Sample records for ad-hoc task force

  1. 75 FR 33838 - NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-15

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (10-065)] NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting AGENCY: National Aeronautics and Space Administration. ACTION... amended, the National Aeronautics and Space Administration announces a meeting of the Ad-Hoc Task Force on...

  2. 75 FR 15742 - NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-30

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice: (10-035)] NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting AGENCY: National Aeronautics and Space Administration. ACTION... amended, the National Aeronautics and Space Administration announces a meeting of the Ad-Hoc Task Force on...

  3. 75 FR 43565 - NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice: (10-084)] NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting AGENCY: National Aeronautics and Space Administration. ACTION... amended, the National Aeronautics and Space Administration announces a two-part meeting of the Ad-Hoc Task...

  4. An Ad-Hoc Adaptive Pilot Model for Pitch Axis Gross Acquisition Tasks

    NASA Technical Reports Server (NTRS)

    Hanson, Curtis E.

    2012-01-01

    An ad-hoc algorithm is presented for real-time adaptation of the well-known crossover pilot model and applied to pitch axis gross acquisition tasks in a generic fighter aircraft. Off-line tuning of the crossover model to human pilot data gathered in a fixed-based high fidelity simulation is first accomplished for a series of changes in aircraft dynamics to provide expected values for model parameters. It is shown that in most cases, for this application, the traditional crossover model can be reduced to a gain and a time delay. The ad-hoc adaptive pilot gain algorithm is shown to have desirable convergence properties for most types of changes in aircraft dynamics.

  5. Interagency Task Forces: The Right Tools for the Job

    DTIC Science & Technology

    2011-01-01

    shortcomings. This analysis discusses four organizational reform models and recommends the interagency task force ( IATF ) as the preferred structure...model.64 Still others recommend creating and deploying ad hoc IATFs for crisis operations. These interagency task forces would be task- organized to...forces assigned for planning, exercises, and mission execution.65 A 2005 article in Policy Review recommended developing IATFs as needed for specific

  6. Analysis on Multicast Routing Protocols for Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Xiang, Ma

    As the Mobile Ad Hoc Networks technologies face a series of challenges like dynamic changes of topological structure, existence of unidirectional channel, limited wireless transmission bandwidth, the capability limitations of mobile termination and etc, therefore, the research to mobile Ad Hoc network routings inevitablely undertake a more important task than those to other networks. Multicast is a mode of communication transmission oriented to group computing, which sends the data to a group of host computers by using single source address. In a typical mobile Ad Hoc Network environment, multicast has a significant meaning. On the one hand, the users of mobile Ad Hoc Network usually need to form collaborative working groups; on the other hand, this is also an important means of fully using the broadcast performances of wireless communication and effectively using the limited wireless channel resources. This paper summarizes and comparatively analyzes the routing mechanisms of various existing multicast routing protocols according to the characteristics of mobile Ad Hoc network.

  7. Initial Report of the Deans Cyber Warfare Ad Hoc Committee

    DTIC Science & Technology

    2011-12-22

    in a cyber warfare environment. Among the more notable recent developments have been the establishment of a new Cyber Warfare Command (USCYBERCOM) at...information-warfare-centric organization. Clearly, future Naval Academy graduates will be expected to know more about cyber warfare than those we have...graduated in the past. The Academic Dean and Provost tasked an ad hoc committeethe Cyber Warfare ad hoc Committeeto examine how USNA can best ensure that

  8. Ad hoc vs. Non-ad hoc Percutaneous Coronary Intervention Strategies in Patients With Stable Coronary Artery Disease.

    PubMed

    Toyota, Toshiaki; Morimoto, Takeshi; Shiomi, Hiroki; Ando, Kenji; Ono, Koh; Shizuta, Satoshi; Kato, Takao; Saito, Naritatsu; Furukawa, Yutaka; Nakagawa, Yoshihisa; Horie, Minoru; Kimura, Takeshi

    2017-03-24

    Few studies have evaluated the prevalence and clinical outcomes of ad hoc percutaneous coronary intervention (PCI), performing diagnostic coronary angiography and PCI in the same session, in stable coronary artery disease (CAD) patients.Methods and Results:From the CREDO-Kyoto PCI/CABG registry cohort-2, 6,943 patients were analyzed as having stable CAD and undergoing first PCI. Ad hoc PCI and non-ad hoc PCI were performed in 1,722 (24.8%) and 5,221 (75.1%) patients, respectively. The cumulative 5-year incidence and adjusted risk for all-cause death were not significantly different between the 2 groups (15% vs. 15%, P=0.53; hazard ratio: 1.15, 95% confidence interval: 0.98-1.35, P=0.08). Ad hoc PCI relative to non-ad hoc PCI was associated with neutral risk for myocardial infarction, any coronary revascularization, and bleeding, but was associated with a trend towards lower risk for stroke (hazard ratio: 0.78, 95% confidence interval: 0.60-1.02, P=0.06). Ad hoc PCI in stable CAD patients was associated with at least comparable 5-year clinical outcomes as with non-ad hoc PCI. Considering patients' preference and the cost-saving, the ad hoc PCI strategy might be a safe and attractive option for patients with stable CAD, although the prevalence of ad hoc PCI was low in the current study population.

  9. A Feasible Approach for an Early Manned Lunar Landing. Part II: Detailed Report of Ad Hoc Task Group

    NASA Technical Reports Server (NTRS)

    Fleming, William A.

    1961-01-01

    This report, in two parts, presents a program development plan for attempting a first manned lunar landing in 1967. The two parts consist of a Summary Report and a Detailed Report representing the coordinated output of the Ad Hoc Task Group assigned to the study. The study was started in response to the request for such a study by the Associate Administrator in his memorandum of May 2, 1961 establishing the Ad Hoc Task Group. The purpose of the study was to take a first cut at the tasks associated with the design, development and construction of the equipment and facilities as well as the development of the crews, and to show the time phasing 6f these tasks. Included are the space sciences, life science and advanced technology tasks whose data and results are needed for designing and developing the systems required in carrying out the mission. The plan presented in the two reports does not presume to be a firm plan. Its basic purpose is, by choosing one feasible method, to size up the scope, schedule and cost of the job, discover the main problems, pacing items and major decisions and provide a threshold from which a firm and detailed project development plan can be jointly formulated by the various elements of NASA.

  10. NASA's Big Data Task Force

    NASA Astrophysics Data System (ADS)

    Holmes, C. P.; Kinter, J. L.; Beebe, R. F.; Feigelson, E.; Hurlburt, N. E.; Mentzel, C.; Smith, G.; Tino, C.; Walker, R. J.

    2017-12-01

    Two years ago NASA established the Ad Hoc Big Data Task Force (BDTF - https://science.nasa.gov/science-committee/subcommittees/big-data-task-force), an advisory working group with the NASA Advisory Council system. The scope of the Task Force included all NASA Big Data programs, projects, missions, and activities. The Task Force focused on such topics as exploring the existing and planned evolution of NASA's science data cyber-infrastructure that supports broad access to data repositories for NASA Science Mission Directorate missions; best practices within NASA, other Federal agencies, private industry and research institutions; and Federal initiatives related to big data and data access. The BDTF has completed its two-year term and produced several recommendations plus four white papers for NASA's Science Mission Directorate. This presentation will discuss the activities and results of the TF including summaries of key points from its focused study topics. The paper serves as an introduction to the papers following in this ESSI session.

  11. Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups

    NASA Astrophysics Data System (ADS)

    Desmedt, Yvo; Lange, Tanja; Burmester, Mike

    Task-specific groups are often formed in an ad-hoc manner within large corporate structures, such as companies. Take the following typical scenario: A director decides to set up a task force group for some specific project. An order is passed down the hierarchy where it finally reaches a manager who selects some employees to form the group. The members should communicate in a secure way and for efficiency, a symmetric encryption system is chosen. To establish a joint secret key for the group, a group key exchange (GKE) protocol is used. We show how to use an existing Public Key Infrastructure (PKI) to achieve authenticated GKE by modifying the protocol and particularly by including signatures.

  12. DAWN: Dynamic Ad-hoc Wireless Network

    DTIC Science & Technology

    2016-06-19

    DAWN: Dynamic Ad-hoc Wireless Network The DAWN (Dynamic Ad-hoc Wireless Networks) project is developing a general theory of complex and dynamic... wireless communication networks. To accomplish this, DAWN adopts a very different approach than those followed in the past and summarized above. DAWN... wireless communication networks. The members of DAWN investigated difference aspects of wireless mobile ad hoc networks (MANET). The views, opinions and/or

  13. Ad Hoc Access Gateway Selection Algorithm

    NASA Astrophysics Data System (ADS)

    Jie, Liu

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. For mobile nodes in Ad Hoc network to internet, internet communications in the peer nodes must be achieved through the gateway. Therefore, the key Ad Hoc Access Networks will focus on the discovery gateway, as well as gateway selection in the case of multi-gateway and handover problems between different gateways. This paper considers the mobile node and the gateway, based on the average number of hops from an average access time and the stability of routes, improved gateway selection algorithm were proposed. An improved gateway selection algorithm, which mainly considers the algorithm can improve the access time of Ad Hoc nodes and the continuity of communication between the gateways, were proposed. This can improve the quality of communication across the network.

  14. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks.

    PubMed

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV.

  15. Effective Ad-Hoc Committees.

    ERIC Educational Resources Information Center

    Young, David G.

    1983-01-01

    Ad-hoc committees may be symbolic, informational, or action committees. A literature survey indicates such committees' structural components include a suprasystem and three subsystems involving linkages, production, and implementation. Other variables include size, personal factors, and timing. All the factors carry implications about ad-hoc…

  16. Research of Ad Hoc Networks Access Algorithm

    NASA Astrophysics Data System (ADS)

    Xiang, Ma

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.

  17. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks

    PubMed Central

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV. PMID:27258013

  18. Enhanced Weight based DSR for Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Verma, Samant; Jain, Sweta

    2011-12-01

    Routing in ad hoc network is a great problematic, since a good routing protocol must ensure fast and efficient packet forwarding, which isn't evident in ad hoc networks. In literature there exists lot of routing protocols however they don't include all the aspects of ad hoc networks as mobility, device and medium constraints which make these protocols not efficient for some configuration and categories of ad hoc networks. Thus in this paper we propose an improvement of Weight Based DSR in order to include some of the aspects of ad hoc networks as stability, remaining battery power, load and trust factor and proposing a new approach Enhanced Weight Based DSR.

  19. 14 CFR 1203.903 - Ad hoc committees.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Ad hoc committees. 1203.903 Section 1203.903 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.903 Ad hoc committees. The Chairperson is authorized to...

  20. 14 CFR 1203.903 - Ad hoc committees.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Ad hoc committees. 1203.903 Section 1203.903 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.903 Ad hoc committees. The Chairperson is authorized...

  1. Assured Information Sharing for Ad-Hoc Collaboration

    ERIC Educational Resources Information Center

    Jin, Jing

    2009-01-01

    Collaborative information sharing tends to be highly dynamic and often ad hoc among organizations. The dynamic natures and sharing patterns in ad-hoc collaboration impose a need for a comprehensive and flexible approach to reflecting and coping with the unique access control requirements associated with the environment. This dissertation…

  2. Innovative research of AD HOC network mobility model

    NASA Astrophysics Data System (ADS)

    Chen, Xin

    2017-08-01

    It is difficult for researchers of AD HOC network to conduct actual deployment during experimental stage as the network topology is changeable and location of nodes is unfixed. Thus simulation still remains the main research method of the network. Mobility model is an important component of AD HOC network simulation. It is used to describe the movement pattern of nodes in AD HOC network (including location and velocity, etc.) and decides the movement trail of nodes, playing as the abstraction of the movement modes of nodes. Therefore, mobility model which simulates node movement is an important foundation for simulation research. In AD HOC network research, mobility model shall reflect the movement law of nodes as truly as possible. In this paper, node generally refers to the wireless equipment people carry. The main research contents include how nodes avoid obstacles during movement process and the impacts of obstacles on the mutual relation among nodes, based on which a Node Self Avoiding Obstacle, i.e. NASO model is established in AD HOC network.

  3. Conflict Management in "Ad Hoc" Problem-Solving Groups: A Preliminary Investigation.

    ERIC Educational Resources Information Center

    Wallace, Les; Baxter, Leslie

    Full study of small group communication must include consideration of task and socio-emotional dimensions, especially in relation to group problem solving. Thirty small groups were tested for their reactions in various "ad hoc" conflict resolution situations. Instructions to the groups were (1) no problem-solving instructions (control),…

  4. On Trust Evaluation in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Nguyen, Dang Quan; Lamont, Louise; Mason, Peter C.

    Trust has been considered as a social relationship between two individuals in human society. But, as computer science and networking have succeeded in using computers to automate many tasks, the concept of trust can be generalized to cover the reliability and relationships of non-human interaction, such as, for example, information gathering and data routing. This paper investigates the evaluation of trust in the context of ad hoc networks. Nodes evaluate each other’s behaviour based on observables. A node then decides whether to trust another node to have certain innate abilities. We show how accurate such an evaluation could be. We also provide the minimum number of observations required to obtain an accurate evaluation, a result that indicates that observation-based trust in ad hoc networks will remain a challenging problem. The impact of making networking decisions using trust evaluation on the network connectivity is also examined. In this manner, quantitative decisions can be made concerning trust-based routing with the knowledge of the potential impact on connectivity.

  5. Topology Control and Routing in Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Carr-Motyckova, Lenka; Navarra, Alfredo; Johansson, Tomas; Unger, Walter

    Mobile nodes with the ability to communicate with radio signals may form an ad hoc network. In this chapter special problems arising for these ad hoc networks are considered. These include range control, the reduction of interferences, regulation of power consumption, and localization.

  6. Ad Hoc Information Extraction for Clinical Data Warehouses.

    PubMed

    Dietrich, Georg; Krebs, Jonathan; Fette, Georg; Ertl, Maximilian; Kaspar, Mathias; Störk, Stefan; Puppe, Frank

    2018-05-01

    Clinical Data Warehouses (CDW) reuse Electronic health records (EHR) to make their data retrievable for research purposes or patient recruitment for clinical trials. However, much information are hidden in unstructured data like discharge letters. They can be preprocessed and converted to structured data via information extraction (IE), which is unfortunately a laborious task and therefore usually not available for most of the text data in CDW. The goal of our work is to provide an ad hoc IE service that allows users to query text data ad hoc in a manner similar to querying structured data in a CDW. While search engines just return text snippets, our systems also returns frequencies (e.g. how many patients exist with "heart failure" including textual synonyms or how many patients have an LVEF < 45) based on the content of discharge letters or textual reports for special investigations like heart echo. Three subtasks are addressed: (1) To recognize and to exclude negations and their scopes, (2) to extract concepts, i.e. Boolean values and (3) to extract numerical values. We implemented an extended version of the NegEx-algorithm for German texts that detects negations and determines their scope. Furthermore, our document oriented CDW PaDaWaN was extended with query functions, e.g. context sensitive queries and regex queries, and an extraction mode for computing the frequencies for Boolean and numerical values. Evaluations in chest X-ray reports and in discharge letters showed high F1-scores for the three subtasks: Detection of negated concepts in chest X-ray reports with an F1-score of 0.99 and in discharge letters with 0.97; of Boolean values in chest X-ray reports about 0.99, and of numerical values in chest X-ray reports and discharge letters also around 0.99 with the exception of the concept age. The advantages of an ad hoc IE over a standard IE are the low development effort (just entering the concept with its variants), the promptness of the results and the

  7. Ad hoc versus standardized admixtures for continuous infusion drugs in neonatal intensive care: cognitive task analysis of safety at the bedside.

    PubMed

    Brannon, Timothy S

    2006-01-01

    Continuous infusion intravenous (IV) drugs in neonatal intensive care are usually prepared based on patient weight so that the dose is readable as a simple multiple of the infusion pump rate. New safety guidelines propose that hospitals switch to using standardized admixtures of these drugs to prevent calculation errors during ad hoc preparation. Extended hierarchical task analysis suggests that switching to standardized admixtures may lead to more errors in programming the pump at the bedside.

  8. CSR: Constrained Selfish Routing in Ad-Hoc Networks

    NASA Astrophysics Data System (ADS)

    Bassem, Christine; Bestavros, Azer

    Routing protocols for ad-hoc networks assume that the nodes forming the network are either under a single authority, or else that they would be altruistically forwarding data for other nodes with no expectation of a return. These assumptions are unrealistic since in ad-hoc networks, nodes are likely to be autonomous and rational (selfish), and thus unwilling to help unless they have an incentive to do so. Providing such incentives is an important aspect that should be considered when designing ad-hoc routing protocols. In this paper, we propose a dynamic, decentralized routing protocol for ad-hoc networks that provides incentives in the form of payments to intermediate nodes used to forward data for others. In our Constrained Selfish Routing (CSR) protocol, game-theoretic approaches are used to calculate payments (incentives) that ensure both the truthfulness of participating nodes and the fairness of the CSR protocol. We show through simulations that CSR is an energy efficient protocol and that it provides lower communication overhead in the best and average cases compared to existing approaches.

  9. Analysis of Pervasive Mobile Ad Hoc Routing Protocols

    NASA Astrophysics Data System (ADS)

    Qadri, Nadia N.; Liotta, Antonio

    Mobile ad hoc networks (MANETs) are a fundamental element of pervasive networks and therefore, of pervasive systems that truly support pervasive computing, where user can communicate anywhere, anytime and on-the-fly. In fact, future advances in pervasive computing rely on advancements in mobile communication, which includes both infrastructure-based wireless networks and non-infrastructure-based MANETs. MANETs introduce a new communication paradigm, which does not require a fixed infrastructure - they rely on wireless terminals for routing and transport services. Due to highly dynamic topology, absence of established infrastructure for centralized administration, bandwidth constrained wireless links, and limited resources in MANETs, it is challenging to design an efficient and reliable routing protocol. This chapter reviews the key studies carried out so far on the performance of mobile ad hoc routing protocols. We discuss performance issues and metrics required for the evaluation of ad hoc routing protocols. This leads to a survey of existing work, which captures the performance of ad hoc routing algorithms and their behaviour from different perspectives and highlights avenues for future research.

  10. Ad Hoc versus Standardized Admixtures for Continuous Infusion Drugs in Neonatal Intensive Care: Cognitive Task Analysis of Safety at the Bedside

    PubMed Central

    Brannon, Timothy S.

    2006-01-01

    Continuous infusion intravenous (IV) drugs in neonatal intensive care are usually prepared based on patient weight so that the dose is readable as a simple multiple of the infusion pump rate. New safety guidelines propose that hospitals switch to using standardized admixtures of these drugs to prevent calculation errors during ad hoc preparation. Extended hierarchical task analysis suggests that switching to standardized admixtures may lead to more errors in programming the pump at the bedside. PMID:17238482

  11. AD HOC Networks for the Autonomous Car

    NASA Astrophysics Data System (ADS)

    Ron, Davidescu; Negrus, Eugen

    2017-10-01

    The future of the vehicle is made of cars, roads and infrastructures connected in a two way automated communication in a holistic system. It is a mandatory to use Encryption to maintain Confidentiality, Integrity and Availability in an ad hoc vehicle network. Vehicle to Vehicle communication, requires multichannel interaction between mobile, moving and changing parties to insure the full benefit from data sharing and real time decision making, a network of such users referred as mobile ad hoc network (MANET), however as ad hoc networks were not implemented in such a scale, it is not clear what is the best method and protocol to apply. Furthermore the visibility of secure preferred asymmetric encrypted ad hoc networks in a real time environment of dense moving autonomous vehicles has to be demonstrated, In order to evaluate the performance of Ad Hoc networks in changing conditions a simulation of multiple protocols was performed on large number of mobile nodes. The following common routing protocols were tested, DSDV is a proactive protocol, every mobile station maintains a routing table with all available destinations, DSR is a reactive routing protocol which allows nodes in the MANET to dynamically discover a source route across multiple network hops, AODV is a reactive routing protocol Instead of being proactive. It minimizes the number of broadcasts by creating routes based on demand, SAODV is a secure version of AODV, requires heavyweight asymmetric cryptographic, ARIANDE is a routing protocol that relies on highly efficient symmetric cryptography the concept is primarily based on DSR. A methodical evolution was performed in a various density of transportation, based on known communication bench mark parameters including, Throughput Vs. time, Routing Load per packets and bytes. Out of the none encrypted protocols, It is clear that in terms of performance of throughput and routing load DSR protocol has a clear advantage the high node number mode. The encrypted

  12. Ad hoc Laser networks component technology for modular spacecraft

    NASA Astrophysics Data System (ADS)

    Huang, Xiujun; Shi, Dele; Ma, Zongfeng; Shen, Jingshi

    2016-03-01

    Distributed reconfigurable satellite is a new kind of spacecraft system, which is based on a flexible platform of modularization and standardization. Based on the module data flow analysis of the spacecraft, this paper proposes a network component of ad hoc Laser networks architecture. Low speed control network with high speed load network of Microwave-Laser communication mode, no mesh network mode, to improve the flexibility of the network. Ad hoc Laser networks component technology was developed, and carried out the related performance testing and experiment. The results showed that ad hoc Laser networks components can meet the demand of future networking between the module of spacecraft.

  13. Ad hoc laser networks component technology for modular spacecraft

    NASA Astrophysics Data System (ADS)

    Huang, Xiujun; Shi, Dele; Shen, Jingshi

    2017-10-01

    Distributed reconfigurable satellite is a new kind of spacecraft system, which is based on a flexible platform of modularization and standardization. Based on the module data flow analysis of the spacecraft, this paper proposes a network component of ad hoc Laser networks architecture. Low speed control network with high speed load network of Microwave-Laser communication mode, no mesh network mode, to improve the flexibility of the network. Ad hoc Laser networks component technology was developed, and carried out the related performance testing and experiment. The results showed that ad hoc Laser networks components can meet the demand of future networking between the module of spacecraft.

  14. The Roles of the Federal Government in Telecommunications. President's Task Force on Communications Policy. Staff Paper Eight.

    ERIC Educational Resources Information Center

    Rostow, Eugene V.

    A staff paper to the President's Task Force on Communications Policy reviews the role played by the Federal Government in regulating the telecommunications industries and recommends broader federal jurisdiction. The history of federal action in telecommunications has been one of ad hoc responses to discrete problems, leading to an inefficient,…

  15. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    PubMed Central

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  16. Sputnik: ad hoc distributed computation.

    PubMed

    Völkel, Gunnar; Lausser, Ludwig; Schmid, Florian; Kraus, Johann M; Kestler, Hans A

    2015-04-15

    In bioinformatic applications, computationally demanding algorithms are often parallelized to speed up computation. Nevertheless, setting up computational environments for distributed computation is often tedious. Aim of this project were the lightweight ad hoc set up and fault-tolerant computation requiring only a Java runtime, no administrator rights, while utilizing all CPU cores most effectively. The Sputnik framework provides ad hoc distributed computation on the Java Virtual Machine which uses all supplied CPU cores fully. It provides a graphical user interface for deployment setup and a web user interface displaying the current status of current computation jobs. Neither a permanent setup nor administrator privileges are required. We demonstrate the utility of our approach on feature selection of microarray data. The Sputnik framework is available on Github http://github.com/sysbio-bioinf/sputnik under the Eclipse Public License. hkestler@fli-leibniz.de or hans.kestler@uni-ulm.de Supplementary data are available at Bioinformatics online. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  17. Trust recovery model of Ad Hoc network based on identity authentication scheme

    NASA Astrophysics Data System (ADS)

    Liu, Jie; Huan, Shuiyuan

    2017-05-01

    Mobile Ad Hoc network trust model is widely used to solve mobile Ad Hoc network security issues. Aiming at the problem of reducing the network availability caused by the processing of malicious nodes and selfish nodes in mobile Ad Hoc network routing based on trust model, an authentication mechanism based on identity authentication mobile Ad Hoc network is proposed, which uses identity authentication to identify malicious nodes, And trust the recovery of selfish nodes in order to achieve the purpose of reducing network congestion and improving network quality. The simulation results show that the implementation of the mechanism can effectively improve the network availability and security.

  18. MWAHCA: A Multimedia Wireless Ad Hoc Cluster Architecture

    PubMed Central

    Diaz, Juan R.; Jimenez, Jose M.; Sendra, Sandra

    2014-01-01

    Wireless Ad hoc networks provide a flexible and adaptable infrastructure to transport data over a great variety of environments. Recently, real-time audio and video data transmission has been increased due to the appearance of many multimedia applications. One of the major challenges is to ensure the quality of multimedia streams when they have passed through a wireless ad hoc network. It requires adapting the network architecture to the multimedia QoS requirements. In this paper we propose a new architecture to organize and manage cluster-based ad hoc networks in order to provide multimedia streams. Proposed architecture adapts the network wireless topology in order to improve the quality of audio and video transmissions. In order to achieve this goal, the architecture uses some information such as each node's capacity and the QoS parameters (bandwidth, delay, jitter, and packet loss). The architecture splits the network into clusters which are specialized in specific multimedia traffic. The real system performance study provided at the end of the paper will demonstrate the feasibility of the proposal. PMID:24737996

  19. MWAHCA: a multimedia wireless ad hoc cluster architecture.

    PubMed

    Diaz, Juan R; Lloret, Jaime; Jimenez, Jose M; Sendra, Sandra

    2014-01-01

    Wireless Ad hoc networks provide a flexible and adaptable infrastructure to transport data over a great variety of environments. Recently, real-time audio and video data transmission has been increased due to the appearance of many multimedia applications. One of the major challenges is to ensure the quality of multimedia streams when they have passed through a wireless ad hoc network. It requires adapting the network architecture to the multimedia QoS requirements. In this paper we propose a new architecture to organize and manage cluster-based ad hoc networks in order to provide multimedia streams. Proposed architecture adapts the network wireless topology in order to improve the quality of audio and video transmissions. In order to achieve this goal, the architecture uses some information such as each node's capacity and the QoS parameters (bandwidth, delay, jitter, and packet loss). The architecture splits the network into clusters which are specialized in specific multimedia traffic. The real system performance study provided at the end of the paper will demonstrate the feasibility of the proposal.

  20. Hybrid Packet-Pheromone-Based Probabilistic Routing for Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Kashkouli Nejad, Keyvan; Shawish, Ahmed; Jiang, Xiaohong; Horiguchi, Susumu

    Ad-Hoc networks are collections of mobile nodes communicating using wireless media without any fixed infrastructure. Minimal configuration and quick deployment make Ad-Hoc networks suitable for emergency situations like natural disasters or military conflicts. The current Ad-Hoc networks can only support either high mobility or high transmission rate at a time because they employ static approaches in their routing schemes. However, due to the continuous expansion of the Ad-Hoc network size, node-mobility and transmission rate, the development of new adaptive and dynamic routing schemes has become crucial. In this paper we propose a new routing scheme to support high transmission rates and high node-mobility simultaneously in a big Ad-Hoc network, by combining a new proposed packet-pheromone-based approach with the Hint Based Probabilistic Protocol (HBPP) for congestion avoidance with dynamic path selection in packet forwarding process. Because of using the available feedback information, the proposed algorithm does not introduce any additional overhead. The extensive simulation-based analysis conducted in this paper indicates that the proposed algorithm offers small packet-latency and achieves a significantly higher delivery probability in comparison with the available Hint-Based Probabilistic Protocol (HBPP).

  1. Quantum load balancing in ad hoc networks

    NASA Astrophysics Data System (ADS)

    Hasanpour, M.; Shariat, S.; Barnaghi, P.; Hoseinitabatabaei, S. A.; Vahid, S.; Tafazolli, R.

    2017-06-01

    This paper presents a novel approach in targeting load balancing in ad hoc networks utilizing the properties of quantum game theory. This approach benefits from the instantaneous and information-less capability of entangled particles to synchronize the load balancing strategies in ad hoc networks. The quantum load balancing (QLB) algorithm proposed by this work is implemented on top of OLSR as the baseline routing protocol; its performance is analyzed against the baseline OLSR, and considerable gain is reported regarding some of the main QoS metrics such as delay and jitter. Furthermore, it is shown that QLB algorithm supports a solid stability gain in terms of throughput which stands a proof of concept for the load balancing properties of the proposed theory.

  2. Supporting Dynamic Ad hoc Collaboration Capabilities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Agarwal, Deborah A.; Berket, Karlo

    2003-07-14

    Modern HENP experiments such as CMS and Atlas involve as many as 2000 collaborators around the world. Collaborations this large will be unable to meet often enough to support working closely together. Many of the tools currently available for collaboration focus on heavy-weight applications such as videoconferencing tools. While these are important, there is a more basic need for tools that support connecting physicists to work together on an ad hoc or continuous basis. Tools that support the day-to-day connectivity and underlying needs of a group of collaborators are important for providing light-weight, non-intrusive, and flexible ways to work collaboratively.more » Some example tools include messaging, file-sharing, and shared plot viewers. An important component of the environment is a scalable underlying communication framework. In this paper we will describe our current progress on building a dynamic and ad hoc collaboration environment and our vision for its evolution into a HENP collaboration environment.« less

  3. A Decentralized VPN Service over Generalized Mobile Ad-Hoc Networks

    NASA Astrophysics Data System (ADS)

    Fujita, Sho; Shima, Keiichi; Uo, Yojiro; Esaki, Hiroshi

    We present a decentralized VPN service that can be built over generalized mobile ad-hoc networks (Generalized MANETs), in which topologies can be represented as a time-varying directed multigraph. We address wireless ad-hoc networks and overlay ad-hoc networks as instances of Generalized MANETs. We first propose an architecture to operate on various kinds of networks through a single set of operations. Then, we design and implement a decentralized VPN service on the proposed architecture. Through the development and operation of a prototype system we implemented, we found that the proposed architecture makes the VPN service applicable to each instance of Generalized MANETs, and that the VPN service makes it possible for unmodified applications to operate on the networks.

  4. ARSENAL: A Cross Layer Architecture for Secure Resilient Tactical Mobile AdHoc Networks

    DTIC Science & Technology

    2016-01-21

    stations separated by 0.5 to 1 km can be coherently measured to a single mobile subscriber using LTE signaling. These are the first measurements of...undertake three parallel but inter-coupled tasks geared towards a) performing measurements via real deployments and enhancing our understanding of layer...dependencies and vulnerabilities in mobile ad hoc networks; these measurements will be on existing testbeds at The views, opinions and/or findings

  5. ARSENAL: A Cross Layer Architecture for SecureResilient Tactical Mobile AdHoc Networks

    DTIC Science & Technology

    2016-01-21

    stations separated by 0.5 to 1 km can be coherently measured to a single mobile subscriber using LTE signaling. These are the first measurements of...undertake three parallel but inter-coupled tasks geared towards a) performing measurements via real deployments and enhancing our understanding of layer...dependencies and vulnerabilities in mobile ad hoc networks; these measurements will be on existing testbeds at The views, opinions and/or findings

  6. T2AR: trust-aware ad-hoc routing protocol for MANET.

    PubMed

    Dhananjayan, Gayathri; Subbiah, Janakiraman

    2016-01-01

    Secure data transfer against the malicious attacks is an important issue in an infrastructure-less independent network called mobile ad-hoc network (MANET). Trust assurance between MANET nodes is the key parameter in the high-security provision under dynamic topology variations and open wireless constraints. But, the malicious behavior of nodes reduces the trust level of the nodes that leads to an insecure data delivery. The increase in malicious attacks causes the excessive energy consumption that leads to a reduction of network lifetime. The lack of positional information update of the nodes in ad-hoc on-demand vector (AODV) protocol during the connection establishment offers less trust level between the nodes. Hence, the trust rate computation using energy and mobility models and its update are the essential tasks for secure data delivery. This paper proposes a trust-aware ad-hoc routing (T2AR) protocol to improve the trust level between the nodes in MANET. The proposed method modifies the traditional AODV routing protocol with the constraints of trust rate, energy, mobility based malicious behavior prediction. The packet sequence ID matching from the log reports of neighbor nodes determine the trust rate that avoids the malicious report generation. Besides, the direct and indirect trust observation schemes utilization increases the trust level. Besides, the received signal strength indicator utilization determines the trusted node is within the communication range or not. The comparative analysis between the proposed T2AR with the existing methods such as TRUNCMAN, RBT, GR, FBR and DICOTIDS regarding the average end-to-end delay, throughput, false positives, packet delivery ratio shows the effectiveness of T2AR in the secure MANET environment design.

  7. Intelligent Sensing and Classification in DSR-Based Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Dempsey, Tae; Sahin, Gokhan; Morton, Yu T. (Jade

    Wireless ad hoc networks have fundamentally altered today's battlefield, with applications ranging from unmanned air vehicles to randomly deployed sensor networks. Security and vulnerabilities in wireless ad hoc networks have been considered at different layers, and many attack strategies have been proposed, including denial of service (DoS) through the intelligent jamming of the most critical packet types of flows in a network. This paper investigates the effectiveness of intelligent jamming in wireless ad hoc networks using the Dynamic Source Routing (DSR) and TCP protocols and introduces an intelligent classifier to facilitate the jamming of such networks. Assuming encrypted packet headers and contents, our classifier is based solely on the observable characteristics of size, inter-arrival timing, and direction and classifies packets with up to 99.4% accuracy in our experiments.

  8. Global Coverage from Ad-Hoc Constellations in Rideshare Orbits

    NASA Technical Reports Server (NTRS)

    Ellis, Armin; Mercury, Michael; Brown, Shannon

    2012-01-01

    A promising area of small satellite development is in providing higher temporal resolution than larger satellites. Traditional constellations have required specific orbits and dedicated launch vehicles. In this paper we discuss an alternative architecture in which the individual elements of the constellation are launched as rideshare opportunities. We compare the coverage of such an ad-hoc constellation with more traditional constellations. Coverage analysis is based on actual historical data from rideshare opportunities. Our analysis includes ground coverage and temporal revisits for Polar, Tropics, Temperate, and Global regions, comparing ad-hoc and Walker constellation.

  9. The effects of malicious nodes on performance of mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Li, Fanzhi; Shi, Xiyu; Jassim, Sabah; Adams, Christopher

    2006-05-01

    Wireless ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to security attacks. Unlike their wired counterpart, infrastructureless ad hoc networks do not have a clear line of defense, their topology is dynamically changing, and every mobile node can receive messages from its neighbors and can be contacted by all other nodes in its neighborhood. This poses a great danger to network security if some nodes behave in a malicious manner. The immediate concern about the security in this type of networks is how to protect the network and the individual mobile nodes against malicious act of rogue nodes from within the network. This paper is concerned with security aspects of wireless ad hoc networks. We shall present results of simulation experiments on ad hoc network's performance in the presence of malicious nodes. We shall investigate two types of attacks and the consequences will be simulated and quantified in terms of loss of packets and other factors. The results show that network performance, in terms of successful packet delivery ratios, significantly deteriorates when malicious nodes act according to the defined misbehaving characteristics.

  10. The Copyright Law as it Relates to National Information Systems and National Programs; a Study by the Ad Hoc Task Group on Legal Aspects Involved in National Information Systems.

    ERIC Educational Resources Information Center

    Federal Council for Science and Technology, Washington, DC. Committee on Scientific and Technical Information.

    An ad hoc task group was constituted by the Committee on Scientific and Technical Information (COSATI) to: (1) delineate present and future issues issues for COSATI, (3) recommend additions or deletions in the present copyright law or in the pending revision now in Congress, and (4) recommend other short or long-term actions related to authorship…

  11. Packets Distributing Evolutionary Algorithm Based on PSO for Ad Hoc Network

    NASA Astrophysics Data System (ADS)

    Xu, Xiao-Feng

    2018-03-01

    Wireless communication network has such features as limited bandwidth, changeful channel and dynamic topology, etc. Ad hoc network has lots of difficulties in accessing control, bandwidth distribution, resource assign and congestion control. Therefore, a wireless packets distributing Evolutionary algorithm based on PSO (DPSO)for Ad Hoc Network is proposed. Firstly, parameters impact on performance of network are analyzed and researched to obtain network performance effective function. Secondly, the improved PSO Evolutionary Algorithm is used to solve the optimization problem from local to global in the process of network packets distributing. The simulation results show that the algorithm can ensure fairness and timeliness of network transmission, as well as improve ad hoc network resource integrated utilization efficiency.

  12. Ad hoc categories and false memories: Memory illusions for categories created on-the-spot.

    PubMed

    Soro, Jerônimo C; Ferreira, Mário B; Semin, Gün R; Mata, André; Carneiro, Paula

    2017-11-01

    Three experiments were designed to test whether experimentally created ad hoc associative networks evoke false memories. We used the DRM (Deese, Roediger, McDermott) paradigm with lists of ad hoc categories composed of exemplars aggregated toward specific goals (e.g., going for a picnic) that do not share any consistent set of features. Experiment 1 revealed considerable levels of false recognitions of critical words from ad hoc categories. False recognitions occurred even when the lists were presented without an organizing theme (i.e., the category's label). Experiments 1 and 2 tested whether (a) the ease of identifying the categories' themes, and (b) the lists' backward associative strength could be driving the effect. List identifiability did not correlate with false recognition, and the effect remained even when backward associative strength was controlled for. Experiment 3 manipulated the distractor items in the recognition task to address the hypothesis that the salience of unrelated items could be facilitating the occurrence of the phenomenon. The effect remained when controlling for this source of facilitation. These results have implications for assumptions made by theories of false memories, namely the preexistence of associations in the activation-monitoring framework and the central role of gist extraction in fuzzy-trace theory, while providing evidence of the occurrence of false memories for more dynamic and context-dependent knowledge structures. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  13. A Group Based Key Sharing and Management Algorithm for Vehicular Ad Hoc Networks

    PubMed Central

    Moharram, Mohammed Morsi; Azam, Farzana

    2014-01-01

    Vehicular ad hoc networks (VANETs) are one special type of ad hoc networks that involves vehicles on roads. Typically like ad hoc networks, broadcast approach is used for data dissemination. Blind broadcast to each and every node results in exchange of useless and irrelevant messages and hence creates an overhead. Unicasting is not preferred in ad-hoc networks due to the dynamic topology and the resource requirements as compared to broadcasting. Simple broadcasting techniques create several problems on privacy, disturbance, and resource utilization. In this paper, we propose media mixing algorithm to decide what information should be provided to each user and how to provide such information. Results obtained through simulation show that fewer number of keys are needed to share compared to simple broadcasting. Privacy is also enhanced through this approach. PMID:24587749

  14. Decentralized session initiation protocol solution in ad hoc networks

    NASA Astrophysics Data System (ADS)

    Han, Lu; Jin, Zhigang; Shu, Yantai; Dong, Linfang

    2006-10-01

    With the fast development of ad hoc networks, SIP has attracted more and more attention in multimedia service. This paper proposes a new architecture to provide SIP service for ad hoc users, although there is no centralized SIP server deployed. In this solution, we provide the SIP service by the introduction of two nodes: Designated SIP Server (DS) and its Backup Server (BDS). The nodes of ad hoc network designate DS and BDS when they join the session nodes set and when some pre-defined events occur. A new sip message type called REGISTRAR is presented so nodes can send others REGISTRAR message to declare they want to be DS. According to the IP information taken in the message, an algorithm works like the election of DR and BDR in OSPF protocol is used to vote DS and BDS SIP servers. Naturally, the DS will be replaced by BDS when the DS is down for predicable or unpredictable reasons. To facilitate this, the DS should register to the BDS and transfer a backup of the SIP users' database. Considering the possibility DS or BDS may abruptly go down, a special policy is given. When there is no DS and BDS, a new election procedure is triggered just like the startup phase. The paper also describes how SIP works normally in the decentralized model as well as the evaluation of its performance. All sessions based on SIP in ad hoc such as DS voting have been tested in the real experiments within a 500m*500m square area where about 30 random nodes are placed.

  15. Information Sharing Modalities for Mobile Ad-Hoc Networks

    NASA Astrophysics Data System (ADS)

    de Spindler, Alexandre; Grossniklaus, Michael; Lins, Christoph; Norrie, Moira C.

    Current mobile phone technologies have fostered the emergence of a new generation of mobile applications. Such applications allow users to interact and share information opportunistically when their mobile devices are in physical proximity or close to fixed installations. It has been shown how mobile applications such as collaborative filtering and location-based services can take advantage of ad-hoc connectivity to use physical proximity as a filter mechanism inherent to the application logic. We discuss the different modes of information sharing that arise in such settings based on the models of persistence and synchronisation. We present a platform that supports the development of applications that can exploit these modes of ad-hoc information sharing and, by means of an example, show how such an application can be realised based on the supported event model.

  16. Interference Drop Scheme: Enhancing QoS Provision in Multi-Hop Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Luo, Chang-Yi; Komuro, Nobuyoshi; Takahashi, Kiyoshi; Kasai, Hiroyuki; Ueda, Hiromi; Tsuboi, Toshinori

    Ad hoc networking uses wireless technologies to construct networks with no physical infrastructure and so are expected to provide instant networking in areas such as disaster recovery sites and inter-vehicle communication. Unlike conventional wired networks services, services in ad hoc networks are easily disrupted by the frequent changes in traffic and topology. Therefore, solutions to assure the Quality of Services (QoS) in ad hoc networks are different from the conventional ones used in wired networks. In this paper, we propose a new queue management scheme, Interference Drop Scheme (IDS) for ad hoc networks. In the conventional queue management approaches such as FIFO (First-in First-out) and RED (Random Early Detection), a queue is usually managed by a queue length limit. FIFO discards packets according to the queue limit, and RED discards packets in an early and random fashion. IDS, on the other hand, manages the queue according to wireless interference time, which increases as the number of contentions in the MAC layer increases. When there are many MAC contentions, IDS discards TCP data packets. By observing the interference time and discarding TCP data packets, our simulation results show that IDS improves TCP performance and reduces QoS violations in UDP in ad hoc networks with chain, grid, and random topologies. Our simulation results also demonstrate that wireless interference time is a better metric than queue length limit for queue management in multi-hop ad hoc networks.

  17. An artificial immune system approach with secondary response for misbehavior detection in mobile ad hoc networks.

    PubMed

    Sarafijanović, Slavisa; Le Boudec, Jean-Yves

    2005-09-01

    In mobile ad hoc networks, nodes act both as terminals and information relays, and they participate in a common routing protocol, such as dynamic source routing (DSR). The network is vulnerable to routing misbehavior, due to faulty or malicious nodes. Misbehavior detection systems aim at removing this vulnerability. In this paper, we investigate the use of an artificial immune system (AIS) to detect node misbehavior in a mobile ad hoc network using DSR. The system is inspired by the natural immune system (IS) of vertebrates. Our goal is to build a system that, like its natural counterpart, automatically learns, and detects new misbehavior. We describe our solution for the classification task of the AIS; it employs negative selection and clonal selection, the algorithms for learning and adaptation used by the natural IS. We define how we map the natural IS concepts such as self, antigen, and antibody to a mobile ad hoc network and give the resulting algorithm for classifying nodes as misbehaving. We implemented the system in the network simulator Glomosim; we present detection results and discuss how the system parameters affect the performance of primary and secondary response. Further steps will extend the design by using an analogy to the innate system, danger signal, and memory cells.

  18. Dynamic fair node spectrum allocation for ad hoc networks using random matrices

    NASA Astrophysics Data System (ADS)

    Rahmes, Mark; Lemieux, George; Chester, Dave; Sonnenberg, Jerry

    2015-05-01

    Dynamic Spectrum Access (DSA) is widely seen as a solution to the problem of limited spectrum, because of its ability to adapt the operating frequency of a radio. Mobile Ad Hoc Networks (MANETs) can extend high-capacity mobile communications over large areas where fixed and tethered-mobile systems are not available. In one use case with high potential impact, cognitive radio employs spectrum sensing to facilitate the identification of allocated frequencies not currently accessed by their primary users. Primary users own the rights to radiate at a specific frequency and geographic location, while secondary users opportunistically attempt to radiate at a specific frequency when the primary user is not using it. We populate a spatial radio environment map (REM) database with known information that can be leveraged in an ad hoc network to facilitate fair path use of the DSA-discovered links. Utilization of high-resolution geospatial data layers in RF propagation analysis is directly applicable. Random matrix theory (RMT) is useful in simulating network layer usage in nodes by a Wishart adjacency matrix. We use the Dijkstra algorithm for discovering ad hoc network node connection patterns. We present a method for analysts to dynamically allocate node-node path and link resources using fair division. User allocation of limited resources as a function of time must be dynamic and based on system fairness policies. The context of fair means that first available request for an asset is not envied as long as it is not yet allocated or tasked in order to prevent cycling of the system. This solution may also save money by offering a Pareto efficient repeatable process. We use a water fill queue algorithm to include Shapley value marginal contributions for allocation.

  19. Anomaly Detection Techniques for Ad Hoc Networks

    ERIC Educational Resources Information Center

    Cai, Chaoli

    2009-01-01

    Anomaly detection is an important and indispensable aspect of any computer security mechanism. Ad hoc and mobile networks consist of a number of peer mobile nodes that are capable of communicating with each other absent a fixed infrastructure. Arbitrary node movements and lack of centralized control make them vulnerable to a wide variety of…

  20. Cross-layer protocols optimized for real-time multimedia services in energy-constrained mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2003-07-01

    Mobile ad hoc networking (MANET) supports self-organizing, mobile infrastructures and enables an autonomous network of mobile nodes that can operate without a wired backbone. Ad hoc networks are characterized by multihop, wireless connectivity via packet radios and by the need for efficient dynamic protocols. All routers are mobile and can establish connectivity with other nodes only when they are within transmission range. Importantly, ad hoc wireless nodes are resource-constrained, having limited processing, memory, and battery capacity. Delivery of high quality-ofservice (QoS), real-time multimedia services from Internet-based applications over a MANET is a challenge not yet achieved by proposed Internet Engineering Task Force (IETF) ad hoc network protocols in terms of standard performance metrics such as end-to-end throughput, packet error rate, and delay. In the distributed operations of route discovery and maintenance, strong interaction occurs across MANET protocol layers, in particular, the physical, media access control (MAC), network, and application layers. The QoS requirements are specified for the service classes by the application layer. The cross-layer design must also satisfy the battery-limited energy constraints, by minimizing the distributed power consumption at the nodes and of selected routes. Interactions across the layers are modeled in terms of the set of concatenated design parameters including associated energy costs. Functional dependencies of the QoS metrics are described in terms of the concatenated control parameters. New cross-layer designs are sought that optimize layer interdependencies to achieve the "best" QoS available in an energy-constrained, time-varying network. The protocol design, based on a reactive MANET protocol, adapts the provisioned QoS to dynamic network conditions and residual energy capacities. The cross-layer optimization is based on stochastic dynamic programming conditions derived from time-dependent models of

  1. A secure 3-way routing protocols for intermittently connected mobile ad hoc networks.

    PubMed

    Sekaran, Ramesh; Parasuraman, Ganesh Kumar

    2014-01-01

    The mobile ad hoc network may be partially connected or it may be disconnected in nature and these forms of networks are termed intermittently connected mobile ad hoc network (ICMANET). The routing in such disconnected network is commonly an arduous task. Many routing protocols have been proposed for routing in ICMANET since decades. The routing techniques in existence for ICMANET are, namely, flooding, epidemic, probabilistic, copy case, spray and wait, and so forth. These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth. Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters. The algorithm along with efficient routing ensures higher degree of security. The security level is cited testing with respect to possibility of malicious nodes into the network. This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET.

  2. A Secure 3-Way Routing Protocols for Intermittently Connected Mobile Ad Hoc Networks

    PubMed Central

    Parasuraman, Ganesh Kumar

    2014-01-01

    The mobile ad hoc network may be partially connected or it may be disconnected in nature and these forms of networks are termed intermittently connected mobile ad hoc network (ICMANET). The routing in such disconnected network is commonly an arduous task. Many routing protocols have been proposed for routing in ICMANET since decades. The routing techniques in existence for ICMANET are, namely, flooding, epidemic, probabilistic, copy case, spray and wait, and so forth. These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth. Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters. The algorithm along with efficient routing ensures higher degree of security. The security level is cited testing with respect to possibility of malicious nodes into the network. This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET. PMID:25136697

  3. Integrated data lookup and replication scheme in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Chen, Kai; Nahrstedt, Klara

    2001-11-01

    Accessing remote data is a challenging task in mobile ad hoc networks. Two problems have to be solved: (1) how to learn about available data in the network; and (2) how to access desired data even when the original copy of the data is unreachable. In this paper, we develop an integrated data lookup and replication scheme to solve these problems. In our scheme, a group of mobile nodes collectively host a set of data to improve data accessibility for all members of the group. They exchange data availability information by broadcasting advertising (ad) messages to the group using an adaptive sending rate policy. The ad messages are used by other nodes to derive a local data lookup table, and to reduce data redundancy within a connected group. Our data replication scheme predicts group partitioning based on each node's current location and movement patterns, and replicates data to other partitions before partitioning occurs. Our simulations show that data availability information can quickly propagate throughout the network, and that the successful data access ratio of each node is significantly improved.

