzej; Jafernik, Henryk

    2016-06-01

    The article shows process of the implementation satellite systems in Polish aviation which contributed to accomplishment Performance-Based Navigation (PBN) concept. Since 1991 authors have introduced Satellite Navigation Equipment in Polish Air Forces. The studies and researches provide to the Polish Air Force alternative approaches, modernize their navigation and landing systems and achieve compatibility with systems of the North Atlantic Treaty Organization (NATO) and International Civil Aviation Organization (ICAO). Acquired experience, conducted military tests and obtained results enabled to take up work scientifically - research in the environment of the civil aviation. Therefore in 2008 there has been launched cooperation with Polish Air Navigation Services Agency (PANSA). Thanks to cooperation, there have been compiled and fulfilled three fundamental international projects: EGNOS APV MIELEC (EGNOS Introduction in European Eastern Region - APV Mielec), HEDGE (Helicopters Deploy GNSS in Europe), SHERPA (Support ad-Hoc to Eastern Region Pre-operational in GNSS). The successful completion of these projects enabled implementation 21 procedures of the RNAV GNSS final approach at Polish airports, contributing to the implementation of PBN in Poland as well as ICAO resolution A37-11. Results of conducted research which served for the implementation of satellite techniques in the air transport constitute the meaning of this material.

  16. Labor force participation, unemployment and occupational attainment among immigrants in West European countries

    PubMed Central

    Semyonov, Moshe

    2017-01-01

    The present paper examines modes of immigrants' labor market incorporation into European societies with specific emphasis on the role played by immigrant status (i.e. first-generation immigrants, immigrant descendants and native born without migrant background), region of origin, and gender. The data were obtained from the European Union Labour Forces Survey 2008 Ad-Hoc Module for France, Belgium, UK and Sweden. In order to supplement the results from the country-specific analysis, we replicated the analysis using pooled data from the five rounds of the European Social Survey conducted between 2002 and 2010, for nine 'old immigration' Western European countries together. The analysis centered on two aspects of incorporation: labor force status and occupation. Multinominal, binary logistic as well as linear probability regression models were estimated. The findings suggest that in all countries non-European origin is associated with greater disadvantage in finding employment not only among first-generation immigrants, but also among sons and daughters of immigrants (i.e. second-generation). Moreover, the relative employment disadvantage among immigrant men of non-European origin is especially pronounced in the second-generation. The likelihood of attaining a high-status job is influenced mostly by immigrant status, regardless of region of origin and gender. The results of the study reveal that patterns of labor force incorporation vary considerably across origin groups and across generations. The patterns do not vary as much across countries, despite cross-country differences in welfare state regimes, migration integration policy and composition of migration flows. PMID:28475632

  17. Labor force participation, unemployment and occupational attainment among immigrants in West European countries.

    PubMed

    Gorodzeisky, Anastasia; Semyonov, Moshe

    2017-01-01

    The present paper examines modes of immigrants' labor market incorporation into European societies with specific emphasis on the role played by immigrant status (i.e. first-generation immigrants, immigrant descendants and native born without migrant background), region of origin, and gender. The data were obtained from the European Union Labour Forces Survey 2008 Ad-Hoc Module for France, Belgium, UK and Sweden. In order to supplement the results from the country-specific analysis, we replicated the analysis using pooled data from the five rounds of the European Social Survey conducted between 2002 and 2010, for nine 'old immigration' Western European countries together. The analysis centered on two aspects of incorporation: labor force status and occupation. Multinominal, binary logistic as well as linear probability regression models were estimated. The findings suggest that in all countries non-European origin is associated with greater disadvantage in finding employment not only among first-generation immigrants, but also among sons and daughters of immigrants (i.e. second-generation). Moreover, the relative employment disadvantage among immigrant men of non-European origin is especially pronounced in the second-generation. The likelihood of attaining a high-status job is influenced mostly by immigrant status, regardless of region of origin and gender. The results of the study reveal that patterns of labor force incorporation vary considerably across origin groups and across generations. The patterns do not vary as much across countries, despite cross-country differences in welfare state regimes, migration integration policy and composition of migration flows.

  18. Study of hydrogen-molecule guests in type II clathrate hydrates using a force-matched potential model parameterised from ab initio molecular dynamics

    NASA Astrophysics Data System (ADS)

    Burnham, Christian J.; Futera, Zdenek; English, Niall J.

