Science.gov

Sample records for ad-hoc task force

  1. 75 FR 43565 - NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ... SPACE ADMINISTRATION NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting AGENCY... Administration announces a two-part meeting of the Ad-Hoc Task Force on Planetary Defense of the NASA Advisory...@nasa.gov . SUPPLEMENTARY INFORMATION: The agenda topic is: Drafting of the Ad-Hoc Task Force...

  2. 75 FR 15742 - NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-30

    ... SPACE ADMINISTRATION NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting AGENCY... Administration announces a meeting of the Ad-Hoc Task Force on Planetary Defense of the NASA Advisory Council... include: Ad-Hoc Task Force on Planetary Defense Terms of Reference. NASA Near Earth Object (NEO)...

  3. Definition of drug resistant epilepsy: consensus proposal by the ad hoc Task Force of the ILAE Commission on Therapeutic Strategies.

    PubMed

    Kwan, Patrick; Arzimanoglou, Alexis; Berg, Anne T; Brodie, Martin J; Allen Hauser, W; Mathern, Gary; Moshé, Solomon L; Perucca, Emilio; Wiebe, Samuel; French, Jacqueline

    2010-06-01

    To improve patient care and facilitate clinical research, the International League Against Epilepsy (ILAE) appointed a Task Force to formulate a consensus definition of drug resistant epilepsy. The overall framework of the definition has two "hierarchical" levels: Level 1 provides a general scheme to categorize response to each therapeutic intervention, including a minimum dataset of knowledge about the intervention that would be needed; Level 2 provides a core definition of drug resistant epilepsy using a set of essential criteria based on the categorization of response (from Level 1) to trials of antiepileptic drugs. It is proposed as a testable hypothesis that drug resistant epilepsy is defined as failure of adequate trials of two tolerated, appropriately chosen and used antiepileptic drug schedules (whether as monotherapies or in combination) to achieve sustained seizure freedom. This definition can be further refined when new evidence emerges. The rationale behind the definition and the principles governing its proper use are discussed, and examples to illustrate its application in clinical practice are provided.

  4. An Ad-Hoc Adaptive Pilot Model for Pitch Axis Gross Acquisition Tasks

    NASA Technical Reports Server (NTRS)

    Hanson, Curtis E.

    2012-01-01

    An ad-hoc algorithm is presented for real-time adaptation of the well-known crossover pilot model and applied to pitch axis gross acquisition tasks in a generic fighter aircraft. Off-line tuning of the crossover model to human pilot data gathered in a fixed-based high fidelity simulation is first accomplished for a series of changes in aircraft dynamics to provide expected values for model parameters. It is shown that in most cases, for this application, the traditional crossover model can be reduced to a gain and a time delay. The ad-hoc adaptive pilot gain algorithm is shown to have desirable convergence properties for most types of changes in aircraft dynamics.

  5. Effective Ad-Hoc Committees.

    ERIC Educational Resources Information Center

    Young, David G.

    1983-01-01

    Ad-hoc committees may be symbolic, informational, or action committees. A literature survey indicates such committees' structural components include a suprasystem and three subsystems involving linkages, production, and implementation. Other variables include size, personal factors, and timing. All the factors carry implications about ad-hoc…

  6. 75 FR 33838 - NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-15

    .... Asteroid detection, warning, response, and concepts for deflection. International coordination on planetary defense against asteroids. The meeting will be open to the public up to the seating capacity of the...

  7. Trust Based Routing in Ad Hoc Network

    NASA Astrophysics Data System (ADS)

    Talati, Mikita V.; Valiveti, Sharada; Kotecha, K.

    Ad Hoc network often termed as an infrastructure-less, self- organized or spontaneous network.The execution and survival of an ad-hoc network is solely dependent upon the cooperative and trusting nature of its nodes. However, this naive dependency on intermediate nodes makes the ad-hoc network vulnerable to passive and active attacks by malicious nodes and cause inflict severe damage. A number of protocols have been developed to secure ad-hoc networks using cryptographic schemes, but all rely on the presence of trust authority. Due to mobility of nodes and limitation of resources in wireless network one interesting research area in MANET is routing. This paper offers various trust models and trust based routing protocols to improve the trustworthiness of the neighborhood.Thus it helps in selecting the most secure and trustworthy route from the available ones for the data transfer.

  8. Anomaly Detection Techniques for Ad Hoc Networks

    ERIC Educational Resources Information Center

    Cai, Chaoli

    2009-01-01

    Anomaly detection is an important and indispensable aspect of any computer security mechanism. Ad hoc and mobile networks consist of a number of peer mobile nodes that are capable of communicating with each other absent a fixed infrastructure. Arbitrary node movements and lack of centralized control make them vulnerable to a wide variety of…

  9. 78 FR 1196 - Codex Alimentarius Commission: Meeting of the Ad Hoc Codex Intergovernmental Task Force on Animal...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-08

    ... used in trade. The AFTF is responsible for: (a) The development of guidelines, intended for governments... the potential transfer of contaminants/residues in feed to edible animal products (e.g. meat, fish... Listserv, a free electronic mail subscription service for industry, trade groups, consumer interest...

  10. 76 FR 71308 - Codex Alimentarius Commission: Meeting of the Ad Hoc Intergovernmental Codex Task Force on Animal...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-17

    ... of consumers and ensure that fair practices are used in trade. The AFTF is responsible for: (a) The... edible animal products (e.g. meat, fish meat, milk and eggs). The AFTF is hosted by Switzerland. Issues... all its programs and activities on the basis of race, color, national origin, gender, religion,...

  11. Supporting Dynamic Ad hoc Collaboration Capabilities

    SciTech Connect

    Agarwal, Deborah A.; Berket, Karlo

    2003-07-14

    Modern HENP experiments such as CMS and Atlas involve as many as 2000 collaborators around the world. Collaborations this large will be unable to meet often enough to support working closely together. Many of the tools currently available for collaboration focus on heavy-weight applications such as videoconferencing tools. While these are important, there is a more basic need for tools that support connecting physicists to work together on an ad hoc or continuous basis. Tools that support the day-to-day connectivity and underlying needs of a group of collaborators are important for providing light-weight, non-intrusive, and flexible ways to work collaboratively. Some example tools include messaging, file-sharing, and shared plot viewers. An important component of the environment is a scalable underlying communication framework. In this paper we will describe our current progress on building a dynamic and ad hoc collaboration environment and our vision for its evolution into a HENP collaboration environment.

  12. Routing Security in Ad Hoc Wireless Networks

    NASA Astrophysics Data System (ADS)

    Pervaiz, Mohammad O.; Cardei, Mihaela; Wu, Jie

    Wireless networks provide rapid, untethered access to information and computing, eliminating the barriers of distance, time, and location for many applications ranging from collaborative, distributed mobile computing to disaster recovery (such as fire, flood, earthquake), law enforcement (crowd control, search, and rescue), and military communications (command, control, surveillance, and reconnaissance). An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration [11

  13. Non-Repudiation in Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tandel, Purvi; Valiveti, Sharada; Agrawal, K. P.; Kotecha, K.

    With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. In conventional network non-repudiation is achieved using protocols involving TTP. Non-repudiation in conventional network is achieved using different protocols, but in ad hoc networks due to mobility problem we can't use trusted third party (TTP). There is a scope to implement a non-repudiation protocol, which satisfies non-repudiation requirements emerged by the application in a peer-to-peer network.

  14. Worm epidemics in wireless ad hoc networks

    NASA Astrophysics Data System (ADS)

    Nekovee, Maziar

    2007-06-01

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet.

  15. American Psychologist Task Force Report: Clarifying Mission, Coverage, Communication, and Review Process.

    ERIC Educational Resources Information Center

    Zimbardo, Philip G.

    2002-01-01

    An American Psychological Association task force reviewed the role and function of "American Psychologist," (AP) focusing on its coverage domain and issues related to its editorial review process. This report examines AP editorial domain, AP editorial instructions, AP editorship, communications within the AP editorial process, use of ad hoc action…

  16. On Trust Evaluation in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Nguyen, Dang Quan; Lamont, Louise; Mason, Peter C.

    Trust has been considered as a social relationship between two individuals in human society. But, as computer science and networking have succeeded in using computers to automate many tasks, the concept of trust can be generalized to cover the reliability and relationships of non-human interaction, such as, for example, information gathering and data routing. This paper investigates the evaluation of trust in the context of ad hoc networks. Nodes evaluate each other’s behaviour based on observables. A node then decides whether to trust another node to have certain innate abilities. We show how accurate such an evaluation could be. We also provide the minimum number of observations required to obtain an accurate evaluation, a result that indicates that observation-based trust in ad hoc networks will remain a challenging problem. The impact of making networking decisions using trust evaluation on the network connectivity is also examined. In this manner, quantitative decisions can be made concerning trust-based routing with the knowledge of the potential impact on connectivity.

  17. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks.

    PubMed

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV. PMID:27258013

  18. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks

    PubMed Central

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV. PMID:27258013

  19. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks.

    PubMed

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV.

  20. Spontaneous ad hoc mobile cloud computing network.

    PubMed

    Lacuesta, Raquel; Lloret, Jaime; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes.

  1. Assured Information Sharing for Ad-Hoc Collaboration

    ERIC Educational Resources Information Center

    Jin, Jing

    2009-01-01

    Collaborative information sharing tends to be highly dynamic and often ad hoc among organizations. The dynamic natures and sharing patterns in ad-hoc collaboration impose a need for a comprehensive and flexible approach to reflecting and coping with the unique access control requirements associated with the environment. This dissertation…

  2. Public-key management in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Lin, Haifeng; Jiang, Anna; Bai, Di; Liu, Yunfei

    A mobile ad hoc network is a new type of wireless networking paradigm which, in general, consists of solely mobile hosts and dispenses with infrastructure. One main challenge in design of mobile ad hoc networks is the vulnerability to security attacks. Without physical boundaries, a mobile ad hoc network faces many more security threats than a wired network does. Therefore the security of mobile ad hoc networks is one of the major research interests in wireless communications. In contrast with conventional networks, public key management protocols of mobile ad hoc networks do not based on infrastructures, where we can use trusted third parties or centralized servers for key management. This is because that the topology of mobile ad hoc networks is unknown due to link and node failures and to node mobility. For these factors, traditional key management solutions which require on-line trusted authorities or certificate authorities are not suitable for securing mobile ad hoc networks. In this report, we first review some existed public-key management protocols for mobile ad hoc networks and after that we propose a fully distributed public -key management model which does not need the third trusted authority.

  3. 14 CFR 1203.903 - Ad hoc committees.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 5 2012-01-01 2012-01-01 false Ad hoc committees. 1203.903 Section 1203.903 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.903 Ad hoc committees. The Chairperson is...

  4. 14 CFR § 1203.903 - Ad hoc committees.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false Ad hoc committees. § 1203.903 Section § 1203.903 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.903 Ad hoc committees. The Chairperson...

  5. 14 CFR 1203.903 - Ad hoc committees.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false Ad hoc committees. 1203.903 Section 1203.903 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.903 Ad hoc committees. The Chairperson is...

  6. 14 CFR 1203.903 - Ad hoc committees.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Ad hoc committees. 1203.903 Section 1203.903 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.903 Ad hoc committees. The Chairperson is...

  7. 14 CFR 1203.903 - Ad hoc committees.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Ad hoc committees. 1203.903 Section 1203.903 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.903 Ad hoc committees. The Chairperson is authorized...

  8. Opportunistic Information Retrieval in Sparsely Connected Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Chuah, Mooi-Choo; Han, Jian-Bin

    With the advancement in technology, many users carry wireless computing de-vices e.g., PDAs, cell-phones etc. Such devices can form mobile ad hoc networks and communicate with one another via the help of intermediate nodes. Such ad hoc networks are very useful in several scenarios e.g., battlefield operations, vehicular ad hoc networks and disaster response scenarios. The ability to access important information in these scenarios is highly critical. Many ad hoc routing schemes have been designed for ad hoc networks but such routing schemes are not useful in some challenging network scenarios where the nodes have intermittent connectivity and suffer frequent partitioning. Recently, disruption tolerant network technologies [5, 12] have been proposed to allow nodes in such extreme network-ing environment to communicate with one another. Several DTN routing schemes [4, 14] have been proposed.

  9. Enhanced Weight based DSR for Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Verma, Samant; Jain, Sweta

    2011-12-01

    Routing in ad hoc network is a great problematic, since a good routing protocol must ensure fast and efficient packet forwarding, which isn't evident in ad hoc networks. In literature there exists lot of routing protocols however they don't include all the aspects of ad hoc networks as mobility, device and medium constraints which make these protocols not efficient for some configuration and categories of ad hoc networks. Thus in this paper we propose an improvement of Weight Based DSR in order to include some of the aspects of ad hoc networks as stability, remaining battery power, load and trust factor and proposing a new approach Enhanced Weight Based DSR.

  10. Robust message routing for mobile (wireless) ad hoc networks.

    SciTech Connect

    Goldsby, Michael E.; Johnson, Michael M.; Kilman, Dominique Marie; Bierbaum, Neal Robert; Chen, Helen Y.; Ammerlahn, Heidi R.; Tsang, Rose P.; Nicol, David M.

    2004-01-01

    This report describes the results of research targeting improvements in the robustness of message transport in wireless ad hoc networks. The first section of the report provides an analysis of throughput and latency in the wireless medium access control (MAC) layer and relates the analysis to the commonly used 802.11 protocol. The second section describes enhancements made to several existing models of wireless MAC and ad hoc routing protocols; the models were used in support of the work described in the following section. The third section of the report presents a lightweight transport layer protocol that is superior to TCP for use in wireless networks. In addition, it introduces techniques that improve the performance of any ad hoc source routing protocol. The fourth section presents a novel, highly scalable ad hoc routing protocol that is based on geographic principles but requires no localization hardware.

  11. Apache Drill: Interactive Ad-Hoc Analysis at Scale.

    PubMed

    Hausenblas, Michael; Nadeau, Jacques

    2013-06-01

    Apache Drill is a distributed system for interactive ad-hoc analysis of large-scale datasets. Designed to handle up to petabytes of data spread across thousands of servers, the goal of Drill is to respond to ad-hoc queries in a low-latency manner. In this article, we introduce Drill's architecture, discuss its extensibility points, and put it into the context of the emerging offerings in the interactive analytics realm.

  12. Malicious node detection in ad-hoc wireless networks

    NASA Astrophysics Data System (ADS)

    Griswold, Richard L.; Medidi, Sirisha R.

    2003-07-01

    Advances in wireless communications and the proliferation of mobile computing devices has led to the rise of a new type of computer network: the ad-hoc wireless network. Ad-hoc networks are characterized by a lack of fixed infrastructure, which give ad-hoc networks a great deal of flexibility, but also increases the risk of security problems. In wired networks, key pieces of network infrastructure are secured to prevent unauthorized physical access and tampering. Network administrators ensure that everything is properly configured and are on-hand to fix problems and deal with intrusions. In contrast, the nodes in an ad-hoc network are responsible for routing and forwarding data in the network, and there are no network administrators to handle potential problems. This makes an ad-hoc network more vulnerable to a misconfigured, faulty, or compromised node. We propose a means for a node in an ad-hoc network to detect and handle these malicious nodes by comparing data available to the routing protocol, such as cached routes in Dynamic Source Routing, ICMP messages, and transport layer information, such as TCP timeouts. This data can then be used along with network probes to isolate the malicious node.

  13. Cross-layer protocols optimized for real-time multimedia services in energy-constrained mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2003-07-01

    Mobile ad hoc networking (MANET) supports self-organizing, mobile infrastructures and enables an autonomous network of mobile nodes that can operate without a wired backbone. Ad hoc networks are characterized by multihop, wireless connectivity via packet radios and by the need for efficient dynamic protocols. All routers are mobile and can establish connectivity with other nodes only when they are within transmission range. Importantly, ad hoc wireless nodes are resource-constrained, having limited processing, memory, and battery capacity. Delivery of high quality-ofservice (QoS), real-time multimedia services from Internet-based applications over a MANET is a challenge not yet achieved by proposed Internet Engineering Task Force (IETF) ad hoc network protocols in terms of standard performance metrics such as end-to-end throughput, packet error rate, and delay. In the distributed operations of route discovery and maintenance, strong interaction occurs across MANET protocol layers, in particular, the physical, media access control (MAC), network, and application layers. The QoS requirements are specified for the service classes by the application layer. The cross-layer design must also satisfy the battery-limited energy constraints, by minimizing the distributed power consumption at the nodes and of selected routes. Interactions across the layers are modeled in terms of the set of concatenated design parameters including associated energy costs. Functional dependencies of the QoS metrics are described in terms of the concatenated control parameters. New cross-layer designs are sought that optimize layer interdependencies to achieve the "best" QoS available in an energy-constrained, time-varying network. The protocol design, based on a reactive MANET protocol, adapts the provisioned QoS to dynamic network conditions and residual energy capacities. The cross-layer optimization is based on stochastic dynamic programming conditions derived from time-dependent models of

  14. Auto-configuration protocols in mobile ad hoc networks.

    PubMed

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity.

  15. Global Coverage from Ad-Hoc Constellations in Rideshare Orbits

    NASA Technical Reports Server (NTRS)

    Ellis, Armin; Mercury, Michael; Brown, Shannon

    2012-01-01

    A promising area of small satellite development is in providing higher temporal resolution than larger satellites. Traditional constellations have required specific orbits and dedicated launch vehicles. In this paper we discuss an alternative architecture in which the individual elements of the constellation are launched as rideshare opportunities. We compare the coverage of such an ad-hoc constellation with more traditional constellations. Coverage analysis is based on actual historical data from rideshare opportunities. Our analysis includes ground coverage and temporal revisits for Polar, Tropics, Temperate, and Global regions, comparing ad-hoc and Walker constellation.

  16. Preferential survival in models of complex ad hoc networks

    NASA Astrophysics Data System (ADS)

    Kong, Joseph S.; Roychowdhury, Vwani P.

    2008-05-01

    There has been a rich interplay in recent years between (i) empirical investigations of real-world dynamic networks, (ii) analytical modeling of the microscopic mechanisms that drive the emergence of such networks, and (iii) harnessing of these mechanisms to either manipulate existing networks, or engineer new networks for specific tasks. We continue in this vein, and study the deletion phenomenon in the web by the following two different sets of websites (each comprising more than 150,000 pages) over a one-year period. Empirical data show that there is a significant deletion component in the underlying web networks, but the deletion process is not uniform. This motivates us to introduce a new mechanism of preferential survival (PS), where nodes are removed according to the degree-dependent deletion kernel, D(k)∝k, with α≥0. We use the mean-field rate equation approach to study a general dynamic model driven by Preferential Attachment (PA), Double PA (DPA), and a tunable PS (i.e., with any α>0), where c nodes ( c<1) are deleted per node added to the network, and verify our predictions via large-scale simulations. One of our results shows that, unlike in the case of uniform deletion (i.e., where α=0), the PS kernel when coupled with the standard PA mechanism, can lead to heavy-tailed power-law networks even in the presence of extreme turnover in the network. Moreover, a weak DPA mechanism, coupled with PS, can help to make the network even more heavy-tailed, especially in the limit when deletion and insertion rates are almost equal, and the overall network growth is minimal. The dynamics reported in this work can be used to design and engineer stable ad hoc networks and explain the stability of the power-law exponents observed in real-world networks.

  17. 14 CFR § 1203.1002 - Ad hoc committees.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false Ad hoc committees. § 1203.1002 Section § 1203.1002 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Special Access Programs (SAP) and Sensitive Compartmented Information (SCI) Programs...

  18. Project "Freestyle": Ad Hoc: Fast-Turn-Around Evaluation.

    ERIC Educational Resources Information Center

    Smith, Karen

    Project "Freestyle" involved the development of prototypical television materials and a comic book intended to combat sex-role stereotyping in career-related attitudes of nine to twelve-year-old children. At various times during the early developmental stages of "Freestyle" materials, "ad hoc fast-turn-around" formative evaluations were conducted.…

  19. Ad Hoc Technical Committee for Vocational Agriculture. Final Report.

    ERIC Educational Resources Information Center

    Indiana State Commission on Vocational and Technical Education, Indianapolis.

    The goal of the Ad Hoc Technical Committee for Vocational Agriculture in Indiana was to develop a model and recommendations that would result in improved student knowledge and skills for the present and future, address labor market needs, and promote program excellence at all levels of education. The committee developed recommendations for…

  20. CSR: Constrained Selfish Routing in Ad-Hoc Networks

    NASA Astrophysics Data System (ADS)

    Bassem, Christine; Bestavros, Azer

    Routing protocols for ad-hoc networks assume that the nodes forming the network are either under a single authority, or else that they would be altruistically forwarding data for other nodes with no expectation of a return. These assumptions are unrealistic since in ad-hoc networks, nodes are likely to be autonomous and rational (selfish), and thus unwilling to help unless they have an incentive to do so. Providing such incentives is an important aspect that should be considered when designing ad-hoc routing protocols. In this paper, we propose a dynamic, decentralized routing protocol for ad-hoc networks that provides incentives in the form of payments to intermediate nodes used to forward data for others. In our Constrained Selfish Routing (CSR) protocol, game-theoretic approaches are used to calculate payments (incentives) that ensure both the truthfulness of participating nodes and the fairness of the CSR protocol. We show through simulations that CSR is an energy efficient protocol and that it provides lower communication overhead in the best and average cases compared to existing approaches.

  1. Providing Location Security in Vehicular Ad Hoc Networks

    ERIC Educational Resources Information Center

    Yan, Gongjun

    2010-01-01

    Location is fundamental information in Vehicular Ad-hoc Networks (VANETs). Almost all VANET applications rely on location information. Therefore it is of importance to ensure location information integrity, meaning that location information is original (from the generator), correct (not bogus or fabricated) and unmodified (value not changed). We…

  2. Routing in Ad Hoc Network Using Ant Colony Optimization

    NASA Astrophysics Data System (ADS)

    Khanpara, Pimal; Valiveti, Sharada; Kotecha, K.

    The ad hoc networks have dynamic topology and are infrastructure less. So it is required to implement a new network protocol for providing efficient end to end communication based on TCP/IP structure. There is a need to re-define or modify the functions of each layer of TCP/IP model to provide end to end communication between nodes. The mobility of the nodes and the limited resources are the main reason for this change. The main challenge in ad hoc networks is routing. Due to the mobility of the nodes in the ad hoc networks, routing becomes very difficult. Ant based algorithms are suitable for routing in ad hoc networks due to its dynamic nature and adaptive behavior. There are number of routing algorithms based on the concept of ant colony optimizations. It is quite difficult to determine the best ant based algorithm for routing as these algorithms perform differently under various circumstances such as the traffic distribution and network topology. In this paper, the overview of such routing algorithms is given.

  3. An artificial immune system approach with secondary response for misbehavior detection in mobile ad hoc networks.

    PubMed

    Sarafijanović, Slavisa; Le Boudec, Jean-Yves

    2005-09-01

    In mobile ad hoc networks, nodes act both as terminals and information relays, and they participate in a common routing protocol, such as dynamic source routing (DSR). The network is vulnerable to routing misbehavior, due to faulty or malicious nodes. Misbehavior detection systems aim at removing this vulnerability. In this paper, we investigate the use of an artificial immune system (AIS) to detect node misbehavior in a mobile ad hoc network using DSR. The system is inspired by the natural immune system (IS) of vertebrates. Our goal is to build a system that, like its natural counterpart, automatically learns, and detects new misbehavior. We describe our solution for the classification task of the AIS; it employs negative selection and clonal selection, the algorithms for learning and adaptation used by the natural IS. We define how we map the natural IS concepts such as self, antigen, and antibody to a mobile ad hoc network and give the resulting algorithm for classifying nodes as misbehaving. We implemented the system in the network simulator Glomosim; we present detection results and discuss how the system parameters affect the performance of primary and secondary response. Further steps will extend the design by using an analogy to the innate system, danger signal, and memory cells.

  4. Metadata-driven Ad Hoc Query of Patient Data

    PubMed Central

    Deshpande, Aniruddha M.; Brandt, Cynthia; Nadkarni, Prakash M.

    2002-01-01

    Clinical study data management systems (CSDMSs) have many similarities to clinical patient record systems (CPRSs) in their focus on recording clinical parameters. Requirements for ad hoc query interfaces for both systems would therefore appear to be highly similar. However, a clinical study is concerned primarily with collective responses of groups of subjects to standardized therapeutic interventions for the same underlying clinical condition. The parameters that are recorded in CSDMSs tend to be more diverse than those required for patient management in non-research settings, because of the greater emphasis on questionnaires for which responses to each question are recorded separately. The differences between CSDMSs and CPRSs are reflected in the metadata that support the respective systems' operation, and need to be reflected in the query interfaces. The authors describe major revisions of their previously described CSDMS ad hoc query interface to meet CSDMS needs more fully, as well as its porting to a Web-based platform. PMID:12087118

  5. Shuttle-run synchronization in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Ma, Sheng-Fei; Bi, Hong-Jie; Zou, Yong; Liu, Zong-Hua; Guan, Shu-Guang

    2015-06-01

    In this work, we study the collective dynamics of phase oscillators in a mobile ad hoc network whose topology changes dynamically. As the network size or the communication radius of individual oscillators increases, the topology of the ad hoc network first undergoes percolation, forming a giant cluster, and then gradually achieves global connectivity. It is shown that oscillator mobility generally enhances the coherence in such networks. Interestingly, we find a new type of phase synchronization/clustering, in which the phases of the oscillators are distributed in a certain narrow range, while the instantaneous frequencies change signs frequently, leading to shuttle-run-like motion of the oscillators in phase space. We conduct a theoretical analysis to explain the mechanism of this synchronization and obtain the critical transition point.

  6. MAC protocol for ad hoc networks using a genetic algorithm.

    PubMed

    Elizarraras, Omar; Panduro, Marco; Méndez, Aldo L; Reyna, Alberto

    2014-01-01

    The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR) and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC) protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access) for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15%) compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput.

  7. MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm

    PubMed Central

    Elizarraras, Omar; Panduro, Marco; Méndez, Aldo L.

    2014-01-01

    The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR) and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC) protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access) for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15%) compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput. PMID:25140339

  8. Auto-configuration protocols in mobile ad hoc networks.

    PubMed

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  9. MWAHCA: a multimedia wireless ad hoc cluster architecture.

    PubMed

    Diaz, Juan R; Lloret, Jaime; Jimenez, Jose M; Sendra, Sandra

    2014-01-01

    Wireless Ad hoc networks provide a flexible and adaptable infrastructure to transport data over a great variety of environments. Recently, real-time audio and video data transmission has been increased due to the appearance of many multimedia applications. One of the major challenges is to ensure the quality of multimedia streams when they have passed through a wireless ad hoc network. It requires adapting the network architecture to the multimedia QoS requirements. In this paper we propose a new architecture to organize and manage cluster-based ad hoc networks in order to provide multimedia streams. Proposed architecture adapts the network wireless topology in order to improve the quality of audio and video transmissions. In order to achieve this goal, the architecture uses some information such as each node's capacity and the QoS parameters (bandwidth, delay, jitter, and packet loss). The architecture splits the network into clusters which are specialized in specific multimedia traffic. The real system performance study provided at the end of the paper will demonstrate the feasibility of the proposal.

  10. MWAHCA: A Multimedia Wireless Ad Hoc Cluster Architecture

    PubMed Central

    Diaz, Juan R.; Jimenez, Jose M.; Sendra, Sandra

    2014-01-01

    Wireless Ad hoc networks provide a flexible and adaptable infrastructure to transport data over a great variety of environments. Recently, real-time audio and video data transmission has been increased due to the appearance of many multimedia applications. One of the major challenges is to ensure the quality of multimedia streams when they have passed through a wireless ad hoc network. It requires adapting the network architecture to the multimedia QoS requirements. In this paper we propose a new architecture to organize and manage cluster-based ad hoc networks in order to provide multimedia streams. Proposed architecture adapts the network wireless topology in order to improve the quality of audio and video transmissions. In order to achieve this goal, the architecture uses some information such as each node's capacity and the QoS parameters (bandwidth, delay, jitter, and packet loss). The architecture splits the network into clusters which are specialized in specific multimedia traffic. The real system performance study provided at the end of the paper will demonstrate the feasibility of the proposal. PMID:24737996

  11. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    PubMed Central

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  12. 29 CFR 1912.11 - Terms of ad hoc committee members.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 7 2010-07-01 2010-07-01 false Terms of ad hoc committee members. 1912.11 Section 1912.11..., DEPARTMENT OF LABOR (CONTINUED) ADVISORY COMMITTEES ON STANDARDS Organizational Matters § 1912.11 Terms of ad hoc committee members. Each member of an ad hoc advisory committee shall serve for such period as...

  13. Ubiquitous and Secure Certificate Service for Wireless Ad Hoc Network

    NASA Astrophysics Data System (ADS)

    Ge, Meng; Lam, Kwok-Yan; Li, Jianbin; Chung, Siu-Leung

    Wireless ad hoc network is one of the most suitable platforms for providing communication services to support mobile applications in public areas where no fixed communication infrastructure exists. However, due to the open nature of wireless links and lack of security infrastructure in an ad hoc network environment, applications operating on ad hoc network platforms are subjected to non-trivial security challenges. Asymmetric key management, which is widely adopted to be an effective basis for security services in an open network environment, typically plays a crucial role in meeting the security requirements of such applications. In this paper, we propose a secure asymmetric key management scheme, the Ubiquitous and Secure Certificate Service (USCS), which is based on a variant of the Distributed Certificate Authority (DCA) - the Fully Distributed Certificate Authority (FDCA). Similar to FDCA, USCS introduces the presence of 1-hop neighbors which hold shares of DCA's private signature key, and can collaborate to issue certificates, thereby providing asymmetric key management service. Both USCS and FDCA aim to achieve higher availability than the basic DCA scheme; however, USCS is more secure than FDCA in that the former achieves high availability by distributing existing shares to new members, rather than generating new shares as the FDCA scheme does. In order to realise the high availability potential of USCS, a share selection algorithm is also proposed. Experimental results demonstrated that USCS is a more secure approach of the DCA scheme in that it can achieve stronger security than FDCA while attaining high availability similar to that of FDCA. Experiments also showed that USCS incurs only moderate communication overheads.

  14. Ad Hoc Selection of Voice over Internet Streams

    NASA Technical Reports Server (NTRS)

    Macha, Mitchell G. (Inventor); Bullock, John T. (Inventor)

    2014-01-01

    A method and apparatus for a communication system technique involving ad hoc selection of at least two audio streams is provided. Each of the at least two audio streams is a packetized version of an audio source. A data connection exists between a server and a client where a transport protocol actively propagates the at least two audio streams from the server to the client. Furthermore, software instructions executable on the client indicate a presence of the at least two audio streams, allow selection of at least one of the at least two audio streams, and direct the selected at least one of the at least two audio streams for audio playback.

  15. Ad Hoc Selection of Voice over Internet Streams

    NASA Technical Reports Server (NTRS)

    Macha, Mitchell G. (Inventor); Bullock, John T. (Inventor)

    2008-01-01

    A method and apparatus for a communication system technique involving ad hoc selection of at least two audio streams is provided. Each of the at least two audio streams is a packetized version of an audio source. A data connection exists between a server and a client where a transport protocol actively propagates the at least two audio streams from the server to the client. Furthermore, software instructions executable on the client indicate a presence of the at least two audio streams, allow selection of at least one of the at least two audio streams, and direct the selected at least one of the at least two audio streams for audio playback.

  16. Stochastic does not equal ad hoc. [theories of lunar origin

    NASA Technical Reports Server (NTRS)

    Hartmann, W. K.

    1984-01-01

    Some classes of influential events in solar system history are class-predictable but not event-predictable. Theories of lunar origin should not ignore class-predictable stochastic events. Impacts and close encounters with large objects during planet formation are class-predictable. These stochastic events, such as large impacts that triggered ejection of Earth-mantle material into a circum-Earth cloud, should not be rejected as ad hoc. A way to deal with such events scientifically is to investigate their consequences; if it can be shown that they might produce the Moon, they become viable concepts in theories of lunar origin.

  17. Approximate ad-hoc query engine for simulation data

    SciTech Connect

    Abdulla, G; Baldwin, C; Critchlow, T; Kamimura, R; Lozares, I; Musick, R; Tang, N; Lee, B S; Snapp, R

    2001-02-01

    In this paper, we describe AQSim, an ongoing effort to design and implement a system to manage terabytes of scientific simulation data. The goal of this project is to reduce data storage requirements and access times while permitting ad-hoc queries using statistical and mathematical models of the data. In order to facilitate data exchange between models based on different representations, we are evaluating using the ASCI common data model which is comprised of several layers of increasing semantic complexity. To support queries over the spatial-temporal mesh structured data we are in the process of defining and implementing a grammar for MeshSQL.

  18. Scalable Architecture for Multihop Wireless ad Hoc Networks

    NASA Technical Reports Server (NTRS)

    Arabshahi, Payman; Gray, Andrew; Okino, Clayton; Yan, Tsun-Yee

    2004-01-01

    A scalable architecture for wireless digital data and voice communications via ad hoc networks has been proposed. Although the details of the architecture and of its implementation in hardware and software have yet to be developed, the broad outlines of the architecture are fairly clear: This architecture departs from current commercial wireless communication architectures, which are characterized by low effective bandwidth per user and are not well suited to low-cost, rapid scaling in large metropolitan areas. This architecture is inspired by a vision more akin to that of more than two dozen noncommercial community wireless networking organizations established by volunteers in North America and several European countries.

  19. Security Condition for Exact Localization in Wireless Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Kim, Jin Seok; Yum, Dae Hyun; Hong, Sung Je; Kim, Jong; Lee, Pil Joong

    As deployment of wireless ad hoc networks for location-based services increases, accurate localization of mobile nodes is becoming more important. Localization of a mobile node is achieved by estimating its distances from a group of anchor nodes. If some anchors are malicious and colluding, localization accuracy cannot be guaranteed. In this article, we present the security conditions for exact localization in the presence of colluding malicious anchors. We first derive the minimum number of truthful anchors that are required for exact localization in 2-D Euclidean space where some anchors may be collinear. Second, we extend our security condition to 3-D localization where some anchors may be coplanar.

  20. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  1. [The global harmonization task force : successes and challenges].

    PubMed

    Rotter, R G

    2009-06-01

    With the move towards globalized international commerce and trade, a call for harmonization of medical device regulatory requirements and practices has evolved. The purpose of the Global Harmonization Task Force (GHTF) is to encourage convergence of regulatory requirements and practices at a global level through consensus to achieve four principle goals: promote safety, quality and performance/effectiveness of medical devices; encourage technological innovation; foster international trade; and serve as a forum of information exchange - all in the interests of protecting and promoting public health. The GHTF is governed by a Steering Committee, and the principle development of the GHTF regulatory model has been, and continues to be, done through five working groups known as Study Groups and supplemented recently by the creation of several Ad Hoc Working Groups. Since its creation in 1992, the members of the GHTF have worked collaboratively to develop what is now ready to be called a global model for the regulation of medical devices.

  2. Energy Efficient Probabilistic Broadcasting for Mobile Ad-Hoc Network

    NASA Astrophysics Data System (ADS)

    Kumar, Sumit; Mehfuz, Shabana

    2016-08-01

    In mobile ad-hoc network (MANETs) flooding method is used for broadcasting route request (RREQ) packet from one node to another node for route discovery. This is the simplest method of broadcasting of RREQ packets but it often results in broadcast storm problem, originating collisions and congestion of packets in the network. A probabilistic broadcasting is one of the widely used broadcasting scheme for route discovery in MANETs and provides solution for broadcasting storm problem. But it does not consider limited energy of the battery of the nodes. In this paper, a new energy efficient probabilistic broadcasting (EEPB) is proposed in which probability of broadcasting RREQs is calculated with respect to remaining energy of nodes. The analysis of simulation results clearly indicate that an EEPB route discovery scheme in ad-hoc on demand distance vector (AODV) can increase the network lifetime with a decrease in the average power consumption and RREQ packet overhead. It also decreases the number of dropped packets in the network, in comparison to other EEPB schemes like energy constraint gossip (ECG), energy aware gossip (EAG), energy based gossip (EBG) and network lifetime through energy efficient broadcast gossip (NEBG).

  3. Asynchronous ad hoc network discovery for low-power systems

    NASA Astrophysics Data System (ADS)

    Joslin, Todd W.

    2008-04-01

    Unattended ground sensor systems (UGS) have become an important part of a covert monitoring arsenal in operations throughout the world. With the increased use of unattended ground sensor systems, there is a need to develop communication architectures that allow the systems to have simple emplacement procedures, have a long mission life, and be difficult to detect. Current ad-hoc networking schemes use either a network beacon, extensive preambles, or guaranteed time synchronization to achieve reliable communications. When used in wireless sensor systems many of these schemes waste power through unnecessary transmissions. These schemes compromise the covert nature of UGS through excess transmissions for a non-beaconed network or the periodic beaconing in a beaconed network. These factors are detrimental to sensor systems, which chiefly rely on being covert and low-power. This paper discusses a nonarbitrated, non-GPS synchronized, beaconless approach to discovering, joining, and reliably transmitting and receiving in a low-power ad-hoc wireless sensor network. This solution is capable of performing network discovery upon demand to get an initial alignment with other nodes in the network. Once aligned, end points maintain alignment and can predict when other nodes will be available to listen.

  4. Enhancement of node connectivity for mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Shi, Xiyu; Li, Fanzhi; Adams, Christopher

    2006-05-01

    For secure mobile wireless networks whose topologies are changed dynamically in insecure environments, mobile users need to keep in contact with each other for the purpose of user authentications. For instance, the network formed by a group of soldiers equipped with wireless devices in a battlefield. Maintaining a high connectivity is crucial in such networks in order to authenticate scattered individuals and to be able to communicate with each other. To establish connections, different mobile ad hoc network routing protocols have been developed. However, much research has shown that these protocols are incapable of maintaining high connectivity when the node density is lower in the network. This paper proposes a mechanism to enhance the node connectivity, which is specifically effective for mobile ad hoc networks with lower node densities. It selects some nodes with larger transmission power as strategic nodes to assist in establishing connections with remote nodes, which are unable to connect with otherwise. The strategic nodes have the ability to connect with each other. Whenever a remote mobile node has a request to connect to another remote mobile node, the strategic nodes function as normal mobile nodes and may forward the connection requests to the desired remote destination node. The mechanism is simulated in different scenarios with various node densities, and the results show that the node connectivity is generally enhanced with the benefit of lower node density network, gaining significant improvement.

  5. Dynamic fair node spectrum allocation for ad hoc networks using random matrices

    NASA Astrophysics Data System (ADS)

    Rahmes, Mark; Lemieux, George; Chester, Dave; Sonnenberg, Jerry

    2015-05-01

    Dynamic Spectrum Access (DSA) is widely seen as a solution to the problem of limited spectrum, because of its ability to adapt the operating frequency of a radio. Mobile Ad Hoc Networks (MANETs) can extend high-capacity mobile communications over large areas where fixed and tethered-mobile systems are not available. In one use case with high potential impact, cognitive radio employs spectrum sensing to facilitate the identification of allocated frequencies not currently accessed by their primary users. Primary users own the rights to radiate at a specific frequency and geographic location, while secondary users opportunistically attempt to radiate at a specific frequency when the primary user is not using it. We populate a spatial radio environment map (REM) database with known information that can be leveraged in an ad hoc network to facilitate fair path use of the DSA-discovered links. Utilization of high-resolution geospatial data layers in RF propagation analysis is directly applicable. Random matrix theory (RMT) is useful in simulating network layer usage in nodes by a Wishart adjacency matrix. We use the Dijkstra algorithm for discovering ad hoc network node connection patterns. We present a method for analysts to dynamically allocate node-node path and link resources using fair division. User allocation of limited resources as a function of time must be dynamic and based on system fairness policies. The context of fair means that first available request for an asset is not envied as long as it is not yet allocated or tasked in order to prevent cycling of the system. This solution may also save money by offering a Pareto efficient repeatable process. We use a water fill queue algorithm to include Shapley value marginal contributions for allocation.

  6. T2AR: trust-aware ad-hoc routing protocol for MANET.

    PubMed

    Dhananjayan, Gayathri; Subbiah, Janakiraman

    2016-01-01

    Secure data transfer against the malicious attacks is an important issue in an infrastructure-less independent network called mobile ad-hoc network (MANET). Trust assurance between MANET nodes is the key parameter in the high-security provision under dynamic topology variations and open wireless constraints. But, the malicious behavior of nodes reduces the trust level of the nodes that leads to an insecure data delivery. The increase in malicious attacks causes the excessive energy consumption that leads to a reduction of network lifetime. The lack of positional information update of the nodes in ad-hoc on-demand vector (AODV) protocol during the connection establishment offers less trust level between the nodes. Hence, the trust rate computation using energy and mobility models and its update are the essential tasks for secure data delivery. This paper proposes a trust-aware ad-hoc routing (T2AR) protocol to improve the trust level between the nodes in MANET. The proposed method modifies the traditional AODV routing protocol with the constraints of trust rate, energy, mobility based malicious behavior prediction. The packet sequence ID matching from the log reports of neighbor nodes determine the trust rate that avoids the malicious report generation. Besides, the direct and indirect trust observation schemes utilization increases the trust level. Besides, the received signal strength indicator utilization determines the trusted node is within the communication range or not. The comparative analysis between the proposed T2AR with the existing methods such as TRUNCMAN, RBT, GR, FBR and DICOTIDS regarding the average end-to-end delay, throughput, false positives, packet delivery ratio shows the effectiveness of T2AR in the secure MANET environment design. PMID:27441127

  7. T2AR: trust-aware ad-hoc routing protocol for MANET.

    PubMed

    Dhananjayan, Gayathri; Subbiah, Janakiraman

    2016-01-01

    Secure data transfer against the malicious attacks is an important issue in an infrastructure-less independent network called mobile ad-hoc network (MANET). Trust assurance between MANET nodes is the key parameter in the high-security provision under dynamic topology variations and open wireless constraints. But, the malicious behavior of nodes reduces the trust level of the nodes that leads to an insecure data delivery. The increase in malicious attacks causes the excessive energy consumption that leads to a reduction of network lifetime. The lack of positional information update of the nodes in ad-hoc on-demand vector (AODV) protocol during the connection establishment offers less trust level between the nodes. Hence, the trust rate computation using energy and mobility models and its update are the essential tasks for secure data delivery. This paper proposes a trust-aware ad-hoc routing (T2AR) protocol to improve the trust level between the nodes in MANET. The proposed method modifies the traditional AODV routing protocol with the constraints of trust rate, energy, mobility based malicious behavior prediction. The packet sequence ID matching from the log reports of neighbor nodes determine the trust rate that avoids the malicious report generation. Besides, the direct and indirect trust observation schemes utilization increases the trust level. Besides, the received signal strength indicator utilization determines the trusted node is within the communication range or not. The comparative analysis between the proposed T2AR with the existing methods such as TRUNCMAN, RBT, GR, FBR and DICOTIDS regarding the average end-to-end delay, throughput, false positives, packet delivery ratio shows the effectiveness of T2AR in the secure MANET environment design.

  8. The task force process

    SciTech Connect

    Applegate, J.S.

    1995-01-31

    This paper focuses on the unique aspects of the Fernald Citizens Task Force process that have contributed to a largely successful public participation effort at Fernald. The Fernald Citizens Task Force passed quickly by many procedural issues. Instead, the Task Force concentrated on (a) educating itself about the site, its problems, and possible solutions, and (b) choosing a directed way to approach its mandate: To make recommendations on several {open_quotes}big picture{close_quotes} issues, including future use of the site, cleanup levels, waste disposition, and cleanup priorities. This paper presents the approach used at Fernald for establishing and running a focused site-specific advisory board, the key issues that have been faced, and how these issues were resolved. The success of Fernald in establishing a strong and functioning site-specific advisory board serves as a useful model for other DOE facilities, although the Fernald model is just one of many approaches that can be taken. However, the approach presented here has worked extremely well for Fernald.

  9. Intelligent routing protocol for ad hoc wireless network

    NASA Astrophysics Data System (ADS)

    Peng, Chaorong; Chen, Chang Wen

    2006-05-01

    A novel routing scheme for mobile ad hoc networks (MANETs), which combines hybrid and multi-inter-routing path properties with a distributed topology discovery route mechanism using control agents is proposed in this paper. In recent years, a variety of hybrid routing protocols for Mobile Ad hoc wireless networks (MANETs) have been developed. Which is proactively maintains routing information for a local neighborhood, while reactively acquiring routes to destinations beyond the global. The hybrid protocol reduces routing discovery latency and the end-to-end delay by providing high connectivity without requiring much of the scarce network capacity. On the other side the hybrid routing protocols in MANETs likes Zone Routing Protocol still need route "re-discover" time when a route between zones link break. Sine the topology update information needs to be broadcast routing request on local zone. Due to this delay, the routing protocol may not be applicable for real-time data and multimedia communication. We utilize the advantages of a clustering organization and multi-routing path in routing protocol to achieve several goals at the same time. Firstly, IRP efficiently saves network bandwidth and reduces route reconstruction time when a routing path fails. The IRP protocol does not require global periodic routing advertisements, local control agents will automatically monitor and repair broke links. Secondly, it efficiently reduces congestion and traffic "bottlenecks" for ClusterHeads in clustering network. Thirdly, it reduces significant overheads associated with maintaining clusters. Fourthly, it improves clusters stability due to dynamic topology changing frequently. In this paper, we present the Intelligent Routing Protocol. First, we discuss the problem of routing in ad hoc networks and the motivation of IRP. We describe the hierarchical architecture of IRP. We describe the routing process and illustrate it with an example. Further, we describe the control manage

  10. Ad hoc committee on global climate issues: Annual report

    USGS Publications Warehouse

    Gerhard, L.C.; Hanson, B.M.B.

    2000-01-01

    The AAPG Ad Hoc Committee on Global Climate Issues has studied the supposition of human-induced climate change since the committee's inception in January 1998. This paper details the progress and findings of the committee through June 1999. At that time there had been essentially no geologic input into the global climate change debate. The following statements reflect the current state of climate knowledge from the geologic perspective as interpreted by the majority of the committee membership. The committee recognizes that new data could change its conclusions. The earth's climate is constantly changing owing to natural variability in earth processes. Natural climate variability over recent geological time is greater than reasonable estimates of potential human-induced greenhouse gas changes. Because no tool is available to test the supposition of human-induced climate change and the range of natural variability is so great, there is no discernible human influence on global climate at this time.

  11. Indoor Positioning - An Ad-Hoc Positioning System

    NASA Astrophysics Data System (ADS)

    Mautz, Rainer

    2008-06-01

    The aim of this paper is to discuss the development of an automatic, low-cost system that exploits current or near future wireless communications technology to enable continuous tracking of the location of devices in all environments. The development of such a wireless sensor network involves system design, digital signal processing, protocol development, extraction of ranges and localisation. This paper focuses on the user requirements, system architecture and network positioning. The user requirements are presented with a focus on applications in geodesy. A high level strategy for the positioning function is presented based on an ad-hoc geodetic network positioning method including issues of accuracy, quality and reliability of the node positions. Results show that it is possible to achieve a position deviation that is of the size of the ranging error.

  12. Opportunistic Channel Scheduling for Ad Hoc Networks with Queue Stability

    NASA Astrophysics Data System (ADS)

    Dong, Lei; Wang, Yongchao

    2015-03-01

    In this paper, a distributed opportunistic channel access strategy in ad hoc network is proposed. We consider the multiple sources contend for the transmission opportunity, the winner source decides to transmit or restart contention based on the current channel condition. Owing to real data assumption at all links, the decision still needs to consider the stability of the queues. We formulate the channel opportunistic scheduling as a constrained optimization problem which maximizes the system average throughput with the constraints that the queues of all links are stable. The proposed optimization model is solved by Lyapunov stability in queueing theory. The successive channel access problem is decoupled into single optimal stopping problem at every frame and solved with Lyapunov algorithm. The threshold for every frame is different, and it is derived based on the instantaneous queue information. Finally, computer simulations are conducted to demonstrate the validity of the proposed strategy.

  13. Topology for efficient information dissemination in ad-hoc networking

    NASA Technical Reports Server (NTRS)

    Jennings, E.; Okino, C. M.

    2002-01-01

    In this paper, we explore the information dissemination problem in ad-hoc wirless networks. First, we analyze the probability of successful broadcast, assuming: the nodes are uniformly distributed, the available area has a lower bould relative to the total number of nodes, and there is zero knowledge of the overall topology of the network. By showing that the probability of such events is small, we are motivated to extract good graph topologies to minimize the overall transmissions. Three algorithms are used to generate topologies of the network with guaranteed connectivity. These are the minimum radius graph, the relative neighborhood graph and the minimum spanning tree. Our simulation shows that the relative neighborhood graph has certain good graph properties, which makes it suitable for efficient information dissemination.

  14. On service differentiation in mobile Ad Hoc networks.

    PubMed

    Zhang, Shun-liang; Ye, Cheng-qing

    2004-09-01

    A network model is proposed to support service differentiation for mobile Ad Hoc networks by combining a fully distributed admission control approach and the DIFS based differentiation mechanism of IEEE802.11. It can provide different kinds of QoS (Quality of Service) for various applications. Admission controllers determine a committed bandwidth based on the reserved bandwidth of flows and the source utilization of networks. Packets are marked when entering into networks by markers according to the committed rate. By the mark in the packet header, intermediate nodes handle the received packets in different manners to provide applications with the QoS corresponding to the pre-negotiated profile. Extensive simulation experiments showed that the proposed mechanism can provide QoS guarantee to assured service traffic and increase the channel utilization of networks.

  15. A Trust Based Clustering Framework for Securing Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Chatterjee, Pushpita; Sengupta, Indranil; Ghosh, S. K.

    In this paper we present a distributed self-organizing trust based clustering framework for securing ad hoc networks. The mobile nodes are vulnerable to security attacks, so ensuring the security of the network is essential. To enhance security, it is important to evaluate the trustworthiness of nodes without depending on central authorities. In our proposal the evidence of trustworthiness is captured in an efficient manner and from broader perspectives including direct interactions with neighbors, observing interactions of neighbors and through recommendations. Our prediction scheme uses a trust evaluation algorithm at each node to calculate the direct trust rating normalized as a fuzzy value between zero and one. The evidence theory of Dempster-Shafer [9], [10] is used in order to combine the evidences collected by a clusterhead itself and the recommendations from other neighbor nodes. Moreover, in our scheme we do not restrict to a single gateway node for inter cluster routing.

  16. Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization in Mobile Ad Hoc Networks.

