Sample records for aodv based manet

  1. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET.

    PubMed

    Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei

    2017-06-17

    Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV's research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV.

  2. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET

    PubMed Central

    Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei

    2017-01-01

    Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV’s research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV. PMID:28629142

  3. FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET.

    PubMed

    N Ahmed, Malik; Abdullah, Abdul Hanan; Kaiwartya, Omprakash

    2016-01-01

    Due to the continuous advancements in wireless communication in terms of quality of communication and affordability of the technology, the application area of Mobile Adhoc Networks (MANETs) significantly growing particularly in military and disaster management. Considering the sensitivity of the application areas, security in terms of detection of Denial of Service (DoS) and intrusion has become prime concern in research and development in the area. The security systems suggested in the past has state recognition problem where the system is not able to accurately identify the actual state of the network nodes due to the absence of clear definition of states of the nodes. In this context, this paper proposes a framework based on Finite State Machine (FSM) for denial of service and intrusion detection in MANETs. In particular, an Interruption Detection system for Adhoc On-demand Distance Vector (ID-AODV) protocol is presented based on finite state machine. The packet dropping and sequence number attacks are closely investigated and detection systems for both types of attacks are designed. The major functional modules of ID-AODV includes network monitoring system, finite state machine and attack detection model. Simulations are carried out in network simulator NS-2 to evaluate the performance of the proposed framework. A comparative evaluation of the performance is also performed with the state-of-the-art techniques: RIDAN and AODV. The performance evaluations attest the benefits of proposed framework in terms of providing better security for denial of service and intrusion detection attacks.

  4. Effect of variation in active route timeout and my route timeout on the performance of AODV-ETX protocol in mobile adhoc network

    NASA Astrophysics Data System (ADS)

    Purnomo, A.; Widyawan; Najib, W.; Hartono, R.; Hartatik

    2018-03-01

    Mobile adhoc network (MANET) consists of nodes that are independent. A node can communicate each other without the presence of network infrastructure. A node can act as a transmitter and receiver as well as a router. This research has been variation in active route timeout and my route timeout on the performance of AODV-ETX protocol in MANET. The AODV-ETX protocol is the AODV protocol that uses the ETX metric. Performance testing is done on the static node topology with 5 m x 5 m node grid model where the distance between nodes is 100 m and node topology that consists of 25 nodes moves randomly with a moving speed of 1.38 m/s in an area of 1500 m x 300 m. From the test result, on the static node, AODV protocol-ETX shows optimal performance at a value MRT and ART of 10 s and 15 s, but showed a stable performance in the value of MRT and ART ≥60 s, while in randomly moved node topology shows stable performance in the value of MRT and ART ≥80 s.

  5. FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET

    PubMed Central

    N. Ahmed, Malik; Abdullah, Abdul Hanan; Kaiwartya, Omprakash

    2016-01-01

    Due to the continuous advancements in wireless communication in terms of quality of communication and affordability of the technology, the application area of Mobile Adhoc Networks (MANETs) significantly growing particularly in military and disaster management. Considering the sensitivity of the application areas, security in terms of detection of Denial of Service (DoS) and intrusion has become prime concern in research and development in the area. The security systems suggested in the past has state recognition problem where the system is not able to accurately identify the actual state of the network nodes due to the absence of clear definition of states of the nodes. In this context, this paper proposes a framework based on Finite State Machine (FSM) for denial of service and intrusion detection in MANETs. In particular, an Interruption Detection system for Adhoc On-demand Distance Vector (ID-AODV) protocol is presented based on finite state machine. The packet dropping and sequence number attacks are closely investigated and detection systems for both types of attacks are designed. The major functional modules of ID-AODV includes network monitoring system, finite state machine and attack detection model. Simulations are carried out in network simulator NS-2 to evaluate the performance of the proposed framework. A comparative evaluation of the performance is also performed with the state-of-the-art techniques: RIDAN and AODV. The performance evaluations attest the benefits of proposed framework in terms of providing better security for denial of service and intrusion detection attacks. PMID:27285146

  6. T2AR: trust-aware ad-hoc routing protocol for MANET.

    PubMed

    Dhananjayan, Gayathri; Subbiah, Janakiraman

    2016-01-01

    Secure data transfer against the malicious attacks is an important issue in an infrastructure-less independent network called mobile ad-hoc network (MANET). Trust assurance between MANET nodes is the key parameter in the high-security provision under dynamic topology variations and open wireless constraints. But, the malicious behavior of nodes reduces the trust level of the nodes that leads to an insecure data delivery. The increase in malicious attacks causes the excessive energy consumption that leads to a reduction of network lifetime. The lack of positional information update of the nodes in ad-hoc on-demand vector (AODV) protocol during the connection establishment offers less trust level between the nodes. Hence, the trust rate computation using energy and mobility models and its update are the essential tasks for secure data delivery. This paper proposes a trust-aware ad-hoc routing (T2AR) protocol to improve the trust level between the nodes in MANET. The proposed method modifies the traditional AODV routing protocol with the constraints of trust rate, energy, mobility based malicious behavior prediction. The packet sequence ID matching from the log reports of neighbor nodes determine the trust rate that avoids the malicious report generation. Besides, the direct and indirect trust observation schemes utilization increases the trust level. Besides, the received signal strength indicator utilization determines the trusted node is within the communication range or not. The comparative analysis between the proposed T2AR with the existing methods such as TRUNCMAN, RBT, GR, FBR and DICOTIDS regarding the average end-to-end delay, throughput, false positives, packet delivery ratio shows the effectiveness of T2AR in the secure MANET environment design.

  7. An Adaptive QoS Routing Solution for MANET Based Multimedia Communications in Emergency Cases

    NASA Astrophysics Data System (ADS)

    Ramrekha, Tipu Arvind; Politis, Christos

    The Mobile Ad hoc Networks (MANET) is a wireless network deprived of any fixed central authoritative routing entity. It relies entirely on collaborating nodes forwarding packets from source to destination. This paper describes the design, implementation and performance evaluation of CHAMELEON, an adaptive Quality of Service (QoS) routing solution, with improved delay and jitter performances, enabling multimedia communication for MANETs in extreme emergency situations such as forest fire and terrorist attacks as defined in the PEACE project. CHAMELEON is designed to adapt its routing behaviour according to the size of a MANET. The reactive Ad Hoc on-Demand Distance Vector Routing (AODV) and proactive Optimized Link State Routing (OLSR) protocols are deemed appropriate for CHAMELEON through their performance evaluation in terms of delay and jitter for different MANET sizes in a building fire emergency scenario. CHAMELEON is then implemented in NS-2 and evaluated similarly. The paper concludes with a summary of findings so far and intended future work.

  8. Effectiveness of AODV Protocol under Hidden Node Environment

    NASA Astrophysics Data System (ADS)

    Garg, Ruchi; Sharma, Himanshu; Kumar, Sumit

    IEEE 802.11 is a standard for mobile ad hoc networks (MANET), implemented with various different protocols. Ad Hoc on Demand Distance Vector Routing (AODV) is one of the several protocols of IEEE 802.11, intended to provide various Quality of Service (QOS) parameters under acceptable range. To avoid the collision and interference the MAC protocol has only two solutions, one, to sense the physical carrier and second, to use the RTS/CTS handshake mechanism. But with the help of these methods AODV is not free from the problem of hidden nodes like other several protocols. Under the hidden node environment, performance of AODV depends upon various factors. The position of receiver and sender among the other nodes is very crucial and it affects the performance. Under the various situations the AODV is simulated with the help of NS2 and the outcomes are discussed.

  9. Performance Evaluation of AODV with Blackhole Attack

    NASA Astrophysics Data System (ADS)

    Dara, Karuna

    2010-11-01

    A Mobile Ad Hoc Network (MANET) is a temporary network set up by a wireless mobile computers moving arbitrary in the places that have no network infrastructure. These nodes maintain connectivity in a decentralized manner. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, mobile ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper, we simulated the black hole attack in various mobile ad-hoc network scenarios using AODV routing protocol of MANET and have tried to find a effect if number of nodes are increased with increase in malicious nodes.

  10. Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks

    PubMed Central

    Paramasivan, B.; Kaliappan, M.

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP. PMID:25143986

  11. Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.

    PubMed

    Paramasivan, B; Kaliappan, M

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  12. Achieving sink node anonymity in tactical wireless sensor networks using a reactive routing protocol

    DTIC Science & Technology

    2017-06-01

    transmit their information through the network based on the specific protocols that are implemented. Nodes may be designed to perform any combination of...band, and one channel in the 868-MHz band. The IEEE 802.15.4 standard is designed to provide Low-Rate Wireless Personal Area Network (LR-WPAN...MANETs and is currently a draft at the IETF Network Working Group [9]. It was derived from the Ad hoc On -Demand Distance Vector (AODV) routing

  13. An Analysis of the Feasibility and Applicability of IEEE 802.x Wireless Mesh Networks within the Global Information Grid

    DTIC Science & Technology

    2004-09-01

    MESH VS . SIMPLE AD HOC AND MANET..............................................5 B. DESIRABLE CHARACTERISTICS OF WIRELESS MESH NETWORKS...Comparison of Mesh (top) vs . Traditional Wireless (bottom) .............26 Figure 7. UML Model of SensorML Components (From SenorML Models Paper) ......30...50 Figure 17. Latency Difference Example – OLSR vs . AODV

  14. Energy Efficient Probabilistic Broadcasting for Mobile Ad-Hoc Network

    NASA Astrophysics Data System (ADS)

    Kumar, Sumit; Mehfuz, Shabana

    2017-06-01

    In mobile ad-hoc network (MANETs) flooding method is used for broadcasting route request (RREQ) packet from one node to another node for route discovery. This is the simplest method of broadcasting of RREQ packets but it often results in broadcast storm problem, originating collisions and congestion of packets in the network. A probabilistic broadcasting is one of the widely used broadcasting scheme for route discovery in MANETs and provides solution for broadcasting storm problem. But it does not consider limited energy of the battery of the nodes. In this paper, a new energy efficient probabilistic broadcasting (EEPB) is proposed in which probability of broadcasting RREQs is calculated with respect to remaining energy of nodes. The analysis of simulation results clearly indicate that an EEPB route discovery scheme in ad-hoc on demand distance vector (AODV) can increase the network lifetime with a decrease in the average power consumption and RREQ packet overhead. It also decreases the number of dropped packets in the network, in comparison to other EEPB schemes like energy constraint gossip (ECG), energy aware gossip (EAG), energy based gossip (EBG) and network lifetime through energy efficient broadcast gossip (NEBG).

  15. AD HOC Networks for the Autonomous Car

    NASA Astrophysics Data System (ADS)

    Ron, Davidescu; Negrus, Eugen

    2017-10-01

    The future of the vehicle is made of cars, roads and infrastructures connected in a two way automated communication in a holistic system. It is a mandatory to use Encryption to maintain Confidentiality, Integrity and Availability in an ad hoc vehicle network. Vehicle to Vehicle communication, requires multichannel interaction between mobile, moving and changing parties to insure the full benefit from data sharing and real time decision making, a network of such users referred as mobile ad hoc network (MANET), however as ad hoc networks were not implemented in such a scale, it is not clear what is the best method and protocol to apply. Furthermore the visibility of secure preferred asymmetric encrypted ad hoc networks in a real time environment of dense moving autonomous vehicles has to be demonstrated, In order to evaluate the performance of Ad Hoc networks in changing conditions a simulation of multiple protocols was performed on large number of mobile nodes. The following common routing protocols were tested, DSDV is a proactive protocol, every mobile station maintains a routing table with all available destinations, DSR is a reactive routing protocol which allows nodes in the MANET to dynamically discover a source route across multiple network hops, AODV is a reactive routing protocol Instead of being proactive. It minimizes the number of broadcasts by creating routes based on demand, SAODV is a secure version of AODV, requires heavyweight asymmetric cryptographic, ARIANDE is a routing protocol that relies on highly efficient symmetric cryptography the concept is primarily based on DSR. A methodical evolution was performed in a various density of transportation, based on known communication bench mark parameters including, Throughput Vs. time, Routing Load per packets and bytes. Out of the none encrypted protocols, It is clear that in terms of performance of throughput and routing load DSR protocol has a clear advantage the high node number mode. The encrypted protocols show lower performance with ARIANDE being superior to SAODV and SRP. Nevertheless all protocol simulation proved it to match required real time performance.

  16. Management of Energy Consumption on Cluster Based Routing Protocol for MANET

    NASA Astrophysics Data System (ADS)

    Hosseini-Seno, Seyed-Amin; Wan, Tat-Chee; Budiarto, Rahmat; Yamada, Masashi

    The usage of light-weight mobile devices is increasing rapidly, leading to demand for more telecommunication services. Consequently, mobile ad hoc networks and their applications have become feasible with the proliferation of light-weight mobile devices. Many protocols have been developed to handle service discovery and routing in ad hoc networks. However, the majority of them did not consider one critical aspect of this type of network, which is the limited of available energy in each node. Cluster Based Routing Protocol (CBRP) is a robust/scalable routing protocol for Mobile Ad hoc Networks (MANETs) and superior to existing protocols such as Ad hoc On-demand Distance Vector (AODV) in terms of throughput and overhead. Therefore, based on this strength, methods to increase the efficiency of energy usage are incorporated into CBRP in this work. In order to increase the stability (in term of life-time) of the network and to decrease the energy consumption of inter-cluster gateway nodes, an Enhanced Gateway Cluster Based Routing Protocol (EGCBRP) is proposed. Three methods have been introduced by EGCBRP as enhancements to the CBRP: improving the election of cluster Heads (CHs) in CBRP which is based on the maximum available energy level, implementing load balancing for inter-cluster traffic using multiple gateways, and implementing sleep state for gateway nodes to further save the energy. Furthermore, we propose an Energy Efficient Cluster Based Routing Protocol (EECBRP) which extends the EGCBRP sleep state concept into all idle member nodes, excluding the active nodes in all clusters. The experiment results show that the EGCBRP decreases the overall energy consumption of the gateway nodes up to 10% and the EECBRP reduces the energy consumption of the member nodes up to 60%, both of which in turn contribute to stabilizing the network.

  17. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks.

    PubMed

    Vara, M Isabel; Campo, Celeste

    2015-07-20

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead.

  18. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks

    PubMed Central

    Vara, M. Isabel; Campo, Celeste

    2015-01-01

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead. PMID:26205272

  19. Direct trust-based security scheme for RREQ flooding attack in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Kumar, Sunil; Dutta, Kamlesh

    2017-06-01

    The routing algorithms in MANETs exhibit distributed and cooperative behaviour which makes them easy target for denial of service (DoS) attacks. RREQ flooding attack is a flooding-type DoS attack in context to Ad hoc On Demand Distance Vector (AODV) routing protocol, where the attacker broadcasts massive amount of bogus Route Request (RREQ) packets to set up the route with the non-existent or existent destination in the network. This paper presents direct trust-based security scheme to detect and mitigate the impact of RREQ flooding attack on the network, in which, every node evaluates the trust degree value of its neighbours through analysing the frequency of RREQ packets originated by them over a short period of time. Taking the node's trust degree value as the input, the proposed scheme is smoothly extended for suppressing the surplus RREQ and bogus RREQ flooding packets at one-hop neighbours during the route discovery process. This scheme distinguishes itself from existing techniques by not directly blocking the service of a normal node due to increased amount of RREQ packets in some unusual conditions. The results obtained throughout the simulation experiments clearly show the feasibility and effectiveness of the proposed defensive scheme.

  20. Performance evaluation of reactive and proactive routing protocol in IEEE 802.11 ad hoc network

    NASA Astrophysics Data System (ADS)

    Hamma, Salima; Cizeron, Eddy; Issaka, Hafiz; Guédon, Jean-Pierre

    2006-10-01

    Wireless technology based on the IEEE 802.11 standard is widely deployed. This technology is used to support multiple types of communication services (data, voice, image) with different QoS requirements. MANET (Mobile Adhoc NETwork) does not require a fixed infrastructure. Mobile nodes communicate through multihop paths. The wireless communication medium has variable and unpredictable characteristics. Furthermore, node mobility creates a continuously changing communication topology in which paths break and new one form dynamically. The routing table of each router in an adhoc network must be kept up-to-date. MANET uses Distance Vector or Link State algorithms which insure that the route to every host is always known. However, this approach must take into account the adhoc networks specific characteristics: dynamic topologies, limited bandwidth, energy constraints, limited physical security, ... Two main routing protocols categories are studied in this paper: proactive protocols (e.g. Optimised Link State Routing - OLSR) and reactive protocols (e.g. Ad hoc On Demand Distance Vector - AODV, Dynamic Source Routing - DSR). The proactive protocols are based on periodic exchanges that update the routing tables to all possible destinations, even if no traffic goes through. The reactive protocols are based on on-demand route discoveries that update routing tables only for the destination that has traffic going through. The present paper focuses on study and performance evaluation of these categories using NS2 simulations. We have considered qualitative and quantitative criteria. The first one concerns distributed operation, loop-freedom, security, sleep period operation. The second are used to assess performance of different routing protocols presented in this paper. We can list end-to-end data delay, jitter, packet delivery ratio, routing load, activity distribution. Comparative study will be presented with number of networking context consideration and the results show the appropriate routing protocol for two kinds of communication services (data and voice).

  1. Evaluation and development the routing protocol of a fully functional simulation environment for VANETs

    NASA Astrophysics Data System (ADS)

    Ali, Azhar Tareq; Warip, Mohd Nazri Mohd; Yaakob, Naimah; Abduljabbar, Waleed Khalid; Atta, Abdu Mohammed Ali

    2017-11-01

    Vehicular Ad-hoc Networks (VANETs) is an area of wireless technologies that is attracting a great deal of interest. There are still several areas of VANETS, such as security and routing protocols, medium access control, that lack large amounts of research. There is also a lack of freely available simulators that can quickly and accurately simulate VANETs. The main goal of this paper is to develop a freely available VANETS simulator and to evaluate popular mobile ad-hoc network routing protocols in several VANETS scenarios. The VANETS simulator consisted of a network simulator, traffic (mobility simulator) and used a client-server application to keep the two simulators in sync. The VANETS simulator also models buildings to create a more realistic wireless network environment. Ad-Hoc Distance Vector routing (AODV), Dynamic Source Routing (DSR) and Dynamic MANET On-demand (DYMO) were initially simulated in a city, country, and highway environment to provide an overall evaluation.

  2. Random Time Identity Based Firewall In Mobile Ad hoc Networks

    NASA Astrophysics Data System (ADS)

    Suman, Patel, R. B.; Singh, Parvinder

    2010-11-01

    A mobile ad hoc network (MANET) is a self-organizing network of mobile routers and associated hosts connected by wireless links. MANETs are highly flexible and adaptable but at the same time are highly prone to security risks due to the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized control. Firewall is an effective means of protecting a local network from network-based security threats and forms a key component in MANET security architecture. This paper presents a review of firewall implementation techniques in MANETs and their relative merits and demerits. A new approach is proposed to select MANET nodes at random for firewall implementation. This approach randomly select a new node as firewall after fixed time and based on critical value of certain parameters like power backup. This approach effectively balances power and resource utilization of entire MANET because responsibility of implementing firewall is equally shared among all the nodes. At the same time it ensures improved security for MANETs from outside attacks as intruder will not be able to find out the entry point in MANET due to the random selection of nodes for firewall implementation.

  3. Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsaur, Woei-Jiunn; Pai, Haw-Tyng

    2008-11-01

    The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.

  4. Scalability enhancement of AODV using local link repairing

    NASA Astrophysics Data System (ADS)

    Jain, Jyoti; Gupta, Roopam; Bandhopadhyay, T. K.

    2014-09-01

    Dynamic change in the topology of an ad hoc network makes it difficult to design an efficient routing protocol. Scalability of an ad hoc network is also one of the important criteria of research in this field. Most of the research works in ad hoc network focus on routing and medium access protocols and produce simulation results for limited-size networks. Ad hoc on-demand distance vector (AODV) is one of the best reactive routing protocols. In this article, modified routing protocols based on local link repairing of AODV are proposed. Method of finding alternate routes for next-to-next node is proposed in case of link failure. These protocols are beacon-less, means periodic hello message is removed from the basic AODV to improve scalability. Few control packet formats have been changed to accommodate suggested modification. Proposed protocols are simulated to investigate scalability performance and compared with basic AODV protocol. This also proves that local link repairing of proposed protocol improves scalability of the network. From simulation results, it is clear that scalability performance of routing protocol is improved because of link repairing method. We have tested protocols for different terrain area with approximate constant node densities and different traffic load.

  5. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs

    NASA Astrophysics Data System (ADS)

    Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D.

    Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual creation and update of policies associated with the initial incorporation of devices to the MANET (admission control) as well as with anomaly detection during communications among members (access control) a very difficult task. In this paper, we present BARTER, a mechanism that automatically creates and updates admission and access control policies for MANETs based on behavior profiles. BARTER is an adaptation for fully distributed environments of our previously introduced BB-NAC mechanism for NAC technologies. Rather than relying on a centralized NAC enforcer, MANET members initially exchange their behavior profiles and compute individual local definitions of normal network behavior. During admission or access control, each member issues an individual decision based on its definition of normalcy. Individual decisions are then aggregated via a threshold cryptographic infrastructure that requires an agreement among a fixed amount of MANET members to change the status of the network. We present experimental results using content and volumetric behavior profiles computed from the ENRON dataset. In particular, we show that the mechanism achieves true rejection rates of 95% with false rejection rates of 9%.

  6. On the Tradeoff Between Altruism and Selfishness in MANET Trust Management

    DTIC Science & Technology

    2016-04-07

    to discourage selfish behaviors, using a hidden Markov model (HMM) to quanti - tatively measure the trustworthiness of nodes. Adams et al. [18...based reliability metric to predict trust-based system survivability. Section 4 analyzes numerical results obtained through the evaluation of our SPN...concepts in MANETs, trust man- agement for MANETs should consider the following design features: trust metrics must be customizable, evaluation of

  7. Angle and Context Free Grammar Based Precarious Node Detection and Secure Data Transmission in MANETs.

    PubMed

    Veerasamy, Anitha; Madane, Srinivasa Rao; Sivakumar, K; Sivaraman, Audithan

    2016-01-01

    Growing attractiveness of Mobile Ad Hoc Networks (MANETs), its features, and usage has led to the launching of threats and attacks to bring negative consequences in the society. The typical features of MANETs, especially with dynamic topology and open wireless medium, may leave MANETs vulnerable. Trust management using uncertain reasoning scheme has previously attempted to solve this problem. However, it produces additional overhead while securing the network. Hence, a Location and Trust-based secure communication scheme (L&TS) is proposed to overcome this limitation. Since the design securing requires more than two data algorithms, the cost of the system goes up. Another mechanism proposed in this paper, Angle and Context Free Grammar (ACFG) based precarious node elimination and secure communication in MANETs, intends to secure data transmission and detect precarious nodes in a MANET at a comparatively lower cost. The Elliptic Curve function is used to isolate a malicious node, thereby incorporating secure data transfer. Simulation results show that the dynamic estimation of the metrics improves throughput by 26% in L&TS when compared to the TMUR. ACFG achieves 33% and 51% throughput increase when compared to L&TS and TMUR mechanisms, respectively.

  8. Securing mobile ad hoc networks using danger theory-based artificial immune algorithm.

    PubMed

    Abdelhaq, Maha; Alsaqour, Raed; Abdelhaq, Shawkat

    2015-01-01

    A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs.

  9. Securing Mobile Ad Hoc Networks Using Danger Theory-Based Artificial Immune Algorithm

    PubMed Central

    2015-01-01

    A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs. PMID:25946001

  10. MPH-M, AODV-M and DSR-M Performance Evaluation under Jamming Attacks.

    PubMed

    Del-Valle-Soto, Carolina; Mex-Perera, Carlos; Monroy, Raul; Nolazco-Flores, Juan A

    2017-07-05

    In this work, we present the design of a mitigation scheme for jamming attacks integrated to the routing protocols MPH, AODV, and DSR. The resulting protocols are named MPH-M (Multi-Parent Hierarchical - Modified), AODV-M (Ad hoc On Demand Distance Vector - Modified), and DSR-M (Dynamic Source Routing - Modified). For the mitigation algorithm, if the detection algorithm running locally in each node produces a positive result then the node is isolated; second, the routing protocol adapts their paths avoiding the isolated nodes. We evaluated how jamming attacks affect different metrics for all these modified protocols. The metrics we employ to detect jamming attack are number of packet retransmissions, number of CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) retries while waiting for an idle channel and the energy wasted by the node. The metrics to evaluate the performance of the modified routing protocols are the throughput and resilience of the system and the energy used by the nodes. We evaluated all the modified protocols when the attacker position was set near, middle and far of the collector node. The results of our evaluation show that performance for MPH-M is much better than AODV-M and DSR-M. For example, the node energy for MPH-M is 138.13% better than AODV-M and 126.07% better than DSR-M. Moreover, we also find that MPH-M benefits much more of the mitigation scheme than AODV-M and DSR-M. For example, the node energy consumption is 34.61% lower for MPH-M and only 3.92% and 3.42% for AODV-M and DSR-M, respectively. On throughput, the MPH protocol presents a packet reception efficiency at the collector node of 16.4% on to AODV and DSR when there is no mitigation mechanism. Moreover, MPH-M has an efficiency greater than 7.7% with respect to AODV-M and DSR-M when there is a mitigation scheme. In addition, we have that with the mitigation mechanism AODV-M and DSR-M do not present noticeable modification. However, MPH-M improves its efficiency by 8.4%. We also measure the resilience of these algorithms from the average packet re-transmissions perspective, and we find that MPH-M has around a 15% lower change rate than AODV-M and DSR-M. The MPH-M recovery time is 5 s faster than AODV-M and 2 s faster than DSR-M.

  11. MPH-M, AODV-M and DSR-M Performance Evaluation under Jamming Attacks

    PubMed Central

    Del-Valle-Soto, Carolina

    2017-01-01

    In this work, we present the design of a mitigation scheme for jamming attacks integrated to the routing protocols MPH, AODV, and DSR. The resulting protocols are named MPH-M (Multi-Parent Hierarchical - Modified), AODV-M (Ad hoc On Demand Distance Vector - Modified), and DSR-M (Dynamic Source Routing - Modified). For the mitigation algorithm, if the detection algorithm running locally in each node produces a positive result then the node is isolated; second, the routing protocol adapts their paths avoiding the isolated nodes. We evaluated how jamming attacks affect different metrics for all these modified protocols. The metrics we employ to detect jamming attack are number of packet retransmissions, number of CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) retries while waiting for an idle channel and the energy wasted by the node. The metrics to evaluate the performance of the modified routing protocols are the throughput and resilience of the system and the energy used by the nodes. We evaluated all the modified protocols when the attacker position was set near, middle and far of the collector node. The results of our evaluation show that performance for MPH-M is much better than AODV-M and DSR-M. For example, the node energy for MPH-M is 138.13% better than AODV-M and 126.07% better than DSR-M. Moreover, we also find that MPH-M benefits much more of the mitigation scheme than AODV-M and DSR-M. For example, the node energy consumption is 34.61% lower for MPH-M and only 3.92% and 3.42% for AODV-M and DSR-M, respectively. On throughput, the MPH protocol presents a packet reception efficiency at the collector node of 16.4% on to AODV and DSR when there is no mitigation mechanism. Moreover, MPH-M has an efficiency greater than 7.7% with respect to AODV-M and DSR-M when there is a mitigation scheme. In addition, we have that with the mitigation mechanism AODV-M and DSR-M do not present noticeable modification. However, MPH-M improves its efficiency by 8.4%. We also measure the resilience of these algorithms from the average packet re-transmissions perspective, and we find that MPH-M has around a 15% lower change rate than AODV-M and DSR-M. The MPH-M recovery time is 5 s faster than AODV-M and 2 s faster than DSR-M. PMID:28678180

  12. Prevention of Malicious Nodes Communication in MANETs by Using Authorized Tokens

    NASA Astrophysics Data System (ADS)

    Chandrakant, N.; Shenoy, P. Deepa; Venugopal, K. R.; Patnaik, L. M.

    A rapid increase of wireless networks and mobile computing applications has changed the landscape of network security. A MANET is more susceptible to the attacks than wired network. As a result, attacks with malicious intent have been and will be devised to take advantage of these vulnerabilities and to cripple the MANET operation. Hence we need to search for new architecture and mechanisms to protect the wireless networks and mobile computing applications. In this paper, we examine the nodes that come under the vicinity of base node and members of the network and communication is provided to genuine nodes only. It is found that the proposed algorithm is a effective algorithm for security in MANETs.

  13. A DNA-Inspired Encryption Methodology for Secure, Mobile Ad Hoc Networks

    NASA Technical Reports Server (NTRS)

    Shaw, Harry

    2012-01-01

    Users are pushing for greater physical mobility with their network and Internet access. Mobile ad hoc networks (MANET) can provide an efficient mobile network architecture, but security is a key concern. A figure summarizes differences in the state of network security for MANET and fixed networks. MANETs require the ability to distinguish trusted peers, and tolerate the ingress/egress of nodes on an unscheduled basis. Because the networks by their very nature are mobile and self-organizing, use of a Public Key Infra structure (PKI), X.509 certificates, RSA, and nonce ex changes becomes problematic if the ideal of MANET is to be achieved. Molecular biology models such as DNA evolution can provide a basis for a proprietary security architecture that achieves high degrees of diffusion and confusion, and resistance to cryptanalysis. A proprietary encryption mechanism was developed that uses the principles of DNA replication and steganography (hidden word cryptography) for confidentiality and authentication. The foundation of the approach includes organization of coded words and messages using base pairs organized into genes, an expandable genome consisting of DNA-based chromosome keys, and a DNA-based message encoding, replication, and evolution and fitness. In evolutionary computing, a fitness algorithm determines whether candidate solutions, in this case encrypted messages, are sufficiently encrypted to be transmitted. The technology provides a mechanism for confidential electronic traffic over a MANET without a PKI for authenticating users.

  14. Analysis of Pervasive Mobile Ad Hoc Routing Protocols

    NASA Astrophysics Data System (ADS)

    Qadri, Nadia N.; Liotta, Antonio

    Mobile ad hoc networks (MANETs) are a fundamental element of pervasive networks and therefore, of pervasive systems that truly support pervasive computing, where user can communicate anywhere, anytime and on-the-fly. In fact, future advances in pervasive computing rely on advancements in mobile communication, which includes both infrastructure-based wireless networks and non-infrastructure-based MANETs. MANETs introduce a new communication paradigm, which does not require a fixed infrastructure - they rely on wireless terminals for routing and transport services. Due to highly dynamic topology, absence of established infrastructure for centralized administration, bandwidth constrained wireless links, and limited resources in MANETs, it is challenging to design an efficient and reliable routing protocol. This chapter reviews the key studies carried out so far on the performance of mobile ad hoc routing protocols. We discuss performance issues and metrics required for the evaluation of ad hoc routing protocols. This leads to a survey of existing work, which captures the performance of ad hoc routing algorithms and their behaviour from different perspectives and highlights avenues for future research.

  15. Self-adaptive trust based ABR protocol for MANETs using Q-learning.

    PubMed

    Kumar, Anitha Vijaya; Jeyapal, Akilandeswari

    2014-01-01

    Mobile ad hoc networks (MANETs) are a collection of mobile nodes with a dynamic topology. MANETs work under scalable conditions for many applications and pose different security challenges. Due to the nomadic nature of nodes, detecting misbehaviour is a complex problem. Nodes also share routing information among the neighbours in order to find the route to the destination. This requires nodes to trust each other. Thus we can state that trust is a key concept in secure routing mechanisms. A number of cryptographic protection techniques based on trust have been proposed. Q-learning is a recently used technique, to achieve adaptive trust in MANETs. In comparison to other machine learning computational intelligence techniques, Q-learning achieves optimal results. Our work focuses on computing a score using Q-learning to weigh the trust of a particular node over associativity based routing (ABR) protocol. Thus secure and stable route is calculated as a weighted average of the trust value of the nodes in the route and associativity ticks ensure the stability of the route. Simulation results show that Q-learning based trust ABR protocol improves packet delivery ratio by 27% and reduces the route selection time by 40% over ABR protocol without trust calculation.

  16. Self-Adaptive Trust Based ABR Protocol for MANETs Using Q-Learning

    PubMed Central

    Jeyapal, Akilandeswari

    2014-01-01

    Mobile ad hoc networks (MANETs) are a collection of mobile nodes with a dynamic topology. MANETs work under scalable conditions for many applications and pose different security challenges. Due to the nomadic nature of nodes, detecting misbehaviour is a complex problem. Nodes also share routing information among the neighbours in order to find the route to the destination. This requires nodes to trust each other. Thus we can state that trust is a key concept in secure routing mechanisms. A number of cryptographic protection techniques based on trust have been proposed. Q-learning is a recently used technique, to achieve adaptive trust in MANETs. In comparison to other machine learning computational intelligence techniques, Q-learning achieves optimal results. Our work focuses on computing a score using Q-learning to weigh the trust of a particular node over associativity based routing (ABR) protocol. Thus secure and stable route is calculated as a weighted average of the trust value of the nodes in the route and associativity ticks ensure the stability of the route. Simulation results show that Q-learning based trust ABR protocol improves packet delivery ratio by 27% and reduces the route selection time by 40% over ABR protocol without trust calculation. PMID:25254243

  17. Organization model for Mobile Wireless Sensor Networks inspired in Artificial Bee Colony

    NASA Astrophysics Data System (ADS)

    Freire Roberto, Guilherme; Castilho Maschi, Luis Fernando; Pigatto, Daniel Fernando; Jaquie Castelo Branco, Kalinka Regina Lucas; Alves Neves, Leandro; Montez, Carlos; Sandro Roschildt Pinto, Alex

    2015-01-01

    The purpose of this study is to find a self-organizing model for MWSN based on bee colonies in order to reduce the number of messages transmitted among nodes, and thus reduce the overall consumption energy while maintaining the efficiency of message delivery. The results obtained in this article are originated from simulations carried out with SINALGO software, which demonstrates the effectiveness of the proposed approach. The BeeAODV (Bee Ad-Hoc On Demand Distance Vector) proposed in this paper allows to considerably reduce message exchanges whether compared to AODV (Ad-Hoc On Demand Distance Vector).

  18. When Reputation Enforces Evolutionary Cooperation in Unreliable MANETs.

    PubMed

    Tang, Changbing; Li, Ang; Li, Xiang

    2015-10-01

    In self-organized mobile ad hoc networks (MANETs), network functions rely on cooperation of self-interested nodes, where a challenge is to enforce their mutual cooperation. In this paper, we study cooperative packet forwarding in a one-hop unreliable channel which results from loss of packets and noisy observation of transmissions. We propose an indirect reciprocity framework based on evolutionary game theory, and enforce cooperation of packet forwarding strategies in both structured and unstructured MANETs. Furthermore, we analyze the evolutionary dynamics of cooperative strategies and derive the threshold of benefit-to-cost ratio to guarantee the convergence of cooperation. The numerical simulations verify that the proposed evolutionary game theoretic solution enforces cooperation when the benefit-to-cost ratio of the altruistic exceeds the critical condition. In addition, the network throughput performance of our proposed strategy in structured MANETs is measured, which is in close agreement with that of the full cooperative strategy.

  19. Wireless Sensor Network Quality of Service Improvement on Flooding Attack Condition

    NASA Astrophysics Data System (ADS)

    Hartono, R.; Widyawan; Wibowo, S. B.; Purnomo, A.; Hartatik

    2018-03-01

    There are two methods of building communication using wireless media. The first method is building a base infrastructure as an intermediary between users. Problems that arise on this type of network infrastructure is limited space to build any network physical infrastructure and also the cost factor. The second method is to build an ad hoc network between users who will communicate. On ad hoc network, each user must be willing to send data from source to destination for the occurrence of a communication. One of network protocol in Ad Hoc, Ad hoc on demand Distance Vector (AODV), has the smallest overhead value, easier to adapt to dynamic network and has small control message. One AODV protocol’s drawback is route finding process’ security for sending the data. In this research, AODV protocol is optimized by determining Expanding Ring Search (ERS) best value. Random topology is used with variation in the number of nodes: 25, 50, 75, 100, 125 and 150 with node’s speed of 10m/s in the area of 1000m x 1000m on flooding network condition. Parameters measured are Throughput, Packet Delivery Ratio, Average Delay and Normalized Routing Load. From the test results of AODV protocol optimization with best value of Expanding Ring Search (ERS), throughput increased by 5.67%, packet delivery ratio increased by 5.73%, and as for Normalized Routing Load decreased by 4.66%. ERS optimal value for each node’s condition depending on the number of nodes on the network.

  20. Security Verification of Secure MANET Routing Protocols

    DTIC Science & Technology

    2012-03-22

    SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS THESIS Matthew F. Steele, Captain, USAF AFIT/GCS/ ENG /12-03 DEPARTMENT OF THE AIR FORCE AIR...States AFIT/GCS/ ENG /12-03 SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS THESIS Presented to the Faculty Department of Electrical and Computer...DISTRIBUTION UNLIMITED AFIT/GCS/ ENG /12-03 SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS Matthew F. Steele, B.S.E.E. Captain, USAF

  1. Cluster Based Location-Aided Routing Protocol for Large Scale Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Wang, Yi; Dong, Liang; Liang, Taotao; Yang, Xinyu; Zhang, Deyun

    Routing algorithms with low overhead, stable link and independence of the total number of nodes in the network are essential for the design and operation of the large-scale wireless mobile ad hoc networks (MANET). In this paper, we develop and analyze the Cluster Based Location-Aided Routing Protocol for MANET (C-LAR), a scalable and effective routing algorithm for MANET. C-LAR runs on top of an adaptive cluster cover of the MANET, which can be created and maintained using, for instance, the weight-based distributed algorithm. This algorithm takes into consideration the node degree, mobility, relative distance, battery power and link stability of mobile nodes. The hierarchical structure stabilizes the end-to-end communication paths and improves the networks' scalability such that the routing overhead does not become tremendous in large scale MANET. The clusterheads form a connected virtual backbone in the network, determine the network's topology and stability, and provide an efficient approach to minimizing the flooding traffic during route discovery and speeding up this process as well. Furthermore, it is fascinating and important to investigate how to control the total number of nodes participating in a routing establishment process so as to improve the network layer performance of MANET. C-LAR is to use geographical location information provided by Global Position System to assist routing. The location information of destination node is used to predict a smaller rectangle, isosceles triangle, or circle request zone, which is selected according to the relative location of the source and the destination, that covers the estimated region in which the destination may be located. Thus, instead of searching the route in the entire network blindly, C-LAR confines the route searching space into a much smaller estimated range. Simulation results have shown that C-LAR outperforms other protocols significantly in route set up time, routing overhead, mean delay and packet collision, and simultaneously maintains low average end-to-end delay, high success delivery ratio, low control overhead, as well as low route discovery frequency.

  2. PKIX Certificate Status in Hybrid MANETs

    NASA Astrophysics Data System (ADS)

    Muñoz, Jose L.; Esparza, Oscar; Gañán, Carlos; Parra-Arnau, Javier

    Certificate status validation is a hard problem in general but it is particularly complex in Mobile Ad-hoc Networks (MANETs) because we require solutions to manage both the lack of fixed infrastructure inside the MANET and the possible absence of connectivity to trusted authorities when the certification validation has to be performed. In this sense, certificate acquisition is usually assumed as an initialization phase. However, certificate validation is a critical operation since the node needs to check the validity of certificates in real-time, that is, when a particular certificate is going to be used. In such MANET environments, it may happen that the node is placed in a part of the network that is disconnected from the source of status data at the moment the status checking is required. Proposals in the literature suggest the use of caching mechanisms so that the node itself or a neighbour node has some status checking material (typically on-line status responses or lists of revoked certificates). However, to the best of our knowledge the only criterion to evaluate the cached (obsolete) material is the time. In this paper, we analyse how to deploy a certificate status checking PKI service for hybrid MANET and we propose a new criterion based on risk to evaluate cached status data that is much more appropriate and absolute than time because it takes into account the revocation process.

  3. On the Suitability of Radios That Interface with Tactical Apps on Android OS

    DTIC Science & Technology

    2014-08-21

    comprising TEC3 and longer-term research): a tablet with its own internal chip connected to a MANET; a tablet tethered to a TP-LINK3 connected to the...MANET; a tablet tethered to a TP-LINK connected to the MANET, and connected to the Internet (as a gateway) with its own internal chip; a tablet...establishment; and a tablet with its own internal chip connected to the MANET, and tethered to a HackRF to perform sensing operations. These

  4. Cross-layer protocols optimized for real-time multimedia services in energy-constrained mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2003-07-01

    Mobile ad hoc networking (MANET) supports self-organizing, mobile infrastructures and enables an autonomous network of mobile nodes that can operate without a wired backbone. Ad hoc networks are characterized by multihop, wireless connectivity via packet radios and by the need for efficient dynamic protocols. All routers are mobile and can establish connectivity with other nodes only when they are within transmission range. Importantly, ad hoc wireless nodes are resource-constrained, having limited processing, memory, and battery capacity. Delivery of high quality-ofservice (QoS), real-time multimedia services from Internet-based applications over a MANET is a challenge not yet achieved by proposed Internet Engineering Task Force (IETF) ad hoc network protocols in terms of standard performance metrics such as end-to-end throughput, packet error rate, and delay. In the distributed operations of route discovery and maintenance, strong interaction occurs across MANET protocol layers, in particular, the physical, media access control (MAC), network, and application layers. The QoS requirements are specified for the service classes by the application layer. The cross-layer design must also satisfy the battery-limited energy constraints, by minimizing the distributed power consumption at the nodes and of selected routes. Interactions across the layers are modeled in terms of the set of concatenated design parameters including associated energy costs. Functional dependencies of the QoS metrics are described in terms of the concatenated control parameters. New cross-layer designs are sought that optimize layer interdependencies to achieve the "best" QoS available in an energy-constrained, time-varying network. The protocol design, based on a reactive MANET protocol, adapts the provisioned QoS to dynamic network conditions and residual energy capacities. The cross-layer optimization is based on stochastic dynamic programming conditions derived from time-dependent models of MANET packet flows. Regulation of network behavior is modeled by the optimal control of the conditional rates of multivariate point processes (MVPPs); these rates depend on the concatenated control parameters through a change of probability measure. The MVPP models capture behavior of many service applications, e.g., voice, video and the self-similar behavior of Internet data sessions. Performance verification of the cross-layer protocols, derived from the dynamic programming conditions, can be achieved by embedding the conditions in a reactive routing protocol for MANETs, in a simulation environment, such as the wireless extension of ns-2. A canonical MANET scenario consists of a distributed collection of battery-powered laptops or hand-held terminals, capable of hosting multimedia applications. Simulation details and performance tradeoffs, not presented, remain for a sequel to the paper.

  5. Édouard Manet's Tabes Dorsalis: From Painful Ataxia to Phantom Limb.

    PubMed

    Bogousslavsky, Julien; Tatu, Laurent

    2016-01-01

    Édouard Manet (1832-1883) is considered the 'father' of Impressionism and even of XXth century modern art. Manet's genius involved getting away from the classical narrative or historical topics and replacing them by the banality of daily life. Technically, he erased volumes into flat two-dimensional coloured planes, and distorted conventional perspective with often gross brushstrokes intentionally giving an 'unfinished' aspect to the work. It is little known that Manet had a very painful second part of his life, due to excruciating limb and chest pains, which developed in parallel with proprioceptive ataxia and gait imbalance. Manet always remained discreet about his private life, and we mainly know that his future wife was his family piano teacher, with whom he had a liaison already at age 17. Later, the great but platonic passion of his life was the painter Berthe Morisot (1841-1895), who got married to Manet's brother Eugène. In fact, we do not know whether he had any mistress at all, although he had several elegant 'flirts' in the mundane and artistic milieu. Thus, while Manet's progressive painful ataxia from age 40 yields little doubt on its tabetic origin, how he contracted syphilis at least 15-20 years before will probably remain a mystery. It is fascinating that Manet's daily struggle against pain and poor coordination may have led his art to become one of the most significant of modern times, opening the way to XXth century avant-gardes, along with another victim of syphilis, Paul Gauguin (1848-1903). Manet never showed any sign of General Paresis, and like his contemporary the writer Alphonse Daudet, his clinical picture remained dominated by paroxysmal pain and walking impairment. Difficult hand coordination made him quit watercolor painting, and during the last 2 years of his life, he had to focus on small format oil works, whose subject was nearly limited to modest bunches of fresh flowers, now often considered to be his maturity masterpieces. Having become bedridden, he had to be amputated of one leg, which was developing gangrene probably associated with ergot overuse. While he died shortly thereafter, we have some witness anecdotes suggesting that he experienced a phantom limb: when Claude Monet (1840-1926) visited him and sat down on his bed, Manet violently shouted at him that he was just sitting on his (absent) leg, which provoked terrible pains. With its facts and mysteries, the subtle interaction between Manet's illness and his work output remains one of the most intriguing stories in neurology of art. © 2016 S. Karger AG, Basel.

  6. Energy consumption and control response evaluations of AODV routing in WSANs for building-temperature control.

    PubMed

    Booranawong, Apidet; Teerapabkajorndet, Wiklom; Limsakul, Chusak

    2013-06-27

    The main objective of this paper is to investigate the effects of routing protocols on wireless sensor and actuator networks (WSANs), focusing on the control system response and the energy consumption of nodes in a network. We demonstrate that routing algorithms designed without considering the relationship between communication and control cannot be appropriately used in wireless networked control applications. For this purpose, an ad-hoc on-demand distance vector (AODV) routing, an IEEE 802.15.4, and a building-temperature control system are employed for this exploration. The findings from our scenarios show that the AODV routing can select a path with a high traffic load for data transmission. It takes a long time before deciding to change a new route although it experiences the unsuccessful transmission of packets. As a result, the desirable control target cannot be achieved in time, and nodes consume more energy due to frequent packet collisions and retransmissions. Consequently, we propose a simple routing solution to alleviate these research problems by modifying the original AODV routing protocol. The delay-threshold is considered to avoid any congested connection during routing procedures. The simulation results demonstrate that our solution can be appropriately applied in WSANs. Both the energy consumption and the control system response are improved.

  7. SEAODV: A Security Enhanced AODV Routing Protocol for Wireless Mesh Networks

    NASA Astrophysics Data System (ADS)

    Li, Celia; Wang, Zhuang; Yang, Cungang

    In this paper, we propose a Security Enhanced AODV routing protocol (SEAODV) for wireless mesh networks (WMN). SEAODV employs Blom's key pre-distribution scheme to compute the pairwise transient key (PTK) through the flooding of enhanced HELLO message and subsequently uses the established PTK to distribute the group transient key (GTK). PTK and GTK authenticate unicast and broadcast routing messages respectively. In WMN, a unique PTK is shared by each pair of nodes, while GTK is shared secretly between the node and all its one-hop neighbours. A message authentication code (MAC) is attached as the extension to the original AODV routing message to guarantee the message's authenticity and integrity in a hop-by-hop fashion. Security analysis and performance evaluation show that SEAODV is more effective in preventing identified routing attacks and outperforms ARAN and SAODV in terms of computation cost and route acquisition latency.

  8. Data Delivery Method Based on Neighbor Nodes' Information in a Mobile Ad Hoc Network

    PubMed Central

    Hayashi, Takuma; Taenaka, Yuzo; Okuda, Takeshi; Yamaguchi, Suguru

    2014-01-01

    This paper proposes a data delivery method based on neighbor nodes' information to achieve reliable communication in a mobile ad hoc network (MANET). In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE), Chachulski et al. (2007), improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow. PMID:24672371

  9. Data delivery method based on neighbor nodes' information in a mobile ad hoc network.

    PubMed

    Kashihara, Shigeru; Hayashi, Takuma; Taenaka, Yuzo; Okuda, Takeshi; Yamaguchi, Suguru

    2014-01-01

    This paper proposes a data delivery method based on neighbor nodes' information to achieve reliable communication in a mobile ad hoc network (MANET). In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE), Chachulski et al. (2007), improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow.

  10. Performance Evaluation of FAST TCP Traffic-Flows in Multihomed MANETs

    NASA Astrophysics Data System (ADS)

    Mudassir, Mumajjed Ul; Akram, Adeel

    In Mobile Ad hoc Networks (MANETs) an efficient communication protocol is required at the transport layer. Mobile nodes moving around will have temporary and rather short-lived connectivity with each other and the Internet, thus requiring efficient utilization of network resources. Moreover the problems arising due to high mobility, collision and congestion must also be considered. Multihoming allows higher reliability and enhancement of network throughput. FAST TCP is a new promising transport layer protocol developed for high-speed high-latency networks. In this paper, we have analyzed the performance of FAST TCP traffic flows in multihomed MANETs and compared it with standard TCP (TCP Reno) traffic flows in non-multihomed MANETs.

  11. Optimal JPWL Forward Error Correction Rate Allocation for Robust JPEG 2000 Images and Video Streaming over Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Agueh, Max; Diouris, Jean-François; Diop, Magaye; Devaux, François-Olivier; De Vleeschouwer, Christophe; Macq, Benoit

    2008-12-01

    Based on the analysis of real mobile ad hoc network (MANET) traces, we derive in this paper an optimal wireless JPEG 2000 compliant forward error correction (FEC) rate allocation scheme for a robust streaming of images and videos over MANET. The packet-based proposed scheme has a low complexity and is compliant to JPWL, the 11th part of the JPEG 2000 standard. The effectiveness of the proposed method is evaluated using a wireless Motion JPEG 2000 client/server application; and the ability of the optimal scheme to guarantee quality of service (QoS) to wireless clients is demonstrated.

  12. Data management issues in mobile ad hoc networks

    PubMed Central

    HARA, Takahiro

    2017-01-01

    Research on mobile ad hoc networks (MANETs) has become a hot research topic since the middle 1990’s. Over the first decade, most research focused on networking techniques, ignoring data management issues. We, however, realized early the importance of data management in MANETs, and have been conducting studies in this area for 15 years. In this review, we summarize some key technical issues related to data management in MANETs, and the studies we have done in addressing these issues, which include placement of data replicas, update management, and query processing with security management. The techniques proposed in our studies have been designed with deep considerations of MANET features including network partitioning, node participation/disappearance, limited network bandwidth, and energy efficiency. Our studies published in early 2000’s have developed a new research field as data management in MANETs. Also, our recent studies are expected to be significant guidelines of new research directions. We conclude the review by discussing some future directions for research. PMID:28496052

  13. Data management issues in mobile ad hoc networks.

    PubMed

    Hara, Takahiro

    2017-01-01

    Research on mobile ad hoc networks (MANETs) has become a hot research topic since the middle 1990's. Over the first decade, most research focused on networking techniques, ignoring data management issues. We, however, realized early the importance of data management in MANETs, and have been conducting studies in this area for 15 years. In this review, we summarize some key technical issues related to data management in MANETs, and the studies we have done in addressing these issues, which include placement of data replicas, update management, and query processing with security management. The techniques proposed in our studies have been designed with deep considerations of MANET features including network partitioning, node participation/disappearance, limited network bandwidth, and energy efficiency. Our studies published in early 2000's have developed a new research field as data management in MANETs. Also, our recent studies are expected to be significant guidelines of new research directions. We conclude the review by discussing some future directions for research.

  14. A Cross-Layer, Anomaly-Based IDS for WSN and MANET

    PubMed Central

    Amouri, Amar; Manthena, Raju

    2018-01-01

    Intrusion detection system (IDS) design for mobile adhoc networks (MANET) is a crucial component for maintaining the integrity of the network. The need for rapid deployment of IDS capability with minimal data availability for training and testing is an important requirement of such systems, especially for MANETs deployed in highly dynamic scenarios, such as battlefields. This work proposes a two-level detection scheme for detecting malicious nodes in MANETs. The first level deploys dedicated sniffers working in promiscuous mode. Each sniffer utilizes a decision-tree-based classifier that generates quantities which we refer to as correctly classified instances (CCIs) every reporting time. In the second level, the CCIs are sent to an algorithmically run supernode that calculates quantities, which we refer to as the accumulated measure of fluctuation (AMoF) of the received CCIs for each node under test (NUT). A key concept that is used in this work is that the variability of the smaller size population which represents the number of malicious nodes in the network is greater than the variance of the larger size population which represents the number of normal nodes in the network. A linear regression process is then performed in parallel with the calculation of the AMoF for fitting purposes and to set a proper threshold based on the slope of the fitted lines. As a result, the malicious nodes are efficiently and effectively separated from the normal nodes. The proposed scheme is tested for various node velocities and power levels and shows promising detection performance even at low-power levels. The results presented also apply to wireless sensor networks (WSN) and represent a novel IDS scheme for such networks. PMID:29470446

  15. A Cross-Layer, Anomaly-Based IDS for WSN and MANET.

    PubMed

    Amouri, Amar; Morgera, Salvatore D; Bencherif, Mohamed A; Manthena, Raju

    2018-02-22

    Intrusion detection system (IDS) design for mobile adhoc networks (MANET) is a crucial component for maintaining the integrity of the network. The need for rapid deployment of IDS capability with minimal data availability for training and testing is an important requirement of such systems, especially for MANETs deployed in highly dynamic scenarios, such as battlefields. This work proposes a two-level detection scheme for detecting malicious nodes in MANETs. The first level deploys dedicated sniffers working in promiscuous mode. Each sniffer utilizes a decision-tree-based classifier that generates quantities which we refer to as correctly classified instances (CCIs) every reporting time. In the second level, the CCIs are sent to an algorithmically run supernode that calculates quantities, which we refer to as the accumulated measure of fluctuation (AMoF) of the received CCIs for each node under test (NUT). A key concept that is used in this work is that the variability of the smaller size population which represents the number of malicious nodes in the network is greater than the variance of the larger size population which represents the number of normal nodes in the network. A linear regression process is then performed in parallel with the calculation of the AMoF for fitting purposes and to set a proper threshold based on the slope of the fitted lines. As a result, the malicious nodes are efficiently and effectively separated from the normal nodes. The proposed scheme is tested for various node velocities and power levels and shows promising detection performance even at low-power levels. The results presented also apply to wireless sensor networks (WSN) and represent a novel IDS scheme for such networks.