  4. MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm

    PubMed Central

    Elizarraras, Omar; Panduro, Marco; Méndez, Aldo L.

    2014-01-01

    The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR) and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC) protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access) for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15%) compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput. PMID:25140339

  5. Providing Location Security in Vehicular Ad Hoc Networks

    ERIC Educational Resources Information Center

    Yan, Gongjun

    2010-01-01

    Location is fundamental information in Vehicular Ad-hoc Networks (VANETs). Almost all VANET applications rely on location information. Therefore it is of importance to ensure location information integrity, meaning that location information is original (from the generator), correct (not bogus or fabricated) and unmodified (value not changed). We…

  6. What Is the Problem of Ad Hoc Hypotheses?

    ERIC Educational Resources Information Center

    Bamford, Greg

    1999-01-01

    Philosophers' attempts to convincingly explicate the received view of an ad hoc hypothesis--that it accounts for only the observations it was designed to account for--have been unsuccessful. Familiar and firmer criteria for evaluating the hypotheses or modified theories so classified are characteristically available. Contains 41 references.…

  7. Energy conservation in ad hoc multimedia networks using traffic-shaping mechanisms

    NASA Astrophysics Data System (ADS)

    Chandra, Surendar

    2003-12-01

    In this work, we explore network traffic shaping mechanisms that deliver packets at pre-determined intervals; allowing the network interface to transition to a lower power consuming sleep state. We focus our efforts on commodity devices, IEEE 802.11b ad hoc mode and popular streaming formats. We argue that factors such as the lack of scheduling clock phase synchronization among the participants and scheduling delays introduced by back ground tasks affect the potential energy savings. Increasing the periodic transmission delays to transmit data infrequently can offset some of these effects at the expense of flooding the wireless channel for longer periods of time; potentially increasing the time to acquire the channel for non-multimedia traffic. Buffering mechanisms built into media browsers can mitigate the effects of these added delays from being mis-interpreted as network congestion. We show that practical implementations of such traffic shaping mechanisms can offer significant energy savings.

  8. 29 CFR 1912.11 - Terms of ad hoc committee members.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 7 2011-07-01 2011-07-01 false Terms of ad hoc committee members. 1912.11 Section 1912.11 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR (CONTINUED) ADVISORY COMMITTEES ON STANDARDS Organizational Matters § 1912.11 Terms of ad...

  9. 29 CFR 1912.11 - Terms of ad hoc committee members.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 7 2010-07-01 2010-07-01 false Terms of ad hoc committee members. 1912.11 Section 1912.11 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR (CONTINUED) ADVISORY COMMITTEES ON STANDARDS Organizational Matters § 1912.11 Terms of ad...

  10. Data Mining of Extremely Large Ad Hoc Data Sets to Produce Inverted Indices

    DTIC Science & Technology

    2016-06-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited DATA MINING OF...COVERED Master’s Thesis 4. TITLE AND SUBTITLE DATA MINING OF EXTREMELY LARGE AD HOC DATA SETS TO PRODUCE INVERTED INDICES 5. FUNDING NUMBERS 6...INTENTIONALLY LEFT BLANK iii Approved for public release; distribution is unlimited DATA MINING OF EXTREMELY LARGE AD HOC DATA SETS TO PRODUCE

  11. Typicality Mediates Performance during Category Verification in Both Ad-Hoc and Well-Defined Categories

    ERIC Educational Resources Information Center

    Sandberg, Chaleece; Sebastian, Rajani; Kiran, Swathi

    2012-01-01

    Background: The typicality effect is present in neurologically intact populations for natural, ad-hoc, and well-defined categories. Although sparse, there is evidence of typicality effects in persons with chronic stroke aphasia for natural and ad-hoc categories. However, it is unknown exactly what influences the typicality effect in this…

  12. Robotic disaster recovery efforts with ad-hoc deployable cloud computing

    NASA Astrophysics Data System (ADS)

    Straub, Jeremy; Marsh, Ronald; Mohammad, Atif F.

    2013-06-01

    Autonomous operations of search and rescue (SaR) robots is an ill posed problem, which is complexified by the dynamic disaster recovery environment. In a typical SaR response scenario, responder robots will require different levels of processing capabilities during various parts of the response effort and will need to utilize multiple algorithms. Placing these capabilities onboard the robot is a mediocre solution that precludes algorithm specific performance optimization and results in mediocre performance. Architecture for an ad-hoc, deployable cloud environment suitable for use in a disaster response scenario is presented. Under this model, each service provider is optimized for the task and maintains a database of situation-relevant information. This service-oriented architecture (SOA 3.0) compliant framework also serves as an example of the efficient use of SOA 3.0 in an actual cloud application.

  13. Impact of network structure on the capacity of wireless multihop ad hoc communication

    NASA Astrophysics Data System (ADS)

    Krause, Wolfram; Glauche, Ingmar; Sollacher, Rudolf; Greiner, Martin

    2004-07-01

    As a representative of a complex technological system, the so-called wireless multihop ad hoc communication networks are discussed. They represent an infrastructure-less generalization of todays wireless cellular phone networks. Lacking a central control authority, the ad hoc nodes have to coordinate themselves such that the overall network performs in an optimal way. A performance indicator is the end-to-end throughput capacity. Various models, generating differing ad hoc network structure via differing transmission power assignments, are constructed and characterized. They serve as input for a generic data traffic simulation as well as some semi-analytic estimations. The latter reveal that due to the most-critical-node effect the end-to-end throughput capacity sensitively depends on the underlying network structure, resulting in differing scaling laws with respect to network size.

  14. Ad Hoc Categories and False Memories: Memory Illusions for Categories Created On-The-Spot

    ERIC Educational Resources Information Center

    Soro, Jerônimo C.; Ferreira, Mário B.; Semin, Gün R.; Mata, André; Carneiro, Paula

    2017-01-01

    Three experiments were designed to test whether experimentally created ad hoc associative networks evoke false memories. We used the DRM (Deese, Roediger, McDermott) paradigm with lists of ad hoc categories composed of exemplars aggregated toward specific goals (e.g., going for a picnic) that do not share any consistent set of features. Experiment…

  15. AAPM/SNMMI Joint Task Force: report on the current state of nuclear medicine physics training.

    PubMed

    Harkness, Beth A; Allison, Jerry D; Clements, Jessica B; Coffey, Charles W; Fahey, Frederic H; Gress, Dustin A; Kinahan, Paul E; Nickoloff, Edward L; Mawlawi, Osama R; MacDougall, Robert D; Pizzutiello, Robert J

    2015-09-08

    The American Association of Physicists in Medicine (AAPM) and the Society of Nuclear Medicine and Molecular Imaging (SNMMI) recognized the need for a review of the current state of nuclear  medicine physics training and the need to explore pathways for improving nuclear medicine physics training opportunities. For these reasons, the two organizations formed a joint AAPM/SNMMI Ad Hoc Task Force on Nuclear Medicine Physics  Training. The mission of this task force was to assemble a representative group of stakeholders to:• Estimate the demand for board-certified nuclear medicine physicists in the next 5-10 years,• Identify the critical issues related to supplying an adequate number of physicists who have received the appropriate level of training in nuclear medicine physics, and• Identify approaches that may be considered to facilitate the training of nuclear medicine physicists.As a result, a task force was appointed and chaired by an active member of both organizations that included representation from the AAPM, SNMMI, the American Board of Radiology (ABR), the American Board of Science in Nuclear Medicine (ABSNM), and the Commission for the Accreditation of Medical Physics Educational Programs (CAMPEP). The Task Force first met at the AAPM Annual Meeting in Charlotte in July 2012 and has met regularly face-to-face, online, and by conference calls. This manuscript reports the findings of the Task Force, as well as recommendations to achieve the stated mission.

  16. AAPM/SNMMI Joint Task Force: report on the current state of nuclear medicine physics training

    PubMed Central

    Allison, Jerry D.; Clements, Jessica B.; Coffey, Charles W.; Fahey, Frederic H.; Gress, Dustin A.; Kinahan, Paul E.; Nickoloff, Edward L.; Mawlawi, Osama R.; MacDougall, Robert D.; Pizzuitello, Robert J.

    2015-01-01

    The American Association of Physicists in Medicine (AAPM) and the Society of Nuclear Medicine and Molecular Imaging (SNMMI) recognized the need for a review of the current state of nuclear medicine physics training and the need to explore pathways for improving nuclear medicine physics training opportunities. For these reasons, the two organizations formed a joint AAPM/SNMMI Ad Hoc Task Force on Nuclear Medicine Physics Training. The mission of this task force was to assemble a representative group of stakeholders to: Estimate the demand for board‐certified nuclear medicine physicists in the next 5–10 years,Identify the critical issues related to supplying an adequate number of physicists who have received the appropriate level of training in nuclear medicine physics, andIdentify approaches that may be considered to facilitate the training of nuclear medicine physicists. As a result, a task force was appointed and chaired by an active member of both organizations that included representation from the AAPM, SNMMI, the American Board of Radiology (ABR), the American Board of Science in Nuclear Medicine (ABSNM), and the Commission for the Accreditation of Medical Physics Educational Programs (CAMPEP). The Task Force first met at the AAPM Annual Meeting in Charlotte in July 2012 and has met regularly face‐to‐face, online, and by conference calls. This manuscript reports the findings of the Task Force, as well as recommendations to achieve the stated mission. PACS number: 01.40.G‐ PMID:26699325

  17. Distributed generation of shared RSA keys in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Liu, Yi-Liang; Huang, Qin; Shen, Ying

    2005-12-01

    Mobile Ad Hoc Networks is a totally new concept in which mobile nodes are able to communicate together over wireless links in an independent manner, independent of fixed physical infrastructure and centralized administrative infrastructure. However, the nature of Ad Hoc Networks makes them very vulnerable to security threats. Generation and distribution of shared keys for CA (Certification Authority) is challenging for security solution based on distributed PKI(Public-Key Infrastructure)/CA. The solutions that have been proposed in the literature and some related issues are discussed in this paper. The solution of a distributed generation of shared threshold RSA keys for CA is proposed in the present paper. During the process of creating an RSA private key share, every CA node only has its own private security. Distributed arithmetic is used to create the CA's private share locally, and that the requirement of centralized management institution is eliminated. Based on fully considering the Mobile Ad Hoc network's characteristic of self-organization, it avoids the security hidden trouble that comes by holding an all private security share of CA, with which the security and robustness of system is enhanced.

  18. Energy Efficient and QoS sensitive Routing Protocol for Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Saeed Tanoli, Tariq; Khalid Khan, Muhammad

    2013-12-01

    Efficient routing is an important part of wireless ad hoc networks. Since in ad hoc networks we have limited resources, there are many limitations like bandwidth, battery consumption, and processing cycle etc. Reliability is also necessary since there is no allowance for invalid or incomplete information (and expired data is useless). There are various protocols that perform routing by considering one parameter but ignoring other parameters. In this paper we present a protocol that finds route on the basis of bandwidth, energy and mobility of the nodes participating in the communication.

  19. Passive and Active Analysis in DSR-Based Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Dempsey, Tae; Sahin, Gokhan; Morton, Y. T. (Jade)

    Security and vulnerabilities in wireless ad hoc networks have been considered at different layers, and many attack strategies have been proposed, including denial of service (DoS) through the intelligent jamming of the most critical packet types of flows in a network. This paper investigates the effectiveness of intelligent jamming in wireless ad hoc networks using the Dynamic Source Routing (DSR) and TCP protocols and introduces an intelligent classifier to facilitate the jamming of such networks. Assuming encrypted packet headers and contents, our classifier is based solely on the observable characteristics of size, inter-arrival timing, and direction and classifies packets with up to 99.4% accuracy in our experiments. Furthermore, we investigate active analysis, which is the combination of a classifier and intelligent jammer to invoke specific responses from a victim network.

  20. Reputation-Based Internet Protocol Security: A Multilayer Security Framework for Mobile Ad Hoc Networks

    DTIC Science & Technology

    2010-09-01

    secure ad-hoc networks of mobile sensors deployed in a hostile environment . These sensors are normally small 86 and resource...Communications Magazine, 51, 2008. 45. Kumar, S.A. “Classification and Review of Security Schemes in Mobile Comput- ing”. Wireless Sensor Network , 2010... Networks ”. Wireless /Mobile Network Security , 2008. 85. Xiao, Y. “Accountability for Wireless LANs, Ad Hoc Networks , and Wireless

  1. [The global harmonization task force : successes and challenges].

    PubMed

    Rotter, R G

    2009-06-01

    With the move towards globalized international commerce and trade, a call for harmonization of medical device regulatory requirements and practices has evolved. The purpose of the Global Harmonization Task Force (GHTF) is to encourage convergence of regulatory requirements and practices at a global level through consensus to achieve four principle goals: promote safety, quality and performance/effectiveness of medical devices; encourage technological innovation; foster international trade; and serve as a forum of information exchange - all in the interests of protecting and promoting public health. The GHTF is governed by a Steering Committee, and the principle development of the GHTF regulatory model has been, and continues to be, done through five working groups known as Study Groups and supplemented recently by the creation of several Ad Hoc Working Groups. Since its creation in 1992, the members of the GHTF have worked collaboratively to develop what is now ready to be called a global model for the regulation of medical devices.

  2. Intelligent routing protocol for ad hoc wireless network

    NASA Astrophysics Data System (ADS)

    Peng, Chaorong; Chen, Chang Wen

    2006-05-01

    A novel routing scheme for mobile ad hoc networks (MANETs), which combines hybrid and multi-inter-routing path properties with a distributed topology discovery route mechanism using control agents is proposed in this paper. In recent years, a variety of hybrid routing protocols for Mobile Ad hoc wireless networks (MANETs) have been developed. Which is proactively maintains routing information for a local neighborhood, while reactively acquiring routes to destinations beyond the global. The hybrid protocol reduces routing discovery latency and the end-to-end delay by providing high connectivity without requiring much of the scarce network capacity. On the other side the hybrid routing protocols in MANETs likes Zone Routing Protocol still need route "re-discover" time when a route between zones link break. Sine the topology update information needs to be broadcast routing request on local zone. Due to this delay, the routing protocol may not be applicable for real-time data and multimedia communication. We utilize the advantages of a clustering organization and multi-routing path in routing protocol to achieve several goals at the same time. Firstly, IRP efficiently saves network bandwidth and reduces route reconstruction time when a routing path fails. The IRP protocol does not require global periodic routing advertisements, local control agents will automatically monitor and repair broke links. Secondly, it efficiently reduces congestion and traffic "bottlenecks" for ClusterHeads in clustering network. Thirdly, it reduces significant overheads associated with maintaining clusters. Fourthly, it improves clusters stability due to dynamic topology changing frequently. In this paper, we present the Intelligent Routing Protocol. First, we discuss the problem of routing in ad hoc networks and the motivation of IRP. We describe the hierarchical architecture of IRP. We describe the routing process and illustrate it with an example. Further, we describe the control manage

  3. UMDR: Multi-Path Routing Protocol for Underwater Ad Hoc Networks with Directional Antenna

    NASA Astrophysics Data System (ADS)

    Yang, Jianmin; Liu, Songzuo; Liu, Qipei; Qiao, Gang

    2018-01-01

    This paper presents a new routing scheme for underwater ad hoc networks based on directional antennas. Ad hoc networks with directional antennas have become a hot research topic because of space reuse may increase networks capacity. At present, researchers have applied traditional self-organizing routing protocols (such as DSR, AODV) [1] [2] on this type of networks, and the routing scheme is based on the shortest path metric. However, such routing schemes often suffer from long transmission delays and frequent link fragmentation along the intermediate nodes of the selected route. This is caused by a unique feature of directional transmission, often called as “deafness”. In this paper, we take a different approach to explore the advantages of space reuse through multipath routing. This paper introduces the validity of the conventional routing scheme in underwater ad hoc networks with directional antennas, and presents a special design of multipath routing algorithm for directional transmission. The experimental results show a significant performance improvement in throughput and latency.

  4. Two Phase Admission Control for QoS Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Chen, Chien-Sheng; Su, Yi-Wen; Liu, Wen-Hsiung; Chi, Ching-Lung

    In this paper a novel and effective two phase admission control (TPAC) for QoS mobile ad hoc networks is proposed that satisfies the real-time traffic requirements in mobile ad hoc networks. With a limited amount of extra overhead, TPAC can avoid network congestions by a simple and precise admission control which blocks most of the overloading flow-requests in the route discovery process. When compared with previous QoS routing schemes such as QoS-aware routing protocol and CACP protocols, it is shown from system simulations that the proposed scheme can increase the system throughput and reduce both the dropping rate and the end-to-end delay. Therefore, TPAC is surely an effective QoS-guarantee protocol to provide for real-time traffic.

  5. Strategies for generating multiple instances of common and ad hoc categories.

    PubMed

    Vallée-Tourangeau, F; Anthony, S H; Austin, N G

    1998-09-01

    In a free-emission procedure participants were asked to generate instances of a given category and to report, retrospectively, the strategies that they were aware of using in retrieving instances. In two studies reported here, participants generated instances for common categories (e.g. fruit) and for ad hoc categories (e.g., things people keep in their pockets) for 90 seconds and for each category described how they had proceeded in doing so. Analysis of the protocols identified three broad classes of strategy: (1) experiential, where memories of specific or generic personal experiences involving interactions with the category instances acted as cues; (2) semantic, where a consideration of abstract conceptual characteristics of a category were employed to retrieve category exemplars; (3) unmediated, where instances were effortlessly retrieved without mediating cognitions of which subjects were aware. Experiential strategies outnumbered semantic strategies (on average 4 to 1) not only for ad hoc categories but also for common categories. This pattern was noticeably reversed for ad hoc categories that subjects were unlikely to have experienced personally (e.g. things sold on the black market in Russia). Whereas more traditional accounts of semantic memory have favoured decontextualised abstract representations of category knowledge, to the extent that mode of access informs us of knowledge structures, our data suggest that category knowledge is significantly grounded in terms of everyday contexts where category instances are encountered.

  6. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks.

    PubMed

    Vara, M Isabel; Campo, Celeste

    2015-07-20

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead.

  7. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks

    PubMed Central

    Vara, M. Isabel; Campo, Celeste

    2015-01-01

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead. PMID:26205272

  8. A Family of ACO Routing Protocols for Mobile Ad Hoc Networks

    PubMed Central

    Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-hoon

    2017-01-01

    In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads. PMID:28531159

  9. A Family of ACO Routing Protocols for Mobile Ad Hoc Networks.

    PubMed

    Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-Hoon

    2017-05-22

    In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads.

  10. Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization in Mobile Ad Hoc Networks

    PubMed Central

    Robinson, Y. Harold; Rajaram, M.

    2015-01-01

    Mobile ad hoc network (MANET) is a collection of autonomous mobile nodes forming an ad hoc network without fixed infrastructure. Dynamic topology property of MANET may degrade the performance of the network. However, multipath selection is a great challenging task to improve the network lifetime. We proposed an energy-aware multipath routing scheme based on particle swarm optimization (EMPSO) that uses continuous time recurrent neural network (CTRNN) to solve optimization problems. CTRNN finds the optimal loop-free paths to solve link disjoint paths in a MANET. The CTRNN is used as an optimum path selection technique that produces a set of optimal paths between source and destination. In CTRNN, particle swarm optimization (PSO) method is primly used for training the RNN. The proposed scheme uses the reliability measures such as transmission cost, energy factor, and the optimal traffic ratio between source and destination to increase routing performance. In this scheme, optimal loop-free paths can be found using PSO to seek better link quality nodes in route discovery phase. PSO optimizes a problem by iteratively trying to get a better solution with regard to a measure of quality. The proposed scheme discovers multiple loop-free paths by using PSO technique. PMID:26819966

  11. Validity of using ad hoc methods to analyze secondary traits in case-control association studies.

    PubMed

    Yung, Godwin; Lin, Xihong

    2016-12-01

    Case-control association studies often collect from their subjects information on secondary phenotypes. Reusing the data and studying the association between genes and secondary phenotypes provide an attractive and cost-effective approach that can lead to discovery of new genetic associations. A number of approaches have been proposed, including simple and computationally efficient ad hoc methods that ignore ascertainment or stratify on case-control status. Justification for these approaches relies on the assumption of no covariates and the correct specification of the primary disease model as a logistic model. Both might not be true in practice, for example, in the presence of population stratification or the primary disease model following a probit model. In this paper, we investigate the validity of ad hoc methods in the presence of covariates and possible disease model misspecification. We show that in taking an ad hoc approach, it may be desirable to include covariates that affect the primary disease in the secondary phenotype model, even though these covariates are not necessarily associated with the secondary phenotype. We also show that when the disease is rare, ad hoc methods can lead to severely biased estimation and inference if the true disease model follows a probit model instead of a logistic model. Our results are justified theoretically and via simulations. Applied to real data analysis of genetic associations with cigarette smoking, ad hoc methods collectively identified as highly significant (P<10-5) single nucleotide polymorphisms from over 10 genes, genes that were identified in previous studies of smoking cessation. © 2016 WILEY PERIODICALS, INC.

  12. Energy Efficient Probabilistic Broadcasting for Mobile Ad-Hoc Network

    NASA Astrophysics Data System (ADS)

    Kumar, Sumit; Mehfuz, Shabana

    2017-06-01

    In mobile ad-hoc network (MANETs) flooding method is used for broadcasting route request (RREQ) packet from one node to another node for route discovery. This is the simplest method of broadcasting of RREQ packets but it often results in broadcast storm problem, originating collisions and congestion of packets in the network. A probabilistic broadcasting is one of the widely used broadcasting scheme for route discovery in MANETs and provides solution for broadcasting storm problem. But it does not consider limited energy of the battery of the nodes. In this paper, a new energy efficient probabilistic broadcasting (EEPB) is proposed in which probability of broadcasting RREQs is calculated with respect to remaining energy of nodes. The analysis of simulation results clearly indicate that an EEPB route discovery scheme in ad-hoc on demand distance vector (AODV) can increase the network lifetime with a decrease in the average power consumption and RREQ packet overhead. It also decreases the number of dropped packets in the network, in comparison to other EEPB schemes like energy constraint gossip (ECG), energy aware gossip (EAG), energy based gossip (EBG) and network lifetime through energy efficient broadcast gossip (NEBG).

  13. Group Task Force on Satellite Rescue and Repair

    NASA Astrophysics Data System (ADS)

    1992-09-01

    The Group Task Force was chartered by the Administrator of NASA to recommend 'a policy outlining the criteria, the design standards, and the pricing model to guide NASA in assessing the responsibilities for government and nongovernment Satellite Rescue and Repair Missions.' Criteria for accepting such missions, risks, and benefits to all sectors of our economy involved in satellite services, adequacy of planning and training, and the impact on NASA's primary mission were reviewed. The Group began by asking a more fundamental question; is satellite rescue and repair a logical element of NASA's mission? Factors considered were: (1) the probability of rescue or repair opportunities arising; (2) the economic justification for such attempts; (3) the benefits to NASA, both from such ad hoc learning experiences in space operations and the impact on the public perception of NASA; (4) the effect of such unanticipated missions on NASA's scheduled activities; (5) any potential effect on NASA's technical capability to work in space; and (6) any potential effect on U.S. economic competitiveness.

  14. Group Task Force on Satellite Rescue and Repair

    NASA Technical Reports Server (NTRS)

    1992-01-01

    The Group Task Force was chartered by the Administrator of NASA to recommend 'a policy outlining the criteria, the design standards, and the pricing model to guide NASA in assessing the responsibilities for government and nongovernment Satellite Rescue and Repair Missions.' Criteria for accepting such missions, risks, and benefits to all sectors of our economy involved in satellite services, adequacy of planning and training, and the impact on NASA's primary mission were reviewed. The Group began by asking a more fundamental question; is satellite rescue and repair a logical element of NASA's mission? Factors considered were: (1) the probability of rescue or repair opportunities arising; (2) the economic justification for such attempts; (3) the benefits to NASA, both from such ad hoc learning experiences in space operations and the impact on the public perception of NASA; (4) the effect of such unanticipated missions on NASA's scheduled activities; (5) any potential effect on NASA's technical capability to work in space; and (6) any potential effect on U.S. economic competitiveness.

  15. Information Fusion in Ad hoc Wireless Sensor Networks for Aircraft Health Monitoring

    NASA Astrophysics Data System (ADS)

    Fragoulis, Nikos; Tsagaris, Vassilis; Anastassopoulos, Vassilis

    In this paper the use of an ad hoc wireless sensor network for implementing a structural health monitoring system is discussed. The network is consisted of sensors deployed throughout the aircraft. These sensors being in the form of a microelectronic chip and consisted of sensing, data processing and communicating components could be easily embedded in any mechanical aircraft component. The established sensor network, due to its ad hoc nature is easily scalable, allowing adding or removing any number of sensors. The position of the sensor nodes need not necessarily to be engineered or predetermined, giving this way the ability to be deployed in inaccessible points. Information collected from various sensors of different modalities throughout the aircraft is then fused in order to provide a more comprehensive image of the aircraft structural health. Sensor level fusion along with decision quality information is used, in order to enhance detection performance.

  16. A fault-tolerant small world topology control model in ad hoc networks for search and rescue

    NASA Astrophysics Data System (ADS)

    Tan, Mian; Fang, Ling; Wu, Yue; Zhang, Bo; Chang, Bowen; Holme, Petter; Zhao, Jing

    2018-02-01

    Due to their self-organized, multi-hop and distributed characteristics, ad hoc networks are useful in search and rescue. Topology control models need to be designed for energy-efficient, robust and fast communication in ad hoc networks. This paper proposes a topology control model which specializes for search and rescue-Compensation Small World-Repeated Game (CSWRG)-which integrates mobility models, constructing small world networks and a game-theoretic approach to the allocation of resources. Simulation results show that our mobility models can enhance the communication performance of the constructed small-world networks. Our strategy, based on repeated game, can suppress selfish behavior and compensate agents that encounter selfish or faulty neighbors. This model could be useful for the design of ad hoc communication networks.

  17. Multicasting in Wireless Communications (Ad-Hoc Networks): Comparison against a Tree-Based Approach

    NASA Astrophysics Data System (ADS)

    Rizos, G. E.; Vasiliadis, D. C.

    2007-12-01

    We examine on-demand multicasting in ad hoc networks. The Core Assisted Mesh Protocol (CAMP) is a well-known protocol for multicast routing in ad-hoc networks, generalizing the notion of core-based trees employed for internet multicasting into multicast meshes that have much richer connectivity than trees. On the other hand, wireless tree-based multicast routing protocols use much simpler structures for determining route paths, using only parent-child relationships. In this work, we compare the performance of the CAMP protocol against the performance of wireless tree-based multicast routing protocols, in terms of two important factors, namely packet delay and ratio of dropped packets.

  18. Space-Time Processing for Tactical Mobile Ad Hoc Networks

    DTIC Science & Technology

    2007-08-01

    rates in mobile ad hoc networks. In addition, he has considered the design of a cross-layer multi-user resource allocation framework using a... framework for many-to-one communication. In this context, multiple nodes cooperate to transmit their packets simultaneously to a single node using multi...spatially multiplexed signals transmitted from multiple nodes. Our goal is to form a framework that activates different sets of communication links

  19. Space-Time Processing for Tactical Mobile Ad Hoc Networks

    DTIC Science & Technology

    2008-08-01

    vision for multiple concurrent communication settings, i.e., a many-to-many framework where multi-packet transmissions (MPTs) and multi-packet...modelling framework of capacity-delay tradeoffs We have introduced the first unified modeling framework for the computation of fundamental limits o We...dalities in wireless n twor i-packet modelling framework to account for the use of m lti-packet reception (MPR) f ad hoc networks with MPT under

  20. Taxonomic and ad hoc categorization within the two cerebral hemispheres.

    PubMed

    Shen, Yeshayahu; Aharoni, Bat-El; Mashal, Nira

    2015-01-01

    A typicality effect refers to categorization which is performed more quickly or more accurately for typical than for atypical members of a given category. Previous studies reported a typicality effect for category members presented in the left visual field/right hemisphere (RH), suggesting that the RH applies a similarity-based categorization strategy. However, findings regarding the typicality effect within the left hemisphere (LH) are less conclusive. The current study tested the pattern of typicality effects within each hemisphere for both taxonomic and ad hoc categories, using words presented to the left or right visual fields. Experiment 1 tested typical and atypical members of taxonomic categories as well as non-members, and Experiment 2 tested typical and atypical members of ad hoc categories as well as non-members. The results revealed a typicality effect in both hemispheres and in both types of categories. Furthermore, the RH categorized atypical stimuli more accurately than did the LH. Our findings suggest that both hemispheres rely on a similarity-based categorization strategy, but the coarse semantic coding of the RH seems to facilitate the categorization of atypical members.

  1. Dynamic autonomous routing technology for IP-based satellite ad hoc networks

    NASA Astrophysics Data System (ADS)

    Wang, Xiaofei; Deng, Jing; Kostas, Theresa; Rajappan, Gowri

    2014-06-01

    IP-based routing for military LEO/MEO satellite ad hoc networks is very challenging due to network and traffic heterogeneity, network topology and traffic dynamics. In this paper, we describe a traffic priority-aware routing scheme for such networks, namely Dynamic Autonomous Routing Technology (DART) for satellite ad hoc networks. DART has a cross-layer design, and conducts routing and resource reservation concurrently for optimal performance in the fluid but predictable satellite ad hoc networks. DART ensures end-to-end data delivery with QoS assurances by only choosing routing paths that have sufficient resources, supporting different packet priority levels. In order to do so, DART incorporates several resource management and innovative routing mechanisms, which dynamically adapt to best fit the prevailing conditions. In particular, DART integrates a resource reservation mechanism to reserve network bandwidth resources; a proactive routing mechanism to set up non-overlapping spanning trees to segregate high priority traffic flows from lower priority flows so that the high priority flows do not face contention from low priority flows; a reactive routing mechanism to arbitrate resources between various traffic priorities when needed; a predictive routing mechanism to set up routes for scheduled missions and for anticipated topology changes for QoS assurance. We present simulation results showing the performance of DART. We have conducted these simulations using the Iridium constellation and trajectories as well as realistic military communications scenarios. The simulation results demonstrate DART's ability to discriminate between high-priority and low-priority traffic flows and ensure disparate QoS requirements of these traffic flows.

  2. Ad Hoc Supervision of General Practice Registrars as a "Community of Practice": Analysis, Interpretation and Re-Presentation

    ERIC Educational Resources Information Center

    Clement, T.; Brown, J.; Morrison, J.; Nestel, D.

    2016-01-01

    General practice registrars in Australia undertake most of their vocational training in accredited general practices. They typically see patients alone from the start of their community-based training and are expected to seek timely ad hoc support from their supervisor. Such ad hoc encounters are a mechanism for ensuring patient safety, but also…

  3. Ad hoc instrumentation methods in ecological studies produce highly biased temperature measurements

    USGS Publications Warehouse

    Terando, Adam J.; Youngsteadt, Elsa; Meineke, Emily K.; Prado, Sara G.

    2017-01-01

    In light of global climate change, ecological studies increasingly address effects of temperature on organisms and ecosystems. To measure air temperature at biologically relevant scales in the field, ecologists often use small, portable temperature sensors. Sensors must be shielded from solar radiation to provide accurate temperature measurements, but our review of 18 years of ecological literature indicates that shielding practices vary across studies (when reported at all), and that ecologists often invent and construct ad hoc radiation shields without testing their efficacy. We performed two field experiments to examine the accuracy of temperature observations from three commonly used portable data loggers (HOBO Pro, HOBO Pendant, and iButton hygrochron) housed in manufactured Gill shields or ad hoc, custom‐fabricated shields constructed from everyday materials such as plastic cups. We installed this sensor array (five replicates of 11 sensor‐shield combinations) at weather stations located in open and forested sites. HOBO Pro sensors with Gill shields were the most accurate devices, with a mean absolute error of 0.2°C relative to weather stations at each site. Error in ad hoc shield treatments ranged from 0.8 to 3.0°C, with the largest errors at the open site. We then deployed one replicate of each sensor‐shield combination at five sites that varied in the amount of urban impervious surface cover, which presents a further shielding challenge. Bias in sensors paired with ad hoc shields increased by up to 0.7°C for every 10% increase in impervious surface. Our results indicate that, due to variable shielding practices, the ecological literature likely includes highly biased temperature data that cannot be compared directly across studies. If left unaddressed, these errors will hinder efforts to predict biological responses to climate change. We call for greater standardization in how temperature data are recorded in the field, handled in analyses, and

  4. Modeling and optimization of Quality of Service routing in Mobile Ad hoc Networks

    NASA Astrophysics Data System (ADS)

    Rafsanjani, Marjan Kuchaki; Fatemidokht, Hamideh; Balas, Valentina Emilia

    2016-01-01

    Mobile ad hoc networks (MANETs) are a group of mobile nodes that are connected without using a fixed infrastructure. In these networks, nodes communicate with each other by forming a single-hop or multi-hop network. To design effective mobile ad hoc networks, it is important to evaluate the performance of multi-hop paths. In this paper, we present a mathematical model for a routing protocol under energy consumption and packet delivery ratio of multi-hop paths. In this model, we use geometric random graphs rather than random graphs. Our proposed model finds effective paths that minimize the energy consumption and maximizes the packet delivery ratio of the network. Validation of the mathematical model is performed through simulation.

  5. Ad-Hoc Networks and the Mobile Application Security System (MASS)

    DTIC Science & Technology

    2006-01-01

    solution to this problem that addresses critical aspects of security in ad-hoc mobile application networks. This approach involves preventing unauthorized...modification of a mobile application , both by other applications and by hosts, and ensuring that mobile code is authentic and authorized. These...capabilities constitute the Mobile Application Security System (MASS). The MASS applies effective, robust security to mobile application -based systems

  6. Performance Analysis of Hierarchical Group Key Management Integrated with Adaptive Intrusion Detection in Mobile ad hoc Networks

    DTIC Science & Technology

    2016-04-05

    applications in wireless networks such as military battlefields, emergency response, mobile commerce , online gaming, and collaborative work are based on the...www.elsevier.com/locate/peva Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc...Accepted 19 September 2010 Available online 26 September 2010 Keywords: Mobile ad hoc networks Intrusion detection Group communication systems Group

  7. Protocols for Detection and Removal of Wormholes for Secure Routing and Neighborhood Creation in Wireless Ad Hoc Networks

    ERIC Educational Resources Information Center

    Hayajneh, Thaier Saleh

    2009-01-01

    Wireless ad hoc networks are suitable and sometimes the only solution for several applications. Many applications, particularly those in military and critical civilian domains (such as battlefield surveillance and emergency rescue) require that ad hoc networks be secure and stable. In fact, security is one of the main barriers to the extensive use…

  8. Research priorities and plans for the International Space Station-results of the 'REMAP' Task Force

    NASA Technical Reports Server (NTRS)

    Kicza, M.; Erickson, K.; Trinh, E.

    2003-01-01

    Recent events in the International Space Station (ISS) Program have resulted in the necessity to re-examine the research priorities and research plans for future years. Due to both technical and fiscal resource constraints expected on the International Space Station, it is imperative that research priorities be carefully reviewed and clearly articulated. In consultation with OSTP and the Office of Management and budget (OMB), NASA's Office of Biological and Physical Research (OBPR) assembled an ad-hoc external advisory committee, the Biological and Physical Research Maximization and Prioritization (REMAP) Task Force. This paper describes the outcome of the Task Force and how it is being used to define a roadmap for near and long-term Biological and Physical Research objectives that supports NASA's Vision and Mission. Additionally, the paper discusses further prioritizations that were necessitated by budget and ISS resource constraints in order to maximize utilization of the International Space Station. Finally, a process has been developed to integrate the requirements for this prioritized research with other agency requirements to develop an integrated ISS assembly and utilization plan that maximizes scientific output. c2003 American Institute of Aeronautics and Astronautics. Published by Elsevier Science Ltd. All rights reserved.

  9. Implications of ICD-10 for Sarcopenia Clinical Practice and Clinical Trials: Report by the International Conference on Frailty and Sarcopenia Research Task Force.

    PubMed

    Vellas, B; Fielding, R A; Bens, C; Bernabei, R; Cawthon, P M; Cederholm, T; Cruz-Jentoft, A J; Del Signore, S; Donahue, S; Morley, J; Pahor, M; Reginster, J-Y; Rodriguez Mañas, L; Rolland, Y; Roubenoff, R; Sinclair, A; Cesari, M

    2018-01-01

    Establishment of an ICD-10-CM code for sarcopenia in 2016 was an important step towards reaching international consensus on the need for a nosological framework of age-related skeletal muscle decline. The International Conference on Frailty and Sarcopenia Research Task Force met in April 2017 to discuss the meaning, significance, and barriers to the implementation of the new code as well as strategies to accelerate development of new therapies. Analyses by the Sarcopenia Definitions and Outcomes Consortium are underway to develop quantitative definitions of sarcopenia. A consensus conference is planned to evaluate this analysis. The Task Force also discussed lessons learned from sarcopenia trials that could be applied to future trials, as well as lessons from the osteoporosis field, a clinical condition with many constructs similar to sarcopenia and for which ad hoc treatments have been developed and approved by regulatory agencies.

  10. Cutting Corners: Provider Perceptions of Interpretation Services and Factors Related to Use of an Ad Hoc Interpreter.

    PubMed

    Mayo, Rachel; Parker, Veronica G; Sherrill, Windsor W; Coltman, Kinneil; Hudson, Matthew F; Nichols, Christina M; Yates, Adam M; Pribonic, Anne Paige

    2016-06-01

    This study assessed health providers' perceptions of factors related to professional interpretation services and the association between these factors and the potential use of ad hoc interpreters. Data were collected from a convenience sample of 150 health services providers at a large, regional health system in South Carolina. Providers rated "ability to communicate effectively during a clinical encounter" as paramount regarding the use of interpretation services. The most important factors related to the likely use of ad hoc interpreters (cutting corners) included locating a qualified interpreter, having to wait for a qualified interpreter, and technical difficulties regarding phone and video technology. Health care organizations may benefit from increasing staff awareness about patient safety and legal and regulatory risks involved with the use of ad hoc interpreters. © The Author(s) 2016.

  11. Capacity-Delay Trade-Off in Collaborative Hybrid Ad-Hoc Networks with Coverage Sensing.

    PubMed

    Chen, Lingyu; Luo, Wenbin; Liu, Chen; Hong, Xuemin; Shi, Jianghong

    2017-01-26

    The integration of ad hoc device-to-device (D2D) communications and open-access small cells can result in a networking paradigm called hybrid the ad hoc network, which is particularly promising in delivering delay-tolerant data. The capacity-delay performance of hybrid ad hoc networks has been studied extensively under a popular framework called scaling law analysis. These studies, however, do not take into account aspects of interference accumulation and queueing delay and, therefore, may lead to over-optimistic results. Moreover, focusing on the average measures, existing works fail to give finer-grained insights into the distribution of delays. This paper proposes an alternative analytical framework based on queueing theoretic models and physical interference models. We apply this framework to study the capacity-delay performance of a collaborative cellular D2D network with coverage sensing and two-hop relay. The new framework allows us to fully characterize the delay distribution in the transform domain and pinpoint the impacts of coverage sensing, user and base station densities, transmit power, user mobility and packet size on the capacity-delay trade-off. We show that under the condition of queueing equilibrium, the maximum throughput capacity per device saturates to an upper bound of 0.7239 λ b / λ u bits/s/Hz, where λ b and λ u are the densities of base stations and mobile users, respectively.

  12. Capacity-Delay Trade-Off in Collaborative Hybrid Ad-Hoc Networks with Coverage Sensing

    PubMed Central

    Chen, Lingyu; Luo, Wenbin; Liu, Chen; Hong, Xuemin; Shi, Jianghong

    2017-01-01

    The integration of ad hoc device-to-device (D2D) communications and open-access small cells can result in a networking paradigm called hybrid the ad hoc network, which is particularly promising in delivering delay-tolerant data. The capacity-delay performance of hybrid ad hoc networks has been studied extensively under a popular framework called scaling law analysis. These studies, however, do not take into account aspects of interference accumulation and queueing delay and, therefore, may lead to over-optimistic results. Moreover, focusing on the average measures, existing works fail to give finer-grained insights into the distribution of delays. This paper proposes an alternative analytical framework based on queueing theoretic models and physical interference models. We apply this framework to study the capacity-delay performance of a collaborative cellular D2D network with coverage sensing and two-hop relay. The new framework allows us to fully characterize the delay distribution in the transform domain and pinpoint the impacts of coverage sensing, user and base station densities, transmit power, user mobility and packet size on the capacity-delay trade-off. We show that under the condition of queueing equilibrium, the maximum throughput capacity per device saturates to an upper bound of 0.7239 λb/λu bits/s/Hz, where λb and λu are the densities of base stations and mobile users, respectively. PMID:28134769

  13. Work, Family, and Community: Summary Proceedings of an Ad Hoc Committee.

    ERIC Educational Resources Information Center

    Hayes, Cheryl D., Ed.

    These proceedings contain summaries of five working group discussions and a discussion of suggestions for future research from an ad hoc meeting on Work, Family, and Community (Fedruary 21-22, 1980) in Washington, D.C. The meeting had these objectives: (1) to identify salient policy and research issues associated with changing patterns of labor…

  14. A Survey on Trust Management for Mobile Ad Hoc Networks

    DTIC Science & Technology

    2011-11-01

    expects, trust is dangerous implying the possible betrayal of trust. In his comments on Lagerspetz’s book titled Trust: The Tacit Demand, Lahno [24...AODV Zouridaki et al. (2005 ) [79] (2006) [80] Secure routing Direct observation [79][80] Reputation by secondhand information [80] Packet dropping...areas of signal processing, wireless communications, sensor and mobile ad hoc networks. He is co-editor of the book Wireless Sensor Networks: Signal

  15. An Optimal CDS Construction Algorithm with Activity Scheduling in Ad Hoc Networks

    PubMed Central

    Penumalli, Chakradhar; Palanichamy, Yogesh

    2015-01-01

    A new energy efficient optimal Connected Dominating Set (CDS) algorithm with activity scheduling for mobile ad hoc networks (MANETs) is proposed. This algorithm achieves energy efficiency by minimizing the Broadcast Storm Problem [BSP] and at the same time considering the node's remaining energy. The Connected Dominating Set is widely used as a virtual backbone or spine in mobile ad hoc networks [MANETs] or Wireless Sensor Networks [WSN]. The CDS of a graph representing a network has a significant impact on an efficient design of routing protocol in wireless networks. Here the CDS is a distributed algorithm with activity scheduling based on unit disk graph [UDG]. The node's mobility and residual energy (RE) are considered as parameters in the construction of stable optimal energy efficient CDS. The performance is evaluated at various node densities, various transmission ranges, and mobility rates. The theoretical analysis and simulation results of this algorithm are also presented which yield better results. PMID:26221627

  16. On knowledge transfer management as a learning process for ad hoc teams

    NASA Astrophysics Data System (ADS)

    Iliescu, D.

    2017-08-01

    Knowledge management represents an emerging domain becoming more and more important. Concepts like knowledge codification and personalisation, knowledge life-cycle, social and technological dimensions, knowledge transfer and learning management are integral parts. Focus goes here in the process of knowledge transfer for the case of ad hoc teams. The social dimension of knowledge transfer plays an important role. No single individual actors involved in the process, but a collective one, representing the organisation. It is critically important for knowledge to be managed from the life-cycle point of view. A complex communication network needs to be in place to supports the process of knowledge transfer. Two particular concepts, the bridge tie and transactive memory, would eventually enhance the communication. The paper focuses on an informational communication platform supporting the collaborative work on knowledge transfer. The platform facilitates the creation of a topic language to be used in knowledge modelling, storage and reuse, by the ad hoc teams.

  17. Scalable Architecture for Multihop Wireless ad Hoc Networks

    NASA Technical Reports Server (NTRS)

    Arabshahi, Payman; Gray, Andrew; Okino, Clayton; Yan, Tsun-Yee

    2004-01-01

    A scalable architecture for wireless digital data and voice communications via ad hoc networks has been proposed. Although the details of the architecture and of its implementation in hardware and software have yet to be developed, the broad outlines of the architecture are fairly clear: This architecture departs from current commercial wireless communication architectures, which are characterized by low effective bandwidth per user and are not well suited to low-cost, rapid scaling in large metropolitan areas. This architecture is inspired by a vision more akin to that of more than two dozen noncommercial community wireless networking organizations established by volunteers in North America and several European countries.

  18. Definition of drug resistant epilepsy: consensus proposal by the ad hoc Task Force of the ILAE Commission on Therapeutic Strategies.

    PubMed

    Kwan, Patrick; Arzimanoglou, Alexis; Berg, Anne T; Brodie, Martin J; Allen Hauser, W; Mathern, Gary; Moshé, Solomon L; Perucca, Emilio; Wiebe, Samuel; French, Jacqueline

    2010-06-01

    To improve patient care and facilitate clinical research, the International League Against Epilepsy (ILAE) appointed a Task Force to formulate a consensus definition of drug resistant epilepsy. The overall framework of the definition has two "hierarchical" levels: Level 1 provides a general scheme to categorize response to each therapeutic intervention, including a minimum dataset of knowledge about the intervention that would be needed; Level 2 provides a core definition of drug resistant epilepsy using a set of essential criteria based on the categorization of response (from Level 1) to trials of antiepileptic drugs. It is proposed as a testable hypothesis that drug resistant epilepsy is defined as failure of adequate trials of two tolerated, appropriately chosen and used antiepileptic drug schedules (whether as monotherapies or in combination) to achieve sustained seizure freedom. This definition can be further refined when new evidence emerges. The rationale behind the definition and the principles governing its proper use are discussed, and examples to illustrate its application in clinical practice are provided.

  19. A Survey on Trust Management for Mobile Ad Hoc Networks

    DTIC Science & Technology

    2010-07-01

    betrayal of trust. In his comments on Lagerspetz’s book titled Trust: The Tacit Demand, Lahno [24] describes the author’s view on trust as a moral...extension of AODV Zouridaki et al. (2005 ) [79] (2006) [80] Secure routing Direct observation [79][80] Reputation by secondhand information [80...the broad areas of signal processing, wireless communications, sensor and mobile ad hoc networks. He is co-editor of the book Wireless Sensor Networks

  20. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  1. Design of free patterns of nanocrystals with ad hoc features via templated dewetting

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aouassa, M.; Berbezier, I.; Favre, L.

    Design of monodisperse ultra-small nanocrystals (NCs) into large scale patterns with ad hoc features is demonstrated. The process makes use of solid state dewetting of a thin film templated through alloy liquid metal ion source focused ion beam (LMIS-FIB) nanopatterning. The solid state dewetting initiated at the edges of the patterns controllably creates the ordering of NCs with ad hoc placement and periodicity. The NC size is tuned by varying the nominal thickness of the film while their position results from the association of film retraction from the edges of the lay out and Rayleigh-like instability. The use of ultra-highmore » resolution LMIS-FIB enables to produce monocrystalline NCs with size, periodicity, and placement tunable as well. It provides routes for the free design of nanostructures for generic applications in nanoelectronics.« less

  2. The impact of brief team communication, leadership and team behavior training on ad hoc team performance in trauma care settings.

    PubMed

    Roberts, Nicole K; Williams, Reed G; Schwind, Cathy J; Sutyak, John A; McDowell, Christopher; Griffen, David; Wall, Jarrod; Sanfey, Hilary; Chestnut, Audra; Meier, Andreas H; Wohltmann, Christopher; Clark, Ted R; Wetter, Nathan

    2014-02-01

    Communication breakdowns and care coordination problems often cause preventable adverse patient care events, which can be especially acute in the trauma setting, in which ad hoc teams have little time for advanced planning. Existing teamwork curricula do not address the particular issues associated with ad hoc emergency teams providing trauma care. Ad hoc trauma teams completed a preinstruction simulated trauma encounter and were provided with instruction on appropriate team behaviors and team communication. Teams completed a postinstruction simulated trauma encounter immediately afterward and 3 weeks later, then completed a questionnaire. Blinded raters rated videotapes of the simulations. Participants expressed high levels of satisfaction and intent to change practice after the intervention. Participants changed teamwork and communication behavior on the posttest, and changes were sustained after a 3-week interval, though there was some loss of retention. Brief training exercises can change teamwork and communication behaviors on ad hoc trauma teams. Copyright © 2014 Elsevier Inc. All rights reserved.