    PubMed

    Robinson, Y Harold; Rajaram, M

    2015-01-01

    Mobile ad hoc network (MANET) is a collection of autonomous mobile nodes forming an ad hoc network without fixed infrastructure. Dynamic topology property of MANET may degrade the performance of the network. However, multipath selection is a great challenging task to improve the network lifetime. We proposed an energy-aware multipath routing scheme based on particle swarm optimization (EMPSO) that uses continuous time recurrent neural network (CTRNN) to solve optimization problems. CTRNN finds the optimal loop-free paths to solve link disjoint paths in a MANET. The CTRNN is used as an optimum path selection technique that produces a set of optimal paths between source and destination. In CTRNN, particle swarm optimization (PSO) method is primly used for training the RNN. The proposed scheme uses the reliability measures such as transmission cost, energy factor, and the optimal traffic ratio between source and destination to increase routing performance. In this scheme, optimal loop-free paths can be found using PSO to seek better link quality nodes in route discovery phase. PSO optimizes a problem by iteratively trying to get a better solution with regard to a measure of quality. The proposed scheme discovers multiple loop-free paths by using PSO technique. PMID:26819966

  17. A Secure 3-Way Routing Protocols for Intermittently Connected Mobile Ad Hoc Networks

    PubMed Central

    Parasuraman, Ganesh Kumar

    2014-01-01

    The mobile ad hoc network may be partially connected or it may be disconnected in nature and these forms of networks are termed intermittently connected mobile ad hoc network (ICMANET). The routing in such disconnected network is commonly an arduous task. Many routing protocols have been proposed for routing in ICMANET since decades. The routing techniques in existence for ICMANET are, namely, flooding, epidemic, probabilistic, copy case, spray and wait, and so forth. These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth. Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters. The algorithm along with efficient routing ensures higher degree of security. The security level is cited testing with respect to possibility of malicious nodes into the network. This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET. PMID:25136697

  18. Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization in Mobile Ad Hoc Networks

    PubMed Central

    Robinson, Y. Harold; Rajaram, M.

    2015-01-01

    Mobile ad hoc network (MANET) is a collection of autonomous mobile nodes forming an ad hoc network without fixed infrastructure. Dynamic topology property of MANET may degrade the performance of the network. However, multipath selection is a great challenging task to improve the network lifetime. We proposed an energy-aware multipath routing scheme based on particle swarm optimization (EMPSO) that uses continuous time recurrent neural network (CTRNN) to solve optimization problems. CTRNN finds the optimal loop-free paths to solve link disjoint paths in a MANET. The CTRNN is used as an optimum path selection technique that produces a set of optimal paths between source and destination. In CTRNN, particle swarm optimization (PSO) method is primly used for training the RNN. The proposed scheme uses the reliability measures such as transmission cost, energy factor, and the optimal traffic ratio between source and destination to increase routing performance. In this scheme, optimal loop-free paths can be found using PSO to seek better link quality nodes in route discovery phase. PSO optimizes a problem by iteratively trying to get a better solution with regard to a measure of quality. The proposed scheme discovers multiple loop-free paths by using PSO technique. PMID:26819966

  19. Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization in Mobile Ad Hoc Networks.

    PubMed

    Robinson, Y Harold; Rajaram, M

    2015-01-01

    Mobile ad hoc network (MANET) is a collection of autonomous mobile nodes forming an ad hoc network without fixed infrastructure. Dynamic topology property of MANET may degrade the performance of the network. However, multipath selection is a great challenging task to improve the network lifetime. We proposed an energy-aware multipath routing scheme based on particle swarm optimization (EMPSO) that uses continuous time recurrent neural network (CTRNN) to solve optimization problems. CTRNN finds the optimal loop-free paths to solve link disjoint paths in a MANET. The CTRNN is used as an optimum path selection technique that produces a set of optimal paths between source and destination. In CTRNN, particle swarm optimization (PSO) method is primly used for training the RNN. The proposed scheme uses the reliability measures such as transmission cost, energy factor, and the optimal traffic ratio between source and destination to increase routing performance. In this scheme, optimal loop-free paths can be found using PSO to seek better link quality nodes in route discovery phase. PSO optimizes a problem by iteratively trying to get a better solution with regard to a measure of quality. The proposed scheme discovers multiple loop-free paths by using PSO technique.

  20. A secure 3-way routing protocols for intermittently connected mobile ad hoc networks.

    PubMed

    Sekaran, Ramesh; Parasuraman, Ganesh Kumar

    2014-01-01

    The mobile ad hoc network may be partially connected or it may be disconnected in nature and these forms of networks are termed intermittently connected mobile ad hoc network (ICMANET). The routing in such disconnected network is commonly an arduous task. Many routing protocols have been proposed for routing in ICMANET since decades. The routing techniques in existence for ICMANET are, namely, flooding, epidemic, probabilistic, copy case, spray and wait, and so forth. These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth. Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters. The algorithm along with efficient routing ensures higher degree of security. The security level is cited testing with respect to possibility of malicious nodes into the network. This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET.

  1. A secure 3-way routing protocols for intermittently connected mobile ad hoc networks.

    PubMed

    Sekaran, Ramesh; Parasuraman, Ganesh Kumar

    2014-01-01

    The mobile ad hoc network may be partially connected or it may be disconnected in nature and these forms of networks are termed intermittently connected mobile ad hoc network (ICMANET). The routing in such disconnected network is commonly an arduous task. Many routing protocols have been proposed for routing in ICMANET since decades. The routing techniques in existence for ICMANET are, namely, flooding, epidemic, probabilistic, copy case, spray and wait, and so forth. These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth. Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters. The algorithm along with efficient routing ensures higher degree of security. The security level is cited testing with respect to possibility of malicious nodes into the network. This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET. PMID:25136697

  2. Extending Service Area of IEEE 802.11 Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Choi, Woo-Yong

    2012-06-01

    According to the current IEEE 802.11 wireless LAN standards, IEEE 802.11 ad hoc networks have the limitation that all STAs (Stations) are in the one-hop transmission range of each other. In this paper, to alleviate the limitation of IEEE 802.11 ad hoc networks we propose the efficient method for selecting the most appropriate pseudo AP (Access Point) from among the set of ad hoc STAs and extending the service area of IEEE 802.11 ad hoc networks by the pseudo AP's relaying the internal traffic of IEEE 802.11 ad hoc networks. Numerical examples show that the proposed method significantly extends the service area of IEEE 802.11 ad hoc networks.

  3. Performance Improvement in Geographic Routing for Vehicular Ad Hoc Networks

    PubMed Central

    Kaiwartya, Omprakash; Kumar, Sushil; Lobiyal, D. K.; Abdullah, Abdul Hanan; Hassan, Ahmed Nazar

    2014-01-01

    Geographic routing is one of the most investigated themes by researchers for reliable and efficient dissemination of information in Vehicular Ad Hoc Networks (VANETs). Recently, different Geographic Distance Routing (GEDIR) protocols have been suggested in the literature. These protocols focus on reducing the forwarding region towards destination to select the Next Hop Vehicles (NHV). Most of these protocols suffer from the problem of elevated one-hop link disconnection, high end-to-end delay and low throughput even at normal vehicle speed in high vehicle density environment. This paper proposes a Geographic Distance Routing protocol based on Segment vehicle, Link quality and Degree of connectivity (SLD-GEDIR). The protocol selects a reliable NHV using the criteria segment vehicles, one-hop link quality and degree of connectivity. The proposed protocol has been simulated in NS-2 and its performance has been compared with the state-of-the-art protocols: P-GEDIR, J-GEDIR and V-GEDIR. The empirical results clearly reveal that SLD-GEDIR has lower link disconnection and end-to-end delay, and higher throughput as compared to the state-of-the-art protocols. It should be noted that the performance of the proposed protocol is preserved irrespective of vehicle density and speed. PMID:25429415

  4. Performance improvement in geographic routing for Vehicular Ad Hoc Networks.

    PubMed

    Kaiwartya, Omprakash; Kumar, Sushil; Lobiyal, D K; Abdullah, Abdul Hanan; Hassan, Ahmed Nazar

    2014-01-01

    Geographic routing is one of the most investigated themes by researchers for reliable and efficient dissemination of information in Vehicular Ad Hoc Networks (VANETs). Recently, different Geographic Distance Routing (GEDIR) protocols have been suggested in the literature. These protocols focus on reducing the forwarding region towards destination to select the Next Hop Vehicles (NHV). Most of these protocols suffer from the problem of elevated one-hop link disconnection, high end-to-end delay and low throughput even at normal vehicle speed in high vehicle density environment. This paper proposes a Geographic Distance Routing protocol based on Segment vehicle, Link quality and Degree of connectivity (SLD-GEDIR). The protocol selects a reliable NHV using the criteria segment vehicles, one-hop link quality and degree of connectivity. The proposed protocol has been simulated in NS-2 and its performance has been compared with the state-of-the-art protocols: P-GEDIR, J-GEDIR and V-GEDIR. The empirical results clearly reveal that SLD-GEDIR has lower link disconnection and end-to-end delay, and higher throughput as compared to the state-of-the-art protocols. It should be noted that the performance of the proposed protocol is preserved irrespective of vehicle density and speed. PMID:25429415

  5. Z306 molecular contamination ad hoc committee results

    NASA Technical Reports Server (NTRS)

    Golden, Johnny L.

    1992-01-01

    LDEF external surfaces which did not receive significant amounts of atomic oxygen were observed to be coated with a brown contamination, apparently the result of a condensed organic residue darkened due to UV radiation exposure. During the initial Materials Special Investigation Group (MSIG) Meeting after LDEF deintegration, held in Seattle - July 1990, this organic contamination was the subject of much discussion. The amount of contamination was thought to be significant and its source was immediately believed to be the Z306 black thermal control coating used to coat the entire inner surface of LDEF. Due to the size of the structure, it was not feasible to bake-out the coating. However, initial data on the contamination film was confusing in that significant amounts of silicon was observed by several different researchers. Silicon (from silicone) was not expected to be a potential outgassing product of the Z306 polyurethane coating. To investigate the connection between external contamination and the interior paint, a MSIG ad hoc committee was formed.

  6. Scaling of critical connectivity of mobile ad hoc networks.

    PubMed

    Wang, Li; Zhu, Chen-Ping; Gu, Zhi-Ming

    2008-12-01

    In this paper, critical global connectivity of mobile ad hoc networks (MANETs) is investigated. We model the two-dimensional plane on which nodes move randomly with a triangular lattice. Demanding the best communication of the network, we account the global connectivity eta as a function of occupancy sigma of sites in the lattice by mobile nodes. Critical phenomena of the connectivity for different transmission ranges r are revealed by numerical simulations, and these results fit well to the analysis based on the assumption of homogeneous mixing. Scaling behavior of the connectivity is found as eta approximately f(R;{beta}sigma) , where R=(r-r_{0})r_{0} , r_{0} is the length unit of the triangular lattice, and beta is the scaling index in the universal function f(x) . The model serves as a sort of geometric distance-dependent site percolation on dynamic complex networks. Moreover, near each critical sigma_{c}(r) corresponding to certain transmission range r , there exists a cutoff degree k_{c} below which the clustering coefficient of such self-organized networks keeps a constant while the averaged nearest-neighbor degree exhibits a unique linear variation with the degree k , which may be useful to the designation of real MANETs.

  7. Design of the next generation cognitive mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Amjad, Ali; Wang, Huiqiang; Chen, Xiaoming

    Cognition capability has been seen by researchers as the way forward for the design of next generation of Mobile Ad Hoc Networks (MANETs). The reason why a cognitive paradigm would be more suited to a MANET is because MANETs are highly dynamic networks. The topology may change very frequently during the operation of a MANET. Traffic patterns in MANETs can vary from time to time depending on the need of the users. The size of a MANET and node density is also very dynamic and may change without any predictable pattern. In a MANET environment, most of these parameters may change very rapidly and keeping track of them manually would be very difficult. Previous studies have shown that the performance of a certain routing approach in MANETs is dependent on the size of the network and node density. The choice of whether to use a reactive or proactive routing approach comes down to the network size parameter. Static or offline approaches to fine tune a MANET to achieve certain performance goals is hence not very productive as a lot of these parameters keep changing during the course of operation of MANETs. Similarly, the performance of MANETs would improve greatly if the MAC layer entity could operate in a more flexible manner. In this paper we propose a cognitive MANET design that will ensure that all these dynamic parameters are automatically monitored and decisions are based on the current status of these parameters.

  8. Performance improvement in geographic routing for Vehicular Ad Hoc Networks.

    PubMed

    Kaiwartya, Omprakash; Kumar, Sushil; Lobiyal, D K; Abdullah, Abdul Hanan; Hassan, Ahmed Nazar

    2014-01-01

    Geographic routing is one of the most investigated themes by researchers for reliable and efficient dissemination of information in Vehicular Ad Hoc Networks (VANETs). Recently, different Geographic Distance Routing (GEDIR) protocols have been suggested in the literature. These protocols focus on reducing the forwarding region towards destination to select the Next Hop Vehicles (NHV). Most of these protocols suffer from the problem of elevated one-hop link disconnection, high end-to-end delay and low throughput even at normal vehicle speed in high vehicle density environment. This paper proposes a Geographic Distance Routing protocol based on Segment vehicle, Link quality and Degree of connectivity (SLD-GEDIR). The protocol selects a reliable NHV using the criteria segment vehicles, one-hop link quality and degree of connectivity. The proposed protocol has been simulated in NS-2 and its performance has been compared with the state-of-the-art protocols: P-GEDIR, J-GEDIR and V-GEDIR. The empirical results clearly reveal that SLD-GEDIR has lower link disconnection and end-to-end delay, and higher throughput as compared to the state-of-the-art protocols. It should be noted that the performance of the proposed protocol is preserved irrespective of vehicle density and speed.

  9. Algorithmic aspects of topology control problems for ad hoc networks

    SciTech Connect

    Liu, R.; Lloyd, E. L.; Marathe, M. V.; Ramanathan, R.; Ravi, S. S.

    2002-01-01

    Topology control problems are concerned with the assignment of power values to nodes of an ad hoc network so that the power assignment leads to a graph topology satisfying some specified properties. This paper considers such problems under several optimization objectives, including minimizing the maximum power and minimizing the total power. A general approach leading to a polynomial algorithm is presented for minimizing maximum power for a class of graph properties, called monotone properties. The difficulty of generalizing the approach to properties that are not monoione is pointed out. Problems involving the minimization of total power are known to be NP-complete even for simple graph properties. A general approach that leads to an approximation algorithm for minimizing the total power for some monotone properties is presented. Using this approach, a new approximation algorithm for the problem of minimizing the total power for obtaining a 2-node-connected graph is obtained. It is shown that this algorithm provides a constant performance guarantee. Experimental results from an implementation of the approximation algorithm are also presented.

  10. Distributed data fusion over an ad hoc network

    NASA Astrophysics Data System (ADS)

    Anderson, Sean; Binns, Lewis A.; Collins, Peter R. C.; Cooke, Andrew; Greenway, Phil; Valachis, Dimitris

    2002-08-01

    We have been developing a decentralised architecture for data fusion for several years. In this architecture, sensing nodes, each with their own processing, are networked together. Previously, we have researched fully connected networks, tree-connected networks, and networks with loops, and have developed a range of theoretical and empirical results for dynamic networks. Here we report the results obtained from building and demonstrating a decentralised data fusion system in which the nodes are connected via an ad hoc network. Several vision based tracking nodes are linked via a wireless LAN. We use UDP to establish local routing tables within the network whenever a node joins, and TCP/IP to provide point to point communications within the network. We show that the resulting data fusion system is modular, scalable and fault tolerant. In particular, we demonstrate robustness to nodes joining and leaving the network, either by choice or as a result of link drop-out. In addition to experimental results from the project, we present some thoughts on how the technology could be applied to large scale, heterogeneous sensor networks.

  11. Random Time Identity Based Firewall In Mobile Ad hoc Networks

    NASA Astrophysics Data System (ADS)

    Suman, Patel, R. B.; Singh, Parvinder

    2010-11-01

    A mobile ad hoc network (MANET) is a self-organizing network of mobile routers and associated hosts connected by wireless links. MANETs are highly flexible and adaptable but at the same time are highly prone to security risks due to the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized control. Firewall is an effective means of protecting a local network from network-based security threats and forms a key component in MANET security architecture. This paper presents a review of firewall implementation techniques in MANETs and their relative merits and demerits. A new approach is proposed to select MANET nodes at random for firewall implementation. This approach randomly select a new node as firewall after fixed time and based on critical value of certain parameters like power backup. This approach effectively balances power and resource utilization of entire MANET because responsibility of implementing firewall is equally shared among all the nodes. At the same time it ensures improved security for MANETs from outside attacks as intruder will not be able to find out the entry point in MANET due to the random selection of nodes for firewall implementation.

  12. A Token Ring Protocol for Dynamic Ad-hoc Wireless Environments

    SciTech Connect

    Top, P; Kohlhepp, V; Dowla, F

    2005-09-30

    A wireless ad-hoc networking protocol is presented. The protocol is designed to be flexible, easy to use and adaptable to a wide variety of potential applications. The primary considerations in design are small code size, guaranteed bandwidth access, limited delay, and error resilience in a highly dynamic ad-hoc environment. These considerations are achieved through the use of token ring protocol.

  13. Typicality Mediates Performance during Category Verification in Both Ad-Hoc and Well-Defined Categories

    ERIC Educational Resources Information Center

    Sandberg, Chaleece; Sebastian, Rajani; Kiran, Swathi

    2012-01-01

    Background: The typicality effect is present in neurologically intact populations for natural, ad-hoc, and well-defined categories. Although sparse, there is evidence of typicality effects in persons with chronic stroke aphasia for natural and ad-hoc categories. However, it is unknown exactly what influences the typicality effect in this…

  14. 32 CFR 2800.7 - Designation of chairperson for Ad Hoc Committees.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Designation of chairperson for Ad Hoc Committees... VICE PRESIDENT OF THE UNITED STATES SECURITY PROCEDURES § 2800.7 Designation of chairperson for Ad Hoc Committees. The Counsel to the Vice President is designated as the responsible official to chair Ad...

  15. The Future of 12th Grade NAEP: Report of the Ad Hoc Committee on Planning for NAEP 12th Grade Assessments in 2009

    ERIC Educational Resources Information Center

    National Assessment Governing Board, 2006

    2006-01-01

    The task of the Ad Hoc Committee on Planning for the the National Assessment of Educational Progress (NAEP) 12th Grade Assessments in 2009 addresses three policy areas: (1) Conducting assessment at the state level in 12th grade; (2) Reporting on 12th grade student preparedness for college-credit coursework, training for employment and entrance…

  16. Does Ad Hoc Coronary Intervention Reduce Radiation Exposure? – Analysis of 568 Patients

    PubMed Central

    Truffa, Márcio A. M.; Alves, Gustavo M.P.; Bernardi, Fernando; Esteves Filho, Antonio; Ribeiro, Expedito; Galon, Micheli Z.; Spadaro, André; Kajita, Luiz J.; Arrieta, Raul; Lemos, Pedro A.

    2015-01-01

    Background Advantages and disadvantages of ad hoc percutaneous coronary intervention have been described. However little is known about the radiation exposure of that procedure as compared with the staged intervention. Objective To compare the radiation dose of the ad hoc percutaneous coronary intervention with that of the staged procedure Methods The dose-area product and total Kerma were measured, and the doses of the diagnostic and therapeutic procedures were added. In addition, total fluoroscopic time and number of acquisitions were evaluated. Results A total of 568 consecutive patients were treated with ad hoc percutaneous coronary intervention (n = 320) or staged percutaneous coronary intervention (n = 248). On admission, the ad hoc group had less hypertension (74.1% vs 81.9%; p = 0.035), dyslipidemia (57.8% vs. 67.7%; p = 0.02) and three-vessel disease (38.8% vs. 50.4%; p = 0.015). The ad hoc group was exposed to significantly lower radiation doses, even after baseline characteristic adjustment between both groups. The ad hoc group was exposed to a total dose-area product of 119.7 ± 70.7 Gycm2, while the staged group, to 139.2 ± 75.3 Gycm2 (p < 0.001). Conclusion Ad hoc percutaneous coronary intervention reduced radiation exposure as compared with diagnostic and therapeutic procedures performed at two separate times. PMID:26351982

  17. Experimental characterization and mitigation of turbulence induced signal fades within an ad hoc FSO network.

    PubMed

    Perez, Joaquin; Zvanovec, Stanislav; Ghassemlooy, Zabih; Popoola, Wasiu O

    2014-02-10

    Optical beams propagating through the turbulent atmospheric channel suffer from both the attenuation and phase distortion. Since future wireless networks are envisaged to be deployed in the ad hoc mesh topology, this paper presents the experimental laboratory characterization of mitigation of turbulence induced signal fades for two ad hoc scenarios. Results from measurements of the thermal structure constant along the propagation channels, changes of the coherence lengths for different turbulence regimes and the eye diagrams for partially correlated turbulences in free space optical channels are discussed. Based on these results future deployment of optical ad hoc networks can be more straightforwardly planned.

  18. A Group Based Key Sharing and Management Algorithm for Vehicular Ad Hoc Networks

    PubMed Central

    Moharram, Mohammed Morsi; Azam, Farzana

    2014-01-01

    Vehicular ad hoc networks (VANETs) are one special type of ad hoc networks that involves vehicles on roads. Typically like ad hoc networks, broadcast approach is used for data dissemination. Blind broadcast to each and every node results in exchange of useless and irrelevant messages and hence creates an overhead. Unicasting is not preferred in ad-hoc networks due to the dynamic topology and the resource requirements as compared to broadcasting. Simple broadcasting techniques create several problems on privacy, disturbance, and resource utilization. In this paper, we propose media mixing algorithm to decide what information should be provided to each user and how to provide such information. Results obtained through simulation show that fewer number of keys are needed to share compared to simple broadcasting. Privacy is also enhanced through this approach. PMID:24587749

  19. A group based key sharing and management algorithm for vehicular ad hoc networks.

    PubMed

    Khan, Zeeshan Shafi; Moharram, Mohammed Morsi; Alaraj, Abdullah; Azam, Farzana

    2014-01-01

    Vehicular ad hoc networks (VANETs) are one special type of ad hoc networks that involves vehicles on roads. Typically like ad hoc networks, broadcast approach is used for data dissemination. Blind broadcast to each and every node results in exchange of useless and irrelevant messages and hence creates an overhead. Unicasting is not preferred in ad-hoc networks due to the dynamic topology and the resource requirements as compared to broadcasting. Simple broadcasting techniques create several problems on privacy, disturbance, and resource utilization. In this paper, we propose media mixing algorithm to decide what information should be provided to each user and how to provide such information. Results obtained through simulation show that fewer number of keys are needed to share compared to simple broadcasting. Privacy is also enhanced through this approach.

  20. Design of multilevel heterogeneous ad-hoc wireless networks with UAVs

    NASA Astrophysics Data System (ADS)

    Gu, Daniel L.; Gerla, Mario; Ly, Henry; Xu, Kaixin; Kong, Jiejun; Hong, Xiaoyan

    2001-10-01

    Multi-Layer Ad Hoc Wireless Networks with UAVs is an ideal infrastructure to establish a rapidly deployable wireless communication system any time any where in the world for military applications. In this paper, we review the research we have done so far for our heterogeneous solution. First of all, we proposed the infrastructure of Multi-level Heterogeneous Ad-Hoc Wireless Network with UAVs. Second, we developed a new MAC layer protocol, Centralized Intelligent Channel Assigned Multiple Access (C-ICAMA), for ground mobile backbone nodes to access UAV. Third, we extended HSR (Hierarchical State Routing) to this Multi-Level Heterogeneous Ad-Hoc Wireless Network. Due to the intrinsic limitations of Extended HSR, we extended the Landmark Ad Hoc Routing (LANMAR) as our forth step. Security is a critical issue for mobile ad-hoc wireless networks, especially for military applications. We developed an embedded distributed security protocol and integrated with this heterogeneous hierarchical ad hoc wireless networks in our fifth step. Therefore, the hierarchical multi-layer approach is the most desirable approach to achieve routing scalability in multi-hop wireless networks.

  1. Group Task Force on Satellite Rescue and Repair

    NASA Astrophysics Data System (ADS)

    1992-09-01

    The Group Task Force was chartered by the Administrator of NASA to recommend 'a policy outlining the criteria, the design standards, and the pricing model to guide NASA in assessing the responsibilities for government and nongovernment Satellite Rescue and Repair Missions.' Criteria for accepting such missions, risks, and benefits to all sectors of our economy involved in satellite services, adequacy of planning and training, and the impact on NASA's primary mission were reviewed. The Group began by asking a more fundamental question; is satellite rescue and repair a logical element of NASA's mission? Factors considered were: (1) the probability of rescue or repair opportunities arising; (2) the economic justification for such attempts; (3) the benefits to NASA, both from such ad hoc learning experiences in space operations and the impact on the public perception of NASA; (4) the effect of such unanticipated missions on NASA's scheduled activities; (5) any potential effect on NASA's technical capability to work in space; and (6) any potential effect on U.S. economic competitiveness.

  2. Group Task Force on Satellite Rescue and Repair

    NASA Technical Reports Server (NTRS)

    1992-01-01

    The Group Task Force was chartered by the Administrator of NASA to recommend 'a policy outlining the criteria, the design standards, and the pricing model to guide NASA in assessing the responsibilities for government and nongovernment Satellite Rescue and Repair Missions.' Criteria for accepting such missions, risks, and benefits to all sectors of our economy involved in satellite services, adequacy of planning and training, and the impact on NASA's primary mission were reviewed. The Group began by asking a more fundamental question; is satellite rescue and repair a logical element of NASA's mission? Factors considered were: (1) the probability of rescue or repair opportunities arising; (2) the economic justification for such attempts; (3) the benefits to NASA, both from such ad hoc learning experiences in space operations and the impact on the public perception of NASA; (4) the effect of such unanticipated missions on NASA's scheduled activities; (5) any potential effect on NASA's technical capability to work in space; and (6) any potential effect on U.S. economic competitiveness.

  3. Sketching Awareness: A Participatory Study to Elicit Designs for Supporting Ad Hoc Emergency Medical Teamwork

    PubMed Central

    Kusunoki, Diana; Sarcevic, Aleksandra; Zhang, Zhan; Yala, Maria

    2014-01-01

    Prior CSCW research on awareness in clinical settings has mostly focused on higher-level team coordination spanning across longer-term trajectories at the department and inter-department levels. In this paper, we offer a perspective on what awareness means within the context of an ad hoc, time- and safety-critical medical setting by looking at teams treating severely ill patients with urgent needs. We report findings from four participatory design workshops conducted with emergency medicine clinicians at two regional emergency departments. Workshops were developed to elicit design ideas for information displays that support awareness in emergency medical situations. Through analysis of discussions and clinicians’ sketches of information displays, we identified five features of teamwork that can be used as a foundation for supporting awareness from the perspective of clinicians. Based on these findings, we contribute rich descriptions of four facets of awareness that teams manage during emergency medical situations: team member awareness, elapsed time awareness, teamwork-oriented and patient-driven task awareness, and overall progress awareness. We then discuss these four awareness types in relation to awareness facets found in the CSCW literature. PMID:25870498

  4. Ad Hoc Query Support For Very Large Simulation Mesh Data: The Metadata Approach

    SciTech Connect

    Lee, B; Snapp, R; Musick, R; Critchlow, T

    2001-12-17

    We present our approach to enabling approximate ad hoc queries on terabyte-scale mesh data generated from large scientific simulations through the extension and integration of database, statistical, and data mining techniques. There are several significant barriers to overcome in achieving this objective. First, large-scale simulation data is already at the multi-terabyte scale and growing quickly, thus rendering traditional forms of interactive data exploration and query processing untenable. Second, a priori knowledge of user queries is not available, making it impossible to tune special-purpose solutions. Third, the data has spatial and temporal aspects, as well as arbitrarily high dimensionality, which exacerbates the task of finding compact, accurate, and easy-to-compute data models. Our approach is to preprocess the mesh data to generate highly compressed, lossy models that are used in lieu of the original data to answer users' queries. This approach leads to interesting challenges. The model (equivalently, the content-oriented metadata) being generated must be smaller than the original data by at least an order of magnitude. Second, the metadata representation must contain enough information to support a broad class of queries. Finally, the accuracy and speed of the queries must be within the tolerances required by users. In this paper we give an overview of ongoing development efforts with an emphasis on extracting metadata and using it in query processing.

  5. A communication theoretical analysis of FRET-based mobile ad hoc molecular nanonetworks.

    PubMed

    Kuscu, Murat; Akan, Ozgur B

    2014-09-01

    Nanonetworks refer to a group of nanosized machines with very basic operational capabilities communicating to each other in order to accomplish more complex tasks such as in-body drug delivery, or chemical defense. Realizing reliable and high-rate communication between these nanomachines is a fundamental problem for the practicality of these nanonetworks. Recently, we have proposed a molecular communication method based on Förster Resonance Energy Transfer (FRET) which is a nonradiative excited state energy transfer phenomenon observed among fluorescent molecules, i.e., fluorophores. We have modeled the FRET-based communication channel considering the fluorophores as single-molecular immobile nanomachines, and shown its reliability at high rates, and practicality at the current stage of nanotechnology. In this study, for the first time in the literature, we investigate the network of mobile nanomachines communicating through FRET. We introduce two novel mobile molecular nanonetworks: FRET-based mobile molecular sensor/actor nanonetwork (FRET-MSAN) which is a distributed system of mobile fluorophores acting as sensor or actor node; and FRET-based mobile ad hoc molecular nanonetwork (FRET-MAMNET) which consists of fluorophore-based nanotransmitter, nanoreceivers and nanorelays. We model the single message propagation based on birth-death processes with continuous time Markov chains. We evaluate the performance of FRET-MSAN and FRET-MAMNET in terms of successful transmission probability and mean extinction time of the messages, system throughput, channel capacity and achievable communication rates.

  6. AAPM/SNMMI Joint Task Force: report on the current state of nuclear medicine physics training.

    PubMed

    Harkness, Beth A; Allison, Jerry D; Clements, Jessica B; Coffey, Charles W; Fahey, Frederic H; Gress, Dustin A; Kinahan, Paul E; Nickoloff, Edward L; Mawlawi, Osama R; MacDougall, Robert D; Pizzutiello, Robert J

    2015-09-08

    The American Association of Physicists in Medicine (AAPM) and the Society of Nuclear Medicine and Molecular Imaging (SNMMI) recognized the need for a review of the current state of nuclear  medicine physics training and the need to explore pathways for improving nuclear medicine physics training opportunities. For these reasons, the two organizations formed a joint AAPM/SNMMI Ad Hoc Task Force on Nuclear Medicine Physics  Training. The mission of this task force was to assemble a representative group of stakeholders to:• Estimate the demand for board-certified nuclear medicine physicists in the next 5-10 years,• Identify the critical issues related to supplying an adequate number of physicists who have received the appropriate level of training in nuclear medicine physics, and• Identify approaches that may be considered to facilitate the training of nuclear medicine physicists.As a result, a task force was appointed and chaired by an active member of both organizations that included representation from the AAPM, SNMMI, the American Board of Radiology (ABR), the American Board of Science in Nuclear Medicine (ABSNM), and the Commission for the Accreditation of Medical Physics Educational Programs (CAMPEP). The Task Force first met at the AAPM Annual Meeting in Charlotte in July 2012 and has met regularly face-to-face, online, and by conference calls. This manuscript reports the findings of the Task Force, as well as recommendations to achieve the stated mission.

  7. Adaptive Control Parameters for Dispersal of Multi-Agent Mobile Ad Hoc Network (MANET) Swarms

    SciTech Connect

    Kurt Derr; Milos Manic

    2013-11-01

    A mobile ad hoc network is a collection of independent nodes that communicate wirelessly with one another. This paper investigates nodes that are swarm robots with communications and sensing capabilities. Each robot in the swarm may operate in a distributed and decentralized manner to achieve some goal. This paper presents a novel approach to dynamically adapting control parameters to achieve mesh configuration stability. The presented approach to robot interaction is based on spring force laws (attraction and repulsion laws) to create near-optimal mesh like configurations. In prior work, we presented the extended virtual spring mesh (EVSM) algorithm for the dispersion of robot swarms. This paper extends the EVSM framework by providing the first known study on the effects of adaptive versus static control parameters on robot swarm stability. The EVSM algorithm provides the following novelties: 1) improved performance with adaptive control parameters and 2) accelerated convergence with high formation effectiveness. Simulation results show that 120 robots reach convergence using adaptive control parameters more than twice as fast as with static control parameters in a multiple obstacle environment.

  8. Hybrid Packet-Pheromone-Based Probabilistic Routing for Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Kashkouli Nejad, Keyvan; Shawish, Ahmed; Jiang, Xiaohong; Horiguchi, Susumu

    Ad-Hoc networks are collections of mobile nodes communicating using wireless media without any fixed infrastructure. Minimal configuration and quick deployment make Ad-Hoc networks suitable for emergency situations like natural disasters or military conflicts. The current Ad-Hoc networks can only support either high mobility or high transmission rate at a time because they employ static approaches in their routing schemes. However, due to the continuous expansion of the Ad-Hoc network size, node-mobility and transmission rate, the development of new adaptive and dynamic routing schemes has become crucial. In this paper we propose a new routing scheme to support high transmission rates and high node-mobility simultaneously in a big Ad-Hoc network, by combining a new proposed packet-pheromone-based approach with the Hint Based Probabilistic Protocol (HBPP) for congestion avoidance with dynamic path selection in packet forwarding process. Because of using the available feedback information, the proposed algorithm does not introduce any additional overhead. The extensive simulation-based analysis conducted in this paper indicates that the proposed algorithm offers small packet-latency and achieves a significantly higher delivery probability in comparison with the available Hint-Based Probabilistic Protocol (HBPP).

  9. The effects of malicious nodes on performance of mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Li, Fanzhi; Shi, Xiyu; Jassim, Sabah; Adams, Christopher

    2006-05-01

    Wireless ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to security attacks. Unlike their wired counterpart, infrastructureless ad hoc networks do not have a clear line of defense, their topology is dynamically changing, and every mobile node can receive messages from its neighbors and can be contacted by all other nodes in its neighborhood. This poses a great danger to network security if some nodes behave in a malicious manner. The immediate concern about the security in this type of networks is how to protect the network and the individual mobile nodes against malicious act of rogue nodes from within the network. This paper is concerned with security aspects of wireless ad hoc networks. We shall present results of simulation experiments on ad hoc network's performance in the presence of malicious nodes. We shall investigate two types of attacks and the consequences will be simulated and quantified in terms of loss of packets and other factors. The results show that network performance, in terms of successful packet delivery ratios, significantly deteriorates when malicious nodes act according to the defined misbehaving characteristics.

  10. American Indian Task Force Report.

    ERIC Educational Resources Information Center

    Mackey, John E., Ed.

    Assuming that the client is central to any service program, the American Indian Task Force examined a national sample of "grass roots" social service organizations and/or individuals and schools of social work to determine the capability of providing relevant social work education to American Indians. Accordingly, the highest priorities…

  11. A Decentralized VPN Service over Generalized Mobile Ad-Hoc Networks

    NASA Astrophysics Data System (ADS)

    Fujita, Sho; Shima, Keiichi; Uo, Yojiro; Esaki, Hiroshi

    We present a decentralized VPN service that can be built over generalized mobile ad-hoc networks (Generalized MANETs), in which topologies can be represented as a time-varying directed multigraph. We address wireless ad-hoc networks and overlay ad-hoc networks as instances of Generalized MANETs. We first propose an architecture to operate on various kinds of networks through a single set of operations. Then, we design and implement a decentralized VPN service on the proposed architecture. Through the development and operation of a prototype system we implemented, we found that the proposed architecture makes the VPN service applicable to each instance of Generalized MANETs, and that the VPN service makes it possible for unmodified applications to operate on the networks.

  12. Fuzzy Multiple Metrics Link Assessment for Routing in Mobile Ad-Hoc Network

    NASA Astrophysics Data System (ADS)

    Soo, Ai Luang; Tan, Chong Eng; Tay, Kai Meng

    2011-06-01

    In this work, we investigate on the use of Sugeno fuzzy inference system (FIS) in route selection for mobile Ad-Hoc networks (MANETs). Sugeno FIS is introduced into Ad-Hoc On Demand Multipath Distance Vector (AOMDV) routing protocol, which is derived from its predecessor, Ad-Hoc On Demand Distance Vector (AODV). Instead of using the conventional way that considering only a single metric to choose the best route, our proposed fuzzy decision making model considers up to three metrics. In the model, the crisp inputs of the three parameters are fed into an FIS and being processed in stages, i.e., fuzzification, inference, and defuzzification. Finally, after experiencing all the stages, a single value score is generated from the combination metrics, which will be used to measure all the discovered routes credibility. Results obtained from simulations show a promising improvement as compared to AOMDV and AODV.

  13. Mobile agent and multilayer integrated distributed intrusion detection model for clustering ad hoc networks

    NASA Astrophysics Data System (ADS)

    Feng, Jianxin; Wang, Guangxing

    2004-04-01

    Ad hoc networks do not depend on any predefined infrastructure or centralized administration to operate. Their security characters require more complex security preventions. As the second line of defense, Intrusion detection is the necessary means of getting the high survivability. In this paper the security characters of ad hoc networks and the related contents of intrusion detection are discussed. Mobile Agent and Multi-layer Integrated Distributed Intrusion Detection Model (MAMIDIDM) and a heuristic global detection algorithm are proposed tentatively by combining the mobile agent technology with the multi-layer conception. This heuristic global detection algorithm combines the mobile agent detection engine with the multi-layer detection engines and analyzes the results obtained by the corresponding detection engines. MAMIDIDM has the better flexibility and extensibility, can execute the intrusion detection in clustering ad hoc networks effectively.

  14. Forward Interference Avoidance in Ad Hoc Communications Using Adaptive Array Antennas

    NASA Astrophysics Data System (ADS)

    Sakaguchi, Tomofumi; Kamiya, Yukihiro; Fujii, Takeo; Suzuki, Yasuo

    Wireless ad hoc communications such as ad hoc networks have been attracting researchers' attention. They are expected to become a key technology for “ubiquitous” networking because of the ability to configure wireless links by nodes autonomously, without any centralized control facilities. Adaptive array antennas (AAA) have been expected to improve the network efficiency by taking advantage of its adaptive beamforming capability. However, it should be noted that AAA is not almighty. Its interference cancellation capability is limited by the degree-of-freedom (DOF) and the angular resolution as a function of the number of element antennas. Application of AAA without attending to these problems can degrade the efficiency of the network. Let us consider wireless ad hoc communication as a target application for AAA, taking advantage of AAA's interference cancellation capability. The low DOF and insufficient resolution will be crucial problems compared to other wireless systems, since there is no centralized facility to control the nodes to avoid interferences in such systems. A number of interferences might impinge on a node from any direction of arrival (DOA) without any timing control. In this paper, focusing on such limitations of AAA applied in ad hoc communications, we propose a new scheme, Forward Interference Avoidance (FIA), using AAA for ad hoc communications in order to avoid problems caused by the limitation of the AAA capability. It enables nodes to avoid interfering with other nodes so that it increases the number of co-existent wireless links. The performance improvement of ad hoc communications in terms of the number of co-existent links is investigated through computer simulations.

  15. Multicasting in Wireless Communications (Ad-Hoc Networks): Comparison against a Tree-Based Approach

    NASA Astrophysics Data System (ADS)

    Rizos, G. E.; Vasiliadis, D. C.

    2007-12-01

    We examine on-demand multicasting in ad hoc networks. The Core Assisted Mesh Protocol (CAMP) is a well-known protocol for multicast routing in ad-hoc networks, generalizing the notion of core-based trees employed for internet multicasting into multicast meshes that have much richer connectivity than trees. On the other hand, wireless tree-based multicast routing protocols use much simpler structures for determining route paths, using only parent-child relationships. In this work, we compare the performance of the CAMP protocol against the performance of wireless tree-based multicast routing protocols, in terms of two important factors, namely packet delay and ratio of dropped packets.

  16. Reliable on-demand multicast routing with congestion control in wireless ad hoc networks

    NASA Astrophysics Data System (ADS)

    Tang, Ken; Gerla, Mario

    2001-07-01

    In this paper, we address the congestion control multicast routing problem in wireless ad hoc networks through the medium access control (MAC) layer. We first introduce the Broadcast Medium Window (BMW) MAC protocol, which provides reliable delivery to broadcast packets at the MAC layer. We then extend the wireless On-Demand Multicast Routing Protocol (ODMRP) to facilitate congestion control in ad hoc networks using BMW. Through simulation, we show that ODMRP with congestion control adapts well to multicast sources that are aggressive in data transmissions.

  17. Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Alicherry, Mansoor; Keromytis, Angelos D.; Stavrou, Angelos

    Mobile Ad-hoc Networks (MANETs) are increasingly employed in tactical military and civil rapid-deployment networks, including emergency rescue operations and ad hoc disaster-relief networks. However, this flexibility of MANETs comes at a price, when compared to wired and base station-based wireless networks: MANETs are susceptible to both insider and outsider attacks. This is mainly because of the lack of a well-defined defense perimeter preventing the effective use of wired defenses including firewalls and intrusion detection systems.

  18. Fuel oil quality task force

    SciTech Connect

    Laisy, J.; Turk, V.

    1997-09-01

    In April, 1996, the R.W. Beckett Corporation became aware of a series of apparently unrelated symptoms that made the leadership of the company concerned that there could be a fuel oil quality problem. A task force of company employees and industry consultants was convened to address the topic of current No. 2 heating oil quality and its effect on burner performance. The task force studied changes in fuel oil specifications and trends in properties that have occurred over the past few years. Experiments were performed at Beckett and Brookhaven National Laboratory to understand the effect of changes in some fuel oil properties. Studies by other groups were reviewed, and field installations were inspected to gain information about the performance of fuel oil that is currently being used in the U.S. and Canada. There was a special concern about the use of red dye in heating oils and the impact of sulfur levels due to the October, 1993 requirement of low sulfur (<0.05%) for on-highway diesel fuel. The results of the task force`s efforts were published in July, 1996. The primary conclusion of the task force was that there is not a crisis or widespread general problem with fuel oil quality. Localized problems that were seen may have been related to refinery practices and/or non-traditional fuel sources. System cleanliness is very important and the cause of many oil burner system problems. Finally, heating oil quality should get ongoing careful attention by Beckett engineering personnel and heating oil industry groups.

  19. Report of ad hoc OTEC cold water pipe committee

    SciTech Connect

    Barr, R.; Giannotti, J.; Deuchler, W.; Scotti, R.; Stadter, J.; Walsh, J. P.; Weiss, R.

    1980-02-01

    Now that the design work on the pilot plant is scheduled to start in the near future, DOE has considered it essential that an overall look be taken at the cold water pipe design process. The VSE Corporation, in its role as a support contractor to DOE, was tasked to organize a small study group to answer the question, Where do we stand on the verification of the computer models of the cold water pipe response by experimental measurements. The committee has studied all the available results of the cold water pipe development program. This report summarizes those results. The development and present capabilities of the computer programs used to calculate the response of a cold water pipe attached to a platform under known at-sea conditions are discussed. The various cold water pipe designs that have been done using the computer programs are summarized. The experiments that have been conducted up to the present time to measure the response of cold water pipes at-sea and in experimental tanks are described. The results of these experiments are presented. The experimental results are compared with the predictions made with the analytical computer programs. Conclusions drawn as a result of this analysis are presented and some recommendations are made. (WHK)

  20. Report of the Ad Hoc Committee on Religious and Cultural Celebrations in the Library.

    ERIC Educational Resources Information Center

    Rathemacher, Andree; Grubman, Sheila Black; Lahiri, Amar; Gilton, Donna; Sharif, Mohammed

    The charge of the University of Rhode Island's Ad Hoc Committee on Religious and Cultural Celebrations in the Library was to: investigate all opportunities for the library to educate the campus community about religious and cultural holidays; consider all the major religions of the world and the possibility of having displays for the symbols of…

  1. Data Security in Ad Hoc Networks Using Randomization of Cryptographic Algorithms

    NASA Astrophysics Data System (ADS)

    Krishna, B. Ananda; Radha, S.; Keshava Reddy, K. Chenna

    Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The military tactical and other security-sensitive operations are still the main applications of ad hoc networks, although there is a trend to adopt ad hoc networks for commercial uses due to their unique properties. One main challenge in design of these networks is how to feasibly detect and defend the major attacks against data, impersonation and unauthorized data modification. Also, in the same network some nodes may be malicious whose objective is to degrade the network performance. In this study, we propose a security model in which the packets are encrypted and decrypted using multiple algorithms where the selection scheme is random. The performance of the proposed model is analyzed and it is observed that there is no increase in control overhead but a slight delay is introduced due to the encryption process. We conclude that the proposed security model works well for heavily loaded networks with high mobility and can be extended for more cryptographic algorithms.

  2. 80 FR 27688 - Make-Up Meetings of the Community Preventive Services Task Force (Task Force)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2015-05-14

    ... of systematic reviews on existing research, and issues recommendations. Task Force recommendations... jurisdictions and constituents. The Task Force's recommendations, along with the systematic reviews of the... Force to consider the findings of systematic reviews and issue findings and recommendations. Task...

  3. General Aviation Task Force report

    NASA Technical Reports Server (NTRS)

    1993-01-01

    General aviation is officially defined as all aviation except scheduled airlines and the military. It is the only air transportation to many communities throughout the world. In order to reverse the recent decline in general aviation aircraft produced in the United States, the Task Force recommends that NASA provide the expertise and facilities such as wind tunnels and computer codes for aircraft design. General aviation manufacturers are receptive to NASA's innovations and technological leadership and are expected to be effective users of NASA-generated technologies.

  4. U.S. Preventive Services Task Force

    MedlinePlus

    ... USPSTF Our Members Conflict of Interest Disclosures Task Force 101 Resources Our Partners Reports to Congress Contact ... effort to make the U.S. Preventive Services Task Force (USPSTF) recommendations clearer and its processes more transparent, ...

  5. Ad Hoc Supervision of General Practice Registrars as a "Community of Practice": Analysis, Interpretation and Re-Presentation

    ERIC Educational Resources Information Center

    Clement, T.; Brown, J.; Morrison, J.; Nestel, D.

    2016-01-01

    General practice registrars in Australia undertake most of their vocational training in accredited general practices. They typically see patients alone from the start of their community-based training and are expected to seek timely ad hoc support from their supervisor. Such ad hoc encounters are a mechanism for ensuring patient safety, but also…

  6. Protocols for Detection and Removal of Wormholes for Secure Routing and Neighborhood Creation in Wireless Ad Hoc Networks

    ERIC Educational Resources Information Center

    Hayajneh, Thaier Saleh

    2009-01-01

    Wireless ad hoc networks are suitable and sometimes the only solution for several applications. Many applications, particularly those in military and critical civilian domains (such as battlefield surveillance and emergency rescue) require that ad hoc networks be secure and stable. In fact, security is one of the main barriers to the extensive use…

  7. On using multiple routing metrics with destination sequenced distance vector protocol for MultiHop wireless ad hoc networks

    NASA Astrophysics Data System (ADS)

    Mehic, M.; Fazio, P.; Voznak, M.; Partila, P.; Komosny, D.; Tovarek, J.; Chmelikova, Z.

    2016-05-01

    A mobile ad hoc network is a collection of mobile nodes which communicate without a fixed backbone or centralized infrastructure. Due to the frequent mobility of nodes, routes connecting two distant nodes may change. Therefore, it is not possible to establish a priori fixed paths for message delivery through the network. Because of its importance, routing is the most studied problem in mobile ad hoc networks. In addition, if the Quality of Service (QoS) is demanded, one must guarantee the QoS not only over a single hop but over an entire wireless multi-hop path which may not be a trivial task. In turns, this requires the propagation of QoS information within the network. The key to the support of QoS reporting is QoS routing, which provides path QoS information at each source. To support QoS for real-time traffic one needs to know not only minimum delay on the path to the destination but also the bandwidth available on it. Therefore, throughput, end-to-end delay, and routing overhead are traditional performance metrics used to evaluate the performance of routing protocol. To obtain additional information about the link, most of quality-link metrics are based on calculation of the lost probabilities of links by broadcasting probe packets. In this paper, we address the problem of including multiple routing metrics in existing routing packets that are broadcasted through the network. We evaluate the efficiency of such approach with modified version of DSDV routing protocols in ns-3 simulator.

  8. Adhoc: an R package to calculate ad hoc distance thresholds for DNA barcoding identification.

    PubMed

    Sonet, Gontran; Jordaens, Kurt; Nagy, Zoltán T; Breman, Floris C; De Meyer, Marc; Backeljau, Thierry; Virgilio, Massimiliano

    2013-12-30

    Identification by DNA barcoding is more likely to be erroneous when it is based on a large distance between the query (the barcode sequence of the specimen to identify) and its best match in a reference barcode library. The number of such false positive identifications can be decreased by setting a distance threshold above which identification has to be rejected. To this end, we proposed recently to use an ad hoc distance threshold producing identifications with an estimated relative error probability that can be fixed by the user (e.g. 5%). Here we introduce two R functions that automate the calculation of ad hoc distance thresholds for reference libraries of DNA barcodes. The scripts of both functions, a user manual and an example file are available on the JEMU website (http://jemu.myspecies.info/computer-programs) as well as on the comprehensive R archive network (CRAN, http://cran.r-project.org).

  9. The Ad Hoc process to strengthen the framework convention on climate change

    SciTech Connect

    Ramakrishna, K.; Deutz, A.M.; Jacobsen, L.A.

    1995-11-01

    The Woods Hole Research Center convened an International Conference on The Ad Hoc Process to Strengthen the Framework Convention on Climate Change in Woods Hole, MA, on October 7-9, 1995. The conference was conducted to examine the prospects for successful adoption of a protocol to the Framework Convention on Climate Change by 1997. In preparation for the Second session of the Ad Hoc Group on the Berlin Mandate, several governmental and nongovernmental representatives met in Woods Hole to discuss the process and possible outcome of the Berlin Mandate negotiations for a protocol or other legal instrument to strengthen the Convention. The conference was by invitation and all participants attended in their personal capacities.

  10. A lightweight secure routing algorithm for ad hoc networks with free-space optics

    NASA Astrophysics Data System (ADS)

    Xu, Zhong; Dai, Guanzhong; Zhang, Guoqing; Liu, Xue; Yang, Deming

    2007-11-01

    Nowadays, there are some works with free-space laser communication system, but security issues of this network are always neglected. We present an efficient online/offline routing based on identity-based signature for ad hoc networks with Free-Space-Optics (FSO). The protocol is especially suitable for ad hoc networks with FSO because the major computational overhead is shifted to the offline phase, whereas the online phase requires only a very low computational overhead to achieve a full scale of authentication. In addition, since the signature scheme uses an identity-based cryptosystem, it does not need to maintain a public key directory and to exchange any certificate. The effectiveness of our protocol is simulated using QualNet tools.

  11. Information Fusion in Ad hoc Wireless Sensor Networks for Aircraft Health Monitoring

    NASA Astrophysics Data System (ADS)

    Fragoulis, Nikos; Tsagaris, Vassilis; Anastassopoulos, Vassilis

    In this paper the use of an ad hoc wireless sensor network for implementing a structural health monitoring system is discussed. The network is consisted of sensors deployed throughout the aircraft. These sensors being in the form of a microelectronic chip and consisted of sensing, data processing and communicating components could be easily embedded in any mechanical aircraft component. The established sensor network, due to its ad hoc nature is easily scalable, allowing adding or removing any number of sensors. The position of the sensor nodes need not necessarily to be engineered or predetermined, giving this way the ability to be deployed in inaccessible points. Information collected from various sensors of different modalities throughout the aircraft is then fused in order to provide a more comprehensive image of the aircraft structural health. Sensor level fusion along with decision quality information is used, in order to enhance detection performance.