  16. Self-Configuration and Self-Optimization Process in Heterogeneous Wireless Networks

    PubMed Central

    Guardalben, Lucas; Villalba, Luis Javier García; Buiati, Fábio; Sobral, João Bosco Mangueira; Camponogara, Eduardo

    2011-01-01

    Self-organization in Wireless Mesh Networks (WMN) is an emergent research area, which is becoming important due to the increasing number of nodes in a network. Consequently, the manual configuration of nodes is either impossible or highly costly. So it is desirable for the nodes to be able to configure themselves. In this paper, we propose an alternative architecture for self-organization of WMN based on Optimized Link State Routing Protocol (OLSR) and the ad hoc on demand distance vector (AODV) routing protocols as well as using the technology of software agents. We argue that the proposed self-optimization and self-configuration modules increase the throughput of network, reduces delay transmission and network load, decreases the traffic of HELLO messages according to network’s scalability. By simulation analysis, we conclude that the self-optimization and self-configuration mechanisms can significantly improve the performance of OLSR and AODV protocols in comparison to the baseline protocols analyzed. PMID:22346584

  17. Self-configuration and self-optimization process in heterogeneous wireless networks.

    PubMed

    Guardalben, Lucas; Villalba, Luis Javier García; Buiati, Fábio; Sobral, João Bosco Mangueira; Camponogara, Eduardo

    2011-01-01

    Self-organization in Wireless Mesh Networks (WMN) is an emergent research area, which is becoming important due to the increasing number of nodes in a network. Consequently, the manual configuration of nodes is either impossible or highly costly. So it is desirable for the nodes to be able to configure themselves. In this paper, we propose an alternative architecture for self-organization of WMN based on Optimized Link State Routing Protocol (OLSR) and the ad hoc on demand distance vector (AODV) routing protocols as well as using the technology of software agents. We argue that the proposed self-optimization and self-configuration modules increase the throughput of network, reduces delay transmission and network load, decreases the traffic of HELLO messages according to network's scalability. By simulation analysis, we conclude that the self-optimization and self-configuration mechanisms can significantly improve the performance of OLSR and AODV protocols in comparison to the baseline protocols analyzed.

  18. On the MAC/network/energy performance evaluation of Wireless Sensor Networks: Contrasting MPH, AODV, DSR and ZTR routing protocols.

    PubMed

    Del-Valle-Soto, Carolina; Mex-Perera, Carlos; Orozco-Lugo, Aldo; Lara, Mauricio; Galván-Tejada, Giselle M; Olmedo, Oscar

    2014-12-02

    Wireless Sensor Networks deliver valuable information for long periods, then it is desirable to have optimum performance, reduced delays, low overhead, and reliable delivery of information. In this work, proposed metrics that influence energy consumption are used for a performance comparison among our proposed routing protocol, called Multi-Parent Hierarchical (MPH), the well-known protocols for sensor networks, Ad hoc On-Demand Distance Vector (AODV), Dynamic Source Routing (DSR), and Zigbee Tree Routing (ZTR), all of them working with the IEEE 802.15.4 MAC layer. Results show how some communication metrics affect performance, throughput, reliability and energy consumption. It can be concluded that MPH is an efficient protocol since it reaches the best performance against the other three protocols under evaluation, such as 19.3% reduction of packet retransmissions, 26.9% decrease of overhead, and 41.2% improvement on the capacity of the protocol for recovering the topology from failures with respect to AODV protocol. We implemented and tested MPH in a real network of 99 nodes during ten days and analyzed parameters as number of hops, connectivity and delay, in order to validate our Sensors 2014, 14 22812 simulator and obtain reliable results. Moreover, an energy model of CC2530 chip is proposed and used for simulations of the four aforementioned protocols, showing that MPH has 15.9% reduction of energy consumption with respect to AODV, 13.7% versus DSR, and 5% against ZTR.

  19. Supporting the Maritime Information Dominance: Optimizing Tactical Network for Biometric Data Sharing in Maritime Interdiction Operations

    DTIC Science & Technology

    2015-03-01

    information dominance in the maritime domain by optimizing tactical mobile ad hoc network (MANET) systems for wireless sharing of biometric data in maritime interdiction operations (MIO). Current methods for sharing biometric data in MIO are unnecessarily slow and do not leverage wireless networks at the tactical edge to maximize information dominance . Field experiments allow students to test wireless MANETs at the tactical edge. Analysis is focused on determining optimal MANET design and implementation. It considers various implementations with

  20. Clair de lune sur le port de Boulogne: enquête sur un tableau de Manet, traduction d'un article de Donald W. Olson

    NASA Astrophysics Data System (ADS)

    Borg, Janet

    2016-10-01

    The 19th-century artist Edouard Manet created a spectacular nocturnal painting showing a full Moon over the harbor of Boulogne. Art historians have dated this work to either 1868 or 1869. Calculations of lunar phases, 19th-century maps and photographs of Boulogne harbor, the correspondence of the artist, and other clues allow us to determine a date and precise time when Manet observed this moonlit scene.

  1. Distributed Dynamic Host Configuration Protocol (D2HCP)

    PubMed Central

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    Mobile Ad Hoc Networks (MANETs) are multihop wireless networks of mobile nodes without any fixed or preexisting infrastructure. The topology of these networks can change randomly due to the unpredictable mobility of nodes and their propagation characteristics. In most networks, including MANETs, each node needs a unique identifier to communicate. This work presents a distributed protocol for dynamic node IP address assignment in MANETs. Nodes of a MANET synchronize from time to time to maintain a record of IP address assignments in the entire network and detect any IP address leaks. The proposed stateful autoconfiguration scheme uses the OLSR proactive routing protocol for synchronization and guarantees unique IP addresses under a variety of network conditions, including message losses and network partitioning. Simulation results show that the protocol incurs low latency and communication overhead for IP address assignment. PMID:22163856

  2. Distributed Dynamic Host Configuration Protocol (D2HCP).

    PubMed

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    Mobile Ad Hoc Networks (MANETs) are multihop wireless networks of mobile nodes without any fixed or preexisting infrastructure. The topology of these networks can change randomly due to the unpredictable mobility of nodes and their propagation characteristics. In most networks, including MANETs, each node needs a unique identifier to communicate. This work presents a distributed protocol for dynamic node IP address assignment in MANETs. Nodes of a MANET synchronize from time to time to maintain a record of IP address assignments in the entire network and detect any IP address leaks. The proposed stateful autoconfiguration scheme uses the OLSR proactive routing protocol for synchronization and guarantees unique IP addresses under a variety of network conditions, including message losses and network partitioning. Simulation results show that the protocol incurs low latency and communication overhead for IP address assignment.

  3. An efficient collaborative approach for black hole attack discovery and mitigating its impact in manet

    NASA Astrophysics Data System (ADS)

    Devipriya, K.; Ivy, B. Persis Urbana; Prabha, D.

    2018-04-01

    A mobile ad hoc network (MANET) is an assemblage of nodes composed of mobile devices coupled in various ways wirelessly which do not have any central administration. Each node in MANET cooperates in forwarding packets in the network. This type of collaboration incurs high cost but there exits nodes that declines to cooperate leading to selfish conduct of nodes which effects overall network performance. To discover the attacks caused by such nodes, a renowned mechanism using watchdog can be deployed. In infrastructure less network attack detection and reaction and high false positives, false negatives initiating black hole attack becomes major issue in watchdog. This paper put forward a collaborative approach for identifying such attacks in MANET. Through abstract analysis and extensive simulation of this approach, the detection time of misbehaved nodes is reduced and substantial enhancement in overhead and throughput is witnessed.

  4. Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization in Mobile Ad Hoc Networks

    PubMed Central

    Robinson, Y. Harold; Rajaram, M.

    2015-01-01

    Mobile ad hoc network (MANET) is a collection of autonomous mobile nodes forming an ad hoc network without fixed infrastructure. Dynamic topology property of MANET may degrade the performance of the network. However, multipath selection is a great challenging task to improve the network lifetime. We proposed an energy-aware multipath routing scheme based on particle swarm optimization (EMPSO) that uses continuous time recurrent neural network (CTRNN) to solve optimization problems. CTRNN finds the optimal loop-free paths to solve link disjoint paths in a MANET. The CTRNN is used as an optimum path selection technique that produces a set of optimal paths between source and destination. In CTRNN, particle swarm optimization (PSO) method is primly used for training the RNN. The proposed scheme uses the reliability measures such as transmission cost, energy factor, and the optimal traffic ratio between source and destination to increase routing performance. In this scheme, optimal loop-free paths can be found using PSO to seek better link quality nodes in route discovery phase. PSO optimizes a problem by iteratively trying to get a better solution with regard to a measure of quality. The proposed scheme discovers multiple loop-free paths by using PSO technique. PMID:26819966

  5. Analytical approach to cross-layer protocol optimization in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2008-04-01

    In the distributed operations of route discovery and maintenance, strong interaction occurs across mobile ad hoc network (MANET) protocol layers. Quality of service (QoS) requirements of multimedia service classes must be satisfied by the cross-layer protocol, along with minimization of the distributed power consumption at nodes and along routes to battery-limited energy constraints. In previous work by the author, cross-layer interactions in the MANET protocol are modeled in terms of a set of concatenated design parameters and associated resource levels by multivariate point processes (MVPPs). Determination of the "best" cross-layer design is carried out using the optimal control of martingale representations of the MVPPs. In contrast to the competitive interaction among nodes in a MANET for multimedia services using limited resources, the interaction among the nodes of a wireless sensor network (WSN) is distributed and collaborative, based on the processing of data from a variety of sensors at nodes to satisfy common mission objectives. Sensor data originates at the nodes at the periphery of the WSN, is successively transported to other nodes for aggregation based on information-theoretic measures of correlation and ultimately sent as information to one or more destination (decision) nodes. The "multimedia services" in the MANET model are replaced by multiple types of sensors, e.g., audio, seismic, imaging, thermal, etc., at the nodes; the QoS metrics associated with MANETs become those associated with the quality of fused information flow, i.e., throughput, delay, packet error rate, data correlation, etc. Significantly, the essential analytical approach to MANET cross-layer optimization, now based on the MVPPs for discrete random events occurring in the WSN, can be applied to develop the stochastic characteristics and optimality conditions for cross-layer designs of sensor network protocols. Functional dependencies of WSN performance metrics are described in terms of the concatenated protocol parameters. New source-to-destination routes are sought that optimize cross-layer interdependencies to achieve the "best available" performance in the WSN. The protocol design, modified from a known reactive protocol, adapts the achievable performance to the transient network conditions and resource levels. Control of network behavior is realized through the conditional rates of the MVPPs. Optimal cross-layer protocol parameters are determined by stochastic dynamic programming conditions derived from models of transient packetized sensor data flows. Moreover, the defining conditions for WSN configurations, grouping sensor nodes into clusters and establishing data aggregation at processing nodes within those clusters, lead to computationally tractable solutions to the stochastic differential equations that describe network dynamics. Closed-form solution characteristics provide an alternative to the "directed diffusion" methods for resource-efficient WSN protocols published previously by other researchers. Performance verification of the resulting cross-layer designs is found by embedding the optimality conditions for the protocols in actual WSN scenarios replicated in a wireless network simulation environment. Performance tradeoffs among protocol parameters remain for a sequel to the paper.

  6. 77 FR 54647 - Culturally Significant Objects Imported for Exhibition Determinations: “Manet: Portraying Life”

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-05

    ... DEPARTMENT OF STATE [Public Notice 8012] Culturally Significant Objects Imported for Exhibition Determinations: ``Manet: Portraying Life'' SUMMARY: Notice is hereby given of the following determinations...: Portraying Life,'' imported from abroad for temporary exhibition within the United States, are of cultural...

  7. Intelligent QoS routing algorithm based on improved AODV protocol for Ad Hoc networks

    NASA Astrophysics Data System (ADS)

    Huibin, Liu; Jun, Zhang

    2016-04-01

    Mobile Ad Hoc Networks were playing an increasingly important part in disaster reliefs, military battlefields and scientific explorations. However, networks routing difficulties are more and more outstanding due to inherent structures. This paper proposed an improved cuckoo searching-based Ad hoc On-Demand Distance Vector Routing protocol (CSAODV). It elaborately designs the calculation methods of optimal routing algorithm used by protocol and transmission mechanism of communication-package. In calculation of optimal routing algorithm by CS Algorithm, by increasing QoS constraint, the found optimal routing algorithm can conform to the requirements of specified bandwidth and time delay, and a certain balance can be obtained among computation spending, bandwidth and time delay. Take advantage of NS2 simulation software to take performance test on protocol in three circumstances and validate the feasibility and validity of CSAODV protocol. In results, CSAODV routing protocol is more adapt to the change of network topological structure than AODV protocol, which improves package delivery fraction of protocol effectively, reduce the transmission time delay of network, reduce the extra burden to network brought by controlling information, and improve the routing efficiency of network.

  8. WEAMR — A Weighted Energy Aware Multipath Reliable Routing Mechanism for Hotline-Based WSNs

    PubMed Central

    Tufail, Ali; Qamar, Arslan; Khan, Adil Mehmood; Baig, Waleed Akram; Kim, Ki-Hyung

    2013-01-01

    Reliable source to sink communication is the most important factor for an efficient routing protocol especially in domains of military, healthcare and disaster recovery applications. We present weighted energy aware multipath reliable routing (WEAMR), a novel energy aware multipath routing protocol which utilizes hotline-assisted routing to meet such requirements for mission critical applications. The protocol reduces the number of average hops from source to destination and provides unmatched reliability as compared to well known reactive ad hoc protocols i.e., AODV and AOMDV. Our protocol makes efficient use of network paths based on weighted cost calculation and intelligently selects the best possible paths for data transmissions. The path cost calculation considers end to end number of hops, latency and minimum energy node value in the path. In case of path failure path recalculation is done efficiently with minimum latency and control packets overhead. Our evaluation shows that our proposal provides better end-to-end delivery with less routing overhead and higher packet delivery success ratio compared to AODV and AOMDV. The use of multipath also increases overall life time of WSN network using optimum energy available paths between sender and receiver in WDNs. PMID:23669714

  9. WEAMR-a weighted energy aware multipath reliable routing mechanism for hotline-based WSNs.

    PubMed

    Tufail, Ali; Qamar, Arslan; Khan, Adil Mehmood; Baig, Waleed Akram; Kim, Ki-Hyung

    2013-05-13

    Reliable source to sink communication is the most important factor for an efficient routing protocol especially in domains of military, healthcare and disaster recovery applications. We present weighted energy aware multipath reliable routing (WEAMR), a novel energy aware multipath routing protocol which utilizes hotline-assisted routing to meet such requirements for mission critical applications. The protocol reduces the number of average hops from source to destination and provides unmatched reliability as compared to well known reactive ad hoc protocols i.e., AODV and AOMDV. Our protocol makes efficient use of network paths based on weighted cost calculation and intelligently selects the best possible paths for data transmissions. The path cost calculation considers end to end number of hops, latency and minimum energy node value in the path. In case of path failure path recalculation is done efficiently with minimum latency and control packets overhead. Our evaluation shows that our proposal provides better end-to-end delivery with less routing overhead and higher packet delivery success ratio compared to AODV and AOMDV. The use of multipath also increases overall life time of WSN network using optimum energy available paths between sender and receiver in WDNs.

  10. Directly executable formal models of middleware for MANET and Cloud Networking and Computing

    NASA Astrophysics Data System (ADS)

    Pashchenko, D. V.; Sadeq Jaafar, Mustafa; Zinkin, S. A.; Trokoz, D. A.; Pashchenko, T. U.; Sinev, M. P.

    2016-04-01

    The article considers some “directly executable” formal models that are suitable for the specification of computing and networking in the cloud environment and other networks which are similar to wireless networks MANET. These models can be easily programmed and implemented on computer networks.

  11. LBMR: Load-Balanced Multipath Routing for Wireless Data-Intensive Transmission in Real-Time Medical Monitoring.

    PubMed

    Tseng, Chinyang Henry

    2016-05-31

    In wireless networks, low-power Zigbee is an excellent network solution for wireless medical monitoring systems. Medical monitoring generally involves transmission of a large amount of data and easily causes bottleneck problems. Although Zigbee's AODV mesh routing provides extensible multi-hop data transmission to extend network coverage, it originally does not, and needs to support some form of load balancing mechanism to avoid bottlenecks. To guarantee a more reliable multi-hop data transmission for life-critical medical applications, we have developed a multipath solution, called Load-Balanced Multipath Routing (LBMR) to replace Zigbee's routing mechanism. LBMR consists of three main parts: Layer Routing Construction (LRC), a Load Estimation Algorithm (LEA), and a Route Maintenance (RM) mechanism. LRC assigns nodes into different layers based on the node's distance to the medical data gateway. Nodes can have multiple next-hops delivering medical data toward the gateway. All neighboring layer-nodes exchange flow information containing current load, which is the used by the LEA to estimate future load of next-hops to the gateway. With LBMR, nodes can choose the neighbors with the least load as the next-hops and thus can achieve load balancing and avoid bottlenecks. Furthermore, RM can detect route failures in real-time and perform route redirection to ensure routing robustness. Since LRC and LEA prevent bottlenecks while RM ensures routing fault tolerance, LBMR provides a highly reliable routing service for medical monitoring. To evaluate these accomplishments, we compare LBMR with Zigbee's AODV and another multipath protocol, AOMDV. The simulation results demonstrate LBMR achieves better load balancing, less unreachable nodes, and better packet delivery ratio than either AODV or AOMDV.

  12. LBMR: Load-Balanced Multipath Routing for Wireless Data-Intensive Transmission in Real-Time Medical Monitoring

    PubMed Central

    Tseng, Chinyang Henry

    2016-01-01

    In wireless networks, low-power Zigbee is an excellent network solution for wireless medical monitoring systems. Medical monitoring generally involves transmission of a large amount of data and easily causes bottleneck problems. Although Zigbee’s AODV mesh routing provides extensible multi-hop data transmission to extend network coverage, it originally does not, and needs to support some form of load balancing mechanism to avoid bottlenecks. To guarantee a more reliable multi-hop data transmission for life-critical medical applications, we have developed a multipath solution, called Load-Balanced Multipath Routing (LBMR) to replace Zigbee’s routing mechanism. LBMR consists of three main parts: Layer Routing Construction (LRC), a Load Estimation Algorithm (LEA), and a Route Maintenance (RM) mechanism. LRC assigns nodes into different layers based on the node’s distance to the medical data gateway. Nodes can have multiple next-hops delivering medical data toward the gateway. All neighboring layer-nodes exchange flow information containing current load, which is the used by the LEA to estimate future load of next-hops to the gateway. With LBMR, nodes can choose the neighbors with the least load as the next-hops and thus can achieve load balancing and avoid bottlenecks. Furthermore, RM can detect route failures in real-time and perform route redirection to ensure routing robustness. Since LRC and LEA prevent bottlenecks while RM ensures routing fault tolerance, LBMR provides a highly reliable routing service for medical monitoring. To evaluate these accomplishments, we compare LBMR with Zigbee’s AODV and another multipath protocol, AOMDV. The simulation results demonstrate LBMR achieves better load balancing, less unreachable nodes, and better packet delivery ratio than either AODV or AOMDV. PMID:27258297

  13. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurt Derr

    Mobile Ad hoc NETworks (MANETs) are distributed self-organizing networks that can change locations and configure themselves on the fly. This paper focuses on an algorithmic approach for the deployment of a MANET within an enclosed area, such as a building in a disaster scenario, which can provide a robust communication infrastructure for search and rescue operations. While a virtual spring mesh (VSM) algorithm provides scalable, self-organizing, and fault-tolerant capabilities required by aMANET, the VSM lacks the MANET's capabilities of deployment mechanisms for blanket coverage of an area and does not provide an obstacle avoidance mechanism. This paper presents a newmore » technique, an extended VSM (EVSM) algorithm that provides the following novelties: (1) new control laws for exploration and expansion to provide blanket coverage, (2) virtual adaptive springs enabling the mesh to expand as necessary, (3) adapts to communications disturbances by varying the density and movement of mobile nodes, and (4) new metrics to assess the performance of the EVSM algorithm. Simulation results show that EVSM provides up to 16% more coverage and is 3.5 times faster than VSM in environments with eight obstacles.« less

  14. Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version

    PubMed Central

    Babu, M. Rajesh; Dian, S. Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan

    2015-01-01

    The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things. PMID:26495430

  15. Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version.

    PubMed

    Babu, M Rajesh; Dian, S Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan

    2015-01-01

    The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things.

  16. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks.

    PubMed

    Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J; Pallarès Segarra, Esteve; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Sanvicente Gargallo, Emilio

    2015-04-17

    The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.

  17. SFTP: A Secure and Fault-Tolerant Paradigm against Blackhole Attack in MANET

    NASA Astrophysics Data System (ADS)

    KumarRout, Jitendra; Kumar Bhoi, Sourav; Kumar Panda, Sanjaya

    2013-02-01

    Security issues in MANET are a challenging task nowadays. MANETs are vulnerable to passive attacks and active attacks because of a limited number of resources and lack of centralized authority. Blackhole attack is an attack in network layer which degrade the network performance by dropping the packets. In this paper, we have proposed a Secure Fault-Tolerant Paradigm (SFTP) which checks the Blackhole attack in the network. The three phases used in SFTP algorithm are designing of coverage area to find the area of coverage, Network Connection algorithm to design a fault-tolerant model and Route Discovery algorithm to discover the route and data delivery from source to destination. SFTP gives better network performance by making the network fault free.

  18. A Decentralized VPN Service over Generalized Mobile Ad-Hoc Networks

    NASA Astrophysics Data System (ADS)

    Fujita, Sho; Shima, Keiichi; Uo, Yojiro; Esaki, Hiroshi

    We present a decentralized VPN service that can be built over generalized mobile ad-hoc networks (Generalized MANETs), in which topologies can be represented as a time-varying directed multigraph. We address wireless ad-hoc networks and overlay ad-hoc networks as instances of Generalized MANETs. We first propose an architecture to operate on various kinds of networks through a single set of operations. Then, we design and implement a decentralized VPN service on the proposed architecture. Through the development and operation of a prototype system we implemented, we found that the proposed architecture makes the VPN service applicable to each instance of Generalized MANETs, and that the VPN service makes it possible for unmodified applications to operate on the networks.

  19. An adaptive neural swarm approach for intrusion defense in ad hoc networks

    NASA Astrophysics Data System (ADS)

    Cannady, James

    2011-06-01

    Wireless sensor networks (WSN) and mobile ad hoc networks (MANET) are being increasingly deployed in critical applications due to the flexibility and extensibility of the technology. While these networks possess numerous advantages over traditional wireless systems in dynamic environments they are still vulnerable to many of the same types of host-based and distributed attacks common to those systems. Unfortunately, the limited power and bandwidth available in WSNs and MANETs, combined with the dynamic connectivity that is a defining characteristic of the technology, makes it extremely difficult to utilize traditional intrusion detection techniques. This paper describes an approach to accurately and efficiently detect potentially damaging activity in WSNs and MANETs. It enables the network as a whole to recognize attacks, anomalies, and potential vulnerabilities in a distributive manner that reflects the autonomic processes of biological systems. Each component of the network recognizes activity in its local environment and then contributes to the overall situational awareness of the entire system. The approach utilizes agent-based swarm intelligence to adaptively identify potential data sources on each node and on adjacent nodes throughout the network. The swarm agents then self-organize into modular neural networks that utilize a reinforcement learning algorithm to identify relevant behavior patterns in the data without supervision. Once the modular neural networks have established interconnectivity both locally and with neighboring nodes the analysis of events within the network can be conducted collectively in real-time. The approach has been shown to be extremely effective in identifying distributed network attacks.

  20. Performance analysis of routing protocols for IoT

    NASA Astrophysics Data System (ADS)

    Manda, Sridhar; Nalini, N.

    2018-04-01

    Internet of Things (IoT) is an arrangement of advancements that are between disciplinary. It is utilized to have compelling combination of both physical and computerized things. With IoT physical things can have personal virtual identities and participate in distributed computing. Realization of IoT needs the usage of sensors based on the sector for which IoT is integrated. For instance, in healthcare domain, IoT needs to have integration with wearable sensors used by patients. As sensor devices produce huge amount of data, often called big data, there should be efficient routing protocols in place. To the extent remote systems is worried there are some current protocols, for example, OLSR, DSR and AODV. It additionally tosses light into Trust based routing protocol for low-power and lossy systems (TRPL) for IoT. These are broadly utilized remote directing protocols. As IoT is developing round the corner, it is basic to investigate routing protocols that and evaluate their execution regarding throughput, end to end delay, and directing overhead. The execution experiences can help in settling on very much educated choices while incorporating remote systems with IoT. In this paper, we analyzed different routing protocols and their performance is compared. It is found that AODV showed better performance than other routing protocols aforementioned.

  1. Mobile Support For Logistics

    DTIC Science & Technology

    2016-03-01

    Infrastructure to Support Mobile Devices (Takai, 2012, p. 2). The objectives needed in order to meet this goal are to: evolve spectrum management, expand... infrastructure to support wireless capabilities, and establish a mobile device security architecture (Takai, 2012, p. 2). By expanding infrastructure to...often used on Mobile Ad-Hoc Networks (MANETs). MANETS are infrastructure -less networks that include, but are not limited to, mobile devices. These

  2. An Efficient Method for Detecting Misbehaving Zone Manager in MANET

    NASA Astrophysics Data System (ADS)

    Rafsanjani, Marjan Kuchaki; Pakzad, Farzaneh; Asadinia, Sanaz

    In recent years, one of the wireless technologies increased tremendously is mobile ad hoc networks (MANETs) in which mobile nodes organize themselves without the help of any predefined infrastructure. MANETs are highly vulnerable to attack due to the open medium, dynamically changing network topology, cooperative algorithms, lack of centralized monitoring, management point and lack of a clear defense line. In this paper, we report our progress in developing intrusion detection (ID) capabilities for MANET. In our proposed scheme, the network with distributed hierarchical architecture is partitioned into zones, so that in each of them there is one zone manager. The zone manager is responsible for monitoring the cluster heads in its zone and cluster heads are in charge of monitoring their members. However, the most important problem is how the trustworthiness of the zone manager can be recognized. So, we propose a scheme in which "honest neighbors" of zone manager specify the validation of their zone manager. These honest neighbors prevent false accusations and also allow manager if it is wrongly misbehaving. However, if the manger repeats its misbehavior, then it will lose its management degree. Therefore, our scheme will be improved intrusion detection and also provide a more reliable network.

  3. The Inevitability of Sleep: Using Manet's Last Paintings to Envision a Pedagogy of Loss and Mourning

    ERIC Educational Resources Information Center

    Otto, Stacy

    2013-01-01

    In this article, the author offers Manet's last paintings as metaphors for a bygone, psychically healthy conception of loss and mourning, what is called the pre-Freudian, Victorian notion of loss (Otto 2008), which contrasts with the post-Freudian, Modern notion of loss and mourning (Otto 2008). Otto argues this liminal, transitional moment…

  4. Mobility based key management technique for multicast security in mobile ad hoc networks.

    PubMed

    Madhusudhanan, B; Chitra, S; Rajan, C

    2015-01-01

    In MANET multicasting, forward and backward secrecy result in increased packet drop rate owing to mobility. Frequent rekeying causes large message overhead which increases energy consumption and end-to-end delay. Particularly, the prevailing group key management techniques cause frequent mobility and disconnections. So there is a need to design a multicast key management technique to overcome these problems. In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. A multicast tree is constructed such that for every weak node, there is a strong parent node. A session key-based encryption technique is utilized to transmit a multicast data. The rekeying process is performed periodically by the initiator node. The rekeying interval is fixed depending on the node category so that this technique greatly minimizes the rekeying overhead. By simulation results, we show that our proposed approach reduces the packet drop rate and improves the data confidentiality.

  5. Service discovery with routing protocols for MANETs

    NASA Astrophysics Data System (ADS)

    Gu, Xuemai; Shi, Shuo

    2005-11-01

    Service discovery is becoming an important topic as its use throughout the Internet becomes more widespread. In Mobile Ad hoc Networks (MANETs), the routing protocol is very important because it is special network. To find a path for data, and destination nodes, nodes send packets to each node, creating substantial overhead traffic and consuming much time. Even though a variety of routing protocols have been developed for use in MANETs, they are insufficient for reducing overhead traffic and time. In this paper, we propose SDRP: a new service discovery protocol combined with routing policies in MANETs. The protocol is performed upon a distributed network. We describe a service by a unique ID number and use a group-cast routing policy in advertisement and request. The group-cast routing policy decreases the traffic in networks, and it is efficient to find destination node. In addition, the nodes included in the reply path also cache the advertisement information, and it means when each node finds a node next time, they can know where it is as soon as possible, so they minimize the time. Finally, we compare SDRP with both Flood and MAODV in terms of overload, and average delay. Simulation results show SDRP can spend less response time and accommodate even high mobility network environments.

  6. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks

    PubMed Central

    Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J.; Segarra, Esteve Pallarès; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Gargallo, Emilio Sanvicente

    2015-01-01

    The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic.Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs. PMID:25897496

  7. Virtual machine-based simulation platform for mobile ad-hoc network-based cyber infrastructure

    DOE PAGES

    Yoginath, Srikanth B.; Perumalla, Kayla S.; Henz, Brian J.

    2015-09-29

    In modeling and simulating complex systems such as mobile ad-hoc networks (MANETs) in de-fense communications, it is a major challenge to reconcile multiple important considerations: the rapidity of unavoidable changes to the software (network layers and applications), the difficulty of modeling the critical, implementation-dependent behavioral effects, the need to sustain larger scale scenarios, and the desire for faster simulations. Here we present our approach in success-fully reconciling them using a virtual time-synchronized virtual machine(VM)-based parallel ex-ecution framework that accurately lifts both the devices as well as the network communications to a virtual time plane while retaining full fidelity. At themore » core of our framework is a scheduling engine that operates at the level of a hypervisor scheduler, offering a unique ability to execute multi-core guest nodes over multi-core host nodes in an accurate, virtual time-synchronized manner. In contrast to other related approaches that suffer from either speed or accuracy issues, our framework provides MANET node-wise scalability, high fidelity of software behaviors, and time-ordering accuracy. The design and development of this framework is presented, and an ac-tual implementation based on the widely used Xen hypervisor system is described. Benchmarks with synthetic and actual applications are used to identify the benefits of our approach. The time inaccuracy of traditional emulation methods is demonstrated, in comparison with the accurate execution of our framework verified by theoretically correct results expected from analytical models of the same scenarios. In the largest high fidelity tests, we are able to perform virtual time-synchronized simulation of 64-node VM-based full-stack, actual software behaviors of MANETs containing a mix of static and mobile (unmanned airborne vehicle) nodes, hosted on a 32-core host, with full fidelity of unmodified ad-hoc routing protocols, unmodified application executables, and user-controllable physical layer effects including inter-device wireless signal strength, reachability, and connectivity.« less

  8. Virtual machine-based simulation platform for mobile ad-hoc network-based cyber infrastructure

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yoginath, Srikanth B.; Perumalla, Kayla S.; Henz, Brian J.

    In modeling and simulating complex systems such as mobile ad-hoc networks (MANETs) in de-fense communications, it is a major challenge to reconcile multiple important considerations: the rapidity of unavoidable changes to the software (network layers and applications), the difficulty of modeling the critical, implementation-dependent behavioral effects, the need to sustain larger scale scenarios, and the desire for faster simulations. Here we present our approach in success-fully reconciling them using a virtual time-synchronized virtual machine(VM)-based parallel ex-ecution framework that accurately lifts both the devices as well as the network communications to a virtual time plane while retaining full fidelity. At themore » core of our framework is a scheduling engine that operates at the level of a hypervisor scheduler, offering a unique ability to execute multi-core guest nodes over multi-core host nodes in an accurate, virtual time-synchronized manner. In contrast to other related approaches that suffer from either speed or accuracy issues, our framework provides MANET node-wise scalability, high fidelity of software behaviors, and time-ordering accuracy. The design and development of this framework is presented, and an ac-tual implementation based on the widely used Xen hypervisor system is described. Benchmarks with synthetic and actual applications are used to identify the benefits of our approach. The time inaccuracy of traditional emulation methods is demonstrated, in comparison with the accurate execution of our framework verified by theoretically correct results expected from analytical models of the same scenarios. In the largest high fidelity tests, we are able to perform virtual time-synchronized simulation of 64-node VM-based full-stack, actual software behaviors of MANETs containing a mix of static and mobile (unmanned airborne vehicle) nodes, hosted on a 32-core host, with full fidelity of unmodified ad-hoc routing protocols, unmodified application executables, and user-controllable physical layer effects including inter-device wireless signal strength, reachability, and connectivity.« less

  9. IDMA: improving the defense against malicious attack for mobile ad hoc networks based on ARIP protocol

    NASA Astrophysics Data System (ADS)

    Peng, Chaorong; Chen, Chang Wen

    2008-04-01

    Malicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks (MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes. However, the defense against malicious attack can be improved when a new layer of network architecture can be developed to separate true IP address from disclosing to the malicious nodes. In this paper, we propose a new algorithm to improve the defense against malicious attack (IDMA) that is based on a recently developed Assignment Router Identify Protocol (ARIP) for the clustering-based MANET management. In the ARIP protocol, we design the ARIP architecture based on the new Identity instead of the vulnerable IP addresses to provide the required security that is embedded seamlessly into the overall network architecture. We make full use of ARIP's special property to monitor gateway forward packets by Reply Request Route Packets (RREP) without additional intrusion detection layer. We name this new algorithm IDMA because of its inherent capability to improve the defense against malicious attacks. Through IDMA, a watching algorithm can be established so as to counterattack the malicious node in the routing path when it unusually drops up packets. We provide analysis examples for IDMA for the defense against a malicious node that disrupts the route discovery by impersonating the destination, or by responding with state of corrupted routing information, or by disseminating forged control traffic. The IDMA algorithm is able to counterattack the malicious node in the cases when the node lunch DoS attack by broadcast a large number of route requests, or make Target traffic congestion by delivering huge mount of data; or spoof the IP addresses and send forge packets with a fake ID to the same Target causing traffic congestion at that destination. We have implemented IDMA algorism using the GloMoSim simulator and have demonstrated its performance under a variety of operational conditions.

  10. A Fresh Look at Internet Protocol Version 6 (IPv6) for Department of Defense (DoD) Networks

    DTIC Science & Technology

    2010-08-01

    since system administration practices (such as the use of security appliances) depend heavily on tools for network management, diagnosis and protection...are mobile ad hoc networks (MANETs) and yet there is limited practical experience with MANETs and their performance. Further, the interaction between...Systems FCS Future Combat System IETF Internet Engineering Task Force ISAT Information Science and Technology BAST Board on Army Science and

  11. Analyzing the Effectiveness of the Self-organized Public-Key Management System on MANETs under the Lack of Cooperation and the Impersonation Attacks

    NASA Astrophysics Data System (ADS)

    da Silva, Eduardo; Dos Santos, Aldri Luiz; Lima, Michele N.; Albini, Luiz Carlos Pessoa

    Among the key management schemes for MANETs, the Self-Organized Public-Key Management System (PGP-Like) is the main chaining-based key management scheme. It is fully self-organized and does not require any certificate authority. Two kinds of misbehavior attacks are considered to be great threats to PGP-Like: lack of cooperation and impersonation attacks. This work quantifies the impact of such attacks on the PGP-Like. Simulation results show that PGP-Like was able to maintain its effectiveness when submitted to the lack of cooperation attack, contradicting previously theoretical results. It correctly works even in the presence of more than 60% of misbehaving nodes, although the convergence time is affected with only 20% of misbehaving nodes. On the other hand, PGP-Like is completely vulnerable to the impersonation attack. Its functionality is affected with just 5% of misbehaving nodes, confirming previously theoretical results.

  12. Geo-Based Inter-Domain Routing (GIDR) Protocol for MANETS

    DTIC Science & Technology

    2009-10-01

    routing, and support for node mobility. Crowcroft et al. proposed Plutarch as architecture to translate address spaces and transport protocols among...Warfield, “ Plutarch : an argument for network pluralism,” ACM Computer Communication Review, vol. 33, no. 4, pp. 258–266, 2003. [6] S. Schmid, L

  13. On the routing protocol influence on the resilience of wireless sensor networks to jamming attacks.

    PubMed

    Del-Valle-Soto, Carolina; Mex-Perera, Carlos; Monroy, Raul; Nolazco-Flores, Juan Arturo

    2015-03-27

    In this work, we compare a recently proposed routing protocol, the multi-parent hierarchical (MPH) protocol, with two well-known protocols, the ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR). For this purpose, we have developed a simulator, which faithfully reifies the workings of a given protocol, considering a fixed, reconfigurable ad hoc network given by the number and location of participants, and general network conditions. We consider a scenario that can be found in a large number of wireless sensor network applications, a single sink node that collects all of the information generated by the sensors. The metrics used to compare the protocols were the number of packet retransmissions, carrier sense multiple access (CSMA) inner loop retries, the number of nodes answering the queries from the coordinator (sink) node and the energy consumption. We tested the network under ordinary (without attacks) conditions (and combinations thereof) and when it is subject to different types of jamming attacks (in particular, random and reactive jamming attacks), considering several positions for the jammer. Our results report that MPH has a greater ability to tolerate such attacks than DSR and AODV, since it minimizes and encapsulates the network segment under attack. The self-configuring capabilities of MPH derived from a combination of a proactive routes update, on a periodic-time basis, and a reactive behavior provide higher resilience while offering a better performance (overhead and energy consumption) than AODV and DSR, as shown in our simulation results.

  14. Anomaly Detection for Data Reduction in an Unattended Ground Sensor (UGS) Field

    DTIC Science & Technology

    2014-09-01

    information (shown with solid lines in the diagram). Typically, this would be a mobile ad - hoc network (MANET). The clusters are connected to other nodes...interquartile ranges MANET mobile ad - hoc network OSUS Open Standards for Unattended Sensors TOC tactical operations center UAVs unmanned aerial vehicles...19b. TELEPHONE NUMBER (Include area code ) 301-394-1221 Standard Form 298 (Rev. 8/98) Prescribed by ANSI Std. Z39.18 iii Contents List of

  15. An Analysis Platform for Mobile Ad Hoc Network (MANET) Scenario Execution Log Data

    DTIC Science & Technology

    2016-01-01

    these technologies. 4.1 Backend Technologies • Java 1.8 • my-sql-connector- java -5.0.8.jar • Tomcat • VirtualBox • Kali MANET Virtual Machine 4.2...Frontend Technologies • LAMPP 4.3 Database • MySQL Server 5. Database The SEDAP database settings and structure are described in this section...contains all the backend java functionality including the web services, should be placed in the webapps directory inside the Tomcat installation

  16. Scalable Lunar Surface Networks and Adaptive Orbit Access

    NASA Technical Reports Server (NTRS)

    Wang, Xudong

    2015-01-01

    Teranovi Technologies, Inc., has developed innovative network architecture, protocols, and algorithms for both lunar surface and orbit access networks. A key component of the overall architecture is a medium access control (MAC) protocol that includes a novel mechanism of overlaying time division multiple access (TDMA) and carrier sense multiple access with collision avoidance (CSMA/CA), ensuring scalable throughput and quality of service. The new MAC protocol is compatible with legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11 networks. Advanced features include efficiency power management, adaptive channel width adjustment, and error control capability. A hybrid routing protocol combines the advantages of ad hoc on-demand distance vector (AODV) routing and disruption/delay-tolerant network (DTN) routing. Performance is significantly better than AODV or DTN and will be particularly effective for wireless networks with intermittent links, such as lunar and planetary surface networks and orbit access networks.

  17. A lightweight neighbor-info-based routing protocol for no-base-station taxi-call system.

    PubMed

    Zhu, Xudong; Wang, Jinhang; Chen, Yunchao

    2014-01-01

    Since the quick topology change and short connection duration, the VANET has had unstable routing and wireless signal quality. This paper proposes a kind of lightweight routing protocol-LNIB for call system without base station, which is applicable to the urban taxis. LNIB maintains and predicts neighbor information dynamically, thus finding the reliable path between the source and the target. This paper describes the protocol in detail and evaluates the performance of this protocol by simulating under different nodes density and speed. The result of evaluation shows that the performance of LNIB is better than AODV which is a classic protocol in taxi-call scene.

  18. Ad Hoc Networking for Unmanned Ground Vehicles: Design and Evaluation at Command, Control, Communications, Intelligence, Surveillance and Reconnaissance On-the-Move

    DTIC Science & Technology

    2006-11-01

    software components used in the ad hoc nodes for the C4ISR OTM experiment were OLSRD, an open-source proactive MANET routing software, and OpenVPN , an...developed by Mike Baker (openwrt.org). 6OpenVPN is a trademark of OpenVPN Solutions LLC. 6 Secure communications in the MANET are achieved with...encryption provided by Wired Equivalent Privacy (WEP) and OpenVPN . The WEP protocol, which is part of the IEEE 802.11 wireless networking standard

  19. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  20. Adaptive, Tactical Mesh Networking: Control Base MANET Model

    DTIC Science & Technology

    2010-09-01

    pp. 316–320 Available: IEEE Xplore , http://ieeexplore.ieee.org [Accessed: June 9, 2010]. [5] N. Sidiropoulos, “Multiuser Transmit Beamforming...Mobile Mesh Segments of TNT Testbed .......... 11 Figure 5. Infrastructure and Ad Hoc Mode of IEEE 802.11................................ 13 Figure...6. The Power Spectral Density of OFDM................................................ 14 Figure 7. A Typical IEEE 802.16 Network

  1. An Optimal CDS Construction Algorithm with Activity Scheduling in Ad Hoc Networks

    PubMed Central

    Penumalli, Chakradhar; Palanichamy, Yogesh

    2015-01-01

    A new energy efficient optimal Connected Dominating Set (CDS) algorithm with activity scheduling for mobile ad hoc networks (MANETs) is proposed. This algorithm achieves energy efficiency by minimizing the Broadcast Storm Problem [BSP] and at the same time considering the node's remaining energy. The Connected Dominating Set is widely used as a virtual backbone or spine in mobile ad hoc networks [MANETs] or Wireless Sensor Networks [WSN]. The CDS of a graph representing a network has a significant impact on an efficient design of routing protocol in wireless networks. Here the CDS is a distributed algorithm with activity scheduling based on unit disk graph [UDG]. The node's mobility and residual energy (RE) are considered as parameters in the construction of stable optimal energy efficient CDS. The performance is evaluated at various node densities, various transmission ranges, and mobility rates. The theoretical analysis and simulation results of this algorithm are also presented which yield better results. PMID:26221627

  2. On Modeling of Adversary Behavior and Defense for Survivability of Military MANET Applications

    DTIC Science & Technology

    2015-01-01

    anomaly detection technique. b) A system-level majority-voting based intrusion detection system with m being the number of verifiers used to perform...pp. 1254 - 1263. [5] R. Mitchell, and I.R. Chen, “Adaptive Intrusion Detection for Unmanned Aircraft Systems based on Behavior Rule Specification...and adaptively trigger the best attack strategies while avoiding detection and eviction. The second step is to model defense behavior of defenders

  3. A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET

    PubMed Central

    Jen, Shang-Ming; Laih, Chi-Sung; Kuo, Wen-Chung

    2009-01-01

    MANET, due to the nature of wireless transmission, has more security issues compared to wired environments. A specific type of attack, the Wormhole attack does not require exploiting any nodes in the network and can interfere with the route establishment process. Instead of detecting wormholes from the role of administrators as in previous methods, we implement a new protocol, MHA, using a hop-count analysis from the viewpoint of users without any special environment assumptions. We also discuss previous works which require the role of administrator and their reliance on impractical assumptions, thus showing the advantages of MHA. PMID:22408566

  4. A new clustering strategy

    NASA Astrophysics Data System (ADS)

    Feng, Jian-xin; Tang, Jia-fu; Wang, Guang-xing

    2007-04-01

    On the basis of the analysis of clustering algorithm that had been proposed for MANET, a novel clustering strategy was proposed in this paper. With the trust defined by statistical hypothesis in probability theory and the cluster head selected by node trust and node mobility, this strategy can realize the function of the malicious nodes detection which was neglected by other clustering algorithms and overcome the deficiency of being incapable of implementing the relative mobility metric of corresponding nodes in the MOBIC algorithm caused by the fact that the receiving power of two consecutive HELLO packet cannot be measured. It's an effective solution to cluster MANET securely.

  5. Catalyst. Volume 8, Number 3, Spring 2007

    ERIC Educational Resources Information Center

    Ryan, Barbara E., Ed.

    2007-01-01

    The U.S. Department of Education's Higher Education Center for Alcohol and Other Drug Abuse and Violence Prevention publishes "Catalyst," a newsletter covering current Alcohol and Other Drug Abuse and Violence (AODV) prevention issues at institutions of higher education. "Catalyst" discusses emerging issues and highlights…

  6. Catalyst, Volume 7, Number 2, Winter 2006

    ERIC Educational Resources Information Center

    Ryan, Barbara E., Ed.

    2006-01-01

    The U.S. Department of Education's Higher Education Center for Alcohol and Other Drug Abuse and Violence Prevention publishes "Catalyst," a newsletter covering current Alcohol and Other Drug Abuse and Violence (AODV) prevention issues at institutions of higher education. "Catalyst" discusses emerging issues and highlights…

  7. Catalyst, Volume 7, Number 3, Spring 2006

    ERIC Educational Resources Information Center

    Ryan, Barbara E., Ed.

    2006-01-01

    The U.S. Department of Education's Higher Education Center for Alcohol and Other Drug Abuse and Violence Prevention publishes "Catalyst," a newsletter covering current Alcohol and Other Drug Abuse and Violence (AODV) prevention issues at institutions of higher education. "Catalyst" discusses emerging issues and highlights…

  8. Catalyst. Volume 8, Number 2, Winter 2007

    ERIC Educational Resources Information Center

    Ryan, Barbara E., Ed.

    2007-01-01

    The U.S. Department of Education's Higher Education Center for Alcohol and Other Drug Abuse and Violence Prevention publishes "Catalyst," a newsletter covering current Alcohol and Other Drug Abuse and Violence (AODV) prevention issues at institutions of higher education. "Catalyst" discusses emerging issues and highlights…

  9. Catalyst, Volume 8, Number 1, Summer 2006

    ERIC Educational Resources Information Center

    Ryan, Barbara E., Ed.

    2006-01-01

    The U.S. Department of Education's Higher Education Center for Alcohol and Other Drug Abuse and Violence Prevention publishes "Catalyst," a newsletter covering current Alcohol and Other Drug Abuse and Violence (AODV) prevention issues at institutions of higher education. "Catalyst" discusses emerging issues and highlights innovative efforts on…

  10. Catalyst, Volume 9, Number 3, Winter 2008

    ERIC Educational Resources Information Center

    Ryan, Barbara E., Ed.

    2008-01-01

    The U.S. Department of Education's Higher Education Center for Alcohol and Other Drug Abuse and Violence Prevention publishes "Catalyst," a newsletter covering current Alcohol and Other Drug Abuse and Violence (AODV) prevention issues at institutions of higher education. "Catalyst" discusses emerging issues and highlights innovative efforts on…

  11. Trust Threshold Based Public Key Management in Mobile Ad Hoc Networks

    DTIC Science & Technology

    2016-03-05

    should operate in a self-organized way. Capkun t al. [15] proposed a certificate-based self-organized pub- c key management for MANETs by removing...period allo node started with ignorance interact with other nodes, th not reach T th Table 2 Attack behavior for operations . Operation Attack...section, we discuss the core operations o CTPKM as illustrated by Fig. 1 . Each mobile entity is able t communicate with other entities using public

  12. Mobile Security Enclaves

    DTIC Science & Technology

    2011-09-01

    LAI Location Area Identity MANET Mobile Ad - hoc Network MCC Mobile Country Code MCD Mobile Communications Device MNC Mobile Network Code ...tower or present within a geographical area. These conditions relate directly to users who often operate with mobile ad - hoc networks. These types of...infrastructures. First responders can use these mobile base stations to set up their own networks on the fly, similar to mobile ad - hoc networks

  13. Internal strains after recovery of hardness in tempered martensitic steels for fusion reactors

    NASA Astrophysics Data System (ADS)

    Brunelli, L.; Gondi, P.; Montanari, R.; Coppola, R.

    1991-03-01

    After tempering, with recovery of hardness, MANET steels present internal strains; these residual strains increase with quenching rate prior to tempering, and they remain after prolonged tempering times. On account of their persistence, after thermal treatments which lead to low dislocation and sub-boundary densities, the possibility has been considered that the high swelling resistance of MANET is connected with these centres of strain, probably connected with the formation, in ferrite, of Cr-enriched and contiguous Cr-depleted zones which may act as sinks for interstitials. Comparative observations on the internal strain behaviour of cold worked 316L stainless steel appear consistent with this possibility.

  14. A miniaturized test method for the mechanical characterization of structural materials for fusion reactors

    NASA Astrophysics Data System (ADS)

    Gondi, P.; Donato, A.; Montanari, R.; Sili, A.

    1996-10-01

    This work deals with a non-destructive method for mechanical tests which is based on the indentation of materials at a constant rate by means of a cylinder with a small radius and penetrating flat surface. The load versus penetration depth curves obtained using this method have shown correspondences with those of tensile tests and have given indications about the mechanical properties on a reduced scale. In this work penetration tests have been carried out on various kinds of Cr martensitic steels (MANET-2, BATMAN and modified F82H) which are of interest for first wall and structural applications in future fusion reactors. The load versus penetration depth curves have been examined with reference to data obtained in tensile tests and to microhardness measurements. Penetration tests have been performed at various temperature (from -180 to 100°C). Conclusions, which can be drawn for the ductile to brittle transition, are discussed for MANET-2 steel. Preliminary results obtained on BATMAN and modified F82H steels are reported. The characteristics of the indenter imprints have been studied by scanning electron microscopy.

  15. Using Link Disconnection Entropy Disorder to Detect Fast Moving Nodes in MANETs.

    PubMed

    Alvarez, Carlos F; Palafox, Luis E; Aguilar, Leocundo; Sanchez, Mauricio A; Martinez, Luis G

    2016-01-01

    Mobile ad-hoc networks (MANETs) are dynamic by nature; this dynamism comes from node mobility, traffic congestion, and other transmission conditions. Metrics to evaluate the effects of those conditions shine a light on node's behavior in an ad-hoc network, helping to identify the node or nodes with better conditions of connection. In this paper, we propose a relative index to evaluate a single node reliability, based on the link disconnection entropy disorder using neighboring nodes as reference. Link disconnection entropy disorder is best used to identify fast moving nodes or nodes with unstable communications, this without the need of specialized sensors such as GPS. Several scenarios were studied to verify the index, measuring the effects of Speed and traffic density on the link disconnection entropy disorder. Packet delivery ratio is associated to the metric detecting a strong relationship, enabling the use of the link disconnection entropy disorder to evaluate the stability of a node to communicate with other nodes. To expand the utilization of the link entropy disorder, we identified nodes with higher speeds in network simulations just by using the link entropy disorder.

  16. Delay and cost performance analysis of the diffie-hellman key exchange protocol in opportunistic mobile networks

    NASA Astrophysics Data System (ADS)

    Soelistijanto, B.; Muliadi, V.

    2018-03-01

    Diffie-Hellman (DH) provides an efficient key exchange system by reducing the number of cryptographic keys distributed in the network. In this method, a node broadcasts a single public key to all nodes in the network, and in turn each peer uses this key to establish a shared secret key which then can be utilized to encrypt and decrypt traffic between the peer and the given node. In this paper, we evaluate the key transfer delay and cost performance of DH in opportunistic mobile networks, a specific scenario of MANETs where complete end-to-end paths rarely exist between sources and destinations; consequently, the end-to-end delays in these networks are much greater than typical MANETs. Simulation results, driven by a random node movement model and real human mobility traces, showed that DH outperforms a typical key distribution scheme based on the RSA algorithm in terms of key transfer delay, measured by average key convergence time; however, DH performs as well as the benchmark in terms of key transfer cost, evaluated by total key (copies) forwards.