  3. Ad Hoc Selection of Voice over Internet Streams

    NASA Technical Reports Server (NTRS)

    Macha, Mitchell G. (Inventor); Bullock, John T. (Inventor)

    2014-01-01

    A method and apparatus for a communication system technique involving ad hoc selection of at least two audio streams is provided. Each of the at least two audio streams is a packetized version of an audio source. A data connection exists between a server and a client where a transport protocol actively propagates the at least two audio streams from the server to the client. Furthermore, software instructions executable on the client indicate a presence of the at least two audio streams, allow selection of at least one of the at least two audio streams, and direct the selected at least one of the at least two audio streams for audio playback.

  4. Ad Hoc Selection of Voice over Internet Streams

    NASA Technical Reports Server (NTRS)

    Macha, Mitchell G. (Inventor); Bullock, John T. (Inventor)

    2008-01-01

    A method and apparatus for a communication system technique involving ad hoc selection of at least two audio streams is provided. Each of the at least two audio streams is a packetized version of an audio source. A data connection exists between a server and a client where a transport protocol actively propagates the at least two audio streams from the server to the client. Furthermore, software instructions executable on the client indicate a presence of the at least two audio streams, allow selection of at least one of the at least two audio streams, and direct the selected at least one of the at least two audio streams for audio playback.

  5. Worm epidemics in wireless ad hoc networks

    NASA Astrophysics Data System (ADS)

    Nekovee, Maziar

    2007-06-01

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet.

  6. Cross-layer model design in wireless ad hoc networks for the Internet of Things.

    PubMed

    Yang, Xin; Wang, Ling; Xie, Jian; Zhang, Zhaolin

    2018-01-01

    Wireless ad hoc networks can experience extreme fluctuations in transmission traffic in the Internet of Things, which is widely used today. Currently, the most crucial issues requiring attention for wireless ad hoc networks are making the best use of low traffic periods, reducing congestion during high traffic periods, and improving transmission performance. To solve these problems, the present paper proposes a novel cross-layer transmission model based on decentralized coded caching in the physical layer and a content division multiplexing scheme in the media access control layer. Simulation results demonstrate that the proposed model effectively addresses these issues by substantially increasing the throughput and successful transmission rate compared to existing protocols without a negative influence on delay, particularly for large scale networks under conditions of highly contrasting high and low traffic periods.

  7. Cross-layer model design in wireless ad hoc networks for the Internet of Things

    PubMed Central

    Wang, Ling; Xie, Jian; Zhang, Zhaolin

    2018-01-01

    Wireless ad hoc networks can experience extreme fluctuations in transmission traffic in the Internet of Things, which is widely used today. Currently, the most crucial issues requiring attention for wireless ad hoc networks are making the best use of low traffic periods, reducing congestion during high traffic periods, and improving transmission performance. To solve these problems, the present paper proposes a novel cross-layer transmission model based on decentralized coded caching in the physical layer and a content division multiplexing scheme in the media access control layer. Simulation results demonstrate that the proposed model effectively addresses these issues by substantially increasing the throughput and successful transmission rate compared to existing protocols without a negative influence on delay, particularly for large scale networks under conditions of highly contrasting high and low traffic periods. PMID:29734355

  8. A game-theoretic approach to optimize ad hoc networks inspired by small-world network topology

    NASA Astrophysics Data System (ADS)

    Tan, Mian; Yang, Tinghong; Chen, Xing; Yang, Gang; Zhu, Guoqing; Holme, Petter; Zhao, Jing

    2018-03-01

    Nodes in ad hoc networks are connected in a self-organized manner. Limited communication radius makes information transmit in multi-hop mode, and each forwarding needs to consume the energy of nodes. Insufficient communication radius or exhaustion of energy may cause the absence of some relay nodes and links, further breaking network connectivity. On the other hand, nodes in the network may refuse to cooperate due to objective faulty or personal selfish, hindering regular communication in the network. This paper proposes a model called Repeated Game in Small World Networks (RGSWN). In this model, we first construct ad hoc networks with small-world feature by forming "communication shortcuts" between multiple-radio nodes. Small characteristic path length reduces average forwarding times in networks; meanwhile high clustering coefficient enhances network robustness. Such networks still maintain relative low global power consumption, which is beneficial to extend the network survival time. Then we use MTTFT strategy (Mend-Tolerance Tit-for-Tat) for repeated game as a rule for the interactions between neighbors in the small-world networks. Compared with other five strategies of repeated game, this strategy not only punishes the nodes' selfishness more reasonably, but also has the best tolerance to the network failure. This work is insightful for designing an efficient and robust ad hoc network.

  9. Forming an ad-hoc nearby storage, based on IKAROS and social networking services

    NASA Astrophysics Data System (ADS)

    Filippidis, Christos; Cotronis, Yiannis; Markou, Christos

    2014-06-01

    We present an ad-hoc "nearby" storage, based on IKAROS and social networking services, such as Facebook. By design, IKAROS is capable to increase or decrease the number of nodes of the I/O system instance on the fly, without bringing everything down or losing data. IKAROS is capable to decide the file partition distribution schema, by taking on account requests from the user or an application, as well as a domain or a Virtual Organization policy. In this way, it is possible to form multiple instances of smaller capacity higher bandwidth storage utilities capable to respond in an ad-hoc manner. This approach, focusing on flexibility, can scale both up and down and so can provide more cost effective infrastructures for both large scale and smaller size systems. A set of experiments is performed comparing IKAROS with PVFS2 by using multiple clients requests under HPC IOR benchmark and MPICH2.

  10. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks

    PubMed Central

    Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J.; Segarra, Esteve Pallarès; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Gargallo, Emilio Sanvicente

    2015-01-01

    The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic.Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs. PMID:25897496

  11. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks.

    PubMed

    Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J; Pallarès Segarra, Esteve; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Sanvicente Gargallo, Emilio

    2015-04-17

    The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.

  12. Specialist availability in emergencies: contributions of response times and the use of ad hoc coverage in New York State.

    PubMed

    Rabin, Elaine; Patrick, Lisa

    2016-04-01

    Nationwide, hospitals struggle to maintain specialist on-call coverage for emergencies. We seek to further understand the issue by examining reliability of scheduled coverage and the role of ad hoc coverage when none is scheduled. An anonymous electronic survey of all emergency department (ED) directors of a large state. Overall and for 10 specialties, respondents were asked to estimate on-call coverage extent and "reliability" (frequency of emergency response in a clinically useful time frame: 2 hours), and use and effect of ad hoc emergency coverage to fill gaps. Descriptive statistics were performed using Fisher exact and Wilcoxon sign rank tests for significance. Contact information was obtained for 125 of 167 ED directors. Sixty responded (48%), representing 36% of EDs. Forty-six percent reported full on-call coverage scheduled for all specialties. Forty-six percent reported consistent reliability. Coverage and reliability were strongly related (P<.01; 33% reported both), and larger ED volume correlated with both (P<.01). Ninety percent of hospitals that had gaps in either employed ad hoc coverage, significantly improving coverage for 8 of 10 specialties. For all but 1 specialty, more than 20% of hospitals reported that specialists are "Never", "Rarely" or "Sometimes" reliable (more than 50% for cardiovascular surgery, hand surgery and ophthalmology). Significant holes in scheduled on-call specialist coverage are compounded by frequent unreliability of on-call specialists, but partially ameliorated by ad hoc specialist coverage. Regionalization may help because a 2-tiered system may exist: larger hospitals have more complete, reliable coverage. Better understanding of specialists' willingness to treat emergencies ad hoc without taking formal call will suggest additional remedies. Copyright © 2015 Elsevier Inc. All rights reserved.

  13. HOW GAS-DYNAMIC FLARE MODELS POWERED BY PETSCHEK RECONNECTION DIFFER FROM THOSE WITH AD HOC ENERGY SOURCES

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Longcope, D. W.; Klimchuk, J. A.

    Aspects of solar flare dynamics, such as chromospheric evaporation and flare light curves, have long been studied using one-dimensional models of plasma dynamics inside a static flare loop, subjected to some energy input. While extremely successful at explaining the observed characteristics of flares, all such models so far have specified energy input ad hoc, rather than deriving it self-consistently. There is broad consensus that flares are powered by magnetic energy released through reconnection. Recent work has generalized Petschek’s basic reconnection scenario, topological change followed by field line retraction and shock heating, to permit its inclusion in a one-dimensional flare loop model. Heremore » we compare the gas dynamics driven by retraction and shocking to those from more conventional static loop models energized by ad hoc source terms. We find significant differences during the first minute, when retraction leads to larger kinetic energies and produces higher densities at the loop top, while ad hoc heating tends to rarify the loop top. The loop-top density concentration is related to the slow magnetosonic shock, characteristic of Petschek’s model, but persists beyond the retraction phase occurring in the outflow jet. This offers an explanation for observed loop-top sources of X-ray and EUV emission, with advantages over that provided by ad hoc heating scenarios. The cooling phases of the two models are, however, notably similar to one another, suggesting that observations at that stage will yield little information on the nature of energy input.« less

  14. Smart border: ad-hoc wireless sensor networks for border surveillance

    NASA Astrophysics Data System (ADS)

    He, Jun; Fallahi, Mahmoud; Norwood, Robert A.; Peyghambarian, Nasser

    2011-06-01

    Wireless sensor networks have been proposed as promising candidates to provide automated monitoring, target tracking, and intrusion detection for border surveillance. In this paper, we demonstrate an ad-hoc wireless sensor network system for border surveillance. The network consists of heterogeneously autonomous sensor nodes that distributively cooperate with each other to enable a smart border in remote areas. This paper also presents energy-aware and sleeping algorithms designed to maximize the operating lifetime of the deployed sensor network. Lessons learned in building the network and important findings from field experiments are shared in the paper.

  15. An Energy-Efficient and Robust Multipath Routing Protocol for Cognitive Radio Ad Hoc Networks.

    PubMed

    Singh, Kishor; Moh, Sangman

    2017-09-04

    Routing in cognitive radio ad hoc networks (CRAHNs) is a daunting task owing to dynamic topology, intermittent connectivity, spectrum heterogeneity, and energy constraints. Other prominent aspects such as channel stability, path reliability, and route discovery frequency should also be exploited. Several routing protocols have been proposed for CRAHNs in the literature. By stressing on one of the aspects more than any other, however, they do not satisfy all requirements of throughput, energy efficiency, and robustness. In this paper, we propose an energy-efficient and robust multipath routing (ERMR) protocol for CRAHNs by considering all prominent aspects including residual energy and channel stability in design. Even when the current routing path fails, the alternative routing path is immediately utilized. In establishing primary and alternative routing paths, both residual energy and channel stability are exploited simultaneously. Our simulation study shows that the proposed ERMR outperforms the conventional protocol in terms of network throughput, packet delivery ratio, energy consumption, and end-to-end delay.

  16. An Energy-Efficient and Robust Multipath Routing Protocol for Cognitive Radio Ad Hoc Networks

    PubMed Central

    Singh, Kishor

    2017-01-01

    Routing in cognitive radio ad hoc networks (CRAHNs) is a daunting task owing to dynamic topology, intermittent connectivity, spectrum heterogeneity, and energy constraints. Other prominent aspects such as channel stability, path reliability, and route discovery frequency should also be exploited. Several routing protocols have been proposed for CRAHNs in the literature. By stressing on one of the aspects more than any other, however, they do not satisfy all requirements of throughput, energy efficiency, and robustness. In this paper, we propose an energy-efficient and robust multipath routing (ERMR) protocol for CRAHNs by considering all prominent aspects including residual energy and channel stability in design. Even when the current routing path fails, the alternative routing path is immediately utilized. In establishing primary and alternative routing paths, both residual energy and channel stability are exploited simultaneously. Our simulation study shows that the proposed ERMR outperforms the conventional protocol in terms of network throughput, packet delivery ratio, energy consumption, and end-to-end delay. PMID:28869551

  17. Spontaneous ad hoc mobile cloud computing network.

    PubMed

    Lacuesta, Raquel; Lloret, Jaime; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes.

  18. On service differentiation in mobile Ad Hoc networks.

    PubMed

    Zhang, Shun-liang; Ye, Cheng-qing

    2004-09-01

    A network model is proposed to support service differentiation for mobile Ad Hoc networks by combining a fully distributed admission control approach and the DIFS based differentiation mechanism of IEEE802.11. It can provide different kinds of QoS (Quality of Service) for various applications. Admission controllers determine a committed bandwidth based on the reserved bandwidth of flows and the source utilization of networks. Packets are marked when entering into networks by markers according to the committed rate. By the mark in the packet header, intermediate nodes handle the received packets in different manners to provide applications with the QoS corresponding to the pre-negotiated profile. Extensive simulation experiments showed that the proposed mechanism can provide QoS guarantee to assured service traffic and increase the channel utilization of networks.

  19. The Use of English as Ad Hoc Institutional Standard in the Belgian Asylum Interview

    ERIC Educational Resources Information Center

    Maryns, Katrijn

    2017-01-01

    In institutional settings of globalization, labelled languages are generally preferred over multilingual repertoires and mobile language resources. Drawing on linguistic-ethnographic analysis of the way English is treated as an invariable "ad hoc" idiom in the Belgian asylum interview, this article demonstrates how institutional measures…

  20. Assessing Clinical Microbiology Practice Guidelines: American Society for Microbiology Ad Hoc Committee on Evidence-Based Laboratory Medicine Practice Guidelines Assessment.

    PubMed

    Nachamkin, Irving; Kirn, Thomas J; Westblade, Lars F; Humphries, Romney

    2017-11-01

    As part of the American Society for Microbiology (ASM) Evidence-Based Laboratory Medicine Practice Guidelines Committee of the Professional Practice Committee, an ad hoc committee was formed in 2014 to assess guidelines published by the committee using an assessment tool, Appraisal of Guidelines for Research Evaluation II (AGREE II). The AGREE II assessment helps reviewers determine whether published guidelines are robust, transparent, and clear in presenting practice recommendations in a standardized manner. Identifying strengths and weaknesses of practice guidelines by ad hoc assessments helps with improving future guidelines through the participation of key stakeholders. This minireview describes the development of the ad hoc committee and results from their review of several ASM best practices guidelines and a non-ASM practice guideline from the Emergency Nurses Association. Copyright © 2017 American Society for Microbiology.

  1. Assessing Clinical Microbiology Practice Guidelines: American Society for Microbiology Ad Hoc Committee on Evidence-Based Laboratory Medicine Practice Guidelines Assessment

    PubMed Central

    Kirn, Thomas J.; Westblade, Lars F.; Humphries, Romney

    2017-01-01

    ABSTRACT As part of the American Society for Microbiology (ASM) Evidence-Based Laboratory Medicine Practice Guidelines Committee of the Professional Practice Committee, an ad hoc committee was formed in 2014 to assess guidelines published by the committee using an assessment tool, Appraisal of Guidelines for Research Evaluation II (AGREE II). The AGREE II assessment helps reviewers determine whether published guidelines are robust, transparent, and clear in presenting practice recommendations in a standardized manner. Identifying strengths and weaknesses of practice guidelines by ad hoc assessments helps with improving future guidelines through the participation of key stakeholders. This minireview describes the development of the ad hoc committee and results from their review of several ASM best practices guidelines and a non-ASM practice guideline from the Emergency Nurses Association. PMID:28835476

  2. Greedy data transportation scheme with hard packet deadlines for wireless ad hoc networks.

    PubMed

    Lee, HyungJune

    2014-01-01

    We present a greedy data transportation scheme with hard packet deadlines in ad hoc sensor networks of stationary nodes and multiple mobile nodes with scheduled trajectory path and arrival time. In the proposed routing strategy, each stationary ad hoc node en route decides whether to relay a shortest-path stationary node toward destination or a passing-by mobile node that will carry closer to destination. We aim to utilize mobile nodes to minimize the total routing cost as far as the selected route can satisfy the end-to-end packet deadline. We evaluate our proposed routing algorithm in terms of routing cost, packet delivery ratio, packet delivery time, and usability of mobile nodes based on network level simulations. Simulation results show that our proposed algorithm fully exploits the remaining time till packet deadline to turn into networking benefits of reducing the overall routing cost and improving packet delivery performance. Also, we demonstrate that the routing scheme guarantees packet delivery with hard deadlines, contributing to QoS improvement in various network services.

  3. Greedy Data Transportation Scheme with Hard Packet Deadlines for Wireless Ad Hoc Networks

    PubMed Central

    Lee, HyungJune

    2014-01-01

    We present a greedy data transportation scheme with hard packet deadlines in ad hoc sensor networks of stationary nodes and multiple mobile nodes with scheduled trajectory path and arrival time. In the proposed routing strategy, each stationary ad hoc node en route decides whether to relay a shortest-path stationary node toward destination or a passing-by mobile node that will carry closer to destination. We aim to utilize mobile nodes to minimize the total routing cost as far as the selected route can satisfy the end-to-end packet deadline. We evaluate our proposed routing algorithm in terms of routing cost, packet delivery ratio, packet delivery time, and usability of mobile nodes based on network level simulations. Simulation results show that our proposed algorithm fully exploits the remaining time till packet deadline to turn into networking benefits of reducing the overall routing cost and improving packet delivery performance. Also, we demonstrate that the routing scheme guarantees packet delivery with hard deadlines, contributing to QoS improvement in various network services. PMID:25258736

  4. The 5th Meeting of the Ad Hoc Panel on Terminal Configured Vehicles

    NASA Technical Reports Server (NTRS)

    1977-01-01

    A report of the fifth meeting of the NASA Research and Technology Advisory Council, Ad Hoc panel on Terminal Configured Vehicles is presented. Some of the following topics were discussed; (1) microwave landing systems; (2) whole word computer system status; (3) flight path angle control: (4) VTOL approaches and landing technology; and (5) simulation study in wind shear.

  5. Adaptive Reliable Routing Protocol Using Combined Link Stability Estimation for Mobile Ad hoc Networks

    NASA Astrophysics Data System (ADS)

    Vadivel, R.; Bhaskaran, V. Murali

    2010-10-01

    The main reason for packet loss in ad hoc networks is the link failure or node failure. In order to increase the path stability, it is essential to distinguish and moderate the failures. By knowing individual link stability along a path, path stability can be identified. In this paper, we develop an adaptive reliable routing protocol using combined link stability estimation for mobile ad hoc networks. The main objective of this protocol is to determine a Quality of Service (QoS) path along with prolonging the network life time and to reduce the packet loss. We calculate a combined metric for a path based on the parameters Link Expiration Time, Node Remaining Energy and Node Velocity and received signal strength to predict the link stability or lifetime. Then, a bypass route is established to retransmit the lost data, when a link failure occurs. By simulation results, we show that the proposed reliable routing protocol achieves high delivery ratio with reduced delay and packet drop.

  6. A multihop key agreement scheme for wireless ad hoc networks based on channel characteristics.

    PubMed

    Hao, Zhuo; Zhong, Sheng; Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks.

  7. A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics

    PubMed Central

    Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks. PMID:23766725

  8. Stochastic does not equal ad hoc. [theories of lunar origin

    NASA Technical Reports Server (NTRS)

    Hartmann, W. K.

    1984-01-01

    Some classes of influential events in solar system history are class-predictable but not event-predictable. Theories of lunar origin should not ignore class-predictable stochastic events. Impacts and close encounters with large objects during planet formation are class-predictable. These stochastic events, such as large impacts that triggered ejection of Earth-mantle material into a circum-Earth cloud, should not be rejected as ad hoc. A way to deal with such events scientifically is to investigate their consequences; if it can be shown that they might produce the Moon, they become viable concepts in theories of lunar origin.

  9. Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks

    DTIC Science & Technology

    2013-01-01

    high resiliency to malicious attacks and misbehaving nodes. Keywords—trust management; mobile ad hoc networks; QoS trust; social trust; trust...paper we address an importance issue of trust management protocol design for MANETs: trust bias minimization despite misbehaving nodes performing

  10. Topology for efficient information dissemination in ad-hoc networking

    NASA Technical Reports Server (NTRS)

    Jennings, E.; Okino, C. M.

    2002-01-01

    In this paper, we explore the information dissemination problem in ad-hoc wirless networks. First, we analyze the probability of successful broadcast, assuming: the nodes are uniformly distributed, the available area has a lower bould relative to the total number of nodes, and there is zero knowledge of the overall topology of the network. By showing that the probability of such events is small, we are motivated to extract good graph topologies to minimize the overall transmissions. Three algorithms are used to generate topologies of the network with guaranteed connectivity. These are the minimum radius graph, the relative neighborhood graph and the minimum spanning tree. Our simulation shows that the relative neighborhood graph has certain good graph properties, which makes it suitable for efficient information dissemination.

  11. Spontaneous Ad Hoc Mobile Cloud Computing Network

    PubMed Central

    Lacuesta, Raquel; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes. PMID:25202715

  12. Analytical Models of Cross-Layer Protocol Optimization in Real-Time Wireless Sensor Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    The real-time interactions among the nodes of a wireless sensor network (WSN) to cooperatively process data from multiple sensors are modeled. Quality-of-service (QoS) metrics are associated with the quality of fused information: throughput, delay, packet error rate, etc. Multivariate point process (MVPP) models of discrete random events in WSNs establish stochastic characteristics of optimal cross-layer protocols. Discrete-event, cross-layer interactions in mobile ad hoc network (MANET) protocols have been modeled using a set of concatenated design parameters and associated resource levels by the MVPPs. Characterization of the "best" cross-layer designs for a MANET is formulated by applying the general theory of martingale representations to controlled MVPPs. Performance is described in terms of concatenated protocol parameters and controlled through conditional rates of the MVPPs. Modeling limitations to determination of closed-form solutions versus explicit iterative solutions for ad hoc WSN controls are examined.

  13. An extended smart utilization medium access control (ESU-MAC) protocol for ad hoc wireless systems

    NASA Astrophysics Data System (ADS)

    Vashishtha, Jyoti; Sinha, Aakash

    2006-05-01

    The demand for spontaneous setup of a wireless communication system has increased in recent years for areas like battlefield, disaster relief operations etc., where a pre-deployment of network infrastructure is difficult or unavailable. A mobile ad-hoc network (MANET) is a promising solution, but poses a lot of challenges for all the design layers, specifically medium access control (MAC) layer. Recent existing works have used the concepts of multi-channel and power control in designing MAC layer protocols. SU-MAC developed by the same authors, efficiently uses the 'available' data and control bandwidth to send control information and results in increased throughput via decreasing contention on the control channel. However, SU-MAC protocol was limited for static ad-hoc network and also faced the busy-receiver node problem. We present the Extended SU-MAC (ESU-MAC) protocol which works mobile nodes. Also, we significantly improve the scheme of control information exchange in ESU-MAC to overcome the busy-receiver node problem and thus, further avoid the blockage of control channel for longer periods of time. A power control scheme is used as before to reduce interference and to effectively re-use the available bandwidth. Simulation results show that ESU-MAC protocol is promising for mobile, ad-hoc network in terms of reduced contention at the control channel and improved throughput because of channel re-use. Results show a considerable increase in throughput compared to SU-MAC which could be attributed to increased accessibility of control channel and improved utilization of data channels due to superior control information exchange scheme.

  14. Automatically assessing properties of dynamic cameras for camera selection and rapid deployment of video content analysis tasks in large-scale ad-hoc networks

    NASA Astrophysics Data System (ADS)

    den Hollander, Richard J. M.; Bouma, Henri; van Rest, Jeroen H. C.; ten Hove, Johan-Martijn; ter Haar, Frank B.; Burghouts, Gertjan J.

    2017-10-01

    Video analytics is essential for managing large quantities of raw data that are produced by video surveillance systems (VSS) for the prevention, repression and investigation of crime and terrorism. Analytics is highly sensitive to changes in the scene, and for changes in the optical chain so a VSS with analytics needs careful configuration and prompt maintenance to avoid false alarms. However, there is a trend from static VSS consisting of fixed CCTV cameras towards more dynamic VSS deployments over public/private multi-organization networks, consisting of a wider variety of visual sensors, including pan-tilt-zoom (PTZ) cameras, body-worn cameras and cameras on moving platforms. This trend will lead to more dynamic scenes and more frequent changes in the optical chain, creating structural problems for analytics. If these problems are not adequately addressed, analytics will not be able to continue to meet end users' developing needs. In this paper, we present a three-part solution for managing the performance of complex analytics deployments. The first part is a register containing meta data describing relevant properties of the optical chain, such as intrinsic and extrinsic calibration, and parameters of the scene such as lighting conditions or measures for scene complexity (e.g. number of people). A second part frequently assesses these parameters in the deployed VSS, stores changes in the register, and signals relevant changes in the setup to the VSS administrator. A third part uses the information in the register to dynamically configure analytics tasks based on VSS operator input. In order to support the feasibility of this solution, we give an overview of related state-of-the-art technologies for autocalibration (self-calibration), scene recognition and lighting estimation in relation to person detection. The presented solution allows for rapid and robust deployment of Video Content Analysis (VCA) tasks in large scale ad-hoc networks.

  15. Defense Acquisition and the Case of the Joint Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a Mechanism for Adaptive Change

    DTIC Science & Technology

    2013-04-01

    Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a Mechanism for Adaptive Change Kathryn Aten and John T. Dillard Naval...Defense Acquisition and the Case of the Joint Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a Mechanism for Adaptive Change...describes the preliminary analysis and findings of our study exploring what drives successful organizational adaptation in the context of technology

  16. An Energy Efficient Power Control Protocol for Ad Hoc Networks Using Directional Antennas

    NASA Astrophysics Data System (ADS)

    Quiroz-Perez, Carlos; Gulliver, T. Aaron

    A wireless ad hoc network is a collection of mobile nodes that can communicate with each other. Typically, nodes employ omnidirectional antennas. The use of directional antennas can increase spatial reuse, reduce the number of hops to a destination, reduce interference, and increase the transmission range in a specific direction. This is because omnidirectional antennas radiate equally in all directions, limiting the transmission range.

  17. On using multiple routing metrics with destination sequenced distance vector protocol for MultiHop wireless ad hoc networks

    NASA Astrophysics Data System (ADS)

    Mehic, M.; Fazio, P.; Voznak, M.; Partila, P.; Komosny, D.; Tovarek, J.; Chmelikova, Z.

    2016-05-01

    A mobile ad hoc network is a collection of mobile nodes which communicate without a fixed backbone or centralized infrastructure. Due to the frequent mobility of nodes, routes connecting two distant nodes may change. Therefore, it is not possible to establish a priori fixed paths for message delivery through the network. Because of its importance, routing is the most studied problem in mobile ad hoc networks. In addition, if the Quality of Service (QoS) is demanded, one must guarantee the QoS not only over a single hop but over an entire wireless multi-hop path which may not be a trivial task. In turns, this requires the propagation of QoS information within the network. The key to the support of QoS reporting is QoS routing, which provides path QoS information at each source. To support QoS for real-time traffic one needs to know not only minimum delay on the path to the destination but also the bandwidth available on it. Therefore, throughput, end-to-end delay, and routing overhead are traditional performance metrics used to evaluate the performance of routing protocol. To obtain additional information about the link, most of quality-link metrics are based on calculation of the lost probabilities of links by broadcasting probe packets. In this paper, we address the problem of including multiple routing metrics in existing routing packets that are broadcasted through the network. We evaluate the efficiency of such approach with modified version of DSDV routing protocols in ns-3 simulator.

  18. Report of the Ad Hoc Committee on Religious and Cultural Celebrations in the Library.

    ERIC Educational Resources Information Center

    Rathemacher, Andree; Grubman, Sheila Black; Lahiri, Amar; Gilton, Donna; Sharif, Mohammed

    The charge of the University of Rhode Island's Ad Hoc Committee on Religious and Cultural Celebrations in the Library was to: investigate all opportunities for the library to educate the campus community about religious and cultural holidays; consider all the major religions of the world and the possibility of having displays for the symbols of…

  19. Defense Acquisition and the Case of the Joint Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a Mechanism for Adaptive Change

    DTIC Science & Technology

    2013-10-01

    pmlkploba=obmloq=pbofbp= Defense Acquisition and the Case of the Joint Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a...of the Joint Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a Mechanism for Adaptive Change 5a. CONTRACT NUMBER 5b. GRANT...findings of our study exploring what drives successful organizational adaptation in the context of technology transition and acquisition within the

  20. Adaptive Control Parameters for Dispersal of Multi-Agent Mobile Ad Hoc Network (MANET) Swarms

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurt Derr; Milos Manic

    A mobile ad hoc network is a collection of independent nodes that communicate wirelessly with one another. This paper investigates nodes that are swarm robots with communications and sensing capabilities. Each robot in the swarm may operate in a distributed and decentralized manner to achieve some goal. This paper presents a novel approach to dynamically adapting control parameters to achieve mesh configuration stability. The presented approach to robot interaction is based on spring force laws (attraction and repulsion laws) to create near-optimal mesh like configurations. In prior work, we presented the extended virtual spring mesh (EVSM) algorithm for the dispersionmore » of robot swarms. This paper extends the EVSM framework by providing the first known study on the effects of adaptive versus static control parameters on robot swarm stability. The EVSM algorithm provides the following novelties: 1) improved performance with adaptive control parameters and 2) accelerated convergence with high formation effectiveness. Simulation results show that 120 robots reach convergence using adaptive control parameters more than twice as fast as with static control parameters in a multiple obstacle environment.« less

  1. Data management issues in mobile ad hoc networks

    PubMed Central

    HARA, Takahiro

    2017-01-01

    Research on mobile ad hoc networks (MANETs) has become a hot research topic since the middle 1990’s. Over the first decade, most research focused on networking techniques, ignoring data management issues. We, however, realized early the importance of data management in MANETs, and have been conducting studies in this area for 15 years. In this review, we summarize some key technical issues related to data management in MANETs, and the studies we have done in addressing these issues, which include placement of data replicas, update management, and query processing with security management. The techniques proposed in our studies have been designed with deep considerations of MANET features including network partitioning, node participation/disappearance, limited network bandwidth, and energy efficiency. Our studies published in early 2000’s have developed a new research field as data management in MANETs. Also, our recent studies are expected to be significant guidelines of new research directions. We conclude the review by discussing some future directions for research. PMID:28496052

  2. Data management issues in mobile ad hoc networks.

    PubMed

    Hara, Takahiro

    2017-01-01

    Research on mobile ad hoc networks (MANETs) has become a hot research topic since the middle 1990's. Over the first decade, most research focused on networking techniques, ignoring data management issues. We, however, realized early the importance of data management in MANETs, and have been conducting studies in this area for 15 years. In this review, we summarize some key technical issues related to data management in MANETs, and the studies we have done in addressing these issues, which include placement of data replicas, update management, and query processing with security management. The techniques proposed in our studies have been designed with deep considerations of MANET features including network partitioning, node participation/disappearance, limited network bandwidth, and energy efficiency. Our studies published in early 2000's have developed a new research field as data management in MANETs. Also, our recent studies are expected to be significant guidelines of new research directions. We conclude the review by discussing some future directions for research.

  3. Panel Discussion : Report of the APS Ad-Hoc Committee on LGBT Issues

    NASA Astrophysics Data System (ADS)

    Atherton, Tim; Barthelemy, Ramon; Garmon, Savannah; Reeves, Kyle; APS Ad-Hoc Committee on LGBT Issues Team

    Following the presentation of the findings and recommendations of the APS Ad-Hoc Committee on LGBT Issues (C-LGBT) by Committee Chair Michael Falk, a panel discussion will be held featuring several members of the committee. The discussion will focus on how APS can best ensure the recommendations of the committee are carried out in a timely fashion and other ideas on future APS efforts toward LGBT inclusion in physics. Discussion topics will also include the research and other input that shaped the committee's findings and recommendations.

  4. Intelligent QoS routing algorithm based on improved AODV protocol for Ad Hoc networks

    NASA Astrophysics Data System (ADS)

    Huibin, Liu; Jun, Zhang

    2016-04-01

    Mobile Ad Hoc Networks were playing an increasingly important part in disaster reliefs, military battlefields and scientific explorations. However, networks routing difficulties are more and more outstanding due to inherent structures. This paper proposed an improved cuckoo searching-based Ad hoc On-Demand Distance Vector Routing protocol (CSAODV). It elaborately designs the calculation methods of optimal routing algorithm used by protocol and transmission mechanism of communication-package. In calculation of optimal routing algorithm by CS Algorithm, by increasing QoS constraint, the found optimal routing algorithm can conform to the requirements of specified bandwidth and time delay, and a certain balance can be obtained among computation spending, bandwidth and time delay. Take advantage of NS2 simulation software to take performance test on protocol in three circumstances and validate the feasibility and validity of CSAODV protocol. In results, CSAODV routing protocol is more adapt to the change of network topological structure than AODV protocol, which improves package delivery fraction of protocol effectively, reduce the transmission time delay of network, reduce the extra burden to network brought by controlling information, and improve the routing efficiency of network.

  5. Academic Standards Task Force Report.

    ERIC Educational Resources Information Center

    Burnham, Peter F.

    The product of a year-long research process undertaken by a Task Force on Academic Standards at Tompkins Cortland Community College (TCCC) in 1980-81, this report provides background to the deliberations of the Task Force and a presentation of their position on academic standards at TCCC. The report establishes the Task Force's commitments to…

  6. A communication theoretical analysis of FRET-based mobile ad hoc molecular nanonetworks.

    PubMed

    Kuscu, Murat; Akan, Ozgur B

    2014-09-01

    Nanonetworks refer to a group of nanosized machines with very basic operational capabilities communicating to each other in order to accomplish more complex tasks such as in-body drug delivery, or chemical defense. Realizing reliable and high-rate communication between these nanomachines is a fundamental problem for the practicality of these nanonetworks. Recently, we have proposed a molecular communication method based on Förster Resonance Energy Transfer (FRET) which is a nonradiative excited state energy transfer phenomenon observed among fluorescent molecules, i.e., fluorophores. We have modeled the FRET-based communication channel considering the fluorophores as single-molecular immobile nanomachines, and shown its reliability at high rates, and practicality at the current stage of nanotechnology. In this study, for the first time in the literature, we investigate the network of mobile nanomachines communicating through FRET. We introduce two novel mobile molecular nanonetworks: FRET-based mobile molecular sensor/actor nanonetwork (FRET-MSAN) which is a distributed system of mobile fluorophores acting as sensor or actor node; and FRET-based mobile ad hoc molecular nanonetwork (FRET-MAMNET) which consists of fluorophore-based nanotransmitter, nanoreceivers and nanorelays. We model the single message propagation based on birth-death processes with continuous time Markov chains. We evaluate the performance of FRET-MSAN and FRET-MAMNET in terms of successful transmission probability and mean extinction time of the messages, system throughput, channel capacity and achievable communication rates.

  7. Intelligent self-organization methods for wireless ad hoc sensor networks based on limited resources

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2006-05-01

    A wireless ad hoc sensor network (WSN) is a configuration for area surveillance that affords rapid, flexible deployment in arbitrary threat environments. There is no infrastructure support and sensor nodes communicate with each other only when they are in transmission range. To a greater degree than the terminals found in mobile ad hoc networks (MANETs) for communications, sensor nodes are resource-constrained, with limited computational processing, bandwidth, memory, and power, and are typically unattended once in operation. Consequently, the level of information exchange among nodes, to support any complex adaptive algorithms to establish network connectivity and optimize throughput, not only deplete those limited resources and creates high overhead in narrowband communications, but also increase network vulnerability to eavesdropping by malicious nodes. Cooperation among nodes, critical to the mission of sensor networks, can thus be disrupted by the inappropriate choice of the method for self-organization. Recent published contributions to the self-configuration of ad hoc sensor networks, e.g., self-organizing mapping and swarm intelligence techniques, have been based on the adaptive control of the cross-layer interactions found in MANET protocols to achieve one or more performance objectives: connectivity, intrusion resistance, power control, throughput, and delay. However, few studies have examined the performance of these algorithms when implemented with the limited resources of WSNs. In this paper, self-organization algorithms for the initiation, operation and maintenance of a network topology from a collection of wireless sensor nodes are proposed that improve the performance metrics significant to WSNs. The intelligent algorithm approach emphasizes low computational complexity, energy efficiency and robust adaptation to change, allowing distributed implementation with the actual limited resources of the cooperative nodes of the network. Extensions of the

  8. Ad hoc supervision of general practice registrars as a 'community of practice': analysis, interpretation and re-presentation.

    PubMed

    Clement, T; Brown, J; Morrison, J; Nestel, D

    2016-05-01

    General practice registrars in Australia undertake most of their vocational training in accredited general practices. They typically see patients alone from the start of their community-based training and are expected to seek timely ad hoc support from their supervisor. Such ad hoc encounters are a mechanism for ensuring patient safety, but also provide an opportunity for learning and teaching. Wenger's (Communities of practice: learning, meaning, and identity. Cambridge University Press, New York, 1998) social theory of learning ('communities of practice') guided a secondary analysis of audio-recordings of ad hoc encounters. Data from one encounter is re-presented as an extended sequence to maintain congruence with the theoretical perspective and enhance vicariousness. An interpretive commentary communicates key features of Wenger's theory and highlights the researchers' interpretations. We argue that one encounter can reveal universal understandings of clinical supervision and that the process of naturalistic generalisation allows readers to transfer others' experiences to their own contexts. The paper raises significant analytic, interpretive, and representational issues. We highlight that report writing is an important, but infrequently discussed, part of research design. We discuss the challenges of supporting the learning and teaching that arises from adopting a socio-cultural lens and argue that such a perspective importantly captures the complex range of issues that work-based practitioners have to grapple with. This offers a challenge to how we research and seek to influence work-based learning and teaching in health care settings.

  9. Mapping Ad Hoc Communications Network of a Large Number Fixed-Wing UAV Swarm

    DTIC Science & Technology

    2017-03-01

    partitioned sub-swarms. The work covered in this thesis is to build a model of the NPS swarm’s communication network in ns-3 simulation software and use...partitioned sub- swarms. The work covered in this thesis is to build a model of the NPS swarm’s communication network in ns-3 simulation software and...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS MAPPING AD HOC COMMUNICATIONS NETWORK OF A LARGE NUMBER FIXED-WING UAV SWARM by Alexis

  10. PRN 94-9: Announcing the Formation of Two Industry-Wide Task Forces: Agricultural Reentry Task Force and Outdoor Residential Exposure Task Force

    EPA Pesticide Factsheets

    This Notice announces two industry-wide Task Forces being formed in response to generic exposure data requirements. It contains EPA's policy on a registrant's options for, and responsibilities when joining Task Force as a way to satisfy data requirements.

  11. ACR-SNM Task Force on Nuclear Medicine Training: report of the task force.

    PubMed

    Guiberteau, Milton J; Graham, Michael M

    2011-06-01

    The expansion of knowledge and technological advances in nuclear medicine and radiology require physicians to have more expertise in functional and anatomic imaging. The convergence of these two specialties into the new discipline of molecular imaging has also begun to place demands on residency training programs for additional instruction in physiology and molecular biology. These changes have unmasked weaknesses in current nuclear medicine and radiology training programs. Adding to the impetus for change are the attendant realities of the job market and uncertain employment prospects for physicians trained in nuclear medicine but not also trained in diagnostic radiology. With this background, the ACR and the Society of Nuclear Medicine convened the Task Force on Nuclear Medicine Training to define the issues and develop recommendations for resident training.

  12. 78 FR 27969 - Meeting of the Community Preventive Services Task Force (Task Force)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-13

    ... discussed: Matters to be discussed: cancer prevention and control, cardiovascular disease prevention and... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention Meeting of the Community Preventive Services Task Force (Task Force) AGENCY: Centers for Disease Control and Prevention...

  13. 77 FR 56845 - Meeting of the Community Preventive Services Task Force (Task Force)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-14

    ...: Matters to be discussed: Tobacco, oral health and cardiovascular disease. Meeting Accessibility: This... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention Meeting of the Community Preventive Services Task Force (Task Force) AGENCY: Centers for Disease Control and Prevention...

  14. 78 FR 59939 - Meeting of the Community Preventive Services Task Force (Task Force)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-30

    .... Matters to be discussed: Cancer prevention and control, cardiovascular disease prevention and control... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention Meeting of the Community Preventive Services Task Force (Task Force) AGENCY: Centers for Disease Control and Prevention...

  15. 78 FR 2996 - Meeting of the Community Preventive Services Task Force (Task Force)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-15

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention Meeting of the Community Preventive Services Task Force (Task Force) AGENCY: Centers for Disease Control and Prevention... for Disease Control and Prevention (CDC) announces the next meeting of the Community Preventive...

  16. Community hoarding task forces: a comparative case study of five task forces in the United States.

    PubMed

    Bratiotis, Christiana

    2013-05-01

    During the past decade, many community task forces have formed to address hoarding problems that come to public attention. Such task forces provide a societal-level intervention to assist people with the most severe cases of hoarding, who do not voluntarily seek or want help for their hoarding behaviour. This qualitative study of five U.S. hoarding task forces included sites selected for their diversity of purpose, approaches to hoarding intervention and community geography, composition and resources. Data were collected during the period of September 2007-March 2008. The case study methodology used multiple forms of data, including semi-structured interviews, analysis of documents, small group interviews and investigator observation. This study captured the perspectives of public and private sector service providers such as mental health, housing, social service, public health agencies and community enforcement organisations (fire, police, legal, animal control) to examine how task forces organise and operate and the emerging practice and policy changes. Study findings suggest that structural factors (e.g. leadership, purpose, funding and membership) impact hoarding task force viability, that participation on a task force influences practice and policy decisions about hoarding, and that social work can expand its role in task force leadership. Task forces may be a mechanism for improving community policies about hoarding and mechanisms for addressing other social problems across multiple sectors. © 2012 Blackwell Publishing Ltd.

  17. Adaptive Flow Control for Enabling Quality of Service in Tactical Ad Hoc Wireless Networks

    DTIC Science & Technology

    2010-12-01

    environment in wireless networks , we use sensors in the network routers to detect and respond to congestion. We use backpressure techniques... wireless mesh network . In the current approach, we used OLSR as the routing scheme. However, B.A.T.M.A.N. offers the significant advantage of being based...Control and QoS Routing in Multi-Channel Wireless Mesh Networks ,” 68-77. ACM International Symposium on Mobile Ad Hoc Networking &

  18. 75 FR 45606 - Interagency Ocean Policy Task Force-Final Recommendations of the Interagency Ocean Policy Task Force

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-03

    ... COUNCIL ON ENVIRONMENTAL QUALITY Interagency Ocean Policy Task Force--Final Recommendations of the Interagency Ocean Policy Task Force AGENCY: Council on Environmental Quality. ACTION: Notice of Availability, Interagency Ocean Policy Task Force's [[Page 45607

  19. Ad hoc committee on global climate issues: Annual report

    USGS Publications Warehouse

    Gerhard, L.C.; Hanson, B.M.B.

    2000-01-01

    The AAPG Ad Hoc Committee on Global Climate Issues has studied the supposition of human-induced climate change since the committee's inception in January 1998. This paper details the progress and findings of the committee through June 1999. At that time there had been essentially no geologic input into the global climate change debate. The following statements reflect the current state of climate knowledge from the geologic perspective as interpreted by the majority of the committee membership. The committee recognizes that new data could change its conclusions. The earth's climate is constantly changing owing to natural variability in earth processes. Natural climate variability over recent geological time is greater than reasonable estimates of potential human-induced greenhouse gas changes. Because no tool is available to test the supposition of human-induced climate change and the range of natural variability is so great, there is no discernible human influence on global climate at this time.

  20. Accurate ab initio quartic force fields for the ions HCO(+) and HOC(+)

    NASA Technical Reports Server (NTRS)

    Martin, J. M. L.; Taylor, Peter R.; Lee, Timothy J.

    1993-01-01

    The quartic force fields of HCO(+) and HOC(+) have been computed using augmented coupled cluster methods and basis sets of spdf and spdfg quality. Calculations on HCN, CO, and N2 have been performed to assist in calibrating the computed results. Going from an spdf to an spdfg basis shortens triple bonds by about 0.004 A, and increases the corresponding harmonic frequency by 10-20/cm, leaving bond distances about 0.003 A too long and triple bond stretching frequencies about 5/cm too low. Accurate estimates for the bond distances, fundamental frequencies, and thermochemical quantities are given. HOC(+) lies 37.8 +/- 0.5 kcal/mol (0 K) above HCO(+); the classical barrier height for proton exchange is 76.7 +/- 1.0 kcal/mol.

  1. The added mass forces in insect flapping wings.

    PubMed

    Liu, Longgui; Sun, Mao

    2018-01-21

    The added mass forces of three-dimensional (3D) flapping wings of some representative insects, and the accuracy of the often used simple two-dimensional (2D) method, are studied. The added mass force of a flapping wing is calculated by both 3D and 2D methods, and the total aerodynamic force of the wing is calculated by the CFD method. Our findings are as following. The added mass force has a significant contribution to the total aerodynamic force of the flapping wings during and near the stroke reversals, and the shorter the stroke amplitude is, the larger the added mass force becomes. Thus the added mass force could not be neglected when using the simple models to estimate the aerodynamics force, especially for insects with relatively small stroke amplitudes. The accuracy of the often used simple 2D method is reasonably good: when the aspect ratio of the wing is greater than about 3.3, error in the added mass force calculation due to the 2D assumption is less than 9%; even when the aspect ratio is 2.8 (approximately the smallest for an insect), the error is no more than 13%. Copyright © 2017 Elsevier Ltd. All rights reserved.

  2. Enhancement of Beaconless Location-Based Routing with Signal Strength Assistance for Ad-Hoc Networks

    NASA Astrophysics Data System (ADS)

    Chen, Guowei; Itoh, Kenichi; Sato, Takuro

    Routing in Ad-hoc networks is unreliable due to the mobility of the nodes. Location-based routing protocols, unlike other protocols which rely on flooding, excel in network scalability. Furthermore, new location-based routing protocols, like, e. g. BLR [1], IGF [2], & CBF [3] have been proposed, with the feature of not requiring beacons in MAC-layer, which improve more in terms of scalability. Such beaconless routing protocols can work efficiently in dense network areas. However, these protocols' algorithms have no ability to avoid from routing into sparse areas. In this article, historical signal strength has been added as a factor into the BLR algorithm, which avoids routing into sparse area, and consequently improves the global routing efficiency.

  3. Sketching Awareness: A Participatory Study to Elicit Designs for Supporting Ad Hoc Emergency Medical Teamwork

    PubMed Central

    Kusunoki, Diana; Sarcevic, Aleksandra; Zhang, Zhan; Yala, Maria

    2014-01-01

    Prior CSCW research on awareness in clinical settings has mostly focused on higher-level team coordination spanning across longer-term trajectories at the department and inter-department levels. In this paper, we offer a perspective on what awareness means within the context of an ad hoc, time- and safety-critical medical setting by looking at teams treating severely ill patients with urgent needs. We report findings from four participatory design workshops conducted with emergency medicine clinicians at two regional emergency departments. Workshops were developed to elicit design ideas for information displays that support awareness in emergency medical situations. Through analysis of discussions and clinicians’ sketches of information displays, we identified five features of teamwork that can be used as a foundation for supporting awareness from the perspective of clinicians. Based on these findings, we contribute rich descriptions of four facets of awareness that teams manage during emergency medical situations: team member awareness, elapsed time awareness, teamwork-oriented and patient-driven task awareness, and overall progress awareness. We then discuss these four awareness types in relation to awareness facets found in the CSCW literature. PMID:25870498

  4. Trust Management in Mobile Ad Hoc Networks for Bias Minimization and Application Performance Maximization

    DTIC Science & Technology

    2014-02-26

    set of anomaly detection rules 62 I.-R. Chen et al. / Ad Hoc Networks 19 (2014) 59–74 Author’s personal copy including the interval rule (for...deficiencies in anomaly detection (e.g., imperfection of rules) by a false negative probability (PHfn) of misidentifying an unhealthy node as a...multimedia servers, Multimedia Syst. 8 (2) (2000) 83–91. [53] R. Mitchell, I.R. Chen, Adaptive intrusion detection for unmanned aircraft systems based on

  5. Grip force and force sharing in two different manipulation tasks with bottles.

    PubMed

    Cepriá-Bernal, Javier; Pérez-González, Antonio; Mora, Marta C; Sancho-Bru, Joaquín L

    2017-07-01

    Grip force and force sharing during two activities of daily living were analysed experimentally in 10 right-handed subjects. Four different bottles, filled to two different levels, were manipulated for two tasks: transporting and pouring. Each test subject's hand was instrumented with eight thin wearable force sensors. The grip force and force sharing were significantly different for each bottle model. Increasing the filling level resulted in an increase in grip force, but the ratio of grip force to load force was higher for lighter loads. The task influenced the force sharing but not the mean grip force. The contributions of the thumb and ring finger were higher in the pouring task, whereas the contributions of the palm and the index finger were higher in the transport task. Mean force sharing among fingers was 30% for index, 29% for middle, 22% for ring and 19% for little finger. Practitioner Summary: We analysed grip force and force sharing in two manipulation tasks with bottles: transporting and pouring. The objective was to understand the effects of the bottle features, filling level and task on the contribution of different areas of the hand to the grip force. Force sharing was different for each task and the bottles features affected to both grip force and force sharing.