  12. An Optimal CDS Construction Algorithm with Activity Scheduling in Ad Hoc Networks.

    PubMed

    Penumalli, Chakradhar; Palanichamy, Yogesh

    2015-01-01

    A new energy efficient optimal Connected Dominating Set (CDS) algorithm with activity scheduling for mobile ad hoc networks (MANETs) is proposed. This algorithm achieves energy efficiency by minimizing the Broadcast Storm Problem [BSP] and at the same time considering the node's remaining energy. The Connected Dominating Set is widely used as a virtual backbone or spine in mobile ad hoc networks [MANETs] or Wireless Sensor Networks [WSN]. The CDS of a graph representing a network has a significant impact on an efficient design of routing protocol in wireless networks. Here the CDS is a distributed algorithm with activity scheduling based on unit disk graph [UDG]. The node's mobility and residual energy (RE) are considered as parameters in the construction of stable optimal energy efficient CDS. The performance is evaluated at various node densities, various transmission ranges, and mobility rates. The theoretical analysis and simulation results of this algorithm are also presented which yield better results.

  13. Forming an ad-hoc nearby storage, based on IKAROS and social networking services

    NASA Astrophysics Data System (ADS)

    Filippidis, Christos; Cotronis, Yiannis; Markou, Christos

    2014-06-01

    We present an ad-hoc "nearby" storage, based on IKAROS and social networking services, such as Facebook. By design, IKAROS is capable to increase or decrease the number of nodes of the I/O system instance on the fly, without bringing everything down or losing data. IKAROS is capable to decide the file partition distribution schema, by taking on account requests from the user or an application, as well as a domain or a Virtual Organization policy. In this way, it is possible to form multiple instances of smaller capacity higher bandwidth storage utilities capable to respond in an ad-hoc manner. This approach, focusing on flexibility, can scale both up and down and so can provide more cost effective infrastructures for both large scale and smaller size systems. A set of experiments is performed comparing IKAROS with PVFS2 by using multiple clients requests under HPC IOR benchmark and MPICH2.

  14. Artificial neural networks for closed loop control of in silico and ad hoc type 1 diabetes.

    PubMed

    Fernandez de Canete, J; Gonzalez-Perez, S; Ramos-Diaz, J C

    2012-04-01

    The closed loop control of blood glucose levels might help to reduce many short- and long-term complications of type 1 diabetes. Continuous glucose monitoring and insulin pump systems have facilitated the development of the artificial pancreas. In this paper, artificial neural networks are used for both the identification of patient dynamics and the glycaemic regulation. A subcutaneous glucose measuring system together with a Lispro insulin subcutaneous pump were used to gather clinical data for each patient undergoing treatment, and a corresponding in silico and ad hoc neural network model was derived for each patient to represent their particular glucose-insulin relationship. Based on this nonlinear neural network model, an ad hoc neural network controller was designed to close the feedback loop for glycaemic regulation of the in silico patient. Both the neural network model and the controller were tested for each patient under simulation, and the results obtained show a good performance during food intake and variable exercise conditions.

  15. Enhancements for distributed certificate authority approaches for mobile wireless ad hoc networks.

    SciTech Connect

    Van Leeuwen, Brian P.; Michalski, John T.; Anderson, William Erik

    2003-12-01

    Mobile wireless ad hoc networks that are resistant to adversarial manipulation are necessary for distributed systems used in military and security applications. Critical to the successful operation of these networks, which operate in the presence of adversarial stressors, are robust and efficient information assurance methods. In this report we describe necessary enhancements for a distributed certificate authority (CA) used in secure wireless network architectures. Necessary cryptographic algorithms used in distributed CAs are described and implementation enhancements of these algorithms in mobile wireless ad hoc networks are developed. The enhancements support a network's ability to detect compromised nodes and facilitate distributed CA services. We provide insights to the impacts the enhancements will have on network performance with timing diagrams and preliminary network simulation studies.

  16. Vehicular ad hoc network for a surveillance system using multifrequency band enhancement

    NASA Astrophysics Data System (ADS)

    Bunruangses, Montree; Sunat, Khamron; Mitatha, Somsak; Yupapin, Preecha P.

    2010-09-01

    We present a new design of a surveillance system via a vehicular ad hoc network (VANET) integrated by a 3-G or 4-G cellular wireless network. We propose dense wavelength division multiplexing wavelength enhancement for increasing the channel capacity and signal security. Increase in the number of channels can be obtained by increasing the wavelength density. Signal security is introduced by a specific wavelength filter controlled by the central operator. Optical communication wavelength enhancement is reviewed. The advantage of this proposed system is that it can easily be implemented and incorporated into the existing communication link in either a cellular or ad hoc wireless system, where signal security and hence privacy can be provided.

  17. A Face Centered Cubic Key Agreement Mechanism for Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Askoxylakis, Ioannis G.; Markantonakis, Konstantinos; Tryfonas, Theo; May, John; Traganitis, Apostolos

    Mobile ad hoc networking is an operating mode for rapid mobile node networking. Each node relies on adjacent nodes in order to achieve and maintain connectivity and functionality. Security is considered among the main issues for the successful deployment of mobile ad hoc networks (MANETs). In this paper we introduce a weak to strong authentication mechanism associated with a multiparty contributory key establishment method. The latter is designed for MANETs with dynamic changing topologies, due to continuous flow of incoming and departing nodes. We introduce a new cube algorithm based on the face-centered cubic (FCC) structure. The proposed architecture employs elliptic curve cryptography, which is considered more efficient for thin clients where processing power and energy consumption are significant constraints.

  18. PNNI routing support for ad hoc mobile networking: The multilevel case

    SciTech Connect

    Martinez, L.; Sholander, P.; Tolendino, L.

    1998-01-01

    This contribution extends the Outside Nodal Hierarchy List (ONHL) procedures described in ATM Forum Contributions 97-0766 and 97-0933. These extensions allow multiple mobile networks to form either an ad hoc network or an extension of a fixed PNNI infrastructure. A previous contribution (97-1073) covered the simplest case where the top-most Logical Group Nodes (LGNs), in those mobile networks, all resided at the same level in a PNNI hierarchy. This contribution covers the more general case wherein those top-most LGNs may reside at different PNNI hierarchy levels. Both of the SNL contributions consider flat ad hoc network architectures in the sense that each mobile network always participates in the PNNI hierarchy at the pre-configured level of its top-most LGN.

  19. PNNI routing support for ad hoc mobile networking: A flat architecture

    SciTech Connect

    Martinez, L.; Sholander, P.; Tolendino, L.

    1997-12-01

    This contribution extends the Outside Nodal Hierarchy List (ONHL) procedures described in ATM Form Contribution 97-0766. These extensions allow multiple mobile networks to form either an ad hoc network or an extension of a fixed PNNI infrastructure. This contribution covers the simplest case where the top-most Logical Group Nodes (LGNs), in those mobile networks, all reside at the same level in a PNNI hierarchy. Future contributions will cover the general case where those top-most LGNs reside at different hierarchy levels. This contribution considers a flat ad hoc network architecture--in the sense that each mobile network always participates in the PNNI hierarchy at the preconfigured level of its top-most LGN.

  20. Adhoc: an R package to calculate ad hoc distance thresholds for DNA barcoding identification

    PubMed Central

    Sonet, Gontran; Jordaens, Kurt; Nagy, Zoltán T.; Breman, Floris C.; De Meyer, Marc; Backeljau, Thierry; Virgilio, Massimiliano

    2013-01-01

    Abstract Identification by DNA barcoding is more likely to be erroneous when it is based on a large distance between the query (the barcode sequence of the specimen to identify) and its best match in a reference barcode library. The number of such false positive identifications can be decreased by setting a distance threshold above which identification has to be rejected. To this end, we proposed recently to use an ad hoc distance threshold producing identifications with an estimated relative error probability that can be fixed by the user (e.g. 5%). Here we introduce two R functions that automate the calculation of ad hoc distance thresholds for reference libraries of DNA barcodes. The scripts of both functions, a user manual and an example file are available on the JEMU website (http://jemu.myspecies.info/computer-programs) as well as on the comprehensive R archive network (CRAN, http://cran.r-project.org). PMID:24453565

  1. VoIP Implementation and Experiments on a Mobile Wireless AdHoc Network

    NASA Astrophysics Data System (ADS)

    Zhang, Hongqi; Yang, Oliver; Zhao, Jiying

    We have implemented a testbed to study the performance of VoIP in wireless ad hoc networks. The ASNC (Adaptive Source Network-rate Control) scheme is used to battle packet loss by feeding MOS (Mean Opinion Score) and loss information back to the sender. Our different VoIP experiments with measurements on delay, packet loss rate and MOS have validated the feasibility and efficiency of our scheme. It further verifies the simulator we used in the initial investigation.

  2. Unsupervised algorithms for intrusion detection and identification in wireless ad hoc sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2009-05-01

    In previous work by the author, parameters across network protocol layers were selected as features in supervised algorithms that detect and identify certain intrusion attacks on wireless ad hoc sensor networks (WSNs) carrying multisensor data. The algorithms improved the residual performance of the intrusion prevention measures provided by any dynamic key-management schemes and trust models implemented among network nodes. The approach of this paper does not train algorithms on the signature of known attack traffic, but, instead, the approach is based on unsupervised anomaly detection techniques that learn the signature of normal network traffic. Unsupervised learning does not require the data to be labeled or to be purely of one type, i.e., normal or attack traffic. The approach can be augmented to add any security attributes and quantified trust levels, established during data exchanges among nodes, to the set of cross-layer features from the WSN protocols. A two-stage framework is introduced for the security algorithms to overcome the problems of input size and resource constraints. The first stage is an unsupervised clustering algorithm which reduces the payload of network data packets to a tractable size. The second stage is a traditional anomaly detection algorithm based on a variation of support vector machines (SVMs), whose efficiency is improved by the availability of data in the packet payload. In the first stage, selected algorithms are adapted to WSN platforms to meet system requirements for simple parallel distributed computation, distributed storage and data robustness. A set of mobile software agents, acting like an ant colony in securing the WSN, are distributed at the nodes to implement the algorithms. The agents move among the layers involved in the network response to the intrusions at each active node and trustworthy neighborhood, collecting parametric values and executing assigned decision tasks. This minimizes the need to move large amounts

  3. Finger force perception during ipsilateral and contralateral force matching tasks

    PubMed Central

    Park, Woo-Hyung; Leonard, Charles T.; Li, Sheng

    2010-01-01

    The aims of the present study were to compare matching performance between ipsilateral and contralateral finger force matching tasks and to examine the effect of handedness on finger force perception. Eleven subjects were instructed to produce reference forces by an instructed finger (index – I or little – L finger) and to reproduce the same amount force by the same or a different finger within the hand (i.e., ipsilateral matching task), or by a finger of the other hand (i.e., contralateral matching task). The results of the ipsilateral and contralateral tasks in the present study commonly showed that 1) the reference and matching forces were matched closely when the two forces were produced by the same or homologous finger(s) such as I/I task; 2) the weaker little finger underestimated the magnitude of reference force of the index finger (I/L task), even with the higher level of effort (relative force), but the two forces were matched when considering total finger forces; 3) the stronger index finger closely matched the reference force of the little finger with the lower level of relative force (i.e., L/I task); 4) when considering the constant errors, I/L tasks showed an underestimation and L/I tasks showed an overestimation compared to I/I tasks. There was no handedness effect during ipsilateral tasks. During the contralateral task, the dominant hand overestimated the force of the non-dominant hand, while the non-dominant hand attempted to match the absolute force of the dominant hand. The overall results support the notion that the absolute, rather than relative, finger force is perceived and reproduced during ipsilateral and contralateral finger force matching tasks, indicating the uniqueness of finger force perception. PMID:18488212

  4. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks

    PubMed Central

    Vara, M. Isabel; Campo, Celeste

    2015-01-01

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead. PMID:26205272

  5. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks.

    PubMed

    Vara, M Isabel; Campo, Celeste

    2015-01-01

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead. PMID:26205272

  6. Strategies for generating multiple instances of common and ad hoc categories.

    PubMed

    Vallée-Tourangeau, F; Anthony, S H; Austin, N G

    1998-09-01

    In a free-emission procedure participants were asked to generate instances of a given category and to report, retrospectively, the strategies that they were aware of using in retrieving instances. In two studies reported here, participants generated instances for common categories (e.g. fruit) and for ad hoc categories (e.g., things people keep in their pockets) for 90 seconds and for each category described how they had proceeded in doing so. Analysis of the protocols identified three broad classes of strategy: (1) experiential, where memories of specific or generic personal experiences involving interactions with the category instances acted as cues; (2) semantic, where a consideration of abstract conceptual characteristics of a category were employed to retrieve category exemplars; (3) unmediated, where instances were effortlessly retrieved without mediating cognitions of which subjects were aware. Experiential strategies outnumbered semantic strategies (on average 4 to 1) not only for ad hoc categories but also for common categories. This pattern was noticeably reversed for ad hoc categories that subjects were unlikely to have experienced personally (e.g. things sold on the black market in Russia). Whereas more traditional accounts of semantic memory have favoured decontextualised abstract representations of category knowledge, to the extent that mode of access informs us of knowledge structures, our data suggest that category knowledge is significantly grounded in terms of everyday contexts where category instances are encountered. PMID:10197163

  7. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks.

    PubMed

    Vara, M Isabel; Campo, Celeste

    2015-07-20

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead.

  8. Distributed generation of shared RSA keys in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Liu, Yi-Liang; Huang, Qin; Shen, Ying

    2005-12-01

    Mobile Ad Hoc Networks is a totally new concept in which mobile nodes are able to communicate together over wireless links in an independent manner, independent of fixed physical infrastructure and centralized administrative infrastructure. However, the nature of Ad Hoc Networks makes them very vulnerable to security threats. Generation and distribution of shared keys for CA (Certification Authority) is challenging for security solution based on distributed PKI(Public-Key Infrastructure)/CA. The solutions that have been proposed in the literature and some related issues are discussed in this paper. The solution of a distributed generation of shared threshold RSA keys for CA is proposed in the present paper. During the process of creating an RSA private key share, every CA node only has its own private security. Distributed arithmetic is used to create the CA's private share locally, and that the requirement of centralized management institution is eliminated. Based on fully considering the Mobile Ad Hoc network's characteristic of self-organization, it avoids the security hidden trouble that comes by holding an all private security share of CA, with which the security and robustness of system is enhanced.

  9. A Dirichlet reputation system in reliable routing of wireless ad hoc network

    SciTech Connect

    Yang, Dr. Li; Cui, Xiaohui; Cemerlic, Alma

    2010-01-01

    Ad hoc networks are very helpful in situations when no fixed network infrastructure is available, such as natural disasters and military conflicts. In such a network, all wireless nodes are equal peers simultaneously serving as both senders and routers for other nodes. Therefore, how to route packets through reliable paths becomes a fundamental problems when behaviors of certain nodes deviate from wireless ad hoc routing protocols. We proposed a novel Dirichlet reputation model based on Bayesian inference theory which evaluates reliability of each node in terms of packet delivery. Our system offers a way to predict and select a reliable path through combination of first-hand observation and second-hand reputation reports. We also proposed moving window mechanism which helps to adjust ours responsiveness of our system to changes of node behaviors. We integrated the Dirichlet reputation into routing protocol of wireless ad hoc networks. Our extensive simulation indicates that our proposed reputation system can improve good throughput of the network and reduce negative impacts caused by misbehaving nodes.

  10. Ad hoc CubeSat constellations: Secondary launch coverage and distribution

    NASA Astrophysics Data System (ADS)

    Marinan, A.; Nicholas, A.; Cahoy, K.

    The primary purpose of a constellation is to obtain global measurements with improved spatial and temporal resolution. The small size, low cost, standardized form factor, and increasing availability of commercial parts for CubeSats make them ideal for use in constellations. However, without taking advantage of secondary payload opportunities, it would be costly to launch and distribute a CubeSat constellation into a specific configuration. A cost-effective way to launch a constellation of CubeSats is via consecutive secondary payload launch opportunities, but the resulting constellation would be an ad hoc mix of orbit parameters. We focus on the feasibility of cobbling together constellation-like functionality from multiple secondary payload opportunities. Each participating CubeSat (or set of CubeSats) per launch could have completely different orbital parameters, even without propulsion onboard the CubeSats or intermediate transfer carriers. We look at the ground coverages that could be obtained for a constellation of five to six orbital planes with one to six satellites in each plane. We analyze past and announced future launch opportunities for CubeSats, including launch platforms supported by the NASA Educational Launch of Nanosatellites (ELaNa). We consider combinations of possible launch locations and temporal spacings over the course of one year and simulate the resulting ground coverage patterns and revisit times for an ad hoc constellation using these launch opportunities. We perform this analysis for two separate case studies - one with only US launches and one with both US and non-US opportunities - and vary the number of satellites per orbital plane. Typical CubeSat mission lifetimes and deorbit times for low-altitude orbits are included in these analyses. The ad hoc constellation results are compared to coverage from uniformly-placed LEO constellations and are quantified in terms of revisit time, time to 100% global coverage, and response time. For mu

  11. Mathematics and Science Task Force Report.

    ERIC Educational Resources Information Center

    Wisconsin Univ., Green Bay. Inst. for Learning Partnership.

    This document presents a report from the Mathematics and Science Task Force. The Task Force held its initial meeting on January 27, 1999 to develop essential competencies in content knowledge and pedagogy in four areas: (1) elementary mathematics; (2) secondary mathematics; (3) elementary science; and (4) secondary science. Initially Task Force…

  12. Research Priorities and Plans for the International Space Station - Results of the REMAP Task Force

    NASA Astrophysics Data System (ADS)

    Kicza, M.

    2002-01-01

    Recent events in the International Space Station (ISS) Program have resulted in the necessity to re-examine the research priorities and research plans for future years. Due to both technical and fiscal resource constraints expected on the International Space Station, it is imperative that research priorities be carefully reviewed and clearly articulated. The U.S. President's Budget language for 2003 states that "...NASA will be working with the White House Office of Science and Technology Policy (OSTP) to engage the scientific community and establish clear high-priority, affordable science objectives with near-term focus on improving scientific productivity. The results of this review will help set the science agenda for Biological and Physical Research that will in turn define how the Space Station is used." In consultation with OSTP and the Office of Management and budget (OMB), NASA's Office of Biological and Physical Research (OBPR) is assembling an ad-hoc external advisory committee, the Biological and Physical REsearch MAximization and Prioritization (REMAP) Task Force, which will be under the auspices of the NASA Advisory Council. This paper will describe the outcome of the Task Force and how it will be used to define a roadmap for near and long term Biological and Physical Research objectives. Additionally the paper will discuss the maximization of the International Space Station utilization.

  13. Research priorities and plans for the International Space Station-results of the 'REMAP' Task Force

    NASA Technical Reports Server (NTRS)

    Kicza, M.; Erickson, K.; Trinh, E.

    2003-01-01

    Recent events in the International Space Station (ISS) Program have resulted in the necessity to re-examine the research priorities and research plans for future years. Due to both technical and fiscal resource constraints expected on the International Space Station, it is imperative that research priorities be carefully reviewed and clearly articulated. In consultation with OSTP and the Office of Management and budget (OMB), NASA's Office of Biological and Physical Research (OBPR) assembled an ad-hoc external advisory committee, the Biological and Physical Research Maximization and Prioritization (REMAP) Task Force. This paper describes the outcome of the Task Force and how it is being used to define a roadmap for near and long-term Biological and Physical Research objectives that supports NASA's Vision and Mission. Additionally, the paper discusses further prioritizations that were necessitated by budget and ISS resource constraints in order to maximize utilization of the International Space Station. Finally, a process has been developed to integrate the requirements for this prioritized research with other agency requirements to develop an integrated ISS assembly and utilization plan that maximizes scientific output. c2003 American Institute of Aeronautics and Astronautics. Published by Elsevier Science Ltd. All rights reserved.

  14. Research priorities and plans for the International Space Station-results of the 'REMAP' Task Force.

    PubMed

    Kicza, M; Erickson, K; Trinh, E

    2003-01-01

    Recent events in the International Space Station (ISS) Program have resulted in the necessity to re-examine the research priorities and research plans for future years. Due to both technical and fiscal resource constraints expected on the International Space Station, it is imperative that research priorities be carefully reviewed and clearly articulated. In consultation with OSTP and the Office of Management and budget (OMB), NASA's Office of Biological and Physical Research (OBPR) assembled an ad-hoc external advisory committee, the Biological and Physical Research Maximization and Prioritization (REMAP) Task Force. This paper describes the outcome of the Task Force and how it is being used to define a roadmap for near and long-term Biological and Physical Research objectives that supports NASA's Vision and Mission. Additionally, the paper discusses further prioritizations that were necessitated by budget and ISS resource constraints in order to maximize utilization of the International Space Station. Finally, a process has been developed to integrate the requirements for this prioritized research with other agency requirements to develop an integrated ISS assembly and utilization plan that maximizes scientific output.

  15. Muon Collider Task Force Report

    SciTech Connect

    Ankenbrandt, C.; Alexahin, Y.; Balbekov, V.; Barzi, E.; Bhat, C.; Broemmelsiek, D.; Bross, A.; Burov, A.; Drozhdin, A.; Finley, D.; Geer, S.; /Fermilab /Argonne /Brookhaven /Jefferson Lab /LBL, Berkeley /MUONS Inc., Batavia /UCLA /UC, Riverside /Mississippi U.

    2007-12-01

    Muon Colliders offer a possible long term path to lepton-lepton collisions at center-of-mass energies {radical}s {ge} 1 TeV. In October 2006 the Muon Collider Task Force (MCTF) proposed a program of advanced accelerator R&D aimed at developing the Muon Collider concept. The proposed R&D program was motivated by progress on Muon Collider design in general, and in particular, by new ideas that have emerged on muon cooling channel design. The scope of the proposed MCTF R&D program includes muon collider design studies, helical cooling channel design and simulation, high temperature superconducting solenoid studies, an experimental program using beams to test cooling channel RF cavities and a 6D cooling demonstration channel. The first year of MCTF activities are summarized in this report together with a brief description of the anticipated FY08 R&D activities. In its first year the MCTF has made progress on (1) Muon Collider ring studies, (2) 6D cooling channel design and simulation studies with an emphasis on the HCC scheme, (3) beam preparations for the first HPRF cavity beam test, (4) preparations for an HCC four-coil test, (5) further development of the MANX experiment ideas and studies of the muon beam possibilities at Fermilab, (6) studies of how to integrate RF into an HCC in preparation for a component development program, and (7) HTS conductor and magnet studies to prepare for an evaluation of the prospects for of an HTS high-field solenoid build for a muon cooling channel.

  16. Variance Components in Discrete Force Production Tasks

    PubMed Central

    SKM, Varadhan; Zatsiorsky, Vladimir M.; Latash, Mark L.

    2010-01-01

    The study addresses the relationships between task parameters and two components of variance, “good” and “bad”, during multi-finger accurate force production. The variance components are defined in the space of commands to the fingers (finger modes) and refer to variance that does (“bad”) and does not (“good”) affect total force. Based on an earlier study of cyclic force production, we hypothesized that speeding-up an accurate force production task would be accompanied by a drop in the regression coefficient linking the “bad” variance and force rate such that variance of the total force remains largely unaffected. We also explored changes in parameters of anticipatory synergy adjustments with speeding-up the task. The subjects produced accurate ramps of total force over different times and in different directions (force-up and force-down) while pressing with the four fingers of the right hand on individual force sensors. The two variance components were quantified, and their normalized difference was used as an index of a total force stabilizing synergy. “Good” variance scaled linearly with force magnitude and did not depend on force rate. “Bad” variance scaled linearly with force rate within each task, and the scaling coefficient did not change across tasks with different ramp times. As a result, a drop in force ramp time was associated with an increase in total force variance, unlike the results of the study of cyclic tasks. The synergy index dropped 100-200 ms prior to the first visible signs of force change. The timing and magnitude of these anticipatory synergy adjustments did not depend on the ramp time. Analysis of the data within an earlier model has shown adjustments in the variance of a timing parameter, although these adjustments were not as pronounced as in the earlier study of cyclic force production. Overall, we observed qualitative differences between the discrete and cyclic force production tasks: Speeding-up the cyclic

  17. Dynamic autonomous routing technology for IP-based satellite ad hoc networks

    NASA Astrophysics Data System (ADS)

    Wang, Xiaofei; Deng, Jing; Kostas, Theresa; Rajappan, Gowri

    2014-06-01

    IP-based routing for military LEO/MEO satellite ad hoc networks is very challenging due to network and traffic heterogeneity, network topology and traffic dynamics. In this paper, we describe a traffic priority-aware routing scheme for such networks, namely Dynamic Autonomous Routing Technology (DART) for satellite ad hoc networks. DART has a cross-layer design, and conducts routing and resource reservation concurrently for optimal performance in the fluid but predictable satellite ad hoc networks. DART ensures end-to-end data delivery with QoS assurances by only choosing routing paths that have sufficient resources, supporting different packet priority levels. In order to do so, DART incorporates several resource management and innovative routing mechanisms, which dynamically adapt to best fit the prevailing conditions. In particular, DART integrates a resource reservation mechanism to reserve network bandwidth resources; a proactive routing mechanism to set up non-overlapping spanning trees to segregate high priority traffic flows from lower priority flows so that the high priority flows do not face contention from low priority flows; a reactive routing mechanism to arbitrate resources between various traffic priorities when needed; a predictive routing mechanism to set up routes for scheduled missions and for anticipated topology changes for QoS assurance. We present simulation results showing the performance of DART. We have conducted these simulations using the Iridium constellation and trajectories as well as realistic military communications scenarios. The simulation results demonstrate DART's ability to discriminate between high-priority and low-priority traffic flows and ensure disparate QoS requirements of these traffic flows.

  18. Panel Discussion : Report of the APS Ad-Hoc Committee on LGBT Issues

    NASA Astrophysics Data System (ADS)

    Atherton, Tim; Barthelemy, Ramon; Garmon, Savannah; Reeves, Kyle; APS Ad-Hoc Committee on LGBT Issues Team

    Following the presentation of the findings and recommendations of the APS Ad-Hoc Committee on LGBT Issues (C-LGBT) by Committee Chair Michael Falk, a panel discussion will be held featuring several members of the committee. The discussion will focus on how APS can best ensure the recommendations of the committee are carried out in a timely fashion and other ideas on future APS efforts toward LGBT inclusion in physics. Discussion topics will also include the research and other input that shaped the committee's findings and recommendations.

  19. Performance Impacts of Lower-Layer Cryptographic Methods in Mobile Wireless Ad Hoc Networks

    SciTech Connect

    VAN LEEUWEN, BRIAN P.; TORGERSON, MARK D.

    2002-10-01

    In high consequence systems, all layers of the protocol stack need security features. If network and data-link layer control messages are not secured, a network may be open to adversarial manipulation. The open nature of the wireless channel makes mobile wireless mobile ad hoc networks (MANETs) especially vulnerable to control plane manipulation. The objective of this research is to investigate MANET performance issues when cryptographic processing delays are applied at the data-link layer. The results of analysis are combined with modeling and simulation experiments to show that network performance in MANETs is highly sensitive to the cryptographic overhead.

  20. Associate Degree Standards. Task Force Report.

    ERIC Educational Resources Information Center

    Minnesota Higher Education Coordinating Board, St. Paul.

    Developed by the Minnesota Higher Education Coordinating Board's (MHECB's) Task Force on Associate Degree Standards, this report recommends standards for all associate degrees granted by Minnesota post-secondary institutions. Chapter I provides introductory and background information on the creation and legislative charge of the task force and…

  1. Cross-layer design for intrusion detection and data security in wireless ad hoc sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2007-09-01

    A wireless ad hoc sensor network is a configuration for area surveillance that affords rapid, flexible deployment in arbitrary threat environments. There is no infrastructure support and sensor nodes communicate with each other only when they are in transmission range. The nodes are severely resource-constrained, with limited processing, memory and power capacities and must operate cooperatively to fulfill a common mission in typically unattended modes. In a wireless sensor network (WSN), each sensor at a node can observe locally some underlying physical phenomenon and sends a quantized version of the observation to sink (destination) nodes via wireless links. Since the wireless medium can be easily eavesdropped, links can be compromised by intrusion attacks from nodes that may mount denial-of-service attacks or insert spurious information into routing packets, leading to routing loops, long timeouts, impersonation, and node exhaustion. A cross-layer design based on protocol-layer interactions is proposed for detection and identification of various intrusion attacks on WSN operation. A feature set is formed from selected cross-layer parameters of the WSN protocol to detect and identify security threats due to intrusion attacks. A separate protocol is not constructed from the cross-layer design; instead, security attributes and quantified trust levels at and among nodes established during data exchanges complement customary WSN metrics of energy usage, reliability, route availability, and end-to-end quality-of-service (QoS) provisioning. Statistical pattern recognition algorithms are applied that use observed feature-set patterns observed during network operations, viewed as security audit logs. These algorithms provide the "best" network global performance in the presence of various intrusion attacks. A set of mobile (software) agents distributed at the nodes implement the algorithms, by moving among the layers involved in the network response at each active node

  2. 80 FR 31033 - Meeting of the Community Preventive Services Task Force (Task Force)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2015-06-01

    ... recommendations, along with the systematic reviews of the scientific evidence on which they are based, are... of the Task Force. During its meetings, the Task Force considers the findings of systematic reviews... purpose of the meeting is for the Task Force to consider the findings of systematic reviews and...

  3. 81 FR 59227 - Meeting of the Community Preventive Services Task Force (Task Force)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2016-08-29

    ... Task Force's recommendations, along with the systematic reviews of the scientific evidence on which... findings of systematic reviews on existing research and issues recommendations. Task Force recommendations... purpose of the meeting is for the Task Force to consider the findings of systematic reviews and...

  4. Opportunistic Hybrid Transport Protocol (OHTP) for Cognitive Radio Ad Hoc Sensor Networks.

    PubMed

    Bin Zikria, Yousaf; Nosheen, Summera; Ishmanov, Farruh; Kim, Sung Won

    2015-01-01

    The inefficient assignment of spectrum for different communications purposes, plus technology enhancements and ever-increasing usage of wireless technology is causing spectrum scarcity. To address this issue, one of the proposed solutions in the literature is to access the spectrum dynamically or opportunistically. Therefore, the concept of cognitive radio appeared, which opens up a new research paradigm. There is extensive research on the physical, medium access control and network layers. The impact of the transport layer on the performance of cognitive radio ad hoc sensor networks is still unknown/unexplored. The Internet's de facto transport protocol is not well suited to wireless networks because of its congestion control mechanism. We propose an opportunistic hybrid transport protocol for cognitive radio ad hoc sensor networks. We developed a new congestion control mechanism to differentiate true congestion from interruption loss. After such detection and differentiation, we propose methods to handle them opportunistically. There are several benefits to window- and rate-based protocols. To exploit the benefits of both in order to enhance overall system performance, we propose a hybrid transport protocol. We empirically calculate the optimal threshold value to switch between window- and rate-based mechanisms. We then compare our proposed transport protocol to Transmission Control Protocol (TCP)-friendly rate control, TCP-friendly rate control for cognitive radio, and TCP-friendly window-based control. We ran an extensive set of simulations in Network Simulator 2. The results indicate that the proposed transport protocol performs better than all the others. PMID:26694396

  5. Adaptive Reliable Routing Protocol Using Combined Link Stability Estimation for Mobile Ad hoc Networks

    NASA Astrophysics Data System (ADS)

    Vadivel, R.; Bhaskaran, V. Murali

    2010-10-01

    The main reason for packet loss in ad hoc networks is the link failure or node failure. In order to increase the path stability, it is essential to distinguish and moderate the failures. By knowing individual link stability along a path, path stability can be identified. In this paper, we develop an adaptive reliable routing protocol using combined link stability estimation for mobile ad hoc networks. The main objective of this protocol is to determine a Quality of Service (QoS) path along with prolonging the network life time and to reduce the packet loss. We calculate a combined metric for a path based on the parameters Link Expiration Time, Node Remaining Energy and Node Velocity and received signal strength to predict the link stability or lifetime. Then, a bypass route is established to retransmit the lost data, when a link failure occurs. By simulation results, we show that the proposed reliable routing protocol achieves high delivery ratio with reduced delay and packet drop.

  6. Linking Satellites Via Earth "Hot Spots" and the Internet to Form Ad Hoc Constellations

    NASA Technical Reports Server (NTRS)

    Mandl, Dan; Frye, Stu; Grosvenor, Sandra; Ingram, Mary Ann; Langley, John; Miranda, Felix; Lee, Richard Q.; Romanofsky, Robert; Zaman, Afoz; Popovic, Zoya

    2004-01-01

    As more assets are placed in orbit, opportunities emerge to combine various sets of satellites in temporary constellations to perform collaborative image collections. Often, new operations concepts for a satellite or set of satellites emerge after launch. To the degree with which new space assets can be inexpensively and rapidly integrated into temporary or "ad hoc" constellations, will determine whether these new ideas will be implemented or not. On the Earth Observing 1 (EO-1) satellite, a New Millennium Program mission, a number of experiments were conducted and are being conducted to demonstrate various aspects of an architecture that, when taken as a whole, will enable progressive mission autonomy. In particular, the target architecture will use adaptive ground antenna arrays to form, as close as possible, the equivalent of wireless access points for low earth orbiting satellites. Coupled with various ground and flight software and the Internet. the architecture enables progressive mission autonomy. Thus, new collaborative sensing techniques can be implemented post-launch. This paper will outline the overall operations concept and highlight details of both the research effort being conducted in ad hoc constellations, mission autonomy and

  7. Intelligent QoS routing algorithm based on improved AODV protocol for Ad Hoc networks

    NASA Astrophysics Data System (ADS)

    Huibin, Liu; Jun, Zhang

    2016-04-01

    Mobile Ad Hoc Networks were playing an increasingly important part in disaster reliefs, military battlefields and scientific explorations. However, networks routing difficulties are more and more outstanding due to inherent structures. This paper proposed an improved cuckoo searching-based Ad hoc On-Demand Distance Vector Routing protocol (CSAODV). It elaborately designs the calculation methods of optimal routing algorithm used by protocol and transmission mechanism of communication-package. In calculation of optimal routing algorithm by CS Algorithm, by increasing QoS constraint, the found optimal routing algorithm can conform to the requirements of specified bandwidth and time delay, and a certain balance can be obtained among computation spending, bandwidth and time delay. Take advantage of NS2 simulation software to take performance test on protocol in three circumstances and validate the feasibility and validity of CSAODV protocol. In results, CSAODV routing protocol is more adapt to the change of network topological structure than AODV protocol, which improves package delivery fraction of protocol effectively, reduce the transmission time delay of network, reduce the extra burden to network brought by controlling information, and improve the routing efficiency of network.

  8. Opportunistic Hybrid Transport Protocol (OHTP) for Cognitive Radio Ad Hoc Sensor Networks.

    PubMed

    Bin Zikria, Yousaf; Nosheen, Summera; Ishmanov, Farruh; Kim, Sung Won

    2015-12-15

    The inefficient assignment of spectrum for different communications purposes, plus technology enhancements and ever-increasing usage of wireless technology is causing spectrum scarcity. To address this issue, one of the proposed solutions in the literature is to access the spectrum dynamically or opportunistically. Therefore, the concept of cognitive radio appeared, which opens up a new research paradigm. There is extensive research on the physical, medium access control and network layers. The impact of the transport layer on the performance of cognitive radio ad hoc sensor networks is still unknown/unexplored. The Internet's de facto transport protocol is not well suited to wireless networks because of its congestion control mechanism. We propose an opportunistic hybrid transport protocol for cognitive radio ad hoc sensor networks. We developed a new congestion control mechanism to differentiate true congestion from interruption loss. After such detection and differentiation, we propose methods to handle them opportunistically. There are several benefits to window- and rate-based protocols. To exploit the benefits of both in order to enhance overall system performance, we propose a hybrid transport protocol. We empirically calculate the optimal threshold value to switch between window- and rate-based mechanisms. We then compare our proposed transport protocol to Transmission Control Protocol (TCP)-friendly rate control, TCP-friendly rate control for cognitive radio, and TCP-friendly window-based control. We ran an extensive set of simulations in Network Simulator 2. The results indicate that the proposed transport protocol performs better than all the others.

  9. A multihop key agreement scheme for wireless ad hoc networks based on channel characteristics.

    PubMed

    Hao, Zhuo; Zhong, Sheng; Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks. PMID:23766725

  10. Distinguishing congestion from malicious behavior in mobile ad-hoc networks

    NASA Astrophysics Data System (ADS)

    Ding, Jin; Medidi, Sirisha R.

    2004-08-01

    Packet dropping in Mobile Ad-hoc Networks could be a result of wireless link errors, congestion, or malicious packet drop attack. Current techniques for detecting malicious behavior either do not consider congestion in the network or are not able to detect in real time. Further more, they usually work at network layer. In this paper, we propose a TCP-Manet protocol, which reacts to congestion like TCP Reno protocol, and has additional capability to distinguish among congestion, wireless link error, and malicious packet drop attack. It is an end-to-end mechanism that does not require additional modifications to the nodes in the network. Since it is an extension of existing TCP protocol, it is compatible with existing protocols. It works in conjunction with the network layer and an unobtrusive monitor to assist the network in the detection and characterization of the nature of the behavior. Experimental results show that TCP-Manet has the same performance as that of TCP-Reno in wired network, and performs better in wireless ad-hoc networks in terms of throughput while having good detection effectiveness.

  11. A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics

    PubMed Central

    Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks. PMID:23766725

  12. Greedy data transportation scheme with hard packet deadlines for wireless ad hoc networks.

    PubMed

    Lee, HyungJune

    2014-01-01

    We present a greedy data transportation scheme with hard packet deadlines in ad hoc sensor networks of stationary nodes and multiple mobile nodes with scheduled trajectory path and arrival time. In the proposed routing strategy, each stationary ad hoc node en route decides whether to relay a shortest-path stationary node toward destination or a passing-by mobile node that will carry closer to destination. We aim to utilize mobile nodes to minimize the total routing cost as far as the selected route can satisfy the end-to-end packet deadline. We evaluate our proposed routing algorithm in terms of routing cost, packet delivery ratio, packet delivery time, and usability of mobile nodes based on network level simulations. Simulation results show that our proposed algorithm fully exploits the remaining time till packet deadline to turn into networking benefits of reducing the overall routing cost and improving packet delivery performance. Also, we demonstrate that the routing scheme guarantees packet delivery with hard deadlines, contributing to QoS improvement in various network services.

  13. A robust cross-layer metric for routing protocol in mobile wireless ad hoc networks

    NASA Astrophysics Data System (ADS)

    Mucchi, Lorenzo; Chisci, Luigi; Fabbrini, Luca; Giovannetti, Giulio

    2012-12-01

    In a mobile ad-hoc network (MANET) where Mobile Nodes (MNs) self-organize to ensure the communication over radio links, routing protocols clearly play a significant role. In future MANETs, protocols should provide routing under full mobility, power constraints, fast time-varying channels, and nodes subject to high loading. In this article, a novel robust routing protocol, named distributed X-layer fastest path (DXFP), is proposed. The protocol is based on a cross-layer metric which is robust against the time-variations of the network as far as topology (mobility), congestion of the nodes and channel quality (fading, power constraints) are concerned. All these features are integrated in a single physical cost, i.e., the network crossing time, which has to be minimized. Furthermore, several routes from source to destination are stored for a given data flow to efficiently face the disconnections which frequently occur in MANETs. It is shown that the DXFP protocol, though locally operating in a fully distributed way within the MNs, provides, for each data flow, the optimum routes according to the considered metric. The DXFP protocol has been compared with two of the most commonly used routing protocols for MANETs, i.e., dynamic source routing and ad hoc on-demand distance vector, showing significant improvements in performance and robustness.

  14. A multihop key agreement scheme for wireless ad hoc networks based on channel characteristics.

    PubMed

    Hao, Zhuo; Zhong, Sheng; Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks.

  15. Trusted Routing Based on Dynamic Trust Mechanism in Mobile Ad-Hoc Networks

    NASA Astrophysics Data System (ADS)

    Peng, Sancheng; Jia, Weijia; Wang, Guojun; Wu, Jie; Guo, Minyi

    Due to the distributed nature, mobile ad-hoc networks (MANETs) are vulnerable to various attacks, resulting in distrusted communications. To achieve trusted communications, it is important to build trusted routes in routing algorithms in a self-organizing and decentralized fashion. This paper proposes a trusted routing to locate and to preserve trusted routes in MANETs. Instead of using a hard security mechanism, we employ a new dynamic trust mechanism based on multiple constraints and collaborative filtering. The dynamic trust mechanism can effectively evaluate the trust and obtain the precise trust value among nodes, and can also be integrated into existing routing protocols for MANETs, such as ad hoc on-demand distance vector routing (AODV) and dynamic source routing (DSR). As an example, we present a trusted routing protocol, based on dynamic trust mechanism, by extending DSR, in which a node makes a routing decision based on the trust values on its neighboring nodes, and finally, establish a trusted route through the trust values of the nodes along the route in MANETs. The effectiveness of our approach is validated through extensive simulations.

  16. Canonical and kinetic forms of the electromagnetic momentum in an ad hoc quantization scheme for a dispersive dielectric

    SciTech Connect

    Garrison, J.C.; Chiao, R.Y.

    2004-11-01

    An ad hoc quantization scheme for the electromagnetic field in a weakly dispersive, transparent dielectric leads to the definition of canonical and kinetic forms for the momentum of the electromagnetic field in a dispersive medium. The canonical momentum is uniquely defined as the operator that generates spatial translations in a uniform medium, but the quantization scheme suggests two possible choices for the kinetic momentum operator, corresponding to the Abraham or the Minkowski momentum in classical electrodynamics. Another implication of this procedure is that a wave packet containing a single dressed photon travels at the group velocity through the medium. The physical significance of the canonical momentum has already been established by considerations of energy and momentum conservation in the atomic recoil due to spontaneous emission, the Cerenkov effect, the Doppler effect, and phase matching in nonlinear optical processes. In addition, the data of the Jones and Leslie radiation pressure experiment is consistent with the assignment of one ({Dirac_h}/2{pi})k unit of canonical momentum to each dressed photon. By contrast, experiments in which the dielectric is rigidly accelerated by unbalanced electromagnetic forces require the use of the Abraham momentum.

  17. Energy-efficient distributed constructions of miniumum spanning tree for wireless ad-hoc networks

    SciTech Connect

    Kumar, V. S. A.; Pandurangan, G.; Khan, M.

    2004-01-01

    The Minimum Spanning Tree (MST) problem is one of the most important and commonly occurring primitive in the design and operation of data and communication networks. While there a redistributed algorithms for the MST problem these require relatively large number of messages and time, and are fairly involved, require synchronization and a lot of book keeping; this makes these algorithms impractical for emerging technologies such as ad hoc and sensor networks. In such networks, a sensor has very limited power, and any algorithm needs to be simple, local and energy efficient for being practical. Motivated by these considerations, we study the performance of a class of simple and local algorithms called Nearest Neighbor Tree (NNT) algorithms for energy-efficient construction of MSTs in a wireless ad hoc setting. These employ a very simple idea to eliminate the work involved in cycle detection in other MST algorithms: each node chooses a distinct rank, and connects to the closest node of higher rank. We consider two variants of the NNT algorithms, obtained by two ways of choosing the ranks: (i) Random NNT, in which each node chooses a rank randomly, and (ii) Directional NNT, in which each node uses directional information for choosing the rank. We show provable bounds on the performance of these algorithms in instances obtained by uniformly distributed points in the unit square. Finally, we perform extensive simulations of our algorithms. We tested our algorithms on both uniformly random distributions of points, and on realistic distributions of points in an urban setting. The cost of the tree found by the NNT algorithms is within a factor of 2 of the MST, but there is more than a ten-fold saving on the energy and about a five fold saving on the number of messages sent. Also, our algorithms are significantly simpler to implement compared to, for instance, the GHS algorithm, which is essentially optimal with regards to the message complexity. Thus, our results

  18. Intelligent self-organization methods for wireless ad hoc sensor networks based on limited resources

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2006-05-01

    A wireless ad hoc sensor network (WSN) is a configuration for area surveillance that affords rapid, flexible deployment in arbitrary threat environments. There is no infrastructure support and sensor nodes communicate with each other only when they are in transmission range. To a greater degree than the terminals found in mobile ad hoc networks (MANETs) for communications, sensor nodes are resource-constrained, with limited computational processing, bandwidth, memory, and power, and are typically unattended once in operation. Consequently, the level of information exchange among nodes, to support any complex adaptive algorithms to establish network connectivity and optimize throughput, not only deplete those limited resources and creates high overhead in narrowband communications, but also increase network vulnerability to eavesdropping by malicious nodes. Cooperation among nodes, critical to the mission of sensor networks, can thus be disrupted by the inappropriate choice of the method for self-organization. Recent published contributions to the self-configuration of ad hoc sensor networks, e.g., self-organizing mapping and swarm intelligence techniques, have been based on the adaptive control of the cross-layer interactions found in MANET protocols to achieve one or more performance objectives: connectivity, intrusion resistance, power control, throughput, and delay. However, few studies have examined the performance of these algorithms when implemented with the limited resources of WSNs. In this paper, self-organization algorithms for the initiation, operation and maintenance of a network topology from a collection of wireless sensor nodes are proposed that improve the performance metrics significant to WSNs. The intelligent algorithm approach emphasizes low computational complexity, energy efficiency and robust adaptation to change, allowing distributed implementation with the actual limited resources of the cooperative nodes of the network. Extensions of the

  19. Bilateral synergies in foot force production tasks.

    PubMed

    Sarabon, Nejc; Markovic, Goran; Mikulic, Pavle; Latash, Mark L

    2013-05-01

    We analysed the effects of task symmetry during bilateral accurate force production tasks performed by the two feet. In particular, we tested a hypothesis that bilateral deficit would lead to higher indices of synergies defined as co-varied adjustments in the two forces across trials that reduced total force variability. The subjects produced steady-state force followed by a quick force pulse into the target. The two feet could be acting both into plantar flexion and into dorsiflexion (symmetrical tasks), or in opposite directions (asymmetrical task). We used the framework of the uncontrolled manifold hypothesis to quantify two variance components, one of which did not change total force (V UCM), while the other did (V ORT). Synergy indices during the asymmetrical task were higher than in either symmetrical task. The difference was due to higher V UCM (compared to the symmetrical plantar flexion task) or lower V ORT (compared to the symmetrical dorsiflexion task). The synergy index showed a drop (anticipatory synergy adjustment, ASA) starting 100-150 ms prior to the force pulse initiation. The ASA tended to be shorter and of a smaller magnitude for the asymmetrical task. This is the first demonstration of bilateral synergies during accurate force production by the legs. We conclude that bilateral deficit has no or weak effects on two-leg synergies. The results fit the earlier introduced scheme with two groups of neural variables defining average performance of a redundant system and patterns of co-variation among its elemental variables, respectively. PMID:23568657

  20. Space station operations task force summary report

    NASA Technical Reports Server (NTRS)

    1987-01-01

    A companion to the Space Stations Operation Task Force Panels' Reports, this document summarizes all space station program goals, operations, and the characteristics of the expected user community. Strategies for operation and recommendations for implementation are included.

  1. A Leasing Model to Deal with Partial Failures in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Gonzalez Boix, Elisa; van Cutsem, Tom; Vallejos, Jorge; de Meuter, Wolfgang; D'Hondt, Theo

    In mobile ad hoc networks (MANETs) many partial failures are the result of temporary network partitions due to the intermittent connectivity of mobile devices. Some of these failures will be permanent and require application-level failure handling. However, it is impossible to distinguish a permanent from a transient failure. Leasing provides a solution to this problem based on the temporal restriction of resources. But to date no leasing model has been designed specifically for MANETs. In this paper, we identify three characteristics required for a leasing model to be usable in a MANET, discuss the issues with existing leasing models and then propose the leased object references model, which integrates leasing with remote object references. In addition, we describe an implementation of the model in the programming language AmbientTalk. Leased object references provide an extensible framework that allows programmers to express their own leasing patterns and enables both lease holders (clients) and lease grantors (services) to deal with permanent failures.

  2. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.

    PubMed

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-07-14

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.

  3. Distributed Spectrum Sharing for Video Streaming in Cognitive Radio Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Ding, Lei; Pudlewski, Scott; Melodia, Tommaso; Batalama, Stella; Matyjas, John D.; Medley, Michael J.

    A distributed joint routing and spectrum sharing algorithm for video streaming applications over cognitive radio ad hoc networks is proposed in this article. The proposed cross-layer control scheme dynamically allocates routes, spectrum and power to maximize the network throughput under the constraints posed by delay-sensitive video applications. The algorithm evaluates the expected delay of competing flows in single-hop and two-hop networks considering the time-varying spectrum condition and occupancy, traffic characteristics, and the condition of queues at intermediate nodes. Simulation results show that the proposed algorithm significantly reduces the packet loss rate and improves the average peak signal-to-noise ratio (PSNR) of the received video streams.

  4. Reducing Congestion in Obstructed Highways with Traffic Data Dissemination Using Ad hoc Vehicular Networks

    NASA Astrophysics Data System (ADS)

    Hewer, Thomas D.; Nekovee, Maziar; Coveney, Peter V.

    2010-12-01

    Vehicle-to-vehicle communications can be used effectively for intelligent transport systems (ITSs) and location-aware services. The ability to disseminate information in an ad hoc fashion allows pertinent information to propagate faster through a network. In the realm of ITS, the ability to spread warning information faster and further is of great advantage to receivers. In this paper we propose and present a message-dissemination procedure that uses vehicular wireless protocols to influence vehicular flow, reducing congestion in road networks. The computational experiments we present show how a car-following model and lane-change algorithm can be adapted to "react" to the reception of information. This model also illustrates the advantages of coupling together with vehicular flow modelling tools and network simulation tools.

  5. Secure Adaptive Topology Control for Wireless Ad-Hoc Sensor Networks

    PubMed Central

    Hsueh, Ching-Tsung; Li, Yu-Wei; Wen, Chih-Yu; Ouyang, Yen-Chieh

    2010-01-01

    This paper presents a secure decentralized clustering algorithm for wireless ad-hoc sensor networks. The algorithm operates without a centralized controller, operates asynchronously, and does not require that the location of the sensors be known a priori. Based on the cluster-based topology, secure hierarchical communication protocols and dynamic quarantine strategies are introduced to defend against spam attacks, since this type of attacks can exhaust the energy of sensor nodes and will shorten the lifetime of a sensor network drastically. By adjusting the threshold of infected percentage of the cluster coverage, our scheme can dynamically coordinate the proportion of the quarantine region and adaptively achieve the cluster control and the neighborhood control of attacks. Simulation results show that the proposed approach is feasible and cost effective for wireless sensor networks. PMID:22205866

  6. Noise-Assisted Concurrent Multipath Traffic Distribution in Ad Hoc Networks

    PubMed Central

    Murata, Masayuki

    2013-01-01

    The concept of biologically inspired networking has been introduced to tackle unpredictable and unstable situations in computer networks, especially in wireless ad hoc networks where network conditions are continuously changing, resulting in the need of robustness and adaptability of control methods. Unfortunately, existing methods often rely heavily on the detailed knowledge of each network component and the preconfigured, that is, fine-tuned, parameters. In this paper, we utilize a new concept, called attractor perturbation (AP), which enables controlling the network performance using only end-to-end information. Based on AP, we propose a concurrent multipath traffic distribution method, which aims at lowering the average end-to-end delay by only adjusting the transmission rate on each path. We demonstrate through simulations that, by utilizing the attractor perturbation relationship, the proposed method achieves a lower average end-to-end delay compared to other methods which do not take fluctuations into account. PMID:24319375

  7. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks

    PubMed Central

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-01-01

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes. PMID:26184224

  8. Implementation and performance evaluation of mobile ad hoc network for Emergency Telemedicine System in disaster areas.