  17. Intrusion Detection for Defense at the MAC and Routing Layers of Wireless Networks

    DTIC Science & Technology

    2007-01-01

    Space DoS Denial of Service DSR Dynamic Source Routing IDS Intrusion Detection System LAR Location-Aided Routing MAC Media Access Control MACA Multiple...different mobility parameters. 10 They simulate interaction between three MAC protocols ( MACA , 802.11 and CSMA) and three routing protocols (AODV, DSR

  18. Catalyst, Volume 7, Number 1, Spring 2005

    ERIC Educational Resources Information Center

    Ryan, Barbara E., Ed.

    2005-01-01

    The Higher Education Center for Alcohol and Other Drug Abuse and Violence Prevention publishes Catalyst, a newsletter covering current AODV prevention issues at institutions of higher education. Catalyst discusses emerging issues and highlights innovative efforts on campuses that may be helpful at other institutions of higher education. The topics…

  19. Managing Network Security Policies in Tactical Manet’s Using Drama

    DTIC Science & Technology

    2010-08-04

    Cheng, M. Raykova, A. Poylisher, S. Alexander, M. Eiger, S. M. Bellovin, “ The Zodiac Policy Subsystem: A Policy-Based Management System for a High...hour per response, including the time for reviewing instructions, searching data sources, gathering and maintaining the data needed, and completing and...reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information

  20. Primary path reservation using enhanced slot assignment in TDMA for session admission.

    PubMed

    Koneri Chandrasekaran, Suresh; Savarimuthu, Prakash; Andi Elumalai, Priya; Ayyaswamy, Kathirvel

    2015-01-01

    Mobile ad hoc networks (MANET) is a self-organized collection of nodes that communicates without any infrastructure. Providing quality of service (QoS) in such networks is a competitive task due to unreliable wireless link, mobility, lack of centralized coordination, and channel contention. The success of many real time applications is purely based on the QoS, which can be achieved by quality aware routing (QAR) and admission control (AC). Recently proposed QoS mechanisms do focus completely on either reservation or admission control but are not better enough. In MANET, high mobility causes frequent path break due to the fact that every time the source node must find the route. In such cases the QoS session is affected. To admit a QoS session, admission control protocols must ensure the bandwidth of the relaying path before transmission starts; reservation of such bandwidth noticeably improves the admission control performance. Many TDMA based reservation mechanisms are proposed but need some improvement over slot reservation procedures. In order to overcome this specific issue, we propose a framework-PRAC (primary path reservation admission control protocol), which achieves improved QoS by making use of backup route combined with resource reservation. A network topology has been simulated and our approach proves to be a mechanism that admits the session effectively.

  1. Strategic Planning for Prevention Professionals on Campus. A Prevention 101 Series Publication

    ERIC Educational Resources Information Center

    Langford, Linda; DeJong, William

    2008-01-01

    The nation's institutions of higher education continue to face serious problems with respect to student alcohol and other drug abuse and violence (AODV). For campus administrators, deciding how to respond effectively means understanding and taking into account both the complexity of these social problems and the individuality of each campus…

  2. Analysis of Soldier Radio Waveform Performance in Operational Test

    DTIC Science & Technology

    2015-05-01

    different frequencies based on carrier, uplink/downlink, and generation. In general, 2G and 3G cellular phones operate at 850 MHz uplink, and 1,900 MHz...spectrum management that may not be operationally feasible. These issues are not unique to SRW, but rather have plagued the mobile ad-hoc network... mobile ad-hoc network (MANET), enabling communication through a self-configuring, infrastructure-less network of mobile nodes. In the SS domain, these

  3. Connecting Land-Based Networks to Ships

    DTIC Science & Technology

    2012-09-01

    LAN Local Area Network LEO Low Earth Orbit LOS Line Of Sight MAC Media Access Control MANET Mobile Ad Hoc Networking ME Mobile...orbit – LEO ). Iridium satellite communication system is an example of LEO , while Inmarsat uses MEO and GEO. GEO satellites are the most common type...August 2012, http://www.cosmote.gr/cosmoportal/page/T25/section/Cover/ loc /en_U.S. [41] WIND, “Network Coverage map,” August 2012, http

  4. An adaptive density-based routing protocol for flying Ad Hoc networks

    NASA Astrophysics Data System (ADS)

    Zheng, Xueli; Qi, Qian; Wang, Qingwen; Li, Yongqiang

    2017-10-01

    An Adaptive Density-based Routing Protocol (ADRP) for Flying Ad Hoc Networks (FANETs) is proposed in this paper. The main objective is to calculate forwarding probability adaptively in order to increase the efficiency of forwarding in FANETs. ADRP dynamically fine-tunes the rebroadcasting probability of a node for routing request packets according to the number of neighbour nodes. Indeed, it is more interesting to privilege the retransmission by nodes with little neighbour nodes. We describe the protocol, implement it and evaluate its performance using NS-2 network simulator. Simulation results reveal that ADRP achieves better performance in terms of the packet delivery fraction, average end-to-end delay, normalized routing load, normalized MAC load and throughput, which is respectively compared with AODV.

  5. Using Link Disconnection Entropy Disorder to Detect Fast Moving Nodes in MANETs

    PubMed Central

    Palafox, Luis E.; Aguilar, Leocundo; Sanchez, Mauricio A.; Martinez, Luis G.

    2016-01-01

    Mobile ad-hoc networks (MANETs) are dynamic by nature; this dynamism comes from node mobility, traffic congestion, and other transmission conditions. Metrics to evaluate the effects of those conditions shine a light on node’s behavior in an ad-hoc network, helping to identify the node or nodes with better conditions of connection. In this paper, we propose a relative index to evaluate a single node reliability, based on the link disconnection entropy disorder using neighboring nodes as reference. Link disconnection entropy disorder is best used to identify fast moving nodes or nodes with unstable communications, this without the need of specialized sensors such as GPS. Several scenarios were studied to verify the index, measuring the effects of Speed and traffic density on the link disconnection entropy disorder. Packet delivery ratio is associated to the metric detecting a strong relationship, enabling the use of the link disconnection entropy disorder to evaluate the stability of a node to communicate with other nodes. To expand the utilization of the link entropy disorder, we identified nodes with higher speeds in network simulations just by using the link entropy disorder. PMID:27219671

  6. Applying self-organizing map and modified radial based neural network for clustering and routing optimal path in wireless network

    NASA Astrophysics Data System (ADS)

    Hoomod, Haider K.; Kareem Jebur, Tuka

    2018-05-01

    Mobile ad hoc networks (MANETs) play a critical role in today’s wireless ad hoc network research and consist of active nodes that can be in motion freely. Because it consider very important problem in this network, we suggested proposed method based on modified radial basis function networks RBFN and Self-Organizing Map SOM. These networks can be improved by the use of clusters because of huge congestion in the whole network. In such a system, the performance of MANET is improved by splitting the whole network into various clusters using SOM. The performance of clustering is improved by the cluster head selection and number of clusters. Modified Radial Based Neural Network is very simple, adaptable and efficient method to increase the life time of nodes, packet delivery ratio and the throughput of the network will increase and connection become more useful because the optimal path has the best parameters from other paths including the best bitrate and best life link with minimum delays. Proposed routing algorithm depends on the group of factors and parameters to select the path between two points in the wireless network. The SOM clustering average time (1-10 msec for stall nodes) and (8-75 msec for mobile nodes). While the routing time range (92-510 msec).The proposed system is faster than the Dijkstra by 150-300%, and faster from the RBFNN (without modify) by 145-180%.

  7. Problem Analysis: The First Step in Prevention Planning. A Prevention 101 Series Publication

    ERIC Educational Resources Information Center

    DeJong, William

    2009-01-01

    Student alcohol and other drug abuse and violence (AODV) still reign as the most serious social problems faced by U.S. institutions of higher education. To tackle these problems, campus administrators--working in conjunction with partners from the surrounding community--need to put in place an integrated set of strategies that address the mix of…

  8. Distribution of Information in Ad Hoc Networks

    DTIC Science & Technology

    2007-09-01

    2.4. MACA Protocol...................................20 Figure 2.5. Route discovery in AODV (From [32]).............28 Figure 2.6. Creation of a...19 Figure 2.3. Exposed terminal Problem (From [20]) (3) MACA and MACAW Protocols. One of the first protocols conceived for wireless local area...networks is MACA [21] (Multiple Accesses with Collision Avoidance). The transmitter sends a small packet, or RTS (Request To Send), which has little

  9. Dynamic social community detection and its applications.

    PubMed

    Nguyen, Nam P; Dinh, Thang N; Shen, Yilin; Thai, My T

    2014-01-01

    Community structure is one of the most commonly observed features of Online Social Networks (OSNs) in reality. The knowledge of this feature is of great advantage: it not only provides helpful insights into developing more efficient social-aware solutions but also promises a wide range of applications enabled by social and mobile networking, such as routing strategies in Mobile Ad Hoc Networks (MANETs) and worm containment in OSNs. Unfortunately, understanding this structure is very challenging, especially in dynamic social networks where social interactions are evolving rapidly. Our work focuses on the following questions: How can we efficiently identify communities in dynamic social networks? How can we adaptively update the network community structure based on its history instead of recomputing from scratch? To this end, we present Quick Community Adaptation (QCA), an adaptive modularity-based framework for not only discovering but also tracing the evolution of network communities in dynamic OSNs. QCA is very fast and efficient in the sense that it adaptively updates and discovers the new community structure based on its history together with the network changes only. This flexible approach makes QCA an ideal framework applicable for analyzing large-scale dynamic social networks due to its lightweight computing-resource requirement. To illustrate the effectiveness of our framework, we extensively test QCA on both synthesized and real-world social networks including Enron, arXiv e-print citation, and Facebook networks. Finally, we demonstrate the applicability of QCA in real applications: (1) A social-aware message forwarding strategy in MANETs, and (2) worm propagation containment in OSNs. Competitive results in comparison with other methods reveal that social-based techniques employing QCA as a community detection core outperform current available methods.

  10. Dynamic Social Community Detection and Its Applications

    PubMed Central

    Nguyen, Nam P.; Dinh, Thang N.; Shen, Yilin; Thai, My T.

    2014-01-01

    Community structure is one of the most commonly observed features of Online Social Networks (OSNs) in reality. The knowledge of this feature is of great advantage: it not only provides helpful insights into developing more efficient social-aware solutions but also promises a wide range of applications enabled by social and mobile networking, such as routing strategies in Mobile Ad Hoc Networks (MANETs) and worm containment in OSNs. Unfortunately, understanding this structure is very challenging, especially in dynamic social networks where social interactions are evolving rapidly. Our work focuses on the following questions: How can we efficiently identify communities in dynamic social networks? How can we adaptively update the network community structure based on its history instead of recomputing from scratch? To this end, we present Quick Community Adaptation (QCA), an adaptive modularity-based framework for not only discovering but also tracing the evolution of network communities in dynamic OSNs. QCA is very fast and efficient in the sense that it adaptively updates and discovers the new community structure based on its history together with the network changes only. This flexible approach makes QCA an ideal framework applicable for analyzing large-scale dynamic social networks due to its lightweight computing-resource requirement. To illustrate the effectiveness of our framework, we extensively test QCA on both synthesized and real-world social networks including Enron, arXiv e-print citation, and Facebook networks. Finally, we demonstrate the applicability of QCA in real applications: (1) A social-aware message forwarding strategy in MANETs, and (2) worm propagation containment in OSNs. Competitive results in comparison with other methods reveal that social-based techniques employing QCA as a community detection core outperform current available methods. PMID:24722164

  11. A Survey on Trust Management for Mobile Ad Hoc Networks

    DTIC Science & Technology

    2011-11-01

    expects, trust is dangerous implying the possible betrayal of trust. In his comments on Lagerspetz’s book titled Trust: The Tacit Demand, Lahno [24...AODV Zouridaki et al. (2005 ) [79] (2006) [80] Secure routing Direct observation [79][80] Reputation by secondhand information [80] Packet dropping...areas of signal processing, wireless communications, sensor and mobile ad hoc networks. He is co-editor of the book Wireless Sensor Networks: Signal

  12. Analytical Models of Cross-Layer Protocol Optimization in Real-Time Wireless Sensor Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    The real-time interactions among the nodes of a wireless sensor network (WSN) to cooperatively process data from multiple sensors are modeled. Quality-of-service (QoS) metrics are associated with the quality of fused information: throughput, delay, packet error rate, etc. Multivariate point process (MVPP) models of discrete random events in WSNs establish stochastic characteristics of optimal cross-layer protocols. Discrete-event, cross-layer interactions in mobile ad hoc network (MANET) protocols have been modeled using a set of concatenated design parameters and associated resource levels by the MVPPs. Characterization of the "best" cross-layer designs for a MANET is formulated by applying the general theory of martingale representations to controlled MVPPs. Performance is described in terms of concatenated protocol parameters and controlled through conditional rates of the MVPPs. Modeling limitations to determination of closed-form solutions versus explicit iterative solutions for ad hoc WSN controls are examined.

  13. Probabilistic monitoring in intrusion detection module for energy efficiency in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    De Rango, Floriano; Lupia, Andrea

    2016-05-01

    MANETs allow mobile nodes communicating to each other using the wireless medium. A key aspect of these kind of networks is the security, because their setup is done without an infrastructure, so external nodes could interfere in the communication. Mobile nodes could be compromised, misbehaving during the multi-hop transmission of data, or they could have a selfish behavior to save energy, which is another important constraint in MANETs. The detection of these behaviors need a framework that takes into account the latest interactions among nodes, so malicious or selfish nodes could be detected also if their behavior is changed over time. The monitoring activity increases the energy consumption, so our proposal takes into account this issue reducing the energy required by the monitoring system, keeping the effectiveness of the intrusion detection system. The results show an improvement in the saved energy, improving the detection performance too.

  14. A Survey on Trust Management for Mobile Ad Hoc Networks

    DTIC Science & Technology

    2010-07-01

    betrayal of trust. In his comments on Lagerspetz’s book titled Trust: The Tacit Demand, Lahno [24] describes the author’s view on trust as a moral...extension of AODV Zouridaki et al. (2005 ) [79] (2006) [80] Secure routing Direct observation [79][80] Reputation by secondhand information [80...the broad areas of signal processing, wireless communications, sensor and mobile ad hoc networks. He is co-editor of the book Wireless Sensor Networks

  15. An Optimal Method for Detecting Internal and External Intrusion in MANET

    NASA Astrophysics Data System (ADS)

    Rafsanjani, Marjan Kuchaki; Aliahmadipour, Laya; Javidi, Mohammad M.

    Mobile Ad hoc Network (MANET) is formed by a set of mobile hosts which communicate among themselves through radio waves. The hosts establish infrastructure and cooperate to forward data in a multi-hop fashion without a central administration. Due to their communication type and resources constraint, MANETs are vulnerable to diverse types of attacks and intrusions. In this paper, we proposed a method for prevention internal intruder and detection external intruder by using game theory in mobile ad hoc network. One optimal solution for reducing the resource consumption of detection external intruder is to elect a leader for each cluster to provide intrusion service to other nodes in the its cluster, we call this mode moderate mode. Moderate mode is only suitable when the probability of attack is low. Once the probability of attack is high, victim nodes should launch their own IDS to detect and thwart intrusions and we call robust mode. In this paper leader should not be malicious or selfish node and must detect external intrusion in its cluster with minimum cost. Our proposed method has three steps: the first step building trust relationship between nodes and estimation trust value for each node to prevent internal intrusion. In the second step we propose an optimal method for leader election by using trust value; and in the third step, finding the threshold value for notifying the victim node to launch its IDS once the probability of attack exceeds that value. In first and third step we apply Bayesian game theory. Our method due to using game theory, trust value and honest leader can effectively improve the network security, performance and reduce resource consumption.

  16. Scalable Mobile Ad Hoc Network (MANET) to Enhance Situational Awareness in Distributed Small Unit Operations

    DTIC Science & Technology

    2015-06-01

    raspberry pi , robotic operation system (ros), arduino 15. NUMBER OF PAGES 123 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT...51  2.  Raspberry Pi ...52  Figure 21.  The Raspberry Pi B+ model, from [24

  17. Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks

    DTIC Science & Technology

    2013-01-01

    high resiliency to malicious attacks and misbehaving nodes. Keywords—trust management; mobile ad hoc networks; QoS trust; social trust; trust...paper we address an importance issue of trust management protocol design for MANETs: trust bias minimization despite misbehaving nodes performing

  18. Multistage Security Mechanism For Hybrid, Large-Scale Wireless Sensor Networks

    DTIC Science & Technology

    2007-06-01

    sensor network . Building on research in the areas of the wireless sensor networks (WSN) and the mobile ad hoc networks (MANET), this thesis proposes an...A wide area network consisting of ballistic missile defense satellites and terrestrial nodes can be viewed as a hybrid, large-scale mobile wireless

  19. A survey on investigating the need for intelligent power-aware load balanced routing protocols for handling critical links in MANETs.

    PubMed

    Sivakumar, B; Bhalaji, N; Sivakumar, D

    2014-01-01

    In mobile ad hoc networks connectivity is always an issue of concern. Due to dynamism in the behavior of mobile nodes, efficiency shall be achieved only with the assumption of good network infrastructure. Presence of critical links results in deterioration which should be detected in advance to retain the prevailing communication setup. This paper discusses a short survey on the specialized algorithms and protocols related to energy efficient load balancing for critical link detection in the recent literature. This paper also suggests a machine learning based hybrid power-aware approach for handling critical nodes via load balancing.

  20. Security in MANETs using reputation-adjusted routing

    NASA Astrophysics Data System (ADS)

    Ondi, Attila; Hoffman, Katherine; Perez, Carlos; Ford, Richard; Carvalho, Marco; Allen, William

    2009-04-01

    Mobile Ad-Hoc Networks enable communication in various dynamic environments, including military combat operations. Their open and shared communication medium enables new forms of attack that are not applicable for traditional wired networks. Traditional security mechanisms and defense techniques are not prepared to cope with the new attacks and the lack of central authorities make identity verifications difficult. This work extends our previous work in the Biologically Inspired Tactical Security Infrastructure to provide a reputation-based weighing mechanism for linkstate routing protocols to protect the network from attackers that are corrupting legitimate network traffic. Our results indicate that the approach is successful in routing network traffic around compromised computers.

  1. A Survey on Investigating the Need for Intelligent Power-Aware Load Balanced Routing Protocols for Handling Critical Links in MANETs

    PubMed Central

    Sivakumar, B.; Bhalaji, N.; Sivakumar, D.

    2014-01-01

    In mobile ad hoc networks connectivity is always an issue of concern. Due to dynamism in the behavior of mobile nodes, efficiency shall be achieved only with the assumption of good network infrastructure. Presence of critical links results in deterioration which should be detected in advance to retain the prevailing communication setup. This paper discusses a short survey on the specialized algorithms and protocols related to energy efficient load balancing for critical link detection in the recent literature. This paper also suggests a machine learning based hybrid power-aware approach for handling critical nodes via load balancing. PMID:24790546

  2. UMDR: Multi-Path Routing Protocol for Underwater Ad Hoc Networks with Directional Antenna

    NASA Astrophysics Data System (ADS)

    Yang, Jianmin; Liu, Songzuo; Liu, Qipei; Qiao, Gang

    2018-01-01

    This paper presents a new routing scheme for underwater ad hoc networks based on directional antennas. Ad hoc networks with directional antennas have become a hot research topic because of space reuse may increase networks capacity. At present, researchers have applied traditional self-organizing routing protocols (such as DSR, AODV) [1] [2] on this type of networks, and the routing scheme is based on the shortest path metric. However, such routing schemes often suffer from long transmission delays and frequent link fragmentation along the intermediate nodes of the selected route. This is caused by a unique feature of directional transmission, often called as “deafness”. In this paper, we take a different approach to explore the advantages of space reuse through multipath routing. This paper introduces the validity of the conventional routing scheme in underwater ad hoc networks with directional antennas, and presents a special design of multipath routing algorithm for directional transmission. The experimental results show a significant performance improvement in throughput and latency.

  3. Multi-hop routing mechanism for reliable sensor computing.

    PubMed

    Chen, Jiann-Liang; Ma, Yi-Wei; Lai, Chia-Ping; Hu, Chia-Cheng; Huang, Yueh-Min

    2009-01-01

    Current research on routing in wireless sensor computing concentrates on increasing the service lifetime, enabling scalability for large number of sensors and supporting fault tolerance for battery exhaustion and broken nodes. A sensor node is naturally exposed to various sources of unreliable communication channels and node failures. Sensor nodes have many failure modes, and each failure degrades the network performance. This work develops a novel mechanism, called Reliable Routing Mechanism (RRM), based on a hybrid cluster-based routing protocol to specify the best reliable routing path for sensor computing. Table-driven intra-cluster routing and on-demand inter-cluster routing are combined by changing the relationship between clusters for sensor computing. Applying a reliable routing mechanism in sensor computing can improve routing reliability, maintain low packet loss, minimize management overhead and save energy consumption. Simulation results indicate that the reliability of the proposed RRM mechanism is around 25% higher than that of the Dynamic Source Routing (DSR) and ad hoc On-demand Distance Vector routing (AODV) mechanisms.

  4. Active Queue Management Mechanisms for Real-Time Traffic in MANETs

    DTIC Science & Technology

    2001-12-01

    characteristics do not change much over a short period of time, substituting indices and/or gains is possible. This study aims to provide general guidelines about... bpf for FEC and 1 bpf to provide future expansion(s) of the coder. Table 6. Federal Standard 1016 characteristics (After Ref. [37]). a...

  5. Intelligent routing protocol for ad hoc wireless network

    NASA Astrophysics Data System (ADS)

    Peng, Chaorong; Chen, Chang Wen

    2006-05-01

    A novel routing scheme for mobile ad hoc networks (MANETs), which combines hybrid and multi-inter-routing path properties with a distributed topology discovery route mechanism using control agents is proposed in this paper. In recent years, a variety of hybrid routing protocols for Mobile Ad hoc wireless networks (MANETs) have been developed. Which is proactively maintains routing information for a local neighborhood, while reactively acquiring routes to destinations beyond the global. The hybrid protocol reduces routing discovery latency and the end-to-end delay by providing high connectivity without requiring much of the scarce network capacity. On the other side the hybrid routing protocols in MANETs likes Zone Routing Protocol still need route "re-discover" time when a route between zones link break. Sine the topology update information needs to be broadcast routing request on local zone. Due to this delay, the routing protocol may not be applicable for real-time data and multimedia communication. We utilize the advantages of a clustering organization and multi-routing path in routing protocol to achieve several goals at the same time. Firstly, IRP efficiently saves network bandwidth and reduces route reconstruction time when a routing path fails. The IRP protocol does not require global periodic routing advertisements, local control agents will automatically monitor and repair broke links. Secondly, it efficiently reduces congestion and traffic "bottlenecks" for ClusterHeads in clustering network. Thirdly, it reduces significant overheads associated with maintaining clusters. Fourthly, it improves clusters stability due to dynamic topology changing frequently. In this paper, we present the Intelligent Routing Protocol. First, we discuss the problem of routing in ad hoc networks and the motivation of IRP. We describe the hierarchical architecture of IRP. We describe the routing process and illustrate it with an example. Further, we describe the control manage mechanisms, which are used to control active route and reduce the traffic amount in the route discovery procedure. Finial, the numerical experiments are given to show the effectiveness of IRP routing protocol.

  6. Construct mine environment monitoring system based on wireless mesh network

    NASA Astrophysics Data System (ADS)

    Chen, Xin; Ge, Gengyu; Liu, Yinmei; Cheng, Aimin; Wu, Jun; Fu, Jun

    2018-04-01

    The system uses wireless Mesh network as a network transmission medium, and strive to establish an effective and reliable underground environment monitoring system. The system combines wireless network technology and embedded technology to monitor the internal data collected in the mine and send it to the processing center for analysis and environmental assessment. The system can be divided into two parts: the main control network module and the data acquisition terminal, and the SPI bus technology is used for mutual communication between them. Multi-channel acquisition and control interface design Data acquisition and control terminal in the analog signal acquisition module, digital signal acquisition module, and digital signal output module. The main control network module running Linux operating system, in which the transplant SPI driver, USB card driver and AODV routing protocol. As a result, the internal data collection and reporting of the mine are realized.

  7. Implementing MANETS in Android based environment using Wi-Fi direct

    NASA Astrophysics Data System (ADS)

    Waqas, Muhammad; Babar, Mohammad Inayatullah Khan; Zafar, Mohammad Haseeb

    2015-05-01

    Packet loss occurs in real-time voice transmission over wireless broadcast Ad-hoc network which creates disruptions in sound. Basic objective of this research is to design a wireless Ad-hoc network based on two Android devices by using the Wireless Fidelity (WIFI) Direct Application Programming Interface (API) and apply the Network Codec, Reed Solomon Code. The network codec is used to encode the data of a music wav file and recover the lost packets if any, packets are dropped using a loss module at the transmitter device to analyze the performance with the objective of retrieving the original file at the receiver device using the network codec. This resulted in faster transmission of the files despite dropped packets. In the end both files had the original formatted music files with complete performance analysis based on the transmission delay.

  8. Commercial Technology at the Tactical Edge

    DTIC Science & Technology

    2013-06-01

    Typical environmental examples are survivability in the face of hostile action, lack of fixed infrastructure , high mobility and ruggedness...Disconnected, Intermittent, and Limited (DIL) Communications Delay Tolerance Mobile Ad Hoc Networks (MANETs) Loss of infrastructure Security Cyber...for Apple’s IOS.25 In particular, various vendors have built application infrastructures around the various mobile phone operating systems (OSs) such

  9. Litera Scripta Manet--The Written Word Endures.

    ERIC Educational Resources Information Center

    McKenzie, Hope Bussey

    Intended for college students and teachers of English literature, this paper examines the lives and works of three great medieval Anglo-Saxon priestly scholars whose Latin writings have preserved the Anglo-Saxon roots of the English language. The paper first describes the works of Aldhelm, born in 650 A.D., whose poetry was not in the Latin…

  10. Robust Network Design - Connectivity and Beyond

    DTIC Science & Technology

    2015-01-15

    utilize a heterogeneous set of physical links (RF, Optical/Laser and SATCOM), for interconnecting a set of terrestrial, space and highly mobile airborne...design of mobility patterns of airborne platforms to provide stable operating conditions,  the design of networks that enable graceful performance...research effort, Airborne Network research was primarily directed towards Mobile Ad-hoc Networks (MANET). From our experience in design and

  11. Designing Robust and Resilient Tactical MANETs

    DTIC Science & Technology

    2014-09-25

    Bounds on the Throughput Efficiency of Greedy Maximal Scheduling in Wireless Networks , IEEE/ACM Transactions on Networking , (06 2011): 0. doi: N... Wireless Sensor Networks and Effects of Long Range Dependant Data, Special IWSM Issue of Sequential Analysis, (11 2012): 0. doi: A. D. Dominguez...Bushnell, R. Poovendran. A Convex Optimization Approach for Clone Detection in Wireless Sensor Networks , Pervasive and Mobile Computing, (01 2012

  12. UGV Interoperability Profile (IOP) Communications Profile, Version 0

    DTIC Science & Technology

    2011-12-21

    some UGV systems employ Orthogonal Frequency Division Multiplexing ( OFDM ) or Coded Orthogonal Frequency Division Multiplexing (COFDM) waveforms which...other portions of the IOP. Attribute Paragraph Title Values Waveform 3.3 Air Interface/ Waveform OFDM , COFDM, DDL, CDL, None OCU to Platform...Sight MANET Mobile Ad-hoc Network Mbps Megabits per second MC/PM Master Controller/ Payload Manager MHz Megahertz MIMO Multiple Input Multiple

  13. Culture Shock: A Teacher's Guide To Accompany the Four-Part PBS Series Premiering January 2000.

    ERIC Educational Resources Information Center

    Jaffee, Cyrisse, Ed.; Sharma, Amina, Ed.

    This teacher's guide accompanies the four videos ("Born to Trouble: Adventures of Huckleberry Finn"; "The Shock of the Nude: Manet's Olympia"; "Hollywood Censored: Movies, Morality and the Production Code"; and "The Devil's Music: 1920s Jazz") of the PBS "Culture Shock" series. The guide suggests that the videos could be used in the…

  14. Fighting The Network: Manet Management In Support Of Littoral Operations

    DTIC Science & Technology

    2016-03-01

    Solomon , 2015). DL widens the scope of naval Surface Action Groups (SAG) operations, introducing the concept of Adaptive Force Package (AFP...be implemented in littoral tactical networks. CENETIX research utilizes three Wave Relay radio models for experimentation : the Man-Portable Unit...enable seamless continuity in the transfer of research knowledge to subsequent testing and CONOPS development. CENETIX field experimentation

  15. Performance Analysis of AeroRP with Ground Station Advertisements

    DTIC Science & Technology

    2012-03-12

    results showed that AeroRP outperforms the traditional MANET routing protocols in terms of throughput and packet delivery ra - tio (PDR) [5, 6]. AeroRP...and waiting for the source to re- send the packet increases the end-to-end delay. The AeroNP corruption indicator and HEC -CRC (header error check...Dev ID | NP HEC CRC-16 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ \\ \\ / AeroTP Payload

  16. The Charpy impact properties of martensitic 10.6% Cr steel (MANET-1) before and after neutron exposure

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rieth, M.; Dafferner, B.; Rohrig, H.D.

    1994-12-31

    The MANET-I martensitic 10.6% Cr type of steel was developed as a potential structural material for the first wall and the blanket of a fusion device within the framework of the Nuclear Fusion Project. An extensive irradiation program (FRUST/SIENA) was elaborated to study the influence of radiation upon the Charpy impact characteristics. In addition to unirradiated reference specimens, 87 irradiated subsize Charpy specimens (3 x 4 x 27 mm{sup 3}) were examined under eight different heat treatments at irradiation temperatures between 287{degrees}C and 475{degrees}C and exposure doses of 5 dpa to 15 dpa. On the basis of the numerous testmore » results and their interpretation it is possible to describe radiation induced material embrittlement, and, consequently, the deterioration of the Charpy impact properties. The description is limited, on the one hand, by the variations in the test results and, on the other hand, by the gaps in the test matrix. Therefore, additional investigations, especially in the low irradiation temperature and low dose regimes will be the subject of further ongoing work.« less

  17. A hop count based heuristic routing protocol for mobile delay tolerant networks.

    PubMed

    You, Lei; Li, Jianbo; Wei, Changjiang; Dai, Chenqu; Xu, Jixing; Hu, Lejuan

    2014-01-01

    Routing in delay tolerant networks (DTNs) is a challenge since it must handle network partitioning, long delays, and dynamic topology. Meanwhile, routing protocols of the traditional mobile ad hoc networks (MANETs) cannot work well due to the failure of its assumption that most network connections are available. In this paper, we propose a hop count based heuristic routing protocol by utilizing the information carried by the peripatetic packets in the network. A heuristic function is defined to help in making the routing decision. We formally define a custom operation for square matrices so as to transform the heuristic value calculation into matrix manipulation. Finally, the performance of our proposed algorithm is evaluated by the simulation results, which show the advantage of such self-adaptive routing protocol in the diverse circumstance of DTNs.

  18. A Hop Count Based Heuristic Routing Protocol for Mobile Delay Tolerant Networks

    PubMed Central

    Wei, Changjiang; Dai, Chenqu; Xu, Jixing; Hu, Lejuan

    2014-01-01

    Routing in delay tolerant networks (DTNs) is a challenge since it must handle network partitioning, long delays, and dynamic topology. Meanwhile, routing protocols of the traditional mobile ad hoc networks (MANETs) cannot work well due to the failure of its assumption that most network connections are available. In this paper, we propose a hop count based heuristic routing protocol by utilizing the information carried by the peripatetic packets in the network. A heuristic function is defined to help in making the routing decision. We formally define a custom operation for square matrices so as to transform the heuristic value calculation into matrix manipulation. Finally, the performance of our proposed algorithm is evaluated by the simulation results, which show the advantage of such self-adaptive routing protocol in the diverse circumstance of DTNs. PMID:25110736

  19. A microstructural comparison of two nuclear-grade martensitic steels using small-angle neutron scattering

    NASA Astrophysics Data System (ADS)

    Coppola, R.; Fiori, F.; Little, E. A.; Magnani, M.

    1997-06-01

    Results are presented of a small-angle neutron scattering (SANS) study on two 10-13% Cr martensitic stainless steels of interest for nuclear applications, viz. DIN 1.4914 (MANET specification, for fusion reactors) and AISI 410. The investigation has focussed principally on microstructural effects associated with the differences in chromium content between the two alloys. The size distribution functions determined from nuclear and magnetic SANS components for the two steels given identical heat treatments are in accord with an interpretation based on the presence of ˜ 1 nm size CCr aggregates in the microstructure. Much larger (˜ 10 nm) scattering inhomogeneities with different magnetic contrast are also present and tentatively identified as carbides.

  20. pyGFC - A Python Extension to the C++ Geodesy Foundation Classes

    DTIC Science & Technology

    2008-09-01

    imperative for a successful emulation of a dynamic MANET as intended. To achieve this objective, the same algorithm and its implementation for...solution has two options: (1) selecting, implementing, and integrating an appropriate algorithm into the tool and in the MANE system, or (2) using an...GFCCoord *estimate_southeast_coords(double, double); double lat; double lon; double alt; private: CEarth *earth; char * cstr

  1. DAWN: Dynamic Ad-hoc Wireless Network

    DTIC Science & Technology

    2016-06-19

    DAWN: Dynamic Ad-hoc Wireless Network The DAWN (Dynamic Ad-hoc Wireless Networks) project is developing a general theory of complex and dynamic... wireless communication networks. To accomplish this, DAWN adopts a very different approach than those followed in the past and summarized above. DAWN... wireless communication networks. The members of DAWN investigated difference aspects of wireless mobile ad hoc networks (MANET). The views, opinions and/or

  2. DMP: Detouring Using Multiple Paths against Jamming Attack for Ubiquitous Networking System

    PubMed Central

    Kim, Mihui; Chae, Kijoon

    2010-01-01

    To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio) and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector), and a conventional JAM (Jammed Area Mapping) service with one reroute. PMID:22319316

  3. DMP: detouring using multiple paths against jamming attack for ubiquitous networking system.

    PubMed

    Kim, Mihui; Chae, Kijoon

    2010-01-01

    To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio) and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector), and a conventional JAM (Jammed Area Mapping) service with one reroute.

  4. Wireless Power Control for Tactical MANET: Power Rate Bounds

    DTIC Science & Technology

    2016-09-01

    signals and by their inherent interference.” Figure 1. Transmission and interference in a two-link wireless network. Wireless power control seeks to...e.g., shutting off transmissions to measure the interference is impractical.) In a wireless power control system, the receiver sets its transmitter’s...Travassos Ro- mano [2013] Transmission Power Control for Opportunistic QoS Provision in Wireless Networks, IEEE Transactions on Control Systems Technology

  5. Scale structure of aluminised Manet steel after HIP treatment

    NASA Astrophysics Data System (ADS)

    Glasbrenner, H.; Stein-Fechner, K.; Konys, J.

    2000-12-01

    Coatings on low activation steels are required in fusion technology in order to reduce the tritium permeation rate through the steel into the cooling water system by a factor of at least 100. Alumina seems to be a promising coating material. However, an appropriate coating system must also have the potential for self-healing since the ceramic alumina scale tends to fail if mechanical stress is applied. A technology is introduced here to form a ductile Al enriched surface scale on Manet II steel (Fe-10.3%Cr) with an alumina overlayer. This technology consists of two main process steps. Hot dip aluminising has been performed at 700°C for 30 s in order to introduce Al to the near surface zone. The very hard intermetallic scale Fe 2Al 5 which forms during the immersion process gets completely transformed into FeAl 2, FeAl and α-Fe(Al) phases during a subsequent hot isostatic press (HIP) process step at high pressure at 1040°C for 30 min. The pressures chosen for the HIPing were 1000 and 2000 bar. Without HIPing pores form due to the Kirkendall effect. The influence of the high pressure on the heat treatment (1040°C, 30 min) will be discussed in this paper.

  6. Towards an Efficient Flooding Scheme Exploiting 2-Hop Backward Information in MANETs

    NASA Astrophysics Data System (ADS)

    Le, Trong Duc; Choo, Hyunseung

    Flooding is an indispensable operation for providing control or routing functionalities to mobile ad hoc networks (MANETs). Previously, many flooding schemes have been studied with the intention of curtailing the problems of severe redundancies, contention, and collisions in traditional implementations. A recent approach with relatively high efficiency is 1HI by Liu et al., which uses only 1-hop neighbor information. The scheme achieves local optimality in terms of the number of retransmission nodes with time complexity &Theta(n log n), where n is the number of neighbors of a node; however, this method tends to make many redundant transmissions. In this paper, we present a novel flooding algorithm, 2HBI (2-hop backward information), that efficiently reduces the number of retransmission nodes and solves the broadcast storm problem in ad hoc networks using our proposed concept, “2-hop backward information.” The most significant feature of the proposed algorithm is that it does not require any extra communication overhead other than the exchange of 1-hop HELLO messages but maintains high deliverability. Comprehensive computer simulations show that the proposed scheme significantly reduces redundant transmissions in 1HI and in pure flooding, up to 38% and 91%, respectively; accordingly it alleviates contention and collisions in networks.

  7. Hydrogen isotopes transport parameters in fusion reactor materials

    NASA Astrophysics Data System (ADS)

    Serra, E.; Benamati, G.; Ogorodnikova, O. V.

    1998-06-01

    This work presents a review of hydrogen isotopes-materials interactions in various materials of interest for fusion reactors. The relevant parameters cover mainly diffusivity, solubility, trap concentration and energy difference between trap and solution sites. The list of materials includes the martensitic steels (MANET, Batman and F82H-mod.), beryllium, aluminium, beryllium oxide, aluminium oxide, copper, tungsten and molybdenum. Some experimental work on the parameters that describe the surface effects is also mentioned.

  8. The Dynamic Community of Interest and Its Realization in ZODIAC

    DTIC Science & Technology

    2009-10-01

    the ZODIAC project. ZODIAC is a network architecture that puts security first and foremost, with security broken down into confidentiality, integrity...hosts, a unified solution for MANETs will work for hosts or routers as well. DYNAMIC COMMUNITIES OF INTEREST The basis of the ZODIAC design is a new dis...narrow scope of each DCoI limits attack propagation, and supports confidentiality ABSTRACT The ZODIAC project has been exploring a security first

  9. Cognitive Radio Networks for Tactical Wireless Communications

    DTIC Science & Technology

    2014-12-01

    exists. Instead, security is an evolving process, as we have seen in the context of WLANs and 2G / 3G networks. New system vulnerabilities continue to...in the network configuration and radio parameters take place due to mobility of platforms, and variation in other users of the RF environment. CRNs...dynamic spectrum access experimentally, and it represents the largest military Mobile Ad hoc Network (MANET) as of today. The WNaN demonstrator has been

  10. New Capabilities in Security and QoS Using the Updated MANET Routing Protocol OLSRv2

    DTIC Science & Technology

    2010-09-01

    integrity, by the authentication of packets or messages, and confidentiality. These are discussed in the following sections. Issues of availability...fully specified, in [2] is the addition of a TLV including a cryptographic signature that will allow the authentication of the received information...The objective is to ensure the integrity of the ad hoc network, that only authorised routers can join the network because unauthorised routers will

  11. SQTrust: Social and QoS Trust Management and Its Application to Mission-Oriented Mobile Groups

    DTIC Science & Technology

    2012-08-15

    ground truth status over a wide range of operational and environment conditions with high resiliency to malicious attacks and misbehaving nodes...attacks and misbehaving nodes. Furthermore, using mission-oriented mobile groups as an application, we identify the best trust formation model under...describe dy- namic behaviors of nodes in MANETs in the presence of misbehaving nodes with the objective to validate subjective trust evaluation with

  12. Robust Airborne Networking Extensions (RANGE)

    DTIC Science & Technology

    2008-02-01

    IMUNES [13] project, which provides an entire network stack virtualization and topology control inside a single FreeBSD machine . The emulated topology...Multicast versus broadcast in a manet.” in ADHOC-NOW, 2004, pp. 14–27. [9] J. Mukherjee, R. Atwood , “ Rendezvous point relocation in protocol independent...computer with an Ethernet connection, or a Linux virtual machine on some other (e.g., Windows) operating system, should work. 2.1 Patching the source code

  13. Intelligent self-organization methods for wireless ad hoc sensor networks based on limited resources

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2006-05-01

    A wireless ad hoc sensor network (WSN) is a configuration for area surveillance that affords rapid, flexible deployment in arbitrary threat environments. There is no infrastructure support and sensor nodes communicate with each other only when they are in transmission range. To a greater degree than the terminals found in mobile ad hoc networks (MANETs) for communications, sensor nodes are resource-constrained, with limited computational processing, bandwidth, memory, and power, and are typically unattended once in operation. Consequently, the level of information exchange among nodes, to support any complex adaptive algorithms to establish network connectivity and optimize throughput, not only deplete those limited resources and creates high overhead in narrowband communications, but also increase network vulnerability to eavesdropping by malicious nodes. Cooperation among nodes, critical to the mission of sensor networks, can thus be disrupted by the inappropriate choice of the method for self-organization. Recent published contributions to the self-configuration of ad hoc sensor networks, e.g., self-organizing mapping and swarm intelligence techniques, have been based on the adaptive control of the cross-layer interactions found in MANET protocols to achieve one or more performance objectives: connectivity, intrusion resistance, power control, throughput, and delay. However, few studies have examined the performance of these algorithms when implemented with the limited resources of WSNs. In this paper, self-organization algorithms for the initiation, operation and maintenance of a network topology from a collection of wireless sensor nodes are proposed that improve the performance metrics significant to WSNs. The intelligent algorithm approach emphasizes low computational complexity, energy efficiency and robust adaptation to change, allowing distributed implementation with the actual limited resources of the cooperative nodes of the network. Extensions of the algorithms from flat topologies to two-tier hierarchies of sensor nodes are presented. Results from a few simulations of the proposed algorithms are compared to the published results of other approaches to sensor network self-organization in common scenarios. The estimated network lifetime and extent under static resource allocations are computed.

  14. Analysis of interference performance of tactical radio network

    NASA Astrophysics Data System (ADS)

    Nie, Hao; Cai, Xiaoxia; Chen, Hong

    2017-08-01

    Mobile Ad hoc network has a strong military background for its development as the core technology of the backbone network of US tactical Internet. And which tactical radio network, is the war in today's tactical use of the Internet more mature form of networking, mainly used in brigade and brigade following forces. This paper analyzes the typical protocol AODV in the tactical radio network, and then carries on the networking. By adding the interference device to the whole network, the battlefield environment is simulated, and then the throughput, delay and packet loss rate are analyzed, and the performance of the whole network and the single node before and after the interference is obtained.

  15. Leveraging Manet and Mobile Devices in Ship-to-Objective Maneuver and Expeditionary MAGTF Operations

    DTIC Science & Technology

    2014-09-01

    Approved OMB No. 0704–0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the ...time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection...Arlington, VA 22202–4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704–0188) Washington DC 20503. 1. AGENCY USE ONLY

  16. MELOC - Memory and Location Optimized Caching for Mobile Ad Hoc Networks

    DTIC Science & Technology

    2011-01-01

    required for such environments. Moreover, nodes located at centre have to be chosen as cache location, since it reduces the chance of being attacked...Figure 1.1. MANET Formed by Armed Forces 47 Example 3: Sharing of music and videos are famous among mobile users. Instead of downloading...The two tier caching scheme discussed in this paper is acoustic . The characteristics of two-tier caching are as follows, the content of data to be

  17. Emerging Radio and Manet Technology Study: Research Support for a Survey of State-of-the-art Commercial and Military Hardware/Software for Mobile Ad Hoc Networks

    DTIC Science & Technology

    2014-10-01

    44 Table 19: Raspberry Pi Information...boards – These are single board devices targeted to education and embedding, the best known being the Raspberry Pi ; and 3. Development boards – These...popular, as it has high performance processor (perhaps 4 times the power of a Raspberry Pi ) with dual core processors running at 1.6 GHz and the cost is

  18. HMM Sequential Hypothesis Tests for Intrusion Detection in MANETs Extended Abstract

    DTIC Science & Technology

    2003-01-01

    securing the routing protocols of mobile ad hoc wireless net- works has been done in prevention. Intrusion detection systems play a complimentary...TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 10 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified...hops of A would be unable to communicate with B and vice versa [1]. 1.2 The role of intrusion detection in security In order to provide reliable

  19. Connecting the Edge: Mobile Ad-Hoc Networks (MANETs) for Network Centric Warfare

    DTIC Science & Technology

    2007-04-01

    Cebrowski and Mr. John Garstka are generally credited with introducing the concept and origins of NCW.8 They described the military’s evolution from...www.sdrforum.org/pages/aboutTheForum/faqs.asp Adams, James. The Next World War. New York, NY: Simon & Schuster, 1998. Alberts, David S., John J. Garstka, and...Joint Tactical Radio System – Reloaded.” CHIPS, July-September 2006: 6-9. Arquilla, John , and David Ronfeldt. In Athena’s Camp. Santa Monica, CA

  20. Bridging Operational and Strategic Communication Architectures: Integrating Small Unmanned Aircraft Systems as Airborne Tactical Relay Communication Vertical Nodes

    DTIC Science & Technology

    2012-09-01

    Surveillance Reconnaissance JUAS Joint Unmanned Aircraft System LAN Local Area Network LOS Line of Sight xiv MANET Mobile Ad Hoc Network...terrain, which severely impacted the ability to communicate with the line of sight ( LOS ) tactical radios used by small units. Much like the commercial...Selectable – NB: 10W, SATCOM: 20W, WB: 20W peak/5W average Operational Mode: Voice/Data (to 3.6Mbps) Distance: 300 meters to 35 Kilometers or LOS

  1. The High Current RF (HCRF) LINAC Program.

    DTIC Science & Technology

    1992-11-01

    oncept. PrOWm, Magnetice Madulatoof. CRC, DO De I IES. FacilityCrtcl. LA (200k Govl. Funds) CrtclCI CIA PHASE I It - Magntic Switchies Fab. Load Manetic 4...beam is shown in Figure 2.7. Figure 2.6 also shows the evolution of the beam pulse width and energy as it moves through the injector, the buncher and...ACCELERATOR ELECTRON BEAM PULSE FORMATS ( SINGLE -MACROPULSE- TRAIN) I Figure 2.6. HCRF accelerator schematic and electron beam pulsewidth and energy evolution

  2. Airborne Network Data Availability Using Peer to Peer Database Replication on a Distributed Hash Table

    DTIC Science & Technology

    2013-03-01

    DSR Dynamic Source Routing DSSS Direct -sequence spread spectrum GUID Globally Unique ID MANET Mobile Ad-hoc Network NS3 Network Simulator 3 OLSR...networking schemes for safe maneuvering and data communication. Imagine needing to maintain an operational picture of an overall environment using a...as simple as O(n) where every node is sequentially queried to O log(n), or O(1). These schemes will be discussed with each individual DHT. Four of the

  3. GAPR2: A DTN Routing Protocol for Communications in Challenged, Degraded, and Denied Environments

    DTIC Science & Technology

    2015-09-01

    Transmission Speed Vs. Latency Figure 4.7: Helsinki Simulation Set 2, High Network Load and Small Buffers Analysis of Delivery Ratio in Helsinki Simulation...ipnsig.org/. [17] MANET routing, class notes for CS4554: Network modeling and analysis . 119 [18] S. Basagni et al. Mobile ad hoc networking . John...Wiley & Sons, 2004. [19] E. Royer et al. A review of current routing protocols for ad hoc mobile wireless networks . Personal Communications, IEEE, 6(2

  4. Adaptive MANET multipath routing algorithm based on the simulated annealing approach.

    PubMed

    Kim, Sungwook

    2014-01-01

    Mobile ad hoc network represents a system of wireless mobile nodes that can freely and dynamically self-organize network topologies without any preexisting communication infrastructure. Due to characteristics like temporary topology and absence of centralized authority, routing is one of the major issues in ad hoc networks. In this paper, a new multipath routing scheme is proposed by employing simulated annealing approach. The proposed metaheuristic approach can achieve greater and reciprocal advantages in a hostile dynamic real world network situation. Therefore, the proposed routing scheme is a powerful method for finding an effective solution into the conflict mobile ad hoc network routing problem. Simulation results indicate that the proposed paradigm adapts best to the variation of dynamic network situations. The average remaining energy, network throughput, packet loss probability, and traffic load distribution are improved by about 10%, 10%, 5%, and 10%, respectively, more than the existing schemes.

  5. Routing architecture and security for airborne networks

    NASA Astrophysics Data System (ADS)

    Deng, Hongmei; Xie, Peng; Li, Jason; Xu, Roger; Levy, Renato

    2009-05-01

    Airborne networks are envisioned to provide interconnectivity for terrestial and space networks by interconnecting highly mobile airborne platforms. A number of military applications are expected to be used by the operator, and all these applications require proper routing security support to establish correct route between communicating platforms in a timely manner. As airborne networks somewhat different from traditional wired and wireless networks (e.g., Internet, LAN, WLAN, MANET, etc), security aspects valid in these networks are not fully applicable to airborne networks. Designing an efficient security scheme to protect airborne networks is confronted with new requirements. In this paper, we first identify a candidate routing architecture, which works as an underlying structure for our proposed security scheme. And then we investigate the vulnerabilities and attack models against routing protocols in airborne networks. Based on these studies, we propose an integrated security solution to address routing security issues in airborne networks.

  6. Performance enhancement of wireless mobile adhoc networks through improved error correction and ICI cancellation

    NASA Astrophysics Data System (ADS)

    Sabir, Zeeshan; Babar, M. Inayatullah; Shah, Syed Waqar

    2012-12-01

    Mobile adhoc network (MANET) refers to an arrangement of wireless mobile nodes that have the tendency of dynamically and freely self-organizing into temporary and arbitrary network topologies. Orthogonal frequency division multiplexing (OFDM) is the foremost choice for MANET system designers at the Physical Layer due to its inherent property of high data rate transmission that corresponds to its lofty spectrum efficiency. The downside of OFDM includes its sensitivity to synchronization errors (frequency offsets and symbol time). Most of the present day techniques employing OFDM for data transmission support mobility as one of the primary features. This mobility causes small frequency offsets due to the production of Doppler frequencies. It results in intercarrier interference (ICI) which degrades the signal quality due to a crosstalk between the subcarriers of OFDM symbol. An efficient frequency-domain block-type pilot-assisted ICI mitigation scheme is proposed in this article which nullifies the effect of channel frequency offsets from the received OFDM symbols. Second problem addressed in this article is the noise effect induced by different sources into the received symbol increasing its bit error rate and making it unsuitable for many applications. Forward-error-correcting turbo codes have been employed into the proposed model which adds redundant bits into the system which are later used for error detection and correction purpose. At the receiver end, maximum a posteriori (MAP) decoding algorithm is implemented using two component MAP decoders. These decoders tend to exchange interleaved extrinsic soft information among each other in the form of log likelihood ratio improving the previous estimate regarding the decoded bit in each iteration.

  7. 3VSR: Three Valued Secure Routing for Vehicular Ad Hoc Networks using Sensing Logic in Adversarial Environment

    PubMed Central

    Wang, Liangmin

    2018-01-01

    Today IoT integrate thousands of inter networks and sensing devices e.g., vehicular networks, which are considered to be challenging due to its high speed and network dynamics. The goal of future vehicular networks is to improve road safety, promote commercial or infotainment products and to reduce the traffic accidents. All these applications are based on the information exchange among nodes, so not only reliable data delivery but also the authenticity and credibility of the data itself are prerequisite. To cope with the aforementioned problem, trust management come up as promising candidate to conduct node’s transaction and interaction management, which requires distributed mobile nodes cooperation for achieving design goals. In this paper, we propose a trust-based routing protocol i.e., 3VSR (Three Valued Secure Routing), which extends the widely used AODV (Ad hoc On-demand Distance Vector) routing protocol and employs the idea of Sensing Logic-based trust model to enhance the security solution of VANET (Vehicular Ad-Hoc Network). The existing routing protocol are mostly based on key or signature-based schemes, which off course increases computation overhead. In our proposed 3VSR, trust among entities is updated frequently by means of opinion derived from sensing logic due to vehicles random topologies. In 3VSR the theoretical capabilities are based on Dirichlet distribution by considering prior and posterior uncertainty of the said event. Also by using trust recommendation message exchange, nodes are able to reduce computation and routing overhead. The simulated results shows that the proposed scheme is secure and practical. PMID:29538314

  8. 3VSR: Three Valued Secure Routing for Vehicular Ad Hoc Networks using Sensing Logic in Adversarial Environment.

