Science.gov

Sample records for hoc within-woman analysis

  1. Apache Drill: Interactive Ad-Hoc Analysis at Scale.

    PubMed

    Hausenblas, Michael; Nadeau, Jacques

    2013-06-01

    Apache Drill is a distributed system for interactive ad-hoc analysis of large-scale datasets. Designed to handle up to petabytes of data spread across thousands of servers, the goal of Drill is to respond to ad-hoc queries in a low-latency manner. In this article, we introduce Drill's architecture, discuss its extensibility points, and put it into the context of the emerging offerings in the interactive analytics realm.

  2. Performance Analysis of Ad Hoc Routing Protocols in City Scenario for VANET

    NASA Astrophysics Data System (ADS)

    Das, Sanjoy; Raw, Ram Shringar; Das, Indrani

    2011-12-01

    In this paper, performance analysis of Location Aided Routing (LAR), AODV and DSR protocol in city scenarios has been done. The mobility model considered is Manhattan model. This mobility model used to emulate the movement pattern of nodes i.e., vehicles on streets defined by maps. Our objective is to provide a comparative analysis among LAR, AODV and DSR protocol in city scenarios in Vehicular Ad hoc Networks. The simulation work has been conducted using the Glomosim 2.03 simulator. The results show that LAR1 protocol achieves maximum packet delivery ratio is 100% in the sparsely populated network. The delay is maximum in AODV 121.88 ms when the number of node is 10 in the network. The results show that LAR1 outperform DSR and AODV in term of packet delivery ratio and end to end delay.

  3. Analysis of a distributed algorithm to determine multiple routes with path diversity in ad hoc networks.

    SciTech Connect

    Ghosal, Dipak; Mueller, Stephen Ng

    2005-04-01

    With multipath routing in mobile ad hoc networks (MANETs), a source can establish multiple routes to a destination for routing data. In MANETs, mulitpath routing can be used to provide route resilience, smaller end-to-end delay, and better load balancing. However, when the multiple paths are close together, transmissions of different paths may interfere with each other, causing degradation in performance. Besides interference, the physical diversity of paths also improves fault tolerance. We present a purely distributed multipath protocol based on the AODV-Multipath (AODVM) protocol called AODVM with Path Diversity (AODVM/PD) that finds multiple paths with a desired degree of correlation between paths specified as an input parameter to the algorithm. We demonstrate through detailed simulation analysis that multiple paths with low degree of correlation determined by AODVM/PD provides both smaller end-to-end delay than AODVM in networks with low mobility and better route resilience in the presence of correlated node failures.

  4. Does Ad Hoc Coronary Intervention Reduce Radiation Exposure? – Analysis of 568 Patients

    PubMed Central

    Truffa, Márcio A. M.; Alves, Gustavo M.P.; Bernardi, Fernando; Esteves Filho, Antonio; Ribeiro, Expedito; Galon, Micheli Z.; Spadaro, André; Kajita, Luiz J.; Arrieta, Raul; Lemos, Pedro A.

    2015-01-01

    Background Advantages and disadvantages of ad hoc percutaneous coronary intervention have been described. However little is known about the radiation exposure of that procedure as compared with the staged intervention. Objective To compare the radiation dose of the ad hoc percutaneous coronary intervention with that of the staged procedure Methods The dose-area product and total Kerma were measured, and the doses of the diagnostic and therapeutic procedures were added. In addition, total fluoroscopic time and number of acquisitions were evaluated. Results A total of 568 consecutive patients were treated with ad hoc percutaneous coronary intervention (n = 320) or staged percutaneous coronary intervention (n = 248). On admission, the ad hoc group had less hypertension (74.1% vs 81.9%; p = 0.035), dyslipidemia (57.8% vs. 67.7%; p = 0.02) and three-vessel disease (38.8% vs. 50.4%; p = 0.015). The ad hoc group was exposed to significantly lower radiation doses, even after baseline characteristic adjustment between both groups. The ad hoc group was exposed to a total dose-area product of 119.7 ± 70.7 Gycm2, while the staged group, to 139.2 ± 75.3 Gycm2 (p < 0.001). Conclusion Ad hoc percutaneous coronary intervention reduced radiation exposure as compared with diagnostic and therapeutic procedures performed at two separate times. PMID:26351982

  5. A Post Hoc Analysis of D-Threo-Methylphenidate Hydrochloride (Focalin) Versus D,l-Threo-Methylphenidate Hydrochloride (Ritalin)

    ERIC Educational Resources Information Center

    Weiss, Margaret; Wasdell, Michael; Patin, John

    2004-01-01

    Objective: To evaluate clinical measures of the benefit/risk ratio in a post hoc analysis of a clinical trial of d-threo-methylphenidate hydrochloride (d-MPH) and d,l-threo-methylphenidate hydrochloride (d,l-MPH). Method: Data from a phase III clinical trial was used to compare equimolar doses of d-MPH and d,l-MPH treatment for…

  6. Ad hoc supervision of general practice registrars as a 'community of practice': analysis, interpretation and re-presentation.

    PubMed

    Clement, T; Brown, J; Morrison, J; Nestel, D

    2016-05-01

    General practice registrars in Australia undertake most of their vocational training in accredited general practices. They typically see patients alone from the start of their community-based training and are expected to seek timely ad hoc support from their supervisor. Such ad hoc encounters are a mechanism for ensuring patient safety, but also provide an opportunity for learning and teaching. Wenger's (Communities of practice: learning, meaning, and identity. Cambridge University Press, New York, 1998) social theory of learning ('communities of practice') guided a secondary analysis of audio-recordings of ad hoc encounters. Data from one encounter is re-presented as an extended sequence to maintain congruence with the theoretical perspective and enhance vicariousness. An interpretive commentary communicates key features of Wenger's theory and highlights the researchers' interpretations. We argue that one encounter can reveal universal understandings of clinical supervision and that the process of naturalistic generalisation allows readers to transfer others' experiences to their own contexts. The paper raises significant analytic, interpretive, and representational issues. We highlight that report writing is an important, but infrequently discussed, part of research design. We discuss the challenges of supporting the learning and teaching that arises from adopting a socio-cultural lens and argue that such a perspective importantly captures the complex range of issues that work-based practitioners have to grapple with. This offers a challenge to how we research and seek to influence work-based learning and teaching in health care settings.

  7. Clinical Factors Associated with Dose of Loop Diuretics After Pediatric Cardiac Surgery: Post Hoc Analysis.

    PubMed

    Haiberger, Roberta; Favia, Isabella; Romagnoli, Stefano; Cogo, Paola; Ricci, Zaccaria

    2016-06-01

    A post hoc analysis of a randomized controlled trial comparing the clinical effects of furosemide and ethacrynic acid was conducted. Infants undergoing cardiac surgery with cardiopulmonary bypass were included in order to explore which clinical factors are associated with diuretic dose in infants with congenital heart disease. Overall, 67 patients with median (interquartile range) age of 48 (13-139) days were enrolled. Median diuretic dose was 0.34 (0.25-0.4) mg/kg/h at the end of postoperative day (POD) 0 and it significantly decreased (p = 0.04) over the following PODs; during this period, the ratio between urine output and diuretic dose increased significantly (p = 0.04). Age (r -0.26, p = 0.02), weight (r -0.28, p = 0.01), cross-clamp time (r 0.27, p = 0.03), administration of ethacrynic acid (OR 0.01, p = 0.03), and, at the end of POD0, creatinine levels (r 0.3, p = 0.009), renal near-infrared spectroscopy saturation (-0.44, p = 0.008), whole-blood neutrophil gelatinase-associated lipocalin levels (r 0.30, p = 0.01), pH (r -0.26, p = 0.02), urinary volume (r -0.2755, p = 0.03), and fluid balance (r 0.2577, p = 0.0266) showed a significant association with diuretic dose. At multivariable logistic regression cross-clamp time (OR 1.007, p = 0.04), use of ethacrynic acid (OR 0.2, p = 0.01) and blood pH at the end of POD0 (OR 0.0001, p = 0.03) was independently associated with diuretic dose. Early resistance to loop diuretics continuous infusion is evident in post-cardiac surgery infants: Higher doses are administered to patients with lower urinary output. Independently associated variables with diuretic dose in our population appeared to be cross-clamping time, the administration of ethacrynic acid, and blood pH. PMID:26961571

  8. Clinical Factors Associated with Dose of Loop Diuretics After Pediatric Cardiac Surgery: Post Hoc Analysis.

    PubMed

    Haiberger, Roberta; Favia, Isabella; Romagnoli, Stefano; Cogo, Paola; Ricci, Zaccaria

    2016-06-01

    A post hoc analysis of a randomized controlled trial comparing the clinical effects of furosemide and ethacrynic acid was conducted. Infants undergoing cardiac surgery with cardiopulmonary bypass were included in order to explore which clinical factors are associated with diuretic dose in infants with congenital heart disease. Overall, 67 patients with median (interquartile range) age of 48 (13-139) days were enrolled. Median diuretic dose was 0.34 (0.25-0.4) mg/kg/h at the end of postoperative day (POD) 0 and it significantly decreased (p = 0.04) over the following PODs; during this period, the ratio between urine output and diuretic dose increased significantly (p = 0.04). Age (r -0.26, p = 0.02), weight (r -0.28, p = 0.01), cross-clamp time (r 0.27, p = 0.03), administration of ethacrynic acid (OR 0.01, p = 0.03), and, at the end of POD0, creatinine levels (r 0.3, p = 0.009), renal near-infrared spectroscopy saturation (-0.44, p = 0.008), whole-blood neutrophil gelatinase-associated lipocalin levels (r 0.30, p = 0.01), pH (r -0.26, p = 0.02), urinary volume (r -0.2755, p = 0.03), and fluid balance (r 0.2577, p = 0.0266) showed a significant association with diuretic dose. At multivariable logistic regression cross-clamp time (OR 1.007, p = 0.04), use of ethacrynic acid (OR 0.2, p = 0.01) and blood pH at the end of POD0 (OR 0.0001, p = 0.03) was independently associated with diuretic dose. Early resistance to loop diuretics continuous infusion is evident in post-cardiac surgery infants: Higher doses are administered to patients with lower urinary output. Independently associated variables with diuretic dose in our population appeared to be cross-clamping time, the administration of ethacrynic acid, and blood pH.

  9. Efficacy of octreotide long-acting repeatable in neuroendocrine tumors: RADIANT-2 placebo arm post hoc analysis

    PubMed Central

    Strosberg, Jonathan R; Yao, James C; Bajetta, Emilio; Aout, Mounir; Bakker, Bert; Hainsworth, John D; Ruszniewski, Philippe B; Van Cutsem, Eric; Öberg, Kjell; Pavel, Marianne E

    2015-01-01

    Somatostatin analogues (SSA) have demonstrated antiproliferative activity in addition to efficacy for carcinoid symptom control in functional neuroendocrine tumors (NET). A post hoc analysis of the placebo arm of the RAD001 In Advanced Neuroendocrine Tumors-2 (RADIANT-2) study was conducted to assess the efficacy of octreotide long-acting repeatable (LAR) on progression-free survival (PFS) and overall survival (OS) estimated using the Kaplan–Meier method. Out of 213 patients randomized to placebo plus octreotide LAR in RADIANT-2, 196 patients with foregut, midgut, or hindgut NET were considered for present analysis. Of these, 41 patients were SSA-treatment naïve and 155 had received SSA therapy before study entry. For SSA-naïve patients, median PFS by adjudicated central review was 13.6 (95% CI 8.2–22.7) months. For SSA-naïve patients with midgut NET (n=24), median PFS was 22.2 (95% CI 8.3–29.5) months. For patients who had received SSA previously, the median PFS was 11.1 (95% CI 8.4–14.3) months. Among the SSA-pretreated patients who had midgut NET (n=119), the median PFS was 12.0 (95% CI 8.4–19.3) months. Median OS was 35.8 (95% CI 32.5–48.9) months for patients in the placebo plus octreotide LAR arm; 50.6 (36.4 – not reached) months for SSA-naïve patients and 33.5 (95% CI 27.5–44.7) months for those who had received prior SSA. This post hoc analysis of the placebo arm of the large phase 3 RADIANT-2 study provides data on PFS and OS among patients with progressive NET treated with octreotide therapy. PMID:26373569

  10. A communication theoretical analysis of FRET-based mobile ad hoc molecular nanonetworks.

    PubMed

    Kuscu, Murat; Akan, Ozgur B

    2014-09-01

    Nanonetworks refer to a group of nanosized machines with very basic operational capabilities communicating to each other in order to accomplish more complex tasks such as in-body drug delivery, or chemical defense. Realizing reliable and high-rate communication between these nanomachines is a fundamental problem for the practicality of these nanonetworks. Recently, we have proposed a molecular communication method based on Förster Resonance Energy Transfer (FRET) which is a nonradiative excited state energy transfer phenomenon observed among fluorescent molecules, i.e., fluorophores. We have modeled the FRET-based communication channel considering the fluorophores as single-molecular immobile nanomachines, and shown its reliability at high rates, and practicality at the current stage of nanotechnology. In this study, for the first time in the literature, we investigate the network of mobile nanomachines communicating through FRET. We introduce two novel mobile molecular nanonetworks: FRET-based mobile molecular sensor/actor nanonetwork (FRET-MSAN) which is a distributed system of mobile fluorophores acting as sensor or actor node; and FRET-based mobile ad hoc molecular nanonetwork (FRET-MAMNET) which consists of fluorophore-based nanotransmitter, nanoreceivers and nanorelays. We model the single message propagation based on birth-death processes with continuous time Markov chains. We evaluate the performance of FRET-MSAN and FRET-MAMNET in terms of successful transmission probability and mean extinction time of the messages, system throughput, channel capacity and achievable communication rates.

  11. Weight Lifting and Physical Function Among Survivors of Breast Cancer: A Post Hoc Analysis of a Randomized Controlled Trial

    PubMed Central

    Brown, Justin C.; Schmitz, Kathryn H.

    2015-01-01

    Purpose Survivors of breast cancer may experience deterioration of physical function. This is important because poor physical function may be associated with premature mortality, injurious falls, bone fracture, and disability. We conducted a post hoc analysis to explore the potential efficacy of slowly progressive weight lifting to reduce the incidence of physical function deterioration among survivors of breast cancer. Methods Between October 2005 and August 2008, we conducted a single-blind, 12-month, randomized controlled trial of twice-per-week slowly progressive weight lifting or standard care among 295 survivors of nonmetastatic breast cancer. In this post hoc analysis of data from the Physical Activity and Lymphedema Trial, we examined incident deterioration of physical function after 12 months, defined as a ≥ 10-point decrease in the physical function subscale of the Medical Outcomes Short-Form 36-item questionnaire. Results The proportion of participants who experienced incident physical function deterioration after 12 months was 16.3% (24/147) in the control group and 8.1% (12/148) in the weight lifting group (relative risk, 0.49; 95% CI, 0.25 to 0.96; P = .04). No serious or unexpected adverse events occurred that were related to weight lifting. Conclusion Slowly progressive weight lifting compared with standard care reduced the incidence of physical function deterioration among survivors of breast cancer. These data are hypothesis generating. Future studies should directly compare the efficacy of weight lifting with other modalities of exercise, such as brisk walking, to appropriately inform the development of a confirmatory study designed to preserve physical function among survivors of breast cancer. PMID:25964257

  12. Ad Hoc Supervision of General Practice Registrars as a "Community of Practice": Analysis, Interpretation and Re-Presentation

    ERIC Educational Resources Information Center

    Clement, T.; Brown, J.; Morrison, J.; Nestel, D.

    2016-01-01

    General practice registrars in Australia undertake most of their vocational training in accredited general practices. They typically see patients alone from the start of their community-based training and are expected to seek timely ad hoc support from their supervisor. Such ad hoc encounters are a mechanism for ensuring patient safety, but also…

  13. Patient outcomes using the European label for dabigatran. A post-hoc analysis from the RE-LY database.

    PubMed

    Lip, Gregory Y H; Clemens, Andreas; Noack, Herbert; Ferreira, Jorge; Connolly, Stuart J; Yusuf, Salim

    2014-05-01

    In the RE-LY trial dabigatran 150 mg twice daily (D150) showed significantly fewer strokes, and 110 mg (D110) significantly fewer major bleeding events (MBE) compared to well-controlled warfarin in patients with atrial fibrillation (AF). The European (EU) label currently recommends the use of D150 in AF patients who are aged < 80 years without an increased risk for bleeding (e.g. HAS-BLED score <3) and not on concomitant verapamil. In other patients, D110 is recommended. In this post-hoc analysis of the RE-LY dataset, we simulated how dabigatran (n=6,004) would compare to well-controlled warfarin (n=6,022) used according to the EU label. "EU label simulated dabigatran treatment" was associated with significant reductions in stroke and systemic embolism (hazard ratio [HR] 0.74; 95% confidence interval [CI] 0.60-0.91), haemorrhagic stroke (HR 0.22; 95%CI 0.11-0.44), death (HR 0.86; 95%CI 0.75-0.98), and vascular death (HR 0.80; 95%CI 0.68-0.95) compared to warfarin. Dabigatran was also associated with less major bleeding (HR 0.85; 95%CI 0.73-0.98), life-threatening bleeding (HR 0.72; 95%CI 0.58-0.91), intracranial haemorrhage (HR 0.28; 95%CI 0.17-0.45), and "any bleeds" (HR 0.86; 95%CI 0.81-0.92), but not gastrointestinal major bleeding (HR 1.23; 95%CI 0.96-1.59). The net clinical benefit was significantly better for dabigatran compared to warfarin. In conclusion, this post-hoc simulation of dabigatran usage based on RE-LY trial dataset indicates that "EU label simulated dabigatran treatment" may be associated with superior efficacy and safety compared to warfarin, and are in support of the EU label and the 2012 European Society of Cardiology AF guideline recommendations. Thus, adherence to European label/guideline use results in a clinically relevant benefit for dabigatran over warfarin, for both efficacy and safety.

  14. A post-hoc Unweighted Analysis of Counter-Matched Case-Control Data.

    PubMed

    Rakovski, Cyril; Langholz, Bryan

    2015-11-01

    Informative sampling based on counter-matching risk set subjects on exposure correlated with a variable of interest has been shown to be an efficient alternative to simple random sampling; however, the opposite is true when correlation between the two covariates is absent. Thus, the counter-matching design will entail substantial gains in statistical efficiency compared to simple random sampling at a first stage of analyses focused by design on variables correlated with the counter-matching variable but will lose efficiency at a second stage of analyses aimed at variables independent of the counter-matching variable and not conceived as a part of the initial study. In an effort to recover efficiency in such second stage of analyses scenarios, we considered a naive analysis of the effect of a dichotomous covariate on the disease rates in the population that ignores the underlying counter-matching sampling design. We derive analytical expressions for the bias and variance and show that when the counter-matching and the new dichotomous variable of interest are uncorrelated and a multiplicative main effects model holds, such an analysis is advantageous over the standard "weighted" approach, especially when the counter-matching variable is rare and in such scenarios the efficiency gains exceeds 80%. Moreover, we consider all possible conceptual violations of the required assumptions and show that moderate departures from the above-mentioned requirements lead to negligible levels of bias; numerical values for the bias under common scenarios are provided. The method is illustrated via an analysis of BRCA1/2 deleterious mutations in the radiation treatment counter-matched WECARE study of second breast cancer. PMID:26351961

  15. Polypharmacy and effects of apixaban versus warfarin in patients with atrial fibrillation: post hoc analysis of the ARISTOTLE trial

    PubMed Central

    Brouwer, Marc A; Wojdyla, Daniel M; Thomas, Laine; Lopes, Renato D; Washam, Jeffrey B; Lanas, Fernando; Xavier, Denis; Husted, Steen; Wallentin, Lars; Alexander, John H; Granger, Christopher B; Verheugt, Freek W A

    2016-01-01

    Objective To determine whether the treatment effect of apixaban versus warfarin differs with increasing numbers of concomitant drugs used by patients with atrial fibrillation. Design Post hoc analysis performed in 2015 of results from ARISTOTLE (apixaban for reduction in stroke and other thromboembolic events in atrial fibrillation)—a multicentre, double blind, double dummy trial that started in 2006 and ended in 2011. Participants 18 201 ARISTOTLE trial participants. Interventions In the ARISTOTLE trial, patients were randomised to either 5 mg apixaban twice daily (n=9120) or warfarin (target international normalised ratio range 2.0-3.0; n=9081). In the post hoc analysis, patients were divided into groups according to the number of concomitant drug treatments used at baseline (0-5, 6-8, ≥9 drugs) with a median follow-up of 1.8 years. Main outcome measures Clinical outcomes and treatment effects of apixaban versus warfarin (adjusted for age, sex, and country). Results Each patient used a median of six drugs (interquartile range 5-9); polypharmacy (≥5 drugs) was seen in 13 932 (76.5%) patients. Greater numbers of concomitant drugs were used in older patients, women, and patients in the United States. The number of comorbidities increased across groups of increasing numbers of drugs (0-5, 6-8, ≥9 drugs), as did the proportions of patients treated with drugs that interact with warfarin or apixaban. Mortality also rose significantly with the number of drug treatments (P<0.001), as did rates of stroke or systemic embolism (1.29, 1.48, and 1.57 per 100 patient years, for 0-5, 6-8, and ≥9 drugs, respectively) and major bleeding (1.91, 2.46, and 3.88 per 100 patient years, respectively). Relative risk reductions in stroke or systemic embolism for apixaban versus warfarin were consistent, regardless of the number of concomitant drugs (Pinteraction=0.82). A smaller reduction in major bleeding was seen with apixaban versus warfarin with increasing numbers

  16. Relief of Cervicogenic Headaches after Single-Level and Multilevel Anterior Cervical Diskectomy: A 5-Year Post Hoc Analysis

    PubMed Central

    Liu, Jonathan J.; Cadena, Gilbert; Panchal, Ripul R.; Schrot, Rudolph J.; Kim, Kee D.

    2015-01-01

    Study Design  Prospective study. Objective  Because single-level disk arthroplasty or arthrodesis in the lower subaxial spine improves headaches after surgery, we studied whether this effect may be better appreciated after two-level arthroplasty. Methods  We performed an independent post hoc analysis of two concurrent prospective randomized investigational device exemption trials for cervical spondylosis, one for single-level treatment and the other for two adjacent-level treatments. Results  For the one-level study, baseline mean headache scores significantly improved at 60 months for both the cervical disk arthroplasty (CDA) and anterior cervical diskectomy and fusion (ACDF) groups (p < 0.0001). However, mean improvement in headache scores was not statistically different between the investigational and control groups from 6 months through 60 months. For the two-level study, baseline mean headache scores significantly improved at 60 months for both the CDA and ACDF groups (p < 0.0001). The CDA group demonstrated greater improvement from baseline at all points; this difference was statistically significant at 6, 12, 24, 36, and 48 months but not at 18 and 60 months. Conclusion  Both CDA and ACDF at either one or two levels are associated with sustained headache relief from baseline. Patients undergoing two-level arthroplasty had significantly greater improvement in headache at all points except for at 18 and 60 months. This difference in improvement was not observed in patients undergoing single-level arthroplasty. The mechanism of greater headache relief after two-level arthroplasty remains unclear. PMID:27555998

  17. The Efficacy Profile of Rotigotine During the Waking Hours in Patients With Advanced Parkinson's Disease: A Post Hoc Analysis

    PubMed Central

    LeWitt, Peter A.; Poewe, Werner; Elmer, Lawrence W.; Asgharnejad, Mahnaz; Boroojerdi, Babak; Grieger, Frank; Bauer, Lars

    2016-01-01

    Objectives Transdermal delivery of rotigotine maintains stable plasma concentrations for 24 hours. Three phase 3 studies of rotigotine as add-on to levodopa in advanced Parkinson's disease showed a significant reduction in “off” time from baseline to end of maintenance (EoM). However, detailed analyses over the range of a day have not yet been performed. The objective was to examine the time course of the efficacy profile of rotigotine throughout the day. Methods Post hoc analysis of diary data from 3 double-blind, placebo-controlled studies of rotigotine in patients with advanced Parkinson's disease inadequately controlled with levodopa, with average “off” time of ≥2.5 h/d (CLEOPATRA-PD [NCT00244387], 16-week maintenance; PREFER, 24-week maintenance; SP921 [NCT00522379], 12-week maintenance). Patients marked 30-minute intervals as “off,” “on without troublesome dyskinesia,” “on with troublesome dyskinesia,” or “sleep.” Diaries completed on the 3 days before EoM were analyzed. A 2-sample t test was performed for comparison of rotigotine + levodopa versus placebo + levodopa for mean percentage of time per status during four 6-hour periods: 12:00am (midnight) to 6:00am, 6:00am to 12:00pm (noon), noon to 6:00pm, and 6:00pm to midnight. Results Data were available for 967 patients (placebo + levodopa, 260; rotigotine + levodopa, 707). During the 24-hour period at EoM, an advantage in mean percentage time spent “off” and “on without troublesome dyskinesia” was observed with rotigotine + levodopa versus placebo + levodopa during the three 6-hour periods from 6:00am to midnight (P < 0.05; exploratory analysis). Conclusions These exploratory analyses of patients with motor fluctuations suggest that the efficacy of rotigotine transdermal patch, as captured by diary data, in reducing “off” time and increasing “on time without troublesome dyskinesia” may cover the full waking day. PMID:26882318

  18. A novel method to prioritize RNAseq data for post-hoc analysis based on absolute changes in transcript abundance.

    PubMed

    McNutt, Patrick; Gut, Ian; Hubbard, Kyle; Beske, Phil

    2015-06-01

    The use of fold-change (FC) to prioritize differentially expressed genes (DEGs) for post-hoc characterization is a common technique in the analysis of RNA sequencing datasets. However, the use of FC can overlook certain population of DEGs, such as high copy number transcripts which undergo metabolically expensive changes in expression yet fail to exceed the ratiometric FC cut-off, thereby missing potential important biological information. Here we evaluate an alternative approach to prioritizing RNAseq data based on absolute changes in normalized transcript counts (ΔT) between control and treatment conditions. In five pairwise comparisons with a wide range of effect sizes, rank-ordering of DEGs based on the magnitude of ΔT produced a power curve-like distribution, in which 4.7-5.0% of transcripts were responsible for 36-50% of the cumulative change. Thus, differential gene expression is characterized by the high production-cost expression of a small number of genes (large ΔT genes), while the differential expression of the majority of genes involves a much smaller metabolic investment by the cell. To determine whether the large ΔT datasets are representative of coordinated changes in the transcriptional program, we evaluated large ΔT genes for enrichment of gene ontologies (GOs) and predicted protein interactions. In comparison to randomly selected DEGs, the large ΔT transcripts were significantly enriched for both GOs and predicted protein interactions. Furthermore, enrichments were were consistent with the biological context of each comparison yet distinct from those produced using equal-sized populations of large FC genes, indicating that the large ΔT genes represent an orthagonal transcriptional response. Finally, the composition of the large ΔT gene sets were unique to each pairwise comparison, indicating that they represent coherent and context-specific responses to biological conditions rather than the non-specific upregulation of a family of genes

  19. The Advantages of Using Planned Comparisons over Post Hoc Tests.

    ERIC Educational Resources Information Center

    Kuehne, Carolyn C.

    There are advantages to using a priori or planned comparisons rather than omnibus multivariate analysis of variance (MANOVA) tests followed by post hoc or a posteriori testing. A small heuristic data set is used to illustrate these advantages. An omnibus MANOVA test was performed on the data followed by a post hoc test (discriminant analysis). A…

  20. Neuromathematical Trichotomous Mixed Methods Analysis: Using the Neuroscientific Tri-Squared Test Statistical Metric as a Post Hoc Analytic to Determine North Carolina School of Science and Mathematics Leadership Efficacy

    ERIC Educational Resources Information Center

    Osler, James Edward, II; Mason, Letita R.

    2016-01-01

    This study examines the leadership efficacy amongst graduates of The North Carolina School of Science and Mathematics (NCSSM) for the classes of 2000 through 2007 from a neuroscientific and neuromathematic perspective. NCSSM alumni (as the primary unit of analysis) were examined using a novel neuromathematic post hoc method of analysis. This study…

  1. Performance analysis of multi-radio routing protocol in cognitive radio ad hoc networks under different path failure rate

    NASA Astrophysics Data System (ADS)

    Che-Aron, Z.; Abdalla, A. H.; Abdullah, K.; Hassan, W. H.

    2013-12-01

    In recent years, Cognitive Radio (CR) technology has largely attracted significant studies and research. Cognitive Radio Ad Hoc Network (CRAHN) is an emerging self-organized, multi-hop, wireless network which allows unlicensed users to opportunistically access available licensed spectrum bands for data communication under an intelligent and cautious manner. However, in CRAHNs, a lot of failures can easily occur during data transmission caused by PU (Primary User) activity, topology change, node fault, or link degradation. In this paper, an attempt has been made to evaluate the performance of the Multi-Radio Link-Quality Source Routing (MR-LQSR) protocol in CRAHNs under different path failure rate. In the MR-LQSR protocol, the Weighted Cumulative Expected Transmission Time (WCETT) is used as the routing metric. The simulations are carried out using the NS-2 simulator. The protocol performance is evaluated with respect to performance metrics like average throughput, packet loss, average end-to-end delay and average jitter. From the simulation results, it is observed that the number of path failures depends on the PUs number and mobility rate of SUs (Secondary Users). Moreover, the protocol performance is greatly affected when the path failure rate is high, leading to major service outages.

  2. Decitabine reduces transfusion dependence in older patients with acute myeloid leukemia: results from a post hoc analysis of a randomized phase III study.

    PubMed

    He, Jianming; Xiu, Liang; De Porre, Peter; Dass, Ramesh; Thomas, Xavier

    2015-04-01

    This post hoc analysis of the DACO-016 phase III study evaluates the impact of decitabine on transfusion dependence and survival in 485 elderly patients with newly diagnosed acute myeloid leukemia (AML). Red blood cell (RBC) and platelet (PLT) transfusion independence, defined as no transfusions for ≥ 8 consecutive weeks, was measured in both decitabine (n = 242) and treatment choice (TC, n = 243) arms. More RBC transfusion dependent patients at baseline became transfusion independent with decitabine than with TC (26% vs. 13%; p = 0.0026). Similar results were obtained for patients who were PLT transfusion dependent at baseline (31% vs. 13%; p = 0.0069). When excluding patients who attained complete remission (CR), survival was improved in patients who achieved RBC or PLT transfusion independence, suggesting that reaching CR is not a prerequisite for deriving benefit from treatment with decitabine. In addition, patients who achieved transfusion independence with decitabine had increased treatment continuation, even in the absence of CR.

  3. Nausea and Vomiting following Balanced Xenon Anesthesia Compared to Sevoflurane: A Post-Hoc Explorative Analysis of a Randomized Controlled Trial

    PubMed Central

    Fahlenkamp, Astrid V.; Stoppe, Christian; Cremer, Jan; Biener, Ingeborg A.; Peters, Dirk; Leuchter, Ricarda; Eisert, Albrecht; Apfel, Christian C.; Rossaint, Rolf; Coburn, Mark

    2016-01-01

    Objective Like other inhalational anesthetics xenon seems to be associated with post-operative nausea and vomiting (PONV). We assessed nausea incidence following balanced xenon anesthesia compared to sevoflurane, and dexamethasone for its prophylaxis in a randomized controlled trial with post-hoc explorative analysis. Methods 220 subjects with elevated PONV risk (Apfel score ≥2) undergoing elective abdominal surgery were randomized to receive xenon or sevoflurane anesthesia and dexamethasone or placebo after written informed consent. 93 subjects in the xenon group and 94 subjects in the sevoflurane group completed the trial. General anesthesia was maintained with 60% xenon or 2.0% sevoflurane. Dexamethasone 4mg or placebo was administered in the first hour. Subjects were analyzed for nausea and vomiting in predefined intervals during a 24h post-anesthesia follow-up. Results Logistic regression, controlled for dexamethasone and anesthesia/dexamethasone interaction, showed a significant risk to develop nausea following xenon anesthesia (OR 2.30, 95% CI 1.02–5.19, p = 0.044). Early-onset nausea incidence was 46% after xenon and 35% after sevoflurane anesthesia (p = 0.138). After xenon, nausea occurred significantly earlier (p = 0.014), was more frequent and rated worse in the beginning. Dexamethasone did not markedly reduce nausea occurrence in both groups. Late-onset nausea showed no considerable difference between the groups. Conclusion In our study setting, xenon anesthesia was associated with an elevated risk to develop nausea in sensitive subjects. Dexamethasone 4mg was not effective preventing nausea in our study. Group size or dosage might have been too small, and change of statistical analysis parameters in the post-hoc evaluation might have further contributed to a limitation of our results. Further trials will be needed to address prophylaxis of xenon-induced nausea. Trial Registration EU Clinical Trials EudraCT-2008-004132-20 ClinicalTrials.gov NCT

  4. Pregabalin versus SSRIs and SNRIs in benzodiazepine-refractory outpatients with generalized anxiety disorder: a post hoc cost-effectiveness analysis in usual medical practice in Spain

    PubMed Central

    De Salas-Cansado, Marina; Olivares, José M; Álvarez, Enrique; Carrasco, Jose L; Barrueta, Andoni; Rejas, Javier

    2012-01-01

    Background Generalized anxiety disorder (GAD) is a prevalent health condition which seriously affects both patient quality of life and the National Health System. The aim of this research was to carry out a post hoc cost-effectiveness analysis of the effect of pregabalin versus selective serotonin reuptake inhibitors (SSRIs)/serotonin norepinephrine reuptake inhibitors (SNRIs) in treated benzodiazepine-refractory outpatients with GAD. Methods This post hoc cost-effectiveness analysis used secondary data extracted from the 6-month cohort, prospective, noninterventional ADAN study, which was conducted to ascertain the cost of illness in GAD subjects diagnosed according to Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition criteria. Benzodiazepine-refractory subjects were those who claimed persistent symptoms of anxiety and showed a suboptimal response (Hamilton Anxiety Rating Scale ≥ 16) to benzodiazepines, alone or in combination, over 6 months. Patients could switch to pregabalin (as monotherapy or addon) or to an SSRI or SNRI, alone or in combination. Effectiveness was expressed as quality-adjusted life years gained, and the perspective was that of the National Health System in the year 2008. A sensitivity analysis was performed using bootstrapping techniques (10,000 resamples were obtained) in order to obtain a cost-effectiveness plane and a corresponding acceptability curve. Results A total of 282 subjects (mean Hamilton Anxiety Rating Scale score 25.8) were identified, comprising 157 in a pregabalin group and 125 in an SSRI/SNRI group. Compared with SSRI/SNRI, pregabalin (average dose 163 mg/day) was associated with higher quality-adjusted life years gained (0.1086 ± 0.0953 versus 0.0967 ± 0.1003, P = 0.334), but increased health care costs (€1014 ± 762 versus €846 ± 620, P = 0.166) and drug costs (€376 ± 252 versus 220 ± 140, P < 0.001), resulting in an incremental cost-effectiveness ratio of €25,304 (95% confidence interval

  5. Treatment of Pulmonary Embolism With Rivaroxaban: Outcomes by Simplified Pulmonary Embolism Severity Index Score from a Post Hoc Analysis of the EINSTEIN PE Study

    PubMed Central

    Fermann, Gregory J; Erkens, Petra M G; Prins, Martin H; Wells, Philip S; Pap, Ákos F; Lensing, Anthonie W A; Kline, Jeffrey

    2015-01-01

    Objectives The objective was to assess adverse outcomes in relation to the simplified Pulmonary Embolism Severity Index (PESI) score in patients treated with rivaroxaban or standard therapy in the phase III EINSTEIN PE study and to evaluate the utility of the simplified PESI score to identify low-risk pulmonary embolism (PE) patients. Methods A post hoc analysis of EINSTEIN PE data was performed to assess the efficacy and safety of rivaroxaban in patients with a range of simplified PESI scores. Recurrent venous thromboembolism, fatal PE, all-cause mortality, and major bleeding were stratified by simplified PESI scores of 0, 1, or ≥2 and according to treatment period at 7, 14, 30, and 90 days and at the end of the full intended treatment period. Results Simplified PESI scores could be calculated in 4,831 of the 4,832 randomized patients; of those, 53.6, 36.7, and 9.7% had PESI scores of 0, 1, and ≥2, respectively. Among patients with simplified PESI scores of 0 or 1, fatal PE, all-cause mortality, and other adverse outcomes were uncommon within the first 7, 14, and 30 days. Patients with simplified PESI scores of ≥2 had more frequent adverse outcomes. Major bleeding was lower in the rivaroxaban group, particularly in those with simplified PESI scores of 1 or ≥2. Conclusions The findings support using risk stratification with the simplified PESI score to identify low-risk patients with PE. PMID:25716463

  6. Chronic effort dyspnea explained by lung function tests and by HRCT and CRX radiographic patterns in COPD: a post-hoc analysis in 51 patients.

    PubMed

    Giuntini, Carlo; Camiciottoli, Gianna; Maluccio, Nazzarena Maria; Mariani, Laura; Lavorini, Federico; Pistolesi, Massimo

    2007-09-01

    This paper is a post-hoc analysis of a previous study performed to investigate the relationship between computerized tomography (CT) and lung function in 51 outpatients with mild-to-moderate COPD. We studied whether changes in lung function and radiographic patterns may help to explain dyspnea, the most disturbing symptom in patients with COPD. The Medical Research Council (MRC) dyspnea scale shows, by univariate analysis, a similar strength of association to CT expiratory lung density and to DL(CO), a functional index of lung parenchymal loss. The MRC dyspnea scale shows a somewhat less strength of association with a small vertical heart on plain chest films. In multivariate analysis, the model with the strongest association to the MRC dyspnea scale (r = 0.76, p < 0.0001) contains 4 explanatory variables (DL(CO), FRC, PaCO(2), and radiographic pattern of pulmonary hypertension). We suggest that diffusing capacity reflects the emphysematous component of hyperinflation, associated by definition with destruction of terminal airspace walls, as distinct from the air trapping component, which is ascribed to airway obstruction and associated with FRC. PaCO(2) mainly reflects the ventilatory components, i.e., ventilatory drive and ventilatory constraints, of pulmonary gas exchange in COPD, while radiographic pattern of pulmonary hypertension likely reflects hypoxic vascular changes, which depend mainly on ventilation/perfusion mismatch and give rise to pulmonary arterial hypertension that may contribute per se to dyspnea. In conclusion, our analysis points out that chronic effort dyspnea variance may account for up to 58% (r(2) = 0.58) by lung function tests and radiographic patterns. Thus, about 42% of the MRC dyspnea variance remains unexplained by this model. On the other hand, dyspnea ascertainment is dependent on subjective behavior and evaluation and in tests is influenced by individual performance and perception. For example in the 6-minute walk test, a similar or

  7. Safety and efficacy of tiotropium Respimat versus HandiHaler in patients naive to treatment with inhaled anticholinergics: a post hoc analysis of the TIOSPIR trial

    PubMed Central

    Wise, Robert; Calverley, Peter MA; Dahl, Ronald; Dusser, Daniel; Metzdorf, Norbert; Müller, Achim; Fowler, Andy; Anzueto, Antonio

    2015-01-01

    Background: Patients with chronic obstructive pulmonary disease (COPD) who were naive to anticholinergics before the TIOtropium Safety and Performance In Respimat (TIOSPIR) trial may reflect patients seen in practice, in particular in primary care. In addition, investigating safety in these patients avoids the potential bias in patients who previously received anticholinergics and may be tolerant of their effects. Aims: The aim of this study was to evaluate whether patients naive to anticholinergic therapy who were treated with tiotropium Respimat 2.5 or 5 μg had different safety and efficacy outcomes than patients treated with tiotropium HandiHaler 18 μg. Methods: A post hoc analysis of patients who were not receiving anticholinergics before TIOSPIR (N=6,966/17,135) was conducted. Primary end points were risk of death from any cause and risk of COPD exacerbation. Secondary outcomes included severe exacerbation and major adverse cardiovascular events (MACE). Additional analysis of exacerbations was carried out in anticholinergic-naive patients with moderate (GOLD II) disease. Results: Anticholinergic-naive patients had less severe disease than the total TIOSPIR population. Discontinuations because of anticholinergic side effects were infrequent (0.9% overall). Similar to the primary study, patients in the tiotropium Respimat groups had no difference in the risk of death or risk of any or severe exacerbation than patients treated with tiotropium HandiHaler. Risk of MACE was similar across the Respimat and HandiHaler groups. Rates of exacerbations in the subgroup of patients with moderate disease were similar across the Respimat and HandiHaler groups. Conclusions: Tiotropium Respimat and HandiHaler have similar safety and efficacy profiles in patients who are naive to anticholinergic therapy. PMID:26540491

  8. Preoperative opioid strength may not affect outcomes of anterior cervical procedures: a post hoc analysis of 2 prospective, randomized trials

    PubMed Central

    Kelly, Michael P.; Anderson, Paul A.; Sasso, Rick C.; Riew, K. Daniel

    2015-01-01

    Object The aim of this study is to evaluate the relationship between preoperative opioid strength and outcomes of anterior cervical decompressive surgery. Methods A retrospective cohort of 1004 patients enrolled in 1 of 2 investigational device exemption studies comparing cervical total disc arthroplasty (TDA) and anterior cervical discectomy and fusion (ACDF) for single-level cervical disease causing radiculopathy or myelopathy was selected. At a preoperative visit, opioid use data, Neck Disability Index (NDI) scores, 36-ltem Short-Form Health Survey (SF-36) scores, and numeric rating scale scores for neck and arm pain were collected. Patients were divided into strong (oxycodone/morphine/meperidine), weak (codeine/propoxyphene/ hydrocodone), and opioid-naïve groups. Preoperative and postoperative (24 months) outcomes scores were compared within and between groups using the paired t-test and ANCOVA, respectively. Results Patients were categorized as follows: 226 strong, 762 weak, and 16 opioid naïve. The strong and weak groups were similar with respect to age, sex, race, marital status, education level, Worker's Compensation status, litigation status, and alcohol use. At 24-month follow-up, no differences in change in arm or neck pain scores (arm: strong –52.3, weak –50.6, naïve –54.0, p = 0.244; neck: strong –52.7, weak –50.8, naïve –44.6, p = 0.355); NDI scores (strong –36.0, weak –33.3, naïve –32.3, p = 0.181); or SF-36 Physical Component Summary scores (strong: 14.1, weak 13.3, naïve 21.7, p = 0.317) were present. Using a 15-point improvement in NDI to determine success, the authors found no between-groups difference in success rates (strong 80.6%, weak 82.7%, naïve 73.3%, p = 0.134). No difference existed between treatment arms (TDA vs ACDF) for any outcome at any time point. Conclusions Preoperative opioid strength did not adversely affect outcomes in this analysis. Careful patient selection can yield good results in this patient

  9. Effects of calcium channel blocker-based combinations on intra-individual blood pressure variability: post hoc analysis of the COPE trial.

    PubMed

    Umemoto, Seiji; Ogihara, Toshio; Matsuzaki, Masunori; Rakugi, Hiromi; Ohashi, Yasuo; Saruta, Takao

    2016-01-01

    Visit-to-visit blood pressure (BP) variability is an important predictor of stroke. However, which antihypertensive drug combination is better at reducing visit-to-visit BP variability and therefore at reducing stroke incidence remains uncertain. We have previously reported that the dihydropyridine calcium channel blocker benidipine combined with a β-blocker appeared to be less beneficial in reducing the risk of stroke than a combination of benidipine and thiazide. Here, we further compare the visit-to-visit BP variability among three benidipine-based regimens, namely angiotensin receptor blocker (ARB), β-blocker and thiazide combinations. The present post hoc analysis included 2983 patients without cardiovascular events or death during the first 18 months after randomization. We compared the BP variability (defined as the s.d. and the coefficient of variation (CV)), maximum systolic BP (SBP) and diastolic BP (DBP) of the clinic mean on-treatment BPs obtained at 6-month intervals, starting 6 months after the treatment initiation, among the 3 treatments (ARB, n=1026; β-blocker, n=966; thiazide, n=991). During the first 6-36 months after randomization, both the s.d. and CV-BPs were lower in the benidipine-thiazide group than in the benidipine-β-blocker group (s.d.-SBP, P=0.019; s.d.-DBP, P=0.030; CV-SBP, P=0.012; CV-DBP, P=0.022). The s.d. and CV in the ARB group did not reach statistical significance compared with the other two groups. The maximum BPs did not differ among the three treatments. These findings suggest that the benidipine-thiazide combination may reduce visit-to-visit BP variability more than the benidipine-β-blocker combination. PMID:26490089

  10. Robust message routing for mobile (wireless) ad hoc networks.

    SciTech Connect

    Goldsby, Michael E.; Johnson, Michael M.; Kilman, Dominique Marie; Bierbaum, Neal Robert; Chen, Helen Y.; Ammerlahn, Heidi R.; Tsang, Rose P.; Nicol, David M.

    2004-01-01

    This report describes the results of research targeting improvements in the robustness of message transport in wireless ad hoc networks. The first section of the report provides an analysis of throughput and latency in the wireless medium access control (MAC) layer and relates the analysis to the commonly used 802.11 protocol. The second section describes enhancements made to several existing models of wireless MAC and ad hoc routing protocols; the models were used in support of the work described in the following section. The third section of the report presents a lightweight transport layer protocol that is superior to TCP for use in wireless networks. In addition, it introduces techniques that improve the performance of any ad hoc source routing protocol. The fourth section presents a novel, highly scalable ad hoc routing protocol that is based on geographic principles but requires no localization hardware.

  11. Brief Report: Intraarticular Sprifermin Not Only Increases Cartilage Thickness, but Also Reduces Cartilage Loss: Location‐Independent Post Hoc Analysis Using Magnetic Resonance Imaging

    PubMed Central

    Wirth, Wolfgang; Guermazi, Ali; Maschek, Susanne; Aydemir, Aida

    2015-01-01

    Objective To determine whether an anabolic drug (sprifermin) is capable of reducing cartilage loss wherever it occurs in a given knee, using a subject‐specific, location‐independent analysis of cartilage change in patients with knee osteoarthritis (OA). Methods Study participants (n = 168; ages ≥40 years, 69% women) had symptomatic femorotibial OA not confined to the medial compartment. Sprifermin (10, 30, or 100 μg) or placebo was injected intraarticularly 3 times over 3 weeks, both after randomization (baseline) and 3 months later. Coronal magnetic resonance images were acquired at baseline and 3, 6, and 12 months after treatment. The femorotibial cartilage of each subject was segmented, and changes in cartilage thickness were computed across 16 subregions. Location‐independent post hoc analysis was used to compute summary scores of negative and positive changes in the subregions, summarized as the total cartilage thinning sum score (ThCTnS) and the total cartilage thickening sum score (ThCTkS), capturing change in either direction in each knee. Ordered values of the magnitude of subject‐specific subregional changes in thickness were determined. The ThCTnS and ThCTkS in each sprifermin dose group at 12 months of followup were compared with the values in the matched placebo groups, using the Wilcoxon‐Mann‐Whitney test. Results The mean ± SD ThCTnS was −591 ± 617 μm (median −360 μm, Q1/Q3 = −820/−200 μm) in patients treated with 100 μg sprifermin (n = 57), and −921 ± 777 μm (median −745 μm, Q1/Q3 = −1,190/−380 μm) in patients given placebo (n = 18). The mean difference in the ThCTnS between the 100‐μg sprifermin group and the placebo group was 331 μm (95% confidence interval [95% CI] 24, 685), a difference that was statistically significant (P = 0.03). The mean difference in the ThCTkS in the 100‐μg sprifermin group compared with the placebo group was 237 μm (95% CI 34, 440), also

  12. History of Depressive and Anxiety Disorders and Paroxetine Response in Patients With Irritable Bowel Syndrome: Post Hoc Analysis From a Placebo-Controlled Study

    PubMed Central

    Marks, David M.; Han, Changsu; Krulewicz, Stan; Pae, Chi-Un; Peindl, Kathleen; Patkar, Ashwin A.; Masand, Prakash S.