    PubMed

    Kim, J C; Kim, D Y; Jung, S M; Lee, M H; Kim, K S; Lee, C K; Nah, J Y; Lee, S H; Kim, J H; Choi, W J; Yoo, S K

    2009-01-01

    So far we have developed Emergency Telemedicine System (ETS) which is a robust system using heterogeneous networks. In disaster areas, however, ETS cannot be used if the primary network channel is disabled due to damages on the network infrastructures. Thus we designed network management software for disaster communication network by combination of Mobile Ad hoc Network (MANET) and Wireless LAN (WLAN). This software maintains routes to a Backbone Gateway Node in dynamic network topologies. In this paper, we introduce the proposed disaster communication network with management software, and evaluate its performance using ETS between Medical Center and simulated disaster areas. We also present the results of network performance analysis which identifies the possibility of actual Telemedicine Service in disaster areas via MANET and mobile network (e.g. HSDPA, WiBro).

  9. Effective route maintenance and restoration schemes in mobile ad hoc networks.

    PubMed

    Kang, Byung-Seok; Ko, In-Young

    2010-01-01

    This study proposes a location-based hybrid routing protocol to improve data packet delivery and to reduce control message overhead in mobile ad hoc networks. In mobile environments, where nodes move continuously at a high speed, it is generally difficult to maintain and restore route paths. Therefore, this study suggests a new flooding mechanism to control route paths. The essence of the proposed scheme is its effective tracking of the destination's location based on the beacon messages of the main route nodes. Through experiments based on an NS-2 simulator, the proposed scheme shows improvements in the data packet delivery ratio and reduces the amount of routing control message overhead compared with existing routing protocols such as AODV, LAR, ZRP and AODV-DFR.

  10. Noise-assisted concurrent multipath traffic distribution in ad hoc networks.

    PubMed

    Asvarujanon, Narun; Leibnitz, Kenji; Wakamiya, Naoki; Murata, Masayuki

    2013-01-01

    The concept of biologically inspired networking has been introduced to tackle unpredictable and unstable situations in computer networks, especially in wireless ad hoc networks where network conditions are continuously changing, resulting in the need of robustness and adaptability of control methods. Unfortunately, existing methods often rely heavily on the detailed knowledge of each network component and the preconfigured, that is, fine-tuned, parameters. In this paper, we utilize a new concept, called attractor perturbation (AP), which enables controlling the network performance using only end-to-end information. Based on AP, we propose a concurrent multipath traffic distribution method, which aims at lowering the average end-to-end delay by only adjusting the transmission rate on each path. We demonstrate through simulations that, by utilizing the attractor perturbation relationship, the proposed method achieves a lower average end-to-end delay compared to other methods which do not take fluctuations into account.

  11. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.

    PubMed

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-01-01

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes. PMID:26184224

  12. Security enhancement for mobile ad hoc networks routing with OLSRv2

    NASA Astrophysics Data System (ADS)

    Wei, Zhexiong; Tang, Helen; Yu, F. Richard; Wang, Maoyu

    2013-05-01

    Some features of Mobile Ad hoc Networks (MANETs), including dynamic membership, topology, and open wireless medium, introduce a variety of security risks. Malicious nodes can drop or modify packets that are received from other nodes. These malicious activities may seriously affect the availability of services in MANETs. Therefore, secure routing in MANETs has emerged as an important MANET research area. In this paper, we propose a scheme that enhances the security of Optimal Link State Routing version 2 (OLSRv2) in MANETs based on trust. In the proposed scheme, more accurate trust can be obtained by considering different types of packets and other important factors that may cause dropping packets in friendly nodes, such as buffer overflows and unreliable wireless connections. Simulation results are presented to demonstrate the effectiveness of the proposed scheme.

  13. A Secure Routing Using Reliable 1-Hop Broadcast in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Park, Seungjin; Yoo, Seong-Moo

    Among many ways to achieve security in wireless mobile ad hoc networks, the approach taken in this paper is to ensure that all nodes in the network receive critical information on security such as public keys. To achieve this, a reliable global broadcasting of the information must be accomplished, which in turn, relies on a reliable 1-hop broadcasting in which a message from the source node is guaranteed to be delivered to all nodes within the source node's transmission range. This paper presents a MAC protocol that guarantees a reliable and efficient 1-hop broadcast. The unique feature of the proposed algorithm is that each node is able to dynamically adjust its transmission range depending on the node density around it. Simulation results show the effectiveness of the proposed algorithm.

  14. Performance Analysis of Ad Hoc Routing Protocols in City Scenario for VANET

    NASA Astrophysics Data System (ADS)

    Das, Sanjoy; Raw, Ram Shringar; Das, Indrani

    2011-12-01

    In this paper, performance analysis of Location Aided Routing (LAR), AODV and DSR protocol in city scenarios has been done. The mobility model considered is Manhattan model. This mobility model used to emulate the movement pattern of nodes i.e., vehicles on streets defined by maps. Our objective is to provide a comparative analysis among LAR, AODV and DSR protocol in city scenarios in Vehicular Ad hoc Networks. The simulation work has been conducted using the Glomosim 2.03 simulator. The results show that LAR1 protocol achieves maximum packet delivery ratio is 100% in the sparsely populated network. The delay is maximum in AODV 121.88 ms when the number of node is 10 in the network. The results show that LAR1 outperform DSR and AODV in term of packet delivery ratio and end to end delay.

  15. A high performance, ad-hoc, fuzzy query processing system for relational databases

    NASA Technical Reports Server (NTRS)

    Mansfield, William H., Jr.; Fleischman, Robert M.

    1992-01-01

    Database queries involving imprecise or fuzzy predicates are currently an evolving area of academic and industrial research. Such queries place severe stress on the indexing and I/O subsystems of conventional database environments since they involve the search of large numbers of records. The Datacycle architecture and research prototype is a database environment that uses filtering technology to perform an efficient, exhaustive search of an entire database. It has recently been modified to include fuzzy predicates in its query processing. The approach obviates the need for complex index structures, provides unlimited query throughput, permits the use of ad-hoc fuzzy membership functions, and provides a deterministic response time largely independent of query complexity and load. This paper describes the Datacycle prototype implementation of fuzzy queries and some recent performance results.

  16. Effective Route Maintenance and Restoration Schemes in Mobile Ad Hoc Networks

    PubMed Central

    Kang, Byung-Seok; Ko, In-Young

    2010-01-01

    This study proposes a location-based hybrid routing protocol to improve data packet delivery and to reduce control message overhead in mobile ad hoc networks. In mobile environments, where nodes move continuously at a high speed, it is generally difficult to maintain and restore route paths. Therefore, this study suggests a new flooding mechanism to control route paths. The essence of the proposed scheme is its effective tracking of the destination’s location based on the beacon messages of the main route nodes. Through experiments based on an NS-2 simulator, the proposed scheme shows improvements in the data packet delivery ratio and reduces the amount of routing control message overhead compared with existing routing protocols such as AODV, LAR, ZRP and AODV-DFR. PMID:22315570

  17. Analysis of a distributed algorithm to determine multiple routes with path diversity in ad hoc networks.

    SciTech Connect

    Ghosal, Dipak; Mueller, Stephen Ng

    2005-04-01

    With multipath routing in mobile ad hoc networks (MANETs), a source can establish multiple routes to a destination for routing data. In MANETs, mulitpath routing can be used to provide route resilience, smaller end-to-end delay, and better load balancing. However, when the multiple paths are close together, transmissions of different paths may interfere with each other, causing degradation in performance. Besides interference, the physical diversity of paths also improves fault tolerance. We present a purely distributed multipath protocol based on the AODV-Multipath (AODVM) protocol called AODVM with Path Diversity (AODVM/PD) that finds multiple paths with a desired degree of correlation between paths specified as an input parameter to the algorithm. We demonstrate through detailed simulation analysis that multiple paths with low degree of correlation determined by AODVM/PD provides both smaller end-to-end delay than AODVM in networks with low mobility and better route resilience in the presence of correlated node failures.

  18. Opportunistic Hybrid Transport Protocol (OHTP) for Cognitive Radio Ad Hoc Sensor Networks

    PubMed Central

    Zikria, Yousaf Bin; Nosheen, Summera; Ishmanov, Farruh; Kim, Sung Won

    2015-01-01

    The inefficient assignment of spectrum for different communications purposes, plus technology enhancements and ever-increasing usage of wireless technology is causing spectrum scarcity. To address this issue, one of the proposed solutions in the literature is to access the spectrum dynamically or opportunistically. Therefore, the concept of cognitive radio appeared, which opens up a new research paradigm. There is extensive research on the physical, medium access control and network layers. The impact of the transport layer on the performance of cognitive radio ad hoc sensor networks is still unknown/unexplored. The Internet’s de facto transport protocol is not well suited to wireless networks because of its congestion control mechanism. We propose an opportunistic hybrid transport protocol for cognitive radio ad hoc sensor networks. We developed a new congestion control mechanism to differentiate true congestion from interruption loss. After such detection and differentiation, we propose methods to handle them opportunistically. There are several benefits to window- and rate-based protocols. To exploit the benefits of both in order to enhance overall system performance, we propose a hybrid transport protocol. We empirically calculate the optimal threshold value to switch between window- and rate-based mechanisms. We then compare our proposed transport protocol to Transmission Control Protocol (TCP)-friendly rate control, TCP-friendly rate control for cognitive radio, and TCP-friendly window-based control. We ran an extensive set of simulations in Network Simulator 2. The results indicate that the proposed transport protocol performs better than all the others. PMID:26694396

  19. 79 FR 5415 - Meeting of the Community Preventive Services Task Force (Task Force)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2014-01-31

    ... systematic reviews of the scientific evidence on which they are based, are compiled in the Guide to Community... Force. During its meetings, the Task Force considers the findings of systematic reviews on existing... meeting is for the Task Force to consider the findings of systematic reviews and issue findings...

  20. 80 FR 51565 - Meeting of the Community Preventive Services Task Force (Task Force)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2015-08-25

    ... the systematic reviews of the scientific evidence on which they are based, are compiled in the Guide... Force. During its meetings, the Task Force considers the findings of systematic reviews on existing... purpose of the meeting is for the Task Force to consider the findings of systematic reviews and...

  1. An artificial immune system for securing mobile ad hoc networks against intrusion attacks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2003-08-01

    To mitigate the problem of intrusion attacks by malicious nodes in mobile ad hoc networks (MANETs), security attributes and quantifiable trust levels, unique to the MANET's transient, self-organizing topology, augment or replace traditional protocol metrics of throughput, packet delay and hop-count in the ad hoc route discovery procedures. The new features are unique to the candidate security protocol, which views security as a quality metric to improve the relevance of the routes discovered by established reactive ad hoc routing protocols. Attributes of a secure route are identified in order to define the appropriate metrics to quantify the "level of security" associated with the protocol messaging and the detection of malicious activities by some intrusive nodes. A state vector of features and metrics based on the published Secure Routing Protocol (SRP) for MANETs is constructed to encode network security characteristics. This route discovery protocol mitigates the detrimental effects of various malicious behaviors to provide trustworthy connectivity information. The protocol ensures that fabricated, compromised, or replayed route replies would either be rejected or never reach the querying source node. In this paper, the pattern of values, taken by the state vector of the SRP features in the route request, discovery and reply operations, are analyzed to detect evidence of intrusion attacks by malicious nodes that could lead to denial of service and network shutdown. The pattern analysis applies a technique based on negative selection found in natural immune systems that can detect extraneous patterns in the (nonself) space that is the complement of vector values associated with correct route discovery and route maintenance. The immune system is well-suited to the distributed nature of the MANET. It does not rely on a central controller, but instead uses a distributed detection and response mechanism in order to respond to foreign invaders, mirroring the

  2. A maintenance scheme of communication link in mobile robot ad hoc networks based on potential field

    NASA Astrophysics Data System (ADS)

    Jiang, Hong; Jin, WenPing; Yang, GyoYing; Li, LeiMin

    2007-12-01

    Maintaining communication link in mobile robot networks between task robots and a control center is very important in some urgent application occasions such as remote danger detections. To offer a reliable multi-hop communication link, a link maintaining scheme based on artificial potential field is presented. The scheme is achieved by a task robot and communication relay ones. The task robot performs predefined tasks, and relay ones are simple robots which form a communication relay chain. When robots move towards destination in formation, a kind of attractive force created by communication quality is added to traditional potential field, and relay robots follow the task robot and automatically stop at adequate locations to form a relay chain from the control station to the task robot. In order to increase relay usage efficiency, when some relays are replaced by other short cut relays, the redundant relays can be reused by initiating another moving toward specified location. Simulation results show that the scheme can provide a reliable multi-hop communication link, and that the communication connection can be obtained through minimal number of relays.

  3. Virtual machine-based simulation platform for mobile ad-hoc network-based cyber infrastructure

    DOE PAGES

    Yoginath, Srikanth B.; Perumalla, Kayla S.; Henz, Brian J.

    2015-09-29

    In modeling and simulating complex systems such as mobile ad-hoc networks (MANETs) in de-fense communications, it is a major challenge to reconcile multiple important considerations: the rapidity of unavoidable changes to the software (network layers and applications), the difficulty of modeling the critical, implementation-dependent behavioral effects, the need to sustain larger scale scenarios, and the desire for faster simulations. Here we present our approach in success-fully reconciling them using a virtual time-synchronized virtual machine(VM)-based parallel ex-ecution framework that accurately lifts both the devices as well as the network communications to a virtual time plane while retaining full fidelity. At themore » core of our framework is a scheduling engine that operates at the level of a hypervisor scheduler, offering a unique ability to execute multi-core guest nodes over multi-core host nodes in an accurate, virtual time-synchronized manner. In contrast to other related approaches that suffer from either speed or accuracy issues, our framework provides MANET node-wise scalability, high fidelity of software behaviors, and time-ordering accuracy. The design and development of this framework is presented, and an ac-tual implementation based on the widely used Xen hypervisor system is described. Benchmarks with synthetic and actual applications are used to identify the benefits of our approach. The time inaccuracy of traditional emulation methods is demonstrated, in comparison with the accurate execution of our framework verified by theoretically correct results expected from analytical models of the same scenarios. In the largest high fidelity tests, we are able to perform virtual time-synchronized simulation of 64-node VM-based full-stack, actual software behaviors of MANETs containing a mix of static and mobile (unmanned airborne vehicle) nodes, hosted on a 32-core host, with full fidelity of unmodified ad-hoc routing protocols, unmodified

  4. Virtual machine-based simulation platform for mobile ad-hoc network-based cyber infrastructure

    SciTech Connect

    Yoginath, Srikanth B.; Perumalla, Kayla S.; Henz, Brian J.

    2015-09-29

    In modeling and simulating complex systems such as mobile ad-hoc networks (MANETs) in de-fense communications, it is a major challenge to reconcile multiple important considerations: the rapidity of unavoidable changes to the software (network layers and applications), the difficulty of modeling the critical, implementation-dependent behavioral effects, the need to sustain larger scale scenarios, and the desire for faster simulations. Here we present our approach in success-fully reconciling them using a virtual time-synchronized virtual machine(VM)-based parallel ex-ecution framework that accurately lifts both the devices as well as the network communications to a virtual time plane while retaining full fidelity. At the core of our framework is a scheduling engine that operates at the level of a hypervisor scheduler, offering a unique ability to execute multi-core guest nodes over multi-core host nodes in an accurate, virtual time-synchronized manner. In contrast to other related approaches that suffer from either speed or accuracy issues, our framework provides MANET node-wise scalability, high fidelity of software behaviors, and time-ordering accuracy. The design and development of this framework is presented, and an ac-tual implementation based on the widely used Xen hypervisor system is described. Benchmarks with synthetic and actual applications are used to identify the benefits of our approach. The time inaccuracy of traditional emulation methods is demonstrated, in comparison with the accurate execution of our framework verified by theoretically correct results expected from analytical models of the same scenarios. In the largest high fidelity tests, we are able to perform virtual time-synchronized simulation of 64-node VM-based full-stack, actual software behaviors of MANETs containing a mix of static and mobile (unmanned airborne vehicle) nodes, hosted on a 32-core host, with full fidelity of unmodified ad-hoc routing protocols, unmodified application

  5. Characterizing the Interaction Between Routing and MAC Protocols in Ad-Hoc Networks

    SciTech Connect

    Barrett, C. L.; Drozda, M.; Marathe, A.; Marathe, M. V.

    2002-01-01

    We empirically study the effect of mobility on the performance of protocols designed for wireless ad-hoc networks. An important objective is to study the interaction of the Routing and MAC layer protocols under different mobility parameters. We use three basic mobility models: grid mobility model, random waypoint model, and exponential correlated random model. The performance of protocols is measured in terms of (i) latency, (ii) throughput, (iii) number of packets received, (iv) long term fairness and (v) number of control packets at the MAC and routing layer level. Three different commonly studied routing protocols are used: AODV, DSR and LAR1. Similarly three well known MAC protocols are used: MACA, 802.1 1 and CSMA. Our main contribution is simulation based experiments coupled with rigorous statistical analysis to characterize the interaction of MAC layer protocols with routing layer protocols in ad-hoc networks. From the results, we can conclude the following: e No single MAC or Routing protocol dominated the other protocols in their class. Probably more interestingly, no MAURouting protocol combination was better than other combinations over all scenarios and response variables. 0 In general, it is not meaningful to speak about a MAC or a routing protocol in isolation. Presence of interaction leads to trade-offs between the amount of control packets generated by each layer. The results raise the possibility of improving the performance of a particular MAC layer protocol by using a cleverly designed routing protocol or vice-versa. Thus in order to improve the performanceof a communication network, it is important to study the entire protocol stack as a single algorithmic construct; optimizing individual layers in the seven layer OS1 stack will not yield performance improvements beyond a point. A methodological contribution of this paper is the use of statistical methods such as analysis of variance (ANOVA), to characterize the interaction between the protocols

  6. Federal Government Printing and Publishing: Policy Issues. Report of the Ad Hoc Advisory Committee on Revision of Title 44.

    ERIC Educational Resources Information Center

    Joint Committee on Printing, Washington, DC.

    Designed to present a better understanding of the government's system of printing and distributing information and to highlight problems, alternatives, and important policy questions, this report synthesizes 13 weeks of the Ad Hoc Advisory Committee hearings on six topics: (1) Administration of policy--who should establish and administer policy in…

  7. Ad Hoc Conference on the Education of Migrants: Conclusions and Recommendations (Strasbourg, France, November 5-8, 1974).

    ERIC Educational Resources Information Center

    Council of Europe, Strasbourg (France). Documentation Center for Education in Europe.

    The 9th session of the Ad Hoc Conference on the Education of Migrants had 3 themes. Theme I was "measures to improve the position of immigrants and their families, primarily in respect of their educational circumstances, at the time of arrival in the host country." The second theme was "measures to secure satisfactory educational provision before…

  8. Future Information Services at the Texas A&M University Library: Background and Recommendations (Report of an Ad Hoc Committee).

    ERIC Educational Resources Information Center

    Cook, Colleen; And Others

    The Ad Hoc Committee on Future Information Services explored possible future directions for information services at Texas A&M University Library and developed a plan to guide the library into the next decade in terms of automated access to information. In exploring future directions for automated information services, the committee members…

  9. Community hoarding task forces: a comparative case study of five task forces in the United States.

    PubMed

    Bratiotis, Christiana

    2013-05-01

    During the past decade, many community task forces have formed to address hoarding problems that come to public attention. Such task forces provide a societal-level intervention to assist people with the most severe cases of hoarding, who do not voluntarily seek or want help for their hoarding behaviour. This qualitative study of five U.S. hoarding task forces included sites selected for their diversity of purpose, approaches to hoarding intervention and community geography, composition and resources. Data were collected during the period of September 2007-March 2008. The case study methodology used multiple forms of data, including semi-structured interviews, analysis of documents, small group interviews and investigator observation. This study captured the perspectives of public and private sector service providers such as mental health, housing, social service, public health agencies and community enforcement organisations (fire, police, legal, animal control) to examine how task forces organise and operate and the emerging practice and policy changes. Study findings suggest that structural factors (e.g. leadership, purpose, funding and membership) impact hoarding task force viability, that participation on a task force influences practice and policy decisions about hoarding, and that social work can expand its role in task force leadership. Task forces may be a mechanism for improving community policies about hoarding and mechanisms for addressing other social problems across multiple sectors. PMID:23199135

  10. 78 FR 59939 - Meeting of the Community Preventive Services Task Force (Task Force)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-30

    ... FR Doc. 2013- 22581, on page 57161, in the third column, correct the FOR FURTHER INFORMATION CONTACT...-498-6876, email: CPSTF@cdc.gov . In the Federal Register of September 17, 2013, in FR Doc. 2013- 22581..., announcing the next meeting of the Community Preventive Services Task Force (Task Force). The document...

  11. Community hoarding task forces: a comparative case study of five task forces in the United States.

    PubMed

    Bratiotis, Christiana

    2013-05-01

    During the past decade, many community task forces have formed to address hoarding problems that come to public attention. Such task forces provide a societal-level intervention to assist people with the most severe cases of hoarding, who do not voluntarily seek or want help for their hoarding behaviour. This qualitative study of five U.S. hoarding task forces included sites selected for their diversity of purpose, approaches to hoarding intervention and community geography, composition and resources. Data were collected during the period of September 2007-March 2008. The case study methodology used multiple forms of data, including semi-structured interviews, analysis of documents, small group interviews and investigator observation. This study captured the perspectives of public and private sector service providers such as mental health, housing, social service, public health agencies and community enforcement organisations (fire, police, legal, animal control) to examine how task forces organise and operate and the emerging practice and policy changes. Study findings suggest that structural factors (e.g. leadership, purpose, funding and membership) impact hoarding task force viability, that participation on a task force influences practice and policy decisions about hoarding, and that social work can expand its role in task force leadership. Task forces may be a mechanism for improving community policies about hoarding and mechanisms for addressing other social problems across multiple sectors.

  12. Managing daily intensive care activities: An observational study concerning ad hoc decision making of charge nurses and intensivists

    PubMed Central

    2011-01-01

    Introduction Management of daily activities in ICUs is challenging. ICU shift leaders, charge nurses and intensivists have to make several immediate ad hoc decisions to enable the fluent flow of ICU activities. Even though the management of ICU activities is quite well delineated by international consensus guidelines, we know only a little about the content of the real clinical decision making of ICU shift leaders. Methods We conducted an observational study with the think-aloud technique to describe the ad hoc decision making of ICU shift leaders. The study was performed in two university-affiliated hospital ICUs. Twelve charge nurses and eight intensivists were recruited. Observations were recorded and transcribed for qualitative content analysis using the protocol analysis method. The software program NVivo 7 was used to manage the data. The interrater agreement was assessed with percentages and by Cohen's κ. Results We identified 463 ad hoc decisions made by the charge nurses and 444 made by the intensivists. During our data collection time, this breaks down to over 230 immediately made decisions per day (24 hours). We divided the ad hoc decision making of ICU shift leaders into two types: process-focused and situation-focused. Process-focused decision making included more permanent information, such as human resources, know-how and material resources, whereas situation-focused decision making included decisions about single events, such as patient admission. We named eight different categories for ICU ad hoc decision making: (1) adverse events, (2) diagnostics, (3) human resources and know-how, (4) material resources, (5) patient admission, (6) patient discharge, (7) patient information and vital signs and (8) special treatments. Conclusions ICU shift leaders make a great number of complex ad hoc decisions throughout the day. Often this decision making involves both intensivists and charge nurses. It forms a bundle that requires versatile, immediate

  13. An adaptive neural swarm approach for intrusion defense in ad hoc networks

    NASA Astrophysics Data System (ADS)

    Cannady, James

    2011-06-01

    Wireless sensor networks (WSN) and mobile ad hoc networks (MANET) are being increasingly deployed in critical applications due to the flexibility and extensibility of the technology. While these networks possess numerous advantages over traditional wireless systems in dynamic environments they are still vulnerable to many of the same types of host-based and distributed attacks common to those systems. Unfortunately, the limited power and bandwidth available in WSNs and MANETs, combined with the dynamic connectivity that is a defining characteristic of the technology, makes it extremely difficult to utilize traditional intrusion detection techniques. This paper describes an approach to accurately and efficiently detect potentially damaging activity in WSNs and MANETs. It enables the network as a whole to recognize attacks, anomalies, and potential vulnerabilities in a distributive manner that reflects the autonomic processes of biological systems. Each component of the network recognizes activity in its local environment and then contributes to the overall situational awareness of the entire system. The approach utilizes agent-based swarm intelligence to adaptively identify potential data sources on each node and on adjacent nodes throughout the network. The swarm agents then self-organize into modular neural networks that utilize a reinforcement learning algorithm to identify relevant behavior patterns in the data without supervision. Once the modular neural networks have established interconnectivity both locally and with neighboring nodes the analysis of events within the network can be conducted collectively in real-time. The approach has been shown to be extremely effective in identifying distributed network attacks.

  14. Ad Hoc modeling, expert problem solving, and R&T program evaluation

    NASA Technical Reports Server (NTRS)

    Silverman, B. G.; Liebowitz, J.; Moustakis, V. S.

    1983-01-01

    A simplified cost and time (SCAT) analysis program utilizing personal-computer technology is presented and demonstrated in the case of the NASA-Goddard end-to-end data system. The difficulties encountered in implementing complex program-selection and evaluation models in the research and technology field are outlined. The prototype SCAT system described here is designed to allow user-friendly ad hoc modeling in real time and at low cost. A worksheet constructed on the computer screen displays the critical parameters and shows how each is affected when one is altered experimentally. In the NASA case, satellite data-output and control requirements, ground-facility data-handling capabilities, and project priorities are intricately interrelated. Scenario studies of the effects of spacecraft phaseout or new spacecraft on throughput and delay parameters are shown. The use of a network of personal computers for higher-level coordination of decision-making processes is suggested, as a complement or alternative to complex large-scale modeling.

  15. A Sensitive Secondary Users Selection Algorithm for Cognitive Radio Ad Hoc Networks

    PubMed Central

    Li, Aohan; Han, Guangjie; Wan, Liangtian; Shu, Lei

    2016-01-01

    Secondary Users (SUs) are allowed to use the temporarily unused licensed spectrum without disturbing Primary Users (PUs) in Cognitive Radio Ad Hoc Networks (CRAHNs). Existing architectures for CRAHNs impose energy-consuming Cognitive Radios (CRs) on SUs. However, the advanced CRs will increase energy cost for their cognitive functionalities, which is undesirable for the battery powered devices. A new architecture referred to as spectral Requirement-based CRAHN (RCRAHN) is proposed to enhance energy efficiency for CRAHNs in this paper. In RCRAHNs, only parts of SUs are equipped with CRs. SUs equipped with CRs are referred to as Cognitive Radio Users (CRUs). To further enhance energy efficiency of CRAHNs, we aim to select minimum CRUs to sense available spectrum. A non-linear programming problem is mathematically formulated under the constraints of energy efficiency and real-time. Considering the NP-hardness of the problem, a framework of a heuristic algorithm referred to as Sensitive Secondary Users Selection (SSUS) was designed to compute the near-optimal solutions. The simulation results demonstrate that SSUS not only improves the energy efficiency, but also achieves satisfied performances in end-to-end delay and communication reliability. PMID:27023562

  16. A Sensitive Secondary Users Selection Algorithm for Cognitive Radio Ad Hoc Networks.

    PubMed

    Li, Aohan; Han, Guangjie; Wan, Liangtian; Shu, Lei

    2016-01-01

    Secondary Users (SUs) are allowed to use the temporarily unused licensed spectrum without disturbing Primary Users (PUs) in Cognitive Radio Ad Hoc Networks (CRAHNs). Existing architectures for CRAHNs impose energy-consuming Cognitive Radios (CRs) on SUs. However, the advanced CRs will increase energy cost for their cognitive functionalities, which is undesirable for the battery powered devices. A new architecture referred to as spectral Requirement-based CRAHN (RCRAHN) is proposed to enhance energy efficiency for CRAHNs in this paper. In RCRAHNs, only parts of SUs are equipped with CRs. SUs equipped with CRs are referred to as Cognitive Radio Users (CRUs). To further enhance energy efficiency of CRAHNs, we aim to select minimum CRUs to sense available spectrum. A non-linear programming problem is mathematically formulated under the constraints of energy efficiency and real-time. Considering the NP-hardness of the problem, a framework of a heuristic algorithm referred to as Sensitive Secondary Users Selection (SSUS) was designed to compute the near-optimal solutions. The simulation results demonstrate that SSUS not only improves the energy efficiency, but also achieves satisfied performances in end-to-end delay and communication reliability. PMID:27023562

  17. Dynamic Agent Classification and Tracking Using an Ad Hoc Mobile Acoustic Sensor Network

    NASA Astrophysics Data System (ADS)

    Friedlander, David; Griffin, Christopher; Jacobson, Noah; Phoha, Shashi; Brooks, Richard R.

    2003-12-01

    Autonomous networks of sensor platforms can be designed to interact in dynamic and noisy environments to determine the occurrence of specified transient events that define the dynamic process of interest. For example, a sensor network may be used for battlefield surveillance with the purpose of detecting, identifying, and tracking enemy activity. When the number of nodes is large, human oversight and control of low-level operations is not feasible. Coordination and self-organization of multiple autonomous nodes is necessary to maintain connectivity and sensor coverage and to combine information for better understanding the dynamics of the environment. Resource conservation requires adaptive clustering in the vicinity of the event. This paper presents methods for dynamic distributed signal processing using an ad hoc mobile network of microsensors to detect, identify, and track targets in noisy environments. They seamlessly integrate data from fixed and mobile platforms and dynamically organize platforms into clusters to process local data along the trajectory of the targets. Local analysis of sensor data is used to determine a set of target attribute values and classify the target. Sensor data from a field test in the Marine base at Twentynine Palms, Calif, was analyzed using the techniques described in this paper. The results were compared to "ground truth" data obtained from GPS receivers on the vehicles.

  18. Securing mobile ad hoc networks using danger theory-based artificial immune algorithm.

    PubMed

    Abdelhaq, Maha; Alsaqour, Raed; Abdelhaq, Shawkat

    2015-01-01

    A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs. PMID:25946001

  19. Integration of Body Sensor Networks and Vehicular Ad-hoc Networks for Traffic Safety.

    PubMed

    Reyes-Muñoz, Angelica; Domingo, Mari Carmen; López-Trinidad, Marco Antonio; Delgado, José Luis

    2016-01-01

    The emergence of Body Sensor Networks (BSNs) constitutes a new and fast growing trend for the development of daily routine applications. However, in the case of heterogeneous BSNs integration with Vehicular ad hoc Networks (VANETs) a large number of difficulties remain, that must be solved, especially when talking about the detection of human state factors that impair the driving of motor vehicles. The main contributions of this investigation are principally three: (1) an exhaustive review of the current mechanisms to detect four basic physiological behavior states (drowsy, drunk, driving under emotional state disorders and distracted driving) that may cause traffic accidents is presented; (2) A middleware architecture is proposed. This architecture can communicate with the car dashboard, emergency services, vehicles belonging to the VANET and road or street facilities. This architecture seeks on the one hand to improve the car driving experience of the driver and on the other hand to extend security mechanisms for the surrounding individuals; and (3) as a proof of concept, an Android real-time attention low level detection application that runs in a next-generation smartphone is developed. The application features mechanisms that allow one to measure the degree of attention of a driver on the base of her/his EEG signals, establish wireless communication links via various standard wireless means, GPRS, Bluetooth and WiFi and issue alarms of critical low driver attention levels. PMID:26784204

  20. Securing Mobile Ad Hoc Networks Using Danger Theory-Based Artificial Immune Algorithm

    PubMed Central

    2015-01-01

    A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs. PMID:25946001

  1. Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks

    PubMed Central

    Paramasivan, B.; Kaliappan, M.

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP. PMID:25143986

  2. Integration of Body Sensor Networks and Vehicular Ad-hoc Networks for Traffic Safety

    PubMed Central

    Reyes-Muñoz, Angelica; Domingo, Mari Carmen; López-Trinidad, Marco Antonio; Delgado, José Luis

    2016-01-01

    The emergence of Body Sensor Networks (BSNs) constitutes a new and fast growing trend for the development of daily routine applications. However, in the case of heterogeneous BSNs integration with Vehicular ad hoc Networks (VANETs) a large number of difficulties remain, that must be solved, especially when talking about the detection of human state factors that impair the driving of motor vehicles. The main contributions of this investigation are principally three: (1) an exhaustive review of the current mechanisms to detect four basic physiological behavior states (drowsy, drunk, driving under emotional state disorders and distracted driving) that may cause traffic accidents is presented; (2) A middleware architecture is proposed. This architecture can communicate with the car dashboard, emergency services, vehicles belonging to the VANET and road or street facilities. This architecture seeks on the one hand to improve the car driving experience of the driver and on the other hand to extend security mechanisms for the surrounding individuals; and (3) as a proof of concept, an Android real-time attention low level detection application that runs in a next-generation smartphone is developed. The application features mechanisms that allow one to measure the degree of attention of a driver on the base of her/his EEG signals, establish wireless communication links via various standard wireless means, GPRS, Bluetooth and WiFi and issue alarms of critical low driver attention levels. PMID:26784204

  3. Energy Efficient Link Aware Routing with Power Control in Wireless Ad Hoc Networks.

    PubMed

    Katiravan, Jeevaa; Sylvia, D; Rao, D Srinivasa

    2015-01-01

    In wireless ad hoc networks, the traditional routing protocols make the route selection based on minimum distance between the nodes and the minimum number of hop counts. Most of the routing decisions do not consider the condition of the network such as link quality and residual energy of the nodes. Also, when a link failure occurs, a route discovery mechanism is initiated which incurs high routing overhead. If the broadcast nature and the spatial diversity of the wireless communication are utilized efficiently it becomes possible to achieve improvement in the performance of the wireless networks. In contrast to the traditional routing scheme which makes use of a predetermined route for packet transmission, such an opportunistic routing scheme defines a predefined forwarding candidate list formed by using single network metrics. In this paper, a protocol is proposed which uses multiple metrics such as residual energy and link quality for route selection and also includes a monitoring mechanism which initiates a route discovery for a poor link, thereby reducing the overhead involved and improving the throughput of the network while maintaining network connectivity. Power control is also implemented not only to save energy but also to improve the network performance. Using simulations, we show the performance improvement attained in the network in terms of packet delivery ratio, routing overhead, and residual energy of the network.

  4. Securing mobile ad hoc networks using danger theory-based artificial immune algorithm.

    PubMed

    Abdelhaq, Maha; Alsaqour, Raed; Abdelhaq, Shawkat

    2015-01-01

    A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs.

  5. Standardization of negative controls in diagnostic immunohistochemistry: recommendations from the international ad hoc expert panel.

    PubMed

    Torlakovic, Emina E; Francis, Glenn; Garratt, John; Gilks, Blake; Hyjek, Elizabeth; Ibrahim, Merdol; Miller, Rodney; Nielsen, Søren; Petcu, Eugen B; Swanson, Paul E; Taylor, Clive R; Vyberg, Mogens

    2014-04-01

    Standardization of controls, both positive and negative controls, is needed for diagnostic immunohistochemistry (dIHC). The use of IHC-negative controls, irrespective of type, although well established, is not standardized. As such, the relevance and applicability of negative controls continues to challenge both pathologists and laboratory budgets. Despite the clear theoretical notion that appropriate controls serve to demonstrate the sensitivity and specificity of the dIHC test, it remains unclear which types of positive and negative controls are applicable and/or useful in day-to-day clinical practice. There is a perceived need to provide "best practice recommendations" for the use of negative controls. This perception is driven not only by logistics and cost issues, but also by increased pressure for accurate IHC testing, especially when IHC is performed for predictive markers, the number of which is rising as personalized medicine continues to develop. Herein, an international ad hoc expert panel reviews classification of negative controls relevant to clinical practice, proposes standard terminology for negative controls, considers the total evidence of IHC specificity that is available to pathologists, and develops a set of recommendations for the use of negative controls in dIHC based on "fit-for-use" principles.

  6. A DNA-Inspired Encryption Methodology for Secure, Mobile Ad Hoc Networks

    NASA Technical Reports Server (NTRS)

    Shaw, Harry

    2012-01-01

    Users are pushing for greater physical mobility with their network and Internet access. Mobile ad hoc networks (MANET) can provide an efficient mobile network architecture, but security is a key concern. A figure summarizes differences in the state of network security for MANET and fixed networks. MANETs require the ability to distinguish trusted peers, and tolerate the ingress/egress of nodes on an unscheduled basis. Because the networks by their very nature are mobile and self-organizing, use of a Public Key Infra structure (PKI), X.509 certificates, RSA, and nonce ex changes becomes problematic if the ideal of MANET is to be achieved. Molecular biology models such as DNA evolution can provide a basis for a proprietary security architecture that achieves high degrees of diffusion and confusion, and resistance to cryptanalysis. A proprietary encryption mechanism was developed that uses the principles of DNA replication and steganography (hidden word cryptography) for confidentiality and authentication. The foundation of the approach includes organization of coded words and messages using base pairs organized into genes, an expandable genome consisting of DNA-based chromosome keys, and a DNA-based message encoding, replication, and evolution and fitness. In evolutionary computing, a fitness algorithm determines whether candidate solutions, in this case encrypted messages, are sufficiently encrypted to be transmitted. The technology provides a mechanism for confidential electronic traffic over a MANET without a PKI for authenticating users.

  7. A Game Theory Algorithm for Intra-Cluster Data Aggregation in a Vehicular Ad Hoc Network.

    PubMed

    Chen, Yuzhong; Weng, Shining; Guo, Wenzhong; Xiong, Naixue

    2016-01-01

    Vehicular ad hoc networks (VANETs) have an important role in urban management and planning. The effective integration of vehicle information in VANETs is critical to traffic analysis, large-scale vehicle route planning and intelligent transportation scheduling. However, given the limitations in the precision of the output information of a single sensor and the difficulty of information sharing among various sensors in a highly dynamic VANET, effectively performing data aggregation in VANETs remains a challenge. Moreover, current studies have mainly focused on data aggregation in large-scale environments but have rarely discussed the issue of intra-cluster data aggregation in VANETs. In this study, we propose a multi-player game theory algorithm for intra-cluster data aggregation in VANETs by analyzing the competitive and cooperative relationships among sensor nodes. Several sensor-centric metrics are proposed to measure the data redundancy and stability of a cluster. We then study the utility function to achieve efficient intra-cluster data aggregation by considering both data redundancy and cluster stability. In particular, we prove the existence of a unique Nash equilibrium in the game model, and conduct extensive experiments to validate the proposed algorithm. Results demonstrate that the proposed algorithm has advantages over typical data aggregation algorithms in both accuracy and efficiency. PMID:26907272

  8. A Sensitive Secondary Users Selection Algorithm for Cognitive Radio Ad Hoc Networks.

    PubMed

    Li, Aohan; Han, Guangjie; Wan, Liangtian; Shu, Lei

    2016-03-26

    Secondary Users (SUs) are allowed to use the temporarily unused licensed spectrum without disturbing Primary Users (PUs) in Cognitive Radio Ad Hoc Networks (CRAHNs). Existing architectures for CRAHNs impose energy-consuming Cognitive Radios (CRs) on SUs. However, the advanced CRs will increase energy cost for their cognitive functionalities, which is undesirable for the battery powered devices. A new architecture referred to as spectral Requirement-based CRAHN (RCRAHN) is proposed to enhance energy efficiency for CRAHNs in this paper. In RCRAHNs, only parts of SUs are equipped with CRs. SUs equipped with CRs are referred to as Cognitive Radio Users (CRUs). To further enhance energy efficiency of CRAHNs, we aim to select minimum CRUs to sense available spectrum. A non-linear programming problem is mathematically formulated under the constraints of energy efficiency and real-time. Considering the NP-hardness of the problem, a framework of a heuristic algorithm referred to as Sensitive Secondary Users Selection (SSUS) was designed to compute the near-optimal solutions. The simulation results demonstrate that SSUS not only improves the energy efficiency, but also achieves satisfied performances in end-to-end delay and communication reliability.

  9. A Game Theory Algorithm for Intra-Cluster Data Aggregation in a Vehicular Ad Hoc Network.

    PubMed

    Chen, Yuzhong; Weng, Shining; Guo, Wenzhong; Xiong, Naixue

    2016-02-19

    Vehicular ad hoc networks (VANETs) have an important role in urban management and planning. The effective integration of vehicle information in VANETs is critical to traffic analysis, large-scale vehicle route planning and intelligent transportation scheduling. However, given the limitations in the precision of the output information of a single sensor and the difficulty of information sharing among various sensors in a highly dynamic VANET, effectively performing data aggregation in VANETs remains a challenge. Moreover, current studies have mainly focused on data aggregation in large-scale environments but have rarely discussed the issue of intra-cluster data aggregation in VANETs. In this study, we propose a multi-player game theory algorithm for intra-cluster data aggregation in VANETs by analyzing the competitive and cooperative relationships among sensor nodes. Several sensor-centric metrics are proposed to measure the data redundancy and stability of a cluster. We then study the utility function to achieve efficient intra-cluster data aggregation by considering both data redundancy and cluster stability. In particular, we prove the existence of a unique Nash equilibrium in the game model, and conduct extensive experiments to validate the proposed algorithm. Results demonstrate that the proposed algorithm has advantages over typical data aggregation algorithms in both accuracy and efficiency.

  10. Energy-efficient algorithm for broadcasting in ad hoc wireless sensor networks.

    PubMed

    Xiong, Naixue; Huang, Xingbo; Cheng, Hongju; Wan, Zheng

    2013-04-12

    Broadcasting is a common and basic operation used to support various network protocols in wireless networks. To achieve energy-efficient broadcasting is especially important for ad hoc wireless sensor networks because sensors are generally powered by batteries with limited lifetimes. Energy consumption for broadcast operations can be reduced by minimizing the number of relay nodes based on the observation that data transmission processes consume more energy than data reception processes in the sensor nodes, and how to improve the network lifetime is always an interesting issue in sensor network research. The minimum-energy broadcast problem is then equivalent to the problem of finding the minimum Connected Dominating Set (CDS) for a connected graph that is proved NP-complete. In this paper, we introduce an Efficient Minimum CDS algorithm (EMCDS) with help of a proposed ordered sequence list. EMCDS does not concern itself with node energy and broadcast operations might fail if relay nodes are out of energy. Next we have proposed a Minimum Energy-consumption Broadcast Scheme (MEBS) with a modified version of EMCDS, and aimed at providing an efficient scheduling scheme with maximized network lifetime. The simulation results show that the proposed EMCDS algorithm can find smaller CDS compared with related works, and the MEBS can help to increase the network lifetime by efficiently balancing energy among nodes in the networks.

  11. Data Delivery Method Based on Neighbor Nodes' Information in a Mobile Ad Hoc Network

    PubMed Central

    Hayashi, Takuma; Taenaka, Yuzo; Okuda, Takeshi; Yamaguchi, Suguru

    2014-01-01

    This paper proposes a data delivery method based on neighbor nodes' information to achieve reliable communication in a mobile ad hoc network (MANET). In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE), Chachulski et al. (2007), improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow. PMID:24672371

  12. Data delivery method based on neighbor nodes' information in a mobile ad hoc network.

    PubMed

    Kashihara, Shigeru; Hayashi, Takuma; Taenaka, Yuzo; Okuda, Takeshi; Yamaguchi, Suguru

    2014-01-01

    This paper proposes a data delivery method based on neighbor nodes' information to achieve reliable communication in a mobile ad hoc network (MANET). In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE), Chachulski et al. (2007), improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow.

  13. Delay-dependent asymptotic stability of mobile ad-hoc networks: A descriptor system approach

    NASA Astrophysics Data System (ADS)

    Yang, Juan; Yang, Dan; Huang, Bin; Zhang, Xiao-Hong; Luo, Jian-Lu

    2014-07-01

    In order to analyze the capacity stability of the time-varying-propagation and delay-dependent of mobile ad-hoc networks (MANETs), in this paper, a novel approach is proposed to explore the capacity asymptotic stability for the delay-dependent of MANETs based on non-cooperative game theory, where the delay-dependent conditions are explicitly taken into consideration. This approach is based on the Lyapunov—Krasovskii stability theory for functional differential equations and the linear matrix inequality (LMI) technique. A corresponding Lyapunov—Krasovskii functional is introduced for the stability analysis of this system with use of the descriptor and “neutral-type” model transformation without producing any additional dynamics. The delay-dependent stability criteria are derived for this system. Conditions are given in terms of linear matrix inequalities, and for the first time referred to neutral systems with the time-varying propagation and delay-dependent stability for capacity analysis of MANETs. The proposed criteria are less conservative since they are based on an equivalent model transformation. Furthermore, we also provide an effective and efficient iterative algorithm to solve the constrained stability control model. Simulation experiments have verified the effectiveness and efficiency of our algorithm.

  14. An Ad-hoc Satellite Network to Measure Filamentary Current Structures in the Auroral Zone

    NASA Astrophysics Data System (ADS)

    Nabong, C.; Fritz, T. A.; Semeter, J. L.

    2014-12-01

    An ad-hoc cubesat-based satellite network project known as ANDESITE is under development at Boston University. It aims to develop a dense constellation of easy-to-use, rapidly-deployable low-cost wireless sensor nodes in space. The objectives of the project are threefold: 1) Demonstrate viability of satellite based sensor networks by deploying an 8-node miniature sensor network to study the filamentation of the field aligned currents in the auroral zones of the Earth's magnetosphere. 2) Test the scalability of proposed protocols, including localization techniques, tracking, data aggregation, and routing, for a 3 dimensional wireless sensor network using a "flock" of nodes. 3) Construct a 6U Cube-sat running the Android OS as an integrated constellation manager, data mule and sensor node deplorer. This small network of sensor nodes will resolve current densities at different spatial resolutions in the near-Earth magnetosphere using measurements from magnetometers with 1-nT sensitivities and 0.2 nT/√Hz self-noise. Mapping of these currents will provide new constraints for models of auroral particle acceleration, wave-particle interactions, ionospheric destabilization, and other kinetic processes operating in the low-beta plasma of the near Earth magnetosphere.

  15. Emergency Situation Prediction Mechanism: A Novel Approach for Intelligent Transportation System Using Vehicular Ad Hoc Networks.

    PubMed

    Ganeshkumar, P; Gokulakrishnan, P

    2015-01-01

    In Indian four-lane express highway, millions of vehicles are travelling every day. Accidents are unfortunate and frequently occurring in these highways causing deaths, increase in death toll, and damage to infrastructure. A mechanism is required to avoid such road accidents at the maximum to reduce the death toll. An Emergency Situation Prediction Mechanism, a novel and proactive approach, is proposed in this paper for achieving the best of Intelligent Transportation System using Vehicular Ad Hoc Network. ESPM intends to predict the possibility of occurrence of an accident in an Indian four-lane express highway. In ESPM, the emergency situation prediction is done by the Road Side Unit based on (i) the Status Report sent by the vehicles in the range of RSU and (ii) the road traffic flow analysis done by the RSU. Once the emergency situation or accident is predicted in advance, an Emergency Warning Message is constructed and disseminated to all vehicles in the area of RSU to alert and prevent the vehicles from accidents. ESPM performs well in emergency situation prediction in advance to the occurrence of an accident. ESPM predicts the emergency situation within 0.20 seconds which is comparatively less than the statistical value. The prediction accuracy of ESPM against vehicle density is found better in different traffic scenarios.

  16. Enhancing the selection of backoff interval using fuzzy logic over wireless Ad Hoc networks.

    PubMed

    Ranganathan, Radha; Kannan, Kathiravan

    2015-01-01

    IEEE 802.11 is the de facto standard for medium access over wireless ad hoc network. The collision avoidance mechanism (i.e., random binary exponential backoff-BEB) of IEEE 802.11 DCF (distributed coordination function) is inefficient and unfair especially under heavy load. In the literature, many algorithms have been proposed to tune the contention window (CW) size. However, these algorithms make every node select its backoff interval between [0, CW] in a random and uniform manner. This randomness is incorporated to avoid collisions among the nodes. But this random backoff interval can change the optimal order and frequency of channel access among competing nodes which results in unfairness and increased delay. In this paper, we propose an algorithm that schedules the medium access in a fair and effective manner. This algorithm enhances IEEE 802.11 DCF with additional level of contention resolution that prioritizes the contending nodes according to its queue length and waiting time. Each node computes its unique backoff interval using fuzzy logic based on the input parameters collected from contending nodes through overhearing. We evaluate our algorithm against IEEE 802.11, GDCF (gentle distributed coordination function) protocols using ns-2.35 simulator and show that our algorithm achieves good performance.

  17. VehiHealth: An Emergency Routing Protocol for Vehicular Ad Hoc Network to Support Healthcare System.

    PubMed

    Bhoi, S K; Khilar, P M

    2016-03-01

    Survival of a patient depends on effective data communication in healthcare system. In this paper, an emergency routing protocol for Vehicular Ad hoc Network (VANET) is proposed to quickly forward the current patient status information from the ambulance to the hospital to provide pre-medical treatment. As the ambulance takes time to reach the hospital, ambulance doctor can provide sudden treatment to the patient in emergency by sending patient status information to the hospital through the vehicles using vehicular communication. Secondly, the experienced doctors respond to the information by quickly sending a treatment information to the ambulance. In this protocol, data is forwarded through that path which has less link breakage problem between the vehicles. This is done by calculating an intersection value I v a l u e for the neighboring intersections by using the current traffic information. Then the data is forwarded through that intersection which has minimum I v a l u e . Simulation results show VehiHealth performs better than P-GEDIR, GyTAR, A-STAR and GSR routing protocols in terms of average end-to-end delay, number of link breakage, path length, and average response time.

  18. Efficient target tracking with an ad-hoc network of omni-directional sensors

    NASA Astrophysics Data System (ADS)

    Atanassov, Kalin

    2015-05-01

    Ad-hoc networks of omni-directional sensors provide an efficient means to obtain low-cost, easily deployed, reliable target tracking systems. To remove target position dependency on the target power, a transformation to another coordinate system is introduced. It can be shown that the problem of sensing target position with omni-directional sensors can be adapted to the conventional Kalman filter framework. To validate the proposed methodology, first an analysis is conducted to show that by converting to log-ratio space and at the same time reducing the number of parameters to track, no information about target position is lost. The analysis is done by deriving the CRLBs for the position estimation error in both original and transformed spaces and showing that they are the same. Second, to show how the traditional Kalman filter framework performs, a particle filter that works off the transformed coordinates is designed. The number of particles is selected to be sufficiently large and the result is used as ground truth to compare with the performance of the Kalman tracker. The comparisons are done for different target movement speeds and sensor density modes. The results provide an insight into Kalman tracker performance in different situations.