  6. 18 CFR 701.58 - Task forces.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Task forces. 701.58... Headquarters Organization § 701.58 Task forces. The Director with Council concurrence or the Council may establish task forces from time to time to aid in the preparation of issues for presentation to the Council...

  7. Clinician Ratings of Interpreter Mediated Visits in Underserved Primary Care Settings with Ad hoc, In-person Professional, and Video Conferencing Modes

    PubMed Central

    Nápoles, Anna M.; Santoyo-Olsson, Jasmine; Karliner, Leah S.; O’Brien, Helen; Gregorich, Steven E.; Pérez-Stable, Eliseo J.

    2013-01-01

    Language interpretation ameliorates health disparities among underserved limited English-proficient patients, yet few studies have compared clinician satisfaction with these services. Self-administered clinician post-visit surveys compared the quality of interpretation and communication, visit satisfaction, degree of patient engagement, and cultural competence of visits using untrained people acting as interpreters (ad hoc), in-person professional, or video conferencing professional interpretation for 283 visits. Adjusting for clinician and patient characteristics, the quality of interpretation of in-person and video conferencing modes were rated similarly (OR=1.79; 95% CI 0.74, 4.33). The quality of in-person (OR=5.55; 95% CI 1.50, 20.51) and video conferencing (OR=3.10; 95% CI 1.16, 8.31) were rated higher than ad hoc interpretation. Self-assessed cultural competence was better for in-person versus video conferencing interpretation (OR=2.32; 95% CI 1.11, 4.86). Video conferencing interpretation increases access without compromising quality, but cultural nuances may be better addressed by in-person interpreters. Professional interpretation is superior to ad hoc (OR=4.15; 95% CI 1.43, 12.09). PMID:20173271

  8. An adaptive density-based routing protocol for flying Ad Hoc networks

    NASA Astrophysics Data System (ADS)

    Zheng, Xueli; Qi, Qian; Wang, Qingwen; Li, Yongqiang

    2017-10-01

    An Adaptive Density-based Routing Protocol (ADRP) for Flying Ad Hoc Networks (FANETs) is proposed in this paper. The main objective is to calculate forwarding probability adaptively in order to increase the efficiency of forwarding in FANETs. ADRP dynamically fine-tunes the rebroadcasting probability of a node for routing request packets according to the number of neighbour nodes. Indeed, it is more interesting to privilege the retransmission by nodes with little neighbour nodes. We describe the protocol, implement it and evaluate its performance using NS-2 network simulator. Simulation results reveal that ADRP achieves better performance in terms of the packet delivery fraction, average end-to-end delay, normalized routing load, normalized MAC load and throughput, which is respectively compared with AODV.

  9. Assessing Situational Awareness in Task Force XXI.

    DTIC Science & Technology

    1997-06-01

    information dominance over the enemy and that units equipped with greater situational awareness will fight more successfully than units without the added capability. In an effort to test this hypothesis the Army conducted an Advanced Warfighter Experiment (AWE) which began at Ft. Hood, TX and culminated in a focused rotation at the National Training Center, Ft. Irwin, CA. Although many initiatives in the area of information dominance were tested in the AWE, the centerpiece of the program was a test case unit designated as Task Force Twenty-One (TF

  10. Linking Satellites Via Earth "Hot Spots" and the Internet to Form Ad Hoc Constellations

    NASA Technical Reports Server (NTRS)

    Mandl, Dan; Frye, Stu; Grosvenor, Sandra; Ingram, Mary Ann; Langley, John; Miranda, Felix; Lee, Richard Q.; Romanofsky, Robert; Zaman, Afoz; Popovic, Zoya

    2004-01-01

    As more assets are placed in orbit, opportunities emerge to combine various sets of satellites in temporary constellations to perform collaborative image collections. Often, new operations concepts for a satellite or set of satellites emerge after launch. To the degree with which new space assets can be inexpensively and rapidly integrated into temporary or "ad hoc" constellations, will determine whether these new ideas will be implemented or not. On the Earth Observing 1 (EO-1) satellite, a New Millennium Program mission, a number of experiments were conducted and are being conducted to demonstrate various aspects of an architecture that, when taken as a whole, will enable progressive mission autonomy. In particular, the target architecture will use adaptive ground antenna arrays to form, as close as possible, the equivalent of wireless access points for low earth orbiting satellites. Coupled with various ground and flight software and the Internet. the architecture enables progressive mission autonomy. Thus, new collaborative sensing techniques can be implemented post-launch. This paper will outline the overall operations concept and highlight details of both the research effort being conducted in ad hoc constellations, mission autonomy and

  11. Performance-based workload assessment: Allocation strategy and added task sensitivity

    NASA Technical Reports Server (NTRS)

    Vidulich, Michael A.

    1990-01-01

    The preliminary results of a research program investigating the use of added tasks to evaluate mental workload are reviewed. The focus of the first studies was a reappraisal of the traditional secondary task logic that encouraged the use of low-priority instructions for the added task. It was believed that such low-priority tasks would encourage subjects to split their available resources among the two tasks. The primary task would be assigned all the resources it needed, and any remaining reserve capacity would be assigned to the secondary task. If the model were correct, this approach was expected to combine sensitivity to primary task difficulty with unintrusiveness to primary task performance. The first studies of the current project demonstrated that a high-priority added task, although intrusive, could be more sensitive than the traditional low-priority secondary task. These results suggested that a more appropriate model of the attentional effects associated with added task performance might be based on capacity switching, rather than the traditional optimal allocation model.

  12. Quality of service routing in wireless ad hoc networks

    NASA Astrophysics Data System (ADS)

    Sane, Sachin J.; Patcha, Animesh; Mishra, Amitabh

    2003-08-01

    An efficient routing protocol is essential to guarantee application level quality of service running on wireless ad hoc networks. In this paper we propose a novel routing algorithm that computes a path between a source and a destination by considering several important constraints such as path-life, availability of sufficient energy as well as buffer space in each of the nodes on the path between the source and destination. The algorithm chooses the best path from among the multiples paths that it computes between two endpoints. We consider the use of control packets that run at a priority higher than the data packets in determining the multiple paths. The paper also examines the impact of different schedulers such as weighted fair queuing, and weighted random early detection among others in preserving the QoS level guarantees. Our extensive simulation results indicate that the algorithm improves the overall lifetime of a network, reduces the number of dropped packets, and decreases the end-to-end delay for real-time voice application.

  13. Noise-Assisted Concurrent Multipath Traffic Distribution in Ad Hoc Networks

    PubMed Central

    Murata, Masayuki

    2013-01-01

    The concept of biologically inspired networking has been introduced to tackle unpredictable and unstable situations in computer networks, especially in wireless ad hoc networks where network conditions are continuously changing, resulting in the need of robustness and adaptability of control methods. Unfortunately, existing methods often rely heavily on the detailed knowledge of each network component and the preconfigured, that is, fine-tuned, parameters. In this paper, we utilize a new concept, called attractor perturbation (AP), which enables controlling the network performance using only end-to-end information. Based on AP, we propose a concurrent multipath traffic distribution method, which aims at lowering the average end-to-end delay by only adjusting the transmission rate on each path. We demonstrate through simulations that, by utilizing the attractor perturbation relationship, the proposed method achieves a lower average end-to-end delay compared to other methods which do not take fluctuations into account. PMID:24319375

  14. U.S. Preventive Services Task Force

    MedlinePlus

    ... USPSTF Our Members Conflict of Interest Disclosures Task Force Resources Our Partners Reports to Congress Contact Us ... effort to make the U.S. Preventive Services Task Force (USPSTF) recommendations clearer and its processes more transparent, ...

  15. Task specific grip force control in writer's cramp.

    PubMed

    Schneider, A S; Fürholzer, W; Marquardt, C; Hermsdörfer, J

    2014-04-01

    Writer's cramp is defined as a task specific focal dystonia generating hypertonic muscle co-contractions during handwriting resulting in impaired writing performance and exaggerated finger force. However, little is known about the generalisation of grip force across tasks others than writing. The aim of the study was to directly compare regulation of grip forces during handwriting with force regulation in other fine-motor tasks in patients and control subjects. Handwriting, lifting and cyclic movements of a grasped object were investigated in 21 patients and 14 controls. The applied forces were registered in all three tasks and compared between groups and tasks. In addition, task-specific measures of fine-motor skill were assessed. As expected, patients generated exaggerated forces during handwriting compared to control subjects. However there were no statistically significant group differences during lifting and cyclic movements. The control group revealed a generalisation of grip forces across manual tasks whereas in patients there was no such correlation. We conclude that increased finger forces during handwriting are a task-specific phenomenon that does not necessarily generalise to other fine-motor tasks. Force control of patients with writer's cramp in handwriting and other fine-motor tasks is characterised by individualised control strategies. Copyright © 2013 International Federation of Clinical Neurophysiology. Published by Elsevier Ireland Ltd. All rights reserved.

  16. A memetic optimization algorithm for multi-constrained multicast routing in ad hoc networks

    PubMed Central

    Hammad, Karim; El Bakly, Ahmed M.

    2018-01-01

    A mobile ad hoc network is a conventional self-configuring network where the routing optimization problem—subject to various Quality-of-Service (QoS) constraints—represents a major challenge. Unlike previously proposed solutions, in this paper, we propose a memetic algorithm (MA) employing an adaptive mutation parameter, to solve the multicast routing problem with higher search ability and computational efficiency. The proposed algorithm utilizes an updated scheme, based on statistical analysis, to estimate the best values for all MA parameters and enhance MA performance. The numerical results show that the proposed MA improved the delay and jitter of the network, while reducing computational complexity as compared to existing algorithms. PMID:29509760

  17. A memetic optimization algorithm for multi-constrained multicast routing in ad hoc networks.

    PubMed

    Ramadan, Rahab M; Gasser, Safa M; El-Mahallawy, Mohamed S; Hammad, Karim; El Bakly, Ahmed M

    2018-01-01

    A mobile ad hoc network is a conventional self-configuring network where the routing optimization problem-subject to various Quality-of-Service (QoS) constraints-represents a major challenge. Unlike previously proposed solutions, in this paper, we propose a memetic algorithm (MA) employing an adaptive mutation parameter, to solve the multicast routing problem with higher search ability and computational efficiency. The proposed algorithm utilizes an updated scheme, based on statistical analysis, to estimate the best values for all MA parameters and enhance MA performance. The numerical results show that the proposed MA improved the delay and jitter of the network, while reducing computational complexity as compared to existing algorithms.

  18. BCDP: Budget Constrained and Delay-Bounded Placement for Hybrid Roadside Units in Vehicular Ad Hoc Networks

    PubMed Central

    Li, Peng; Huang, Chuanhe; Liu, Qin

    2014-01-01

    In vehicular ad hoc networks, roadside units (RSUs) placement has been proposed to improve the the overall network performance in many ITS applications. This paper addresses the budget constrained and delay-bounded placement problem (BCDP) for roadside units in vehicular ad hoc networks. There are two types of RSUs: cable connected RSU (c-RSU) and wireless RSU (w-RSU). c-RSUs are interconnected through wired lines, and they form the backbone of VANETs, while w-RSUs connect to other RSUs through wireless communication and serve as an economical extension of the coverage of c-RSUs. The delay-bounded coverage range and deployment cost of these two cases are totally different. We are given a budget constraint and a delay bound, the problem is how to find the optimal candidate sites with the maximal delay-bounded coverage to place RSUs such that a message from any c-RSU in the region can be disseminated to the more vehicles within the given budget constraint and delay bound. We first prove that the BCDP problem is NP-hard. Then we propose several algorithms to solve the BCDP problem. Simulation results show the heuristic algorithms can significantly improve the coverage range and reduce the total deployment cost, compared with other heuristic methods. PMID:25436656

  19. Context dependent off loading for cloudlet in mobile ad-hoc network

    NASA Astrophysics Data System (ADS)

    Bhatt, N.; Nadesh, R. K.; ArivuSelvan, K.

    2017-11-01

    Cloud Computing in Mobile Ad-hoc network is emerging part of research consideration as the demand and competency of mobile devices increased in last few years. To follow out operation within the remote cloud builds the postponement and influences the administration standard. To keep away from this trouble cloudlet is presented. Cloudlet gives identical support of the devices as cloud at low inactivity however at high transfer speed. Be that as it may, choice of a cloudlet for offloading calculation with flat energy is a noteworthy test if multiple cloud let is accessible adjacent. Here I proposed energy and bandwidth (Traffic overload for communication with cloud) aware cloudlet selection strategy based on the context dependency of the device location. It works on the basis of mobile device location and bandwidth availability of cloudlet. The cloudlet offloading and selection process using given solution is simulated in Cloud ~ Simulator.

  20. An enhanced performance through agent-based secure approach for mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Bisen, Dhananjay; Sharma, Sanjeev

    2018-01-01

    This paper proposes an agent-based secure enhanced performance approach (AB-SEP) for mobile ad hoc network. In this approach, agent nodes are selected through optimal node reliability as a factor. This factor is calculated on the basis of node performance features such as degree difference, normalised distance value, energy level, mobility and optimal hello interval of node. After selection of agent nodes, a procedure of malicious behaviour detection is performed using fuzzy-based secure architecture (FBSA). To evaluate the performance of the proposed approach, comparative analysis is done with conventional schemes using performance parameters such as packet delivery ratio, throughput, total packet forwarding, network overhead, end-to-end delay and percentage of malicious detection.

  1. Energy Aware Cluster-Based Routing in Flying Ad-Hoc Networks.

    PubMed

    Aadil, Farhan; Raza, Ali; Khan, Muhammad Fahad; Maqsood, Muazzam; Mehmood, Irfan; Rho, Seungmin

    2018-05-03

    Flying ad-hoc networks (FANETs) are a very vibrant research area nowadays. They have many military and civil applications. Limited battery energy and the high mobility of micro unmanned aerial vehicles (UAVs) represent their two main problems, i.e., short flight time and inefficient routing. In this paper, we try to address both of these problems by means of efficient clustering. First, we adjust the transmission power of the UAVs by anticipating their operational requirements. Optimal transmission range will have minimum packet loss ratio (PLR) and better link quality, which ultimately save the energy consumed during communication. Second, we use a variant of the K-Means Density clustering algorithm for selection of cluster heads. Optimal cluster heads enhance the cluster lifetime and reduce the routing overhead. The proposed model outperforms the state of the art artificial intelligence techniques such as Ant Colony Optimization-based clustering algorithm and Grey Wolf Optimization-based clustering algorithm. The performance of the proposed algorithm is evaluated in term of number of clusters, cluster building time, cluster lifetime and energy consumption.

  2. A high performance, ad-hoc, fuzzy query processing system for relational databases

    NASA Technical Reports Server (NTRS)

    Mansfield, William H., Jr.; Fleischman, Robert M.

    1992-01-01

    Database queries involving imprecise or fuzzy predicates are currently an evolving area of academic and industrial research. Such queries place severe stress on the indexing and I/O subsystems of conventional database environments since they involve the search of large numbers of records. The Datacycle architecture and research prototype is a database environment that uses filtering technology to perform an efficient, exhaustive search of an entire database. It has recently been modified to include fuzzy predicates in its query processing. The approach obviates the need for complex index structures, provides unlimited query throughput, permits the use of ad-hoc fuzzy membership functions, and provides a deterministic response time largely independent of query complexity and load. This paper describes the Datacycle prototype implementation of fuzzy queries and some recent performance results.

  3. USLCSG Task Force

    Science.gov Websites

    Unites States Linear Collider Steering Group dot dot dot dot What's New! June 2003 Meeting Welcome to the USLCSG Task Force at the Stanford Linear Accelerator Center [Enter] dot dot SLAC Page Owners

  4. Federal Government Printing and Publishing: Policy Issues. Report of the Ad Hoc Advisory Committee on Revision of Title 44.

    ERIC Educational Resources Information Center

    Joint Committee on Printing, Washington, DC.

    Designed to present a better understanding of the government's system of printing and distributing information and to highlight problems, alternatives, and important policy questions, this report synthesizes 13 weeks of the Ad Hoc Advisory Committee hearings on six topics: (1) Administration of policy--who should establish and administer policy in…

  5. 75 FR 76744 - National Disaster Housing Task Force

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-09

    ...] National Disaster Housing Task Force AGENCY: Federal Emergency Management Agency, DHS. ACTION: Notice of Meeting. SUMMARY: The National Disaster Housing Task Force (NDHTF) will meet by teleconference on December...: Mitchell Wyllins, National Disaster Housing Task Force, 500 C Street, SW., (Room 428), Washington, DC 20472...

  6. Task analysis of Air Force pharmacy practice.

    PubMed

    Bartholomew, A; Sawyer, W T; Coats, L

    1995-01-15

    The frequency with which United States Air Force pharmacists perform specific professional tasks and the pharmacists' views as to the importance of those tasks were studied. A questionnaire was prepared that asked recipients to rate each of 36 tasks selected as representing the spectrum of practice activities. There were four categories of tasks: managerial tasks, dispensing tasks, drug information tasks, and patient care tasks. Recipients rated the tasks with respect to frequency of performance and importance on separate 6-point scales. The questionnaire was mailed in May 1991 to the 225 pharmacists then serving in the Air Force worldwide. Of the 225 questionnaires, 150 usable questionnaires were returned (response rate, 67%). All the tasks in the survey were performed by at least one Air Force pharmacy officer, although the frequency of task performance varied. In particular, the frequency of many patient care tasks was low. All the tasks were perceived to have some importance, but drug information tasks were rated as being significantly more important than tasks in the other categories; patient care tasks were rated lowest in importance. The results varied with the respondents' demographic characteristics. Pharmacy officers with more years of service, more senior positions, higher rank, or an advanced degree in a field other than pharmacy tended to give responses that diverged from those of the population. A 1991 survey showed an awareness among Air Force pharmacists of the need to orient practice around patient care; however, they were not spending substantial time on patient care and tended to view it as less important than more traditional pharmacy tasks.

  7. 76 FR 60863 - Aquatic Nuisance Species Task Force Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-30

    ...] Aquatic Nuisance Species Task Force Meeting AGENCY: Fish and Wildlife Service, Interior. ACTION: Notice of meeting. SUMMARY: This notice announces a meeting of the Aquatic Nuisance Species Task Force (ANS Task Force). The ANS Task Force's purpose is to develop and implement a program for U.S. waters to prevent...

  8. Ad-Hoc Queries over Document Collections - A Case Study

    NASA Astrophysics Data System (ADS)

    Löser, Alexander; Lutter, Steffen; Düssel, Patrick; Markl, Volker

    We discuss the novel problem of supporting analytical business intelligence queries over web-based textual content, e.g., BI-style reports based on 100.000's of documents from an ad-hoc web search result. Neither conventional search engines nor conventional Business Intelligence and ETL tools address this problem, which lies at the intersection of their capabilities. "Google Squared" or our system GOOLAP.info, are examples of these kinds of systems. They execute information extraction methods over one or several document collections at query time and integrate extracted records into a common view or tabular structure. Frequent extraction and object resolution failures cause incomplete records which could not be joined into a record answering the query. Our focus is the identification of join-reordering heuristics maximizing the size of complete records answering a structured query. With respect to given costs for document extraction we propose two novel join-operations: The multi-way CJ-operator joins records from multiple relationships extracted from a single document. The two-way join-operator DJ ensures data density by removing incomplete records from results. In a preliminary case study we observe that our join-reordering heuristics positively impact result size, record density and lower execution costs.

  9. Task Force II: Energy and Its Socioeconomic Impacts

    ERIC Educational Resources Information Center

    Appalachia, 1977

    1977-01-01

    Summarizing the Task Force Issues Paper presented at the Appalachian Conference on Balanced Growth and Economic Development (1977), this article presents selected comments by Task Force participants, and Task Force recommendations re: a national severence tax on extraction of nonrenewable energy resources; socioeconomic costs of nuclear energy; a…

  10. Ad Hoc modeling, expert problem solving, and R&T program evaluation

    NASA Technical Reports Server (NTRS)

    Silverman, B. G.; Liebowitz, J.; Moustakis, V. S.

    1983-01-01

    A simplified cost and time (SCAT) analysis program utilizing personal-computer technology is presented and demonstrated in the case of the NASA-Goddard end-to-end data system. The difficulties encountered in implementing complex program-selection and evaluation models in the research and technology field are outlined. The prototype SCAT system described here is designed to allow user-friendly ad hoc modeling in real time and at low cost. A worksheet constructed on the computer screen displays the critical parameters and shows how each is affected when one is altered experimentally. In the NASA case, satellite data-output and control requirements, ground-facility data-handling capabilities, and project priorities are intricately interrelated. Scenario studies of the effects of spacecraft phaseout or new spacecraft on throughput and delay parameters are shown. The use of a network of personal computers for higher-level coordination of decision-making processes is suggested, as a complement or alternative to complex large-scale modeling.

  11. 78 FR 60306 - Aquatic Nuisance Species Task Force Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-01

    ...-FF09F14000-134] Aquatic Nuisance Species Task Force Meeting AGENCY: Fish and Wildlife Service, Interior... the Aquatic Nuisance Species (ANS) Task Force. The ANS Task Force's purpose is to develop and... Task Force will meet from 8 a.m. to 4:30 p.m. on Wednesday, November 6, through Thursday, November 7...

  12. Assessment of interbreeding and introgression of farm genes into a small Scottish Atlantic salmon Salmo salar stock: ad hoc samples - ad hoc results?

    PubMed

    Verspoor, E; Knox, D; Marshall, S

    2016-12-01

    An eclectic set of tissues and existing data, including purposely collected samples, spanning 1997-2006, was used in an ad hoc assessment of hybridization and introgression of farmed wild Atlantic salmon Salmo salar in the small Loch na Thull (LnT) catchment in north-west Scotland. The catchment is in an area of marine farm production and contains freshwater smolt rearing cages. The LnT S. salar stock was found to be genetically distinctive from stocks in neighbouring rivers and, despite regular reports of feral farm S. salar, there was no evidence of physical or genetic mixing. This cannot be completely ruled out, however, and low level mixing with other local wild stocks has been suggested. The LnT population appeared underpinned by relatively smaller effective number of breeders (N eb ) and showed relatively low levels of genetic diversity, consistent with a small effective population size. Small sample sizes, an incomplete farm baseline and the use of non-diagnostic molecular markers, constrain the power of the analysis but the findings strongly support the LnT catchment having a genetically distinct wild S. salar population little affected by interbreeding with feral farm escapes. © 2016 The Fisheries Society of the British Isles.

  13. Solar Energy Task Force Report: Technical Training Guidelines.

    ERIC Educational Resources Information Center

    O'Connor, Kevin

    This task force report offers guidelines and information for the development of vocational education programs oriented to the commercial application of solar energy in water and space heating. After Section I introduces the Solar Energy Task Force and its activities, Section II outlines the task force's objectives and raises several issues and…

  14. An epidemic model for biological data fusion in ad hoc sensor networks

    NASA Astrophysics Data System (ADS)

    Chang, K. C.; Kotari, Vikas

    2009-05-01

    Bio terrorism can be a very refined and a catastrophic approach of attacking a nation. This requires the development of a complete architecture dedicatedly designed for this purpose which includes but is not limited to Sensing/Detection, Tracking and Fusion, Communication, and others. In this paper we focus on one such architecture and evaluate its performance. Various sensors for this specific purpose have been studied. The accent has been on use of Distributed systems such as ad-hoc networks and on application of epidemic data fusion algorithms to better manage the bio threat data. The emphasis has been on understanding the performance characteristics of these algorithms under diversified real time scenarios which are implemented through extensive JAVA based simulations. Through comparative studies on communication and fusion the performance of channel filter algorithm for the purpose of biological sensor data fusion are validated.

  15. 77 FR 61019 - Aquatic Nuisance Species Task Force Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-05

    ..., Cost Center: FF09F14000, Fund: 134] Aquatic Nuisance Species Task Force Meeting AGENCY: Fish and... Aquatic Nuisance Species (ANS) Task Force. The ANS Task Force's purpose is to develop and implement a.... DATES: The ANS Task Force will meet from 8:30 a.m. to 5:00 p.m. Wednesday November 14, and from 8:30 a.m...

  16. Introduction to Blueweb: A Decentralized Scatternet Formation Algorithm for Bluetooth Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Yu, Chih-Min; Huang, Chia-Chi

    In this letter, a decentralized scatternet formation algorithm called Bluelayer is proposed. First, Bluelayer uses a designated root to construct a tree-shaped subnet and propagates an integer variable k1 called counter limit as well as a constant k in its downstream direction to determine new roots. Then each new root asks its upstream master to start a return connection procedure to convert the tree-shaped subnet into a web-shaped subnet for its immediate upstream root. At the same time, each new root repeats the same procedure as the root to build its own subnet until the whole scatternet is formed. Simulation results show that Bluelayer achieves good network scalability and generates an efficient scatternet configuration for various sizes of Bluetooth ad hoc network.

  17. Predicting impact of multi-paths on phase change in map-based vehicular ad hoc networks

    NASA Astrophysics Data System (ADS)

    Rahmes, Mark; Lemieux, George; Sonnenberg, Jerome; Chester, David B.

    2014-05-01

    Dynamic Spectrum Access, which through its ability to adapt the operating frequency of a radio, is widely believed to be a solution to the limited spectrum problem. Mobile Ad Hoc Networks (MANETs) can extend high capacity mobile communications over large areas where fixed and tethered-mobile systems are not available. In one use case with high potential impact cognitive radio employs spectrum sensing to facilitate identification of allocated frequencies not currently accessed by their primary users. Primary users own the rights to radiate at a specific frequency and geographic location, secondary users opportunistically attempt to radiate at a specific frequency when the primary user is not using it. We quantify optimal signal detection in map based cognitive radio networks with multiple rapidly varying phase changes and multiple orthogonal signals. Doppler shift occurs due to reflection, scattering, and rapid vehicle movement. Path propagation as well as vehicle movement produces either constructive or destructive interference with the incident wave. Our signal detection algorithms can assist the Doppler spread compensation algorithm by deciding how many phase changes in signals are present in a selected band of interest. Additionally we can populate a spatial radio environment map (REM) database with known information that can be leveraged in an ad hoc network to facilitate Dynamic Spectrum Access. We show how topography can help predict the impact of multi-paths on phase change, as well as about the prediction from dense traffic areas. Utilization of high resolution geospatial data layers in RF propagation analysis is directly applicable.

  18. GeoVision Exploration Task Force Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Doughty, Christine; Dobson, Patrick F.; Wall, Anna

    The GeoVision study effort included ground-breaking, detailed research on current and future market conditions and geothermal technologies in order to forecast and quantify the electric and non-electric deployment potentials under a range of scenarios, in addition to their impacts on the Nation’s jobs, economy and environment. Coordinated by the U.S. Department of Energy’s (DOE’s) Geothermal Technologies Office (GTO), the GeoVision study development relied on the collection, modeling, and analysis of robust datasets through seven national laboratory partners, which were organized into eight technical Task Force groups. The purpose of this report is to provide a central repository for the researchmore » conducted by the Exploration Task Force. The Exploration Task Force consists of four individuals representing three national laboratories: Patrick Dobson (task lead) and Christine Doughty of Lawrence Berkeley National Laboratory, Anna Wall of National Renewable Energy Laboratory, Travis McLing of Idaho National Laboratory, and Chester Weiss of Sandia National Laboratories. As part of the GeoVision analysis, our team conducted extensive scientific and financial analyses on a number of topics related to current and future geothermal exploration methods. The GeoVision Exploration Task Force complements the drilling and resource technology investigations conducted as part of the Reservoir Maintenance and Development Task Force. The Exploration Task Force however has focused primarily on early stage R&D technologies in exploration and confirmation drilling, along with an evaluation of geothermal financing challenges and assumptions, and innovative “blue-sky” technologies. This research was used to develop geothermal resource supply curves (through the use of GETEM) for use in the ReEDS capacity expansion modeling that determines geothermal technology deployment potential. It also catalogues and explores the large array of early-stage R&D technologies with the

  19. Cooperative Education and the Academy. and Response to the Preliminary Report of the Ad Hoc Committee on Cooperative Education and the Curriculum.

    ERIC Educational Resources Information Center

    Heinemann, Harry N.; And Others

    1988-01-01

    Two articles describe the final report submitted by the Ad Hoc Committee on Cooperative Education and the Curriculum to the Cooperative Education Association and the reaction to that report by the person who established the committee. (JOW)

  20. 76 FR 22685 - Interagency Management Task Force Public Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-22

    ... Force Public Meeting AGENCY: Office of Energy Efficiency and Renewable Energy, Department of Energy (DOE... meetings of the Interagency Energy Management Task Force (Task Force) in 2011. FEMP intends to hold recurring public meetings of the Task Force. Interested parties can check http://www.femp.energy.gov/news...

  1. History-based route selection for reactive ad hoc routing protocols

    NASA Astrophysics Data System (ADS)

    Medidi, Sirisha; Cappetto, Peter

    2007-04-01

    Ad hoc networks rely on cooperation in order to operate, but in a resource constrained environment not all nodes behave altruistically. Selfish nodes preserve their own resources and do not forward packets not in their own self interest. These nodes degrade the performance of the network, but judicious route selection can help maintain performance despite this behavior. Many route selection algorithms place importance on shortness of the route rather than its reliability. We introduce a light-weight route selection algorithm that uses past behavior to judge the quality of a route rather than solely on the length of the route. It draws information from the underlying routing layer at no extra cost and selects routes with a simple algorithm. This technique maintains this data in a small table, which does not place a high cost on memory. History-based route selection's minimalism suits the needs the portable wireless devices and is easy to implement. We implemented our algorithm and tested it in the ns2 environment. Our simulation results show that history-based route selection achieves higher packet delivery and improved stability than its length-based counterpart.

  2. Random Time Identity Based Firewall In Mobile Ad hoc Networks

    NASA Astrophysics Data System (ADS)

    Suman, Patel, R. B.; Singh, Parvinder

    2010-11-01

    A mobile ad hoc network (MANET) is a self-organizing network of mobile routers and associated hosts connected by wireless links. MANETs are highly flexible and adaptable but at the same time are highly prone to security risks due to the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized control. Firewall is an effective means of protecting a local network from network-based security threats and forms a key component in MANET security architecture. This paper presents a review of firewall implementation techniques in MANETs and their relative merits and demerits. A new approach is proposed to select MANET nodes at random for firewall implementation. This approach randomly select a new node as firewall after fixed time and based on critical value of certain parameters like power backup. This approach effectively balances power and resource utilization of entire MANET because responsibility of implementing firewall is equally shared among all the nodes. At the same time it ensures improved security for MANETs from outside attacks as intruder will not be able to find out the entry point in MANET due to the random selection of nodes for firewall implementation.

  3. Virtual machine-based simulation platform for mobile ad-hoc network-based cyber infrastructure

    DOE PAGES

    Yoginath, Srikanth B.; Perumalla, Kayla S.; Henz, Brian J.

    2015-09-29

    In modeling and simulating complex systems such as mobile ad-hoc networks (MANETs) in de-fense communications, it is a major challenge to reconcile multiple important considerations: the rapidity of unavoidable changes to the software (network layers and applications), the difficulty of modeling the critical, implementation-dependent behavioral effects, the need to sustain larger scale scenarios, and the desire for faster simulations. Here we present our approach in success-fully reconciling them using a virtual time-synchronized virtual machine(VM)-based parallel ex-ecution framework that accurately lifts both the devices as well as the network communications to a virtual time plane while retaining full fidelity. At themore » core of our framework is a scheduling engine that operates at the level of a hypervisor scheduler, offering a unique ability to execute multi-core guest nodes over multi-core host nodes in an accurate, virtual time-synchronized manner. In contrast to other related approaches that suffer from either speed or accuracy issues, our framework provides MANET node-wise scalability, high fidelity of software behaviors, and time-ordering accuracy. The design and development of this framework is presented, and an ac-tual implementation based on the widely used Xen hypervisor system is described. Benchmarks with synthetic and actual applications are used to identify the benefits of our approach. The time inaccuracy of traditional emulation methods is demonstrated, in comparison with the accurate execution of our framework verified by theoretically correct results expected from analytical models of the same scenarios. In the largest high fidelity tests, we are able to perform virtual time-synchronized simulation of 64-node VM-based full-stack, actual software behaviors of MANETs containing a mix of static and mobile (unmanned airborne vehicle) nodes, hosted on a 32-core host, with full fidelity of unmodified ad-hoc routing protocols, unmodified

  4. Virtual machine-based simulation platform for mobile ad-hoc network-based cyber infrastructure

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yoginath, Srikanth B.; Perumalla, Kayla S.; Henz, Brian J.

    In modeling and simulating complex systems such as mobile ad-hoc networks (MANETs) in de-fense communications, it is a major challenge to reconcile multiple important considerations: the rapidity of unavoidable changes to the software (network layers and applications), the difficulty of modeling the critical, implementation-dependent behavioral effects, the need to sustain larger scale scenarios, and the desire for faster simulations. Here we present our approach in success-fully reconciling them using a virtual time-synchronized virtual machine(VM)-based parallel ex-ecution framework that accurately lifts both the devices as well as the network communications to a virtual time plane while retaining full fidelity. At themore » core of our framework is a scheduling engine that operates at the level of a hypervisor scheduler, offering a unique ability to execute multi-core guest nodes over multi-core host nodes in an accurate, virtual time-synchronized manner. In contrast to other related approaches that suffer from either speed or accuracy issues, our framework provides MANET node-wise scalability, high fidelity of software behaviors, and time-ordering accuracy. The design and development of this framework is presented, and an ac-tual implementation based on the widely used Xen hypervisor system is described. Benchmarks with synthetic and actual applications are used to identify the benefits of our approach. The time inaccuracy of traditional emulation methods is demonstrated, in comparison with the accurate execution of our framework verified by theoretically correct results expected from analytical models of the same scenarios. In the largest high fidelity tests, we are able to perform virtual time-synchronized simulation of 64-node VM-based full-stack, actual software behaviors of MANETs containing a mix of static and mobile (unmanned airborne vehicle) nodes, hosted on a 32-core host, with full fidelity of unmodified ad-hoc routing protocols, unmodified

  5. 32 CFR 700.1053 - Commander of a task force.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Commander of a task force. 700.1053 Section 700... Command Detail to Duty § 700.1053 Commander of a task force. (a) A geographic fleet commander, and any other naval commander, may detail in command of a task force, or other task command, any eligible...

  6. Modern foreign language teachers - don't leave those kids alone! Linguistic-cultural "give and take" in an ad-hoc tutoring scheme

    NASA Astrophysics Data System (ADS)

    Leroy, Norah

    2017-08-01

    This paper addresses the theme of social inclusion through language learning. The focus is on an ad-hoc tutoring scheme set up between newly arrived British migrant pupils and French monolingual pupils in a small secondary school in the south-west of France. Though the original objective of this tutoring scheme was to improve the English skills of the younger pupils, feedback reports indicated that it also had a positive impact on the relationship between the British migrant pupils and their French peers. Teachers believed that those involved participated more fully in class, and appeared more self-assured and generally happy thanks to the interpersonal relationships this scheme helped to forge. This study demonstrates the necessity of analysing the socio-cultural context migrants may find themselves in, in order to identify potential challenges. The ad-hoc tutoring scheme described here is an example of how language learning can support the integration and inclusion of "new generation" migrants into everyday school life.

  7. Functional Fixedness in Creative Thinking Tasks Depends on Stimulus Modality.

    PubMed

    Chrysikou, Evangelia G; Motyka, Katharine; Nigro, Cristina; Yang, Song-I; Thompson-Schill, Sharon L

    2016-11-01

    Pictorial examples during creative thinking tasks can lead participants to fixate on these examples and reproduce their elements even when yielding suboptimal creative products. Semantic memory research may illuminate the cognitive processes underlying this effect. Here, we examined whether pictures and words differentially influence access to semantic knowledge for object concepts depending on whether the task is close- or open-ended. Participants viewed either names or pictures of everyday objects, or a combination of the two, and generated common, secondary, or ad hoc uses for them. Stimulus modality effects were assessed quantitatively through reaction times and qualitatively through a novel coding system, which classifies creative output on a continuum from top-down-driven to bottom-up-driven responses. Both analyses revealed differences across tasks. Importantly, for ad hoc uses, participants exposed to pictures generated more top-down-driven responses than those exposed to object names. These findings have implications for accounts of functional fixedness in creative thinking, as well as theories of semantic memory for object concepts.

  8. The development of contact force construction in the dynamic-contact task of cycling [corrected].

    PubMed

    Brown, Nicholas A T; Jensen, Jody L

    2003-01-01

    Purposeful movement requires that an individual produce appropriate joint torques to accelerate segments, and when environmental contact is involved, to develop task-appropriate contact forces. Developmental research has been confined largely to the mastery of unconstrained movement skills (pointing, kicking). The purpose of this study was to study the developmental progression that characterizes the interaction of muscular and non-muscular forces in tasks constrained by contact with the environment. Seven younger children (YC, 6-8 years), 7 older children (OC, 9-11 years) and 7 adults (AD) pedaled an ergometer (80 rpm) at an anthropometrically scaled cycling power. Resultant forces measured at the pedal's surface were decomposed into muscle, inertia and gravity components. Muscle pedal forces were further examined in terms of the underlying lower extremity joint torques and kinematic weights that constitute the muscular component of the pedal force. Data showed children applied muscle forces to the pedal in a significantly different manner compared to adults, and that this was due to the children's lower segmental mass and inertia. The children adjusted the contribution of the proximal joint muscle torques to compensate for reduced contributions to the resultant pedal force by gravitational and inertial components. These data show that smaller segmental mass and inertia limit younger children's ability to construct the dynamic-contact task of cycling in an adult-like form. On the basis of these results, however, the children's response was not "immature". Rather, the results show a task-appropriate adaptation to lower segmental mass and inertia. Copyright 2002 Elsevier Science Ltd.

  9. 2015 International PV Quality Assurance Task Force (PVQAT) Workshop |

    Science.gov Websites

    Photovoltaic Research | NREL International PV Quality Assurance Task Force (PVQAT) Workshop 2015 International PV Quality Assurance Task Force (PVQAT) Workshop Wednesday, February 25, 2015 Chairs : Tony Sample and Masaaki Yamamichi The 2015 International PV Quality Assurance Task Force (PVQAT

  10. 75 FR 32186 - Task Force on Community Preventive Services

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-07

    ... by space available. Purpose: The mission of the Task Force is to develop and publish the Guide to... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention Task Force on Community Preventive Services Name: Task Force on Community Preventive Services meeting. Times and Dates: 8...

  11. 77 FR 16256 - Aquatic Nuisance Species Task Force Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-20

    ...] Aquatic Nuisance Species Task Force Meeting AGENCY: Fish and Wildlife Service, Interior. ACTION: Notice of meeting. SUMMARY: This notice announces a meeting of the Aquatic Nuisance Species (ANS) Task Force. The ANS Task Force's purpose is to develop and implement a program for U.S. waters to prevent introduction...

  12. 75 FR 70764 - Small Business Information Security Task Force

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-18

    ... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... Task Force. Chairman, Rusty Pickens, called the meeting to order on October 13, 2010 at 1 p.m. Roll...

  13. 7 CFR 1900.6 - Chair, Loan Resolution Task Force.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Chair, Loan Resolution Task Force. 1900.6 Section... AGRICULTURE PROGRAM REGULATIONS GENERAL Delegations of Authority § 1900.6 Chair, Loan Resolution Task Force. The Chair, Loan Resolution Task Force is delegated the following authorities, to be exercised until...

  14. 76 FR 5232 - Small Business Information Security Task Force

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-28

    ... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... Task Force. Chairman, Rusty Pickens, called the meeting to order on December 8, 2010 at 1 p.m. Roll...

  15. 76 FR 11307 - Small Business Information Security Task Force

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-01

    ... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... Task Force. Chairman, Mr. Rusty Pickens, called the meeting to order on January 12, 2011 at 1 p.m. Roll...

  16. On mobile wireless ad hoc IP video transports

    NASA Astrophysics Data System (ADS)

    Kazantzidis, Matheos

    2006-05-01

    Multimedia transports in wireless, ad-hoc, multi-hop or mobile networks must be capable of obtaining information about the network and adaptively tune sending and encoding parameters to the network response. Obtaining meaningful metrics to guide a stable congestion control mechanism in the transport (i.e. passive, simple, end-to-end and network technology independent) is a complex problem. Equally difficult is obtaining a reliable QoS metrics that agrees with user perception in a client/server or distributed environment. Existing metrics, objective or subjective, are commonly used after or before to test or report on a transmission and require access to both original and transmitted frames. In this paper, we propose that an efficient and successful video delivery and the optimization of overall network QoS requires innovation in a) a direct measurement of available and bottleneck capacity for its congestion control and b) a meaningful subjective QoS metric that is dynamically reported to video sender. Once these are in place, a binomial -stable, fair and TCP friendly- algorithm can be used to determine the sending rate and other packet video parameters. An adaptive mpeg codec can then continually test and fit its parameters and temporal-spatial data-error control balance using the perceived QoS dynamic feedback. We suggest a new measurement based on a packet dispersion technique that is independent of underlying network mechanisms. We then present a binomial control based on direct measurements. We implement a QoS metric that is known to agree with user perception (MPQM) in a client/server, distributed environment by using predetermined table lookups and characterization of video content.

  17. Report of the Fermilab ILC Citizens' Task Force

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    Fermi National Accelerator Laboratory convened the ILC Citizens' Task Force to provide guidance and advice to the laboratory to ensure that community concerns and ideas are included in all public aspects of planning and design for a proposed future accelerator, the International Linear Collider. In this report, the members of the Task Force describe the process they used to gather and analyze information on all aspects of the proposed accelerator and its potential location at Fermilab in northern Illinois. They present the conclusions and recommendations they reached as a result of the learning process and their subsequent discussions and deliberations.more » While the Task Force was charged to provide guidance on the ILC, it became clear during the process that the high cost of the proposed accelerator made a near-term start for the project at Fermilab unlikely. Nevertheless, based on a year of extensive learning and dialogue, the Task Force developed a series of recommendations for Fermilab to consider as the laboratory develops all successor projects to the Tevatron. The Task Force recognizes that bringing a next-generation particle physics project to Fermilab will require both a large international effort and the support of the local community. While the Task Force developed its recommendations in response to the parameters of a future ILC, the principles they set forth apply directly to any large project that may be conceived at Fermilab, or at other laboratories, in the future. With this report, the Task Force fulfills its task of guiding Fermilab from the perspective of the local community on how to move forward with a large-scale project while building positive relationships with surrounding communities. The report summarizes the benefits, concerns and potential impacts of bringing a large-scale scientific project to northern Illinois.« less

  18. 75 FR 61175 - Aquatic Nuisance Species Task Force Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-04

    ...] Aquatic Nuisance Species Task Force Meeting AGENCY: Fish and Wildlife Service, Interior. ACTION: Notice of meeting. SUMMARY: This notice announces a meeting of the Aquatic Nuisance Species (ANS) Task Force. The.... DATES: The ANS Task Force will meet from 8 a.m. to 5 p.m. on Wednesday, November 3 through Thursday...

  19. ACHP | Archeology Task Force

    Science.gov Websites

    Task Force ACHP adopts new Policy Statement Regarding Treatment of Burial Sites, Human Remains, and Treatment of Human Remains and Grave Goods;" A new human remains policy statement was adopted in

  20. Inter-Association Task Force Report on Image.

    ERIC Educational Resources Information Center

    Special Libraries Association, Washington, DC.

    In 1988, the Board of Directors of the Special Libraries Association provided funding to a task force to gather data which would determine how certain segments of society perceive librarians, how librarians view themselves and their colleagues, and to provide recommendations for addressing the issue of image. The task force project consisted of…

  1. Hierarchical auto-configuration addressing in mobile ad hoc networks (HAAM)

    NASA Astrophysics Data System (ADS)

    Ram Srikumar, P.; Sumathy, S.

    2017-11-01

    Addressing plays a vital role in networking to identify devices uniquely. A device must be assigned with a unique address in order to participate in the data communication in any network. Different protocols defining different types of addressing are proposed in literature. Address auto-configuration is a key requirement for self organizing networks. Existing auto-configuration based addressing protocols require broadcasting probes to all the nodes in the network before assigning a proper address to a new node. This needs further broadcasts to reflect the status of the acquired address in the network. Such methods incur high communication overheads due to repetitive flooding. To address this overhead, a new partially stateful address allocation scheme, namely Hierarchical Auto-configuration Addressing (HAAM) scheme is extended and proposed. Hierarchical addressing basically reduces latency and overhead caused during address configuration. Partially stateful addressing algorithm assigns addresses without the need for flooding and global state awareness, which in turn reduces the communication overhead and space complexity respectively. Nodes are assigned addresses hierarchically to maintain the graph of the network as a spanning tree which helps in effectively avoiding the broadcast storm problem. Proposed algorithm for HAAM handles network splits and merges efficiently in large scale mobile ad hoc networks incurring low communication overheads.

  2. Performance Improvement in Geographic Routing for Vehicular Ad Hoc Networks

    PubMed Central

    Kaiwartya, Omprakash; Kumar, Sushil; Lobiyal, D. K.; Abdullah, Abdul Hanan; Hassan, Ahmed Nazar

    2014-01-01

    Geographic routing is one of the most investigated themes by researchers for reliable and efficient dissemination of information in Vehicular Ad Hoc Networks (VANETs). Recently, different Geographic Distance Routing (GEDIR) protocols have been suggested in the literature. These protocols focus on reducing the forwarding region towards destination to select the Next Hop Vehicles (NHV). Most of these protocols suffer from the problem of elevated one-hop link disconnection, high end-to-end delay and low throughput even at normal vehicle speed in high vehicle density environment. This paper proposes a Geographic Distance Routing protocol based on Segment vehicle, Link quality and Degree of connectivity (SLD-GEDIR). The protocol selects a reliable NHV using the criteria segment vehicles, one-hop link quality and degree of connectivity. The proposed protocol has been simulated in NS-2 and its performance has been compared with the state-of-the-art protocols: P-GEDIR, J-GEDIR and V-GEDIR. The empirical results clearly reveal that SLD-GEDIR has lower link disconnection and end-to-end delay, and higher throughput as compared to the state-of-the-art protocols. It should be noted that the performance of the proposed protocol is preserved irrespective of vehicle density and speed. PMID:25429415

  3. Performance improvement in geographic routing for Vehicular Ad Hoc Networks.

    PubMed

    Kaiwartya, Omprakash; Kumar, Sushil; Lobiyal, D K; Abdullah, Abdul Hanan; Hassan, Ahmed Nazar

    2014-11-25

    Geographic routing is one of the most investigated themes by researchers for reliable and efficient dissemination of information in Vehicular Ad Hoc Networks (VANETs). Recently, different Geographic Distance Routing (GEDIR) protocols have been suggested in the literature. These protocols focus on reducing the forwarding region towards destination to select the Next Hop Vehicles (NHV). Most of these protocols suffer from the problem of elevated one-hop link disconnection, high end-to-end delay and low throughput even at normal vehicle speed in high vehicle density environment. This paper proposes a Geographic Distance Routing protocol based on Segment vehicle, Link quality and Degree of connectivity (SLD-GEDIR). The protocol selects a reliable NHV using the criteria segment vehicles, one-hop link quality and degree of connectivity. The proposed protocol has been simulated in NS-2 and its performance has been compared with the state-of-the-art protocols: P-GEDIR, J-GEDIR and V-GEDIR. The empirical results clearly reveal that SLD-GEDIR has lower link disconnection and end-to-end delay, and higher throughput as compared to the state-of-the-art protocols. It should be noted that the performance of the proposed protocol is preserved irrespective of vehicle density and speed.

  4. 76 FR 15334 - Aquatic Nuisance Species Task Force Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-21

    ...] Aquatic Nuisance Species Task Force Meeting AGENCY: Fish and Wildlife Service, Interior. ACTION: Notice of meeting. SUMMARY: This notice announces a meeting of the Aquatic Nuisance Species (ANS) Task Force. The.... DATES: The ANS Task Force will meet from 8 a.m. to 5 p.m. on Wednesday, May 4; and Thursday May 5; and...