    PubMed

    Sohail, Muhammad; Wang, Liangmin

    2018-03-14

    Today IoT integrate thousands of inter networks and sensing devices e.g., vehicular networks, which are considered to be challenging due to its high speed and network dynamics. The goal of future vehicular networks is to improve road safety, promote commercial or infotainment products and to reduce the traffic accidents. All these applications are based on the information exchange among nodes, so not only reliable data delivery but also the authenticity and credibility of the data itself are prerequisite. To cope with the aforementioned problem, trust management come up as promising candidate to conduct node's transaction and interaction management, which requires distributed mobile nodes cooperation for achieving design goals. In this paper, we propose a trust-based routing protocol i.e., 3VSR (Three Valued Secure Routing), which extends the widely used AODV (Ad hoc On-demand Distance Vector) routing protocol and employs the idea of Sensing Logic-based trust model to enhance the security solution of VANET (Vehicular Ad-Hoc Network). The existing routing protocol are mostly based on key or signature-based schemes, which off course increases computation overhead. In our proposed 3VSR, trust among entities is updated frequently by means of opinion derived from sensing logic due to vehicles random topologies. In 3VSR the theoretical capabilities are based on Dirichlet distribution by considering prior and posterior uncertainty of the said event. Also by using trust recommendation message exchange, nodes are able to reduce computation and routing overhead. The simulated results shows that the proposed scheme is secure and practical.

  9. BPTAP: A New Approach to IP over DTN

    NASA Technical Reports Server (NTRS)

    Tsao, Philip; Nguyen, Sam

    2012-01-01

    Traditional Internet protocols have been widely deployed for a variety of applications. However such protocols generally perform poorly in situations in which, round trip delays are very large (interplanetary distances) or . persistent connectivity is not always available (widely dispersed MANET). Delay/Disruption Tolerant Network (DTN) technology was invented to address these issues: (1) . Relay nodes "take custody" of blocks of network traffic on a hop-by -hop basis and retransmit them in cases of expected or unexpected link outage (2) Bundle lifetime may be configured for long round trip light times. BPTAP is novel by encapsulating Ethernet frames in BP

  10. Design of verification platform for wireless vision sensor networks

    NASA Astrophysics Data System (ADS)

    Ye, Juanjuan; Shang, Fei; Yu, Chuang

    2017-08-01

    At present, the majority of research for wireless vision sensor networks (WVSNs) still remains in the software simulation stage, and the verification platforms of WVSNs that available for use are very few. This situation seriously restricts the transformation from theory research of WVSNs to practical application. Therefore, it is necessary to study the construction of verification platform of WVSNs. This paper combines wireless transceiver module, visual information acquisition module and power acquisition module, designs a high-performance wireless vision sensor node whose core is ARM11 microprocessor and selects AODV as the routing protocol to set up a verification platform called AdvanWorks for WVSNs. Experiments show that the AdvanWorks can successfully achieve functions of image acquisition, coding, wireless transmission, and obtain the effective distance parameters between nodes, which lays a good foundation for the follow-up application of WVSNs.

  11. Design and performance evaluation of a distributed OFDMA-based MAC protocol for MANETs.

    PubMed

    Park, Jaesung; Chung, Jiyoung; Lee, Hyungyu; Lee, Jung-Ryun

    2014-01-01

    In this paper, we propose a distributed MAC protocol for OFDMA-based wireless mobile ad hoc multihop networks, in which the resource reservation and data transmission procedures are operated in a distributed manner. A frame format is designed considering the characteristics of OFDMA that each node can transmit or receive data to or from multiple nodes simultaneously. Under this frame structure, we propose a distributed resource management method including network state estimation and resource reservation processes. We categorize five types of logical errors according to their root causes and show that two of the logical errors are inevitable while three of them are avoided under the proposed distributed MAC protocol. In addition, we provide a systematic method to determine the advertisement period of each node by presenting a clear relation between the accuracy of estimated network states and the signaling overhead. We evaluate the performance of the proposed protocol in respect of the reservation success rate and the success rate of data transmission. Since our method focuses on avoiding logical errors, it could be easily placed on top of the other resource allocation methods focusing on the physical layer issues of the resource management problem and interworked with them.

  12. Cyber threat model for tactical radio networks

    NASA Astrophysics Data System (ADS)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  13. Adaptive Control Parameters for Dispersal of Multi-Agent Mobile Ad Hoc Network (MANET) Swarms

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurt Derr; Milos Manic

    A mobile ad hoc network is a collection of independent nodes that communicate wirelessly with one another. This paper investigates nodes that are swarm robots with communications and sensing capabilities. Each robot in the swarm may operate in a distributed and decentralized manner to achieve some goal. This paper presents a novel approach to dynamically adapting control parameters to achieve mesh configuration stability. The presented approach to robot interaction is based on spring force laws (attraction and repulsion laws) to create near-optimal mesh like configurations. In prior work, we presented the extended virtual spring mesh (EVSM) algorithm for the dispersionmore » of robot swarms. This paper extends the EVSM framework by providing the first known study on the effects of adaptive versus static control parameters on robot swarm stability. The EVSM algorithm provides the following novelties: 1) improved performance with adaptive control parameters and 2) accelerated convergence with high formation effectiveness. Simulation results show that 120 robots reach convergence using adaptive control parameters more than twice as fast as with static control parameters in a multiple obstacle environment.« less

  14. NOBAI: a web server for character coding of geometrical and statistical features in RNA structure

    PubMed Central

    Knudsen, Vegeir; Caetano-Anollés, Gustavo

    2008-01-01

    The Numeration of Objects in Biology: Alignment Inferences (NOBAI) web server provides a web interface to the applications in the NOBAI software package. This software codes topological and thermodynamic information related to the secondary structure of RNA molecules as multi-state phylogenetic characters, builds character matrices directly in NEXUS format and provides sequence randomization options. The web server is an effective tool that facilitates the search for evolutionary history embedded in the structure of functional RNA molecules. The NOBAI web server is accessible at ‘http://www.manet.uiuc.edu/nobai/nobai.php’. This web site is free and open to all users and there is no login requirement. PMID:18448469

  15. A multimetric, map-aware routing protocol for VANETs in urban areas.

    PubMed

    Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Aguilar Igartua, Mónica; Rebollo-Monedero, David; de la Cruz Llopis, Luis J; Mezher, Ahmad Mohamad; Aguilar-Calderón, José Alfonso

    2014-01-28

    In recent years, the general interest in routing for vehicular ad hoc networks (VANETs) has increased notably. Many proposals have been presented to improve the behavior of the routing decisions in these very changeable networks. In this paper, we propose a new routing protocol for VANETs that uses four different metrics. which are the distance to destination, the vehicles' density, the vehicles' trajectory and the available bandwidth, making use of the information retrieved by the sensors of the vehicle, in order to make forwarding decisions, minimizing packet losses and packet delay. Through simulation, we compare our proposal to other protocols, such as AODV (Ad hoc On-Demand Distance Vector), GPSR (Greedy Perimeter Stateless Routing), I-GPSR (Improvement GPSR) and to our previous proposal, GBSR-B (Greedy Buffer Stateless Routing Building-aware). Besides, we present a performance evaluation of the individual importance of each metric to make forwarding decisions. Experimental results show that our proposed forwarding decision outperforms existing solutions in terms of packet delivery.

  16. Modeling and optimization of Quality of Service routing in Mobile Ad hoc Networks

    NASA Astrophysics Data System (ADS)

    Rafsanjani, Marjan Kuchaki; Fatemidokht, Hamideh; Balas, Valentina Emilia

    2016-01-01

    Mobile ad hoc networks (MANETs) are a group of mobile nodes that are connected without using a fixed infrastructure. In these networks, nodes communicate with each other by forming a single-hop or multi-hop network. To design effective mobile ad hoc networks, it is important to evaluate the performance of multi-hop paths. In this paper, we present a mathematical model for a routing protocol under energy consumption and packet delivery ratio of multi-hop paths. In this model, we use geometric random graphs rather than random graphs. Our proposed model finds effective paths that minimize the energy consumption and maximizes the packet delivery ratio of the network. Validation of the mathematical model is performed through simulation.

  17. Explicit Context Matching in Content-Based Publish/Subscribe Systems

    PubMed Central

    Vavassori, Sergio; Soriano, Javier; Lizcano, David; Jiménez, Miguel

    2013-01-01

    Although context could be exploited to improve performance, elasticity and adaptation in most distributed systems that adopt the publish/subscribe (P/S) communication model, only a few researchers have focused on the area of context-aware matching in P/S systems and have explored its implications in domains with highly dynamic context like wireless sensor networks (WSNs) and IoT-enabled applications. Most adopted P/S models are context agnostic or do not differentiate context from the other application data. In this article, we present a novel context-aware P/S model. SilboPS manages context explicitly, focusing on the minimization of network overhead in domains with recurrent context changes related, for example, to mobile ad hoc networks (MANETs). Our approach represents a solution that helps to efficiently share and use sensor data coming from ubiquitous WSNs across a plethora of applications intent on using these data to build context awareness. Specifically, we empirically demonstrate that decoupling a subscription from the changing context in which it is produced and leveraging contextual scoping in the filtering process notably reduces (un)subscription cost per node, while improving the global performance/throughput of the network of brokers without altering the cost of SIENA-like topology changes. PMID:23529118

  18. A New Approach to Predict user Mobility Using Semantic Analysis and Machine Learning.

    PubMed

    Fernandes, Roshan; D'Souza G L, Rio

    2017-10-19

    Mobility prediction is a technique in which the future location of a user is identified in a given network. Mobility prediction provides solutions to many day-to-day life problems. It helps in seamless handovers in wireless networks to provide better location based services and to recalculate paths in Mobile Ad hoc Networks (MANET). In the present study, a framework is presented which predicts user mobility in presence and absence of mobility history. Naïve Bayesian classification algorithm and Markov Model are used to predict user future location when user mobility history is available. An attempt is made to predict user future location by using Short Message Service (SMS) and instantaneous Geological coordinates in the absence of mobility patterns. The proposed technique compares the performance metrics with commonly used Markov Chain model. From the experimental results it is evident that the techniques used in this work gives better results when considering both spatial and temporal information. The proposed method predicts user's future location in the absence of mobility history quite fairly. The proposed work is applied to predict the mobility of medical rescue vehicles and social security systems.

  19. Methods for reliability evaluation of trust and reputation systems

    NASA Astrophysics Data System (ADS)

    Janiszewski, Marek B.

    2016-09-01

    Trust and reputation systems are a systematic approach to build security on the basis of observations of node's behaviour. Exchange of node's opinions about other nodes is very useful to indicate nodes which act selfishly or maliciously. The idea behind trust and reputation systems gets significance because of the fact that conventional security measures (based on cryptography) are often not sufficient. Trust and reputation systems can be used in various types of networks such as WSN, MANET, P2P and also in e-commerce applications. Trust and reputation systems give not only benefits but also could be a thread itself. Many attacks aim at trust and reputation systems exist, but such attacks still have not gain enough attention of research teams. Moreover, joint effects of many of known attacks have been determined as a very interesting field of research. Lack of an acknowledged methodology of evaluation of trust and reputation systems is a serious problem. This paper aims at presenting various approaches of evaluation such systems. This work also contains a description of generalization of many trust and reputation systems which can be used to evaluate reliability of such systems in the context of preventing various attacks.

  20. Immune Inspired Security Approach for Manets: a Case Study

    NASA Astrophysics Data System (ADS)

    Mohamed, Yasir Abdelgadir

    2011-06-01

    This paper extends the work that has earlier been established. Immune inspired approach for securing mobile ad hoc networks is specified there. Although it is clearly indicated there that the research scope is the wireless networks in general and hybrid mobile ad hoc networks in particular, we have seen that specifying the security system in one of the communications applications that need further security approach may help to understand how effectively the system can contribute to this vital and important networks sector. Security in this type of networks is important and controversial as it plays a key role in users' eagerness or reluctance for the services provided by these networks. In this paper, the immune inspired security system is specified to secure web services in converged networks.

  1. The diffusivity and solubility of deuterium in a high chromium martensitic steel

    NASA Astrophysics Data System (ADS)

    Forcey, K. S.; Iordanova, I.; Yaneva, M.

    1997-01-01

    The permeability, diffusivity and solubility of deuterium in the martensitic stainless steel MANET II have been studied in the temperature range 194-465°C by applying a time dependent gas-phase permeation technique. It was found that the temperature dependence of diffusivity and solubility could not be described by a simple Arrhenius expression over the entire temperature range investigated. At lower temperatures (below about 330°C) the diffusivity was found to be greatly reduced by the effects of trapping. Oriani's model has been applied to obtain the trapping energy and number density of the traps as well as the relative amounts of deuterium dissolved at lattice and trap sites. It is suggested that the most likely sites for trapping are at interfaces between the martensitic laths and between second phase particles and the surrounding metal matrix.

  2. Fifty Years of Seismic Monitoring in Davao,Philippines

    NASA Astrophysics Data System (ADS)

    McNamara, D. J.

    2016-12-01

    The Manila Observatory was a 150 years old as of 2015. Fiftry years ago it began a seismic monitoring station in the Island of Mindanao, outside the city of Davao, 7 deg. N and 121 deg. E. approxiamtely. This station was chosen not only for its position on the Ring of Fire but also for the fact the the dip angle of the earth's manetic field is zeo at that location. When the CTBT was established and the Republic of the Philippines (RP) a signatory, the Davao station by agreement with RP, began to send its seismic data to the CTBT database in Vienna. This has continued to the present day with support from CTBTO for updates in equipment and maintainence. We discuss if such a private+government model is the way forward for more comprehensive monitoring in the future.

  3. Where-Fi: a dynamic energy-efficient multimedia distribution framework for MANETs

    NASA Astrophysics Data System (ADS)

    Mohapatra, Shivajit; Carbunar, Bogdan; Pearce, Michael; Chaudhri, Rohit; Vasudevan, Venu

    2008-01-01

    Next generation mobile ad-hoc applications will revolve around users' need for sharing content/presence information with co-located devices. However, keeping such information fresh requires frequent meta-data exchanges, which could result in significant energy overheads. To address this issue, we propose distributed algorithms for energy efficient dissemination of presence and content usage information between nodes in mobile ad-hoc networks. First, we introduce a content dissemination protocol (called CPMP) for effectively distributing frequent small meta-data updates between co-located devices using multicast. We then develop two distributed algorithms that use the CPMP protocol to achieve "phase locked" wake up cycles for all the participating nodes in the network. The first algorithm is designed for fully-connected networks and then extended in the second to handle hidden terminals. The "phase locked" schedules are then exploited to adaptively transition the network interface to a deep sleep state for energy savings. We have implemented a prototype system (called "Where-Fi") on several Motorola Linux-based cell phone models. Our experimental results show that for all network topologies our algorithms were able to achieve "phase locking" between nodes even in the presence of hidden terminals. Moreover, we achieved battery lifetime extensions of as much as 28% for fully connected networks and about 20% for partially connected networks.

  4. MANEMO Routing in Practice: Protocol Selection, Expected Performance, and Experimental Evaluation

    NASA Astrophysics Data System (ADS)

    Tazaki, Hajime; van Meter, Rodney; Wakikawa, Ryuji; Wongsaardsakul, Thirapon; Kanchanasut, Kanchana; Dias de Amorim, Marcelo; Murai, Jun

    Motivated by the deployment of post-disaster MANEMO (MANET for NEMO) composed of mobile routers and stations, we evaluate two candidate routing protocols through network simulation, theoretical performance analysis, and field experiments. The first protocol is the widely adopted Optimized Link State Routing protocol (OLSR) and the second is the combination of the Tree Discovery Protocol (TDP) with Network In Node Advertisement (NINA). To the best of our knowledge, this is the first time that these two protocols are compared in both theoretical and practical terms. We focus on the control overhead generated when mobile routers perform a handover. Our results confirm the correctness and operational robustness of both protocols. More interestingly, although in the general case OLSR leads to better results, TDP/NINA outperforms OLSR both in the case of sparse networks and in highly mobile networks, which correspond to the operation point of a large set of post-disaster scenarios.

  5. The tensile and fatigue properties of DIN 1.4914 martensitic stainless steel after 590 MeV proton irradiation

    NASA Astrophysics Data System (ADS)

    Marmy, P.; Victoria, M.

    1992-09-01

    Tensile and low cycle fatigue subsize specimens of DIN 1.4914 martensitic steel (MANET) have been irradiated with 590 MeV protons to doses up to 1 dpa and at temperatures between 363 and 703 K. The helium produced by spallation reactions was measured as 130 appm/dpa. A strong radiation hardening is found, which decreases as the irradiation temperature increases. The tensile elongation is reduced after irradiation, but the fracture mode is always ductile and transgranular. The radition hardening produced at low irradiation temperatures is recovered after annealing at higher temperatures. Continous softening is observed during low cycle fatigue testing. The rate of softening of the irradiated material is stonger than that of the unirradiated material and tends to reach the saturation level of the latter. The irradiation badly affects the fatigue life, particularly in the temperature domain of dynamic strain ageing between 553 and 653 K.

  6. Low temperature embrittlement behaviour of different ferritic-martensitic alloys for fusion applications

    NASA Astrophysics Data System (ADS)

    Rieth, M.; Dafferner, B.

    1996-10-01

    In the last few years a lot of different low activation CrWVTa steels have been developed world-wide. Without irradiation some of these alloys show clearly a better low temperature embrittlement behaviour than commercial CrNiMoV(Nb) alloys. Within the MANITU project a study was carried out to compare, prior to the irradiation program, the embrittlement behaviour of different alloys in the unirradiated condition performing instrumented Charpy impact bending tests with sub-size specimens. The low activation materials (LAM) considered were different OPTIFER alloys (Forschungszentrum Karlsruhe), F82H (JAERI), 9Cr2WVTa (ORNL), and GA3X (PNL). The modified commercial 10-11% CrNiMoVNb steels were MANET and OPTIMAR. A meaningful comparison between these alloys could be drawn, since the specimens of all materials were manufactured and tested under the same conditions.

  7. Embrittlement behavior of neutron irradiated RAFM steels

    NASA Astrophysics Data System (ADS)

    Gaganidze, E.; Schneider, H.-C.; Dafferner, B.; Aktaa, J.

    2007-08-01

    The effects of neutron irradiation on the embrittlement behavior of reduced activation ferritic/martensitic (RAFM) steel EUROFER97 for different heat treatment conditions have been investigated. The irradiation to 16.3 dpa at different irradiation temperatures (250-450 °C) was carried out in the Petten High Flux Reactor in the framework of the HFR Phase-IIb (SPICE) irradiation project. Several reference RAFM steels (F82H-mod, OPTIFER-Ia, GA3X) and MANET-I were also irradiated at selected temperatures. The embrittlement behavior and hardening were investigated by instrumented Charpy-V tests with subsize specimens. The neutron irradiation induced embrittlement and hardening of as-delivered EUROFER97 are comparable to those of investigated reference steels, being mostly pronounced for 250 °C and 300 °C irradiation temperatures. Heat treatment of EUROFER97 at higher austenization temperature substantially improves the embrittlement behavior at irradiation temperatures of 250 °C and 350 °C.

  8. P-T data from central Bhutan imply distributed extensional shear at the Black Mountain "klippe"

    NASA Astrophysics Data System (ADS)

    Corrie, S. L.; Kohn, M. J.; Long, S. P.; McQuarrie, N.; Tobgay, T.

    2011-12-01

    The Southern Tibetan Detachment system (STDS) occurs along the entire length of the Himalayan orogen, and extensionally emplaces low-grade to unmetamorphosed Tethyan Himalayan (TH) rocks over highly metamorphosed Greater Himalayan sequence (GH) rocks. The base of TH remnants preserved in northern Bhutan all have top-to-the-north shear sense indicators (C'-type shear bands, asymmetric folds, and boudinaged leucogranite dikes) that are interpreted to reflect a discrete shear zone. In contrast, the GH-TH contact in the southernmost TH remnant (the Black Mountain region, central Bhutan) has been interpreted as depositional. A depositional contact limits the magnitude of displacement along the early STDS to 10's of km. If the GH-TH contact in the Black Mountain region is instead a discrete shear zone, as observed farther north, displacement on the STDS could be as high as 100's of km. To discriminate between these two interpretations, we determined peak metamorphic P-T conditions through the GH and TH sections, reasoning that a discrete shear zone would produce a distinct jump in metamorphic temperature, pressure or both. Thin section-scale kinematic indicators reveal pervasive top-to-the-north shear from 2-3 km structurally above the Main Central thrust (MCT) through the rest of the 11 km thick GH and TH sections. P-T conditions were determined from immediately above the MCT to 4 km above the GH-TH contact, with 19 samples from the GH, 6 from the overlying Chekha Fm (TH), and 9 from the overlying Maneting Fm (TH). We applied standard Fe-Mg exchange thermometers and Ca net-transfer barometers involving garnet. P-T conditions range from 700 °C and 11 kbar in migmatitic GHS to 600 °C and 8 kbar at the GH-Chekha contact, and 500 °C and 5 kbar at the top of the Maneting. We found no jumps in either temperature or pressure at any level, but a steeper than lithostatic pressure gradient, which we interpret to result from distributed extensional shear. The average thermal field gradient is surprisingly cool - only 20-25 °C/km. The baric field gradient is approximately 2 times steeper than lithostatic - 0.6 to 0.7 kbar/km, rather than 0.3 - so approximately 10 km of section has been excised. We argue that instead of a discrete structure, the Black Mountain "klippe," is part of a broad (≥8 km thick), low displacement shear zone and that the relationship between the GH and TH rocks in this region is depositional. These results support relatively minor displacement (a few tens of km) on the STDS remnants in northern Bhutan. Thus while channel- like behavior is present within the GHS and TH sections, its role in controlling Himalayan architecture is minor.

  9. Predicting impact of multi-paths on phase change in map-based vehicular ad hoc networks

    NASA Astrophysics Data System (ADS)

    Rahmes, Mark; Lemieux, George; Sonnenberg, Jerome; Chester, David B.

    2014-05-01

    Dynamic Spectrum Access, which through its ability to adapt the operating frequency of a radio, is widely believed to be a solution to the limited spectrum problem. Mobile Ad Hoc Networks (MANETs) can extend high capacity mobile communications over large areas where fixed and tethered-mobile systems are not available. In one use case with high potential impact cognitive radio employs spectrum sensing to facilitate identification of allocated frequencies not currently accessed by their primary users. Primary users own the rights to radiate at a specific frequency and geographic location, secondary users opportunistically attempt to radiate at a specific frequency when the primary user is not using it. We quantify optimal signal detection in map based cognitive radio networks with multiple rapidly varying phase changes and multiple orthogonal signals. Doppler shift occurs due to reflection, scattering, and rapid vehicle movement. Path propagation as well as vehicle movement produces either constructive or destructive interference with the incident wave. Our signal detection algorithms can assist the Doppler spread compensation algorithm by deciding how many phase changes in signals are present in a selected band of interest. Additionally we can populate a spatial radio environment map (REM) database with known information that can be leveraged in an ad hoc network to facilitate Dynamic Spectrum Access. We show how topography can help predict the impact of multi-paths on phase change, as well as about the prediction from dense traffic areas. Utilization of high resolution geospatial data layers in RF propagation analysis is directly applicable.

  10. Postirradiation thermocyclic loading of ferritic-martensitic structural materials

    NASA Astrophysics Data System (ADS)

    Belyaeva, L.; Orychtchenko, A.; Petersen, C.; Rybin, V.

    Thermonuclear fusion reactors of the Tokamak-type will be unique power engineering plants to operate in thermocyclic mode only. Ferritic-martensitic stainless steels are prime candidate structural materials for test blankets of the ITER fusion reactor. Beyond the radiation damage, thermomechanical cyclic loading is considered as the most detrimental lifetime limiting phenomenon for the above structure. With a Russian and a German facility for thermal fatigue testing of neutron irradiated materials a cooperation has been undertaken. Ampule devices to irradiate specimens for postirradiation thermal fatigue tests have been developed by the Russian partner. The irradiation of these ampule devices loaded with specimens of ferritic-martensitic steels, like the European MANET-II, the Russian 05K12N2M and the Japanese Low Activation Material F82H-mod, in a WWR-M-type reactor just started. A description of the irradiation facility, the qualification of the ampule device and the modification of the German thermal fatigue facility will be presented.

  11. PRP: peripheral routing protocol for WSN realistic marginal mobility model

    NASA Astrophysics Data System (ADS)

    Tudorache, I. G.; Popescu, A. M.; Kemp, A. H.

    2017-02-01

    This article proposes a new routing protocol called Peripheral Routing Protocol (PRP) for the scenario where the mobile destination (D) moves at the wireless sensor network (WSN) periphery for gathering data. From a connectivity point of view, when D follows the marginal mobility model (MMM), the WSN becomes a hybrid network: a sparse network, because of the interrupted connectivity between D and the rest of the nodes and a well-connected network, because of the connectivity between all the other nodes of the WSN except D. It will be proven through MATLAB simulations that, for a military application scenario where D's connectivity to the WSN varies between 10% and 95%, compared with the 100% case, PRP outperforms routing protocols recommended for Mobile Ad-hoc Networks (MANET) in three ways: it maintains an average Packet Delivery Ratio (PDR) over 90%, a below 10% and 5% increase for the Average End to End Delay (AETED) and energy per transmitted packet.

  12. High-dose neutron irradiation embrittlement of RAFM steels

    NASA Astrophysics Data System (ADS)

    Gaganidze, E.; Schneider, H.-C.; Dafferner, B.; Aktaa, J.

    2006-09-01

    Neutron irradiation-induced embrittlement of the reduced-activation ferritic/martensitic (RAFM) steel EUROFER97 was studied under different heat treatment conditions. Irradiation was performed in the Petten High Flux Reactor within the HFR Phase-IIb (SPICE) irradiation project up to 16.3 dpa and at different irradiation temperatures (250-450 °C). Several reference RAFM steels (F82H-mod, OPTIFER-Ia, GA3X and MANET-I) were also irradiated at selected temperatures. The impact properties were investigated by instrumented Charpy-V tests with subsize specimens. Embrittlement and hardening of as-delivered EUROFER97 steel are comparable to those of reference steels. Heat treatment of EUROFER97 at a higher austenitizing temperature substantially improves the embrittlement behaviour at low irradiation temperatures. Analysis of embrittlement in terms of the parameter C = ΔDBTT/Δ σ indicates hardening-dominated embrittlement at irradiation temperatures below 350 °C with 0.17 ⩽ C ⩽ 0.53 °C/MPa. Scattering of C at irradiation temperatures above 400 °C indicates no hardening embrittlement.

  13. Evaluating the More Suitable ISM Frequency Band for IoT-Based Smart Grids: A Quantitative Study of 915 MHz vs. 2400 MHz.

    PubMed

    Sandoval, Ruben M; Garcia-Sanchez, Antonio-Javier; Garcia-Sanchez, Felipe; Garcia-Haro, Joan

    2016-12-31

    IoT has begun to be employed pervasively in industrial environments and critical infrastructures thanks to its positive impact on performance and efficiency. Among these environments, the Smart Grid (SG) excels as the perfect host for this technology, mainly due to its potential to become the motor of the rest of electrically-dependent infrastructures. To make this SG-oriented IoT cost-effective, most deployments employ unlicensed ISM bands, specifically the 2400 MHz one, due to its extended communication bandwidth in comparison with lower bands. This band has been extensively used for years by Wireless Sensor Networks (WSN) and Mobile Ad-hoc Networks (MANET), from which the IoT technologically inherits. However, this work questions and evaluates the suitability of such a "default" communication band in SG environments, compared with the 915 MHz ISM band. A comprehensive quantitative comparison of these bands has been accomplished in terms of: power consumption, average network delay, and packet reception rate. To allow such a study, a dual-band propagation model specifically designed for the SG has been derived, tested, and incorporated into the well-known TOSSIM simulator. Simulation results reveal that only in the absence of other 2400 MHz interfering devices (such as WiFi or Bluetooth) or in small networks, is the 2400 MHz band the best option. In any other case, SG-oriented IoT quantitatively perform better if operating in the 915 MHz band.

  14. Evaluating the More Suitable ISM Frequency Band for IoT-Based Smart Grids: A Quantitative Study of 915 MHz vs. 2400 MHz

    PubMed Central

    Sandoval, Ruben M.; Garcia-Sanchez, Antonio-Javier; Garcia-Sanchez, Felipe; Garcia-Haro, Joan

    2016-01-01

    IoT has begun to be employed pervasively in industrial environments and critical infrastructures thanks to its positive impact on performance and efficiency. Among these environments, the Smart Grid (SG) excels as the perfect host for this technology, mainly due to its potential to become the motor of the rest of electrically-dependent infrastructures. To make this SG-oriented IoT cost-effective, most deployments employ unlicensed ISM bands, specifically the 2400 MHz one, due to its extended communication bandwidth in comparison with lower bands. This band has been extensively used for years by Wireless Sensor Networks (WSN) and Mobile Ad-hoc Networks (MANET), from which the IoT technologically inherits. However, this work questions and evaluates the suitability of such a “default” communication band in SG environments, compared with the 915 MHz ISM band. A comprehensive quantitative comparison of these bands has been accomplished in terms of: power consumption, average network delay, and packet reception rate. To allow such a study, a dual-band propagation model specifically designed for the SG has been derived, tested, and incorporated into the well-known TOSSIM simulator. Simulation results reveal that only in the absence of other 2400 MHz interfering devices (such as WiFi or Bluetooth) or in small networks, is the 2400 MHz band the best option. In any other case, SG-oriented IoT quantitatively perform better if operating in the 915 MHz band. PMID:28042863

  15. Metallography studies and hardness measurements on ferritic/martensitic steels irradiated in STIP

    NASA Astrophysics Data System (ADS)

    Zhang, H.; Long, B.; Dai, Y.

    2008-06-01

    In this work metallography investigations and microhardness measurements have been performed on 15 ferritic/martensitic (FM) steels and 6 weld metals irradiated in the SINQ Target Irradiation Program (STIP). The results demonstrate that all the steels have quite similar martensite lath structures. However, the sizes of the prior austenite grain (PAG) of these steels are quite different and vary from 10 to 86 μm. The microstructure in the fusion zones (FZ) of electron-beam welds (EBWs) of 5 steels (T91, EM10, MANET-II, F82H and Optifer-IX) is similar in respect to the martensite lath structure and PAG size. The FZ of the inert-gas-tungsten weld (TIGW) of the T91 steel shows a duplex structure of large ferrite gains and martensite laths. The microhardness measurements indicate that the normalized and tempered FM steels have rather close hardness values. The unusual high hardness values of the EBW and TIGW of the T91 steel were detected, which suggests that these materials are without proper tempering or post-welding heat treatment.

  16. [Pierre Bourdieu: sociology as a "symbolic revolution"].

    PubMed

    Suaud, Charles

    2014-03-01

    The article combines two objectives: understand the genesis and development of the sociology of Bourdieu in connection with his social and intellectual positioning. The sociology of Bourdieu is a theory of Action which reconciles the double requirement of objectification and taking account of the practical logic bound by social agents. From the character both objective and subjective of social space, he analyzes how different institutions (firstly School) are doing that mental structures match the objective structures of society. By making acceptable reality and registering it in the body, these instances contribute to reproduce social divisions and participate in the work of domination. Gradually, Bourdieu develops a general theory about Power, which leads to a sociology of State. But he refuses any sociological fatalism. Because he perceived homologies between the sociologist and the artist facing the social order, each in their own way, he devoted two researches to Flaubert and Manet, seized in the same enterprise of aesthetic subversion he described as a 'symbolic revolution'. In many aspects, the sociology of Bourdieu opens ways of looking for an objectification of caregivers and their practices.

  17. Narcotics detection using piezoelectric ringing

    NASA Astrophysics Data System (ADS)

    Rayner, Timothy J.; Magnuson, Erik E.; West, Rebecca; Lyndquist, R.

    1997-02-01

    Piezo-electric ringing (PER) has been demonstrated to be an effective means of scanning cargo for the presence of hidden narcotics. The PER signal is characteristic of certain types of crystallized material, such as cocaine hydrochloride. However, the PER signal cannot be used to conclusively identify all types of narcotic material, as the signal is not unique. For the purposes of cargo scanning, the PER technique is therefore most effective when used in combination with quadrupole resonance analysis (QRA). PER shares the same methodology as QRA technology, and can therefore be very easily and inexpensively integrated into existing QRA detectors. PER can be used as a pre-scanning technique before the QRA scan is applied and, because the PER scan is of a very short duration, can effectively offset some of the throughput limitations of standard QRA narcotics detectors. Following is a discussion of a PER detector developed by Quantum Manetics under contract to United States Customs. Design philosophy and performance are discussed, supported by results from recent tests conducted by the U.S. Drug Enforcement Agency and U.S. Customs.

  18. LCMV beamforming for a novel wireless local positioning system: a stationarity analysis

    NASA Astrophysics Data System (ADS)

    Tong, Hui; Zekavat, Seyed A.

    2005-05-01

    In this paper, we discuss the implementation of Linear Constrained Minimum Variance (LCMV) beamforming (BF) for a novel Wireless Local Position System (WLPS). WLPS main components are: (a) a dynamic base station (DBS), and (b) a transponder (TRX), both mounted on mobiles. WLPS might be considered as a node in a Mobile Adhoc NETwork (MANET). Each TRX is assigned an identification (ID) code. DBS transmits periodic short bursts of energy which contains an ID request (IDR) signal. The TRX transmits back its ID code (a signal with a limited duration) to the DBS as soon as it detects the IDR signal. Hence, the DBS receives non-continuous signals transmitted by TRX. In this work, we assume asynchronous Direct-Sequence Code Division Multiple Access (DS-CDMA) transmission from the TRX with antenna array/LCMV BF mounted at the DBS, and we discuss the implementation of the observed signal covariance matrix for LCMV BF. In LCMV BF, the observed covariance matrix should be estimated. Usually sample covariance matrix (SCM) is used to estimate this covariance matrix assuming a stationary model for the observed data which is the case in many communication systems. However, due to the non-stationary behavior of the received signal in WLPS systems, SCM does not lead to a high WLPS performance compared to even a conventional beamformer. A modified covariance matrix estimation method which utilizes the cyclostationarity property of WLPS system is introduced as a solution to this problem. It is shown that this method leads to a significant improvement in the WLPS performance.

  19. Dynamic fair node spectrum allocation for ad hoc networks using random matrices

    NASA Astrophysics Data System (ADS)

    Rahmes, Mark; Lemieux, George; Chester, Dave; Sonnenberg, Jerry

    2015-05-01

    Dynamic Spectrum Access (DSA) is widely seen as a solution to the problem of limited spectrum, because of its ability to adapt the operating frequency of a radio. Mobile Ad Hoc Networks (MANETs) can extend high-capacity mobile communications over large areas where fixed and tethered-mobile systems are not available. In one use case with high potential impact, cognitive radio employs spectrum sensing to facilitate the identification of allocated frequencies not currently accessed by their primary users. Primary users own the rights to radiate at a specific frequency and geographic location, while secondary users opportunistically attempt to radiate at a specific frequency when the primary user is not using it. We populate a spatial radio environment map (REM) database with known information that can be leveraged in an ad hoc network to facilitate fair path use of the DSA-discovered links. Utilization of high-resolution geospatial data layers in RF propagation analysis is directly applicable. Random matrix theory (RMT) is useful in simulating network layer usage in nodes by a Wishart adjacency matrix. We use the Dijkstra algorithm for discovering ad hoc network node connection patterns. We present a method for analysts to dynamically allocate node-node path and link resources using fair division. User allocation of limited resources as a function of time must be dynamic and based on system fairness policies. The context of fair means that first available request for an asset is not envied as long as it is not yet allocated or tasked in order to prevent cycling of the system. This solution may also save money by offering a Pareto efficient repeatable process. We use a water fill queue algorithm to include Shapley value marginal contributions for allocation.

  20. Survey on Monitoring and Quality Controlling of the Mobile Biosignal Delivery.

    PubMed

    Pawar, Pravin A; Edla, Damodar R; Edoh, Thierry; Shinde, Vijay; van Beijnum, Bert-Jan

    2017-10-31

    A Mobile Patient Monitoring System (MPMS) acquires patient's biosignals and transmits them using wireless network connection to the decision-making module or healthcare professional for the assessment of patient's condition. A variety of wireless network technologies such as wireless personal area networks (e.g., Bluetooth), mobile ad-hoc networks (MANET), and infrastructure-based networks (e.g., WLAN and cellular networks) are in practice for biosignals delivery. The wireless network quality-of-service (QoS) requirements of biosignals delivery are mainly specified in terms of required bandwidth, acceptable delay, and tolerable error rate. An important research challenge in the MPMS is how to satisfy QoS requirements of biosignals delivery in the environment characterized by patient mobility, deployment of multiple wireless network technologies, and variable QoS characteristics of the wireless networks. QoS requirements are mainly application specific, while available QoS is largely dependent on QoS provided by wireless network in use. QoS provisioning refers to providing support for improving QoS experience of networked applications. In resource poor conditions, application adaptation may also be required to make maximum use of available wireless network QoS. This survey paper presents a survey of recent developments in the area of QoS provisioning for MPMS. In particular, our contributions are as follows: (1) overview of wireless networks and network QoS requirements of biosignals delivery; (2) survey of wireless networks' QoS performance evaluation for the transmission of biosignals; and (3) survey of QoS provisioning mechanisms for biosignals delivery in MPMS. We also propose integrating end-to-end QoS monitoring and QoS provisioning strategies in a mobile patient monitoring system infrastructure to support optimal delivery of biosignals to the healthcare professionals.

  1. Analyzing the effect of routing protocols on media access control protocols in radio networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Barrett, C. L.; Drozda, M.; Marathe, A.

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i)more » number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.« less

  2. Promoting Wired Links in Wireless Mesh Networks: An Efficient Engineering Solution

    PubMed Central

    Barekatain, Behrang; Raahemifar, Kaamran; Ariza Quintana, Alfonso; Triviño Cabrera, Alicia

    2015-01-01

    Wireless Mesh Networks (WMNs) cannot completely guarantee good performance of traffic sources such as video streaming. To improve the network performance, this study proposes an efficient engineering solution named Wireless-to-Ethernet-Mesh-Portal-Passageway (WEMPP) that allows effective use of wired communication in WMNs. WEMPP permits transmitting data through wired and stable paths even when the destination is in the same network as the source (Intra-traffic). Tested with four popular routing protocols (Optimized Link State Routing or OLSR as a proactive protocol, Dynamic MANET On-demand or DYMO as a reactive protocol, DYMO with spanning tree ability and HWMP), WEMPP considerably decreases the end-to-end delay, jitter, contentions and interferences on nodes, even when the network size or density varies. WEMPP is also cost-effective and increases the network throughput. Moreover, in contrast to solutions proposed by previous studies, WEMPP is easily implemented by modifying the firmware of the actual Ethernet hardware without altering the routing protocols and/or the functionality of the IP/MAC/Upper layers. In fact, there is no need for modifying the functionalities of other mesh components in order to work with WEMPPs. The results of this study show that WEMPP significantly increases the performance of all routing protocols, thus leading to better video quality on nodes. PMID:25793516

  3. Enabling information management systems in tactical network environments

    NASA Astrophysics Data System (ADS)

    Carvalho, Marco; Uszok, Andrzej; Suri, Niranjan; Bradshaw, Jeffrey M.; Ceccio, Philip J.; Hanna, James P.; Sinclair, Asher

    2009-05-01

    Net-Centric Information Management (IM) and sharing in tactical environments promises to revolutionize forward command and control capabilities by providing ubiquitous shared situational awareness to the warfighter. This vision can be realized by leveraging the tactical and Mobile Ad hoc Networks (MANET) which provide the underlying communications infrastructure, but, significant technical challenges remain. Enabling information management in these highly dynamic environments will require multiple support services and protocols which are affected by, and highly dependent on, the underlying capabilities and dynamics of the tactical network infrastructure. In this paper we investigate, discuss, and evaluate the effects of realistic tactical and mobile communications network environments on mission-critical information management systems. We motivate our discussion by introducing the Advanced Information Management System (AIMS) which is targeted for deployment in tactical sensor systems. We present some operational requirements for AIMS and highlight how critical IM support services such as discovery, transport, federation, and Quality of Service (QoS) management are necessary to meet these requirements. Our goal is to provide a qualitative analysis of the impact of underlying assumptions of availability and performance of some of the critical services supporting tactical information management. We will also propose and describe a number of technologies and capabilities that have been developed to address these challenges, providing alternative approaches for transport, service discovery, and federation services for tactical networks.

  4. Comparative study of inversion methods of three-dimensional NMR and sensitivity to fluids

    NASA Astrophysics Data System (ADS)

    Tan, Maojin; Wang, Peng; Mao, Keyu

    2014-04-01

    Three-dimensional nuclear magnetic resonance (3D NMR) logging can simultaneously measure transverse relaxation time (T2), longitudinal relaxation time (T1), and diffusion coefficient (D). These parameters can be used to distinguish fluids in the porous reservoirs. For 3D NMR logging, the relaxation mechanism and mathematical model, Fredholm equation, are introduced, and the inversion methods including Singular Value Decomposition (SVD), Butler-Reeds-Dawson (BRD), and Global Inversion (GI) methods are studied in detail, respectively. During one simulation test, multi-echo CPMG sequence activation is designed firstly, echo trains of the ideal fluid models are synthesized, then an inversion algorithm is carried on these synthetic echo trains, and finally T2-T1-D map is built. Futhermore, SVD, BRD, and GI methods are respectively applied into a same fluid model, and the computing speed and inversion accuracy are compared and analyzed. When the optimal inversion method and matrix dimention are applied, the inversion results are in good aggreement with the supposed fluid model, which indicates that the inversion method of 3D NMR is applieable for fluid typing of oil and gas reservoirs. Additionally, the forward modeling and inversion tests are made in oil-water and gas-water models, respectively, the sensitivity to the fluids in different magnetic field gradients is also examined in detail. The effect of magnetic gradient on fluid typing in 3D NMR logging is stuied and the optimal manetic gradient is choosen.

  5. An extended smart utilization medium access control (ESU-MAC) protocol for ad hoc wireless systems

    NASA Astrophysics Data System (ADS)

    Vashishtha, Jyoti; Sinha, Aakash

    2006-05-01

    The demand for spontaneous setup of a wireless communication system has increased in recent years for areas like battlefield, disaster relief operations etc., where a pre-deployment of network infrastructure is difficult or unavailable. A mobile ad-hoc network (MANET) is a promising solution, but poses a lot of challenges for all the design layers, specifically medium access control (MAC) layer. Recent existing works have used the concepts of multi-channel and power control in designing MAC layer protocols. SU-MAC developed by the same authors, efficiently uses the 'available' data and control bandwidth to send control information and results in increased throughput via decreasing contention on the control channel. However, SU-MAC protocol was limited for static ad-hoc network and also faced the busy-receiver node problem. We present the Extended SU-MAC (ESU-MAC) protocol which works mobile nodes. Also, we significantly improve the scheme of control information exchange in ESU-MAC to overcome the busy-receiver node problem and thus, further avoid the blockage of control channel for longer periods of time. A power control scheme is used as before to reduce interference and to effectively re-use the available bandwidth. Simulation results show that ESU-MAC protocol is promising for mobile, ad-hoc network in terms of reduced contention at the control channel and improved throughput because of channel re-use. Results show a considerable increase in throughput compared to SU-MAC which could be attributed to increased accessibility of control channel and improved utilization of data channels due to superior control information exchange scheme.

  6. New archaeomagnetic data recovered from the study of celtiberic remains from central Spain (Numantia and Ciadueña, 3rd-1st centuries BC). Implications on the fidelity of the Iberian paleointensity database

    NASA Astrophysics Data System (ADS)

    Osete, M. L.; Chauvin, A.; Catanzariti, G.; Jimeno, A.; Campuzano, S. A.; Benito-Batanero, J. P.; Tabernero-Galán, C.; Roperch, P.

    2016-11-01

    Variations of geomagnetic field in the Iberian Peninsula prior to roman times are poorly constrained. Here we report new archaeomagnetic results from four ceramic collections and two combustion structures recovered in two pre-roman (celtiberic) archaeological sites in central Spain. The studied materials have been dated by archaeological evidences and supported by five radiocarbon dates. Rock magnetic experiments indicate that the characteristic remanent manetization (ChRM) is carried by a low coercivity magnetic phase with Curie temperatures of 530-575 °C, most likely Ti-poor titanomagnetite/titanomaghemite. Archaeointensity determinations were carried out by using the classical Thellier-Thellier protocol including tests and corrections for magnetic anisotropy and cooling rate dependency. Two magnetic behaviours were depicted during the laboratory treatment. Black potsherds and poor heated samples from the kilns, presented two magnetization components, alterations or curved Arai plots and were therefore rejected. In contrast, well heated specimens (red ceramic fragments and well heated samples from the kilns) show one single well defined component of magnetization going through the origin and linear Arai plots providing successful archaeointensity determinations. The effect of anisotropy of the thermoremanent magnetization (ATRM) on paleointensity analysis was systematically investigated obtaining very high ATRM corrections on fine pottery specimens. In some cases, differences between the uncorrected and ATRM corrected paleointensity values reached up to 86 %. The mean intensity values obtained from three selected set of samples were 64.3 ± 5.8 μT; 56.8 ± 3.8 and 56.7 ± 4.6 μT (NUS2, CI2 and CIA, respectively), which contribute to better understand the evolution of the palaeofield intensity in central Iberia during the 3rd-1st centuries BC. The direction of the field at first century BC has also been determined from oriented samples from CIA kilns (D = 357.2°; I = 62.2°; N = 10, α95 = 2.7°). The new archaeointensity data disagrees with previous results from Iberian ceramics which were not corrected for the ATRM effect. On the contrary, they are in agreement with the most recent French paleointensity curve and the latest European intensity model; both based on a selection of high quality paleointensity data. This result reinforces the idea that the puzzling scatter often observed in the global paleointensity database is likely due to differences in the laboratory protocols. Further data from well-established laboratory protocols are still necessary to delineate confidently the evolution of the geomagnetic palaeofield during the first millennium BC.

  7. Accurate prediction of pregnancy viability by means of a simple scoring system.

    PubMed

    Bottomley, Cecilia; Van Belle, Vanya; Kirk, Emma; Van Huffel, Sabine; Timmerman, Dirk; Bourne, Tom

    2013-01-01

    What is the performance of a simple scoring system to predict whether women will have an ongoing viable intrauterine pregnancy beyond the first trimester? A simple scoring system using demographic and initial ultrasound variables accurately predicts pregnancy viability beyond the first trimester with an area under the curve (AUC) in a receiver operating characteristic curve of 0.924 [95% confidence interval (CI) 0.900-0.947] on an independent test set. Individual demographic and ultrasound factors, such as maternal age, vaginal bleeding and gestational sac size, are strong predictors of miscarriage. Previous mathematical models have combined individual risk factors with reasonable performance. A simple scoring system derived from a mathematical model that can be easily implemented in clinical practice has not previously been described for the prediction of ongoing viability. This was a prospective observational study in a single early pregnancy assessment centre during a 9-month period. A cohort of 1881 consecutive women undergoing transvaginal ultrasound scan at a gestational age <84 days were included. Women were excluded if the first trimester outcome was not known. Demographic features, symptoms and ultrasound variables were tested for their influence on ongoing viability. Logistic regression was used to determine the influence on first trimester viability from demographics and symptoms alone, ultrasound findings alone and then from all the variables combined. Each model was developed on a training data set, and a simple scoring system was derived from this. This scoring system was tested on an independent test data set. The final outcome based on a total of 1435 participants was an ongoing viable pregnancy in 885 (61.7%) and early pregnancy loss in 550 (38.3%) women. The scoring system using significant demographic variables alone (maternal age and amount of bleeding) to predict ongoing viability gave an AUC of 0.724 (95% CI = 0.692-0.756) in the training set and 0.729 (95% CI = 0.684-0.774) in the test set. The scoring system using significant ultrasound variables alone (mean gestation sac diameter, mean yolk sac diameter and the presence of fetal heart beat) gave an AUC of 0.873 (95% CI = 0.850-0.897) and 0.900 (95% CI = 0.871-0.928) in the training and the test sets, respectively. The final scoring system using demographic and ultrasound variables together gave an AUC of 0.901 (95% CI = 0.881-0.920) and 0.924 (CI = 0.900-0.947) in the training and the test sets, respectively. After defining the cut-off at which the sensitivity is 0.90 on the training set, this model performed with a sensitivity of 0.92, specificity of 0.73, positive predictive value of 84.7% and negative predictive value of 85.4% in the test set. BMI and smoking variables were a potential omission in the data collection and might further improve the model performance if included. A further limitation is the absence of information on either bleeding or pain in 18% of women. Caution should be exercised before implementation of this scoring system prior to further external validation studies This simple scoring system incorporates readily available data that are routinely collected in clinical practice and does not rely on complex data entry. As such it could, unlike most mathematical models, be easily incorporated into normal early pregnancy care, where women may appreciate an individualized calculation of the likelihood of ongoing pregnancy viability. Research by V.V.B. supported by Research Council KUL: GOA MaNet, PFV/10/002 (OPTEC), several PhD/postdoc & fellow grants; IWT: TBM070706-IOTA3, PhD Grants; IBBT; Belgian Federal Science Policy Office: IUAP P7/(DYSCO, `Dynamical systems, control and optimization', 2012-2017). T.B. is supported by the Imperial Healthcare NHS Trust NIHR Biomedical Research Centre. Not applicable.

  8. [Progress in bio-based polyamides].

    PubMed

    Huang, Zhengqiang; Cui, Zhe; Zhang, Heming; Fu, Peng; Zhao, Qingxiang; Liu, Minying

    2016-06-25

    Bio-based polyamides are environment-friendly polymers. The precursors of bio-based polyamides come from bio-based materials such as castor oil, glucose and animal oil. Bio-based polyamides precursors include bio-based amino acids, bio-based lactams, bio-based diprotic acid and bio-based diamines. In this paper, we discussed the route of the precursors of bio-based polyamides that come from bio-based materials. We discussed the properties of bio-based polyamides. Bio-based PA11and bio-based PA1010 are well-known bio-based polyamides; we discussed the origin materials of the precursors, the route of manufacturing bio-based PA11 and PA1010, and their modifications status. The variety, classification and commercial production of bio-based polyamides were described in details, as well as bio-based polyamides development in China.

  9. [Current status of bio-based materials industry in China].

    PubMed

    Diao, Xiaoqian; Weng, Yunxuan; Huang, Zhigang; Yang, Nan; Wang, Xiyuan; Zhang, Min; Jin, Yujuan

    2016-06-25

    In recent years, bio-based materials are becoming a new dominant industry leading the scientific and technological innovation, and economic development of the world. We reviewed the new development of bio-based materials industry in China, analyzed the entire market of bio-based materials products comprehensively, and also stated the industry status of bio-based chemicals, such as lactic acid, 1,3-propanediol, and succinic acid; biodegradable bio-based polymers, such as co-polyester of diacid and diol, polylactic acid, carbon dioxide based copolymer, polyhydroxyalknoates, polycaprolactone, and thermoplastic bio-based plastics; non-biodegradable bio-based polymers, such as bio-based polyamide, polytrimethylene terephthalate, bio-based polyurethane, and bio-based fibers.

  10. 48 CFR 32.1002 - Bases for performance-based payments.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Bases for performance... REGULATION GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Performance-Based Payments 32.1002 Bases for performance-based payments. Performance-based payments may be made on any of the following bases: (a...

  11. 48 CFR 32.1002 - Bases for performance-based payments.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Bases for performance... REGULATION GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Performance-Based Payments 32.1002 Bases for performance-based payments. Performance-based payments may be made on any of the following bases: (a...

  12. 48 CFR 32.1002 - Bases for performance-based payments.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Bases for performance... REGULATION GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Performance-Based Payments 32.1002 Bases for performance-based payments. Performance-based payments may be made on any of the following bases: (a...

  13. 48 CFR 32.1002 - Bases for performance-based payments.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Bases for performance... REGULATION GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Performance-Based Payments 32.1002 Bases for performance-based payments. Performance-based payments may be made on any of the following bases: (a...

  14. 24 CFR 1000.103 - How may IHBG funds be used for tenant-based or project-based rental assistance?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Housing Activities § 1000.103 How may IHBG funds be used for tenant-based or project-based rental assistance? (a) IHBG funds may be used for project-based or tenant-based rental assistance. (b) IHBG funds may be used for project-based or tenant-based rental assistance that is provided in a manner...

  15. Entanglement bases and general structures of orthogonal complete bases

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhong Zaizhe

    2004-10-01

    In quantum mechanics and quantum information, to establish the orthogonal bases is a useful means. The existence of unextendible product bases impels us to study the 'entanglement bases' problems. In this paper, the concepts of entanglement bases and exact-entanglement bases are defined, and a theorem about exact-entanglement bases is given. We discuss the general structures of the orthogonal complete bases. Two examples of applications are given. At last, we discuss the problem of transformation of the general structure forms.