    2008-01-01

    Objective: Although irritable bowel syndrome (IBS) is highly comorbid with depressive and anxiety disorders, information on the clinical implications of this comorbidity is limited. We investigated whether a history of depressive and/or anxiety disorders was associated with response to treatment in a double-blind, randomized, placebo-controlled trial of paroxetine controlled release (CR) in IBS. Method: Seventy-two IBS subjects (diagnosed using Rome II criteria) were recruited from August 2003 to November 2005 and randomly assigned to receive flexibly dosed paroxetine CR (dose, 12.5–50 mg/day) or placebo for 12 weeks. The Mini-International Neuropsychiatric Interview (MINI-Plus version) was used to ascertain current (exclusionary) or past diagnoses of depressive and anxiety disorders. Subjective depression, anxiety, and stress were assessed at entry and throughout the trial using the Beck Depression Inventory (BDI), Beck Anxiety Inventory (BAI), and Perceived Stress Scale (PSS). Severity of IBS symptoms was determined by the Composite Pain Score (CPS), administered via Interactive Voice Response System, and the Clinical Global Impressions scale (CGI). The primary outcome was treatment response defined as ≥ 25% reduction in CPS from randomization to end of treatment. A post hoc analysis (multivariate logistic regression) was done to evaluate whether a history of depressive and/or anxiety disorder was associated with response to medication. Results: Baseline demographic and clinical characteristics (CPS, BDI, BAI, PSS, CGI scores) were similar between groups (history of depressive/anxiety disorder vs. no history). In multivariate logistic regression analysis, treatment response was not predicted by history of depressive and/or anxiety disorder (OR = 0.58, CI = 0.29 to 1.68, p = .32) or drug status (paroxetine CR vs. placebo) (OR = 1.26, CI = 0.68 to 3.21, p = .19). Drug status was significantly associated with the secondary outcome variable of treatment response

  13. A Post Hoc Analysis of the Effect of Weight on Efficacy in Depressed Patients Treated With Desvenlafaxine 50 mg/d and 100 mg/d

    PubMed Central

    Fayyad, Rana S.; Guico-Pabia, Christine J.; Boucher, Matthieu

    2015-01-01

    Objective: To assess the effect of baseline body mass index (BMI) on efficacy and weight change in adults with major depressive disorder (MDD) treated with desvenlafaxine or placebo in a pooled, post hoc analysis. Method: Adults with MDD were randomly assigned to placebo or desvenlafaxine (50 mg or 100 mg) in 8 short-term, double-blind studies and 1 longer-term randomized withdrawal study (the studies were published between 2007 and 2013). Change from baseline in 17-item Hamilton Depression Rating Scale (HDRS-17) total score at week 8 was analyzed in normal (BMI ≤ 25 kg/m2), overweight (25 kg/m2 < BMI ≤ 30 kg/m2), and obese (BMI > 30 kg/m2) subgroups using analysis of covariance (ANCOVA). Weight change was analyzed in BMI subgroups using ANCOVA and a mixed-effects model for repeated measures. Results: Desvenlafaxine 50 mg/d or 100 mg/d improved HDRS-17 scores significantly from baseline to week 8 (last observation carried forward) versus placebo in all BMI subgroups (normal: n = 1,122; overweight: n = 960; obese: n = 1,302; all P ≤ .0027); improvement was greatest in normal BMI patients. There was a statistically significant decrease in weight (< 1 kg) with short-term desvenlafaxine 50 mg/d and 100 mg/d versus placebo in all BMI subgroups (all P < .0001). In the randomized withdrawal study (n = 548), no statistically significant difference in weight was observed for desvenlafaxine versus placebo in any BMI subgroup. Baseline BMI predicted weight change in short-term and longer-term desvenlafaxine treatment. Conclusions: Desvenlafaxine significantly improved symptoms of depression versus placebo regardless of baseline BMI. In all BMI subgroups, desvenlafaxine was associated with statistically significant weight loss (< 1 kg) versus placebo over 8 weeks, but no significant differences longer term. Trial Registration: ClinicalTrials.gov identifiers: NCT00072774, NCT00277823, NCT00300378, NCT00384033, NCT00798707, NCT00863798, NCT01121484, NCT00824291, NCT

  14. Blood pressure‐lowering effects of sulodexide depend on albuminuria severity: post hoc analysis of the sulodexide microalbuminuria and macroalbuminuria studies

    PubMed Central

    Heerspink, Hiddo J. L.; de Zeeuw, Dick; Vogt, Liffert

    2016-01-01

    Aims It has been suggested that sulodexide is able to lower blood pressure (BP). This may be attributed to its ability to restore the endothelial surface layer (ESL). As ESL perturbation is known to be related to the degree of kidney damage, we investigated whether albuminuria, reflecting ESL status, modified the BP‐lowering potential of sulodexide. Methods A post hoc analysis of the double‐blind, randomized, placebo‐controlled sulodexide microalbuminuria (Sun‐MICRO) and macroalbuminuria (Sun‐MACRO) studies, including 1056 microalbuminuric and 843 macroalbuminuric subjects with type 2 diabetes receiving maximal tolerated renin–angiotensin‐aldosterone system inhibitor therapy, was carried out. We compared the effect of placebo and sulodexide on systolic BP (SBP) among albuminuria groups. Results Analysis of covariance, including data from both trials, showed that baseline urine albumin‐to‐creatinine ratio (UACR) was the only modifier of the SBP response (interaction with treatment P = 0.001). In subjects with an UACR >1000 mg g–1, sulodexide lowered SBP by 4.6 mmHg [95% confidence interval (CI) 3.6, 5.6; P < 0.001] compared with placebo, whereas a 2.3 mmHg (95% CI 0.9,3.7; P = 0.001) reduction was seen in subjects with a UACR of 300–1000 mg g–1. Sulodexide did not lower SBP in subjects with a UACR <300 mg g–1 (−0.2 mmHg, 95% CI −0.8, 0.5; P = 0.60). SBP‐lowering effects were not accompanied by changes in body weight. Conclusion The BP‐reducing potency of sulodexide is modified by the degree of albuminuria in subjects with type 2 diabetes. As ESL status deteriorates with increasing albuminuria and nephropathy severity, this suggests that ESL restoration may represent a new target for BP treatment in subjects with diabetic nephropathy. PMID:27412828

  15. Differences in glycemic control across world regions: a post-hoc analysis in patients with type 2 diabetes mellitus on dual antidiabetes drug therapy

    PubMed Central

    Brath, H; Paldánius, P M; Bader, G; Kolaczynski, W M; Nilsson, P M

    2016-01-01

    Objective: This post-hoc analysis of the EDGE (Effectiveness of Diabetes control with vildaGliptin and vildagliptin/mEtformin) study assessed inter-regional differences in baseline characteristics and response to treatment intensification with dual oral antidiabetes drugs (OADs) in patients with type 2 diabetes mellitus (T2DM). Methods: Patients with T2DM inadequately controlled with first-line monotherapy were assigned to receive a dipeptidyl peptidase-4 (DPP-4) inhibitor, vildagliptin, or comparator OADs as add-on dual therapy. The primary effectiveness end point (PEP) was achieving glycated hemoglobin (HbA1c) reduction >0.3% without hypoglycemia, peripheral edema, discontinuation owing to gastrointestinal events or weight gain ⩾5% at 12 months. The secondary effectiveness end point (SEP) was achieving HbA1c of <7% without hypoglycemia or weight gain ⩾3% at 12 months. Results: Baseline characteristics of patients (N=43 791), including mean HbA1c (8.2%), varied across regions. Baseline age (62.3 years) and T2DM duration (6.3 years) were greater in patients from Europe than those from India and the Middle East (age: 51.8 and 52.1 years; T2DM duration: 4.3 and 4.2 years, respectively). The probability of achieving PEP with dual therapy was higher in India (odds ratio (OR): 1.5), Latin America (OR: 1.2) and Middle East (OR: 2.0) than in Europe (OR: 0.8) and East Asia (OR: 0.3). Achievement of SEP in patients receiving dual therapy was greater in Latin America (OR: 1.7) and Middle East (OR: 1.7). Vildagliptin add-on therapy allowed more patients to achieve SEP across regions. Women aged ⩾45 years less often attained glycemic target (HbA1c<7%) without significant weight gain ⩾5% compared with women aged <45 years (OR: 0.876, 95% confidence interval: 0.774, 0.992; P=0.037). Conclusions: Baseline HbA1c and T2DM duration differed considerably across all regions. Treatment intensification with second OAD, particularly with a DPP-4 inhibitor vildagliptin, resulted

  16. Indomethacin reduces glomerular and tubular damage markers but not renal inflammation in chronic kidney disease patients: a post-hoc analysis.

    PubMed

    de Borst, Martin H; Nauta, Ferdau L; Vogt, Liffert; Laverman, Gozewijn D; Gansevoort, Ron T; Navis, Gerjan

    2012-01-01

    Under specific conditions non-steroidal anti-inflammatory drugs (NSAIDs) may be used to lower therapy-resistant proteinuria. The potentially beneficial anti-proteinuric, tubulo-protective, and anti-inflammatory effects of NSAIDs may be offset by an increased risk of (renal) side effects. We investigated the effect of indomethacin on urinary markers of glomerular and tubular damage and renal inflammation. We performed a post-hoc analysis of a prospective open-label crossover study in chronic kidney disease patients (n = 12) with mild renal function impairment and stable residual proteinuria of 4.7±4.1 g/d. After a wash-out period of six wks without any RAAS blocking agents or other therapy to lower proteinuria (untreated proteinuria (UP)), patients subsequently received indomethacin 75 mg BID for 4 wks (NSAID). Healthy subjects (n = 10) screened for kidney donation served as controls. Urine and plasma levels of total IgG, IgG4, KIM-1, beta-2-microglobulin, H-FABP, MCP-1 and NGAL were determined using ELISA. Following NSAID treatment, 24 h -urinary excretion of glomerular and proximal tubular damage markers was reduced in comparison with the period without anti-proteinuric treatment (total IgG: UP 131[38-513] vs NSAID 38[17-218] mg/24 h, p<0.01; IgG4: 50[16-68] vs 10[1-38] mg/24 h, p<0.001; beta-2-microglobulin: 200[55-404] vs 50[28-110] ug/24 h, p = 0.03; KIM-1: 9[5]-[14] vs 5[2]-[9] ug/24 h, p = 0.01). Fractional excretions of these damage markers were also reduced by NSAID. The distal tubular marker H-FABP showed a trend to reduction following NSAID treatment. Surprisingly, NSAID treatment did not reduce urinary excretion of the inflammation markers MCP-1 and NGAL, but did reduce plasma MCP-1 levels, resulting in an increased fractional MCP-1 excretion. In conclusion, the anti-proteinuric effect of indomethacin is associated with reduced urinary excretion of glomerular and tubular damage markers, but not with reduced excretion of renal

  17. Effective Ad-Hoc Committees.

    ERIC Educational Resources Information Center

    Young, David G.

    1983-01-01

    Ad-hoc committees may be symbolic, informational, or action committees. A literature survey indicates such committees' structural components include a suprasystem and three subsystems involving linkages, production, and implementation. Other variables include size, personal factors, and timing. All the factors carry implications about ad-hoc…

  18. Global Coverage from Ad-Hoc Constellations in Rideshare Orbits

    NASA Technical Reports Server (NTRS)

    Ellis, Armin; Mercury, Michael; Brown, Shannon

    2012-01-01

    A promising area of small satellite development is in providing higher temporal resolution than larger satellites. Traditional constellations have required specific orbits and dedicated launch vehicles. In this paper we discuss an alternative architecture in which the individual elements of the constellation are launched as rideshare opportunities. We compare the coverage of such an ad-hoc constellation with more traditional constellations. Coverage analysis is based on actual historical data from rideshare opportunities. Our analysis includes ground coverage and temporal revisits for Polar, Tropics, Temperate, and Global regions, comparing ad-hoc and Walker constellation.

  19. Impact of Bone-targeted Therapies in Chemotherapy-naïve Metastatic Castration-resistant Prostate Cancer Patients Treated with Abiraterone Acetate: Post Hoc Analysis of Study COU-AA-302

    PubMed Central

    Saad, Fred; Shore, Neal; Van Poppel, Hendrik; Rathkopf, Dana E.; Smith, Matthew R.; de Bono, Johann S.; Logothetis, Christopher J.; de Souza, Paul; Fizazi, Karim; Mulders, Peter F.A.; Mainwaring, Paul; Hainsworth, John D.; Beer, Tomasz M.; North, Scott; Fradet, Yves; Griffin, Thomas A.; De Porre, Peter; Londhe, Anil; Kheoh, Thian; Small, Eric J.; Scher, Howard I.; Molina, Arturo; Ryan, Charles J.

    2016-01-01

    Background Metastatic castration-resistant prostate cancer (mCRPC) often involves bone, and bone-targeted therapy (BTT) has become part of the overall treatment strategy. Objective Investigation of outcomes for concomitant BTT in a post hoc analysis of the COU-AA-302 trial, which demonstrated an overall clinical benefit of abiraterone acetate (AA) plus prednisone over placebo plus prednisone in asymptomatic or mildly symptomatic chemotherapy-naïve mCRPC patients. Design, setting, and participants This report describes the third interim analysis (prespecified at 55% overall survival [OS] events) for the COU-AA-302 trial. Intervention Patients were grouped by concomitant BTT use or no BTT use. Outcome measurements and statistical analysis Radiographic progression-free survival and OS were coprimary end points. This report describes the third interim analysis (prespecified at 55% OS events) and involves patients treated with or without concomitant BTT during the COU-AA-302 study. Median follow-up for OS was 27.1 mo. Median time-to-event variables with 95% confidence intervals (CIs) were estimated using the Kaplan-Meier method. Adjusted hazard ratios (HRs), 95% CIs, and p values for concomitant BTT versus no BTT were obtained via Cox models. Results and limitations While the post hoc nature of the analysis is a limitation, superiority of AA and prednisone versus prednisone alone was demonstrated for clinical outcomes with or without BTT use. Compared with no BTT use, concomitant BTT significantly improved OS (HR 0.75; p = 0.01) and increased the time to ECOG deterioration (HR 0.75; p < 0.001) and time to opiate use for cancer-related pain (HR 0.80; p = 0.036). The safety profile of concomitant BTT with AA was similar to that reported for AA in the overall intent-to-treat population. Osteonecrosis of the jaw (all grade 1/2) with concomitant BTT use was reported in <3% of patients. Conclusions AA with concomitant BTT was safe and well tolerated in men with chemotherapy

  20. Effect of smoking reduction and cessation on the plasma levels of the oxidative stress biomarker glutathione--Post-hoc analysis of data from a smoking cessation trial.

    PubMed

    Mons, Ute; Muscat, Joshua E; Modesto, Jennifer; Richie, John P; Brenner, Hermann

    2016-02-01

    Cigarette smoke contains high concentrations of free radical components that induce oxidative stress. Smoking-induced oxidative stress is thought to contribute to chronic obstructive pulmonary disease, cardiovascular disease and lung cancer through degenerative processes in the lung and other tissues. It is uncertain however whether smoking cessation lowers the burden of oxidative stress. We used data from a randomized controlled cessation trial of 434 current smokers for a post-hoc examination of the effects of smoking cessation on blood plasma levels of total glutathione (tGSH), the most abundant endogenous antioxidant in cells, and total cysteine (tCys), an amino acid and constituent of glutathione. Smoking status was validated based on serum cotinine levels. Multivariate linear mixed models were fitted to examine the association of smoking cessation and change in cigarette consumption with tGSH and tCys. After 12 months follow-up, quitters (n=55) had significantly increased levels of tGSH compared to subjects who continued to smoke (P<0.01). No significant change in tGSH was found for subjects who continued to smoke but reduced their intensity of smoking. No significant effect of smoking cessation or reduction was observed on levels of tCys. These results suggest that smoking cessation but not smoking reduction reduces levels of oxidative stress. PMID:26708755

  1. Post Hoc Analysis of a Randomized Double-Blind Trial of the Correlation of Functional and Binding Antibody Responses Elicited by 13-Valent and 7-Valent Pneumococcal Conjugate Vaccines and Association with Nasopharyngeal Colonization

    PubMed Central

    Juergens, Christine; Patterson, Scott; Trammel, James; Greenberg, David; Givon-Lavi, Noga; Cooper, David; Gurtman, Alejandra; Gruber, William C.; Scott, Daniel A.

    2014-01-01

    In a randomized double-blind trial in healthy Israeli infants in Israel who received the 13-valent or 7-valent pneumococcal conjugate vaccine (PCV13 or PCV7, respectively) at 2, 4, 6, and 12 months, PCV13 significantly reduced nasopharyngeal (NP) colonization of serotypes 1, 6A, 7F, 19A, cross-reacting 6C, and the common PCV7 serotype 19F, from ages 7 to 24 months. No differences were observed between the vaccine groups for serotype 3 or for the remaining common PCV7 serotypes. For serotype 5, too few events were observed to draw an inference. Generally consistent with these findings, PCV13 elicited significantly higher enzyme-linked immunosorbent assay (ELISA) IgG-binding antibody responses than did PCV7 for the additional PCV13 serotypes 1, 3, 5, 6A, 7F, 19A, and for the common serotype 19F, with similar or lower responses for the remaining common serotypes. To further assess immunogenicity and colonization, we conducted a post hoc analysis of PCV13 functional antibody responses measured by opsonophagocytic activity (OPA) assays in a randomly selected subset of subjects. The pattern of functional antibody OPA responses elicited by PCV13 relative to PCV7 was similar to that of the ELISA anticapsular IgG-binding antibody responses described above. In addition, the OPA responses generally correlated positively with IgG responses for all 13 serotypes among the PCV13 recipients and for all 7 common serotypes and the additional serotype 6A but not for 19A or the other serotypes unique to PCV13 among the PCV7 recipients. This post hoc analysis supports an association between serum OPA functional and IgG-binding antibody levels, allowing for a transfer of inferred associations between IgG responses and NP colonization to OPA responses. PMID:24990907

  2. A post hoc analysis of negative symptoms and psychosocial function in patients with schizophrenia: a 40-week randomized, double-blind study of ziprasidone versus haloperidol followed by a 3-year double-blind extension trial.

    PubMed

    Stahl, Stephen M; Malla, Ashok; Newcomer, John W; Potkin, Steven G; Weiden, Peter J; Harvey, Philip D; Loebel, Antony; Watsky, Eric; Siu, Cynthia O; Romano, Steve

    2010-08-01

    Schizophrenia is a persistent, lifelong illness such that enduring functional improvements may only occur over the course of years [corrected].This post hoc analysis in stable outpatients with schizophrenia investigated the negative symptom efficacy and treatment outcomes of ziprasidone (80-160 mg/d given twice a day, mean modal dose of 112 mg/d; and 80-120 mg/d given every day, mean modal dose of 96 mg/d) versus haloperidol (5-20 mg/d, mean modal dose of 12 mg/d) in a randomized, 40-week, double-blind study, followed by a double-blind continuation trial that extended up to 156 additional weeks. Symptomatic and functional recovery criteria were met when subjects attained both negative symptom remission and adequate psychosocial functioning based on the 4 Quality-of-Life subscales (instrumental role, interpersonal relations, participation in community, and intrapsychic foundations). Negative symptom remission (P = 0.005), as well as sustained adequate functioning (6 months) in instrumental role (P = 0.04) and participation in community (P = 0.02), was associated with significantly shorter time to remission in the ziprasidone 80 to 160 mg group than in the haloperidol group, as was the combination of symptomatic and functional recovery during the 196-week double-blind study period. A similar pattern was observed for the ziprasidone 80 to 120 mg group, which showed significant differences versus haloperidol in negative symptom remission and instrumental role functioning (but not other Quality-of-Life subscale measures). The clinically relevant outcome differences detected in this post hoc exploratory analysis support the potential for both enhanced remission in negative symptoms and psychosocial recovery during long-term treatment with an atypical agent and add to our understanding regarding the degree to which negative symptom remission can be attained in the maintenance phase.

  3. Trust Based Routing in Ad Hoc Network

    NASA Astrophysics Data System (ADS)

    Talati, Mikita V.; Valiveti, Sharada; Kotecha, K.

    Ad Hoc network often termed as an infrastructure-less, self- organized or spontaneous network.The execution and survival of an ad-hoc network is solely dependent upon the cooperative and trusting nature of its nodes. However, this naive dependency on intermediate nodes makes the ad-hoc network vulnerable to passive and active attacks by malicious nodes and cause inflict severe damage. A number of protocols have been developed to secure ad-hoc networks using cryptographic schemes, but all rely on the presence of trust authority. Due to mobility of nodes and limitation of resources in wireless network one interesting research area in MANET is routing. This paper offers various trust models and trust based routing protocols to improve the trustworthiness of the neighborhood.Thus it helps in selecting the most secure and trustworthy route from the available ones for the data transfer.

  4. Effect of Renin-Angiotensin-Aldosterone System Inhibition, Dietary Sodium Restriction, and/or Diuretics on Urinary Kidney Injury Molecule 1 Excretion in Nondiabetic Proteinuric Kidney Disease: A Post Hoc Analysis of a Randomized Controlled Trial

    PubMed Central

    Waanders, Femke; Vaidya, Vishal S.; van Goor, Harry; Leuvenink, Henri; Damman, Kevin; Hamming, Inge; Bonventre, Joseph V.; Vogt, Liffert; Navis, Gerjan

    2012-01-01

    Background Tubulointerstitial damage plays an important role in chronic kidney disease (CKD) with proteinuria. Urinary kidney injury molecule 1 (KIM-1) reflects tubular KIM-1 and is considered a sensitive biomarker for early tubular damage. We hypothesized that a decrease in proteinuria by using therapeutic interventions is associated with decreased urinary KIM-1 levels. Study Design Post hoc analysis of a randomized, double-blind, placebo-controlled, crossover trial. Setting & Participants 34 proteinuric patients without diabetes from our outpatient renal clinic. Intervention Stepwise 6-week interventions of losartan, sodium restriction (low-sodium [LS] diet), their combination, losartan plus hydrochlorothiazide (HCT), and the latter plus an LS diet. Outcomes & Measurements Urinary excretion of KIM-1, total protein, and N-acetyl-β-D-glucosaminidase (NAG) as a positive control for tubular injury. Results Mean baseline urine protein level was 3.8 ± 0.4 (SE) g/d, and KIM-1 level was 1,706 ± 498 ng/d (increased compared with healthy controls; 74 ng/d). KIM-1 level was decreased by using placebo/LS (1,201 ± 388 ng/d; P = 0.04), losartan/high sodium (1,184 ± 296 ng/d; P = 0.09), losartan/LS (921 ± 176 ng/d; P = 0.008), losartan/high sodium plus HCT (862 ± 151 ng/d; P = 0.008) and losartan/LS plus HCT (743 ± 170 ng/d; P = 0.001). The decrease in urinary KIM-1 levels paralleled the decrease in proteinuria (R = 0.523; P < 0.001), but not blood pressure or creatinine clearance. 16 patients reached target proteinuria with protein less than 1 g/d, whereas KIM-1 levels normalized in only 2 patients. Urinary NAG level was increased at baseline and significantly decreased during the treatment periods of combined losartan plus HCT only. The decrease in urinary NAG levels was not closely related to proteinuria. Limitations Post hoc analysis. Conclusions Urinary KIM-1 level was increased in patients with nondiabetic CKD with proteinuria and decreased in parallel with

  5. Shuttle-run synchronization in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Ma, Sheng-Fei; Bi, Hong-Jie; Zou, Yong; Liu, Zong-Hua; Guan, Shu-Guang

    2015-06-01

    In this work, we study the collective dynamics of phase oscillators in a mobile ad hoc network whose topology changes dynamically. As the network size or the communication radius of individual oscillators increases, the topology of the ad hoc network first undergoes percolation, forming a giant cluster, and then gradually achieves global connectivity. It is shown that oscillator mobility generally enhances the coherence in such networks. Interestingly, we find a new type of phase synchronization/clustering, in which the phases of the oscillators are distributed in a certain narrow range, while the instantaneous frequencies change signs frequently, leading to shuttle-run-like motion of the oscillators in phase space. We conduct a theoretical analysis to explain the mechanism of this synchronization and obtain the critical transition point.

  6. Functional impairment related to painful physical symptoms in patients with generalized anxiety disorder with or without comorbid major depressive disorder: post hoc analysis of a cross-sectional study

    PubMed Central

    2011-01-01

    Background Generalized anxiety disorder (GAD) is the most frequent anxiety disorder in primary care patients. It is known that painful physical symptoms (PPS) are associated with GAD, regardless the presence of comorbid major depressive disorder (MDD). However the specific role of such symptoms in patients' functional impairment is not well understood. The objective of the present study is to assess functional impairment related to the presence of PPS in patients with GAD. Methods This is a post hoc analysis of a cross-sectional study. Functioning, in the presence (overall pain score >30; Visual Analog Scale) or absence of PPS, was assessed using the Sheehan Disability Scale (SDS) in three groups of patients; 1) GAD and comorbid MDD (GAD+MDD+), 2) GAD without comorbid MDD (GAD+MDD-), 3) controls (GAD-MDD-). ANCOVA models were used. Results Of those patients with GAD+MDD+ (n = 559), 436 (78.0%) had PPS, compared with GAD+MDD- (249 of 422, 59%) and controls (95 of 336, 28.3%). Functioning worsened in both GAD groups in presence of PPS (SDS least squares mean total score: 16.1 vs. 9.8, p < 0.0001, GAD+MDD+; 14.3 vs. 8.2, p < 0.0001, GAD+MDD-). The presence of PPS was significantly associated with less productivity. Conclusions Functional impairment related to the presence of PPS was relevant. Clinical implications should be considered. PMID:21510887

  7. Physicians Experience with and Expectations of the Safety and Tolerability of WHO-Step III Opioids for Chronic (Low) Back Pain: Post Hoc Analysis of Data from a German Cross-Sectional Physician Survey

    PubMed Central

    Ueberall, Michael A.; Eberhardt, Alice; Mueller-Schwefe, Gerhard H. H.

    2015-01-01

    Objective. To describe physicians' daily life experience with WHO-step III opioids in the treatment of chronic (low) back pain (CLBP). Methods. Post hoc analysis of data from a cross-sectional online survey with 4.283 Germany physicians. Results. With a reported median use in 17% of affected patients, WHO-step III opioids play a minor role in treatment of CLBP in daily practice associated with a broad spectrum of positive and negative effects. If prescribed, potent opioids were reported to show clinically relevant effects (such as ≥50% pain relief) in approximately 3 of 4 patients (median 72%). Analgesic effects reported are frequently related with adverse events (AEs). Only 20% of patients were reported to remain free of any AE. Most frequently reported AE was constipation (50%), also graded highest for AE-related daily life restrictions (median 46%). Specific AE countermeasures were reported to be necessary in approximately half of patients (median 45%); nevertheless AE-related premature discontinuation rates reported were high (median 22%). Fentanyl/morphine were the most/least prevalently prescribed potent opioids mentioned (median 20 versus 8%). Conclusion. Overall, use of WHO-step III opioids for CLBP is low. AEs, especially constipation, are commonly reported and interfere significantly with analgesic effects in daily practice. Nevertheless, beneficial effects outweigh related AEs in most patients with CLBP. PMID:26568890

  8. Pooled post hoc analysis of population pharmacokinetics of oxycodone and acetaminophen following a single oral dose of biphasic immediate-release/extended-release oxycodone/acetaminophen tablets.

    PubMed

    Franke, Ryan M; Morton, Terri; Devarakonda, Krishna

    2015-01-01

    This analysis evaluated the single-dose population pharmacokinetics (PK) of biphasic immediate-release (IR)/extended-release (ER) oxycodone (OC)/acetaminophen (APAP) 7.5/325 mg tablets administered under fasted conditions and the effects of a meal on their single-dose population PK. Data were pooled from four randomized, single-dose crossover trials enrolling healthy adult (18-55 years old) participants (three trials) and nondependent recreational users of prescription opioids (one trial) with a body weight of ≥59 kg. Participants received IR/ER OC/APAP 7.5/325 mg tablets in single doses of 7.5/325 mg (one tablet), 15/650 mg (two tablets), or 30/1,300 mg (four tablets) under fasted or fed conditions. Six variables were examined: sex, race, age, weight, height, and body mass index. Single-dose population PK was analyzed using first-order conditional estimation methods. A total of 151 participants were included in the analysis under fasted conditions, and 31 participants were included in the fed analysis. Under fasted conditions, a 10% change in body weight was accompanied by ~7.5% change in total body clearance (CL/F) and volume of distribution (V/F) of OC and APAP. Black participants had 17.3% lower CL/F and a 16.9% lower V/F of OC compared with white participants. Under fed conditions, the absorption rate constant of OC and APAP decreased significantly, although there was no effect on CL/F and V/F. Considering that the recommended dose for IR/ER OC/APAP 7.5/325 mg tablets is two tablets every 12 hours, adjustments of <50% are not clinically relevant. Dose adjustment may be necessary for large deviations from average body weight, but the small PK effects associated with race and consumption of a meal are not clinically relevant.

  9. Post hoc Analysis for Detecting Individual Rare Variant Risk Associations Using Probit Regression Bayesian Variable Selection Methods in Case-Control Sequencing Studies.

    PubMed

    Larson, Nicholas B; McDonnell, Shannon; Albright, Lisa Cannon; Teerlink, Craig; Stanford, Janet; Ostrander, Elaine A; Isaacs, William B; Xu, Jianfeng; Cooney, Kathleen A; Lange, Ethan; Schleutker, Johanna; Carpten, John D; Powell, Isaac; Bailey-Wilson, Joan; Cussenot, Olivier; Cancel-Tassin, Geraldine; Giles, Graham; MacInnis, Robert; Maier, Christiane; Whittemore, Alice S; Hsieh, Chih-Lin; Wiklund, Fredrik; Catolona, William J; Foulkes, William; Mandal, Diptasri; Eeles, Rosalind; Kote-Jarai, Zsofia; Ackerman, Michael J; Olson, Timothy M; Klein, Christopher J; Thibodeau, Stephen N; Schaid, Daniel J

    2016-09-01

    Rare variants (RVs) have been shown to be significant contributors to complex disease risk. By definition, these variants have very low minor allele frequencies and traditional single-marker methods for statistical analysis are underpowered for typical sequencing study sample sizes. Multimarker burden-type approaches attempt to identify aggregation of RVs across case-control status by analyzing relatively small partitions of the genome, such as genes. However, it is generally the case that the aggregative measure would be a mixture of causal and neutral variants, and these omnibus tests do not directly provide any indication of which RVs may be driving a given association. Recently, Bayesian variable selection approaches have been proposed to identify RV associations from a large set of RVs under consideration. Although these approaches have been shown to be powerful at detecting associations at the RV level, there are often computational limitations on the total quantity of RVs under consideration and compromises are necessary for large-scale application. Here, we propose a computationally efficient alternative formulation of this method using a probit regression approach specifically capable of simultaneously analyzing hundreds to thousands of RVs. We evaluate our approach to detect causal variation on simulated data and examine sensitivity and specificity in instances of high RV dimensionality as well as apply it to pathway-level RV analysis results from a prostate cancer (PC) risk case-control sequencing study. Finally, we discuss potential extensions and future directions of this work.

  10. Post hoc Analysis for Detecting Individual Rare Variant Risk Associations Using Probit Regression Bayesian Variable Selection Methods in Case-Control Sequencing Studies.

    PubMed

    Larson, Nicholas B; McDonnell, Shannon; Albright, Lisa Cannon; Teerlink, Craig; Stanford, Janet; Ostrander, Elaine A; Isaacs, William B; Xu, Jianfeng; Cooney, Kathleen A; Lange, Ethan; Schleutker, Johanna; Carpten, John D; Powell, Isaac; Bailey-Wilson, Joan; Cussenot, Olivier; Cancel-Tassin, Geraldine; Giles, Graham; MacInnis, Robert; Maier, Christiane; Whittemore, Alice S; Hsieh, Chih-Lin; Wiklund, Fredrik; Catolona, William J; Foulkes, William; Mandal, Diptasri; Eeles, Rosalind; Kote-Jarai, Zsofia; Ackerman, Michael J; Olson, Timothy M; Klein, Christopher J; Thibodeau, Stephen N; Schaid, Daniel J

    2016-09-01

    Rare variants (RVs) have been shown to be significant contributors to complex disease risk. By definition, these variants have very low minor allele frequencies and traditional single-marker methods for statistical analysis are underpowered for typical sequencing study sample sizes. Multimarker burden-type approaches attempt to identify aggregation of RVs across case-control status by analyzing relatively small partitions of the genome, such as genes. However, it is generally the case that the aggregative measure would be a mixture of causal and neutral variants, and these omnibus tests do not directly provide any indication of which RVs may be driving a given association. Recently, Bayesian variable selection approaches have been proposed to identify RV associations from a large set of RVs under consideration. Although these approaches have been shown to be powerful at detecting associations at the RV level, there are often computational limitations on the total quantity of RVs under consideration and compromises are necessary for large-scale application. Here, we propose a computationally efficient alternative formulation of this method using a probit regression approach specifically capable of simultaneously analyzing hundreds to thousands of RVs. We evaluate our approach to detect causal variation on simulated data and examine sensitivity and specificity in instances of high RV dimensionality as well as apply it to pathway-level RV analysis results from a prostate cancer (PC) risk case-control sequencing study. Finally, we discuss potential extensions and future directions of this work. PMID:27312771

  11. Prevalence of acute and chronic viral seropositivity and characteristics of disease in patients with psoriatic arthritis treated with cyclosporine: a post hoc analysis from a sex point of view on the observational study of infectious events in psoriasis complicated by active psoriatic arthritis

    PubMed Central

    Colombo, Delia; Chimenti, Sergio; Grossi, Paolo Antonio; Marchesoni, Antonio; Bardazzi, Federico; Ayala, Fabio; Simoni, Lucia; Vassellatti, Donatella; Bellia, Gilberto

    2016-01-01

    Background Sex medicine studies have shown that there are sex differences with regard to disease characteristics in immune-mediated inflammatory diseases, including psoriasis, in immune response and susceptibility to viral infections. We performed a post hoc analysis of the Observational Study of infectious events in psoriasis complicated by active psoriatic arthritis (SYNERGY) study in patients with psoriatic arthritis (PsA) treated with immunosuppressive regimens including cyclosporine, in order to evaluate potential between-sex differences in severity of disease and prevalence of viral infections. Methods SYNERGY was an observational study conducted in 24 Italian dermatology clinics, which included 238 consecutively enrolled patients with PsA, under treatment with immunosuppressant regimens including cyclosporin A. In this post hoc analysis, patients’ demographical data and clinical characteristics of psoriasis, severity and activity of PsA, prevalence of seropositivity for at least one viral infection, and treatments administered for PsA and infections were compared between sexes. Results A total of 225 patients were evaluated in this post hoc analysis, and 121 (54%) were males. Demographic characteristics and concomitant diseases were comparable between sexes. Statistically significant sex differences were observed at baseline in Psoriasis Area and Severity Index score (higher in males), mean number of painful joints, Bath Ankylosing Spondylitis Disease Activity Index, and the global activity of disease assessed by patients (all higher in females). The percentage of patients with at least one seropositivity detected at baseline, indicative of concomitant or former viral infection, was significantly higher among women than among men. No between-sex differences were detected in other measures, at other time points, and in treatments. Patients developed no hepatitis B virus or hepatitis C virus reactivation during cyclosporine treatment. Conclusion Our post hoc

  12. Impact of mannose-binding lectin deficiency on radiocontrast-induced renal dysfunction: a post-hoc analysis of a multicenter randomized controlled trial

    PubMed Central

    2012-01-01

    Background Local renal ischemia is regarded as an important factor in the development of contrast-induced nephropathy (CIN). Mannose-binding lectin (MBL) is involved in the tissue damage during experimental ischemia/reperfusion injury of the kidneys. The aim of the present study was to investigate the association of MBL deficiency with radiocontrast-induced renal dysfunction in a large prospective cohort. Methods 246 patients with advanced non–dialysis-dependent renal dysfunction who underwent radiographic contrast procedures were included in the study. Baseline serum MBL levels were analyzed according to the occurrence of a creatinine-based (increase of ≥0.5 mg/dL or ≥25% within 48 hours) or cystatin C-based (increase of ≥10% within 24 hours) CIN. Results The incidence of creatinine-based and cystatin C-based CIN was 6.5% and 24%, respectively. MBL levels were not associated with the occurrence of creatinine-based CIN. However, patients that experienced a cystatin C increase of ≥10% showed significantly higher MBL levels than patients with a rise of <10% (median 2885 (IQR 1193–4471) vs. 1997 (IQR 439–3504)ng/mL, p = 0.01). In logistic regression analysis MBL deficiency (MBL levels≤500 ng/ml) was identified as an inverse predictor of a cystatin C increase ≥10% (OR 0.34, 95% CI 0.15-0.8, p = 0.01). Conclusion MBL deficiency was associated with a reduced radiocontrast-induced renal dysfunction as reflected by the course of cystatin C. Our findings support a possible role of MBL in the pathogenesis of CIN. PMID:22938690

  13. The lipid-lowering effects of lomitapide are unaffected by adjunctive apheresis in patients with homozygous familial hypercholesterolaemia – a post-hoc analysis of a Phase 3, single-arm, open-label trial

    PubMed Central

    Stefanutti, C; Blom, DJ; Averna, MR; Meagher, EA; Theron, HdT; Marais, AD; Hegele, RA; Sirtori, CR; Shah, PK; Gaudet, D; Vigna, GB; Sachais, BS; Di Giacomo, S; du Plessis, AME; Bloedon, LT; Balser, J; Rader, DJ; Cuchel, M

    2015-01-01

    Objective Lomitapide (a microsomal triglyceride transfer protein inhibitor) is an adjunctive treatment for homozygous familial hypercholesterolaemia (HoFH), a rare genetic condition characterised by elevated low-density lipoprotein-cholesterol (LDL-C), and premature, severe, accelerated atherosclerosis. Standard of care for HoFH includes lipid-lowering drugs and lipoprotein apheresis. We conducted a post-hoc analysis using data from a Phase 3 study to assess whether concomitant apheresis affected the lipid-lowering efficacy of lomitapide. Methods Existing lipid-lowering therapy, including apheresis, was to remain stable from Week −6 to Week 26. Lomitapide dose was escalated on the basis of individual safety/tolerability from 5 mg to 60 mg a day (maximum). The primary endpoint was mean percent change in LDL-C from baseline to Week 26 (efficacy phase), after which patients remained on lomitapide through Week 78 for safety assessment and further evaluation of efficacy. During this latter period, apheresis could be adjusted. We analysed the impact of apheresis on LDL-C reductions in patients receiving lomitapide. Results Of the 29 patients that entered the efficacy phase, 18 (62%) were receiving apheresis at baseline. Twenty-three patients (13 receiving apheresis) completed the Week 26 evaluation. Of the six patients who discontinued in the first 26 weeks, five were receiving apheresis. There were no significant differences in percent change from baseline of LDL-C at Week 26 in patients treated (−48%) and not treated (−55%) with apheresis (p=0.545). Changes in Lp(a) levels were modest and not different between groups (p=0.436). Conclusion The LDL-C lowering efficacy of lomitapide is unaffected by lipoprotein apheresis. PMID:25897792

  14. Effect of a reduction in uric acid on renal outcomes during losartan treatment: a post hoc analysis of the reduction of endpoints in non-insulin-dependent diabetes mellitus with the Angiotensin II Antagonist Losartan Trial.

    PubMed

    Miao, Yan; Ottenbros, Stefan A; Laverman, Goos D; Brenner, Barry M; Cooper, Mark E; Parving, Hans-Henrik; Grobbee, Diederick E; Shahinfar, Shahnaz; de Zeeuw, Dick; Lambers Heerspink, Hiddo J

    2011-07-01

    Emerging data show that increased serum uric acid (SUA) concentration is an independent risk factor for end-stage renal disease. Treatment with the antihypertensive drug losartan lowers SUA. Whether reductions in SUA during losartan therapy are associated with renoprotection is unclear. We therefore tested this hypothesis. In a post hoc analysis of 1342 patients with type 2 diabetes mellitus and nephropathy participating in the Reduction of Endpoints in Non-Insulin-Dependent Diabetes Mellitus With the Angiotensin II Antagonist Losartan Trial, we determined the relationship between month 6 change in SUA and renal endpoints, defined as a doubling of serum creatinine or end-stage renal disease. Baseline SUA was 6.7 mg/dL in placebo and losartan-treated subjects. During the first 6 months, losartan lowered SUA by -0.16 mg/dL (95% CI: -0.30 to -0.01; P=0.031) as compared with placebo. The risk of renal events was decreased by 6% (95% CI: 10% to 3%) per 0.5-mg/dL decrement in SUA during the first 6 months. This effect was independent of other risk markers, including estimate glomerular filtration rate and albuminuria. Adjustment of the overall treatment effects for SUA attenuated losartan's renoprotective effect from 22% (95% CI: 6% to 35%) to 17% (95% CI: 1% to 31%), suggesting that approximately one fifth of losartan's renoprotective effect could be attributed to its effect on SUA. Losartan lowers SUA levels compared with placebo treatment in patients with type 2 diabetes mellitus and nephropathy. The degree of reduction in SUA is subsequently associated with the degree in long-term renal risk reduction and explains part of losartan's renoprotective effect. These findings support the view that SUA may be a modifiable risk factor for renal disease.

  15. Is herpes zoster an additional complication in old age alongside comorbidity and multiple medications? Results of the post hoc analysis of the 12-month longitudinal prospective observational ARIZONA cohort study

    PubMed Central

    Pickering, Gisèle; Gavazzi, Gaëtan; Gaillat, Jacques; Paccalin, Marc; Bloch, Karine; Bouhassira, Didier

    2016-01-01

    Objectives To examine the burden of comorbidity, polypharmacy and herpes zoster (HZ), an infectious disease, and its main complication post-herpetic neuralgia (PHN) in young (50–70 years of age: 70−) and old (≥70 years of age: 70+) patients. Design Post hoc analysis of the results of the 12-month longitudinal prospective multicentre observational ARIZONA cohort study. Settings and participants The study took place in primary care in France from 20 November 2006 to 12 September 2008. Overall, 644 general practitioners (GPs) collected data from 1358 patients aged 50 years or more with acute eruptive HZ. Outcome measures Presence of HZ-related pain or PHN (pain persisting >3 months) was documented at day 0 and at months 3, 6, and 12. To investigate HZ and PHN burden, pain, quality of life (QoL) and mood were self-assessed using validated questionnaires (Zoster Brief Pain Inventory, 12-item Short-Form health survey and Hospital Anxiety and Depression Scale, respectively). Results As compared with younger patients, older patients more frequently presented with comorbidities, more frequently took analgesics and had poorer response on all questionnaires, indicating greater burden, at inclusion. Analgesics were more frequently prescribed to relieve acute pain or PHN in 70+ than 70− patients. Despite higher levels of medication prescription, poorer pain relief and poorer response to all questionnaires were reported in 70+ than 70− patients. Conclusions Occurrence of HZ and progression to PHN adds extra burden on top of pharmacological treatment and impaired quality of life, especially in older patients who already have health problems to cope with in everyday life. PMID:26892790

  16. Anomaly Detection Techniques for Ad Hoc Networks

    ERIC Educational Resources Information Center

    Cai, Chaoli

    2009-01-01

    Anomaly detection is an important and indispensable aspect of any computer security mechanism. Ad hoc and mobile networks consist of a number of peer mobile nodes that are capable of communicating with each other absent a fixed infrastructure. Arbitrary node movements and lack of centralized control make them vulnerable to a wide variety of…

  17. Supporting Dynamic Ad hoc Collaboration Capabilities

    SciTech Connect

    Agarwal, Deborah A.; Berket, Karlo

    2003-07-14

    Modern HENP experiments such as CMS and Atlas involve as many as 2000 collaborators around the world. Collaborations this large will be unable to meet often enough to support working closely together. Many of the tools currently available for collaboration focus on heavy-weight applications such as videoconferencing tools. While these are important, there is a more basic need for tools that support connecting physicists to work together on an ad hoc or continuous basis. Tools that support the day-to-day connectivity and underlying needs of a group of collaborators are important for providing light-weight, non-intrusive, and flexible ways to work collaboratively. Some example tools include messaging, file-sharing, and shared plot viewers. An important component of the environment is a scalable underlying communication framework. In this paper we will describe our current progress on building a dynamic and ad hoc collaboration environment and our vision for its evolution into a HENP collaboration environment.

  18. Effect of ferric carboxymaltose on serum phosphate and C-terminal FGF23 levels in non-dialysis chronic kidney disease patients: post-hoc analysis of a prospective study

    PubMed Central

    2013-01-01

    Background Some parenteral iron therapies have been found to be associated with hypophosphatemia. The mechanism of the decrease in serum phosphate is unknown. The aim of this study is to examine the effect of IV ferric carboxymaltose(FCM) on phosphate metabolism and FGF23 levels in patients with chronic kidney disease(CKD). Methods This is a post-hoc analysis of a prospective study carried out in 47 non-dialysis CKD patients with iron-deficiency anaemia who received a single 1000 mg injection of FCM. Markers of mineral metabolism (calcium, phosphate, 1,25-dihydroxyvitamin D, PTH and FGF23[c-terminal]) were measured prior to FCM administration and at week 3 and week 12 after FCM administration. Based on the measured levels of serum phosphate at week 3, patiens were classified as hypophosphatemic or non-hypophosphatemic. Results Serum phosphate levels decreased significantly three weeks after FCM administration and remained at lower levels at week 12 (4.24 ± 0.84 vs 3.69 ± 1.10 vs 3.83 ± 0.68 mg/dL, respectively, p < 0.0001. Serum calcium, PTH and 1,25-dihydroxyvitamin D did not change over the course of the study. Serum FGF23 decreased significantly from 442(44.9-4079.2) at baseline to 340(68.5-2603.3) at week 3 and 191.6(51.3-2465.9) RU/mL at week 12, p < 0.0001. Twelve patients were non-hypophosphatemic and 35 hypophosphatemic. FGF23 levels decreased in both groups, whereas no changes were documented in any of the other mineral parameters. Conclusions In non-dialysis CKD patients, FCM induces reduction in serum phosphate levels that persists for three months. FCM causes a significant decrease in FGF23 levels without changes to other bone metabolism parameters. PMID:23902731

  19. Routing Security in Ad Hoc Wireless Networks

    NASA Astrophysics Data System (ADS)

    Pervaiz, Mohammad O.; Cardei, Mihaela; Wu, Jie

    Wireless networks provide rapid, untethered access to information and computing, eliminating the barriers of distance, time, and location for many applications ranging from collaborative, distributed mobile computing to disaster recovery (such as fire, flood, earthquake), law enforcement (crowd control, search, and rescue), and military communications (command, control, surveillance, and reconnaissance). An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration [11

  20. Hybrid Packet-Pheromone-Based Probabilistic Routing for Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Kashkouli Nejad, Keyvan; Shawish, Ahmed; Jiang, Xiaohong; Horiguchi, Susumu

    Ad-Hoc networks are collections of mobile nodes communicating using wireless media without any fixed infrastructure. Minimal configuration and quick deployment make Ad-Hoc networks suitable for emergency situations like natural disasters or military conflicts. The current Ad-Hoc networks can only support either high mobility or high transmission rate at a time because they employ static approaches in their routing schemes. However, due to the continuous expansion of the Ad-Hoc network size, node-mobility and transmission rate, the development of new adaptive and dynamic routing schemes has become crucial. In this paper we propose a new routing scheme to support high transmission rates and high node-mobility simultaneously in a big Ad-Hoc network, by combining a new proposed packet-pheromone-based approach with the Hint Based Probabilistic Protocol (HBPP) for congestion avoidance with dynamic path selection in packet forwarding process. Because of using the available feedback information, the proposed algorithm does not introduce any additional overhead. The extensive simulation-based analysis conducted in this paper indicates that the proposed algorithm offers small packet-latency and achieves a significantly higher delivery probability in comparison with the available Hint-Based Probabilistic Protocol (HBPP).

  1. Energy Efficient Probabilistic Broadcasting for Mobile Ad-Hoc Network

    NASA Astrophysics Data System (ADS)

    Kumar, Sumit; Mehfuz, Shabana

    2016-08-01

    In mobile ad-hoc network (MANETs) flooding method is used for broadcasting route request (RREQ) packet from one node to another node for route discovery. This is the simplest method of broadcasting of RREQ packets but it often results in broadcast storm problem, originating collisions and congestion of packets in the network. A probabilistic broadcasting is one of the widely used broadcasting scheme for route discovery in MANETs and provides solution for broadcasting storm problem. But it does not consider limited energy of the battery of the nodes. In this paper, a new energy efficient probabilistic broadcasting (EEPB) is proposed in which probability of broadcasting RREQs is calculated with respect to remaining energy of nodes. The analysis of simulation results clearly indicate that an EEPB route discovery scheme in ad-hoc on demand distance vector (AODV) can increase the network lifetime with a decrease in the average power consumption and RREQ packet overhead. It also decreases the number of dropped packets in the network, in comparison to other EEPB schemes like energy constraint gossip (ECG), energy aware gossip (EAG), energy based gossip (EBG) and network lifetime through energy efficient broadcast gossip (NEBG).

  2. Non-Repudiation in Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tandel, Purvi; Valiveti, Sharada; Agrawal, K. P.; Kotecha, K.

    With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. In conventional network non-repudiation is achieved using protocols involving TTP. Non-repudiation in conventional network is achieved using different protocols, but in ad hoc networks due to mobility problem we can't use trusted third party (TTP). There is a scope to implement a non-repudiation protocol, which satisfies non-repudiation requirements emerged by the application in a peer-to-peer network.

  3. Worm epidemics in wireless ad hoc networks

    NASA Astrophysics Data System (ADS)

    Nekovee, Maziar

    2007-06-01

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet.

  4. Assured Information Sharing for Ad-Hoc Collaboration

    ERIC Educational Resources Information Center

    Jin, Jing

    2009-01-01

    Collaborative information sharing tends to be highly dynamic and often ad hoc among organizations. The dynamic natures and sharing patterns in ad-hoc collaboration impose a need for a comprehensive and flexible approach to reflecting and coping with the unique access control requirements associated with the environment. This dissertation…

  5. Public-key management in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Lin, Haifeng; Jiang, Anna; Bai, Di; Liu, Yunfei

    A mobile ad hoc network is a new type of wireless networking paradigm which, in general, consists of solely mobile hosts and dispenses with infrastructure. One main challenge in design of mobile ad hoc networks is the vulnerability to security attacks. Without physical boundaries, a mobile ad hoc network faces many more security threats than a wired network does. Therefore the security of mobile ad hoc networks is one of the major research interests in wireless communications. In contrast with conventional networks, public key management protocols of mobile ad hoc networks do not based on infrastructures, where we can use trusted third parties or centralized servers for key management. This is because that the topology of mobile ad hoc networks is unknown due to link and node failures and to node mobility. For these factors, traditional key management solutions which require on-line trusted authorities or certificate authorities are not suitable for securing mobile ad hoc networks. In this report, we first review some existed public-key management protocols for mobile ad hoc networks and after that we propose a fully distributed public -key management model which does not need the third trusted authority.

  6. 14 CFR 1203.903 - Ad hoc committees.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 5 2012-01-01 2012-01-01 false Ad hoc committees. 1203.903 Section 1203.903 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.903 Ad hoc committees. The Chairperson is...

  7. 14 CFR § 1203.903 - Ad hoc committees.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false Ad hoc committees. § 1203.903 Section § 1203.903 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.903 Ad hoc committees. The Chairperson...

  8. 14 CFR 1203.903 - Ad hoc committees.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false Ad hoc committees. 1203.903 Section 1203.903 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.903 Ad hoc committees. The Chairperson is...

  9. 14 CFR 1203.903 - Ad hoc committees.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Ad hoc committees. 1203.903 Section 1203.903 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.903 Ad hoc committees. The Chairperson is...

  10. 14 CFR 1203.903 - Ad hoc committees.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Ad hoc committees. 1203.903 Section 1203.903 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.903 Ad hoc committees. The Chairperson is authorized...

  11. Possible association between phages, Hoc protein, and the immune system.

    PubMed

    Dabrowska, K; Switała-Jeleń, K; Opolski, A; Górski, A

    2006-02-01

    Mammals have become "an environment" for enterobacterial phage life cycles. Therefore it could be expected that bacteriophages adapt to them. This adaptation must comprise bacteriophage proteins. Gp Hoc seems to have significance neither for phage particle structure nor for phage antibacterial activity. It is evidently not necessary for the "typical" antibacterial actions of bacteriophages. But the rules of evolution make it improbable that gp Hoc really has no function, and non-essential genes of T4-type phages are probably important for phages' adaptation to their particular lifestyle. More interesting is the eukaryotic origin of gp Hoc: a resemblance to immunoglobulin-like proteins that reflects their evolutionary relation. Substantial differences in biological activity between T4 and a mutant that lacks gp Hoc were observed in a mammalian system. Hoc protein seems to be one of the molecules predicted to interact with mammalian organisms and/or modulate these interactions. PMID:16195787

  12. Opportunistic Information Retrieval in Sparsely Connected Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Chuah, Mooi-Choo; Han, Jian-Bin

    With the advancement in technology, many users carry wireless computing de-vices e.g., PDAs, cell-phones etc. Such devices can form mobile ad hoc networks and communicate with one another via the help of intermediate nodes. Such ad hoc networks are very useful in several scenarios e.g., battlefield operations, vehicular ad hoc networks and disaster response scenarios. The ability to access important information in these scenarios is highly critical. Many ad hoc routing schemes have been designed for ad hoc networks but such routing schemes are not useful in some challenging network scenarios where the nodes have intermittent connectivity and suffer frequent partitioning. Recently, disruption tolerant network technologies [5, 12] have been proposed to allow nodes in such extreme network-ing environment to communicate with one another. Several DTN routing schemes [4, 14] have been proposed.

  13. Enhanced Weight based DSR for Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Verma, Samant; Jain, Sweta

    2011-12-01

    Routing in ad hoc network is a great problematic, since a good routing protocol must ensure fast and efficient packet forwarding, which isn't evident in ad hoc networks. In literature there exists lot of routing protocols however they don't include all the aspects of ad hoc networks as mobility, device and medium constraints which make these protocols not efficient for some configuration and categories of ad hoc networks. Thus in this paper we propose an improvement of Weight Based DSR in order to include some of the aspects of ad hoc networks as stability, remaining battery power, load and trust factor and proposing a new approach Enhanced Weight Based DSR.

  14. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks.

    PubMed

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV. PMID:27258013

  15. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks

    PubMed Central

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV. PMID:27258013

  16. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks.

    PubMed

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV.

  17. Ad-hoc surface-enhanced Raman spectroscopy methodologies for the detection of artist dyestuffs: thin layer chromatography-surface enhanced Raman spectroscopy and in situ on the fiber analysis.

    PubMed

    Brosseau, Christa L; Gambardella, Alessa; Casadio, Francesca; Grzywacz, Cecily M; Wouters, Jan; Van Duyne, Richard P

    2009-04-15

    Tailored ad-hoc methods must be developed for successful identification of minute amounts of natural dyes on works of art using Surface-Enhanced Raman Spectroscopy (SERS). This article details two of these successful approaches using silver film over nanosphere (AgFON) substrates and silica gel coupled with citrate-reduced Ag colloids. The latter substrate functions as the test system for the coupling of thin-layer chromatography and SERS (TLC-SERS), which has been used in the current research to separate and characterize a mixture of several artists' dyes. The poor limit of detection of TLC is overcome by coupling with SERS, and dyes which co-elute to nearly the same spot can be distinguished from each other. In addition, in situ extractionless non-hydrolysis SERS was used to analyze dyed reference fibers, as well as historical textile fibers. Colorants such as alizarin, purpurin, carminic acid, lac dye, crocin, and Cape jasmine were thus successfully identified. PMID:19317457

  18. Spontaneous ad hoc mobile cloud computing network.

    PubMed

    Lacuesta, Raquel; Lloret, Jaime; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes.