  5. Childhood Obesity Task Forces Established by State Legislatures, 2001-2010

    PubMed Central

    Kim, Sonia A.; Sherry, Bettylou; Blanck, Heidi M.

    2013-01-01

    Introduction States and communities are considering policy and environmental strategies, including enacting legislation, to reduce and prevent childhood obesity. One legislative approach has been to create task forces to understand key issues and develop a course of action. The goal of this study was to describe state-level, childhood obesity task forces in the United States created by legislation from 2001 through 2010. Methods We used the Center for Disease Control and Prevention’s Division of Nutrition, Physical Activity, and Obesity database to identify state-level childhood obesity task forces created through legislation from 2001 through 2010. Results We identified 21 states that had enacted legislation creating childhood obesity task forces of which 6 had created more than one task force. Most task forces were charged with both gathering and reviewing information and making recommendations for obesity-prevention actions in the state. Most legislation required that task forces include representation from the state legislature, state agencies, community organizations, and community members. Conclusion Evaluation of the effectiveness of obesity-prevention task forces and the primary components that contribute to their success may help to determine the advantages of the use of such strategies in obesity prevention. PMID:23987250

  6. Report of the Social Studies Task Force.

    ERIC Educational Resources Information Center

    Gathman, John; And Others

    In 1982 the Colorado Board of Education directed the State Board of Education to organize task forces to address a variety of state educational needs. This report, presented by the Social Studies Task Force, explains the group's purposes and concerns, provides a social studies definition, and outlines the Colorado grades K-12 social studies…

  7. 75 FR 15457 - Aquatic Nuisance Species Task Force Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-29

    ...] Aquatic Nuisance Species Task Force Meeting AGENCY: Fish and Wildlife Service, Interior. ACTION: Notice of meeting. SUMMARY: This notice announces a meeting of the Aquatic Nuisance Species (ANS) Task Force. The.... DATES: The ANS Task Force will meet from 8 a.m. to 5 p.m. on Wednesday, May 5, and from 8 a.m. to 5 p.m...

  8. Power system restoration - A task force report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Adibi, M.; Clelland, P.; Fink, L.

    1986-01-01

    The IEEE PES System Operation Subcommittee has established the Power System Restoration Task Force to: review operating practices, conduct a literature search, prepare relevant glossaries and bibliographies, and promote information exchange through technical papers. This is the first report of the Task Force. The problem of bulk power system restoration following a complete or partial collapse is practically as old as the electric utility industry itself. Many electric utilities have developed over the years system restoration schemes that meet the needs of their particular systems. These plans provide a great deal of insight into how the restorative process is viewedmore » by operating and planning personnel and what concerns and constraints any plan must operate under. The body of the report consists of notes prepared by members of the Task Force. It should not be interred that a complete reporting on Power System Restoration is undertaken here. The intent is to report upon work of the Task Force to date. The report also reviews several different restoration plans and shows their common concerns and constraints.« less

  9. The AAPT Advanced Laboratory Task Force Report

    NASA Astrophysics Data System (ADS)

    Dunham, Jeffrey

    2008-04-01

    In late 2005, the American Association of Physics Teachers (AAPT) assembled a seven-member Advanced Laboratory Task Force^ to recommend ways that AAPT could increase the degree and effectiveness of its interactions with physics teachers of upper-division physics laboratories, with the ultimate goal of improving the teaching of advanced laboratories. The task force completed its work during the first half of 2006 and its recommendations were presented to the AAPT Executive Committee in July 2006. This talk will present the recommendations of the task force and actions taken by AAPT in response to them. The curricular goals of the advanced laboratory course at various institutions will also be discussed. The talk will conclude with an appeal to the APS membership to support ongoing efforts to revitalize advanced laboratory course instruction. ^Members of the Advanced Laboratory Task Force: Van Bistrow, University of Chicago; Bob DeSerio, University of Florida; Jeff Dunham, Middlebury College (Chair); Elizabeth George, Wittenburg University; Daryl Preston, California State University, East Bay; Patricia Sparks, Harvey Mudd College; Gerald Taylor, James Madison University; and David Van Baak, Calvin College.

  10. Preserving Nevada's Environmental Heritage: A Report of the Ad Hoc Committee on Environmental Quality. Final Report to the Governor's Natural Resources Council.

    ERIC Educational Resources Information Center

    Nevada State Dept. of Conservation and Natural Resources, Carson City.

    The Environmental Quality Ad Hoc Committee has prepared this report for the Governor's Natural Resources Council (Nevada). It is a compilation of available factual data focusing attention on needed statutory and administrative changes to preserve Nevada's environmental heritage and from which recommendations for future budgetary and legislative…

  11. TASK FORCE REPORT ON ASSESSMENT AND EVALUATION.

    ERIC Educational Resources Information Center

    MORRIS, ROBERT

    THE TASK FORCE ON ASSESSMENT AND EVALUATION HAS BEEN CHARGED TO RECOMMEND THE MOST EFFECTIVE MEANS FOR ASSESSING AND EVALUATING THE SHORT-TERM ACTIVITIES AND THE LONG-TERM ACHIEVEMENTS OF ACTION FOR BOSTON COMMUNITY DEVELOPMENT. THE GENERAL OBJECTIVES OF THE TASK FORCE ARE--THE ANALYSIS OF DATA RELEVANT FOR EVALUATING DAY-BY-DAY DECISION-MAKING,…

  12. A novel unbalanced multiple description coder for robust video transmission over ad hoc wireless networks

    NASA Astrophysics Data System (ADS)

    Huang, Feng; Sun, Lifeng; Zhong, Yuzhuo

    2006-01-01

    Robust transmission of live video over ad hoc wireless networks presents new challenges: high bandwidth requirements are coupled with delay constraints; even a single packet loss causes error propagation until a complete video frame is coded in the intra-mode; ad hoc wireless networks suffer from bursty packet losses that drastically degrade the viewing experience. Accordingly, we propose a novel UMD coder capable of quickly recovering from losses and ensuring continuous playout. It uses 'peg' frames to prevent error propagation in the High-Resolution (HR) description and improve the robustness of key frames. The Low-Resolution (LR) coder works independent of the HR one, but they can also help each other recover from losses. Like many UMD coders, our UMD coder is drift-free, disruption-tolerant and able to make good use of the asymmetric available bandwidths of multiple paths. The simulation results under different conditions show that the proposed UMD coder has the highest decoded quality and lowest probability of pause when compared with concurrent UMDC techniques. The coder also has a comparable decoded quality, lower startup delay and lower probability of pause than a state-of-the-art FEC-based scheme. To provide robustness for video multicast applications, we propose non-end-to-end UMDC-based video distribution over a multi-tree multicast network. The multiplicity of parents decorrelates losses and the non-end-to-end feature increases the throughput of UMDC video data. We deploy an application-level service of LR description reconstruction in some intermediate nodes of the LR multicast tree. The principle behind this is to reconstruct the disrupted LR frames by the correctly received HR frames. As a result, the viewing experience at the downstream nodes benefits from the protection reconstruction at the upstream nodes.

  13. A guide for statewide impaired-driving task forces.

    DOT National Transportation Integrated Search

    2009-09-01

    The purpose of the guide is to assist State officials and other stakeholders who are interested in establishing an : Impaired-Driving Statewide Task Force or who are exploring ways to improve their current Task Force. The guide : addresses issues suc...

  14. 78 FR 29378 - Aquatic Nuisance Species Task Force; Public Teleconference/Webinar

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-20

    ...-FF09F14000-134] Aquatic Nuisance Species Task Force; Public Teleconference/ Webinar AGENCY: Fish and Wildlife... teleconference/webinar of the Aquatic Nuisance Species Task Force (ANS Task Force). The ANS Task Force's purpose... aquatic nuisance species; to monitor, control, and study such species; and to disseminate related...

  15. Life Cycles of Ad Hoc Task Groups

    DTIC Science & Technology

    1983-10-01

    Rick’s Cafe after work. . 25 Alexandra: You have connections? 26 Ken: Yes! ൣ Alexandra: You can be the industrial spy! (Pause) We don’t really need...with franchising --he could do a whole business strictly dealing with spare parts. We have to describe these packages and describe how to... (words

  16. Modern Foreign Language Teachers--Don't Leave Those Kids Alone! Linguistic-Cultural "Give and Take" in an Ad-Hoc Tutoring Scheme

    ERIC Educational Resources Information Center

    Leroy, Norah

    2017-01-01

    This paper addresses the theme of social inclusion through language learning. The focus is on an ad-hoc tutoring scheme set up between newly arrived British migrant pupils and French monolingual pupils in a small secondary school in the south-west of France. Though the original objective of this tutoring scheme was to improve the English skills of…

  17. Impact of Beamforming on the Path Connectivity in Cognitive Radio Ad Hoc Networks

    PubMed Central

    Dung, Le The; Hieu, Tran Dinh; Choi, Seong-Gon; Kim, Byung-Seo; An, Beongku

    2017-01-01

    This paper investigates the impact of using directional antennas and beamforming schemes on the connectivity of cognitive radio ad hoc networks (CRAHNs). Specifically, considering that secondary users use two kinds of directional antennas, i.e., uniform linear array (ULA) and uniform circular array (UCA) antennas, and two different beamforming schemes, i.e., randomized beamforming and center-directed to communicate with each other, we study the connectivity of all combination pairs of directional antennas and beamforming schemes and compare their performances to those of omnidirectional antennas. The results obtained in this paper show that, compared with omnidirectional transmission, beamforming transmission only benefits the connectivity when the density of secondary user is moderate. Moreover, the combination of UCA and randomized beamforming scheme gives the highest path connectivity in all evaluating scenarios. Finally, the number of antenna elements and degree of path loss greatly affect path connectivity in CRAHNs. PMID:28346377

  18. Use of synthesized data to support complex ad-hoc queries in an enterprise information warehouse: a diabetes use case.

    PubMed

    Rogers, Patrick; Erdal, Selnur; Santangelo, Jennifer; Liu, Jianhua; Schuster, Dara; Kamal, Jyoti

    2008-11-06

    The Ohio State University Medical Center (OSUMC) Information Warehouse (IW) is a comprehensive data warehousing facility incorporating operational, clinical, and biological data sets from multiple enterprise system. It is common for users of the IW to request complex ad-hoc queries that often require significant intervention by data analyst. In response to this challenge, we have designed a workflow that leverages synthesized data elements to support such queries in an more timely, efficient manner.

  19. Functional Fixedness in Creative Thinking Tasks Depends on Stimulus Modality

    PubMed Central

    Chrysikou, Evangelia G.; Motyka, Katharine; Nigro, Cristina; Yang, Song-I; Thompson-Schill, Sharon L.

    2015-01-01

    Pictorial examples during creative thinking tasks can lead participants to fixate on these examples and reproduce their elements even when yielding suboptimal creative products. Semantic memory research may illuminate the cognitive processes underlying this effect. Here, we examined whether pictures and words differentially influence access to semantic knowledge for object concepts depending on whether the task is close- or open-ended. Participants viewed either names or pictures of everyday objects, or a combination of the two, and generated common, secondary, or ad hoc uses for them. Stimulus modality effects were assessed quantitatively through reaction times and qualitatively through a novel coding system, which classifies creative output on a continuum from top-down-driven to bottom-up-driven responses. Both analyses revealed differences across tasks. Importantly, for ad hoc uses, participants exposed to pictures generated more top-down-driven responses than those exposed to object names. These findings have implications for accounts of functional fixedness in creative thinking, as well as theories of semantic memory for object concepts. PMID:28344724

  20. Gulf Coast Ecosystem Restoration Task Force Meeting and Public Listening

    Science.gov Websites

    Data Media & News Publications Press Releases Story Archive Home Gulf Coast Ecosystem Restoration Task Force Meeting and Public Listening Session Gulf Coast Ecosystem Restoration Task Force Meeting and Title: Gulf Coast Ecosystem Restoration Task Force Meeting and Public Listening SessionDescription: The

  1. Securing mobile ad hoc networks using danger theory-based artificial immune algorithm.

    PubMed

    Abdelhaq, Maha; Alsaqour, Raed; Abdelhaq, Shawkat

    2015-01-01

    A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs.

  2. Securing Mobile Ad Hoc Networks Using Danger Theory-Based Artificial Immune Algorithm

    PubMed Central

    2015-01-01

    A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs. PMID:25946001

  3. Distributive routing and congestion control in wireless multihop ad hoc communication networks

    NASA Astrophysics Data System (ADS)

    Glauche, Ingmar; Krause, Wolfram; Sollacher, Rudolf; Greiner, Martin

    2004-10-01

    Due to their inherent complexity, engineered wireless multihop ad hoc communication networks represent a technological challenge. Having no mastering infrastructure the nodes have to selforganize themselves in such a way that for example network connectivity, good data traffic performance and robustness are guaranteed. In this contribution the focus is on routing and congestion control. First, random data traffic along shortest path routes is studied by simulations as well as theoretical modeling. Measures of congestion like end-to-end time delay and relaxation times are given. A scaling law of the average time delay with respect to network size is revealed and found to depend on the underlying network topology. In the second step, a distributive routing and congestion control is proposed. Each node locally propagates its routing cost estimates and information about its congestion state to its neighbors, which then update their respective cost estimates. This allows for a flexible adaptation of end-to-end routes to the overall congestion state of the network. Compared to shortest-path routing, the critical network load is significantly increased.

  4. Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey

    PubMed Central

    Islam, A. K. M. Muzahidul; Baharun, Sabariah; Mansoor, Nafees

    2017-01-01

    New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR) and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC) protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN). First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective. PMID:28926952

  5. ACHP | Archeology Task Force

    Science.gov Websites

    Statement Regarding Treatment of Human Remains and Grave Goods," the Task Force first developed six Intent to Reconsider the Advisory Council's "Policy Statement Regarding Treatment of Human Remains Reconsider the Advisory Council's "Policy Statement Regarding Treatment of Human Remains and Grave Goods

  6. 3VSR: Three Valued Secure Routing for Vehicular Ad Hoc Networks using Sensing Logic in Adversarial Environment

    PubMed Central

    Wang, Liangmin

    2018-01-01

    Today IoT integrate thousands of inter networks and sensing devices e.g., vehicular networks, which are considered to be challenging due to its high speed and network dynamics. The goal of future vehicular networks is to improve road safety, promote commercial or infotainment products and to reduce the traffic accidents. All these applications are based on the information exchange among nodes, so not only reliable data delivery but also the authenticity and credibility of the data itself are prerequisite. To cope with the aforementioned problem, trust management come up as promising candidate to conduct node’s transaction and interaction management, which requires distributed mobile nodes cooperation for achieving design goals. In this paper, we propose a trust-based routing protocol i.e., 3VSR (Three Valued Secure Routing), which extends the widely used AODV (Ad hoc On-demand Distance Vector) routing protocol and employs the idea of Sensing Logic-based trust model to enhance the security solution of VANET (Vehicular Ad-Hoc Network). The existing routing protocol are mostly based on key or signature-based schemes, which off course increases computation overhead. In our proposed 3VSR, trust among entities is updated frequently by means of opinion derived from sensing logic due to vehicles random topologies. In 3VSR the theoretical capabilities are based on Dirichlet distribution by considering prior and posterior uncertainty of the said event. Also by using trust recommendation message exchange, nodes are able to reduce computation and routing overhead. The simulated results shows that the proposed scheme is secure and practical. PMID:29538314

  7. 3VSR: Three Valued Secure Routing for Vehicular Ad Hoc Networks using Sensing Logic in Adversarial Environment.

    PubMed

    Sohail, Muhammad; Wang, Liangmin

    2018-03-14

    Today IoT integrate thousands of inter networks and sensing devices e.g., vehicular networks, which are considered to be challenging due to its high speed and network dynamics. The goal of future vehicular networks is to improve road safety, promote commercial or infotainment products and to reduce the traffic accidents. All these applications are based on the information exchange among nodes, so not only reliable data delivery but also the authenticity and credibility of the data itself are prerequisite. To cope with the aforementioned problem, trust management come up as promising candidate to conduct node's transaction and interaction management, which requires distributed mobile nodes cooperation for achieving design goals. In this paper, we propose a trust-based routing protocol i.e., 3VSR (Three Valued Secure Routing), which extends the widely used AODV (Ad hoc On-demand Distance Vector) routing protocol and employs the idea of Sensing Logic-based trust model to enhance the security solution of VANET (Vehicular Ad-Hoc Network). The existing routing protocol are mostly based on key or signature-based schemes, which off course increases computation overhead. In our proposed 3VSR, trust among entities is updated frequently by means of opinion derived from sensing logic due to vehicles random topologies. In 3VSR the theoretical capabilities are based on Dirichlet distribution by considering prior and posterior uncertainty of the said event. Also by using trust recommendation message exchange, nodes are able to reduce computation and routing overhead. The simulated results shows that the proposed scheme is secure and practical.

  8. Endpoints for Pre-Dementia AD Trials: A Report from the EU/US/CTAD Task Force

    PubMed Central

    Vellas, B.; Bateman, R.; Blennow, K.; Frisoni, G.; Johnson, K.; Katz, R.; Langbaum, J.; Marson, D.; Sperling, R.; Wessels, A.; Salloway, S.; Doody, R.; Aisen, P.

    2015-01-01

    For Alzheimer’s disease treatment trials that focus on the pre-dementia stage of disease, outcome measures are needed that will enable assessment of disease progression in patients who are clinically normal. The EU/US CTAD Task Force, an international collaboration of investigators from industry, academia, non-profit foundations, and regulatory agencies, met in Philadelphia, Pennsylvania, USA, on November 19, 2014 to discuss existing and novel outcome assessments that may be useful in pre-dementia trials. Composite measures that assess changes in episodic memory, executive function, global cognition, and global function have recently been developed by a number of groups and appear to be sensitive at this stage. Functional measures that involve real-life complex tasks also appear to capture early subtle changes in pre-dementia subjects and have the advantage of representing clinically meaningful change. Patient reported outcomes and novel CSF and imaging biomarkers have also shown promise. More studies are needed to validate all of these tests in the pre-dementia population. Many of them have been incorporated as exploratory measures in ongoing or planned trials. PMID:26247004

  9. 78 FR 63208 - UPDATE-Meeting of the Community Preventive Services Task Force (Task Force)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-23

    ..., and issues recommendations. These recommendations provide evidence-based options from which decision makers in communities, companies, health departments, health plans and healthcare systems, non..., available resources, and constraints of their constituents. The Task Force's recommendations, along with the...

  10. Ad-hoc and context-dependent adjustments of selective attention in conflict control: an ERP study with visual probes.

    PubMed

    Nigbur, R; Schneider, J; Sommer, W; Dimigen, O; Stürmer, B

    2015-02-15

    Cognitive conflict control in flanker tasks has often been described using the zoom-lens metaphor of selective attention. However, whether and how selective attention - in terms of suppression and enhancement - operates in this context has remained unclear. To examine the dynamic interplay of selective attention and cognitive control we used electrophysiological measures and presented task-irrelevant visual probe stimuli at foveal, parafoveal, and peripheral display positions. Target-flanker congruency varied either randomly from trial to trial (mixed-block) or block-wise (fixed-block) in order to induce reactive versus proactive control modes, respectively. Three EEG measures were used to capture ad-hoc adjustments within trials as well as effects of context-based predictions: the N1 component of the visual evoked potential (VEP) to probes, the VEP to targets, and the conflict-related midfrontal N2 component. Results from probe-VEPs indicate that enhanced processing of the foveal target rather than suppression of the peripheral flankers supports interference control. In incongruent mixed-block trials VEPs were larger to probes near the targets. In the fixed-blocks probe-VEPs were not modulated, but contrary to the mixed-block the preceding target-related VEP was affected by congruency. Results of the control-related N2 reveal largest amplitudes in the unpredictable context, which did not differentiate for stimulus and response incongruency. In contrast, in the predictable context, N2 amplitudes were reduced overall and differentiated between stimulus and response incongruency. Taken together these results imply that predictability alters interference control by a reconfiguration of stimulus processing. During unpredictable sequences participants adjust their attentional focus dynamically on a trial-by-trial basis as reflected in congruency-dependent probe-VEP-modulation. This reactive control mode also elicits larger N2 amplitudes. In contrast, when task demands

  11. Magnus force effect in optical manipulation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cipparrone, Gabriella; Pagliusi, Pasquale; Istituto per i Processi Chimici e Fisici, Consiglio Nazionale delle Ricerche, Ponte P. Bucci, Cubo 33B, I-87036 Rende

    2011-07-15

    The effect of the Magnus force in optical micromanipulation has been observed. An ad hoc experiment has been designed based on a one-dimensional optical trap that carries angular momentum. The observed particle dynamics reveals the occurrence of this hydrodynamic force, which is neglected in the common approach. Its measured value is larger than the one predicted by the existing theoretical models for micrometric particles and low Reynolds number, showing that the Magnus force can contribute to unconventional optohydrodynamic trapping and manipulation.

  12. Hop Optimization and Relay Node Selection in Multi-hop Wireless Ad-Hoc Networks

    NASA Astrophysics Data System (ADS)

    Li, Xiaohua(Edward)

    In this paper we propose an efficient approach to determine the optimal hops for multi-hop ad hoc wireless networks. Based on the assumption that nodes use successive interference cancellation (SIC) and maximal ratio combining (MRC) to deal with mutual interference and to utilize all the received signal energy, we show that the signal-to-interference-plus-noise ratio (SINR) of a node is determined only by the nodes before it, not the nodes after it, along a packet forwarding path. Based on this observation, we propose an iterative procedure to select the relay nodes and to calculate the path SINR as well as capacity of an arbitrary multi-hop packet forwarding path. The complexity of the algorithm is extremely low, and scaling well with network size. The algorithm is applicable in arbitrarily large networks. Its performance is demonstrated as desirable by simulations. The algorithm can be helpful in analyzing the performance of multi-hop wireless networks.

  13. Real-Time Support on IEEE 802.11 Wireless Ad-Hoc Networks: Reality vs. Theory

    NASA Astrophysics Data System (ADS)

    Kang, Mikyung; Kang, Dong-In; Suh, Jinwoo

    The usable throughput of an IEEE 802.11 system for an application is much less than the raw bandwidth. Although 802.11b has a theoretical maximum of 11Mbps, more than half of the bandwidth is consumed by overhead leaving at most 5Mbps of usable bandwidth. Considering this characteristic, this paper proposes and analyzes a real-time distributed scheduling scheme based on the existing IEEE 802.11 wireless ad-hoc networks, using USC/ISI's Power Aware Sensing Tracking and Analysis (PASTA) hardware platform. We compared the distributed real-time scheduling scheme with the real-time polling scheme to meet deadline, and compared a measured real bandwidth with a theoretical result. The theoretical and experimental results show that the distributed scheduling scheme can guarantee real-time traffic and enhances the performance up to 74% compared with polling scheme.

  14. Human Health Effects, Task Force Assessment, Preliminary Report.

    ERIC Educational Resources Information Center

    Aronow, Wilbert S.; And Others

    Presented in this preliminary report is one of seven assessments conducted by a special task force of Project Clean Air, the Human Health Effects Task Force. The reports summarize assessments of the state of knowledge on various air pollution problems, particularly in California, and make tentative recommendations as to what the University of…

  15. Keepin' On: Five Years Down the Road to Better Schools. Reports of the Task Force on Improving Kentucky's Schools and the Task Force on Restructuring Time and Learning.

    ERIC Educational Resources Information Center

    Prichard Committee for Academic Excellence, Lexington, KY.

    This report contains the findings of two task forces established during 1994 by the Prichard Committee for Academic Excellence: (1) the Task Force on Improving Kentucky Schools; and (2) the Task Force on Restructuring Time and Learning. The task forces, comprised of parents and business members of the Prichard Committee, examined key elements of…

  16. Report of the Task Force on School Health.

    ERIC Educational Resources Information Center

    Maryland State Dept. of Health and Mental Hygiene, Baltimore.

    The 1990 Report of the Task Force on School Health examines the current status of Maryland's school health programs and proposes 16 recommendations designed to implement a comprehensive school health (CSH) program to meet the needs of all students. The report describes the Task Force, which was appointed in 1989. After presenting a background on…

  17. Mining Task Force Report.

    ERIC Educational Resources Information Center

    Saskatchewan Inst. of Applied Science and Technology, Saskatoon.

    In fall 1988, the Board of Directors of the Saskatchewan Institute of Applied Science and Technology (SIAST) created a task force to study the training needs of the mining industry in the province and evaluate SIAST's responsiveness to those needs. After assessing the technological changes taking place in the industry, surveying manpower needs,…

  18. Beyond Line-of-Sight Information Dissemination for Force Protection

    DTIC Science & Technology

    2012-11-01

    utilize ad hoc, mesh networks to support data-in-motion and remote data storage and access. These types of sensors are common among Force Protection...Operations and Forward Operating Base security . Current Force Protection Kits include a rich set of sensors that can be monitored from a core operator...and tactical war fighters in tactical network environments . Marti has the potential to improve situation awareness and Force Protection for

  19. 78 FR 23970 - Interagency Task Force on Veterans Small Business Development

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-23

    ... SMALL BUSINESS ADMINISTRATION Interagency Task Force on Veterans Small Business Development AGENCY: U.S. Small Business Administration. ACTION: Notice of open Federal Interagency Task Force Meeting. SUMMARY: This document corrects the SBA's Interagency Task Force on Veterans Small Business Developments...

  20. 75 FR 62611 - Interagency Task Force on Veterans Small Business Development

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-12

    ... SMALL BUSINESS ADMINISTRATION Interagency Task Force on Veterans Small Business Development AGENCY: U.S. Small Business Administration. ACTION: Notice of open Federal Interagency Task Force meeting... public meeting of the Interagency Task Force on Veterans Small Business Development. The meeting will be...

  1. 78 FR 7849 - Interagency Task Force on Veterans Small Business Development

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-04

    ... SMALL BUSINESS ADMINISTRATION Interagency Task Force on Veterans Small Business Development AGENCY: U.S. Small Business Administration. ACTION: Notice of open Federal Interagency Task Force Meeting... meeting of the Interagency Task Force on Veterans Small Business Development. The meeting will be open to...

  2. 77 FR 41472 - Interagency Task Force on Veterans Small Business Development

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-13

    ... SMALL BUSINESS ADMINISTRATION Interagency Task Force on Veterans Small Business Development AGENCY: U.S. Small Business Administration. ACTION: Notice of open Federal Interagency Task Force meeting... public meeting of the Interagency Task Force on Veterans Small Business Development. The meeting will be...

  3. 78 FR 70087 - Interagency Task Force on Veterans Small Business Development

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-22

    ... SMALL BUSINESS ADMINISTRATION Interagency Task Force on Veterans Small Business Development AGENCY: U.S. Small Business Administration. ACTION: Notice of open Federal Interagency Task Force meeting... meeting of the Interagency Task Force on Veterans Small Business Development. The meeting will be open to...

  4. 76 FR 8393 - Interagency Task Force on Veterans Small Business Development

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-14

    ... SMALL BUSINESS ADMINISTRATION Interagency Task Force on Veterans Small Business Development AGENCY: U.S. Small Business Administration. ACTION: Notice of open Federal Interagency Task Force meeting... public meeting of the Interagency Task Force on Veterans Small Business Development. The meeting will be...

  5. 78 FR 45996 - Interagency Task Force on Veterans Small Business Development

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-30

    ... SMALL BUSINESS ADMINISTRATION Interagency Task Force on Veterans Small Business Development AGENCY: U.S. Small Business Administration. ACTION: Notice of open Federal Interagency Task Force meeting... meeting of the Interagency Task Force on Veterans Small Business Development. The meeting will be open to...

  6. 78 FR 21492 - Interagency Task Force on Veterans Small Business Development

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-10

    ... SMALL BUSINESS ADMINISTRATION Interagency Task Force on Veterans Small Business Development AGENCY: U.S. Small Business Administration. ACTION: Notice of open Federal Interagency Task Force Meeting... meeting of the Interagency Task Force on Veterans Small Business Development. The meeting will be open to...

  7. Overview of the Machine-Tool Task Force

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sutton, G.P.

    1981-06-08

    The Machine Tool Task Force, (MTTF) surveyed the state of the art of machine tool technology for material removal for two and one-half years. This overview gives a brief summary of the approach, specific subjects covered, principal conclusions and some of the key recommendations aimed at improving the technology and advancing the productivity of machine tools. The Task Force consisted of 123 experts from the US and other countries. Their findings are documented in a five-volume report, Technology of Machine Tools.

  8. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks

    PubMed Central

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-01-01

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes. PMID:26184224

  9. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.

    PubMed

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-07-14

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.

  10. Force-stabilizing synergies in motor tasks involving two actors

    PubMed Central

    Solnik, Stanislaw; Reschechtko, Sasha; Wu, Yen-Hsun; Zatsiorsky, Vladimir M.; Latash, Mark L.

    2015-01-01

    We investigated the ability of two persons to produce force-stabilizing synergies in accurate multi-finger force production tasks under visual feedback on the total force only. The subjects produced a time profile of total force (the sum of two hand forces in one-person tasks and the sum of two subject forces in two-person tasks) consisting of a ramp-up, steady-state, and ramp-down segments; the steady-state segment was interrupted in the middle by a quick force pulse. Analyses of the structure of inter-trial finger force variance, motor equivalence, anticipatory synergy adjustments (ASAs), and the unintentional drift of the sharing pattern were performed. The two-person performance was characterized by a dramatically higher amount of inter-trial variance that did not affect total force, higher finger force deviations that did not affect total force (motor equivalent deviations), shorter ASAs, and larger drift of the sharing pattern. The rate of sharing pattern drift correlated with the initial disparity between the forces produced by the two persons (or two hands). The drift accelerated following the quick force pulse. Our observations show that sensory information on the task-specific performance variable is sufficient for the organization of performance-stabilizing synergies. They suggest, however, that two actors are less likely to follow a single optimization criterion as compared to a single performer. The presence of ASAs in the two-person condition might reflect fidgeting by one or both of the subjects. We discuss the characteristics of the drift in the sharing pattern as reflections of different characteristic times of motion within the sub-spaces that affect and do not affect salient performance variables. PMID:26105756

  11. Force-stabilizing synergies in motor tasks involving two actors.

    PubMed

    Solnik, Stanislaw; Reschechtko, Sasha; Wu, Yen-Hsun; Zatsiorsky, Vladimir M; Latash, Mark L

    2015-10-01

    We investigated the ability of two persons to produce force-stabilizing synergies in accurate multi-finger force production tasks under visual feedback on the total force only. The subjects produced a time profile of total force (the sum of two hand forces in one-person tasks and the sum of two subject forces in two-person tasks) consisting of a ramp-up, steady-state, and ramp-down segments; the steady-state segment was interrupted in the middle by a quick force pulse. Analyses of the structure of inter-trial finger force variance, motor equivalence, anticipatory synergy adjustments (ASAs), and the unintentional drift of the sharing pattern were performed. The two-person performance was characterized by a dramatically higher amount of inter-trial variance that did not affect total force, higher finger force deviations that did not affect total force (motor equivalent deviations), shorter ASAs, and larger drift of the sharing pattern. The rate of sharing pattern drift correlated with the initial disparity between the forces produced by the two persons (or two hands). The drift accelerated following the quick force pulse. Our observations show that sensory information on the task-specific performance variable is sufficient for the organization of performance-stabilizing synergies. They suggest, however, that two actors are less likely to follow a single optimization criterion as compared to a single performer. The presence of ASAs in the two-person condition might reflect fidgeting by one or both of the subjects. We discuss the characteristics of the drift in the sharing pattern as reflections of different characteristic times of motion within the subspaces that affect and do not affect salient performance variables.

  12. Forced Aerobic Exercise Preceding Task Practice Improves Motor Recovery Poststroke.

    PubMed

    Linder, Susan M; Rosenfeldt, Anson B; Dey, Tanujit; Alberts, Jay L

    To understand how two types of aerobic exercise affect upper-extremity motor recovery post-stroke. Our aims were to (1) evaluate the feasibility of having people who had a stroke complete an aerobic exercise intervention and (2) determine whether forced or voluntary exercise differentially facilitates upper-extremity recovery when paired with task practice. Seventeen participants with chronic stroke completed twenty-four 90-min sessions over 8 wk. Aerobic exercise was immediately followed by task practice. Participants were randomized to forced or voluntary aerobic exercise groups or to task practice only. Improvement on the Fugl-Meyer Assessment exceeded the minimal clinically important difference: 12.3, 4.8, and 4.4 for the forced exercise, voluntary exercise, and repetitive task practice-only groups, respectively. Only the forced exercise group exhibited a statistically significant improvement. People with chronic stroke can safely complete intensive aerobic exercise. Forced aerobic exercise may be optimal in facilitating motor recovery associated with task practice. Copyright © 2017 by the American Occupational Therapy Association, Inc.

  13. Neural Correlates of Task Cost for Stance Control with an Additional Motor Task: Phase-Locked Electroencephalogram Responses

    PubMed Central

    Hwang, Ing-Shiou; Huang, Cheng-Ya

    2016-01-01

    With appropriate reallocation of central resources, the ability to maintain an erect posture is not necessarily degraded by a concurrent motor task. This study investigated the neural control of a particular postural-suprapostural procedure involving brain mechanisms to solve crosstalk between posture and motor subtasks. Participants completed a single posture task and a dual-task while concurrently conducting force-matching and maintaining a tilted stabilometer stance at a target angle. Stabilometer movements and event-related potentials (ERPs) were recorded. The added force-matching task increased the irregularity of postural response rather than the size of postural response prior to force-matching. In addition, the added force-matching task during stabilometer stance led to marked topographic ERP modulation, with greater P2 positivity in the frontal and sensorimotor-parietal areas of the N1-P2 transitional phase and in the sensorimotor-parietal area of the late P2 phase. The time-frequency distribution of the ERP primary principal component revealed that the dual-task condition manifested more pronounced delta (1–4 Hz) and beta (13–35 Hz) synchronizations but suppressed theta activity (4–8 Hz) before force-matching. The dual-task condition also manifested coherent fronto-parietal delta activity in the P2 period. In addition to a decrease in postural regularity, this study reveals spatio-temporal and temporal-spectral reorganizations of ERPs in the fronto-sensorimotor-parietal network due to the added suprapostural motor task. For a particular set of postural-suprapostural task, the behavior and neural data suggest a facilitatory role of autonomous postural response and central resource expansion with increasing interregional interactions for task-shift and planning the motor-suprapostural task. PMID:27010634

  14. Pseudo-random dynamic address configuration (PRDAC) algorithm for mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Wu, Shaochuan; Tan, Xuezhi

    2007-11-01

    By analyzing all kinds of address configuration algorithms, this paper provides a new pseudo-random dynamic address configuration (PRDAC) algorithm for mobile ad hoc networks. Based on PRDAC, the first node that initials this network randomly chooses a nonlinear shift register that can generates an m-sequence. When another node joins this network, the initial node will act as an IP address configuration sever to compute an IP address according to this nonlinear shift register, and then allocates this address and tell the generator polynomial of this shift register to this new node. By this means, when other node joins this network, any node that has obtained an IP address can act as a server to allocate address to this new node. PRDAC can also efficiently avoid IP conflicts and deal with network partition and merge as same as prophet address (PA) allocation and dynamic configuration and distribution protocol (DCDP). Furthermore, PRDAC has less algorithm complexity, less computational complexity and more sufficient assumption than PA. In addition, PRDAC radically avoids address conflicts and maximizes the utilization rate of IP addresses. Analysis and simulation results show that PRDAC has rapid convergence, low overhead and immune from topological structures.

  15. Association of Academic Physiatrists Women's Task Force Report.

    PubMed

    Silver, Julie K; Cuccurullo, Sara; Ambrose, Anne Felicia; Bhatnagar, Saurabha; Bosques, Glendaliz; Fleming, Talya K; Frontera, Walter R; Karimi, Danielle Perret; Oh-Park, Mooyeon; Sowa, Gwendolyn; Visco, Christopher; Weiss, Lyn; Knowlton, Tiffany

    2018-04-30

    The Association of Academic Physiatrists (AAP) convened a women's task force in 2016, and the members agreed on a list of metrics that would permit retrospective data review pertaining to the representation and inclusion of women physicians in the society. Examples of categories examined included leadership positions (i.e., board membership, board presidents, committee membership, committee chairs, and resident fellow physician chairs), conference presentations (i.e., annual meeting session proposals, annual meeting faculty, annual meeting plenary speakers) and recognition awards (i.e., recognition award nominations and recipients). The findings highlight areas in which the AAP has been successful in supporting gender equity and other areas in which women physiatrists have been underrepresented. The task force worked with the Board of Trustees to construct an action plan; asking the respective committees to address areas of underrepresentation. A volunteer from each committee was deemed a 'diversity steward' and going forward will work directly with the task force as a liaison to document an action plan and collect data. The board plans to transparently report progress to members and other stakeholders, and the task force aims to publish a follow-up report within the next five years.

  16. Task force on deterrence of air piracy : final report.

    DOT National Transportation Integrated Search

    1978-11-01

    In February 1969, as the frequency of hijacking of U.S. air carrier aircraft was rising to an all-time high, the Federal Aviation Administration established a multi-disciplinary Task Force on Deterrence of Air Piracy. The work of the Task Force in de...

  17. 75 FR 16577 - Gulf War Veterans' Illnesses Task Force

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-01

    ... DEPARTMENT OF VETERANS AFFAIRS Gulf War Veterans' Illnesses Task Force AGENCY: Department of Veterans Affairs (VA). ACTION: Notice with request for comments. SUMMARY: The Secretary Department of Veterans Affairs (VA) established the Gulf War Veterans' Illnesses Task Force (GWVI-TF) in August 2009 to...

  18. 78 FR 28292 - Gulf War Veterans' Illnesses Task Force

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-14

    ... DEPARTMENT OF VETERANS AFFAIRS Gulf War Veterans' Illnesses Task Force AGENCY: Department of Veterans Affairs (VA). ACTION: Notice with request for comments. SUMMARY: The Secretary, Department of Veterans Affairs (VA) established the Gulf War Veterans' Illnesses Task Force (GWVI-TF) in August 2009 to...

  19. 76 FR 65321 - Gulf War Veterans' Illnesses Task Force

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-20

    ... DEPARTMENT OF VETERANS AFFAIRS Gulf War Veterans' Illnesses Task Force AGENCY: Department of Veterans Affairs (VA). ACTION: Notice with request for comments. SUMMARY: The Secretary, Department of Veterans Affairs (VA) established the Gulf War Veterans' Illnesses Task Force (GWVI-TF) in August 2009 to...

  20. Multifunctional Battalion Task Force Training: Slovenian Armed Forces Battalion Training Cycle

    DTIC Science & Technology

    2016-06-10

    MULTIFUNCTIONAL BATTALION TASK FORCE TRAINING: SLOVENIAN ARMED FORCES BATTALION TRAINING CYCLE A thesis presented to...Forces Battalion Training Cycle 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Major Ales Avsec 5d...Bn TF) training cycle . It focuses on how the SAF is conducting the infantry and multifunctional Bn TF training. In particular, it deals with mission

  1. 3 CFR - White House Task Force on Middle-Class Working Families

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 3 The President 1 2010-01-01 2010-01-01 false White House Task Force on Middle-Class Working... Task Force on Middle-Class Working Families Memorandum for the Heads of Executive Departments and... times. To these ends, I hereby direct the following: Section 1. White House Task Force on Middle-Class...

  2. Optimal route discovery for soft QOS provisioning in mobile ad hoc multimedia networks

    NASA Astrophysics Data System (ADS)

    Huang, Lei; Pan, Feng

    2007-09-01

    In this paper, we propose an optimal routing discovery algorithm for ad hoc multimedia networks whose resource keeps changing, First, we use stochastic models to measure the network resource availability, based on the information about the location and moving pattern of the nodes, as well as the link conditions between neighboring nodes. Then, for a certain multimedia packet flow to be transmitted from a source to a destination, we formulate the optimal soft-QoS provisioning problem as to find the best route that maximize the probability of satisfying its desired QoS requirements in terms of the maximum delay constraints. Based on the stochastic network resource model, we developed three approaches to solve the formulated problem: A centralized approach serving as the theoretical reference, a distributed approach that is more suitable to practical real-time deployment, and a distributed dynamic approach that utilizes the updated time information to optimize the routing for each individual packet. Examples of numerical results demonstrated that using the route discovered by our distributed algorithm in a changing network environment, multimedia applications could achieve better QoS statistically.

  3. Honeywell's Working Parents Task Force. Final Report and Recommendations.

    ERIC Educational Resources Information Center

    Honeywell, Inc., Minneapolis, Minn.

    This publication provides a summary of the Honeywell Working Parent Task Force's recommendations on how to solve problems experienced by working parents. The Task Force consisted of three committees: the Employment Practices Committee (EPC); the Parent Education Committee (PEC); and the Child Care Facilities Committee (CCFC). After examining a…

  4. Energy-efficient algorithm for broadcasting in ad hoc wireless sensor networks.

    PubMed

    Xiong, Naixue; Huang, Xingbo; Cheng, Hongju; Wan, Zheng

    2013-04-12

    Broadcasting is a common and basic operation used to support various network protocols in wireless networks. To achieve energy-efficient broadcasting is especially important for ad hoc wireless sensor networks because sensors are generally powered by batteries with limited lifetimes. Energy consumption for broadcast operations can be reduced by minimizing the number of relay nodes based on the observation that data transmission processes consume more energy than data reception processes in the sensor nodes, and how to improve the network lifetime is always an interesting issue in sensor network research. The minimum-energy broadcast problem is then equivalent to the problem of finding the minimum Connected Dominating Set (CDS) for a connected graph that is proved NP-complete. In this paper, we introduce an Efficient Minimum CDS algorithm (EMCDS) with help of a proposed ordered sequence list. EMCDS does not concern itself with node energy and broadcast operations might fail if relay nodes are out of energy. Next we have proposed a Minimum Energy-consumption Broadcast Scheme (MEBS) with a modified version of EMCDS, and aimed at providing an efficient scheduling scheme with maximized network lifetime. The simulation results show that the proposed EMCDS algorithm can find smaller CDS compared with related works, and the MEBS can help to increase the network lifetime by efficiently balancing energy among nodes in the networks.

  5. A DNA-Inspired Encryption Methodology for Secure, Mobile Ad Hoc Networks

    NASA Technical Reports Server (NTRS)

    Shaw, Harry

    2012-01-01

    Users are pushing for greater physical mobility with their network and Internet access. Mobile ad hoc networks (MANET) can provide an efficient mobile network architecture, but security is a key concern. A figure summarizes differences in the state of network security for MANET and fixed networks. MANETs require the ability to distinguish trusted peers, and tolerate the ingress/egress of nodes on an unscheduled basis. Because the networks by their very nature are mobile and self-organizing, use of a Public Key Infra structure (PKI), X.509 certificates, RSA, and nonce ex changes becomes problematic if the ideal of MANET is to be achieved. Molecular biology models such as DNA evolution can provide a basis for a proprietary security architecture that achieves high degrees of diffusion and confusion, and resistance to cryptanalysis. A proprietary encryption mechanism was developed that uses the principles of DNA replication and steganography (hidden word cryptography) for confidentiality and authentication. The foundation of the approach includes organization of coded words and messages using base pairs organized into genes, an expandable genome consisting of DNA-based chromosome keys, and a DNA-based message encoding, replication, and evolution and fitness. In evolutionary computing, a fitness algorithm determines whether candidate solutions, in this case encrypted messages, are sufficiently encrypted to be transmitted. The technology provides a mechanism for confidential electronic traffic over a MANET without a PKI for authenticating users.

  6. Nursery Task Force update

    Treesearch

    Russ Pohl

    2007-01-01

    The Nursery Task Force was set up at the behest of the Southern Group of State Foresters in the late winter/spring of 2005. Its mission was to assess the condition of state nurseries across the South and to make recommendations to improve their viability. At the time, tree planting cost-share money was diminished; pulpwood prices were low; much of the Southeast had...

  7. Generalized derivation of the added-mass and circulatory forces for viscous flows

    NASA Astrophysics Data System (ADS)

    Limacher, Eric; Morton, Chris; Wood, David

    2018-01-01

    The concept of added mass arises from potential flow analysis and is associated with the acceleration of a body in an inviscid irrotational fluid. When shed vorticity is modeled as vortex singularities embedded in this irrotational flow, the associated force can be superimposed onto the added-mass force due to the linearity of the governing Laplace equation. This decomposition of force into added-mass and circulatory components remains common in modern aerodynamic models, but its applicability to viscous separated flows remains unclear. The present work addresses this knowledge gap by presenting a generalized derivation of the added-mass and circulatory force decomposition which is valid for a body of arbitrary shape in an unbounded, incompressible fluid domain, in both two and three dimensions, undergoing arbitrary motions amid continuous distributions of vorticity. From the general expression, the classical added-mass force is rederived for well-known canonical cases and is seen to be additive to the circulatory force for any flow. The formulation is shown to be equivalent to existing theoretical work under the specific conditions and assumptions of previous studies. It is also validated using a numerical simulation of a pitching plate in a steady freestream flow, conducted by Wang and Eldredge [Theor. Comput. Fluid Dyn. 27, 577 (2013), 10.1007/s00162-012-0279-5]. In response to persistent confusion in the literature, a discussion of the most appropriate physical interpretation of added mass is included, informed by inspection of the derived equations. The added-mass force is seen to account for the dynamic effect of near-body vorticity and is not (as is commonly claimed) associated with the acceleration of near-body fluid which "must" somehow move with the body. Various other consequences of the derivation are discussed, including a concept which has been labeled the conservation of image-vorticity impulse.

  8. Verifying Safety Messages Using Relative-Time and Zone Priority in Vehicular Ad Hoc Networks.

    PubMed

    Banani, Sam; Gordon, Steven; Thiemjarus, Surapa; Kittipiyakul, Somsak

    2018-04-13

    In high-density road networks, with each vehicle broadcasting multiple messages per second, the arrival rate of safety messages can easily exceed the rate at which digital signatures can be verified. Since not all messages can be verified, algorithms for selecting which messages to verify are required to ensure that each vehicle receives appropriate awareness about neighbouring vehicles. This paper presents a novel scheme to select important safety messages for verification in vehicular ad hoc networks (VANETs). The proposed scheme uses location and direction of the sender, as well as proximity and relative-time between vehicles, to reduce the number of irrelevant messages verified (i.e., messages from vehicles that are unlikely to cause an accident). Compared with other existing schemes, the analysis results show that the proposed scheme can verify messages from nearby vehicles with lower inter-message delay and reduced packet loss and thus provides high level of awareness of the nearby vehicles.

  9. Verifying Safety Messages Using Relative-Time and Zone Priority in Vehicular Ad Hoc Networks

    PubMed Central

    Banani, Sam; Thiemjarus, Surapa; Kittipiyakul, Somsak

    2018-01-01

    In high-density road networks, with each vehicle broadcasting multiple messages per second, the arrival rate of safety messages can easily exceed the rate at which digital signatures can be verified. Since not all messages can be verified, algorithms for selecting which messages to verify are required to ensure that each vehicle receives appropriate awareness about neighbouring vehicles. This paper presents a novel scheme to select important safety messages for verification in vehicular ad hoc networks (VANETs). The proposed scheme uses location and direction of the sender, as well as proximity and relative-time between vehicles, to reduce the number of irrelevant messages verified (i.e., messages from vehicles that are unlikely to cause an accident). Compared with other existing schemes, the analysis results show that the proposed scheme can verify messages from nearby vehicles with lower inter-message delay and reduced packet loss and thus provides high level of awareness of the nearby vehicles. PMID:29652840

  10. National Task Force on Student Aid Problems. Final Report.

    ERIC Educational Resources Information Center

    1975

    This document presents a full discussion of the activities, findings, and recommendations of the National Task Force on Student Aid Problems. The task force was a voluntary association of concerned and interested agencies and organizations. Its only standing came from the support of those directly concerned with student aid problems. By design and…

  11. 32 CFR 700.1053 - Commander of a task force.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 5 2011-07-01 2011-07-01 false Commander of a task force. 700.1053 Section 700.1053 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY... Command Detail to Duty § 700.1053 Commander of a task force. (a) A geographic fleet commander, and any...

  12. 32 CFR 700.1053 - Commander of a task force.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 5 2012-07-01 2012-07-01 false Commander of a task force. 700.1053 Section 700.1053 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY... Command Detail to Duty § 700.1053 Commander of a task force. (a) A geographic fleet commander, and any...