    2018-03-01

    The force-matching method has been applied to parameterise an empirical potential model for water-water and water-hydrogen intermolecular interactions for use in clathrate-hydrate simulations containing hydrogen guest molecules. The underlying reference simulations constituted ab initio molecular dynamics (AIMD) of clathrate hydrates with various occupations of hydrogen-molecule guests. It is shown that the resultant model is able to reproduce AIMD-derived free-energy curves for the movement of a tagged hydrogen molecule between the water cages that make up the clathrate, thus giving us confidence in the model. Furthermore, with the aid of an umbrella-sampling algorithm, we calculate barrier heights for the force-matched model, yielding the free-energy barrier for a tagged molecule to move between cages. The barrier heights are reasonably large, being on the order of 30 kJ/mol, and are consistent with our previous studies with empirical models [C. J. Burnham and N. J. English, J. Phys. Chem. C 120, 16561 (2016) and C. J. Burnham et al., Phys. Chem. Chem. Phys. 19, 717 (2017)]. Our results are in opposition to the literature, which claims that this system may have very low barrier heights. We also compare results to that using the more ad hoc empirical model of Alavi et al. [J. Chem. Phys. 123, 024507 (2005)] and find that this model does very well when judged against the force-matched and ab initio simulation data.

  19. Predicting impact of multi-paths on phase change in map-based vehicular ad hoc networks

    NASA Astrophysics Data System (ADS)

    Rahmes, Mark; Lemieux, George; Sonnenberg, Jerome; Chester, David B.

    2014-05-01

    Dynamic Spectrum Access, which through its ability to adapt the operating frequency of a radio, is widely believed to be a solution to the limited spectrum problem. Mobile Ad Hoc Networks (MANETs) can extend high capacity mobile communications over large areas where fixed and tethered-mobile systems are not available. In one use case with high potential impact cognitive radio employs spectrum sensing to facilitate identification of allocated frequencies not currently accessed by their primary users. Primary users own the rights to radiate at a specific frequency and geographic location, secondary users opportunistically attempt to radiate at a specific frequency when the primary user is not using it. We quantify optimal signal detection in map based cognitive radio networks with multiple rapidly varying phase changes and multiple orthogonal signals. Doppler shift occurs due to reflection, scattering, and rapid vehicle movement. Path propagation as well as vehicle movement produces either constructive or destructive interference with the incident wave. Our signal detection algorithms can assist the Doppler spread compensation algorithm by deciding how many phase changes in signals are present in a selected band of interest. Additionally we can populate a spatial radio environment map (REM) database with known information that can be leveraged in an ad hoc network to facilitate Dynamic Spectrum Access. We show how topography can help predict the impact of multi-paths on phase change, as well as about the prediction from dense traffic areas. Utilization of high resolution geospatial data layers in RF propagation analysis is directly applicable.

  20. 3VSR: Three Valued Secure Routing for Vehicular Ad Hoc Networks using Sensing Logic in Adversarial Environment

    PubMed Central

    Wang, Liangmin

    2018-01-01

    Today IoT integrate thousands of inter networks and sensing devices e.g., vehicular networks, which are considered to be challenging due to its high speed and network dynamics. The goal of future vehicular networks is to improve road safety, promote commercial or infotainment products and to reduce the traffic accidents. All these applications are based on the information exchange among nodes, so not only reliable data delivery but also the authenticity and credibility of the data itself are prerequisite. To cope with the aforementioned problem, trust management come up as promising candidate to conduct node’s transaction and interaction management, which requires distributed mobile nodes cooperation for achieving design goals. In this paper, we propose a trust-based routing protocol i.e., 3VSR (Three Valued Secure Routing), which extends the widely used AODV (Ad hoc On-demand Distance Vector) routing protocol and employs the idea of Sensing Logic-based trust model to enhance the security solution of VANET (Vehicular Ad-Hoc Network). The existing routing protocol are mostly based on key or signature-based schemes, which off course increases computation overhead. In our proposed 3VSR, trust among entities is updated frequently by means of opinion derived from sensing logic due to vehicles random topologies. In 3VSR the theoretical capabilities are based on Dirichlet distribution by considering prior and posterior uncertainty of the said event. Also by using trust recommendation message exchange, nodes are able to reduce computation and routing overhead. The simulated results shows that the proposed scheme is secure and practical. PMID:29538314

Top