  19. Malicious node detection in ad-hoc wireless networks

    NASA Astrophysics Data System (ADS)

    Griswold, Richard L.; Medidi, Sirisha R.

    2003-07-01

    Advances in wireless communications and the proliferation of mobile computing devices has led to the rise of a new type of computer network: the ad-hoc wireless network. Ad-hoc networks are characterized by a lack of fixed infrastructure, which give ad-hoc networks a great deal of flexibility, but also increases the risk of security problems. In wired networks, key pieces of network infrastructure are secured to prevent unauthorized physical access and tampering. Network administrators ensure that everything is properly configured and are on-hand to fix problems and deal with intrusions. In contrast, the nodes in an ad-hoc network are responsible for routing and forwarding data in the network, and there are no network administrators to handle potential problems. This makes an ad-hoc network more vulnerable to a misconfigured, faulty, or compromised node. We propose a means for a node in an ad-hoc network to detect and handle these malicious nodes by comparing data available to the routing protocol, such as cached routes in Dynamic Source Routing, ICMP messages, and transport layer information, such as TCP timeouts. This data can then be used along with network probes to isolate the malicious node.

  20. Why HOC+ is detectable in interstellar clouds: the rate of the reaction between HOC+ and H2

    PubMed

    Herbst, E; Woon, D E

    1996-06-01

    The recent confirmation by Ziurys and Apponi of the detection of HOC+ toward Sgr B2 (OH), and their identification of the ion in Orion-KL and several other sources show that HOC+ is far more abundant than predicted by previous ion-molecule models. In these models, the reaction HOC(+) + H2 --> HCO(+) + H2 is assumed to rapidly destroy HOC+, based on the results of a prior calculation. We have recalculated the rate of this reaction as a function of temperature using a new ab initio potential surface and a phase space approach to the dynamics which includes tunneling. The newly calculated rate is small (< or = 1 x 10(-10) cm3 s-1) at temperatures under 100 K.

  1. Why HOC+ is detectable in interstellar clouds: the rate of the reaction between HOC+ and H2

    NASA Technical Reports Server (NTRS)

    Herbst, E.; Woon, D. E.

    1996-01-01

    The recent confirmation by Ziurys and Apponi of the detection of HOC+ toward Sgr B2 (OH), and their identification of the ion in Orion-KL and several other sources show that HOC+ is far more abundant than predicted by previous ion-molecule models. In these models, the reaction HOC(+) + H2 --> HCO(+) + H2 is assumed to rapidly destroy HOC+, based on the results of a prior calculation. We have recalculated the rate of this reaction as a function of temperature using a new ab initio potential surface and a phase space approach to the dynamics which includes tunneling. The newly calculated rate is small (< or = 1 x 10(-10) cm3 s-1) at temperatures under 100 K.

  2. An Optimal CDS Construction Algorithm with Activity Scheduling in Ad Hoc Networks.

    PubMed

    Penumalli, Chakradhar; Palanichamy, Yogesh

    2015-01-01

    A new energy efficient optimal Connected Dominating Set (CDS) algorithm with activity scheduling for mobile ad hoc networks (MANETs) is proposed. This algorithm achieves energy efficiency by minimizing the Broadcast Storm Problem [BSP] and at the same time considering the node's remaining energy. The Connected Dominating Set is widely used as a virtual backbone or spine in mobile ad hoc networks [MANETs] or Wireless Sensor Networks [WSN]. The CDS of a graph representing a network has a significant impact on an efficient design of routing protocol in wireless networks. Here the CDS is a distributed algorithm with activity scheduling based on unit disk graph [UDG]. The node's mobility and residual energy (RE) are considered as parameters in the construction of stable optimal energy efficient CDS. The performance is evaluated at various node densities, various transmission ranges, and mobility rates. The theoretical analysis and simulation results of this algorithm are also presented which yield better results.

  3. Scaling of critical connectivity of mobile ad hoc networks.

    PubMed

    Wang, Li; Zhu, Chen-Ping; Gu, Zhi-Ming

    2008-12-01

    In this paper, critical global connectivity of mobile ad hoc networks (MANETs) is investigated. We model the two-dimensional plane on which nodes move randomly with a triangular lattice. Demanding the best communication of the network, we account the global connectivity eta as a function of occupancy sigma of sites in the lattice by mobile nodes. Critical phenomena of the connectivity for different transmission ranges r are revealed by numerical simulations, and these results fit well to the analysis based on the assumption of homogeneous mixing. Scaling behavior of the connectivity is found as eta approximately f(R;{beta}sigma) , where R=(r-r_{0})r_{0} , r_{0} is the length unit of the triangular lattice, and beta is the scaling index in the universal function f(x) . The model serves as a sort of geometric distance-dependent site percolation on dynamic complex networks. Moreover, near each critical sigma_{c}(r) corresponding to certain transmission range r , there exists a cutoff degree k_{c} below which the clustering coefficient of such self-organized networks keeps a constant while the averaged nearest-neighbor degree exhibits a unique linear variation with the degree k , which may be useful to the designation of real MANETs.

  4. Comparison of efficacy and safety of two starting insulin regimens in non-Asian, Asian Indian, and East Asian patients with type 2 diabetes: a post hoc analysis of the PARADIGM study

    PubMed Central

    Ji, Linong; Min, Kyung Wan; Oliveira, Juliana; Lew, Thomas; Duan, Ran

    2016-01-01

    Objective The objective of this study was to explore the efficacy and safety of insulin lispro mix 25 (25% insulin lispro and 75% insulin lispro protamine suspension [LM25]) or insulin glargine plus insulin lispro (G+L) in insulin-naïve patients with type 2 diabetes from different racial/ethnic groups. Methods Three subgroups from the PARADIGM study were analyzed post hoc: non-Asian (n=130), Asian Indian (n=106), and East Asian (n=89). Results All subgroups recorded glycated hemoglobin (HbA1c) reductions: non-Asian (LM25, −2.07%; G+L, −2.05%), Asian Indian (LM25, −1.75%; G+L, −1.60%), and East Asian (LM25, −2.03%; G+L, −1.76%); end point HbA1c values were higher in Asian Indians and East Asians than in non-Asians. Fewer Asian Indians (LM25, 43.2%; G+L, 29.2%) and East Asians (LM25, 37.5%; G+L, 36.1%) reached HbA1c <7% versus non-Asians (LM25, 51.7%; G+L, 48.1%); differences were not significant (P=0.12 and P=0.06, respectively). The mean total daily insulin dose (U/kg) for non-Asians was 0.67 (LM25) and 0.61 (G+L), for Asian Indians was 0.91 (LM25) and 0.90 (G+L), and for East Asians was 0.53 (LM25) and 0.59 (G+L). The ratio of mealtime to total insulin dose in the G+L arm for non-Asians was 0.19±0.23, for Asian Indians was 0.33±0.25, and for East Asians was 0.34±0.27. Overall incidence (%) of hypoglycemia in non-Asians was 94.1 (LM25) and 91.8 (G+L), in Asian Indians was 90.4 (LM25) and 88.5 (G+L), and in East Asians was 69.8 (LM25) and 77.3 (G+L). Conclusion Asian Indians showed least improvement in glycemic HbA1c reduction despite greater insulin use. East Asians and non-Asians achieved similar HbA1c reduction in the LM25 arm with a lower rate of hypoglycemia. Asians required more mealtime insulin coverage than non-Asians. This study added important insight into the effect of ethnicity on insulin treatment outcomes in patients with type 2 diabetes. PMID:27563254

  5. Strategies for generating multiple instances of common and ad hoc categories.

    PubMed

    Vallée-Tourangeau, F; Anthony, S H; Austin, N G

    1998-09-01

    In a free-emission procedure participants were asked to generate instances of a given category and to report, retrospectively, the strategies that they were aware of using in retrieving instances. In two studies reported here, participants generated instances for common categories (e.g. fruit) and for ad hoc categories (e.g., things people keep in their pockets) for 90 seconds and for each category described how they had proceeded in doing so. Analysis of the protocols identified three broad classes of strategy: (1) experiential, where memories of specific or generic personal experiences involving interactions with the category instances acted as cues; (2) semantic, where a consideration of abstract conceptual characteristics of a category were employed to retrieve category exemplars; (3) unmediated, where instances were effortlessly retrieved without mediating cognitions of which subjects were aware. Experiential strategies outnumbered semantic strategies (on average 4 to 1) not only for ad hoc categories but also for common categories. This pattern was noticeably reversed for ad hoc categories that subjects were unlikely to have experienced personally (e.g. things sold on the black market in Russia). Whereas more traditional accounts of semantic memory have favoured decontextualised abstract representations of category knowledge, to the extent that mode of access informs us of knowledge structures, our data suggest that category knowledge is significantly grounded in terms of everyday contexts where category instances are encountered. PMID:10197163

  6. Tri-Squared Mean Cross Comparative Analysis: An Advanced Post Hoc Qualitative and Quantitative Metric for a More In-Depth Examination of the Initial Research Outcomes of the Tri-Square Test

    ERIC Educational Resources Information Center

    Osler, James Edward

    2013-01-01

    This monograph provides an epistemological rational for the design of an advanced novel analysis metric. The metric is designed to analyze the outcomes of the Tri-Squared Test. This methodology is referred to as: "Tri-Squared Mean Cross Comparative Analysis" (given the acronym TSMCCA). Tri-Squared Mean Cross Comparative Analysis involves…

  7. Auto-configuration protocols in mobile ad hoc networks.

    PubMed

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity.

  8. Multichannel MAC Layer In Mobile Ad—Hoc Network

    NASA Astrophysics Data System (ADS)

    Logesh, K.; Rao, Samba Siva

    2010-11-01

    This paper we presented the design objectives and technical challenges in Multichannel MAC protocols in Mobile Ad-hoc Network. In IEEE 802.11 a/b/g standards allow use of multiple channels, only a single channel is popularly used, due to the lack of efficient protocols that enable use of Multiple Channels. Even though complex environments in ad hoc networks require a combined control of physical (PHY) and medium access control (MAC) layers resources in order to optimize performance. And also we discuss the characteristics of cross-layer frame and give a multichannel MAC approach.

  9. 14 CFR § 1203.1002 - Ad hoc committees.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false Ad hoc committees. § 1203.1002 Section § 1203.1002 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Special Access Programs (SAP) and Sensitive Compartmented Information (SCI) Programs...

  10. A Multivariate Kruskal-Wallis Test with Post Hoc Procedures.

    ERIC Educational Resources Information Center

    Katz, Barry M.; McSweeney, Maryellen

    1980-01-01

    An explicit statement of a statistic which is a nonparametric analog to one-way MANOVA is presented. The statistic is a multivariate extension of the nonparametric Kruskal-Wallis test (1952). In addition two post hoc procedures are developed and compared. (Author/JKS)

  11. Project "Freestyle": Ad Hoc: Fast-Turn-Around Evaluation.

    ERIC Educational Resources Information Center

    Smith, Karen

    Project "Freestyle" involved the development of prototypical television materials and a comic book intended to combat sex-role stereotyping in career-related attitudes of nine to twelve-year-old children. At various times during the early developmental stages of "Freestyle" materials, "ad hoc fast-turn-around" formative evaluations were conducted.…

  12. Ad Hoc Technical Committee for Vocational Agriculture. Final Report.

    ERIC Educational Resources Information Center

    Indiana State Commission on Vocational and Technical Education, Indianapolis.

    The goal of the Ad Hoc Technical Committee for Vocational Agriculture in Indiana was to develop a model and recommendations that would result in improved student knowledge and skills for the present and future, address labor market needs, and promote program excellence at all levels of education. The committee developed recommendations for…

  13. CSR: Constrained Selfish Routing in Ad-Hoc Networks

    NASA Astrophysics Data System (ADS)

    Bassem, Christine; Bestavros, Azer

    Routing protocols for ad-hoc networks assume that the nodes forming the network are either under a single authority, or else that they would be altruistically forwarding data for other nodes with no expectation of a return. These assumptions are unrealistic since in ad-hoc networks, nodes are likely to be autonomous and rational (selfish), and thus unwilling to help unless they have an incentive to do so. Providing such incentives is an important aspect that should be considered when designing ad-hoc routing protocols. In this paper, we propose a dynamic, decentralized routing protocol for ad-hoc networks that provides incentives in the form of payments to intermediate nodes used to forward data for others. In our Constrained Selfish Routing (CSR) protocol, game-theoretic approaches are used to calculate payments (incentives) that ensure both the truthfulness of participating nodes and the fairness of the CSR protocol. We show through simulations that CSR is an energy efficient protocol and that it provides lower communication overhead in the best and average cases compared to existing approaches.

  14. Providing Location Security in Vehicular Ad Hoc Networks

    ERIC Educational Resources Information Center

    Yan, Gongjun

    2010-01-01

    Location is fundamental information in Vehicular Ad-hoc Networks (VANETs). Almost all VANET applications rely on location information. Therefore it is of importance to ensure location information integrity, meaning that location information is original (from the generator), correct (not bogus or fabricated) and unmodified (value not changed). We…

  15. Routing in Ad Hoc Network Using Ant Colony Optimization

    NASA Astrophysics Data System (ADS)

    Khanpara, Pimal; Valiveti, Sharada; Kotecha, K.

    The ad hoc networks have dynamic topology and are infrastructure less. So it is required to implement a new network protocol for providing efficient end to end communication based on TCP/IP structure. There is a need to re-define or modify the functions of each layer of TCP/IP model to provide end to end communication between nodes. The mobility of the nodes and the limited resources are the main reason for this change. The main challenge in ad hoc networks is routing. Due to the mobility of the nodes in the ad hoc networks, routing becomes very difficult. Ant based algorithms are suitable for routing in ad hoc networks due to its dynamic nature and adaptive behavior. There are number of routing algorithms based on the concept of ant colony optimizations. It is quite difficult to determine the best ant based algorithm for routing as these algorithms perform differently under various circumstances such as the traffic distribution and network topology. In this paper, the overview of such routing algorithms is given.

  16. Ad hoc CubeSat constellations: Secondary launch coverage and distribution

    NASA Astrophysics Data System (ADS)

    Marinan, A.; Nicholas, A.; Cahoy, K.

    The primary purpose of a constellation is to obtain global measurements with improved spatial and temporal resolution. The small size, low cost, standardized form factor, and increasing availability of commercial parts for CubeSats make them ideal for use in constellations. However, without taking advantage of secondary payload opportunities, it would be costly to launch and distribute a CubeSat constellation into a specific configuration. A cost-effective way to launch a constellation of CubeSats is via consecutive secondary payload launch opportunities, but the resulting constellation would be an ad hoc mix of orbit parameters. We focus on the feasibility of cobbling together constellation-like functionality from multiple secondary payload opportunities. Each participating CubeSat (or set of CubeSats) per launch could have completely different orbital parameters, even without propulsion onboard the CubeSats or intermediate transfer carriers. We look at the ground coverages that could be obtained for a constellation of five to six orbital planes with one to six satellites in each plane. We analyze past and announced future launch opportunities for CubeSats, including launch platforms supported by the NASA Educational Launch of Nanosatellites (ELaNa). We consider combinations of possible launch locations and temporal spacings over the course of one year and simulate the resulting ground coverage patterns and revisit times for an ad hoc constellation using these launch opportunities. We perform this analysis for two separate case studies - one with only US launches and one with both US and non-US opportunities - and vary the number of satellites per orbital plane. Typical CubeSat mission lifetimes and deorbit times for low-altitude orbits are included in these analyses. The ad hoc constellation results are compared to coverage from uniformly-placed LEO constellations and are quantified in terms of revisit time, time to 100% global coverage, and response time. For mu

  17. Effusion of hydrophobic organic compounds (HOCs) from fog droplets

    SciTech Connect

    Lee, W.M.; Tsay, C.

    1998-12-31

    In this study, the effects of surface-active substances, pH and salt on the effusion of HOCs from droplets were investigated. An HOCs-effusion reactor was established for experiments. N-octane was used for the HOCs and Sodium Dodecyl Sulfate (SDS) was selected as the surface-active substance. A correction factor to mass exchange constant, defined as the deviation of exchange constant of n-octane in fog phase from that in planar aqueous phase was used to quantify the effects of surface-active substance, pH, and salt concentration on the effusion rate of HOCs from fog droplets by a modified double-layer diffusion model. The results showed that surface-active substances, SDS cab decrease the effusion rate of n-octane from fog droplets by about 40%--62% and the values of were in the range of 0.382 to 0.609. The salt, sodium chloride, at the concentration of 1.00 {times} 10{sup {minus}3} [M] can further decrease the mass transfer rate of n-octane from fog droplets because the values changed from 0.590 to 0.368, so that the effusion rate was further decrease by salt. When pH values were between 5.60 and 2.00, values varied from 0.609 to 0.367 at SDS concentration of 1.00 x 10{sup 3}[M]. This indicated that the effusion rate of HOCs from fog droplets decreased with decreasing pH value.

  18. Managing daily intensive care activities: An observational study concerning ad hoc decision making of charge nurses and intensivists

    PubMed Central

    2011-01-01

    Introduction Management of daily activities in ICUs is challenging. ICU shift leaders, charge nurses and intensivists have to make several immediate ad hoc decisions to enable the fluent flow of ICU activities. Even though the management of ICU activities is quite well delineated by international consensus guidelines, we know only a little about the content of the real clinical decision making of ICU shift leaders. Methods We conducted an observational study with the think-aloud technique to describe the ad hoc decision making of ICU shift leaders. The study was performed in two university-affiliated hospital ICUs. Twelve charge nurses and eight intensivists were recruited. Observations were recorded and transcribed for qualitative content analysis using the protocol analysis method. The software program NVivo 7 was used to manage the data. The interrater agreement was assessed with percentages and by Cohen's κ. Results We identified 463 ad hoc decisions made by the charge nurses and 444 made by the intensivists. During our data collection time, this breaks down to over 230 immediately made decisions per day (24 hours). We divided the ad hoc decision making of ICU shift leaders into two types: process-focused and situation-focused. Process-focused decision making included more permanent information, such as human resources, know-how and material resources, whereas situation-focused decision making included decisions about single events, such as patient admission. We named eight different categories for ICU ad hoc decision making: (1) adverse events, (2) diagnostics, (3) human resources and know-how, (4) material resources, (5) patient admission, (6) patient discharge, (7) patient information and vital signs and (8) special treatments. Conclusions ICU shift leaders make a great number of complex ad hoc decisions throughout the day. Often this decision making involves both intensivists and charge nurses. It forms a bundle that requires versatile, immediate

  19. Performance Impacts of Lower-Layer Cryptographic Methods in Mobile Wireless Ad Hoc Networks

    SciTech Connect

    VAN LEEUWEN, BRIAN P.; TORGERSON, MARK D.

    2002-10-01

    In high consequence systems, all layers of the protocol stack need security features. If network and data-link layer control messages are not secured, a network may be open to adversarial manipulation. The open nature of the wireless channel makes mobile wireless mobile ad hoc networks (MANETs) especially vulnerable to control plane manipulation. The objective of this research is to investigate MANET performance issues when cryptographic processing delays are applied at the data-link layer. The results of analysis are combined with modeling and simulation experiments to show that network performance in MANETs is highly sensitive to the cryptographic overhead.

  20. 29 CFR 1912.11 - Terms of ad hoc committee members.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 7 2010-07-01 2010-07-01 false Terms of ad hoc committee members. 1912.11 Section 1912.11..., DEPARTMENT OF LABOR (CONTINUED) ADVISORY COMMITTEES ON STANDARDS Organizational Matters § 1912.11 Terms of ad hoc committee members. Each member of an ad hoc advisory committee shall serve for such period as...

  1. 75 FR 43565 - NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ... SPACE ADMINISTRATION NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting AGENCY... Administration announces a two-part meeting of the Ad-Hoc Task Force on Planetary Defense of the NASA Advisory...@nasa.gov . SUPPLEMENTARY INFORMATION: The agenda topic is: Drafting of the Ad-Hoc Task Force...

  2. 75 FR 15742 - NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-30

    ... SPACE ADMINISTRATION NASA Advisory Council; Ad-Hoc Task Force on Planetary Defense; Meeting AGENCY... Administration announces a meeting of the Ad-Hoc Task Force on Planetary Defense of the NASA Advisory Council... include: Ad-Hoc Task Force on Planetary Defense Terms of Reference. NASA Near Earth Object (NEO)...

  3. Determination of endogenous concentration of γ-hydroxybutyric acid (GHB) in hair through an ad hoc GC-MS analysis: A study on a wide population and influence of gender and age.

    PubMed

    Vaiano, Fabio; Serpelloni, Giovanni; Furlanetto, Sandra; Palumbo, Diego; Mari, Francesco; Fioravanti, Alessia; Bertol, Elisabetta

    2016-01-25

    γ-Hydroxybutyric acid (GHB) spread for recreational purposes or as "rape drug" represents a hard issue for forensic toxicologists due to its endogenous nature. It is clear that an actual and reliable discrimination between basal and exogenous levels is mandatory to achieve a correct evaluation of conscious/unconscious administration. This research aimed to study the GHB baseline in hair samples, collected from 150 volunteers, non-consumers of any drugs of abuse, in order to evaluate if a generic cut-off value could be accepted, also focusing on potential influences of gender and age. The analysis consisted of an overnight incubation with NaOH at 56 °C, liquid-liquid extraction with ethylacetate and trimethylsylil derivatization. Detection was carried out through gas chromatography-mass spectrometry in single ion monitoring (m/z 233, 234, 147 for GHB; m/z 239, 240 and 147 for GHB-d6). The endogenous amount in "blank" hair was estimated by the standard addition method. Concentration range was 0.279-2.839 ng/mg. In males, the average GHB levels were higher than in females (0.829 vs 0.596 ng/mg, respectively), especially in the first age category (<30 years, 1.008 vs 0.606 ng/mg, respectively). Age influences on GHB levels seemed to be different among the two sexes: in male population concentrations were higher <30 (1.008 ng/mg) and similar in the other age ranges (0.762 ng/mg, 30-50; 0.763 ng/mg, >50); in female, quite similar levels were registered throughout all the age categories (0.606 ng/mg, <30; 0.536 ng/mg, 30-50; 0.691 ng/mg, >50). Further study should be performed on GHB physiology in order to better understand these differences among ages and genders. Moreover, we demonstrated that for hair analysis a cut-off reference value is not strictly mandatory, underlining the great interpretative valence of segmental analysis.

  4. The effect of galantamine on brain atrophy rate in subjects with mild cognitive impairment is modified by apolipoprotein E genotype: post-hoc analysis of data from a randomized controlled trial

    PubMed Central

    2014-01-01

    Introduction The aim of this investigation was to assess the effect of galantamine, an acetylcholinesterase inhibitor and allosteric modulator of nicotinic receptors, on brain atrophy in individuals with mild cognitive impairment (MCI), and to assess effect modification by apolipoprotein E (APOE) genotype. Methods We used data from the Galantamine-International-11 (Gal-Int-11) trial, a 24-month, randomized, double blind, placebo-controlled, flexible-dose (16 to 24 mg daily) study in patients with MCI. Brain magnetic resonance imaging (MRI), including a 3-dimensional T1-weighted gradient echo volumetric sequence, was performed at screening and at 24 months. We recorded whole brain and hippocampal volumes, and calculated annual atrophy rates. Linear regression analysis was used to calculate adjusted mean differences in the rate of whole brain and hippocampal atrophy, between MCI patients treated with galantamine and with placebo. Additionally, we performed stratified analyses according to APOE genotype. Results Data from 364 MCI patients with 24-month MRI data (galantamine, n = 176; placebo, n = 188) were included in the volumetric analysis. Subjects treated with galantamine demonstrated a lower rate of whole brain atrophy compared to those treated with placebo (adjusted mean difference 0.18% per year (95% confidence interval (CI) 0.04; 0.30)). Stratified analyses according to APOE genotype, showed that this effect was confined to patients who carried an APOE ϵ4 allele (adjusted mean difference 0.28% per year (95% CI 0.07; 0.50)). Rates of hippocampal atrophy did not differ significantly between study groups. Conclusions Patients with MCI who were treated with galantamine demonstrated a lower rate of whole brain atrophy, but not of hippocampal atrophy, over a 24-month treatment period, compared to those treated with placebo. This protective effect of galantamine on whole brain atrophy rate in MCI was only present in APOE ϵ4 carriers. PMID:25478019

  5. Metadata-driven Ad Hoc Query of Patient Data

    PubMed Central

    Deshpande, Aniruddha M.; Brandt, Cynthia; Nadkarni, Prakash M.

    2002-01-01

    Clinical study data management systems (CSDMSs) have many similarities to clinical patient record systems (CPRSs) in their focus on recording clinical parameters. Requirements for ad hoc query interfaces for both systems would therefore appear to be highly similar. However, a clinical study is concerned primarily with collective responses of groups of subjects to standardized therapeutic interventions for the same underlying clinical condition. The parameters that are recorded in CSDMSs tend to be more diverse than those required for patient management in non-research settings, because of the greater emphasis on questionnaires for which responses to each question are recorded separately. The differences between CSDMSs and CPRSs are reflected in the metadata that support the respective systems' operation, and need to be reflected in the query interfaces. The authors describe major revisions of their previously described CSDMS ad hoc query interface to meet CSDMS needs more fully, as well as its porting to a Web-based platform. PMID:12087118

  6. Efficacy and safety of liraglutide, a once-daily human glucagon-like peptide-1 analogue, in Latino/Hispanic patients with type 2 diabetes: post hoc analysis of data from four phase III trials.

    PubMed

    Davidson, J A; Ørsted, D D; Campos, C

    2016-07-01

    The aim of the present analysis was to evaluate the efficacy of the glucagon-like peptide-1 receptor agonist liraglutide in Latino/Hispanic individuals with type 2 diabetes, in addition to comparing its treatment effects with those observed in non-Latino/Hispanic individuals. Analyses were performed on patient-level data from a subset of individuals self-defined as Latino/Hispanic from four phase III studies, the LEAD-3, LEAD-4, LEAD-6 and 1860-LIRA-DPP-4 trials. Endpoints included change in glycated haemoglobin (HbA1c) and body weight from baseline. In Latino/Hispanic patients (n = 505; 323 treated with liraglutide) after 26 weeks, mean HbA1c reductions were significantly greater with both liraglutide 1.2 and 1.8 mg versus comparator or placebo in the LEAD-3 and LEAD-4 studies, and with 1.8 mg liraglutide in the 1860-LIRA-DPP-4 trial. In LEAD-3 both doses led to significant differences in body weight change among Latino/Hispanic patients versus the comparator. With 1.8 mg liraglutide, difference in weight change was significant only in the 1860-LIRA-DPP-4 trial versus sitagliptin. For both endpoints Latino/Hispanic and non-Latino/Hispanic patients responded to liraglutide similarly. In summary, liraglutide is efficacious for treatment of type 2 diabetes in Latino/Hispanic patients, with a similar efficacy to that seen in non-Latino/Hispanic patients. PMID:26936426

  7. Calculations concerning the HCO+/HOC+ abundance ratio in dense interstellar clouds.

    PubMed

    DeFrees, D J; McLean, A D; Herbst, E

    1984-04-01

    Calculations have been performed to determine the rate coefficients of several reactions involved in both the formation and depletion of interstellar HCO+ and HOC+. The abundance of HOC+ deduced from these calculations is consistent with the tentative identification of HOC+ in Sgr B2 by Woods et al. The large HCO+/HOC+ abundance ratio observed by Woods et al. is due at least in part to a more rapid formation rate for HCO+ and probably due as well as to a more rapid depletion rate for HOC+.

  8. Quality measure attainment with dapagliflozin plus metformin extended-release as initial combination therapy in patients with type 2 diabetes: a post hoc pooled analysis of two clinical studies

    PubMed Central

    Bell, Kelly F; Katz, Arie; Sheehan, John J

    2016-01-01

    Background The use of quality measures attempts to improve safety and health outcomes and to reduce costs. In two Phase III trials in treatment-naive patients with type 2 diabetes, dapagliflozin 5 or 10 mg/d as initial combination therapy with metformin extended-release (XR) significantly reduced glycated hemoglobin (A1C) from baseline to 24 weeks and allowed higher proportions of patients to achieve A1C <7% vs dapagliflozin or metformin monotherapy. Objective A pooled analysis of data from these two studies assessed the effect of dapagliflozin 5 or 10 mg/d plus metformin XR (combination therapy) compared with placebo plus metformin XR (metformin monotherapy) on diabetes quality measures. Quality measures include laboratory measures of A1C and low-density lipoprotein cholesterol (LDL-C) as well as vital status measures of blood pressure (BP) and body mass index (BMI). The proportion of patients achieving A1C, BP, and LDL-C individual and composite measures was assessed, as was the proportion with baseline BMI ≥25 kg/m2 who lost ≥4.5 kg. Subgroup analyses by baseline BMI were also performed. Results A total of 194 and 211 patients were treated with dapagliflozin 5- or 10-mg/d combination therapy, respectively, and 409 with metformin monotherapy. Significantly higher proportions of patients achieved A1C ≤6.5%, <7%, or <8% with combination therapy vs metformin monotherapy (P<0.02). Significantly higher proportions of patients achieved BP <140/90 mmHg (P<0.02 for each dapagliflozin dose) and BP <130/80 mmHg (P<0.02 with dapagliflozin 5 mg/d only) with combination therapy vs metformin monotherapy. Similar proportions (29%–33%) of patients had LDL-C <100 mg/dL across treatment groups. A higher proportion of patients with baseline BMI ≥25 kg/m2 lost ≥4.5 kg with combination therapy. Combination therapy had a more robust effect on patients with higher baseline BMI. Conclusion Initial combination therapy with dapagliflozin 5 or 10 mg/d and metformin improved

  9. MAC protocol for ad hoc networks using a genetic algorithm.

    PubMed

    Elizarraras, Omar; Panduro, Marco; Méndez, Aldo L; Reyna, Alberto

    2014-01-01

    The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR) and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC) protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access) for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15%) compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput.

  10. MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm

    PubMed Central

    Elizarraras, Omar; Panduro, Marco; Méndez, Aldo L.

    2014-01-01

    The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR) and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC) protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access) for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15%) compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput. PMID:25140339

  11. Auto-configuration protocols in mobile ad hoc networks.

    PubMed

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  12. MWAHCA: a multimedia wireless ad hoc cluster architecture.

    PubMed

    Diaz, Juan R; Lloret, Jaime; Jimenez, Jose M; Sendra, Sandra

    2014-01-01

    Wireless Ad hoc networks provide a flexible and adaptable infrastructure to transport data over a great variety of environments. Recently, real-time audio and video data transmission has been increased due to the appearance of many multimedia applications. One of the major challenges is to ensure the quality of multimedia streams when they have passed through a wireless ad hoc network. It requires adapting the network architecture to the multimedia QoS requirements. In this paper we propose a new architecture to organize and manage cluster-based ad hoc networks in order to provide multimedia streams. Proposed architecture adapts the network wireless topology in order to improve the quality of audio and video transmissions. In order to achieve this goal, the architecture uses some information such as each node's capacity and the QoS parameters (bandwidth, delay, jitter, and packet loss). The architecture splits the network into clusters which are specialized in specific multimedia traffic. The real system performance study provided at the end of the paper will demonstrate the feasibility of the proposal.

  13. MWAHCA: A Multimedia Wireless Ad Hoc Cluster Architecture

    PubMed Central

    Diaz, Juan R.; Jimenez, Jose M.; Sendra, Sandra

    2014-01-01

    Wireless Ad hoc networks provide a flexible and adaptable infrastructure to transport data over a great variety of environments. Recently, real-time audio and video data transmission has been increased due to the appearance of many multimedia applications. One of the major challenges is to ensure the quality of multimedia streams when they have passed through a wireless ad hoc network. It requires adapting the network architecture to the multimedia QoS requirements. In this paper we propose a new architecture to organize and manage cluster-based ad hoc networks in order to provide multimedia streams. Proposed architecture adapts the network wireless topology in order to improve the quality of audio and video transmissions. In order to achieve this goal, the architecture uses some information such as each node's capacity and the QoS parameters (bandwidth, delay, jitter, and packet loss). The architecture splits the network into clusters which are specialized in specific multimedia traffic. The real system performance study provided at the end of the paper will demonstrate the feasibility of the proposal. PMID:24737996

  14. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    PubMed Central

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  15. Post hoc analysis of the PATRICIA randomized trial of the efficacy of human papillomavirus type 16 (HPV-16)/HPV-18 AS04-adjuvanted vaccine against incident and persistent infection with nonvaccine oncogenic HPV types using an alternative multiplex type-specific PCR assay for HPV DNA.

    PubMed

    Struyf, Frank; Colau, Brigitte; Wheeler, Cosette M; Naud, Paulo; Garland, Suzanne; Quint, Wim; Chow, Song-Nan; Salmerón, Jorge; Lehtinen, Matti; Del Rosario-Raymundo, M Rowena; Paavonen, Jorma; Teixeira, Júlio C; Germar, Maria Julieta; Peters, Klaus; Skinner, S Rachel; Limson, Genara; Castellsagué, Xavier; Poppe, Willy A J; Ramjattan, Brian; Klein, Terry D; Schwarz, Tino F; Chatterjee, Archana; Tjalma, Wiebren A A; Diaz-Mitoma, Francisco; Lewis, David J M; Harper, Diane M; Molijn, Anco; van Doorn, Leen-Jan; David, Marie-Pierre; Dubin, Gary

    2015-02-01

    The efficacy of the human papillomavirus type 16 (HPV-16)/HPV-18 AS04-adjuvanted vaccine against cervical infections with HPV in the Papilloma Trial against Cancer in Young Adults (PATRICIA) was evaluated using a combination of the broad-spectrum L1-based SPF10 PCR-DNA enzyme immunoassay (DEIA)/line probe assay (LiPA25) system with type-specific PCRs for HPV-16 and -18. Broad-spectrum PCR assays may underestimate the presence of HPV genotypes present at relatively low concentrations in multiple infections, due to competition between genotypes. Therefore, samples were retrospectively reanalyzed using a testing algorithm incorporating the SPF10 PCR-DEIA/LiPA25 plus a novel E6-based multiplex type-specific PCR and reverse hybridization assay (MPTS12 RHA), which permits detection of a panel of nine oncogenic HPV genotypes (types 16, 18, 31, 33, 35, 45, 52, 58, and 59). For the vaccine against HPV types 16 and 18, there was no major impact on estimates of vaccine efficacy (VE) for incident or 6-month or 12-month persistent infections when the MPTS12 RHA was included in the testing algorithm versus estimates with the protocol-specified algorithm. However, the alternative testing algorithm showed greater sensitivity than the protocol-specified algorithm for detection of some nonvaccine oncogenic HPV types. More cases were gained in the control group than in the vaccine group, leading to higher point estimates of VE for 6-month and 12-month persistent infections for the nonvaccine oncogenic types included in the MPTS12 RHA assay (types 31, 33, 35, 45, 52, 58, and 59). This post hoc analysis indicates that the per-protocol testing algorithm used in PATRICIA underestimated the VE against some nonvaccine oncogenic HPV types and that the choice of the HPV DNA testing methodology is important for the evaluation of VE in clinical trials. (This study has been registered at ClinicalTrials.gov under registration no. NCT00122681.).

  16. Dynamic fair node spectrum allocation for ad hoc networks using random matrices

    NASA Astrophysics Data System (ADS)

    Rahmes, Mark; Lemieux, George; Chester, Dave; Sonnenberg, Jerry

    2015-05-01

    Dynamic Spectrum Access (DSA) is widely seen as a solution to the problem of limited spectrum, because of its ability to adapt the operating frequency of a radio. Mobile Ad Hoc Networks (MANETs) can extend high-capacity mobile communications over large areas where fixed and tethered-mobile systems are not available. In one use case with high potential impact, cognitive radio employs spectrum sensing to facilitate the identification of allocated frequencies not currently accessed by their primary users. Primary users own the rights to radiate at a specific frequency and geographic location, while secondary users opportunistically attempt to radiate at a specific frequency when the primary user is not using it. We populate a spatial radio environment map (REM) database with known information that can be leveraged in an ad hoc network to facilitate fair path use of the DSA-discovered links. Utilization of high-resolution geospatial data layers in RF propagation analysis is directly applicable. Random matrix theory (RMT) is useful in simulating network layer usage in nodes by a Wishart adjacency matrix. We use the Dijkstra algorithm for discovering ad hoc network node connection patterns. We present a method for analysts to dynamically allocate node-node path and link resources using fair division. User allocation of limited resources as a function of time must be dynamic and based on system fairness policies. The context of fair means that first available request for an asset is not envied as long as it is not yet allocated or tasked in order to prevent cycling of the system. This solution may also save money by offering a Pareto efficient repeatable process. We use a water fill queue algorithm to include Shapley value marginal contributions for allocation.

  17. T2AR: trust-aware ad-hoc routing protocol for MANET.

    PubMed

    Dhananjayan, Gayathri; Subbiah, Janakiraman

    2016-01-01

    Secure data transfer against the malicious attacks is an important issue in an infrastructure-less independent network called mobile ad-hoc network (MANET). Trust assurance between MANET nodes is the key parameter in the high-security provision under dynamic topology variations and open wireless constraints. But, the malicious behavior of nodes reduces the trust level of the nodes that leads to an insecure data delivery. The increase in malicious attacks causes the excessive energy consumption that leads to a reduction of network lifetime. The lack of positional information update of the nodes in ad-hoc on-demand vector (AODV) protocol during the connection establishment offers less trust level between the nodes. Hence, the trust rate computation using energy and mobility models and its update are the essential tasks for secure data delivery. This paper proposes a trust-aware ad-hoc routing (T2AR) protocol to improve the trust level between the nodes in MANET. The proposed method modifies the traditional AODV routing protocol with the constraints of trust rate, energy, mobility based malicious behavior prediction. The packet sequence ID matching from the log reports of neighbor nodes determine the trust rate that avoids the malicious report generation. Besides, the direct and indirect trust observation schemes utilization increases the trust level. Besides, the received signal strength indicator utilization determines the trusted node is within the communication range or not. The comparative analysis between the proposed T2AR with the existing methods such as TRUNCMAN, RBT, GR, FBR and DICOTIDS regarding the average end-to-end delay, throughput, false positives, packet delivery ratio shows the effectiveness of T2AR in the secure MANET environment design. PMID:27441127

  18. T2AR: trust-aware ad-hoc routing protocol for MANET.

    PubMed

    Dhananjayan, Gayathri; Subbiah, Janakiraman

    2016-01-01

    Secure data transfer against the malicious attacks is an important issue in an infrastructure-less independent network called mobile ad-hoc network (MANET). Trust assurance between MANET nodes is the key parameter in the high-security provision under dynamic topology variations and open wireless constraints. But, the malicious behavior of nodes reduces the trust level of the nodes that leads to an insecure data delivery. The increase in malicious attacks causes the excessive energy consumption that leads to a reduction of network lifetime. The lack of positional information update of the nodes in ad-hoc on-demand vector (AODV) protocol during the connection establishment offers less trust level between the nodes. Hence, the trust rate computation using energy and mobility models and its update are the essential tasks for secure data delivery. This paper proposes a trust-aware ad-hoc routing (T2AR) protocol to improve the trust level between the nodes in MANET. The proposed method modifies the traditional AODV routing protocol with the constraints of trust rate, energy, mobility based malicious behavior prediction. The packet sequence ID matching from the log reports of neighbor nodes determine the trust rate that avoids the malicious report generation. Besides, the direct and indirect trust observation schemes utilization increases the trust level. Besides, the received signal strength indicator utilization determines the trusted node is within the communication range or not. The comparative analysis between the proposed T2AR with the existing methods such as TRUNCMAN, RBT, GR, FBR and DICOTIDS regarding the average end-to-end delay, throughput, false positives, packet delivery ratio shows the effectiveness of T2AR in the secure MANET environment design.

  19. A multihop key agreement scheme for wireless ad hoc networks based on channel characteristics.

    PubMed

    Hao, Zhuo; Zhong, Sheng; Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks. PMID:23766725

  20. A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics

    PubMed Central

    Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks. PMID:23766725

  1. A multihop key agreement scheme for wireless ad hoc networks based on channel characteristics.

    PubMed

    Hao, Zhuo; Zhong, Sheng; Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks.

  2. Ubiquitous and Secure Certificate Service for Wireless Ad Hoc Network

    NASA Astrophysics Data System (ADS)

    Ge, Meng; Lam, Kwok-Yan; Li, Jianbin; Chung, Siu-Leung

    Wireless ad hoc network is one of the most suitable platforms for providing communication services to support mobile applications in public areas where no fixed communication infrastructure exists. However, due to the open nature of wireless links and lack of security infrastructure in an ad hoc network environment, applications operating on ad hoc network platforms are subjected to non-trivial security challenges. Asymmetric key management, which is widely adopted to be an effective basis for security services in an open network environment, typically plays a crucial role in meeting the security requirements of such applications. In this paper, we propose a secure asymmetric key management scheme, the Ubiquitous and Secure Certificate Service (USCS), which is based on a variant of the Distributed Certificate Authority (DCA) - the Fully Distributed Certificate Authority (FDCA). Similar to FDCA, USCS introduces the presence of 1-hop neighbors which hold shares of DCA's private signature key, and can collaborate to issue certificates, thereby providing asymmetric key management service. Both USCS and FDCA aim to achieve higher availability than the basic DCA scheme; however, USCS is more secure than FDCA in that the former achieves high availability by distributing existing shares to new members, rather than generating new shares as the FDCA scheme does. In order to realise the high availability potential of USCS, a share selection algorithm is also proposed. Experimental results demonstrated that USCS is a more secure approach of the DCA scheme in that it can achieve stronger security than FDCA while attaining high availability similar to that of FDCA. Experiments also showed that USCS incurs only moderate communication overheads.

  3. Ad Hoc Selection of Voice over Internet Streams

    NASA Technical Reports Server (NTRS)

    Macha, Mitchell G. (Inventor); Bullock, John T. (Inventor)

    2014-01-01

    A method and apparatus for a communication system technique involving ad hoc selection of at least two audio streams is provided. Each of the at least two audio streams is a packetized version of an audio source. A data connection exists between a server and a client where a transport protocol actively propagates the at least two audio streams from the server to the client. Furthermore, software instructions executable on the client indicate a presence of the at least two audio streams, allow selection of at least one of the at least two audio streams, and direct the selected at least one of the at least two audio streams for audio playback.

  4. Ad Hoc Selection of Voice over Internet Streams

    NASA Technical Reports Server (NTRS)

    Macha, Mitchell G. (Inventor); Bullock, John T. (Inventor)

    2008-01-01

    A method and apparatus for a communication system technique involving ad hoc selection of at least two audio streams is provided. Each of the at least two audio streams is a packetized version of an audio source. A data connection exists between a server and a client where a transport protocol actively propagates the at least two audio streams from the server to the client. Furthermore, software instructions executable on the client indicate a presence of the at least two audio streams, allow selection of at least one of the at least two audio streams, and direct the selected at least one of the at least two audio streams for audio playback.

  5. Stochastic does not equal ad hoc. [theories of lunar origin

    NASA Technical Reports Server (NTRS)

    Hartmann, W. K.

    1984-01-01

    Some classes of influential events in solar system history are class-predictable but not event-predictable. Theories of lunar origin should not ignore class-predictable stochastic events. Impacts and close encounters with large objects during planet formation are class-predictable. These stochastic events, such as large impacts that triggered ejection of Earth-mantle material into a circum-Earth cloud, should not be rejected as ad hoc. A way to deal with such events scientifically is to investigate their consequences; if it can be shown that they might produce the Moon, they become viable concepts in theories of lunar origin.

  6. Approximate ad-hoc query engine for simulation data

    SciTech Connect

    Abdulla, G; Baldwin, C; Critchlow, T; Kamimura, R; Lozares, I; Musick, R; Tang, N; Lee, B S; Snapp, R

    2001-02-01

    In this paper, we describe AQSim, an ongoing effort to design and implement a system to manage terabytes of scientific simulation data. The goal of this project is to reduce data storage requirements and access times while permitting ad-hoc queries using statistical and mathematical models of the data. In order to facilitate data exchange between models based on different representations, we are evaluating using the ASCI common data model which is comprised of several layers of increasing semantic complexity. To support queries over the spatial-temporal mesh structured data we are in the process of defining and implementing a grammar for MeshSQL.

  7. Scalable Architecture for Multihop Wireless ad Hoc Networks

    NASA Technical Reports Server (NTRS)

    Arabshahi, Payman; Gray, Andrew; Okino, Clayton; Yan, Tsun-Yee

    2004-01-01

    A scalable architecture for wireless digital data and voice communications via ad hoc networks has been proposed. Although the details of the architecture and of its implementation in hardware and software have yet to be developed, the broad outlines of the architecture are fairly clear: This architecture departs from current commercial wireless communication architectures, which are characterized by low effective bandwidth per user and are not well suited to low-cost, rapid scaling in large metropolitan areas. This architecture is inspired by a vision more akin to that of more than two dozen noncommercial community wireless networking organizations established by volunteers in North America and several European countries.

  8. Security Condition for Exact Localization in Wireless Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Kim, Jin Seok; Yum, Dae Hyun; Hong, Sung Je; Kim, Jong; Lee, Pil Joong

    As deployment of wireless ad hoc networks for location-based services increases, accurate localization of mobile nodes is becoming more important. Localization of a mobile node is achieved by estimating its distances from a group of anchor nodes. If some anchors are malicious and colluding, localization accuracy cannot be guaranteed. In this article, we present the security conditions for exact localization in the presence of colluding malicious anchors. We first derive the minimum number of truthful anchors that are required for exact localization in 2-D Euclidean space where some anchors may be collinear. Second, we extend our security condition to 3-D localization where some anchors may be coplanar.

  9. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  10. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.

    PubMed

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-07-14

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.

  11. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks

    PubMed Central

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-01-01

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes. PMID:26184224

  12. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.

    PubMed

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-01-01

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes. PMID:26184224

  13. Extending Service Area of IEEE 802.11 Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Choi, Woo-Yong

    2012-06-01

    According to the current IEEE 802.11 wireless LAN standards, IEEE 802.11 ad hoc networks have the limitation that all STAs (Stations) are in the one-hop transmission range of each other. In this paper, to alleviate the limitation of IEEE 802.11 ad hoc networks we propose the efficient method for selecting the most appropriate pseudo AP (Access Point) from among the set of ad hoc STAs and extending the service area of IEEE 802.11 ad hoc networks by the pseudo AP's relaying the internal traffic of IEEE 802.11 ad hoc networks. Numerical examples show that the proposed method significantly extends the service area of IEEE 802.11 ad hoc networks.

  14. Post Hoc Analysis of the PATRICIA Randomized Trial of the Efficacy of Human Papillomavirus Type 16 (HPV-16)/HPV-18 AS04-Adjuvanted Vaccine against Incident and Persistent Infection with Nonvaccine Oncogenic HPV Types Using an Alternative Multiplex Type-Specific PCR Assay for HPV DNA

    PubMed Central

    Colau, Brigitte; Wheeler, Cosette M.; Naud, Paulo; Garland, Suzanne; Quint, Wim; Chow, Song-Nan; Salmerón, Jorge; Lehtinen, Matti; Del Rosario-Raymundo, M. Rowena; Paavonen, Jorma; Teixeira, Júlio C.; Germar, Maria Julieta; Peters, Klaus; Skinner, S. Rachel; Limson, Genara; Castellsagué, Xavier; Poppe, Willy A. J.; Ramjattan, Brian; Klein, Terry D.; Schwarz, Tino F.; Chatterjee, Archana; Tjalma, Wiebren A. A.; Diaz-Mitoma, Francisco; Lewis, David J. M.; Harper, Diane M.; Molijn, Anco; van Doorn, Leen-Jan; David, Marie-Pierre; Dubin, Gary

    2014-01-01

    The efficacy of the human papillomavirus type 16 (HPV-16)/HPV-18 AS04-adjuvanted vaccine against cervical infections with HPV in the Papilloma Trial against Cancer in Young Adults (PATRICIA) was evaluated using a combination of the broad-spectrum L1-based SPF10 PCR-DNA enzyme immunoassay (DEIA)/line probe assay (LiPA25) system with type-specific PCRs for HPV-16 and -18. Broad-spectrum PCR assays may underestimate the presence of HPV genotypes present at relatively low concentrations in multiple infections, due to competition between genotypes. Therefore, samples were retrospectively reanalyzed using a testing algorithm incorporating the SPF10 PCR-DEIA/LiPA25 plus a novel E6-based multiplex type-specific PCR and reverse hybridization assay (MPTS12 RHA), which permits detection of a panel of nine oncogenic HPV genotypes (types 16, 18, 31, 33, 35, 45, 52, 58, and 59). For the vaccine against HPV types 16 and 18, there was no major impact on estimates of vaccine efficacy (VE) for incident or 6-month or 12-month persistent infections when the MPTS12 RHA was included in the testing algorithm versus estimates with the protocol-specified algorithm. However, the alternative testing algorithm showed greater sensitivity than the protocol-specified algorithm for detection of some nonvaccine oncogenic HPV types. More cases were gained in the control group than in the vaccine group, leading to higher point estimates of VE for 6-month and 12-month persistent infections for the nonvaccine oncogenic types included in the MPTS12 RHA assay (types 31, 33, 35, 45, 52, 58, and 59). This post hoc analysis indicates that the per-protocol testing algorithm used in PATRICIA underestimated the VE against some nonvaccine oncogenic HPV types and that the choice of the HPV DNA testing methodology is important for the evaluation of VE in clinical trials. (This study has been registered at ClinicalTrials.gov under registration no. NCT00122681.) PMID:25540273

  15. Asynchronous ad hoc network discovery for low-power systems

    NASA Astrophysics Data System (ADS)

    Joslin, Todd W.

    2008-04-01

    Unattended ground sensor systems (UGS) have become an important part of a covert monitoring arsenal in operations throughout the world. With the increased use of unattended ground sensor systems, there is a need to develop communication architectures that allow the systems to have simple emplacement procedures, have a long mission life, and be difficult to detect. Current ad-hoc networking schemes use either a network beacon, extensive preambles, or guaranteed time synchronization to achieve reliable communications. When used in wireless sensor systems many of these schemes waste power through unnecessary transmissions. These schemes compromise the covert nature of UGS through excess transmissions for a non-beaconed network or the periodic beaconing in a beaconed network. These factors are detrimental to sensor systems, which chiefly rely on being covert and low-power. This paper discusses a nonarbitrated, non-GPS synchronized, beaconless approach to discovering, joining, and reliably transmitting and receiving in a low-power ad-hoc wireless sensor network. This solution is capable of performing network discovery upon demand to get an initial alignment with other nodes in the network. Once aligned, end points maintain alignment and can predict when other nodes will be available to listen.

  16. Enhancement of node connectivity for mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Shi, Xiyu; Li, Fanzhi; Adams, Christopher

    2006-05-01

    For secure mobile wireless networks whose topologies are changed dynamically in insecure environments, mobile users need to keep in contact with each other for the purpose of user authentications. For instance, the network formed by a group of soldiers equipped with wireless devices in a battlefield. Maintaining a high connectivity is crucial in such networks in order to authenticate scattered individuals and to be able to communicate with each other. To establish connections, different mobile ad hoc network routing protocols have been developed. However, much research has shown that these protocols are incapable of maintaining high connectivity when the node density is lower in the network. This paper proposes a mechanism to enhance the node connectivity, which is specifically effective for mobile ad hoc networks with lower node densities. It selects some nodes with larger transmission power as strategic nodes to assist in establishing connections with remote nodes, which are unable to connect with otherwise. The strategic nodes have the ability to connect with each other. Whenever a remote mobile node has a request to connect to another remote mobile node, the strategic nodes function as normal mobile nodes and may forward the connection requests to the desired remote destination node. The mechanism is simulated in different scenarios with various node densities, and the results show that the node connectivity is generally enhanced with the benefit of lower node density network, gaining significant improvement.

  17. On Trust Evaluation in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Nguyen, Dang Quan; Lamont, Louise; Mason, Peter C.