  13. 32 CFR 700.1053 - Commander of a task force.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 5 2013-07-01 2013-07-01 false Commander of a task force. 700.1053 Section 700.1053 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY... Command Detail to Duty § 700.1053 Commander of a task force. (a) A geographic fleet commander, and any...

  14. Enslaving in a serial chain: interactions between grip force and hand force in isometric tasks.

    PubMed

    Paclet, Florent; Ambike, Satyajit; Zatsiorsky, Vladimir M; Latash, Mark L

    2014-03-01

    This study was motivated by the double action of extrinsic hand muscles that produce grip force and also contribute to wrist torque. We explored interactions between grip force and wrist torque in isometric force production tasks. In particular, we tested a hypothesis that an intentional change in one of the two kinetic variables would produce an unintentional change in the other (enslaving). When young healthy subjects produced accurate changes in the grip force, only minor effects on the force produced by the hand (by wrist flexion/extension action) were observed. In contrast, a change in the hand force produced consistent changes in grip force in the same direction. The magnitude of such unintentional grip force change was stronger for intentional hand force decrease as compared to hand force increase. These effects increased with the magnitude of the initial grip force. When the subjects were asked to produce accurate total force computed as the sum of the hand and grip forces, strong negative covariation between the two forces was seen across trials interpreted as a synergy stabilizing the total force. An index of this synergy was higher in the space of "modes," hypothetical signals to the two effectors that could be changed by the controller one at a time. We interpret the complex enslaving effects (positive force covariation) as conditioned by typical everyday tasks. The presence of synergic effects (negative, task-specific force covariation) can be naturally interpreted within the referent configuration hypothesis.

  15. 75 FR 62438 - Interagency Task Force on Veterans Small Business Development Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-08

    ... SMALL BUSINESS ADMINISTRATION Interagency Task Force on Veterans Small Business Development Meeting AGENCY: U.S. Small Business Administration. ACTION: Notice of open Federal Interagency Task Force... first public meeting of the Interagency Task Force on Veterans Small Business Development. The meeting...

  16. Control of force during rapid visuomotor force-matching tasks can be described by discrete time PID control algorithms.

    PubMed

    Dideriksen, Jakob Lund; Feeney, Daniel F; Almuklass, Awad M; Enoka, Roger M

    2017-08-01

    Force trajectories during isometric force-matching tasks involving isometric contractions vary substantially across individuals. In this study, we investigated if this variability can be explained by discrete time proportional, integral, derivative (PID) control algorithms with varying model parameters. To this end, we analyzed the pinch force trajectories of 24 subjects performing two rapid force-matching tasks with visual feedback. Both tasks involved isometric contractions to a target force of 10% maximal voluntary contraction. One task involved a single action (pinch) and the other required a double action (concurrent pinch and wrist extension). 50,000 force trajectories were simulated with a computational neuromuscular model whose input was determined by a PID controller with different PID gains and frequencies at which the controller adjusted muscle commands. The goal was to find the best match between each experimental force trajectory and all simulated trajectories. It was possible to identify one realization of the PID controller that matched the experimental force produced during each task for most subjects (average index of similarity: 0.87 ± 0.12; 1 = perfect similarity). The similarities for both tasks were significantly greater than that would be expected by chance (single action: p = 0.01; double action: p = 0.04). Furthermore, the identified control frequencies in the simulated PID controller with the greatest similarities decreased as task difficulty increased (single action: 4.0 ± 1.8 Hz; double action: 3.1 ± 1.3 Hz). Overall, the results indicate that discrete time PID controllers are realistic models for the neural control of force in rapid force-matching tasks involving isometric contractions.

  17. 75 FR 57987 - Evaluation of the Groundwater Task Force Report: Public Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-23

    ... NUCLEAR REGULATORY COMMISSION [NRC-2010-0302] Evaluation of the Groundwater Task Force Report... Task Force (GTF) in March 2010 to determine whether past, current, and planned actions should be... recommendations made in the Liquid Radioactive Release Lessons Learned Task Force Final Report dated September 1...

  18. Ad Hoc Networking for Unmanned Ground Vehicles: Design and Evaluation at Command, Control, Communications, Intelligence, Surveillance and Reconnaissance On-the-Move

    DTIC Science & Technology

    2006-11-01

    software components used in the ad hoc nodes for the C4ISR OTM experiment were OLSRD, an open-source proactive MANET routing software, and OpenVPN , an...developed by Mike Baker (openwrt.org). 6OpenVPN is a trademark of OpenVPN Solutions LLC. 6 Secure communications in the MANET are achieved with...encryption provided by Wired Equivalent Privacy (WEP) and OpenVPN . The WEP protocol, which is part of the IEEE 802.11 wireless networking standard

  19. San Juan College Task Force on Innovation 1995 Report.

    ERIC Educational Resources Information Center

    Moore, Nelle

    In fall 1994, San Juan College, in New Mexico, established the Task Force on Innovation to examine changes in the paradigm of education and how those changes might affect the college. The Task Force determined that the primary driver of change in education was technology, and specifically the increasing number of means and ease of access to…

  20. National Library of Education Advisory Task Force. Briefing Book.

    ERIC Educational Resources Information Center

    National Library of Education (ED/OERI), Washington, DC.

    This briefing book with appendices was prepared for the initial meetings of the National Library of Education Advisory Task Force (NLE/ATF), in March 1996. An agenda for this meeting is included in the briefing book. The first section, "Governing Authorities for NLE and the Advisory Task Force," contains a copy of Public Law 103-227,…

  1. American Indian Task Force Report.

    ERIC Educational Resources Information Center

    Mackey, John E., Ed.

    Assuming that the client is central to any service program, the American Indian Task Force examined a national sample of "grass roots" social service organizations and/or individuals and schools of social work to determine the capability of providing relevant social work education to American Indians. Accordingly, the highest priorities…

  2. Report of NASA Lunar Energy Enterprise Case Study Task Force

    NASA Technical Reports Server (NTRS)

    Kearney, John J.

    1989-01-01

    The Lunar Energy Enterprise Case Study Task Force was asked to determine the economic viability and commercial potential of mining and extracting He-3 from the lunar soil, and transporting the material to Earth for use in a power-generating fusion reactor. Two other space energy projects, the Space Power Station (SPS) and the Lunar Power Station (LPS), were also reviewed because of several interrelated aspects of these projects. The specific findings of the Task Force are presented. Appendices contain related papers generated by individual Task Force Members.

  3. Ad Hoc working group on diurnal and semi-diurnal Earth Orientation variation.

    NASA Astrophysics Data System (ADS)

    Gipson, J. M.

    2017-12-01

    Diurnal and semi-diurnal Earth orientation ("HF-EOP") variation were detected in the early 1990s in SLR and VLBI data. Beginning in 1996 a model of HF-EOP variation based on ocean-tides derived from Topex data was included in the IERS standards. This model has not been updated since then with the exception of including libration for effects for polar motion (2003 IERS conventions) and UT1 (2010 IERS conventions). The accuracy of Space Geodesy has increased remarkably over the last 20 years and the 1996 IERS HF-EOP model is no longer adequate. At the conclusion of the 2017 GGOS/IERS Unified Analysis Workshop an ad hoc working group was formed including representatives of the IDS, IGS, ILRS, and IVS. The goal of the working group is to test several models of HF-EOP in the different space geodesy techniques and to make a recommendation to the IERS for the adoption of a new HF-EOP model. In this presentation I will give a summary of work on HF-EOP done to date by various scientists which demonstrate the inadequacy of the current IERS HF-EOP model. I will then describe the goals and the progress of the working group to date, with a preview of further work.

  4. An ultra-wide bandwidth-based range/GPS tight integration approach for relative positioning in vehicular ad hoc networks

    NASA Astrophysics Data System (ADS)

    Shen, Feng; Wayn Cheong, Joon; Dempster, Andrew G.

    2015-04-01

    Relative position awareness is a vital premise for the implementation of emerging intelligent transportation systems, such as collision warning. However, commercial global navigation satellite systems (GNSS) receivers do not satisfy the requirements of these applications. Fortunately, cooperative positioning (CP) techniques, through sharing the GNSS measurements between vehicles, can improve the performance of relative positioning in a vehicular ad hoc network (VANET). In this paper, while assuming there are no obstacles between vehicles, a new enhanced tightly coupled CP technique is presented by adding ultra-wide bandwidth (UWB)-based inter-vehicular range measurements. In the proposed CP method, each vehicle fuses the GPS measurements and the inter-vehicular range measurements. Based on analytical and experimental results, in the full GPS coverage environment, the new tight integration CP method outperforms the INS-aided tight CP method, tight CP method, and DGPS by 11%, 15%, and 24%, respectively; in the GPS outage scenario, the performance improvement achieves 60%, 65%, and 73%, respectively.

  5. Enslaving in a serial chain: Interactions between grip force and hand force in isometric tasks

    PubMed Central

    Paclet, Florent; Ambike, Satyajit; Zatsiorsky, Vladimir M.; Latash, Mark L.

    2014-01-01

    This study was motivated by the double action of extrinsic hand muscles that produce grip force and also contribute to wrist torque. We explored interactions between grip force and wrist torque in isometric force production tasks. In particular, we tested a hypothesis that an intentional change in one of the two kinetic variables would produce an unintentional change in the other (enslaving). When young healthy subjects produced accurate changes in the grip force, only minor effects on the force produced by the hand (by wrist flexion/extension action) were observed. In contrast, a change in the hand force produced consistent changes in grip force in the same direction. The magnitude of such unintentional grip force change was stronger for intentional hand force decrease as compared to hand force increase. These effects increased with the magnitude of the initial grip force. When the subjects were asked to produce accurate total force computed as the sum of the hand and grip forces, strong negative co-variation between the two forces was seen across trials interpreted as a synergy stabilizing the total force. An index of this synergy was higher in the space of “modes”, hypothetical signals to the two effectors that could be changed by the controller one at a time. We interpret the complex enslaving effects (positive force co-variation) as conditioned by typical everyday tasks. The presence of synergic effects (negative, task-specific force co-variation) can be naturally interpreted within the referent configuration hypothesis. PMID:24309747

  6. Influence of sports flooring and shoes on impact forces and performance during jump tasks.

    PubMed

    Malisoux, Laurent; Gette, Paul; Urhausen, Axel; Bomfim, Joao; Theisen, Daniel

    2017-01-01

    We aim to determine the influence of sports floorings and sports shoes on impact mechanics and performance during standardised jump tasks. Twenty-one male volunteers performed ankle jumps (four consecutive maximal bounds with very dynamic ankle movements) and multi-jumps (two consecutive maximal counter-movement jumps) on force plates using minimalist and cushioned shoes under 5 sports flooring (SF) conditions. The shock absorption properties of the SF, defined as the proportion of peak impact force absorbed by the tested flooring when compared with a concrete hard surface, were: SF0 = 0% (no flooring), SF1 = 19%, SF2 = 26%, SF3 = 37% and SF4 = 45%. Shoe and flooring effects were compared using 2x5 repeated-measures ANOVA with post-hoc Bonferroni-corrected comparisons. A significant interaction between SF and shoe conditions was found for VILR only (p = 0.003). In minimalist shoes, SF influenced Vertical Instantaneous Loading Rate (VILR) during ankle jumps (p = 0.006) and multi-jumps (p<0.001), in accordance with shock absorption properties. However, in cushioned shoes, SF influenced VILR during ankle jumps only (p<0.001). Contact Time was the only additional variable affected by SF, but only during multi-jumps in minimalist shoes (p = 0.037). Cushioned shoes induced lower VILR (p<0.001) and lower Contact Time (p≤0.002) during ankle jumps and multi-jumps compared to minimalist shoes. During ankle jumps, cushioned shoes induced greater Peak Vertical Ground Reaction Force (PVGRF, p = 0.002), greater Vertical Average Loading Rate (p<0.001), and lower eccentric (p = 0.008) and concentric (p = 0.004) work. During multi-jumps, PVGRF was lower (p<0.001) and jump height was higher (p<0.001) in cushioned compared to minimalist shoes. In conclusion, cushioning influenced impact forces during standardised jump tasks, whether it was provided by the shoes or the sports flooring. VILR is the variable that was the most affected.

  7. Influence of sports flooring and shoes on impact forces and performance during jump tasks

    PubMed Central

    Urhausen, Axel; Bomfim, Joao

    2017-01-01

    We aim to determine the influence of sports floorings and sports shoes on impact mechanics and performance during standardised jump tasks. Twenty-one male volunteers performed ankle jumps (four consecutive maximal bounds with very dynamic ankle movements) and multi-jumps (two consecutive maximal counter-movement jumps) on force plates using minimalist and cushioned shoes under 5 sports flooring (SF) conditions. The shock absorption properties of the SF, defined as the proportion of peak impact force absorbed by the tested flooring when compared with a concrete hard surface, were: SF0 = 0% (no flooring), SF1 = 19%, SF2 = 26%, SF3 = 37% and SF4 = 45%. Shoe and flooring effects were compared using 2x5 repeated-measures ANOVA with post-hoc Bonferroni-corrected comparisons. A significant interaction between SF and shoe conditions was found for VILR only (p = 0.003). In minimalist shoes, SF influenced Vertical Instantaneous Loading Rate (VILR) during ankle jumps (p = 0.006) and multi-jumps (p<0.001), in accordance with shock absorption properties. However, in cushioned shoes, SF influenced VILR during ankle jumps only (p<0.001). Contact Time was the only additional variable affected by SF, but only during multi-jumps in minimalist shoes (p = 0.037). Cushioned shoes induced lower VILR (p<0.001) and lower Contact Time (p≤0.002) during ankle jumps and multi-jumps compared to minimalist shoes. During ankle jumps, cushioned shoes induced greater Peak Vertical Ground Reaction Force (PVGRF, p = 0.002), greater Vertical Average Loading Rate (p<0.001), and lower eccentric (p = 0.008) and concentric (p = 0.004) work. During multi-jumps, PVGRF was lower (p<0.001) and jump height was higher (p<0.001) in cushioned compared to minimalist shoes. In conclusion, cushioning influenced impact forces during standardised jump tasks, whether it was provided by the shoes or the sports flooring. VILR is the variable that was the most affected. PMID:29020108

  8. Unsupervised algorithms for intrusion detection and identification in wireless ad hoc sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2009-05-01

    In previous work by the author, parameters across network protocol layers were selected as features in supervised algorithms that detect and identify certain intrusion attacks on wireless ad hoc sensor networks (WSNs) carrying multisensor data. The algorithms improved the residual performance of the intrusion prevention measures provided by any dynamic key-management schemes and trust models implemented among network nodes. The approach of this paper does not train algorithms on the signature of known attack traffic, but, instead, the approach is based on unsupervised anomaly detection techniques that learn the signature of normal network traffic. Unsupervised learning does not require the data to be labeled or to be purely of one type, i.e., normal or attack traffic. The approach can be augmented to add any security attributes and quantified trust levels, established during data exchanges among nodes, to the set of cross-layer features from the WSN protocols. A two-stage framework is introduced for the security algorithms to overcome the problems of input size and resource constraints. The first stage is an unsupervised clustering algorithm which reduces the payload of network data packets to a tractable size. The second stage is a traditional anomaly detection algorithm based on a variation of support vector machines (SVMs), whose efficiency is improved by the availability of data in the packet payload. In the first stage, selected algorithms are adapted to WSN platforms to meet system requirements for simple parallel distributed computation, distributed storage and data robustness. A set of mobile software agents, acting like an ant colony in securing the WSN, are distributed at the nodes to implement the algorithms. The agents move among the layers involved in the network response to the intrusions at each active node and trustworthy neighborhood, collecting parametric values and executing assigned decision tasks. This minimizes the need to move large amounts

  9. Comparing the Values Hierarchy of the Kentucky Department of Education's Character/Values Task Force. Comparing a Character/Values Task Force to a National Sample.

    ERIC Educational Resources Information Center

    Butler, Fonda P.

    In March 1989, the Kentucky Department of Education assembled a task force to make recommendations regarding the issue of teaching values and character in public schools in Kentucky. The 23-member task force represented educators, parents, the legislature, state and local school boards, law enforcement agencies, higher education, Catholic…

  10. ICTNET at Web Track 2012 Ad-hoc Task

    DTIC Science & Technology

    2012-11-01

    Model and use it as baseline this year. 3.2 Learning to rank Learning to rank (LTR) introduces machine learning to retrieval ranking problem. It...Yoram Singer. An efficient boosting algorithm  for  combining preferences [J]. The Journal of  Machine   Learning  Research. 2003. 

  11. 77 FR 18307 - Gulf War Veterans' Illnesses Task Force Report

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-27

    ... DEPARTMENT OF VETERANS AFFAIRS Gulf War Veterans' Illnesses Task Force Report AGENCY: Department of Veterans Affairs. ACTION: Notice. SUMMARY: The Secretary Department of Veterans Affairs (VA) established the Gulf War Veterans' Illnesses Task Force (GWVI-TF) in August 2009 to conduct a comprehensive...

  12. Non-ad-hoc decision rule for the Dempster-Shafer method of evidential reasoning

    NASA Astrophysics Data System (ADS)

    Cheaito, Ali; Lecours, Michael; Bosse, Eloi

    1998-03-01

    This paper is concerned with the fusion of identity information through the use of statistical analysis rooted in Dempster-Shafer theory of evidence to provide automatic identification aboard a platform. An identity information process for a baseline Multi-Source Data Fusion (MSDF) system is defined. The MSDF system is applied to information sources which include a number of radars, IFF systems, an ESM system, and a remote track source. We use a comprehensive Platform Data Base (PDB) containing all the possible identity values that the potential target may take, and we use the fuzzy logic strategies which enable the fusion of subjective attribute information from sensor and the PDB to make the derivation of target identity more quickly, more precisely, and with statistically quantifiable measures of confidence. The conventional Dempster-Shafer lacks a formal basis upon which decision can be made in the face of ambiguity. We define a non-ad hoc decision rule based on the expected utility interval for pruning the `unessential' propositions which would otherwise overload the real-time data fusion systems. An example has been selected to demonstrate the implementation of our modified Dempster-Shafer method of evidential reasoning.

  13. An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks

    PubMed Central

    Tan, Guozhen; Yu, Chao

    2017-01-01

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment) applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS) support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access) have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC) protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications. PMID:28991217

  14. Data Delivery Method Based on Neighbor Nodes' Information in a Mobile Ad Hoc Network

    PubMed Central

    Hayashi, Takuma; Taenaka, Yuzo; Okuda, Takeshi; Yamaguchi, Suguru

    2014-01-01

    This paper proposes a data delivery method based on neighbor nodes' information to achieve reliable communication in a mobile ad hoc network (MANET). In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE), Chachulski et al. (2007), improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow. PMID:24672371

  15. Data delivery method based on neighbor nodes' information in a mobile ad hoc network.

    PubMed

    Kashihara, Shigeru; Hayashi, Takuma; Taenaka, Yuzo; Okuda, Takeshi; Yamaguchi, Suguru

    2014-01-01

    This paper proposes a data delivery method based on neighbor nodes' information to achieve reliable communication in a mobile ad hoc network (MANET). In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE), Chachulski et al. (2007), improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow.

  16. PCPA: A Practical Certificateless Conditional Privacy Preserving Authentication Scheme for Vehicular Ad Hoc Networks

    PubMed Central

    2018-01-01

    Vehicle ad hoc networks (VANETs) is a promising network scenario for greatly improving traffic efficiency and safety, in which smart vehicles can communicate with other vehicles or roadside units. For the availability of VANETs, it is very important to deal with the security and privacy problems for VANETs. In this paper, based on certificateless cryptography and elliptic curve cryptography, we present a certificateless signature with message recovery (CLS-MR), which we believe are of independent interest. Then, a practical certificateless conditional privacy preserving authentication (PCPA) scheme is proposed by incorporating the proposed CLS-MR scheme. Furthermore, the security analysis shows that PCPA satisfies all security and privacy requirements. The evaluation results indicate that PCPA achieves low computation and communication costs because there is no need to use the bilinear pairing and map-to-point hash operations. Moreover, extensive simulations show that PCPA is feasible and achieves prominent performances in terms of message delay and message loss ratio, and thus is more suitable for the deployment and adoption of VANETs. PMID:29762511

  17. Post Hoc Analyses of ApoE Genotype-Defined Subgroups in Clinical Trials.

    PubMed

    Kennedy, Richard E; Cutter, Gary R; Wang, Guoqiao; Schneider, Lon S

    2016-01-01

    Many post hoc analyses of clinical trials in Alzheimer's disease (AD) and mild cognitive impairment (MCI) are in small Phase 2 trials. Subject heterogeneity may lead to statistically significant post hoc results that cannot be replicated in larger follow-up studies. We investigated the extent of this problem using simulation studies mimicking current trial methods with post hoc analyses based on ApoE4 carrier status. We used a meta-database of 24 studies, including 3,574 subjects with mild AD and 1,171 subjects with MCI/prodromal AD, to simulate clinical trial scenarios. Post hoc analyses examined if rates of progression on the Alzheimer's Disease Assessment Scale-cognitive (ADAS-cog) differed between ApoE4 carriers and non-carriers. Across studies, ApoE4 carriers were younger and had lower baseline scores, greater rates of progression, and greater variability on the ADAS-cog. Up to 18% of post hoc analyses for 18-month trials in AD showed greater rates of progression for ApoE4 non-carriers that were statistically significant but unlikely to be confirmed in follow-up studies. The frequency of erroneous conclusions dropped below 3% with trials of 100 subjects per arm. In MCI, rates of statistically significant differences with greater progression in ApoE4 non-carriers remained below 3% unless sample sizes were below 25 subjects per arm. Statistically significant differences for ApoE4 in post hoc analyses often reflect heterogeneity among small samples rather than true differential effect among ApoE4 subtypes. Such analyses must be viewed cautiously. ApoE genotype should be incorporated into the design stage to minimize erroneous conclusions.

  18. Task Force Report 4. Report of the Task Force on Marketing and Communications

    PubMed Central

    Dickinson, John C.; Evans, Kenneth L.; Carter, Jan; Burke, Kevin

    2004-01-01

    BACKGROUND To ensure the success of the proposed New Model of family medicine and to create a better understanding of the nature and role of family medicine, an effective communications plan must be developed and implemented. This Future of Family Medicine task force report proposes strategies for communicating the role of family physicians within medicine, as well as to purchasers, consumers, and other entities. METHODS After reviewing the findings from the research conducted for the Future of Family Medicine project, the task force presents a preliminary brand-positioning strategy for family medicine messages. Based on this strategy, the task force identifies 5 major audiences to which family medicine communications should be directed. A consistent method was used to determine optimum strategies to address each audience: defining the audience, assessing the literature and other pertinent evidence, identifying the communication objectives, determining the key messages, developing brand promises, and proposing strategies and tactics to support the messages and objectives. Preliminary communications plans are then presented for each of the 5 target audiences. MAJOR FINDINGS It is important that the organizations involved in family medicine make a multiyear commitment of resources to implement and support an aggressive communications strategy, which is based on key messages to target audiences. A concerted effort is particularly needed to address the declining interest among medical students in the specialty. Implementing a comprehensive family medicine career development program may be one effective strategy to reverse this trend. To help eliminate the current confusion among the public regarding family medicine and to promote clarity and consistency in terminology, the specialty should replace the name family practice with family medicine and a new graphic symbol for the discipline of family medicine should be developed. CONCLUSION As a discipline, family medicine

  19. Report of the HDA building Task Force.

    PubMed

    Scheerer, Ernest W

    2006-01-01

    The Building Task Force, after researching the many options, recommended to the Board of Trustees that, at this time, it is in the best interest of the association and its members to keep the building. In addition to the reasons outlined in the preceding paragraphs, the conclusions drawn by the Task Force can be summarized as follows: 1) This is not the time to make a change as both land and construction costs are high; 2) There is little inventory at this time that would provide a significant improvement over the present building; 3) There is no urgent need to act now; and 4) Cost-effective changes can be made to make the building more valuable to the association.

  20. 77 FR 41165 - Notice of Meeting of the Agricultural Air Quality Task Force

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-12

    ... Agricultural Air Quality Task Force AGENCY: Natural Resources Conservation Service, USDA. ACTION: Notice of meeting. SUMMARY: The Department of Agriculture (USDA), Agricultural Air Quality Task Force (AAQTF) will.../Concerns Discussion Continued discussion of goals for Task Force Anaerobic Digester Technologies Odor...

  1. A Status Report from the Task Force on Marketing Research.

    ERIC Educational Resources Information Center

    Keim, William A.; And Others

    Concerned with changes in enrollment and credit hour patterns, the chancellor of the Kansas City Metropolitan Community Colleges (MCC) created a special Task Force to consider recommendations for marketing strategies for the 1978-79 academic year. The Task Force reviewed regional and district demography, area population trends and density, age and…

  2. 76 FR 54258 - Request for Comments-Fiscal Oversight Task Force Report and Recommendations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-31

    ... LEGAL SERVICES CORPORATION Request for Comments--Fiscal Oversight Task Force Report and... Fiscal Oversight Task Force, which reviewed and made recommendations regarding how LSC conducts fiscal... territories. By Resolution adopted on July 21, 2010, the Board established the Fiscal Oversight Task Force...

  3. Identifying strategy for ad hoc percutaneous coronary intervention in patients with anticipated unfavorable radial access: the Little Women study.

    PubMed

    Sgueglia, Gregory A; Todaro, Daniel; De Santis, Antonella; Conte, Micaela; Gioffrè, Gaetano; Di Giorgio, Angela; D'Errico, Fabrizio; Piccioni, Fabiana; Summaria, Francesco; Gaspardone, Achille

    2017-10-16

    Transradial percutaneous coronary intervention (PCI) offers important advantages over transfemoral PCI, including better outcomes. However, when there is indication to ad hoc PCI, a 6 French workflow is a common default strategy, hence potentially influencing vascular access selection in patients with anticipated small size radial artery. A multidimensional evaluation was performed to compare two ad hoc interventional strategies in women <160cm: a full 6 French workflow (namely 6 French introducer sheath, diagnostic catheters and guiding catheter) with a modified workflow consisting in the use of 5 French diagnostic catheters preceded by the placement of a 6 French sheath introducer and followed by a 6 French guiding catheter use for PCI. Overall 120 women (68±11years) were enrolled in the study. Coronary angiography has been performed using 5 French or 6 French diagnostic catheters in 57 (47.5%) and 63 (52.5%) cases, respectively. Radial spasm and switch to another access occurred more frequently among women who underwent coronary angiography with 6 French rather than 5 French diagnostic catheters (43% vs. 25%, p=0.03 and 2% vs. 11%, p=0.04, respectively). Total time to guidewire lesion crossing was also significantly higher when PCI has been preceded by 6 French rather than 5 French coronary angiography (23±11min vs 16±7min, p=0.013). In patients with anticipated unfavorable radial access, a workflow consisting in 6 French introducer sheath placement, 5 French coronary angiography, and 6 French coronary intervention is on multiple parameters the most straightforward and effective strategy. Copyright © 2017 Elsevier Inc. All rights reserved.

  4. PRN 2009-1: Establishment of Antimicrobial Exposure Assessment Task Force II

    EPA Pesticide Factsheets

    This PR notice announces the establishment of the Antimicrobial Exposure Assessment Task Force II, an industry-wide task force to develop mixer, loader, applicator and post-application exposure data for antimicrobial pesticides used in various settings.

  5. Report of the Task Force on Declining Enrollment. Third Revision.

    ERIC Educational Resources Information Center

    Highline Public Schools, Seattle, WA.

    The purpose of this task force was to study the program, facilities, and alternatives of the Highline School District as they relate to enrollment decline. Specifically, the task force was to establish criteria for identifying facilities where changes should be considered; identify and prioritize alternatives for use of excess classroom space; and…

  6. Youth Employment. Final Recommendations of the State Superintendent's Task Force.

    ERIC Educational Resources Information Center

    Wisconsin State Dept. of Public Instruction, Madison.

    This report contains the final recommendations of the task force on youth employment for the state of Wisconsin. The task force was specifically charged with studying issues related to working teenagers, reviewing existing laws and regulations on child labor, and developing recommendations to ensure that when teenagers work, their jobs do not…

  7. Report of the Defense Science Board Task Force on Quality of Life.

    DTIC Science & Technology

    1995-10-15

    The Quality of Life Task Force is deeply grateful to those distinguished Americans who served as Counselors to the Task Force. Although they did not... Quality of Life issues to the readiness and well being of our Armed Forces. Their willingness to offer suggestions and advice on topics within their...respective expertise was most helpful The recommendations of the Report are those of the Quality of Life Task Force; and Counselors may, or may not, concur in whole or in part with them.

  8. Force sharing and other collaborative strategies in a dyadic force perception task

    PubMed Central

    Tatti, Fabio

    2018-01-01

    When several persons perform a physical task jointly, such as transporting an object together, the interaction force that each person experiences is the sum of the forces applied by all other persons on the same object. Therefore, there is a fundamental ambiguity about the origin of the force that each person experiences. This study investigated the ability of a dyad (two persons) to identify the direction of a small force produced by a haptic device and applied to a jointly held object. In this particular task, the dyad might split the force produced by the haptic device (the external force) in an infinite number of ways, depending on how the two partners interacted physically. A major objective of this study was to understand how the two partners coordinated their action to perceive the direction of the third force that was applied to the jointly held object. This study included a condition where each participant responded independently and another one where the two participants had to agree upon a single negotiated response. The results showed a broad range of behaviors. In general, the external force was not split in a way that would maximize the joint performance. In fact, the external force was often split very unequally, leaving one person without information about the external force. However, the performance was better than expected in this case, which led to the discovery of an unanticipated strategy whereby the person who took all the force transmitted this information to the partner by moving the jointly held object. When the dyad could negotiate the response, we found that the participant with less force information tended to switch his or her response more often. PMID:29474433

  9. Adding Stiffness to the Foot Modulates Soleus Force-Velocity Behaviour during Human Walking

    PubMed Central

    Takahashi, Kota Z.; Gross, Michael T.; van Werkhoven, Herman; Piazza, Stephen J.; Sawicki, Gregory S.

    2016-01-01

    Previous studies of human locomotion indicate that foot and ankle structures can interact in complex ways. The structure of the foot defines the input and output lever arms that influences the force-generating capacity of the ankle plantar flexors during push-off. At the same time, deformation of the foot may dissipate some of the mechanical energy generated by the plantar flexors during push-off. We investigated this foot-ankle interplay during walking by adding stiffness to the foot through shoes and insoles, and characterized the resulting changes in in vivo soleus muscle-tendon mechanics using ultrasonography. Added stiffness decreased energy dissipation at the foot (p < 0.001) and increased the gear ratio (i.e., ratio of ground reaction force and plantar flexor muscle lever arms) (p < 0.001). Added foot stiffness also altered soleus muscle behaviour, leading to greater peak force (p < 0.001) and reduced fascicle shortening speed (p < 0.001). Despite this shift in force-velocity behaviour, the whole-body metabolic cost during walking increased with added foot stiffness (p < 0.001). This increased metabolic cost is likely due to the added force demand on the plantar flexors, as walking on a more rigid foot/shoe surface compromises the plantar flexors’ mechanical advantage. PMID:27417976

  10. Adding Stiffness to the Foot Modulates Soleus Force-Velocity Behaviour during Human Walking

    NASA Astrophysics Data System (ADS)

    Takahashi, Kota Z.; Gross, Michael T.; van Werkhoven, Herman; Piazza, Stephen J.; Sawicki, Gregory S.

    2016-07-01

    Previous studies of human locomotion indicate that foot and ankle structures can interact in complex ways. The structure of the foot defines the input and output lever arms that influences the force-generating capacity of the ankle plantar flexors during push-off. At the same time, deformation of the foot may dissipate some of the mechanical energy generated by the plantar flexors during push-off. We investigated this foot-ankle interplay during walking by adding stiffness to the foot through shoes and insoles, and characterized the resulting changes in in vivo soleus muscle-tendon mechanics using ultrasonography. Added stiffness decreased energy dissipation at the foot (p < 0.001) and increased the gear ratio (i.e., ratio of ground reaction force and plantar flexor muscle lever arms) (p < 0.001). Added foot stiffness also altered soleus muscle behaviour, leading to greater peak force (p < 0.001) and reduced fascicle shortening speed (p < 0.001). Despite this shift in force-velocity behaviour, the whole-body metabolic cost during walking increased with added foot stiffness (p < 0.001). This increased metabolic cost is likely due to the added force demand on the plantar flexors, as walking on a more rigid foot/shoe surface compromises the plantar flexors’ mechanical advantage.

  11. Adding Stiffness to the Foot Modulates Soleus Force-Velocity Behaviour during Human Walking.

    PubMed

    Takahashi, Kota Z; Gross, Michael T; van Werkhoven, Herman; Piazza, Stephen J; Sawicki, Gregory S

    2016-07-15

    Previous studies of human locomotion indicate that foot and ankle structures can interact in complex ways. The structure of the foot defines the input and output lever arms that influences the force-generating capacity of the ankle plantar flexors during push-off. At the same time, deformation of the foot may dissipate some of the mechanical energy generated by the plantar flexors during push-off. We investigated this foot-ankle interplay during walking by adding stiffness to the foot through shoes and insoles, and characterized the resulting changes in in vivo soleus muscle-tendon mechanics using ultrasonography. Added stiffness decreased energy dissipation at the foot (p < 0.001) and increased the gear ratio (i.e., ratio of ground reaction force and plantar flexor muscle lever arms) (p < 0.001). Added foot stiffness also altered soleus muscle behaviour, leading to greater peak force (p < 0.001) and reduced fascicle shortening speed (p < 0.001). Despite this shift in force-velocity behaviour, the whole-body metabolic cost during walking increased with added foot stiffness (p < 0.001). This increased metabolic cost is likely due to the added force demand on the plantar flexors, as walking on a more rigid foot/shoe surface compromises the plantar flexors' mechanical advantage.

  12. Power system restoration - A task force report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Adibi, M.; Clelland, P.; Link, L.

    1987-05-01

    The IEEE PES System Operation Subcommittee has established the Power System Restoration Task Force to: review operating practices, conduct a literature search, prepare relevant glossaries and bibliographies, and promote information exchange through technical papers. This is the first report of the Task Force. The problem of bulk power system restoration following a complete or partial collapse is practically as old as the electric utility industry itself. Many electric utilities have developed over the years system restoration schemes that meet the needs of their particular systems. These plans provide a great deal of insight into how the restorative process is viewedmore » by operating and planning personnel and what concerns and constraints any plan must operate under.« less

  13. Optimal JPWL Forward Error Correction Rate Allocation for Robust JPEG 2000 Images and Video Streaming over Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Agueh, Max; Diouris, Jean-François; Diop, Magaye; Devaux, François-Olivier; De Vleeschouwer, Christophe; Macq, Benoit

    2008-12-01

    Based on the analysis of real mobile ad hoc network (MANET) traces, we derive in this paper an optimal wireless JPEG 2000 compliant forward error correction (FEC) rate allocation scheme for a robust streaming of images and videos over MANET. The packet-based proposed scheme has a low complexity and is compliant to JPWL, the 11th part of the JPEG 2000 standard. The effectiveness of the proposed method is evaluated using a wireless Motion JPEG 2000 client/server application; and the ability of the optimal scheme to guarantee quality of service (QoS) to wireless clients is demonstrated.

  14. 76 FR 76189 - Notice of Public Hearing-Fiscal Oversight Task Force Report & Recommendations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-06

    ... period; and (3) reactions to those comments submitted by Task Force members. DATES: Monday, December 12... Report, the public comments previously submitted, and reactions to those comments from several Task Force members. The public comments and a summary of Task Force members' reactions may be viewed online at http...

  15. An introductory handbook for state task forces to combat drunk driving.

    DOT National Transportation Integrated Search

    1983-01-01

    In June 1982 Governor Robb created a task force to identify and assess efforts under way in Virginia to address the problem of drunken driving and to make recommendations. This booklet was prepared to assist the task force in its deliberations.

  16. Effects of Grip-Force, Contact, and Acceleration Feedback on a Teleoperated Pick-and-Place Task.

    PubMed

    Khurshid, Rebecca P; Fitter, Naomi T; Fedalei, Elizabeth A; Kuchenbecker, Katherine J

    2017-01-01

    The multifaceted human sense of touch is fundamental to direct manipulation, but technical challenges prevent most teleoperation systems from providing even a single modality of haptic feedback, such as force feedback. This paper postulates that ungrounded grip-force, fingertip-contact-and-pressure, and high-frequency acceleration haptic feedback will improve human performance of a teleoperated pick-and-place task. Thirty subjects used a teleoperation system consisting of a haptic device worn on the subject's right hand, a remote PR2 humanoid robot, and a Vicon motion capture system to move an object to a target location. Each subject completed the pick-and-place task 10 times under each of the eight haptic conditions obtained by turning on and off grip-force feedback, contact feedback, and acceleration feedback. To understand how object stiffness affects the utility of the feedback, half of the subjects completed the task with a flexible plastic cup, and the others used a rigid plastic block. The results indicate that the addition of grip-force feedback with gain switching enables subjects to hold both the flexible and rigid objects more stably, and it also allowed subjects who manipulated the rigid block to hold the object more delicately and to better control the motion of the remote robot's hand. Contact feedback improved the ability of subjects who manipulated the flexible cup to move the robot's arm in space, but it deteriorated this ability for subjects who manipulated the rigid block. Contact feedback also caused subjects to hold the flexible cup less stably, but the rigid block more securely. Finally, adding acceleration feedback slightly improved the subject's performance when setting the object down, as originally hypothesized; interestingly, it also allowed subjects to feel vibrations produced by the robot's motion, causing them to be more careful when completing the task. This study supports the utility of grip-force and high-frequency acceleration

  17. 18 CFR 701.58 - Task forces.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 18 Conservation of Power and Water Resources 2 2012-04-01 2012-04-01 false Task forces. 701.58 Section 701.58 Conservation of Power and Water Resources WATER RESOURCES COUNCIL COUNCIL ORGANIZATION... provided administrative and secretarial support by the Water Resources Council Staff to the extent possible...

  18. 18 CFR 701.58 - Task forces.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 18 Conservation of Power and Water Resources 2 2013-04-01 2012-04-01 true Task forces. 701.58 Section 701.58 Conservation of Power and Water Resources WATER RESOURCES COUNCIL COUNCIL ORGANIZATION... provided administrative and secretarial support by the Water Resources Council Staff to the extent possible...

  19. 18 CFR 701.58 - Task forces.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 18 Conservation of Power and Water Resources 2 2011-04-01 2011-04-01 false Task forces. 701.58 Section 701.58 Conservation of Power and Water Resources WATER RESOURCES COUNCIL COUNCIL ORGANIZATION... provided administrative and secretarial support by the Water Resources Council Staff to the extent possible...

  20. 18 CFR 701.58 - Task forces.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 18 Conservation of Power and Water Resources 2 2014-04-01 2014-04-01 false Task forces. 701.58 Section 701.58 Conservation of Power and Water Resources WATER RESOURCES COUNCIL COUNCIL ORGANIZATION... provided administrative and secretarial support by the Water Resources Council Staff to the extent possible...

  1. Task Force on Confidentiality: A Report

    ERIC Educational Resources Information Center

    Campbell, Roger

    1978-01-01

    After discussing opening the admission file, challenging the contents, and retention of records the NACAC Task Force recommends that the House of Representatives Bill 9982 be discarded. The more institutions are allowed to consider responsible information, responsibly gathered within reasonable limits, the better they will serve individuals and…

  2. Task Force on Teacher Education in Physics: Findings and Recommendations

    NASA Astrophysics Data System (ADS)

    Otero, Valerie

    2010-03-01

    In response to the national crisis in science education, including low performance in high school physical science and a critical shortage of highly qualified physics teachers, a National Task Force was convened to investigate the state of physics education in the United States. The Task Force spent one year collecting data from over 900 universities and conducting site visits at 13 universities that were identified as ``high producers'' of physics teachers. The final report of the Task Force will be published early in 2010 and will highlight the findings and recommendations that resulted from the study. In this presentation, the main findings and recommendations will be presented along with selected case studies that illustrate exemplary practices in physics and education departments.

  3. An Overview of the NOAA Drought Task Force

    NASA Technical Reports Server (NTRS)

    Schubert, S.; Mo, K.; Peters-Lidard, C.; Wood, A.

    2012-01-01

    The charge of the NOAA Drought Task Force is to coordinate and facilitate the various MAPP-funded research efforts with the overall goal of achieving significant advances in understanding and in the ability to monitor and predict drought over North America. In order to achieve this, the task force has developed a Drought Test-bed that individual research groups can use to test/evaluate methods and ideas. Central to this is a focus on three high profile North American droughts (1998-2004 western US drought, 2006-2007 SE US drought, 2011- current Tex-Mex drought) to facilitate collaboration among projects, including the development of metrics to assess the quality of monitoring and prediction products, and the development of an experimental drought monitoring and prediction system that incorporates and assesses recent advances. This talk will review the progress and plans of the task force, including efforts to help advance official national drought products, and the development of early warning systems by the National Integrated Drought Information System (NIDIS). Coordination with other relevant national and international efforts such as the emerging NMME capabilities and the international effort to develop a Global Drought Information System (GDIS) will be discussed.

  4. Small Schools Task Force. Final Report.

    ERIC Educational Resources Information Center

    Eugene School District 4J, OR.

    In the spring of 1975 the Eugene (Oregon) school board appointed a task force to make a comprehensive study related to all aspects of possible closure of small schools. Consideration was given to population and enrollment trends; economics; building condition; school size; school design; neighborhood and community implications; program capacity;…

  5. Report of the Television Task Force.

    ERIC Educational Resources Information Center

    Bedell, Fran; And Others

    In early 1985, one of the new television channels resulting from the expansion of the Fort Smith TV Cable Company was allocated to Westark Community College (WCC). In July, a task force was appointed to develop recommendations regarding programming, policies, staffing, equipment, physical location, and organizational location. This report presents…

  6. Report of the Task Force on Human Rights.

    ERIC Educational Resources Information Center

    National Education Association, Washington, DC.

    The NEA Task Force was instructed to "recommend to the Executive Committee a structure and program for the coordination and expansion of the human rights activities of the NEA and of the departments, divisions, commissions, and committees." Their recommendations and a discussion of the forces in American society that make them necessary comprise…

  7. An Ad-hoc Satellite Network to Measure Filamentary Current Structures in the Auroral Zone

    NASA Astrophysics Data System (ADS)

    Nabong, C.; Fritz, T. A.; Semeter, J. L.

    2014-12-01

    An ad-hoc cubesat-based satellite network project known as ANDESITE is under development at Boston University. It aims to develop a dense constellation of easy-to-use, rapidly-deployable low-cost wireless sensor nodes in space. The objectives of the project are threefold: 1) Demonstrate viability of satellite based sensor networks by deploying an 8-node miniature sensor network to study the filamentation of the field aligned currents in the auroral zones of the Earth's magnetosphere. 2) Test the scalability of proposed protocols, including localization techniques, tracking, data aggregation, and routing, for a 3 dimensional wireless sensor network using a "flock" of nodes. 3) Construct a 6U Cube-sat running the Android OS as an integrated constellation manager, data mule and sensor node deplorer. This small network of sensor nodes will resolve current densities at different spatial resolutions in the near-Earth magnetosphere using measurements from magnetometers with 1-nT sensitivities and 0.2 nT/√Hz self-noise. Mapping of these currents will provide new constraints for models of auroral particle acceleration, wave-particle interactions, ionospheric destabilization, and other kinetic processes operating in the low-beta plasma of the near Earth magnetosphere.

  8. 1999 Florida Freight Stakeholders Task Force Report

    DOT National Transportation Integrated Search

    1999-11-01

    The Florida Freight Stakeholders Task Force was organized in 1998 as a result of the Governor's Transportation Summit to address two principal objectives: (1) to identify, prioritize and recommend freight transportation projects for fast track fundin...

  9. Governor's Educational Summit Task Force Report.

    ERIC Educational Resources Information Center

    Michigan Governor's Office, Lansing.

    This booklet contains a series of potential educational goals for Michigan in 1985, prepared by a task force appointed by the governor. The selection of these goals was guided by three major considerations: programs likely to achieve progress within a year, projects directly affecting the classroom level, and goals with statewide effects. These…

  10. Space station operations task force summary report

    NASA Technical Reports Server (NTRS)

    1987-01-01

    A companion to the Space Stations Operation Task Force Panels' Reports, this document summarizes all space station program goals, operations, and the characteristics of the expected user community. Strategies for operation and recommendations for implementation are included.

  11. Report of the APS Ad-Hoc Committee on LGBT Issues - Presentation of Findings and Recommendations

    NASA Astrophysics Data System (ADS)

    Falk, Michael

    In 2014 the Executive Officer of the American Physical Society (APS), Kate Kirby, created an Ad-Hoc Committee on LGBT Issues (C-LGBT) charged with reporting on the obstacles to inclusion of LGBT physicists, a term which for the purpose of this report refers to persons who self-identify as lesbian, gay, bisexual, transgender, queer, questioning, intersex, or asexual, as well as other sexual and gender minorities. The full charge was as follows: ``The committee will advise the APS on the current status of LGBT issues in physics, provide recommendations for greater inclusion, and engage physicists in laying the foundation for a more inclusive physics community. ?More specifically, the committee will investigate LGBT representation in physics, assess the educational and professional climate in physics, recommend changes in policies and practices that impact LGBT physicists, and address other issues that affect inclusion.'' We will present the findings and recommendations of the C-LGBT final report, and a panel discussion will be held following the presentation to discuss the future of APS efforts toward LGBT inclusion in physics.

  12. Report of the APS Ad-Hoc Committee on LGBT Issues - Presentation of Findings and Recommendations

    NASA Astrophysics Data System (ADS)

    Long, Elena

    2016-03-01

    In 2014 the Executive Officer of the American Physical Society (APS), Kate Kirby, created an Ad-Hoc Committee on LGBT Issues (C-LGBT) charged with reporting on the obstacles to inclusion of LGBT physicists, a term which for the purpose of this report refers to persons who self-identify as lesbian, gay, bisexual, transgender, queer, questioning, intersex, or asexual, as well as other sexual and gender minorities. The full charge was as follows: ``The committee will advise the APS on the current status of LGBT issues in physics, provide recommendations for greater inclusion, and engage physicists in laying the foundation for a more inclusive physics community? More specifically, the committee will investigate LGBT representation in physics, assess the educational and professional climate in physics, recommend changes in policies and practices that impact LGBT physicists, and address other issues that affect inclusion.'' We will present the findings and recommendations of the C-LGBT final report, and a panel discussion will be held following the presentation to discuss the future of APS efforts toward LGBT inclusion in physics.

  13. Task Force on Education Funding Equity, Accountability, and Partnerships. Preliminary Report.

    ERIC Educational Resources Information Center

    Maryland State Dept. of Legislative Services, Annapolis.

    In 1997, Maryland formed the Task Force on Education Funding Equity, Accountability, and Partnerships to ensure that students throughout Maryland have an equal opportunity for academic success. The Task Force's preliminary report features a comprehensive review of education funding and programs in grades K-12. The report presents membership and…

  14. The Washington State Task Force on Student Transportation Safety. Final Report.

    ERIC Educational Resources Information Center

    Washington State Legislature, Olympia.

    Findings of a study conducted by the Washington State Task Force on Student Transportation Safety are presented in this report. The data-collection process involved four phases: meetings with experts in student transportation and pedestrian safety; public meetings, informational work sessions, and tours of problems areas; task force meetings; and…

  15. PRN 2007-3: The Agricultural Handlers Exposure Task Force, L.L.C

    EPA Pesticide Factsheets

    This PR Notice discusses the Agricultural Handlers Exposure Task Force, an industry-wide task force formed to develop mixer, loader, and applicator exposure data for pesticides used in agricultural settings. It includes contacts for more information.

  16. Defense Science Board Task Force Report on Cyber Defense Management

    DTIC Science & Technology

    2016-09-01

    manage cyber security is often a verymanual and labor intensive process. When a crisis hits, DoD responses range from highly automatedand instrumented...DSB Task Force Report on Cyber Defense Management September 2016 (U) This page intentionally blank REPORT OF THE DEFENSE SCIENCE BOARD STUDY ON Cyber ...DEFENSE FOR ACQUISITION, TECHNOLOGY & LOGISTICS SUBJECT: Final Report of the Defense Science Board (DSB) Task Force on Cyber Defense Management I am

  17. Task Force on Education Funding Equity, Accountability, and Partnerships. Final Report.

    ERIC Educational Resources Information Center

    Maryland State Dept. of Legislative Services, Annapolis.