  16. Net-centric ACT-R-Based Cognitive Architecture with DEVS Unified Process

    DTIC Science & Technology

    2011-04-01

    effort has been spent in analyzing various forms of requirement specifications, viz, state-based, Natural Language based, UML-based, Rule- based, BPMN ...requirement specifications in one of the chosen formats such as BPMN , DoDAF, Natural Language Processing (NLP) based, UML- based, DSL or simply

  17. Is questionnaire-based sitting time inaccurate and can it be improved? A cross-sectional investigation using accelerometer-based sitting time

    PubMed Central

    Gupta, Nidhi; Christiansen, Caroline Stordal; Hanisch, Christiana; Bay, Hans; Burr, Hermann; Holtermann, Andreas

    2017-01-01

    Objectives To investigate the differences between a questionnaire-based and accelerometer-based sitting time, and develop a model for improving the accuracy of questionnaire-based sitting time for predicting accelerometer-based sitting time. Methods 183 workers in a cross-sectional study reported sitting time per day using a single question during the measurement period, and wore 2 Actigraph GT3X+ accelerometers on the thigh and trunk for 1–4 working days to determine their actual sitting time per day using the validated Acti4 software. Least squares regression models were fitted with questionnaire-based siting time and other self-reported predictors to predict accelerometer-based sitting time. Results Questionnaire-based and accelerometer-based average sitting times were ≈272 and ≈476 min/day, respectively. A low Pearson correlation (r=0.32), high mean bias (204.1 min) and wide limits of agreement (549.8 to −139.7 min) between questionnaire-based and accelerometer-based sitting time were found. The prediction model based on questionnaire-based sitting explained 10% of the variance in accelerometer-based sitting time. Inclusion of 9 self-reported predictors in the model increased the explained variance to 41%, with 10% optimism using a resampling bootstrap validation. Based on a split validation analysis, the developed prediction model on ≈75% of the workers (n=132) reduced the mean and the SD of the difference between questionnaire-based and accelerometer-based sitting time by 64% and 42%, respectively, in the remaining 25% of the workers. Conclusions This study indicates that questionnaire-based sitting time has low validity and that a prediction model can be one solution to materially improve the precision of questionnaire-based sitting time. PMID:28093433

  18. Influence of base modifications on in-flight base drag in the presence of jet exhaust for Mach numbers from 0.7 to 1.5

    NASA Technical Reports Server (NTRS)

    Powers, Sheryll Goecke

    1988-01-01

    The use of external modifications in the base region to reduce the base drag of a blunt-base body in the presence of jet engine exhaust was investigated in flight. Base pressure data were obtained for the following configurations: (1) blunt base; (2) blunt base modified with splitter plate; and (3) blunt base modified with two variations of a vented cavity. Reynolds number based on the length of the aircraft ranged from 1.2 to 3.1 x 10 to the 8th. Mach number M ranges were 0.71 less than or = M less than or = 0.95 and 1.10 less than or = M less than or = 1.51. The data were analyzed using the blunt base for a reference, or baseline condition. For 1.10 less than or = M less than or = 1.51, the reduction in base drag coefficient provided by the vented cavity configuration ranged from 0.07 to 0.05. These increments in base drag coefficient at M = 1.31 and 1.51 result in base drag reductions of 27 and 24 percent, respectively, when compared to the blunt base drag. For M less than 1, the drag increment between the blunt base and the modification is not significant.

  19. Computer-based simulation training to improve learning outcomes in mannequin-based simulation exercises.

    PubMed

    Curtin, Lindsay B; Finn, Laura A; Czosnowski, Quinn A; Whitman, Craig B; Cawley, Michael J

    2011-08-10

    To assess the impact of computer-based simulation on the achievement of student learning outcomes during mannequin-based simulation. Participants were randomly assigned to rapid response teams of 5-6 students and then teams were randomly assigned to either a group that completed either computer-based or mannequin-based simulation cases first. In both simulations, students used their critical thinking skills and selected interventions independent of facilitator input. A predetermined rubric was used to record and assess students' performance in the mannequin-based simulations. Feedback and student performance scores were generated by the software in the computer-based simulations. More of the teams in the group that completed the computer-based simulation before completing the mannequin-based simulation achieved the primary outcome for the exercise, which was survival of the simulated patient (41.2% vs. 5.6%). The majority of students (>90%) recommended the continuation of simulation exercises in the course. Students in both groups felt the computer-based simulation should be completed prior to the mannequin-based simulation. The use of computer-based simulation prior to mannequin-based simulation improved the achievement of learning goals and outcomes. In addition to improving participants' skills, completing the computer-based simulation first may improve participants' confidence during the more real-life setting achieved in the mannequin-based simulation.

  20. Foundation: Transforming data bases into knowledge bases

    NASA Technical Reports Server (NTRS)

    Purves, R. B.; Carnes, James R.; Cutts, Dannie E.

    1987-01-01

    One approach to transforming information stored in relational data bases into knowledge based representations and back again is described. This system, called Foundation, allows knowledge bases to take advantage of vast amounts of pre-existing data. A benefit of this approach is inspection, and even population, of data bases through an intelligent knowledge-based front-end.

  1. 36 CFR 1237.30 - How do agencies manage records on nitrocellulose-base and cellulose-acetate base film?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... records on nitrocellulose-base and cellulose-acetate base film? 1237.30 Section 1237.30 Parks, Forests... and cellulose-acetate base film? (a) The nitrocellulose base, a substance akin to gun cotton, is chemically unstable and highly flammable. Agencies must handle nitrocellulose-base film (used in the...

  2. 10 CFR 429.40 - Candelabra base incandescent lamps and intermediate base incandescent lamps.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 3 2013-01-01 2013-01-01 false Candelabra base incandescent lamps and intermediate base....40 Candelabra base incandescent lamps and intermediate base incandescent lamps. (a) Sampling plan for selection of units for testing. (1) The requirements of § 429.11 are applicable to candelabra base...

  3. 10 CFR 429.40 - Candelabra base incandescent lamps and intermediate base incandescent lamps.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 3 2012-01-01 2012-01-01 false Candelabra base incandescent lamps and intermediate base....40 Candelabra base incandescent lamps and intermediate base incandescent lamps. (a) Sampling plan for selection of units for testing. (1) The requirements of § 429.11 are applicable to candelabra base...

  4. Introducing Computer-Based Testing in High-Stakes Exams in Higher Education: Results of a Field Experiment.

    PubMed

    Boevé, Anja J; Meijer, Rob R; Albers, Casper J; Beetsma, Yta; Bosker, Roel J

    2015-01-01

    The introduction of computer-based testing in high-stakes examining in higher education is developing rather slowly due to institutional barriers (the need of extra facilities, ensuring test security) and teacher and student acceptance. From the existing literature it is unclear whether computer-based exams will result in similar results as paper-based exams and whether student acceptance can change as a result of administering computer-based exams. In this study, we compared results from a computer-based and paper-based exam in a sample of psychology students and found no differences in total scores across the two modes. Furthermore, we investigated student acceptance and change in acceptance of computer-based examining. After taking the computer-based exam, fifty percent of the students preferred paper-and-pencil exams over computer-based exams and about a quarter preferred a computer-based exam. We conclude that computer-based exam total scores are similar as paper-based exam scores, but that for the acceptance of high-stakes computer-based exams it is important that students practice and get familiar with this new mode of test administration.

  5. An Alternative Collaborative Supervision Practice between University-Based Teachers and School-Based Teachers

    ERIC Educational Resources Information Center

    Steele, Annfrid R.

    2017-01-01

    There is an increased focus in teacher education on research-based teaching as a means to develop a more research-based professional knowledge. However, research from several Western countries shows that neither school-based nor university-based teachers are familiar with how to integrate research-based knowledge in professional teacher practice.…

  6. 42 CFR 412.72 - Modification of base-year costs.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 2 2012-10-01 2012-10-01 false Modification of base-year costs. 412.72 Section 412... Modification of base-year costs. (a) Bases for modification of base-year costs. Base-year costs as determined... before November 16, 1983 has until November 15, 1983 to request its intermediary to reestimate its base...

  7. 42 CFR 412.72 - Modification of base-year costs.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 2 2013-10-01 2013-10-01 false Modification of base-year costs. 412.72 Section 412... Modification of base-year costs. (a) Bases for modification of base-year costs. Base-year costs as determined... before November 16, 1983 has until November 15, 1983 to request its intermediary to reestimate its base...

  8. 42 CFR 412.72 - Modification of base-year costs.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 2 2011-10-01 2011-10-01 false Modification of base-year costs. 412.72 Section 412... Modification of base-year costs. (a) Bases for modification of base-year costs. Base-year costs as determined... before November 16, 1983 has until November 15, 1983 to request its intermediary to reestimate its base...

  9. 42 CFR 412.72 - Modification of base-year costs.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Modification of base-year costs. 412.72 Section 412... Modification of base-year costs. (a) Bases for modification of base-year costs. Base-year costs as determined... before November 16, 1983 has until November 15, 1983 to request its intermediary to reestimate its base...

  10. Concept and practice of evidence-based psychiatry and its application in Nigerian psychiatry: a critical review.

    PubMed

    Onifade, P O; Oluwole, L O

    2006-01-01

    The practice of Evidence-Based Psychiatry started in the 1990's, however prior to this time the practice of psychiatry did have an evidenced base though not structured and systematically spelt out. This study aimed to review the development of the concept and practice of Evidence-Based Psychiatry and to identify position of Nigerian psychiatry in it. Narrative reviews were made from information obtained from scientific publications i.e. (books and journals) and internet-based electronic articles. Evidence-Based Psychiatry emerged from Evidence-Based Medicine in the 1990's and aims to base practice on the best available evidence. The evidence is graded into A, B, and C, depending on the study design. Also critical to the practice of Evidence-Based Psychiatry is the availability of high-grade evidence and an efficient means of storing and retrieving it. Evidence-Based Psychiatry uses a systematic approach and involves five steps. Its scope covers aetiology, diagnosis, intervention, and prognosis. A comprehensive definition of Evidence-Based Psychiatry is given. There is a suggestion to change the term 'Evidence-Based' to 'Systematic Evidence-Based'. The right way to determine if a therapeutic intervention is evidence-based is to consider if the process that led to it is systematic in terms of the five steps of Evidence-Based Psychiatry. Nigeria is yet to develop structures required for Systematic Evidence-Based Psychiatry.

  11. Is questionnaire-based sitting time inaccurate and can it be improved? A cross-sectional investigation using accelerometer-based sitting time.

    PubMed

    Gupta, Nidhi; Christiansen, Caroline Stordal; Hanisch, Christiana; Bay, Hans; Burr, Hermann; Holtermann, Andreas

    2017-01-16

    To investigate the differences between a questionnaire-based and accelerometer-based sitting time, and develop a model for improving the accuracy of questionnaire-based sitting time for predicting accelerometer-based sitting time. 183 workers in a cross-sectional study reported sitting time per day using a single question during the measurement period, and wore 2 Actigraph GT3X+ accelerometers on the thigh and trunk for 1-4 working days to determine their actual sitting time per day using the validated Acti4 software. Least squares regression models were fitted with questionnaire-based siting time and other self-reported predictors to predict accelerometer-based sitting time. Questionnaire-based and accelerometer-based average sitting times were ≈272 and ≈476 min/day, respectively. A low Pearson correlation (r=0.32), high mean bias (204.1 min) and wide limits of agreement (549.8 to -139.7 min) between questionnaire-based and accelerometer-based sitting time were found. The prediction model based on questionnaire-based sitting explained 10% of the variance in accelerometer-based sitting time. Inclusion of 9 self-reported predictors in the model increased the explained variance to 41%, with 10% optimism using a resampling bootstrap validation. Based on a split validation analysis, the developed prediction model on ≈75% of the workers (n=132) reduced the mean and the SD of the difference between questionnaire-based and accelerometer-based sitting time by 64% and 42%, respectively, in the remaining 25% of the workers. This study indicates that questionnaire-based sitting time has low validity and that a prediction model can be one solution to materially improve the precision of questionnaire-based sitting time. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  12. BEAT: A Web-Based Boolean Expression Fault-Based Test Case Generation Tool

    ERIC Educational Resources Information Center

    Chen, T. Y.; Grant, D. D.; Lau, M. F.; Ng, S. P.; Vasa, V. R.

    2006-01-01

    BEAT is a Web-based system that generates fault-based test cases from Boolean expressions. It is based on the integration of our several fault-based test case selection strategies. The generated test cases are considered to be fault-based, because they are aiming at the detection of particular faults. For example, when the Boolean expression is in…

  13. Lessons to be Learned from Evidence-based Medicine: Practice and Promise of Evidence-based Medicine and Evidence-based Education.

    ERIC Educational Resources Information Center

    Wolf, Fredric M.

    2000-01-01

    Presents statistics of deaths caused by medical errors and argues the effects of misconceptions in diagnosis and treatment. Suggests evidence-based medicine to enhance the quality of practice and minimize error rates. Presents 10 evidence-based lessons and discusses the possible benefits of evidence-based medicine to evidence-based education and…

  14. 14 CFR 119.47 - Maintaining a principal base of operations, main operations base, and main maintenance base...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 3 2012-01-01 2012-01-01 false Maintaining a principal base of operations, main operations base, and main maintenance base; change of address. 119.47 Section 119.47 Aeronautics... Under Part 121 or Part 135 of This Chapter § 119.47 Maintaining a principal base of operations, main...

  15. 14 CFR 119.47 - Maintaining a principal base of operations, main operations base, and main maintenance base...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 3 2013-01-01 2013-01-01 false Maintaining a principal base of operations, main operations base, and main maintenance base; change of address. 119.47 Section 119.47 Aeronautics... Under Part 121 or Part 135 of This Chapter § 119.47 Maintaining a principal base of operations, main...

  16. 14 CFR 119.47 - Maintaining a principal base of operations, main operations base, and main maintenance base...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Maintaining a principal base of operations, main operations base, and main maintenance base; change of address. 119.47 Section 119.47 Aeronautics... Under Part 121 or Part 135 of This Chapter § 119.47 Maintaining a principal base of operations, main...

  17. 14 CFR 119.47 - Maintaining a principal base of operations, main operations base, and main maintenance base...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Maintaining a principal base of operations, main operations base, and main maintenance base; change of address. 119.47 Section 119.47 Aeronautics... Under Part 121 or Part 135 of This Chapter § 119.47 Maintaining a principal base of operations, main...

  18. Online Learning: A Comparison of Web-Based and Land-Based Courses

    ERIC Educational Resources Information Center

    Brown, Joy L. M.

    2012-01-01

    Distance learning has become more popular in recent years. Due to concern about the quality of web-based courses, the purpose of this study was to explore the differences in web-based versus land-based courses. In this study, the researcher compares web-based and land-based education courses to explore the strengths and weaknesses of each type of…

  19. High-Resolution Crystal Structure of a Silver(I)-RNA Hybrid Duplex Containing Watson-Crick-like C-Silver(I)-C Metallo-Base Pairs.

    PubMed

    Kondo, Jiro; Tada, Yoshinari; Dairaku, Takenori; Saneyoshi, Hisao; Okamoto, Itaru; Tanaka, Yoshiyuki; Ono, Akira

    2015-11-02

    Metallo-base pairs have been extensively studied for applications in nucleic acid-based nanodevices and genetic code expansion. Metallo-base pairs composed of natural nucleobases are attractive because nanodevices containing natural metallo-base pairs can be easily prepared from commercially available sources. Previously, we have reported a crystal structure of a DNA duplex containing T-Hg(II)-T base pairs. Herein, we have determined a high-resolution crystal structure of the second natural metallo-base pair between pyrimidine bases C-Ag(I)-C formed in an RNA duplex. One Ag(I) occupies the center between two cytosines and forms a C-Ag(I)-C base pair through N3-Ag(I)-N3 linear coordination. The C-Ag(I)-C base pair formation does not disturb the standard A-form conformation of RNA. Since the C-Ag(I)-C base pair is structurally similar to the canonical Watson-Crick base pairs, it can be a useful building block for structure-based design and fabrication of nucleic acid-based nanodevices. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  20. The influence of affective and cognitive arguments on message judgement and attitude change: The moderating effects of meta-bases and structural bases.

    PubMed

    Keer, Mario; van den Putte, Bas; Neijens, Peter; de Wit, John

    2013-01-01

    This study investigated whether the efficacy of affective vs. cognitive persuasive messages was moderated by (1) individuals' subjective assessments of whether their attitudes were based on affect or cognition (i.e. meta-bases) and (2) the degree individuals' attitudes were correlated with affect and cognition (i.e. structural bases). Participants (N = 97) were randomly exposed to a message containing either affective or cognitive arguments discouraging binge drinking. The results demonstrated that meta-bases and not structural bases moderated the influence of argument type on message judgement. Affective (cognitive) messages were judged more positively when individuals' meta-bases were more affective (cognitive). In contrast, structural bases and not meta-bases moderated the influence of argument type on attitude and intention change following exposure to the message. Surprisingly, change was greater among individuals who read a message that mismatched their structural attitude base. Affective messages were more effective as attitudes were more cognition-based, and vice versa. Thus, although individuals prefer messages that match their meta-base, attitude and intention change regarding binge drinking are best established by mismatching their structural base.

  1. Introducing Computer-Based Testing in High-Stakes Exams in Higher Education: Results of a Field Experiment

    PubMed Central

    Boevé, Anja J.; Meijer, Rob R.; Albers, Casper J.; Beetsma, Yta; Bosker, Roel J.

    2015-01-01

    The introduction of computer-based testing in high-stakes examining in higher education is developing rather slowly due to institutional barriers (the need of extra facilities, ensuring test security) and teacher and student acceptance. From the existing literature it is unclear whether computer-based exams will result in similar results as paper-based exams and whether student acceptance can change as a result of administering computer-based exams. In this study, we compared results from a computer-based and paper-based exam in a sample of psychology students and found no differences in total scores across the two modes. Furthermore, we investigated student acceptance and change in acceptance of computer-based examining. After taking the computer-based exam, fifty percent of the students preferred paper-and-pencil exams over computer-based exams and about a quarter preferred a computer-based exam. We conclude that computer-based exam total scores are similar as paper-based exam scores, but that for the acceptance of high-stakes computer-based exams it is important that students practice and get familiar with this new mode of test administration. PMID:26641632

  2. 24 CFR 35.700 - Purpose and applicability.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Development LEAD-BASED PAINT POISONING PREVENTION IN CERTAIN RESIDENTIAL STRUCTURES Project-Based Assistance... practicable lead-based paint hazards in residential properties receiving project-based assistance under a HUD... Program project-based rental assistance and sponsor-based rental assistance components (42 U.S.C. 11402...

  3. 24 CFR 35.700 - Purpose and applicability.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Development LEAD-BASED PAINT POISONING PREVENTION IN CERTAIN RESIDENTIAL STRUCTURES Project-Based Assistance... practicable lead-based paint hazards in residential properties receiving project-based assistance under a HUD... Program project-based rental assistance and sponsor-based rental assistance components (42 U.S.C. 11402...

  4. 24 CFR 35.700 - Purpose and applicability.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Development LEAD-BASED PAINT POISONING PREVENTION IN CERTAIN RESIDENTIAL STRUCTURES Project-Based Assistance... practicable lead-based paint hazards in residential properties receiving project-based assistance under a HUD... Program project-based rental assistance and sponsor-based rental assistance components (42 U.S.C. 11402...

  5. 24 CFR 35.700 - Purpose and applicability.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Development LEAD-BASED PAINT POISONING PREVENTION IN CERTAIN RESIDENTIAL STRUCTURES Project-Based Assistance... practicable lead-based paint hazards in residential properties receiving project-based assistance under a HUD... Program project-based rental assistance and sponsor-based rental assistance components (42 U.S.C. 11402...

  6. 24 CFR 35.700 - Purpose and applicability.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Development LEAD-BASED PAINT POISONING PREVENTION IN CERTAIN RESIDENTIAL STRUCTURES Project-Based Assistance... practicable lead-based paint hazards in residential properties receiving project-based assistance under a HUD... Program project-based rental assistance and sponsor-based rental assistance components (42 U.S.C. 11402...

  7. Identification of Synthetic Fluids Utilizing Pyrolysis Gas Liquid Chromatographic Techniques

    DTIC Science & Technology

    1981-09-01

    Base Stock No. 6327 Di-isodecyl Azelate II 7 Synthetic Base Stock No. 6318 Di-2-ethylhexyl Azelate I 8 Synthetic Base Stock No. 6323 l)i-2-ethylhexyl...Adipatc 13 9 Synthetic Base Stock No. 6321 Di-2-cthylhexyl Sebacattk 14 10 Synthetic Base Stock No. 6326 Di-tridecyl Azelate 15 11 Synthetic Base...Stock No. 6319 Di-tridecyl Adipate 16 12 Synthetic Base Stock No. 6320 Di-iso-octyl Azelate 17 13 Synthetic Base Stock No. 6516 TMP Triheptanoate 18 14

  8. Construction of Silica-Based Micro/Nanoplatforms for Ultrasound Theranostic Biomedicine.

    PubMed

    Zhou, Yang; Han, Xiaoxia; Jing, Xiangxiang; Chen, Yu

    2017-09-01

    Ultrasound (US)-based biomedicine has been extensively explored for its applications in both diagnostic imaging and disease therapy. The fast development of theranostic nanomedicine significantly promotes the development of US-based biomedicine. This progress report summarizes and discusses the recent developments of rational design and fabrication of silica-based micro/nanoparticles for versatile US-based biomedical applications. The synthetic strategies and surface-engineering approaches of silica-based micro/nanoparticles are initially discussed, followed by detailed introduction on their US-based theranostic applications. They have been extensively explored in contrast-enhanced US imaging, US-based multi-modality imaging, synergistic high-intensity focused US (HIFU) ablation, sonosensitizer-enhanced sonodynamic therapy (SDT), as well as US-triggered chemotherapy. Their biological effects and biosafety have been briefly discussed to guarantee further clinical translation. Based on the high biocompatibility, versatile composition/structure and high performance in US-based theranostic biomedicine, these silica-based theranostic agents are expected to pave a new way for achieving efficient US-based theranostics of disease by taking the specific advantages of material science, nanotechnology and US-based biomedicine. © 2017 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  9. Effects of diet on titratable acid-base excretion in grasshoppers.

    PubMed

    Frazier, M R; Harrison, J F; Behmer, S T

    2000-01-01

    Despite the potential for diet to affect organismal acid-base status, especially in herbivores, little is known about the effects of diet on acid-base loading and excretion. We tested the effects of diet on acid-base loading and excretion in grasshoppers by (a) comparing the fecal acid-base content of 15 grasshopper species collected from the field and (b) comparing fecal acid-base excretion rates of Schistocerca americana grasshoppers fed vegetable diets that differed in their ashed and raw acid-base contents. The field experiments indicated that grass-feeding species excrete fairly neutral fecal pellets, while forb/mixed-feeding species vary widely in their fecal acid-base contents. In the laboratory experiment, acid-base excretion rates were positively correlated with dietary ashed base intake rates but were not correlated with the acid-base content of raw, unashed diet or feeding rate. These experiments suggest that some diets could strongly challenge the acid-base homeostasis of herbivores; in some grasshoppers, dietary acid-base loads could produce certainly lethal 1-unit changes in average body pH within 6 h if they were not excreted.

  10. A demonstrative model of a lunar base simulation on a personal computer

    NASA Technical Reports Server (NTRS)

    1985-01-01

    The initial demonstration model of a lunar base simulation is described. This initial model was developed on the personal computer level to demonstrate feasibility and technique before proceeding to a larger computer-based model. Lotus Symphony Version 1.1 software was used to base the demonstration model on an personal computer with an MS-DOS operating system. The personal computer-based model determined the applicability of lunar base modeling techniques developed at an LSPI/NASA workshop. In addition, the personnal computer-based demonstration model defined a modeling structure that could be employed on a larger, more comprehensive VAX-based lunar base simulation. Refinement of this personal computer model and the development of a VAX-based model is planned in the near future.

  11. Investigation of contrast-enhanced subtracted breast CT images with MAP-EM based on projection-based weighting imaging.

    PubMed

    Zhou, Zhengdong; Guan, Shaolin; Xin, Runchao; Li, Jianbo

    2018-06-01

    Contrast-enhanced subtracted breast computer tomography (CESBCT) images acquired using energy-resolved photon counting detector can be helpful to enhance the visibility of breast tumors. In such technology, one challenge is the limited number of photons in each energy bin, thereby possibly leading to high noise in separate images from each energy bin, the projection-based weighted image, and the subtracted image. In conventional low-dose CT imaging, iterative image reconstruction provides a superior signal-to-noise compared with the filtered back projection (FBP) algorithm. In this paper, maximum a posteriori expectation maximization (MAP-EM) based on projection-based weighting imaging for reconstruction of CESBCT images acquired using an energy-resolving photon counting detector is proposed, and its performance was investigated in terms of contrast-to-noise ratio (CNR). The simulation study shows that MAP-EM based on projection-based weighting imaging can improve the CNR in CESBCT images by 117.7%-121.2% compared with FBP based on projection-based weighting imaging method. When compared with the energy-integrating imaging that uses the MAP-EM algorithm, projection-based weighting imaging that uses the MAP-EM algorithm can improve the CNR of CESBCT images by 10.5%-13.3%. In conclusion, MAP-EM based on projection-based weighting imaging shows significant improvement the CNR of the CESBCT image compared with FBP based on projection-based weighting imaging, and MAP-EM based on projection-based weighting imaging outperforms MAP-EM based on energy-integrating imaging for CESBCT imaging.

  12. 40 CFR 745.233 - Lead-based paint activities requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...) TOXIC SUBSTANCES CONTROL ACT LEAD-BASED PAINT POISONING PREVENTION IN CERTAIN RESIDENTIAL STRUCTURES Lead-Based Paint Activities § 745.233 Lead-based paint activities requirements. Lead-based paint... 40 Protection of Environment 31 2014-07-01 2014-07-01 false Lead-based paint activities...

  13. 40 CFR 745.233 - Lead-based paint activities requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...) TOXIC SUBSTANCES CONTROL ACT LEAD-BASED PAINT POISONING PREVENTION IN CERTAIN RESIDENTIAL STRUCTURES Lead-Based Paint Activities § 745.233 Lead-based paint activities requirements. Lead-based paint... 40 Protection of Environment 32 2013-07-01 2013-07-01 false Lead-based paint activities...

  14. 40 CFR 745.233 - Lead-based paint activities requirements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) TOXIC SUBSTANCES CONTROL ACT LEAD-BASED PAINT POISONING PREVENTION IN CERTAIN RESIDENTIAL STRUCTURES Lead-Based Paint Activities § 745.233 Lead-based paint activities requirements. Lead-based paint... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Lead-based paint activities...

  15. 40 CFR 745.233 - Lead-based paint activities requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...) TOXIC SUBSTANCES CONTROL ACT LEAD-BASED PAINT POISONING PREVENTION IN CERTAIN RESIDENTIAL STRUCTURES Lead-Based Paint Activities § 745.233 Lead-based paint activities requirements. Lead-based paint... 40 Protection of Environment 31 2011-07-01 2011-07-01 false Lead-based paint activities...

  16. 40 CFR 745.233 - Lead-based paint activities requirements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...) TOXIC SUBSTANCES CONTROL ACT LEAD-BASED PAINT POISONING PREVENTION IN CERTAIN RESIDENTIAL STRUCTURES Lead-Based Paint Activities § 745.233 Lead-based paint activities requirements. Lead-based paint... 40 Protection of Environment 32 2012-07-01 2012-07-01 false Lead-based paint activities...

  17. [A Study of the Evidence-Based Nursing Practice Competence of Nurses and Its Clinical Applications].

    PubMed

    Hsu, Li-Ling; Hsieh, Suh-Ing; Huang, Ya-Hsuan

    2015-10-01

    Nurses must develop competence in evidence-based nursing in order to provide the best practice medical care to patients. Evidence-based nursing uses issue identification, data mining, and information consolidation from the related medical literature to help nurses find the best evidence. Therefore, for medical institutions to provide quality clinical care, it is necessary for nurses to develop competence in evidence-based nursing. This study aims to explore the effect of a fundamental evidence-based nursing course, as a form of educational intervention, on the development of evidence-based nursing knowledge, self-efficacy in evidence-based practice activities, and outcome expectations of evidence-based practice in nurse participants. Further the competence of these nurses in overcoming obstacles in evidence-based nursing practice. This quasi-experimental study used a pre-post test design with a single group of participants. A convenience sample of 34 nurses from a municipal hospital in northern Taiwan received 8 hours of a fundamental evidence-based nursing course over a two-week period. Participants were asked to complete four questionnaires before and after the intervention. The questionnaires measured the participants' basic demographics, experience in mining the medical literature, evidence-based nursing knowledge, self-efficacy in evidence-based practice activities, outcome expectations of evidence-based practice, competence in overcoming obstacles in evidence-based nursing practice, and learning satisfaction. Collected data was analyzed using paired t, Wilcoxon Signed Rank, and McNemar tests to measure the differences among participants' evidence-based nursing knowledge and practice activities before and after the workshop. The nurses demonstrated significantly higher scores from pre-test to post-test in evidence-based nursing knowledge II, self-efficacy in evidence-based nursing practice activities, and outcome expectations of evidence-based practice. Although the differences did not reach statistical significance, the post-test scores were significantly lower than pre-test scores in terms of the measurement of the nurses' obstacles in evidence-based nursing practice, which indicates significant improvements from pre-test to post-test in terms of the competence of participants in overcoming obstacles in evidence-based nursing practice. The intervention was found to be effective in improving the evidence-based nursing knowledge, self-efficacy in evidence-based nursing practice activities, and outcome expectations of evidence-based practice of participants and effective in reducing their obstacles in evidence-based nursing practice. Medical institutions should provide evidence-based nursing courses on a regular basis as a part of in-service education for nurses in order to help nurses develop the evidence-based nursing knowledge and practical competence required to provide quality clinical care.

  18. Case-based reasoning for space applications: Utilization of prior experience in knowledge-based systems

    NASA Technical Reports Server (NTRS)

    King, James A.

    1987-01-01

    The goal is to explain Case-Based Reasoning as a vehicle to establish knowledge-based systems based on experimental reasoning for possible space applications. This goal will be accomplished through an examination of reasoning based on prior experience in a sample domain, and also through a presentation of proposed space applications which could utilize Case-Based Reasoning techniques.

  19. Moral empiricism and the bias for act-based rules.

    PubMed

    Ayars, Alisabeth; Nichols, Shaun

    2017-10-01

    Previous studies on rule learning show a bias in favor of act-based rules, which prohibit intentionally producing an outcome but not merely allowing the outcome. Nichols, Kumar, Lopez, Ayars, and Chan (2016) found that exposure to a single sample violation in which an agent intentionally causes the outcome was sufficient for participants to infer that the rule was act-based. One explanation is that people have an innate bias to think rules are act-based. We suggest an alternative empiricist account: since most rules that people learn are act-based, people form an overhypothesis (Goodman, 1955) that rules are typically act-based. We report three studies that indicate that people can use information about violations to form overhypotheses about rules. In study 1, participants learned either three "consequence-based" rules that prohibited allowing an outcome or three "act-based" rules that prohibiting producing the outcome; in a subsequent learning task, we found that participants who had learned three consequence-based rules were more likely to think that the new rule prohibited allowing an outcome. In study 2, we presented participants with either 1 consequence-based rule or 3 consequence-based rules, and we found that those exposed to 3 such rules were more likely to think that a new rule was also consequence based. Thus, in both studies, it seems that learning 3 consequence-based rules generates an overhypothesis to expect new rules to be consequence-based. In a final study, we used a more subtle manipulation. We exposed participants to examples act-based or accident-based (strict liability) laws and then had them learn a novel rule. We found that participants who were exposed to the accident-based laws were more likely to think a new rule was accident-based. The fact that participants' bias for act-based rules can be shaped by evidence from other rules supports the idea that the bias for act-based rules might be acquired as an overhypothesis from the preponderance of act-based rules. Copyright © 2017 Elsevier B.V. All rights reserved.

  20. Comparative Evaluation of Rice Bran Wax as an Ointment Base with Standard Base

    PubMed Central

    Sabale, Vidya; Sabale, P. M.; Lakhotiya, C. L.

    2009-01-01

    Waxes have been used in many cosmetic preparations and pharmaceuticals as formulation aids. Rice bran wax is a byproduct of rice bran oil industry. Present investigation has been aimed to explore the possible utility of rice bran wax as ointment base compared to standard base. The rice bran wax obtained, purified and its physicochemical characteristics were determined. Ointment base acts as a carrier for medicaments. The ointment base composition determines not only the extent of penetration but also controls the transfer of medicaments from the base to the body tissues. Rice bran wax base was compared with standard base for appearance, spreadability, water number, wash ability and diffusibility. The results show that rice bran wax acts as an ointment base as far as its pharmaceutical properties are concerned and it could effectively replace comparatively costlier available ointment bases. PMID:20177466

  1. Recent Progress in Optical Biosensors Based on Smartphone Platforms

    PubMed Central

    Geng, Zhaoxin; Zhang, Xiong; Fan, Zhiyuan; Lv, Xiaoqing; Su, Yue; Chen, Hongda

    2017-01-01

    With a rapid improvement of smartphone hardware and software, especially complementary metal oxide semiconductor (CMOS) cameras, many optical biosensors based on smartphone platforms have been presented, which have pushed the development of the point-of-care testing (POCT). Imaging-based and spectrometry-based detection techniques have been widely explored via different approaches. Combined with the smartphone, imaging-based and spectrometry-based methods are currently used to investigate a wide range of molecular properties in chemical and biological science for biosensing and diagnostics. Imaging techniques based on smartphone-based microscopes are utilized to capture microscale analysts, while spectrometry-based techniques are used to probe reactions or changes of molecules. Here, we critically review the most recent progress in imaging-based and spectrometry-based smartphone-integrated platforms that have been developed for chemical experiments and biological diagnosis. We focus on the analytical performance and the complexity for implementation of the platforms. PMID:29068375

  2. The effects of performance-based assessment criteria on student performance and self-assessment skills

    PubMed Central

    van der Klink, Marcel R.; van Merriënboer, Jeroen J. G.

    2010-01-01

    This study investigated the effect of performance-based versus competence-based assessment criteria on task performance and self-assessment skills among 39 novice secondary vocational education students in the domain of nursing and care. In a performance-based assessment group students are provided with a preset list of performance-based assessment criteria, describing what students should do, for the task at hand. The performance-based group is compared to a competence-based assessment group in which students receive a preset list of competence-based assessment criteria, describing what students should be able to do. The test phase revealed that the performance-based group outperformed the competence-based group on test task performance. In addition, higher performance of the performance-based group was reached with lower reported mental effort during training, indicating a higher instructional efficiency for novice students. PMID:20054648

  3. Recent Progress in Optical Biosensors Based on Smartphone Platforms.

    PubMed

    Geng, Zhaoxin; Zhang, Xiong; Fan, Zhiyuan; Lv, Xiaoqing; Su, Yue; Chen, Hongda

    2017-10-25

    With a rapid improvement of smartphone hardware and software, especially complementary metal oxide semiconductor (CMOS) cameras, many optical biosensors based on smartphone platforms have been presented, which have pushed the development of the point-of-care testing (POCT). Imaging-based and spectrometry-based detection techniques have been widely explored via different approaches. Combined with the smartphone, imaging-based and spectrometry-based methods are currently used to investigate a wide range of molecular properties in chemical and biological science for biosensing and diagnostics. Imaging techniques based on smartphone-based microscopes are utilized to capture microscale analysts, while spectrometry-based techniques are used to probe reactions or changes of molecules. Here, we critically review the most recent progress in imaging-based and spectrometry-based smartphone-integrated platforms that have been developed for chemical experiments and biological diagnosis. We focus on the analytical performance and the complexity for implementation of the platforms.

  4. Web-based interventions for menopause: A systematic integrated literature review.

    PubMed

    Im, Eun-Ok; Lee, Yaelim; Chee, Eunice; Chee, Wonshik

    2017-01-01

    Advances in computer and Internet technologies have allowed health care providers to develop, use, and test various types of Web-based interventions for their practice and research. Indeed, an increasing number of Web-based interventions have recently been developed and tested in health care fields. Despite the great potential for Web-based interventions to improve practice and research, little is known about the current status of Web-based interventions, especially those related to menopause. To identify the current status of Web-based interventions used in the field of menopause, a literature review was conducted using multiple databases, with the keywords "online," "Internet," "Web," "intervention," and "menopause." Using these keywords, a total of 18 eligible articles were analyzed to identify the current status of Web-based interventions for menopause. Six themes reflecting the current status of Web-based interventions for menopause were identified: (a) there existed few Web-based intervention studies on menopause; (b) Web-based decision support systems were mainly used; (c) there was a lack of detail on the interventions; (d) there was a lack of guidance on the use of Web-based interventions; (e) counselling was frequently combined with Web-based interventions; and (f) the pros and cons were similar to those of Web-based methods in general. Based on these findings, directions for future Web-based interventions for menopause are provided. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  5. Nonlinear dynamic modeling of a simple flexible rotor system subjected to time-variable base motions

    NASA Astrophysics Data System (ADS)

    Chen, Liqiang; Wang, Jianjun; Han, Qinkai; Chu, Fulei

    2017-09-01

    Rotor systems carried in transportation system or under seismic excitations are considered to have a moving base. To study the dynamic behavior of flexible rotor systems subjected to time-variable base motions, a general model is developed based on finite element method and Lagrange's equation. Two groups of Euler angles are defined to describe the rotation of the rotor with respect to the base and that of the base with respect to the ground. It is found that the base rotations would cause nonlinearities in the model. To verify the proposed model, a novel test rig which could simulate the base angular-movement is designed. Dynamic experiments on a flexible rotor-bearing system with base angular motions are carried out. Based upon these, numerical simulations are conducted to further study the dynamic response of the flexible rotor under harmonic angular base motions. The effects of base angular amplitude, rotating speed and base frequency on response behaviors are discussed by means of FFT, waterfall, frequency response curve and orbits of the rotor. The FFT and waterfall plots of the disk horizontal and vertical vibrations are marked with multiplications of the base frequency and sum and difference tones of the rotating frequency and the base frequency. Their amplitudes will increase remarkably when they meet the whirling frequencies of the rotor system.

  6. Design of Composite Structures Using Knowledge-Based and Case Based Reasoning

    NASA Technical Reports Server (NTRS)

    Lambright, Jonathan Paul

    1996-01-01

    A method of using knowledge based and case based reasoning to assist designers during conceptual design tasks of composite structures was proposed. The cooperative use of heuristics, procedural knowledge, and previous similar design cases suggests a potential reduction in design cycle time and ultimately product lead time. The hypothesis of this work is that the design process of composite structures can be improved by using Case-Based Reasoning (CBR) and Knowledge-Based (KB) reasoning in the early design stages. The technique of using knowledge-based and case-based reasoning facilitates the gathering of disparate information into one location that is easily and readily available. The method suggests that the inclusion of downstream life-cycle issues into the conceptual design phase reduces potential of defective, and sub-optimal composite structures. Three industry experts were interviewed extensively. The experts provided design rules, previous design cases, and test problems. A Knowledge Based Reasoning system was developed using the CLIPS (C Language Interpretive Procedural System) environment and a Case Based Reasoning System was developed using the Design Memory Utility For Sharing Experiences (MUSE) xviii environment. A Design Characteristic State (DCS) was used to document the design specifications, constraints, and problem areas using attribute-value pair relationships. The DCS provided consistent design information between the knowledge base and case base. Results indicated that the use of knowledge based and case based reasoning provided a robust design environment for composite structures. The knowledge base provided design guidance from well defined rules and procedural knowledge. The case base provided suggestions on design and manufacturing techniques based on previous similar designs and warnings of potential problems and pitfalls. The case base complemented the knowledge base and extended the problem solving capability beyond the existence of limited well defined rules. The findings indicated that the technique is most effective when used as a design aid and not as a tool to totally automate the composites design process. Other areas of application and implications for future research are discussed.

  7. Literature-Based Instruction: Reshaping the Curriculum.

    ERIC Educational Resources Information Center

    Raphael, Taffy E., Ed.; Au, Kathryn H., Ed.

    Making a case for the value of literature-based instruction, this book presents an overview of the extensive knowledge base supporting literature-based approaches to literacy instruction. It notes that literature-based instruction goes beyond simply changing the kinds of texts children read--also required in literature-based instruction are an…

  8. Environmental Assessment: General Plan-Based Environmental Impact Analysis Process, Laughlin Air Force Base

    DTIC Science & Technology

    2007-05-01

    BASED ENVIROMENTAL IMPACT ANALYSIS PROCESS LAUGHLIN AIR FORCE BASE, TEXAS AGENCY: 47th Flying Training Wing (FTW), Laughlin Air Force Base (AFB), Texas...8217\\ \\ \\ \\ \\\\ \\ ~ >(- \\ , ~ AOC01 \\ PS018 / WP002 \\ DP008 // WP006 \\ ~ ,/ ’----- -----·-------------~--/·/ LAUGHLIN AIR FORCE BASE ENVIROMENTAL RESTORATION

  9. 10 CFR 429.40 - Candelabra base incandescent lamps and intermediate base incandescent lamps.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 3 2014-01-01 2014-01-01 false Candelabra base incandescent lamps and intermediate base incandescent lamps. 429.40 Section 429.40 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION CERTIFICATION....40 Candelabra base incandescent lamps and intermediate base incandescent lamps. (a) Sampling plan for...

  10. Starting Strong: Evidence-­Based Early Literacy Practices

    ERIC Educational Resources Information Center

    Blamey, Katrin; Beauchat, Katherine

    2016-01-01

    Four evidence-based instructional approaches create an essential resource for any early literacy teacher or coach. Improve your teaching practices in all areas of early literacy. Use four proven instructional approaches--standards based, evidenced based, assessment based, and student based--to improve their teaching practice in all areas of early…

  11. Quantitative Analyses about Market- and Prevalence-Based Needs for Adapted Physical Education Teachers in the Public Schools in the United States

    ERIC Educational Resources Information Center

    Zhang, Jiabei

    2011-01-01

    The purpose of this study was to analyze quantitative needs for more adapted physical education (APE) teachers based on both market- and prevalence-based models. The market-based need for more APE teachers was examined based on APE teacher positions funded, while the prevalence-based need for additional APE teachers was analyzed based on students…

  12. Systematic Differences in HIV, Syphilis and Risk Behaviors among Street Based and Establishment Based Female Sex Workers in Kathmandu Valley of Nepal.

    PubMed

    Kakchapati, Sampurna; Paudel, Tarun; Maharjan, Manju; Lim, Apiradee

    2016-12-01

    Female Sex Workers (FSWs) are main drivers of the HIV epidemic in Nepal. The work environment of sex work in Nepal is differentiated into establishment based (e.g. massage parlors, dance restaurants, hotels and lodges) and street based (e.g. streets, parks and markets). The study compares HIV, syphilis and risk behaviours among establishment-based FSWs and street-based FSWs in Kathmandu Valley of Nepal. Cross-sectional bio-behavioral surveys in 2006, 2008, 2011 and 2015 aimed to sample 2093 FSWs using two stage cluster sampling in the Kathmandu valley. Statistical analysis used chi-squared tests and logistic regression models to assess differences of HIV, syphilis and risk behaviors among street-based FSWs and establishment-based FSWs. The study included 39.7% street-based FSWs and 60.3% establishment-based FSWs. The street-based FSWs had lower education levels, older age groups, separated, longer duration of sex work and inconsistent condom used with clients than establishment-based FSWs (p<0.05). Establishment-based FSWs were lower exposure to HIV intervention programs and pervasive alcohol consumption and use of drugs (p<0.05). The multivariate analysis showed that street-based FSWs were more likely of HIV test (aOR=1.25, 95%CI=1.04, 1.49), HIV (aOR=4.72, 95%CI=2.19, 10.15) and syphilis (aOR=7.96, 95%CI=3.49, 18.15) than establishment-based FSWs. Street-based FSWs possessed higher risk behaviour and have higher HIV and syphilis prevalence. HIV prevention interventions targeting FSWs should consider risks and vulnerability of street-based FSWs. .

  13. Systematic Differences in HIV, Syphilis and Risk Behaviors among Street Based and Establishment Based Female Sex Workers in Kathmandu Valley of Nepal

    PubMed Central

    Paudel, Tarun; Maharjan, Manju; Lim, Apiradee

    2016-01-01

    Background: Female Sex Workers (FSWs) are main drivers of the HIV epidemic in Nepal. The work environment of sex work in Nepal is differentiated into establishment based (e.g. massage parlors, dance restaurants, hotels and lodges) and street based (e.g. streets, parks and markets). The study compares HIV, syphilis and risk behaviours among establishment-based FSWs and street-based FSWs in Kathmandu Valley of Nepal. Materials and Methods: Cross-sectional bio-behavioral surveys in 2006, 2008, 2011 and 2015 aimed to sample 2093 FSWs using two stage cluster sampling in the Kathmandu valley. Statistical analysis used chi-squared tests and logistic regression models to assess differences of HIV, syphilis and risk behaviors among street-based FSWs and establishment-based FSWs. Results: The study included 39.7% street-based FSWs and 60.3% establishment-based FSWs. The street-based FSWs had lower education levels, older age groups, separated, longer duration of sex work and inconsistent condom used with clients than establishment-based FSWs (p<0.05). Establishment-based FSWs were lower exposure to HIV intervention programs and pervasive alcohol consumption and use of drugs (p<0.05). The multivariate analysis showed that street-based FSWs were more likely of HIV test (aOR=1.25, 95%CI=1.04, 1.49), HIV (aOR=4.72, 95%CI=2.19, 10.15) and syphilis (aOR=7.96, 95%CI=3.49, 18.15) than establishment-based FSWs. Conclusion: Street-based FSWs possessed higher risk behaviour and have higher HIV and syphilis prevalence. HIV prevention interventions targeting FSWs should consider risks and vulnerability of street-based FSWs. . PMID:28804674

  14. Nurses' readiness for evidence-based practice at Finnish university hospitals: a national survey.

    PubMed

    Saunders, Hannele; Stevens, Kathleen R; Vehviläinen-Julkunen, Katri

    2016-08-01

    The aim of this study was to determine nurses' readiness for evidence-based practice at Finnish university hospitals. Although systematic implementation of evidence-based practice is essential to effectively improving patient outcomes and value of care, nurses do not consistently use evidence in practice. Uptake is hampered by lack of nurses' individual and organizational readiness for evidence-based practice. Although nurses' evidence-based practice competencies have been widely studied in countries leading the evidence-based practice movement, less is known about nurses' readiness for evidence-based practice in the non-English-speaking world. A cross-sectional descriptive survey design. The study was conducted in November-December 2014 in every university hospital in Finland with a convenience sample (n = 943) of practicing nurses. The electronic survey data were collected using the Stevens' Evidence-Based Practice Readiness Inventory, which was translated into Finnish according to standardized guidelines for translation of research instruments. The data were analysed using descriptive and inferential statistics. Nurses reported low to moderate levels of self-efficacy and low levels of evidence-based practice knowledge. A statistically significant, direct correlation was found between nurses' self-efficacy in employing evidence-based practice and their actual evidence-based practice knowledge level. Several statistically significant differences were found between nurses' socio-demographic variables and nurses' self-efficacy in employing evidence-based practice, and actual and perceived evidence-based practice knowledge. Finnish nurses at university hospitals are not ready for evidence-based practice. Although nurses are familiar with the concept of evidence-based practice, they lack the evidence-based practice knowledge and self-efficacy in employing evidence-based practice required for integrating best evidence into clinical care delivery. © 2016 John Wiley & Sons Ltd.

  15. Marker-based or model-based RSA for evaluation of hip resurfacing arthroplasty? A clinical validation and 5-year follow-up.

    PubMed

    Lorenzen, Nina Dyrberg; Stilling, Maiken; Jakobsen, Stig Storgaard; Gustafson, Klas; Søballe, Kjeld; Baad-Hansen, Thomas

    2013-11-01

    The stability of implants is vital to ensure a long-term survival. RSA determines micro-motions of implants as a predictor of early implant failure. RSA can be performed as a marker- or model-based analysis. So far, CAD and RE model-based RSA have not been validated for use in hip resurfacing arthroplasty (HRA). A phantom study determined the precision of marker-based and CAD and RE model-based RSA on a HRA implant. In a clinical study, 19 patients were followed with stereoradiographs until 5 years after surgery. Analysis of double-examination migration results determined the clinical precision of marker-based and CAD model-based RSA, and at the 5-year follow-up, results of the total translation (TT) and the total rotation (TR) for marker- and CAD model-based RSA were compared. The phantom study showed that comparison of the precision (SDdiff) in marker-based RSA analysis was more precise than model-based RSA analysis in TT (p CAD < 0.001; p RE = 0.04) and TR (p CAD = 0.01; p RE < 0.001). The clinical precision (double examination in 8 patients) comparing the precision SDdiff was better evaluating the TT using the marker-based RSA analysis (p = 0.002), but showed no difference between the marker- and CAD model-based RSA analysis regarding the TR (p = 0.91). Comparing the mean signed values regarding the TT and the TR at the 5-year follow-up in 13 patients, the TT was lower (p = 0.03) and the TR higher (p = 0.04) in the marker-based RSA compared to CAD model-based RSA. The precision of marker-based RSA was significantly better than model-based RSA. However, problems with occluded markers lead to exclusion of many patients which was not a problem with model-based RSA. HRA were stable at the 5-year follow-up. The detection limit was 0.2 mm TT and 1° TR for marker-based and 0.5 mm TT and 1° TR for CAD model-based RSA for HRA.

  16. Advanced membrane electrode assemblies for fuel cells

    DOEpatents

    Kim, Yu Seung; Pivovar, Bryan S.

    2012-07-24

    A method of preparing advanced membrane electrode assemblies (MEA) for use in fuel cells. A base polymer is selected for a base membrane. An electrode composition is selected to optimize properties exhibited by the membrane electrode assembly based on the selection of the base polymer. A property-tuning coating layer composition is selected based on compatibility with the base polymer and the electrode composition. A solvent is selected based on the interaction of the solvent with the base polymer and the property-tuning coating layer composition. The MEA is assembled by preparing the base membrane and then applying the property-tuning coating layer to form a composite membrane. Finally, a catalyst is applied to the composite membrane.

  17. Theoretical determination of one-electron redox potentials for DNA bases, base pairs, and stacks.

    PubMed

    Paukku, Y; Hill, G

    2011-05-12

    Electron affinities, ionization potentials, and redox potentials for DNA bases, base pairs, and N-methylated derivatives are computed at the DFT/M06-2X/6-31++G(d,p) level of theory. Redox properties of a guanine-guanine stack model are explored as well. Reduction and oxidation potentials are in good agreement with the experimental ones. Electron affinities of base pairs were found to be negative. Methylation of canonical bases affects the ionization potentials the most. Base pair formation and base stacking lower ionization potentials by 0.3 eV. Pairing of guanine with the 5-methylcytosine does not seem to influence the redox properties of this base pair much.

  18. Method for rapid base sequencing in DNA and RNA

    DOEpatents

    Jett, J.H.; Keller, R.A.; Martin, J.C.; Moyzis, R.K.; Ratliff, R.L.; Shera, E.B.; Stewart, C.C.

    1987-10-07

    A method is provided for the rapid base sequencing of DNA or RNA fragments wherein a single fragment of DNA or RNA is provided with identifiable bases and suspended in a moving flow stream. An exonuclease sequentially cleaves individual bases from the end of the suspended fragment. The moving flow stream maintains the cleaved bases in an orderly train for subsequent detection and identification. In a particular embodiment, individual bases forming the DNA or RNA fragments are individually tagged with a characteristic fluorescent dye. The train of bases is then excited to fluorescence with an output spectrum characteristic of the individual bases. Accordingly, the base sequence of the original DNA or RNA fragment can be reconstructed. 2 figs.

  19. Mutually unbiased bases in six dimensions: The four most distant bases

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Raynal, Philippe; Lue Xin; Englert, Berthold-Georg

    2011-06-15

    We consider the average distance between four bases in six dimensions. The distance between two orthonormal bases vanishes when the bases are the same, and the distance reaches its maximal value of unity when the bases are unbiased. We perform a numerical search for the maximum average distance and find it to be strictly smaller than unity. This is strong evidence that no four mutually unbiased bases exist in six dimensions. We also provide a two-parameter family of three bases which, together with the canonical basis, reach the numerically found maximum of the average distance, and we conduct a detailedmore » study of the structure of the extremal set of bases.« less

  20. Advanced membrane electrode assemblies for fuel cells

    DOEpatents

    Kim, Yu Seung; Pivovar, Bryan S

    2014-02-25

    A method of preparing advanced membrane electrode assemblies (MEA) for use in fuel cells. A base polymer is selected for a base membrane. An electrode composition is selected to optimize properties exhibited by the membrane electrode assembly based on the selection of the base polymer. A property-tuning coating layer composition is selected based on compatibility with the base polymer and the electrode composition. A solvent is selected based on the interaction of the solvent with the base polymer and the property-tuning coating layer composition. The MEA is assembled by preparing the base membrane and then applying the property-tuning coating layer to form a composite membrane. Finally, a catalyst is applied to the composite membrane.

  1. Method for rapid base sequencing in DNA and RNA

    DOEpatents

    Jett, J.H.; Keller, R.A.; Martin, J.C.; Moyzis, R.K.; Ratliff, R.L.; Shera, E.B.; Stewart, C.C.