    Trust has been considered as a social relationship between two individuals in human society. But, as computer science and networking have succeeded in using computers to automate many tasks, the concept of trust can be generalized to cover the reliability and relationships of non-human interaction, such as, for example, information gathering and data routing. This paper investigates the evaluation of trust in the context of ad hoc networks. Nodes evaluate each other’s behaviour based on observables. A node then decides whether to trust another node to have certain innate abilities. We show how accurate such an evaluation could be. We also provide the minimum number of observations required to obtain an accurate evaluation, a result that indicates that observation-based trust in ad hoc networks will remain a challenging problem. The impact of making networking decisions using trust evaluation on the network connectivity is also examined. In this manner, quantitative decisions can be made concerning trust-based routing with the knowledge of the potential impact on connectivity.

  18. Implementation and performance evaluation of mobile ad hoc network for Emergency Telemedicine System in disaster areas.

    PubMed

    Kim, J C; Kim, D Y; Jung, S M; Lee, M H; Kim, K S; Lee, C K; Nah, J Y; Lee, S H; Kim, J H; Choi, W J; Yoo, S K

    2009-01-01

    So far we have developed Emergency Telemedicine System (ETS) which is a robust system using heterogeneous networks. In disaster areas, however, ETS cannot be used if the primary network channel is disabled due to damages on the network infrastructures. Thus we designed network management software for disaster communication network by combination of Mobile Ad hoc Network (MANET) and Wireless LAN (WLAN). This software maintains routes to a Backbone Gateway Node in dynamic network topologies. In this paper, we introduce the proposed disaster communication network with management software, and evaluate its performance using ETS between Medical Center and simulated disaster areas. We also present the results of network performance analysis which identifies the possibility of actual Telemedicine Service in disaster areas via MANET and mobile network (e.g. HSDPA, WiBro).

  19. Intelligent routing protocol for ad hoc wireless network

    NASA Astrophysics Data System (ADS)

    Peng, Chaorong; Chen, Chang Wen

    2006-05-01

    A novel routing scheme for mobile ad hoc networks (MANETs), which combines hybrid and multi-inter-routing path properties with a distributed topology discovery route mechanism using control agents is proposed in this paper. In recent years, a variety of hybrid routing protocols for Mobile Ad hoc wireless networks (MANETs) have been developed. Which is proactively maintains routing information for a local neighborhood, while reactively acquiring routes to destinations beyond the global. The hybrid protocol reduces routing discovery latency and the end-to-end delay by providing high connectivity without requiring much of the scarce network capacity. On the other side the hybrid routing protocols in MANETs likes Zone Routing Protocol still need route "re-discover" time when a route between zones link break. Sine the topology update information needs to be broadcast routing request on local zone. Due to this delay, the routing protocol may not be applicable for real-time data and multimedia communication. We utilize the advantages of a clustering organization and multi-routing path in routing protocol to achieve several goals at the same time. Firstly, IRP efficiently saves network bandwidth and reduces route reconstruction time when a routing path fails. The IRP protocol does not require global periodic routing advertisements, local control agents will automatically monitor and repair broke links. Secondly, it efficiently reduces congestion and traffic "bottlenecks" for ClusterHeads in clustering network. Thirdly, it reduces significant overheads associated with maintaining clusters. Fourthly, it improves clusters stability due to dynamic topology changing frequently. In this paper, we present the Intelligent Routing Protocol. First, we discuss the problem of routing in ad hoc networks and the motivation of IRP. We describe the hierarchical architecture of IRP. We describe the routing process and illustrate it with an example. Further, we describe the control manage

  20. Ad hoc committee on global climate issues: Annual report

    USGS Publications Warehouse

    Gerhard, L.C.; Hanson, B.M.B.

    2000-01-01

    The AAPG Ad Hoc Committee on Global Climate Issues has studied the supposition of human-induced climate change since the committee's inception in January 1998. This paper details the progress and findings of the committee through June 1999. At that time there had been essentially no geologic input into the global climate change debate. The following statements reflect the current state of climate knowledge from the geologic perspective as interpreted by the majority of the committee membership. The committee recognizes that new data could change its conclusions. The earth's climate is constantly changing owing to natural variability in earth processes. Natural climate variability over recent geological time is greater than reasonable estimates of potential human-induced greenhouse gas changes. Because no tool is available to test the supposition of human-induced climate change and the range of natural variability is so great, there is no discernible human influence on global climate at this time.

  1. Indoor Positioning - An Ad-Hoc Positioning System

    NASA Astrophysics Data System (ADS)

    Mautz, Rainer

    2008-06-01

    The aim of this paper is to discuss the development of an automatic, low-cost system that exploits current or near future wireless communications technology to enable continuous tracking of the location of devices in all environments. The development of such a wireless sensor network involves system design, digital signal processing, protocol development, extraction of ranges and localisation. This paper focuses on the user requirements, system architecture and network positioning. The user requirements are presented with a focus on applications in geodesy. A high level strategy for the positioning function is presented based on an ad-hoc geodetic network positioning method including issues of accuracy, quality and reliability of the node positions. Results show that it is possible to achieve a position deviation that is of the size of the ranging error.

  2. Opportunistic Channel Scheduling for Ad Hoc Networks with Queue Stability

    NASA Astrophysics Data System (ADS)

    Dong, Lei; Wang, Yongchao

    2015-03-01

    In this paper, a distributed opportunistic channel access strategy in ad hoc network is proposed. We consider the multiple sources contend for the transmission opportunity, the winner source decides to transmit or restart contention based on the current channel condition. Owing to real data assumption at all links, the decision still needs to consider the stability of the queues. We formulate the channel opportunistic scheduling as a constrained optimization problem which maximizes the system average throughput with the constraints that the queues of all links are stable. The proposed optimization model is solved by Lyapunov stability in queueing theory. The successive channel access problem is decoupled into single optimal stopping problem at every frame and solved with Lyapunov algorithm. The threshold for every frame is different, and it is derived based on the instantaneous queue information. Finally, computer simulations are conducted to demonstrate the validity of the proposed strategy.

  3. Topology for efficient information dissemination in ad-hoc networking

    NASA Technical Reports Server (NTRS)

    Jennings, E.; Okino, C. M.

    2002-01-01

    In this paper, we explore the information dissemination problem in ad-hoc wirless networks. First, we analyze the probability of successful broadcast, assuming: the nodes are uniformly distributed, the available area has a lower bould relative to the total number of nodes, and there is zero knowledge of the overall topology of the network. By showing that the probability of such events is small, we are motivated to extract good graph topologies to minimize the overall transmissions. Three algorithms are used to generate topologies of the network with guaranteed connectivity. These are the minimum radius graph, the relative neighborhood graph and the minimum spanning tree. Our simulation shows that the relative neighborhood graph has certain good graph properties, which makes it suitable for efficient information dissemination.

  4. On service differentiation in mobile Ad Hoc networks.

    PubMed

    Zhang, Shun-liang; Ye, Cheng-qing

    2004-09-01

    A network model is proposed to support service differentiation for mobile Ad Hoc networks by combining a fully distributed admission control approach and the DIFS based differentiation mechanism of IEEE802.11. It can provide different kinds of QoS (Quality of Service) for various applications. Admission controllers determine a committed bandwidth based on the reserved bandwidth of flows and the source utilization of networks. Packets are marked when entering into networks by markers according to the committed rate. By the mark in the packet header, intermediate nodes handle the received packets in different manners to provide applications with the QoS corresponding to the pre-negotiated profile. Extensive simulation experiments showed that the proposed mechanism can provide QoS guarantee to assured service traffic and increase the channel utilization of networks.

  5. A Trust Based Clustering Framework for Securing Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Chatterjee, Pushpita; Sengupta, Indranil; Ghosh, S. K.

    In this paper we present a distributed self-organizing trust based clustering framework for securing ad hoc networks. The mobile nodes are vulnerable to security attacks, so ensuring the security of the network is essential. To enhance security, it is important to evaluate the trustworthiness of nodes without depending on central authorities. In our proposal the evidence of trustworthiness is captured in an efficient manner and from broader perspectives including direct interactions with neighbors, observing interactions of neighbors and through recommendations. Our prediction scheme uses a trust evaluation algorithm at each node to calculate the direct trust rating normalized as a fuzzy value between zero and one. The evidence theory of Dempster-Shafer [9], [10] is used in order to combine the evidences collected by a clusterhead itself and the recommendations from other neighbor nodes. Moreover, in our scheme we do not restrict to a single gateway node for inter cluster routing.

  6. A Token Ring Protocol for Dynamic Ad-hoc Wireless Environments

    SciTech Connect

    Top, P; Kohlhepp, V; Dowla, F

    2005-09-30

    A wireless ad-hoc networking protocol is presented. The protocol is designed to be flexible, easy to use and adaptable to a wide variety of potential applications. The primary considerations in design are small code size, guaranteed bandwidth access, limited delay, and error resilience in a highly dynamic ad-hoc environment. These considerations are achieved through the use of token ring protocol.

  7. Typicality Mediates Performance during Category Verification in Both Ad-Hoc and Well-Defined Categories

    ERIC Educational Resources Information Center

    Sandberg, Chaleece; Sebastian, Rajani; Kiran, Swathi

    2012-01-01

    Background: The typicality effect is present in neurologically intact populations for natural, ad-hoc, and well-defined categories. Although sparse, there is evidence of typicality effects in persons with chronic stroke aphasia for natural and ad-hoc categories. However, it is unknown exactly what influences the typicality effect in this…

  8. 32 CFR 2800.7 - Designation of chairperson for Ad Hoc Committees.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Designation of chairperson for Ad Hoc Committees... VICE PRESIDENT OF THE UNITED STATES SECURITY PROCEDURES § 2800.7 Designation of chairperson for Ad Hoc Committees. The Counsel to the Vice President is designated as the responsible official to chair Ad...

  9. Saccharomyces Cerevisiae Hoc1, a Suppressor of Pkc1, Encodes a Putative Glycosyltransferase

    PubMed Central

    Neiman, A. M.; Mhaiskar, V.; Manus, V.; Galibert, F.; Dean, N.

    1997-01-01

    The Saccharomyces cerevisiae gene PKC1 encodes a protein kinase C isozyme that regulates cell wall synthesis. Here we describe the characterization of HOC1, a gene identified by its ability to suppress the cell lysis phenotype of pkc1-371 cells. The HOC1 gene (Homologous to OCH1) is predicted to encode a type II integral membrane protein that strongly resembles Och1p, an α-1,6-mannosyltransferase. Immunofluorescence studies localized Hoc1p to the Golgi apparatus. While overexpression of HOC1 rescued the pkc1-371 temperature-sensitive cell lysis phenotype, disruption of HOC1 lowered the restrictive temperature of the pkc1-371 allele. Disruption of HOC1 also resulted in hypersensitivity to Calcofluor White and hygromycin B, phenotypes characteristic of defects in cell wall integrity and protein glycosylation, respectively. The function of HOC1 appears to be distinct from that of OCH1. Taken together, these results suggest that HOC1 encodes a Golgi-localized putative mannosyltransferase required for the proper construction of the cell wall. PMID:9055074

  10. A reanalysis of the HCO+/HOC+ abundance ratio in dense interstellar clouds.

    PubMed

    Jarrold, M F; Bowers, M T; DeFrees, D J; McLean, A D; Herbst, E

    1986-04-01

    New theoretical and experimental results have prompted a reinvestigation of the HCO+/HOC+ abundance ratio in dense interstellar clouds. These results pertain principally but not exclusively to the reaction between HOC+ and H2, which was previously calculated by DeFrees, McLean, and Herbst to possess a large activation energy barrier. New calculations, reported here, indicate that this activation energy barrier is quite small and may well be zero. In addition, experimental results at higher energy and temperature indicate strongly that the reaction proceeds efficiently at interstellar temperatures. If HOC+ does indeed react efficiently with H2 in interstellar clouds, the calculated HCO+/HOC+ abundance ratio rises to substantially greater value under standard dense cloud conditions than in deduced via the tentative observation of HOC+ in Sgr B2.

  11. Post hoc pattern matching: assigning significance to statistically defined expression patterns in single channel microarray data

    PubMed Central

    Hulshizer, Randall; Blalock, Eric M

    2007-01-01

    Background Researchers using RNA expression microarrays in experimental designs with more than two treatment groups often identify statistically significant genes with ANOVA approaches. However, the ANOVA test does not discriminate which of the multiple treatment groups differ from one another. Thus, post hoc tests, such as linear contrasts, template correlations, and pairwise comparisons are used. Linear contrasts and template correlations work extremely well, especially when the researcher has a priori information pointing to a particular pattern/template among the different treatment groups. Further, all pairwise comparisons can be used to identify particular, treatment group-dependent patterns of gene expression. However, these approaches are biased by the researcher's assumptions, and some treatment-based patterns may fail to be detected using these approaches. Finally, different patterns may have different probabilities of occurring by chance, importantly influencing researchers' conclusions about a pattern and its constituent genes. Results We developed a four step, post hoc pattern matching (PPM) algorithm to automate single channel gene expression pattern identification/significance. First, 1-Way Analysis of Variance (ANOVA), coupled with post hoc 'all pairwise' comparisons are calculated for all genes. Second, for each ANOVA-significant gene, all pairwise contrast results are encoded to create unique pattern ID numbers. The # genes found in each pattern in the data is identified as that pattern's 'actual' frequency. Third, using Monte Carlo simulations, those patterns' frequencies are estimated in random data ('random' gene pattern frequency). Fourth, a Z-score for overrepresentation of the pattern is calculated ('actual' against 'random' gene pattern frequencies). We wrote a Visual Basic program (StatiGen) that automates PPM procedure, constructs an Excel workbook with standardized graphs of overrepresented patterns, and lists of the genes comprising

  12. Performance Improvement in Geographic Routing for Vehicular Ad Hoc Networks

    PubMed Central

    Kaiwartya, Omprakash; Kumar, Sushil; Lobiyal, D. K.; Abdullah, Abdul Hanan; Hassan, Ahmed Nazar

    2014-01-01

    Geographic routing is one of the most investigated themes by researchers for reliable and efficient dissemination of information in Vehicular Ad Hoc Networks (VANETs). Recently, different Geographic Distance Routing (GEDIR) protocols have been suggested in the literature. These protocols focus on reducing the forwarding region towards destination to select the Next Hop Vehicles (NHV). Most of these protocols suffer from the problem of elevated one-hop link disconnection, high end-to-end delay and low throughput even at normal vehicle speed in high vehicle density environment. This paper proposes a Geographic Distance Routing protocol based on Segment vehicle, Link quality and Degree of connectivity (SLD-GEDIR). The protocol selects a reliable NHV using the criteria segment vehicles, one-hop link quality and degree of connectivity. The proposed protocol has been simulated in NS-2 and its performance has been compared with the state-of-the-art protocols: P-GEDIR, J-GEDIR and V-GEDIR. The empirical results clearly reveal that SLD-GEDIR has lower link disconnection and end-to-end delay, and higher throughput as compared to the state-of-the-art protocols. It should be noted that the performance of the proposed protocol is preserved irrespective of vehicle density and speed. PMID:25429415

  13. Performance improvement in geographic routing for Vehicular Ad Hoc Networks.

    PubMed

    Kaiwartya, Omprakash; Kumar, Sushil; Lobiyal, D K; Abdullah, Abdul Hanan; Hassan, Ahmed Nazar

    2014-01-01

    Geographic routing is one of the most investigated themes by researchers for reliable and efficient dissemination of information in Vehicular Ad Hoc Networks (VANETs). Recently, different Geographic Distance Routing (GEDIR) protocols have been suggested in the literature. These protocols focus on reducing the forwarding region towards destination to select the Next Hop Vehicles (NHV). Most of these protocols suffer from the problem of elevated one-hop link disconnection, high end-to-end delay and low throughput even at normal vehicle speed in high vehicle density environment. This paper proposes a Geographic Distance Routing protocol based on Segment vehicle, Link quality and Degree of connectivity (SLD-GEDIR). The protocol selects a reliable NHV using the criteria segment vehicles, one-hop link quality and degree of connectivity. The proposed protocol has been simulated in NS-2 and its performance has been compared with the state-of-the-art protocols: P-GEDIR, J-GEDIR and V-GEDIR. The empirical results clearly reveal that SLD-GEDIR has lower link disconnection and end-to-end delay, and higher throughput as compared to the state-of-the-art protocols. It should be noted that the performance of the proposed protocol is preserved irrespective of vehicle density and speed. PMID:25429415

  14. Z306 molecular contamination ad hoc committee results

    NASA Technical Reports Server (NTRS)

    Golden, Johnny L.

    1992-01-01

    LDEF external surfaces which did not receive significant amounts of atomic oxygen were observed to be coated with a brown contamination, apparently the result of a condensed organic residue darkened due to UV radiation exposure. During the initial Materials Special Investigation Group (MSIG) Meeting after LDEF deintegration, held in Seattle - July 1990, this organic contamination was the subject of much discussion. The amount of contamination was thought to be significant and its source was immediately believed to be the Z306 black thermal control coating used to coat the entire inner surface of LDEF. Due to the size of the structure, it was not feasible to bake-out the coating. However, initial data on the contamination film was confusing in that significant amounts of silicon was observed by several different researchers. Silicon (from silicone) was not expected to be a potential outgassing product of the Z306 polyurethane coating. To investigate the connection between external contamination and the interior paint, a MSIG ad hoc committee was formed.

  15. Design of the next generation cognitive mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Amjad, Ali; Wang, Huiqiang; Chen, Xiaoming

    Cognition capability has been seen by researchers as the way forward for the design of next generation of Mobile Ad Hoc Networks (MANETs). The reason why a cognitive paradigm would be more suited to a MANET is because MANETs are highly dynamic networks. The topology may change very frequently during the operation of a MANET. Traffic patterns in MANETs can vary from time to time depending on the need of the users. The size of a MANET and node density is also very dynamic and may change without any predictable pattern. In a MANET environment, most of these parameters may change very rapidly and keeping track of them manually would be very difficult. Previous studies have shown that the performance of a certain routing approach in MANETs is dependent on the size of the network and node density. The choice of whether to use a reactive or proactive routing approach comes down to the network size parameter. Static or offline approaches to fine tune a MANET to achieve certain performance goals is hence not very productive as a lot of these parameters keep changing during the course of operation of MANETs. Similarly, the performance of MANETs would improve greatly if the MAC layer entity could operate in a more flexible manner. In this paper we propose a cognitive MANET design that will ensure that all these dynamic parameters are automatically monitored and decisions are based on the current status of these parameters.

  16. Performance improvement in geographic routing for Vehicular Ad Hoc Networks.

    PubMed

    Kaiwartya, Omprakash; Kumar, Sushil; Lobiyal, D K; Abdullah, Abdul Hanan; Hassan, Ahmed Nazar

    2014-01-01

    Geographic routing is one of the most investigated themes by researchers for reliable and efficient dissemination of information in Vehicular Ad Hoc Networks (VANETs). Recently, different Geographic Distance Routing (GEDIR) protocols have been suggested in the literature. These protocols focus on reducing the forwarding region towards destination to select the Next Hop Vehicles (NHV). Most of these protocols suffer from the problem of elevated one-hop link disconnection, high end-to-end delay and low throughput even at normal vehicle speed in high vehicle density environment. This paper proposes a Geographic Distance Routing protocol based on Segment vehicle, Link quality and Degree of connectivity (SLD-GEDIR). The protocol selects a reliable NHV using the criteria segment vehicles, one-hop link quality and degree of connectivity. The proposed protocol has been simulated in NS-2 and its performance has been compared with the state-of-the-art protocols: P-GEDIR, J-GEDIR and V-GEDIR. The empirical results clearly reveal that SLD-GEDIR has lower link disconnection and end-to-end delay, and higher throughput as compared to the state-of-the-art protocols. It should be noted that the performance of the proposed protocol is preserved irrespective of vehicle density and speed.

  17. Algorithmic aspects of topology control problems for ad hoc networks

    SciTech Connect

    Liu, R.; Lloyd, E. L.; Marathe, M. V.; Ramanathan, R.; Ravi, S. S.

    2002-01-01

    Topology control problems are concerned with the assignment of power values to nodes of an ad hoc network so that the power assignment leads to a graph topology satisfying some specified properties. This paper considers such problems under several optimization objectives, including minimizing the maximum power and minimizing the total power. A general approach leading to a polynomial algorithm is presented for minimizing maximum power for a class of graph properties, called monotone properties. The difficulty of generalizing the approach to properties that are not monoione is pointed out. Problems involving the minimization of total power are known to be NP-complete even for simple graph properties. A general approach that leads to an approximation algorithm for minimizing the total power for some monotone properties is presented. Using this approach, a new approximation algorithm for the problem of minimizing the total power for obtaining a 2-node-connected graph is obtained. It is shown that this algorithm provides a constant performance guarantee. Experimental results from an implementation of the approximation algorithm are also presented.

  18. Distributed data fusion over an ad hoc network

    NASA Astrophysics Data System (ADS)

    Anderson, Sean; Binns, Lewis A.; Collins, Peter R. C.; Cooke, Andrew; Greenway, Phil; Valachis, Dimitris

    2002-08-01

    We have been developing a decentralised architecture for data fusion for several years. In this architecture, sensing nodes, each with their own processing, are networked together. Previously, we have researched fully connected networks, tree-connected networks, and networks with loops, and have developed a range of theoretical and empirical results for dynamic networks. Here we report the results obtained from building and demonstrating a decentralised data fusion system in which the nodes are connected via an ad hoc network. Several vision based tracking nodes are linked via a wireless LAN. We use UDP to establish local routing tables within the network whenever a node joins, and TCP/IP to provide point to point communications within the network. We show that the resulting data fusion system is modular, scalable and fault tolerant. In particular, we demonstrate robustness to nodes joining and leaving the network, either by choice or as a result of link drop-out. In addition to experimental results from the project, we present some thoughts on how the technology could be applied to large scale, heterogeneous sensor networks.

  19. Random Time Identity Based Firewall In Mobile Ad hoc Networks

    NASA Astrophysics Data System (ADS)

    Suman, Patel, R. B.; Singh, Parvinder

    2010-11-01

    A mobile ad hoc network (MANET) is a self-organizing network of mobile routers and associated hosts connected by wireless links. MANETs are highly flexible and adaptable but at the same time are highly prone to security risks due to the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized control. Firewall is an effective means of protecting a local network from network-based security threats and forms a key component in MANET security architecture. This paper presents a review of firewall implementation techniques in MANETs and their relative merits and demerits. A new approach is proposed to select MANET nodes at random for firewall implementation. This approach randomly select a new node as firewall after fixed time and based on critical value of certain parameters like power backup. This approach effectively balances power and resource utilization of entire MANET because responsibility of implementing firewall is equally shared among all the nodes. At the same time it ensures improved security for MANETs from outside attacks as intruder will not be able to find out the entry point in MANET due to the random selection of nodes for firewall implementation.

  20. Objectivity in confirmation: post hoc monsters and novel predictions.

    PubMed

    Votsis, Ioannis

    2014-03-01

    The aim of this paper is to put in place some cornerstones in the foundations for an objective theory of confirmation by considering lessons from the failures of predictivism. Discussion begins with a widely accepted challenge, to find out what is needed in addition to the right kind of inferential-semantical relations between hypothesis and evidence to have a complete account of confirmation, one that gives a definitive answer to the question whether hypotheses branded as "post hoc monsters" can be confirmed. The predictivist view is then presented as a way to meet this challenge. Particular attention is paid to Worrall's version of predictivism, as it appears to be the most sophisticated of the lot. It is argued that, despite its faults, his view turns our heads in the right direction by attempting to remove contingent considerations from confirmational matters. The demand to remove such considerations becomes the first of four cornerstones. Each cornerstone is put in place with the aim to steer clear of the sort of failures that plague various kinds of predictivism. In the process, it becomes obvious that the original challenge is wrongheaded and in need of revision. The paper ends with just such a revision.

  1. Experimental characterization and mitigation of turbulence induced signal fades within an ad hoc FSO network.

    PubMed

    Perez, Joaquin; Zvanovec, Stanislav; Ghassemlooy, Zabih; Popoola, Wasiu O

    2014-02-10

    Optical beams propagating through the turbulent atmospheric channel suffer from both the attenuation and phase distortion. Since future wireless networks are envisaged to be deployed in the ad hoc mesh topology, this paper presents the experimental laboratory characterization of mitigation of turbulence induced signal fades for two ad hoc scenarios. Results from measurements of the thermal structure constant along the propagation channels, changes of the coherence lengths for different turbulence regimes and the eye diagrams for partially correlated turbulences in free space optical channels are discussed. Based on these results future deployment of optical ad hoc networks can be more straightforwardly planned.

  2. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks

    PubMed Central

    Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J.; Segarra, Esteve Pallarès; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Gargallo, Emilio Sanvicente

    2015-01-01

    The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic.Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs. PMID:25897496

  3. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks.

    PubMed

    Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J; Pallarès Segarra, Esteve; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Sanvicente Gargallo, Emilio

    2015-01-01

    The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs. PMID:25897496

  4. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks.

    PubMed

    Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J; Pallarès Segarra, Esteve; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Sanvicente Gargallo, Emilio

    2015-04-17

    The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.

  5. A Group Based Key Sharing and Management Algorithm for Vehicular Ad Hoc Networks

    PubMed Central

    Moharram, Mohammed Morsi; Azam, Farzana

    2014-01-01

    Vehicular ad hoc networks (VANETs) are one special type of ad hoc networks that involves vehicles on roads. Typically like ad hoc networks, broadcast approach is used for data dissemination. Blind broadcast to each and every node results in exchange of useless and irrelevant messages and hence creates an overhead. Unicasting is not preferred in ad-hoc networks due to the dynamic topology and the resource requirements as compared to broadcasting. Simple broadcasting techniques create several problems on privacy, disturbance, and resource utilization. In this paper, we propose media mixing algorithm to decide what information should be provided to each user and how to provide such information. Results obtained through simulation show that fewer number of keys are needed to share compared to simple broadcasting. Privacy is also enhanced through this approach. PMID:24587749

  6. Planned and Post Hoc Comparisons in Tests of Concordance and Discordance for G Groups of Judges.

    ERIC Educational Resources Information Center

    Serlin, Ronald C.; Marascuilo, Leonard A.

    1983-01-01

    Two alternatives to the problems of conducting planned and post hoc comparisons in tests of concordance and discordance for G groups of judges are examined. The two models are illustrated using existing data. (Author/JKS)

  7. A group based key sharing and management algorithm for vehicular ad hoc networks.

    PubMed

    Khan, Zeeshan Shafi; Moharram, Mohammed Morsi; Alaraj, Abdullah; Azam, Farzana

    2014-01-01

    Vehicular ad hoc networks (VANETs) are one special type of ad hoc networks that involves vehicles on roads. Typically like ad hoc networks, broadcast approach is used for data dissemination. Blind broadcast to each and every node results in exchange of useless and irrelevant messages and hence creates an overhead. Unicasting is not preferred in ad-hoc networks due to the dynamic topology and the resource requirements as compared to broadcasting. Simple broadcasting techniques create several problems on privacy, disturbance, and resource utilization. In this paper, we propose media mixing algorithm to decide what information should be provided to each user and how to provide such information. Results obtained through simulation show that fewer number of keys are needed to share compared to simple broadcasting. Privacy is also enhanced through this approach.

  8. Preferential survival in models of complex ad hoc networks

    NASA Astrophysics Data System (ADS)

    Kong, Joseph S.; Roychowdhury, Vwani P.

    2008-05-01

    There has been a rich interplay in recent years between (i) empirical investigations of real-world dynamic networks, (ii) analytical modeling of the microscopic mechanisms that drive the emergence of such networks, and (iii) harnessing of these mechanisms to either manipulate existing networks, or engineer new networks for specific tasks. We continue in this vein, and study the deletion phenomenon in the web by the following two different sets of websites (each comprising more than 150,000 pages) over a one-year period. Empirical data show that there is a significant deletion component in the underlying web networks, but the deletion process is not uniform. This motivates us to introduce a new mechanism of preferential survival (PS), where nodes are removed according to the degree-dependent deletion kernel, D(k)∝k, with α≥0. We use the mean-field rate equation approach to study a general dynamic model driven by Preferential Attachment (PA), Double PA (DPA), and a tunable PS (i.e., with any α>0), where c nodes ( c<1) are deleted per node added to the network, and verify our predictions via large-scale simulations. One of our results shows that, unlike in the case of uniform deletion (i.e., where α=0), the PS kernel when coupled with the standard PA mechanism, can lead to heavy-tailed power-law networks even in the presence of extreme turnover in the network. Moreover, a weak DPA mechanism, coupled with PS, can help to make the network even more heavy-tailed, especially in the limit when deletion and insertion rates are almost equal, and the overall network growth is minimal. The dynamics reported in this work can be used to design and engineer stable ad hoc networks and explain the stability of the power-law exponents observed in real-world networks.

  9. Characterizing the Interaction Between Routing and MAC Protocols in Ad-Hoc Networks

    SciTech Connect

    Barrett, C. L.; Drozda, M.; Marathe, A.; Marathe, M. V.

    2002-01-01

    We empirically study the effect of mobility on the performance of protocols designed for wireless ad-hoc networks. An important objective is to study the interaction of the Routing and MAC layer protocols under different mobility parameters. We use three basic mobility models: grid mobility model, random waypoint model, and exponential correlated random model. The performance of protocols is measured in terms of (i) latency, (ii) throughput, (iii) number of packets received, (iv) long term fairness and (v) number of control packets at the MAC and routing layer level. Three different commonly studied routing protocols are used: AODV, DSR and LAR1. Similarly three well known MAC protocols are used: MACA, 802.1 1 and CSMA. Our main contribution is simulation based experiments coupled with rigorous statistical analysis to characterize the interaction of MAC layer protocols with routing layer protocols in ad-hoc networks. From the results, we can conclude the following: e No single MAC or Routing protocol dominated the other protocols in their class. Probably more interestingly, no MAURouting protocol combination was better than other combinations over all scenarios and response variables. 0 In general, it is not meaningful to speak about a MAC or a routing protocol in isolation. Presence of interaction leads to trade-offs between the amount of control packets generated by each layer. The results raise the possibility of improving the performance of a particular MAC layer protocol by using a cleverly designed routing protocol or vice-versa. Thus in order to improve the performanceof a communication network, it is important to study the entire protocol stack as a single algorithmic construct; optimizing individual layers in the seven layer OS1 stack will not yield performance improvements beyond a point. A methodological contribution of this paper is the use of statistical methods such as analysis of variance (ANOVA), to characterize the interaction between the protocols

  10. Delay-dependent asymptotic stability of mobile ad-hoc networks: A descriptor system approach

    NASA Astrophysics Data System (ADS)

    Yang, Juan; Yang, Dan; Huang, Bin; Zhang, Xiao-Hong; Luo, Jian-Lu

    2014-07-01

    In order to analyze the capacity stability of the time-varying-propagation and delay-dependent of mobile ad-hoc networks (MANETs), in this paper, a novel approach is proposed to explore the capacity asymptotic stability for the delay-dependent of MANETs based on non-cooperative game theory, where the delay-dependent conditions are explicitly taken into consideration. This approach is based on the Lyapunov—Krasovskii stability theory for functional differential equations and the linear matrix inequality (LMI) technique. A corresponding Lyapunov—Krasovskii functional is introduced for the stability analysis of this system with use of the descriptor and “neutral-type” model transformation without producing any additional dynamics. The delay-dependent stability criteria are derived for this system. Conditions are given in terms of linear matrix inequalities, and for the first time referred to neutral systems with the time-varying propagation and delay-dependent stability for capacity analysis of MANETs. The proposed criteria are less conservative since they are based on an equivalent model transformation. Furthermore, we also provide an effective and efficient iterative algorithm to solve the constrained stability control model. Simulation experiments have verified the effectiveness and efficiency of our algorithm.

  11. Efficient target tracking with an ad-hoc network of omni-directional sensors

    NASA Astrophysics Data System (ADS)

    Atanassov, Kalin

    2015-05-01

    Ad-hoc networks of omni-directional sensors provide an efficient means to obtain low-cost, easily deployed, reliable target tracking systems. To remove target position dependency on the target power, a transformation to another coordinate system is introduced. It can be shown that the problem of sensing target position with omni-directional sensors can be adapted to the conventional Kalman filter framework. To validate the proposed methodology, first an analysis is conducted to show that by converting to log-ratio space and at the same time reducing the number of parameters to track, no information about target position is lost. The analysis is done by deriving the CRLBs for the position estimation error in both original and transformed spaces and showing that they are the same. Second, to show how the traditional Kalman filter framework performs, a particle filter that works off the transformed coordinates is designed. The number of particles is selected to be sufficiently large and the result is used as ground truth to compare with the performance of the Kalman tracker. The comparisons are done for different target movement speeds and sensor density modes. The results provide an insight into Kalman tracker performance in different situations.

  12. An artificial immune system for securing mobile ad hoc networks against intrusion attacks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2003-08-01

    To mitigate the problem of intrusion attacks by malicious nodes in mobile ad hoc networks (MANETs), security attributes and quantifiable trust levels, unique to the MANET's transient, self-organizing topology, augment or replace traditional protocol metrics of throughput, packet delay and hop-count in the ad hoc route discovery procedures. The new features are unique to the candidate security protocol, which views security as a quality metric to improve the relevance of the routes discovered by established reactive ad hoc routing protocols. Attributes of a secure route are identified in order to define the appropriate metrics to quantify the "level of security" associated with the protocol messaging and the detection of malicious activities by some intrusive nodes. A state vector of features and metrics based on the published Secure Routing Protocol (SRP) for MANETs is constructed to encode network security characteristics. This route discovery protocol mitigates the detrimental effects of various malicious behaviors to provide trustworthy connectivity information. The protocol ensures that fabricated, compromised, or replayed route replies would either be rejected or never reach the querying source node. In this paper, the pattern of values, taken by the state vector of the SRP features in the route request, discovery and reply operations, are analyzed to detect evidence of intrusion attacks by malicious nodes that could lead to denial of service and network shutdown. The pattern analysis applies a technique based on negative selection found in natural immune systems that can detect extraneous patterns in the (nonself) space that is the complement of vector values associated with correct route discovery and route maintenance. The immune system is well-suited to the distributed nature of the MANET. It does not rely on a central controller, but instead uses a distributed detection and response mechanism in order to respond to foreign invaders, mirroring the

  13. Design of multilevel heterogeneous ad-hoc wireless networks with UAVs

    NASA Astrophysics Data System (ADS)

    Gu, Daniel L.; Gerla, Mario; Ly, Henry; Xu, Kaixin; Kong, Jiejun; Hong, Xiaoyan

    2001-10-01

    Multi-Layer Ad Hoc Wireless Networks with UAVs is an ideal infrastructure to establish a rapidly deployable wireless communication system any time any where in the world for military applications. In this paper, we review the research we have done so far for our heterogeneous solution. First of all, we proposed the infrastructure of Multi-level Heterogeneous Ad-Hoc Wireless Network with UAVs. Second, we developed a new MAC layer protocol, Centralized Intelligent Channel Assigned Multiple Access (C-ICAMA), for ground mobile backbone nodes to access UAV. Third, we extended HSR (Hierarchical State Routing) to this Multi-Level Heterogeneous Ad-Hoc Wireless Network. Due to the intrinsic limitations of Extended HSR, we extended the Landmark Ad Hoc Routing (LANMAR) as our forth step. Security is a critical issue for mobile ad-hoc wireless networks, especially for military applications. We developed an embedded distributed security protocol and integrated with this heterogeneous hierarchical ad hoc wireless networks in our fifth step. Therefore, the hierarchical multi-layer approach is the most desirable approach to achieve routing scalability in multi-hop wireless networks.

  14. Predicting impact of multi-paths on phase change in map-based vehicular ad hoc networks

    NASA Astrophysics Data System (ADS)

    Rahmes, Mark; Lemieux, George; Sonnenberg, Jerome; Chester, David B.

    2014-05-01

    Dynamic Spectrum Access, which through its ability to adapt the operating frequency of a radio, is widely believed to be a solution to the limited spectrum problem. Mobile Ad Hoc Networks (MANETs) can extend high capacity mobile communications over large areas where fixed and tethered-mobile systems are not available. In one use case with high potential impact cognitive radio employs spectrum sensing to facilitate identification of allocated frequencies not currently accessed by their primary users. Primary users own the rights to radiate at a specific frequency and geographic location, secondary users opportunistically attempt to radiate at a specific frequency when the primary user is not using it. We quantify optimal signal detection in map based cognitive radio networks with multiple rapidly varying phase changes and multiple orthogonal signals. Doppler shift occurs due to reflection, scattering, and rapid vehicle movement. Path propagation as well as vehicle movement produces either constructive or destructive interference with the incident wave. Our signal detection algorithms can assist the Doppler spread compensation algorithm by deciding how many phase changes in signals are present in a selected band of interest. Additionally we can populate a spatial radio environment map (REM) database with known information that can be leveraged in an ad hoc network to facilitate Dynamic Spectrum Access. We show how topography can help predict the impact of multi-paths on phase change, as well as about the prediction from dense traffic areas. Utilization of high resolution geospatial data layers in RF propagation analysis is directly applicable.

  15. An adaptive neural swarm approach for intrusion defense in ad hoc networks

    NASA Astrophysics Data System (ADS)

    Cannady, James

    2011-06-01

    Wireless sensor networks (WSN) and mobile ad hoc networks (MANET) are being increasingly deployed in critical applications due to the flexibility and extensibility of the technology. While these networks possess numerous advantages over traditional wireless systems in dynamic environments they are still vulnerable to many of the same types of host-based and distributed attacks common to those systems. Unfortunately, the limited power and bandwidth available in WSNs and MANETs, combined with the dynamic connectivity that is a defining characteristic of the technology, makes it extremely difficult to utilize traditional intrusion detection techniques. This paper describes an approach to accurately and efficiently detect potentially damaging activity in WSNs and MANETs. It enables the network as a whole to recognize attacks, anomalies, and potential vulnerabilities in a distributive manner that reflects the autonomic processes of biological systems. Each component of the network recognizes activity in its local environment and then contributes to the overall situational awareness of the entire system. The approach utilizes agent-based swarm intelligence to adaptively identify potential data sources on each node and on adjacent nodes throughout the network. The swarm agents then self-organize into modular neural networks that utilize a reinforcement learning algorithm to identify relevant behavior patterns in the data without supervision. Once the modular neural networks have established interconnectivity both locally and with neighboring nodes the analysis of events within the network can be conducted collectively in real-time. The approach has been shown to be extremely effective in identifying distributed network attacks.

  16. Ad Hoc modeling, expert problem solving, and R&T program evaluation

    NASA Technical Reports Server (NTRS)

    Silverman, B. G.; Liebowitz, J.; Moustakis, V. S.

    1983-01-01

    A simplified cost and time (SCAT) analysis program utilizing personal-computer technology is presented and demonstrated in the case of the NASA-Goddard end-to-end data system. The difficulties encountered in implementing complex program-selection and evaluation models in the research and technology field are outlined. The prototype SCAT system described here is designed to allow user-friendly ad hoc modeling in real time and at low cost. A worksheet constructed on the computer screen displays the critical parameters and shows how each is affected when one is altered experimentally. In the NASA case, satellite data-output and control requirements, ground-facility data-handling capabilities, and project priorities are intricately interrelated. Scenario studies of the effects of spacecraft phaseout or new spacecraft on throughput and delay parameters are shown. The use of a network of personal computers for higher-level coordination of decision-making processes is suggested, as a complement or alternative to complex large-scale modeling.

  17. Dynamic Agent Classification and Tracking Using an Ad Hoc Mobile Acoustic Sensor Network

    NASA Astrophysics Data System (ADS)

    Friedlander, David; Griffin, Christopher; Jacobson, Noah; Phoha, Shashi; Brooks, Richard R.

    2003-12-01

    Autonomous networks of sensor platforms can be designed to interact in dynamic and noisy environments to determine the occurrence of specified transient events that define the dynamic process of interest. For example, a sensor network may be used for battlefield surveillance with the purpose of detecting, identifying, and tracking enemy activity. When the number of nodes is large, human oversight and control of low-level operations is not feasible. Coordination and self-organization of multiple autonomous nodes is necessary to maintain connectivity and sensor coverage and to combine information for better understanding the dynamics of the environment. Resource conservation requires adaptive clustering in the vicinity of the event. This paper presents methods for dynamic distributed signal processing using an ad hoc mobile network of microsensors to detect, identify, and track targets in noisy environments. They seamlessly integrate data from fixed and mobile platforms and dynamically organize platforms into clusters to process local data along the trajectory of the targets. Local analysis of sensor data is used to determine a set of target attribute values and classify the target. Sensor data from a field test in the Marine base at Twentynine Palms, Calif, was analyzed using the techniques described in this paper. The results were compared to "ground truth" data obtained from GPS receivers on the vehicles.

  18. Sketching Awareness: A Participatory Study to Elicit Designs for Supporting Ad Hoc Emergency Medical Teamwork

    PubMed Central

    Kusunoki, Diana; Sarcevic, Aleksandra; Zhang, Zhan; Yala, Maria

    2014-01-01

    Prior CSCW research on awareness in clinical settings has mostly focused on higher-level team coordination spanning across longer-term trajectories at the department and inter-department levels. In this paper, we offer a perspective on what awareness means within the context of an ad hoc, time- and safety-critical medical setting by looking at teams treating severely ill patients with urgent needs. We report findings from four participatory design workshops conducted with emergency medicine clinicians at two regional emergency departments. Workshops were developed to elicit design ideas for information displays that support awareness in emergency medical situations. Through analysis of discussions and clinicians’ sketches of information displays, we identified five features of teamwork that can be used as a foundation for supporting awareness from the perspective of clinicians. Based on these findings, we contribute rich descriptions of four facets of awareness that teams manage during emergency medical situations: team member awareness, elapsed time awareness, teamwork-oriented and patient-driven task awareness, and overall progress awareness. We then discuss these four awareness types in relation to awareness facets found in the CSCW literature. PMID:25870498

  19. A Game Theory Algorithm for Intra-Cluster Data Aggregation in a Vehicular Ad Hoc Network.

    PubMed

    Chen, Yuzhong; Weng, Shining; Guo, Wenzhong; Xiong, Naixue

    2016-01-01

    Vehicular ad hoc networks (VANETs) have an important role in urban management and planning. The effective integration of vehicle information in VANETs is critical to traffic analysis, large-scale vehicle route planning and intelligent transportation scheduling. However, given the limitations in the precision of the output information of a single sensor and the difficulty of information sharing among various sensors in a highly dynamic VANET, effectively performing data aggregation in VANETs remains a challenge. Moreover, current studies have mainly focused on data aggregation in large-scale environments but have rarely discussed the issue of intra-cluster data aggregation in VANETs. In this study, we propose a multi-player game theory algorithm for intra-cluster data aggregation in VANETs by analyzing the competitive and cooperative relationships among sensor nodes. Several sensor-centric metrics are proposed to measure the data redundancy and stability of a cluster. We then study the utility function to achieve efficient intra-cluster data aggregation by considering both data redundancy and cluster stability. In particular, we prove the existence of a unique Nash equilibrium in the game model, and conduct extensive experiments to validate the proposed algorithm. Results demonstrate that the proposed algorithm has advantages over typical data aggregation algorithms in both accuracy and efficiency. PMID:26907272

  20. A Game Theory Algorithm for Intra-Cluster Data Aggregation in a Vehicular Ad Hoc Network.

    PubMed

    Chen, Yuzhong; Weng, Shining; Guo, Wenzhong; Xiong, Naixue

    2016-02-19

    Vehicular ad hoc networks (VANETs) have an important role in urban management and planning. The effective integration of vehicle information in VANETs is critical to traffic analysis, large-scale vehicle route planning and intelligent transportation scheduling. However, given the limitations in the precision of the output information of a single sensor and the difficulty of information sharing among various sensors in a highly dynamic VANET, effectively performing data aggregation in VANETs remains a challenge. Moreover, current studies have mainly focused on data aggregation in large-scale environments but have rarely discussed the issue of intra-cluster data aggregation in VANETs. In this study, we propose a multi-player game theory algorithm for intra-cluster data aggregation in VANETs by analyzing the competitive and cooperative relationships among sensor nodes. Several sensor-centric metrics are proposed to measure the data redundancy and stability of a cluster. We then study the utility function to achieve efficient intra-cluster data aggregation by considering both data redundancy and cluster stability. In particular, we prove the existence of a unique Nash equilibrium in the game model, and conduct extensive experiments to validate the proposed algorithm. Results demonstrate that the proposed algorithm has advantages over typical data aggregation algorithms in both accuracy and efficiency.

  1. Emergency Situation Prediction Mechanism: A Novel Approach for Intelligent Transportation System Using Vehicular Ad Hoc Networks.

    PubMed

    Ganeshkumar, P; Gokulakrishnan, P

    2015-01-01

    In Indian four-lane express highway, millions of vehicles are travelling every day. Accidents are unfortunate and frequently occurring in these highways causing deaths, increase in death toll, and damage to infrastructure. A mechanism is required to avoid such road accidents at the maximum to reduce the death toll. An Emergency Situation Prediction Mechanism, a novel and proactive approach, is proposed in this paper for achieving the best of Intelligent Transportation System using Vehicular Ad Hoc Network. ESPM intends to predict the possibility of occurrence of an accident in an Indian four-lane express highway. In ESPM, the emergency situation prediction is done by the Road Side Unit based on (i) the Status Report sent by the vehicles in the range of RSU and (ii) the road traffic flow analysis done by the RSU. Once the emergency situation or accident is predicted in advance, an Emergency Warning Message is constructed and disseminated to all vehicles in the area of RSU to alert and prevent the vehicles from accidents. ESPM performs well in emergency situation prediction in advance to the occurrence of an accident. ESPM predicts the emergency situation within 0.20 seconds which is comparatively less than the statistical value. The prediction accuracy of ESPM against vehicle density is found better in different traffic scenarios.

  2. Emergency Situation Prediction Mechanism: A Novel Approach for Intelligent Transportation System Using Vehicular Ad Hoc Networks

    PubMed Central

    Gokulakrishnan, P.

    2015-01-01

    In Indian four-lane express highway, millions of vehicles are travelling every day. Accidents are unfortunate and frequently occurring in these highways causing deaths, increase in death toll, and damage to infrastructure. A mechanism is required to avoid such road accidents at the maximum to reduce the death toll. An Emergency Situation Prediction Mechanism, a novel and proactive approach, is proposed in this paper for achieving the best of Intelligent Transportation System using Vehicular Ad Hoc Network. ESPM intends to predict the possibility of occurrence of an accident in an Indian four-lane express highway. In ESPM, the emergency situation prediction is done by the Road Side Unit based on (i) the Status Report sent by the vehicles in the range of RSU and (ii) the road traffic flow analysis done by the RSU. Once the emergency situation or accident is predicted in advance, an Emergency Warning Message is constructed and disseminated to all vehicles in the area of RSU to alert and prevent the vehicles from accidents. ESPM performs well in emergency situation prediction in advance to the occurrence of an accident. ESPM predicts the emergency situation within 0.20 seconds which is comparatively less than the statistical value. The prediction accuracy of ESPM against vehicle density is found better in different traffic scenarios. PMID:26065014

  3. A Game Theory Algorithm for Intra-Cluster Data Aggregation in a Vehicular Ad Hoc Network

    PubMed Central

    Chen, Yuzhong; Weng, Shining; Guo, Wenzhong; Xiong, Naixue

    2016-01-01

    Vehicular ad hoc networks (VANETs) have an important role in urban management and planning. The effective integration of vehicle information in VANETs is critical to traffic analysis, large-scale vehicle route planning and intelligent transportation scheduling. However, given the limitations in the precision of the output information of a single sensor and the difficulty of information sharing among various sensors in a highly dynamic VANET, effectively performing data aggregation in VANETs remains a challenge. Moreover, current studies have mainly focused on data aggregation in large-scale environments but have rarely discussed the issue of intra-cluster data aggregation in VANETs. In this study, we propose a multi-player game theory algorithm for intra-cluster data aggregation in VANETs by analyzing the competitive and cooperative relationships among sensor nodes. Several sensor-centric metrics are proposed to measure the data redundancy and stability of a cluster. We then study the utility function to achieve efficient intra-cluster data aggregation by considering both data redundancy and cluster stability. In particular, we prove the existence of a unique Nash equilibrium in the game model, and conduct extensive experiments to validate the proposed algorithm. Results demonstrate that the proposed algorithm has advantages over typical data aggregation algorithms in both accuracy and efficiency. PMID:26907272

  4. Efficient and Secure Self-Organized Public Key Management for Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Choi, Daeseon; Lee, Younho; Park, Yongsu; Jin, Seung-Hun; Yoon, Hyunsoo

    This paper presents a fully self-organized key management scheme for mobile ad hoc networks. Unlike most previous schemes, there is no priori shared secret or no priori trust relationship in the proposed scheme; every node plays the same role and carries out the same function of key management. The proposed scheme consists of (1) Handshaking (HS) and (2) Certificate request/reply (CRR) procedures. In HS, a node acquires the public key of the approaching node via a secure side channel. In CRR, a node requests certificates of a remote node via a radio channel to the nodes that it has HSed. If the number of received valid certificates that contain the same public key exceeds a given threshold, the node accepts the remote node's public key as valid. Security is rigorously analyzed against various known attacks and network costs are intensively analyzed mathematically. Using this analysis, we provide parameter selection guideline to optimize performance and to maintain security for diverse cases. Simulation results show that every node acquires the public keys of all other nodes at least 5 times faster than in a previous scheme.

  5. Investigation of hydrophobic organic carbon (HOC) partitioning to 1 kDa fractionated municipal wastewater colloids.

    PubMed

    McPhedran, Kerry N; Seth, Rajesh; Drouillard, Ken G

    2013-03-19

    Natural organic matter from the aquatic environment passing a 1 kDa filter has been hypothesized to not contribute appreciably to hydrophobic organic compound (HOC) partitioning; however, to our knowledge this limit has not been verified experimentally for any sorbate/sorbent system. Presently, colloidal organic carbon (COC) < 1 kDa approached 70% of the total COC (<1.5 μm) mass in primary effluent (PE) from a municipal wastewater treatment plant. Partitioning of HOCs 1,2,4,5-tetrachlorobenzene, pentachlorobenzene, and hexachlorobenzene to COC for both 1.5 μm and 1 kDa filtrates of PE was investigated using the gas-stripping technique. Contrary to the hypothesis, significant HOC-COC partitioning to the 1 kDa filtrate was observed with organic carbon-normalized partitioning coefficients (logKCOC) of 4.30, 4.36, and 3.74 for 1,2,4,5-TeCB, PeCB, and HCB, respectively. Further, partitioning to COC < 1 kDa dominated the overall partitioning of the three chlorobenzenes in the 1.5 μm filtrate, and the partitioning behavior did not follow the trend based on hydrophobicity (KOW). The results show that significant partitioning of HOC may occur to OC < 1 kDa and highlights the need for further experiments with other HOCs and COC characterization to better understand and explain the observed partitioning.

  6. Structure and spectroscopic properties of low-lying states of the HOC(O)O radical.

    PubMed

    Linguerri, Roberto; Puzzarini, Cristina; Francisco, Joseph S

    2016-02-28

    The HOC(O)O radical is a product of the reaction of HOCO radicals with oxygen atoms. The present study provides theoretical prediction of critical spectroscopic features of this radical that should aid in its experimental characterization. Energies, structures, rotational constants, and harmonic frequencies are presented for the ground and two low-lying excited electronic states of HOC(O)O. The energies for the Ã(2)A″←X̃(2)A' and B̃(2)A'←X̃(2)A' electronic transitions are reported. The band origin of the B̃←X̃ transition of HOC(O)O is predicted to occur in the near infrared region of the spectrum at around 1.5 eV and it is suggested to be the most promising one for observing this radical spectroscopically. The structural and spectroscopic similarities between HOC(O)O and the isoelectronic radical FC(O)O are discussed. The abundance of experimental data on the FC(O)O radical should guide the spectroscopic characterization of HOC(O)O and serve as a benchmark for the structural and spectroscopic parameters obtained from theory.