  19. Road Accident Prevention with Instant Emergency Warning Message Dissemination in Vehicular Ad-Hoc Network.

    PubMed

    Gokulakrishnan, P; Ganeshkumar, P

    2015-01-01

    A Road Accident Prevention (RAP) scheme based on Vehicular Backbone Network (VBN) structure is proposed in this paper for Vehicular Ad-hoc Network (VANET). The RAP scheme attempts to prevent vehicles from highway road traffic accidents and thereby reduces death and injury rates. Once the possibility of an emergency situation (i.e. an accident) is predicted in advance, instantly RAP initiates a highway road traffic accident prevention scheme. The RAP scheme constitutes the following activities: (i) the Road Side Unit (RSU) constructs a Prediction Report (PR) based on the status of the vehicles and traffic in the highway roads, (ii) the RSU generates an Emergency Warning Message (EWM) based on an abnormal PR, (iii) the RSU forms a VBN structure and (iv) the RSU disseminates the EWM to the vehicles that holds the high Risk Factor (RF) and travels in High Risk Zone (HRZ). These vehicles might reside either within the RSU's coverage area or outside RSU's coverage area (reached using VBN structure). The RAP scheme improves the performance of EWM dissemination in terms of increase in notification and decrease in end-to-end delay. The RAP scheme also reduces infrastructure cost (number of RSUs) by formulating and deploying the VBN structure. The RAP scheme with VBN structure improves notification by 19 percent and end-to-end delay by 14.38 percent for a vehicle density of 160 vehicles. It is also proved from the simulation experiment that the performance of RAP scheme is promising in 4-lane highway roads.

  20. SVANET: A smart vehicular ad hoc network for efficient data transmission with wireless sensors.

    PubMed

    Sahoo, Prasan Kumar; Chiang, Ming-Jer; Wu, Shih-Lin

    2014-01-01

    Wireless sensors can sense any event, such as accidents, as well as icy roads, and can forward the rescue/warning messages through intermediate vehicles for any necessary help. In this paper, we propose a smart vehicular ad hoc network (SVANET) architecture that uses wireless sensors to detect events and vehicles to transmit the safety and non-safety messages efficiently by using different service channels and one control channel with different priorities. We have developed a data transmission protocol for the vehicles in the highway, in which data can be forwarded with the help of vehicles if they are connected with each other or data can be forwarded with the help of nearby wireless sensors. Our data transmission protocol is designed to increase the driving safety, to prevent accidents and to utilize channels efficiently by adjusting the control and service channel time intervals dynamically. Besides, our protocol can transmit information to vehicles in advance, so that drivers can decide an alternate route in case of traffic congestion. For various data sharing, we design a method that can select a few leader nodes among vehicles running along a highway to broadcast data efficiently. Simulation results show that our protocol can outperform the existing standard in terms of the end to end packet delivery ratio and latency. PMID:25429409

  1. Emergency Situation Prediction Mechanism: A Novel Approach for Intelligent Transportation System Using Vehicular Ad Hoc Networks

    PubMed Central

    Gokulakrishnan, P.

    2015-01-01

    In Indian four-lane express highway, millions of vehicles are travelling every day. Accidents are unfortunate and frequently occurring in these highways causing deaths, increase in death toll, and damage to infrastructure. A mechanism is required to avoid such road accidents at the maximum to reduce the death toll. An Emergency Situation Prediction Mechanism, a novel and proactive approach, is proposed in this paper for achieving the best of Intelligent Transportation System using Vehicular Ad Hoc Network. ESPM intends to predict the possibility of occurrence of an accident in an Indian four-lane express highway. In ESPM, the emergency situation prediction is done by the Road Side Unit based on (i) the Status Report sent by the vehicles in the range of RSU and (ii) the road traffic flow analysis done by the RSU. Once the emergency situation or accident is predicted in advance, an Emergency Warning Message is constructed and disseminated to all vehicles in the area of RSU to alert and prevent the vehicles from accidents. ESPM performs well in emergency situation prediction in advance to the occurrence of an accident. ESPM predicts the emergency situation within 0.20 seconds which is comparatively less than the statistical value. The prediction accuracy of ESPM against vehicle density is found better in different traffic scenarios. PMID:26065014

  2. A Game Theory Algorithm for Intra-Cluster Data Aggregation in a Vehicular Ad Hoc Network

    PubMed Central

    Chen, Yuzhong; Weng, Shining; Guo, Wenzhong; Xiong, Naixue

    2016-01-01

    Vehicular ad hoc networks (VANETs) have an important role in urban management and planning. The effective integration of vehicle information in VANETs is critical to traffic analysis, large-scale vehicle route planning and intelligent transportation scheduling. However, given the limitations in the precision of the output information of a single sensor and the difficulty of information sharing among various sensors in a highly dynamic VANET, effectively performing data aggregation in VANETs remains a challenge. Moreover, current studies have mainly focused on data aggregation in large-scale environments but have rarely discussed the issue of intra-cluster data aggregation in VANETs. In this study, we propose a multi-player game theory algorithm for intra-cluster data aggregation in VANETs by analyzing the competitive and cooperative relationships among sensor nodes. Several sensor-centric metrics are proposed to measure the data redundancy and stability of a cluster. We then study the utility function to achieve efficient intra-cluster data aggregation by considering both data redundancy and cluster stability. In particular, we prove the existence of a unique Nash equilibrium in the game model, and conduct extensive experiments to validate the proposed algorithm. Results demonstrate that the proposed algorithm has advantages over typical data aggregation algorithms in both accuracy and efficiency. PMID:26907272

  3. Report of the APS Ad-Hoc Committee on LGBT Issues - Presentation of Findings and Recommendations

    NASA Astrophysics Data System (ADS)

    Falk, Michael

    In 2014 the Executive Officer of the American Physical Society (APS), Kate Kirby, created an Ad-Hoc Committee on LGBT Issues (C-LGBT) charged with reporting on the obstacles to inclusion of LGBT physicists, a term which for the purpose of this report refers to persons who self-identify as lesbian, gay, bisexual, transgender, queer, questioning, intersex, or asexual, as well as other sexual and gender minorities. The full charge was as follows: ``The committee will advise the APS on the current status of LGBT issues in physics, provide recommendations for greater inclusion, and engage physicists in laying the foundation for a more inclusive physics community. ?More specifically, the committee will investigate LGBT representation in physics, assess the educational and professional climate in physics, recommend changes in policies and practices that impact LGBT physicists, and address other issues that affect inclusion.'' We will present the findings and recommendations of the C-LGBT final report, and a panel discussion will be held following the presentation to discuss the future of APS efforts toward LGBT inclusion in physics.

  4. Report of the APS Ad-Hoc Committee on LGBT Issues - Presentation of Findings and Recommendations

    NASA Astrophysics Data System (ADS)

    Long, Elena

    2016-03-01

    In 2014 the Executive Officer of the American Physical Society (APS), Kate Kirby, created an Ad-Hoc Committee on LGBT Issues (C-LGBT) charged with reporting on the obstacles to inclusion of LGBT physicists, a term which for the purpose of this report refers to persons who self-identify as lesbian, gay, bisexual, transgender, queer, questioning, intersex, or asexual, as well as other sexual and gender minorities. The full charge was as follows: ``The committee will advise the APS on the current status of LGBT issues in physics, provide recommendations for greater inclusion, and engage physicists in laying the foundation for a more inclusive physics community? More specifically, the committee will investigate LGBT representation in physics, assess the educational and professional climate in physics, recommend changes in policies and practices that impact LGBT physicists, and address other issues that affect inclusion.'' We will present the findings and recommendations of the C-LGBT final report, and a panel discussion will be held following the presentation to discuss the future of APS efforts toward LGBT inclusion in physics.

  5. Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.

    PubMed

    Paramasivan, B; Kaliappan, M

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  6. Efficient and Secure Self-Organized Public Key Management for Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Choi, Daeseon; Lee, Younho; Park, Yongsu; Jin, Seung-Hun; Yoon, Hyunsoo

    This paper presents a fully self-organized key management scheme for mobile ad hoc networks. Unlike most previous schemes, there is no priori shared secret or no priori trust relationship in the proposed scheme; every node plays the same role and carries out the same function of key management. The proposed scheme consists of (1) Handshaking (HS) and (2) Certificate request/reply (CRR) procedures. In HS, a node acquires the public key of the approaching node via a secure side channel. In CRR, a node requests certificates of a remote node via a radio channel to the nodes that it has HSed. If the number of received valid certificates that contain the same public key exceeds a given threshold, the node accepts the remote node's public key as valid. Security is rigorously analyzed against various known attacks and network costs are intensively analyzed mathematically. Using this analysis, we provide parameter selection guideline to optimize performance and to maintain security for diverse cases. Simulation results show that every node acquires the public keys of all other nodes at least 5 times faster than in a previous scheme.

  7. Mean field game theoretic approach for security in mobile ad-hoc networks

    NASA Astrophysics Data System (ADS)

    Wang, Yanwei; Tang, Helen; Yu, F. Richard; Huang, Minyi

    2013-05-01

    Game theory can provide a useful tool to study the security problem in mobile ad hoc networks (MANETs). Most existing work on applying game theories to security only considers two players in the security game model: an attacker and a defender. While this assumption is valid for a network with centralized administration, it may not be realistic in MANETs, where centralized administration is not available. Consequently, each individual node in a MANET should be treated separately in the security game model. In this paper, using recent advances in mean field game theory, we propose a novel game theoretic approach for security in MANETs. Mean field game theory provides a powerful mathematical tool for problems with a large number of players. Since security defence mechanisms consume precious system resources (e.g., energy), the proposed scheme considers not only the security requirement of MANETs but also the system resources. In addition, each node only needs to know its own state information and the aggregate effect of the other nodes in the MANET. Therefore, the proposed scheme is a fully distributed scheme. Simulation results are presented to illustrate the effectiveness of the proposed scheme.

  8. A Threshold-Adaptive Reputation System on Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsai, Hsiao-Chien; Lo, Nai-Wei; Wu, Tzong-Chen

    In recent years huge potential benefits from novel applications in mobile ad hoc networks (MANET) have been discussed extensively. However, without robust security mechanisms and systems to provide safety shell through the MANET infrastructure, MANET applications can be vulnerable and hammered by malicious attackers easily. In order to detect misbehaved message routing and identify malicious attackers in MANET, schemes based on reputation concept have shown their advantages in this area in terms of good scalability and simple threshold-based detection strategy. We observed that previous reputation schemes generally use predefined thresholds which do not take into account the effect of behavior dynamics between nodes in a period of time. In this paper, we propose a Threshold-Adaptive Reputation System (TARS) to overcome the shortcomings of static threshold strategy and improve the overall MANET performance under misbehaved routing attack. A fuzzy-based inference engine is introduced to evaluate the trustiness of a node's one-hop neighbors. Malicious nodes whose trust values are lower than the adaptive threshold, will be detected and filtered out by their honest neighbors during trustiness evaluation process. The results of network simulation show that the TARS outperforms other compared schemes under security attacks in most cases and at the same time reduces the decrease of total packet delivery ratio by 67% in comparison with MANET without reputation system.

  9. SVANET: A Smart Vehicular Ad Hoc Network for Efficient Data Transmission with Wireless Sensors

    PubMed Central

    Sahoo, Prasan Kumar; Chiang, Ming-Jer; Wu, Shih-Lin

    2014-01-01

    Wireless sensors can sense any event, such as accidents, as well as icy roads, and can forward the rescue/warning messages through intermediate vehicles for any necessary help. In this paper, we propose a smart vehicular ad hoc network (SVANET) architecture that uses wireless sensors to detect events and vehicles to transmit the safety and non-safety messages efficiently by using different service channels and one control channel with different priorities. We have developed a data transmission protocol for the vehicles in the highway, in which data can be forwarded with the help of vehicles if they are connected with each other or data can be forwarded with the help of nearby wireless sensors. Our data transmission protocol is designed to increase the driving safety, to prevent accidents and to utilize channels efficiently by adjusting the control and service channel time intervals dynamically. Besides, our protocol can transmit information to vehicles in advance, so that drivers can decide an alternate route in case of traffic congestion. For various data sharing, we design a method that can select a few leader nodes among vehicles running along a highway to broadcast data efficiently. Simulation results show that our protocol can outperform the existing standard in terms of the end to end packet delivery ratio and latency. PMID:25429409

  10. Integration of Body Sensor Networks and Vehicular Ad-hoc Networks for Traffic Safety.

    PubMed

    Reyes-Muñoz, Angelica; Domingo, Mari Carmen; López-Trinidad, Marco Antonio; Delgado, José Luis

    2016-01-15

    The emergence of Body Sensor Networks (BSNs) constitutes a new and fast growing trend for the development of daily routine applications. However, in the case of heterogeneous BSNs integration with Vehicular ad hoc Networks (VANETs) a large number of difficulties remain, that must be solved, especially when talking about the detection of human state factors that impair the driving of motor vehicles. The main contributions of this investigation are principally three: (1) an exhaustive review of the current mechanisms to detect four basic physiological behavior states (drowsy, drunk, driving under emotional state disorders and distracted driving) that may cause traffic accidents is presented; (2) A middleware architecture is proposed. This architecture can communicate with the car dashboard, emergency services, vehicles belonging to the VANET and road or street facilities. This architecture seeks on the one hand to improve the car driving experience of the driver and on the other hand to extend security mechanisms for the surrounding individuals; and (3) as a proof of concept, an Android real-time attention low level detection application that runs in a next-generation smartphone is developed. The application features mechanisms that allow one to measure the degree of attention of a driver on the base of her/his EEG signals, establish wireless communication links via various standard wireless means, GPRS, Bluetooth and WiFi and issue alarms of critical low driver attention levels.

  11. Report of the Television Task Force.

    ERIC Educational Resources Information Center

    Bedell, Fran; And Others

    In early 1985, one of the new television channels resulting from the expansion of the Fort Smith TV Cable Company was allocated to Westark Community College (WCC). In July, a task force was appointed to develop recommendations regarding programming, policies, staffing, equipment, physical location, and organizational location. This report presents…

  12. Citizens Task Force Study on Aging.

    ERIC Educational Resources Information Center

    Collyer, Gilbert A.; Greenleaf, George

    A citizens task force of 25 persons representing the geographic areas and population of Shasta College (Redding, California) district was organized to propose goals for Shasta College in providing services for the older adult population in the district, and to make recommendations concerning a comprehensive continuing program to achieve these…

  13. Interstate Migrant Education Task Force: Migrant Health.

    ERIC Educational Resources Information Center

    Education Commission of the States, Denver, CO.

    Because ill-clothed, sick, or hungry migrant children learn poorly, the Task Force has emphasized the migrant health situation in 1979. Migrant workers have a 33% shorter life expectancy, a 25% higher infant mortality rate, and a 25% higher death rate from tuberculosis and other communicable diseases than the national average. Common among…

  14. Governor's Task Force on Immigration: Final Report.

    ERIC Educational Resources Information Center

    1984

    Texas Governor Mark White established a 28-member Governor's Task Force on Immigration on March 24, 1983 to: (1) examine the impact on Texas and its citizens of the legislative issues in the proposed federal Immigration Reform and Control Act of 1983; (2) hold public hearings to gain input from citizens, business, industry, labor, ranching and…

  15. Agricultural Drainage Management Systems Task Force (ADMSTF)

    Technology Transfer Automated Retrieval System (TEKTRAN)

    The Agricultural Drainage Management Systems (ADMS) Task Force was initiated during a Charter meeting in the fall of 2002 by dedicated professional employees of Federal, State, and Local Government Agencies and Universities. The Agricultural Drainage Management (ADM) Coalition was established in 200...

  16. AIPRC Jurisdiction Task Force Holds Hearings

    ERIC Educational Resources Information Center

    American Indian Journal of the Institute for the Development of Indian Law, 1976

    1976-01-01

    The Jurisdiction Task Force of the American Indian Policy Review Commission (AIPRC) held a series of hearings on jurisdictional issues/problems confronting Native American governments today, and the following four topics emerged as primary areas of concern: Child Placement; Public Law 280; Water Rights; and Hunting/Fishing Rights. (JC)

  17. States Address Civics with Mandated Task Forces

    ERIC Educational Resources Information Center

    Delander, Brady

    2014-01-01

    By coincidence or not, Massachusetts, Illinois and Virginia created civic education task forces not long after national test results showed a dismal understanding of the subject matter across all grade levels. Results of the 2010 National Assessment of Educational Progress showed just 25 percent of all testtakers in grades 4, 8 and 12 demonstrated…

  18. Virginia Tech State Task Force Reports Summary

    ERIC Educational Resources Information Center

    McBride, James T.

    2010-01-01

    An analysis of eleven state task force reports prompted by the tragic nature of the Virginia Tech shooting in 2007 revealed that all shared a primary theme: no "single best way" to protect American college and university campuses yet exists. These documents, individually and collectively, make it clear that contemporary complex learning…

  19. 18 CFR 701.58 - Task forces.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 18 Conservation of Power and Water Resources 2 2014-04-01 2014-04-01 false Task forces. 701.58 Section 701.58 Conservation of Power and Water Resources WATER RESOURCES COUNCIL COUNCIL ORGANIZATION... provided administrative and secretarial support by the Water Resources Council Staff to the extent...

  20. 18 CFR 701.58 - Task forces.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 18 Conservation of Power and Water Resources 2 2013-04-01 2012-04-01 true Task forces. 701.58 Section 701.58 Conservation of Power and Water Resources WATER RESOURCES COUNCIL COUNCIL ORGANIZATION... provided administrative and secretarial support by the Water Resources Council Staff to the extent...

  1. 18 CFR 701.58 - Task forces.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 18 Conservation of Power and Water Resources 2 2011-04-01 2011-04-01 false Task forces. 701.58 Section 701.58 Conservation of Power and Water Resources WATER RESOURCES COUNCIL COUNCIL ORGANIZATION... provided administrative and secretarial support by the Water Resources Council Staff to the extent...

  2. 18 CFR 701.58 - Task forces.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Task forces. 701.58 Section 701.58 Conservation of Power and Water Resources WATER RESOURCES COUNCIL COUNCIL ORGANIZATION... provided administrative and secretarial support by the Water Resources Council Staff to the extent...

  3. 18 CFR 701.58 - Task forces.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 18 Conservation of Power and Water Resources 2 2012-04-01 2012-04-01 false Task forces. 701.58 Section 701.58 Conservation of Power and Water Resources WATER RESOURCES COUNCIL COUNCIL ORGANIZATION... provided administrative and secretarial support by the Water Resources Council Staff to the extent...

  4. The possibility for collaboration of Arecibo with international S2 ad-hoc array

    NASA Astrophysics Data System (ADS)

    Molotov, I. E.; Chuprikov, A. A.; Salter, C.; Ghosh, T.

    2001-05-01

    The loan of an S2 VLBI recording terminal to Arecibo Observatory by the Space Geodynamics Laboratory, ISTS (now CRESTech), Canada, for support of the VSOP mission, opens the possibility of Arecibo participating in ground based VLBI observations. I.e. in collaboration with an international ad-hoc S2 array that has begun to operate under the Low Frequency VLBI Network (LFVN) project. LFVN arranges VLBI experiments using the telescopes in 11 countries which are equipped with S2 systems, together with the Penticton S2 correlator in Canada. A wide spectrum of baselines has been achieved, up to the largest on Earth, while the participation of Arecibo can ensure the high sensitivity of this S2 array. The first LFVN S2 observations including Arecibo were carried out at a wavelength of 18 cm on December 2, 1998, as part of INTAS98.5. This experiment with participation of three Russian antennas (Bear Lakes RT-64, Puschino RT-22 and Svetloe RT-32), Green Bank RT-43 and HartRAO RT-26 included 7 hrs of observation of weak sources on the Arecibo-Green Bank baseline. The successful processing of INTAS98.5 and two other observations (INTAS98.2 and INTAS99.4) by the Penticton correlator confirms the feasibility of this initiative (the post-processing was made at Astro Space Center, Russia). These VLBI observations may be continued with the Green Bank RT-100, Penticton RT-26 and Madrid RT-70. (The next S2 experiment is planned for October-November 2001). The recent equipping of Arecibo with a 92-cm receiver also opens new opportunities for LFVN cooperation, especially as there is a plan to also supply AlgoPark RT-46 and Penticton RT-26 in Canada with 92-cm facilities. Another field of interest for cooperation may be the radar VLBI research of the nearer planets with the S2 system recording of transmitted and reflected signals.

  5. Road Accident Prevention with Instant Emergency Warning Message Dissemination in Vehicular Ad-Hoc Network

    PubMed Central

    P, Gokulakrishnan; P, Ganeshkumar

    2015-01-01

    A Road Accident Prevention (RAP) scheme based on Vehicular Backbone Network (VBN) structure is proposed in this paper for Vehicular Ad-hoc Network (VANET). The RAP scheme attempts to prevent vehicles from highway road traffic accidents and thereby reduces death and injury rates. Once the possibility of an emergency situation (i.e. an accident) is predicted in advance, instantly RAP initiates a highway road traffic accident prevention scheme. The RAP scheme constitutes the following activities: (i) the Road Side Unit (RSU) constructs a Prediction Report (PR) based on the status of the vehicles and traffic in the highway roads, (ii) the RSU generates an Emergency Warning Message (EWM) based on an abnormal PR, (iii) the RSU forms a VBN structure and (iv) the RSU disseminates the EWM to the vehicles that holds the high Risk Factor (RF) and travels in High Risk Zone (HRZ). These vehicles might reside either within the RSU’s coverage area or outside RSU’s coverage area (reached using VBN structure). The RAP scheme improves the performance of EWM dissemination in terms of increase in notification and decrease in end-to-end delay. The RAP scheme also reduces infrastructure cost (number of RSUs) by formulating and deploying the VBN structure. The RAP scheme with VBN structure improves notification by 19 percent and end-to-end delay by 14.38 percent for a vehicle density of 160 vehicles. It is also proved from the simulation experiment that the performance of RAP scheme is promising in 4-lane highway roads. PMID:26636576

  6. Ad-hoc Solutions for Capturing Electronic Structure Details in Classical Dynamics Simulations

    NASA Astrophysics Data System (ADS)

    Crill, John Wesley

    Traditional empirical potentials used in molecular dynamics (MD) simulations replace an explicit treatment of the electronic structure with an appropriate interatomic potential energy expression. This enables MD simulations to model atomistic processes, such as dislocation dynamics and plastic deformation, which typically require size and time domains exceeding what is currently feasible with computationally-demanding first principles techniques. However, discarding the electronic degrees of freedom prevents MD simulations from properly resolving certain phenomena which are dominated by electronic interactions. One example is thermal transport in metals, which is often underestimated by orders of magnitude in MD simulations. A recently-developed multi-scale simulation approach, allowing ad-hoc feedback from continuum heat flow solutions to thermostat atoms in an MD simulation, is used to model Joule-heating in nano-scale metallic contacts under electromagnetic stress. The simulations are carried out under conditions representative of contact surfaces in Radio Frequency Electromechanical Switches (RF MEMS) and rail/armature components of Electromagnetic Launchers (EMLs) and are used to speculate on the mechanisms for experimentally-observed material transfer. Another phenomenon that is typically neglected in MD simulations is charge transfer between atoms of dissimilar electronegativity. A common approach to incorporating a dynamic treatment of charge in a classical potential simulation is to solve atomic charges using an equalization of electronegativity in the charge equilibration (QEq) method. The current work studies the effectiveness of the QEq to mimic the charge distribution properties of f-center defects in a sodium chloride crystal. The results indicate that the QEq is able to replicate some of the electrostatic energy features of an f-center, which include an extremely localized potential well in the vicinity of the defect.

  7. Road Accident Prevention with Instant Emergency Warning Message Dissemination in Vehicular Ad-Hoc Network.

    PubMed

    Gokulakrishnan, P; Ganeshkumar, P

    2015-01-01

    A Road Accident Prevention (RAP) scheme based on Vehicular Backbone Network (VBN) structure is proposed in this paper for Vehicular Ad-hoc Network (VANET). The RAP scheme attempts to prevent vehicles from highway road traffic accidents and thereby reduces death and injury rates. Once the possibility of an emergency situation (i.e. an accident) is predicted in advance, instantly RAP initiates a highway road traffic accident prevention scheme. The RAP scheme constitutes the following activities: (i) the Road Side Unit (RSU) constructs a Prediction Report (PR) based on the status of the vehicles and traffic in the highway roads, (ii) the RSU generates an Emergency Warning Message (EWM) based on an abnormal PR, (iii) the RSU forms a VBN structure and (iv) the RSU disseminates the EWM to the vehicles that holds the high Risk Factor (RF) and travels in High Risk Zone (HRZ). These vehicles might reside either within the RSU's coverage area or outside RSU's coverage area (reached using VBN structure). The RAP scheme improves the performance of EWM dissemination in terms of increase in notification and decrease in end-to-end delay. The RAP scheme also reduces infrastructure cost (number of RSUs) by formulating and deploying the VBN structure. The RAP scheme with VBN structure improves notification by 19 percent and end-to-end delay by 14.38 percent for a vehicle density of 160 vehicles. It is also proved from the simulation experiment that the performance of RAP scheme is promising in 4-lane highway roads. PMID:26636576

  8. Bringing Ad-Hoc Analytics to Big Earth Data: the EarthServer Experience

    NASA Astrophysics Data System (ADS)

    Baumann, Peter

    2014-05-01

    From the commonly accepted Vs defining the Big Data challenge - volume, velocity, variety - we more and more learn that the sheer volume is not the only, and often not even the decisive factor inhibiting access and analytics. In particular variety of data is a frequent core issue, posing manifold issues. Based on this observation we claim that a key aspect to analytics is the freedom to ask any questions, simple or complex, anytime and combining any choice of data structures, whatever diverging they may be. Actually, techniques for such "ad-hoc queries" we can learn from classical databases. Their concept of high-level query languages brings along several benefits: a uniform semantic, allowing machine-to-machine communication, including automatic generation of queries; massive server-side optimization and parallelization; and building attractive client interfaces hiding the query syntax from casual users while allowing power users to utilize it. However, these benefits used to be available only on tabular and set oriented data, text, and - more recently - graph data. With the advent of Array Databases, they become available on large multidimensional raster data assets as well, getting one step closer to the Holy Grail of itnegrated, uniform retrieval for users. ErthServer is a transatlantic initiative setting up operationa linfrastructures based on this paradigm. In our talk, we present core EarthServer technology concepts as well as a spectrum of Earth Science applications utilizing the EarthServer platform for versatile, visualisation supported analytics services. Further, we discuss the substantial impact EarthServer is having on Big Geo Data standardization in OGC and ISO. Time and Internet connection permitting a live demo can be presented.

  9. Performance evaluation of reactive and proactive routing protocol in IEEE 802.11 ad hoc network

    NASA Astrophysics Data System (ADS)

    Hamma, Salima; Cizeron, Eddy; Issaka, Hafiz; Guédon, Jean-Pierre

    2006-10-01

    Wireless technology based on the IEEE 802.11 standard is widely deployed. This technology is used to support multiple types of communication services (data, voice, image) with different QoS requirements. MANET (Mobile Adhoc NETwork) does not require a fixed infrastructure. Mobile nodes communicate through multihop paths. The wireless communication medium has variable and unpredictable characteristics. Furthermore, node mobility creates a continuously changing communication topology in which paths break and new one form dynamically. The routing table of each router in an adhoc network must be kept up-to-date. MANET uses Distance Vector or Link State algorithms which insure that the route to every host is always known. However, this approach must take into account the adhoc networks specific characteristics: dynamic topologies, limited bandwidth, energy constraints, limited physical security, ... Two main routing protocols categories are studied in this paper: proactive protocols (e.g. Optimised Link State Routing - OLSR) and reactive protocols (e.g. Ad hoc On Demand Distance Vector - AODV, Dynamic Source Routing - DSR). The proactive protocols are based on periodic exchanges that update the routing tables to all possible destinations, even if no traffic goes through. The reactive protocols are based on on-demand route discoveries that update routing tables only for the destination that has traffic going through. The present paper focuses on study and performance evaluation of these categories using NS2 simulations. We have considered qualitative and quantitative criteria. The first one concerns distributed operation, loop-freedom, security, sleep period operation. The second are used to assess performance of different routing protocols presented in this paper. We can list end-to-end data delay, jitter, packet delivery ratio, routing load, activity distribution. Comparative study will be presented with number of networking context consideration and the results show

  10. IDMA: improving the defense against malicious attack for mobile ad hoc networks based on ARIP protocol

    NASA Astrophysics Data System (ADS)

    Peng, Chaorong; Chen, Chang Wen

    2008-04-01

    Malicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks (MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes. However, the defense against malicious attack can be improved when a new layer of network architecture can be developed to separate true IP address from disclosing to the malicious nodes. In this paper, we propose a new algorithm to improve the defense against malicious attack (IDMA) that is based on a recently developed Assignment Router Identify Protocol (ARIP) for the clustering-based MANET management. In the ARIP protocol, we design the ARIP architecture based on the new Identity instead of the vulnerable IP addresses to provide the required security that is embedded seamlessly into the overall network architecture. We make full use of ARIP's special property to monitor gateway forward packets by Reply Request Route Packets (RREP) without additional intrusion detection layer. We name this new algorithm IDMA because of its inherent capability to improve the defense against malicious attacks. Through IDMA, a watching algorithm can be established so as to counterattack the malicious node in the routing path when it unusually drops up packets. We provide analysis examples for IDMA for the defense against a malicious node that disrupts the route discovery by impersonating the destination, or by responding with state of corrupted routing information, or by disseminating forged control traffic. The IDMA algorithm is able to counterattack the malicious node in the cases when the node lunch DoS attack by broadcast a large number of route requests, or make Target traffic congestion by delivering huge mount of data; or spoof the IP addresses and send forge packets with a fake ID to the same Target causing traffic congestion at that destination. We have implemented IDMA algorism using the GloMoSim simulator and have demonstrated its performance under a variety of

  11. Illinois task force on global climate change

    SciTech Connect

    Griffin, B.S.

    1996-12-31

    The purpose of this report is to document progress in the areas of national policy development, emissions reduction, research and education, and adaptation, and to identify specific actions that will be undertaken to implement the Illinois state action plan. The task force has been tracking national and international climate change policy, and helping shape national policy agenda. Identification and implementation of cost-effective mitigation measures has been performed for emissions reduction. In the area of research and education, the task force is developing the capacity to measure climate change indicators, maintaining and enhancing Illinois relevant research, and strengthening climate change education. Activities relevant to adaptation to new policy include strengthening water laws and planning for adaptation. 6 figs., 4 tabs.

  12. Joint Task Force on Undergraduate Physics Programs

    NASA Astrophysics Data System (ADS)

    This session will focus on the guidelines and recommendations being developed by the APS/AAPT Joint Task Force on Undergraduate Physics Programs. J-TUPP is studying how undergraduate physics programs might better prepare physics majors for diverse careers. The guidelines and recommendations will focus on curricular content, flexible tracks, pedagogical methods, research experiences and internships, the development of professional skills, and enhanced advising and mentoring for all physics majors.

  13. A Distributed and Cooperative Algorithm for the Detection and Elimination of Multiple Black Hole Nodes in Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Yu, Chang Wu; Wu, Tung-Kuang; Cheng, Rei-Heng; Yu, Kun-Ming; Chang, Shun Chao

    A mobile node in ad hoc networks may move arbitrarily and act as a router and a host simultaneously. Such a characteristic makes nodes in MANET vulnerable to potential attacks. The black hole problem, in which some malicious nodes pretend to be intermediate nodes of a route to some given destinations and drop packets that pass through it, is one of the major types of attack. In this paper, we propose a distributed and cooperative mechanism to tackle the black hole problem. The mechanism is distributed so that it suits the ad hoc nature of network, and nodes in the protocol cooperate so that they can analyze, detect, and eliminate possible multiple black-hole nodes in a more reliable fashion. Simulation results show that our method achieves a high black hole detection rate and good packet delivery rate, while the overhead is comparatively lower as the network traffic increases.

  14. Use of synthesized data to support complex ad-hoc queries in an enterprise information warehouse: a diabetes use case.

    PubMed

    Rogers, Patrick; Erdal, Selnur; Santangelo, Jennifer; Liu, Jianhua; Schuster, Dara; Kamal, Jyoti

    2008-11-06

    The Ohio State University Medical Center (OSUMC) Information Warehouse (IW) is a comprehensive data warehousing facility incorporating operational, clinical, and biological data sets from multiple enterprise system. It is common for users of the IW to request complex ad-hoc queries that often require significant intervention by data analyst. In response to this challenge, we have designed a workflow that leverages synthesized data elements to support such queries in an more timely, efficient manner.

  15. HOW GAS-DYNAMIC FLARE MODELS POWERED BY PETSCHEK RECONNECTION DIFFER FROM THOSE WITH AD HOC ENERGY SOURCES

    SciTech Connect

    Longcope, D. W.; Klimchuk, J. A.

    2015-11-10

    Aspects of solar flare dynamics, such as chromospheric evaporation and flare light curves, have long been studied using one-dimensional models of plasma dynamics inside a static flare loop, subjected to some energy input. While extremely successful at explaining the observed characteristics of flares, all such models so far have specified energy input ad hoc, rather than deriving it self-consistently. There is broad consensus that flares are powered by magnetic energy released through reconnection. Recent work has generalized Petschek’s basic reconnection scenario, topological change followed by field line retraction and shock heating, to permit its inclusion in a one-dimensional flare loop model. Here we compare the gas dynamics driven by retraction and shocking to those from more conventional static loop models energized by ad hoc source terms. We find significant differences during the first minute, when retraction leads to larger kinetic energies and produces higher densities at the loop top, while ad hoc heating tends to rarify the loop top. The loop-top density concentration is related to the slow magnetosonic shock, characteristic of Petschek’s model, but persists beyond the retraction phase occurring in the outflow jet. This offers an explanation for observed loop-top sources of X-ray and EUV emission, with advantages over that provided by ad hoc heating scenarios. The cooling phases of the two models are, however, notably similar to one another, suggesting that observations at that stage will yield little information on the nature of energy input.

  16. 32 CFR 700.1053 - Commander of a task force.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 5 2011-07-01 2011-07-01 false Commander of a task force. 700.1053 Section 700... Command Detail to Duty § 700.1053 Commander of a task force. (a) A geographic fleet commander, and any other naval commander, may detail in command of a task force, or other task command, any...

  17. 32 CFR 700.1053 - Commander of a task force.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 5 2012-07-01 2012-07-01 false Commander of a task force. 700.1053 Section 700... Command Detail to Duty § 700.1053 Commander of a task force. (a) A geographic fleet commander, and any other naval commander, may detail in command of a task force, or other task command, any...

  18. 32 CFR 700.1053 - Commander of a task force.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 5 2014-07-01 2014-07-01 false Commander of a task force. 700.1053 Section 700... Command Detail to Duty § 700.1053 Commander of a task force. (a) A geographic fleet commander, and any other naval commander, may detail in command of a task force, or other task command, any...

  19. 32 CFR 700.1053 - Commander of a task force.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 5 2013-07-01 2013-07-01 false Commander of a task force. 700.1053 Section 700... Command Detail to Duty § 700.1053 Commander of a task force. (a) A geographic fleet commander, and any other naval commander, may detail in command of a task force, or other task command, any...

  20. 32 CFR 700.1053 - Commander of a task force.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Commander of a task force. 700.1053 Section 700... Command Detail to Duty § 700.1053 Commander of a task force. (a) A geographic fleet commander, and any other naval commander, may detail in command of a task force, or other task command, any...

  1. FRCA: A Fuzzy Relevance-Based Cluster Head Selection Algorithm for Wireless Mobile Ad-Hoc Sensor Networks

    PubMed Central

    Lee, Chongdeuk; Jeong, Taegwon

    2011-01-01

    Clustering is an important mechanism that efficiently provides information for mobile nodes and improves the processing capacity of routing, bandwidth allocation, and resource management and sharing. Clustering algorithms can be based on such criteria as the battery power of nodes, mobility, network size, distance, speed and direction. Above all, in order to achieve good clustering performance, overhead should be minimized, allowing mobile nodes to join and leave without perturbing the membership of the cluster while preserving current cluster structure as much as possible. This paper proposes a Fuzzy Relevance-based Cluster head selection Algorithm (FRCA) to solve problems found in existing wireless mobile ad hoc sensor networks, such as the node distribution found in dynamic properties due to mobility and flat structures and disturbance of the cluster formation. The proposed mechanism uses fuzzy relevance to select the cluster head for clustering in wireless mobile ad hoc sensor networks. In the simulation implemented on the NS-2 simulator, the proposed FRCA is compared with algorithms such as the Cluster-based Routing Protocol (CBRP), the Weighted-based Adaptive Clustering Algorithm (WACA), and the Scenario-based Clustering Algorithm for Mobile ad hoc networks (SCAM). The simulation results showed that the proposed FRCA achieves better performance than that of the other existing mechanisms. PMID:22163905

  2. Ad hoc supervision of general practice registrars as a 'community of practice': analysis, interpretation and re-presentation.

    PubMed

    Clement, T; Brown, J; Morrison, J; Nestel, D

    2016-05-01

    General practice registrars in Australia undertake most of their vocational training in accredited general practices. They typically see patients alone from the start of their community-based training and are expected to seek timely ad hoc support from their supervisor. Such ad hoc encounters are a mechanism for ensuring patient safety, but also provide an opportunity for learning and teaching. Wenger's (Communities of practice: learning, meaning, and identity. Cambridge University Press, New York, 1998) social theory of learning ('communities of practice') guided a secondary analysis of audio-recordings of ad hoc encounters. Data from one encounter is re-presented as an extended sequence to maintain congruence with the theoretical perspective and enhance vicariousness. An interpretive commentary communicates key features of Wenger's theory and highlights the researchers' interpretations. We argue that one encounter can reveal universal understandings of clinical supervision and that the process of naturalistic generalisation allows readers to transfer others' experiences to their own contexts. The paper raises significant analytic, interpretive, and representational issues. We highlight that report writing is an important, but infrequently discussed, part of research design. We discuss the challenges of supporting the learning and teaching that arises from adopting a socio-cultural lens and argue that such a perspective importantly captures the complex range of issues that work-based practitioners have to grapple with. This offers a challenge to how we research and seek to influence work-based learning and teaching in health care settings.

  3. FRCA: a fuzzy relevance-based cluster head selection algorithm for wireless mobile ad-hoc sensor networks.

    PubMed

    Lee, Chongdeuk; Jeong, Taegwon

    2011-01-01

    Clustering is an important mechanism that efficiently provides information for mobile nodes and improves the processing capacity of routing, bandwidth allocation, and resource management and sharing. Clustering algorithms can be based on such criteria as the battery power of nodes, mobility, network size, distance, speed and direction. Above all, in order to achieve good clustering performance, overhead should be minimized, allowing mobile nodes to join and leave without perturbing the membership of the cluster while preserving current cluster structure as much as possible. This paper proposes a Fuzzy Relevance-based Cluster head selection Algorithm (FRCA) to solve problems found in existing wireless mobile ad hoc sensor networks, such as the node distribution found in dynamic properties due to mobility and flat structures and disturbance of the cluster formation. The proposed mechanism uses fuzzy relevance to select the cluster head for clustering in wireless mobile ad hoc sensor networks. In the simulation implemented on the NS-2 simulator, the proposed FRCA is compared with algorithms such as the Cluster-based Routing Protocol (CBRP), the Weighted-based Adaptive Clustering Algorithm (WACA), and the Scenario-based Clustering Algorithm for Mobile ad hoc networks (SCAM). The simulation results showed that the proposed FRCA achieves better performance than that of the other existing mechanisms.

  4. Final Technical Report Transport Task Force

    SciTech Connect

    P.W. Terry

    2006-08-22

    The Transport Task Force has functioned as the primary scientific organization in the area of magnetic-fusion confinement and transport since its inception in 1988. It has defined and set research directions, coordinated broad research efforts, advocated new funding initiatives, and created a highly successful and widely admired interactive culture between experiment, theory and modeling. The Transport Task Force carries out its activities under the direction of its chair and the Executive Committee. The Executive Committee is comprised of the leaders and deputy leaders of the scientific working groups. The working groups are structured and organized according to research needs and priorities and have been organized around the areas of Core Transport, H Mode and Pedestal, Fast Particle Transport, Transient Transport Phenomena, and Modeling and Simulation. A steering committee provides advise on TTF activities. Further information on the working groups and the structure and management of the TTF can be found at http://psfcwww2.psfc.mit.edu/ttf/index.html. The TTF holds an annual workshop. A summary of the workshops held during the period of this report is given in Appendix I. During the period of this report the Transport Task Force was involved in several significant activities. Foremost of these was a sweeping review of the status of transport science, the key research tasks for progress during the next 5-10 years, and a proposal for a funding initiative to ensure application of adequate resources to these problems. The conclusions of this study were incorporated into a white paper, which is copied below in Appendix II. Other significant activities have included the introduction of an extended, ongoing discussion on verification and validation as a requisite for defining and codifying the path toward predictive capability, the orchestration of a gradual shift of focus from ion thermal confinement to electron thermal confinement, and a joining of efforts on edge

  5. A Task Force to Address Bullying.

    PubMed

    Keller, Ronald; Budin, Wendy C; Allie, Tammy

    2016-02-01

    Bullying in the workplace can create a dysfunctional environment that is associated with serious physical and psychological harm to the person being bullied. Nurses' experience with bullying has gained considerable attention in recent years, and warrants further discussion. Nurse leaders need to develop and implement effective bullying prevention initiatives that will foster the functioning of a professional and productive staff in a healthy work environment. The aim of this article is to review workplace bullying as experienced by nurses, and describe how nurses at a Magnet-designated academic medical center developed and implemented a bullying task force to address the problem.

  6. A Task Force to Address Bullying.

    PubMed

    Keller, Ronald; Budin, Wendy C; Allie, Tammy

    2016-02-01

    Bullying in the workplace can create a dysfunctional environment that is associated with serious physical and psychological harm to the person being bullied. Nurses' experience with bullying has gained considerable attention in recent years, and warrants further discussion. Nurse leaders need to develop and implement effective bullying prevention initiatives that will foster the functioning of a professional and productive staff in a healthy work environment. The aim of this article is to review workplace bullying as experienced by nurses, and describe how nurses at a Magnet-designated academic medical center developed and implemented a bullying task force to address the problem. PMID:26817556

  7. 76 FR 60863 - Aquatic Nuisance Species Task Force Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-30

    .... You may also view the minutes on the ANS Task Force Web site at http://anstaskforce.gov/meetings.php... Task Force Web site at http://anstaskforce.gov/meetings.php . Accessibility Information The...

  8. 75 FR 15457 - Aquatic Nuisance Species Task Force Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-29

    ... Task Force Web site at: http://anstaskforce.gov/meetings.php . FOR FURTHER INFORMATION CONTACT: Susan... on the ANS Task Force Web site at: http://anstaskforce.gov/meetings.php . Dated: March 19,...

  9. 76 FR 15334 - Aquatic Nuisance Species Task Force Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-21

    ... minutes on the ANS Task Force Web site at: http://anstaskforce.gov/meetings.php . FOR FURTHER INFORMATION... on the ANS Task Force Web site at: http://anstaskforce.gov/meetings.php . Dated: March 14,...

  10. 76 FR 5232 - Small Business Information Security Task Force

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-28

    ... PCI SSC conduct a webinar for the Task Force in the Spring of 2011 on credit card security issues for... ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small Business Administration. ACTION... Small Business Information Security Task Force Meeting. DATES: 1 p.m., Wednesday, December 8,...

  11. Task Force II: Energy and Its Socioeconomic Impacts

    ERIC Educational Resources Information Center

    Appalachia, 1977

    1977-01-01

    Summarizing the Task Force Issues Paper presented at the Appalachian Conference on Balanced Growth and Economic Development (1977), this article presents selected comments by Task Force participants, and Task Force recommendations re: a national severence tax on extraction of nonrenewable energy resources; socioeconomic costs of nuclear energy; a…

  12. 75 FR 61175 - Aquatic Nuisance Species Task Force Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-04

    ... Fish and Wildlife Service Aquatic Nuisance Species Task Force Meeting AGENCY: Fish and Wildlife Service... Species (ANS) Task Force. The meeting is open to the public. The meeting topics are identified in the SUPPLEMENTARY INFORMATION section. DATES: The ANS Task Force will meet from 8 a.m. to 5 p.m. on...

  13. 75 FR 77934 - Small Business Information Security Task Force

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-14

    ... ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small Business Administration. ACTION... Small Business Information Security Task Force Meeting. DATES: 1 p.m., Wednesday, November 10, 2010... meeting minutes for the second meeting of the Small Business Information Security Task Force....

  14. Solar Energy Task Force Report: Technical Training Guidelines.

    ERIC Educational Resources Information Center

    O'Connor, Kevin

    This task force report offers guidelines and information for the development of vocational education programs oriented to the commercial application of solar energy in water and space heating. After Section I introduces the Solar Energy Task Force and its activities, Section II outlines the task force's objectives and raises several issues and…

  15. Enabling real-time H.26L video services over wireless ad hoc networks using joint admission and transmission power control

    NASA Astrophysics Data System (ADS)

    Pei, Yong; Modestino, James W.; Qu, Qi; Wang, Xiaochun

    2003-06-01

    In a wireless ad hoc network, packets are sent from node-to-node in a multihop fashion until they reach the destination. In this paper we investigate the capacity of a wireless ad hoc network in supporting packet video transport. The ad hoc network consists of n homogeneous video users with each of them also serving as a relay node for other users. We investigate how the time delay aspects the video throughput in such an ad hoc network and how to provide a time-delay bounded packet video delivery service over such a network? The analytical results indicate that appropriate joint admission and power control have to be employed in order to efficiently utilize the network capacity while operating under the delay constraint as the distance between source and destination changes.

  16. 77 FR 56845 - Meeting of the Community Preventive Services Task Force (Task Force)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-14

    ... practice, policy, and research, and are appointed by the CDC Director. The Task Force was convened in 1996..., environmental, population, and healthcare system interventions in public health and health promotion. During... and findings to help inform decision making about policy, practice, and research in a wide range of...

  17. ESPR postmortem imaging task force: where we begin.

    PubMed

    Arthurs, Owen J; van Rijn, Rick R; Whitby, Elspeth H; Johnson, Karl; Miller, Elka; Stenzel, Martin; Watt, Andrew; Taranath, Ajay; Perry, David H

    2016-08-01

    A new task force on postmortem imaging was established at the annual meeting of the European Society of Paediatric Radiology (ESPR) in Graz, Austria, in 2015. The postmortem task force is separate from the child abuse task force as it covers all aspects of fetal, neonatal and non-forensic postmortem imaging. The main focus of the task force is the guidance and standardization of non-radiographic postmortem imaging, particularly postmortem CT and postmortem MRI. This manuscript outlines the starting point of the task force, with a mission statement, outline of current experience, and short- and long-term goals.

  18. In vacuum undulator task force report

    SciTech Connect

    Hastings, J.B.; Kao, C.C.; Stefan, P.

    1998-06-01

    Historically the NSLS has been active in R&D for state-of-the-art electron beams, photon beams and x-ray optics. One of the available straight sections has therefore been dedicated to insertion device R&D. Over the past five to seven years a program aimed at exploiting the very small vertical {beta} function in the straight sections has yielded first a prototype small gap undulator (PSGU) and then an in-vacuum undulator (IVUN). The IVUN sources attain a brightness similar to the existing hybrid wigglers in X21 and X25. They radiate significantly lower total power than the wigglers but produce higher power densities. They provide undulator rather than wiggler spectra. Because of the small gaps and small periods there is not much tunability in these devices and they will have to be purpose-built for a specific scientific program. The original IVUN parameters were chosen for in-elastic x-ray scattering, similar to the scientific program on X21. This put the fundamental at 4.6 keV and the third harmonic at 13.8 keV. The question that this new possible insertion device poses is what science programs can best take advantage of this new insertion device source? To answer this, a task force was formed by M. Hart, NSLS Department Chair and charged with identifying viable scientific programs that could seek outside funding to construct IVUN beamlines. The task force concentrated on experimental programs that are presently being pursued on new insertion devices worldwide. For example, x-ray photon correlation spectroscopy, which takes advantage of the large coherent flux from undulator sources, was considered. However, this program was not considered as the highest priority. The general area of protein crystallography, however, is ideal for the IVUN source. The unique electron beam optics that makes the IVUN possible in the first place also makes the IVUN ideal as a source for microdiffraction.

  19. Effects of force reflection on servomanipulator task performance

    SciTech Connect

    Draper, J.V.; Moore, W.E.; Herndon, J.N.; Weil, B.S.

    1986-01-01

    This paper reports results of a testing program that assessed the impact of force reflection on servomanipulator task performance. The testing program compared three force-reflection levels: 4 to 1 (four units of force on the slave produce one unit of force at the master controller), 1 to 1, and infinity to 1 (no force reflection). Time required to complete tasks, rate of occurrence of errors, the maximum force applied to task components, and variability in forces during completion of representative remote handling tasks were used as dependent variables. Operators exhibited lower error rates, lower peak forces, and more consistent application of forces using force reflection than they did without it. These data support the hypothesis that force reflection provides useful information for servomanipulator operators.

  20. A Novel Clustering Algorithm for Mobile Ad Hoc Networks Based on Determination of Virtual Links' Weight to Increase Network Stability

    PubMed Central

    Karimi, Abbas; Afsharfarnia, Abbas; Zarafshan, Faraneh; Al-Haddad, S. A. R.

    2014-01-01

    The stability of clusters is a serious issue in mobile ad hoc networks. Low stability of clusters may lead to rapid failure of clusters, high energy consumption for reclustering, and decrease in the overall network stability in mobile ad hoc network. In order to improve the stability of clusters, weight-based clustering algorithms are utilized. However, these algorithms only use limited features of the nodes. Thus, they decrease the weight accuracy in determining node's competency and lead to incorrect selection of cluster heads. A new weight-based algorithm presented in this paper not only determines node's weight using its own features, but also considers the direct effect of feature of adjacent nodes. It determines the weight of virtual links between nodes and the effect of the weights on determining node's final weight. By using this strategy, the highest weight is assigned to the best choices for being the cluster heads and the accuracy of nodes selection increases. The performance of new algorithm is analyzed by using computer simulation. The results show that produced clusters have longer lifetime and higher stability. Mathematical simulation shows that this algorithm has high availability in case of failure. PMID:25114965

  1. BCDP: Budget Constrained and Delay-Bounded Placement for Hybrid Roadside Units in Vehicular Ad Hoc Networks

    PubMed Central

    Li, Peng; Huang, Chuanhe; Liu, Qin

    2014-01-01

    In vehicular ad hoc networks, roadside units (RSUs) placement has been proposed to improve the the overall network performance in many ITS applications. This paper addresses the budget constrained and delay-bounded placement problem (BCDP) for roadside units in vehicular ad hoc networks. There are two types of RSUs: cable connected RSU (c-RSU) and wireless RSU (w-RSU). c-RSUs are interconnected through wired lines, and they form the backbone of VANETs, while w-RSUs connect to other RSUs through wireless communication and serve as an economical extension of the coverage of c-RSUs. The delay-bounded coverage range and deployment cost of these two cases are totally different. We are given a budget constraint and a delay bound, the problem is how to find the optimal candidate sites with the maximal delay-bounded coverage to place RSUs such that a message from any c-RSU in the region can be disseminated to the more vehicles within the given budget constraint and delay bound. We first prove that the BCDP problem is NP-hard. Then we propose several algorithms to solve the BCDP problem. Simulation results show the heuristic algorithms can significantly improve the coverage range and reduce the total deployment cost, compared with other heuristic methods. PMID:25436656

  2. Predicting impact of multi-paths on phase change in map-based vehicular ad hoc networks

    NASA Astrophysics Data System (ADS)

    Rahmes, Mark; Lemieux, George; Sonnenberg, Jerome; Chester, David B.