    1990-10-09

    A method is provided for the rapid base sequencing of DNA or RNA fragments wherein a single fragment of DNA or RNA is provided with identifiable bases and suspended in a moving flow stream. An exonuclease sequentially cleaves individual bases from the end of the suspended fragment. The moving flow stream maintains the cleaved bases in an orderly train for subsequent detection and identification. In a particular embodiment, individual bases forming the DNA or RNA fragments are individually tagged with a characteristic fluorescent dye. The train of bases is then excited to fluorescence with an output spectrum characteristic of the individual bases. Accordingly, the base sequence of the original DNA or RNA fragment can be reconstructed. 2 figs.

  2. Method for rapid base sequencing in DNA and RNA

    DOEpatents

    Jett, James H.; Keller, Richard A.; Martin, John C.; Moyzis, Robert K.; Ratliff, Robert L.; Shera, E. Brooks; Stewart, Carleton C.

    1990-01-01

    A method is provided for the rapid base sequencing of DNA or RNA fragments wherein a single fragment of DNA or RNA is provided with identifiable bases and suspended in a moving flow stream. An exonuclease sequentially cleaves individual bases from the end of the suspended fragment. The moving flow stream maintains the cleaved bases in an orderly train for subsequent detection and identification. In a particular embodiment, individual bases forming the DNA or RNA fragments are individually tagged with a characteristic fluorescent dye. The train of bases is then excited to fluorescence with an output spectrum characteristic of the individual bases. Accordingly, the base sequence of the original DNA or RNA fragment can be reconstructed.

  3. 23. Photographic copy of an asconstructed site plan for North ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    23. Photographic copy of an as-constructed site plan for North Base: Air Force Flight Test Center, Edwards Air Force Base, Edwards, California: North Base Site Plan, February 1970. This drawing shows the North Base building distribution substantially as it appears in 1995. Records on file at AFFTC/CE-CECC-B (Design/Construction Flight/RPMC), Edwards AFB, California. - Edwards Air Force Base, North Base, North Base Road, Boron, Kern County, CA

  4. Comparability of a Paper-Based Language Test and a Computer-Based Language Test.

    ERIC Educational Resources Information Center

    Choi, Inn-Chull; Kim, Kyoung Sung; Boo, Jaeyool

    2003-01-01

    Utilizing the Test of English Proficiency, developed by Seoul National University (TEPS), examined comparability between the paper-based language test and the computer-based language test based on content and construct validation employing content analyses based on corpus linguistic techniques in addition to such statistical analyses as…

  5. 24 CFR 200.800 - Lead-based paint.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 2 2012-04-01 2012-04-01 false Lead-based paint. 200.800 Section... DEVELOPMENT GENERAL INTRODUCTION TO FHA PROGRAMS Lead-Based Paint Poisoning Prevention § 200.800 Lead-based paint. The Lead-Based Paint Poisoning Prevention Act (42 U.S.C. 4821-4846), the Residential Lead-Based...

  6. 24 CFR 200.800 - Lead-based paint.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 2 2013-04-01 2013-04-01 false Lead-based paint. 200.800 Section... DEVELOPMENT GENERAL INTRODUCTION TO FHA PROGRAMS Lead-Based Paint Poisoning Prevention § 200.800 Lead-based paint. The Lead-Based Paint Poisoning Prevention Act (42 U.S.C. 4821-4846), the Residential Lead-Based...

  7. 24 CFR 200.800 - Lead-based paint.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 2 2014-04-01 2014-04-01 false Lead-based paint. 200.800 Section... DEVELOPMENT GENERAL INTRODUCTION TO FHA PROGRAMS Lead-Based Paint Poisoning Prevention § 200.800 Lead-based paint. The Lead-Based Paint Poisoning Prevention Act (42 U.S.C. 4821-4846), the Residential Lead-Based...

  8. 24 CFR 200.800 - Lead-based paint.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 2 2011-04-01 2011-04-01 false Lead-based paint. 200.800 Section... DEVELOPMENT GENERAL INTRODUCTION TO FHA PROGRAMS Lead-Based Paint Poisoning Prevention § 200.800 Lead-based paint. The Lead-Based Paint Poisoning Prevention Act (42 U.S.C. 4821-4846), the Residential Lead-Based...

  9. 24 CFR 200.800 - Lead-based paint.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Lead-based paint. 200.800 Section... DEVELOPMENT GENERAL INTRODUCTION TO FHA PROGRAMS Lead-Based Paint Poisoning Prevention § 200.800 Lead-based paint. The Lead-Based Paint Poisoning Prevention Act (42 U.S.C. 4821-4846), the Residential Lead-Based...

  10. 77 FR 26229 - Meloy Channel, U.S. Coast Guard Base Miami Beach, FL; Restricted Area

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-03

    ....S. Coast Guard Base Miami Beach, FL; Restricted Area AGENCY: United States Army Corps of Engineers... the waters surrounding the U.S. Coast Guard Base Miami Beach, Florida (Base Miami Beach). Base Miami... corridors encompassing the waters immediately contiguous to Base Miami Beach. The amendment will also serve...

  11. 40 CFR 1066.610 - Mass-based and molar-based exhaust emission calculations.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 34 2012-07-01 2012-07-01 false Mass-based and molar-based exhaust... (CONTINUED) AIR POLLUTION CONTROLS VEHICLE-TESTING PROCEDURES Calculations § 1066.610 Mass-based and molar-based exhaust emission calculations. (a) Calculate your total mass of emissions over a test cycle as...

  12. 40 CFR 1066.610 - Mass-based and molar-based exhaust emission calculations.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 34 2013-07-01 2013-07-01 false Mass-based and molar-based exhaust... (CONTINUED) AIR POLLUTION CONTROLS VEHICLE-TESTING PROCEDURES Calculations § 1066.610 Mass-based and molar-based exhaust emission calculations. (a) Calculate your total mass of emissions over a test cycle as...

  13. Model-based RSA of a femoral hip stem using surface and geometrical shape models.

    PubMed

    Kaptein, Bart L; Valstar, Edward R; Spoor, Cees W; Stoel, Berend C; Rozing, Piet M

    2006-07-01

    Roentgen stereophotogrammetry (RSA) is a highly accurate three-dimensional measuring technique for assessing micromotion of orthopaedic implants. A drawback is that markers have to be attached to the implant. Model-based techniques have been developed to prevent using special marked implants. We compared two model-based RSA methods with standard marker-based RSA techniques. The first model-based RSA method used surface models, and the second method used elementary geometrical shape (EGS) models. We used a commercially available stem to perform experiments with a phantom as well as reanalysis of patient RSA radiographs. The data from the phantom experiment indicated the accuracy and precision of the elementary geometrical shape model-based RSA method is equal to marker-based RSA. For model-based RSA using surface models, the accuracy is equal to the accuracy of marker-based RSA, but its precision is worse. We found no difference in accuracy and precision between the two model-based RSA techniques in clinical data. For this particular hip stem, EGS model-based RSA is a good alternative for marker-based RSA.

  14. A narrative review of undergraduate peer-based healthcare ethics teaching.

    PubMed

    Hindmarch, Thomas; Allikmets, Silvia; Knights, Felicity

    2015-12-12

    This study explores the literature in establishing the value of undergraduate peer-based healthcare ethics teaching as an educational methodology. A narrative review of the literature concerning peer-based ethics teaching was conducted. MEDLINE, EMBASE, CINAHL, SCOPUS databases, and the Cochrane Library, were systematically searched for studies of peer-based ethics or professionalism teaching. Selected studies related peer-based teaching to ethics education outcomes. Ten publications were identified. Selected studies were varied in their chosen intervention methodology and analysis. Collectively, the identified studies suggest peer-based ethics education is an effective and valued educational methodology in training healthcare professionals. One paper suggests peer-based ethics teaching has advantages over traditional didactic methods. Peer-based ethics teaching also receives positive feedback from student participants. However, the limited literature base demonstrates a clear need for more evaluation of this pedagogy. The current literature base suggests that undergraduate peer based healthcare ethics teaching is valuable in terms of efficacy and student satisfaction. We conclude that the medical community should invest in further study in order to capitalise upon the potential of peer-based ethics teaching in undergraduate healthcare education.

  15. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Stoiber, Marcus H.; Brown, James B.

    This software implements the first base caller for nanopore data that calls bases directly from raw data. The basecRAWller algorithm has two major advantages over current nanopore base calling software: (1) streaming base calling and (2) base calling from information rich raw signal. The ability to perform truly streaming base calling as signal is received from the sequencer can be very powerful as this is one of the major advantages of this technology as compared to other sequencing technologies. As such enabling as much streaming potential as possible will be incredibly important as this technology continues to become more widelymore » applied in biosciences. All other base callers currently employ the Viterbi algorithm which requires the whole sequence to employ the complete base calling procedure and thus precludes a natural streaming base calling procedure. The other major advantage of the basecRAWller algorithm is the prediction of bases from raw signal which contains much richer information than the segmented chunks that current algorithms employ. This leads to the potential for much more accurate base calls which would make this technology much more valuable to all of the growing user base for this technology.« less

  16. The roles of constraint-based and dedication-based influences on user's continued online shopping behavior.

    PubMed

    Chang, Su-Chao; Chou, Chi-Min

    2012-11-01

    The objective of this study was to determine empirically the role of constraint-based and dedication-based influences as drivers of the intention to continue using online shopping websites. Constraint-based influences consist of two variables: trust and perceived switching costs. Dedication-based influences consist of three variables: satisfaction, perceived usefulness, and trust. The current results indicate that both constraint-based and dedication-based influences are important drivers of the intention to continue using online shopping websites. The data also shows that trust has the strongest total effect on online shoppers' intention to continue using online shopping websites. In addition, the results indicate that the antecedents of constraint-based influences, technical bonds (e.g., perceived operational competence and perceived website interactivity) and social bonds (e.g., perceived relationship investment, community building, and intimacy) have indirect positive effects on the intention to continue using online shopping websites. Based on these findings, this research suggests that online shopping websites should build constraint-based and dedication-based influences to enhance user's continued online shopping behaviors simultaneously.

  17. Household-based trip survey procedure

    DOT National Transportation Integrated Search

    1993-02-22

    This memorandum describes the development of interim trip production cross-classification models for four home-based trip purposes: home-based work (HBW), home-based shopping and personal business (HBPB), home-based social and recreational (HBSR), an...

  18. Overheating Anomalies during Flight Test Due to the Base Bleeding

    NASA Technical Reports Server (NTRS)

    Luchinsky, Dmitry; Hafiychuck, Halyna; Osipov, Slava; Ponizhovskaya, Ekaterina; Smelyanskiy, Vadim; Dagostino, Mark; Canabal, Francisco; Mobley, Brandon L.

    2012-01-01

    In this paper we present the results of the analytical and numerical studies of the plume interaction with the base flow in the presence of base out-gassing. The physics-based analysis and CFD modeling of the base heating for single solid rocket motor performed in this research addressed the following questions: what are the key factors making base flow so different from that in the Shuttle [1]; why CFD analysis of this problem reveals small plume recirculation; what major factors influence base temperature; and why overheating was initiated at a given time in the flight. To answer these questions topological analysis of the base flow was performed and Korst theory was used to estimate relative contributions of radiation, plume recirculation, and chemically reactive out-gassing to the base heating. It was shown that base bleeding and small base volume are the key factors contributing to the overheating, while plume recirculation is effectively suppressed by asymmetric configuration of the flow formed earlier in the flight. These findings are further verified using CFD simulations that include multi-species gas environment both in the plume and in the base. Solid particles in the exhaust plume (Al2O3) and char particles in the base bleeding were also included into the simulations and their relative contributions into the base temperature rise were estimated. The results of simulations are in good agreement with the temperature and pressure in the base measured during the test.

  19. Evaluation of medical students of teacher-based and student-based teaching methods in Infectious diseases course.

    PubMed

    Ghasemzadeh, I; Aghamolaei, T; Hosseini-Parandar, F

    2015-01-01

    Introduction: In recent years, medical education has changed dramatically and many medical schools in the world have been trying for expand modern training methods. Purpose of the research is to appraise the medical students of teacher-based and student-based teaching methods in Infectious diseases course, in the Medical School of Hormozgan Medical Sciences University. Methods: In this interventional study, a total of 52 medical scholars that used Section in this Infectious diseases course were included. About 50% of this course was presented by a teacher-based teaching method (lecture) and 50% by a student-based teaching method (problem-based learning). The satisfaction of students regarding these methods was assessed by a questionnaire and a test was used to measure their learning. information are examined with using SPSS 19 and paired t-test. Results: The satisfaction of students of student-based teaching method (problem-based learning) was more positive than their satisfaction of teacher-based teaching method (lecture).The mean score of students in teacher-based teaching method was 12.03 (SD=4.08) and in the student-based teaching method it was 15.50 (SD=4.26) and where is a considerable variation among them (p<0.001). Conclusion: The use of the student-based teaching method (problem-based learning) in comparison with the teacher-based teaching method (lecture) to present the Infectious diseases course led to the student satisfaction and provided additional learning opportunities.

  20. Performance analysis of a potassium-base AMTEC cell

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Huang, C.; Hendricks, T.J.; Hunt, T.K.

    1998-07-01

    Sodium-BASE Alkali-Metal-Thermal-to-Electric-Conversion (AMTEC) cells have been receiving increased attention and funding from the Department of Energy, NASA and the United States Air Force. Recently, sodium-BASE (Na-BASE) AMTEC cells were selected for the Advanced Radioisotope Power System (ARPS) program for the next generation of deep-space missions and spacecraft. Potassium-BASE (K-BASE) AMTEC cells have not received as much attention to date, even though the vapor pressure of potassium is higher than that of sodium at the same temperature. So that, K-BASE AMTEC cells with potentially higher open circuit voltage and higher power output than Na-BASE AMTEC cells are possible. Because the surfacemore » tension of potassium is about half of the surface tension of sodium at the same temperature, the artery and evaporator design in a potassium AMTEC cell has much more challenging pore size requirements than designs using sodium. This paper uses a flexible thermal/fluid/electrical model to predict the performance of a K-BASE AMTEC cell. Pore sizes in the artery of K-BASE AMTEC cells must be smaller by an order of magnitude than in Na-BASE AMTEC cells. The performance of a K-BASE AMTEC cell was higher than a Na-BASE AMTEC cell at low voltages/high currents. K-BASE AMTEC cells also have the potential of much better electrode performance, thereby creating another avenue for potentially better performance in K-BASE AMTEC cells.« less

  1. Disturbance of DNA conformation by the binding of testosterone-based platinum drugs via groove-face and intercalative interactions: a molecular dynamics simulation study

    PubMed Central

    2013-01-01

    Background To explore novel platinum-based anticancer agents that are distinct from the structure and interaction mode of the traditional cisplatin by forming the bifunctional intrastrand 1,2 GpG adduct, the monofunctional platinum + DNA adducts with extensive non-covalent interactions had been studied. It was reported that the monofunctional testosterone-based platinum(II) agents present the high anticancer activity. Moreover, it was also found that the testosterone-based platinum agents could cause the DNA helix to undergo significant unwinding and bending over the non-testosterone-based platinum agents. However, the interaction mechanisms of these platinum agents with DNA at the atomic level are not yet clear so far. Results In the present work, we used molecular dynamics (MD) simulations and DNA conformational dynamics calculations to study the DNA distortion properties of the testosterone-based platinum + DNA, the improved testosterone-based platinum + DNA and the non-testosterone-based platinum + DNA adducts. The results show that the intercalative interaction of the improved flexible testosterone-based platinum agent with DNA molecule could cause larger DNA conformational distortion than the groove-face interaction of the rigid testosterone-based platinum agent with DNA molecule. Further investigations for the non-testosterone-based platinum agent reveal the occurrence of insignificant change of DNA conformation due to the absence of testosterone ligand in such agent. Based on the DNA dynamics analysis, the DNA base motions relating to DNA groove parameter changes and hydrogen bond destruction of DNA base pairs were also discussed in this work. Conclusions The flexible linker in the improved testosterone-based platinum agent causes an intercalative interaction with DNA in the improved testosterone-based platinum + DNA adduct, which is different from the groove-face interaction caused by a rigid linker in the testosterone-based platinum agent. The present investigations provide useful information of DNA conformation affected by a testosterone-based platinum complex at the atomic level. PMID:23517640

  2. Compatibility of pedigree-based and marker-based relationship matrices for single-step genetic evaluation.

    PubMed

    Christensen, Ole F

    2012-12-03

    Single-step methods provide a coherent and conceptually simple approach to incorporate genomic information into genetic evaluations. An issue with single-step methods is compatibility between the marker-based relationship matrix for genotyped animals and the pedigree-based relationship matrix. Therefore, it is necessary to adjust the marker-based relationship matrix to the pedigree-based relationship matrix. Moreover, with data from routine evaluations, this adjustment should in principle be based on both observed marker genotypes and observed phenotypes, but until now this has been overlooked. In this paper, I propose a new method to address this issue by 1) adjusting the pedigree-based relationship matrix to be compatible with the marker-based relationship matrix instead of the reverse and 2) extending the single-step genetic evaluation using a joint likelihood of observed phenotypes and observed marker genotypes. The performance of this method is then evaluated using two simulated datasets. The method derived here is a single-step method in which the marker-based relationship matrix is constructed assuming all allele frequencies equal to 0.5 and the pedigree-based relationship matrix is constructed using the unusual assumption that animals in the base population are related and inbred with a relationship coefficient γ and an inbreeding coefficient γ / 2. Taken together, this γ parameter and a parameter that scales the marker-based relationship matrix can handle the issue of compatibility between marker-based and pedigree-based relationship matrices. The full log-likelihood function used for parameter inference contains two terms. The first term is the REML-log-likelihood for the phenotypes conditional on the observed marker genotypes, whereas the second term is the log-likelihood for the observed marker genotypes. Analyses of the two simulated datasets with this new method showed that 1) the parameters involved in adjusting marker-based and pedigree-based relationship matrices can depend on both observed phenotypes and observed marker genotypes and 2) a strong association between these two parameters exists. Finally, this method performed at least as well as a method based on adjusting the marker-based relationship matrix. Using the full log-likelihood and adjusting the pedigree-based relationship matrix to be compatible with the marker-based relationship matrix provides a new and interesting approach to handle the issue of compatibility between the two matrices in single-step genetic evaluation.

  3. Research on the comparison of performance-based concept and force-based concept

    NASA Astrophysics Data System (ADS)

    Wu, Zeyu; Wang, Dongwei

    2011-03-01

    There are two ideologies about structure design: force-based concept and performance-based concept. Generally, if the structure operates during elastic stage, the two philosophies usually attain the same results. But beyond that stage, the shortage of force-based method is exposed, and the merit of performance-based is displayed. Pros and cons of each strategy are listed herein, and then which structure is best suitable to each method analyzed. At last, a real structure is evaluated by adaptive pushover method to verify that performance-based method is better than force-based method.

  4. Accuracy and Reliability of Eye-Based vs Quadrant-Based Diagnosis of Plus Disease in Retinopathy of Prematurity.

    PubMed

    Kim, Sang Jin; Campbell, J Peter; Kalpathy-Cramer, Jayashree; Ostmo, Susan; Jonas, Karyn E; Choi, Dongseok; Chan, R V Paul; Chiang, Michael F

    2018-06-01

    Presence of plus disease in retinopathy of prematurity is the most critical element in identifying treatment-requiring disease. However, there is significant variability in plus disease diagnosis. In particular, plus disease has been defined as 2 or more quadrants of vascular abnormality, and it is not clear whether it is more reliably and accurately diagnosed by eye-based assessment of overall retinal appearance or by quadrant-based assessment combining grades of 4 individual quadrants. To compare eye-based vs quadrant-based diagnosis of plus disease and to provide insight for ophthalmologists about the diagnostic process. In this multicenter cohort study, we developed a database of 197 wide-angle retinal images from 141 preterm infants from neonatal intensive care units at 9 academic institutions (enrolled from July 2011 to December 2016). Each image was assigned a reference standard diagnosis based on consensus image-based and clinical diagnosis. Data analysis was performed from February 2017 to September 2017. Six graders independently diagnosed each of the 4 quadrants (cropped images) of the 197 eyes (quadrant-based diagnosis) as well as the entire image (eye-based diagnosis). Images were displayed individually, in random order. Quadrant-based diagnosis of plus disease was made when 2 or more quadrants were diagnosed as indicating plus disease by combining grades of individual quadrants post hoc. Intragrader and intergrader reliability (absolute agreement and κ statistic) and accuracy compared with the reference standard diagnosis. Of the 141 included preterm infants, 65 (46.1%) were female and 116 (82.3%) white, and the mean (SD) gestational age was 27.0 (2.6) weeks. There was variable agreement between eye-based and quadrant-based diagnosis among the 6 graders (Cohen κ range, 0.32-0.75). Four graders showed underdiagnosis of plus disease with quadrant-based diagnosis compared with eye-based diagnosis (by McNemar test). Intergrader agreement of quadrant-based diagnosis was lower than that of eye-based diagnosis (Fleiss κ, 0.75 [95% CI, 0.71-0.78] vs 0.55 [95% CI, 0.51-0.59]). The accuracy of eye-based diagnosis compared with the reference standard diagnosis was substantial to near-perfect, whereas that of quadrant-based plus disease diagnosis was only moderate to substantial for each grader. Graders had lower reliability and accuracy using quadrant-based diagnosis combining grades of individual quadrants than with eye-based diagnosis, suggesting that eye-based diagnosis has advantages over quadrant-based diagnosis. This has implications for more precise definitions of plus disease regarding the criterion of 2 or more quadrants, clinical care, computer-based image analysis, and education for all ophthalmologists who manage retinopathy of prematurity.

  5. Construction of dynamic stochastic simulation models using knowledge-based techniques

    NASA Technical Reports Server (NTRS)

    Williams, M. Douglas; Shiva, Sajjan G.

    1990-01-01

    Over the past three decades, computer-based simulation models have proven themselves to be cost-effective alternatives to the more structured deterministic methods of systems analysis. During this time, many techniques, tools and languages for constructing computer-based simulation models have been developed. More recently, advances in knowledge-based system technology have led many researchers to note the similarities between knowledge-based programming and simulation technologies and to investigate the potential application of knowledge-based programming techniques to simulation modeling. The integration of conventional simulation techniques with knowledge-based programming techniques is discussed to provide a development environment for constructing knowledge-based simulation models. A comparison of the techniques used in the construction of dynamic stochastic simulation models and those used in the construction of knowledge-based systems provides the requirements for the environment. This leads to the design and implementation of a knowledge-based simulation development environment. These techniques were used in the construction of several knowledge-based simulation models including the Advanced Launch System Model (ALSYM).

  6. Contests versus Norms: Implications of Contest-Based and Norm-Based Intervention Techniques

    PubMed Central

    Bergquist, Magnus; Nilsson, Andreas; Hansla, André

    2017-01-01

    Interventions using either contests or norms can promote environmental behavioral change. Yet research on the implications of contest-based and norm-based interventions is lacking. Based on Goal-framing theory, we suggest that a contest-based intervention frames a gain goal promoting intensive but instrumental behavioral engagement. In contrast, the norm-based intervention was expected to frame a normative goal activating normative obligations for targeted and non-targeted behavior and motivation to engage in pro-environmental behaviors in the future. In two studies participants (n = 347) were randomly assigned to either a contest- or a norm-based intervention technique. Participants in the contest showed more intensive engagement in both studies. Participants in the norm-based intervention tended to report higher intentions for future energy conservation (Study 1) and higher personal norms for non-targeted pro-environmental behaviors (Study 2). These findings suggest that contest-based intervention technique frames a gain goal, while norm-based intervention frames a normative goal. PMID:29218026

  7. Contests versus Norms: Implications of Contest-Based and Norm-Based Intervention Techniques.

    PubMed

    Bergquist, Magnus; Nilsson, Andreas; Hansla, André

    2017-01-01

    Interventions using either contests or norms can promote environmental behavioral change. Yet research on the implications of contest-based and norm-based interventions is lacking. Based on Goal-framing theory, we suggest that a contest-based intervention frames a gain goal promoting intensive but instrumental behavioral engagement. In contrast, the norm-based intervention was expected to frame a normative goal activating normative obligations for targeted and non-targeted behavior and motivation to engage in pro-environmental behaviors in the future. In two studies participants ( n = 347) were randomly assigned to either a contest- or a norm-based intervention technique. Participants in the contest showed more intensive engagement in both studies. Participants in the norm-based intervention tended to report higher intentions for future energy conservation (Study 1) and higher personal norms for non-targeted pro-environmental behaviors (Study 2). These findings suggest that contest-based intervention technique frames a gain goal, while norm-based intervention frames a normative goal.

  8. Widespread Transient Hoogsteen Base-Pairs in Canonical Duplex DNA with Variable Energetics

    PubMed Central

    Alvey, Heidi S.; Gottardo, Federico L.; Nikolova, Evgenia N.; Al-Hashimi, Hashim M.

    2015-01-01

    Hoogsteen base-pairing involves a 180 degree rotation of the purine base relative to Watson-Crick base-pairing within DNA duplexes, creating alternative DNA conformations that can play roles in recognition, damage induction, and replication. Here, using Nuclear Magnetic Resonance R1ρ relaxation dispersion, we show that transient Hoogsteen base-pairs occur across more diverse sequence and positional contexts than previously anticipated. We observe sequence-specific variations in Hoogsteen base-pair energetic stabilities that are comparable to variations in Watson-Crick base-pair stability, with Hoogsteen base-pairs being more abundant for energetically less favorable Watson-Crick base-pairs. Our results suggest that the variations in Hoogsteen stabilities and rates of formation are dominated by variations in Watson-Crick base pair stability, suggesting a late transition state for the Watson-Crick to Hoogsteen conformational switch. The occurrence of sequence and position-dependent Hoogsteen base-pairs provide a new potential mechanism for achieving sequence-dependent DNA transactions. PMID:25185517

  9. Asymmetric Base-Bleed Effect on Aerospike Plume-Induced Base-Heating Environment

    NASA Technical Reports Server (NTRS)

    Wang, Ten-See; Droege, Alan; DAgostino, Mark; Lee, Young-Ching; Williams, Robert

    2004-01-01

    A computational heat transfer design methodology was developed to study the dual-engine linear aerospike plume-induced base-heating environment during one power-pack out, in ascent flight. It includes a three-dimensional, finite volume, viscous, chemically reacting, and pressure-based computational fluid dynamics formulation, a special base-bleed boundary condition, and a three-dimensional, finite volume, and spectral-line-based weighted-sum-of-gray-gases absorption computational radiation heat transfer formulation. A separate radiation model was used for diagnostic purposes. The computational methodology was systematically benchmarked. In this study, near-base radiative heat fluxes were computed, and they compared well with those measured during static linear aerospike engine tests. The base-heating environment of 18 trajectory points selected from three power-pack out scenarios was computed. The computed asymmetric base-heating physics were analyzed. The power-pack out condition has the most impact on convective base heating when it happens early in flight. The source of its impact comes from the asymmetric and reduced base bleed.

  10. The Consistencies and Vagaries of the Washington State Inventory of Evidence-Based Practice: The Definition of "Evidence-Based" in a Policy Context.

    PubMed

    Walker, Sarah Cusworth; Lyon, Aaron R; Aos, Steve; Trupin, Eric W

    2017-01-01

    As states increasingly establish the importance of evidence-based practice through policy and funding mandates, the definition of evidence-based practice can have a significant impact on investment decisions. Not meeting established criteria can mean a loss of funding for established programs and the implementation disruption of programs without a strong research base. Whether the definition of "evidence-based" is influenced by these high stakes contexts is an interesting question that can inform the larger field about the value and utility of evidence-based practice lists/inventories for disseminating knowledge. In this paper we review the development of the Washington State Inventory of Evidence-Based, Research-Based and Promising Practices as a case study for the process of defining evidence-based practice in a policy context. As part of this study we also present a comparison of other well-known evidence-based practice inventories and examine consistencies and differences in the process of identifying and developing program ratings.

  11. Does a pre-intervention functional assessment increase intervention effectiveness? A meta-analysis of within-subject interrupted time-series studies.

    PubMed

    Hurl, Kylee; Wightman, Jade; Haynes, Stephen N; Virues-Ortega, Javier

    2016-07-01

    This study examined the relative effectiveness of interventions based on a pre-intervention functional behavioral assessment (FBA), compared to interventions not based on a pre-intervention FBA. We examined 19 studies that included a direct comparison between the effects of FBA- and non-FBA-based interventions with the same participants. A random effects meta-analysis of effect sizes indicated that FBA-based interventions were associated with large reductions in problem behaviors when using non-FBA-based interventions as a reference intervention (Effect size=0.85, 95% CI [0.42, 1.27], p<0.001). In addition, non-FBA based interventions had no effect on problem behavior when compared to no intervention (0.06, 95% CI [-0.21, 0.33], p=0.664). Interestingly, both FBA-based and non-FBA-based interventions had significant effects on appropriate behavior relative to no intervention, albeit the overall effect size was much larger for FBA-based interventions (FBA-based: 1.27, 95% CI [0.89, 1.66], p<0.001 vs. non-FBA-based: 0.35, 95% CI [0.14, 0.56], p=0.001). In spite of the evidence in favor of FBA-based interventions, the limited number of comparative studies with high methodological standards underlines the need for further comparisons of FBA-based versus non-FBA-based interventions. Copyright © 2016 Elsevier Ltd. All rights reserved.

  12. An investigation of care-based vs. rule-based morality in frontotemporal dementia, Alzheimer's disease, and healthy controls.

    PubMed

    Carr, Andrew R; Paholpak, Pongsatorn; Daianu, Madelaine; Fong, Sylvia S; Mather, Michelle; Jimenez, Elvira E; Thompson, Paul; Mendez, Mario F

    2015-11-01

    Behavioral changes in dementia, especially behavioral variant frontotemporal dementia (bvFTD), may result in alterations in moral reasoning. Investigators have not clarified whether these alterations reflect differential impairment of care-based vs. rule-based moral behavior. This study investigated 18 bvFTD patients, 22 early onset Alzheimer's disease (eAD) patients, and 20 healthy age-matched controls on care-based and rule-based items from the Moral Behavioral Inventory and the Social Norms Questionnaire, neuropsychological measures, and magnetic resonance imaging (MRI) regions of interest. There were significant group differences with the bvFTD patients rating care-based morality transgressions less severely than the eAD group and rule-based moral behavioral transgressions more severely than controls. Across groups, higher care-based morality ratings correlated with phonemic fluency on neuropsychological tests, whereas higher rule-based morality ratings correlated with increased difficulty set-shifting and learning new rules to tasks. On neuroimaging, severe care-based reasoning correlated with cortical volume in right anterior temporal lobe, and rule-based reasoning correlated with decreased cortical volume in the right orbitofrontal cortex. Together, these findings suggest that frontotemporal disease decreases care-based morality and facilitates rule-based morality possibly from disturbed contextual abstraction and set-shifting. Future research can examine whether frontal lobe disorders and bvFTD result in a shift from empathic morality to the strong adherence to conventional rules. Published by Elsevier Ltd.

  13. An Investigation of Care-Based vs. Rule-Based Morality in Frontotemporal Dementia, Alzheimer’s Disease, and Healthy Controls

    PubMed Central

    Carr, Andrew R.; Paholpak, Pongsatorn; Daianu, Madelaine; Fong, Sylvia S.; Mather, Michelle; Jimenez, Elvira E.; Thompson, Paul; Mendez, Mario F.

    2015-01-01

    Behavioral changes in dementia, especially behavioral variant frontotemporal dementia (bvFTD), may result in alterations in moral reasoning. Investigators have not clarified whether these alterations reflect differential impairment of care-based vs. rule-based moral behavior. This study investigated 18 bvFTD patients, 22 early onset Alzheimer’s disease (eAD) patients, and 20 healthy age-matched controls on care-based and rule-based items from the Moral Behavioral Inventory and the Social Norms Questionnaire, neuropsychological measures, and magnetic resonance imaging (MRI) regions of interest. There were significant group differences with the bvFTD patients rating care-based morality transgressions less severely than the eAD group and rule-based moral behavioral transgressions more severely than controls. Across groups, higher care-based morality ratings correlated with phonemic fluency on neuropsychological tests, whereas higher rule-based morality ratings correlated with increased difficulty set-shifting and learning new rules to tasks. On neuroimaging, severe care-based reasoning correlated with cortical volume in right anterior temporal lobe, and rule-based reasoning correlated with decreased cortical volume in the right orbitofrontal cortex. Together, these findings suggest that frontotemporal disease decreases care-based morality and facilitates rule-based morality possibly from disturbed contextual abstraction and set-shifting. Future research can examine whether frontal lobe disorders and bvFTD result in a shift from empathic morality to the strong adherence to conventional rules. PMID:26432341

  14. Does Solving Insight-Based Problems Differ from Solving Learning-Based Problems? Some Evidence from an ERP Study

    ERIC Educational Resources Information Center

    Leikin, Roza; Waisman, Ilana; Leikin, Mark

    2016-01-01

    We asked: "What are the similarities and differences in mathematical processing associated with solving learning-based and insight-based problems?" To answer this question, the ERP research procedure was employed with 69 male adolescent subjects who solved specially designed insight-based and learning-based tests. Solutions of…

  15. Representing Micro-Macro Linkages by Actor-Based Dynamic Network Models

    ERIC Educational Resources Information Center

    Snijders, Tom A. B.; Steglich, Christian E. G.

    2015-01-01

    Stochastic actor-based models for network dynamics have the primary aim of statistical inference about processes of network change, but may be regarded as a kind of agent-based models. Similar to many other agent-based models, they are based on local rules for actor behavior. Different from many other agent-based models, by including elements of…

  16. Innovate and Evaluate: Expanding the Research Base for Competency-Based Education. AEI Series on Competency-Based Higher Education

    ERIC Educational Resources Information Center

    Kelly, Andrew P.; Columbus, Rooney

    2016-01-01

    Competency-based education (CBE) has garnered significant attention lately from reformers and policymakers. Put simply, CBE awards credit based on what students have learned rather than how much time they spend in class. Competency-based programs identify specific competencies, develop assessments to measure mastery of those competencies, and then…

  17. 77 FR 42652 - Meloy Channel, U.S. Coast Guard Base Miami Beach, FL; Restricted Area

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-20

    ....S. Coast Guard Base Miami Beach, FL; Restricted Area AGENCY: United States Army Corps of Engineers... Guard Base Miami Beach, Florida (Base Miami Beach). Base Miami Beach is composed of multiple U.S. Coast... contiguous to Base Miami Beach. The amendment will also serve to protect the general public from injury or...

  18. Evidence-based policy as reflexive practice. What can we learn from evidence-based medicine?

    PubMed

    Bal, Roland

    2017-04-01

    The call for evidence-based policy is often accompanied by rather uncritical references to the success of evidence-based medicine, leading to often unsuccessful translation attempts. In this paper, I reflect on the practice of evidence-based medicine in an attempt to sketch a more productive approach to translating evidence into the practice of policy making. Discussing three episodes in the history of evidence-based medicine - clinical trials, and the production and use of clinical guidelines - I conclude that the success of evidence-based medicine is based on the creation of reflexive practices in which evidence and practice can be combined productively. In the conclusion, I discuss the prospects of such a practice for evidence-based policy.

  19. Evidence based practice beliefs and implementation among nurses: a cross-sectional study

    PubMed Central

    2014-01-01

    Background Having a positive attitude towards evidence-based practice and being able to see the value of evidence-based practice for patients have been reported as important for the implementation of evidence-based practice among nurses. The aim of this study was to map self-reported beliefs towards EBP and EBP implementation among nurses, and to investigate whether there was a positive correlation between EBP beliefs and EBP implementation. Method We carried out a cross-sectional study among 356 nurses at a specialist hospital for the treatment of cancer in Norway. The Norwegian translations of the Evidence-based Practice Belief Scale and the Evidence-based Practice Implementation Scale were used. Results In total, 185 nurses participated in the study (response rate 52%). The results showed that nurses were positive towards evidence-based practice, but only practised it to a small extent. There was a positive correlation (r) between beliefs towards evidence-based practice and implementation of evidence-based practice (r = 0.59, p = 0.001). There was a statistical significant positive, but moderate correlation between all the four subscales of the EBP Beliefs Scale (beliefs related to: 1) knowledge, 2) resources, 3) the value of EBP and 4) difficulty and time) and the EBP Implementation Scale, with the highest correlation observed for beliefs related to knowledge (r = 0.38, p < .0001). Participants who had learned about evidence-based practice had significantly higher scores on the Evidence-based Practice Belief Scale than participants who were unfamiliar with evidence-based practice. Those involved in evidence-based practice working groups also reported significantly higher scores on the Evidence-based Practice Belief Scale than participants not involved in these groups. Conclusion This study shows that nurses have a positive attitude towards evidence-based practice, but practise it to a lesser extent. There was a positive correlation between beliefs about evidence-based practice and implementation of evidence-based practice. Beliefs related to knowledge appear to have the greatest effect on implementation of evidence-based practice. Having knowledge and taking part in evidence-based practice working groups seem important. PMID:24661602

  20. Patch-based generation of a pseudo CT from conventional MRI sequences for MRI-only radiotherapy of the brain

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Andreasen, Daniel, E-mail: dana@dtu.dk; Van Leemput, Koen; Hansen, Rasmus H.

    Purpose: In radiotherapy (RT) based on magnetic resonance imaging (MRI) as the only modality, the information on electron density must be derived from the MRI scan by creating a so-called pseudo computed tomography (pCT). This is a nontrivial task, since the voxel-intensities in an MRI scan are not uniquely related to electron density. To solve the task, voxel-based or atlas-based models have typically been used. The voxel-based models require a specialized dual ultrashort echo time MRI sequence for bone visualization and the atlas-based models require deformable registrations of conventional MRI scans. In this study, we investigate the potential of amore » patch-based method for creating a pCT based on conventional T{sub 1}-weighted MRI scans without using deformable registrations. We compare this method against two state-of-the-art methods within the voxel-based and atlas-based categories. Methods: The data consisted of CT and MRI scans of five cranial RT patients. To compare the performance of the different methods, a nested cross validation was done to find optimal model parameters for all the methods. Voxel-wise and geometric evaluations of the pCTs were done. Furthermore, a radiologic evaluation based on water equivalent path lengths was carried out, comparing the upper hemisphere of the head in the pCT and the real CT. Finally, the dosimetric accuracy was tested and compared for a photon treatment plan. Results: The pCTs produced with the patch-based method had the best voxel-wise, geometric, and radiologic agreement with the real CT, closely followed by the atlas-based method. In terms of the dosimetric accuracy, the patch-based method had average deviations of less than 0.5% in measures related to target coverage. Conclusions: We showed that a patch-based method could generate an accurate pCT based on conventional T{sub 1}-weighted MRI sequences and without deformable registrations. In our evaluations, the method performed better than existing voxel-based and atlas-based methods and showed a promising potential for RT of the brain based only on MRI.« less

  1. Quantum structures for recombination control in the light-emitting transistor

    NASA Astrophysics Data System (ADS)

    Chen, Kanuo; Hsiao, Fu-Chen; Joy, Brittany; Dallesasse, John M.

    2017-02-01

    Recombination of carriers in the direct-bandgap base of a transistor-injected quantum cascade laser (TI-QCL) is shown to be controllable through the field applied across the quantum cascade region located in the transistor's base-collector junction. The influence of the electric field on the quantum states in the cascade region's superlattice allows free flow of electrons out of the transistor base only for field values near the design field that provides optimal QCL gain. Quantum modulation of base recombination in the light-emitting transistor is therefore observed. In a GaAs-based light-emitting transistor, a periodic superlattice is grown between the p-type base and the n-type collector. Under different base-collector biasing conditions the distribution of quantum states, and as a consequence transition probabilities through the wells and barriers forming the cascade region, leads to strong field-dependent mobility for electrons in transit through the base-collector junction. The radiative base recombination, which is influenced by minority carrier transition lifetime, can be modulated through the quantum states alignment in the superlattice. A GaAs-based transistor-injected quantum cascade laser with AlGaAs/GaAs superlattice is designed and fabricated. Radiative base recombination is measured under both common-emitter and common-base configuration. In both configurations the optical output from the base is proportional to the emitter injection. When the quantum states in the superlattice are aligned the optical output in the base is reduced as electrons encounter less impedance entering the collector; when the quantum states are misaligned electrons have longer lifetime in the base and the radiative base recombination process is enhanced.

  2. Data Bases in Writing: Method, Practice, and Metaphor.

    ERIC Educational Resources Information Center

    Schwartz, Helen J.

    1985-01-01

    Points out the need for informed and experienced users of data bases. Discusses the definition of a data base, creating a data base for research, comparison use, and checking written text as a data base. (EL)

  3. Refining Automatically Extracted Knowledge Bases Using Crowdsourcing.

    PubMed

    Li, Chunhua; Zhao, Pengpeng; Sheng, Victor S; Xian, Xuefeng; Wu, Jian; Cui, Zhiming

    2017-01-01

    Machine-constructed knowledge bases often contain noisy and inaccurate facts. There exists significant work in developing automated algorithms for knowledge base refinement. Automated approaches improve the quality of knowledge bases but are far from perfect. In this paper, we leverage crowdsourcing to improve the quality of automatically extracted knowledge bases. As human labelling is costly, an important research challenge is how we can use limited human resources to maximize the quality improvement for a knowledge base. To address this problem, we first introduce a concept of semantic constraints that can be used to detect potential errors and do inference among candidate facts. Then, based on semantic constraints, we propose rank-based and graph-based algorithms for crowdsourced knowledge refining, which judiciously select the most beneficial candidate facts to conduct crowdsourcing and prune unnecessary questions. Our experiments show that our method improves the quality of knowledge bases significantly and outperforms state-of-the-art automatic methods under a reasonable crowdsourcing cost.

  4. Sustainability of meat-based and plant-based diets and the environment.

    PubMed

    Pimentel, David; Pimentel, Marcia

    2003-09-01

    Worldwide, an estimated 2 billion people live primarily on a meat-based diet, while an estimated 4 billion live primarily on a plant-based diet. The US food production system uses about 50% of the total US land area, 80% of the fresh water, and 17% of the fossil energy used in the country. The heavy dependence on fossil energy suggests that the US food system, whether meat-based or plant-based, is not sustainable. The use of land and energy resources devoted to an average meat-based diet compared with a lactoovovegetarian (plant-based) diet is analyzed in this report. In both diets, the daily quantity of calories consumed are kept constant at about 3533 kcal per person. The meat-based food system requires more energy, land, and water resources than the lactoovovegetarian diet. In this limited sense, the lactoovovegetarian diet is more sustainable than the average American meat-based diet.

  5. Method for rapid base sequencing in DNA and RNA with two base labeling

    DOEpatents

    Jett, J.H.; Keller, R.A.; Martin, J.C.; Posner, R.G.; Marrone, B.L.; Hammond, M.L.; Simpson, D.J.

    1995-04-11

    A method is described for rapid-base sequencing in DNA and RNA with two-base labeling and employing fluorescent detection of single molecules at two wavelengths. Bases modified to accept fluorescent labels are used to replicate a single DNA or RNA strand to be sequenced. The bases are then sequentially cleaved from the replicated strand, excited with a chosen spectrum of electromagnetic radiation, and the fluorescence from individual, tagged bases detected in the order of cleavage from the strand. 4 figures.

  6. A Fundamental Approach to Developing Aluminium based Bulk Amorphous Alloys based on Stable Liquid Metal Structures and Electronic Equilibrium - 154041

    DTIC Science & Technology

    2017-03-28

    AFRL-AFOSR-JP-TR-2017-0027 A Fundamental Approach to Developing Aluminium-based Bulk Amorphous Alloys based on Stable Liquid -Metal Structures and...to 16 Dec 2016 4.  TITLE AND SUBTITLE A Fundamental Approach to Developing Aluminium-based Bulk Amorphous Alloys based on Stable Liquid -Metal...including Al, Cu, Ni, Zr, Mg, Pd, Ga , Ca. Many new Al-based amorphous alloys were found within the numerous alloy systems studied in this project, and

  7. Method for rapid base sequencing in DNA and RNA with two base labeling

    DOEpatents

    Jett, James H.; Keller, Richard A.; Martin, John C.; Posner, Richard G.; Marrone, Babetta L.; Hammond, Mark L.; Simpson, Daniel J.

    1995-01-01

    Method for rapid-base sequencing in DNA and RNA with two-base labeling and employing fluorescent detection of single molecules at two wavelengths. Bases modified to accept fluorescent labels are used to replicate a single DNA or RNA strand to be sequenced. The bases are then sequentially cleaved from the replicated strand, excited with a chosen spectrum of electromagnetic radiation, and the fluorescence from individual, tagged bases detected in the order of cleavage from the strand.

  8. A systematic review of surgical skills transfer after simulation-based training: laparoscopic cholecystectomy and endoscopy.

    PubMed

    Dawe, Susan R; Windsor, John A; Broeders, Joris A J L; Cregan, Patrick C; Hewett, Peter J; Maddern, Guy J

    2014-02-01

    A systematic review to determine whether skills acquired through simulation-based training transfer to the operating room for the procedures of laparoscopic cholecystectomy and endoscopy. Simulation-based training assumes that skills are directly transferable to the operation room, but only a few studies have investigated the effect of simulation-based training on surgical performance. A systematic search strategy that was used in 2006 was updated to retrieve relevant studies. Inclusion of articles was determined using a predetermined protocol, independent assessment by 2 reviewers, and a final consensus decision. Seventeen randomized controlled trials and 3 nonrandomized comparative studies were included in this review. In most cases, simulation-based training was in addition to patient-based training programs. Only 2 studies directly compared simulation-based training in isolation with patient-based training. For laparoscopic cholecystectomy (n = 10 studies) and endoscopy (n = 10 studies), participants who reached simulation-based skills proficiency before undergoing patient-based assessment performed with higher global assessment scores and fewer errors in the operating room than their counterparts who did not receive simulation training. Not all parameters measured were improved. Two of the endoscopic studies compared simulation-based training in isolation with patient-based training with different results: for sigmoidoscopy, patient-based training was more effective, whereas for colonoscopy, simulation-based training was equally effective. Skills acquired by simulation-based training seem to be transferable to the operative setting for laparoscopic cholecystectomy and endoscopy. Future research will strengthen these conclusions by evaluating predetermined competency levels on the same simulators and using objective validated global rating scales to measure operative performance.

  9. Effectiveness of an education intervention to strengthen nurses' readiness for evidence-based practice: A single-blind randomized controlled study.

    PubMed

    Saunders, Hannele; Vehviläinen-Julkunen, Katri; Stevens, Kathleen R

    2016-08-01

    Nurses' lack of readiness for evidence-based practice slows down the uptake, adoption, and implementation of evidence-based practice which is of international concern as it impedes attainment of the highest quality of care and best patient outcomes. There is limited evidence about the most effective approaches to strengthen nurses' readiness for evidence-based practice. To evaluate the effectiveness of an Advanced Practice Nurse-delivered education program to strengthen nurses' readiness for evidence-based practice at a university hospital. A single-blind randomized controlled trial with repeated measures design, with measures completed during spring and fall 2015, before the education program (T0), within 1week after (T1), 8weeks after (T2), and 4months after completion of education interventions (T3). One large university hospital system in Finland, consisting of 15 acute care hospitals. The required sample size, calculated by a priori power analysis and including a 20% estimated attrition rate, called for 85 nurse participants to be recruited. Nurses working in different professional nursing roles and care settings were randomly allocated into two groups: intervention (evidence-based practice education, N=43) and control (research utilization education, N=34). The nurse participants received live 4-h education sessions on the basic principles of evidence-based practice (intervention group) and on the principles of research utilization (control group). The intervention group also received a web-based interactive evidence-based practice education module with a booster mentoring intervention. Readiness for evidence-based practice data, previous experience with evidence-based practice, and participant demographics were collected using the Stevens' EBP Readiness Inventory. Nurses' confidence in employing evidence-based practice and actual evidence-based practice knowledge were lower at T0, compared with the post-education scores, specifically at T1. The improvement in the confidence or actual evidence-based practice knowledge levels did not differ between the intervention and control groups. Confidence in employing evidence-based practice was directly correlated with level of education and inversely correlated with age. Actual evidence-based practice knowledge was lowest among nurses who had no previous knowledge or experience of evidence-based practice. Both the evidence-based practice and research utilization education interventions improved nurses' confidence in employing evidence-based practice and actual evidence-based practice knowledge, strengthening their evidence-based practice readiness at least in the short-term. Most of the variation in the confidence in employing evidence-based practice and actual evidence-based practice knowledge levels was due to background factors, such as primary role and education level, which emphasize differences in educational needs between nurses with diverse backgrounds. Copyright © 2016 Elsevier Inc. All rights reserved.

  10. Comparison of Text-Based and Visual-Based Programming Input Methods for First-Time Learners

    ERIC Educational Resources Information Center

    Saito, Daisuke; Washizaki, Hironori; Fukazawa, Yoshiaki

    2017-01-01

    Aim/Purpose: When learning to program, both text-based and visual-based input methods are common. However, it is unclear which method is more appropriate for first-time learners (first learners). Background: The differences in the learning effect between text-based and visual-based input methods for first learners are compared the using a…

  11. 78 FR 44424 - Revisions to Page 700 of FERC Form No. 6

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-24

    ... original cost (TOC) rate base information provided on line 5 of page 700 by requiring the reporting of the three subparts of the TOC rate base: (1) Rate Base--Original Cost (proposed line 5a); (2) Rate Base... oil pipeline's TOC Rate Base. Consequently, the NOPR proposed to move the TOC rate base from line 5 to...

  12. NetWeaver for EMDS user guide (version 1.1): a knowledge base development system.

    Treesearch

    Keith M. Reynolds

    1999-01-01

    The guide describes use of the NetWeaver knowledge base development system. Knowledge representation in NetWeaver is based on object-oriented fuzzy-logic networks that offer several significant advantages over the more traditional rulebased representation. Compared to rule-based knowledge bases, NetWeaver knowledge bases are easier to build, test, and maintain because...

  13. Model Documentation of Base Case Data | Regional Energy Deployment System

    Science.gov Websites

    Model | Energy Analysis | NREL Documentation of Base Case Data Model Documentation of Base Case base case of the model. The base case was developed simply as a point of departure for other analyses Base Case derives many of its inputs from the Energy Information Administration's (EIA's) Annual Energy

  14. Creating Stimulating Learning and Thinking Using New Models of Activity-Based Learning and Metacognitive-Based Activities

    ERIC Educational Resources Information Center

    Pang, Katherine

    2010-01-01

    The purpose of this paper is to present a novel way to stimulate learning, creativity, and thinking based on a new understanding of activity-based learning (ABL) and two methods for developing metacognitive-based activities for the classroom. ABL, in this model, is based on the premise that teachers are distillers and facilitators of information…

  15. Overview of Selected State Policies and Supports Related to K-12 Competency-Based Education. REL 2017-249

    ERIC Educational Resources Information Center

    Brodersen, R. Marc; Yanoski, David; Mason, Katie; Apthorp, Helen; Piscatelli, Jennifer

    2017-01-01

    Competency-based education--also known as proficiency-based, mastery-based, and performance-based education--has received increased attention in recent years as an education approach that may help ensure that students graduate from high school with the knowledge and skills necessary for college and their careers. In competency-based education,…

  16. On Decision-Making Among Multiple Rule-Bases in Fuzzy Control Systems

    NASA Technical Reports Server (NTRS)

    Tunstel, Edward; Jamshidi, Mo

    1997-01-01

    Intelligent control of complex multi-variable systems can be a challenge for single fuzzy rule-based controllers. This class of problems cam often be managed with less difficulty by distributing intelligent decision-making amongst a collection of rule-bases. Such an approach requires that a mechanism be chosen to ensure goal-oriented interaction between the multiple rule-bases. In this paper, a hierarchical rule-based approach is described. Decision-making mechanisms based on generalized concepts from single-rule-based fuzzy control are described. Finally, the effects of different aggregation operators on multi-rule-base decision-making are examined in a navigation control problem for mobile robots.

  17. A narrative review of undergraduate peer-based healthcare ethics teaching

    PubMed Central

    Allikmets, Silvia; Knights, Felicity

    2015-01-01

    Objectives This study explores the literature in establishing the value of undergraduate peer-based healthcare ethics teaching as an educational methodology. Methods A narrative review of the literature concerning peer-based ethics teaching was conducted. MEDLINE, EMBASE, CINAHL, SCOPUS databases, and the Cochrane Library, were systematically searched for studies of peer-based ethics or professionalism teaching. Selected studies related peer-based teaching to ethics education outcomes. Results Ten publications were identified. Selected studies were varied in their chosen intervention methodology and analysis. Collectively, the identified studies suggest peer-based ethics education is an effective and valued educational methodology in training healthcare professionals. One paper suggests peer-based ethics teaching has advantages over traditional didactic methods. Peer-based ethics teaching also receives positive feedback from student participants. However, the limited literature base demonstrates a clear need for more evaluation of this pedagogy. Conclusions The current literature base suggests that undergraduate peer based healthcare ethics teaching is valuable in terms of efficacy and student satisfaction. We conclude that the medical community should invest in further study in order to capitalise upon the potential of peer-based ethics teaching in undergraduate healthcare education. PMID:26668050

  18. Boron nitride nanotube-based biosensing of various bacterium/viruses: continuum modelling-based simulation approach.

    PubMed

    Panchal, Mitesh B; Upadhyay, Sanjay H

    2014-09-01

    In this study, the feasibility of single walled boron nitride nanotube (SWBNNT)-based biosensors has been ensured considering the continuum modelling-based simulation approach, for mass-based detection of various bacterium/viruses. Various types of bacterium or viruses have been taken into consideration at the free-end of the cantilevered configuration of the SWBNNT, as a biosensor. Resonant frequency shift-based analysis has been performed with the adsorption of various bacterium/viruses considered as additional mass to the SWBNNT-based sensor system. The continuum mechanics-based analytical approach, considering effective wall thickness has been considered to validate the finite element method (FEM)-based simulation results, based on continuum volume-based modelling of the SWBNNT. As a systematic analysis approach, the FEM-based simulation results are found in excellent agreement with the analytical results, to analyse the SWBNNTs for their wide range of applications such as nanoresonators, biosensors, gas-sensors, transducers and so on. The obtained results suggest that by using the SWBNNT of smaller size the sensitivity of the sensor system can be enhanced and detection of the bacterium/virus having mass of 4.28 × 10⁻²⁴ kg can be effectively performed.