  7. The effects of malicious nodes on performance of mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Li, Fanzhi; Shi, Xiyu; Jassim, Sabah; Adams, Christopher

    2006-05-01

    Wireless ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to security attacks. Unlike their wired counterpart, infrastructureless ad hoc networks do not have a clear line of defense, their topology is dynamically changing, and every mobile node can receive messages from its neighbors and can be contacted by all other nodes in its neighborhood. This poses a great danger to network security if some nodes behave in a malicious manner. The immediate concern about the security in this type of networks is how to protect the network and the individual mobile nodes against malicious act of rogue nodes from within the network. This paper is concerned with security aspects of wireless ad hoc networks. We shall present results of simulation experiments on ad hoc network's performance in the presence of malicious nodes. We shall investigate two types of attacks and the consequences will be simulated and quantified in terms of loss of packets and other factors. The results show that network performance, in terms of successful packet delivery ratios, significantly deteriorates when malicious nodes act according to the defined misbehaving characteristics.

  8. A Decentralized VPN Service over Generalized Mobile Ad-Hoc Networks

    NASA Astrophysics Data System (ADS)

    Fujita, Sho; Shima, Keiichi; Uo, Yojiro; Esaki, Hiroshi

    We present a decentralized VPN service that can be built over generalized mobile ad-hoc networks (Generalized MANETs), in which topologies can be represented as a time-varying directed multigraph. We address wireless ad-hoc networks and overlay ad-hoc networks as instances of Generalized MANETs. We first propose an architecture to operate on various kinds of networks through a single set of operations. Then, we design and implement a decentralized VPN service on the proposed architecture. Through the development and operation of a prototype system we implemented, we found that the proposed architecture makes the VPN service applicable to each instance of Generalized MANETs, and that the VPN service makes it possible for unmodified applications to operate on the networks.

  9. Fuzzy Multiple Metrics Link Assessment for Routing in Mobile Ad-Hoc Network

    NASA Astrophysics Data System (ADS)

    Soo, Ai Luang; Tan, Chong Eng; Tay, Kai Meng

    2011-06-01

    In this work, we investigate on the use of Sugeno fuzzy inference system (FIS) in route selection for mobile Ad-Hoc networks (MANETs). Sugeno FIS is introduced into Ad-Hoc On Demand Multipath Distance Vector (AOMDV) routing protocol, which is derived from its predecessor, Ad-Hoc On Demand Distance Vector (AODV). Instead of using the conventional way that considering only a single metric to choose the best route, our proposed fuzzy decision making model considers up to three metrics. In the model, the crisp inputs of the three parameters are fed into an FIS and being processed in stages, i.e., fuzzification, inference, and defuzzification. Finally, after experiencing all the stages, a single value score is generated from the combination metrics, which will be used to measure all the discovered routes credibility. Results obtained from simulations show a promising improvement as compared to AOMDV and AODV.

  10. Mobile agent and multilayer integrated distributed intrusion detection model for clustering ad hoc networks

    NASA Astrophysics Data System (ADS)

    Feng, Jianxin; Wang, Guangxing

    2004-04-01

    Ad hoc networks do not depend on any predefined infrastructure or centralized administration to operate. Their security characters require more complex security preventions. As the second line of defense, Intrusion detection is the necessary means of getting the high survivability. In this paper the security characters of ad hoc networks and the related contents of intrusion detection are discussed. Mobile Agent and Multi-layer Integrated Distributed Intrusion Detection Model (MAMIDIDM) and a heuristic global detection algorithm are proposed tentatively by combining the mobile agent technology with the multi-layer conception. This heuristic global detection algorithm combines the mobile agent detection engine with the multi-layer detection engines and analyzes the results obtained by the corresponding detection engines. MAMIDIDM has the better flexibility and extensibility, can execute the intrusion detection in clustering ad hoc networks effectively.

  11. Forward Interference Avoidance in Ad Hoc Communications Using Adaptive Array Antennas

    NASA Astrophysics Data System (ADS)

    Sakaguchi, Tomofumi; Kamiya, Yukihiro; Fujii, Takeo; Suzuki, Yasuo

    Wireless ad hoc communications such as ad hoc networks have been attracting researchers' attention. They are expected to become a key technology for “ubiquitous” networking because of the ability to configure wireless links by nodes autonomously, without any centralized control facilities. Adaptive array antennas (AAA) have been expected to improve the network efficiency by taking advantage of its adaptive beamforming capability. However, it should be noted that AAA is not almighty. Its interference cancellation capability is limited by the degree-of-freedom (DOF) and the angular resolution as a function of the number of element antennas. Application of AAA without attending to these problems can degrade the efficiency of the network. Let us consider wireless ad hoc communication as a target application for AAA, taking advantage of AAA's interference cancellation capability. The low DOF and insufficient resolution will be crucial problems compared to other wireless systems, since there is no centralized facility to control the nodes to avoid interferences in such systems. A number of interferences might impinge on a node from any direction of arrival (DOA) without any timing control. In this paper, focusing on such limitations of AAA applied in ad hoc communications, we propose a new scheme, Forward Interference Avoidance (FIA), using AAA for ad hoc communications in order to avoid problems caused by the limitation of the AAA capability. It enables nodes to avoid interfering with other nodes so that it increases the number of co-existent wireless links. The performance improvement of ad hoc communications in terms of the number of co-existent links is investigated through computer simulations.

  12. Multicasting in Wireless Communications (Ad-Hoc Networks): Comparison against a Tree-Based Approach

    NASA Astrophysics Data System (ADS)

    Rizos, G. E.; Vasiliadis, D. C.

    2007-12-01

    We examine on-demand multicasting in ad hoc networks. The Core Assisted Mesh Protocol (CAMP) is a well-known protocol for multicast routing in ad-hoc networks, generalizing the notion of core-based trees employed for internet multicasting into multicast meshes that have much richer connectivity than trees. On the other hand, wireless tree-based multicast routing protocols use much simpler structures for determining route paths, using only parent-child relationships. In this work, we compare the performance of the CAMP protocol against the performance of wireless tree-based multicast routing protocols, in terms of two important factors, namely packet delay and ratio of dropped packets.

  13. A high-precision ab initio determination of the equilibrium geometry and force field of HOC(+)

    NASA Technical Reports Server (NTRS)

    Defrees, D. J.; Bunker, P. R.; Binkley, J. S.; Mclean, A. D.

    1987-01-01

    The results of an ab initio molecular orbital investigation of the isoformyl cation, HOC(+), shape are reported. The effects of expanding the basis set to near the Hartree-Fock limit and of electron correlation were examined, and the results indicate that near the Hartree-Fock limit the HOC(+) is linear. An analytic potential function is presented, from which the calculated rotational energies are only 0.03 percent different from the experimental values. This represents a nearly two orders of magnitude reduction in error from earlier work.

  14. Reliable on-demand multicast routing with congestion control in wireless ad hoc networks

    NASA Astrophysics Data System (ADS)

    Tang, Ken; Gerla, Mario

    2001-07-01

    In this paper, we address the congestion control multicast routing problem in wireless ad hoc networks through the medium access control (MAC) layer. We first introduce the Broadcast Medium Window (BMW) MAC protocol, which provides reliable delivery to broadcast packets at the MAC layer. We then extend the wireless On-Demand Multicast Routing Protocol (ODMRP) to facilitate congestion control in ad hoc networks using BMW. Through simulation, we show that ODMRP with congestion control adapts well to multicast sources that are aggressive in data transmissions.

  15. Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Alicherry, Mansoor; Keromytis, Angelos D.; Stavrou, Angelos

    Mobile Ad-hoc Networks (MANETs) are increasingly employed in tactical military and civil rapid-deployment networks, including emergency rescue operations and ad hoc disaster-relief networks. However, this flexibility of MANETs comes at a price, when compared to wired and base station-based wireless networks: MANETs are susceptible to both insider and outsider attacks. This is mainly because of the lack of a well-defined defense perimeter preventing the effective use of wired defenses including firewalls and intrusion detection systems.

  16. IDMA: improving the defense against malicious attack for mobile ad hoc networks based on ARIP protocol

    NASA Astrophysics Data System (ADS)

    Peng, Chaorong; Chen, Chang Wen

    2008-04-01

    Malicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks (MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes. However, the defense against malicious attack can be improved when a new layer of network architecture can be developed to separate true IP address from disclosing to the malicious nodes. In this paper, we propose a new algorithm to improve the defense against malicious attack (IDMA) that is based on a recently developed Assignment Router Identify Protocol (ARIP) for the clustering-based MANET management. In the ARIP protocol, we design the ARIP architecture based on the new Identity instead of the vulnerable IP addresses to provide the required security that is embedded seamlessly into the overall network architecture. We make full use of ARIP's special property to monitor gateway forward packets by Reply Request Route Packets (RREP) without additional intrusion detection layer. We name this new algorithm IDMA because of its inherent capability to improve the defense against malicious attacks. Through IDMA, a watching algorithm can be established so as to counterattack the malicious node in the routing path when it unusually drops up packets. We provide analysis examples for IDMA for the defense against a malicious node that disrupts the route discovery by impersonating the destination, or by responding with state of corrupted routing information, or by disseminating forged control traffic. The IDMA algorithm is able to counterattack the malicious node in the cases when the node lunch DoS attack by broadcast a large number of route requests, or make Target traffic congestion by delivering huge mount of data; or spoof the IP addresses and send forge packets with a fake ID to the same Target causing traffic congestion at that destination. We have implemented IDMA algorism using the GloMoSim simulator and have demonstrated its performance under a variety of

  17. Protocols for Detection and Removal of Wormholes for Secure Routing and Neighborhood Creation in Wireless Ad Hoc Networks

    ERIC Educational Resources Information Center

    Hayajneh, Thaier Saleh

    2009-01-01

    Wireless ad hoc networks are suitable and sometimes the only solution for several applications. Many applications, particularly those in military and critical civilian domains (such as battlefield surveillance and emergency rescue) require that ad hoc networks be secure and stable. In fact, security is one of the main barriers to the extensive use…

  18. Post-Hoc IRT Equating of Previously Administered English Tests for Comparison of Test Scores

    ERIC Educational Resources Information Center

    Saida, Chisato; Hattori, Tamaki

    2008-01-01

    Despite growing concerns about declining scholastic abilities of Japanese students throughout Japan prior to the implementation of the revised Courses of Study in 2002, little empirical evidence was available at that time to support this perceived decline in academic performance. This research describes post-hoc IRT equating of previously…

  19. A Compendium of Textbook Views on Planned versus Post Hoc Tests.

    ERIC Educational Resources Information Center

    Tucker, Mary L.

    This paper focuses on two methods of performing multiple comparisons (post hoc or unplanned versus a priori or planned) for determining exactly where statistically significant results arise when there are more than "k equals two" groups. Textbook views and recommendations regarding the use of these two types of multiple comparisons are summarized.…

  20. Report of the Ad Hoc Committee on Religious and Cultural Celebrations in the Library.

    ERIC Educational Resources Information Center

    Rathemacher, Andree; Grubman, Sheila Black; Lahiri, Amar; Gilton, Donna; Sharif, Mohammed

    The charge of the University of Rhode Island's Ad Hoc Committee on Religious and Cultural Celebrations in the Library was to: investigate all opportunities for the library to educate the campus community about religious and cultural holidays; consider all the major religions of the world and the possibility of having displays for the symbols of…

  1. Data Security in Ad Hoc Networks Using Randomization of Cryptographic Algorithms

    NASA Astrophysics Data System (ADS)

    Krishna, B. Ananda; Radha, S.; Keshava Reddy, K. Chenna

    Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The military tactical and other security-sensitive operations are still the main applications of ad hoc networks, although there is a trend to adopt ad hoc networks for commercial uses due to their unique properties. One main challenge in design of these networks is how to feasibly detect and defend the major attacks against data, impersonation and unauthorized data modification. Also, in the same network some nodes may be malicious whose objective is to degrade the network performance. In this study, we propose a security model in which the packets are encrypted and decrypted using multiple algorithms where the selection scheme is random. The performance of the proposed model is analyzed and it is observed that there is no increase in control overhead but a slight delay is introduced due to the encryption process. We conclude that the proposed security model works well for heavily loaded networks with high mobility and can be extended for more cryptographic algorithms.

  2. Distribution of carbonaceous matter in lithofacies: impacts on HOC sorption nonlinearity.

    PubMed

    Kalinovich, Indra; Allen-King, Richelle M; Thomas, Kathryn

    2012-05-15

    Both the composition and distribution of the lithocomponents within an aquifer impact hydrophobic organic compound (HOC) transport. Using samples from the sandy, low fraction organic carbon content (f(oc)~0.02%) Borden aquifer, we demonstrate how HOC sorption is controlled by the carbonaceous matter (CM) associated with calcareous sedimentary lithocomponents. Two-point isotherms using perchloroethene (PCE) as a sorbate showed that medium-grained lithofacies have a broader range of K(f) (Freundlich coefficient), 1/n (Freundlich parameter) and f(oc) than fine-grained facies. Dual-mode (linear+Freundlich) sorption modeling, fraction inorganic carbon (f(ic)) and laboratory analyses confirm that both the magnitude and variability of PCE K(d) (sorption distribution coefficient) in the Borden aquifer are controlled by the presence of heterogeneous CM in dark and very dark carbonate lithocomponents. Laboratory analyses and model results confirmed that the CM type controlling PCE sorption behavior in the Borden aquifer is in a condensed form, likely kerogen, contained within the carbonate matrix of the grains. The dark carbonate grains comprise a small proportion of the aquifer sediment (≪1%) and are found predominantly in medium-grained lithofacies in the Borden aquifer. These results show that increased heterogeneity, HOC mass storage and sorption nonlinearity associated with medium-grained lithofacies impact HOC transport in historically contaminated sedimentary aquifers.

  3. Adhoc: an R package to calculate ad hoc distance thresholds for DNA barcoding identification.

    PubMed

    Sonet, Gontran; Jordaens, Kurt; Nagy, Zoltán T; Breman, Floris C; De Meyer, Marc; Backeljau, Thierry; Virgilio, Massimiliano

    2013-12-30

    Identification by DNA barcoding is more likely to be erroneous when it is based on a large distance between the query (the barcode sequence of the specimen to identify) and its best match in a reference barcode library. The number of such false positive identifications can be decreased by setting a distance threshold above which identification has to be rejected. To this end, we proposed recently to use an ad hoc distance threshold producing identifications with an estimated relative error probability that can be fixed by the user (e.g. 5%). Here we introduce two R functions that automate the calculation of ad hoc distance thresholds for reference libraries of DNA barcodes. The scripts of both functions, a user manual and an example file are available on the JEMU website (http://jemu.myspecies.info/computer-programs) as well as on the comprehensive R archive network (CRAN, http://cran.r-project.org).

  4. The Ad Hoc process to strengthen the framework convention on climate change

    SciTech Connect

    Ramakrishna, K.; Deutz, A.M.; Jacobsen, L.A.

    1995-11-01

    The Woods Hole Research Center convened an International Conference on The Ad Hoc Process to Strengthen the Framework Convention on Climate Change in Woods Hole, MA, on October 7-9, 1995. The conference was conducted to examine the prospects for successful adoption of a protocol to the Framework Convention on Climate Change by 1997. In preparation for the Second session of the Ad Hoc Group on the Berlin Mandate, several governmental and nongovernmental representatives met in Woods Hole to discuss the process and possible outcome of the Berlin Mandate negotiations for a protocol or other legal instrument to strengthen the Convention. The conference was by invitation and all participants attended in their personal capacities.

  5. A lightweight secure routing algorithm for ad hoc networks with free-space optics

    NASA Astrophysics Data System (ADS)

    Xu, Zhong; Dai, Guanzhong; Zhang, Guoqing; Liu, Xue; Yang, Deming

    2007-11-01

    Nowadays, there are some works with free-space laser communication system, but security issues of this network are always neglected. We present an efficient online/offline routing based on identity-based signature for ad hoc networks with Free-Space-Optics (FSO). The protocol is especially suitable for ad hoc networks with FSO because the major computational overhead is shifted to the offline phase, whereas the online phase requires only a very low computational overhead to achieve a full scale of authentication. In addition, since the signature scheme uses an identity-based cryptosystem, it does not need to maintain a public key directory and to exchange any certificate. The effectiveness of our protocol is simulated using QualNet tools.

  6. Information Fusion in Ad hoc Wireless Sensor Networks for Aircraft Health Monitoring

    NASA Astrophysics Data System (ADS)

    Fragoulis, Nikos; Tsagaris, Vassilis; Anastassopoulos, Vassilis

    In this paper the use of an ad hoc wireless sensor network for implementing a structural health monitoring system is discussed. The network is consisted of sensors deployed throughout the aircraft. These sensors being in the form of a microelectronic chip and consisted of sensing, data processing and communicating components could be easily embedded in any mechanical aircraft component. The established sensor network, due to its ad hoc nature is easily scalable, allowing adding or removing any number of sensors. The position of the sensor nodes need not necessarily to be engineered or predetermined, giving this way the ability to be deployed in inaccessible points. Information collected from various sensors of different modalities throughout the aircraft is then fused in order to provide a more comprehensive image of the aircraft structural health. Sensor level fusion along with decision quality information is used, in order to enhance detection performance.

  7. Accurate ab initio quartic force fields for the ions HCO(+) and HOC(+)

    NASA Technical Reports Server (NTRS)

    Martin, J. M. L.; Taylor, Peter R.; Lee, Timothy J.

    1993-01-01

    The quartic force fields of HCO(+) and HOC(+) have been computed using augmented coupled cluster methods and basis sets of spdf and spdfg quality. Calculations on HCN, CO, and N2 have been performed to assist in calibrating the computed results. Going from an spdf to an spdfg basis shortens triple bonds by about 0.004 A, and increases the corresponding harmonic frequency by 10-20/cm, leaving bond distances about 0.003 A too long and triple bond stretching frequencies about 5/cm too low. Accurate estimates for the bond distances, fundamental frequencies, and thermochemical quantities are given. HOC(+) lies 37.8 +/- 0.5 kcal/mol (0 K) above HCO(+); the classical barrier height for proton exchange is 76.7 +/- 1.0 kcal/mol.

  8. Forming an ad-hoc nearby storage, based on IKAROS and social networking services

    NASA Astrophysics Data System (ADS)

    Filippidis, Christos; Cotronis, Yiannis; Markou, Christos

    2014-06-01

    We present an ad-hoc "nearby" storage, based on IKAROS and social networking services, such as Facebook. By design, IKAROS is capable to increase or decrease the number of nodes of the I/O system instance on the fly, without bringing everything down or losing data. IKAROS is capable to decide the file partition distribution schema, by taking on account requests from the user or an application, as well as a domain or a Virtual Organization policy. In this way, it is possible to form multiple instances of smaller capacity higher bandwidth storage utilities capable to respond in an ad-hoc manner. This approach, focusing on flexibility, can scale both up and down and so can provide more cost effective infrastructures for both large scale and smaller size systems. A set of experiments is performed comparing IKAROS with PVFS2 by using multiple clients requests under HPC IOR benchmark and MPICH2.

  9. Artificial neural networks for closed loop control of in silico and ad hoc type 1 diabetes.

    PubMed

    Fernandez de Canete, J; Gonzalez-Perez, S; Ramos-Diaz, J C

    2012-04-01

    The closed loop control of blood glucose levels might help to reduce many short- and long-term complications of type 1 diabetes. Continuous glucose monitoring and insulin pump systems have facilitated the development of the artificial pancreas. In this paper, artificial neural networks are used for both the identification of patient dynamics and the glycaemic regulation. A subcutaneous glucose measuring system together with a Lispro insulin subcutaneous pump were used to gather clinical data for each patient undergoing treatment, and a corresponding in silico and ad hoc neural network model was derived for each patient to represent their particular glucose-insulin relationship. Based on this nonlinear neural network model, an ad hoc neural network controller was designed to close the feedback loop for glycaemic regulation of the in silico patient. Both the neural network model and the controller were tested for each patient under simulation, and the results obtained show a good performance during food intake and variable exercise conditions.

  10. An Ad-Hoc Adaptive Pilot Model for Pitch Axis Gross Acquisition Tasks

    NASA Technical Reports Server (NTRS)

    Hanson, Curtis E.

    2012-01-01

    An ad-hoc algorithm is presented for real-time adaptation of the well-known crossover pilot model and applied to pitch axis gross acquisition tasks in a generic fighter aircraft. Off-line tuning of the crossover model to human pilot data gathered in a fixed-based high fidelity simulation is first accomplished for a series of changes in aircraft dynamics to provide expected values for model parameters. It is shown that in most cases, for this application, the traditional crossover model can be reduced to a gain and a time delay. The ad-hoc adaptive pilot gain algorithm is shown to have desirable convergence properties for most types of changes in aircraft dynamics.

  11. Enhancements for distributed certificate authority approaches for mobile wireless ad hoc networks.

    SciTech Connect

    Van Leeuwen, Brian P.; Michalski, John T.; Anderson, William Erik

    2003-12-01

    Mobile wireless ad hoc networks that are resistant to adversarial manipulation are necessary for distributed systems used in military and security applications. Critical to the successful operation of these networks, which operate in the presence of adversarial stressors, are robust and efficient information assurance methods. In this report we describe necessary enhancements for a distributed certificate authority (CA) used in secure wireless network architectures. Necessary cryptographic algorithms used in distributed CAs are described and implementation enhancements of these algorithms in mobile wireless ad hoc networks are developed. The enhancements support a network's ability to detect compromised nodes and facilitate distributed CA services. We provide insights to the impacts the enhancements will have on network performance with timing diagrams and preliminary network simulation studies.

  12. Vehicular ad hoc network for a surveillance system using multifrequency band enhancement

    NASA Astrophysics Data System (ADS)

    Bunruangses, Montree; Sunat, Khamron; Mitatha, Somsak; Yupapin, Preecha P.

    2010-09-01

    We present a new design of a surveillance system via a vehicular ad hoc network (VANET) integrated by a 3-G or 4-G cellular wireless network. We propose dense wavelength division multiplexing wavelength enhancement for increasing the channel capacity and signal security. Increase in the number of channels can be obtained by increasing the wavelength density. Signal security is introduced by a specific wavelength filter controlled by the central operator. Optical communication wavelength enhancement is reviewed. The advantage of this proposed system is that it can easily be implemented and incorporated into the existing communication link in either a cellular or ad hoc wireless system, where signal security and hence privacy can be provided.

  13. A Face Centered Cubic Key Agreement Mechanism for Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Askoxylakis, Ioannis G.; Markantonakis, Konstantinos; Tryfonas, Theo; May, John; Traganitis, Apostolos

    Mobile ad hoc networking is an operating mode for rapid mobile node networking. Each node relies on adjacent nodes in order to achieve and maintain connectivity and functionality. Security is considered among the main issues for the successful deployment of mobile ad hoc networks (MANETs). In this paper we introduce a weak to strong authentication mechanism associated with a multiparty contributory key establishment method. The latter is designed for MANETs with dynamic changing topologies, due to continuous flow of incoming and departing nodes. We introduce a new cube algorithm based on the face-centered cubic (FCC) structure. The proposed architecture employs elliptic curve cryptography, which is considered more efficient for thin clients where processing power and energy consumption are significant constraints.

  14. PNNI routing support for ad hoc mobile networking: The multilevel case

    SciTech Connect

    Martinez, L.; Sholander, P.; Tolendino, L.

    1998-01-01

    This contribution extends the Outside Nodal Hierarchy List (ONHL) procedures described in ATM Forum Contributions 97-0766 and 97-0933. These extensions allow multiple mobile networks to form either an ad hoc network or an extension of a fixed PNNI infrastructure. A previous contribution (97-1073) covered the simplest case where the top-most Logical Group Nodes (LGNs), in those mobile networks, all resided at the same level in a PNNI hierarchy. This contribution covers the more general case wherein those top-most LGNs may reside at different PNNI hierarchy levels. Both of the SNL contributions consider flat ad hoc network architectures in the sense that each mobile network always participates in the PNNI hierarchy at the pre-configured level of its top-most LGN.

  15. PNNI routing support for ad hoc mobile networking: A flat architecture

    SciTech Connect

    Martinez, L.; Sholander, P.; Tolendino, L.

    1997-12-01

    This contribution extends the Outside Nodal Hierarchy List (ONHL) procedures described in ATM Form Contribution 97-0766. These extensions allow multiple mobile networks to form either an ad hoc network or an extension of a fixed PNNI infrastructure. This contribution covers the simplest case where the top-most Logical Group Nodes (LGNs), in those mobile networks, all reside at the same level in a PNNI hierarchy. Future contributions will cover the general case where those top-most LGNs reside at different hierarchy levels. This contribution considers a flat ad hoc network architecture--in the sense that each mobile network always participates in the PNNI hierarchy at the preconfigured level of its top-most LGN.

  16. Adhoc: an R package to calculate ad hoc distance thresholds for DNA barcoding identification

    PubMed Central

    Sonet, Gontran; Jordaens, Kurt; Nagy, Zoltán T.; Breman, Floris C.; De Meyer, Marc; Backeljau, Thierry; Virgilio, Massimiliano

    2013-01-01

    Abstract Identification by DNA barcoding is more likely to be erroneous when it is based on a large distance between the query (the barcode sequence of the specimen to identify) and its best match in a reference barcode library. The number of such false positive identifications can be decreased by setting a distance threshold above which identification has to be rejected. To this end, we proposed recently to use an ad hoc distance threshold producing identifications with an estimated relative error probability that can be fixed by the user (e.g. 5%). Here we introduce two R functions that automate the calculation of ad hoc distance thresholds for reference libraries of DNA barcodes. The scripts of both functions, a user manual and an example file are available on the JEMU website (http://jemu.myspecies.info/computer-programs) as well as on the comprehensive R archive network (CRAN, http://cran.r-project.org). PMID:24453565

  17. Report of ad hoc OTEC cold water pipe committee

    SciTech Connect

    Barr, R.; Giannotti, J.; Deuchler, W.; Scotti, R.; Stadter, J.; Walsh, J. P.; Weiss, R.

    1980-02-01

    Now that the design work on the pilot plant is scheduled to start in the near future, DOE has considered it essential that an overall look be taken at the cold water pipe design process. The VSE Corporation, in its role as a support contractor to DOE, was tasked to organize a small study group to answer the question, Where do we stand on the verification of the computer models of the cold water pipe response by experimental measurements. The committee has studied all the available results of the cold water pipe development program. This report summarizes those results. The development and present capabilities of the computer programs used to calculate the response of a cold water pipe attached to a platform under known at-sea conditions are discussed. The various cold water pipe designs that have been done using the computer programs are summarized. The experiments that have been conducted up to the present time to measure the response of cold water pipes at-sea and in experimental tanks are described. The results of these experiments are presented. The experimental results are compared with the predictions made with the analytical computer programs. Conclusions drawn as a result of this analysis are presented and some recommendations are made. (WHK)

  18. Tri-Center Analysis: Determining Measures of Trichotomous Central Tendency for the Parametric Analysis of Tri-Squared Test Results

    ERIC Educational Resources Information Center

    Osler, James Edward

    2014-01-01

    This monograph provides an epistemological rational for the design of a novel post hoc statistical measure called "Tri-Center Analysis". This new statistic is designed to analyze the post hoc outcomes of the Tri-Squared Test. In Tri-Center Analysis trichotomous parametric inferential parametric statistical measures are calculated from…

  19. VoIP Implementation and Experiments on a Mobile Wireless AdHoc Network

    NASA Astrophysics Data System (ADS)

    Zhang, Hongqi; Yang, Oliver; Zhao, Jiying

    We have implemented a testbed to study the performance of VoIP in wireless ad hoc networks. The ASNC (Adaptive Source Network-rate Control) scheme is used to battle packet loss by feeding MOS (Mean Opinion Score) and loss information back to the sender. Our different VoIP experiments with measurements on delay, packet loss rate and MOS have validated the feasibility and efficiency of our scheme. It further verifies the simulator we used in the initial investigation.

  20. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks

    PubMed Central

    Vara, M. Isabel; Campo, Celeste

    2015-01-01

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead. PMID:26205272

  1. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks.

    PubMed

    Vara, M Isabel; Campo, Celeste

    2015-01-01

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead. PMID:26205272

  2. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks.

    PubMed

    Vara, M Isabel; Campo, Celeste

    2015-07-20

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead.

  3. An artificial immune system approach with secondary response for misbehavior detection in mobile ad hoc networks.

    PubMed

    Sarafijanović, Slavisa; Le Boudec, Jean-Yves

    2005-09-01

    In mobile ad hoc networks, nodes act both as terminals and information relays, and they participate in a common routing protocol, such as dynamic source routing (DSR). The network is vulnerable to routing misbehavior, due to faulty or malicious nodes. Misbehavior detection systems aim at removing this vulnerability. In this paper, we investigate the use of an artificial immune system (AIS) to detect node misbehavior in a mobile ad hoc network using DSR. The system is inspired by the natural immune system (IS) of vertebrates. Our goal is to build a system that, like its natural counterpart, automatically learns, and detects new misbehavior. We describe our solution for the classification task of the AIS; it employs negative selection and clonal selection, the algorithms for learning and adaptation used by the natural IS. We define how we map the natural IS concepts such as self, antigen, and antibody to a mobile ad hoc network and give the resulting algorithm for classifying nodes as misbehaving. We implemented the system in the network simulator Glomosim; we present detection results and discuss how the system parameters affect the performance of primary and secondary response. Further steps will extend the design by using an analogy to the innate system, danger signal, and memory cells.

  4. Distributed generation of shared RSA keys in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Liu, Yi-Liang; Huang, Qin; Shen, Ying

    2005-12-01

    Mobile Ad Hoc Networks is a totally new concept in which mobile nodes are able to communicate together over wireless links in an independent manner, independent of fixed physical infrastructure and centralized administrative infrastructure. However, the nature of Ad Hoc Networks makes them very vulnerable to security threats. Generation and distribution of shared keys for CA (Certification Authority) is challenging for security solution based on distributed PKI(Public-Key Infrastructure)/CA. The solutions that have been proposed in the literature and some related issues are discussed in this paper. The solution of a distributed generation of shared threshold RSA keys for CA is proposed in the present paper. During the process of creating an RSA private key share, every CA node only has its own private security. Distributed arithmetic is used to create the CA's private share locally, and that the requirement of centralized management institution is eliminated. Based on fully considering the Mobile Ad Hoc network's characteristic of self-organization, it avoids the security hidden trouble that comes by holding an all private security share of CA, with which the security and robustness of system is enhanced.

  5. A Dirichlet reputation system in reliable routing of wireless ad hoc network

    SciTech Connect

    Yang, Dr. Li; Cui, Xiaohui; Cemerlic, Alma

    2010-01-01

    Ad hoc networks are very helpful in situations when no fixed network infrastructure is available, such as natural disasters and military conflicts. In such a network, all wireless nodes are equal peers simultaneously serving as both senders and routers for other nodes. Therefore, how to route packets through reliable paths becomes a fundamental problems when behaviors of certain nodes deviate from wireless ad hoc routing protocols. We proposed a novel Dirichlet reputation model based on Bayesian inference theory which evaluates reliability of each node in terms of packet delivery. Our system offers a way to predict and select a reliable path through combination of first-hand observation and second-hand reputation reports. We also proposed moving window mechanism which helps to adjust ours responsiveness of our system to changes of node behaviors. We integrated the Dirichlet reputation into routing protocol of wireless ad hoc networks. Our extensive simulation indicates that our proposed reputation system can improve good throughput of the network and reduce negative impacts caused by misbehaving nodes.

  6. Nerve endoneurial microstructure facilitates uniform distribution of regenerative fibers: a post hoc comparison of midgraft nerve fiber densities.

    PubMed

    Johnson, Philip J; Newton, Piyaraj; Hunter, Daniel A; Mackinnon, Susan E

    2011-02-01

    Despite their inferiority to nerve autograft, clinical alternatives are commonly used for reconstruction of peripheral nerve injuries because of their convenient off-the-shelf availability. Previously, our group compared isografts with NeuraGen(®) (Integra, Plainsboro, NJ) nerve guides, which are a commercially available type I collagen conduit and processed rat allografts comparable to Avance(®) (AxoGen, Alachua, FL) human decellularized allograft product. From this study, qualitative observations were made of distinct differences in the pattern of regenerating fibers within conduits, acellular allografts, and isografts. In the current post hoc analysis, these observations were quantified. Using nerve density, we statistically compared the differential pattern of regenerating axon fibers within grafts and conduit. The conduits exhibited a consistent decrease in midgraft density when compared with the isograft and acellularized allografts at two gap lengths (14 mm and 28 mm) and time points (12 and 22 weeks). The decrease in density was accompanied by clustered distribution of nerve fibers in conduits, which contrasted the evenly distributed regeneration seen in processed allografts and isografts. We hypothesize that the lack of endoneurial microstructure of conduits results in the clustering regenerating fibers, and that the presence of microstructure in the acellularized allograft and isografts facilitates even distribution of regenerating fibers.

  7. Dynamic autonomous routing technology for IP-based satellite ad hoc networks

    NASA Astrophysics Data System (ADS)

    Wang, Xiaofei; Deng, Jing; Kostas, Theresa; Rajappan, Gowri

    2014-06-01

    IP-based routing for military LEO/MEO satellite ad hoc networks is very challenging due to network and traffic heterogeneity, network topology and traffic dynamics. In this paper, we describe a traffic priority-aware routing scheme for such networks, namely Dynamic Autonomous Routing Technology (DART) for satellite ad hoc networks. DART has a cross-layer design, and conducts routing and resource reservation concurrently for optimal performance in the fluid but predictable satellite ad hoc networks. DART ensures end-to-end data delivery with QoS assurances by only choosing routing paths that have sufficient resources, supporting different packet priority levels. In order to do so, DART incorporates several resource management and innovative routing mechanisms, which dynamically adapt to best fit the prevailing conditions. In particular, DART integrates a resource reservation mechanism to reserve network bandwidth resources; a proactive routing mechanism to set up non-overlapping spanning trees to segregate high priority traffic flows from lower priority flows so that the high priority flows do not face contention from low priority flows; a reactive routing mechanism to arbitrate resources between various traffic priorities when needed; a predictive routing mechanism to set up routes for scheduled missions and for anticipated topology changes for QoS assurance. We present simulation results showing the performance of DART. We have conducted these simulations using the Iridium constellation and trajectories as well as realistic military communications scenarios. The simulation results demonstrate DART's ability to discriminate between high-priority and low-priority traffic flows and ensure disparate QoS requirements of these traffic flows.

  8. Panel Discussion : Report of the APS Ad-Hoc Committee on LGBT Issues

    NASA Astrophysics Data System (ADS)

    Atherton, Tim; Barthelemy, Ramon; Garmon, Savannah; Reeves, Kyle; APS Ad-Hoc Committee on LGBT Issues Team

    Following the presentation of the findings and recommendations of the APS Ad-Hoc Committee on LGBT Issues (C-LGBT) by Committee Chair Michael Falk, a panel discussion will be held featuring several members of the committee. The discussion will focus on how APS can best ensure the recommendations of the committee are carried out in a timely fashion and other ideas on future APS efforts toward LGBT inclusion in physics. Discussion topics will also include the research and other input that shaped the committee's findings and recommendations.

  9. The HOCS paradigm shift from disciplinary knowledge (LOCS)--to interdisciplinary evaluative, system thinking (HOCS): what should it take in science-technology-environment-society oriented courses, curricula and assessment?

    PubMed

    Zoller, U; Scholz, R W

    2004-01-01

    Given the current world state of affairs, striving for sustainability and the consequent paradigm shift: growth-to-sustainable development, correction-to-prevention and options selection-to-options generation: the corresponding paradigm shift in science-technology-environment-society (STES) education is unavoidable. Accordingly, the essence of the current reform in STES education, worldwide, is a purposed effort to develop students' higher-order cognitive skills (HOCS) capability; i.e., question-asking, critical system thinking, decision making and problem solving, at the expense of the "delivery" of lower-order cognitive skills (LOCS)-oriented knowledge. This means a paradigm shift from the contemporary prevalent LOCS algorithmic teaching to HOCS evaluative learning and HOCS-promoting courses, curricula, teaching strategies and assessment methodologies, leading, hopefully to evaluative thinking and transfer. Following the formulation of selected relevant axioms, major paradigm shift in STES research and education for sustainability have been identified. The consequent shift, in the STES context, from disciplinary to inter- and transdisciplinary learning, in science technology and environmental engineering education is discussed, followed by selected examples of successfully implemented HOCS-promoting courses, and assessment methodologies. It is argued, that transferable "HOCS learning" for sustainability can and should be done.

  10. Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization in Mobile Ad Hoc Networks.

    PubMed

    Robinson, Y Harold; Rajaram, M

    2015-01-01

    Mobile ad hoc network (MANET) is a collection of autonomous mobile nodes forming an ad hoc network without fixed infrastructure. Dynamic topology property of MANET may degrade the performance of the network. However, multipath selection is a great challenging task to improve the network lifetime. We proposed an energy-aware multipath routing scheme based on particle swarm optimization (EMPSO) that uses continuous time recurrent neural network (CTRNN) to solve optimization problems. CTRNN finds the optimal loop-free paths to solve link disjoint paths in a MANET. The CTRNN is used as an optimum path selection technique that produces a set of optimal paths between source and destination. In CTRNN, particle swarm optimization (PSO) method is primly used for training the RNN. The proposed scheme uses the reliability measures such as transmission cost, energy factor, and the optimal traffic ratio between source and destination to increase routing performance. In this scheme, optimal loop-free paths can be found using PSO to seek better link quality nodes in route discovery phase. PSO optimizes a problem by iteratively trying to get a better solution with regard to a measure of quality. The proposed scheme discovers multiple loop-free paths by using PSO technique. PMID:26819966

  11. Stable nitrogen isotope ratios and accumulation of various HOCs in northern Baltic aquatic food chains

    SciTech Connect

    Broman, D.; Axelman, J.; Bergqvist, P.A.; Naef, C.; Rolff, C.; Zebuehr, Y.

    1995-12-31

    Ratios of naturally occurring stable isotopes of nitrogen ({delta}{sup 15}N) can be used to numerically classify trophic levels of organisms in food chains. By combining analyses results of various HOCs (e.g. PCDD/Fs, PCBs, DDTs, HCHs and some other pesticides) the biomagnification of these substances can be quantitatively estimated. In this paper different pelagic and benthic northern Baltic food chains were studied. The {delta}{sup 15}N-data gave food chain descriptions qualitatively consistent with previous conceptions of trophic arrangements in the food chains. The different HOCs concentrations were plotted versus the {delta}{sup 15}N-values for the different trophic levels and an exponential model of the form e{sup (A+B*{delta}N)} was fitted to the data. The estimates of the constant B in the model allows for an estimation of a biomagnification power (B) of different singular, or groups of, contaminants. A B-value around zero indicates that a substance is flowing through the food chain without being magnified, whereas a value > 0 indicates that a substance is biomagnified. Negative B-values indicate that a substance is not taken up or is metabolized. The A-term of the expression is only a scaling factor depending on the background level of the contaminant.

  12. Opportunistic Hybrid Transport Protocol (OHTP) for Cognitive Radio Ad Hoc Sensor Networks.

    PubMed

    Bin Zikria, Yousaf; Nosheen, Summera; Ishmanov, Farruh; Kim, Sung Won

    2015-01-01

    The inefficient assignment of spectrum for different communications purposes, plus technology enhancements and ever-increasing usage of wireless technology is causing spectrum scarcity. To address this issue, one of the proposed solutions in the literature is to access the spectrum dynamically or opportunistically. Therefore, the concept of cognitive radio appeared, which opens up a new research paradigm. There is extensive research on the physical, medium access control and network layers. The impact of the transport layer on the performance of cognitive radio ad hoc sensor networks is still unknown/unexplored. The Internet's de facto transport protocol is not well suited to wireless networks because of its congestion control mechanism. We propose an opportunistic hybrid transport protocol for cognitive radio ad hoc sensor networks. We developed a new congestion control mechanism to differentiate true congestion from interruption loss. After such detection and differentiation, we propose methods to handle them opportunistically. There are several benefits to window- and rate-based protocols. To exploit the benefits of both in order to enhance overall system performance, we propose a hybrid transport protocol. We empirically calculate the optimal threshold value to switch between window- and rate-based mechanisms. We then compare our proposed transport protocol to Transmission Control Protocol (TCP)-friendly rate control, TCP-friendly rate control for cognitive radio, and TCP-friendly window-based control. We ran an extensive set of simulations in Network Simulator 2. The results indicate that the proposed transport protocol performs better than all the others. PMID:26694396

  13. Adaptive Reliable Routing Protocol Using Combined Link Stability Estimation for Mobile Ad hoc Networks

    NASA Astrophysics Data System (ADS)

    Vadivel, R.; Bhaskaran, V. Murali

    2010-10-01

    The main reason for packet loss in ad hoc networks is the link failure or node failure. In order to increase the path stability, it is essential to distinguish and moderate the failures. By knowing individual link stability along a path, path stability can be identified. In this paper, we develop an adaptive reliable routing protocol using combined link stability estimation for mobile ad hoc networks. The main objective of this protocol is to determine a Quality of Service (QoS) path along with prolonging the network life time and to reduce the packet loss. We calculate a combined metric for a path based on the parameters Link Expiration Time, Node Remaining Energy and Node Velocity and received signal strength to predict the link stability or lifetime. Then, a bypass route is established to retransmit the lost data, when a link failure occurs. By simulation results, we show that the proposed reliable routing protocol achieves high delivery ratio with reduced delay and packet drop.

  14. A Secure 3-Way Routing Protocols for Intermittently Connected Mobile Ad Hoc Networks

    PubMed Central

    Parasuraman, Ganesh Kumar

    2014-01-01

    The mobile ad hoc network may be partially connected or it may be disconnected in nature and these forms of networks are termed intermittently connected mobile ad hoc network (ICMANET). The routing in such disconnected network is commonly an arduous task. Many routing protocols have been proposed for routing in ICMANET since decades. The routing techniques in existence for ICMANET are, namely, flooding, epidemic, probabilistic, copy case, spray and wait, and so forth. These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth. Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters. The algorithm along with efficient routing ensures higher degree of security. The security level is cited testing with respect to possibility of malicious nodes into the network. This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET. PMID:25136697

  15. Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization in Mobile Ad Hoc Networks

    PubMed Central

    Robinson, Y. Harold; Rajaram, M.

    2015-01-01

    Mobile ad hoc network (MANET) is a collection of autonomous mobile nodes forming an ad hoc network without fixed infrastructure. Dynamic topology property of MANET may degrade the performance of the network. However, multipath selection is a great challenging task to improve the network lifetime. We proposed an energy-aware multipath routing scheme based on particle swarm optimization (EMPSO) that uses continuous time recurrent neural network (CTRNN) to solve optimization problems. CTRNN finds the optimal loop-free paths to solve link disjoint paths in a MANET. The CTRNN is used as an optimum path selection technique that produces a set of optimal paths between source and destination. In CTRNN, particle swarm optimization (PSO) method is primly used for training the RNN. The proposed scheme uses the reliability measures such as transmission cost, energy factor, and the optimal traffic ratio between source and destination to increase routing performance. In this scheme, optimal loop-free paths can be found using PSO to seek better link quality nodes in route discovery phase. PSO optimizes a problem by iteratively trying to get a better solution with regard to a measure of quality. The proposed scheme discovers multiple loop-free paths by using PSO technique. PMID:26819966

  16. P-method post hoc test for adaptive trimmed mean, HQ

    NASA Astrophysics Data System (ADS)

    Low, Joon Khim; Yahaya, Sharipah Soaad Syed; Abdullah, Suhaida; Yusof, Zahayu Md; Othman, Abdul Rahman

    2014-12-01

    Adaptive trimmed mean, HQ, which is one of the latest additions in robust estimators, had been proven to be good in controlling Type I error in omnibus test. However, post hoc (pairwise multiple comparison) procedure for HQ was yet to be developed then. Thus, we have taken the initiative to develop post hoc procedure for HQ. Percentile bootstrap method or P-Method was proposed as it was proven to be effective in controlling Type I error rate even when the sample size was small. This paper deliberates on the effectiveness of P-Method on HQ, denoted as P-HQ. The strength and weakness of the proposed method were put to test on various conditions created by manipulating several variables such as shape of distributions, number of groups, sample sizes, degree of variance heterogeneity and pairing of sample sizes and group variances. For such, a simulation study on 2000 datasets was conducted using SAS/IML Version 9.2. The performance of the method on various conditions was based on its ability in controlling Type I error which was benchmarked using Bradley's criterion of robustness. The finding revealed that P-HQ could effectively control Type I error for almost all the conditions investigated.

  17. Linking Satellites Via Earth "Hot Spots" and the Internet to Form Ad Hoc Constellations

    NASA Technical Reports Server (NTRS)

    Mandl, Dan; Frye, Stu; Grosvenor, Sandra; Ingram, Mary Ann; Langley, John; Miranda, Felix; Lee, Richard Q.; Romanofsky, Robert; Zaman, Afoz; Popovic, Zoya

    2004-01-01

    As more assets are placed in orbit, opportunities emerge to combine various sets of satellites in temporary constellations to perform collaborative image collections. Often, new operations concepts for a satellite or set of satellites emerge after launch. To the degree with which new space assets can be inexpensively and rapidly integrated into temporary or "ad hoc" constellations, will determine whether these new ideas will be implemented or not. On the Earth Observing 1 (EO-1) satellite, a New Millennium Program mission, a number of experiments were conducted and are being conducted to demonstrate various aspects of an architecture that, when taken as a whole, will enable progressive mission autonomy. In particular, the target architecture will use adaptive ground antenna arrays to form, as close as possible, the equivalent of wireless access points for low earth orbiting satellites. Coupled with various ground and flight software and the Internet. the architecture enables progressive mission autonomy. Thus, new collaborative sensing techniques can be implemented post-launch. This paper will outline the overall operations concept and highlight details of both the research effort being conducted in hoc constellations, mission autonomy and

  18. Intelligent QoS routing algorithm based on improved AODV protocol for Ad Hoc networks

    NASA Astrophysics Data System (ADS)

    Huibin, Liu; Jun, Zhang

    2016-04-01

    Mobile Ad Hoc Networks were playing an increasingly important part in disaster reliefs, military battlefields and scientific explorations. However, networks routing difficulties are more and more outstanding due to inherent structures. This paper proposed an improved cuckoo searching-based Ad hoc On-Demand Distance Vector Routing protocol (CSAODV). It elaborately designs the calculation methods of optimal routing algorithm used by protocol and transmission mechanism of communication-package. In calculation of optimal routing algorithm by CS Algorithm, by increasing QoS constraint, the found optimal routing algorithm can conform to the requirements of specified bandwidth and time delay, and a certain balance can be obtained among computation spending, bandwidth and time delay. Take advantage of NS2 simulation software to take performance test on protocol in three circumstances and validate the feasibility and validity of CSAODV protocol. In results, CSAODV routing protocol is more adapt to the change of network topological structure than AODV protocol, which improves package delivery fraction of protocol effectively, reduce the transmission time delay of network, reduce the extra burden to network brought by controlling information, and improve the routing efficiency of network.

  19. Opportunistic Hybrid Transport Protocol (OHTP) for Cognitive Radio Ad Hoc Sensor Networks.

    PubMed

    Bin Zikria, Yousaf; Nosheen, Summera; Ishmanov, Farruh; Kim, Sung Won

    2015-12-15

    The inefficient assignment of spectrum for different communications purposes, plus technology enhancements and ever-increasing usage of wireless technology is causing spectrum scarcity. To address this issue, one of the proposed solutions in the literature is to access the spectrum dynamically or opportunistically. Therefore, the concept of cognitive radio appeared, which opens up a new research paradigm. There is extensive research on the physical, medium access control and network layers. The impact of the transport layer on the performance of cognitive radio ad hoc sensor networks is still unknown/unexplored. The Internet's de facto transport protocol is not well suited to wireless networks because of its congestion control mechanism. We propose an opportunistic hybrid transport protocol for cognitive radio ad hoc sensor networks. We developed a new congestion control mechanism to differentiate true congestion from interruption loss. After such detection and differentiation, we propose methods to handle them opportunistically. There are several benefits to window- and rate-based protocols. To exploit the benefits of both in order to enhance overall system performance, we propose a hybrid transport protocol. We empirically calculate the optimal threshold value to switch between window- and rate-based mechanisms. We then compare our proposed transport protocol to Transmission Control Protocol (TCP)-friendly rate control, TCP-friendly rate control for cognitive radio, and TCP-friendly window-based control. We ran an extensive set of simulations in Network Simulator 2. The results indicate that the proposed transport protocol performs better than all the others.

  20. Distinguishing congestion from malicious behavior in mobile ad-hoc networks

    NASA Astrophysics Data System (ADS)

    Ding, Jin; Medidi, Sirisha R.

    2004-08-01

    Packet dropping in Mobile Ad-hoc Networks could be a result of wireless link errors, congestion, or malicious packet drop attack. Current techniques for detecting malicious behavior either do not consider congestion in the network or are not able to detect in real time. Further more, they usually work at network layer. In this paper, we propose a TCP-Manet protocol, which reacts to congestion like TCP Reno protocol, and has additional capability to distinguish among congestion, wireless link error, and malicious packet drop attack. It is an end-to-end mechanism that does not require additional modifications to the nodes in the network. Since it is an extension of existing TCP protocol, it is compatible with existing protocols. It works in conjunction with the network layer and an unobtrusive monitor to assist the network in the detection and characterization of the nature of the behavior. Experimental results show that TCP-Manet has the same performance as that of TCP-Reno in wired network, and performs better in wireless ad-hoc networks in terms of throughput while having good detection effectiveness.

  1. Greedy data transportation scheme with hard packet deadlines for wireless ad hoc networks.

    PubMed

    Lee, HyungJune

    2014-01-01

    We present a greedy data transportation scheme with hard packet deadlines in ad hoc sensor networks of stationary nodes and multiple mobile nodes with scheduled trajectory path and arrival time. In the proposed routing strategy, each stationary ad hoc node en route decides whether to relay a shortest-path stationary node toward destination or a passing-by mobile node that will carry closer to destination. We aim to utilize mobile nodes to minimize the total routing cost as far as the selected route can satisfy the end-to-end packet deadline. We evaluate our proposed routing algorithm in terms of routing cost, packet delivery ratio, packet delivery time, and usability of mobile nodes based on network level simulations. Simulation results show that our proposed algorithm fully exploits the remaining time till packet deadline to turn into networking benefits of reducing the overall routing cost and improving packet delivery performance. Also, we demonstrate that the routing scheme guarantees packet delivery with hard deadlines, contributing to QoS improvement in various network services.

  2. A robust cross-layer metric for routing protocol in mobile wireless ad hoc networks

    NASA Astrophysics Data System (ADS)

    Mucchi, Lorenzo; Chisci, Luigi; Fabbrini, Luca; Giovannetti, Giulio

    2012-12-01

    In a mobile ad-hoc network (MANET) where Mobile Nodes (MNs) self-organize to ensure the communication over radio links, routing protocols clearly play a significant role. In future MANETs, protocols should provide routing under full mobility, power constraints, fast time-varying channels, and nodes subject to high loading. In this article, a novel robust routing protocol, named distributed X-layer fastest path (DXFP), is proposed. The protocol is based on a cross-layer metric which is robust against the time-variations of the network as far as topology (mobility), congestion of the nodes and channel quality (fading, power constraints) are concerned. All these features are integrated in a single physical cost, i.e., the network crossing time, which has to be minimized. Furthermore, several routes from source to destination are stored for a given data flow to efficiently face the disconnections which frequently occur in MANETs. It is shown that the DXFP protocol, though locally operating in a fully distributed way within the MNs, provides, for each data flow, the optimum routes according to the considered metric. The DXFP protocol has been compared with two of the most commonly used routing protocols for MANETs, i.e., dynamic source routing and ad hoc on-demand distance vector, showing significant improvements in performance and robustness.

  3. Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization in Mobile Ad Hoc Networks.