    In 1997, Maryland formed the Task Force on Education Funding Equity, Accountability, and Partnerships. The group made a comprehensive review of education funding and programs in grades K-12 to ensure that students throughout Maryland have an equal opportunity for academic success. The task force's final report features the membership roster, the…

  18. Response to Vogelstein: How the 2012 AAP Task Force on circumcision went wrong.

    PubMed

    Van Howe, Robert S

    2018-01-01

    Vogelstein cautions medical organizations against jumping into the fray of controversial issues, yet proffers the 2012 American Academy of Pediatrics' Task Force policy position on infant male circumcision as 'an appropriate use of position-statements.' Only a scratch below the surface of this policy statement uncovers the Task Force's failure to consider Vogelstein's many caveats. The Task Force supported the cultural practice by putting undeserved emphasis on questionable scientific data, while ignoring or underplaying the importance of valid contrary scientific data. Without any effort to quantitatively assess the risk/benefit balance, the Task Force concluded the benefits of circumcision outweighed the risks, while acknowledging that the incidence of risks was unknown. This Task Force differed from other Academy policy-forming panels by ignoring the Academy's standard quality measures and by not appointing members with extensive research experience, extensive publications, or recognized expertise directly related to this topic. Despite nearly 100 publications available at the time addressing the substantial ethical issues associated with infant male circumcision, the Task Force chose to ignore the ethical controversy. They merely stated, with minimal justification, the opinion of one of the Task Force members that the practice of infant male circumcision is morally permissible. The release of the report has fostered an explosion of academic discussion on the ethics of infant male circumcision with a number of national medical organizations now decrying the practice as a human rights violation. © 2017 John Wiley & Sons Ltd.

  19. Idaho Rural Education Task Force. Public School Information. Legislative Report, 2008

    ERIC Educational Resources Information Center

    Idaho State Department of Education, 2008

    2008-01-01

    The Idaho Rural Education Task Force was formed in July 2007 with the goal of proposing and examining solutions to challenges facing rural schools. The task force's work this year has focused on three areas: recruitment and retention of highly qualified teachers, funding shortages related to insurance costs and staff allowances, and the technology…

  20. 76 FR 7579 - U.S. Coral Reef Task Force Public Meeting and Public Comment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-10

    .... Coral Reef Task Force Public Meeting and Public Comment AGENCY: Fish and Wildlife Service, Interior... Service (Service), announce a public business meeting of the U.S. Coral Reef Task Force (USCRTF) [email protected] ); or Liza Johnson, U.S. Coral Reef Task Force Department of the Interior Liaison, U.S...

  1. The Future of Indigenous Security Force Training: Considerations for the Joint Operational Commander

    DTIC Science & Technology

    2007-11-06

    FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE The Future of Indigenous Security Force Training: 5a. CONTRACT NUMBER...focus on indigenous security force training and development (ISFTD) is unique to OIF or if it foreshadows a requirement that must be addressed in...operational plans using ad hoc capabilities. This research paper seeks to demonstrate that the U.S. military has an increased need to train indigenous

  2. Energy Efficient Link Aware Routing with Power Control in Wireless Ad Hoc Networks.

    PubMed

    Katiravan, Jeevaa; Sylvia, D; Rao, D Srinivasa

    2015-01-01

    In wireless ad hoc networks, the traditional routing protocols make the route selection based on minimum distance between the nodes and the minimum number of hop counts. Most of the routing decisions do not consider the condition of the network such as link quality and residual energy of the nodes. Also, when a link failure occurs, a route discovery mechanism is initiated which incurs high routing overhead. If the broadcast nature and the spatial diversity of the wireless communication are utilized efficiently it becomes possible to achieve improvement in the performance of the wireless networks. In contrast to the traditional routing scheme which makes use of a predetermined route for packet transmission, such an opportunistic routing scheme defines a predefined forwarding candidate list formed by using single network metrics. In this paper, a protocol is proposed which uses multiple metrics such as residual energy and link quality for route selection and also includes a monitoring mechanism which initiates a route discovery for a poor link, thereby reducing the overhead involved and improving the throughput of the network while maintaining network connectivity. Power control is also implemented not only to save energy but also to improve the network performance. Using simulations, we show the performance improvement attained in the network in terms of packet delivery ratio, routing overhead, and residual energy of the network.

  3. Integration of Body Sensor Networks and Vehicular Ad-hoc Networks for Traffic Safety.

    PubMed

    Reyes-Muñoz, Angelica; Domingo, Mari Carmen; López-Trinidad, Marco Antonio; Delgado, José Luis

    2016-01-15

    The emergence of Body Sensor Networks (BSNs) constitutes a new and fast growing trend for the development of daily routine applications. However, in the case of heterogeneous BSNs integration with Vehicular ad hoc Networks (VANETs) a large number of difficulties remain, that must be solved, especially when talking about the detection of human state factors that impair the driving of motor vehicles. The main contributions of this investigation are principally three: (1) an exhaustive review of the current mechanisms to detect four basic physiological behavior states (drowsy, drunk, driving under emotional state disorders and distracted driving) that may cause traffic accidents is presented; (2) A middleware architecture is proposed. This architecture can communicate with the car dashboard, emergency services, vehicles belonging to the VANET and road or street facilities. This architecture seeks on the one hand to improve the car driving experience of the driver and on the other hand to extend security mechanisms for the surrounding individuals; and (3) as a proof of concept, an Android real-time attention low level detection application that runs in a next-generation smartphone is developed. The application features mechanisms that allow one to measure the degree of attention of a driver on the base of her/his EEG signals, establish wireless communication links via various standard wireless means, GPRS, Bluetooth and WiFi and issue alarms of critical low driver attention levels.

  4. Energy Efficient Link Aware Routing with Power Control in Wireless Ad Hoc Networks

    PubMed Central

    Katiravan, Jeevaa; Sylvia, D.; Rao, D. Srinivasa

    2015-01-01

    In wireless ad hoc networks, the traditional routing protocols make the route selection based on minimum distance between the nodes and the minimum number of hop counts. Most of the routing decisions do not consider the condition of the network such as link quality and residual energy of the nodes. Also, when a link failure occurs, a route discovery mechanism is initiated which incurs high routing overhead. If the broadcast nature and the spatial diversity of the wireless communication are utilized efficiently it becomes possible to achieve improvement in the performance of the wireless networks. In contrast to the traditional routing scheme which makes use of a predetermined route for packet transmission, such an opportunistic routing scheme defines a predefined forwarding candidate list formed by using single network metrics. In this paper, a protocol is proposed which uses multiple metrics such as residual energy and link quality for route selection and also includes a monitoring mechanism which initiates a route discovery for a poor link, thereby reducing the overhead involved and improving the throughput of the network while maintaining network connectivity. Power control is also implemented not only to save energy but also to improve the network performance. Using simulations, we show the performance improvement attained in the network in terms of packet delivery ratio, routing overhead, and residual energy of the network. PMID:26167529

  5. Dynamic Agent Classification and Tracking Using an Ad Hoc Mobile Acoustic Sensor Network

    NASA Astrophysics Data System (ADS)

    Friedlander, David; Griffin, Christopher; Jacobson, Noah; Phoha, Shashi; Brooks, Richard R.

    2003-12-01

    Autonomous networks of sensor platforms can be designed to interact in dynamic and noisy environments to determine the occurrence of specified transient events that define the dynamic process of interest. For example, a sensor network may be used for battlefield surveillance with the purpose of detecting, identifying, and tracking enemy activity. When the number of nodes is large, human oversight and control of low-level operations is not feasible. Coordination and self-organization of multiple autonomous nodes is necessary to maintain connectivity and sensor coverage and to combine information for better understanding the dynamics of the environment. Resource conservation requires adaptive clustering in the vicinity of the event. This paper presents methods for dynamic distributed signal processing using an ad hoc mobile network of microsensors to detect, identify, and track targets in noisy environments. They seamlessly integrate data from fixed and mobile platforms and dynamically organize platforms into clusters to process local data along the trajectory of the targets. Local analysis of sensor data is used to determine a set of target attribute values and classify the target. Sensor data from a field test in the Marine base at Twentynine Palms, Calif, was analyzed using the techniques described in this paper. The results were compared to "ground truth" data obtained from GPS receivers on the vehicles.

  6. 78 FR 10127 - Request for Nominations to the Agricultural Air Quality Task Force

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-13

    ... Conservation Service Request for Nominations to the Agricultural Air Quality Task Force AGENCY: Natural... Nominations to the Agricultural Air Quality Task Force. SUMMARY: The Secretary of Agriculture invites... Force (AAQTF) which was established by the Federal Agriculture Improvement and Reform Act of 1996 to...

  7. 76 FR 52318 - U.S. Coral Reef Task Force Public Meeting and Public Comment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-22

    ... DEPARTMENT OF COMMERCE National Oceanic and Atmospheric Administration U.S. Coral Reef Task Force... of the U.S. Coral Reef Task Force. The meeting will be held in Ft. Lauderdale, Florida. This meeting, the 26th bi-annual meeting of the U.S. Coral Reef Task Force, provides a forum for coordinated...

  8. History and background of the California Oak Mortality Task Force (COMTF)

    Treesearch

    Mark R. Stanley

    2006-01-01

    The California Oak Mortality Task Force was formed in August 2000 as a consensus group to address the impacts caused by Phytophthora ramorum. It is over 1000 strong with over 80 agencies, universities, public, and private groups currently involved. The Task Force has been a tremendous success and may serve as model for other similar efforts.

  9. Agricultural Drainage Management Systems Task Force (ADMSTF)

    USDA-ARS?s Scientific Manuscript database

    The Agricultural Drainage Management Systems (ADMS) Task Force was initiated during a Charter meeting in the fall of 2002 by dedicated professional employees of Federal, State, and Local Government Agencies and Universities. The Agricultural Drainage Management (ADM) Coalition was established in 200...

  10. Report of the Task Force on SSC Magnet System Test Site

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1984-10-01

    The Task Force on SSC Magnet Systems test Site was appointed by Maury Tigner, Director of the SSC, Phase 1 in August 1984. In brief, the charge asked the Task Force to make a critical evaluation of potential test sites for a major SSC magnet System Test Facility (STF) with regard to: (1) availability of the needed space, utilities, staff and other requirements on the desired time scale; and (2) the cost of preparing the sites for the tests and for operating the facilities during the test period. The charge further suggests that, by virtue of existing facilities and availabilitymore » of experienced staff, BNL and FNAL are the two best candidate sites and that is therefore appears appropriate to restrict the considerations of the Task Force to these sites. During the subsequent deliberations of the Task Force, no new facts were revealed that altered the assumptions of the charge in this regard. The charge does not ask for a specific site recommendation for the STF. Indeed, an agreement on such a recommendation would be difficult to achieve considering the composition of the Task Force, wherein a large fraction of the membership is drawn from the two contending laboratories. Instead, we have attempted to describe the purpose of the facility, outline a productive test program, list the major facilities required, carefully review the laboratories` responses to the facility requirements, and make objective comparisons of the specific features and capabilities offered.« less

  11. 75 FR 47624 - U.S. Coral Reef Task Force Public Meeting and Public Comment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-06

    ... DEPARTMENT OF THE INTERIOR Fish and Wildlife Service U.S. Coral Reef Task Force Public Meeting and... (Service), announce a public meeting of the U.S. Coral Reef Task Force (USCRTF) and a request for written.... Coral Reef Task Force Department of the Interior Liaison, U.S. Department of the Interior, MS-3530-MIB...

  12. Dynamical signatures of isometric force control as a function of age, expertise, and task constraints.

    PubMed

    Vieluf, Solveig; Sleimen-Malkoun, Rita; Voelcker-Rehage, Claudia; Jirsa, Viktor; Reuter, Eva-Maria; Godde, Ben; Temprado, Jean-Jacques; Huys, Raoul

    2017-07-01

    From the conceptual and methodological framework of the dynamical systems approach, force control results from complex interactions of various subsystems yielding observable behavioral fluctuations, which comprise both deterministic (predictable) and stochastic (noise-like) dynamical components. Here, we investigated these components contributing to the observed variability in force control in groups of participants differing in age and expertise level. To this aim, young (18-25 yr) as well as late middle-aged (55-65 yr) novices and experts (precision mechanics) performed a force maintenance and a force modulation task. Results showed that whereas the amplitude of force variability did not differ across groups in the maintenance tasks, in the modulation task it was higher for late middle-aged novices than for experts and higher for both these groups than for young participants. Within both tasks and for all groups, stochastic fluctuations were lowest where the deterministic influence was smallest. However, although all groups showed similar dynamics underlying force control in the maintenance task, a group effect was found for deterministic and stochastic fluctuations in the modulation task. The latter findings imply that both components were involved in the observed group differences in the variability of force fluctuations in the modulation task. These findings suggest that between groups the general characteristics of the dynamics do not differ in either task and that force control is more affected by age than by expertise. However, expertise seems to counteract some of the age effects. NEW & NOTEWORTHY Stochastic and deterministic dynamical components contribute to force production. Dynamical signatures differ between force maintenance and cyclic force modulation tasks but hardly between age and expertise groups. Differences in both stochastic and deterministic components are associated with group differences in behavioral variability, and observed behavioral

  13. Quadriceps force and anterior tibial force occur obviously later than vertical ground reaction force: a simulation study.

    PubMed

    Ueno, Ryo; Ishida, Tomoya; Yamanaka, Masanori; Taniguchi, Shohei; Ikuta, Ryohei; Samukawa, Mina; Saito, Hiroshi; Tohyama, Harukazu

    2017-11-18

    Although it is well known that quadriceps force generates anterior tibial force, it has been unclear whether quadriceps force causes great anterior tibial force during the early phase of a landing task. The purpose of the present study was to examine whether the quadriceps force induced great anterior tibial force during the early phase of a landing task. Fourteen young, healthy, female subjects performed a single-leg landing task. Muscle force and anterior tibial force were estimated from motion capture data and synchronized force data from the force plate. One-way repeated measures analysis of variance and the post hoc Bonferroni test were conducted to compare the peak time of the vertical ground reaction force, quadriceps force and anterior tibial force during the single-leg landing. In addition, we examined the contribution of vertical and posterior ground reaction force, knee flexion angle and moment to peak quadriceps force using multiple linear regression. The peak times of the estimated quadriceps force (96.0 ± 23.0 ms) and anterior tibial force (111.9 ± 18.9 ms) were significantly later than that of the vertical ground reaction force (63.5 ± 6.8 ms) during the single-leg landing. The peak quadriceps force was positively correlated with the peak anterior tibial force (R = 0.953, P < 0.001). Multiple linear regression analysis showed that the peak knee flexion moment contributed significantly to the peak quadriceps force (R 2  = 0.778, P < 0.001). The peak times of the quadriceps force and the anterior tibial force were obviously later than that of the vertical ground reaction force for the female athletes during successful single-leg landings. Studies have reported that the peak time of the vertical ground reaction force was close to the time of anterior cruciate ligament (ACL) disruption in ACL injury cases. It is possible that early contraction of the quadriceps during landing might induce ACL disruption as a result of

  14. An adaptive neural swarm approach for intrusion defense in ad hoc networks

    NASA Astrophysics Data System (ADS)

    Cannady, James

    2011-06-01

    Wireless sensor networks (WSN) and mobile ad hoc networks (MANET) are being increasingly deployed in critical applications due to the flexibility and extensibility of the technology. While these networks possess numerous advantages over traditional wireless systems in dynamic environments they are still vulnerable to many of the same types of host-based and distributed attacks common to those systems. Unfortunately, the limited power and bandwidth available in WSNs and MANETs, combined with the dynamic connectivity that is a defining characteristic of the technology, makes it extremely difficult to utilize traditional intrusion detection techniques. This paper describes an approach to accurately and efficiently detect potentially damaging activity in WSNs and MANETs. It enables the network as a whole to recognize attacks, anomalies, and potential vulnerabilities in a distributive manner that reflects the autonomic processes of biological systems. Each component of the network recognizes activity in its local environment and then contributes to the overall situational awareness of the entire system. The approach utilizes agent-based swarm intelligence to adaptively identify potential data sources on each node and on adjacent nodes throughout the network. The swarm agents then self-organize into modular neural networks that utilize a reinforcement learning algorithm to identify relevant behavior patterns in the data without supervision. Once the modular neural networks have established interconnectivity both locally and with neighboring nodes the analysis of events within the network can be conducted collectively in real-time. The approach has been shown to be extremely effective in identifying distributed network attacks.

  15. PRN 2000-7: Non-Dietary Exposure Task Force

    EPA Pesticide Factsheets

    This PR Notice announces an industry-wide task force to jointly develop residential indoor exposure data for pesticides containing one or more of the active ingredients synthetic pyrethroids, pyrethrum and synergists.

  16. Enhancing the Selection of Backoff Interval Using Fuzzy Logic over Wireless Ad Hoc Networks

    PubMed Central

    Ranganathan, Radha; Kannan, Kathiravan

    2015-01-01

    IEEE 802.11 is the de facto standard for medium access over wireless ad hoc network. The collision avoidance mechanism (i.e., random binary exponential backoff—BEB) of IEEE 802.11 DCF (distributed coordination function) is inefficient and unfair especially under heavy load. In the literature, many algorithms have been proposed to tune the contention window (CW) size. However, these algorithms make every node select its backoff interval between [0, CW] in a random and uniform manner. This randomness is incorporated to avoid collisions among the nodes. But this random backoff interval can change the optimal order and frequency of channel access among competing nodes which results in unfairness and increased delay. In this paper, we propose an algorithm that schedules the medium access in a fair and effective manner. This algorithm enhances IEEE 802.11 DCF with additional level of contention resolution that prioritizes the contending nodes according to its queue length and waiting time. Each node computes its unique backoff interval using fuzzy logic based on the input parameters collected from contending nodes through overhearing. We evaluate our algorithm against IEEE 802.11, GDCF (gentle distributed coordination function) protocols using ns-2.35 simulator and show that our algorithm achieves good performance. PMID:25879066

  17. SVANET: A smart vehicular ad hoc network for efficient data transmission with wireless sensors.

    PubMed

    Sahoo, Prasan Kumar; Chiang, Ming-Jer; Wu, Shih-Lin

    2014-11-25

    Wireless sensors can sense any event, such as accidents, as well as icy roads, and can forward the rescue/warning messages through intermediate vehicles for any necessary help. In this paper, we propose a smart vehicular ad hoc network (SVANET) architecture that uses wireless sensors to detect events and vehicles to transmit the safety and non-safety messages efficiently by using different service channels and one control channel with different priorities. We have developed a data transmission protocol for the vehicles in the highway, in which data can be forwarded with the help of vehicles if they are connected with each other or data can be forwarded with the help of nearby wireless sensors. Our data transmission protocol is designed to increase the driving safety, to prevent accidents and to utilize channels efficiently by adjusting the control and service channel time intervals dynamically. Besides, our protocol can transmit information to vehicles in advance, so that drivers can decide an alternate route in case of traffic congestion. For various data sharing, we design a method that can select a few leader nodes among vehicles running along a highway to broadcast data efficiently. Simulation results show that our protocol can outperform the existing standard in terms of the end to end packet delivery ratio and latency.

  18. Frame Transmission Efficiency-Based Cross-Layer Congestion Notification Scheme in Wireless Ad Hoc Networks.

    PubMed

    He, Huaguang; Li, Taoshen; Feng, Luting; Ye, Jin

    2017-07-15

    Different from the traditional wired network, the fundamental cause of transmission congestion in wireless ad hoc networks is medium contention. How to utilize the congestion state from the MAC (Media Access Control) layer to adjust the transmission rate is core work for transport protocol design. However, recent works have shown that the existing cross-layer congestion detection solutions are too complex to be deployed or not able to characterize the congestion accurately. We first propose a new congestion metric called frame transmission efficiency (i.e., the ratio of successful transmission delay to the frame service delay), which describes the medium contention in a fast and accurate manner. We further present the design and implementation of RECN (ECN and the ratio of successful transmission delay to the frame service delay in the MAC layer, namely, the frame transmission efficiency), a general supporting scheme that adjusts the transport sending rate through a standard ECN (Explicit Congestion Notification) signaling method. Our method can be deployed on commodity switches with small firmware updates, while making no modification on end hosts. We integrate RECN transparently (i.e., without modification) with TCP on NS2 simulation. The experimental results show that RECN remarkably improves network goodput across multiple concurrent TCP flows.

  19. Direct trust-based security scheme for RREQ flooding attack in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Kumar, Sunil; Dutta, Kamlesh

    2017-06-01

    The routing algorithms in MANETs exhibit distributed and cooperative behaviour which makes them easy target for denial of service (DoS) attacks. RREQ flooding attack is a flooding-type DoS attack in context to Ad hoc On Demand Distance Vector (AODV) routing protocol, where the attacker broadcasts massive amount of bogus Route Request (RREQ) packets to set up the route with the non-existent or existent destination in the network. This paper presents direct trust-based security scheme to detect and mitigate the impact of RREQ flooding attack on the network, in which, every node evaluates the trust degree value of its neighbours through analysing the frequency of RREQ packets originated by them over a short period of time. Taking the node's trust degree value as the input, the proposed scheme is smoothly extended for suppressing the surplus RREQ and bogus RREQ flooding packets at one-hop neighbours during the route discovery process. This scheme distinguishes itself from existing techniques by not directly blocking the service of a normal node due to increased amount of RREQ packets in some unusual conditions. The results obtained throughout the simulation experiments clearly show the feasibility and effectiveness of the proposed defensive scheme.

  20. 76 FR 55394 - Meeting of the Task Force on Community Preventive Services

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-07

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention Meeting of the...), Department of Health and Human Services (HHS). ACTION: Notice of meeting. SUMMARY: The Centers for Disease... (Task Force). The Task Force--an independent, nonfederal body of nationally known leaders in public...

  1. 76 FR 4115 - Meeting of the Task Force on Community Preventive Services

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-24

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention Meeting of the...), Department of Health and Human Services (HHS). ACTION: Notice of meeting. SUMMARY: The Centers for Disease... (Task Force). The Task Force--an independent, nonfederal body of nationally known leaders in public...

  2. 75 FR 63846 - Meeting of the Task Force on Community Preventive Services

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-18

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention Meeting of the...), Department of Health and Human Services (HHS). ACTION: Notice of meeting. SUMMARY: The Centers for Disease... (Task Force). The Task Force is an independent, nonfederal body of nationally known leaders in public...

  3. Enhanced Training by a Systemic Governance of Force Capabilities, Tasks, and Processes

    DTIC Science & Technology

    2013-06-01

    18th ICCRTS “C2 in Underdeveloped, Degraded and Denied Operational Environments” Enhanced Training by a Systemic Governance of Force Capabilities...TITLE AND SUBTITLE Enhanced Training by a Systemic Governance of Force Capabilities, Tasks, and Processes 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c...assess, evaluate and accredit the Swedish forces. This paper presents a Systemic Governance of Capabilities, Tasks, and Processes applied to the

  4. Performance drifts in two-finger cyclical force production tasks performed by one and two actors.

    PubMed

    Hasanbarani, Fariba; Reschechtko, Sasha; Latash, Mark L

    2018-03-01

    We explored changes in the cyclical two-finger force performance task caused by turning visual feedback off performed either by the index and middle fingers of the dominant hand or by two index fingers of two persons. Based on an earlier study, we expected drifts in finger force amplitude and midpoint without a drift in relative phase. The subjects performed two rhythmical tasks at 1 Hz while paced by an auditory metronome. One of the tasks required cyclical changes in total force magnitude without changes in the sharing of the force between the two fingers. The other task required cyclical changes in the force sharing without changing total force magnitude. Subjects were provided with visual feedback, which showed total force magnitude and force sharing via cursor motion along the vertical and horizontal axes, respectively. Further, visual feedback was turned off, first on the variable that was not required to change and then on both variables. Turning visual feedback off led to a mean force drift toward lower magnitudes while force amplitude increased. There was a consistent drift in the relative phase in the one-hand task with the index finger leading the middle finger. No consistent relative phase drift was seen in the two-person tasks. The shape of the force cycle changed without visual feedback reflected in the lower similarity to a perfect cosine shape and in the higher time spent at lower force magnitudes. The data confirm findings of earlier studies regarding force amplitude and midpoint changes, but falsify predictions of an earlier proposed model with respect to the relative phase changes. We discuss factors that could contribute to the observed relative phase drift in the one-hand tasks including the leader-follower pattern generalized for two-effector tasks performed by one person.

  5. Task Force on Innovation in Dental Hygiene Curricula.

    ERIC Educational Resources Information Center

    Bader, James; And Others

    1989-01-01

    The background, origins, functions, and recommendations of the American Association of Dental Schools' task force investigating improvement of access to dental hygiene training programs and of curriculum and program design are presented. (MSE)

  6. 28 CFR 16.105 - Exemption of Foreign Terrorist Tracking Task Force System.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of Foreign Terrorist Tracking Task Force System. 16.105 Section 16.105 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR... of Foreign Terrorist Tracking Task Force System. (a) The following system of records is exempt from 5...

  7. General Aviation Task Force report

    NASA Technical Reports Server (NTRS)

    1993-01-01

    General aviation is officially defined as all aviation except scheduled airlines and the military. It is the only air transportation to many communities throughout the world. In order to reverse the recent decline in general aviation aircraft produced in the United States, the Task Force recommends that NASA provide the expertise and facilities such as wind tunnels and computer codes for aircraft design. General aviation manufacturers are receptive to NASA's innovations and technological leadership and are expected to be effective users of NASA-generated technologies.

  8. Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks

    PubMed Central

    Paramasivan, B.; Kaliappan, M.

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP. PMID:25143986

  9. VehiHealth: An Emergency Routing Protocol for Vehicular Ad Hoc Network to Support Healthcare System.

    PubMed

    Bhoi, S K; Khilar, P M

    2016-03-01

    Survival of a patient depends on effective data communication in healthcare system. In this paper, an emergency routing protocol for Vehicular Ad hoc Network (VANET) is proposed to quickly forward the current patient status information from the ambulance to the hospital to provide pre-medical treatment. As the ambulance takes time to reach the hospital, ambulance doctor can provide sudden treatment to the patient in emergency by sending patient status information to the hospital through the vehicles using vehicular communication. Secondly, the experienced doctors respond to the information by quickly sending a treatment information to the ambulance. In this protocol, data is forwarded through that path which has less link breakage problem between the vehicles. This is done by calculating an intersection value I v a l u e for the neighboring intersections by using the current traffic information. Then the data is forwarded through that intersection which has minimum I v a l u e . Simulation results show VehiHealth performs better than P-GEDIR, GyTAR, A-STAR and GSR routing protocols in terms of average end-to-end delay, number of link breakage, path length, and average response time.

  10. Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.

    PubMed

    Paramasivan, B; Kaliappan, M

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  11. Grip force coordination during bimanual tasks in unilateral cerebral palsy.

    PubMed

    Islam, Mominul; Gordon, Andrew M; Sköld, Annika; Forssberg, Hans; Eliasson, Ann-Christin

    2011-10-01

    The aim of the study was to investigate coordination of fingertip forces during an asymmetrical bimanual task in children with unilateral cerebral palsy (CP). Twelve participants (six males, six females; mean age 14y 4mo, SD 3.3y; range 9-20y;) with unilateral CP (eight right-sided, four left-sided) and 15 age-matched typically developing participants (five males, 10 females; mean age 14y 3mo, SD 2.9y; range 9-18y,) were included. Participants were instructed to hold custom-made grip devices in each hand and place one device on top of the other. The grip force and load force were recorded simultaneously in both hands. Temporal coordination between the two hands was impaired in the participants with CP (compared with that in typically developing participants), that is they initiated the task by decreasing grip force in the releasing hand before increasing the force in the holding hand. The grip force increase in the holding hand was also smaller in participants with CP (involved hand/non-dominant hand releasing, p<0.001; non-involved hand/dominant hand releasing, p=0.007), indicating deficient scaling of force amplitude. The impairment was greater when participants with CP used their non-involved hand as the holding hand. Temporal coordination and scaling of fingertip forces were impaired in both hands in participants with CP. The non-involved hand was strongly affected by activity in the involved hand, which may explain why children with unilateral CP prefer to use only one hand during tasks that are typically performed with both hands. © The Authors. Developmental Medicine & Child Neurology © 2011 Mac Keith Press.

  12. Bidirectional transfer between joint and individual actions in a task of discrete force production.

    PubMed

    Masumoto, Junya; Inui, Nobuyuki

    2017-07-01

    The present study examined bidirectional learning transfer between joint and individual actions involving discrete isometric force production with the right index finger. To examine the effects of practice of joint action on performance of the individual action, participants performed a pre-test (individual condition), practice blocks (joint condition), and a post-test (individual condition) (IJI task). To examine the effects of practice of the individual action on performance during the joint action, the participants performed a pre-test (joint condition), practice blocks (individual condition), and a post-test (joint condition) (JIJ task). Whereas one participant made pressing movements with a target peak force of 10% maximum voluntary contraction (MVC) in the individual condition, two participants produced the target force of the sum of 10% MVC produced by each of them in the joint condition. In both the IJI and JIJ tasks, absolute errors and standard deviations of peak force were smaller post-test than pre-test, indicating bidirectional transfer between individual and joint conditions for force accuracy and variability. Although the negative correlation between forces produced by two participants (complementary force production) became stronger with practice blocks in the IJI task, there was no difference between the pre- and post-tests for the negative correlation in the JIJ task. In the JIJ task, the decrease in force accuracy and variability during the individual action did not facilitate complementary force production during the joint action. This indicates that practice performed by two people is essential for complementary force production in joint action.

  13. Task Force on Declining Enrollment. Final Report.

    ERIC Educational Resources Information Center

    Hamden Public Schools, CT.

    This task force in Hamden, Connecticut, discovered an intricate relationship among declining enrollment and finances, buildings, community impact, and educational impact. Their study resulted in nine conclusions and recommendations. (1) We will recommend to the board of education criteria, procedures, and timetables for closing a school. (2)…

  14. Freedom of Information Act: FOIA Task Force Report

    EPA Pesticide Factsheets

    FOIA Task Force review of any significant weaknesses, and recommendation for improvements of efficiency and effectiveness of the agency's FOIA operations to ensure that information is provided to the Amercian public in a timely fashion.

  15. Integration of Body Sensor Networks and Vehicular Ad-hoc Networks for Traffic Safety

    PubMed Central

    Reyes-Muñoz, Angelica; Domingo, Mari Carmen; López-Trinidad, Marco Antonio; Delgado, José Luis

    2016-01-01

    The emergence of Body Sensor Networks (BSNs) constitutes a new and fast growing trend for the development of daily routine applications. However, in the case of heterogeneous BSNs integration with Vehicular ad hoc Networks (VANETs) a large number of difficulties remain, that must be solved, especially when talking about the detection of human state factors that impair the driving of motor vehicles. The main contributions of this investigation are principally three: (1) an exhaustive review of the current mechanisms to detect four basic physiological behavior states (drowsy, drunk, driving under emotional state disorders and distracted driving) that may cause traffic accidents is presented; (2) A middleware architecture is proposed. This architecture can communicate with the car dashboard, emergency services, vehicles belonging to the VANET and road or street facilities. This architecture seeks on the one hand to improve the car driving experience of the driver and on the other hand to extend security mechanisms for the surrounding individuals; and (3) as a proof of concept, an Android real-time attention low level detection application that runs in a next-generation smartphone is developed. The application features mechanisms that allow one to measure the degree of attention of a driver on the base of her/his EEG signals, establish wireless communication links via various standard wireless means, GPRS, Bluetooth and WiFi and issue alarms of critical low driver attention levels. PMID:26784204

  16. Telecommunications: A Paradigm for the Future of Illinois Higher Education.

    ERIC Educational Resources Information Center

    Illinois Community Coll. Board, Springfield.

    The Illinois Community College Board created the Telecommunications Ad Hoc Task Force (TAHTF) to examine the current status of telecommunications in the Illinois Community College System (ICCS), to determine the feasibility of establishing a statewide telecommunications network, and to recommend policies for the development and use of such a…

  17. Report of the Task Force on Continuing Education and Non-Credit Instruction.

    ERIC Educational Resources Information Center

    Ernest, Richard J.; And Others

    The Task Force on Continuing Education and Non-Credit Instruction was appointed to develop specific strategies for expanding lifelong learning and non-credit instruction in the Virginia community colleges. The task force reviewed a report on the state funding of non-credit instruction; wrote to the community college coordinating offices in 17…

  18. Wave scheduling - Decentralized scheduling of task forces in multicomputers

    NASA Technical Reports Server (NTRS)

    Van Tilborg, A. M.; Wittie, L. D.

    1984-01-01

    Decentralized operating systems that control large multicomputers need techniques to schedule competing parallel programs called task forces. Wave scheduling is a probabilistic technique that uses a hierarchical distributed virtual machine to schedule task forces by recursively subdividing and issuing wavefront-like commands to processing elements capable of executing individual tasks. Wave scheduling is highly resistant to processing element failures because it uses many distributed schedulers that dynamically assign scheduling responsibilities among themselves. The scheduling technique is trivially extensible as more processing elements join the host multicomputer. A simple model of scheduling cost is used by every scheduler node to distribute scheduling activity and minimize wasted processing capacity by using perceived workload to vary decentralized scheduling rules. At low to moderate levels of network activity, wave scheduling is only slightly less efficient than a central scheduler in its ability to direct processing elements to accomplish useful work.

  19. Using grasping tasks to evaluate hand force coordination in children with hemiplegic cerebral palsy.

    PubMed

    Mackenzie, Samuel J; Getchell, Nancy; Modlesky, Christopher M; Miller, Freeman; Jaric, Slobodan

    2009-08-01

    Mackenzie SJ, Getchell N, Modlesky CM, Miller F, Jaric S. Using grasping tasks to evaluate hand force coordination in children with hemiplegic cerebral palsy. To assess force coordination in children with hemiplegic cerebral palsy (CP) using a device that allows for testing both unimanual and bimanual manipulation tasks performed under static and dynamic conditions. Nonequivalent groups design. University research laboratory for motor control. Six children with hemiplegic CP (age, mean +/- SD, 11.6+/-1.8 y) and 6 typically developing controls (11.6+/-1.6 y). Not applicable. Children performed simple lifting and force-matching static ramp tasks by way of both unimanual and bimanual pulling using a device that measures grip force (force acting perpendicularly at the digits-device contact area) and load force (tangential force). Main outcome measures were grip/load force ratios (grip force scaling) and correlation coefficients (force coupling). CP subjects showed significantly higher grip/load force ratios (P<.05) and slightly lower correlation coefficients than the control group, with more pronounced differences for most tasks when using their involved hand. For subjects with CP, switching from unimanual to bimanual conditions did not bring changes in scaling or coupling for the involved hand (P>.05). Compared with healthy children, the impaired hand function in the hemiplegic CP pediatric population could be reflected in excessive grip force that is also decoupled from ongoing changes in load force. Therefore, the bimanual grip load device used in this study could provide a sensitive measure of grip force coordination in CP, although nonmotor deficits should be taken into account when asking children to perform more complex tasks.

  20. Ad Hoc Influenza Vaccination During Years of Significant Antigenic Drift in a Tropical City With 2 Seasonal Peaks

    PubMed Central

    Wong, Martin C.S.; Nelson, E. Anthony S.; Leung, Czarina; Lee, Nelson; Chan, Martin C.W.; Choi, Kin Wing; Rainer, Timothy H.; Cheng, Frankie W.T.; Wong, Samuel Y.S.; Lai, Christopher K.C.; Lam, Bosco; Cheung, Tak Hong; Leung, Ting Fan; Chan, Paul K.S.

    2016-01-01

    Abstract We evaluated the acceptability of an additional ad hoc influenza vaccination among the health care professionals following seasons with significant antigenic drift. Self-administered, anonymous surveys were performed by hard copy questionnaires in public hospitals, and by an on-line platform available to all healthcare professionals, from April 1st to May 31st, 2015. A total of 1290 healthcare professionals completed the questionnaires, including doctors, nurses, and allied health professionals working in both the public and private systems. Only 31.8% of participating respondents expressed an intention to receive the additional vaccine, despite that the majority of them agreed or strongly agreed that it would bring benefit to the community (88.9%), save lives (86.7%), reduce medical expenses (76.3%), satisfy public expectation (82.8%), and increase awareness of vaccination (86.1%). However, a significant proportion expressed concern that the vaccine could disturb the normal immunization schedule (45.5%); felt uncertain what to do in the next vaccination round (66.0%); perceived that the summer peak might not occur (48.2%); and believed that the summer peak might not be of the same virus (83.5%). Furthermore, 27.8% of all respondents expected that the additional vaccination could weaken the efficacy of previous vaccinations; 51.3% was concerned about side effects; and 61.3% estimated that there would be a low uptake rate. If the supply of vaccine was limited, higher priority groups were considered to include the elderly aged ≥65 years with chronic medical conditions (89.2%), the elderly living in residential care homes (87.4%), and long-stay residents of institutions for the disabled (80.7%). The strongest factors associated with accepting the additional vaccine included immunization with influenza vaccines in the past 3 years, higher perceived risk of contracting influenza, and higher perceived severity of the disease impact. The acceptability to an

  1. Lifelong Learning NCES Task Force: Final Report, Volume I. Working Paper Series.

    ERIC Educational Resources Information Center

    Binkley, Marilyn; Hudson, Lisa; Knepper, Paula; Kolstad, Andy; Stowe, Peter; Wirt, John

    In September 1998, the National Center for Education Statistics (NCES) established a 1-year task force to review the NCES's role concerning lifelong learning. The eight-member task force established a working definition of lifelong learning ("a process or system through which individuals are able and willing to learn at all stages of life,…

  2. 76 FR 71308 - Codex Alimentarius Commission: Meeting of the Ad Hoc Intergovernmental Codex Task Force on Animal...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-17

    ... DEPARTMENT OF AGRICULTURE Food Safety and Inspection Service [Docket No. FSIS-2011-0026] Codex...: Office of the Under Secretary for Food Safety, USDA. ACTION: Notice of public meeting and request for comments. SUMMARY: The Office of the Under Secretary for Food Safety, U.S. Department of Agriculture (USDA...

  3. 78 FR 1196 - Codex Alimentarius Commission: Meeting of the Ad Hoc Codex Intergovernmental Task Force on Animal...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-08

    ... related to the 7th Session of the AFTF will be accessible via the World Wide Web at the following address... World Health Organization (WHO). Through adoption of food standards, codes of practice, and other... animals. The guidelines should include specific science-based risk assessment criteria to apply to feed...

  4. 76 FR 52932 - Notice of Meeting of the Agricultural Air Quality Task Force

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-24

    ... DEPARTMENT OF AGRICULTURE Natural Resources Conservation Service Notice of Meeting of the Agricultural Air Quality Task Force AGENCY: Natural Resources Conservation Service (NRCS). ACTION: Notice of meeting. SUMMARY: The Agricultural Air Quality Task Force (AAQTF) will meet to continue discussions on...

  5. Virginia Tech State Task Force Reports Summary

    ERIC Educational Resources Information Center

    McBride, James T.

    2010-01-01

    An analysis of eleven state task force reports prompted by the tragic nature of the Virginia Tech shooting in 2007 revealed that all shared a primary theme: no "single best way" to protect American college and university campuses yet exists. These documents, individually and collectively, make it clear that contemporary complex learning…

  6. Interstate Migrant Education Task Force: Migrant Health.

    ERIC Educational Resources Information Center

    Education Commission of the States, Denver, CO.

    Because ill-clothed, sick, or hungry migrant children learn poorly, the Task Force has emphasized the migrant health situation in 1979. Migrant workers have a 33% shorter life expectancy, a 25% higher infant mortality rate, and a 25% higher death rate from tuberculosis and other communicable diseases than the national average. Common among…

  7. Current guidelines for the evaluation and management of atopic dermatitis: A comparison of the Joint Task Force Practice Parameter and American Academy of Dermatology guidelines.

    PubMed

    Eichenfield, Lawrence F; Ahluwalia, Jusleen; Waldman, Andrea; Borok, Jenna; Udkoff, Jeremy; Boguniewicz, Mark

    2017-04-01

    Atopic dermatitis (AD) is a chronic pruritic inflammatory disease that commonly presents in the pediatric population. Although definitions and diagnosis of AD have largely been agreed upon, allergists and dermatologists have similar and divergent approaches to the management of AD. This review facilitated integration of the American Academy of Allergy, Asthma & Immunology/American College of Allergy, Asthma & Immunology Joint Task Force 2012 AD Practice Parameter and the 2014 American Academy of Dermatology guidelines to highlight the basic principles of AD management and discuss therapies and management of AD from the distinct perspectives of the allergist and dermatologist. Copyright © 2017 American Academy of Allergy, Asthma & Immunology. Published by Elsevier Inc. All rights reserved.

  8. A Report by the Governor's Task Force on Vocational and Technical Education.

    ERIC Educational Resources Information Center

    Governor's Task Force on Vocational and Technical Education, Columbus, OH.

    On July 19, 1968, a Task Force on Vocational and Technical Education was created by the governor of Ohio to develop proposals for organization, financing, and legislation. Some major problems to which the Task Force gave attention were: (1) the serious gap between the need for and the availability of vocational and technical education, (2) the…

  9. U. S. Atlantic Fleet, Task Force 85. Operation Plan Number 3-44

    DTIC Science & Technology

    1944-07-27

    Potential Targets in Sectors of Responsibility Gril /8thPhib/Al6-3 Serial: 0031(P) DEAN/14- Potential Targets in Se_otors t of Respon- sibility...tags accompany the remains, ANNEX QUEEN MEDICAL PLAN - Page 6 of 8 GrIl /8thPhib/Al6-3 WESTERN NAVAL TASK FORCE, Serial: 0037(P) TASK FORCE EIGHTY-FIVE

  10. 75 FR 48929 - Notice of Meeting of the Agricultural Air Quality Task Force

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-12

    ... Agricultural Air Quality Task Force AGENCY: Natural Resources Conservation Service (NRCS), United States... Triangle Park, North Carolina 27711; (919) 541-5400. The Agricultural Air Quality Task Force (AAQTF) will meet to continue discussions on air quality issues relating to agriculture. Additionally, the Livestock...

  11. Multisociety Task Force for Critical Care Research

    PubMed Central

    Deutschman, Clifford S.; Ahrens, Tom; Cairns, Charles B.; Sessler, Curtis N.

    2012-01-01

    Background: Research in critical care extends from the bench to the bedside, involving multiple departments, specialties, and funding organizations. Because of this diversity, it has been difficult for all stakeholders to collectively identify challenges and establish priorities. Objective: To define a comprehensive agenda for critical care research using input from a broad range of stakeholders to serve as a blueprint for future initiatives. Methods: The Critical Care Societies Collaborative (CCSC), consisting of the leadership of the American Association of Critical-Care Nurses (AACN), the American College of Chest Physicians (ACCP), the American Thoracic Society (ATS), and the Society of Critical Care Medicine (SCCM), joined the US Critical Illness and Injury Trials Group (USCIITG) in forming a task force to define a comprehensive critical care research agenda. This group of 25 identified experts was divided into subgroups to address basic, translational, clinical, implementation, and educational research. The subgroups met via conference calls, and the entire task force met in person for a 2-day session. The result was a detailed discussion of the research priorities that served as the basis for this report. Results: The task force identified challenges, specific priority areas, and recommendations for process improvements to support critical care research. Additionally, four overarching themes emerged: 1) the traditional “silo-ed” approach to critical care research is counterproductive and should be modified; 2) an approach that more effectively links areas of research (ie, basic and translational research, or clinical research and implementation) should be embraced; 3) future approaches to human research should account for disease complexity and patient heterogeneity; and 4) an enhanced infrastructure for critical care research is essential for future success. Conclusions: This document contains the themes/recommendations developed by a large

  12. States Address Civics with Mandated Task Forces

    ERIC Educational Resources Information Center

    Delander, Brady

    2014-01-01

    By coincidence or not, Massachusetts, Illinois and Virginia created civic education task forces not long after national test results showed a dismal understanding of the subject matter across all grade levels. Results of the 2010 National Assessment of Educational Progress showed just 25 percent of all testtakers in grades 4, 8 and 12 demonstrated…

  13. Concurrent Transmission Based on Channel Quality in Ad Hoc Networks: A Game Theoretic Approach

    NASA Astrophysics Data System (ADS)

    Chen, Chen; Gao, Xinbo; Li, Xiaoji; Pei, Qingqi

    In this paper, a decentralized concurrent transmission strategy in shared channel in Ad Hoc networks is proposed based on game theory. Firstly, a static concurrent transmissions game is used to determine the candidates for transmitting by channel quality threshold and to maximize the overall throughput with consideration of channel quality variation. To achieve NES (Nash Equilibrium Solution), the selfish behaviors of node to attempt to improve the channel gain unilaterally are evaluated. Therefore, this game allows each node to be distributed and to decide whether to transmit concurrently with others or not depending on NES. Secondly, as there are always some nodes with lower channel gain than NES, which are defined as hunger nodes in this paper, a hunger suppression scheme is proposed by adjusting the price function with interferences reservation and forward relay, to fairly give hunger nodes transmission opportunities. Finally, inspired by stock trading, a dynamic concurrent transmission threshold determination scheme is implemented to make the static game practical. Numerical results show that the proposed scheme is feasible to increase concurrent transmission opportunities for active nodes, and at the same time, the number of hunger nodes is greatly reduced with the least increase of threshold by interferences reservation. Also, the good performance on network goodput of the proposed model can be seen from the results.

  14. SVANET: A Smart Vehicular Ad Hoc Network for Efficient Data Transmission with Wireless Sensors

    PubMed Central

    Sahoo, Prasan Kumar; Chiang, Ming-Jer; Wu, Shih-Lin

    2014-01-01

    Wireless sensors can sense any event, such as accidents, as well as icy roads, and can forward the rescue/warning messages through intermediate vehicles for any necessary help. In this paper, we propose a smart vehicular ad hoc network (SVANET) architecture that uses wireless sensors to detect events and vehicles to transmit the safety and non-safety messages efficiently by using different service channels and one control channel with different priorities. We have developed a data transmission protocol for the vehicles in the highway, in which data can be forwarded with the help of vehicles if they are connected with each other or data can be forwarded with the help of nearby wireless sensors. Our data transmission protocol is designed to increase the driving safety, to prevent accidents and to utilize channels efficiently by adjusting the control and service channel time intervals dynamically. Besides, our protocol can transmit information to vehicles in advance, so that drivers can decide an alternate route in case of traffic congestion. For various data sharing, we design a method that can select a few leader nodes among vehicles running along a highway to broadcast data efficiently. Simulation results show that our protocol can outperform the existing standard in terms of the end to end packet delivery ratio and latency. PMID:25429409

  15. Vibrational Frequencies and Spectroscopic Constants for 1(sup 3)A' HNC and 1(sup 3)A' HOC+ from High-Accuracy Quartic Force Fields

    NASA Technical Reports Server (NTRS)

    Fortenberry, Ryan C.; Crawford, T. Daniel; Lee, Timothy J.

    2014-01-01

    The spectroscopic constants and vibrational frequencies for the 1(sup 3)A' states of HNC, DNC, HOC+, and DOC+ are computed and discussed in this work. The reliable CcCR quartic force field based on high-level coupled cluster ab initio quantum chemical computations is exclusively utilized to provide the anharmonic potential. Then, second order vibrational perturbation theory and vibrational configuration interaction methods are employed to treat the nuclear Schroedinger equation. Second-order perturbation theory is also employed to provide spectroscopic data for all molecules examined. The relationship between these molecules and the corresponding 1(sup 3)A' HCN and HCO+ isomers is further developed here. These data are applicable to laboratory studies involving formation of HNC and HOC+ as well as astronomical observations of chemically active astrophysical environments.