  19. Control of radiative base recombination in the quantum cascade light-emitting transistor using quantum state overlap

    NASA Astrophysics Data System (ADS)

    Chen, Kanuo; Hsiao, Fu-Chen; Joy, Brittany; Dallesasse, John M.

    2018-07-01

    The concept of the quantum cascade light-emitting transistor (QCLET) is proposed by incorporating periodic stages of quantum wells and barriers in the completely depleted base-collector junction of a heterojunction bipolar transistor. The radiative band-to-band base recombination in the QCLET is shown to be controllable using the base-collector voltage bias for a given emitter-base biasing condition. A self-consistent Schrödinger-Poisson Equation model is built to validate the idea of the QCLET. A GaAs-based QCLET is designed and fabricated. Control of radiative band-to-band base recombination is observed and characterized. By changing the voltage across the quantum cascade region in the QCLET, the alignment of quantum states in the cascade region creates a tunable barrier for electrons that allows or suppresses emitter-injected electron flow from the p-type base through the quantum cascade region into the collector. The field-dependent electron barrier in the base-collector junction manipulates the effective minority carrier lifetime in the base and controls the radiative base recombination process. Under different quantum cascade region biasing conditions, the radiative base recombination is measured and analyzed.

  20. Comparison of Physician-, Biomarker-, and Symptom-Based Strategies for Adjustment of Inhaled Corticosteroid Therapy in Adults With Asthma

    PubMed Central

    Calhoun, William J.; Ameredes, Bill T.; King, Tonya S.; Icitovic, Nikolina; Bleecker, Eugene R.; Castro, Mario; Cherniack, Reuben M.; Chinchilli, Vernon M.; Craig, Timothy; Denlinger, Loren; DiMango, Emily A.; Engle, Linda L.; Fahy, John V.; Grant, J. Andrew; Israel, Elliot; Jarjour, Nizar; Kazani, Shamsah D.; Kraft, Monica; Kunselman, Susan J.; Lazarus, Stephen C.; Lemanske, Robert F.; Lugogo, Njira; Martin, Richard J.; Meyers, Deborah A.; Moore, Wendy C.; Pascual, Rodolfo; Peters, Stephen P.; Ramsdell, Joe; Sorkness, Christine A.; Sutherland, E. Rand; Szefler, Stanley J.; Wasserman, Stephen I.; Walter, Michael J.; Wechsler, Michael E.; Boushey, Homer A.

    2013-01-01

    Context No consensus exists for adjusting inhaled corticosteroid therapy in patients with asthma. Approaches include adjustment at outpatient visits guided by physician assessment of asthma control (symptoms, rescue therapy, pulmonary function), based on exhaled nitric oxide, or on a day-to-day basis guided by symptoms. Objective To determine if adjustment of inhaled corticosteroid therapy based on exhaled nitric oxide or day-to-day symptoms is superior to guideline-informed, physician assessment–based adjustment in preventing treatment failure in adults with mild to moderate asthma. Design, Setting, and Participants A randomized, parallel, 3-group, placebo-controlled, multiply-blinded trial of 342 adults with mild to moderate asthma controlled by low-dose inhaled corticosteroid therapy (n=114 assigned to physician assessment–based adjustment [101 completed], n=115 to biomarker-based [exhaled nitric oxide] adjustment [92 completed], and n=113 to symptom-based adjustment [97 completed]), the Best Adjustment Strategy for Asthma in the Long Term (BASALT) trial was conducted by the Asthma Clinical Research Network at 10 academic medical centers in the United States for 9 months between June 2007 and July 2010. Interventions For physician assessment–based adjustment and biomarker-based (exhaled nitric oxide) adjustment, the dose of inhaled corticosteroids was adjusted every 6 weeks; for symptom-based adjustment, inhaled corticosteroids were taken with each albuterol rescue use. Main Outcome Measure The primary outcome was time to treatment failure. Results There were no significant differences in time to treatment failure. The 9-month Kaplan-Meier failure rates were 22% (97.5% CI, 14%-33%; 24 events) for physician assessment–based adjustment, 20% (97.5% CI, 13%-30%; 21 events) for biomarker-based adjustment, and 15% (97.5% CI, 9%-25%; 16 events) for symptom-based adjustment. The hazard ratio for physician assessment–based adjustment vs biomarker-based adjustment was 1.2 (97.5% CI, 0.6-2.3). The hazard ratio for physician assessment–based adjustment vs symptom-based adjustment was 1.6 (97.5% CI, 0.8-3.3). Conclusion Among adults with mild to moderate persistent asthma controlled with low-dose inhaled corticosteroid therapy, the use of either biomarker-based or symptom-based adjustment of inhaled corticosteroids was not superior to physician assessment–based adjustment of inhaled corticosteroids in time to treatment failure. Trial Registration clinicaltrials.gov Identifier: NCT00495157 PMID:22968888

  1. An Empirical Assessment and Comparison of Species-Based and Habitat-Based Surrogates: A Case Study of Forest Vertebrates and Large Old Trees

    PubMed Central

    Lindenmayer, David B.; Barton, Philip S.; Lane, Peter W.; Westgate, Martin J.; McBurney, Lachlan; Blair, David; Gibbons, Philip; Likens, Gene E.

    2014-01-01

    A holy grail of conservation is to find simple but reliable measures of environmental change to guide management. For example, particular species or particular habitat attributes are often used as proxies for the abundance or diversity of a subset of other taxa. However, the efficacy of such kinds of species-based surrogates and habitat-based surrogates is rarely assessed, nor are different kinds of surrogates compared in terms of their relative effectiveness. We use 30-year datasets on arboreal marsupials and vegetation structure to quantify the effectiveness of: (1) the abundance of a particular species of arboreal marsupial as a species-based surrogate for other arboreal marsupial taxa, (2) hollow-bearing tree abundance as a habitat-based surrogate for arboreal marsupial abundance, and (3) a combination of species- and habitat-based surrogates. We also quantify the robustness of species-based and habitat-based surrogates over time. We then use the same approach to model overall species richness of arboreal marsupials. We show that a species-based surrogate can appear to be a valid surrogate until a habitat-based surrogate is co-examined, after which the effectiveness of the former is lost. The addition of a species-based surrogate to a habitat-based surrogate made little difference in explaining arboreal marsupial abundance, but altered the co-occurrence relationship between species. Hence, there was limited value in simultaneously using a combination of kinds of surrogates. The habitat-based surrogate also generally performed significantly better and was easier and less costly to gather than the species-based surrogate. We found that over 30 years of study, the relationships which underpinned the habitat-based surrogate generally remained positive but variable over time. Our work highlights why it is important to compare the effectiveness of different broad classes of surrogates and identify situations when either species- or habitat-based surrogates are likely to be superior. PMID:24587050

  2. An empirical assessment and comparison of species-based and habitat-based surrogates: a case study of forest vertebrates and large old trees.

    PubMed

    Lindenmayer, David B; Barton, Philip S; Lane, Peter W; Westgate, Martin J; McBurney, Lachlan; Blair, David; Gibbons, Philip; Likens, Gene E

    2014-01-01

    A holy grail of conservation is to find simple but reliable measures of environmental change to guide management. For example, particular species or particular habitat attributes are often used as proxies for the abundance or diversity of a subset of other taxa. However, the efficacy of such kinds of species-based surrogates and habitat-based surrogates is rarely assessed, nor are different kinds of surrogates compared in terms of their relative effectiveness. We use 30-year datasets on arboreal marsupials and vegetation structure to quantify the effectiveness of: (1) the abundance of a particular species of arboreal marsupial as a species-based surrogate for other arboreal marsupial taxa, (2) hollow-bearing tree abundance as a habitat-based surrogate for arboreal marsupial abundance, and (3) a combination of species- and habitat-based surrogates. We also quantify the robustness of species-based and habitat-based surrogates over time. We then use the same approach to model overall species richness of arboreal marsupials. We show that a species-based surrogate can appear to be a valid surrogate until a habitat-based surrogate is co-examined, after which the effectiveness of the former is lost. The addition of a species-based surrogate to a habitat-based surrogate made little difference in explaining arboreal marsupial abundance, but altered the co-occurrence relationship between species. Hence, there was limited value in simultaneously using a combination of kinds of surrogates. The habitat-based surrogate also generally performed significantly better and was easier and less costly to gather than the species-based surrogate. We found that over 30 years of study, the relationships which underpinned the habitat-based surrogate generally remained positive but variable over time. Our work highlights why it is important to compare the effectiveness of different broad classes of surrogates and identify situations when either species- or habitat-based surrogates are likely to be superior.

  3. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tanabe, S; Utsunomiya, S; Abe, E

    Purpose: To assess an accuracy of fiducial maker-based setup using ExacTrac (ExT-based setup) as compared with soft tissue-based setup using Cone-beam CT (CBCT-based setup) for patients with prostate cancer receiving intensity-modulated radiation therapy (IMRT) for the purpose of investigating whether ExT-based setup can be an alternative to CBCT-based setup. Methods: The setup accuracy was analyzed prospectively for 7 prostate cancer patients with implanted three fiducial markers received IMRT. All patients were treated after CBCT-based setup was performed and corresponding shifts were recorded. ExacTrac images were obtained before and after CBCT-based setup. The fiducial marker-based shifts were calculated based on thosemore » two images and recorded on the assumption that the setup correction was carried out by fiducial marker-based auto correction. Mean and standard deviation of absolute differences and the correlation between CBCT and ExT shifts were estimated. Results: A total of 178 image dataset were analyzed. On the differences between CBCT and ExT shifts, 133 (75%) of 178 image dataset resulted in smaller differences than 3 mm in all dimensions. Mean differences in the anterior-posterior (AP), superior-inferior (SI), and left-right (LR) dimensions were 1.8 ± 1.9 mm, 0.7 ± 1.9 mm, and 0.6 ± 0.8 mm, respectively. The percentages of shift agreements within ±3 mm were 76% for AP, 90% for SI, and 100% for LR. The Pearson coefficient of correlation for CBCT and ExT shifts were 0.80 for AP, 0.80 for SI, and 0.65 for LR. Conclusion: This work showed that the accuracy of ExT-based setup was correlated with that of CBCT-based setup, implying that ExT-based setup has a potential ability to be an alternative to CBCT-based setup. The further work is to specify the conditions that ExT-based setup can provide the accuracy comparable to CBCT-based setup.« less

  4. Study on Hybrid Image Search Technology Based on Texts and Contents

    NASA Astrophysics Data System (ADS)

    Wang, H. T.; Ma, F. L.; Yan, C.; Pan, H.

    2018-05-01

    Image search was studied first here based on texts and contents, respectively. The text-based image feature extraction was put forward by integrating the statistical and topic features in view of the limitation of extraction of keywords only by means of statistical features of words. On the other hand, a search-by-image method was put forward based on multi-feature fusion in view of the imprecision of the content-based image search by means of a single feature. The layered-searching method depended on primarily the text-based image search method and additionally the content-based image search was then put forward in view of differences between the text-based and content-based methods and their difficult direct fusion. The feasibility and effectiveness of the hybrid search algorithm were experimentally verified.

  5. CIRSS vertical data integration, San Bernardino County study phases 1-A, 1-B

    NASA Technical Reports Server (NTRS)

    Christenson, J.; Michel, R. (Principal Investigator)

    1981-01-01

    User needs, data types, data automation, and preliminary applications are described for an effort to assemble a single data base for San Bernardino County from data bases which exist at several administrative levels. Each of the data bases used was registered and converted to a grid-based data file at a resolution of 4 acres and used to create a multivariable data base for the entire study area. To this data base were added classified LANDSAT data from 1976 and 1979. The resulting data base thus integrated in a uniform format all of the separately automated data within the study area. Several possible interactions between existing geocoded data bases and LANDSAT data were tested. The use of LANDSAT to update existing data base is to be tested.

  6. Comparison of clinical knowledge bases for summarization of electronic health records.

    PubMed

    McCoy, Allison B; Sittig, Dean F; Wright, Adam

    2013-01-01

    Automated summarization tools that create condition-specific displays may improve clinician efficiency. These tools require new kinds of knowledge that is difficult to obtain. We compared five problem-medication pair knowledge bases generated using four previously described knowledge base development approaches. The number of pairs in the resulting mapped knowledge bases varied widely due to differing mapping techniques from the source terminologies, ranging from 2,873 to 63,977,738 pairs. The number of overlapping pairs across knowledge bases was low, with one knowledge base having half of the pairs overlapping with another knowledge base, and most having less than a third overlapping. Further research is necessary to better evaluate the knowledge bases independently in additional settings, and to identify methods to integrate the knowledge bases.

  7. Expert system for web based collaborative CAE

    NASA Astrophysics Data System (ADS)

    Hou, Liang; Lin, Zusheng

    2006-11-01

    An expert system for web based collaborative CAE was developed based on knowledge engineering, relational database and commercial FEA (Finite element analysis) software. The architecture of the system was illustrated. In this system, the experts' experiences, theories and typical examples and other related knowledge, which will be used in the stage of pre-process in FEA, were categorized into analysis process and object knowledge. Then, the integrated knowledge model based on object-oriented method and rule based method was described. The integrated reasoning process based on CBR (case based reasoning) and rule based reasoning was presented. Finally, the analysis process of this expert system in web based CAE application was illustrated, and an analysis example of a machine tool's column was illustrated to prove the validity of the system.

  8. Participant satisfaction with appearance-based versus health-based educational videos promoting sunscreen use: a randomized controlled trial.

    PubMed

    Tuong, William; Armstrong, April W

    2015-02-16

    Increasing participant satisfaction with health interventions can improve compliance with recommended health behaviors and lead to better health outcomes. However, factors that influence participant satisfaction have not been well studied in dermatology-specific behavioral health interventions. We sought to assess participant satisfaction of either an appearance-based educational video or a health-based educational video promoting sunscreen use along dimensions of usefulness of educational content, message appeal, and presentation quality. In a randomized controlled trial, participants were randomized 1:1 to view an appearance-based video or a health-based video. After six weeks, participant satisfaction with the educational videos was assessed. Fifty high school students were enrolled and completed the study. Participant satisfaction ratings were assessed using a pre-tested 10-point assessment scale. The participants rated the usefulness of the appearance-based video (8.1 ± 1.2) significantly higher than the health-based video (6.4 ± 1.4, p<0.001). The message appeal of the appearance-based video (8.3 ± 1.0) was also significantly higher than the health-based video (6.6 ± 1.6, p<0.001). The presentation quality rating was similar between the appearance-based video (7.8 ± 1.3) and the health-based video (8.1 ± 1.3), p=0.676. Adolescents rated the appearance-based video higher than the health-based video in terms of usefulness of educational content and message appeal.

  9. Structural parameter study on polymer-based ultrasonic motor

    NASA Astrophysics Data System (ADS)

    Wu, Jiang; Mizuno, Yosuke; Nakamura, Kentaro

    2017-11-01

    Our previous study has shown that traveling-wave rotary ultrasonic motors using polymer-based vibrators can work in the same way as conventional motors with metal-based vibrators. It is feasible to enhance the performance, particularly output torques, of polymer-based motors by adjusting several key dimensions of their vibrators. In this study, poly phenylene sulfide, a functional polymer exhibiting low attenuation at ultrasonic frequency, is selected as the vibrating body, which is activated with a piezoelectric ceramic element bonded on its back surface. The optimal thicknesses of the polymer-based motors are higher than those of metal-based motors. When the same voltages were applied, the maximum torques and output powers available with the polymer-based motors were lower than the values of the metal-based motors with the same structures. The reasons for the lower torque were explained on the basis of vibration modes. First, the force factors of the polymer-based vibrators are lower than those of metal-based vibrators owing to the great difference in the mechanical constants between polymers and piezoelectric ceramics. Subsequently, though the force factors of polymer-based vibrators can be slightly enhanced by increasing their thicknesses, the unavoidable radial vibrations become higher and cause undesirable friction loss, which reduces the output torques. Though the polymer-based motors have rotation speeds comparable to those of metal-based motors, their output power are lower due to the low electromechanical coupling factors of the polymer-based vibrators.

  10. 0-6621 : developing a mixture-based specification for flexible base.

    DOT National Transportation Integrated Search

    2012-08-01

    The Texas Department of Transportation : (TxDOT) currently utilizes Item 247, Flexible : Base, to specify a foundation course of flexible : base utilized in a pavement. Base materials are : not allowed to be used by the contractors until : the ...

  11. Surveillance Among Men Who have Sex with Men in the United States: A Comparison of Web-Based and Venue-Based Samples.

    PubMed

    Chen, Yen-Tyng; Bowles, Kristina; An, Qian; DiNenno, Elizabeth; Finlayson, Teresa; Hoots, Brooke; Paz-Bailey, Gabriela; Wejnert, Cyprian

    2018-07-01

    Although men who have sex with men (MSM) recruited through web-based and venue-based sampling methods have been compared, no large web-based and venue-based samples using similar survey instruments have been examined in the U.S. This study describes the differences in sociodemographic characteristics and risk behaviors between the 2012 Web-based HIV Behavioral Survey (n = 3221) and 2011 National HIV Behavioral Surveillance (n = 9256). Compared with participants in the venue-based sample, participants in the web-based sample were older, less likely to be black or Hispanic, more likely to have higher socioeconomic status, and more likely to have anal sex without a condom with their last male sex partner. Web-based participants were less likely to have multiple male sex partners, ever injected drugs, been tested for HIV in the past 12 months, and received free condoms than venue-based participants. The method for sampling MSM into a behavioral survey should consider the sub-population of MSM to be reached.

  12. Active contour-based visual tracking by integrating colors, shapes, and motions.

    PubMed

    Hu, Weiming; Zhou, Xue; Li, Wei; Luo, Wenhan; Zhang, Xiaoqin; Maybank, Stephen

    2013-05-01

    In this paper, we present a framework for active contour-based visual tracking using level sets. The main components of our framework include contour-based tracking initialization, color-based contour evolution, adaptive shape-based contour evolution for non-periodic motions, dynamic shape-based contour evolution for periodic motions, and the handling of abrupt motions. For the initialization of contour-based tracking, we develop an optical flow-based algorithm for automatically initializing contours at the first frame. For the color-based contour evolution, Markov random field theory is used to measure correlations between values of neighboring pixels for posterior probability estimation. For adaptive shape-based contour evolution, the global shape information and the local color information are combined to hierarchically evolve the contour, and a flexible shape updating model is constructed. For the dynamic shape-based contour evolution, a shape mode transition matrix is learnt to characterize the temporal correlations of object shapes. For the handling of abrupt motions, particle swarm optimization is adopted to capture the global motion which is applied to the contour in the current frame to produce an initial contour in the next frame.

  13. Comparing team-based and mixed active-learning methods in an ambulatory care elective course.

    PubMed

    Zingone, Michelle M; Franks, Andrea S; Guirguis, Alexander B; George, Christa M; Howard-Thompson, Amanda; Heidel, Robert E

    2010-11-10

    To assess students' performance and perceptions of team-based and mixed active-learning methods in 2 ambulatory care elective courses, and to describe faculty members' perceptions of team-based learning. Using the 2 teaching methods, students' grades were compared. Students' perceptions were assessed through 2 anonymous course evaluation instruments. Faculty members who taught courses using the team-based learning method were surveyed regarding their impressions of team-based learning. The ambulatory care course was offered to 64 students using team-based learning (n = 37) and mixed active learning (n = 27) formats. The mean quality points earned were 3.7 (team-based learning) and 3.3 (mixed active learning), p < 0.001. Course evaluations for both courses were favorable. All faculty members who used the team-based learning method reported that they would consider using team-based learning in another course. Students were satisfied with both teaching methods; however, student grades were significantly higher in the team-based learning course. Faculty members recognized team-based learning as an effective teaching strategy for small-group active learning.

  14. Dynamics of spontaneous flipping of a mismatched base in DNA duplex.

    PubMed

    Yin, Yandong; Yang, Lijiang; Zheng, Guanqun; Gu, Chan; Yi, Chengqi; He, Chuan; Gao, Yi Qin; Zhao, Xin Sheng

    2014-06-03

    DNA base flipping is a fundamental theme in DNA biophysics. The dynamics for a B-DNA base to spontaneously flip out of the double helix has significant implications in various DNA-protein interactions but are still poorly understood. The spontaneous base-flipping rate obtained previously via the imino proton exchange assay is most likely the rate of base wobbling instead of flipping. Using the diffusion-decelerated fluorescence correlation spectroscopy together with molecular dynamics simulations, we show that a base of a single mismatched base pair (T-G, T-T, or T-C) in a double-stranded DNA can spontaneously flip out of the DNA duplex. The extrahelical lifetimes are on the order of 10 ms, whereas the intrahelical lifetimes range from 0.3 to 20 s depending on the stability of the base pairs. These findings provide detailed understanding on the dynamics of DNA base flipping and lay down foundation to fully understand how exactly the repair proteins search and locate the target mismatched base among a vast excess of matched DNA bases.

  15. 17 CFR 240.3a68-2 - Requests for interpretation of swaps, security-based swaps, and mixed swaps.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... swaps, security-based swaps, and mixed swaps. 240.3a68-2 Section 240.3a68-2 Commodity and Securities..., Security-Based Swap, and Security-Based Swap Agreement; Mixed Swaps; Security-Based Swap Agreement Recordkeeping § 240.3a68-2 Requests for interpretation of swaps, security-based swaps, and mixed swaps. (a) In...

  16. 17 CFR 240.3a68-2 - Requests for interpretation of swaps, security-based swaps, and mixed swaps.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... swaps, security-based swaps, and mixed swaps. 240.3a68-2 Section 240.3a68-2 Commodity and Securities..., Security-Based Swap, and Security-Based Swap Agreement; Mixed Swaps; Security-Based Swap Agreement Recordkeeping § 240.3a68-2 Requests for interpretation of swaps, security-based swaps, and mixed swaps. (a) In...

  17. Graphene-based field-effect transistor biosensors

    DOEpatents

    Chen; , Junhong; Mao, Shun; Lu, Ganhua

    2017-06-14

    The disclosure provides a field-effect transistor (FET)-based biosensor and uses thereof. In particular, to FET-based biosensors using thermally reduced graphene-based sheets as a conducting channel decorated with nanoparticle-biomolecule conjugates. The present disclosure also relates to FET-based biosensors using metal nitride/graphene hybrid sheets. The disclosure provides a method for detecting a target biomolecule in a sample using the FET-based biosensor described herein.

  18. Transitioning Client Based NALCOMIS to a Multi Function Web Based Application

    DTIC Science & Technology

    2016-09-23

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS TRANSITIONING CLIENT- BASED NALCOMIS TO A MULTI-FUNCTION WEB- BASED APPLICATION by Aaron P...TITLE AND SUBTITLE TRANSITIONING CLIENT- BASED NALCOMIS TO A MULTI-FUNCTION WEB- BASED APPLICATION 5. FUNDING NUMBERS 6. AUTHOR(S) Aaron P. Schnetzler 7...NALCOMIS. NALCOMIS has two configurations that are used by organizational and intermediate level maintenance activi- ties, Optimized Organizational

  19. Case-based reasoning: The marriage of knowledge base and data base

    NASA Technical Reports Server (NTRS)

    Pulaski, Kirt; Casadaban, Cyprian

    1988-01-01

    The coupling of data and knowledge has a synergistic effect when building an intelligent data base. The goal is to integrate the data and knowledge almost to the point of indistinguishability, permitting them to be used interchangeably. Examples given in this paper suggest that Case-Based Reasoning is a more integrated way to link data and knowledge than pure rule-based reasoning.

  20. Clinical and cost-effectiveness of home-based cardiac rehabilitation compared to conventional, centre-based cardiac rehabilitation: Results of the FIT@Home study.

    PubMed

    Kraal, Jos J; Van den Akker-Van Marle, M Elske; Abu-Hanna, Ameen; Stut, Wim; Peek, Niels; Kemps, Hareld Mc

    2017-08-01

    Aim Although cardiac rehabilitation improves physical fitness after a cardiac event, many eligible patients do not participate in cardiac rehabilitation and the beneficial effects of cardiac rehabilitation are often not maintained over time. Home-based training with telemonitoring guidance could improve participation rates and enhance long-term effectiveness. Methods and results We randomised 90 low-to-moderate cardiac risk patients entering cardiac rehabilitation to three months of either home-based training with telemonitoring guidance or centre-based training. Although training adherence was similar between groups, satisfaction was higher in the home-based group ( p = 0.02). Physical fitness improved at discharge ( p < 0.01) and at one-year follow-up ( p < 0.01) in both groups, without differences between groups (home-based p = 0.31 and centre-based p = 0.87). Physical activity levels did not change during the one-year study period (centre-based p = 0.38, home-based p = 0.80). Healthcare costs were statistically non-significantly lower in the home-based group (€437 per patient, 95% confidence interval -562 to 1436, p = 0.39). From a societal perspective, a statistically non-significant difference of €3160 per patient in favour of the home-based group was found (95% confidence interval -460 to 6780, p = 0.09) and the probability that it was more cost-effective varied between 97% and 75% (willingness-to-pay of €0 and €100,000 per quality-adjusted life-years, respectively). Conclusion We found no differences between home-based training with telemonitoring guidance and centre-based training on physical fitness, physical activity level or health-related quality of life. However, home-based training was associated with a higher patient satisfaction and appears to be more cost-effective than centre-based training. We conclude that home-based training with telemonitoring guidance can be used as an alternative to centre-based training for low-to-moderate cardiac risk patients entering cardiac rehabilitation.

  1. Complexity in Acid–Base Titrations: Multimer Formation Between Phosphoric Acids and Imines

    PubMed Central

    Malm, Christian; Kim, Heejae; Wagner, Manfred

    2017-01-01

    Abstract Solutions of Brønsted acids with bases in aprotic solvents are not only common model systems to study the fundamentals of proton transfer pathways but are also highly relevant to Brønsted acid catalysis. Despite their importance the light nature of the proton makes characterization of acid–base aggregates challenging. Here, we track such acid–base interactions over a broad range of relative compositions between diphenyl phosphoric acid and the base quinaldine in dichloromethane, by using a combination of dielectric relaxation and NMR spectroscopy. In contrast to what one would expect for an acid–base titration, we find strong deviations from quantitative proton transfer from the acid to the base. Even for an excess of the base, multimers consisting of one base and at least two acid molecules are formed, in addition to the occurrence of proton transfer from the acid to the base and simultaneous formation of ion pairs. For equimolar mixtures such multimers constitute about one third of all intermolecular aggregates. Quantitative analysis of our results shows that the acid‐base association constant is only around six times larger than that for the acid binding to an acid‐base dimer, that is, to an already protonated base. Our findings have implications for the interpretation of previous studies of reactive intermediates in organocatalysis and provide a rationale for previously observed nonlinear effects in phosphoric acid catalysis. PMID:28597513

  2. A Flexible Base Electrode Array for Intraspinal Microstimulation

    PubMed Central

    Khaled, I.; Elmallah, S.; Cheng, C.; Moussa, W.A.; Mushahwar, V.K.; Elias, A.L.

    2013-01-01

    In this paper, we report the development of a flexible base array of penetrating electrodes which can be used to interface with the spinal cord. A customizable and feasible fabrication protocol is described. The flexible base arrays were fabricated and implanted into surrogate cords which were elongated by 12%. The resulting strains were optically measured across the cord and compared to those associated with two types of electrodes arrays (one without a base and one with a rigid base connecting the electrodes). The deformation behavior of cords implanted with the flexible base arrays resembled the behavior of cords implanted with individual microwires that were not connected through a base. The results of the strain test were used to validate a 2D finite element model. The validated model was used to assess the stresses induced by the electrodes of the 3 types of arrays on the cord, and to examine how various design parameters (thickness, base modulus, etc.) impact the mechanical behavior of the electrode array. Rigid base arrays induced higher stresses on the cord than the flexible base arrays which in turn imposed higher stresses than the individual microwire implants. The developed flexible base array showed improvement over the rigid base array; however, its stiffness needs to be further reduced to emulate the mechanical behavior of individual microwire arrays without a base. PMID:23744656

  3. 24 CFR 35.1200 - Purpose and applicability.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Development LEAD-BASED PAINT POISONING PREVENTION IN CERTAIN RESIDENTIAL STRUCTURES Tenant-Based Rental... procedures to eliminate as far as practicable lead-based paint hazards in housing occupied by families receiving tenant-based rental assistance. Such assistance includes tenant-based rental assistance under the...

  4. 24 CFR 35.1200 - Purpose and applicability.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Development LEAD-BASED PAINT POISONING PREVENTION IN CERTAIN RESIDENTIAL STRUCTURES Tenant-Based Rental... procedures to eliminate as far as practicable lead-based paint hazards in housing occupied by families receiving tenant-based rental assistance. Such assistance includes tenant-based rental assistance under the...

  5. 24 CFR 35.1200 - Purpose and applicability.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Development LEAD-BASED PAINT POISONING PREVENTION IN CERTAIN RESIDENTIAL STRUCTURES Tenant-Based Rental... procedures to eliminate as far as practicable lead-based paint hazards in housing occupied by families receiving tenant-based rental assistance. Such assistance includes tenant-based rental assistance under the...

  6. 24 CFR 35.1200 - Purpose and applicability.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Development LEAD-BASED PAINT POISONING PREVENTION IN CERTAIN RESIDENTIAL STRUCTURES Tenant-Based Rental... procedures to eliminate as far as practicable lead-based paint hazards in housing occupied by families receiving tenant-based rental assistance. Such assistance includes tenant-based rental assistance under the...

  7. 24 CFR 35.1200 - Purpose and applicability.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Development LEAD-BASED PAINT POISONING PREVENTION IN CERTAIN RESIDENTIAL STRUCTURES Tenant-Based Rental... procedures to eliminate as far as practicable lead-based paint hazards in housing occupied by families receiving tenant-based rental assistance. Such assistance includes tenant-based rental assistance under the...

  8. 47 CFR 65.800 - Rate base.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 3 2012-10-01 2012-10-01 false Rate base. 65.800 Section 65.800 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES (CONTINUED) INTERSTATE RATE OF RETURN PRESCRIPTION PROCEDURES AND METHODOLOGIES Rate Base § 65.800 Rate base. The rate base shall...

  9. 47 CFR 65.800 - Rate base.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 3 2011-10-01 2011-10-01 false Rate base. 65.800 Section 65.800 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES (CONTINUED) INTERSTATE RATE OF RETURN PRESCRIPTION PROCEDURES AND METHODOLOGIES Rate Base § 65.800 Rate base. The rate base shall...

  10. 47 CFR 65.800 - Rate base.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 3 2013-10-01 2013-10-01 false Rate base. 65.800 Section 65.800 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES (CONTINUED) INTERSTATE RATE OF RETURN PRESCRIPTION PROCEDURES AND METHODOLOGIES Rate Base § 65.800 Rate base. The rate base shall...

  11. 17 CFR 41.14 - Transition period for indexes that cease being narrow-based security indexes.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... day tolerance provision. An index that is a narrow-based security index that becomes a broad-based... than forty-five days. An index that is a narrow-based security index that becomes a broad-based...

  12. 47 CFR 65.800 - Rate base.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Rate base. 65.800 Section 65.800 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES (CONTINUED) INTERSTATE RATE OF RETURN PRESCRIPTION PROCEDURES AND METHODOLOGIES Rate Base § 65.800 Rate base. The rate base shall...

  13. US Air Force Air Base Ground Defense Doctrine. Are The Issues Which Arose Concerning Air Base Ground Defense During the Vietnam Conflict Recognized in Current US Air Force Doctrine

    DTIC Science & Technology

    1984-05-01

    Conflict; US efforts to overcome these difficulties_ statistics concerning hostile attacks against air bases and the results thereof (8]; and, a...buses. During the period from � through 1973 the threat to ,air bacses iontinued, as reflected in the air base attack statistics provided ,at...advantage of aI r base vulnerabi lities to gather detailed intelligenrci concerning the air bases. C1 48 -STANDOFF ATTACKS- Based upon the statistics in

  14. How Prevalent Is Object-Based Attention?

    PubMed Central

    Pilz, Karin S.; Roggeveen, Alexa B.; Creighton, Sarah E.; Bennett, Patrick J.; Sekuler, Allison B.

    2012-01-01

    Previous research suggests that visual attention can be allocated to locations in space (space-based attention) and to objects (object-based attention). The cueing effects associated with space-based attention tend to be large and are found consistently across experiments. Object-based attention effects, however, are small and found less consistently across experiments. In three experiments we address the possibility that variability in object-based attention effects across studies reflects low incidence of such effects at the level of individual subjects. Experiment 1 measured space-based and object-based cueing effects for horizontal and vertical rectangles in 60 subjects comparing commonly used target detection and discrimination tasks. In Experiment 2 we ran another 120 subjects in a target discrimination task in which rectangle orientation varied between subjects. Using parametric statistical methods, we found object-based effects only for horizontal rectangles. Bootstrapping methods were used to measure effects in individual subjects. Significant space-based cueing effects were found in nearly all subjects in both experiments, across tasks and rectangle orientations. However, only a small number of subjects exhibited significant object-based cueing effects. Experiment 3 measured only object-based attention effects using another common paradigm and again, using bootstrapping, we found only a small number of subjects that exhibited significant object-based cueing effects. Our results show that object-based effects are more prevalent for horizontal rectangles, which is in accordance with the theory that attention may be allocated more easily along the horizontal meridian. The fact that so few individuals exhibit a significant object-based cueing effect presumably is why previous studies of this effect might have yielded inconsistent results. The results from the current study highlight the importance of considering individual subject data in addition to commonly used statistical methods. PMID:22348018

  15. Validating the WHO Maternal Near Miss Tool in a high-income country.

    PubMed

    Witteveen, Tom; de Koning, Ilona; Bezstarosti, Hans; van den Akker, Thomas; van Roosmalen, Jos; Bloemenkamp, Kitty W

    2016-01-01

    This study was performed to assess the applicability of the WHO Maternal Near Miss Tool (MNM Tool) and the organ dysfunction criteria in a high-income country. The MNM tool was applied to 2552 women who died of pregnancy-related causes or sustained severe acute maternal morbidity between August 2004 and August 2006 in one of the 98 hospitals with a maternity unit in the Netherlands. Fourteen (0.6%) cases had insufficient data for application. Each case was assessed according to the three main "MNM categories" specified in the MNM tool and their subcategory criteria: five disease-, four intervention- and seven organ dysfunction-based criteria. Potentially life-threatening conditions (disease-based inclusions) and life-threatening cases (organ dysfunction-based inclusions) were differentiated according to WHO methodology. Outcomes were incidence of all (sub)categories and case-fatality rates. Of the 2538 cases, 2308 (90.9%) women fulfilled disease-based, 2116 (83.4%) intervention-based and 1024 (40.3%) organ dysfunction-based criteria. Maternal death occurred in 48 women, of whom 23 (47.9%) fulfilled disease-based, 33 (68.8%) intervention-based and 31 (64.6%) organ dysfunction-based criteria. Case-fatality rates were 23/2308 (1.0%) for cases fulfilling the disease-based criteria, 33/2116 (1.6%) for intervention-based criteria and 31/1024 (3.0%) for women fulfilling the organ dysfunction-based criteria. In the Netherlands, where advanced laboratory and clinical monitoring are available, organ dysfunction-based criteria of the MNM tool failed to identify nearly two-thirds of sustained severe acute maternal morbidity cases and more than one-third of maternal deaths. Disease-based criteria remain important, and using only organ dysfunction-based criteria would lead to underestimating severe acute maternal morbidity. © 2015 Nordic Federation of Societies of Obstetrics and Gynecology.

  16. Availability, price and promotions for cigarettes and non-cigarette tobacco products: an observational comparison of US Air Force bases with nearby tobacco retailers, 2016.

    PubMed

    Kong, Amanda Y; Golden, Shelley D; Myers, Allison E; Little, Melissa A; Klesges, Robert; Talcott, Wayne; Vandegrift, Sara M; Cassidy, Daniel G; Ribisl, Kurt M

    2018-04-28

    Active duty military personnel have higher cigarette and smokeless tobacco use rates than civilian populations. Although US Airmen (called Airmen regardless of gender or rank) are required to be tobacco-free during initial training, many resume use once this period ends, perhaps as a result of easy access to cheap tobacco products. Between July and September 2016, we collected tobacco product, price and promotion information by visiting on-base (n=28) and off-base (n=80) tobacco retailers near the eight technical training bases where approximately 99% of Airmen attend training. We conducted mixed linear effects models to examine on-base versus off-base differences. Cigarette packs were 11%-12% cheaper at on-base retailers compared with off-base retailers. Newport Menthol and Marlboro Red cigarette packs were $0.87 and $0.80 lower on-base (p<0.001) while the cheapest pack available was $0.54 lower on-base (p<0.01). Copenhagen smokeless tobacco was also significantly cheaper on-base (B=-0.65, p<0.01). Interior price promotions were more common on-base. Retail stores located on Air Force bases sell cigarettes and smokeless tobacco products at prices well below those in nearby off-base retailers: the vast majority of these retailers feature interior price promotions for these products. Federal policies regulating prices of on-base tobacco sales, if implemented more effectively, have the potential to protect the health of Airmen by helping them remain tobacco-free after technical training. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  17. Knowledge information management toolkit and method

    DOEpatents

    Hempstead, Antoinette R.; Brown, Kenneth L.

    2006-08-15

    A system is provided for managing user entry and/or modification of knowledge information into a knowledge base file having an integrator support component and a data source access support component. The system includes processing circuitry, memory, a user interface, and a knowledge base toolkit. The memory communicates with the processing circuitry and is configured to store at least one knowledge base. The user interface communicates with the processing circuitry and is configured for user entry and/or modification of knowledge pieces within a knowledge base. The knowledge base toolkit is configured for converting knowledge in at least one knowledge base from a first knowledge base form into a second knowledge base form. A method is also provided.

  18. Skull base, orbits, temporal bone, and cranial nerves: anatomy on MR imaging.

    PubMed

    Morani, Ajaykumar C; Ramani, Nisha S; Wesolowski, Jeffrey R

    2011-08-01

    Accurate delineation, diagnosis, and treatment planning of skull base lesions require knowledge of the complex anatomy of the skull base. Because the skull base cannot be directly evaluated, imaging is critical for the diagnosis and management of skull base diseases. Although computed tomography (CT) is excellent for outlining the bony detail, magnetic resonance (MR) imaging provides better soft tissue detail and is helpful for evaluating the adjacent meninges, brain parenchyma, and bone marrow of the skull base. Thus, CT and MR imaging are often used together for evaluating skull base lesions. This article focuses on the radiologic anatomy of the skull base pertinent to MR imaging evaluation. Copyright © 2011 Elsevier Inc. All rights reserved.

  19. Differentiating location- and distance-based processes in memory for time: an ERP study.

    PubMed

    Curran, Tim; Friedman, William J

    2003-09-01

    Memory for the time of events may benefit from reconstructive, location-based, and distance-based processes, but these processes are difficult to dissociate with behavioral methods. Neuropsychological research has emphasized the contribution of prefrontal brain mechanisms to memory for time but has not clearly differentiated location- from distance-based processing. The present experiment recorded event-related brain potentials (ERPs) while subjects completed two different temporal memory tests, designed to emphasize either location- or distance-based processing. The subjects' reports of location-based versus distance-based strategies and the reaction time pattern validated our experimental manipulation. Late (800-1,800 msec) frontal ERP effects were related to location-based processing. The results provide support for a two-process theory of memory for time and suggest that frontal memory mechanisms are specifically related to reconstructive, location-based processing.

  20. Score-Level Fusion of Phase-Based and Feature-Based Fingerprint Matching Algorithms

    NASA Astrophysics Data System (ADS)

    Ito, Koichi; Morita, Ayumi; Aoki, Takafumi; Nakajima, Hiroshi; Kobayashi, Koji; Higuchi, Tatsuo

    This paper proposes an efficient fingerprint recognition algorithm combining phase-based image matching and feature-based matching. In our previous work, we have already proposed an efficient fingerprint recognition algorithm using Phase-Only Correlation (POC), and developed commercial fingerprint verification units for access control applications. The use of Fourier phase information of fingerprint images makes it possible to achieve robust recognition for weakly impressed, low-quality fingerprint images. This paper presents an idea of improving the performance of POC-based fingerprint matching by combining it with feature-based matching, where feature-based matching is introduced in order to improve recognition efficiency for images with nonlinear distortion. Experimental evaluation using two different types of fingerprint image databases demonstrates efficient recognition performance of the combination of the POC-based algorithm and the feature-based algorithm.

  1. Students' attitudes and perceptions of teaching and assessment of evidence-based practice in an occupational therapy professional Master's curriculum: a mixed methods study.

    PubMed

    Thomas, Aliki; Han, Lu; Osler, Brittony P; Turnbull, Emily A; Douglas, Erin

    2017-03-27

    Most health professions, including occupational therapy, have made the application of evidence-based practice a desired competency and professional responsibility. Despite the increasing emphasis on evidence-based practice for improving patient outcomes, there are numerous research-practice gaps in the health professions. In addition to efforts aimed at promoting evidence-based practice with clinicians, there is a strong impetus for university programs to design curricula that will support the development of the knowledge, attitudes, skills and behaviours associated with evidence-based practice. Though occupational therapy curricula in North America are becoming increasingly focused on evidence-based practice, research on students' attitudes towards evidence-based practice, their perceptions regarding the integration and impact of this content within the curricula, and the impact of the curriculum on their readiness for evidence-based practice is scarce. The present study examined occupational therapy students' perceptions towards the teaching and assessment of evidence-based practice within a professional master's curriculum and their self-efficacy for evidence-based practice. The study used a mixed methods explanatory sequential design. The quantitative phase included a cross-sectional questionnaire exploring attitudes towards evidence-based practice, perceptions of the teaching and assessment of evidence-based practice and evidence-based practice self-efficacy for four cohorts of students enrolled in the program and a cohort of new graduates. The questionnaire was followed by a focus group of senior students aimed at further exploring the quantitative findings. All student cohorts held favourable attitudes towards evidence-based practice; there was no difference across cohorts. There were significant differences with regards to perceptions of the teaching and assessment of evidence-based practice within the curriculum; junior cohorts and students with previous education had less favourable perceptions. Students' self-efficacy for evidence-based practice was significantly higher across cohorts. Four main themes emerged from the focus group data: (a) Having mixed feelings about the value of evidence-based practice (b) Barriers to the application of evidence-based practice; (c) Opposing worlds and (d) Vital and imperfect role of the curriculum. This study provides important data to support the design and revision of evidence-based practice curricula within professional rehabilitation programs.

  2. 17 CFR 41.14 - Transition period for indexes that cease being narrow-based security indexes.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... provision. An index that is a narrow-based security index that becomes a broad-based security index for no...-five days. An index that is a narrow-based security index that becomes a broad-based security index for...

  3. 17 CFR 41.14 - Transition period for indexes that cease being narrow-based security indexes.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... provision. An index that is a narrow-based security index that becomes a broad-based security index for no...-five days. An index that is a narrow-based security index that becomes a broad-based security index for...

  4. 17 CFR 41.14 - Transition period for indexes that cease being narrow-based security indexes.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... provision. An index that is a narrow-based security index that becomes a broad-based security index for no...-five days. An index that is a narrow-based security index that becomes a broad-based security index for...

  5. 17 CFR 41.14 - Transition period for indexes that cease being narrow-based security indexes.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... provision. An index that is a narrow-based security index that becomes a broad-based security index for no...-five days. An index that is a narrow-based security index that becomes a broad-based security index for...

  6. Intrusion-based reasoning and depression: cross-sectional and prospective relationships.

    PubMed

    Berle, David; Moulds, Michelle L

    2014-01-01

    Intrusion-based reasoning refers to the tendency to form interpretations about oneself or a situation based on the occurrence of a negative intrusive autobiographical memory. Intrusion-based reasoning characterises post-traumatic stress disorder, but has not yet been investigated in depression. We report two studies that aimed to investigate this. In Study 1 both high (n = 42) and low (n = 28) dysphoric participants demonstrated intrusion-based reasoning. High-dysphoric individuals engaged in self-referent intrusion-based reasoning to a greater extent than did low-dysphoric participants. In Study 2 there were no significant differences in intrusion-based reasoning between currently depressed (n = 27) and non-depressed (n = 51) participants, and intrusion-based reasoning did not predict depressive symptoms at 6-month follow-up. Interestingly, previously (n = 26) but not currently (n = 27) depressed participants engaged in intrusion-based reasoning to a greater extent than never-depressed participants (n = 25), indicating the possibility that intrusion-based reasoning may serve as a "scar" from previous episodes. The implications of these findings are discussed.

  7. A knowledge-based object recognition system for applications in the space station

    NASA Technical Reports Server (NTRS)

    Dhawan, Atam P.

    1988-01-01

    A knowledge-based three-dimensional (3D) object recognition system is being developed. The system uses primitive-based hierarchical relational and structural matching for the recognition of 3D objects in the two-dimensional (2D) image for interpretation of the 3D scene. At present, the pre-processing, low-level preliminary segmentation, rule-based segmentation, and the feature extraction are completed. The data structure of the primitive viewing knowledge-base (PVKB) is also completed. Algorithms and programs based on attribute-trees matching for decomposing the segmented data into valid primitives were developed. The frame-based structural and relational descriptions of some objects were created and stored in a knowledge-base. This knowledge-base of the frame-based descriptions were developed on the MICROVAX-AI microcomputer in LISP environment. The simulated 3D scene of simple non-overlapping objects as well as real camera data of images of 3D objects of low-complexity have been successfully interpreted.

  8. Refining Automatically Extracted Knowledge Bases Using Crowdsourcing

    PubMed Central

    Xian, Xuefeng; Cui, Zhiming

    2017-01-01

    Machine-constructed knowledge bases often contain noisy and inaccurate facts. There exists significant work in developing automated algorithms for knowledge base refinement. Automated approaches improve the quality of knowledge bases but are far from perfect. In this paper, we leverage crowdsourcing to improve the quality of automatically extracted knowledge bases. As human labelling is costly, an important research challenge is how we can use limited human resources to maximize the quality improvement for a knowledge base. To address this problem, we first introduce a concept of semantic constraints that can be used to detect potential errors and do inference among candidate facts. Then, based on semantic constraints, we propose rank-based and graph-based algorithms for crowdsourced knowledge refining, which judiciously select the most beneficial candidate facts to conduct crowdsourcing and prune unnecessary questions. Our experiments show that our method improves the quality of knowledge bases significantly and outperforms state-of-the-art automatic methods under a reasonable crowdsourcing cost. PMID:28588611

  9. Value-based medicine: evidence-based medicine and beyond.

    PubMed

    Brown, Gary C; Brown, Melissa M; Sharma, Sanjay

    2003-09-01

    Value-based medicine is the practice of medicine emphasizing the value received from an intervention. Value is measured by objectively quantifying: 1) the improvement in quality of life and/or 2) the improvement in length of life conferred by an intervention. Evidence-based medicine often measures the improvement gained in length of life, but generally ignores the importance of quality of life improvement or loss. Value-based medicine incorporates the best features of evidence-based medicine and takes evidence-based data to a higher level by incorporating the quality of life perceptions of patients with a disease in concerning the value of an intervention. Inherent in value-based medicine are the costs associated with an intervention. The resources expended for the value gained in value-based medicine is measured with cost-utility analysis in terms of the US dollars/QALY (money spent per quality-adjusted life-year gained). A review of the current status and the likely future of value-based medicine is addressed herein.

  10. Lunar bases and space activities of the 21st century

    NASA Technical Reports Server (NTRS)

    Mendell, W. W. (Editor)

    1985-01-01

    The present conference gives attention to such major aspects of lunar colonization as lunar base concepts, lunar transportation, lunar science research activities, moon-based astronomical researches, lunar architectural construction, lunar materials and processes, lunar oxygen production, life support and health maintenance in lunar bases, societal aspects of lunar colonization, and the prospects for Mars colonization. Specific discussions are presented concerning the role of nuclear energy in lunar development, achromatic trajectories and the industrial scale transport of lunar resources, advanced geologic exploration from a lunar base, geophysical investigations of the moon, moon-based astronomical interferometry, the irradiation of the moon by particles, cement-based composites for lunar base construction, electrostatic concentration of lunar soil minerals, microwave processing of lunar materials, a parametric analysis of lunar oxygen production, hydrogen from lunar regolith fines, metabolic support for a lunar base, past and future Soviet lunar exploration, and the use of the moons of Mars as sources of water for lunar bases.

  11. Rule-based reasoning is fast and belief-based reasoning can be slow: Challenging current explanations of belief-bias and base-rate neglect.

    PubMed

    Newman, Ian R; Gibb, Maia; Thompson, Valerie A

    2017-07-01

    It is commonly assumed that belief-based reasoning is fast and automatic, whereas rule-based reasoning is slower and more effortful. Dual-Process theories of reasoning rely on this speed-asymmetry explanation to account for a number of reasoning phenomena, such as base-rate neglect and belief-bias. The goal of the current study was to test this hypothesis about the relative speed of belief-based and rule-based processes. Participants solved base-rate problems (Experiment 1) and conditional inferences (Experiment 2) under a challenging deadline; they then gave a second response in free time. We found that fast responses were informed by rules of probability and logical validity, and that slow responses incorporated belief-based information. Implications for Dual-Process theories and future research options for dissociating Type I and Type II processes are discussed. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  12. How Affectively-Based and Cognitively-Based Attitudes Drive Intergroup Behaviours: The Moderating Role of Affective-Cognitive Consistency

    PubMed Central

    Zhou, Jie; Dovidio, John; Wang, Erping

    2013-01-01

    The moderating role of affective-cognitive consistency in the effects of affectively-based and cognitively-based attitudes on consummatory and instrumental behaviors was explored using two experimental studies in the intergroup context. Study 1 revealed that affectively-based attitudes were better predictors than cognitively-based attitudes regardless of affective-cognitive consistency for consummatory behaviors (e.g., undergraduates’ supportive behaviors toward government officials). Study 2, which investigated task groups’ supportive behaviors toward an immediate supervisory group, found that for these instrumental behaviors cognitively-based attitudes were better predictors than affectively-based attitudes only when affective-cognitive consistency was high. The present research also examined the mechanism by which affective-cognitive consistency moderates the relative roles of affectively-based and cognitively-based attitudes in attitude-behavior consistency. Results indicated that attitude-behavior consistency is eroded primarily because of the weaker relationship of affective or cognitive components to behaviors than to general attitudes. The reciprocal implications of research on attitudes and work on intergroup relations are considered. PMID:24244751

  13. Preparation of non-metals properties for data base

    NASA Technical Reports Server (NTRS)

    1988-01-01

    The development of non-metallic material properties data bases is discussed. The data bases consist of the non-metallic material classes of adhesives, adhesive/sealants, plastics, and elastomers. A specifications data base was also developed to incorporate material specifications data as a supplement to the Elastomers Data Base. Examples of the forms used are provided to show the properties of the materials which appear in the data base.

  14. 2010 Defense Industrial Base Critical Infrastructure Protection Conference (DIBCIP) Risk Reduction and Mitigation in the Defense Industrial Base

    DTIC Science & Technology

    2010-04-28

    Base Critical Infrastructure Protection Conference (DIBCIP) “Risk Reduction & Mitigation in the Defense Industrial Base ” April 26-28, 2010...Philadelphia, PA Agenda Tuesday, April 27, 2010 Keynote Address: The Economic Crisis and Its Impact on the DIB: Defense Industrial Base Forecasts 2010...Ms. Nancy Pomerleau, Exercise Director, Partnership Outreach Division, DHS-IP DIB 2010 DIB CIP DEFENSE INDUSTRIAL BASE CRITICAL

  15. The Research of New Environment-Friendly Oil-based Drilling Fluid Base Oil

    NASA Astrophysics Data System (ADS)

    Sui, Dianjie; Sun, Yuxue; Zhao, Jingyuan; Zhao, Fulei; Zhu, Xiuyu; Xu, Jianjun

    2018-01-01

    In this paper, the heavy hydrocarbon of Daqing is used, and the desulfurization and de-aromatization experiments and refining process are carried out, A base oil suitable for oil-based drilling fluid was developed, and the performance of base oil was evaluated, we can know the aromatics content of oil base is low, less toxic, less pollution and it can meet the requirement of environmental protection.