    PubMed

    Robinson, Y Harold; Rajaram, M

    2015-01-01

    Mobile ad hoc network (MANET) is a collection of autonomous mobile nodes forming an ad hoc network without fixed infrastructure. Dynamic topology property of MANET may degrade the performance of the network. However, multipath selection is a great challenging task to improve the network lifetime. We proposed an energy-aware multipath routing scheme based on particle swarm optimization (EMPSO) that uses continuous time recurrent neural network (CTRNN) to solve optimization problems. CTRNN finds the optimal loop-free paths to solve link disjoint paths in a MANET. The CTRNN is used as an optimum path selection technique that produces a set of optimal paths between source and destination. In CTRNN, particle swarm optimization (PSO) method is primly used for training the RNN. The proposed scheme uses the reliability measures such as transmission cost, energy factor, and the optimal traffic ratio between source and destination to increase routing performance. In this scheme, optimal loop-free paths can be found using PSO to seek better link quality nodes in route discovery phase. PSO optimizes a problem by iteratively trying to get a better solution with regard to a measure of quality. The proposed scheme discovers multiple loop-free paths by using PSO technique.

  4. Trusted Routing Based on Dynamic Trust Mechanism in Mobile Ad-Hoc Networks

    NASA Astrophysics Data System (ADS)

    Peng, Sancheng; Jia, Weijia; Wang, Guojun; Wu, Jie; Guo, Minyi

    Due to the distributed nature, mobile ad-hoc networks (MANETs) are vulnerable to various attacks, resulting in distrusted communications. To achieve trusted communications, it is important to build trusted routes in routing algorithms in a self-organizing and decentralized fashion. This paper proposes a trusted routing to locate and to preserve trusted routes in MANETs. Instead of using a hard security mechanism, we employ a new dynamic trust mechanism based on multiple constraints and collaborative filtering. The dynamic trust mechanism can effectively evaluate the trust and obtain the precise trust value among nodes, and can also be integrated into existing routing protocols for MANETs, such as ad hoc on-demand distance vector routing (AODV) and dynamic source routing (DSR). As an example, we present a trusted routing protocol, based on dynamic trust mechanism, by extending DSR, in which a node makes a routing decision based on the trust values on its neighboring nodes, and finally, establish a trusted route through the trust values of the nodes along the route in MANETs. The effectiveness of our approach is validated through extensive simulations.

  5. A secure 3-way routing protocols for intermittently connected mobile ad hoc networks.

    PubMed

    Sekaran, Ramesh; Parasuraman, Ganesh Kumar

    2014-01-01

    The mobile ad hoc network may be partially connected or it may be disconnected in nature and these forms of networks are termed intermittently connected mobile ad hoc network (ICMANET). The routing in such disconnected network is commonly an arduous task. Many routing protocols have been proposed for routing in ICMANET since decades. The routing techniques in existence for ICMANET are, namely, flooding, epidemic, probabilistic, copy case, spray and wait, and so forth. These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth. Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters. The algorithm along with efficient routing ensures higher degree of security. The security level is cited testing with respect to possibility of malicious nodes into the network. This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET.

  6. A secure 3-way routing protocols for intermittently connected mobile ad hoc networks.

    PubMed

    Sekaran, Ramesh; Parasuraman, Ganesh Kumar

    2014-01-01

    The mobile ad hoc network may be partially connected or it may be disconnected in nature and these forms of networks are termed intermittently connected mobile ad hoc network (ICMANET). The routing in such disconnected network is commonly an arduous task. Many routing protocols have been proposed for routing in ICMANET since decades. The routing techniques in existence for ICMANET are, namely, flooding, epidemic, probabilistic, copy case, spray and wait, and so forth. These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth. Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters. The algorithm along with efficient routing ensures higher degree of security. The security level is cited testing with respect to possibility of malicious nodes into the network. This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET. PMID:25136697

  7. On the Connectivity, Lifetime and Hop Count of Routes Determined Using the City Section and Manhattan Mobility Models for Vehicular Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Meghanathan, Natarajan

    The high-level contribution of this paper is a simulation based analysis of the network connectivity, hop count and lifetime of the routes determined for vehicular ad hoc networks (VANETs) using the City Section and Manhattan mobility models. The Random Waypoint mobility model is used as a benchmark in the simulation studies. Two kinds of paths are determined on the sequence of static graphs representing the topology over the duration of the network session: paths with the minimum hop count (using the Dijkstra algorithm) and stable paths with the longest lifetime (using our recently proposed OptPathTrans algorithm). Simulation results indicate that the City Section model provided higher network connectivity compared to the Manhattan model for all the network scenarios. Minimum hop paths and stable paths determined under the Manhattan model have a smaller lifetime and larger hop count compared to those determined using the City Section and Random Waypoint mobility models.

  8. Energy-efficient distributed constructions of miniumum spanning tree for wireless ad-hoc networks

    SciTech Connect

    Kumar, V. S. A.; Pandurangan, G.; Khan, M.

    2004-01-01

    The Minimum Spanning Tree (MST) problem is one of the most important and commonly occurring primitive in the design and operation of data and communication networks. While there a redistributed algorithms for the MST problem these require relatively large number of messages and time, and are fairly involved, require synchronization and a lot of book keeping; this makes these algorithms impractical for emerging technologies such as ad hoc and sensor networks. In such networks, a sensor has very limited power, and any algorithm needs to be simple, local and energy efficient for being practical. Motivated by these considerations, we study the performance of a class of simple and local algorithms called Nearest Neighbor Tree (NNT) algorithms for energy-efficient construction of MSTs in a wireless ad hoc setting. These employ a very simple idea to eliminate the work involved in cycle detection in other MST algorithms: each node chooses a distinct rank, and connects to the closest node of higher rank. We consider two variants of the NNT algorithms, obtained by two ways of choosing the ranks: (i) Random NNT, in which each node chooses a rank randomly, and (ii) Directional NNT, in which each node uses directional information for choosing the rank. We show provable bounds on the performance of these algorithms in instances obtained by uniformly distributed points in the unit square. Finally, we perform extensive simulations of our algorithms. We tested our algorithms on both uniformly random distributions of points, and on realistic distributions of points in an urban setting. The cost of the tree found by the NNT algorithms is within a factor of 2 of the MST, but there is more than a ten-fold saving on the energy and about a five fold saving on the number of messages sent. Also, our algorithms are significantly simpler to implement compared to, for instance, the GHS algorithm, which is essentially optimal with regards to the message complexity. Thus, our results

  9. Intelligent self-organization methods for wireless ad hoc sensor networks based on limited resources

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2006-05-01

    A wireless ad hoc sensor network (WSN) is a configuration for area surveillance that affords rapid, flexible deployment in arbitrary threat environments. There is no infrastructure support and sensor nodes communicate with each other only when they are in transmission range. To a greater degree than the terminals found in mobile ad hoc networks (MANETs) for communications, sensor nodes are resource-constrained, with limited computational processing, bandwidth, memory, and power, and are typically unattended once in operation. Consequently, the level of information exchange among nodes, to support any complex adaptive algorithms to establish network connectivity and optimize throughput, not only deplete those limited resources and creates high overhead in narrowband communications, but also increase network vulnerability to eavesdropping by malicious nodes. Cooperation among nodes, critical to the mission of sensor networks, can thus be disrupted by the inappropriate choice of the method for self-organization. Recent published contributions to the self-configuration of ad hoc sensor networks, e.g., self-organizing mapping and swarm intelligence techniques, have been based on the adaptive control of the cross-layer interactions found in MANET protocols to achieve one or more performance objectives: connectivity, intrusion resistance, power control, throughput, and delay. However, few studies have examined the performance of these algorithms when implemented with the limited resources of WSNs. In this paper, self-organization algorithms for the initiation, operation and maintenance of a network topology from a collection of wireless sensor nodes are proposed that improve the performance metrics significant to WSNs. The intelligent algorithm approach emphasizes low computational complexity, energy efficiency and robust adaptation to change, allowing distributed implementation with the actual limited resources of the cooperative nodes of the network. Extensions of the

  10. Performance Evaluation Analysis of Group Mobility in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Irshad, Ehtsham; Noshairwan, Wajahat; Shafiq, Muhammad; Khurram, Shahzada; Irshad, Azeem; Usman, Muhammad

    Mobility of nodes is an important issue in mobile adhoc networks (MANET). Nodes in MANET move from one network to another individually and in the form of group. In single node mobility scheme every node performs registration individually in new MANET whereas in group mobility scheme only one node in a group i.e group representative (GR) performs registration on behalf of all other nodes in the group and is assigned Care of Address (CoA). Internet protocol (IP) of all other nodes in the group remains same. Our simulated results prove that group mobility scheme reduces number of messages and consumes less time for registration of nodes as compared to single node mobility scheme. Thus network load is reduced in group mobility scheme. This research paper evaluates the performance of group mobility with single node mobility scheme. Test bed for this evaluation is based on Network Simulator 2 (NS-2) environment.

  11. Who Should Be the Winner: A "Post Hoc" Analysis of the 2000 US Election

    ERIC Educational Resources Information Center

    Wu, D. W.

    2006-01-01

    The 2000 US presidential election between Al Gore and George W. Bush has been the most intriguing and controversial in American history. Using the Florida ballot data, Wu showed that the 2000 election result could have been reversed had the "butterfly ballot effect" been eliminated. Through a combinatorial approach, Harger concluded that Gore…

  12. A Leasing Model to Deal with Partial Failures in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Gonzalez Boix, Elisa; van Cutsem, Tom; Vallejos, Jorge; de Meuter, Wolfgang; D'Hondt, Theo

    In mobile ad hoc networks (MANETs) many partial failures are the result of temporary network partitions due to the intermittent connectivity of mobile devices. Some of these failures will be permanent and require application-level failure handling. However, it is impossible to distinguish a permanent from a transient failure. Leasing provides a solution to this problem based on the temporal restriction of resources. But to date no leasing model has been designed specifically for MANETs. In this paper, we identify three characteristics required for a leasing model to be usable in a MANET, discuss the issues with existing leasing models and then propose the leased object references model, which integrates leasing with remote object references. In addition, we describe an implementation of the model in the programming language AmbientTalk. Leased object references provide an extensible framework that allows programmers to express their own leasing patterns and enables both lease holders (clients) and lease grantors (services) to deal with permanent failures.

  13. Distributed Spectrum Sharing for Video Streaming in Cognitive Radio Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Ding, Lei; Pudlewski, Scott; Melodia, Tommaso; Batalama, Stella; Matyjas, John D.; Medley, Michael J.

    A distributed joint routing and spectrum sharing algorithm for video streaming applications over cognitive radio ad hoc networks is proposed in this article. The proposed cross-layer control scheme dynamically allocates routes, spectrum and power to maximize the network throughput under the constraints posed by delay-sensitive video applications. The algorithm evaluates the expected delay of competing flows in single-hop and two-hop networks considering the time-varying spectrum condition and occupancy, traffic characteristics, and the condition of queues at intermediate nodes. Simulation results show that the proposed algorithm significantly reduces the packet loss rate and improves the average peak signal-to-noise ratio (PSNR) of the received video streams.

  14. Reducing Congestion in Obstructed Highways with Traffic Data Dissemination Using Ad hoc Vehicular Networks

    NASA Astrophysics Data System (ADS)

    Hewer, Thomas D.; Nekovee, Maziar; Coveney, Peter V.

    2010-12-01

    Vehicle-to-vehicle communications can be used effectively for intelligent transport systems (ITSs) and location-aware services. The ability to disseminate information in an ad hoc fashion allows pertinent information to propagate faster through a network. In the realm of ITS, the ability to spread warning information faster and further is of great advantage to receivers. In this paper we propose and present a message-dissemination procedure that uses vehicular wireless protocols to influence vehicular flow, reducing congestion in road networks. The computational experiments we present show how a car-following model and lane-change algorithm can be adapted to "react" to the reception of information. This model also illustrates the advantages of coupling together with vehicular flow modelling tools and network simulation tools.

  15. Secure Adaptive Topology Control for Wireless Ad-Hoc Sensor Networks

    PubMed Central

    Hsueh, Ching-Tsung; Li, Yu-Wei; Wen, Chih-Yu; Ouyang, Yen-Chieh

    2010-01-01

    This paper presents a secure decentralized clustering algorithm for wireless ad-hoc sensor networks. The algorithm operates without a centralized controller, operates asynchronously, and does not require that the location of the sensors be known a priori. Based on the cluster-based topology, secure hierarchical communication protocols and dynamic quarantine strategies are introduced to defend against spam attacks, since this type of attacks can exhaust the energy of sensor nodes and will shorten the lifetime of a sensor network drastically. By adjusting the threshold of infected percentage of the cluster coverage, our scheme can dynamically coordinate the proportion of the quarantine region and adaptively achieve the cluster control and the neighborhood control of attacks. Simulation results show that the proposed approach is feasible and cost effective for wireless sensor networks. PMID:22205866

  16. Noise-Assisted Concurrent Multipath Traffic Distribution in Ad Hoc Networks

    PubMed Central

    Murata, Masayuki

    2013-01-01

    The concept of biologically inspired networking has been introduced to tackle unpredictable and unstable situations in computer networks, especially in wireless ad hoc networks where network conditions are continuously changing, resulting in the need of robustness and adaptability of control methods. Unfortunately, existing methods often rely heavily on the detailed knowledge of each network component and the preconfigured, that is, fine-tuned, parameters. In this paper, we utilize a new concept, called attractor perturbation (AP), which enables controlling the network performance using only end-to-end information. Based on AP, we propose a concurrent multipath traffic distribution method, which aims at lowering the average end-to-end delay by only adjusting the transmission rate on each path. We demonstrate through simulations that, by utilizing the attractor perturbation relationship, the proposed method achieves a lower average end-to-end delay compared to other methods which do not take fluctuations into account. PMID:24319375

  17. On measurements and their quality: Paper 3: Post hoc pooling and errors of discreteness.

    PubMed

    Beckstead, Jason W

    2014-03-01

    This is the third in a short series of papers on measurement theory and practice with particular relevance to research in nursing, midwifery, and healthcare. In this paper I demonstrate how the decisions we make regarding the post hoc treatment of our measurements impact the quality of our data and influence the validity of the inferences we draw from them. I address two variations of this practice, pooling data over response options found on self-report measures, and transforming measurements of continuous variables, such as age, into ranges or ordered categories. The problems inherent in this practice are examined using concepts from information theory. Pooling more precise measurements into less precise ones creates errors of discreteness that introduce unpredictable (positive or negative) bias in our results.

  18. Effective route maintenance and restoration schemes in mobile ad hoc networks.

    PubMed

    Kang, Byung-Seok; Ko, In-Young

    2010-01-01

    This study proposes a location-based hybrid routing protocol to improve data packet delivery and to reduce control message overhead in mobile ad hoc networks. In mobile environments, where nodes move continuously at a high speed, it is generally difficult to maintain and restore route paths. Therefore, this study suggests a new flooding mechanism to control route paths. The essence of the proposed scheme is its effective tracking of the destination's location based on the beacon messages of the main route nodes. Through experiments based on an NS-2 simulator, the proposed scheme shows improvements in the data packet delivery ratio and reduces the amount of routing control message overhead compared with existing routing protocols such as AODV, LAR, ZRP and AODV-DFR.

  19. Noise-assisted concurrent multipath traffic distribution in ad hoc networks.

    PubMed

    Asvarujanon, Narun; Leibnitz, Kenji; Wakamiya, Naoki; Murata, Masayuki

    2013-01-01

    The concept of biologically inspired networking has been introduced to tackle unpredictable and unstable situations in computer networks, especially in wireless ad hoc networks where network conditions are continuously changing, resulting in the need of robustness and adaptability of control methods. Unfortunately, existing methods often rely heavily on the detailed knowledge of each network component and the preconfigured, that is, fine-tuned, parameters. In this paper, we utilize a new concept, called attractor perturbation (AP), which enables controlling the network performance using only end-to-end information. Based on AP, we propose a concurrent multipath traffic distribution method, which aims at lowering the average end-to-end delay by only adjusting the transmission rate on each path. We demonstrate through simulations that, by utilizing the attractor perturbation relationship, the proposed method achieves a lower average end-to-end delay compared to other methods which do not take fluctuations into account.

  20. Security enhancement for mobile ad hoc networks routing with OLSRv2

    NASA Astrophysics Data System (ADS)

    Wei, Zhexiong; Tang, Helen; Yu, F. Richard; Wang, Maoyu

    2013-05-01

    Some features of Mobile Ad hoc Networks (MANETs), including dynamic membership, topology, and open wireless medium, introduce a variety of security risks. Malicious nodes can drop or modify packets that are received from other nodes. These malicious activities may seriously affect the availability of services in MANETs. Therefore, secure routing in MANETs has emerged as an important MANET research area. In this paper, we propose a scheme that enhances the security of Optimal Link State Routing version 2 (OLSRv2) in MANETs based on trust. In the proposed scheme, more accurate trust can be obtained by considering different types of packets and other important factors that may cause dropping packets in friendly nodes, such as buffer overflows and unreliable wireless connections. Simulation results are presented to demonstrate the effectiveness of the proposed scheme.

  1. A Secure Routing Using Reliable 1-Hop Broadcast in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Park, Seungjin; Yoo, Seong-Moo

    Among many ways to achieve security in wireless mobile ad hoc networks, the approach taken in this paper is to ensure that all nodes in the network receive critical information on security such as public keys. To achieve this, a reliable global broadcasting of the information must be accomplished, which in turn, relies on a reliable 1-hop broadcasting in which a message from the source node is guaranteed to be delivered to all nodes within the source node's transmission range. This paper presents a MAC protocol that guarantees a reliable and efficient 1-hop broadcast. The unique feature of the proposed algorithm is that each node is able to dynamically adjust its transmission range depending on the node density around it. Simulation results show the effectiveness of the proposed algorithm.

  2. A high performance, ad-hoc, fuzzy query processing system for relational databases

    NASA Technical Reports Server (NTRS)

    Mansfield, William H., Jr.; Fleischman, Robert M.

    1992-01-01

    Database queries involving imprecise or fuzzy predicates are currently an evolving area of academic and industrial research. Such queries place severe stress on the indexing and I/O subsystems of conventional database environments since they involve the search of large numbers of records. The Datacycle architecture and research prototype is a database environment that uses filtering technology to perform an efficient, exhaustive search of an entire database. It has recently been modified to include fuzzy predicates in its query processing. The approach obviates the need for complex index structures, provides unlimited query throughput, permits the use of ad-hoc fuzzy membership functions, and provides a deterministic response time largely independent of query complexity and load. This paper describes the Datacycle prototype implementation of fuzzy queries and some recent performance results.

  3. Effective Route Maintenance and Restoration Schemes in Mobile Ad Hoc Networks

    PubMed Central

    Kang, Byung-Seok; Ko, In-Young

    2010-01-01

    This study proposes a location-based hybrid routing protocol to improve data packet delivery and to reduce control message overhead in mobile ad hoc networks. In mobile environments, where nodes move continuously at a high speed, it is generally difficult to maintain and restore route paths. Therefore, this study suggests a new flooding mechanism to control route paths. The essence of the proposed scheme is its effective tracking of the destination’s location based on the beacon messages of the main route nodes. Through experiments based on an NS-2 simulator, the proposed scheme shows improvements in the data packet delivery ratio and reduces the amount of routing control message overhead compared with existing routing protocols such as AODV, LAR, ZRP and AODV-DFR. PMID:22315570

  4. Post-hoc power estimation for topological inference in fMRI.

    PubMed

    Durnez, Joke; Moerkerke, Beatrijs; Nichols, Thomas E

    2014-01-01

    When analyzing functional MRI data, several thresholding procedures are available to account for the huge number of volume units or features that are tested simultaneously. The main focus of these methods is to prevent an inflation of false positives. However, this comes with a serious decrease in power and leads to a problematic imbalance between type I and type II errors. In this paper, we show how estimating the number of activated peaks or clusters enables one to estimate post-hoc how powerful the selection procedure performs. This procedure can be used in real studies as a diagnostics tool, and raises awareness on how much activation is potentially missed. The method is evaluated and illustrated using simulations and a real data example. Our real data example illustrates the lack of power in current fMRI research.

  5. Opportunistic Hybrid Transport Protocol (OHTP) for Cognitive Radio Ad Hoc Sensor Networks

    PubMed Central

    Zikria, Yousaf Bin; Nosheen, Summera; Ishmanov, Farruh; Kim, Sung Won

    2015-01-01

    The inefficient assignment of spectrum for different communications purposes, plus technology enhancements and ever-increasing usage of wireless technology is causing spectrum scarcity. To address this issue, one of the proposed solutions in the literature is to access the spectrum dynamically or opportunistically. Therefore, the concept of cognitive radio appeared, which opens up a new research paradigm. There is extensive research on the physical, medium access control and network layers. The impact of the transport layer on the performance of cognitive radio ad hoc sensor networks is still unknown/unexplored. The Internet’s de facto transport protocol is not well suited to wireless networks because of its congestion control mechanism. We propose an opportunistic hybrid transport protocol for cognitive radio ad hoc sensor networks. We developed a new congestion control mechanism to differentiate true congestion from interruption loss. After such detection and differentiation, we propose methods to handle them opportunistically. There are several benefits to window- and rate-based protocols. To exploit the benefits of both in order to enhance overall system performance, we propose a hybrid transport protocol. We empirically calculate the optimal threshold value to switch between window- and rate-based mechanisms. We then compare our proposed transport protocol to Transmission Control Protocol (TCP)-friendly rate control, TCP-friendly rate control for cognitive radio, and TCP-friendly window-based control. We ran an extensive set of simulations in Network Simulator 2. The results indicate that the proposed transport protocol performs better than all the others. PMID:26694396

  6. Post hoc interlaboratory comparison of single particle ICP-MS size measurements of NIST gold nanoparticle reference materials.

    PubMed

    Montoro Bustos, Antonio R; Petersen, Elijah J; Possolo, Antonio; Winchester, Michael R

    2015-09-01

    Single particle inductively coupled plasma-mass spectrometry (spICP-MS) is an emerging technique that enables simultaneous measurement of nanoparticle size and number quantification of metal-containing nanoparticles at realistic environmental exposure concentrations. Such measurements are needed to understand the potential environmental and human health risks of nanoparticles. Before spICP-MS can be considered a mature methodology, additional work is needed to standardize this technique including an assessment of the reliability and variability of size distribution measurements and the transferability of the technique among laboratories. This paper presents the first post hoc interlaboratory comparison study of the spICP-MS technique. Measurement results provided by six expert laboratories for two National Institute of Standards and Technology (NIST) gold nanoparticle reference materials (RM 8012 and RM 8013) were employed. The general agreement in particle size between spICP-MS measurements and measurements by six reference techniques demonstrates the reliability of spICP-MS and validates its sizing capability. However, the precision of the spICP-MS measurement was better for the larger 60 nm gold nanoparticles and evaluation of spICP-MS precision indicates substantial variability among laboratories, with lower variability between operators within laboratories. Global particle number concentration and Au mass concentration recovery were quantitative for RM 8013 but significantly lower and with a greater variability for RM 8012. Statistical analysis did not suggest an optimal dwell time, because this parameter did not significantly affect either the measured mean particle size or the ability to count nanoparticles. Finally, the spICP-MS data were often best fit with several single non-Gaussian distributions or mixtures of Gaussian distributions, rather than the more frequently used normal or log-normal distributions.

  7. Federal Government Printing and Publishing: Policy Issues. Report of the Ad Hoc Advisory Committee on Revision of Title 44.

    ERIC Educational Resources Information Center

    Joint Committee on Printing, Washington, DC.

    Designed to present a better understanding of the government's system of printing and distributing information and to highlight problems, alternatives, and important policy questions, this report synthesizes 13 weeks of the Ad Hoc Advisory Committee hearings on six topics: (1) Administration of policy--who should establish and administer policy in…

  8. Ad Hoc Conference on the Education of Migrants: Conclusions and Recommendations (Strasbourg, France, November 5-8, 1974).

    ERIC Educational Resources Information Center

    Council of Europe, Strasbourg (France). Documentation Center for Education in Europe.

    The 9th session of the Ad Hoc Conference on the Education of Migrants had 3 themes. Theme I was "measures to improve the position of immigrants and their families, primarily in respect of their educational circumstances, at the time of arrival in the host country." The second theme was "measures to secure satisfactory educational provision before…

  9. Future Information Services at the Texas A&M University Library: Background and Recommendations (Report of an Ad Hoc Committee).

    ERIC Educational Resources Information Center

    Cook, Colleen; And Others

    The Ad Hoc Committee on Future Information Services explored possible future directions for information services at Texas A&M University Library and developed a plan to guide the library into the next decade in terms of automated access to information. In exploring future directions for automated information services, the committee members…

  10. Virtual machine-based simulation platform for mobile ad-hoc network-based cyber infrastructure

    DOE PAGES

    Yoginath, Srikanth B.; Perumalla, Kayla S.; Henz, Brian J.

    2015-09-29

    In modeling and simulating complex systems such as mobile ad-hoc networks (MANETs) in de-fense communications, it is a major challenge to reconcile multiple important considerations: the rapidity of unavoidable changes to the software (network layers and applications), the difficulty of modeling the critical, implementation-dependent behavioral effects, the need to sustain larger scale scenarios, and the desire for faster simulations. Here we present our approach in success-fully reconciling them using a virtual time-synchronized virtual machine(VM)-based parallel ex-ecution framework that accurately lifts both the devices as well as the network communications to a virtual time plane while retaining full fidelity. At themore » core of our framework is a scheduling engine that operates at the level of a hypervisor scheduler, offering a unique ability to execute multi-core guest nodes over multi-core host nodes in an accurate, virtual time-synchronized manner. In contrast to other related approaches that suffer from either speed or accuracy issues, our framework provides MANET node-wise scalability, high fidelity of software behaviors, and time-ordering accuracy. The design and development of this framework is presented, and an ac-tual implementation based on the widely used Xen hypervisor system is described. Benchmarks with synthetic and actual applications are used to identify the benefits of our approach. The time inaccuracy of traditional emulation methods is demonstrated, in comparison with the accurate execution of our framework verified by theoretically correct results expected from analytical models of the same scenarios. In the largest high fidelity tests, we are able to perform virtual time-synchronized simulation of 64-node VM-based full-stack, actual software behaviors of MANETs containing a mix of static and mobile (unmanned airborne vehicle) nodes, hosted on a 32-core host, with full fidelity of unmodified ad-hoc routing protocols, unmodified

  11. Virtual machine-based simulation platform for mobile ad-hoc network-based cyber infrastructure

    SciTech Connect

    Yoginath, Srikanth B.; Perumalla, Kayla S.; Henz, Brian J.

    2015-09-29

    In modeling and simulating complex systems such as mobile ad-hoc networks (MANETs) in de-fense communications, it is a major challenge to reconcile multiple important considerations: the rapidity of unavoidable changes to the software (network layers and applications), the difficulty of modeling the critical, implementation-dependent behavioral effects, the need to sustain larger scale scenarios, and the desire for faster simulations. Here we present our approach in success-fully reconciling them using a virtual time-synchronized virtual machine(VM)-based parallel ex-ecution framework that accurately lifts both the devices as well as the network communications to a virtual time plane while retaining full fidelity. At the core of our framework is a scheduling engine that operates at the level of a hypervisor scheduler, offering a unique ability to execute multi-core guest nodes over multi-core host nodes in an accurate, virtual time-synchronized manner. In contrast to other related approaches that suffer from either speed or accuracy issues, our framework provides MANET node-wise scalability, high fidelity of software behaviors, and time-ordering accuracy. The design and development of this framework is presented, and an ac-tual implementation based on the widely used Xen hypervisor system is described. Benchmarks with synthetic and actual applications are used to identify the benefits of our approach. The time inaccuracy of traditional emulation methods is demonstrated, in comparison with the accurate execution of our framework verified by theoretically correct results expected from analytical models of the same scenarios. In the largest high fidelity tests, we are able to perform virtual time-synchronized simulation of 64-node VM-based full-stack, actual software behaviors of MANETs containing a mix of static and mobile (unmanned airborne vehicle) nodes, hosted on a 32-core host, with full fidelity of unmodified ad-hoc routing protocols, unmodified application

  12. A Sensitive Secondary Users Selection Algorithm for Cognitive Radio Ad Hoc Networks

    PubMed Central

    Li, Aohan; Han, Guangjie; Wan, Liangtian; Shu, Lei

    2016-01-01

    Secondary Users (SUs) are allowed to use the temporarily unused licensed spectrum without disturbing Primary Users (PUs) in Cognitive Radio Ad Hoc Networks (CRAHNs). Existing architectures for CRAHNs impose energy-consuming Cognitive Radios (CRs) on SUs. However, the advanced CRs will increase energy cost for their cognitive functionalities, which is undesirable for the battery powered devices. A new architecture referred to as spectral Requirement-based CRAHN (RCRAHN) is proposed to enhance energy efficiency for CRAHNs in this paper. In RCRAHNs, only parts of SUs are equipped with CRs. SUs equipped with CRs are referred to as Cognitive Radio Users (CRUs). To further enhance energy efficiency of CRAHNs, we aim to select minimum CRUs to sense available spectrum. A non-linear programming problem is mathematically formulated under the constraints of energy efficiency and real-time. Considering the NP-hardness of the problem, a framework of a heuristic algorithm referred to as Sensitive Secondary Users Selection (SSUS) was designed to compute the near-optimal solutions. The simulation results demonstrate that SSUS not only improves the energy efficiency, but also achieves satisfied performances in end-to-end delay and communication reliability. PMID:27023562

  13. A Sensitive Secondary Users Selection Algorithm for Cognitive Radio Ad Hoc Networks.

    PubMed

    Li, Aohan; Han, Guangjie; Wan, Liangtian; Shu, Lei

    2016-01-01

    Secondary Users (SUs) are allowed to use the temporarily unused licensed spectrum without disturbing Primary Users (PUs) in Cognitive Radio Ad Hoc Networks (CRAHNs). Existing architectures for CRAHNs impose energy-consuming Cognitive Radios (CRs) on SUs. However, the advanced CRs will increase energy cost for their cognitive functionalities, which is undesirable for the battery powered devices. A new architecture referred to as spectral Requirement-based CRAHN (RCRAHN) is proposed to enhance energy efficiency for CRAHNs in this paper. In RCRAHNs, only parts of SUs are equipped with CRs. SUs equipped with CRs are referred to as Cognitive Radio Users (CRUs). To further enhance energy efficiency of CRAHNs, we aim to select minimum CRUs to sense available spectrum. A non-linear programming problem is mathematically formulated under the constraints of energy efficiency and real-time. Considering the NP-hardness of the problem, a framework of a heuristic algorithm referred to as Sensitive Secondary Users Selection (SSUS) was designed to compute the near-optimal solutions. The simulation results demonstrate that SSUS not only improves the energy efficiency, but also achieves satisfied performances in end-to-end delay and communication reliability. PMID:27023562

  14. Securing mobile ad hoc networks using danger theory-based artificial immune algorithm.

    PubMed

    Abdelhaq, Maha; Alsaqour, Raed; Abdelhaq, Shawkat

    2015-01-01

    A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs. PMID:25946001

  15. Integration of Body Sensor Networks and Vehicular Ad-hoc Networks for Traffic Safety.

    PubMed

    Reyes-Muñoz, Angelica; Domingo, Mari Carmen; López-Trinidad, Marco Antonio; Delgado, José Luis

    2016-01-01

    The emergence of Body Sensor Networks (BSNs) constitutes a new and fast growing trend for the development of daily routine applications. However, in the case of heterogeneous BSNs integration with Vehicular ad hoc Networks (VANETs) a large number of difficulties remain, that must be solved, especially when talking about the detection of human state factors that impair the driving of motor vehicles. The main contributions of this investigation are principally three: (1) an exhaustive review of the current mechanisms to detect four basic physiological behavior states (drowsy, drunk, driving under emotional state disorders and distracted driving) that may cause traffic accidents is presented; (2) A middleware architecture is proposed. This architecture can communicate with the car dashboard, emergency services, vehicles belonging to the VANET and road or street facilities. This architecture seeks on the one hand to improve the car driving experience of the driver and on the other hand to extend security mechanisms for the surrounding individuals; and (3) as a proof of concept, an Android real-time attention low level detection application that runs in a next-generation smartphone is developed. The application features mechanisms that allow one to measure the degree of attention of a driver on the base of her/his EEG signals, establish wireless communication links via various standard wireless means, GPRS, Bluetooth and WiFi and issue alarms of critical low driver attention levels. PMID:26784204

  16. Securing Mobile Ad Hoc Networks Using Danger Theory-Based Artificial Immune Algorithm

    PubMed Central

    2015-01-01

    A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs. PMID:25946001

  17. Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks

    PubMed Central

    Paramasivan, B.; Kaliappan, M.

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP. PMID:25143986

  18. Integration of Body Sensor Networks and Vehicular Ad-hoc Networks for Traffic Safety

    PubMed Central

    Reyes-Muñoz, Angelica; Domingo, Mari Carmen; López-Trinidad, Marco Antonio; Delgado, José Luis

    2016-01-01

    The emergence of Body Sensor Networks (BSNs) constitutes a new and fast growing trend for the development of daily routine applications. However, in the case of heterogeneous BSNs integration with Vehicular ad hoc Networks (VANETs) a large number of difficulties remain, that must be solved, especially when talking about the detection of human state factors that impair the driving of motor vehicles. The main contributions of this investigation are principally three: (1) an exhaustive review of the current mechanisms to detect four basic physiological behavior states (drowsy, drunk, driving under emotional state disorders and distracted driving) that may cause traffic accidents is presented; (2) A middleware architecture is proposed. This architecture can communicate with the car dashboard, emergency services, vehicles belonging to the VANET and road or street facilities. This architecture seeks on the one hand to improve the car driving experience of the driver and on the other hand to extend security mechanisms for the surrounding individuals; and (3) as a proof of concept, an Android real-time attention low level detection application that runs in a next-generation smartphone is developed. The application features mechanisms that allow one to measure the degree of attention of a driver on the base of her/his EEG signals, establish wireless communication links via various standard wireless means, GPRS, Bluetooth and WiFi and issue alarms of critical low driver attention levels. PMID:26784204

  19. Energy Efficient Link Aware Routing with Power Control in Wireless Ad Hoc Networks.

    PubMed

    Katiravan, Jeevaa; Sylvia, D; Rao, D Srinivasa

    2015-01-01

    In wireless ad hoc networks, the traditional routing protocols make the route selection based on minimum distance between the nodes and the minimum number of hop counts. Most of the routing decisions do not consider the condition of the network such as link quality and residual energy of the nodes. Also, when a link failure occurs, a route discovery mechanism is initiated which incurs high routing overhead. If the broadcast nature and the spatial diversity of the wireless communication are utilized efficiently it becomes possible to achieve improvement in the performance of the wireless networks. In contrast to the traditional routing scheme which makes use of a predetermined route for packet transmission, such an opportunistic routing scheme defines a predefined forwarding candidate list formed by using single network metrics. In this paper, a protocol is proposed which uses multiple metrics such as residual energy and link quality for route selection and also includes a monitoring mechanism which initiates a route discovery for a poor link, thereby reducing the overhead involved and improving the throughput of the network while maintaining network connectivity. Power control is also implemented not only to save energy but also to improve the network performance. Using simulations, we show the performance improvement attained in the network in terms of packet delivery ratio, routing overhead, and residual energy of the network.

  20. Securing mobile ad hoc networks using danger theory-based artificial immune algorithm.

    PubMed

    Abdelhaq, Maha; Alsaqour, Raed; Abdelhaq, Shawkat

    2015-01-01

    A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs.

  1. Standardization of negative controls in diagnostic immunohistochemistry: recommendations from the international ad hoc expert panel.

    PubMed

    Torlakovic, Emina E; Francis, Glenn; Garratt, John; Gilks, Blake; Hyjek, Elizabeth; Ibrahim, Merdol; Miller, Rodney; Nielsen, Søren; Petcu, Eugen B; Swanson, Paul E; Taylor, Clive R; Vyberg, Mogens

    2014-04-01

    Standardization of controls, both positive and negative controls, is needed for diagnostic immunohistochemistry (dIHC). The use of IHC-negative controls, irrespective of type, although well established, is not standardized. As such, the relevance and applicability of negative controls continues to challenge both pathologists and laboratory budgets. Despite the clear theoretical notion that appropriate controls serve to demonstrate the sensitivity and specificity of the dIHC test, it remains unclear which types of positive and negative controls are applicable and/or useful in day-to-day clinical practice. There is a perceived need to provide "best practice recommendations" for the use of negative controls. This perception is driven not only by logistics and cost issues, but also by increased pressure for accurate IHC testing, especially when IHC is performed for predictive markers, the number of which is rising as personalized medicine continues to develop. Herein, an international ad hoc expert panel reviews classification of negative controls relevant to clinical practice, proposes standard terminology for negative controls, considers the total evidence of IHC specificity that is available to pathologists, and develops a set of recommendations for the use of negative controls in dIHC based on "fit-for-use" principles.

  2. Ad Hoc Query Support For Very Large Simulation Mesh Data: The Metadata Approach

    SciTech Connect

    Lee, B; Snapp, R; Musick, R; Critchlow, T

    2001-12-17

    We present our approach to enabling approximate ad hoc queries on terabyte-scale mesh data generated from large scientific simulations through the extension and integration of database, statistical, and data mining techniques. There are several significant barriers to overcome in achieving this objective. First, large-scale simulation data is already at the multi-terabyte scale and growing quickly, thus rendering traditional forms of interactive data exploration and query processing untenable. Second, a priori knowledge of user queries is not available, making it impossible to tune special-purpose solutions. Third, the data has spatial and temporal aspects, as well as arbitrarily high dimensionality, which exacerbates the task of finding compact, accurate, and easy-to-compute data models. Our approach is to preprocess the mesh data to generate highly compressed, lossy models that are used in lieu of the original data to answer users' queries. This approach leads to interesting challenges. The model (equivalently, the content-oriented metadata) being generated must be smaller than the original data by at least an order of magnitude. Second, the metadata representation must contain enough information to support a broad class of queries. Finally, the accuracy and speed of the queries must be within the tolerances required by users. In this paper we give an overview of ongoing development efforts with an emphasis on extracting metadata and using it in query processing.

  3. A DNA-Inspired Encryption Methodology for Secure, Mobile Ad Hoc Networks

    NASA Technical Reports Server (NTRS)

    Shaw, Harry

    2012-01-01

    Users are pushing for greater physical mobility with their network and Internet access. Mobile ad hoc networks (MANET) can provide an efficient mobile network architecture, but security is a key concern. A figure summarizes differences in the state of network security for MANET and fixed networks. MANETs require the ability to distinguish trusted peers, and tolerate the ingress/egress of nodes on an unscheduled basis. Because the networks by their very nature are mobile and self-organizing, use of a Public Key Infra structure (PKI), X.509 certificates, RSA, and nonce ex changes becomes problematic if the ideal of MANET is to be achieved. Molecular biology models such as DNA evolution can provide a basis for a proprietary security architecture that achieves high degrees of diffusion and confusion, and resistance to cryptanalysis. A proprietary encryption mechanism was developed that uses the principles of DNA replication and steganography (hidden word cryptography) for confidentiality and authentication. The foundation of the approach includes organization of coded words and messages using base pairs organized into genes, an expandable genome consisting of DNA-based chromosome keys, and a DNA-based message encoding, replication, and evolution and fitness. In evolutionary computing, a fitness algorithm determines whether candidate solutions, in this case encrypted messages, are sufficiently encrypted to be transmitted. The technology provides a mechanism for confidential electronic traffic over a MANET without a PKI for authenticating users.

  4. Adaptive Control Parameters for Dispersal of Multi-Agent Mobile Ad Hoc Network (MANET) Swarms

    SciTech Connect

    Kurt Derr; Milos Manic

    2013-11-01

    A mobile ad hoc network is a collection of independent nodes that communicate wirelessly with one another. This paper investigates nodes that are swarm robots with communications and sensing capabilities. Each robot in the swarm may operate in a distributed and decentralized manner to achieve some goal. This paper presents a novel approach to dynamically adapting control parameters to achieve mesh configuration stability. The presented approach to robot interaction is based on spring force laws (attraction and repulsion laws) to create near-optimal mesh like configurations. In prior work, we presented the extended virtual spring mesh (EVSM) algorithm for the dispersion of robot swarms. This paper extends the EVSM framework by providing the first known study on the effects of adaptive versus static control parameters on robot swarm stability. The EVSM algorithm provides the following novelties: 1) improved performance with adaptive control parameters and 2) accelerated convergence with high formation effectiveness. Simulation results show that 120 robots reach convergence using adaptive control parameters more than twice as fast as with static control parameters in a multiple obstacle environment.

  5. A Sensitive Secondary Users Selection Algorithm for Cognitive Radio Ad Hoc Networks.

    PubMed

    Li, Aohan; Han, Guangjie; Wan, Liangtian; Shu, Lei

    2016-03-26

    Secondary Users (SUs) are allowed to use the temporarily unused licensed spectrum without disturbing Primary Users (PUs) in Cognitive Radio Ad Hoc Networks (CRAHNs). Existing architectures for CRAHNs impose energy-consuming Cognitive Radios (CRs) on SUs. However, the advanced CRs will increase energy cost for their cognitive functionalities, which is undesirable for the battery powered devices. A new architecture referred to as spectral Requirement-based CRAHN (RCRAHN) is proposed to enhance energy efficiency for CRAHNs in this paper. In RCRAHNs, only parts of SUs are equipped with CRs. SUs equipped with CRs are referred to as Cognitive Radio Users (CRUs). To further enhance energy efficiency of CRAHNs, we aim to select minimum CRUs to sense available spectrum. A non-linear programming problem is mathematically formulated under the constraints of energy efficiency and real-time. Considering the NP-hardness of the problem, a framework of a heuristic algorithm referred to as Sensitive Secondary Users Selection (SSUS) was designed to compute the near-optimal solutions. The simulation results demonstrate that SSUS not only improves the energy efficiency, but also achieves satisfied performances in end-to-end delay and communication reliability.

  6. Energy-efficient algorithm for broadcasting in ad hoc wireless sensor networks.

    PubMed

    Xiong, Naixue; Huang, Xingbo; Cheng, Hongju; Wan, Zheng

    2013-04-12

    Broadcasting is a common and basic operation used to support various network protocols in wireless networks. To achieve energy-efficient broadcasting is especially important for ad hoc wireless sensor networks because sensors are generally powered by batteries with limited lifetimes. Energy consumption for broadcast operations can be reduced by minimizing the number of relay nodes based on the observation that data transmission processes consume more energy than data reception processes in the sensor nodes, and how to improve the network lifetime is always an interesting issue in sensor network research. The minimum-energy broadcast problem is then equivalent to the problem of finding the minimum Connected Dominating Set (CDS) for a connected graph that is proved NP-complete. In this paper, we introduce an Efficient Minimum CDS algorithm (EMCDS) with help of a proposed ordered sequence list. EMCDS does not concern itself with node energy and broadcast operations might fail if relay nodes are out of energy. Next we have proposed a Minimum Energy-consumption Broadcast Scheme (MEBS) with a modified version of EMCDS, and aimed at providing an efficient scheduling scheme with maximized network lifetime. The simulation results show that the proposed EMCDS algorithm can find smaller CDS compared with related works, and the MEBS can help to increase the network lifetime by efficiently balancing energy among nodes in the networks.

  7. Data Delivery Method Based on Neighbor Nodes' Information in a Mobile Ad Hoc Network

    PubMed Central

    Hayashi, Takuma; Taenaka, Yuzo; Okuda, Takeshi; Yamaguchi, Suguru

    2014-01-01

    This paper proposes a data delivery method based on neighbor nodes' information to achieve reliable communication in a mobile ad hoc network (MANET). In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE), Chachulski et al. (2007), improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow. PMID:24672371

  8. Data delivery method based on neighbor nodes' information in a mobile ad hoc network.

    PubMed

    Kashihara, Shigeru; Hayashi, Takuma; Taenaka, Yuzo; Okuda, Takeshi; Yamaguchi, Suguru

    2014-01-01

    This paper proposes a data delivery method based on neighbor nodes' information to achieve reliable communication in a mobile ad hoc network (MANET). In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE), Chachulski et al. (2007), improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow.

  9. An Ad-hoc Satellite Network to Measure Filamentary Current Structures in the Auroral Zone

    NASA Astrophysics Data System (ADS)

    Nabong, C.; Fritz, T. A.; Semeter, J. L.

    2014-12-01

    An ad-hoc cubesat-based satellite network project known as ANDESITE is under development at Boston University. It aims to develop a dense constellation of easy-to-use, rapidly-deployable low-cost wireless sensor nodes in space. The objectives of the project are threefold: 1) Demonstrate viability of satellite based sensor networks by deploying an 8-node miniature sensor network to study the filamentation of the field aligned currents in the auroral zones of the Earth's magnetosphere. 2) Test the scalability of proposed protocols, including localization techniques, tracking, data aggregation, and routing, for a 3 dimensional wireless sensor network using a "flock" of nodes. 3) Construct a 6U Cube-sat running the Android OS as an integrated constellation manager, data mule and sensor node deplorer. This small network of sensor nodes will resolve current densities at different spatial resolutions in the near-Earth magnetosphere using measurements from magnetometers with 1-nT sensitivities and 0.2 nT/√Hz self-noise. Mapping of these currents will provide new constraints for models of auroral particle acceleration, wave-particle interactions, ionospheric destabilization, and other kinetic processes operating in the low-beta plasma of the near Earth magnetosphere.

  10. Enhancing the selection of backoff interval using fuzzy logic over wireless Ad Hoc networks.

    PubMed

    Ranganathan, Radha; Kannan, Kathiravan

    2015-01-01

    IEEE 802.11 is the de facto standard for medium access over wireless ad hoc network. The collision avoidance mechanism (i.e., random binary exponential backoff-BEB) of IEEE 802.11 DCF (distributed coordination function) is inefficient and unfair especially under heavy load. In the literature, many algorithms have been proposed to tune the contention window (CW) size. However, these algorithms make every node select its backoff interval between [0, CW] in a random and uniform manner. This randomness is incorporated to avoid collisions among the nodes. But this random backoff interval can change the optimal order and frequency of channel access among competing nodes which results in unfairness and increased delay. In this paper, we propose an algorithm that schedules the medium access in a fair and effective manner. This algorithm enhances IEEE 802.11 DCF with additional level of contention resolution that prioritizes the contending nodes according to its queue length and waiting time. Each node computes its unique backoff interval using fuzzy logic based on the input parameters collected from contending nodes through overhearing. We evaluate our algorithm against IEEE 802.11, GDCF (gentle distributed coordination function) protocols using ns-2.35 simulator and show that our algorithm achieves good performance.

  11. VehiHealth: An Emergency Routing Protocol for Vehicular Ad Hoc Network to Support Healthcare System.

    PubMed

    Bhoi, S K; Khilar, P M

    2016-03-01

    Survival of a patient depends on effective data communication in healthcare system. In this paper, an emergency routing protocol for Vehicular Ad hoc Network (VANET) is proposed to quickly forward the current patient status information from the ambulance to the hospital to provide pre-medical treatment. As the ambulance takes time to reach the hospital, ambulance doctor can provide sudden treatment to the patient in emergency by sending patient status information to the hospital through the vehicles using vehicular communication. Secondly, the experienced doctors respond to the information by quickly sending a treatment information to the ambulance. In this protocol, data is forwarded through that path which has less link breakage problem between the vehicles. This is done by calculating an intersection value I v a l u e for the neighboring intersections by using the current traffic information. Then the data is forwarded through that intersection which has minimum I v a l u e . Simulation results show VehiHealth performs better than P-GEDIR, GyTAR, A-STAR and GSR routing protocols in terms of average end-to-end delay, number of link breakage, path length, and average response time.

  12. Road Accident Prevention with Instant Emergency Warning Message Dissemination in Vehicular Ad-Hoc Network.

    PubMed

    Gokulakrishnan, P; Ganeshkumar, P

    2015-01-01

    A Road Accident Prevention (RAP) scheme based on Vehicular Backbone Network (VBN) structure is proposed in this paper for Vehicular Ad-hoc Network (VANET). The RAP scheme attempts to prevent vehicles from highway road traffic accidents and thereby reduces death and injury rates. Once the possibility of an emergency situation (i.e. an accident) is predicted in advance, instantly RAP initiates a highway road traffic accident prevention scheme. The RAP scheme constitutes the following activities: (i) the Road Side Unit (RSU) constructs a Prediction Report (PR) based on the status of the vehicles and traffic in the highway roads, (ii) the RSU generates an Emergency Warning Message (EWM) based on an abnormal PR, (iii) the RSU forms a VBN structure and (iv) the RSU disseminates the EWM to the vehicles that holds the high Risk Factor (RF) and travels in High Risk Zone (HRZ). These vehicles might reside either within the RSU's coverage area or outside RSU's coverage area (reached using VBN structure). The RAP scheme improves the performance of EWM dissemination in terms of increase in notification and decrease in end-to-end delay. The RAP scheme also reduces infrastructure cost (number of RSUs) by formulating and deploying the VBN structure. The RAP scheme with VBN structure improves notification by 19 percent and end-to-end delay by 14.38 percent for a vehicle density of 160 vehicles. It is also proved from the simulation experiment that the performance of RAP scheme is promising in 4-lane highway roads.

  13. SVANET: A smart vehicular ad hoc network for efficient data transmission with wireless sensors.

    PubMed

    Sahoo, Prasan Kumar; Chiang, Ming-Jer; Wu, Shih-Lin

    2014-01-01

    Wireless sensors can sense any event, such as accidents, as well as icy roads, and can forward the rescue/warning messages through intermediate vehicles for any necessary help. In this paper, we propose a smart vehicular ad hoc network (SVANET) architecture that uses wireless sensors to detect events and vehicles to transmit the safety and non-safety messages efficiently by using different service channels and one control channel with different priorities. We have developed a data transmission protocol for the vehicles in the highway, in which data can be forwarded with the help of vehicles if they are connected with each other or data can be forwarded with the help of nearby wireless sensors. Our data transmission protocol is designed to increase the driving safety, to prevent accidents and to utilize channels efficiently by adjusting the control and service channel time intervals dynamically. Besides, our protocol can transmit information to vehicles in advance, so that drivers can decide an alternate route in case of traffic congestion. For various data sharing, we design a method that can select a few leader nodes among vehicles running along a highway to broadcast data efficiently. Simulation results show that our protocol can outperform the existing standard in terms of the end to end packet delivery ratio and latency. PMID:25429409

  14. Report of the APS Ad-Hoc Committee on LGBT Issues - Presentation of Findings and Recommendations

    NASA Astrophysics Data System (ADS)

    Falk, Michael

    In 2014 the Executive Officer of the American Physical Society (APS), Kate Kirby, created an Ad-Hoc Committee on LGBT Issues (C-LGBT) charged with reporting on the obstacles to inclusion of LGBT physicists, a term which for the purpose of this report refers to persons who self-identify as lesbian, gay, bisexual, transgender, queer, questioning, intersex, or asexual, as well as other sexual and gender minorities. The full charge was as follows: ``The committee will advise the APS on the current status of LGBT issues in physics, provide recommendations for greater inclusion, and engage physicists in laying the foundation for a more inclusive physics community. ?More specifically, the committee will investigate LGBT representation in physics, assess the educational and professional climate in physics, recommend changes in policies and practices that impact LGBT physicists, and address other issues that affect inclusion.'' We will present the findings and recommendations of the C-LGBT final report, and a panel discussion will be held following the presentation to discuss the future of APS efforts toward LGBT inclusion in physics.

  15. Report of the APS Ad-Hoc Committee on LGBT Issues - Presentation of Findings and Recommendations

    NASA Astrophysics Data System (ADS)

    Long, Elena

    2016-03-01

    In 2014 the Executive Officer of the American Physical Society (APS), Kate Kirby, created an Ad-Hoc Committee on LGBT Issues (C-LGBT) charged with reporting on the obstacles to inclusion of LGBT physicists, a term which for the purpose of this report refers to persons who self-identify as lesbian, gay, bisexual, transgender, queer, questioning, intersex, or asexual, as well as other sexual and gender minorities. The full charge was as follows: ``The committee will advise the APS on the current status of LGBT issues in physics, provide recommendations for greater inclusion, and engage physicists in laying the foundation for a more inclusive physics community? More specifically, the committee will investigate LGBT representation in physics, assess the educational and professional climate in physics, recommend changes in policies and practices that impact LGBT physicists, and address other issues that affect inclusion.'' We will present the findings and recommendations of the C-LGBT final report, and a panel discussion will be held following the presentation to discuss the future of APS efforts toward LGBT inclusion in physics.