    2014-05-01

    Dynamic Spectrum Access, which through its ability to adapt the operating frequency of a radio, is widely believed to be a solution to the limited spectrum problem. Mobile Ad Hoc Networks (MANETs) can extend high capacity mobile communications over large areas where fixed and tethered-mobile systems are not available. In one use case with high potential impact cognitive radio employs spectrum sensing to facilitate identification of allocated frequencies not currently accessed by their primary users. Primary users own the rights to radiate at a specific frequency and geographic location, secondary users opportunistically attempt to radiate at a specific frequency when the primary user is not using it. We quantify optimal signal detection in map based cognitive radio networks with multiple rapidly varying phase changes and multiple orthogonal signals. Doppler shift occurs due to reflection, scattering, and rapid vehicle movement. Path propagation as well as vehicle movement produces either constructive or destructive interference with the incident wave. Our signal detection algorithms can assist the Doppler spread compensation algorithm by deciding how many phase changes in signals are present in a selected band of interest. Additionally we can populate a spatial radio environment map (REM) database with known information that can be leveraged in an ad hoc network to facilitate Dynamic Spectrum Access. We show how topography can help predict the impact of multi-paths on phase change, as well as about the prediction from dense traffic areas. Utilization of high resolution geospatial data layers in RF propagation analysis is directly applicable.

  3. BCDP: Budget constrained and delay-bounded placement for hybrid roadside units in vehicular ad hoc networks.

    PubMed

    Li, Peng; Huang, Chuanhe; Liu, Qin

    2014-01-01

    In vehicular ad hoc networks, roadside units (RSUs) placement has been proposed to improve the the overall network performance in many ITS applications. This paper addresses the budget constrained and delay-bounded placement problem (BCDP) for roadside units in vehicular ad hoc networks. There are two types of RSUs: cable connected RSU (c-RSU) and wireless RSU (w-RSU). c-RSUs are interconnected through wired lines, and they form the backbone of VANETs, while w-RSUs connect to other RSUs through wireless communication and serve as an economical extension of the coverage of c-RSUs. The delay-bounded coverage range and deployment cost of these two cases are totally different. We are given a budget constraint and a delay bound, the problem is how to find the optimal candidate sites with the maximal delay-bounded coverage to place RSUs such that a message from any c-RSU in the region can be disseminated to the more vehicles within the given budget constraint and delay bound. We first prove that the BCDP problem is NP-hard. Then we propose several algorithms to solve the BCDP problem. Simulation results show the heuristic algorithms can significantly improve the coverage range and reduce the total deployment cost, compared with other heuristic methods. PMID:25436656

  4. A novel clustering algorithm for mobile ad hoc networks based on determination of virtual links' weight to increase network stability.

    PubMed

    Karimi, Abbas; Afsharfarnia, Abbas; Zarafshan, Faraneh; Al-Haddad, S A R

    2014-01-01

    The stability of clusters is a serious issue in mobile ad hoc networks. Low stability of clusters may lead to rapid failure of clusters, high energy consumption for reclustering, and decrease in the overall network stability in mobile ad hoc network. In order to improve the stability of clusters, weight-based clustering algorithms are utilized. However, these algorithms only use limited features of the nodes. Thus, they decrease the weight accuracy in determining node's competency and lead to incorrect selection of cluster heads. A new weight-based algorithm presented in this paper not only determines node's weight using its own features, but also considers the direct effect of feature of adjacent nodes. It determines the weight of virtual links between nodes and the effect of the weights on determining node's final weight. By using this strategy, the highest weight is assigned to the best choices for being the cluster heads and the accuracy of nodes selection increases. The performance of new algorithm is analyzed by using computer simulation. The results show that produced clusters have longer lifetime and higher stability. Mathematical simulation shows that this algorithm has high availability in case of failure.

  5. BCDP: Budget constrained and delay-bounded placement for hybrid roadside units in vehicular ad hoc networks.

    PubMed

    Li, Peng; Huang, Chuanhe; Liu, Qin

    2014-01-01

    In vehicular ad hoc networks, roadside units (RSUs) placement has been proposed to improve the the overall network performance in many ITS applications. This paper addresses the budget constrained and delay-bounded placement problem (BCDP) for roadside units in vehicular ad hoc networks. There are two types of RSUs: cable connected RSU (c-RSU) and wireless RSU (w-RSU). c-RSUs are interconnected through wired lines, and they form the backbone of VANETs, while w-RSUs connect to other RSUs through wireless communication and serve as an economical extension of the coverage of c-RSUs. The delay-bounded coverage range and deployment cost of these two cases are totally different. We are given a budget constraint and a delay bound, the problem is how to find the optimal candidate sites with the maximal delay-bounded coverage to place RSUs such that a message from any c-RSU in the region can be disseminated to the more vehicles within the given budget constraint and delay bound. We first prove that the BCDP problem is NP-hard. Then we propose several algorithms to solve the BCDP problem. Simulation results show the heuristic algorithms can significantly improve the coverage range and reduce the total deployment cost, compared with other heuristic methods.

  6. 77 FR 61019 - Aquatic Nuisance Species Task Force Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-05

    ....php . FOR FURTHER INFORMATION CONTACT: Susan Mangin, Executive Secretary, ANS Task Force, at (703) 358... site at: http://anstaskforce.gov/meetings.php . Accessibility Information The meeting location...

  7. Scope of practice in speech-language pathology. Ad Hoc Committee on Scope of Practice in Speech-Language Pathology.

    PubMed

    1996-01-01

    This scope of practice in speech-language pathology statement is an official policy of the American Speech-Language-Hearing Association (ASHA). It was developed by the Ad Hoc Committee on Scope of Practice in Speech-Language Pathology: Sarah W. Blackstone, chair; Diane Paul-Brown, ex officio; David A. Brandt; Rhonda Friedlander; Luis F. Riquelme; and Mark Ylvisaker. Crystal S. Cooper, vice president for professional practices in speech-language pathology, served as monitoring vice-president. The contributions of the editor, Jude Langsam, and select the widespread peer reviewers are grateful acknowledged. This statement supersedes the Scope of Practice, Speech-Language Pathology and Audiology statement (LC 6-89), Asha, April 1990, 1-2.

  8. Augmenting 3d City Model Components by Geodata Joins to Facilitate Ad-Hoc Geometric-Topologically Sound Integration

    NASA Astrophysics Data System (ADS)

    Kaden, R.; Kolbe, T. H.

    2012-07-01

    Virtual 3D city models are integrated complex compositions of spatial data of different themes, origin, quality, scale, and dimensions. Within this paper, we address the problem of spatial compatibility of geodata aiming to provide support for ad-hoc integration of virtual 3D city models including geodata of different sources and themes like buildings, terrain, and city furniture. In contrast to related work which is dealing with the integration of redundant geodata structured according to different data models and ontologies, we focus on the integration of complex 3D models of the same representation (here: CityGML) but regarding to the geometric-topological consistent matching of non-homologous objects, e.g. a building is connected to a road, and their geometric homogenisation. Therefore, we present an approach including a data model for a Geodata Join and the general concept of an integration procedure using the join information. The Geodata Join aims to bridge the lack of information between fragmented geodata by describing the relationship between adjacent objects from different datasets. The join information includes the geometrical representation of those parts of an object, which have a specific/known topological or geometrical relationship to another object. This part is referred to as a Connector and is either described by points, lines, or surfaces of the existing object geometry or by additional join geometry. In addition, the join information includes the specification of the connected object in the other dataset and the description of the topological and geometrical relationship between both objects, which is used to aid the matching process. Furthermore, the Geodata Join contains object-related information like accuracy values and restrictions of movement and deformation which are used to optimize the integration process. Based on these parameters, a functional model including a matching algorithm, transformation methods, and conditioned adjustment

  9. Potentials, Limitations and Applications of long-term and mobile ad-hoc Wireless Sensor Networks for Environmental Monitoring

    NASA Astrophysics Data System (ADS)

    Bumberger, Jan; Mollenhauer, Hannes; Lapteva, Yulia; Hutschenreuther, Tino; Toepfer, Hannes; Dietrich, Peter

    2014-05-01

    To characterize environmental systems it is necessary to identify and describe processes with suitable methods. Environmental systems are often characterized by their high heterogeneity, so individual measurements for their complete representation are often not sufficient. The application of wireless sensor networks in terrestrial and aquatic ecosystems offer significant benefits as a better consideration of the local test conditions becomes possible. This can be essential for the monitoring of heterogeneous environmental systems. Significant advantages in the application of mobile ad-hoc wireless sensor networks are their self-organizing behavior, resulting in a major reduction in installation and operation costs and time. In addition, a point measurement with a sensor is significantly improved by measuring at several points. It is also possible to perform analog and digital signal processing and computation on the basis of the measured data close to the sensor. Hence, a significant reduction of the data to be transmitted can be achieved which leads to a better energy management of sensor nodes. Furthermore, their localization via satellite, the miniaturization of the nodes and long-term energy self-sufficiency are current topics under investigation. The possibilities and limitations of the applicability of wireless sensor networks for long-term and mobile environmental monitoring are presented. A concepts and realization example are given in the field of micrometeorology and soil parameters for the interaction of biotic and abiotic processes .This long term monitoring is part of the Global Change Experimental Facility (GCEF), a large field-based experimental platform to assess the effects of climate change on ecosystem functions and processes under different land-use scenarios. Furthermore a mobile ad-hoc sensor network is presented for the monitoring of water induced mass wasting processes.

  10. A Report of the Computer Application Task Force.

    ERIC Educational Resources Information Center

    New Jersey State Library, Trenton.

    Ways in which computer technology can be used to support the development of a library network are proposed by the Computer Application Task Force, following the recommendations of the New Jersey Statewide Planning Group and its several task forces. A summary of three primary recommendations is followed by a general discussion of opportunities…

  11. 75 FR 70764 - Small Business Information Security Task Force

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-18

    ... resources have not fully trickled down to, or are not being well utilized by many small businesses... Task Force is chartered through 2013, he expressed the expectation that its work might be accomplished... on the work of the Task Force to the SBA Administrator. He concluded his introduction by...

  12. Economic and Workforce Development. [Final Task Force Report].

    ERIC Educational Resources Information Center

    Howard Community Coll., Columbia, MD.

    This document describes the vision and priorities of Howard Community College's (HCC's) Economic and Workforce Development Task Force. The task force's commission was to identify the long- and short-term skills businesses will demand of the workforce in the Greater Baltimore area and what Howard Community College must do to continue developing…

  13. 78 FR 28292 - Gulf War Veterans' Illnesses Task Force

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-14

    ... AFFAIRS Gulf War Veterans' Illnesses Task Force AGENCY: Department of Veterans Affairs (VA). ACTION... the Gulf War Veterans' Illnesses Task Force (GWVI-TF) in August 2009 to conduct a comprehensive review of VA's approach to and programs addressing 1990-1991 Gulf War Veterans' illnesses. The third...

  14. 76 FR 65321 - Gulf War Veterans' Illnesses Task Force

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-20

    ... AFFAIRS Gulf War Veterans' Illnesses Task Force AGENCY: Department of Veterans Affairs (VA). ACTION... the Gulf War Veterans' Illnesses Task Force (GWVI-TF) in August 2009 to conduct a comprehensive review of VA's approach to and programs addressing 1990-1991 Gulf War Veterans' illnesses. The second...

  15. 75 FR 16577 - Gulf War Veterans' Illnesses Task Force

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-01

    ... AFFAIRS Gulf War Veterans' Illnesses Task Force AGENCY: Department of Veterans Affairs (VA). ACTION... the Gulf War Veterans' Illnesses Task Force (GWVI-TF) in August 2009 to conduct a comprehensive review of VA's approach to and programs addressing 1990-1991 Gulf War Veterans' illnesses. The Gulf...

  16. Report of the WPA Task Force on Brain Drain

    PubMed Central

    GUREJE, OYE; HOLLINS, SHEILA; BOTBOL, MICHEL; JAVED, AFZAL; JORGE, MIGUE; OKECH, VIOLET; RIBA, MICHELLE; TRIVEDI, JITENDRA; SARTORIUS, NORMAN; JENKINS, RACHEL

    2009-01-01

    The brain drain of health professionals is an issue of continuing interest and debate. The WPA set up a Task Force to examine the phenomenon as it relates specifically to mental health professionals. This report provides a description of the work of the Task Force and its recommendations in regard to how the WPA might act to help address the issue PMID:19516936

  17. Human Health Effects, Task Force Assessment, Preliminary Report.

    ERIC Educational Resources Information Center

    Aronow, Wilbert S.; And Others

    Presented in this preliminary report is one of seven assessments conducted by a special task force of Project Clean Air, the Human Health Effects Task Force. The reports summarize assessments of the state of knowledge on various air pollution problems, particularly in California, and make tentative recommendations as to what the University of…

  18. Management Skills. Skills Task Force Research Paper 3.

    ERIC Educational Resources Information Center

    Johnson, Steven; Winterton, Jonathan

    A task force was convened to identify the nature, extent, and pattern of skill needs and shortages for managerial occupations in the United Kingdom (UK). The task force began by examining the key challenges facing managers in the UK. The following factors were among those considered: economic policies promoting liberalization and deregulation;…

  19. Illinois Community College Board: Baccalaureate Access Task Force

    ERIC Educational Resources Information Center

    Illinois Community College Board, 2005

    2005-01-01

    This report presents the background and history of community college role in baccalaureate access in Illinois from 1901 to the present and describes the role of the Baccalaureate Access Task Force, which commenced its work in December 2004. The Baccalaureate Access Task Force was charged with examining the extent of the baccalaureate access issues…

  20. 76 FR 11307 - Small Business Information Security Task Force

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-01

    ... From the Federal Register Online via the Government Publishing Office SMALL BUSINESS... scope requirements for the Task Force with specific questions of Identity Theft, Privacy, and Government Contracting information. Additionally, resource and staffing issues to support the work of the Task Force...

  1. Report of the Task Force on Institutional Effectiveness Measures.

    ERIC Educational Resources Information Center

    Arizona State Board of Directors for Community Colleges, Phoenix.

    The Task Force on Institutional Effectiveness Measures was formed by the State Board of Directors for Community Colleges of Arizona to develop a statewide plan for systematically demonstrating the degree to which community colleges accomplish their diverse missions. Two subgroups were formed in the Task Force on transfer and college programs and…

  2. Alberta North Needs Assessment Task Force. Interim Report Number One.

    ERIC Educational Resources Information Center

    Dumont, F. J.

    Contracted for 18 months and employing local people, the Alberta North Needs Assessment (ANNA) Task Force assessed the educational, social and cultural needs of North Albertans, and translated these needs into potential programs integrated, where desirable, with other government and local programs. The Task Force examined the community, client,…

  3. National Library of Education Advisory Task Force. Briefing Book.

    ERIC Educational Resources Information Center

    National Library of Education (ED/OERI), Washington, DC.

    This briefing book with appendices was prepared for the initial meetings of the National Library of Education Advisory Task Force (NLE/ATF), in March 1996. An agenda for this meeting is included in the briefing book. The first section, "Governing Authorities for NLE and the Advisory Task Force," contains a copy of Public Law 103-227, Title X, Part…

  4. Urban search and rescue medical teams: FEMA Task Force System.

    PubMed

    Barbera, J A; Lozano, M

    1993-01-01

    Recent national and international disasters involving collapsed structures and trapped casualties (Mexico City; Armenia; Iran; Philippines; Charleston, South Carolina; Loma Prieta, California; and others) have provoked a heightened national concern for the development of an adequate capability to respond quickly and effectively to this type of calamity. The Federal Emergency Management Agency (FEMA) has responded to this need by developing an Urban Search and Rescue (US&R) Response System, a national system of multi-disciplinary task forces for rapid deployment to the site of a collapsed structure incident. Each 56-person task force includes a medical team capable of providing advanced emergency medical care both for task force members and for victims located and reached by the sophisticated search, rescue, and technical components of the task force. This paper reviews the background and development of urban search and rescue, and describes the make-up and function of the Federal Emergency Management Agency (FEMA) Task Force medical teams.

  5. Decentralized Opportunistic Spectrum Resources Access Model and Algorithm toward Cooperative Ad-Hoc Networks.

    PubMed

    Liu, Ming; Xu, Yang; Mohammed, Abdul-Wahid

    2016-01-01

    Limited communication resources have gradually become a critical factor toward efficiency of decentralized large scale multi-agent coordination when both system scales up and tasks become more complex. In current researches, due to the agent's limited communication and observational capability, an agent in a decentralized setting can only choose a part of channels to access, but cannot perceive or share global information. Each agent's cooperative decision is based on the partial observation of the system state, and as such, uncertainty in the communication network is unavoidable. In this situation, it is a major challenge working out cooperative decision-making under uncertainty with only a partial observation of the environment. In this paper, we propose a decentralized approach that allows agents cooperatively search and independently choose channels. The key to our design is to build an up-to-date observation for each agent's view so that a local decision model is achievable in a large scale team coordination. We simplify the Dec-POMDP model problem, and each agent can jointly work out its communication policy in order to improve its local decision utilities for the choice of communication resources. Finally, we discuss an implicate resource competition game, and show that, there exists an approximate resources access tradeoff balance between agents. Based on this discovery, the tradeoff between real-time decision-making and the efficiency of cooperation using these channels can be well improved. PMID:26727504

  6. Decentralized Opportunistic Spectrum Resources Access Model and Algorithm toward Cooperative Ad-Hoc Networks

    PubMed Central

    Liu, Ming; Xu, Yang; Mohammed, Abdul-Wahid

    2016-01-01

    Limited communication resources have gradually become a critical factor toward efficiency of decentralized large scale multi-agent coordination when both system scales up and tasks become more complex. In current researches, due to the agent’s limited communication and observational capability, an agent in a decentralized setting can only choose a part of channels to access, but cannot perceive or share global information. Each agent’s cooperative decision is based on the partial observation of the system state, and as such, uncertainty in the communication network is unavoidable. In this situation, it is a major challenge working out cooperative decision-making under uncertainty with only a partial observation of the environment. In this paper, we propose a decentralized approach that allows agents cooperatively search and independently choose channels. The key to our design is to build an up-to-date observation for each agent’s view so that a local decision model is achievable in a large scale team coordination. We simplify the Dec-POMDP model problem, and each agent can jointly work out its communication policy in order to improve its local decision utilities for the choice of communication resources. Finally, we discuss an implicate resource competition game, and show that, there exists an approximate resources access tradeoff balance between agents. Based on this discovery, the tradeoff between real-time decision-making and the efficiency of cooperation using these channels can be well improved. PMID:26727504

  7. Ad HOC Model Generation Using Multiscale LIDAR Data from a Geospatial Database

    NASA Astrophysics Data System (ADS)

    Gordon, M.; Borgmann, B.; Gehrung, J.; Hebel, M.; Arens, M.

    2015-08-01

    Due to the spread of economically priced laser scanning technology nowadays, especially in the field of topographic surveying and mapping, ever-growing amounts of data need to be handled. Depending on the requirements of the specific application, airborne, mobile or terrestrial laser scanners are commonly used. Since visualizing this flood of data is not feasible with classical approaches like raw point cloud rendering, real time decision making requires sophisticated solutions. In addition, the efficient storage and recovery of 3D measurements is a challenging task. Therefore we propose an approach for the intelligent storage of 3D point clouds using a spatial database. For a given region of interest, the database is queried for the data available. All resulting point clouds are fused in a model generation process, utilizing the fact that low density airborne measurements could be used to supplement higher density mobile or terrestrial laser scans. The octree based modeling approach divides and subdivides the world into cells of varying size and fits one plane per cell, once a specified amount of points is present. The resulting model exceeds the completeness and precision of every single data source and enables for real time visualization. This is especially supported by data compression ratios of about 90%.

  8. Decentralized Opportunistic Spectrum Resources Access Model and Algorithm toward Cooperative Ad-Hoc Networks.

    PubMed

    Liu, Ming; Xu, Yang; Mohammed, Abdul-Wahid

    2016-01-01

    Limited communication resources have gradually become a critical factor toward efficiency of decentralized large scale multi-agent coordination when both system scales up and tasks become more complex. In current researches, due to the agent's limited communication and observational capability, an agent in a decentralized setting can only choose a part of channels to access, but cannot perceive or share global information. Each agent's cooperative decision is based on the partial observation of the system state, and as such, uncertainty in the communication network is unavoidable. In this situation, it is a major challenge working out cooperative decision-making under uncertainty with only a partial observation of the environment. In this paper, we propose a decentralized approach that allows agents cooperatively search and independently choose channels. The key to our design is to build an up-to-date observation for each agent's view so that a local decision model is achievable in a large scale team coordination. We simplify the Dec-POMDP model problem, and each agent can jointly work out its communication policy in order to improve its local decision utilities for the choice of communication resources. Finally, we discuss an implicate resource competition game, and show that, there exists an approximate resources access tradeoff balance between agents. Based on this discovery, the tradeoff between real-time decision-making and the efficiency of cooperation using these channels can be well improved.

  9. Homoclinic chaos in axisymmetric Bianchi-IX cosmological models with an ad hoc quantum potential

    SciTech Connect

    Correa, G. C.; Stuchi, T. J.; Joras, S. E.

    2010-04-15

    In this work we study the dynamics of the axisymmetric Bianchi-IX cosmological model with a term of quantum potential added. As it is well known, this class of Bianchi-IX models is homogeneous and anisotropic with two scale factors, A(t) and B(t), derived from the solution of Einstein's equation for general relativity. The model we use in this work has a cosmological constant and the matter content is dust. To this model we add a quantum-inspired potential that is intended to represent short-range effects due to the general relativistic behavior of matter in small scales and play the role of a repulsive force near the singularity. We find that this potential restricts the dynamics of the model to positive values of A(t) and B(t) and alters some qualitative and quantitative characteristics of the dynamics studied previously by several authors. We make a complete analysis of the phase space of the model finding critical points, periodic orbits, stable/unstable manifolds using numerical techniques such as Poincare section, numerical continuation of orbits, and numerical globalization of invariant manifolds. We compare the classical and the quantum models. Our main result is the existence of homoclinic crossings of the stable and unstable manifolds in the physically meaningful region of the phase space [where both A(t) and B(t) are positive], indicating chaotic escape to inflation and bouncing near the singularity.

  10. Ad-hoc KEEN-type Waves and their Occasional Resemblance to KdV Waveforms

    NASA Astrophysics Data System (ADS)

    Tyshetskiy, Yuriy; Afeyan, Bedros

    2005-10-01

    Nonlinear kinetic waves of the KEEN type [1] but constructed with two BGK recipes are tested with 1D Vlasov-Poisson simulation (1DVPS). One is that of Allis [2] as modified by Johnston (unpublished), the other is that of Eliasson and Shukla [3]. Strong kinetic waves survive well, but not weaker ones. The potential wave trains resemble those from the Korteweg-deVries equation. This proves to be natural when charge density variation with electrostatic potential is like a quadratic polynomial. For expositions on the physics of ponderomotively driven KEEN waves, consult presentations by Afeyan and Savchenko, this conference. (Part of this work was performed under the auspices of the U.S. Department of Energy under grant number DE-FG03-NA00059.) [1] B. Afeyan et al., ``Kinetic Electrostatic Electron Nonlinear (KEEN) Waves and their interactions driven by the ponderomotive force of crossing laser beams'', Proc. IFSA (Inertial Fusion Sciences and Applications 2003, Monterey, CA), 213, B. Hammel, D. Meyerhofer, J. Meyer-ter-Vehn and H. Azechi, editors, American Nuclear Society, 2004. [2] W.P. Allis, paper 3 (pp.21-42), in ``In Honor of Philip M. Morse'', ed. H. Feshbach and K. Ingard, MIT Press (1969). [3] B. Eliasson and P.K. Shukla, Phys. Rev. E 71, 046402 (2005)

  11. Task Force Report 2. Report of the Task Force on Medical Education

    PubMed Central

    Bucholtz, John R.; Matheny, Samuel C.; Pugno, Perry A.; David, Alan; Bliss, Erika B.; Korin, Eliana C.

    2004-01-01

    BACKGROUND For family physicians to be prepared to deliver the core attributes and system services of family medicine in the future, especially within the New Model of family medicine that has been proposed, changes will need to be made in how family physicians are trained. This Future of Family Medicine task force report presents a plan for implementing appropriate changes in medical school and residency programs. METHODS As a foundation for the development of specific recommendations on medical education, this task force reviewed relevant findings from research conducted for the Future of Family Medicine project and presents an historical perspective of the specialty. We addressed accreditation criteria for family medicine residency programs and examined various relevant projects and programs, including the Academic Family Medicine Organizations/Association of Family Practice Residency Directors Action Plan, the Residency Assistance Program Criteria for Excellence, the Accreditation Council for Graduate Medical Education Outcome Project, the Family Medicine Curriculum Resource Project, and the Arizona Study of Career Selection Factors. The task force relied on the Institute of Medicine report, Health Professions Education: A Bridge to Quality, as a foundation for proposing a new vision and mission for family medicine residency education. MAJOR FINDINGS The training of future family physicians must be grounded in evidence-based medicine that is relevant to the care of the whole person in a relationship and community context. It also must be technologically up to date, built on a solid foundation of clinical science, and strong in the components of interpersonal and behavioral skills. Family physicians must continue to be broadly trained and have the competencies required to practice in a variety of settings. It is important that training in maternity care and training in the care of hospitalized patients continue to be included in the family medicine residency

  12. Task Force Report 4. Report of the Task Force on Marketing and Communications

    PubMed Central

    Dickinson, John C.; Evans, Kenneth L.; Carter, Jan; Burke, Kevin

    2004-01-01

    BACKGROUND To ensure the success of the proposed New Model of family medicine and to create a better understanding of the nature and role of family medicine, an effective communications plan must be developed and implemented. This Future of Family Medicine task force report proposes strategies for communicating the role of family physicians within medicine, as well as to purchasers, consumers, and other entities. METHODS After reviewing the findings from the research conducted for the Future of Family Medicine project, the task force presents a preliminary brand-positioning strategy for family medicine messages. Based on this strategy, the task force identifies 5 major audiences to which family medicine communications should be directed. A consistent method was used to determine optimum strategies to address each audience: defining the audience, assessing the literature and other pertinent evidence, identifying the communication objectives, determining the key messages, developing brand promises, and proposing strategies and tactics to support the messages and objectives. Preliminary communications plans are then presented for each of the 5 target audiences. MAJOR FINDINGS It is important that the organizations involved in family medicine make a multiyear commitment of resources to implement and support an aggressive communications strategy, which is based on key messages to target audiences. A concerted effort is particularly needed to address the declining interest among medical students in the specialty. Implementing a comprehensive family medicine career development program may be one effective strategy to reverse this trend. To help eliminate the current confusion among the public regarding family medicine and to promote clarity and consistency in terminology, the specialty should replace the name family practice with family medicine and a new graphic symbol for the discipline of family medicine should be developed. CONCLUSION As a discipline, family medicine

  13. Ad Hoc Influenza Vaccination During Years of Significant Antigenic Drift in a Tropical City With 2 Seasonal Peaks

    PubMed Central

    Wong, Martin C.S.; Nelson, E. Anthony S.; Leung, Czarina; Lee, Nelson; Chan, Martin C.W.; Choi, Kin Wing; Rainer, Timothy H.; Cheng, Frankie W.T.; Wong, Samuel Y.S.; Lai, Christopher K.C.; Lam, Bosco; Cheung, Tak Hong; Leung, Ting Fan; Chan, Paul K.S.

    2016-01-01

    Abstract We evaluated the acceptability of an additional ad hoc influenza vaccination among the health care professionals following seasons with significant antigenic drift. Self-administered, anonymous surveys were performed by hard copy questionnaires in public hospitals, and by an on-line platform available to all healthcare professionals, from April 1st to May 31st, 2015. A total of 1290 healthcare professionals completed the questionnaires, including doctors, nurses, and allied health professionals working in both the public and private systems. Only 31.8% of participating respondents expressed an intention to receive the additional vaccine, despite that the majority of them agreed or strongly agreed that it would bring benefit to the community (88.9%), save lives (86.7%), reduce medical expenses (76.3%), satisfy public expectation (82.8%), and increase awareness of vaccination (86.1%). However, a significant proportion expressed concern that the vaccine could disturb the normal immunization schedule (45.5%); felt uncertain what to do in the next vaccination round (66.0%); perceived that the summer peak might not occur (48.2%); and believed that the summer peak might not be of the same virus (83.5%). Furthermore, 27.8% of all respondents expected that the additional vaccination could weaken the efficacy of previous vaccinations; 51.3% was concerned about side effects; and 61.3% estimated that there would be a low uptake rate. If the supply of vaccine was limited, higher priority groups were considered to include the elderly aged ≥65 years with chronic medical conditions (89.2%), the elderly living in residential care homes (87.4%), and long-stay residents of institutions for the disabled (80.7%). The strongest factors associated with accepting the additional vaccine included immunization with influenza vaccines in the past 3 years, higher perceived risk of contracting influenza, and higher perceived severity of the disease impact. The acceptability to an

  14. ACR-SNM Task Force on Nuclear Medicine Training: report of the task force.

    PubMed

    Guiberteau, Milton J; Graham, Michael M

    2011-06-01

    The expansion of knowledge and technological advances in nuclear medicine and radiology require physicians to have more expertise in functional and anatomic imaging. The convergence of these two specialties into the new discipline of molecular imaging has also begun to place demands on residency training programs for additional instruction in physiology and molecular biology. These changes have unmasked weaknesses in current nuclear medicine and radiology training programs. Adding to the impetus for change are the attendant realities of the job market and uncertain employment prospects for physicians trained in nuclear medicine but not also trained in diagnostic radiology. With this background, the ACR and the Society of Nuclear Medicine convened the Task Force on Nuclear Medicine Training to define the issues and develop recommendations for resident training.

  15. Report of NASA Lunar Energy Enterprise Case Study Task Force

    NASA Technical Reports Server (NTRS)

    Kearney, John J.

    1989-01-01

    The Lunar Energy Enterprise Case Study Task Force was asked to determine the economic viability and commercial potential of mining and extracting He-3 from the lunar soil, and transporting the material to Earth for use in a power-generating fusion reactor. Two other space energy projects, the Space Power Station (SPS) and the Lunar Power Station (LPS), were also reviewed because of several interrelated aspects of these projects. The specific findings of the Task Force are presented. Appendices contain related papers generated by individual Task Force Members.

  16. Ad Hoc Conference on the Education of Migrants (Strasbourg, France, November 5-8, 1974). Council of Europe, Standing Conference of European Ministers of Education, Country Reports.

    ERIC Educational Resources Information Center

    Council of Europe, Strasbourg (France). Documentation Center for Education in Europe.

    In Resolution No. 4 of their 7th Conference (Brussels, June 1971) the Ministers of Education of 21 nations signatory to the European Cultural Convention instructed the Committee of Senior Officials to study, in collaboration with the Secretariat of the Council of Europe, the practical arrangements for holding an ad hoc conference on problems…

  17. Report of the Ad Hoc Committee to Review the Status of Women at The Ohio State University, Phases I and II.

    ERIC Educational Resources Information Center

    Schoen, Kathryn T.; And Others

    In the late summer of 1970, an Ad Hoc Committee at the Ohio State University was appointed (1) to review the status of all women at the University; and (2) to submit a report of the findings and recommendations. The Committee consisted of 3 undergraduate students, 1 graduate student, 2 administrative personnel, and 3 faculty members, one of whom…

  18. Preserving Nevada's Environmental Heritage: A Report of the Ad Hoc Committee on Environmental Quality. Final Report to the Governor's Natural Resources Council.

    ERIC Educational Resources Information Center

    Nevada State Dept. of Conservation and Natural Resources, Carson City.

    The Environmental Quality Ad Hoc Committee has prepared this report for the Governor's Natural Resources Council (Nevada). It is a compilation of available factual data focusing attention on needed statutory and administrative changes to preserve Nevada's environmental heritage and from which recommendations for future budgetary and legislative…

  19. Meeting the Needs of CALS Students for Computing Capabilities. Final Report of the Ad Hoc Committee on College of Agriculture and Life Sciences Student Computing Competencies.

    ERIC Educational Resources Information Center

    Monk, David; And Others

    The Ad Hoc Committee on the Cornell University (New York) College of Agriculture and Life Sciences (CALS) Student Computing Competencies was appointed in the fall of 1995 to determine (1) what all CALS undergraduate students should know about computing and related technologies; (2) how the college can make it possible for students to develop these…

  20. Consensus statement: the use of intravenous immunoglobulin in the treatment of neuromuscular conditions report of the AANEM ad hoc committee.

    PubMed

    Donofrio, Peter D; Berger, Alan; Brannagan, Thomas H; Bromberg, Mark B; Howard, James F; Latov, Normal; Quick, Adam; Tandan, Rup

    2009-11-01

    Intravenous immunoglobulin (IVIG) is a therapeutic biologic agent that has been prescribed for over two decades to treat various neuromuscular conditions. Most of the treatments are given off-label, as little evidence from large randomized trials exists to support its use. Recently, IGIV-C has received an indication for the treatment of chronic inflammatory demyelinating polyneuropathy (CIDP). Because of the lack of evidence, an ad hoc committee of the AANEM was convened to draft a consensus statement on the rational use of IVIG for neuromuscular disorders. Recommendations were categorized as Class I-IV based on the strength of the medical literature. Class I evidence exists to support the prescription of IVIG to treat patients with Guillain-Barré syndrome (GBS), CIDP, multifocal motor neuropathy, refractory exacerbations of myasthenia gravis, Lambert-Eaton syndrome, dermatomyositis, and stiff person syndrome. Treatment of Fisher syndrome, polymyositis, and certain presumed autoimmune neuromuscular disorders is supported only by Class IV studies, whereas there is no convincing data to substantiate the treatment of inclusion body myopathy (IBM), idiopathic neuropathies, brachial plexopathy, or diabetic amyotrophy using IVIG. Treatment with IVIG must be administered in the context of its known adverse effects. There is little evidence to advise the clinician on the proper dosing of IVIG and duration of therapy.

  1. Two new ad-hoc models of detection physics and their evaluation for navigated beta probe surface imaging

    NASA Astrophysics Data System (ADS)

    Shakir, Dzhoshkun I.; Hartl, Alexander; Schneider, Florian R.; Pulko, Jozef; Ziegler, Sibylle I.; Navab, Nassir; Lasser, Tobias

    2012-02-01

    Intra-operative surface imaging with navigated beta probes in conjunction with positron-emitting radiotracers like 18F-FDG has been shown to enable control of tumor resection borders. We showed previously that employing iterative reconstruction (MLEM) in conjunction with an ad-hoc model of the detection physics (based on solid-angle geometry, SA) improves the image quality. In this study, we sampled the beta probe readings of a point source using a precision step-motor to generate a look-up-table (LUT) model. We also generated a simplified geometrical model (SG) based on this data set. To see how these two models influence the image quality compared to the old SA model, we reconstructed images from sparsely sampled datasets of a phantom with three hotspots using each model. The images yielded 76% (SA), 81% (SG), and 81% (LUT) mean NCC compared to the ground truth. The SG and LUT models, however, could resolve the hotspots better in the datasets where the detector-to-phantom distance was larger. Additionally, we compared the deviations of the SA and SG analytical models to the measured LUT model, where we found that the SG model gives estimates substantially closer to the actual beta probe readings than the previous SA model.

  2. Extended Virtual Spring Mesh (EVSM): The Distributed Self-Organizing Mobile Ad Hoc Network for Area Exploration

    SciTech Connect

    Kurt Derr

    2011-12-01

    Mobile Ad hoc NETworks (MANETs) are distributed self-organizing networks that can change locations and configure themselves on the fly. This paper focuses on an algorithmic approach for the deployment of a MANET within an enclosed area, such as a building in a disaster scenario, which can provide a robust communication infrastructure for search and rescue operations. While a virtual spring mesh (VSM) algorithm provides scalable, self-organizing, and fault-tolerant capabilities required by aMANET, the VSM lacks the MANET's capabilities of deployment mechanisms for blanket coverage of an area and does not provide an obstacle avoidance mechanism. This paper presents a new technique, an extended VSM (EVSM) algorithm that provides the following novelties: (1) new control laws for exploration and expansion to provide blanket coverage, (2) virtual adaptive springs enabling the mesh to expand as necessary, (3) adapts to communications disturbances by varying the density and movement of mobile nodes, and (4) new metrics to assess the performance of the EVSM algorithm. Simulation results show that EVSM provides up to 16% more coverage and is 3.5 times faster than VSM in environments with eight obstacles.

  3. A Proposal and Evaluation of Security Camera System at a Car Park in an Ad-Hoc Network

    NASA Astrophysics Data System (ADS)

    Uemura, Wataru; Murata, Masashi

    In recent year, ad-hoc network technology has gained attention, which consists of not access points and base stations but of wireless nodes. In this network, it is difficult to maintain the whole data flow because of the absence of access points as the network administrator when nodes share the data. This paper proposes the security camera system which has only nodes sharing the taken pictures and has the robustness against the data destroying. The sender node cannot know whether packets are received or not by neighboring nodes in broadcasting because of a unidirectional communication. So in our proposed method, the sender node selects the receiver node from neighboring nodes, and they communicate with each other. On the other hand, neighboring nodes listen to packets between the sender node and the receiver node. After that, this method guarantees nodes of more than 1 which receive a data in broadcasting. We construct the security camera system using wireless nodes with the IEEE 802.15.4 specification and show the performance for security. At last, using the simulator we show the efficiency in the large environment, and conclude this paper.

  4. Performance analysis of multi-radio routing protocol in cognitive radio ad hoc networks under different path failure rate

    NASA Astrophysics Data System (ADS)

    Che-Aron, Z.; Abdalla, A. H.; Abdullah, K.; Hassan, W. H.

    2013-12-01

    In recent years, Cognitive Radio (CR) technology has largely attracted significant studies and research. Cognitive Radio Ad Hoc Network (CRAHN) is an emerging self-organized, multi-hop, wireless network which allows unlicensed users to opportunistically access available licensed spectrum bands for data communication under an intelligent and cautious manner. However, in CRAHNs, a lot of failures can easily occur during data transmission caused by PU (Primary User) activity, topology change, node fault, or link degradation. In this paper, an attempt has been made to evaluate the performance of the Multi-Radio Link-Quality Source Routing (MR-LQSR) protocol in CRAHNs under different path failure rate. In the MR-LQSR protocol, the Weighted Cumulative Expected Transmission Time (WCETT) is used as the routing metric. The simulations are carried out using the NS-2 simulator. The protocol performance is evaluated with respect to performance metrics like average throughput, packet loss, average end-to-end delay and average jitter. From the simulation results, it is observed that the number of path failures depends on the PUs number and mobility rate of SUs (Secondary Users). Moreover, the protocol performance is greatly affected when the path failure rate is high, leading to major service outages.

  5. Dynamic cooperative clustering based power assignment: network capacity and lifetime efficient topology control in cooperative ad hoc networks.

    PubMed

    Li, Xiao-Hong; Xiao, Ling; Wang, Dong

    2014-01-01

    Cooperative communication (CC) is used in topology control as it can reduce the transmission power and expand the transmission range. However, all previous research on topology control under the CC model focused on maintaining network connectivity and minimizing the total energy consumption, which would lead to low network capacity, transmission interruption, or even network paralysis. Meanwhile, without considering the balance of energy consumption in the network, it would reduce the network lifetime and greatly affect the network performance. This paper tries to solve the above problems existing in the research on topology control under the CC model by proposing a power assignment (DCCPA) algorithm based on dynamic cooperative clustering in cooperative ad hoc networks. The new algorithm clusters the network to maximize network capacity and makes the clusters communicate with each other by CC. To reduce the number of redundant links between clusters, we design a static clustering method by using Kruskal algorithm. To maximize the network lifetime, we also propose a cluster head rotating method which can reach a good tradeoff between residual energy and distance for the cluster head reselection. Experimental results show that DCCPA can improve 80% network capacity with Cooperative Bridges algorithm; meanwhile, it can improve 20% network lifetime.

  6. Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsaur, Woei-Jiunn; Pai, Haw-Tyng

    2008-11-01

    The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.

  7. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks

    PubMed Central

    Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J.; Segarra, Esteve Pallarès; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Gargallo, Emilio Sanvicente

    2015-01-01

    The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic.Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs. PMID:25897496

  8. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks.

    PubMed

    Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J; Pallarès Segarra, Esteve; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Sanvicente Gargallo, Emilio

    2015-01-01

    The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs. PMID:25897496

  9. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks.

    PubMed

    Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J; Pallarès Segarra, Esteve; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Sanvicente Gargallo, Emilio

    2015-04-17

    The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.

  10. Task Force on Innovation in Dental Hygiene Curricula.

    ERIC Educational Resources Information Center

    Bader, James; And Others

    1989-01-01

    The background, origins, functions, and recommendations of the American Association of Dental Schools' task force investigating improvement of access to dental hygiene training programs and of curriculum and program design are presented. (MSE)

  11. 77 FR 16256 - Aquatic Nuisance Species Task Force Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-20

    ... minutes on the ANS Task Force Web site at: http://anstaskforce.gov/meetings.php . FOR FURTHER INFORMATION... site at: http://anstaskforce.gov/meetings.php . Accessibility Information The meeting location...

  12. 78 FR 16675 - First Technology Transitions; Policy Task Force Workshop

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... COMMISSION First Technology Transitions; Policy Task Force Workshop AGENCY: Federal Communications Commission... planned series of workshops to analyze technology transitions from narrowband to broadband; from time... technological capabilities of wireless and wireline (copper, fiber and coax) technologies today and in...

  13. Task Force: Routine Genital Herpes Screening Not Recommended

    MedlinePlus

    ... during delivery." The task force does, however, recommend screening for other sexually transmitted infections such as chlamydia, gonorrhea, syphilis and HIV. It also recommends health care professionals counsel patients ...

  14. Ad Hoc Rural Regionalism

    ERIC Educational Resources Information Center

    Hamin, Elisabeth M.; Marcucci, Daniel J.

    2008-01-01

    A new regionalism has been much documented and researched for metropolitan areas; this article documents that there is a new rural regionalism as well. In the United States, these groups appear most likely to emerge in areas that are challenged by outcomes characterizing globalization's effects on the rural condition: namely, exurban or…

  15. Force-stabilizing synergies in motor tasks involving two actors

    PubMed Central

    Solnik, Stanislaw; Reschechtko, Sasha; Wu, Yen-Hsun; Zatsiorsky, Vladimir M.; Latash, Mark L.

    2015-01-01

    We investigated the ability of two persons to produce force-stabilizing synergies in accurate multi-finger force production tasks under visual feedback on the total force only. The subjects produced a time profile of total force (the sum of two hand forces in one-person tasks and the sum of two subject forces in two-person tasks) consisting of a ramp-up, steady-state, and ramp-down segments; the steady-state segment was interrupted in the middle by a quick force pulse. Analyses of the structure of inter-trial finger force variance, motor equivalence, anticipatory synergy adjustments (ASAs), and the unintentional drift of the sharing pattern were performed. The two-person performance was characterized by a dramatically higher amount of inter-trial variance that did not affect total force, higher finger force deviations that did not affect total force (motor equivalent deviations), shorter ASAs, and larger drift of the sharing pattern. The rate of sharing pattern drift correlated with the initial disparity between the forces produced by the two persons (or two hands). The drift accelerated following the quick force pulse. Our observations show that sensory information on the task-specific performance variable is sufficient for the organization of performance-stabilizing synergies. They suggest, however, that two actors are less likely to follow a single optimization criterion as compared to a single performer. The presence of ASAs in the two-person condition might reflect fidgeting by one or both of the subjects. We discuss the characteristics of the drift in the sharing pattern as reflections of different characteristic times of motion within the sub-spaces that affect and do not affect salient performance variables. PMID:26105756

  16. Force-stabilizing synergies in motor tasks involving two actors.

    PubMed

    Solnik, Stanislaw; Reschechtko, Sasha; Wu, Yen-Hsun; Zatsiorsky, Vladimir M; Latash, Mark L

    2015-10-01

    We investigated the ability of two persons to produce force-stabilizing synergies in accurate multi-finger force production tasks under visual feedback on the total force only. The subjects produced a time profile of total force (the sum of two hand forces in one-person tasks and the sum of two subject forces in two-person tasks) consisting of a ramp-up, steady-state, and ramp-down segments; the steady-state segment was interrupted in the middle by a quick force pulse. Analyses of the structure of inter-trial finger force variance, motor equivalence, anticipatory synergy adjustments (ASAs), and the unintentional drift of the sharing pattern were performed. The two-person performance was characterized by a dramatically higher amount of inter-trial variance that did not affect total force, higher finger force deviations that did not affect total force (motor equivalent deviations), shorter ASAs, and larger drift of the sharing pattern. The rate of sharing pattern drift correlated with the initial disparity between the forces produced by the two persons (or two hands). The drift accelerated following the quick force pulse. Our observations show that sensory information on the task-specific performance variable is sufficient for the organization of performance-stabilizing synergies. They suggest, however, that two actors are less likely to follow a single optimization criterion as compared to a single performer. The presence of ASAs in the two-person condition might reflect fidgeting by one or both of the subjects. We discuss the characteristics of the drift in the sharing pattern as reflections of different characteristic times of motion within the subspaces that affect and do not affect salient performance variables. PMID:26105756

  17. Report of the Fermilab ILC Citizens' Task Force

    SciTech Connect

    2008-06-01

    Fermi National Accelerator Laboratory convened the ILC Citizens' Task Force to provide guidance and advice to the laboratory to ensure that community concerns and ideas are included in all public aspects of planning and design for a proposed future accelerator, the International Linear Collider. In this report, the members of the Task Force describe the process they used to gather and analyze information on all aspects of the proposed accelerator and its potential location at Fermilab in northern Illinois. They present the conclusions and recommendations they reached as a result of the learning process and their subsequent discussions and deliberations. While the Task Force was charged to provide guidance on the ILC, it became clear during the process that the high cost of the proposed accelerator made a near-term start for the project at Fermilab unlikely. Nevertheless, based on a year of extensive learning and dialogue, the Task Force developed a series of recommendations for Fermilab to consider as the laboratory develops all successor projects to the Tevatron. The Task Force recognizes that bringing a next-generation particle physics project to Fermilab will require both a large international effort and the support of the local community. While the Task Force developed its recommendations in response to the parameters of a future ILC, the principles they set forth apply directly to any large project that may be conceived at Fermilab, or at other laboratories, in the future. With this report, the Task Force fulfills its task of guiding Fermilab from the perspective of the local community on how to move forward with a large-scale project while building positive relationships with surrounding communities. The report summarizes the benefits, concerns and potential impacts of bringing a large-scale scientific project to northern Illinois.

  18. Enslaving in a serial chain: interactions between grip force and hand force in isometric tasks.

    PubMed

    Paclet, Florent; Ambike, Satyajit; Zatsiorsky, Vladimir M; Latash, Mark L

    2014-03-01

    This study was motivated by the double action of extrinsic hand muscles that produce grip force and also contribute to wrist torque. We explored interactions between grip force and wrist torque in isometric force production tasks. In particular, we tested a hypothesis that an intentional change in one of the two kinetic variables would produce an unintentional change in the other (enslaving). When young healthy subjects produced accurate changes in the grip force, only minor effects on the force produced by the hand (by wrist flexion/extension action) were observed. In contrast, a change in the hand force produced consistent changes in grip force in the same direction. The magnitude of such unintentional grip force change was stronger for intentional hand force decrease as compared to hand force increase. These effects increased with the magnitude of the initial grip force. When the subjects were asked to produce accurate total force computed as the sum of the hand and grip forces, strong negative covariation between the two forces was seen across trials interpreted as a synergy stabilizing the total force. An index of this synergy was higher in the space of "modes," hypothetical signals to the two effectors that could be changed by the controller one at a time. We interpret the complex enslaving effects (positive force covariation) as conditioned by typical everyday tasks. The presence of synergic effects (negative, task-specific force covariation) can be naturally interpreted within the referent configuration hypothesis. PMID:24309747

  19. Enslaving in a serial chain: Interactions between grip force and hand force in isometric tasks

    PubMed Central

    Paclet, Florent; Ambike, Satyajit; Zatsiorsky, Vladimir M.; Latash, Mark L.

    2014-01-01

    This study was motivated by the double action of extrinsic hand muscles that produce grip force and also contribute to wrist torque. We explored interactions between grip force and wrist torque in isometric force production tasks. In particular, we tested a hypothesis that an intentional change in one of the two kinetic variables would produce an unintentional change in the other (enslaving). When young healthy subjects produced accurate changes in the grip force, only minor effects on the force produced by the hand (by wrist flexion/extension action) were observed. In contrast, a change in the hand force produced consistent changes in grip force in the same direction. The magnitude of such unintentional grip force change was stronger for intentional hand force decrease as compared to hand force increase. These effects increased with the magnitude of the initial grip force. When the subjects were asked to produce accurate total force computed as the sum of the hand and grip forces, strong negative co-variation between the two forces was seen across trials interpreted as a synergy stabilizing the total force. An index of this synergy was higher in the space of “modes”, hypothetical signals to the two effectors that could be changed by the controller one at a time. We interpret the complex enslaving effects (positive force co-variation) as conditioned by typical everyday tasks. The presence of synergic effects (negative, task-specific force co-variation) can be naturally interpreted within the referent configuration hypothesis. PMID:24309747

  20. Adaptive Wireless Ad-hoc Sensor Networks for Long-term and Event-oriented Environmental Monitoring

    NASA Astrophysics Data System (ADS)

    Bumberger, Jan; Mollenhauer, Hannes; Remmler, Paul; Chirila, Andrei Marian; Mollenhauer, Olaf; Hutschenreuther, Tino; Toepfer, Hannes; Dietrich, Peter

    2016-04-01

    Ecosystems are often characterized by their high heterogeneity, complexity and dynamic. Hence, single point measurements are often not sufficient for their complete representation. The application of wireless sensor networks in terrestrial and aquatic environmental systems offer significant benefits as a better consideration to the local test conditions, due to the simple adjustment of the sensor distribution, the sensor types and the sample rate. Another advantage of wireless ad-hoc sensor networks is their self-organizing behavior, resulting in a major reduction in installation and operation costs and time. In addition, individual point measurements with a sensor are significantly improved by measuring at several points continuously. In this work a concept and realization for Long-term ecosystem research is given in the field monitoring of micrometeorology and soil parameters for the interaction of biotic and abiotic processes. This long term analyses are part of the Global Change Experimental Facility (GCEF), a large field-based experimental platform to assess the effects of climate change on ecosystem functions and processes under different land-use scenarios. Regarding to the adaptive behavior of the network, also a mobile version was developed to overcome the lack of information of temporally and spatially fixed measurements for the detection and recording of highly dynamic or time limited processes. First results of different field campaigns are given to present the potentials and limitations of this application in environmental science, especially for the monitoring of the interaction of biotic and abiotic processes, soil-atmosphere interaction and the validation of remote sensing data.

  1. Adaptive Wireless Ad-hoc Sensor Networks for Long-term and Event-oriented Environmental Monitoring

    NASA Astrophysics Data System (ADS)

    Bumberger, Jan; Mollenhauer, Hannes; Remmler, Paul; Schaedler, Martin; Schima, Robert; Mollenhauer, Olaf; Hutschenreuther, Tino; Toepfer, Hannes; Dietrich, Peter

    2015-04-01

    Ecosystems are often characterized by their high heterogeneity, complexity and dynamic. Hence, single point measurements are often not sufficient for their complete representation. The application of wireless sensor networks in terrestrial and aquatic environmental systems offer significant benefits as a better consideration to the local test conditions, due to the simple adjustment of the sensor distribution, the sensor types and the sample rate. Another advantage of wireless ad-hoc sensor networks is their self-organizing behavior, resulting in a major reduction in installation and operation costs and time. In addition, individual point measurements with a sensor are significantly improved by measuring at several points continuously. In this work a concept and realization for Long-term ecosystem research is given in the field monitoring of micrometeorology and soil parameters for the interaction of biotic and abiotic processes. This long term analyses are part of the Global Change Experimental Facility (GCEF), a large field-based experimental platform to assess the effects of climate change on ecosystem functions and processes under different land-use scenarios. Regarding to the adaptive behavior of the network, also a mobile version was developed to overcome the lack of information of temporally and spatially fixed measurements for the detection and recording of highly dynamic or time limited processes. First results of different field campaigns are given to present the potentials and limitations of this application in environmental science, especially for the monitoring of the interaction of biotic and abiotic processes, soil-atmosphere interaction and the validation of remote sensing data.