  16. Scanning the skeleton of the 4D F-theory landscape

    NASA Astrophysics Data System (ADS)

    Taylor, Washington; Wang, Yi-Nan

    2018-01-01

    Using a one-way Monte Carlo algorithm from several different starting points, we get an approximation to the distribution of toric threefold bases that can be used in four-dimensional F-theory compactification. We separate the threefold bases into "resolvable" ones where the Weierstrass polynomials ( f, g) can vanish to order (4 , 6) or higher on codimension-two loci and the "good" bases where these (4 , 6) loci are not allowed. A simple estimate suggests that the number of distinct resolvable base geometries exceeds 103000, with over 10250 "good" bases, though the actual numbers are likely much larger. We find that the good bases are concentrated at specific "end points" with special isolated values of h 1,1 that are bigger than 1,000. These end point bases give Calabi-Yau fourfolds with specific Hodge numbers mirror to elliptic fibrations over simple threefolds. The non-Higgsable gauge groups on the end point bases are almost entirely made of products of E 8, F 4, G 2 and SU(2). Nonetheless, we find a large class of good bases with a single non-Higgsable SU(3). Moreover, by randomly contracting the end point bases, we find many resolvable bases with h 1,1( B) ˜ 50-200 that cannot be contracted to another smooth threefold base.

  17. Computer-based teaching is as good as face to face lecture-based teaching of evidence based medicine: a randomised controlled trial

    PubMed Central

    2007-01-01

    Background At postgraduate level evidence based medicine (EBM) is currently taught through tutor based lectures. Computer based sessions fit around doctors' workloads, and standardise the quality of educational provision. There have been no randomized controlled trials comparing computer based sessions with traditional lectures at postgraduate level within medicine. Methods This was a randomised controlled trial involving six postgraduate education centres in the West Midlands, U.K. Fifty five newly qualified foundation year one doctors (U.S internship equivalent) were randomised to either computer based sessions or an equivalent lecture in EBM and systematic reviews. The change from pre to post-intervention score was measured using a validated questionnaire assessing knowledge (primary outcome) and attitudes (secondary outcome). Results Both groups were similar at baseline. Participants' improvement in knowledge in the computer based group was equivalent to the lecture based group (gain in score: 2.1 [S.D = 2.0] versus 1.9 [S.D = 2.4]; ANCOVA p = 0.078). Attitudinal gains were similar in both groups. Conclusion On the basis of our findings we feel computer based teaching and learning is as effective as typical lecture based teaching sessions for educating postgraduates in EBM and systematic reviews. PMID:17659076

  18. Evidence based practice readiness: A concept analysis.

    PubMed

    Schaefer, Jessica D; Welton, John M

    2018-01-15

    To analyse and define the concept "evidence based practice readiness" in nurses. Evidence based practice readiness is a term commonly used in health literature, but without a clear understanding of what readiness means. Concept analysis is needed to define the meaning of evidence based practice readiness. A concept analysis was conducted using Walker and Avant's method to clarify the defining attributes of evidence based practice readiness as well as antecedents and consequences. A Boolean search of PubMed and Cumulative Index for Nursing and Allied Health Literature was conducted and limited to those published after the year 2000. Eleven articles met the inclusion criteria for this analysis. Evidence based practice readiness incorporates personal and organisational readiness. Antecedents include the ability to recognize the need for evidence based practice, ability to access and interpret evidence based practice, and a supportive environment. The concept analysis demonstrates the complexity of the concept and its implications for nursing practice. The four pillars of evidence based practice readiness: nursing, training, equipping and leadership support are necessary to achieve evidence based practice readiness. Nurse managers are in the position to address all elements of evidence based practice readiness. Creating an environment that fosters evidence based practice can improve patient outcomes, decreased health care cost, increase nurses' job satisfaction and decrease nursing turnover. © 2018 John Wiley & Sons Ltd.

  19. Biochemical behavior of N-oxidized cytosine and adenine bases in DNA polymerase-mediated primer extension reactions

    PubMed Central

    Tsunoda, Hirosuke; Kudo, Tomomi; Masaki, Yoshiaki; Ohkubo, Akihiro; Seio, Kohji; Sekine, Mitsuo

    2011-01-01

    To clarify the biochemical behavior of 2′-deoxyribonucleoside 5′-triphosphates and oligodeoxyribonucleotides (ODNs) containing cytosine N-oxide (Co) and adenine N-oxide (Ao), we examined their base recognition ability in DNA duplex formation using melting temperature (Tm) experiments and their substrate specificity in DNA polymerase-mediated replication. As the result, it was found that the Tm values of modified DNA–DNA duplexes incorporating 2′-deoxyribonucleoside N-oxide derivatives significantly decreased compared with those of the unmodified duplexes. However, single insertion reactions by DNA polymerases of Klenow fragment (KF) (exo−) and Vent (exo−) suggested that Co and Ao selectively recognized G and T, respectively. Meanwhile, the kinetic study showed that the incorporation efficiencies of the modified bases were lower than those of natural bases. Ab initio calculations suggest that these modified bases can form the stable base pairs with the original complementary bases. These results indicate that the modified bases usually recognize the original bases as partners for base pairing, except for misrecognition of dATP by the action of KF (exo−) toward Ao on the template, and the primers could be extended on the template DNA. When they misrecognized wrong bases, the chain could not be elongated so that the modified base served as the chain terminator. PMID:21300642

  20. Biochemical behavior of N-oxidized cytosine and adenine bases in DNA polymerase-mediated primer extension reactions.

    PubMed

    Tsunoda, Hirosuke; Kudo, Tomomi; Masaki, Yoshiaki; Ohkubo, Akihiro; Seio, Kohji; Sekine, Mitsuo

    2011-04-01

    To clarify the biochemical behavior of 2'-deoxyribonucleoside 5'-triphosphates and oligodeoxyribonucleotides (ODNs) containing cytosine N-oxide (C(o)) and adenine N-oxide (A(o)), we examined their base recognition ability in DNA duplex formation using melting temperature (T(m)) experiments and their substrate specificity in DNA polymerase-mediated replication. As the result, it was found that the T(m) values of modified DNA-DNA duplexes incorporating 2'-deoxyribonucleoside N-oxide derivatives significantly decreased compared with those of the unmodified duplexes. However, single insertion reactions by DNA polymerases of Klenow fragment (KF) (exo(-)) and Vent (exo(-)) suggested that C(o) and A(o) selectively recognized G and T, respectively. Meanwhile, the kinetic study showed that the incorporation efficiencies of the modified bases were lower than those of natural bases. Ab initio calculations suggest that these modified bases can form the stable base pairs with the original complementary bases. These results indicate that the modified bases usually recognize the original bases as partners for base pairing, except for misrecognition of dATP by the action of KF (exo(-)) toward A(o) on the template, and the primers could be extended on the template DNA. When they misrecognized wrong bases, the chain could not be elongated so that the modified base served as the chain terminator.

  1. Family vs Village-Based: Intangible View on the Sustainable of Seaweed Farming

    NASA Astrophysics Data System (ADS)

    Teniwut, Wellem A.; Teniwut, Yuliana K.; Teniwut, Roberto M. K.; Hasyim, Cawalinya L.

    2017-10-01

    Compare to other fishery activities for instance fish mariculture and catching fisheries, seaweed farming is considered easier. Also, the market for seaweed is wider and will keep growing. Thus, makes seaweed farming as one of the fastest commodity to improve the welfare of a coastal community. There are technical and non-technical factors in seaweed farming management, for non-technical on this intangible factors vary between family-based and village-based management, therefore aimed of this study was to simulate farmers decision to choose between family-based and village-based on seaweed managing system trigger by intangible factors. We conducted our study in Southeast Maluku, data collecting conducted from October to December 2016 by depth interview and questionnaires on seaweed farmers. We used logistic regression to compare each intangible factors on family and village-based seaweed farming management. The result showed that for family-based management farmers were willing to transfer their knowledge among each member in the household. For village-based revealed that farmers with higher education background tend to work on village-based, also, the result also stated that in village-based management member were those who have better capability and skill, at the same time village-based management had a small probability for conflict to occur compared to family-based.

  2. Event- and time-triggered remembering: the impact of attention deficit hyperactivity disorder on prospective memory performance in children.

    PubMed

    Talbot, Karley-Dale S; Kerns, Kimberly A

    2014-11-01

    The current study examined prospective memory (PM, both time-based and event-based) and time estimation (TR, a time reproduction task) in children with and without attention deficit hyperactivity disorder (ADHD). This study also investigated the influence of task performance and TR on time-based PM in children with ADHD relative to controls. A sample of 69 children, aged 8 to 13 years, completed the CyberCruiser-II time-based PM task, a TR task, and the Super Little Fisherman event-based PM task. PM performance was compared with children's TR abilities, parental reports of daily prospective memory disturbances (Prospective and Retrospective Memory Questionnaire for Children, PRMQC), and ADHD symptomatology (Conner's rating scales). Children with ADHD scored more poorly on event-based PM, time-based PM, and TR; interestingly, TR did not appear related to performance on time-based PM. In addition, it was found that PRMQC scores and ADHD symptom severity were related to performance on the time-based PM task but not to performance on the event-based PM task. These results provide some limited support for theories that propose a distinction between event-based PM and time-based PM. Copyright © 2014 Elsevier Inc. All rights reserved.

  3. Systematic review of skills transfer after surgical simulation-based training.

    PubMed

    Dawe, S R; Pena, G N; Windsor, J A; Broeders, J A J L; Cregan, P C; Hewett, P J; Maddern, G J

    2014-08-01

    Simulation-based training assumes that skills are directly transferable to the patient-based setting, but few studies have correlated simulated performance with surgical performance. A systematic search strategy was undertaken to find studies published since the last systematic review, published in 2007. Inclusion of articles was determined using a predetermined protocol, independent assessment by two reviewers and a final consensus decision. Studies that reported on the use of surgical simulation-based training and assessed the transferability of the acquired skills to a patient-based setting were included. Twenty-seven randomized clinical trials and seven non-randomized comparative studies were included. Fourteen studies investigated laparoscopic procedures, 13 endoscopic procedures and seven other procedures. These studies provided strong evidence that participants who reached proficiency in simulation-based training performed better in the patient-based setting than their counterparts who did not have simulation-based training. Simulation-based training was equally as effective as patient-based training for colonoscopy, laparoscopic camera navigation and endoscopic sinus surgery in the patient-based setting. These studies strengthen the evidence that simulation-based training, as part of a structured programme and incorporating predetermined proficiency levels, results in skills transfer to the operative setting. © 2014 BJS Society Ltd. Published by John Wiley & Sons Ltd.

  4. Greater fruit selection following an appearance-based compared with a health-based health promotion poster

    PubMed Central

    2016-01-01

    Abstract Background This study investigated the impact of an appearance-based compared with a traditional health-based public health message for healthy eating. Methods A total of 166 British University students (41 males; aged 20.6 ± 1.9 years) were randomized to view either an appearance-based (n = 82) or a health-based (n = 84) fruit promotion poster. Intentions to consume fruit and immediate fruit selection (laboratory observation) were assessed immediately after poster viewing, and subsequent self-report fruit consumption was assessed 3 days later. Results Intentions to consume fruit were not predicted by poster type (largest β = 0.03, P = 0.68) but were associated with fruit-based liking, past consumption, attitudes and social norms (smallest β = 0.16, P = 0.04). Immediate fruit selection was greater following the appearance-based compared with the health-based poster (β = −0.24, P < 0.01), and this effect remained when controlling for participant characteristics (β = −0.21, P < 0.01). Subsequent fruit consumption was greater following the appearance-based compared with the health-based poster (β = −0.22, P = 0.03), but this effect became non-significant on consideration of participant characteristics (β = −0.15, P = 0.13), and was instead associated with fruit-based liking and past consumption (smallest β = 0.24, P = 0.03). Conclusions These findings demonstrate the clear value of an appearance-based compared with a health-based health promotion poster for increasing fruit selection. A distinction between outcome measures and the value of a behavioural measure is also demonstrated. PMID:28158693

  5. Base pairing and base mis-pairing in nucleic acids

    NASA Technical Reports Server (NTRS)

    Wang, A. H. J.; Rich, A.

    1986-01-01

    In recent years we have learned that DNA is conformationally active. It can exist in a number of different stable conformations including both right-handed and left-handed forms. Using single crystal X-ray diffraction analysis we are able to discover not only additional conformations of the nucleic acids but also different types of hydrogen bonded base-base interactions. Although Watson-Crick base pairings are the predominant type of interaction in double helical DNA, they are not the only types. Recently, we have been able to examine mismatching of guanine-thymine base pairs in left-handed Z-DNA at atomic resolution (1A). A minimum amount of distortion of the sugar phosphate backbone is found in the G x T pairing in which the bases are held together by two hydrogen bonds in the wobble pairing interaction. Because of the high resolution of the analysis we can visualize water molecules which fill in to accommodate the other hydrogen bonding positions in the bases which are not used in the base-base interactions. Studies on other DNA oligomers have revealed that other types of non-Watson-Crick hydrogen bonding interactions can occur. In the structure of a DNA octamer with the sequence d(GCGTACGC) complexed to an antibiotic triostin A, it was found that the two central AT base pairs are held together by Hoogsteen rather than Watson-Crick base pairs. Similarly, the G x C base pairs at the ends are also Hoogsteen rather than Watson-Crick pairing. Hoogsteen base pairs make a modified helix which is distinct from the Watson-Crick double helix.

  6. Effects of a fish oil-based emulsion on rat hepatoma cell invasion in culture.

    PubMed

    Hagi, Akifumi; Nakayama, Mitsuo; Miura, Yutaka; Yagasaki, Kazumi

    2007-01-01

    Total parenteral nutrition containing a lipid emulsion is often employed after surgical tumor resection. This study investigated the effects of a fish oil-based infusion on rat hepatoma cell invasion. Rat ascites hepatoma cell line AH109A was precultured with a fish oil-based or safflower oil-based emulsion for 48 h. Changes in membranous fatty acid composition were evaluated by gas chromatography. The invasiveness of hepatoma cells was assessed by coculturing with mesentery-derived mesothelial cells. To examine ex vivo effects of the fish oil-based infusion on hepatoma invasion, sera were prepared from rats infused with fish oil- or safflower oil-based emulsion and the effects of these sera were assessed. To clarify the mechanism of inhibition of invasion by the fish oil-based emulsion, the effects of prostaglandin (PG) E(2) and PGE(3) on invasion were examined. Pretreatment with the fish oil-based emulsion reduced invasiveness without affecting growth compared with the safflower oil-based emulsion. Pretreatment with the sera from rats infused with the fish oil-based emulsion also reduced invasiveness compared with the sera from rats infused with the safflower oil-based emulsion. The addition of PGE(2) eliminated the inhibitory effect of the fish oil-based emulsion, and the addition of PGE(3) reduced the invasiveness of hepatoma cells pretreated with the safflower oil-based emulsion. These results suggest that the fish oil-based emulsion may have anti-invasive effects. Changes in the membranous fatty acid composition and consequent changes in the prostaglandins produced may be involved in this inhibitory effect.

  7. Financial Management Reforms in the Health Sector: A Comparative Study Between Cash-based and Accrual-based Accounting Systems.

    PubMed

    Abolhallaje, Masoud; Jafari, Mehdi; Seyedin, Hesam; Salehi, Masoud

    2014-10-01

    Financial management and accounting reform in the public sectors was started in 2000. Moving from cash-based to accrual-based is considered as the key component of these reforms and adjustments in the public sector. Performing this reform in the health system is a part of a bigger reform under the new public management. The current study aimed to analyze the movement from cash-based to accrual-based accounting in the health sector in Iran. This comparative study was conducted in 2013 to compare financial management and movement from cash-based to accrual-based accounting in health sector in the countries such as the United States, Britain, Canada, Australia, New Zealand, and Iran. Library resources and reputable databases such as Medline, Elsevier, Index Copernicus, DOAJ, EBSCO-CINAHL and SID, and Iranmedex were searched. Fish cards were used to collect the data. Data were compared and analyzed using comparative tables. Developed countries have implemented accrual-based accounting and utilized the valid, reliable and practical information in accrual-based reporting in different areas such as price and tariffs setting, operational budgeting, public accounting, performance evaluation and comparison and evidence based decision making. In Iran, however, only a few public organizations such as the municipalities and the universities of medical sciences use accrual-based accounting, but despite what is required by law, the other public organizations do not use accrual-based accounting. There are advantages in applying accrual-based accounting in the public sector which certainly depends on how this system is implemented in the sector.

  8. Detecting the Presence of Bacterial DNA and RNA by Polymerase Chain Reaction to Diagnose Suspected Periprosthetic Joint Infection after Antibiotic Therapy.

    PubMed

    Fang, Xin-Yu; Li, Wen-Bo; Zhang, Chao-Fan; Huang, Zi-da; Zeng, Hui-Yi; Dong, Zheng; Zhang, Wen-Ming

    2018-02-01

    To explore the diagnostic efficiency of DNA-based and RNA-based quantitative polymerase chain reaction (qPCR) analyses for periprosthetic joint infection (PJI). To determine the detection limit of DNA-based and RNA-based qPCR in vitro, Staphylococcus aureus and Escherichia coli strains were added to sterile synovial fluid obtained from a patient with knee osteoarthritis. Serial dilutions of samples were analyzed by DNA-based and RNA-based qPCR. Clinically, patients who were suspected of having PJI and eventually underwent revision arthroplasty in our hospital from July 2014 to December 2016 were screened. Preoperative puncture or intraoperative collection was performed on patients who met the inclusion and exclusion criteria to obtain synovial fluid. DNA-based and RNA-based PCR analyses and culture were performed on each synovial fluid sample. The patients' demographic characteristics, medical history, and laboratory test results were recorded. The diagnostic efficiency of both PCR assays was compared with culture methods. The in vitro analysis demonstrated that DNA-based qPCR assay was highly sensitive, with the detection limit being 1200 colony forming units (CFU)/mL of S. aureus and 3200 CFU/mL of E. coli. Meanwhile, The RNA-based qPCR assay could detect 2300 CFU/mL of S. aureus and 11 000 CFU/mL of E. coli. Clinically, the sensitivity, specificity, and accuracy were 65.7%, 100%, and 81.6%, respectively, for the culture method; 81.5%, 84.8%, and 83.1%, respectively, for DNA-based qPCR; and 73.6%, 100%, and 85.9%, respectively, for RNA-based qPCR. DNA-based qPCR could detect suspected PJI with high sensitivity after antibiotic therapy. RNA-based qPCR could reduce the false positive rates of DNA-based assays. qPCR-based methods could improve the efficiency of PJI diagnosis. © 2018 Chinese Orthopaedic Association and John Wiley & Sons Australia, Ltd.

  9. Anthropometric measures in cardiovascular disease prediction: comparison of laboratory-based versus non-laboratory-based model.

    PubMed

    Dhana, Klodian; Ikram, M Arfan; Hofman, Albert; Franco, Oscar H; Kavousi, Maryam

    2015-03-01

    Body mass index (BMI) has been used to simplify cardiovascular risk prediction models by substituting total cholesterol and high-density lipoprotein cholesterol. In the elderly, the ability of BMI as a predictor of cardiovascular disease (CVD) declines. We aimed to find the most predictive anthropometric measure for CVD risk to construct a non-laboratory-based model and to compare it with the model including laboratory measurements. The study included 2675 women and 1902 men aged 55-79 years from the prospective population-based Rotterdam Study. We used Cox proportional hazard regression analysis to evaluate the association of BMI, waist circumference, waist-to-hip ratio and a body shape index (ABSI) with CVD, including coronary heart disease and stroke. The performance of the laboratory-based and non-laboratory-based models was evaluated by studying the discrimination, calibration, correlation and risk agreement. Among men, ABSI was the most informative measure associated with CVD, therefore ABSI was used to construct the non-laboratory-based model. Discrimination of the non-laboratory-based model was not different than laboratory-based model (c-statistic: 0.680-vs-0.683, p=0.71); both models were well calibrated (15.3% observed CVD risk vs 16.9% and 17.0% predicted CVD risks by the non-laboratory-based and laboratory-based models, respectively) and Spearman rank correlation and the agreement between non-laboratory-based and laboratory-based models were 0.89 and 91.7%, respectively. Among women, none of the anthropometric measures were independently associated with CVD. Among middle-aged and elderly where the ability of BMI to predict CVD declines, the non-laboratory-based model, based on ABSI, could predict CVD risk as accurately as the laboratory-based model among men. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  10. Adaptation and validation of the Evidence-Based Practice Belief and Implementation scales for French-speaking Swiss nurses and allied healthcare providers.

    PubMed

    Verloo, Henk; Desmedt, Mario; Morin, Diane

    2017-09-01

    To evaluate two psychometric properties of the French versions of the Evidence-Based Practice Beliefs and Evidence-Based Practice Implementation scales, namely their internal consistency and construct validity. The Evidence-Based Practice Beliefs and Evidence-Based Practice Implementation scales developed by Melnyk et al. are recognised as valid, reliable instruments in English. However, no psychometric validation for their French versions existed. Secondary analysis of a cross sectional survey. Source data came from a cross-sectional descriptive study sample of 382 nurses and other allied healthcare providers. Cronbach's alpha was used to evaluate internal consistency, and principal axis factor analysis and varimax rotation were computed to determine construct validity. The French Evidence-Based Practice Beliefs and Evidence-Based Practice Implementation scales showed excellent reliability, with Cronbach's alphas close to the scores established by Melnyk et al.'s original versions. Principal axis factor analysis showed medium-to-high factor loading scores without obtaining collinearity. Principal axis factor analysis with varimax rotation of the 16-item Evidence-Based Practice Beliefs scale resulted in a four-factor loading structure. Principal axis factor analysis with varimax rotation of the 17-item Evidence-Based Practice Implementation scale revealed a two-factor loading structure. Further research should attempt to understand why the French Evidence-Based Practice Implementation scale showed a two-factor loading structure but Melnyk et al.'s original has only one. The French versions of the Evidence-Based Practice Beliefs and Evidence-Based Practice Implementation scales can both be considered valid and reliable instruments for measuring Evidence-Based Practice beliefs and implementation. The results suggest that the French Evidence-Based Practice Beliefs and Evidence-Based Practice Implementation scales are valid and reliable and can therefore be used to evaluate the effectiveness of organisational strategies aimed at increasing professionals' confidence in Evidence-Based Practice, supporting its use and implementation. © 2017 John Wiley & Sons Ltd.

  11. Telling Active Learning Pedagogies Apart: From Theory to Practice

    ERIC Educational Resources Information Center

    Cattaneo, Kelsey Hood

    2017-01-01

    Designing learning environments to incorporate active learning pedagogies is difficult as definitions are often contested and intertwined. This article seeks to determine whether classification of active learning pedagogies (i.e., project-based, problem-based, inquiry-based, case-based, and discovery-based), through theoretical and practical…

  12. 13 CFR 120.1000 - Risk-Based Lender Oversight.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Risk-Based Lender Oversight. 120.1000 Section 120.1000 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Risk-Based Lender Oversight Supervision § 120.1000 Risk-Based Lender Oversight. (a) Risk-Based Lender...

  13. Comparison of sequencing-based methods to profile DNA methylation and identification of monoallelic epigenetic modifications

    USDA-ARS?s Scientific Manuscript database

    Analysis of DNA methylation patterns relies increasingly on sequencing-based profiling methods. The four most frequently used sequencing-based technologies are the bisulfite-based methods MethylC-seq and reduced representation bisulfite sequencing (RRBS), and the enrichment-based techniques methylat...

  14. 32 CFR 989.25 - Base closure and realignment.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Base closure and realignment. 989.25 Section 989... PROTECTION ENVIRONMENTAL IMPACT ANALYSIS PROCESS (EIAP) § 989.25 Base closure and realignment. Base closure or realignment may entail special requirements for environmental analysis. The permanent base closure...

  15. 32 CFR 989.25 - Base closure and realignment.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Base closure and realignment. 989.25 Section 989... PROTECTION ENVIRONMENTAL IMPACT ANALYSIS PROCESS (EIAP) § 989.25 Base closure and realignment. Base closure or realignment may entail special requirements for environmental analysis. The permanent base closure...

  16. 24 CFR 35.1220 - Ongoing lead-based paint maintenance activities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 1 2014-04-01 2014-04-01 false Ongoing lead-based paint..., Department of Housing and Urban Development LEAD-BASED PAINT POISONING PREVENTION IN CERTAIN RESIDENTIAL STRUCTURES Tenant-Based Rental Assistance § 35.1220 Ongoing lead-based paint maintenance activities...

  17. 24 CFR 35.1220 - Ongoing lead-based paint maintenance activities.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 1 2012-04-01 2012-04-01 false Ongoing lead-based paint..., Department of Housing and Urban Development LEAD-BASED PAINT POISONING PREVENTION IN CERTAIN RESIDENTIAL STRUCTURES Tenant-Based Rental Assistance § 35.1220 Ongoing lead-based paint maintenance activities...

  18. 24 CFR 35.1220 - Ongoing lead-based paint maintenance activities.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 1 2011-04-01 2011-04-01 false Ongoing lead-based paint..., Department of Housing and Urban Development LEAD-BASED PAINT POISONING PREVENTION IN CERTAIN RESIDENTIAL STRUCTURES Tenant-Based Rental Assistance § 35.1220 Ongoing lead-based paint maintenance activities...

  19. 24 CFR 35.1220 - Ongoing lead-based paint maintenance activities.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 1 2013-04-01 2013-04-01 false Ongoing lead-based paint..., Department of Housing and Urban Development LEAD-BASED PAINT POISONING PREVENTION IN CERTAIN RESIDENTIAL STRUCTURES Tenant-Based Rental Assistance § 35.1220 Ongoing lead-based paint maintenance activities...

  20. 24 CFR 35.1220 - Ongoing lead-based paint maintenance activities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Ongoing lead-based paint..., Department of Housing and Urban Development LEAD-BASED PAINT POISONING PREVENTION IN CERTAIN RESIDENTIAL STRUCTURES Tenant-Based Rental Assistance § 35.1220 Ongoing lead-based paint maintenance activities...

  1. 24 CFR 35.90 - Opportunity to conduct an evaluation.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... and Urban Development LEAD-BASED PAINT POISONING PREVENTION IN CERTAIN RESIDENTIAL STRUCTURES Disclosure of Known Lead-Based Paint and/or Lead-Based Paint Hazards Upon Sale or Lease of Residential... inspection for the presence of lead-based paint and/or lead-based paint hazards. (b) Notwithstanding...

  2. A Web-Based and Print-Based Computer-Tailored Physical Activity Intervention for Prostate and Colorectal Cancer Survivors: A Comparison of User Characteristics and Intervention Use

    PubMed Central

    Bolman, Catherine; Peels, Denise Astrid; Volders, Esmee; de Vries, Hein; Lechner, Lilian

    2017-01-01

    Background Physical activity (PA) is beneficial in improving negative physical and psychological effects of cancer. The rapidly increasing number of cancer survivors, resulting from aging and improved cancer care, emphasizes the importance to develop and provide low cost, easy accessible PA programs. Such programs could be provided through the Internet, but that could result in the exclusion of cancer survivors not familiar with the Internet. Therefore, we developed a computer-tailored PA intervention for prostate and colorectal cancer survivors in which both Web-based and print materials are provided, and participants can choose their own preferred delivery mode. Objective The aim of this study was to assess participants’ characteristics related to delivery mode and use of intervention materials. Methods We studied characteristics of participants using Web-based and printed intervention materials in a randomized controlled trial (RCT). Prostate and colorectal cancer survivors recruited from hospitals were randomized to OncoActive (computer-tailored PA intervention) or a usual-care control group. OncoActive participants received both Web-based and printed materials. Participants were classified into initial print- or Web-based participants based on their preferred mode of completion of the first questionnaire, which was needed for the computer-tailored PA advice. Intervention material use during the remainder of the intervention was compared for initial print- or Web-based participants. Additionally, participants were classified into those using only print materials and those using Web-based materials. Differences in participant characteristics and intervention material use were studied through analysis of variance (ANOVAs), chi-square tests, and logistic regressions. Results The majority of the participants in the intervention group were classified as initial Web-based participants (170/249, 68.3%), and 84.9% (191/249) used Web-based intervention materials. Dropout was low (15/249, 6.0%) and differed between initial Web-based (4/170, 2.4%) and print-based (11/79, 14%) participants. Participants were less likely to start Web-based with higher age (odds ratio [OR]=0.93), longer time since last treatment (OR=0.87), and higher fatigue (OR=0.96), and more likely with higher education (OR=4.08) and having completed treatments (OR=5.58). Those who were older (OR=0.93) and post treatment for a longer time (OR=0.86) were less likely to use Web-based intervention materials. Initial print-based participants predominantly used print-based materials, whereas initial Web-based participants used both print- and Web-based materials. Conclusions To our knowledge, this is one of the first studies that assessed participant characteristics related to delivery mode in an intervention in which participants had a free choice of delivery modes. Use of print-based materials among the initial Web-based participants was substantial, indicating the importance of print-based materials. According to our findings, it may be important to offer Web- and print-based materials alongside each other. Providing Web-based materials only may exclude older, less educated, more fatigued, or currently treated participants; these groups are especially more vulnerable and could benefit most from PA interventions. PMID:28835353

  3. 47 CFR 90.539 - Frequency stability.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... base station signal. (b) The frequency stability of base transmitters operating in the narrowband... is locked to the base station. When AFC is not locked to the base station, the frequency stability... base station, and 5 parts per million or better when AFC is not locked. [63 FR 58651, Nov. 2, 1998, as...

  4. Base Rates: Both Neglected and Intuitive

    ERIC Educational Resources Information Center

    Pennycook, Gordon; Trippas, Dries; Handley, Simon J.; Thompson, Valerie A.

    2014-01-01

    Base-rate neglect refers to the tendency for people to underweight base-rate probabilities in favor of diagnostic information. It is commonly held that base-rate neglect occurs because effortful (Type 2) reasoning is required to process base-rate information, whereas diagnostic information is accessible to fast, intuitive (Type 1) processing…

  5. 48 CFR 9904.418-50 - Techniques for application.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... objective's allocation base data shall be excluded from the base used to allocate the pool. (g) Use of... which the pool relates. (c) Change in allocation base. No change in an existing indirect cost pool allocation base is required if the allocation resulting from the existing base does not differ materially...

  6. Investigation of biobased and petroleum base oils in the entire spectrum of lubrication regimes

    USDA-ARS?s Scientific Manuscript database

    The tribological properties of biobased and petroleum-based base oils in the entire lubrication regime were investigated. High oleic sunflower oil (HOSuO) and commercially available polyalphaolefin (PAO-6) were selected to represent biobased and petroleum-based base oils, respectively. These two oil...

  7. 75 FR 64643 - Reporting of Security-Based Swap Transaction Data

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-20

    ... information relating to pre-enactment security-based swaps to a registered security-based swap data repository... within 60 days after a registered security- based swap data repository commences operations to receive... repository,\\8\\ and security- based swap execution facility.\\9\\ The Commission has issued an advance notice of...

  8. 47 CFR 61.16 - Base documents.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... for Electronic Filing § 61.16 Base documents. (a) The Base Document is a complete tariff which incorporates all effective revisions, as of the last day of the preceding month. The Base Document should be... 47 Telecommunication 3 2011-10-01 2011-10-01 false Base documents. 61.16 Section 61.16...

  9. Evidence-Based Practice for Outpatient Clinical Teams

    ERIC Educational Resources Information Center

    Hamilton, John D.

    2006-01-01

    This column focuses on evidence-based practice (EBP) within multidisciplinary outpatient settings, but first provides some definitions. Besides EBP (Burns and Hoagwood, 2005; Guyatt and Rennie, 2002), there are also evidence-based medicine (EBM; March et al., 2005), evidence-based service (EBS; Chorpita et al., 2002), and evidence-based treatment…

  10. 40 CFR 745.229 - Certification of individuals and firms engaged in lead-based paint activities: public and...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...) TOXIC SUBSTANCES CONTROL ACT LEAD-BASED PAINT POISONING PREVENTION IN CERTAIN RESIDENTIAL STRUCTURES Lead-Based Paint Activities § 745.229 Certification of individuals and firms engaged in lead-based... engaged in lead-based paint activities: public and commercial buildings, bridges and superstructures...

  11. 24 CFR 965.701 - Lead-based paint poisoning prevention.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... URBAN DEVELOPMENT PHA-OWNED OR LEASED PROJECTS-GENERAL PROVISIONS Lead-Based Paint Poisoning Prevention § 965.701 Lead-based paint poisoning prevention. The requirements of the Lead-Based Paint Poisoning... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Lead-based paint poisoning...

  12. 24 CFR 965.701 - Lead-based paint poisoning prevention.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... URBAN DEVELOPMENT PHA-OWNED OR LEASED PROJECTS-GENERAL PROVISIONS Lead-Based Paint Poisoning Prevention § 965.701 Lead-based paint poisoning prevention. The requirements of the Lead-Based Paint Poisoning... 24 Housing and Urban Development 4 2014-04-01 2014-04-01 false Lead-based paint poisoning...

  13. 24 CFR 965.701 - Lead-based paint poisoning prevention.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... URBAN DEVELOPMENT PHA-OWNED OR LEASED PROJECTS-GENERAL PROVISIONS Lead-Based Paint Poisoning Prevention § 965.701 Lead-based paint poisoning prevention. The requirements of the Lead-Based Paint Poisoning... 24 Housing and Urban Development 4 2012-04-01 2012-04-01 false Lead-based paint poisoning...

  14. 40 CFR 745.230 - Work practice standards for conducting lead-based paint activities: public and commercial...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SUBSTANCES CONTROL ACT LEAD-BASED PAINT POISONING PREVENTION IN CERTAIN RESIDENTIAL STRUCTURES Lead-Based Paint Activities § 745.230 Work practice standards for conducting lead-based paint activities: public... lead-based paint activities: public and commercial buildings, bridges and superstructures. [Reserved...

  15. 40 CFR 745.230 - Work practice standards for conducting lead-based paint activities: public and commercial...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SUBSTANCES CONTROL ACT LEAD-BASED PAINT POISONING PREVENTION IN CERTAIN RESIDENTIAL STRUCTURES Lead-Based Paint Activities § 745.230 Work practice standards for conducting lead-based paint activities: public... lead-based paint activities: public and commercial buildings, bridges and superstructures. [Reserved...

  16. 40 CFR 745.229 - Certification of individuals and firms engaged in lead-based paint activities: public and...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...) TOXIC SUBSTANCES CONTROL ACT LEAD-BASED PAINT POISONING PREVENTION IN CERTAIN RESIDENTIAL STRUCTURES Lead-Based Paint Activities § 745.229 Certification of individuals and firms engaged in lead-based... engaged in lead-based paint activities: public and commercial buildings, bridges and superstructures...

  17. 40 CFR 745.229 - Certification of individuals and firms engaged in lead-based paint activities: public and...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...) TOXIC SUBSTANCES CONTROL ACT LEAD-BASED PAINT POISONING PREVENTION IN CERTAIN RESIDENTIAL STRUCTURES Lead-Based Paint Activities § 745.229 Certification of individuals and firms engaged in lead-based... engaged in lead-based paint activities: public and commercial buildings, bridges and superstructures...

  18. 24 CFR 965.701 - Lead-based paint poisoning prevention.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... URBAN DEVELOPMENT PHA-OWNED OR LEASED PROJECTS-GENERAL PROVISIONS Lead-Based Paint Poisoning Prevention § 965.701 Lead-based paint poisoning prevention. The requirements of the Lead-Based Paint Poisoning... 24 Housing and Urban Development 4 2011-04-01 2011-04-01 false Lead-based paint poisoning...

  19. 24 CFR 965.701 - Lead-based paint poisoning prevention.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... URBAN DEVELOPMENT PHA-OWNED OR LEASED PROJECTS-GENERAL PROVISIONS Lead-Based Paint Poisoning Prevention § 965.701 Lead-based paint poisoning prevention. The requirements of the Lead-Based Paint Poisoning... 24 Housing and Urban Development 4 2013-04-01 2013-04-01 false Lead-based paint poisoning...

  20. 40 CFR 745.230 - Work practice standards for conducting lead-based paint activities: public and commercial...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SUBSTANCES CONTROL ACT LEAD-BASED PAINT POISONING PREVENTION IN CERTAIN RESIDENTIAL STRUCTURES Lead-Based Paint Activities § 745.230 Work practice standards for conducting lead-based paint activities: public... lead-based paint activities: public and commercial buildings, bridges and superstructures. [Reserved...

  1. 10 CFR 904.7 - Base charge.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Base charge. 904.7 Section 904.7 Energy DEPARTMENT OF... Marketing § 904.7 Base charge. (a) The Base Charge shall be developed by the Administrator and promulgated in accordance with appropriate DOE regulations. The Base Charge shall be composed of a capacity...

  2. 26 CFR 1.954-1 - Foreign base company income.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 26 Internal Revenue 10 2013-04-01 2013-04-01 false Foreign base company income. 1.954-1 Section 1... (CONTINUED) INCOME TAXES (CONTINUED) Controlled Foreign Corporations § 1.954-1 Foreign base company income... computing the foreign base company income of a controlled foreign corporation. Foreign base company income...

  3. 10 CFR 904.7 - Base charge.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Base charge. 904.7 Section 904.7 Energy DEPARTMENT OF... Marketing § 904.7 Base charge. (a) The Base Charge shall be developed by the Administrator and promulgated in accordance with appropriate DOE regulations. The Base Charge shall be composed of a capacity...

  4. 47 CFR 61.16 - Base documents.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 3 2012-10-01 2012-10-01 false Base documents. 61.16 Section 61.16... for Electronic Filing § 61.16 Base documents. (a) The Base Document is a complete tariff which incorporates all effective revisions, as of the last day of the preceding month. The Base Document should be...

  5. 25 CFR 39.102 - What is academic base funding?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 25 Indians 1 2013-04-01 2013-04-01 false What is academic base funding? 39.102 Section 39.102... PROGRAM Indian School Equalization Formula Base and Supplemental Funding § 39.102 What is academic base funding? Academic base funding is the ADM times the weighted student unit. ...

  6. 26 CFR 1.954-1 - Foreign base company income.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 26 Internal Revenue 10 2011-04-01 2011-04-01 false Foreign base company income. 1.954-1 Section 1... (CONTINUED) INCOME TAXES (CONTINUED) Controlled Foreign Corporations § 1.954-1 Foreign base company income... computing the foreign base company income of a controlled foreign corporation. Foreign base company income...

  7. 25 CFR 39.102 - What is academic base funding?

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 25 Indians 1 2011-04-01 2011-04-01 false What is academic base funding? 39.102 Section 39.102... PROGRAM Indian School Equalization Formula Base and Supplemental Funding § 39.102 What is academic base funding? Academic base funding is the ADM times the weighted student unit. ...

  8. 25 CFR 39.102 - What is academic base funding?

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 25 Indians 1 2012-04-01 2011-04-01 true What is academic base funding? 39.102 Section 39.102... PROGRAM Indian School Equalization Formula Base and Supplemental Funding § 39.102 What is academic base funding? Academic base funding is the ADM times the weighted student unit. ...

  9. 26 CFR 1.954-1 - Foreign base company income.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 26 Internal Revenue 10 2012-04-01 2012-04-01 false Foreign base company income. 1.954-1 Section 1... (CONTINUED) INCOME TAXES (CONTINUED) Controlled Foreign Corporations § 1.954-1 Foreign base company income... computing the foreign base company income of a controlled foreign corporation. Foreign base company income...

  10. 47 CFR 61.16 - Base documents.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 3 2013-10-01 2013-10-01 false Base documents. 61.16 Section 61.16... for Electronic Filing § 61.16 Base documents. (a) The Base Document is a complete tariff which incorporates all effective revisions, as of the last day of the preceding month. The Base Document should be...

  11. 10 CFR 904.7 - Base charge.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Base charge. 904.7 Section 904.7 Energy DEPARTMENT OF... Marketing § 904.7 Base charge. (a) The Base Charge shall be developed by the Administrator and promulgated in accordance with appropriate DOE regulations. The Base Charge shall be composed of a capacity...

  12. 21. Photographic copy of a keyed site plan for North ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    21. Photographic copy of a keyed site plan for North Base: Military Construction, Muroc Flight Test Base, Muroc, California; General Layout Plan, December 1944. Reproduced from the holdings of the National Archives, Pacific Southwest Region - Edwards Air Force Base, North Base, North Base Road, Boron, Kern County, CA

  13. Riding the Rapids of Classroom-Based Research

    ERIC Educational Resources Information Center

    Lonergan, Robyn; Cumming, Therese M.

    2017-01-01

    Conducting classroom-based research can be difficult, often fraught with challenges, analogous to riding a canoe down the rapids. The dynamics of classroom-based research often require flexibility on the parts of both the researcher and school personnel. Classroom-based research is viewed here through a framework of problem-based methodology as…

  14. Computer-Based and Paper-Based Measurement of Recognition Performance.

    ERIC Educational Resources Information Center

    Federico, Pat-Anthony

    To determine the relative reliabilities and validities of paper-based and computer-based measurement procedures, 83 male student pilots and radar intercept officers were administered computer and paper-based tests of aircraft recognition. The subject matter consisted of line drawings of front, side, and top silhouettes of aircraft. Reliabilities…

  15. University-Based Community College Leadership Programs: Where Future Community College Leaders Are Prepared

    ERIC Educational Resources Information Center

    Friedel, Janice Nahra

    2010-01-01

    Community college leadership programs may take a variety of forms, among them university-based programs, leadership institutes, community college-based "grow your own" programs, professional organization-based institutes, or a combination of these. University-based doctorate leadership programs are the principal providers of these…

  16. 24 CFR 598.408 - Lead-based paint requirements.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 3 2013-04-01 2013-04-01 false Lead-based paint requirements. 598... DESIGNATIONS Post-Designation Requirements § 598.408 Lead-based paint requirements. The Lead-Based Paint Poisoning Prevention Act (42 U.S.C. 4821-4846), the Residential Lead-Based Paint Hazard Reduction Act of...

  17. 24 CFR 598.408 - Lead-based paint requirements.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 3 2011-04-01 2010-04-01 true Lead-based paint requirements. 598... DESIGNATIONS Post-Designation Requirements § 598.408 Lead-based paint requirements. The Lead-Based Paint Poisoning Prevention Act (42 U.S.C. 4821-4846), the Residential Lead-Based Paint Hazard Reduction Act of...

  18. 24 CFR 598.408 - Lead-based paint requirements.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 3 2014-04-01 2013-04-01 true Lead-based paint requirements. 598... DESIGNATIONS Post-Designation Requirements § 598.408 Lead-based paint requirements. The Lead-Based Paint Poisoning Prevention Act (42 U.S.C. 4821-4846), the Residential Lead-Based Paint Hazard Reduction Act of...

  19. 24 CFR 598.408 - Lead-based paint requirements.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 3 2012-04-01 2012-04-01 false Lead-based paint requirements. 598... DESIGNATIONS Post-Designation Requirements § 598.408 Lead-based paint requirements. The Lead-Based Paint Poisoning Prevention Act (42 U.S.C. 4821-4846), the Residential Lead-Based Paint Hazard Reduction Act of...

  20. 77 FR 55371 - System Safety Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-07

    ...-based rule and FRA seeks comments on all aspects of the proposed rule. An SSP would be implemented by a... SSP would be the risk-based hazard management program and risk-based hazard analysis. A properly implemented risk-based hazard management program and risk-based hazard analysis would identify the hazards and...

  1. Models of Quantitative Estimations: Rule-Based and Exemplar-Based Processes Compared

    ERIC Educational Resources Information Center

    von Helversen, Bettina; Rieskamp, Jorg

    2009-01-01

    The cognitive processes underlying quantitative estimations vary. Past research has identified task-contingent changes between rule-based and exemplar-based processes (P. Juslin, L. Karlsson, & H. Olsson, 2008). B. von Helversen and J. Rieskamp (2008), however, proposed a simple rule-based model--the mapping model--that outperformed the…

  2. THE FUTURE OF COMPUTER-BASED TOXICITY PREDICTION: MECHANISM-BASED MODELS VS. INFORMATION MINING APPROACHES

    EPA Science Inventory


    The Future of Computer-Based Toxicity Prediction:
    Mechanism-Based Models vs. Information Mining Approaches

    When we speak of computer-based toxicity prediction, we are generally referring to a broad array of approaches which rely primarily upon chemical structure ...

  3. 24 CFR 598.408 - Lead-based paint requirements.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 3 2010-04-01 2010-04-01 false Lead-based paint requirements. 598... DESIGNATIONS Post-Designation Requirements § 598.408 Lead-based paint requirements. The Lead-Based Paint Poisoning Prevention Act (42 U.S.C. 4821-4846), the Residential Lead-Based Paint Hazard Reduction Act of...

  4. Web-Based Evaluation System for a Problem-Based Laboratory

    ERIC Educational Resources Information Center

    Azli, Naziha Ahmadi; Othman, Mohd Shahizan

    2008-01-01

    The Faculty of Electrical Engineering, University Technology Malaysia is currently moving towards a Problem-Based Laboratory implementation rather than the conventional instructional-based laboratory for final year students. The laboratory has commenced session with about 500 students' registration in the 2007/08/1. The Problem-Based Laboratory…

  5. 10 CFR 904.7 - Base charge.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Base charge. 904.7 Section 904.7 Energy DEPARTMENT OF... Marketing § 904.7 Base charge. (a) The Base Charge shall be developed by the Administrator and promulgated in accordance with appropriate DOE regulations. The Base Charge shall be composed of a capacity...

  6. 25 CFR 39.102 - What is academic base funding?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false What is academic base funding? 39.102 Section 39.102... PROGRAM Indian School Equalization Formula Base and Supplemental Funding § 39.102 What is academic base funding? Academic base funding is the ADM times the weighted student unit. ...

  7. 47 CFR 61.16 - Base documents.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Base documents. 61.16 Section 61.16... for Electronic Filing § 61.16 Base documents. (a) The Base Document is a complete tariff which incorporates all effective revisions, as of the last day of the preceding month. The Base Document should be...

  8. 40 CFR 125.3 - Technology-based treatment requirements in permits.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 21 2010-07-01 2010-07-01 false Technology-based treatment... Criteria and Standards for Imposing Technology-Based Treatment Requirements Under Sections 301(b) and 402 of the Act § 125.3 Technology-based treatment requirements in permits. (a) General. Technology-based...

  9. 25 CFR 39.102 - What is academic base funding?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 25 Indians 1 2014-04-01 2014-04-01 false What is academic base funding? 39.102 Section 39.102... PROGRAM Indian School Equalization Formula Base and Supplemental Funding § 39.102 What is academic base funding? Academic base funding is the ADM times the weighted student unit. ...

  10. 24 CFR 35.98 - Impact on State and local requirements.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... and Urban Development LEAD-BASED PAINT POISONING PREVENTION IN CERTAIN RESIDENTIAL STRUCTURES Disclosure of Known Lead-Based Paint and/or Lead-Based Paint Hazards Upon Sale or Lease of Residential... regulations governing notice or disclosure of known lead-based paint and/or lead-based paint hazards. Neither...

  11. [Development and perspective of bio-based chemical fiber industry].

    PubMed

    Li, Zengjun

    2016-06-25

    Bio-based fiber is environment friendly, reproducible, easily biodegradable. Therefore, rapid development of bio-based fiber industry is an obvious in progress to replace petrochemical resources, develop sustainable economy, build resource saving and environment friendly society. This article describes the current development of bio-based fiber industry, analyzes existing problems, indicates the trends and objectives of bio-based fiber materials technology innovation and recommends developing bio-based fibers industry of our country.

  12. Rule-Based Reasoning Is Fast and Belief-Based Reasoning Can Be Slow: Challenging Current Explanations of Belief-Bias and Base-Rate Neglect

    ERIC Educational Resources Information Center

    Newman, Ian R.; Gibb, Maia; Thompson, Valerie A.

    2017-01-01

    It is commonly assumed that belief-based reasoning is fast and automatic, whereas rule-based reasoning is slower and more effortful. Dual-Process theories of reasoning rely on this speed-asymmetry explanation to account for a number of reasoning phenomena, such as base-rate neglect and belief-bias. The goal of the current study was to test this…

  13. Credit USAF, 7 September 1945. Original housed in the Muroc ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Credit USAF, 7 September 1945. Original housed in the Muroc Flight Test Base, Unit History, 1 September 1942 - 30 June 1945. Alfred F. Simpson Historical Research Agency. United States Air Force. Maxwell AFB, Alabama. View of the mess hall, looking to the north. Sign over door reads "MFTB Muroc Flight Test Base Base Mess." - Edwards Air Force Base, North Base, Base Mess Hall T-27, Third Street, Boron, Kern County, CA

  14. Spectrum Efficiency Through Dynamic Spectrum Access Techniques (Briefing Charts)

    DTIC Science & Technology

    2014-06-01

    Telemetry Data Sources IP BASED TELEMETRY STATION Flow control • Volume- based • Credit- based • Rate- based Signaling using custom protocols or standards...Responsible for all T&E infrastructure assessment within the Major Range and Test Facility Base (MRTFB) DoD Directive 3200.11 • Administer three...Memorandum Unleashing of the Wireless Broadband Revolution THE WHY: Based on the view that “we are now beginning the next transformation in

  15. View looks east northeast (64°) along North Base Road, showing ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    View looks east northeast (64°) along North Base Road, showing North Base as it appears on approach by automobile. From left to right, one sees Building 4505 with its ancillary buildings; Building 4500, Control Tower; followed by Buildings 4402 (Hangar No. 2), 4401 (Hangar No. 1), and 4305 (Unicon Portable Hangar) with their respective ancillary structures. - Edwards Air Force Base, North Base, North Base Road, Boron, Kern County, CA

  16. Ground-Based Midcourse Defense (GMD) Initial Defensive Operations Capability (IDOC) at Vandenberg Air Force Base Environmental Assessment

    DTIC Science & Technology

    2003-08-28

    Zielinski , EDAW, Inc., concerning utilities supply and demand for Vandenberg Air Force Base, 1 August. Rush, P., 2002. Personal communication between...Pernell W. Rush, Technical Sergeant, Water Utilities/Water Treatment NCO, USAF 30th CES/CEOIU, Vandenberg Air Force Base, and James E. Zielinski ... Dave Savinsky, Environmental Consultant, 30 CES/CEVC, Vandenberg Air Force Base, on the Preliminary Draft Ground-Based Midcourse Defense (GMD

  17. Health Care Leadership: Managing Knowledge Bases as Stakeholders.

    PubMed

    Rotarius, Timothy

    Communities are composed of many organizations. These organizations naturally form clusters based on common patterns of knowledge, skills, and abilities of the individual organizations. Each of these spontaneous clusters represents a distinct knowledge base. The health care knowledge base is shown to be the natural leader of any community. Using the Central Florida region's 5 knowledge bases as an example, each knowledge base is categorized as a distinct type of stakeholder, and then a specific stakeholder management strategy is discussed to facilitate managing both the cooperative potential and the threatening potential of each "knowledge base" stakeholder.

  18. Multidimensional display controller for displaying to a user an aspect of a multidimensional space visible from a base viewing location along a desired viewing orientation

    DOEpatents

    Davidson, George S.; Anderson, Thomas G.

    2001-01-01

    A display controller allows a user to control a base viewing location, a base viewing orientation, and a relative viewing orientation. The base viewing orientation and relative viewing orientation are combined to determine a desired viewing orientation. An aspect of a multidimensional space visible from the base viewing location along the desired viewing orientation is displayed to the user. The user can change the base viewing location, base viewing orientation, and relative viewing orientation by changing the location or other properties of input objects.

  19. Real-time detection of deoxyribonucleic acid bases via their negative differential conductance signature.

    PubMed

    Dragoman, D; Dragoman, M

    2009-08-01

    In this Brief Report, we present a method for the real-time detection of the bases of the deoxyribonucleic acid using their signatures in negative differential conductance measurements. The present methods of electronic detection of deoxyribonucleic acid bases are based on a statistical analysis because the electrical currents of the four bases are weak and do not differ significantly from one base to another. In contrast, we analyze a device that combines the accumulated knowledge in nanopore and scanning tunneling detection and which is able to provide very distinctive electronic signatures for the four bases.

  20. 22. Photographic copy of an asconstructed site plan for North ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    22. Photographic copy of an as-constructed site plan for North Base: Job No. Muroc AFB A-52, War Department-Corps of Engineers, Office of the District Engineer, Los Angeles, California: Muroc Air Force Base, Muroc, California; Additonal Sprinkler Facilities, Test Base, Electrical Distribution & Pump House No. 3 Details, Sheet No. 14 of 17, October 1950. This drawing gives the contemporary temporary building numbers (T-xx) for all structures at North Base in 1950 Reproduced from the holdings of the National Archives, Pacific Southwest Region - Edwards Air Force Base, North Base, North Base Road, Boron, Kern County, CA

Top