  16. Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.

    PubMed

    Paramasivan, B; Kaliappan, M

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  17. Mean field game theoretic approach for security in mobile ad-hoc networks

    NASA Astrophysics Data System (ADS)

    Wang, Yanwei; Tang, Helen; Yu, F. Richard; Huang, Minyi

    2013-05-01

    Game theory can provide a useful tool to study the security problem in mobile ad hoc networks (MANETs). Most existing work on applying game theories to security only considers two players in the security game model: an attacker and a defender. While this assumption is valid for a network with centralized administration, it may not be realistic in MANETs, where centralized administration is not available. Consequently, each individual node in a MANET should be treated separately in the security game model. In this paper, using recent advances in mean field game theory, we propose a novel game theoretic approach for security in MANETs. Mean field game theory provides a powerful mathematical tool for problems with a large number of players. Since security defence mechanisms consume precious system resources (e.g., energy), the proposed scheme considers not only the security requirement of MANETs but also the system resources. In addition, each node only needs to know its own state information and the aggregate effect of the other nodes in the MANET. Therefore, the proposed scheme is a fully distributed scheme. Simulation results are presented to illustrate the effectiveness of the proposed scheme.

  18. A Threshold-Adaptive Reputation System on Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsai, Hsiao-Chien; Lo, Nai-Wei; Wu, Tzong-Chen

    In recent years huge potential benefits from novel applications in mobile ad hoc networks (MANET) have been discussed extensively. However, without robust security mechanisms and systems to provide safety shell through the MANET infrastructure, MANET applications can be vulnerable and hammered by malicious attackers easily. In order to detect misbehaved message routing and identify malicious attackers in MANET, schemes based on reputation concept have shown their advantages in this area in terms of good scalability and simple threshold-based detection strategy. We observed that previous reputation schemes generally use predefined thresholds which do not take into account the effect of behavior dynamics between nodes in a period of time. In this paper, we propose a Threshold-Adaptive Reputation System (TARS) to overcome the shortcomings of static threshold strategy and improve the overall MANET performance under misbehaved routing attack. A fuzzy-based inference engine is introduced to evaluate the trustiness of a node's one-hop neighbors. Malicious nodes whose trust values are lower than the adaptive threshold, will be detected and filtered out by their honest neighbors during trustiness evaluation process. The results of network simulation show that the TARS outperforms other compared schemes under security attacks in most cases and at the same time reduces the decrease of total packet delivery ratio by 67% in comparison with MANET without reputation system.

  19. SVANET: A Smart Vehicular Ad Hoc Network for Efficient Data Transmission with Wireless Sensors

    PubMed Central

    Sahoo, Prasan Kumar; Chiang, Ming-Jer; Wu, Shih-Lin

    2014-01-01

    Wireless sensors can sense any event, such as accidents, as well as icy roads, and can forward the rescue/warning messages through intermediate vehicles for any necessary help. In this paper, we propose a smart vehicular ad hoc network (SVANET) architecture that uses wireless sensors to detect events and vehicles to transmit the safety and non-safety messages efficiently by using different service channels and one control channel with different priorities. We have developed a data transmission protocol for the vehicles in the highway, in which data can be forwarded with the help of vehicles if they are connected with each other or data can be forwarded with the help of nearby wireless sensors. Our data transmission protocol is designed to increase the driving safety, to prevent accidents and to utilize channels efficiently by adjusting the control and service channel time intervals dynamically. Besides, our protocol can transmit information to vehicles in advance, so that drivers can decide an alternate route in case of traffic congestion. For various data sharing, we design a method that can select a few leader nodes among vehicles running along a highway to broadcast data efficiently. Simulation results show that our protocol can outperform the existing standard in terms of the end to end packet delivery ratio and latency. PMID:25429409

  20. Integration of Body Sensor Networks and Vehicular Ad-hoc Networks for Traffic Safety.

    PubMed

    Reyes-Muñoz, Angelica; Domingo, Mari Carmen; López-Trinidad, Marco Antonio; Delgado, José Luis

    2016-01-15

    The emergence of Body Sensor Networks (BSNs) constitutes a new and fast growing trend for the development of daily routine applications. However, in the case of heterogeneous BSNs integration with Vehicular ad hoc Networks (VANETs) a large number of difficulties remain, that must be solved, especially when talking about the detection of human state factors that impair the driving of motor vehicles. The main contributions of this investigation are principally three: (1) an exhaustive review of the current mechanisms to detect four basic physiological behavior states (drowsy, drunk, driving under emotional state disorders and distracted driving) that may cause traffic accidents is presented; (2) A middleware architecture is proposed. This architecture can communicate with the car dashboard, emergency services, vehicles belonging to the VANET and road or street facilities. This architecture seeks on the one hand to improve the car driving experience of the driver and on the other hand to extend security mechanisms for the surrounding individuals; and (3) as a proof of concept, an Android real-time attention low level detection application that runs in a next-generation smartphone is developed. The application features mechanisms that allow one to measure the degree of attention of a driver on the base of her/his EEG signals, establish wireless communication links via various standard wireless means, GPRS, Bluetooth and WiFi and issue alarms of critical low driver attention levels.

  1. A Distributed and Cooperative Algorithm for the Detection and Elimination of Multiple Black Hole Nodes in Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Yu, Chang Wu; Wu, Tung-Kuang; Cheng, Rei-Heng; Yu, Kun-Ming; Chang, Shun Chao

    A mobile node in ad hoc networks may move arbitrarily and act as a router and a host simultaneously. Such a characteristic makes nodes in MANET vulnerable to potential attacks. The black hole problem, in which some malicious nodes pretend to be intermediate nodes of a route to some given destinations and drop packets that pass through it, is one of the major types of attack. In this paper, we propose a distributed and cooperative mechanism to tackle the black hole problem. The mechanism is distributed so that it suits the ad hoc nature of network, and nodes in the protocol cooperate so that they can analyze, detect, and eliminate possible multiple black-hole nodes in a more reliable fashion. Simulation results show that our method achieves a high black hole detection rate and good packet delivery rate, while the overhead is comparatively lower as the network traffic increases.

  2. Lessons learnt from the CERCA Project, a multicomponent intervention to promote adolescent sexual and reproductive health in three Latin America countries: a qualitative post-hoc evaluation.

    PubMed

    Ivanova, Olena; Pozo, Kathya Cordova; Segura, Zoyla Esmeralda; Vega, Bernardo; Chandra-Mouli, Venkatraman; Hindin, Michelle J; Temmerman, Marleen; Decat, Peter; De Meyer, Sara; Michielsen, Kristien

    2016-10-01

    The Community-Embedded Reproductive Health Care for Adolescents (CERCA) Project was implemented in Bolivia, Ecuador and Nicaragua (2011-2014) to test the effectiveness of interventions preventing teenage pregnancies. As the outcome evaluation showed limited impact, a post-hoc process evaluation was carried out to determine if and how CERCA's design, implementation, monitoring and evaluation affected the results. We did a document analysis and conducted 18 in-depth interviews and 21 focus group discussions with stakeholders and beneficiaries. Transcripts were analyzed using directed content analysis. Data showed that CERCA sensitized stakeholders and encouraged the discussion on this sensitive issue. In terms of design, a strong point was the participatory approach; a weak point was that the detailed situation analysis was completed too late. In terms of implementation, a strong point was that multifaceted activities were implemented; a weak point was that the activities were not pilot tested for feasibility/acceptability and evolved substantially throughout the Project. In terms of monitoring, strong points were that regular monitoring kept the Project on track administratively/financially; a weak point was that monitoring indicators did not change as the intervention package changed. In terms of evaluation, weak points were the substantial attrition rate and narrow focus on adolescents. This study provides recommendations for future projects.

  3. Lessons learnt from the CERCA Project, a multicomponent intervention to promote adolescent sexual and reproductive health in three Latin America countries: a qualitative post-hoc evaluation.

    PubMed

    Ivanova, Olena; Pozo, Kathya Cordova; Segura, Zoyla Esmeralda; Vega, Bernardo; Chandra-Mouli, Venkatraman; Hindin, Michelle J; Temmerman, Marleen; Decat, Peter; De Meyer, Sara; Michielsen, Kristien

    2016-10-01

    The Community-Embedded Reproductive Health Care for Adolescents (CERCA) Project was implemented in Bolivia, Ecuador and Nicaragua (2011-2014) to test the effectiveness of interventions preventing teenage pregnancies. As the outcome evaluation showed limited impact, a post-hoc process evaluation was carried out to determine if and how CERCA's design, implementation, monitoring and evaluation affected the results. We did a document analysis and conducted 18 in-depth interviews and 21 focus group discussions with stakeholders and beneficiaries. Transcripts were analyzed using directed content analysis. Data showed that CERCA sensitized stakeholders and encouraged the discussion on this sensitive issue. In terms of design, a strong point was the participatory approach; a weak point was that the detailed situation analysis was completed too late. In terms of implementation, a strong point was that multifaceted activities were implemented; a weak point was that the activities were not pilot tested for feasibility/acceptability and evolved substantially throughout the Project. In terms of monitoring, strong points were that regular monitoring kept the Project on track administratively/financially; a weak point was that monitoring indicators did not change as the intervention package changed. In terms of evaluation, weak points were the substantial attrition rate and narrow focus on adolescents. This study provides recommendations for future projects. PMID:27347640

  4. Use of synthesized data to support complex ad-hoc queries in an enterprise information warehouse: a diabetes use case.

    PubMed

    Rogers, Patrick; Erdal, Selnur; Santangelo, Jennifer; Liu, Jianhua; Schuster, Dara; Kamal, Jyoti

    2008-11-06

    The Ohio State University Medical Center (OSUMC) Information Warehouse (IW) is a comprehensive data warehousing facility incorporating operational, clinical, and biological data sets from multiple enterprise system. It is common for users of the IW to request complex ad-hoc queries that often require significant intervention by data analyst. In response to this challenge, we have designed a workflow that leverages synthesized data elements to support such queries in an more timely, efficient manner.

  5. HOW GAS-DYNAMIC FLARE MODELS POWERED BY PETSCHEK RECONNECTION DIFFER FROM THOSE WITH AD HOC ENERGY SOURCES

    SciTech Connect

    Longcope, D. W.; Klimchuk, J. A.

    2015-11-10

    Aspects of solar flare dynamics, such as chromospheric evaporation and flare light curves, have long been studied using one-dimensional models of plasma dynamics inside a static flare loop, subjected to some energy input. While extremely successful at explaining the observed characteristics of flares, all such models so far have specified energy input ad hoc, rather than deriving it self-consistently. There is broad consensus that flares are powered by magnetic energy released through reconnection. Recent work has generalized Petschek’s basic reconnection scenario, topological change followed by field line retraction and shock heating, to permit its inclusion in a one-dimensional flare loop model. Here we compare the gas dynamics driven by retraction and shocking to those from more conventional static loop models energized by ad hoc source terms. We find significant differences during the first minute, when retraction leads to larger kinetic energies and produces higher densities at the loop top, while ad hoc heating tends to rarify the loop top. The loop-top density concentration is related to the slow magnetosonic shock, characteristic of Petschek’s model, but persists beyond the retraction phase occurring in the outflow jet. This offers an explanation for observed loop-top sources of X-ray and EUV emission, with advantages over that provided by ad hoc heating scenarios. The cooling phases of the two models are, however, notably similar to one another, suggesting that observations at that stage will yield little information on the nature of energy input.

  6. FRCA: A Fuzzy Relevance-Based Cluster Head Selection Algorithm for Wireless Mobile Ad-Hoc Sensor Networks

    PubMed Central

    Lee, Chongdeuk; Jeong, Taegwon

    2011-01-01

    Clustering is an important mechanism that efficiently provides information for mobile nodes and improves the processing capacity of routing, bandwidth allocation, and resource management and sharing. Clustering algorithms can be based on such criteria as the battery power of nodes, mobility, network size, distance, speed and direction. Above all, in order to achieve good clustering performance, overhead should be minimized, allowing mobile nodes to join and leave without perturbing the membership of the cluster while preserving current cluster structure as much as possible. This paper proposes a Fuzzy Relevance-based Cluster head selection Algorithm (FRCA) to solve problems found in existing wireless mobile ad hoc sensor networks, such as the node distribution found in dynamic properties due to mobility and flat structures and disturbance of the cluster formation. The proposed mechanism uses fuzzy relevance to select the cluster head for clustering in wireless mobile ad hoc sensor networks. In the simulation implemented on the NS-2 simulator, the proposed FRCA is compared with algorithms such as the Cluster-based Routing Protocol (CBRP), the Weighted-based Adaptive Clustering Algorithm (WACA), and the Scenario-based Clustering Algorithm for Mobile ad hoc networks (SCAM). The simulation results showed that the proposed FRCA achieves better performance than that of the other existing mechanisms. PMID:22163905

  7. FRCA: a fuzzy relevance-based cluster head selection algorithm for wireless mobile ad-hoc sensor networks.

    PubMed

    Lee, Chongdeuk; Jeong, Taegwon

    2011-01-01

    Clustering is an important mechanism that efficiently provides information for mobile nodes and improves the processing capacity of routing, bandwidth allocation, and resource management and sharing. Clustering algorithms can be based on such criteria as the battery power of nodes, mobility, network size, distance, speed and direction. Above all, in order to achieve good clustering performance, overhead should be minimized, allowing mobile nodes to join and leave without perturbing the membership of the cluster while preserving current cluster structure as much as possible. This paper proposes a Fuzzy Relevance-based Cluster head selection Algorithm (FRCA) to solve problems found in existing wireless mobile ad hoc sensor networks, such as the node distribution found in dynamic properties due to mobility and flat structures and disturbance of the cluster formation. The proposed mechanism uses fuzzy relevance to select the cluster head for clustering in wireless mobile ad hoc sensor networks. In the simulation implemented on the NS-2 simulator, the proposed FRCA is compared with algorithms such as the Cluster-based Routing Protocol (CBRP), the Weighted-based Adaptive Clustering Algorithm (WACA), and the Scenario-based Clustering Algorithm for Mobile ad hoc networks (SCAM). The simulation results showed that the proposed FRCA achieves better performance than that of the other existing mechanisms.

  8. Enabling real-time H.26L video services over wireless ad hoc networks using joint admission and transmission power control

    NASA Astrophysics Data System (ADS)

    Pei, Yong; Modestino, James W.; Qu, Qi; Wang, Xiaochun

    2003-06-01

    In a wireless ad hoc network, packets are sent from node-to-node in a multihop fashion until they reach the destination. In this paper we investigate the capacity of a wireless ad hoc network in supporting packet video transport. The ad hoc network consists of n homogeneous video users with each of them also serving as a relay node for other users. We investigate how the time delay aspects the video throughput in such an ad hoc network and how to provide a time-delay bounded packet video delivery service over such a network? The analytical results indicate that appropriate joint admission and power control have to be employed in order to efficiently utilize the network capacity while operating under the delay constraint as the distance between source and destination changes.

  9. The possibility for collaboration of Arecibo with international S2 ad-hoc array

    NASA Astrophysics Data System (ADS)

    Molotov, I. E.; Chuprikov, A. A.; Salter, C.; Ghosh, T.

    2001-05-01

    The loan of an S2 VLBI recording terminal to Arecibo Observatory by the Space Geodynamics Laboratory, ISTS (now CRESTech), Canada, for support of the VSOP mission, opens the possibility of Arecibo participating in ground based VLBI observations. I.e. in collaboration with an international ad-hoc S2 array that has begun to operate under the Low Frequency VLBI Network (LFVN) project. LFVN arranges VLBI experiments using the telescopes in 11 countries which are equipped with S2 systems, together with the Penticton S2 correlator in Canada. A wide spectrum of baselines has been achieved, up to the largest on Earth, while the participation of Arecibo can ensure the high sensitivity of this S2 array. The first LFVN S2 observations including Arecibo were carried out at a wavelength of 18 cm on December 2, 1998, as part of INTAS98.5. This experiment with participation of three Russian antennas (Bear Lakes RT-64, Puschino RT-22 and Svetloe RT-32), Green Bank RT-43 and HartRAO RT-26 included 7 hrs of observation of weak sources on the Arecibo-Green Bank baseline. The successful processing of INTAS98.5 and two other observations (INTAS98.2 and INTAS99.4) by the Penticton correlator confirms the feasibility of this initiative (the post-processing was made at Astro Space Center, Russia). These VLBI observations may be continued with the Green Bank RT-100, Penticton RT-26 and Madrid RT-70. (The next S2 experiment is planned for October-November 2001). The recent equipping of Arecibo with a 92-cm receiver also opens new opportunities for LFVN cooperation, especially as there is a plan to also supply AlgoPark RT-46 and Penticton RT-26 in Canada with 92-cm facilities. Another field of interest for cooperation may be the radar VLBI research of the nearer planets with the S2 system recording of transmitted and reflected signals.

  10. Road Accident Prevention with Instant Emergency Warning Message Dissemination in Vehicular Ad-Hoc Network

    PubMed Central

    P, Gokulakrishnan; P, Ganeshkumar

    2015-01-01

    A Road Accident Prevention (RAP) scheme based on Vehicular Backbone Network (VBN) structure is proposed in this paper for Vehicular Ad-hoc Network (VANET). The RAP scheme attempts to prevent vehicles from highway road traffic accidents and thereby reduces death and injury rates. Once the possibility of an emergency situation (i.e. an accident) is predicted in advance, instantly RAP initiates a highway road traffic accident prevention scheme. The RAP scheme constitutes the following activities: (i) the Road Side Unit (RSU) constructs a Prediction Report (PR) based on the status of the vehicles and traffic in the highway roads, (ii) the RSU generates an Emergency Warning Message (EWM) based on an abnormal PR, (iii) the RSU forms a VBN structure and (iv) the RSU disseminates the EWM to the vehicles that holds the high Risk Factor (RF) and travels in High Risk Zone (HRZ). These vehicles might reside either within the RSU’s coverage area or outside RSU’s coverage area (reached using VBN structure). The RAP scheme improves the performance of EWM dissemination in terms of increase in notification and decrease in end-to-end delay. The RAP scheme also reduces infrastructure cost (number of RSUs) by formulating and deploying the VBN structure. The RAP scheme with VBN structure improves notification by 19 percent and end-to-end delay by 14.38 percent for a vehicle density of 160 vehicles. It is also proved from the simulation experiment that the performance of RAP scheme is promising in 4-lane highway roads. PMID:26636576

  11. Ad-hoc Solutions for Capturing Electronic Structure Details in Classical Dynamics Simulations

    NASA Astrophysics Data System (ADS)

    Crill, John Wesley

    Traditional empirical potentials used in molecular dynamics (MD) simulations replace an explicit treatment of the electronic structure with an appropriate interatomic potential energy expression. This enables MD simulations to model atomistic processes, such as dislocation dynamics and plastic deformation, which typically require size and time domains exceeding what is currently feasible with computationally-demanding first principles techniques. However, discarding the electronic degrees of freedom prevents MD simulations from properly resolving certain phenomena which are dominated by electronic interactions. One example is thermal transport in metals, which is often underestimated by orders of magnitude in MD simulations. A recently-developed multi-scale simulation approach, allowing ad-hoc feedback from continuum heat flow solutions to thermostat atoms in an MD simulation, is used to model Joule-heating in nano-scale metallic contacts under electromagnetic stress. The simulations are carried out under conditions representative of contact surfaces in Radio Frequency Electromechanical Switches (RF MEMS) and rail/armature components of Electromagnetic Launchers (EMLs) and are used to speculate on the mechanisms for experimentally-observed material transfer. Another phenomenon that is typically neglected in MD simulations is charge transfer between atoms of dissimilar electronegativity. A common approach to incorporating a dynamic treatment of charge in a classical potential simulation is to solve atomic charges using an equalization of electronegativity in the charge equilibration (QEq) method. The current work studies the effectiveness of the QEq to mimic the charge distribution properties of f-center defects in a sodium chloride crystal. The results indicate that the QEq is able to replicate some of the electrostatic energy features of an f-center, which include an extremely localized potential well in the vicinity of the defect.

  12. Road Accident Prevention with Instant Emergency Warning Message Dissemination in Vehicular Ad-Hoc Network.

    PubMed

    Gokulakrishnan, P; Ganeshkumar, P

    2015-01-01

    A Road Accident Prevention (RAP) scheme based on Vehicular Backbone Network (VBN) structure is proposed in this paper for Vehicular Ad-hoc Network (VANET). The RAP scheme attempts to prevent vehicles from highway road traffic accidents and thereby reduces death and injury rates. Once the possibility of an emergency situation (i.e. an accident) is predicted in advance, instantly RAP initiates a highway road traffic accident prevention scheme. The RAP scheme constitutes the following activities: (i) the Road Side Unit (RSU) constructs a Prediction Report (PR) based on the status of the vehicles and traffic in the highway roads, (ii) the RSU generates an Emergency Warning Message (EWM) based on an abnormal PR, (iii) the RSU forms a VBN structure and (iv) the RSU disseminates the EWM to the vehicles that holds the high Risk Factor (RF) and travels in High Risk Zone (HRZ). These vehicles might reside either within the RSU's coverage area or outside RSU's coverage area (reached using VBN structure). The RAP scheme improves the performance of EWM dissemination in terms of increase in notification and decrease in end-to-end delay. The RAP scheme also reduces infrastructure cost (number of RSUs) by formulating and deploying the VBN structure. The RAP scheme with VBN structure improves notification by 19 percent and end-to-end delay by 14.38 percent for a vehicle density of 160 vehicles. It is also proved from the simulation experiment that the performance of RAP scheme is promising in 4-lane highway roads. PMID:26636576

  13. Bringing Ad-Hoc Analytics to Big Earth Data: the EarthServer Experience

    NASA Astrophysics Data System (ADS)

    Baumann, Peter

    2014-05-01

    From the commonly accepted Vs defining the Big Data challenge - volume, velocity, variety - we more and more learn that the sheer volume is not the only, and often not even the decisive factor inhibiting access and analytics. In particular variety of data is a frequent core issue, posing manifold issues. Based on this observation we claim that a key aspect to analytics is the freedom to ask any questions, simple or complex, anytime and combining any choice of data structures, whatever diverging they may be. Actually, techniques for such "ad-hoc queries" we can learn from classical databases. Their concept of high-level query languages brings along several benefits: a uniform semantic, allowing machine-to-machine communication, including automatic generation of queries; massive server-side optimization and parallelization; and building attractive client interfaces hiding the query syntax from casual users while allowing power users to utilize it. However, these benefits used to be available only on tabular and set oriented data, text, and - more recently - graph data. With the advent of Array Databases, they become available on large multidimensional raster data assets as well, getting one step closer to the Holy Grail of itnegrated, uniform retrieval for users. ErthServer is a transatlantic initiative setting up operationa linfrastructures based on this paradigm. In our talk, we present core EarthServer technology concepts as well as a spectrum of Earth Science applications utilizing the EarthServer platform for versatile, visualisation supported analytics services. Further, we discuss the substantial impact EarthServer is having on Big Geo Data standardization in OGC and ISO. Time and Internet connection permitting a live demo can be presented.

  14. Performance evaluation of reactive and proactive routing protocol in IEEE 802.11 ad hoc network

    NASA Astrophysics Data System (ADS)

    Hamma, Salima; Cizeron, Eddy; Issaka, Hafiz; Guédon, Jean-Pierre

    2006-10-01

    Wireless technology based on the IEEE 802.11 standard is widely deployed. This technology is used to support multiple types of communication services (data, voice, image) with different QoS requirements. MANET (Mobile Adhoc NETwork) does not require a fixed infrastructure. Mobile nodes communicate through multihop paths. The wireless communication medium has variable and unpredictable characteristics. Furthermore, node mobility creates a continuously changing communication topology in which paths break and new one form dynamically. The routing table of each router in an adhoc network must be kept up-to-date. MANET uses Distance Vector or Link State algorithms which insure that the route to every host is always known. However, this approach must take into account the adhoc networks specific characteristics: dynamic topologies, limited bandwidth, energy constraints, limited physical security, ... Two main routing protocols categories are studied in this paper: proactive protocols (e.g. Optimised Link State Routing - OLSR) and reactive protocols (e.g. Ad hoc On Demand Distance Vector - AODV, Dynamic Source Routing - DSR). The proactive protocols are based on periodic exchanges that update the routing tables to all possible destinations, even if no traffic goes through. The reactive protocols are based on on-demand route discoveries that update routing tables only for the destination that has traffic going through. The present paper focuses on study and performance evaluation of these categories using NS2 simulations. We have considered qualitative and quantitative criteria. The first one concerns distributed operation, loop-freedom, security, sleep period operation. The second are used to assess performance of different routing protocols presented in this paper. We can list end-to-end data delay, jitter, packet delivery ratio, routing load, activity distribution. Comparative study will be presented with number of networking context consideration and the results show

  15. Hydrophobic organic chemicals (HOCs) removal from biologically treated landfill leachate by powder-activated carbon (PAC), granular-activated carbon (GAC) and biomimetic fat cell (BFC).

    PubMed

    Liyan, Song; Youcai, Zhao; Weimin, Sun; Ziyang, Lou

    2009-04-30

    Biological pretreatment efficiently remove organic matter from landfill leachate, but further removal of refractory hydrophobic organic chemicals (HOCs) is hard even with advanced treatment. In this work, three-stage-aged refuse bioreactor (ARB) efficiently removed chemical oxygen demand (COD) and biochemical oxygen demand (BOD) of fresh leachate produced in Shanghai laogang landfill, from 8603 to 451 mg L(-1) and 1368 to 30 mg L(-1), respectively. In downstream treatment, 3 g L(-1) powder-activated carbon (PAC), granular-activated carbon (GAC) and biomimetic fat cell (BFC) removed 89.2, 73.4 and 81.1% HOCs, but only 24.6, 19.1 and 8.9% COD, respectively. Through the specific HOCs accumulation characteristics of BFC, about 11.2% HOCs with low molecular weight (<1000 Da) in the biologically treated leachate were concluded. Since HOCs are competitively trapped by dissolved organic matters (DOM), the ultimate removal of HOCs from leachate is unreachable by activated carbon or BFC. It was also found that the biologically treated leachate effluent exhibited a wide molecular weight distribution (34-514,646 Da). These constitutes are derived from both autochthonous and allochthonous matters as well as biological activities.

  16. Unsupervised algorithms for intrusion detection and identification in wireless ad hoc sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2009-05-01

    In previous work by the author, parameters across network protocol layers were selected as features in supervised algorithms that detect and identify certain intrusion attacks on wireless ad hoc sensor networks (WSNs) carrying multisensor data. The algorithms improved the residual performance of the intrusion prevention measures provided by any dynamic key-management schemes and trust models implemented among network nodes. The approach of this paper does not train algorithms on the signature of known attack traffic, but, instead, the approach is based on unsupervised anomaly detection techniques that learn the signature of normal network traffic. Unsupervised learning does not require the data to be labeled or to be purely of one type, i.e., normal or attack traffic. The approach can be augmented to add any security attributes and quantified trust levels, established during data exchanges among nodes, to the set of cross-layer features from the WSN protocols. A two-stage framework is introduced for the security algorithms to overcome the problems of input size and resource constraints. The first stage is an unsupervised clustering algorithm which reduces the payload of network data packets to a tractable size. The second stage is a traditional anomaly detection algorithm based on a variation of support vector machines (SVMs), whose efficiency is improved by the availability of data in the packet payload. In the first stage, selected algorithms are adapted to WSN platforms to meet system requirements for simple parallel distributed computation, distributed storage and data robustness. A set of mobile software agents, acting like an ant colony in securing the WSN, are distributed at the nodes to implement the algorithms. The agents move among the layers involved in the network response to the intrusions at each active node and trustworthy neighborhood, collecting parametric values and executing assigned decision tasks. This minimizes the need to move large amounts

  17. A simple post hoc transformation that improves the metric properties of the BBB scale for rats with moderate to severe spinal cord injury.

    PubMed

    Ferguson, Adam R; Hook, Michelle A; Garcia, Guadalupe; Bresnahan, Jacqueline C; Beattie, Michael S; Grau, James W

    2004-11-01

    The Basso, Beattie, Bresnahan (BBB) open field locomotor scale is a popular measure of functional recovery following spinal cord injury (SCI). To examine the metric properties of the scale, we performed detailed analyses of BBB scores from 643 rats with moderate and severe SCI (12.5, 25, or 50 mm MASCIS) from two different laboratories. The analyses revealed that the BBB scale is ordinal in the most frequently used portion of the scale. Higher scores (14 and greater) were not frequently assigned in the dataset as animals with mild injuries were not sampled, making the ordinal nature of the upper end of the scale difficult to assess. The rare scores assigned in this range disproportionately increased variance. Under these conditions collapsing scores above 14 into one category increased effect size. Analysis of the lower region of the scale revealed that some scores (2 and 3) were rarely assigned, implying a discontinuity in the scale. The discontinuous nature of the lower portion of the scale presents a problem for both parametric and nonparametric statistical analyses. Pooling scores 2/3/4 eliminated the gap, enhancing the metric properties of the scale. Under the injury conditions evaluated, the transformation helped assure that the data were continuous and ordered. Further, interval durations were comparable across the entire range of the transformed scale, allowing application of parametric statistical techniques. The transformation should be applied in a post hoc fashion to reduce variability and increase power in cases where few scores fall in upper portion of the scale. PMID:15684652

  18. Cross-layer protocols optimized for real-time multimedia services in energy-constrained mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2003-07-01

    Mobile ad hoc networking (MANET) supports self-organizing, mobile infrastructures and enables an autonomous network of mobile nodes that can operate without a wired backbone. Ad hoc networks are characterized by multihop, wireless connectivity via packet radios and by the need for efficient dynamic protocols. All routers are mobile and can establish connectivity with other nodes only when they are within transmission range. Importantly, ad hoc wireless nodes are resource-constrained, having limited processing, memory, and battery capacity. Delivery of high quality-ofservice (QoS), real-time multimedia services from Internet-based applications over a MANET is a challenge not yet achieved by proposed Internet Engineering Task Force (IETF) ad hoc network protocols in terms of standard performance metrics such as end-to-end throughput, packet error rate, and delay. In the distributed operations of route discovery and maintenance, strong interaction occurs across MANET protocol layers, in particular, the physical, media access control (MAC), network, and application layers. The QoS requirements are specified for the service classes by the application layer. The cross-layer design must also satisfy the battery-limited energy constraints, by minimizing the distributed power consumption at the nodes and of selected routes. Interactions across the layers are modeled in terms of the set of concatenated design parameters including associated energy costs. Functional dependencies of the QoS metrics are described in terms of the concatenated control parameters. New cross-layer designs are sought that optimize layer interdependencies to achieve the "best" QoS available in an energy-constrained, time-varying network. The protocol design, based on a reactive MANET protocol, adapts the provisioned QoS to dynamic network conditions and residual energy capacities. The cross-layer optimization is based on stochastic dynamic programming conditions derived from time-dependent models of

  19. Cross-layer design for intrusion detection and data security in wireless ad hoc sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2007-09-01

    A wireless ad hoc sensor network is a configuration for area surveillance that affords rapid, flexible deployment in arbitrary threat environments. There is no infrastructure support and sensor nodes communicate with each other only when they are in transmission range. The nodes are severely resource-constrained, with limited processing, memory and power capacities and must operate cooperatively to fulfill a common mission in typically unattended modes. In a wireless sensor network (WSN), each sensor at a node can observe locally some underlying physical phenomenon and sends a quantized version of the observation to sink (destination) nodes via wireless links. Since the wireless medium can be easily eavesdropped, links can be compromised by intrusion attacks from nodes that may mount denial-of-service attacks or insert spurious information into routing packets, leading to routing loops, long timeouts, impersonation, and node exhaustion. A cross-layer design based on protocol-layer interactions is proposed for detection and identification of various intrusion attacks on WSN operation. A feature set is formed from selected cross-layer parameters of the WSN protocol to detect and identify security threats due to intrusion attacks. A separate protocol is not constructed from the cross-layer design; instead, security attributes and quantified trust levels at and among nodes established during data exchanges complement customary WSN metrics of energy usage, reliability, route availability, and end-to-end quality-of-service (QoS) provisioning. Statistical pattern recognition algorithms are applied that use observed feature-set patterns observed during network operations, viewed as security audit logs. These algorithms provide the "best" network global performance in the presence of various intrusion attacks. A set of mobile (software) agents distributed at the nodes implement the algorithms, by moving among the layers involved in the network response at each active node

  20. A Novel Clustering Algorithm for Mobile Ad Hoc Networks Based on Determination of Virtual Links' Weight to Increase Network Stability

    PubMed Central

    Karimi, Abbas; Afsharfarnia, Abbas; Zarafshan, Faraneh; Al-Haddad, S. A. R.

    2014-01-01

    The stability of clusters is a serious issue in mobile ad hoc networks. Low stability of clusters may lead to rapid failure of clusters, high energy consumption for reclustering, and decrease in the overall network stability in mobile ad hoc network. In order to improve the stability of clusters, weight-based clustering algorithms are utilized. However, these algorithms only use limited features of the nodes. Thus, they decrease the weight accuracy in determining node's competency and lead to incorrect selection of cluster heads. A new weight-based algorithm presented in this paper not only determines node's weight using its own features, but also considers the direct effect of feature of adjacent nodes. It determines the weight of virtual links between nodes and the effect of the weights on determining node's final weight. By using this strategy, the highest weight is assigned to the best choices for being the cluster heads and the accuracy of nodes selection increases. The performance of new algorithm is analyzed by using computer simulation. The results show that produced clusters have longer lifetime and higher stability. Mathematical simulation shows that this algorithm has high availability in case of failure. PMID:25114965

  1. BCDP: Budget Constrained and Delay-Bounded Placement for Hybrid Roadside Units in Vehicular Ad Hoc Networks

    PubMed Central

    Li, Peng; Huang, Chuanhe; Liu, Qin

    2014-01-01

    In vehicular ad hoc networks, roadside units (RSUs) placement has been proposed to improve the the overall network performance in many ITS applications. This paper addresses the budget constrained and delay-bounded placement problem (BCDP) for roadside units in vehicular ad hoc networks. There are two types of RSUs: cable connected RSU (c-RSU) and wireless RSU (w-RSU). c-RSUs are interconnected through wired lines, and they form the backbone of VANETs, while w-RSUs connect to other RSUs through wireless communication and serve as an economical extension of the coverage of c-RSUs. The delay-bounded coverage range and deployment cost of these two cases are totally different. We are given a budget constraint and a delay bound, the problem is how to find the optimal candidate sites with the maximal delay-bounded coverage to place RSUs such that a message from any c-RSU in the region can be disseminated to the more vehicles within the given budget constraint and delay bound. We first prove that the BCDP problem is NP-hard. Then we propose several algorithms to solve the BCDP problem. Simulation results show the heuristic algorithms can significantly improve the coverage range and reduce the total deployment cost, compared with other heuristic methods. PMID:25436656

  2. BCDP: Budget constrained and delay-bounded placement for hybrid roadside units in vehicular ad hoc networks.

    PubMed

    Li, Peng; Huang, Chuanhe; Liu, Qin

    2014-01-01

    In vehicular ad hoc networks, roadside units (RSUs) placement has been proposed to improve the the overall network performance in many ITS applications. This paper addresses the budget constrained and delay-bounded placement problem (BCDP) for roadside units in vehicular ad hoc networks. There are two types of RSUs: cable connected RSU (c-RSU) and wireless RSU (w-RSU). c-RSUs are interconnected through wired lines, and they form the backbone of VANETs, while w-RSUs connect to other RSUs through wireless communication and serve as an economical extension of the coverage of c-RSUs. The delay-bounded coverage range and deployment cost of these two cases are totally different. We are given a budget constraint and a delay bound, the problem is how to find the optimal candidate sites with the maximal delay-bounded coverage to place RSUs such that a message from any c-RSU in the region can be disseminated to the more vehicles within the given budget constraint and delay bound. We first prove that the BCDP problem is NP-hard. Then we propose several algorithms to solve the BCDP problem. Simulation results show the heuristic algorithms can significantly improve the coverage range and reduce the total deployment cost, compared with other heuristic methods. PMID:25436656

  3. A novel clustering algorithm for mobile ad hoc networks based on determination of virtual links' weight to increase network stability.

    PubMed

    Karimi, Abbas; Afsharfarnia, Abbas; Zarafshan, Faraneh; Al-Haddad, S A R

    2014-01-01

    The stability of clusters is a serious issue in mobile ad hoc networks. Low stability of clusters may lead to rapid failure of clusters, high energy consumption for reclustering, and decrease in the overall network stability in mobile ad hoc network. In order to improve the stability of clusters, weight-based clustering algorithms are utilized. However, these algorithms only use limited features of the nodes. Thus, they decrease the weight accuracy in determining node's competency and lead to incorrect selection of cluster heads. A new weight-based algorithm presented in this paper not only determines node's weight using its own features, but also considers the direct effect of feature of adjacent nodes. It determines the weight of virtual links between nodes and the effect of the weights on determining node's final weight. By using this strategy, the highest weight is assigned to the best choices for being the cluster heads and the accuracy of nodes selection increases. The performance of new algorithm is analyzed by using computer simulation. The results show that produced clusters have longer lifetime and higher stability. Mathematical simulation shows that this algorithm has high availability in case of failure.

  4. BCDP: Budget constrained and delay-bounded placement for hybrid roadside units in vehicular ad hoc networks.

    PubMed

    Li, Peng; Huang, Chuanhe; Liu, Qin

    2014-01-01

    In vehicular ad hoc networks, roadside units (RSUs) placement has been proposed to improve the the overall network performance in many ITS applications. This paper addresses the budget constrained and delay-bounded placement problem (BCDP) for roadside units in vehicular ad hoc networks. There are two types of RSUs: cable connected RSU (c-RSU) and wireless RSU (w-RSU). c-RSUs are interconnected through wired lines, and they form the backbone of VANETs, while w-RSUs connect to other RSUs through wireless communication and serve as an economical extension of the coverage of c-RSUs. The delay-bounded coverage range and deployment cost of these two cases are totally different. We are given a budget constraint and a delay bound, the problem is how to find the optimal candidate sites with the maximal delay-bounded coverage to place RSUs such that a message from any c-RSU in the region can be disseminated to the more vehicles within the given budget constraint and delay bound. We first prove that the BCDP problem is NP-hard. Then we propose several algorithms to solve the BCDP problem. Simulation results show the heuristic algorithms can significantly improve the coverage range and reduce the total deployment cost, compared with other heuristic methods.

  5. Clinical response to eliglustat in treatment-naïve patients with Gaucher disease type 1: Post-hoc comparison to imiglucerase-treated patients enrolled in the International Collaborative Gaucher Group Gaucher Registry.

    PubMed

    Ibrahim, Jennifer; Underhill, Lisa H; Taylor, John S; Angell, Jennifer; Peterschmitt, M Judith

    2016-09-01

    Eliglustat is a recently approved oral therapy in the United States and Europe for adults with Gaucher disease type 1 who are CYP2D6 extensive, intermediate, or poor metabolizers (> 90% of patients) that has been shown to decrease spleen and liver volume and increase hemoglobin concentrations and platelet counts in untreated adults with Gaucher disease type 1 and maintain these parameters in patients previously stabilized on enzyme replacement therapy. In a post-hoc analysis, we compared the results of eliglustat treatment in treatment-naïve patients in two clinical studies with the results of imiglucerase treatment among a cohort of treatment-naïve patients with comparable baseline hematologic and visceral parameters in the International Collaborative Gaucher Group Gaucher Registry. Organ volumes and hematologic parameters improved from baseline in both treatment groups, with a time course and degree of improvement in eliglustat-treated patients similar to imiglucerase-treated patients. PMID:27408819

  6. Scope of practice in speech-language pathology. Ad Hoc Committee on Scope of Practice in Speech-Language Pathology.

    PubMed

    1996-01-01

    This scope of practice in speech-language pathology statement is an official policy of the American Speech-Language-Hearing Association (ASHA). It was developed by the Ad Hoc Committee on Scope of Practice in Speech-Language Pathology: Sarah W. Blackstone, chair; Diane Paul-Brown, ex officio; David A. Brandt; Rhonda Friedlander; Luis F. Riquelme; and Mark Ylvisaker. Crystal S. Cooper, vice president for professional practices in speech-language pathology, served as monitoring vice-president. The contributions of the editor, Jude Langsam, and select the widespread peer reviewers are grateful acknowledged. This statement supersedes the Scope of Practice, Speech-Language Pathology and Audiology statement (LC 6-89), Asha, April 1990, 1-2.

  7. On using multiple routing metrics with destination sequenced distance vector protocol for MultiHop wireless ad hoc networks

    NASA Astrophysics Data System (ADS)

    Mehic, M.; Fazio, P.; Voznak, M.; Partila, P.; Komosny, D.; Tovarek, J.; Chmelikova, Z.

    2016-05-01

    A mobile ad hoc network is a collection of mobile nodes which communicate without a fixed backbone or centralized infrastructure. Due to the frequent mobility of nodes, routes connecting two distant nodes may change. Therefore, it is not possible to establish a priori fixed paths for message delivery through the network. Because of its importance, routing is the most studied problem in mobile ad hoc networks. In addition, if the Quality of Service (QoS) is demanded, one must guarantee the QoS not only over a single hop but over an entire wireless multi-hop path which may not be a trivial task. In turns, this requires the propagation of QoS information within the network. The key to the support of QoS reporting is QoS routing, which provides path QoS information at each source. To support QoS for real-time traffic one needs to know not only minimum delay on the path to the destination but also the bandwidth available on it. Therefore, throughput, end-to-end delay, and routing overhead are traditional performance metrics used to evaluate the performance of routing protocol. To obtain additional information about the link, most of quality-link metrics are based on calculation of the lost probabilities of links by broadcasting probe packets. In this paper, we address the problem of including multiple routing metrics in existing routing packets that are broadcasted through the network. We evaluate the efficiency of such approach with modified version of DSDV routing protocols in ns-3 simulator.

  8. Brain BLAQ: Post-hoc thick-section histochemistry for localizing optogenetic constructs in neurons and their distal terminals.

    PubMed

    Kupferschmidt, David A; Cody, Patrick A; Lovinger, David M; Davis, Margaret I

    2015-01-01

    Optogenetic constructs have revolutionized modern neuroscience, but the ability to accurately and efficiently assess their expression in the brain and associate it with prior functional measures remains a challenge. High-resolution imaging of thick, fixed brain sections would make such post-hoc assessment and association possible; however, thick sections often display autofluorescence that limits their compatibility with fluorescence microscopy. We describe and evaluate a method we call "Brain BLAQ" (Block Lipids and Aldehyde Quench) to rapidly reduce autofluorescence in thick brain sections, enabling efficient axon-level imaging of neurons and their processes in conventional tissue preparations using standard epifluorescence microscopy. Following viral-mediated transduction of optogenetic constructs and fluorescent proteins in mouse cortical pyramidal and dopaminergic neurons, we used BLAQ to assess innervation patterns in the striatum, a region in which autofluorescence often obscures the imaging of fine neural processes. After BLAQ treatment of 250-350 μm-thick brain sections, axons and puncta of labeled afferents were visible throughout the striatum using a standard epifluorescence stereomicroscope. BLAQ histochemistry confirmed that motor cortex (M1) projections preferentially innervated the matrix component of lateral striatum, whereas medial prefrontal cortex projections terminated largely in dorsal striosomes and distinct nucleus accumbens subregions. Ventral tegmental area dopaminergic projections terminated in a similarly heterogeneous pattern within nucleus accumbens and ventral striatum. Using a minimal number of easily manipulated and visualized sections, and microscopes available in most neuroscience laboratories, BLAQ enables simple, high-resolution assessment of virally transduced optogenetic construct expression, and post-hoc association of this expression with molecular markers, physiology and behavior.

  9. Augmenting 3d City Model Components by Geodata Joins to Facilitate Ad-Hoc Geometric-Topologically Sound Integration

    NASA Astrophysics Data System (ADS)

    Kaden, R.; Kolbe, T. H.

    2012-07-01

    Virtual 3D city models are integrated complex compositions of spatial data of different themes, origin, quality, scale, and dimensions. Within this paper, we address the problem of spatial compatibility of geodata aiming to provide support for ad-hoc integration of virtual 3D city models including geodata of different sources and themes like buildings, terrain, and city furniture. In contrast to related work which is dealing with the integration of redundant geodata structured according to different data models and ontologies, we focus on the integration of complex 3D models of the same representation (here: CityGML) but regarding to the geometric-topological consistent matching of non-homologous objects, e.g. a building is connected to a road, and their geometric homogenisation. Therefore, we present an approach including a data model for a Geodata Join and the general concept of an integration procedure using the join information. The Geodata Join aims to bridge the lack of information between fragmented geodata by describing the relationship between adjacent objects from different datasets. The join information includes the geometrical representation of those parts of an object, which have a specific/known topological or geometrical relationship to another object. This part is referred to as a Connector and is either described by points, lines, or surfaces of the existing object geometry or by additional join geometry. In addition, the join information includes the specification of the connected object in the other dataset and the description of the topological and geometrical relationship between both objects, which is used to aid the matching process. Furthermore, the Geodata Join contains object-related information like accuracy values and restrictions of movement and deformation which are used to optimize the integration process. Based on these parameters, a functional model including a matching algorithm, transformation methods, and conditioned adjustment

  10. Potentials, Limitations and Applications of long-term and mobile ad-hoc Wireless Sensor Networks for Environmental Monitoring

    NASA Astrophysics Data System (ADS)

    Bumberger, Jan; Mollenhauer, Hannes; Lapteva, Yulia; Hutschenreuther, Tino; Toepfer, Hannes; Dietrich, Peter

    2014-05-01

    To characterize environmental systems it is necessary to identify and describe processes with suitable methods. Environmental systems are often characterized by their high heterogeneity, so individual measurements for their complete representation are often not sufficient. The application of wireless sensor networks in terrestrial and aquatic ecosystems offer significant benefits as a better consideration of the local test conditions becomes possible. This can be essential for the monitoring of heterogeneous environmental systems. Significant advantages in the application of mobile ad-hoc wireless sensor networks are their self-organizing behavior, resulting in a major reduction in installation and operation costs and time. In addition, a point measurement with a sensor is significantly improved by measuring at several points. It is also possible to perform analog and digital signal processing and computation on the basis of the measured data close to the sensor. Hence, a significant reduction of the data to be transmitted can be achieved which leads to a better energy management of sensor nodes. Furthermore, their localization via satellite, the miniaturization of the nodes and long-term energy self-sufficiency are current topics under investigation. The possibilities and limitations of the applicability of wireless sensor networks for long-term and mobile environmental monitoring are presented. A concepts and realization example are given in the field of micrometeorology and soil parameters for the interaction of biotic and abiotic processes .This long term monitoring is part of the Global Change Experimental Facility (GCEF), a large field-based experimental platform to assess the effects of climate change on ecosystem functions and processes under different land-use scenarios. Furthermore a mobile ad-hoc sensor network is presented for the monitoring of water induced mass wasting processes.

  11. Monotherapy with pixantrone in histologically confirmed relapsed or refractory aggressive B-cell non-Hodgkin lymphoma: post-hoc analyses from a phase III trial.

    PubMed

    Pettengell, Ruth; Sebban, Catherine; Zinzani, Pier Luigi; Derigs, Hans Gunter; Kravchenko, Sergey; Singer, Jack W; Theocharous, Panteli; Wang, Lixia; Pavlyuk, Mariya; Makhloufi, Kahina M; Coiffier, Bertrand

    2016-09-01

    This post hoc analysis of a phase 3 trial explored the effect of pixantrone in patients (50 pixantrone, 47 comparator) with relapsed or refractory aggressive B-cell non-Hodgkin lymphoma (NHL) confirmed by centralized histological review. Patients received 28-d cycles of 85 mg/m(2) pixantrone dimaleate (equivalent to 50 mg/m(2) in the approved formulation) on days 1, 8 and 15, or comparator. The population was subdivided according to previous rituximab use and whether they received the study treatment as 3rd or 4th line. Median number of cycles was 4 (range, 2-6) with pixantrone and 3 (2-6) with comparator. In 3rd or 4th line, pixantrone was associated with higher complete response (CR) (23·1% vs. 5·1% comparator, P = 0·047) and overall response rate (ORR, 43·6% vs. 12·8%, P = 0·005). In 3rd or 4th line with previous rituximab (20 pixantrone, 18 comparator), pixantrone produced better ORR (45·0% vs. 11·1%, P = 0·033), CR (30·0% vs. 5·6%, P = 0·093) and progression-free survival (median 5·4 vs. 2·8 months, hazard ratio 0·52, 95% confidence interval 0·26-1·04) than the comparator. Similar results were found in patients without previous rituximab. There were no unexpected safety issues. Pixantrone monotherapy is more effective than comparator in relapsed or refractory aggressive B-cell NHL in the 3rd or 4th line setting, independently of previous rituximab.

  12. Records of pan (floodplain wetland) sedimentation as an approach for post-hoc investigation of the hydrological impacts of dam impoundment: The Pongolo river, KwaZulu-Natal.

    PubMed

    Heath, S K; Plater, A J

    2010-07-01

    River impoundment by dams has far-reaching consequences for downstream floodplains in terms of hydrology, water quality, geomorphology, ecology and ecosystem services. With the imperative of economic development, there is the danger that potential environmental impacts are not assessed adequately or monitored appropriately. Here, an investigation of sediment composition of two pans (floodplain wetlands) in the Pongolo River floodplain, KwaZulu-Natal, downstream of the Pongolapoort dam constructed in 1974, is considered as a method for post-hoc assessment of the impacts on river hydrology, sediment supply and water quality. Bumbe and Sokhunti pans have contrasting hydrological regimes in terms of their connection to the main Pongolo channel - Bumbe is a shallow ephemeral pan and Sokhunti is a deep, perennial water body. The results of X-ray fluorescence (XRF) geochemical analysis of their sediment records over a depth of >1 m show that whilst the two pans exhibit similar sediment composition and variability in their lower part, Bumbe pan exhibits a shift toward increased fine-grained mineral supply and associated nutrient influx at a depth of c. 45 cm whilst Sokhunti pan is characterised by increased biogenic productivity at a depth of c. 26 cm due to enhanced nutrient status. The underlying cause is interpreted as a shift in hydrology to a 'post-dam' flow regime of reduced flood frequencies with more regular baseline flows which reduce the average flow velocity. In addition, Sokhunti shows a greater sensitivity to soil influx during flood events due to the nature of its 'background' of autochthonous biogenic sedimentation. The timing of the overall shift in sediment composition and the dates of the mineral inwash events are not well defined, but the potential for these wetlands as sensitive recorders of dam-induced changes in floodplain hydrology, especially those with a similar setting to Sokhunti pan, is clearly demonstrated.

  13. Ad Hoc Conference on the Education of Migrants (Strasbourg, France, November 5-8, 1974). Council of Europe, Standing Conference of European Ministers of Education, Country Reports.

    ERIC Educational Resources Information Center

    Council of Europe, Strasbourg (France). Documentation Center for Education in Europe.