  16. Task Force on Defense Strategies for Ensuring the Resilience of National Space Capabilities. Executive Summary

    DTIC Science & Technology

    2017-03-21

    March 2017 Task Force on Defense Strategies for Ensuring the Resilience of National Space Capabilities OFFICE OF THE UNDER SECRETARY OF...the Department of Defense. The DSB Task Force on Defense Strategies for Ensuring the Resilience of National Space Capabilities completed its formal...Ensuring the Resilience of National Space Capabilities | i DSB Task Force on Defense Strategies for Ensuring the

  17. U.S. Preventive Services Task Force recommendations and cancer screening among female Medicare beneficiaries.

    PubMed

    Salloum, Ramzi G; Kohler, Racquel E; Jensen, Gail A; Sheridan, Stacey L; Carpenter, William R; Biddle, Andrea K

    2014-03-01

    Medicare covers several cancer screening tests not currently recommended by the U.S. Preventive Services Task Force (Task Force). In September 2002, the Task Force relaxed the upper age limit of 70 years for breast cancer screening recommendations, and in March 2003 an upper age limit of 65 years was introduced for cervical cancer screening recommendations. We assessed whether mammogram and Pap test utilization among women with Medicare coverage is influenced by changes in the Task Force's recommendations for screening. We identified female Medicare beneficiaries aged 66-80 years and used bivariate probit regression to examine the receipt of breast (mammogram) and cervical (Pap test) cancer screening reflecting changes in the Task Force recommendations. We analyzed 9,760 Medicare Current Beneficiary Survey responses from 2001 to 2007. More than two-thirds reported receiving a mammogram and more than one-third a Pap test in the previous 2 years. Lack of recommendation was given as a reason for not getting screened among the majority (51% for mammogram and 75% for Pap). After controlling for beneficiary-level socioeconomic characteristics and access to care factors, we did not observe a significant change in breast and cervical cancer screening patterns following the changes in Task Force recommendations. Although there is evidence that many Medicare beneficiaries adhere to screening guidelines, some women may be receiving non-recommended screening services covered by Medicare.

  18. 75 FR 20578 - Federal Advisory Committee; Defense Health Board (DHB); Department of Defense Task Force on the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-20

    ... (DHB); Department of Defense Task Force on the Prevention of Suicide by Members of the Armed Forces... announces a meeting of the Department of Defense Task Force on the Prevention of Suicide by Members of the... Secretary, Department of Defense Task Force on the Prevention of Suicide by Members of the Armed Forces, One...

  19. Effect of loudness on reaction time and response force in different motor tasks.

    PubMed

    Jaśkowski, Piotr; Włodarczyk, Dariusz

    2005-12-01

    Van der Molen and Keuss, in 1979 and 1981, showed that paradoxically long reaction times occur with extremely strong auditory stimuli when the task is difficult, e.g., choice-by-location or Simon paradigm. It was argued that this paradoxical behavior of RT is due to active inhibition of an arousal-dependent bypassing mechanism to prevent false responses. As the peak force, i.e., maximal force exerted by participants on a response key, is considered to be related to immediate arousal, we predicted that for extremely loud stimuli and for difficult tasks, lengthening of RT should be associated with reduction of peak force. Moreover, these effects should be enhanced when emphasis is on accuracy rather than speed. Although the relation between RT and intensity depended on task difficulty, no increase in RT was found for the loudest tones. Moreover, peak force increased monotonically with loudness, showing no tendency to be suppressed for loudest tones and difficult tasks.

  20. Conference-EC-US Task Force Joint US-EU Workshop on Metabolomics and Environmental Biotechnology

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    PI: Lily Y. Young

    2009-06-04

    Since 1990, the EC-US Task Force on Biotechnology Research has been coordinating transatlantic efforts to guide and exploit the ongoing revolution in biotechnology and the life sciences. The Task Force was established in June 1990 by the European Commission and the White House Office of Science and Technology Policy. The Task Force has acted as an effective forum for discussion, coordination, and development of new ideas for the last 18 years. Task Force members are European Commission and US Government science and technology administrators who meet annually to enhance communication across the Atlantic, and to encourage collaborative research. Through sponsoringmore » workshops, and other activities, the Task Force also brings together scientific leaders and early career researchers from both sides of the Atlantic to forecast research challenges and opportunities and to promote better links between researchers. Over the years, by keeping a focus on the future of science, the Task Force has played a key role in establishing a diverse range of emerging scientific fields, including biodiversity research, neuroinformatics, genomics, nanobiotechnology, neonatal immunology, transkingdom molecular biology, biologically-based fuels, and environmental biotechnology. The EC-US Task Force has sponsored a number of Working Groups on topics of mutual transatlantic interest. The idea to create a Working Group on Environmental Biotechnology research was discussed in the Task Force meeting of October 1993. The EC-US Working Group on Environmental Biotechnology set as its mission 'To train the next generation of leaders in environmental biotechnology in the United States and the European Union to work collaboratively across the Atlantic.' Since 1995, the Working Group supported three kinds of activities, all of which focus one early career scientists: (1) Workshops on the use of molecular methods and genomics in environmental biotechnology; (2) Short courses with theoretical

  1. Standardization of Negative Controls in Diagnostic Immunohistochemistry: Recommendations From the International Ad Hoc Expert Panel

    PubMed Central

    Torlakovic, Emina E.; Francis, Glenn; Garratt, John; Gilks, Blake; Hyjek, Elizabeth; Ibrahim, Merdol; Miller, Rodney; Nielsen, Søren; Petcu, Eugen B.; Swanson, Paul E.; Taylor, Clive R.; Vyberg, Mogens

    2014-01-01

    Standardization of controls, both positive and negative controls, is needed for diagnostic immunohistochemistry (dIHC). The use of IHC-negative controls, irrespective of type, although well established, is not standardized. As such, the relevance and applicability of negative controls continues to challenge both pathologists and laboratory budgets. Despite the clear theoretical notion that appropriate controls serve to demonstrate the sensitivity and specificity of the dIHC test, it remains unclear which types of positive and negative controls are applicable and/or useful in day-to-day clinical practice. There is a perceived need to provide “best practice recommendations” for the use of negative controls. This perception is driven not only by logistics and cost issues, but also by increased pressure for accurate IHC testing, especially when IHC is performed for predictive markers, the number of which is rising as personalized medicine continues to develop. Herein, an international ad hoc expert panel reviews classification of negative controls relevant to clinical practice, proposes standard terminology for negative controls, considers the total evidence of IHC specificity that is available to pathologists, and develops a set of recommendations for the use of negative controls in dIHC based on “fit-for-use” principles. PMID:24714041

  2. A Game Theory Algorithm for Intra-Cluster Data Aggregation in a Vehicular Ad Hoc Network

    PubMed Central

    Chen, Yuzhong; Weng, Shining; Guo, Wenzhong; Xiong, Naixue

    2016-01-01

    Vehicular ad hoc networks (VANETs) have an important role in urban management and planning. The effective integration of vehicle information in VANETs is critical to traffic analysis, large-scale vehicle route planning and intelligent transportation scheduling. However, given the limitations in the precision of the output information of a single sensor and the difficulty of information sharing among various sensors in a highly dynamic VANET, effectively performing data aggregation in VANETs remains a challenge. Moreover, current studies have mainly focused on data aggregation in large-scale environments but have rarely discussed the issue of intra-cluster data aggregation in VANETs. In this study, we propose a multi-player game theory algorithm for intra-cluster data aggregation in VANETs by analyzing the competitive and cooperative relationships among sensor nodes. Several sensor-centric metrics are proposed to measure the data redundancy and stability of a cluster. We then study the utility function to achieve efficient intra-cluster data aggregation by considering both data redundancy and cluster stability. In particular, we prove the existence of a unique Nash equilibrium in the game model, and conduct extensive experiments to validate the proposed algorithm. Results demonstrate that the proposed algorithm has advantages over typical data aggregation algorithms in both accuracy and efficiency. PMID:26907272

  3. A Game Theory Algorithm for Intra-Cluster Data Aggregation in a Vehicular Ad Hoc Network.

    PubMed

    Chen, Yuzhong; Weng, Shining; Guo, Wenzhong; Xiong, Naixue

    2016-02-19

    Vehicular ad hoc networks (VANETs) have an important role in urban management and planning. The effective integration of vehicle information in VANETs is critical to traffic analysis, large-scale vehicle route planning and intelligent transportation scheduling. However, given the limitations in the precision of the output information of a single sensor and the difficulty of information sharing among various sensors in a highly dynamic VANET, effectively performing data aggregation in VANETs remains a challenge. Moreover, current studies have mainly focused on data aggregation in large-scale environments but have rarely discussed the issue of intra-cluster data aggregation in VANETs. In this study, we propose a multi-player game theory algorithm for intra-cluster data aggregation in VANETs by analyzing the competitive and cooperative relationships among sensor nodes. Several sensor-centric metrics are proposed to measure the data redundancy and stability of a cluster. We then study the utility function to achieve efficient intra-cluster data aggregation by considering both data redundancy and cluster stability. In particular, we prove the existence of a unique Nash equilibrium in the game model, and conduct extensive experiments to validate the proposed algorithm. Results demonstrate that the proposed algorithm has advantages over typical data aggregation algorithms in both accuracy and efficiency.

  4. Force Reconnaissance: A Key Enabler in the Marine Air Ground Task Force and Beyond

    DTIC Science & Technology

    2012-03-13

    round Task Force Advance Force Operations, Deep Reconnaissance, Military Free Fall (MFF), Marine Combatar t Diver ( MCD ), Joint Terminal Attack...Marine Division. These early years focused on developing the doctrine and insertion skills became legendary in the crucible of South East Asia , and...potential for regional powers to threaten critical U.S. interests. Areas of particular concern in the QDR are the Middle East and Asia .41 The United

  5. 77 FR 1913 - Notice of Meeting of the Agricultural Air Quality Task Force

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-12

    ... Conservation Service Notice of Meeting of the Agricultural Air Quality Task Force AGENCY: Natural Resources...), Agricultural Air Quality Task Force (AAQTF) will meet to continue discussions on critical air quality issues... relationship between agricultural production and air quality. The meeting is open to the public, and a draft...

  6. Attention Deficit Hyperactivity Disorder: ADHD Task Force Report.

    ERIC Educational Resources Information Center

    Michigan State Dept. of Education, Lansing. Special Education Services.

    A Michigan task force examined existing and needed services for students with attention deficit hyperactivity disorder (ADHD), to assist school districts in developing services and to create a systematic plan for statewide information dissemination regarding referral, assessment, identification, intervention strategies, and legal mandates.…

  7. Unintentional force changes in cyclical tasks performed by an abundant system: Empirical observations and a dynamical model.

    PubMed

    Reschechtko, Sasha; Hasanbarani, Fariba; Akulin, Vladimir M; Latash, Mark L

    2017-05-14

    The study explored unintentional force changes elicited by removing visual feedback during cyclical, two-finger isometric force production tasks. Subjects performed two types of tasks at 1Hz, paced by an auditory metronome. One - Force task - required cyclical changes in total force while maintaining the sharing, defined as relative contribution of a finger to total force. The other task - Share task - required cyclical changes in sharing while keeping total force unchanged. Each trial started under full visual feedback on both force and sharing; subsequently, feedback on the variable that was instructed to stay constant was frozen, and finally feedback on the other variable was also removed. In both tasks, turning off visual feedback on total force elicited a drop in the mid-point of the force cycle and an increase in the peak-to-peak force amplitude. Turning off visual feedback on sharing led to a drift of mean share toward 50:50 across both tasks. Without visual feedback there was consistent deviation of the two force time series from the in-phase pattern (typical of the Force task) and from the out-of-phase pattern (typical of the Share task). This finding is in contrast to most earlier studies that demonstrated only two stable patterns, in-phase and out-of-phase. We interpret the results as consequences of drifts of parameters in a dynamical system leading in particular to drifts in the referent finger coordinates toward their actual coordinates. The relative phase desynchronization is caused by the right-left differences in the hypothesized drift processes, consistent with the dynamic dominance hypothesis. Copyright © 2017 IBRO. Published by Elsevier Ltd. All rights reserved.

  8. Unintentional force changes in cyclical tasks performed by an abundant system: Empirical observations and a dynamical model

    PubMed Central

    Reschechtko, Sasha; Hasanbarani, Fariba; Akulin, Vladimir M.; Latash, Mark L.

    2017-01-01

    The study explored unintentional force changes elicited by removing visual feedback during cyclical, two-finger isometric force production tasks. Subjects performed two types of tasks at 1 Hz, paced by an auditory metronome. One – Force task – required cyclical changes in total force while maintaining the sharing, defined as relative contribution of a finger to total force. The other task – Share task – required cyclical changes in sharing while keeping total force unchanged. Each trial started under full visual feedback on both force and sharing; subsequently, feedback on the variable that was instructed to stay constant was frozen, and finally feedback on the other variable was also removed. In both tasks, turning off visual feedback on total force elicited a drop in the mid-point of the force cycle and an increase in the peak-to-peak force amplitude. Turning off visual feedback on sharing led to a drift of mean share toward 50:50 across both tasks. Without visual feedback there was consistent deviation of the two force time series from the in-phase pattern (typical of the Force task) and from the out-of-phase pattern (typical of the Share task). This finding is in contrast to most earlier studies that demonstrated only two stable patterns, in-phase and out-of-phase. We interpret the results as consequences of drifts of parameters in a dynamical system leading in particular to drifts in the referent finger coordinates toward their actual coordinates. The relative phase desynchronization is caused by the right-left differences in the hypothesized drift processes, consistent with the dynamic dominance hypothesis. PMID:28344070

  9. 14th International Congress on Antiphospholipid Antibodies Task Force Report on Catastrophic Antiphospholipid Syndrome.

    PubMed

    Cervera, Ricard; Rodríguez-Pintó, Ignasi; Colafrancesco, Serena; Conti, Fabrizio; Valesini, Guido; Rosário, Cristina; Agmon-Levin, Nancy; Shoenfeld, Yehuda; Ferrão, Claudia; Faria, Raquel; Vasconcelos, Carlos; Signorelli, Flavio; Espinosa, Gerard

    2014-07-01

    The 'Task Force on Catastrophic Antiphospholipid Syndrome (CAPS)' was developed on the occasion of the 14th International Congress on Antiphospholipid Antibodies. The objectives of this Task Force were to assess the current knowledge on pathogenesis, clinical and laboratory features, diagnosis and classification, precipitating factors and treatment of this condition in order to address recommendations for future research. This article summarizes the studies analyzed by the Task Force, its recommendations and the future research agenda. Copyright © 2014 Elsevier B.V. All rights reserved.

  10. The congestion control algorithm based on queue management of each node in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Wei, Yifei; Chang, Lin; Wang, Yali; Wang, Gaoping

    2016-12-01

    This paper proposes an active queue management mechanism, considering the node's own ability and its importance in the network to set the queue threshold. As the network load increases, local congestion of mobile ad hoc network may lead to network performance degradation, hot node's energy consumption increase even failure. If small energy nodes congested because of forwarding data packets, then when it is used as the source node will cause a lot of packet loss. This paper proposes an active queue management mechanism, considering the node's own ability and its importance in the network to set the queue threshold. Controlling nodes buffer queue in different levels of congestion area probability by adjusting the upper limits and lower limits, thus nodes can adjust responsibility of forwarding data packets according to their own situation. The proposed algorithm will slow down the send rate hop by hop along the data package transmission direction from congestion node to source node so that to prevent further congestion from the source node. The simulation results show that, the algorithm can better play the data forwarding ability of strong nodes, protect the weak nodes, can effectively alleviate the network congestion situation.

  11. 77 FR 6786 - U.S. Coral Reef Task Force Public Meeting and Public Comment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-09

    ... DEPARTMENT OF COMMERCE National Oceanic and Atmospheric Administration U.S. Coral Reef Task Force... of the U.S. Coral Reef Task Force. The meeting will be held in Washington, DC This meeting, the 27th [[Page 6787

  12. Crafting a Balanced System of Assessment in Wisconsin. Recommendations of the Next Generation Assessment Task Force

    ERIC Educational Resources Information Center

    Wisconsin Department of Public Instruction, 2009

    2009-01-01

    The Next Generation Assessment Task Force was convened to formulate Wisconsin's path forward. Task force members listened to leaders from business and technology sectors as well as leaders from PK-12 and higher education. This summary shares the process, definitions, assumptions, and recommendations of the task force. This paper aims to use these…

  13. Biomarker and Clinical Trial Design Support for Disease-Modifying Therapies: Report of a Survey of the EU/US: Alzheimer's Disease Task Force.

    PubMed

    Cummings, J; Fox, N; Vellas, B; Aisen, P; Shan, G

    2018-01-01

    Disease-modifying therapies are urgently needed for the treatment of Alzheimer's disease (AD). The European Union/United States (EU/US) Task Force represents a broad range of stakeholders including biopharma industry personnel, academicians, and regulatory authorities. The EU/US Task Force represents a community of knowledgeable individuals who can inform views of evidence supporting disease modification and the development of disease-modifying therapies (DMTs). We queried their attitudes toward clinical trial design and biomarkers in support of DMTs. A survey of members of the EU/US Alzheimer's Disease Task Force was conducted. Ninety-three members (87%) responded. The details were analyzed to understand what clinical trial design and biomarker data support disease modification. Task Force members favored the parallel group design compared to delayed start or staggered withdrawal clinical trial designs to support disease modification. Amyloid biomarkers were regarded as providing mild support for disease modification while tau biomarkers were regarded as providing moderate support. Combinations of biomarkers, particularly combinations of tau and neurodegeneration, were regarded as providing moderate to marked support for disease modification and combinations of all three classes of biomarkers were regarded by a majority as providing marked support for disease modification. Task Force members considered that evidence derived from clinical trials and biomarkers supports clinical meaningfulness of an intervention, and when combined with a single clinical trial outcome, nearly all regarded the clinical trial design or biomarker evidence as supportive of disease modification. A minority considered biomarker evidence by itself as indicative of disease modification in prevention trials. Levels of evidence (A,B,C) were constructed based on these observations. The survey indicates the view of knowledgeable stakeholders regarding evidence derived from clinical trial design

  14. Report of the Governor's Blue Ribbon Transportation Task Force

    DOT National Transportation Integrated Search

    1982-12-01

    Governor Ray appointed the Blue Ribbon Transportation Task Force to provide guidance concerning specific steps that can be taken to: achieve maximum efficiency in the utilization of transportation resources; preserve essential transportation services...

  15. Report of the MLA Task Force on Evaluating Scholarship for Tenure and Promotion

    ERIC Educational Resources Information Center

    Modern Language Association, 2007

    2007-01-01

    In 2004 the Executive Council of the Modern Language Association of America (MLA) created a task force to examine current standards and emerging trends in publication requirements for tenure and promotion in English and foreign language departments in the United States. To fulfill its charge, the task force reviewed numerous studies, reports, and…

  16. A Naval Task Force Performance Assessment Methodology

    DTIC Science & Technology

    1991-11-01

    methodology combines two fundamental and intuitively appealing approaches to problem solving: (1) the systems approach with its focus on a system as a whole...Naval Coastal Systems Center AD-A242 915 Panama City, Florida 32407-5000 IlhIIiRjjq TECHNICAL MEMORANDUM NCSC TM 592-91 NOVEMBER 1991 A NAVAL TASK... SYSTEMS CENTER PANAMA CITY, FLORIDA 32407-5000 CAPT DAVID P. FITCH, USN MR. TED C. BUCKLEY Commanding Officer Technical Director ADMINISTRATIVE

  17. Task Oriented Evaluation of Module Extraction Techniques

    NASA Astrophysics Data System (ADS)

    Palmisano, Ignazio; Tamma, Valentina; Payne, Terry; Doran, Paul

    Ontology Modularization techniques identify coherent and often reusable regions within an ontology. The ability to identify such modules, thus potentially reducing the size or complexity of an ontology for a given task or set of concepts is increasingly important in the Semantic Web as domain ontologies increase in terms of size, complexity and expressivity. To date, many techniques have been developed, but evaluation of the results of these techniques is sketchy and somewhat ad hoc. Theoretical properties of modularization algorithms have only been studied in a small number of cases. This paper presents an empirical analysis of a number of modularization techniques, and the modules they identify over a number of diverse ontologies, by utilizing objective, task-oriented measures to evaluate the fitness of the modules for a number of statistical classification problems.

  18. No Winglets: What a Drag...Argument for Adding Winglets to Large Air Force Aircraft

    DTIC Science & Technology

    2008-01-01

    22134-5068 MASTER OF MILITARY STUDIES NO WINGLETS : WHAT A DRAG... ARGUMENT FOR ADDING WINGLETS TO LARGE AIR FORCE AIRCRAFT ,SUBMITTED IN PARTIAL...currently valid OMB control number. 1. REPORT DATE 2008 2. REPORT TYPE 3. DATES COVERED 00-00-2008 to 00-00-2008 4. TITLE AND SUBTITLE No Winglets ...What a Drag...Argument for Adding Winglets to Large Air Force Aircraft 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR

  19. Real time relationship between individual finger force and grip exertion on distal phalanges in linear force following tasks.

    PubMed

    Luo, Shi-Jian; Shu, Ge; Gong, Yan

    2018-05-01

    Individual finger force (FF) in a grip task is a vital concern in rehabilitation engineering and precise control of manipulators because disorders in any of the fingers will affect the stability or accuracy of the grip force (GF). To understand the functions of each finger in a dynamic grip exertion task, a GF following experiment with four individual fingers without thumb was designed. This study obtained four individual FFs from the distal phalanges with a cylindrical handle in dynamic GF following tasks. Ten healthy male subjects with similar hand sizes participated in the four-finger linear GF following tasks at different submaximal voluntary contraction (SMVC) levels. The total GF, individual FF, finger force contribution, and following error were subsequently calculated and analyzed. The statistics indicated the following: 1) the accuracy and stability of GF at low %MVC were significantly higher than those at high SMVC; 2) at low SMVC, the ability of the fingers to increase the GF was better than the ability to reduce it, but it was contrary at high SMVC; 3) when the target wave (TW) was changing, all four fingers strongly participated in the force exertion, but the participation of the little finger decreased significantly when TW remained stable; 4) the index finger and ring finger had a complementary relationship and played a vital role in the adjustment and control of GF. The middle finger and little finger had a minor influence on the force control and adjustment. In conclusion, each of the fingers had different functions in a GF following task. These findings can be used in the assessment of finger injury rehabilitation and for algorithms of precise control. Copyright © 2017 Elsevier Ltd. All rights reserved.

  20. Study of modeling and evaluation of remote manipulation tasks with force feedback

    NASA Technical Reports Server (NTRS)

    Hill, J. W.

    1979-01-01

    The use of time and motion study methods to evaluate force feedback in remote manipulation tasks are described. Several systems of time measurement derived for industrial workers were studied and adapted for manipulator use. A task board incorporating a set of basic motions was designed and built. Results obtained from two subjects in three manipulation situations for each are reported: a force-reflective manipulator, a unilateral manipulator, and the unaided human hand. The results indicate that: (1) a time-and-motion study techniques are applicable to manipulation; and that (2) force feedback facilitates some motions (notably fitting), but not others (such as positioning).

  1. The Campus-Based Formula. NASFAA Task Force Report

    ERIC Educational Resources Information Center

    National Association of Student Financial Aid Administrators, 2014

    2014-01-01

    The primary purpose of the National Association of Student Financial Aid Administrators (NASFAA) Campus-Based Aid Allocation Task Force was to examine the formula by which congressional appropriations for the Federal Supplemental Educational Opportunity Grant (FSEOG), Federal Work-Study (FWS), and Perkins Loan programs are distributed to schools,…

  2. Guide for machine tool task force members

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sutton, G.P.

    1978-09-01

    The purpose of the guide is to assist members of the Machine Tool Task Force (MTTF) in doing the job, preparing technical summary papers, and helping to achieve a uniform, high-quality output from this comprehensive study effort. It supplements the MTTF Plan (UCRL-52552) which contains other important information on the method of operation of MTTF that is related to the preparation of MTTF reports.

  3. 77 FR 71471 - Interagency Task Force on Veterans Small Business Development; Notice of Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-30

    ... SMALL BUSINESS ADMINISTRATION Interagency Task Force on Veterans Small Business Development; Notice of Meeting AGENCY: U.S. Small Business Administration. ACTION: Notice of open Federal Interagency... agenda for its public meeting of the Interagency Task Force on Veterans Small Business Development. The...

  4. 75 FR 34439 - Defense Science Board Task Force on Nuclear Treaty Monitoring and Verification

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-17

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Science Board Task Force on Nuclear Treaty... meetings. SUMMARY: The Defense Science Board Task Force on Nuclear Treaty Monitoring and Verification will... Applications International Corporation, 4001 North Fairfax Drive, Suite 300, Arlington, VA. FOR FURTHER...

  5. Report of the Defense Science Board Task Force on Globalization and Security.

    DTIC Science & Technology

    1999-12-01

    adversaries, such as North Korea’s progress in ballistic missiles. The leveling effect of globalization is a thread that runs through the Task Force...globalization are manifold. Increased use of the commercial sector cannot be separated from the effects of globalization. Nor is increased DoD reliance...enhance dramatically DSB Task Force on Globalization and Security DoD’s organizational efficiency and effectiveness . This could allow DoD to cut

  6. Adult Education Basic Skills Task Force: Writing Skills.

    ERIC Educational Resources Information Center

    Utah State Office of Education, Salt Lake City.

    In response to the Utah State Board of Education's new high school graduation requirements, five task forces of adult basic education teachers were charged with the identification of functional competencies for adult students in the areas of reading, writing, speaking, listening, and computation, and with the development of curricular materials…

  7. President's Task Force on Communications Policy. Final Report.

    ERIC Educational Resources Information Center

    Rostow, Eugene V.

    The final report of the President's Task Force on Communications Policy recommends strengthened federal powers to form public policy in telecommunications. Such planned policy would enable the private sector to reach its full capacities in the field by improving regulation when it is necessary and removing unnecessary regulation. Monopoly of…

  8. Consumer Information. NASFAA Task Force Report. Consumer Information

    ERIC Educational Resources Information Center

    National Association of Student Financial Aid Administrators, 2014

    2014-01-01

    The National Association of Student Financial Aid and Administrators (NASFAA) Consumer Information Task Force was convened to conduct a thorough review of the current student consumer information requirements and propose ways to streamline both the content and delivery of those requirements. The proposals in the this report were produced for…

  9. 75 FR 76422 - Meeting of the Department of Defense Task Force on the Care, Management, and Transition of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary Meeting of the Department of Defense Task Force on... Forces (Subsequently Referred to as the Task Force) AGENCY: Department of Defense. ACTION: Notice... forthcoming meeting of the Department of Defense Task Force on the Care, Management, and Transition of...

  10. 75 FR 12493 - Task Force on Childhood Obesity: Request for Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-16

    ... Force on Childhood Obesity: Request for Information AGENCY: U.S. Department of Agriculture, U.S.... SUMMARY: Across the country, childhood obesity has reached epidemic rates. On February 9, 2010, President Obama signed a Presidential Memo establishing a Task Force on Childhood Obesity that directs Federal...

  11. 75 FR 43943 - Defense Science Board; Task Force on Nuclear Treaty Monitoring and Verification

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-27

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Science Board; Task Force on Nuclear Treaty... meetings. SUMMARY: The Defense Science Board Task Force on Nuclear Treaty Monitoring and Verification will... held September 13-14, and 25-26, 2010. ADDRESSES: The meetings will be held at Science Applications...

  12. Response to the Task Force on School Governance.

    ERIC Educational Resources Information Center

    Denoyer, Richard A.

    Although the Task Force on School Governance report claims that restructuring of school boards is essential to save the nation's failing schools, the real failure is society itself. Societal problems such as the nation's $4 trillion debt, air and water pollution, crime, drug abuse, and special interest lobbies abound, and legislators'…

  13. Report of the Task Force on Computer Charging.

    ERIC Educational Resources Information Center

    Computer Co-ordination Group, Ottawa (Ontario).

    The objectives of the Task Force on Computer Charging as approved by the Committee of Presidents of Universities of Ontario were: (1) to identify alternative methods of costing computing services; (2) to identify alternative methods of pricing computing services; (3) to develop guidelines for the pricing of computing services; (4) to identify…

  14. Joint Task Force on Undergraduate Physics Programs

    NASA Astrophysics Data System (ADS)

    This session will focus on the guidelines and recommendations being developed by the APS/AAPT Joint Task Force on Undergraduate Physics Programs. J-TUPP is studying how undergraduate physics programs might better prepare physics majors for diverse careers. The guidelines and recommendations will focus on curricular content, flexible tracks, pedagogical methods, research experiences and internships, the development of professional skills, and enhanced advising and mentoring for all physics majors.

  15. Report of the Defense Science Board Task Force on Tactical Battlefield Communications,

    DTIC Science & Technology

    2000-02-01

    Communications, in and Intelligence (ASD/C3I); and LTG John Woodward, J6. The Task Force comprised fourteen experts from government, industry, and academe. The...O’Berry (USAF-Retired) Col Bobby Smart (USAF) Professor Stewart Personick Mr. Mark Rich Mr. Peter D. Steensma DSB Staff Assistant Mr. John ...were: The Honorable Dr. Jacques Gansler, USD/AT&L, the Honorable Art Money, ASD/C3I and LTG John Woodward, JCS-J6. The Task Force membership (Figure

  16. Initial Report of the Task Force on Cultural Competence Education in the Health Sciences

    ERIC Educational Resources Information Center

    New Mexico Higher Education Department, 2007

    2007-01-01

    This report summarizes the findings and recommendations of the Task Force on Cultural Competence Education and represents the distillation of the Task Force's efforts to fulfill its legislative charge. The report is intended to facilitate a statewide conversation about the health services provided to New Mexico's multicultural citizenry. It…

  17. 77 FR 23667 - Department of Defense Task Force on the Care, Management, and Transition of Recovering Wounded...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-20

    ... CONTACT: Mail Delivery service through Recovering Warrior Task Force, Hoffman Building II, 200 Stovall St... Review of Non- Medical Case Management. 9:30-9:45 a.m. Break. 9:45-10:45 a.m. Task Force Recommendation... Task Force through the contact information in FOR FURTHER INFORMATION CONTACT, and this individual will...

  18. Nurturing Institutional Cultures of Caring

    ERIC Educational Resources Information Center

    Spano, David B.

    2008-01-01

    The aftershocks of the Virginia Tech incident have included numerous committee meetings, task forces, congressional hearings, and ad hoc debates focused on what went wrong and what educators can do to make their suddenly scary campuses safer. The issue of safety on their campuses has been thrust front and center. The author found it remarkable and…

  19. Santa Monica College Child Care Task Force Report.

    ERIC Educational Resources Information Center

    Feiger, Helen Tina; And Others

    In 1983, Santa Monica College (SMC) created a task force to assess the college's need for child care services and to devise possible service models for consideration. Subcommittees were formed to address student and staff child care needs; ways of funding child care services; criteria for possible child care facilities and sites which met these…

  20. Infrastructure Task Force National Environmental Policy Act Requirements - February 2011

    EPA Pesticide Factsheets

    This document summarizes in a matrix format the federal regulations requirements and guidance for complying with the National Environmental Policy Act for the Infrastructure Task Force federal partner agencies.

  1. International Reference Ionosphere (IRI): Task Force Activity 2000

    NASA Technical Reports Server (NTRS)

    Bilitza, D.

    2000-01-01

    The annual IRI Task Force Activity was held at the Abdus Salam International Center for Theoretical Physics in Trieste, Italy from July 10 to July 14. The participants included J. Adeniyi (University of Ilorin, Nigeria), D. Bilitza (NSSDC/RITSS, USA), D. Buresova (Institute of Atmospheric Physics, Czech Republic), B. Forte (ICTP, Italy), R. Leitinger (University of Graz, Austria), B. Nava (ICTP, Italy), M. Mosert (University National Tucuman, Argentina), S. Pulinets (IZMIRAN, Russia), S. Radicella (ICTP, Italy), and B. Reinisch (University of Mass. Lowell, USA). The main topic of this Task Force Activity was the modeling of the topside ionosphere and the development of strategies for modeling of ionospheric variability. Each day during the workshop week the team debated a specific modeling problem in the morning during informal presentations and round table discussions of all participants. Ways of resolving the specific modeling problem were devised and tested in the afternoon in front of the computers of the ICTP Aeronomy and Radiopropagation Laboratory using ICTP s computer networks and internet access.

  2. The synergic control of multi-finger force production: Stability of explicit and implicit task components

    PubMed Central

    Reschechtko, Sasha; Zatsiorsky, Vladimir M.; Latash, Mark L.

    2016-01-01

    Manipulating objects with the hands requires the accurate production of resultant forces including shear forces; effective control of these shear forces also requires the production of internal forces normal to the surface of the object(s) being manipulated. In the present study, we investigated multi-finger synergies stabilizing shear and normal components of force, as well as drifts in both components of force, during isometric pressing tasks requiring a specific magnitude of shear force production. We hypothesized that shear and normal forces would evolve similarly in time, and also show similar stability properties as assessed by the decomposition of inter-trial variance within the uncontrolled manifold hypothesis. Healthy subjects were required to accurately produce total shear and total normal forces with four fingers of the hand during a steady-state force task (with and without visual feedback) and a self-paced force pulse task. The two force components showed similar time profiles during both shear force pulse production and unintentional drift induced by turning the visual feedback off. Only the explicitly instructed components of force, however, were stabilized with multi-finger synergies. No force-stabilizing synergies and no anticipatory synergy adjustments were seen for the normal force in shear force production trials. These unexpected qualitative differences in the control of the two force components – which are produced by some of the same muscles and show high degree of temporal coupling – are interpreted within the theory of control with referent coordinates for salient variables. These observations suggest the existence of two classes of neural variables: one that translates into shifts of referent coordinates and defines changes in magnitude of salient variables, and the other controlling gains in back-coupling loops that define stability of the salient variables. Only the former are shared between the explicit and implicit task components

  3. Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks

    PubMed Central

    2017-01-01

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle’s safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given. PMID:29231882

  4. Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks.

    PubMed

    Song, Caixia

    2017-12-12

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle's safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given.

  5. Report of the Task Force on Specifications and Standards

    DTIC Science & Technology

    1977-04-01

    pro- cedures covering interim changes or corrections to specifications and standar (ls required to effect a procurement . A language change was proposed...DEFENSE SCIENCE BOARD SREPORT OF THE TASK FORCE ON 0 ’SPECIFICATIONS AND STANDARDS APRIL 1977 I S-J APPROVED FOR PUBLIC RELEASE; DISTRIBUTION...FORCE ON SPECIFICATIONS aSTANDARDS :::nm,1UTION STA T,~~ i vl for public Weeae; .-Aibution Ulnlimited Office of, 11h1 I irel-4,r. I )eh- iss R se rc

  6. A Report of the Child Labor Task Force.

    ERIC Educational Resources Information Center

    Oregon State Bureau of Labor and Industry, Portland.

    A task force studied youth work and its impact on the health, education, and safety of 16- and 17-year-olds. The study covered such issues as the following: effects of work on school performance, work's physical and psychological effects on young people, the effects work can have on young people's preparation for lifelong work, and what steps can…

  7. Army Energy Initiatives Task Force Industry Summit (portfolio)

    DTIC Science & Technology

    2011-11-03

    IY Q N’ZWrt• r Q N’ZWarte US Army Kw•J•I•Io. Atoll. R•public of Monhollltl.nd• fotta..a..,.,., Puerto Rico a (11Jf:!;!6£1) Assistant...Turbine Engines Vehicle connected microgrid to provide assured power Low Speed Electric Vehicles 11 Vehicle Power Energy Initiatives Task Force

  8. 77 FR 39724 - U.S. Coral Reef Task Force Public Meeting and Public Comment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-05

    ...-DS61200000] U.S. Coral Reef Task Force Public Meeting and Public Comment AGENCY: Fish and Wildlife Service... Wildlife Service (Service), announce a public meeting of the U.S. Coral Reef Task Force (USCRTF) and a... strengthen U.S. government actions to better preserve and protect coral reef ecosystems. The Departments of...

  9. International survey of vestibular rehabilitation therapists by the Barany Society Ad Hoc Committee on Vestibular Rehabilitation Therapy.

    PubMed

    Cohen, Helen S; Gottshall, Kim R; Graziano, Mariella; Malmstrom, Eva-Maj; Sharpe, Margaret H

    2009-01-01

    The goal of this study was to determine how occupational and physical therapists learn about vestibular rehabilitation therapy, their educational backgrounds, referral patterns, and their ideas about entry-level and advanced continuing education in vestibular rehabilitation therapy. The Barany Society Ad Hoc Committee for Vestibular Rehabilitation Therapy invited therapists around the world to complete an E-mail survey. Participants were either known to committee members or other Barany Society members, known to other participants, identified from their self-listings on the Internet, or volunteered after reading notices published in publications read by therapists. Responses were received from 133 therapists in 19 countries. They had a range of educational backgrounds, practice settings, and referral patterns. Few respondents had had any training about vestibular rehabilitation during their professional entry-level education. Most respondents learned about vestibular rehabilitation from continuing education courses, interactions with their colleagues, and reading. All of them endorsed the concept of developing standards and educating therapists about vestibular anatomy and physiology, vestibular diagnostic testing, vestibular disorders and current intervention strategies. Therefore, the Committee recommends the development of international standards for education and practice in vestibular rehabilitation therapy.

  10. Adaptive increase in force variance during fatigue in tasks with low redundancy.

    PubMed

    Singh, Tarkeshwar; S K M, Varadhan; Zatsiorsky, Vladimir M; Latash, Mark L

    2010-11-26

    We tested a hypothesis that fatigue of an element (a finger) leads to an adaptive neural strategy that involves an increase in force variability in the other finger(s) and an increase in co-variation of commands to fingers to keep total force variability relatively unchanged. We tested this hypothesis using a system with small redundancy (two fingers) and a marginally redundant system (with an additional constraint related to the total moment of force produced by the fingers, unstable condition). The subjects performed isometric accurate rhythmic force production tasks by the index (I) finger and two fingers (I and middle, M) pressing together before and after a fatiguing exercise by the I finger. Fatigue led to a large increase in force variance in the I-finger task and a smaller increase in the IM-task. We quantified two components of variance in the space of hypothetical commands to fingers, finger modes. Under both stable and unstable conditions, there was a large increase in the variance component that did not affect total force and a much smaller increase in the component that did. This resulted in an increase in an index of the force-stabilizing synergy. These results indicate that marginal redundancy is sufficient to allow the central nervous system to use adaptive increase in variability to shield important variables from effects of fatigue. We offer an interpretation of these results based on a recent development of the equilibrium-point hypothesis known as the referent configuration hypothesis. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.

  11. Foot force direction control during a pedaling task in individuals post-stroke

    PubMed Central

    2014-01-01

    Background Appropriate magnitude and directional control of foot-forces is required for successful execution of locomotor tasks. Earlier evidence suggested, following stroke, there is a potential impairment in foot-force control capabilities both during stationary force generation and locomotion. The purpose of this study was to investigate the foot-pedal surface interaction force components, in non-neurologically-impaired and stroke-impaired individuals, in order to determine how fore/aft shear-directed foot/pedal forces are controlled. Methods Sixteen individuals with chronic post-stroke hemiplegia and 10 age-similar non-neurologically-impaired controls performed a foot placement maintenance task under a stationary and a pedaling condition, achieving a target normal pedal force. Electromyography and force profiles were recorded. We expected generation of unduly large magnitude shear pedal forces and reduced participation of multiple muscles that can contribute forces in appropriate directions in individuals post-stroke. Results We found lower force output, inconsistent modulation of muscle activity and reduced ability to change foot force direction in the paretic limbs, but we did not observe unduly large magnitude shear pedal surface forces by the paretic limbs as we hypothesized. Conclusion These findings suggested the preservation of foot-force control capabilities post-stroke under minimal upright postural control requirements. Further research must be conducted to determine whether inappropriate shear force generation will be revealed under non-seated, postural demanding conditions, where subjects have to actively control for upright body suspension. PMID:24739234

  12. More tooth, Less Skull: Force Structure Changes for an Uncertain Future

    DTIC Science & Technology

    2012-05-17

    deployments in OIF and OEF are the archetypes for force employment and span of control, highlighting the limits of modularity and the creation of ad hoc...square miles in extent. There was a wider dispersion of formations to minimize the effect of an enemy’s tactical atomic weapons. At the same time, this...The sweeping reorganization to meet the requirements of the atomic battlefield became the Pentomic Division. The Pentomic Division, officially known

  13. 75 FR 59698 - Federal Advisory Committee; Department of Defense Task Force on the Care, Management, and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-28

    .... SUPPLEMENTARY INFORMATION: The Task Force is a non-discretionary Federal advisory committee established to (a... for wounded, ill, and injured members of the Armed Forces; ii. Medical case management; iii. Non... Task Force on the Care, Management, and Transition of Recovering Wounded, Ill, and Injured Member of...

  14. Road Accident Prevention with Instant Emergency Warning Message Dissemination in Vehicular Ad-Hoc Network.

    PubMed

    Gokulakrishnan, P; Ganeshkumar, P

    2015-01-01

    A Road Accident Prevention (RAP) scheme based on Vehicular Backbone Network (VBN) structure is proposed in this paper for Vehicular Ad-hoc Network (VANET). The RAP scheme attempts to prevent vehicles from highway road traffic accidents and thereby reduces death and injury rates. Once the possibility of an emergency situation (i.e. an accident) is predicted in advance, instantly RAP initiates a highway road traffic accident prevention scheme. The RAP scheme constitutes the following activities: (i) the Road Side Unit (RSU) constructs a Prediction Report (PR) based on the status of the vehicles and traffic in the highway roads, (ii) the RSU generates an Emergency Warning Message (EWM) based on an abnormal PR, (iii) the RSU forms a VBN structure and (iv) the RSU disseminates the EWM to the vehicles that holds the high Risk Factor (RF) and travels in High Risk Zone (HRZ). These vehicles might reside either within the RSU's coverage area or outside RSU's coverage area (reached using VBN structure). The RAP scheme improves the performance of EWM dissemination in terms of increase in notification and decrease in end-to-end delay. The RAP scheme also reduces infrastructure cost (number of RSUs) by formulating and deploying the VBN structure. The RAP scheme with VBN structure improves notification by 19 percent and end-to-end delay by 14.38 percent for a vehicle density of 160 vehicles. It is also proved from the simulation experiment that the performance of RAP scheme is promising in 4-lane highway roads.

  15. Road Accident Prevention with Instant Emergency Warning Message Dissemination in Vehicular Ad-Hoc Network

    PubMed Central

    P, Gokulakrishnan; P, Ganeshkumar

    2015-01-01

    A Road Accident Prevention (RAP) scheme based on Vehicular Backbone Network (VBN) structure is proposed in this paper for Vehicular Ad-hoc Network (VANET). The RAP scheme attempts to prevent vehicles from highway road traffic accidents and thereby reduces death and injury rates. Once the possibility of an emergency situation (i.e. an accident) is predicted in advance, instantly RAP initiates a highway road traffic accident prevention scheme. The RAP scheme constitutes the following activities: (i) the Road Side Unit (RSU) constructs a Prediction Report (PR) based on the status of the vehicles and traffic in the highway roads, (ii) the RSU generates an Emergency Warning Message (EWM) based on an abnormal PR, (iii) the RSU forms a VBN structure and (iv) the RSU disseminates the EWM to the vehicles that holds the high Risk Factor (RF) and travels in High Risk Zone (HRZ). These vehicles might reside either within the RSU’s coverage area or outside RSU’s coverage area (reached using VBN structure). The RAP scheme improves the performance of EWM dissemination in terms of increase in notification and decrease in end-to-end delay. The RAP scheme also reduces infrastructure cost (number of RSUs) by formulating and deploying the VBN structure. The RAP scheme with VBN structure improves notification by 19 percent and end-to-end delay by 14.38 percent for a vehicle density of 160 vehicles. It is also proved from the simulation experiment that the performance of RAP scheme is promising in 4-lane highway roads. PMID:26636576

  16. Antiepileptic drugs and suicidality: an expert consensus statement from the Task Force on Therapeutic Strategies of the ILAE Commission on Neuropsychobiology.

    PubMed

    Mula, Marco; Kanner, Andres M; Schmitz, Bettina; Schachter, Steven

    2013-01-01

    In 2008, the U.S. Food and Drug Administration (FDA) issued an alert to health care professionals about an increased risk of suicide ideation and suicide behavior in people treated with antiepileptic drugs (AEDs). Since then, a number of retrospective cohort and case-control studies have been published that are trying to address this issue, but gathered results are contradictory. This report represents an expert consensus statement developed by an ad hoc task force of the Commission on Neuropsychobiology of the International League Against Epilepsy (ILAE). Although some (but not all) AEDs can be associated with treatment-emergent psychiatric problems that can lead to suicidal ideation and behavior, the actual suicidal risk is yet to be established, but it seems to be very low. The risk of stopping AEDs or refusing to start AEDs is significantly worse and can actually result in serious harm including death to the patient. Suicidality in epilepsy is multifactorial, and different variables are operant. Clinicians should investigate the existence of such risk factors and adopt appropriate screening instruments. If necessary, patients should be referred for a psychiatric evaluation, but AED treatment should not be withheld, even in patients with positive suicidal risks. When starting an AED or switching from one to other AEDs, patients should be advised to report to their treating physician any change in mood and suicidal ideation. Data on treatment-emergent psychiatric adverse events need to be collected, in addition to general safety information, during controlled studies in order to have meaningful information for patients and their relatives when a new drug is marketed. Wiley Periodicals, Inc. © 2012 International League Against Epilepsy.

  17. Third Report of the Task Force on the Shuttle-Mir Rendezvous and Docking Missions

    NASA Technical Reports Server (NTRS)

    1994-01-01

    In May 1994, the Task Force on the Shuttle-Mir Rendezvous and Docking Missions was established by the NASA Advisory Council. Its purpose is to review Phase 1 (Shuttle-Mir) planning, training, operations, rendezvous and docking, and management and to provide interim reports containing specific recommendations to the Advisory Council. Phase 1 represents the building block to create the experience and technical expertise for an International Space Station. The Phase 1 program brings together the United States and Russia in a major cooperative and contractual program that takes advantage of both countries' capabilities. The content of the Phase 1 program consists of the following elements as defined by the Phase 1 Program Management Plan, dated October 6, 1994: Shuttle-Mir rendezvous and docking missions; astronaut long duration presence on Mir Requirements for Mir support of Phase 1 when astronauts are not on board; outfitting Spektr and Priroda modules with NASA science, research, and risk mitigation equipment Related ground support requirements of NASA and the Russian Space Agency (RSA) to support Phase 1 Integrated NASA and RSA launch schedules and manifests The first meeting of the Task Force was held at the Johnson Space Center (JSC) on May 24 and 25, 1994 with a preliminary report submitted to the NASA Advisory Council on June 6, 1994. The second meeting of the Task Force was held at JSC on July 12 and 13, 1994 and a detailed report containing a series of specific recommendations was submitted on July 29, 1994. This report reflects the results of the third Task Force meeting which was held at JSC on 11 and 12 October, 1994. The briefings presented at that meeting reviewed NASA's response to the Task Force recommendations made to date and provided background data and current status on several critical areas which the Task Force had not addressed in its previous reports.

  18. Arizona Community Colleges: Report of the Task Force on Community College Enrollment Growth Planning.

    ERIC Educational Resources Information Center

    Arizona State Board of Directors for Community Colleges, Phoenix.

    The Task Force on Enrollment Growth Planning (TFEGP), authorized in 1992 by the State Board of Directors for Community Colleges (SBDCC) of Arizona, includes representatives from each community college as well as staff from SBDCC office. The Task Force was created to prepare enrollment growth estimates for community colleges through the year 2010;…

  19. DESIGNING PHARMACEUTICAL TRIALS FOR SARCOPENIA IN FRAIL OLDER ADULTS: EU/US TASK FORCE RECOMMENDATIONS

    PubMed Central

    VELLAS, B.; PAHOR, M.; MANINI, T.; ROOKS, D.; GURALNIK, J.M.; MORLEY, J.; STUDENSKI, S.; EVANS, W.; ASBRAND, C.; FARIELLO, R.; PEREIRA, S.; ROLLAND, Y.; VAN KAN, G. ABELLAN; CESARI, M.; CHUMLEA, WM.C.; FIELDING, R.

    2014-01-01

    An international task force of academic and industry leaders in sarcopenia research met on December 5, 2012 in Orlando, Florida to develop guidelines for designing and executing randomized clinical trials of sarcopenia treatments. The Task Force reviewed results from previous trials in related disease areas to extract lessons relevant to future sarcopenia trials, including practical issues regarding the design and conduct of trials in elderly populations, the definition of appropriate target populations, and the selection of screening tools, outcome measures, and biomarkers. They discussed regulatory issues, the challenges posed by trials of different types of interventions, and the need for standardization and harmonization. The Task Force concluded with recommendations for advancing the field toward better clinical trials. PMID:23933872

  20. Assessing Tuition- and Debt-Free Higher Education. NASFAA Task Force Report

    ERIC Educational Resources Information Center

    National Association of Student Financial Aid Administrators, 2017

    2017-01-01

    The Assessing Tuition- and Debt-Free Higher Education Task Force was convened in July 2016. Charged by the National Association of Student Financial Aid Administrators's (NASFAA's) Board of Directors with evaluating the existing landscape of state and local promise programs with a focus on scaling such models to the national level, the task force…