  2. Combined bio-inspired/evolutionary computational methods in cross-layer protocol optimization for wireless ad hoc sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2011-06-01

    Published studies have focused on the application of one bio-inspired or evolutionary computational method to the functions of a single protocol layer in a wireless ad hoc sensor network (WSN). For example, swarm intelligence in the form of ant colony optimization (ACO), has been repeatedly considered for the routing of data/information among nodes, a network-layer function, while genetic algorithms (GAs) have been used to select transmission frequencies and power levels, physical-layer functions. Similarly, artificial immune systems (AISs) as well as trust models of quantized data reputation have been invoked for detection of network intrusions that cause anomalies in data and information; these act on the application and presentation layers. Most recently, a self-organizing scheduling scheme inspired by frog-calling behavior for reliable data transmission in wireless sensor networks, termed anti-phase synchronization, has been applied to realize collision-free transmissions between neighboring nodes, a function of the MAC layer. In a novel departure from previous work, the cross-layer approach to WSN protocol design suggests applying more than one evolutionary computational method to the functions of the appropriate layers to improve the QoS performance of the cross-layer design beyond that of one method applied to a single layer's functions. A baseline WSN protocol design, embedding GAs, anti-phase synchronization, ACO, and a trust model based on quantized data reputation at the physical, MAC, network, and application layers, respectively, is constructed. Simulation results demonstrate the synergies among the bioinspired/ evolutionary methods of the proposed baseline design improve the overall QoS performance of networks over that of a single computational method.

  3. First interim report of the Federal Fleet Conversion Task Force

    SciTech Connect

    Not Available

    1993-08-01

    The Federal Fleet Conversion Task Force was created by Executive Order 12844, signed by President Clinton on April 21, 1993. In the Order, the President directed that purchases of alternative fueled vehicles by the Federal Government be substantially increased beyond the levels required by current law. The President charged the Task Force with developing recommendations for carrying out the Executive Order, with special emphasis on setting a course that will lead to the widespread use of alternative fueled vehicles by Federal, State, and local government fleets, by private fleets and, ultimately, by individuals. The chief recommendation of the Task Force is the establishment of a Presidential Clean Cities Initiative. To support creation of the Presidential Initiative, the Task Force identified 38 cities and regions, prioritized into three tiers, for concentrating the Initiative`s efforts in Fiscal Years 1994 through 1996. This concentration of effort is key to the effectiveness of the Initiative. The 38 cities and regions would receive priority funding for Federal vehicle purchases and for infrastructure development. In addition, the Task Force has made specific recommendations for overcoming numerous regulatory, economic, and technical barriers that have slowed the introduction of alternative fueled vehicles into general use.

  4. Comparison of two commonly practiced atropinization regimens in acute organophosphorus and carbamate poisoning, doubling doses vs. ad hoc: a prospective observational study.

    PubMed

    Perera, P M S; Shahmy, S; Gawarammana, I; Dawson, A H

    2008-06-01

    There is a wide variation and lack of evidence in current recommendations for atropine dosing schedules leading to subsequent variation in clinical practice. Therefore, we sought to examine the safety and effectiveness of a titrated vs. ad hoc atropine treatment regimen in a cohort of patients with acute cholinesterase inhibitor pesticide poisoning. A prospective cohort study was conducted in three district secondary referral hospitals in Sri Lanka using a structured data collection form that collected details of clinical symptoms and outcomes of cholinesterase inhibitor pesticide poisoning, atropine doses, and signs of atropinization. We compared two hospitals that used a titrated dosing protocol based on a structured monitoring sheet for atropine infusion with another hospital using an ad hoc regime. During the study, 272 symptomatic patients with anticholinesterase poisoning requiring atropine were admitted to the three hospitals. Outcomes of death and ventilation were analyzed for all patients, 226 patients were prospectively assessed for atropine toxicity. At baseline, patients in the titrated dose cohort had clinical signs consistent with greater toxicity. This in part may be due to ingestion of more toxic organophosphates. They received less pralidoxime and atropine, and were less likely to develop features of atropine toxicity, such as delirium (1% vs. 17%), hallucinations (1% vs. 35%), or either (1% vs. 35%) and need for patient restraint (3% vs. 48%) compared with the ad hoc dose regime. After adjusting for the pesticides ingested, there was no difference in mortality and ventilatory rates between protocols. Ad hoc high dose atropine regimens are associated with more frequent atropine toxicity without any obvious improvement in patient outcome compared with doses titrated to clinical effect. Atropine doses should be titrated against response and toxicity. Further education and the use of a structured monitoring sheet may assist in more appropriate

  5. Development of Innovative and Inexpensive Optical Sensors in Wireless Ad-hoc Sensor Networks for Environmental Monitoring

    NASA Astrophysics Data System (ADS)

    Mollenhauer, Hannes; Schima, Robert; Assing, Martin; Mollenhauer, Olaf; Dietrich, Peter; Bumberger, Jan

    2015-04-01

    Due to the heterogeneity and dynamic of ecosystems, the observation and monitoring of natural processes necessitate a high temporal and spatial resolution. This also requires inexpensive and adaptive measurements as well as innovative monitoring strategies. To this end, the application of ad-hoc wireless sensor networks holds the potential of creating an adequate monitoring platform. In order to achieve a comprehensive monitoring in space and time with affordability, it is necessary to reduce the sensor costs. Common investigation methods, especially with regard to vegetation processes, are based on optical measurements. In particular, different wavelengths correspond to specific properties of the plants and preserve the possibility to derive information about the ecosystem, e.g. photosynthetic performance or nutrient content. In this context, photosynthetically active radiation (PAR) sensors and hyperspectral sensors are in major use. This work aims the development, evaluation and application of inexpensive but high performance optical sensors for the implementation in wireless sensor networks. Photosynthetically active radiation designates the spectral range from 400 to 700 nanometers that photosynthetic organisms are able to use in the process of photosynthesis. PAR sensors enable the detection of the reflected solar light of the vegetation in the whole PAR wave band. The amount of absorption indicates photosynthetic activity of the plant, with good approximation. Hyperspectral sensors observe specific parts or rather distinct wavelengths of the solar light spectrum and facilitate the determination of the main pigment classes, e.g. Chlorophyll, Carotenoid and Anthocyanin. Due to the specific absorption of certain pigments, a characteristic spectral signature can be seen in the visible part of the electromagnetic spectrum, known as narrow-band peaks. In an analogous manner, also the presence and concentration of different nutrients cause a characteristic spectral

  6. Report of the Task Force on De-Regulation Initiatives.

    ERIC Educational Resources Information Center

    Fishbein, Estelle A.; Blumer, Dennis H.

    In response to a request by the Presidential Task Force on Regulatory Relief, this report offers specific recommendations for reform of federal regulations. A cover letter explains the constraints imposed by the recommended format: that the report is unable to address adequately the area of federal regulatory activity generating the most adverse…

  7. Report of the Task Force on AIDS and Dental Education.

    ERIC Educational Resources Information Center

    Molinari, John; Gray, Carolyn F.

    1988-01-01

    The American Association of Dental Schools' task force on acquired immune deficiency syndrome and dental education recommends that educational strategies stress the necessity for routine infection control procedures in treatment, enhancing the health professionals' knowledge, attitudes, and behaviors concerning all aspects of disease prevention.…

  8. 78 FR 60306 - Aquatic Nuisance Species Task Force Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-01

    ... implement a program for U.S. waters to prevent introduction and dispersal of aquatic invasive species (AIS... Snakehead and Lionfish Management Plans. Biocontrol Programs. National Invasive Species Awareness Week... Fish and Wildlife Service Aquatic Nuisance Species Task Force Meeting AGENCY: Fish and Wildlife...

  9. 76 FR 22685 - Interagency Management Task Force Public Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-22

    ... of Energy Efficiency and Renewable Energy Interagency Management Task Force Public Meeting AGENCY: Office of Energy Efficiency and Renewable Energy, Department of Energy (DOE). ACTION: Notice of public...), within the Department of Energy's Office of Energy Efficiency and Renewable Energy, facilitates...

  10. 7 CFR 1900.6 - Chair, Loan Resolution Task Force.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... under 7 CFR part 1951, subpart S; (b) The responsibility for making and directing the making of loan... servicing rights and pre-acceleration homestead and preservation loan servicing rights under 7 CFR part 1951... 7 Agriculture 12 2010-01-01 2010-01-01 false Chair, Loan Resolution Task Force. 1900.6...

  11. Report of the NASFAA Task Force on Student Loan Indebtedness

    ERIC Educational Resources Information Center

    National Association of Student Financial Aid Administrators, 2013

    2013-01-01

    In light of increasing concern about student loans, debt levels, and rising default rates, which coincide with worries about college costs, affordability, and transparency, the National Association of Student Financial Aid Administrators (NASFAA) convened a task force in 2012 to study this issue and make recommendations for improvement. NASFAA's…

  12. Report of the Governor's Task Force on School Construction.

    ERIC Educational Resources Information Center

    Maryland State Interagency Committee on School Construction, Baltimore.

    In October 1992, Maryland Governor William Donald Schaefer established a 21-member task force to conduct an in-depth study and review 8 specific areas of the state's public school construction program. This report summarizes the committee's activities, findings, and recommendations. The first recommendation, to review project requests from the 24…

  13. Urban Consortium Energy Task Force - Year 21 Final Report

    SciTech Connect

    2003-04-01

    The Urban Consortium Energy Task Force (UCETF), comprised of representatives of large cities and counties in the United States, is a subgroup of the Urban Consortium, an organization of the nation's largest cities and counties joined together to identify, develop and deploy innovative approaches and technological solutions to pressing urban issues.

  14. Psychosocial Aspects of Nuclear Developments. Task Force Report 20.

    ERIC Educational Resources Information Center

    American Psychiatric Association, Washington, DC.

    This is the report of a task force formed to bring psychological understanding to bear on the various aspects of the development of nuclear arms and nuclear energy and the threat they pose to human physical, mental, and emotional health. The first of seven articles considers the sociopsychological aspects of the nuclear arms race. Other articles…

  15. Consumer Information. NASFAA Task Force Report. Consumer Information

    ERIC Educational Resources Information Center

    National Association of Student Financial Aid Administrators, 2014

    2014-01-01

    The National Association of Student Financial Aid and Administrators (NASFAA) Consumer Information Task Force was convened to conduct a thorough review of the current student consumer information requirements and propose ways to streamline both the content and delivery of those requirements. The proposals in the this report were produced for…

  16. 77 FR 74341 - Establishing the Hurricane Sandy Rebuilding Task Force

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-14

    ... person. (Presidential Sig.) THE WHITE HOUSE, Washington, December 7, 2012. [FR Doc. 2012-30310 Filed 12... the Hurricane Sandy Rebuilding Task Force By the authority vested in me as President by the.... Hurricane Sandy made landfall on October 29, 2012, resulting in major flooding, extensive structural...

  17. 75 FR 32186 - Task Force on Community Preventive Services

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-07

    ... Name: Task Force on Community Preventive Services meeting. Times and Dates: 8 a.m.-5:30 p.m. EST, June 16, 2010. 8 a.m.-1 p.m. EST, June, 17, 2010. Place: Centers for Disease Control and Prevention,...

  18. Report from the Attorney General's Task Force on Domestic Violence.

    ERIC Educational Resources Information Center

    1977

    This report lists a series of recommendations for dealing with the widespread but largely undocumented problem of domestic violence. The efforts of the Task Force were concentrated in the area of mate abuse. Working committees examined prevention methods, legal safeguards and social services. Two subcommittees examined the special problems of…

  19. A Report of the Child Labor Task Force.

    ERIC Educational Resources Information Center

    Oregon State Bureau of Labor and Industry, Portland.

    A task force studied youth work and its impact on the health, education, and safety of 16- and 17-year-olds. The study covered such issues as the following: effects of work on school performance, work's physical and psychological effects on young people, the effects work can have on young people's preparation for lifelong work, and what steps can…

  20. The Campus-Based Formula. NASFAA Task Force Report

    ERIC Educational Resources Information Center

    National Association of Student Financial Aid Administrators, 2014

    2014-01-01

    The primary purpose of the National Association of Student Financial Aid Administrators (NASFAA) Campus-Based Aid Allocation Task Force was to examine the formula by which congressional appropriations for the Federal Supplemental Educational Opportunity Grant (FSEOG), Federal Work-Study (FWS), and Perkins Loan programs are distributed to schools,…

  1. Report of AVA Task Force on Career Education.

    ERIC Educational Resources Information Center

    The American Vocational Education (AVA) Task Force on Career Education met to formulate a recommended position for AVA on career education. Papers were presented, and six study groups made recommendations regarding the position that AVA should take on concepts and issues. Study group recommendations covered leadership, financing, the role of…

  2. Academic Calendar Task Force Report to the President.

    ERIC Educational Resources Information Center

    College of DuPage, Glen Ellyn, IL.

    This report presents the findings of a study done by a college-wide task force at the College of DuPage (Illinois) on academic calendar formats in an effort to determine whether to retain the quarter system or convert to another calendar. A brief introduction gives the background to the issue at DuPage. A section on procedures explains that the…

  3. Solar Energy Task Force Report on Education and Training.

    ERIC Educational Resources Information Center

    O'Connor, J. Kevin

    The Solar Energy Task Force Report summarizes data, information, and discussions focusing on solar space and water heating applications. The report is intended to fill a need for curriculum and course development and direction for technical training programs, especially in vocational/technical schools and community colleges. It addresses…

  4. Wave scheduling - Decentralized scheduling of task forces in multicomputers

    NASA Technical Reports Server (NTRS)

    Van Tilborg, A. M.; Wittie, L. D.

    1984-01-01

    Decentralized operating systems that control large multicomputers need techniques to schedule competing parallel programs called task forces. Wave scheduling is a probabilistic technique that uses a hierarchical distributed virtual machine to schedule task forces by recursively subdividing and issuing wavefront-like commands to processing elements capable of executing individual tasks. Wave scheduling is highly resistant to processing element failures because it uses many distributed schedulers that dynamically assign scheduling responsibilities among themselves. The scheduling technique is trivially extensible as more processing elements join the host multicomputer. A simple model of scheduling cost is used by every scheduler node to distribute scheduling activity and minimize wasted processing capacity by using perceived workload to vary decentralized scheduling rules. At low to moderate levels of network activity, wave scheduling is only slightly less efficient than a central scheduler in its ability to direct processing elements to accomplish useful work.

  5. Quantifying force and positional frequency bands in neurosurgical tasks.

    PubMed

    Maddahi, Yaser; Ghasemloonia, Ahmad; Zareinia, Kourosh; Sepehri, Nariman; Sutherland, Garnette R

    2016-06-01

    To establish the design requirements for an MR-compatible haptic hand-controller, this paper measures magnitudes and frequency bands of three mechanical motion and interaction components during the performance of neurosurgical tasks on a cadaveric brain. The hand-controller would allow the performance of virtual neurosurgical tasks within the bore of a high field magnet during image acquisition, i.e., functional MRI. The components are the position and the orientation of a surgical tool, and the force interaction between the tool and the brain tissue. A bipolar forceps was retrofitted with a tracking system and a set of force sensing components to measure displacements and forces, respectively. Results showed working positional, rotational, and force frequency bands of 3, 3 and 5 Hz, respectively. Peak forces of 1.4, 2.9 and 3.0 N were measured in the Cartesian coordinate system. A workspace of 50.1 × 39.8 × 58.2 mm(3) and orientation ranges of 40.4°, 60.1° and 63.1° for azimuth, elevation, and roll angles were observed. The results contribute in providing information specific to neurosurgery that can be used to effectively design a compact and customized haptic hand-controller reflecting characteristics of neurosurgical tasks.

  6. 78 FR 70087 - Interagency Task Force on Veterans Small Business Development

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-22

    ... ADMINISTRATION Interagency Task Force on Veterans Small Business Development AGENCY: U.S. Small Business Administration. ACTION: Notice of open Federal Interagency Task Force meeting. SUMMARY: The SBA is issuing this... meeting of the Interagency Task Force on Veterans Small Business Development. The Task Force...

  7. 78 FR 21492 - Interagency Task Force on Veterans Small Business Development

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-10

    ... ADMINISTRATION Interagency Task Force on Veterans Small Business Development AGENCY: U.S. Small Business Administration. ACTION: Notice of open Federal Interagency Task Force Meeting. SUMMARY: The SBA is issuing this... meeting of the Interagency Task Force on Veterans Small Business Development. The Task Force...

  8. Task Force Examines U.S. Hurricane Research Agenda

    NASA Astrophysics Data System (ADS)

    Zielinski, Sarah

    2006-01-01

    While U.S. federal, state, and local governments continue to debate what should be done, following the devastating 2005 hurricane season, to rebuild the Gulf Coast and to prevent future disasters, a task force of the U.S. National Science Board (NSB) has begun an effort to construct a national agenda for federally-sponsored hurricane research. At a 24 January meeting at the U.S. National Science Foundation (NSF) headquarters in Arlington,Va., task force members and government representatives examined current hurricane-related research conducted and supported by several federal agencies, identified gaps in understanding and future priorities, and discussed how these agencies can better coordinate their activities.

  9. Grip Force Coordination during Bimanual Tasks in Unilateral Cerebral Palsy

    ERIC Educational Resources Information Center

    Islam, Mominul; Gordon, Andrew M.; Skold, Annika; Forssberg, Hans; Eliasson, Ann-Christin

    2011-01-01

    Aim: The aim of the study was to investigate coordination of fingertip forces during an asymmetrical bimanual task in children with unilateral cerebral palsy (CP). Method: Twelve participants (six males, six females; mean age 14y 4mo, SD 3.3y; range 9-20y;) with unilateral CP (eight right-sided, four left-sided) and 15 age-matched typically…

  10. Final Report of the Simulation Optimization Task Force

    SciTech Connect

    ATLAS Collaboration; Rimoldi, A.; Carli, T.; Dell'Acqua, A.; Froidevaux, D.; Gianotti, F.; Guyot, C.; Hinchliffe, I.; Jakobs, K.; Marshall, Z.; Nisati, A.; Quarrie, D.; Unal, G.; Young, C.

    2008-12-15

    This is the final report of the ATLAS Simulation Optimization Task Force, establishedin June of 2007. This note justifies the selected Geant4 version, physics list, and range cuts to be used by the default ATLAS simulation for initial data taking and beyond. The current status of several projects, including detector description, simulation validation, studies of additional Geant4 parameters, and cavern background, are reported.

  11. Space station operations task force. Panel 4 report: Management integration

    NASA Technical Reports Server (NTRS)

    1987-01-01

    The Management Integration Panel of the Space Station Operations Task Force was chartered to provide a structure and ground rules for integrating the efforts of the other three panels and to address a number of cross cutting issues that affect all areas of space station operations. Issues addressed include operations concept implementation, alternatives development and integration process, strategic policy issues and options, and program management emphasis areas.

  12. [The "Green Brigades" task-force. Description and practical information].

    PubMed

    Taillon, A

    1995-11-01

    The General Rhône Council has set up a new task force, the "Green Brigades", which reflects awareness that the environment can serve as a means towards social and professional reinsertion. The field of activity is maintenance of open spaces on sites that are cleaned up on behalf of local authorities: removal of bulky matter, renovation of banks and riverbeds, clearing or making of footpaths, etc.

  13. NCCN Task Force Report: Bone Health In Cancer Care.

    PubMed

    Gralow, Julie R; Biermann, J Sybil; Farooki, Azeez; Fornier, Monica N; Gagel, Robert F; Kumar, Rashmi; Litsas, Georgia; McKay, Rana; Podoloff, Donald A; Srinivas, Sandy; Van Poznak, Catherine H

    2013-08-01

    Bone health and maintenance of bone integrity are important components of comprehensive cancer care. Many patients with cancer are at risk for therapy-induced bone loss, with resultant osteoporotic fractures, or skeletal metastases, which may result in pathologic fractures, hypercalcemia, bone pain, and decline in motility and performance status. Effective screening and timely interventions are essential for reducing bone-related morbidity. Management of long-term bone health requires a broad knowledge base. A multidisciplinary health care team may be needed for optimal assessment and treatment of bone-related issues in patients with cancer. Since publication of the previous NCCN Task Force Report: Bone Health in Cancer Care in 2009, new data have emerged on bone health and treatment, prompting NCCN to convene this multidisciplinary task force to discuss the progress made in optimizing bone health in patients with cancer. In December 2012, the panel members provided didactic presentations on various topics, integrating expert judgment with a review of the key literature. This report summarizes issues surrounding bone health in cancer care presented and discussed during this NCCN Bone Health in Cancer Care Task Force meeting.

  14. Status of the new initiative task force work

    SciTech Connect

    Sheffield, J. )

    1992-06-01

    The proposal for a [open quotes]New Initiatives Task Force[close quotes] emerged from discussions in the scientific community on how to proceed following the demise of the Burning Plasma Experiment (BPX). In particular, the action of the Secretary of Energy Advisory Board (SEAB), which made the following recommendation in 1991, prompted the initiative: [open quotes]Concept exploration should begin to define a new experiment in the $500 million class for the purpose of scientific study of tokomak improvements (e.g., second stability, steady state, bootstrap current) that could suggest new operating modes for ITER and permit the design of more reactor-desirable follow-ons to ITER.[close quotes] A New Initiative Task force, was chartered by Princeton Plasma Physics Laboratory in October 1991 to provide oversight in the development of a new experimental initiative and to provide guidance to advocate groups in the following areas: programmatic mission and technical objectives, critical issues of physics, engineering, and technology, design criteria, costing, and modes of operation. The guidance was designed to be based on broad community involvement. In addition, the Task Force was asked to identify the preferred options which could proceed to the design stage. Three primary machine designs have emerged from the work of this group, and they are briefly described. 4 refs., 2 figs., 2 tabs.

  15. An Overview of the NOAA Drought Task Force

    NASA Technical Reports Server (NTRS)

    Schubert, S.; Mo, K.; Peters-Lidard, C.; Wood, A.

    2012-01-01

    The charge of the NOAA Drought Task Force is to coordinate and facilitate the various MAPP-funded research efforts with the overall goal of achieving significant advances in understanding and in the ability to monitor and predict drought over North America. In order to achieve this, the task force has developed a Drought Test-bed that individual research groups can use to test/evaluate methods and ideas. Central to this is a focus on three high profile North American droughts (1998-2004 western US drought, 2006-2007 SE US drought, 2011- current Tex-Mex drought) to facilitate collaboration among projects, including the development of metrics to assess the quality of monitoring and prediction products, and the development of an experimental drought monitoring and prediction system that incorporates and assesses recent advances. This talk will review the progress and plans of the task force, including efforts to help advance official national drought products, and the development of early warning systems by the National Integrated Drought Information System (NIDIS). Coordination with other relevant national and international efforts such as the emerging NMME capabilities and the international effort to develop a Global Drought Information System (GDIS) will be discussed.

  16. Breast Cancer EDGE Task Force Outcomes: Clinical Measures of Pain

    PubMed Central

    Harrington, Shana; Gilchrist, Laura; Sander, Antoinette

    2014-01-01

    Background Pain is one of the most commonly reported impairments after breast cancer treatment affecting anywhere from 16-73% of breast cancer survivors Despite the high reported incidence of pain from cancer and its treatments, the ability to evaluate cancer pain continues to be difficult due to the complexity of the disease and the subjective experience of pain. The Oncology Section Breast Cancer EDGE Task Force was created to evaluate the evidence behind clinical outcome measures of pain in women diagnosed with breast cancer. Methods The authors systematically reviewed the literature for pain outcome measures published in the research involving women diagnosed with breast cancer. The goal was to examine the reported psychometric properties that are reported in the literature in order to determine clinical utility. Results Visual Analog Scale, Numeric Rating Scale, Pressure Pain Threshold, McGill Pain Questionnaire, McGill Pain Questionnaire – Short Form, Brief Pain Inventory and Brief Pain Inventory – Short Form were highly recommended by the Task Force. The Task Force was unable to recommend two measures for use in the breast cancer population at the present time. Conclusions A variety of outcome measures were used to measure pain in women diagnosed with breast cancer. When assessing pain in women with breast cancer, researchers and clinicians need to determine whether a unidimensional or multidimensional tool is most appropriate as well as whether the tool has strong psychometric properties. PMID:25346950

  17. A Security Solution for IEEE 802.11's Ad-hoc Mode:Password-Authentication and Group Diffie-Hellman Key Exchange

    SciTech Connect

    Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval

    2005-10-01

    The IEEE 802 standards ease the deployment of networkinginfrastructures and enable employers to accesscorporate networks whiletraveling. These standards provide two modes of communication calledinfrastructure and ad-hoc modes. A security solution for the IEEE802.11's infrastructure mode took several years to reach maturity andfirmware are still been upgraded, yet a solution for the ad-hoc modeneeds to be specified. The present paper is a first attempt in thisdirection. It leverages the latest developments in the area ofpassword-based authentication and (group) Diffie-Hellman key exchange todevelop a provably-secure key-exchange protocol for IEEE 802.11's ad-hocmode. The protocol allows users to securely join and leave the wirelessgroup at time, accommodates either a single-shared password orpairwise-shared passwords among the group members, or at least with acentral server; achieves security against dictionary attacks in theideal-hash model (i.e. random-oracles). This is, to the best of ourknowledge, the first such protocol to appear in the cryptographicliterature.

  18. Sandia-Power Surety Task Force Hawaii foam analysis.

    SciTech Connect

    McIntyre, Annie

    2010-11-01

    The Office of Secretary of Defense (OSD) Power Surety Task Force was officially created in early 2008, after nearly two years of work in demand reduction and renewable energy technologies to support the Warfighter in Theater. The OSD Power Surety Task Force is tasked with identifying efficient energy solutions that support mission requirements. Spray foam insulation demonstrations were recently expanded beyond field structures to include military housing at Ft. Belvoir. Initial results to using the foam in both applications are favorable. This project will address the remaining key questions: (1) Can this technology help to reduce utility costs for the Installation Commander? (2) Is the foam cost effective? (3) What application differences in housing affect those key metrics? The critical need for energy solutions in Hawaii and the existing relationships among Sandia, the Department of Defense (DOD), the Department of Energy (DOE), and Forest City, make this location a logical choice for a foam demonstration. This project includes application and analysis of foam to a residential duplex at the Waikulu military community on Oahu, Hawaii, as well as reference to spray foam applied to a PACOM facility and additional foamed units on Maui, conducted during this project phase. This report concludes the analysis and describes the utilization of foam insulation at military housing in Hawaii and the subsequent data gathering and analysis.

  19. 75 FR 76744 - National Disaster Housing Task Force Concept of Operations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-09

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency National Disaster Housing Task Force Concept of Operations... Housing Task Force (NDHTF) Concept of Operations (CONOPS). The CONOPS describes the Federal...

  20. Report of the Task Force on Collision Hall Limitations

    SciTech Connect

    1987-04-01

    The Task Force on Collision Hall Limitations met March 23--26, 1987, to obtain a greater understanding of the civil construction requirements for a large scale model SSC detector and to identify limitations, if any, on overall detector scale and individual detector components that may result from civil construction limitations. To this purpose the Task Force studied civil construction techniques and limitations for both deep sites and surface or near surface sites, developed limits and criteria for model detector assembly and servicing, developed a model detector assembly scenario, and estimated an overall schedule from initiation of the design of the experimental hall complex to the completion of the assembly of the model detector. Our conclusions apply only to facilities required to house experiments of the scale of the model detector studied. From our studies it is apparent that the experimental hall complex required for SSC-scale detectors can be constructed under a variety of assumptions regarding the eventual SSC site. There may be significant differences in the schedule and the cost of the experimental hall complex between surface and deep underground locations, with the deep underground, in general, being more expensive and requiring a longer time for construction. The difference in cost and schedule for the experimental facilities for housing the model detector between a surface site and a deep underground site may amount to $25M and two years.

  1. International Reference Ionosphere (IRI): Task Force Activity 2000

    NASA Technical Reports Server (NTRS)

    Bilitza, D.

    2000-01-01

    The annual IRI Task Force Activity was held at the Abdus Salam International Center for Theoretical Physics in Trieste, Italy from July 10 to July 14. The participants included J. Adeniyi (University of Ilorin, Nigeria), D. Bilitza (NSSDC/RITSS, USA), D. Buresova (Institute of Atmospheric Physics, Czech Republic), B. Forte (ICTP, Italy), R. Leitinger (University of Graz, Austria), B. Nava (ICTP, Italy), M. Mosert (University National Tucuman, Argentina), S. Pulinets (IZMIRAN, Russia), S. Radicella (ICTP, Italy), and B. Reinisch (University of Mass. Lowell, USA). The main topic of this Task Force Activity was the modeling of the topside ionosphere and the development of strategies for modeling of ionospheric variability. Each day during the workshop week the team debated a specific modeling problem in the morning during informal presentations and round table discussions of all participants. Ways of resolving the specific modeling problem were devised and tested in the afternoon in front of the computers of the ICTP Aeronomy and Radiopropagation Laboratory using ICTP s computer networks and internet access.

  2. 78 FR 29378 - Aquatic Nuisance Species Task Force; Public Teleconference/Webinar

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-20

    ... Guidelines, National Invasive Species Awareness Week, Michigan and Mississippi ANS Management Plans, and... Fish and Wildlife Service Aquatic Nuisance Species Task Force; Public Teleconference/ Webinar AGENCY..., announce a public teleconference/webinar of the Aquatic Nuisance Species Task Force (ANS Task Force)....

  3. Comprehensive Career Development for Illinois: Findings and Recommendations of the Illinois Career Development Task Force

    ERIC Educational Resources Information Center

    Williams, J. Mark; Bragg, Debra D.; Makela, Julia Panke

    2008-01-01

    This report summarizes major findings and recommendations of the Illinois Career Development Task Force. The first section provides background information on Task Force formation, membership, meetings, and discussion topics. The second section defines career development, based on the consensus-building process employed by the Task Force, and…

  4. Crafting a Balanced System of Assessment in Wisconsin. Recommendations of the Next Generation Assessment Task Force

    ERIC Educational Resources Information Center

    Wisconsin Department of Public Instruction, 2009

    2009-01-01

    The Next Generation Assessment Task Force was convened to formulate Wisconsin's path forward. Task force members listened to leaders from business and technology sectors as well as leaders from PK-12 and higher education. This summary shares the process, definitions, assumptions, and recommendations of the task force. This paper aims to use these…

  5. Report of the Task Force - Space for Health Sciences. Building Blocks. Volume III.

    ERIC Educational Resources Information Center

    Council of Ontario Universities, Toronto.

    The Task Force on Space for Health Sciences is one of four task forces established by the Committee on Capital Financing of the Council of Ontario Universities to work toward the development of a capital formula that would define space needs and building costs for Ontario universities. Each task force has a particular assignment related to the…

  6. Task Force Report on Social Studies Education in Maryland: The Challenge and the Imperative

    ERIC Educational Resources Information Center

    Maryland State Department of Education, 2010

    2010-01-01

    In November 2004, State Superintendent of Schools Nancy S. Grasmick convened the Maryland Social Studies Task Force. The Task Force was charged with examining issues related to social studies education and recommending ways to improve social studies instruction in Maryland's public schools. The Task Force formed four Subcommittees, each examining…

  7. 75 FR 34439 - Defense Science Board Task Force on Nuclear Treaty Monitoring and Verification

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-17

    ... of the Secretary Defense Science Board Task Force on Nuclear Treaty Monitoring and Verification... Science Board Task Force on Nuclear Treaty Monitoring and Verification will meet in closed session on July... might be implemented. The task force's findings and recommendations, pursuant to 41 CFR...

  8. 75 FR 34439 - Defense Science Board Task Force on Improvements to Services Contracting; Notice of Advisory...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-17

    ... of the Secretary Defense Science Board Task Force on Improvements to Services Contracting; Notice of... meetings. SUMMARY: The Defense Science Board Task Force on Improvements to Services Contracting will meet... statutory and regulatory authorities and requirements. The task force's findings and...

  9. 78 FR 23970 - Interagency Task Force on Veterans Small Business Development

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-23

    ... ADMINISTRATION Interagency Task Force on Veterans Small Business Development AGENCY: U.S. Small Business Administration. ACTION: Notice of open Federal Interagency Task Force Meeting. SUMMARY: This document corrects the SBA's Interagency Task Force on Veterans Small Business Developments notice of a public...

  10. Task Force on Responsible Decisions About Alcohol. Final Report. (A Summary)

    ERIC Educational Resources Information Center

    Education Commission of the States, Denver, CO.

    The Final Report of the Task Force on Responsible Decisions About Alcohol is comprised of three booklets. Booklet 1 contains a history of the Education Commission of the States (ECS) and the formation of the ECS Task Force on Responsible Decisions About Alcohol. The goals and objectives of the task force are defined as they relate to approaches…

  11. On the Connectivity, Lifetime and Hop Count of Routes Determined Using the City Section and Manhattan Mobility Models for Vehicular Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Meghanathan, Natarajan

    The high-level contribution of this paper is a simulation based analysis of the network connectivity, hop count and lifetime of the routes determined for vehicular ad hoc networks (VANETs) using the City Section and Manhattan mobility models. The Random Waypoint mobility model is used as a benchmark in the simulation studies. Two kinds of paths are determined on the sequence of static graphs representing the topology over the duration of the network session: paths with the minimum hop count (using the Dijkstra algorithm) and stable paths with the longest lifetime (using our recently proposed OptPathTrans algorithm). Simulation results indicate that the City Section model provided higher network connectivity compared to the Manhattan model for all the network scenarios. Minimum hop paths and stable paths determined under the Manhattan model have a smaller lifetime and larger hop count compared to those determined using the City Section and Random Waypoint mobility models.

  12. NCCN Task Force Report: Bone Health in Cancer Care

    PubMed Central

    Gralow, Julie R.; Biermann, J. Sybil; Farooki, Azeez; Fornier, Monica N.; Gagel, Robert F.; Kumar, Rashmi N.; Shapiro, Charles L.; Shields, Andrew; Smith, Matthew R.; Srinivas, Sandy; Van Poznak, Catherine H.

    2011-01-01

    Bone health and maintenance of bone integrity are important components of comprehensive cancer care in both early and late stages of disease. Risk factors for osteoporosis are increased in patients with cancer, including women with chemotherapy-induced ovarian failure, those treated with aromatase inhibitors for breast cancer, men receiving androgen-deprivation therapy for prostate cancer, and patients undergoing glucocorticoid therapy. The skeleton is a common site of metastatic cancer recurrence, and skeletal-related events are the cause of significant morbidity. The National Comprehensive Cancer Network (NCCN) convened a multidisciplinary task force on Bone Health in Cancer Care to discuss the progress made in identifying effective screening and therapeutic options for management of treatment-related bone loss; understanding the factors that result in bone metastases; managing skeletal metastases; and evolving strategies to reduce bone recurrences. This report summarizes presentations made at the meeting. PMID:19555589

  13. AIDS: developing a primary health care task force.

    PubMed

    Graham, L; Cates, J A

    1987-12-01

    As the number of people with AIDS increases, the number of people impacted by the AIDS crisis will also increase. Larger metropolitan areas have already responded to the crisis with various services (Deuchar, 1984); but the disease has yet to fully impact on smaller cities and towns. The formation of community service groups to cope with the AIDS crisis is a virtual necessity in health care preparation for persons with AIDS. The experience of the Fort Wayne AIDS Task Force reflects the potential of any community to utilize the existing resources in the gay and lesbian community, health and social service professions, and among family and friends of persons with AIDS. Consultation and resources are available through local and state boards of health, as well as local social service and health personnel currently dealing with the AIDS crisis. PMID:3430436

  14. Power system restoration - The second task force report

    SciTech Connect

    Adibi, M.M.; Borkoski, J.N.; Kafka, R.J.

    1986-01-01

    In its second report, the Power System Restoration Task Force (PSR-TF) (1) reviews the 1979-83 North American Electric Reliability Council (NERC) Reports on Major Bulk Power System Disturbances (2), identifying restoration problems which have been encountered during that 5-year period. Generally, these problems fall into three phases of restoration activities: planning for restart, reintegration and restoration of the bulk power supply; control actions during system degradation for saving and retaining critical sources of power; and restoration after a major disturbance when the power system has stabilized. The report also briefly discusses the applicability of several existing programs to the system restoration process. The opinions and conclusions expressed in this paper are those of the authors; they are bases on the referenced reports and have not been reviewed with NERC or the reporting utilities.

  15. Power system restoration - The second task force report

    SciTech Connect

    Adibi, M.M.; Borkoski, J.N.; Kafka, R.J.

    1987-11-01

    In its second report, the Power System Restoration Task Force (PSR-TF) (1) reviews the 1979-83 North American Electric Reliability Council (NERC) Reports on Major Bulk Power System Disturbances (2), identifying restoration problems which have been encountered during that 5-year period. Generally, these problems fall into three phases of restoration activities: planning for restart, reintegration and restoration of the bulk power supply; control actions during system degradation for saving and retaining critical sources of power; and restoration after a major disturbance when the power system has stabilized. The report also briefly discusses the applicability of several existing programs to the system restoration process. The opinions and conclusions expressed in this paper are those of the authors; they are based on the referenced reports and have not been reviewed with NERC or the reporting utilities.

  16. Family pediatrics: report of the Task Force on the Family.

    PubMed

    Schor, Edward L

    2003-06-01

    WHY A TASK FORCE ON THE FAMILY? The practice of pediatrics is unique among medical specialties in many ways, among which is the nearly certain presence of a parent when health care services are provided for the patient. Regardless of whether parents or other family members are physically present, their influence is pervasive. Families are the most central and enduring influence in children's lives. Parents are also central in pediatric care. The health and well-being of children are inextricably linked to their parents' physical, emotional and social health, social circumstances, and child-rearing practices. The rising incidence of behavior problems among children attests to some families' inability to cope with the increasing stresses they are experiencing and their need for assistance. When a family's distress finds its voice in a child's symptoms, pediatricians are often parents' first source for help. There is enormous diversity among families-diversity in the composition of families, in their ethnic and racial heritage, in their religious and spiritual orientation, in how they communicate, in the time they spend together, in their commitment to individual family members, in their connections to their community, in their experiences, and in their ability to adapt to stress. Within families, individuals are different from one another as well. Pediatricians are especially sensitive to differences among children-in their temperaments and personalities, in their innate and learned abilities, and in how they view themselves and respond to the world around them. It is remarkable and a testament to the effort of parents and to the resilience of children that most families function well and most children succeed in life. Family life in the United States has been subjected to extensive scrutiny and frequent commentary, yet even when those activities have been informed by research, they tend to be influenced by personal experience within families and by individual and

  17. Family pediatrics: report of the Task Force on the Family.

    PubMed

    Schor, Edward L

    2003-06-01

    WHY A TASK FORCE ON THE FAMILY? The practice of pediatrics is unique among medical specialties in many ways, among which is the nearly certain presence of a parent when health care services are provided for the patient. Regardless of whether parents or other family members are physically present, their influence is pervasive. Families are the most central and enduring influence in children's lives. Parents are also central in pediatric care. The health and well-being of children are inextricably linked to their parents' physical, emotional and social health, social circumstances, and child-rearing practices. The rising incidence of behavior problems among children attests to some families' inability to cope with the increasing stresses they are experiencing and their need for assistance. When a family's distress finds its voice in a child's symptoms, pediatricians are often parents' first source for help. There is enormous diversity among families-diversity in the composition of families, in their ethnic and racial heritage, in their religious and spiritual orientation, in how they communicate, in the time they spend together, in their commitment to individual family members, in their connections to their community, in their experiences, and in their ability to adapt to stress. Within families, individuals are different from one another as well. Pediatricians are especially sensitive to differences among children-in their temperaments and personalities, in their innate and learned abilities, and in how they view themselves and respond to the world around them. It is remarkable and a testament to the effort of parents and to the resilience of children that most families function well and most children succeed in life. Family life in the United States has been subjected to extensive scrutiny and frequent commentary, yet even when those activities have been informed by research, they tend to be influenced by personal experience within families and by individual and

  18. Greater Caribbean Energy and Environment Future. Ad hoc working group report, Key Biscayne, Florida, October 26-28, 1980

    SciTech Connect

    Thorhaug, A.

    1980-01-01

    This report of Workshop I (presented in outline form) by the Greater Caribbean Energy and Environment Foundation begin an intensive focus on the energy problems of the Caribbean. The process by which environmental assessments by tropical experts can be successfully integrated into energy decisions is by: (1) international loan institutions requiring or strongly recommending excellent assessments; (2) engineering awareness of total effects of energy projects; (3) governmental environmental consciousness-raising with regard to natural resource value and potential inadvertent and unnecessary resource losses during energy development; and (4) media participation. Section headings in the outline are: preamble; introduction; research tasks: today and twenty years hence; needed research, demonstration and information dissemination projects to get knowledge about Caribbean energy-environment used; summary; recommendations; generalized conclusions; and background literature. (JGB)

  19. 77 FR 6786 - U.S. Coral Reef Task Force Public Meeting and Public Comment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-09

    ... National Oceanic and Atmospheric Administration U.S. Coral Reef Task Force Public Meeting and Public..., Notice of public comment. SUMMARY: Notice is hereby given of a public meeting of the U.S. Coral Reef Task.... Coral Reef Task Force, provides a forum for coordinated planning and action among federal...

  20. 76 FR 52318 - U.S. Coral Reef Task Force Public Meeting and Public Comment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-22

    ... National Oceanic and Atmospheric Administration U.S. Coral Reef Task Force Public Meeting and Public..., Notice of public comment. SUMMARY: Notice is hereby given of a public meeting of the U.S. Coral Reef Task... the U.S. Coral Reef Task Force, provides a forum for coordinated planning and action among...

  1. Ad Hoc Influenza Vaccination During Years of Significant Antigenic Drift in a Tropical City With 2 Seasonal Peaks: A Cross-Sectional Survey Among Health Care Practitioners.

    PubMed

    Wong, Martin C S; Nelson, E Anthony S; Leung, Czarina; Lee, Nelson; Chan, Martin C W; Choi, Kin Wing; Rainer, Timothy H; Cheng, Frankie W T; Wong, Samuel Y S; Lai, Christopher K C; Lam, Bosco; Cheung, Tak Hong; Leung, Ting Fan; Chan, Paul K S

    2016-05-01

    We evaluated the acceptability of an additional ad hoc influenza vaccination among the health care professionals following seasons with significant antigenic drift.Self-administered, anonymous surveys were performed by hard copy questionnaires in public hospitals, and by an on-line platform available to all healthcare professionals, from April 1st to May 31st, 2015. A total of 1290 healthcare professionals completed the questionnaires, including doctors, nurses, and allied health professionals working in both the public and private systems.Only 31.8% of participating respondents expressed an intention to receive the additional vaccine, despite that the majority of them agreed or strongly agreed that it would bring benefit to the community (88.9%), save lives (86.7%), reduce medical expenses (76.3%), satisfy public expectation (82.8%), and increase awareness of vaccination (86.1%). However, a significant proportion expressed concern that the vaccine could disturb the normal immunization schedule (45.5%); felt uncertain what to do in the next vaccination round (66.0%); perceived that the summer peak might not occur (48.2%); and believed that the summer peak might not be of the same virus (83.5%). Furthermore, 27.8% of all respondents expected that the additional vaccination could weaken the efficacy of previous vaccinations; 51.3% was concerned about side effects; and 61.3% estimated that there would be a low uptake rate. If the supply of vaccine was limited, higher priority groups were considered to include the elderly aged ≥65 years with chronic medical conditions (89.2%), the elderly living in residential care homes (87.4%), and long-stay residents of institutions for the disabled (80.7%). The strongest factors associated with accepting the additional vaccine included immunization with influenza vaccines in the past 3 years, higher perceived risk of contracting influenza, and higher perceived severity of the disease impact.The acceptability to an additional ad

  2. Early career professionals: the mission of a task force.

    PubMed

    Barnes, G D; Lauw, M N

    2016-07-01

    Early career researchers and clinicians face unique challenges in comparison with more senior colleagues, for instance connecting with expert leaders outside of their own institution to enhance their expertise. As the largest international thrombosis and hemostasis professional society, the ISTH can play a central role in supporting the development of early career professionals. The ISTH Early Career Task Force was formed to improve support for, and encourage collaboration between early career thrombosis and hemostasis researchers and clinicians. These activities include (1) maintaining an online forum for early career ISTH members to connect, promote clinical, research, funding and educational activities, and to generate a sense of community; (2) broaden ISTH's reach with early career professionals in the developing world through promotion of the Reach-the-World fellowships and translating ISTH websites into six languages; (3) encourage early career engagement with ISTH activities, such as guidelines and guidance document processing and online webinar series; and (4) establishing this early career forum series in this journal. The JTH Forum series will highlight the early career perspective on a wide range of issues relevant to this group, and all ISTH early career members are encouraged to contribute.

  3. Government Applications Task Force ground truth study of WAG 4

    SciTech Connect

    Evers, T.K.; Smyre, J.L.; King, A.L.

    1997-06-01

    This report documents the Government Applications Task Force (GATF) Buried Waste Project. The project was initiated as a field investigation and verification of the 1994 Strategic Environmental Research and Development Program`s (SERDP) Buried Waste Identification Project results. The GATF project team included staff from three US Department of Energy (DOE) Laboratories [Oak Ridge National Laboratory (ORNL), Los Alamos National Laboratory (LANL), and the Savannah River Technology Center (SRTC)] and from the National Exploitation Laboratory. Similar studies were conducted at each of the three DOE laboratories to demonstrate the effective use of remote sensing technologies. The three locations were selected to assess differences in buried waste signatures under various environmental conditions (i.e., climate, terrain, precipitation, geology, etc.). After a brief background discussion of the SERDP Project, this report documents the field investigation (ground truth) results from the 1994--1995 GATF Buried Waste Study at ORNL`s Waste Area Grouping (WAG) 4. Figures for this report are located in Appendix A.

  4. The Workforce Task Force report: clinical implications for neurology.

    PubMed

    Freeman, William D; Vatz, Kenneth A; Griggs, Robert C; Pedley, Timothy

    2013-07-30

    The American Academy of Neurology Workforce Task Force (WFTF) report predicts a future shortfall of neurologists in the United States. The WFTF data also suggest that for most states, the current demand for neurologist services already exceeds the supply, and by 2025 the demand for neurologists will be even higher. This future demand is fueled by the aging of the US population, the higher health care utilization rates of neurologic services, and by a greater number of patients gaining access to the health care system due to the Patient Protection and Affordable Care Act. Uncertainties in health care delivery and patient access exist due to looming concerns about further Medicare reimbursement cuts. This uncertainty is set against a backdrop of Congressional volatility on a variety of issues, including the repeal of the sustainable growth rate for physician reimbursement. The impact of these US health care changes on the neurology workforce, future increasing demands, reimbursement, and alternative health care delivery models including accountable care organizations, nonphysician providers such as nurse practitioners and physician assistants, and teleneurology for both stroke and general neurology are discussed. The data lead to the conclusion that neurologists will need to play an even larger role in caring for the aging US population by 2025. We propose solutions to increase the availability of neurologic services in the future and provide other ways of meeting the anticipated increased demand for neurologic care.

  5. Proceedings of the Censorship Conference of the National Ad Hoc Committee Against Censorship (Dec. 9, 1975, New York City); A Day Long Discussion of Three Threats to the First Amendment and How Organizations Can Respond.

    ERIC Educational Resources Information Center

    National Ad Hoc Committee Against Censorship, New York, NY.

    The contents of this document consist of a transcript of the 1975 Censorship Conference proceedings, a list of conference participants, an outline of the National Ad Hoc Committee against Censorship, a statement of concern, and three appendixes. Contents of the transcript include introductory remarks by William F. Fore; a welcoming address by Dave…

  6. Ad Hoc Conference on the Education of Migrants: Introductory Report on Theme I, "The Position of the Immigrant and His Family on Arrival in the Host Country" (Strasbourg, France, November 5-8, 1974).

    ERIC Educational Resources Information Center

    Morin, Emma

    Theme I of the Ad Hoc Conference on the Education of Migrants was "measures to improve the position of the immigrant and his family at the time of arrival in the host country (including measures taken in the sending country on behalf of those intending to emigrate), primarily in respect of their educational circumstances". This report presents an…

  7. Ad Hoc Conference on the Education of Migrants: Introductory Report on Theme III, "Opportunities for Vocational and Technical Training and General Education for Adults and Adolescents" (Strasbourg, France, November 5-8, 1974).

    ERIC Educational Resources Information Center

    Egger, Eugene

    Theme III of the Ad Hoc Conference on the Education of Migrants was "measures to secure the satisfactory provision of opportunities for vocational and technical training and general education for adults and adolescents". This report briefly summarizes the situation in member countries regarding the vocational and technical training and general…

  8. Scientific and Technological Information for Development. Proceedings of the Ad-hoc Panel of Experts on Information Systems for Science and Technology for Development (Rome, Italy, January 21-25, 1985).

    ERIC Educational Resources Information Center

    United Nations, New York, NY.

    The report of the ad-hoc panel and the 25 papers in these proceedings cover a wide spectrum of issues and perspectives relating to information systems, services, and networks at both the national and international levels. The first part of this six-part volume presents the panel's report, which reviews the history of the panel and its purpose and…

  9. Ad Hoc Conference on the Education of Migrants: Introductory Report on Theme II, "Educational Provision Before and During the Host Country's Compulsory Schooling Period" (Strasbourg, France, November 5-8, 1974).

    ERIC Educational Resources Information Center

    Warzee, Louis

    Theme II of the Ad Hoc Conference on the Education of Migrants was "measures to secure satisfactory educational provision before and during the host country's compulsory schooling period (including specialized and additional training for teachers dealing with migrant workers' children)". This paper briefly discusses this theme. Major topics are:…

  10. The influence of task frequency and force direction on psychophysically acceptable forces in the context of the biomechanically weakest links.

    PubMed

    Cudlip, Alan C; Fischer, Steven L; Wells, Richard; Dickerson, Clark R

    2013-06-01

    This study examined the influence of frequency and direction of force application on psychophysically acceptable forces for simulated work tasks. Fifteen male participants exerted psychophysically acceptable forces on a force transducer at 1, 3, or 5 repetitions per minute by performing both a downward press and a pull toward the body. These exertions were shown previously to be strength and balance limited, respectively. Workers chose acceptable forces at a lower percentage of their maximum voluntary force capacity during downward (strength-limited) exertions than during pulling (balance-limited) exertions at all frequencies (4% to 11%, P = .035). Frequency modulated acceptable hand force only during downward exertions, where forces at five repetitions per minute were 13% less (P = .005) than those at one exertion per minute. This study provides insight into the relationship between biomechanically limiting factors and the selection of acceptable forces for unilateral manual tasks.

  11. Sociocultural barriers to medical care among Mexican Americans in Texas: a summary report of research conducted by the Southwest Medical Sociology Ad Hoc Committee.

    PubMed

    Quesada, G M; Heller, P L

    1977-05-01

    This paper summarizes research findings from members of the Southwest Medical Sociology Ad Hoc Committee concerning sociocultural barriers to medical care among Mexican Americans in Texas. Committee members individually, or in two-person groups, studied a number of factors concerning Mexican-American medical care in Texas such as: 1) mortality, morbidity, and other health status indicators; 2) health manpower and educational needs; 3) political factors impeding economical health care; 4) alienation, familism, and their relationship to utilization of the health services; 5) language and communication barriers; and 6) folk medicine. Findings include documentation that structural alienation of Mexican-Americans from mainstream Anglo-American middle-class society is carried over into their relation with utilization of the health care delivery system; that their emphasis on familism works alternatively to encourage and discourage their seeking access to health care; the language differences serve to perpetuate certain cultural differences that are inimical to health care delivery; and that curanderismo can be seen as complementing other types of health care. The report concludes with a number of recommendations for accomplishing cultural integration that will lead to better care for this segment of the health population. PMID:857103

  12. Sociocultural barriers to medical care among Mexican Americans in Texas: a summary report of research conducted by the Southwest Medical Sociology Ad Hoc Committee.

    PubMed

    Quesada, G M; Heller, P L

    1977-05-01

    This paper summarizes research findings from members of the Southwest Medical Sociology Ad Hoc Committee concerning sociocultural barriers to medical care among Mexican Americans in Texas. Committee members individually, or in two-person groups, studied a number of factors concerning Mexican-American medical care in Texas such as: 1) mortality, morbidity, and other health status indicators; 2) health manpower and educational needs; 3) political factors impeding economical health care; 4) alienation, familism, and their relationship to utilization of the health services; 5) language and communication barriers; and 6) folk medicine. Findings include documentation that structural alienation of Mexican-Americans from mainstream Anglo-American middle-class society is carried over into their relation with utilization of the health care delivery system; that their emphasis on familism works alternatively to encourage and discourage their seeking access to health care; the language differences serve to perpetuate certain cultural differences that are inimical to health care delivery; and that curanderismo can be seen as complementing other types of health care. The report concludes with a number of recommendations for accomplishing cultural integration that will lead to better care for this segment of the health population.

  13. 3 CFR 13540 - Executive Order 13540 of April 26, 2010. Interagency Task Force on Veterans Small Business...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Task Force on Veterans Small Business Development 13540 Order 13540 Presidential Documents Executive... interagency task force to coordinate the efforts of Federal agencies to improve capital, business development... Administration an Interagency Task Force on Veterans Small Business Development (Task Force). Sec. 2....

  14. Cancer classification using the Immunoscore: a worldwide task force.

    PubMed

    Galon, Jérôme; Pagès, Franck; Marincola, Francesco M; Angell, Helen K; Thurin, Magdalena; Lugli, Alessandro; Zlobec, Inti; Berger, Anne; Bifulco, Carlo; Botti, Gerardo; Tatangelo, Fabiana; Britten, Cedrik M; Kreiter, Sebastian; Chouchane, Lotfi; Delrio, Paolo; Arndt, Hartmann; Asslaber, Martin; Maio, Michele; Masucci, Giuseppe V; Mihm, Martin; Vidal-Vanaclocha, Fernando; Allison, James P; Gnjatic, Sacha; Hakansson, Leif; Huber, Christoph; Singh-Jasuja, Harpreet; Ottensmeier, Christian; Zwierzina, Heinz; Laghi, Luigi; Grizzi, Fabio; Ohashi, Pamela S; Shaw, Patricia A; Clarke, Blaise A; Wouters, Bradly G; Kawakami, Yutaka; Hazama, Shoichi; Okuno, Kiyotaka; Wang, Ena; O'Donnell-Tormey, Jill; Lagorce, Christine; Pawelec, Graham; Nishimura, Michael I; Hawkins, Robert; Lapointe, Réjean; Lundqvist, Andreas; Khleif, Samir N; Ogino, Shuji; Gibbs, Peter; Waring, Paul; Sato, Noriyuki; Torigoe, Toshihiko; Itoh, Kyogo; Patel, Prabhu S; Shukla, Shilin N; Palmqvist, Richard; Nagtegaal, Iris D; Wang, Yili; D'Arrigo, Corrado; Kopetz, Scott; Sinicrope, Frank A; Trinchieri, Giorgio; Gajewski, Thomas F; Ascierto, Paolo A; Fox, Bernard A

    2012-10-03

    Prediction of clinical outcome in cancer is usually achieved by histopathological evaluation of tissue samples obtained during surgical resection of the primary tumor. Traditional tumor staging (AJCC/UICC-TNM classification) summarizes data on tumor burden (T), presence of cancer cells in draining and regional lymph nodes (N) and evidence for metastases (M). However, it is now recognized that clinical outcome can significantly vary among patients within the same stage. The current classification provides limited prognostic information, and does not predict response to therapy. Recent literature has alluded to the importance of the host immune system in controlling tumor progression. Thus, evidence supports the notion to include immunological biomarkers, implemented as a tool for the prediction of prognosis and response to therapy. Accumulating data, collected from large cohorts of human cancers, has demonstrated the impact of immune-classification, which has a prognostic value that may add to the significance of the AJCC/UICC TNM-classification. It is therefore imperative to begin to incorporate the 'Immunoscore' into traditional classification, thus providing an essential prognostic and potentially predictive tool. Introduction of this parameter as a biomarker to classify cancers, as part of routine diagnostic and prognostic assessment of tumors, will facilitate clinical decision-making including rational stratification of patient treatment. Equally, the inherent complexity of quantitative immunohistochemistry, in conjunction with protocol variation across laboratories, analysis of different immune cell types, inconsistent region selection criteria, and variable ways to quantify immune infiltration, all underline the urgent requirement to reach assay harmonization. In an effort to promote the Immunoscore in routine clinical settings, an international task force was initiated. This review represents a follow-up of the announcement of this initiative, and of the J

  15. Task Dependency of Grip Stiffness—A Study of Human Grip Force and Grip Stiffness Dependency during Two Different Tasks with Same Grip Forces

    PubMed Central

    Höppner, Hannes; McIntyre, Joseph; van der Smagt, Patrick

    2013-01-01

    It is widely known that the pinch-grip forces of the human hand are linearly related to the weight of the grasped object. Less is known about the relationship between grip force and grip stiffness. We set out to determine variations to these dependencies in different tasks with and without visual feedback. In two different settings, subjects were asked to (a) grasp and hold a stiffness-measuring manipulandum with a predefined grip force, differing from experiment to experiment, or (b) grasp and hold this manipulandum of which we varied the weight between trials in a more natural task. Both situations led to grip forces in comparable ranges. As the measured grip stiffness is the result of muscle and tendon properties, and since muscle/tendon stiffness increases more-or-less linearly as a function of muscle force, we found, as might be predicted, a linear relationship between grip force and grip stiffness. However, the measured stiffness ranges and the increase of stiffness with grip force varied significantly between the two tasks. Furthermore, we found a strong correlation between regression slope and mean stiffness for the force task which we ascribe to a force stiffness curve going through the origin. Based on a biomechanical model, we attributed the difference between both tasks to changes in wrist configuration, rather than to changes in cocontraction. In a new set of experiments where we prevent the wrist from moving by fixing it and resting it on a pedestal, we found subjects exhibiting similar stiffness/force characteristics in both tasks. PMID:24324643

  16. 75 FR 4051 - Defense Health Board; DoD Task Force on the Prevention of Suicide by Members of the Armed Forces...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-26

    ... of the Secretary Defense Health Board; DoD Task Force on the Prevention of Suicide by Members of the...)(2) of Public Law, the DoD Task Force on the Prevention of Suicide by Members of the Armed Forces (hereafter, Task Force) will meet on February 11, 2010, to gather information pertaining to suicide...

  17. 77 FR 15399 - Model Safety Evaluation for Plant-Specific Adoption of Technical Specifications Task Force...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-15

    ... (76 FR 73737), is available under ADAMS Accession No. ML120200484. NRC's PDR: You may examine and... COMMISSION Model Safety Evaluation for Plant-Specific Adoption of Technical Specifications Task Force...-specific adoption of Technical Specifications (TS) Task Force (TSTF) Traveler TSTF-505, Revision...

  18. Report to the Governor's Task Force on Violence and Extremism [with Executive Summary].

    ERIC Educational Resources Information Center

    Governor's Task Force on Violence and Extremism, Annapolis, MD.

    This paper presents the result of a statewide survey conducted by the Survey Research Center at the University of Maryland for the Governor's Task Force on Extremism and Violence. The Task Force was commissioned in response to an increased number of reported incidents associated with racial, ethnic, or religious bigotry. The survey was intended to…

  19. Initial Report of the Task Force on Cultural Competence Education in the Health Sciences

    ERIC Educational Resources Information Center

    New Mexico Higher Education Department, 2007

    2007-01-01

    This report summarizes the findings and recommendations of the Task Force on Cultural Competence Education and represents the distillation of the Task Force's efforts to fulfill its legislative charge. The report is intended to facilitate a statewide conversation about the health services provided to New Mexico's multicultural citizenry. It…

  20. American Indian Policy Review Commission Special Joint Task Force Report on Alaskan Native Issues.

    ERIC Educational Resources Information Center

    Congress of the U.S. Washington, DC. American Indian Policy Review Commission.

    Impact of the Alaskan Native Claims Settlement Act (ANCSA) on Alaskan Natives, particularly at village levels, is the focus of a joint task force report on Alaskan Native issues. Prepared for the American Indian Policy Review Commission, the report is the work of representatives from task forces on tribal government, federal, state, and tribal…

  1. 28 CFR 16.105 - Exemption of Foreign Terrorist Tracking Task Force System.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Exemption of Foreign Terrorist Tracking Task Force System. 16.105 Section 16.105 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR... of Foreign Terrorist Tracking Task Force System. (a) The following system of records is exempt from...

  2. 28 CFR 16.105 - Exemption of Foreign Terrorist Tracking Task Force System.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of Foreign Terrorist Tracking Task Force System. 16.105 Section 16.105 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR... of Foreign Terrorist Tracking Task Force System. (a) The following system of records is exempt from...

  3. 76 FR 76189 - Notice of Public Hearing-Fiscal Oversight Task Force Report & Recommendations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-06

    ...) written comments previously submitted during the public comment period; and (3) reactions to those... comments previously submitted, and reactions to those comments from several Task Force members. The public comments and a summary of Task Force members' reactions may be viewed online at...

  4. A Formula for Change: The Report of the Task Force on Minorities in Public Broadcasting.

    ERIC Educational Resources Information Center

    Corporation for Public Broadcasting, Washington, DC.

    The results of research conducted by the 1977 Task Force on Minorities in Public Broadcasting are reported in this document. The task force, consisting of a group of 28 individuals of various ethnic backgrounds, was assembled by the Corporation for Public Broadcasting to determine the success of public broadcasting in meeting the informational and…

  5. 78 FR 46671 - Membership on the Presidential Task Force on Wildlife Trafficking

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-01

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF STATE Membership on the Presidential Task Force on Wildlife Trafficking By virtue of the authority vested in me as... of State representative to the Presidential Task Force on Wildlife Trafficking, established...

  6. Identification of Occupational Areas for Indiana's Future. Final Report of the Technology Forecasting Task Force.

    ERIC Educational Resources Information Center

    Indiana State Commission on Vocational and Technical Education, Indianapolis.

    A task force representing the Indiana private sector was convened for two purposes: to (1) identify the impact of technology on required worker skills, the labor market, and the vocational education, training, and employment system; and (2) identify occupational areas that should be future growth areas for the state. Task force members reviewed…

  7. 76 FR 67761 - Hearing of the Attorney General's National Task Force on Children Exposed to Violence

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-02

    ... Violence AGENCY: Office of Juvenile Justice and Delinquency Prevention (OJJDP). ACTION: Notice of hearing... Children Exposed to Violence (hereafter refered to as the Task Force). The Task Force is chartered to provide the Attorney General with valuable advice in the areas of children's exposure to ] violence...

  8. 77 FR 22000 - Hearing of the Attorney General's National Task Force on Children Exposed to Violence

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-12

    ... Violence AGENCY: Office of Justice Programs (OJP), Justice. ACTION: Notice of hearing. SUMMARY: This is an... Violence (the ``task force''). The task force is chartered to provide OJP, a component of the Department of Justice, with valuable advice in the areas of children exposed to violence for the purpose of...

  9. 28 CFR 16.105 - Exemption of Foreign Terrorist Tracking Task Force System.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Exemption of Foreign Terrorist Tracking Task Force System. 16.105 Section 16.105 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR... of Foreign Terrorist Tracking Task Force System. (a) The following system of records is exempt from...

  10. 28 CFR 16.105 - Exemption of Foreign Terrorist Tracking Task Force System.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Exemption of Foreign Terrorist Tracking Task Force System. 16.105 Section 16.105 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR... of Foreign Terrorist Tracking Task Force System. (a) The following system of records is exempt from...

  11. 28 CFR 16.105 - Exemption of Foreign Terrorist Tracking Task Force System.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Exemption of Foreign Terrorist Tracking Task Force System. 16.105 Section 16.105 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR... of Foreign Terrorist Tracking Task Force System. (a) The following system of records is exempt from...

  12. Task Force on Education Funding Equity, Accountability, and Partnerships. Preliminary Report.

    ERIC Educational Resources Information Center

    Maryland State Dept. of Legislative Services, Annapolis.

    In 1997, Maryland formed the Task Force on Education Funding Equity, Accountability, and Partnerships to ensure that students throughout Maryland have an equal opportunity for academic success. The Task Force's preliminary report features a comprehensive review of education funding and programs in grades K-12. The report presents membership and…

  13. Report of the MLA Task Force on Evaluating Scholarship for Tenure and Promotion

    ERIC Educational Resources Information Center

    Modern Language Association, 2007

    2007-01-01

    In 2004 the Executive Council of the Modern Language Association of America (MLA) created a task force to examine current standards and emerging trends in publication requirements for tenure and promotion in English and foreign language departments in the United States. To fulfill its charge, the task force reviewed numerous studies, reports, and…

  14. Credentialing Educational Accomplishment. Report and Recommendations of the Task Force on Educational Credit and Credentials.

    ERIC Educational Resources Information Center

    Miller, Jerry W., Ed.; Mills, Olive, Ed.

    The Task Force on Educational Credit and Credentials of the American Council on Education undertook a two-year study to determine how postsecondary education's system for awarding credit and credentials can be changed or its adequacy improved to meet today's educational and social needs. This book sets forth the Task Force's report and…

  15. "ZERO TO THREE's" Task Force on Culture and Development: Learning to Walk the Talk

    ERIC Educational Resources Information Center

    Mann, Tammy; Steward, Marva; Eggbeer, Linda; Norton, Dolores

    2007-01-01

    The Executive Committee at "ZERO TO THREE" created a Task Force on Culture and Development to deepen our understanding of the role of culture in child development and to guide the organization through a self-assessment process to better understand how staff and board members address the issue of culture in their work. The task force's literature…

  16. Report of the Build Subsidized Child Care Rate Policy Task Force: Recommendations for Action

    ERIC Educational Resources Information Center

    Stoney, Louise

    2004-01-01

    In the Fall of 2003, the Pennsylvania Build Initiative convened a Rate Policy Task Force to broadly examine the issue of child care rates and make recommendations for action. The Task Force goal was two-fold: (1) to suggest ways that the rate and payment process currently used by the Pennsylvania Department of Public Welfare (DPW) can better…

  17. 75 FR 30002 - Federal Advisory Committee; Defense Task Force on Sexual Assault in the Military Services

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-28

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; Defense Task Force on Sexual Assault in the Military... terminating the Defense Task Force on Sexual Assault in the Military Services, effective June 1, 2010....

  18. Idaho Rural Education Task Force. Public School Information. Legislative Report, 2008

    ERIC Educational Resources Information Center

    Idaho State Department of Education, 2008

    2008-01-01

    The Idaho Rural Education Task Force was formed in July 2007 with the goal of proposing and examining solutions to challenges facing rural schools. The task force's work this year has focused on three areas: recruitment and retention of highly qualified teachers, funding shortages related to insurance costs and staff allowances, and the technology…

  19. Report of the Accreditation Task Force: Building Agreement on an Accreditation System for Educator Preparation

    ERIC Educational Resources Information Center

    American Association of Colleges for Teacher Education (NJ1), 2008

    2008-01-01

    In early 2008 the Board of Directors of the American Association of Colleges for Teacher Education (AACTE) convened a Task Force on Accreditation to work toward a unified approach to accreditation. The Task Force brought together AACTE representatives with the two major federally-recognized accrediting agencies in educator preparation--the…

  20. CSS Council Task Force on Reauthorization: Recommendations for Improving Federal Aid Delivery. Research Report.

    ERIC Educational Resources Information Center

    College Entrance Examination Board, New York, NY.

    The College Scholarship Service (CSS) Council Task Force on Reauthorization presented its recommendations to the CSS Council in December 2002. The Task Force focused its recommendations on issues that address the overarching goal of ensuring access to higher education for the most needy students. The recommendations reflect the consensus of CSS…

  1. Report to the Ford Foundation by the Task Force on Economic Well-Being and Employment.

    ERIC Educational Resources Information Center

    Estrada, Leobardo; And Others

    A research and policy agenda for addressing issues related to the Hispanic worker in the United States is provided in this report, which was prepared by the Ford Foundation's Task Force on Employment and Economic Well-Being. First, the theoretical basis of the Task Force's recommendations is outlined. This was based on the observation of three…

  2. 81 FR 23300 - Meeting of the Community Preventive Services Task Force

    Federal Register 2010, 2011, 2012, 2013, 2014

    2016-04-20

    ... systematic reviews of the scientific evidence on which they are based, are compiled in the Guide to Community.... During its meetings, the Task Force considers the findings of systematic reviews on existing research and... systematic reviews and issue findings and recommendations. Task Force recommendations provide...

  3. 80 FR 5537 - Meeting of the Community Preventive Services Task Force

    Federal Register 2010, 2011, 2012, 2013, 2014

    2015-02-02

    ... recommendations, along with the systematic reviews of the scientific evidence on which they are based, are.... During its meetings, the Task Force considers the findings of systematic reviews on existing research and... purpose of the meeting is for the Task Force to consider the findings of systematic reviews and...

  4. Report of the Oklahoma Higher Education Task Force on Student Retention.

    ERIC Educational Resources Information Center

    Oklahoma State Regents for Higher Education, Oklahoma City.

    The Oklahoma State Regents for Higher Education appointed the Oklahoma Higher Education Task Force on Student Retention and charged the Task Force to: (1) review Oklahoma and national data on student attrition; (2) identify factors that contribute to student persistence in college; and (3) recommend specific initiatives to increase student…

  5. 75 FR 20578 - Federal Advisory Committee; Defense Health Board (DHB); Department of Defense Task Force on the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-20

    ... Force on the Prevention of Suicide by Members of the Armed Forces AGENCY: Department of Defense (DoD... Department of Defense Task Force on the Prevention of Suicide by Members of the Armed Forces will meet on May... Defense Task Force on the Prevention of Suicide by Members of the Armed Forces, One Skyline Place,...

  6. Motor learning of cue-dependent pull-force changes during an isometric precision grip task.

    PubMed

    Schmid, Barbara C; Meindl, Tobias; Timmann, Dagmar; Kolb, Florian P; Kutz, Dieter F

    2015-02-01

    The "raspberry task" represents a precision grip task that requires continuous adjustment of grip and pull forces. During this task subjects grip a specialized grip rod and have to increase the pull force linearly while the rod is locked. The aim of this study was to determine whether an associated, initially neutral cue is able to evoke pull-force changes in the raspberry task. A standard delay paradigm was used to study cued pull-force changes during an ongoing movement resulting in unloading. Pull force and EMG activity of hand and arm muscles were recorded from 13 healthy, young subjects. The cue was associated with a complex change in motor behavior. In this task, cued force changes take place more rapidly than in protective reflex systems (in median after the second presentation of the cueing stimulus). A cued force change was detectable in two-thirds of paired trials. Although the force change is produced by a decrease of the EMG activity in several grip- and pull-force-producing muscles, the most significant effect in the majority of the subjects was an increase of the activity of the flexor carpi ulnaris muscle which antagonises corresponding pull-force-producing muscles. Cued force changes require adequately and precisely controlled activation of the muscle groups involved in the movement.

  7. The Report and Recommendations of the New York State Special Task Force on Equity and Excellence in Education. Volume One.

    ERIC Educational Resources Information Center

    New York State Special Task Force on Equity and Excellence in Education.

    A statewide task force established to improve educational equity in New York State describes its activities and results in this report. The task force chairman's letter of submittal discusses the Levittown v. Nyquist decision that led to the task force's formation and reviews the group's deliberations. The report then summarizes task force…

  8. Functional muscle synergies constrain force production during postural tasks

    PubMed Central

    McKay, J. Lucas; Ting, Lena H.

    2015-01-01

    We recently demonstrated that a set of five functional muscle synergies were sufficient to characterize both hindlimb muscle activity and active forces during automatic postural responses in cats standing at multiple postural configurations. This characterization depended critically upon the assumption that the endpoint force vector (synergy force vector) produced by the activation of each muscle synergy rotated with the limb axis as the hindlimb posture varied in the sagittal plane. Here, we used a detailed, 3D static model of the hindlimb to confirm that this assumption is biomechanically plausible: as we varied the model posture, simulated synergy force vectors rotated monotonically with the limb axis in the parasagittal plane (r2 = 0.94 ± 0.08). We then tested whether a neural strategy of using these five functional muscle synergies provides the same force-generating capability as controlling each of the 31 muscles individually. We compared feasible force sets (FFS) from the model with and without a muscle synergy organization. FFS volumes were significantly reduced with the muscle synergy organization (F = 1556.01, p ≪ 0.01), and as posture varied, the synergy-limited FFSs changed in shape, consistent with changes in experimentally-measured active forces. In contrast, nominal FFS shapes were invariant with posture, reinforcing prior findings that postural forces cannot be predicted by hindlimb biomechanics alone. We propose that an internal model for postural force generation may coordinate functional muscle synergies that are invariant in intrinsic limb coordinates, and this reduced-dimension control scheme reduces the set of forces available for postural control. PMID:17980370

  9. 77 FR 42334 - Meeting of the Attorney General's National Task Force on Children Exposed to Violence (Correction)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-18

    ... Violence (Correction) AGENCY: Office of Justice Programs, Justice. ACTION: Notice; correction. SUMMARY: The... meeting of the Attorney General's National Task Force on Children Exposed to Violence (the ``task...

  10. The Effect of Occupational Growth on Labor Force Task Characteristics.

    ERIC Educational Resources Information Center

    Szafran, Robert F.

    1996-01-01

    Examination of changes in 495 occupations from 1950-1990 shows an increased likelihood of tasks with high levels of complexity and social interaction, decreased likelihood of fine or gross motor skills or harsh climatic conditions. There is evidence that jobs have become polarized on the need for fine motor skills and level of social interaction.…

  11. Effects of prolonged patellar tendon vibration on force steadiness in quadriceps femoris during force-matching task.

    PubMed

    Saito, Akira; Ando, Ryosuke; Akima, Hiroshi

    2016-01-01

    The quadriceps femoris (QF) muscle group plays an essential role in human movement, such as standing, walking and running. The ability to maintain a steady force during physical activity of the human lower limb is important for mobility, postural control and balance. Although prolonged mechanical vibration of the muscle-tendon unit can moderate the efficacy of synaptic input from Ia afferent onto the α-motor neuron pathway, the effect of prolonged tendon vibration on fluctuations of knee extensor force has received little attention. The purpose of the present study was to examine the effects of prolonged patellar tendon vibration on the force steadiness of the QF muscle. Nine healthy men performed a submaximal force-matching task involving isometric knee extension before and after patellar tendon vibration or quiet seated rest (n = 7, control condition) for 30 min. The target force was 2.5, 10 and 30 % of maximal voluntary contraction (MVC). Surface electromyography (EMG) of the four QF synergists was recorded and normalized to EMG amplitude during the MVC. The knee extension force and the EMG amplitude of vastus medialis during the MVC were significantly reduced after the vibration, but did not significantly decrease in the control condition. Fluctuations of force and normalized EMG of individual QF muscles at each submaximal force level did not significantly change after the vibration. We conclude that prolonged patellar tendon vibration does not influence the force steadiness of the QF muscle during an isometric force-matching task.

  12. Bioconversion of α-Linolenic Acid into n-3 Long-Chain Polyunsaturated Fatty Acid in Hepatocytes and Ad Hoc Cell Culture Optimisation

    PubMed Central

    Alhazzaa, Ramez; Sinclair, Andrew J.; Turchini, Giovanni M.

    2013-01-01

    This study aimed to establish optimal conditions for a cell culture system that would allow the measurement of 18∶3n-3 (ALA) bioconversion into n-3 long-chain polyunsaturated fatty acid (n-3 LC-PUFA), and to determine the overall pathway kinetics. Using rat hepatocytes (FaO) as model cells, it was established that a maximum 20∶5n-3 (EPA) production from 50 µM ALA initial concentration was achieved after 3 days of incubation. Next, it was established that a gradual increase in the ALA concentration from 0 up to 125µM lead to a proportional increase in EPA, without concomitant increase in further elongated or desaturated products, such as 22∶5n-3 (DPA) and 22∶6n-3 (DHA) in 3 day incubations. Of interest, ALA bioconversion products were observed in the culture medium. Therefore, in vitro experiments disregarding the medium fatty acid content are underestimating the metabolism efficiency. The novel application of the fatty acid mass balance (FAMB) method on cell culture system (cells with medium) enabled quantifying the apparent enzymatic activities for the biosynthesis of n-3 LC-PUFA. The activity of the key enzymes was estimated and showed that, under these conditions, 50% (Km) of the theoretical maximal (Vmax = 3654 µmol.g−1 of cell protein.hour−1) Fads2 activity on ALA can be achieved with 81 µM initial ALA. Interestingly, the apparent activity of Elovl2 (20∶5n-3 elongation) was the slowest amongst other biosynthesis steps. Therefore, the possible improvement of Elovl2 activity is suggested toward a more efficient DHA production from ALA. The present study proposed and described an ad hoc optimised cell culture conditions and methodology towards achieving a reliable experimental platform, using FAMB, to assist in studying the efficiency of ALA bioconversion into n-3 LC-PUFA in vitro. The FAMB proved to be a powerful and inexpensive method to generate a detailed description of the kinetics of n-3 LC-PUFA biosynthesis enzymes activities in vitro

  13. A leader-follower relationship in joint action on a discrete force production task.

    PubMed

    Masumoto, Junya; Inui, Nobuyuki

    2014-11-01

    The present study examined the development of a leader-follower relationship in joint action performed by participants with different skill levels. Two participants were instructed to produce discrete isometric forces such that the sum of the forces was the target force. The task did not prescribe the onset time or share of force each participant contributed to the target force. Although novices with low force variability did not produce an earlier force than those with high force variability in the novice-novice group, experienced participants produced an earlier force than novices in the novice-experienced group. While participants with low force variability always produced a stronger force than those with high force variability in both the groups, there was no significant difference in force distributions between participants with low and high force variabilities. Although a novice-experienced pair produced force more complementarily than a novice-novice pair in the first practice block, the difference between pairs vanished after the first practice block, suggesting that leader-follower relations were not always beneficial to task performance. In addition, practice of the joint action did not transfer to individual action.

  14. Visual information gain and task asymmetry interact in bimanual force coordination and control.

    PubMed

    Hu, Xiaogang; Newell, Karl M

    2011-08-01

    This study examined the question of whether and how the influence of visual information on force coordination patterns is dependent on the settings of a task asymmetry constraint. In a bimanual isometric force experiment, the task asymmetry was manipulated via imposing different coefficients on the index finger forces such that the weighted sum of the finger forces matched the target force. The environmental constraint was quantified by the visual performance error and was manipulated through the change of visual gain (number of pixels on the screen representing the unit of force). The constraint arising from the individual was quantified by the bilateral coupling effect (i.e., symmetric force production) between hands. The results revealed improved performance in terms of lower variability and performance error and more complex total force structure with higher visual gain. The influence of visual gain on the force coordination pattern, however, was found to be dependent on the task coefficients imposed on the finger forces. Namely, the force sharing between hands became more symmetric with high visual gain only when the right finger force had the higher coefficient, and an error-compensatory strategy was evident with high gain only when symmetric coefficients were imposed on the two fingers. The findings support the proposition that the motor coordination and control patterns are organized by the interactive influence of different categories of constraints where the functional influence of the information provided is dependent on the motor output.

  15. 75 FR 45091 - Notice of Request for Nominations to the Agricultural Air Quality Task Force

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-02

    ... Natural Resources Conservation Service Notice of Request for Nominations to the Agricultural Air Quality Task Force AGENCY: Natural Resources Conservation Service, United States Department of Agriculture... Designated Federal Official. Mr. Schmidt may be contacted at the Department of Agriculture, Natural...

  16. 75 FR 8917 - Notice of a Meeting of the Agricultural Air Quality Task Force

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-26

    ... Natural Resources Conservation Service Notice of a Meeting of the Agricultural Air Quality Task Force AGENCY: Natural Resources Conservation Service, Department of Agriculture. ACTION: Notice of a meeting..., Natural Resources Conservation Service, 1400 Independence Avenue, SW., Room 6165 South...

  17. 77 FR 1913 - Notice of Meeting of the Agricultural Air Quality Task Force

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-12

    ...; ] DEPARTMENT OF AGRICULTURE Natural Resources Conservation Service Notice of Meeting of the Agricultural Air Quality Task Force AGENCY: Natural Resources Conservation Service, USDA. ACTION: Notice of Meeting..., Department of Agriculture Natural Resources Conservation Service, Post Office Box 2890, Washington, DC...

  18. 77 FR 41165 - Notice of Meeting of the Agricultural Air Quality Task Force

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-12

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF AGRICULTURE Natural Resources Conservation Service Notice of Meeting of the Agricultural Air Quality Task Force AGENCY: Natural Resources Conservation Service, USDA. ACTION: Notice of meeting. SUMMARY: The Department...

  19. International confederation for cleft lip and palate and related craniofacial anomalies task force report: holistic outcomes.

    PubMed

    Broder, Hillary L

    2014-11-01

    Objective : This paper describes the process and outcomes of the 2013 American Cleft Palate-Craniofacial Association task force on Holistic Outcomes. The goals and membership of the task force are presented. Methods : Using internet communication, the group introduced themselves, shared ideas and information related to holistic assessment and implementation of using a validated holistic measure, the Child Oral Health Impact Profile (COHIP) at participating international sites. Results : Data from the sites were analyzed using descriptive statistics. Administration of the COHIP was successful. It varied from self-completion as well as verbal presentation due to language differences and a function of the short time period to complete collection. Additionally qualitative comments were reported by the task force site directors. Conclusions : Future directions for holistic assessment and communication among task force members and sites were discussed at the Congress and are presented in this report.

  20. 78 FR 10127 - Request for Nominations to the Agricultural Air Quality Task Force

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-13

    ...; ] DEPARTMENT OF AGRICULTURE Natural Resources Conservation Service Request for Nominations to the Agricultural Air Quality Task Force AGENCY: Natural Resources Conservation Service, United States Department of... Resources Conservation Service, 1201 Lloyd Boulevard, Suite 1000, Portland, Oregon 97232, or by email...

  1. Foot force direction control during a pedaling task in individuals post-stroke

    PubMed Central

    2014-01-01

    Background Appropriate magnitude and directional control of foot-forces is required for successful execution of locomotor tasks. Earlier evidence suggested, following stroke, there is a potential impairment in foot-force control capabilities both during stationary force generation and locomotion. The purpose of this study was to investigate the foot-pedal surface interaction force components, in non-neurologically-impaired and stroke-impaired individuals, in order to determine how fore/aft shear-directed foot/pedal forces are controlled. Methods Sixteen individuals with chronic post-stroke hemiplegia and 10 age-similar non-neurologically-impaired controls performed a foot placement maintenance task under a stationary and a pedaling condition, achieving a target normal pedal force. Electromyography and force profiles were recorded. We expected generation of unduly large magnitude shear pedal forces and reduced participation of multiple muscles that can contribute forces in appropriate directions in individuals post-stroke. Results We found lower force output, inconsistent modulation of muscle activity and reduced ability to change foot force direction in the paretic limbs, but we did not observe unduly large magnitude shear pedal surface forces by the paretic limbs as we hypothesized. Conclusion These findings suggested the preservation of foot-force control capabilities post-stroke under minimal upright postural control requirements. Further research must be conducted to determine whether inappropriate shear force generation will be revealed under non-seated, postural demanding conditions, where subjects have to actively control for upright body suspension. PMID:24739234

  2. Two-dimensional static manipulation tasks: does force coordination depend on change of the tangential force direction?

    PubMed

    Uygur, Mehmet; Jin, Xin; Knezevic, Olivera; Jaric, Slobodan

    2012-10-01

    Coordination of the grip force (GF) with a tangential force (TF, often referred to as load force) exerted along a certain line in space (i.e., one-dimensional tasks) during object manipulation has proved both to be high and based on feed-forward neural control mechanisms. However, GF-TF coordination deteriorates when the TF of one-dimensional task consecutively switches its direction (bidirectional task). In the present study, we aimed to explore GF-TF coordination in the generally neglected multi-dimensional manipulations. We hypothesized that the coordination would depend on the number of unidirectional and bidirectional orthogonal components of a two-dimensional TF exertion. Fourteen subjects traced various circular TF patterns and their orthogonal diameters shown on a computer screen by exerting a static TF. As expected, the unidirectional tasks revealed higher GF-TF coordination than the bidirectional ones (e.g., higher GF-TF correlations and GF gains, and lower GF/TF ratio). Regarding the circular tasks, most of the data were in line with the hypothesis revealing higher coordination associated with higher number of unidirectional components. Of particular importance could be that the circular tasks also revealed prominent time lags of GF with respect to TF, suggesting involvement of feedback mechanisms. We conclude that the force coordination in bidirectional static manipulations could be affected by changes in TF direction along either of its orthogonal components. The time lags observed from the circular tasks could be a consequence of the activity of sensory afferents, rather than of the visual feedback provided or the task complexity.

  3. Effects of Type and Strength of Force Feedback on Movement Time in a Target Selection Task

    NASA Technical Reports Server (NTRS)

    Rorie, Robert Conrad; Vu, Kim-Phuong L.; Marayong, Panadda; Robles, Jose; Strybel, Thomas Z.; Battiste, Vernol

    2013-01-01

    Future cockpits will likely include new onboard technologies, such as cockpit displays of traffic information, to help support future flight deck roles and responsibilities. These new technologies may benefit from multimodal feedback to aid pilot information processing. The current study investigated the effects of multiple levels of force feedback on operator performance in an aviation task. Participants were presented with two different types of force feedback (gravitational and spring force feedback) for a discrete targeting task, with multiple levels of gain examined for each force feedback type. Approach time and time in target were recorded. Results suggested that the two highest levels of gravitational force significantly reduced approach times relative to the lowest level of gravitational force. Spring force level only affected time in target. Implications of these findings for the design of future cockpit displays will be discussed.

  4. Report of the Task Force on Medical Record Education. American Medical Record Association.

    PubMed

    1986-12-01

    An eight-member task force on medical record education was created in 1985 as part of AMRA's strategic planning process and long history of commitment to education. This report on their activities was presented to the Board of Directors in September 1986. While not intended to be a definitive work plan, the recommendations in the report involve the entire AMRA membership. The task force expects and encourages extensive debate on the issues and recommendations contained herein.

  5. The United States Preventive Services Task Force recommendations for lung cancer screening.

    PubMed

    Blackmon, Shanda H; Feinglass, Shamiram R

    2015-05-01

    In 2013, the United States Preventive Services Task Force made a grade B recommendation for annual screening for lung cancer with low-dose computed tomography in adult patients 55 to 80 years of age who have a 30 pack-year smoking history and currently smoke or have quit within the last 15 years. In practical terms, the United States Preventive Services Task Force recommendations will likely mean a large increase in actual screening rates.

  6. NCCN Task Force Report: Optimizing Treatment of Advanced Renal Cell Carcinoma With Molecular Targeted Therapy

    PubMed Central

    Hudes, Gary R.; Carducci, Michael A.; Choueiri, Toni K.; Esper, Peg; Jonasch, Eric; Kumar, Rashmi; Margolin, Kim A.; Michaelson, M. Dror; Motzer, Robert J.; Pili, Roberto; Roethke, Susan; Srinivas, Sandy

    2015-01-01

    The outcome of patients with metastatic renal cell carcinoma has been substantially improved with administration of the currently available molecularly targeted therapies. However, proper selection of therapy and management of toxicities remain challenging. NCCN convened a multidisciplinary task force panel to address the clinical issues associated with these therapies in attempt to help practicing oncologists optimize patient outcomes. This report summarizes the background data presented at the task force meeting and the ensuing discussion. PMID:21335444

  7. Aging, visual information, and adaptation to task asymmetry in bimanual force coordination.

    PubMed

    Hu, Xiaogang; Newell, Karl M

    2011-12-01

    This study investigated the coordination and control strategies that the elderly adopt during a redundant finger force coordination task and how the amount of visual information regulates the coordination patterns. Three age groups (20-24, 65-69, and 75-79 yr) performed a bimanual asymmetric force task. Task asymmetry was manipulated via imposing different coefficients on the finger forces such that the weighted sum of the two index finger forces equaled the total force. The amount of visual information was manipulated by changing the visual information gain of the total force output. Two hypotheses were tested: the reduced adaptability hypothesis predicts that the elderly show less degree of force asymmetry between hands compared with young adults in the asymmetric coefficient conditions, whereas the compensatory hypothesis predicts that the elderly exhibit more asymmetric force coordination patterns with asymmetric coefficients. Under the compensatory hypothesis, two contrasting directions of force sharing strategies (i.e., more efficient coordination strategy and minimum variance strategy) are expected. A deteriorated task performance (high performance error and force variability) was found in the two elderly groups, but enhanced visual information improved the task performance in all age groups. With low visual information gain, the elderly showed reduced adaptability (i.e., less asymmetric forces between hands) to the unequal weighting coefficients, which supported the reduced adaptability hypothesis; however, the elderly revealed the same degree of adaptation as the young group under high visual gain. The findings are consistent with the notion that the age-related reorganization of force coordination and control patterns is mediated by visual information and, more generally, the interactive influence of multiple categories of constraints.

  8. Montana's Clark Fork River Basin Task Force: a vehicle for integrated water resources management?

    PubMed

    Shively, David D; Mueller, Gerald

    2010-11-01

    This article examines what is generally considered to be an unattainable goal in the western United States: integrated water resources management (IWRM). Specifically, we examine an organization that is quite unique in the West, Montana's Clark Fork River Basin Task Force (Task Force), and we analyze its activities since its formation in 2001 to answer the question: are the activities and contributions of the Task Force working to promote a more strongly integrated approach to water resources management in Montana? After reviewing the concepts underlying IWRM, some of the issues that have been identified for achieving IWRM in the West, and the Montana system of water right allocation and issues it faces, we adapt Mitchell's IWRM framework and apply it to the analysis of the Task Force's activities in the context of IWRM. In evaluating the physical, interaction, and protocol/planning/policy components of IWRM, we find that the Task Force has been contributing to the evolution of Montana's water resources management towards this framework, though several factors will likely continue to prevent its complete realization. The Task Force has been successful in this regard because of its unique nature and charge, and because of the authority and power given it by successive Montana legislatures. Also critical to the success of the organization is its ability to help translate into policy the outcomes of legal and quasi-judicial decisions that have impacted the state's water resources management agency.

  9. Factors which explain amount of participation in rural adolescent alcohol use prevention task forces.

    PubMed

    Rissel, C; Finnegan, J; Wolfson, M; Perry, C

    1995-01-01

    Project Northland task force members are typically female, have children, and belong to a number of other community or social groups. Members were likely to participate more in the task forces if they were relative newcomers to the community and if they got satisfaction from their participation. While explaining only a modest amount of the variance (15.5%), the explanatory power of the results are comparable to other studies of this nature, where 23% of explained variance predicting participation has been considered informative. Future models will need to consider other factors to increase the explained variance. Satisfaction with being a task force member was associated with the amount of control and ownership each member felt and the extent of agreement with the direction of the task force. These variables explained 26% of the variance. It may be that relative newcomers to the community, who tended to participate more, have lived elsewhere and been exposed to environments where alcohol was less frequently used, and this contrast contributed to their motivation and preparedness to work towards change. They may not be as integrated into the community as task force members who have lived in their communities for their entire lives, and may not be part of the dominant "alcohol culture" that exists in the region. If membership in community or social groups is an indicator of integration into the community, then the results suggest less integrated task force members were more active participants.(ABSTRACT TRUNCATED AT 250 WORDS)

  10. 77 FR 39724 - U.S. Coral Reef Task Force Public Meeting and Public Comment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-05

    ... Fish and Wildlife Service U.S. Coral Reef Task Force Public Meeting and Public Comment AGENCY: Fish and... U.S. Fish and Wildlife Service (Service), announce a public meeting of the U.S. Coral Reef Task... protect coral reef ecosystems. The Departments of Commerce and the Interior co-chair the USCRTF,...

  11. Grip Force Control Is Dependent on Task Constraints in Children with and without Developmental Coordination Disorder

    ERIC Educational Resources Information Center

    Law, Sui-Heung; Lo, Sing Kai; Chow, Susanna; Cheing, Gladys L.Y.

    2011-01-01

    Excessive grip force (GF) is often found in children with developmental coordination disorder (DCD). However, their GF control may vary when task constraints are imposed upon their motor performance. This study aimed to investigate how their GF control changes in response to task demands, and to examine their tactile sensitivity. Twenty-one…

  12. Grip force adjustments induced by predictable load perturbations during a manipulative task.

    PubMed

    Serrien, D J; Kaluzny, P; Wicki, U; Wiesendanger, M

    1999-01-01

    The experiment examined the anticipatory modulation of grip force with respect to load force during a drawer opening task. An impact force was introduced by a mechanical stop that arrested movement of the pulling hand. The results showed a typical grip force profile which consisted of two evolving phases, one to control drawer movement onset, and the other to secure grip force at the expected impact. Initially, grip force increased with the load force that was developed to overcome the inertia of the drawer. After the first peak, a small decline was observed, followed by a proactive grip force increase prior to the time of impact. During this ramp-like increase of grip force, load force remained unchanged. In addition, a reactive response was triggered by the impact. That anticipatory control with respect to an impact force is not innate but, rather, is learned by experience was evidenced by a comparison of adults and children. Whereas adults made the characteristic grip force adjustments to anticipate the impact, children used a probing strategy with irregular build-up of force until impact. Furthermore, adults calibrated the second phase of the grip force profile in the initial trials of the task, indicating that grip force was rapidly updated with information related to the impact force. The present results demonstrate that grip-load force coordination during manipulation is a necessity for dealing with destabilizing load perturbations produced by self-induced movement and impact forces. It is concluded that grip force is adjusted automatically, but in a flexible manner, to secure grip in accordance with the characteristics of the pulling synergy. PMID:9928794

  13. Those Who Served: Report of the Twentieth Century Fund Task Force on Policies Toward Veterans. Background Paper.

    ERIC Educational Resources Information Center

    Taussig, Michael K.

    Veterans' policies and programs are examined by a task force of the Twentieth Century Fund. Part 1, the report of the task force, includes sections on the rationale for veterans benefits, recommendations for further benefits and programs, and a dissenting opinion by one task force member. Recommendations are summarized into five basic areas: (1)…

  14. Communicating with New and Existing Markets. A Task Force of Howard Community College's 1998-1999 Commission on the Future.

    ERIC Educational Resources Information Center

    Howard Community Coll., Columbia, MD.

    This is a report from a task force formed by Howard Community College (Maryland) to examine existing and future markets. The task force also explored ways to use marketing strategies to attract potential customers to the college. The task force recommends that the college use its strengths to attract customers, such as its commitment to open…

  15. Trajectory adjustments underlying task-specific intermittent force behaviors and muscular rhythms.

    PubMed

    Chen, Yi-Ching; Lin, Yen-Ting; Huang, Chien-Ting; Shih, Chia-Li; Yang, Zong-Ru; Hwang, Ing-Shiou

    2013-01-01

    Force intermittency is one of the major causes of motor variability. Focusing on the dynamics of force intermittency, this study was undertaken to investigate how force trajectory is fine-tuned for static and dynamic force-tracking of a comparable physical load. Twenty-two healthy adults performed two unilateral resistance protocols (static force-tracking at 75% maximal effort and dynamic force-tracking in the range of 50%-100% maximal effort) using the left hand. The electromyographic activity and force profile of the designated hand were monitored. Gripping force was off-line decomposed into a primary movement spectrally identical to the target motion and a force intermittency profile containing numerous force pulses. The results showed that dynamic force-tracking exhibited greater intermittency amplitude and force pulse but a smaller amplitude ratio of primary movement to force intermittency than static force-tracking. Multi-scale entropy analysis revealed that force intermittency during dynamic force-tracking was more complex on a low time scale but more regular on a high time scale than that of static force-tracking. Together with task-dependent force intermittency properties, dynamic force-tracking exhibited a smaller 8-12 Hz muscular oscillation but a more potentiated muscular oscillation at 35-50 Hz than static force-tracking. In conclusion, force intermittency reflects differing trajectory controls for static and dynamic force-tracking. The target goal of dynamic tracking is achieved through trajectory adjustments that are more intricate and more frequent than those of static tracking, pertaining to differing organizations and functioning of muscular oscillations in the alpha and gamma bands. PMID:24098640

  16. Monitoring of slope-instabilities and deformations with Micro-Electro-Mechanical-Systems (MEMS) in wireless ad-hoc Sensor Networks

    NASA Astrophysics Data System (ADS)

    Arnhardt, C.; Fernández-Steeger, T. M.; Azzam, R.

    2009-04-01

    In most mountainous regions, landslides represent a major threat to human life, properties and infrastructures. Nowadays existing landslide monitoring systems are often characterized by high efforts in terms of purchase, installation, maintenance, manpower and material. In addition (or because of this) only small areas or selective points of the endangered zone can be observed by the system. Therefore the improvement of existing and the development of new monitoring and warning systems are of high relevance. The joint project "Sensor based Landslide Early Warning Systems" (SLEWS) deals with the development of a prototypic Alarm- and Early Warning system (EWS) for different types of landslides using low-cost micro-sensors (MEMS) integrated in a wireless sensor network (WSN). Modern so called Ad-Hoc, Multi-Hop wireless sensor networks (WSN) are characterized by a self organizing and self-healing capacity of the system (autonomous systems). The network consists of numerous individual and own energy-supply operating sensor nodes, that can send data packages from their measuring devices (here: MEMS) over other nodes (Multi-Hop) to a collection point (gateway). The gateway provides the interface to central processing and data retrieval units (PC, Laptop or server) outside the network. In order to detect and monitor the different landslide processes (like fall, topple, spreading or sliding) 3D MEMS capacitive sensors made from single silicon crystals and glass were chosen to measure acceleration, tilting and altitude changes. Based on the so called MEMS (Micro-Electro-Mechanical Systems) technology, the sensors combine very small mechanical and electronic units, sensing elements and transducers on a small microchip. The mass production of such type of sensors allows low cost applications in different areas (like automobile industries, medicine, and automation technology). Apart from the small and so space saving size and the low costs another advantage is the energy

  17. Montana's Clark Fork River Basin Task Force: A Vehicle for Integrated Water Resources Management?

    NASA Astrophysics Data System (ADS)

    Shively, David D.; Mueller, Gerald

    2010-11-01

    This article examines what is generally considered to be an unattainable goal in the western United States: integrated water resources management (IWRM). Specifically, we examine an organization that is quite unique in the West, Montana’s Clark Fork River Basin Task Force (Task Force), and we analyze its activities since its formation in 2001 to answer the question: are the activities and contributions of the Task Force working to promote a more strongly integrated approach to water resources management in Montana? After reviewing the concepts underlying IWRM, some of the issues that have been identified for achieving IWRM in the West, and the Montana system of water right allocation and issues it faces, we adapt Mitchell’s IWRM framework and apply it to the analysis of the Task Force’s activities in the context of IWRM. In evaluating the physical, interaction, and protocol/planning/policy components of IWRM, we find that the Task Force has been contributing to the evolution of Montana’s water resources management towards this framework, though several factors will likely continue to prevent its complete realization. The Task Force has been successful in this regard because of its unique nature and charge, and because of the authority and power given it by successive Montana legislatures. Also critical to the success of the organization is its ability to help translate into policy the outcomes of legal and quasi-judicial decisions that have impacted the state’s water resources management agency.

  18. Study of modeling and evaluation of remote manipulation tasks with force feedback

    NASA Technical Reports Server (NTRS)

    Hill, J. W.

    1979-01-01

    The use of time and motion study methods to evaluate force feedback in remote manipulation tasks are described. Several systems of time measurement derived for industrial workers were studied and adapted for manipulator use. A task board incorporating a set of basic motions was designed and built. Results obtained from two subjects in three manipulation situations for each are reported: a force-reflective manipulator, a unilateral manipulator, and the unaided human hand. The results indicate that: (1) a time-and-motion study techniques are applicable to manipulation; and that (2) force feedback facilitates some motions (notably fitting), but not others (such as positioning).

  19. Task-dependent force sharing between muscle synergists during locomotion in turkeys.

    PubMed

    Nelson, Frank E; Roberts, Thomas J

    2008-04-01

    At most joints, there is a redundancy of muscle function. For any given movement, there are a wide range of possible solutions to the problem of how force is shared among muscle synergists. A better understanding of how force is shared among muscle synergists can provide insight into the mechanics and control of movement. We examined force sharing in the gastrocnemius of wild turkeys (Meleagris gallopavo), using strain gauges bonded to bony tendons. Force was measured separately in the lateral (LG) and medial (MG) heads of the gastrocnemius, to evaluate force sharing. We also used inverse dynamics to determine the total force required during swing phase. To determine whether the pattern of force sharing varied depending on the mechanical task, we used running speed (1 to 3.5 m s(-1)) and limb loading (30 and 60 g added tarsometatarsal mass) to vary the force required at the intertarsal joint. We found that the distribution of force between these two heads varied depending on the phase of the stride cycle. During stance, force was shared in near equal amounts between the two heads and this distribution was unaffected by changes in running speed or limb load. During swing phase, however, there was no force sharing. Force was produced only in the lateral head, and this force was not significantly different from the total force required, as calculated from inverse dynamics. Thus, the LG produced all of the force required for limb extension during swing. This change in the pattern of force sharing between stance and swing supports the theory that force sharing between muscle synergists is task-dependent.

  20. Depth of processing in the stroop task: evidence from a novel forced-reading condition.

    PubMed

    Eidels, Ami; Ryan, Kathryn; Williams, Paul; Algom, Daniel

    2014-01-01

    The presence of the Stroop effect betrays the fact that the carrier words were read in the face of instructions to ignore them and to respond to the target ink colors. In this study, we probed the nature of this involuntary reading by comparing color performance with that in a new forced-reading Stroop task in which responding is strictly contingent on reading each and every word. We found larger Stroop effects in the forced-reading task than in the classic Stroop task and concluded that words are processed to a shallower level in the Stroop task than they are in routine voluntary reading. The results show that the two modes of word processing differ in systematic ways and are conductive to qualitatively different representations. These results can pose a challenge to the strongly automatic view of word reading in the Stroop task.