    In Resolution No. 4 of their 7th Conference (Brussels, June 1971) the Ministers of Education of 21 nations signatory to the European Cultural Convention instructed the Committee of Senior Officials to study, in collaboration with the Secretariat of the Council of Europe, the practical arrangements for holding an ad hoc conference on problems…

  14. The Future of 12th Grade NAEP: Report of the Ad Hoc Committee on Planning for NAEP 12th Grade Assessments in 2009

    ERIC Educational Resources Information Center

    National Assessment Governing Board, 2006

    2006-01-01

    The task of the Ad Hoc Committee on Planning for the the National Assessment of Educational Progress (NAEP) 12th Grade Assessments in 2009 addresses three policy areas: (1) Conducting assessment at the state level in 12th grade; (2) Reporting on 12th grade student preparedness for college-credit coursework, training for employment and entrance…

  15. Report of the Ad Hoc Committee to Review the Status of Women at The Ohio State University, Phases I and II.

    ERIC Educational Resources Information Center

    Schoen, Kathryn T.; And Others

    In the late summer of 1970, an Ad Hoc Committee at the Ohio State University was appointed (1) to review the status of all women at the University; and (2) to submit a report of the findings and recommendations. The Committee consisted of 3 undergraduate students, 1 graduate student, 2 administrative personnel, and 3 faculty members, one of whom…

  16. Preserving Nevada's Environmental Heritage: A Report of the Ad Hoc Committee on Environmental Quality. Final Report to the Governor's Natural Resources Council.

    ERIC Educational Resources Information Center

    Nevada State Dept. of Conservation and Natural Resources, Carson City.

    The Environmental Quality Ad Hoc Committee has prepared this report for the Governor's Natural Resources Council (Nevada). It is a compilation of available factual data focusing attention on needed statutory and administrative changes to preserve Nevada's environmental heritage and from which recommendations for future budgetary and legislative…

  17. Meeting the Needs of CALS Students for Computing Capabilities. Final Report of the Ad Hoc Committee on College of Agriculture and Life Sciences Student Computing Competencies.

    ERIC Educational Resources Information Center

    Monk, David; And Others

    The Ad Hoc Committee on the Cornell University (New York) College of Agriculture and Life Sciences (CALS) Student Computing Competencies was appointed in the fall of 1995 to determine (1) what all CALS undergraduate students should know about computing and related technologies; (2) how the college can make it possible for students to develop these…

  18. A Post Hoc Analysis of Field Negotiated Content in a Two-Year Competency-Based Teacher Education Program.

    ERIC Educational Resources Information Center

    Yarger, Sam J.; Mintz, Susan L.

    At least four factors are important to consider in contemporary teacher education programs: the demand for increased accountability; the emphasis on field-based instruction; the need for responsiveness to field input; and the need for responsiveness to student input. In New York, the demand for increased accountability has been translated into a…

  19. Job Search in the Labor Market for College Graduates: A Post Hoc Analysis and Some New Insights. Paper No. 483.

    ERIC Educational Resources Information Center

    Ford, David L., Jr.

    This study examines the impact of job-relevant information on search behavior of males and females, and compares the findings with those obtained in the Ullman and Gutteridge studies. The data were obtained from two questionnaires and by monitoring the operations of the Purdue University computerized teacher placement bureau. The subjects of the…

  20. Report of the NASA Ad Hoc Committee on failure of high strength structural materials

    NASA Technical Reports Server (NTRS)

    Brown, W. F., Jr. (Editor)

    1972-01-01

    An analysis of structural failures that have occurred in NASA programs was conducted. Reports of 231 examples of structural failure were reviewed. Attempts were made to identify those factors which contributed to the failures, and recommendations were formulated for actions which would minimize their effects on future NASA programs. Two classes of factors were identified: (1) those associated with deficiencies in existing materials and structures technology and (2) those attributable to inadequate documentation or communication of that technology.

  1. Influencing Anesthesia Provider Behavior Using Anesthesia Information Management System Data for Near Real-Time Alerts and Post Hoc Reports.

    PubMed

    Epstein, Richard H; Dexter, Franklin; Patel, Neil

    2015-09-01

    In this review article, we address issues related to using data from anesthesia information management systems (AIMS) to deliver near real-time alerts via AIMS workstation popups and/or alphanumeric pagers and post hoc reports via e-mail. We focus on reports and alerts for influencing the behavior of anesthesia providers (i.e., anesthesiologists, anesthesia residents, and nurse anesthetists). Multiple studies have shown that anesthesia clinical decision support (CDS) improves adherence to protocols and increases financial performance through facilitation of billing, regulatory, and compliance documentation; however, improved clinical outcomes have not been demonstrated. We inform developers and users of feedback systems about the multitude of concerns to consider during development and implementation of CDS to increase its effectiveness and to mitigate its potentially disruptive aspects. We discuss the timing and modalities used to deliver messages, implications of outlier-only versus individualized feedback, the need to consider possible unintended consequences of such feedback, regulations, sustainability, and portability among systems. We discuss statistical issues related to the appropriate evaluation of CDS efficacy. We provide a systematic review of the published literature (indexed in PubMed) of anesthesia CDS and offer 2 case studies of CDS interventions using AIMS data from our own institution illustrating the salient points. Because of the considerable expense and complexity of maintaining near real-time CDS systems, as compared with providing individual reports via e-mail after the fact, we suggest that if the same goal can be accomplished via delayed reporting versus immediate feedback, the former approach is preferable. Nevertheless, some processes require near real-time alerts to produce the desired improvement. Post hoc e-mail reporting from enterprise-wide electronic health record systems is straightforward and can be accomplished using system

  2. Influencing Anesthesia Provider Behavior Using Anesthesia Information Management System Data for Near Real-Time Alerts and Post Hoc Reports.

    PubMed

    Epstein, Richard H; Dexter, Franklin; Patel, Neil

    2015-09-01

    In this review article, we address issues related to using data from anesthesia information management systems (AIMS) to deliver near real-time alerts via AIMS workstation popups and/or alphanumeric pagers and post hoc reports via e-mail. We focus on reports and alerts for influencing the behavior of anesthesia providers (i.e., anesthesiologists, anesthesia residents, and nurse anesthetists). Multiple studies have shown that anesthesia clinical decision support (CDS) improves adherence to protocols and increases financial performance through facilitation of billing, regulatory, and compliance documentation; however, improved clinical outcomes have not been demonstrated. We inform developers and users of feedback systems about the multitude of concerns to consider during development and implementation of CDS to increase its effectiveness and to mitigate its potentially disruptive aspects. We discuss the timing and modalities used to deliver messages, implications of outlier-only versus individualized feedback, the need to consider possible unintended consequences of such feedback, regulations, sustainability, and portability among systems. We discuss statistical issues related to the appropriate evaluation of CDS efficacy. We provide a systematic review of the published literature (indexed in PubMed) of anesthesia CDS and offer 2 case studies of CDS interventions using AIMS data from our own institution illustrating the salient points. Because of the considerable expense and complexity of maintaining near real-time CDS systems, as compared with providing individual reports via e-mail after the fact, we suggest that if the same goal can be accomplished via delayed reporting versus immediate feedback, the former approach is preferable. Nevertheless, some processes require near real-time alerts to produce the desired improvement. Post hoc e-mail reporting from enterprise-wide electronic health record systems is straightforward and can be accomplished using system

  3. Ad Hoc Influenza Vaccination During Years of Significant Antigenic Drift in a Tropical City With 2 Seasonal Peaks

    PubMed Central

    Wong, Martin C.S.; Nelson, E. Anthony S.; Leung, Czarina; Lee, Nelson; Chan, Martin C.W.; Choi, Kin Wing; Rainer, Timothy H.; Cheng, Frankie W.T.; Wong, Samuel Y.S.; Lai, Christopher K.C.; Lam, Bosco; Cheung, Tak Hong; Leung, Ting Fan; Chan, Paul K.S.

    2016-01-01

    Abstract We evaluated the acceptability of an additional ad hoc influenza vaccination among the health care professionals following seasons with significant antigenic drift. Self-administered, anonymous surveys were performed by hard copy questionnaires in public hospitals, and by an on-line platform available to all healthcare professionals, from April 1st to May 31st, 2015. A total of 1290 healthcare professionals completed the questionnaires, including doctors, nurses, and allied health professionals working in both the public and private systems. Only 31.8% of participating respondents expressed an intention to receive the additional vaccine, despite that the majority of them agreed or strongly agreed that it would bring benefit to the community (88.9%), save lives (86.7%), reduce medical expenses (76.3%), satisfy public expectation (82.8%), and increase awareness of vaccination (86.1%). However, a significant proportion expressed concern that the vaccine could disturb the normal immunization schedule (45.5%); felt uncertain what to do in the next vaccination round (66.0%); perceived that the summer peak might not occur (48.2%); and believed that the summer peak might not be of the same virus (83.5%). Furthermore, 27.8% of all respondents expected that the additional vaccination could weaken the efficacy of previous vaccinations; 51.3% was concerned about side effects; and 61.3% estimated that there would be a low uptake rate. If the supply of vaccine was limited, higher priority groups were considered to include the elderly aged ≥65 years with chronic medical conditions (89.2%), the elderly living in residential care homes (87.4%), and long-stay residents of institutions for the disabled (80.7%). The strongest factors associated with accepting the additional vaccine included immunization with influenza vaccines in the past 3 years, higher perceived risk of contracting influenza, and higher perceived severity of the disease impact. The acceptability to an

  4. Suicidal Thoughts and Reasons for Living in Hospitalized Patients With Severe Depression: Post-Hoc Analyses of a Double-Blind Randomized Trial of Duloxetine

    PubMed Central

    Desaiah, Durisala; Raskin, Joel; Cairns, Victoria; Brecht, Stephan

    2014-01-01

    Objective: To evaluate suicidal thoughts in relationship to depressive symptom severity and reasons for living in patients hospitalized for major depressive disorder (MDD). Method: A post hoc analysis was conducted of a randomized, double-blind, parallel-group trial involving hospitalized patients with MDD (DSM-IV criteria) who received duloxetine 60 mg once daily or duloxetine 60 mg twice daily for 8 weeks. After 4 weeks, the dose for nonresponders receiving 60 mg once daily could be increased to 60 mg twice daily (double-blind). The study was conducted between February 9, 2007, and August 26, 2008 at 43 centers in 4 countries across Europe and South Africa. Suicidal thoughts were assessed with Montgomery-Asberg Depression Rating Scale (MADRS) item 10, depression severity was assessed with the 6-item Hamilton Depression Rating Scale and the Clinical Global Impressions–Severity of Illness scale, and protective factors were assessed with the patient-rated Reasons for Living Inventory (RFL) assessing 6 domains. Descriptive statistics, correlation, and linear regression analysis were performed. Results: At baseline, patients (N = 336) had varying severity of suicidal thoughts: 18% had a score ≥ 4. The proportion of patients with a score ≥ 4 decreased to 7% at week 1 and 1% at week 8 of treatment. The RFL scores at baseline were lower in patients with higher baseline suicidal thoughts and increased significantly during treatment (P < .0001). A regression model revealed that only 16% of variance in baseline total RFL score is explained by the different MADRS items. Eight patients had suicidal behavior or ideation recorded as an adverse event during the study; no consistent pattern was found in the different psychometric scores either at baseline or at the visit preceding the suicidal behavior/ideation. Conclusions: Suicidality rapidly decreased in hospitalized patients with severe depression treated with duloxetine. The RFL scores were low at baseline but

  5. Consensus statement: the use of intravenous immunoglobulin in the treatment of neuromuscular conditions report of the AANEM ad hoc committee.

    PubMed

    Donofrio, Peter D; Berger, Alan; Brannagan, Thomas H; Bromberg, Mark B; Howard, James F; Latov, Normal; Quick, Adam; Tandan, Rup

    2009-11-01

    Intravenous immunoglobulin (IVIG) is a therapeutic biologic agent that has been prescribed for over two decades to treat various neuromuscular conditions. Most of the treatments are given off-label, as little evidence from large randomized trials exists to support its use. Recently, IGIV-C has received an indication for the treatment of chronic inflammatory demyelinating polyneuropathy (CIDP). Because of the lack of evidence, an ad hoc committee of the AANEM was convened to draft a consensus statement on the rational use of IVIG for neuromuscular disorders. Recommendations were categorized as Class I-IV based on the strength of the medical literature. Class I evidence exists to support the prescription of IVIG to treat patients with Guillain-Barré syndrome (GBS), CIDP, multifocal motor neuropathy, refractory exacerbations of myasthenia gravis, Lambert-Eaton syndrome, dermatomyositis, and stiff person syndrome. Treatment of Fisher syndrome, polymyositis, and certain presumed autoimmune neuromuscular disorders is supported only by Class IV studies, whereas there is no convincing data to substantiate the treatment of inclusion body myopathy (IBM), idiopathic neuropathies, brachial plexopathy, or diabetic amyotrophy using IVIG. Treatment with IVIG must be administered in the context of its known adverse effects. There is little evidence to advise the clinician on the proper dosing of IVIG and duration of therapy.

  6. Two new ad-hoc models of detection physics and their evaluation for navigated beta probe surface imaging

    NASA Astrophysics Data System (ADS)

    Shakir, Dzhoshkun I.; Hartl, Alexander; Schneider, Florian R.; Pulko, Jozef; Ziegler, Sibylle I.; Navab, Nassir; Lasser, Tobias

    2012-02-01

    Intra-operative surface imaging with navigated beta probes in conjunction with positron-emitting radiotracers like 18F-FDG has been shown to enable control of tumor resection borders. We showed previously that employing iterative reconstruction (MLEM) in conjunction with an ad-hoc model of the detection physics (based on solid-angle geometry, SA) improves the image quality. In this study, we sampled the beta probe readings of a point source using a precision step-motor to generate a look-up-table (LUT) model. We also generated a simplified geometrical model (SG) based on this data set. To see how these two models influence the image quality compared to the old SA model, we reconstructed images from sparsely sampled datasets of a phantom with three hotspots using each model. The images yielded 76% (SA), 81% (SG), and 81% (LUT) mean NCC compared to the ground truth. The SG and LUT models, however, could resolve the hotspots better in the datasets where the detector-to-phantom distance was larger. Additionally, we compared the deviations of the SA and SG analytical models to the measured LUT model, where we found that the SG model gives estimates substantially closer to the actual beta probe readings than the previous SA model.

  7. Canonical and kinetic forms of the electromagnetic momentum in an ad hoc quantization scheme for a dispersive dielectric

    SciTech Connect

    Garrison, J.C.; Chiao, R.Y.

    2004-11-01

    An ad hoc quantization scheme for the electromagnetic field in a weakly dispersive, transparent dielectric leads to the definition of canonical and kinetic forms for the momentum of the electromagnetic field in a dispersive medium. The canonical momentum is uniquely defined as the operator that generates spatial translations in a uniform medium, but the quantization scheme suggests two possible choices for the kinetic momentum operator, corresponding to the Abraham or the Minkowski momentum in classical electrodynamics. Another implication of this procedure is that a wave packet containing a single dressed photon travels at the group velocity through the medium. The physical significance of the canonical momentum has already been established by considerations of energy and momentum conservation in the atomic recoil due to spontaneous emission, the Cerenkov effect, the Doppler effect, and phase matching in nonlinear optical processes. In addition, the data of the Jones and Leslie radiation pressure experiment is consistent with the assignment of one ({Dirac_h}/2{pi})k unit of canonical momentum to each dressed photon. By contrast, experiments in which the dielectric is rigidly accelerated by unbalanced electromagnetic forces require the use of the Abraham momentum.

  8. Extended Virtual Spring Mesh (EVSM): The Distributed Self-Organizing Mobile Ad Hoc Network for Area Exploration

    SciTech Connect

    Kurt Derr

    2011-12-01

    Mobile Ad hoc NETworks (MANETs) are distributed self-organizing networks that can change locations and configure themselves on the fly. This paper focuses on an algorithmic approach for the deployment of a MANET within an enclosed area, such as a building in a disaster scenario, which can provide a robust communication infrastructure for search and rescue operations. While a virtual spring mesh (VSM) algorithm provides scalable, self-organizing, and fault-tolerant capabilities required by aMANET, the VSM lacks the MANET's capabilities of deployment mechanisms for blanket coverage of an area and does not provide an obstacle avoidance mechanism. This paper presents a new technique, an extended VSM (EVSM) algorithm that provides the following novelties: (1) new control laws for exploration and expansion to provide blanket coverage, (2) virtual adaptive springs enabling the mesh to expand as necessary, (3) adapts to communications disturbances by varying the density and movement of mobile nodes, and (4) new metrics to assess the performance of the EVSM algorithm. Simulation results show that EVSM provides up to 16% more coverage and is 3.5 times faster than VSM in environments with eight obstacles.

  9. A Proposal and Evaluation of Security Camera System at a Car Park in an Ad-Hoc Network

    NASA Astrophysics Data System (ADS)

    Uemura, Wataru; Murata, Masashi

    In recent year, ad-hoc network technology has gained attention, which consists of not access points and base stations but of wireless nodes. In this network, it is difficult to maintain the whole data flow because of the absence of access points as the network administrator when nodes share the data. This paper proposes the security camera system which has only nodes sharing the taken pictures and has the robustness against the data destroying. The sender node cannot know whether packets are received or not by neighboring nodes in broadcasting because of a unidirectional communication. So in our proposed method, the sender node selects the receiver node from neighboring nodes, and they communicate with each other. On the other hand, neighboring nodes listen to packets between the sender node and the receiver node. After that, this method guarantees nodes of more than 1 which receive a data in broadcasting. We construct the security camera system using wireless nodes with the IEEE 802.15.4 specification and show the performance for security. At last, using the simulator we show the efficiency in the large environment, and conclude this paper.

  10. Geophysical investigation of the June 6, 1944 D-Day invasion site at Pointe du Hoc, Normandy, France

    NASA Astrophysics Data System (ADS)

    Everett, M. E.; Pierce, C. J.; Warden, R. R.; Burt, R. A.

    2005-05-01

    A near-surface geophysical survey at the D-Day invasion site atop the cliffs at Pointe du Hoc, Normandy, France was carried out using ground-penetrating radar, electromagnetic induction, and magnetic gradiometry equipment. The subsurface targets of investigation are predominantly buried concrete and steel structures and earthworks associated with the German coastal fortifications at this stronpoint of Hitler's Atlantic Wall. The targets are readily detectable embedded within the vadose zone of a weakly magnetic, electrically resistive loess soil cover. The radar and electromagnetic induction responses lend themselves to plan-view imaging of the subsurface, while the magnetics data reveal the presence of buried magnetic bodies in a more subtle fashion. Several intriguing geophysical signatures were discovered, including what may be the buried remains of a railway turntable, ordnance fragments in the bomb craters, a buried steel-reinforced concrete trench, and a linear chain of machine gun firing positins. Geophysical prospecting is shown to be a very powerful tool for historical battlefield characterization.

  11. Dynamic cooperative clustering based power assignment: network capacity and lifetime efficient topology control in cooperative ad hoc networks.

    PubMed

    Li, Xiao-Hong; Xiao, Ling; Wang, Dong

    2014-01-01

    Cooperative communication (CC) is used in topology control as it can reduce the transmission power and expand the transmission range. However, all previous research on topology control under the CC model focused on maintaining network connectivity and minimizing the total energy consumption, which would lead to low network capacity, transmission interruption, or even network paralysis. Meanwhile, without considering the balance of energy consumption in the network, it would reduce the network lifetime and greatly affect the network performance. This paper tries to solve the above problems existing in the research on topology control under the CC model by proposing a power assignment (DCCPA) algorithm based on dynamic cooperative clustering in cooperative ad hoc networks. The new algorithm clusters the network to maximize network capacity and makes the clusters communicate with each other by CC. To reduce the number of redundant links between clusters, we design a static clustering method by using Kruskal algorithm. To maximize the network lifetime, we also propose a cluster head rotating method which can reach a good tradeoff between residual energy and distance for the cluster head reselection. Experimental results show that DCCPA can improve 80% network capacity with Cooperative Bridges algorithm; meanwhile, it can improve 20% network lifetime.

  12. Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsaur, Woei-Jiunn; Pai, Haw-Tyng

    2008-11-01

    The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.

  13. Vibrational Frequencies and Spectroscopic Constants for 1(sup 3)A' HNC and 1(sup 3)A' HOC+ from High-Accuracy Quartic Force Fields

    NASA Technical Reports Server (NTRS)

    Fortenberry, Ryan C.; Crawford, T. Daniel; Lee, Timothy J.

    2014-01-01

    The spectroscopic constants and vibrational frequencies for the 1(sup 3)A' states of HNC, DNC, HOC+, and DOC+ are computed and discussed in this work. The reliable CcCR quartic force field based on high-level coupled cluster ab initio quantum chemical computations is exclusively utilized to provide the anharmonic potential. Then, second order vibrational perturbation theory and vibrational configuration interaction methods are employed to treat the nuclear Schroedinger equation. Second-order perturbation theory is also employed to provide spectroscopic data for all molecules examined. The relationship between these molecules and the corresponding 1(sup 3)A' HCN and HCO+ isomers is further developed here. These data are applicable to laboratory studies involving formation of HNC and HOC+ as well as astronomical observations of chemically active astrophysical environments.

  14. Use of Numerical Models as Data Proxies for Approximate Ad-Hoc Query Processing

    SciTech Connect

    Kamimura, R; Abdulla, G; Baldwin, C; Critchlow, T; Lee, B; Lozares, I; Musick, R; Tang, N

    2003-05-19

    As datasets grow beyond the gigabyte scale, there is an increasing demand to develop techniques for dealing/interacting with them. To this end, the DataFoundry team at the Lawrence Livermore National Laboratory has developed a software prototype called Approximate Adhoc Query Engine for Simulation Data (AQSim). The goal of AQSim is to provide a framework that allows scientists to interactively perform adhoc queries over terabyte scale datasets using numerical models as proxies for the original data. The advantages of this system are several. The first is that by storing only the model parameters, each dataset occupies a smaller footprint compared to the original, increasing the shelf-life of such datasets before they are sent to archival storage. Second, the models are geared towards approximate querying as they are built at different resolutions, allowing the user to make the tradeoff between model accuracy and query response time. This allows the user greater opportunities for exploratory data analysis. Lastly, several different models are allowed, each focusing on a different characteristic of the data thereby enhancing the interpretability of the data compared to the original. The focus of this paper is on the modeling aspects of the AQSim framework.

  15. Homoclinic chaos in axisymmetric Bianchi-IX cosmological models with an ad hoc quantum potential

    SciTech Connect

    Correa, G. C.; Stuchi, T. J.; Joras, S. E.

    2010-04-15

    In this work we study the dynamics of the axisymmetric Bianchi-IX cosmological model with a term of quantum potential added. As it is well known, this class of Bianchi-IX models is homogeneous and anisotropic with two scale factors, A(t) and B(t), derived from the solution of Einstein's equation for general relativity. The model we use in this work has a cosmological constant and the matter content is dust. To this model we add a quantum-inspired potential that is intended to represent short-range effects due to the general relativistic behavior of matter in small scales and play the role of a repulsive force near the singularity. We find that this potential restricts the dynamics of the model to positive values of A(t) and B(t) and alters some qualitative and quantitative characteristics of the dynamics studied previously by several authors. We make a complete analysis of the phase space of the model finding critical points, periodic orbits, stable/unstable manifolds using numerical techniques such as Poincare section, numerical continuation of orbits, and numerical globalization of invariant manifolds. We compare the classical and the quantum models. Our main result is the existence of homoclinic crossings of the stable and unstable manifolds in the physically meaningful region of the phase space [where both A(t) and B(t) are positive], indicating chaotic escape to inflation and bouncing near the singularity.

  16. Comparison of two commonly practiced atropinization regimens in acute organophosphorus and carbamate poisoning, doubling doses vs. ad hoc: a prospective observational study.

    PubMed

    Perera, P M S; Shahmy, S; Gawarammana, I; Dawson, A H

    2008-06-01

    There is a wide variation and lack of evidence in current recommendations for atropine dosing schedules leading to subsequent variation in clinical practice. Therefore, we sought to examine the safety and effectiveness of a titrated vs. ad hoc atropine treatment regimen in a cohort of patients with acute cholinesterase inhibitor pesticide poisoning. A prospective cohort study was conducted in three district secondary referral hospitals in Sri Lanka using a structured data collection form that collected details of clinical symptoms and outcomes of cholinesterase inhibitor pesticide poisoning, atropine doses, and signs of atropinization. We compared two hospitals that used a titrated dosing protocol based on a structured monitoring sheet for atropine infusion with another hospital using an ad hoc regime. During the study, 272 symptomatic patients with anticholinesterase poisoning requiring atropine were admitted to the three hospitals. Outcomes of death and ventilation were analyzed for all patients, 226 patients were prospectively assessed for atropine toxicity. At baseline, patients in the titrated dose cohort had clinical signs consistent with greater toxicity. This in part may be due to ingestion of more toxic organophosphates. They received less pralidoxime and atropine, and were less likely to develop features of atropine toxicity, such as delirium (1% vs. 17%), hallucinations (1% vs. 35%), or either (1% vs. 35%) and need for patient restraint (3% vs. 48%) compared with the ad hoc dose regime. After adjusting for the pesticides ingested, there was no difference in mortality and ventilatory rates between protocols. Ad hoc high dose atropine regimens are associated with more frequent atropine toxicity without any obvious improvement in patient outcome compared with doses titrated to clinical effect. Atropine doses should be titrated against response and toxicity. Further education and the use of a structured monitoring sheet may assist in more appropriate

  17. A probabilistic dynamic energy model for ad-hoc wireless sensors network with varying topology

    NASA Astrophysics Data System (ADS)

    Al-Husseini, Amal

    In this dissertation we investigate the behavior of Wireless Sensor Networks (WSNs) from the degree distribution and evolution perspective. In specific, we focus on implementation of a scale-free degree distribution topology for energy efficient WSNs. WSNs is an emerging technology that finds its applications in different areas such as environment monitoring, agricultural crop monitoring, forest fire monitoring, and hazardous chemical monitoring in war zones. This technology allows us to collect data without human presence or intervention. Energy conservation/efficiency is one of the major issues in prolonging the active life WSNs. Recently, many energy aware and fault tolerant topology control algorithms have been presented, but there is dearth of research focused on energy conservation/efficiency of WSNs. Therefore, we study energy efficiency and fault-tolerance in WSNs from the degree distribution and evolution perspective. Self-organization observed in natural and biological systems has been directly linked to their degree distribution. It is widely known that scale-free distribution bestows robustness, fault-tolerance, and access efficiency to system. Fascinated by these properties, we propose two complex network theoretic self-organizing models for adaptive WSNs. In particular, we focus on adopting the Barabasi and Albert scale-free model to fit into the constraints and limitations of WSNs. We developed simulation models to conduct numerical experiments and network analysis. The main objective of studying these models is to find ways to reducing energy usage of each node and balancing the overall network energy disrupted by faulty communication among nodes. The first model constructs the wireless sensor network relative to the degree (connectivity) and remaining energy of every individual node. We observed that it results in a scale-free network structure which has good fault tolerance properties in face of random node failures. The second model considers

  18. An Analysis of the Readability of Financial Accounting Textbooks.

    ERIC Educational Resources Information Center

    Smith, Gerald; And Others

    1981-01-01

    The Flesch formula was used to calculate the readability of 15 financial accounting textbooks. The 15 textbooks represented introductory, intermediate, and advanced levels and also were classified by five different publishers. Two-way analysis of variance and Tukey's post hoc analysis revealed some significant differences. (Author/CT)

  19. EFFECT OF MOBILITY ON PERFORMANCE OF WIRELESS AD-HOC NETWORK PROTOCOLS.

    SciTech Connect

    Barrett, C. L.; Drozda, M.; Marathe, M. V.; Marathe, A.

    2001-01-01

    not only speed that influences the performance but also node degree and connectivity of the dynamic network that affects the protocol performance. 'The main implication of OUI' work is that performance analysis of protocols at a given level in the protocol stack need to be studied not locally in isolation but as a part of the complete protocol stack. The results suggest that in order to improve the pcrlormance of a communication network, it will be important to study the entire protocol stack as a single algorithmic construct; optimizing individual layers in the 7 layer OS1 stilck will not yield performance improvements beyond a point. A methodological contribution of this paper is the use of statistical methods such as design of experinierits arzd aiialysis qf variance methods to characterize the interaction between the protocols, mobility patterns and speed. This allows us to mako much more informed conclusions about the performance of thc protocols than would have been possible by merely running these experiments and observing the data. These ideas are of independtmt interest and are applicable in other contexts wherein one experimentally analyzes algorithms.

  20. Adaptive Wireless Ad-hoc Sensor Networks for Long-term and Event-oriented Environmental Monitoring

    NASA Astrophysics Data System (ADS)

    Bumberger, Jan; Mollenhauer, Hannes; Remmler, Paul; Chirila, Andrei Marian; Mollenhauer, Olaf; Hutschenreuther, Tino; Toepfer, Hannes; Dietrich, Peter

    2016-04-01

    Ecosystems are often characterized by their high heterogeneity, complexity and dynamic. Hence, single point measurements are often not sufficient for their complete representation. The application of wireless sensor networks in terrestrial and aquatic environmental systems offer significant benefits as a better consideration to the local test conditions, due to the simple adjustment of the sensor distribution, the sensor types and the sample rate. Another advantage of wireless ad-hoc sensor networks is their self-organizing behavior, resulting in a major reduction in installation and operation costs and time. In addition, individual point measurements with a sensor are significantly improved by measuring at several points continuously. In this work a concept and realization for Long-term ecosystem research is given in the field monitoring of micrometeorology and soil parameters for the interaction of biotic and abiotic processes. This long term analyses are part of the Global Change Experimental Facility (GCEF), a large field-based experimental platform to assess the effects of climate change on ecosystem functions and processes under different land-use scenarios. Regarding to the adaptive behavior of the network, also a mobile version was developed to overcome the lack of information of temporally and spatially fixed measurements for the detection and recording of highly dynamic or time limited processes. First results of different field campaigns are given to present the potentials and limitations of this application in environmental science, especially for the monitoring of the interaction of biotic and abiotic processes, soil-atmosphere interaction and the validation of remote sensing data.

  1. Adaptive Wireless Ad-hoc Sensor Networks for Long-term and Event-oriented Environmental Monitoring

    NASA Astrophysics Data System (ADS)

    Bumberger, Jan; Mollenhauer, Hannes; Remmler, Paul; Schaedler, Martin; Schima, Robert; Mollenhauer, Olaf; Hutschenreuther, Tino; Toepfer, Hannes; Dietrich, Peter

    2015-04-01

    Ecosystems are often characterized by their high heterogeneity, complexity and dynamic. Hence, single point measurements are often not sufficient for their complete representation. The application of wireless sensor networks in terrestrial and aquatic environmental systems offer significant benefits as a better consideration to the local test conditions, due to the simple adjustment of the sensor distribution, the sensor types and the sample rate. Another advantage of wireless ad-hoc sensor networks is their self-organizing behavior, resulting in a major reduction in installation and operation costs and time. In addition, individual point measurements with a sensor are significantly improved by measuring at several points continuously. In this work a concept and realization for Long-term ecosystem research is given in the field monitoring of micrometeorology and soil parameters for the interaction of biotic and abiotic processes. This long term analyses are part of the Global Change Experimental Facility (GCEF), a large field-based experimental platform to assess the effects of climate change on ecosystem functions and processes under different land-use scenarios. Regarding to the adaptive behavior of the network, also a mobile version was developed to overcome the lack of information of temporally and spatially fixed measurements for the detection and recording of highly dynamic or time limited processes. First results of different field campaigns are given to present the potentials and limitations of this application in environmental science, especially for the monitoring of the interaction of biotic and abiotic processes, soil-atmosphere interaction and the validation of remote sensing data.

  2. Combined bio-inspired/evolutionary computational methods in cross-layer protocol optimization for wireless ad hoc sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2011-06-01

    Published studies have focused on the application of one bio-inspired or evolutionary computational method to the functions of a single protocol layer in a wireless ad hoc sensor network (WSN). For example, swarm intelligence in the form of ant colony optimization (ACO), has been repeatedly considered for the routing of data/information among nodes, a network-layer function, while genetic algorithms (GAs) have been used to select transmission frequencies and power levels, physical-layer functions. Similarly, artificial immune systems (AISs) as well as trust models of quantized data reputation have been invoked for detection of network intrusions that cause anomalies in data and information; these act on the application and presentation layers. Most recently, a self-organizing scheduling scheme inspired by frog-calling behavior for reliable data transmission in wireless sensor networks, termed anti-phase synchronization, has been applied to realize collision-free transmissions between neighboring nodes, a function of the MAC layer. In a novel departure from previous work, the cross-layer approach to WSN protocol design suggests applying more than one evolutionary computational method to the functions of the appropriate layers to improve the QoS performance of the cross-layer design beyond that of one method applied to a single layer's functions. A baseline WSN protocol design, embedding GAs, anti-phase synchronization, ACO, and a trust model based on quantized data reputation at the physical, MAC, network, and application layers, respectively, is constructed. Simulation results demonstrate the synergies among the bioinspired/ evolutionary methods of the proposed baseline design improve the overall QoS performance of networks over that of a single computational method.

  3. Daytime intragastric acid control: post hoc analyses of esomeprazole 20 mg and over-the-counter proton-pump inhibitors

    PubMed Central

    Katz, Philip; Kahrilas, Peter J.; Johnson, David A.; Lind, Tore; Röhss, Kerstin; Traxler, Barry; Hugo, Vincent; Dent, John

    2015-01-01

    Objectives: In mild gastroesophageal reflux disease, which accounts for the great majority of cases, the major burden of reflux occurs during daytime hours, after food intake. The aim of these analyses was to evaluate intragastric pH control during the typical 14-hour daytime awake period by proton-pump inhibitors (PPIs) given at over-the-counter (OTC) dosages. Methods: In one double-blind and three open-label, randomized, crossover studies, intragastric pH was monitored for 24 hours on day 5 of treatment. The 24-hour data have been reported previously. Post hoc analyses reassessed these studies for the 14-hour daytime period, comparing esomeprazole 20 mg with currently available OTC PPIs omeprazole, pantoprazole (not available in the US) and lansoprazole. Results: Subjects maintained intragastric pH >4 for a significantly greater mean percentage of the 14-hour daytime period with esomeprazole 20 mg compared with any of the PPI comparators at OTC dosages. Geometric mean ratios (95% confidence intervals) for esomeprazole 20 mg versus the comparators were: 1.45 (1.14–1.85; p = 0.003) versus omeprazole 20 mg; 2.50 (2.01–3.11; p < 0.0001) versus pantoprazole 20 mg; and 1.69 (1.46–1.97; p < 0.0001) and 1.89 (1.05–3.37; p = 0.03) versus lansoprazole 15 mg. A greater proportion of subjects had better pH control with esomeprazole than with the other PPIs (range: 69–97%). Conclusions: Across the 14-hour daytime period, esomeprazole 20 mg once daily given 30 minutes before breakfast for 5 days provided acid control for a significantly greater average proportion of time versus the PPI comparators omeprazole, pantoprazole and lansoprazole at currently available OTC dosages. PMID:26557888

  4. Post hoc analyses of the impact of previous medication on the efficacy of lisdexamfetamine dimesylate in the treatment of attention-deficit/hyperactivity disorder in a randomized, controlled trial

    PubMed Central

    Coghill, David R; Banaschewski, Tobias; Lecendreux, Michel; Soutullo, César; Zuddas, Alessandro; Adeyi, Ben; Sorooshian, Shaw

    2014-01-01

    Background Following the approval of lisdexamfetamine dimesylate (LDX) in several European countries for the treatment of attention-deficit/hyperactivity disorder (ADHD) in children and adolescents with an inadequate response to methylphenidate (MPH) treatment, the aim of the present analysis was to establish the response to LDX in subgroups of patients with different ADHD medication histories. Methods This was a post hoc subgroup analysis of data from a 7-week, European, double-blind, dose-optimized, Phase III study. Patients aged 6–17 years were randomized 1:1:1 to LDX, placebo, or osmotic-release oral system methylphenidate (OROS-MPH). OROS-MPH was included as a reference arm rather than as a direct comparator. Efficacy was assessed in patients categorized according to their ADHD medication history using the ADHD Rating Scale IV and Clinical Global Impressions-Improvement (CGI-I) scores. Results The difference between active drug and placebo in least-squares mean change from baseline to endpoint in ADHD Rating Scale IV total score (95% confidence interval) was similar between the overall study population (n=317; LDX, −18.6 [−21.5, −15.7]; OROS-MPH, −13.0 [−15.9, −10.2]) and treatment-naïve individuals (n=147; LDX, −15.1 [−19.4, −10.9]; OROS-MPH, −12.7 [−16.8, −8.5]) or patients previously treated with any ADHD medication (n=170; LDX, −21.5 [−25.5, −17.6]; OROS-MPH, −14.2 [−18.1, −10.3]). In addition, similar proportions of patients receiving active treatment were categorized as improved based on CGI-I score (CGI-I of 1 or 2) in the overall study population and among treatment-naïve individuals or patients previously treated with any ADHD medication. Conclusion In these post hoc analyses, the response to LDX treatment, and to the reference treatment OROS-MPH, was similar to that observed for the overall study population in subgroups of patients categorized according to whether or not they had previously received ADHD

  5. In vitro binding of anthrax protective antigen on bacteriophage T4 capsid surface through Hoc-capsid interactions: A strategy for efficient display of large full-length proteins

    SciTech Connect

    Shivachandra, Sathish B.; Rao, Mangala; Janosi, Laszlo; Sathaliyawala, Taheri; Matyas, Gary R.; Alving, Carl R.; Leppla, Stephen H.; Rao, Venigalla B. . E-mail: rao@cua.edu

    2006-02-05

    An in vitro binding system is described to display large full-length proteins on bacteriophage T4 capsid surface at high density. The phage T4 icosahedral capsid features 155 copies of a nonessential highly antigenic outer capsid protein, Hoc, at the center of each major capsid protein hexon. Gene fusions were engineered to express the 83-kDa protective antigen (PA) from Bacillus anthracis fused to the N-terminus of Hoc and the 130-kDa PA-Hoc protein was expressed in Escherichia coli and purified. The purified PA-Hoc was assembled in vitro on hoc {sup -} phage particles. Binding was specific, stable, and of high affinity. This defined in vitro system allowed manipulation of the copy number of displayed PA and imposed no significant limitation on the size of the displayed antigen. In contrast to in vivo display systems, the in vitro approach allows all the capsid binding sites to be occupied by the 130-kDa PA-Hoc fusion protein. The PA-T4 particles were immunogenic in mice in the absence of an adjuvant, eliciting strong PA-specific antibodies and anthrax lethal toxin neutralizing antibodies. The in vitro display on phage T4 offers a novel platform for potential construction of customized vaccines against anthrax and other infectious diseases.

  6. Ad Hoc Rural Regionalism

    ERIC Educational Resources Information Center

    Hamin, Elisabeth M.; Marcucci, Daniel J.

    2008-01-01

    A new regionalism has been much documented and researched for metropolitan areas; this article documents that there is a new rural regionalism as well. In the United States, these groups appear most likely to emerge in areas that are challenged by outcomes characterizing globalization's effects on the rural condition: namely, exurban or…

  7. Development of Innovative and Inexpensive Optical Sensors in Wireless Ad-hoc Sensor Networks for Environmental Monitoring

    NASA Astrophysics Data System (ADS)

    Mollenhauer, Hannes; Schima, Robert; Assing, Martin; Mollenhauer, Olaf; Dietrich, Peter; Bumberger, Jan

    2015-04-01

    Due to the heterogeneity and dynamic of ecosystems, the observation and monitoring of natural processes necessitate a high temporal and spatial resolution. This also requires inexpensive and adaptive measurements as well as innovative monitoring strategies. To this end, the application of ad-hoc wireless sensor networks holds the potential of creating an adequate monitoring platform. In order to achieve a comprehensive monitoring in space and time with affordability, it is necessary to reduce the sensor costs. Common investigation methods, especially with regard to vegetation processes, are based on optical measurements. In particular, different wavelengths correspond to specific properties of the plants and preserve the possibility to derive information about the ecosystem, e.g. photosynthetic performance or nutrient content. In this context, photosynthetically active radiation (PAR) sensors and hyperspectral sensors are in major use. This work aims the development, evaluation and application of inexpensive but high performance optical sensors for the implementation in wireless sensor networks. Photosynthetically active radiation designates the spectral range from 400 to 700 nanometers that photosynthetic organisms are able to use in the process of photosynthesis. PAR sensors enable the detection of the reflected solar light of the vegetation in the whole PAR wave band. The amount of absorption indicates photosynthetic activity of the plant, with good approximation. Hyperspectral sensors observe specific parts or rather distinct wavelengths of the solar light spectrum and facilitate the determination of the main pigment classes, e.g. Chlorophyll, Carotenoid and Anthocyanin. Due to the specific absorption of certain pigments, a characteristic spectral signature can be seen in the visible part of the electromagnetic spectrum, known as narrow-band peaks. In an analogous manner, also the presence and concentration of different nutrients cause a characteristic spectral

  8. Why caution is recommended with post-hoc individual patient matching for estimation of treatment effect in parallel-group randomized controlled trials: the case of acute stroke trials.

    PubMed

    Jafari, Nahid; Hearne, John; Churilov, Leonid

    2013-11-10

    A post-hoc individual patient matching procedure was recently proposed within the context of parallel group randomized clinical trials (RCTs) as a method for estimating treatment effect. In this paper, we consider a post-hoc individual patient matching problem within a parallel group RCT as a multi-objective decision-making problem focussing on the trade-off between the quality of individual matches and the overall percentage of matching. Using acute stroke trials as a context, we utilize exact optimization and simulation techniques to investigate a complex relationship between the overall percentage of individual post-hoc matching, the size of the respective RCT, and the quality of matching on variables highly prognostic for a good functional outcome after stroke, as well as the dispersion in these variables. It is empirically confirmed that a high percentage of individual post-hoc matching can only be achieved when the differences in prognostic baseline variables between individually matched subjects within the same pair are sufficiently large and that the unmatched subjects are qualitatively different to the matched ones. It is concluded that the post-hoc individual matching as a technique for treatment effect estimation in parallel-group RCTs should be exercised with caution because of its propensity to introduce significant bias and reduce validity. If used with appropriate caution and thorough evaluation, this approach can complement other viable alternative approaches for estimating the treatment effect. PMID:23761106

  9. A Security Solution for IEEE 802.11's Ad-hoc Mode:Password-Authentication and Group Diffie-Hellman Key Exchange

    SciTech Connect

    Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval

    2005-10-01

    The IEEE 802 standards ease the deployment of networkinginfrastructures and enable employers to accesscorporate networks whiletraveling. These standards provide two modes of communication calledinfrastructure and ad-hoc modes. A security solution for the IEEE802.11's infrastructure mode took several years to reach maturity andfirmware are still been upgraded, yet a solution for the ad-hoc modeneeds to be specified. The present paper is a first attempt in thisdirection. It leverages the latest developments in the area ofpassword-based authentication and (group) Diffie-Hellman key exchange todevelop a provably-secure key-exchange protocol for IEEE 802.11's ad-hocmode. The protocol allows users to securely join and leave the wirelessgroup at time, accommodates either a single-shared password orpairwise-shared passwords among the group members, or at least with acentral server; achieves security against dictionary attacks in theideal-hash model (i.e. random-oracles). This is, to the best of ourknowledge, the first such protocol to appear in the cryptographicliterature.

  10. Diagnosis and Repair of Negative Polarity Constructions in the Light of Symbolic Resonance Analysis

    ERIC Educational Resources Information Center

    Drenhaus, Heiner; beim Graben, Peter; Saddy, Douglas; Frisch, Stefan

    2006-01-01

    In a post hoc analysis, we investigate differences in event-related potentials of two studies (Drenhaus et al., 2004, to appear; Saddy et al., 2004) by using the symbolic resonance analysis (Beim Graben & Kurths, 2003). The studies under discussion, examined the failure to license a negative polarity item (NPI) in German: Saddy et al. (2004a)…

  11. PCard Data Analysis Tool

    SciTech Connect

    Hilts, Jim

    2005-04-01

    The Procurement Card data analysis and monitoring tool enables due-diligence review using predefined user-created queries and reports. The system tracks individual compliance emails. More specifically, the tool: - Helps identify exceptions or questionable and non-compliant purchases, - Creates audit random sample on request, - Allows users to create and run new or ad-hoc queries and reports, - Monitors disputed charges, - Creates predefined Emails to Cardholders requesting documentation and/or clarification, - Tracks audit status, notes, Email status (date sent, response), audit resolution.

  12. Bayesian Exploratory Factor Analysis

    PubMed Central

    Conti, Gabriella; Frühwirth-Schnatter, Sylvia; Heckman, James J.; Piatek, Rémi

    2014-01-01

    This paper develops and applies a Bayesian approach to Exploratory Factor Analysis that improves on ad hoc classical approaches. Our framework relies on dedicated factor models and simultaneously determines the number of factors, the allocation of each measurement to a unique factor, and the corresponding factor loadings. Classical identification criteria are applied and integrated into our Bayesian procedure to generate models that are stable and clearly interpretable. A Monte Carlo study confirms the validity of the approach. The method is used to produce interpretable low dimensional aggregates from a high dimensional set of psychological measurements. PMID:25431517

  13. PCard Data Analysis Tool

    2005-04-01

    The Procurement Card data analysis and monitoring tool enables due-diligence review using predefined user-created queries and reports. The system tracks individual compliance emails. More specifically, the tool: - Helps identify exceptions or questionable and non-compliant purchases, - Creates audit random sample on request, - Allows users to create and run new or ad-hoc queries and reports, - Monitors disputed charges, - Creates predefined Emails to Cardholders requesting documentation and/or clarification, - Tracks audit status, notes,more » Email status (date sent, response), audit resolution.« less

  14. Multiple comparison analysis testing in ANOVA.

    PubMed

    McHugh, Mary L

    2011-01-01

    The Analysis of Variance (ANOVA) test has long been an important tool for researchers conducting studies on multiple experimental groups and one or more control groups. However, ANOVA cannot provide detailed information on differences among the various study groups, or on complex combinations of study groups. To fully understand group differences in an ANOVA, researchers must conduct tests of the differences between particular pairs of experimental and control groups. Tests conducted on subsets of data tested previously in another analysis are called post hoc tests. A class of post hoc tests that provide this type of detailed information for ANOVA results are called "multiple comparison analysis" tests. The most commonly used multiple comparison analysis statistics include the following tests: Tukey, Newman-Keuls, Scheffee, Bonferroni and Dunnett. These statistical tools each have specific uses, advantages and disadvantages. Some are best used for testing theory while others are useful in generating new theory. Selection of the appropriate post hoc test will provide researchers with the most detailed information while limiting Type 1 errors due to alpha inflation.

  15. Evaluating the efficacy of vilazodone in achieving remission in patients with major depressive disorder: post-hoc analyses of a phase IV trial.

    PubMed

    Citrome, Leslie; Gommoll, Carl P; Tang, Xiongwen; Nunez, Rene; Mathews, Maju

    2015-03-01

    The aim of this study was to evaluate the efficacy of vilazodone using different definitions of remission. Post-hoc analyses were carried out using data from an 8-week, multicenter, randomized, double-blind, placebo-controlled trial of vilazodone 40 mg/day in adults with major depressive disorder (NCT01473394). The primary efficacy endpoint was a mean change in the Montgomery-Åsberg Depression Rating Scale (MADRS) total score; additional measures included the Clinical Global Impressions-Severity (CGI-S) and Hamilton Rating Scale for Anxiety (HAMA) scores. In addition to treatment response (MADRS≥50% improvement), post-hoc analyses were carried out for remission of depressive symptoms [MADRS score≤10; MADRS≤5 (complete remission)], anxiety symptoms (HAMA≤7), and combined depression and anxiety symptoms (MADRS/HAMA≤10/≤7), as well as for overall symptom severity (CGI-S=1). Odds ratios (ORs) and numbers needed to treat (NNTs) were also calculated. Significant outcomes were obtained with vilazodone versus placebo for MADRS response (50.6 vs. 33.3%, OR=2.04, P<0.001, NNT=6), remission (34.0 vs. 21.8%, OR=1.82, P=0.003, NNT=9), and complete remission (18.2 vs. 8.3%, OR=2.42, P=0.002, NNT=11). More patients receiving vilazodone rather than placebo also met remission criteria for HAMA (48.8 vs. 35.2%, OR=1.82, P=0.002, NNT=8), MADRS/HAMA (32.1 vs. 20.4%, OR=1.83, P=0.004, NNT=9), and CGI-S (24.1 vs. 11.5%, OR=2.41, P<0.001, NNT=8). Treatment with vilazodone 40 mg/day may help adult patients with major depressive disorder achieve remission of depression and/or anxiety symptoms.

  16. Quartic force fields for excited electronic states: rovibronic reference data for the 1 (2)A' and 1 (2)A″ states of the isoformyl radical, HOC.

    PubMed

    Morgan, W James; Fortenberry, Ryan C

    2015-01-25

    Quartic force fields (QFFs) have been shown to be an effective, accurate, and relatively compact means of computing rovibrational spectroscopic data for numerous molecules with numerous applications. However, excited states have been nearly excluded from the this approach since most accurate QFFs are based on the "gold standard" coupled cluster singles, doubles, and perturbative triples [CCSD(T)] method which is not readily extended to excited states. In this work, rovibronic spectroscopic data is provided for the isoformyl radical, a molecule of significance in combustion and astrochemistry, both through the traditional means of variational access to excited states with CCSD(T) and in the novel extension of QFFs routinely to treat electronically excited states through the standard coupled cluster excited state approach, equation of motion (EOM) CCSD. It is shown here that the new EOM-based QFF provides structural parameters and rotational constants that are quite close to those from a related CCSD(T)-based QFF for the 1 (2)A(″) excited state of HOC. The anharmonic vibrational frequency percent differences between the two QFFs are less than 0.4% for the O-H stretch, less than 1.9% for the C-O stretch, and around 3.0% for the bend. Even so, the pure excited state EOM-QFF anharmonic frequencies are still very good abinitio representations that may be applied to systems where electronically excited states are not variationally accessible. Additionally, rovibrational spectroscopic data is provided for the 1 (2)A(') ground state of HOC and for both the ground and excited state of DOC.

  17. Proceedings of the Censorship Conference of the National Ad Hoc Committee Against Censorship (Dec. 9, 1975, New York City); A Day Long Discussion of Three Threats to the First Amendment and How Organizations Can Respond.

    ERIC Educational Resources Information Center

    National Ad Hoc Committee Against Censorship, New York, NY.

    The contents of this document consist of a transcript of the 1975 Censorship Conference proceedings, a list of conference participants, an outline of the National Ad Hoc Committee against Censorship, a statement of concern, and three appendixes. Contents of the transcript include introductory remarks by William F. Fore; a welcoming address by Dave…

  18. Ad Hoc Conference on the Education of Migrants: Introductory Report on Theme I, "The Position of the Immigrant and His Family on Arrival in the Host Country" (Strasbourg, France, November 5-8, 1974).

    ERIC Educational Resources Information Center

    Morin, Emma

    Theme I of the Ad Hoc Conference on the Education of Migrants was "measures to improve the position of the immigrant and his family at the time of arrival in the host country (including measures taken in the sending country on behalf of those intending to emigrate), primarily in respect of their educational circumstances". This report presents an…

  19. Ad Hoc Conference on the Education of Migrants: Introductory Report on Theme III, "Opportunities for Vocational and Technical Training and General Education for Adults and Adolescents" (Strasbourg, France, November 5-8, 1974).

    ERIC Educational Resources Information Center

    Egger, Eugene

    Theme III of the Ad Hoc Conference on the Education of Migrants was "measures to secure the satisfactory provision of opportunities for vocational and technical training and general education for adults and adolescents". This report briefly summarizes the situation in member countries regarding the vocational and technical training and general…

  20. Scientific and Technological Information for Development. Proceedings of the Ad-hoc Panel of Experts on Information Systems for Science and Technology for Development (Rome, Italy, January 21-25, 1985).

    ERIC Educational Resources Information Center

    United Nations, New York, NY.

    The report of the ad-hoc panel and the 25 papers in these proceedings cover a wide spectrum of issues and perspectives relating to information systems, services, and networks at both the national and international levels. The first part of this six-part volume presents the panel's report, which reviews the history of the panel and its purpose and…

  1. Ad Hoc Conference on the Education of Migrants: Introductory Report on Theme II, "Educational Provision Before and During the Host Country's Compulsory Schooling Period" (Strasbourg, France, November 5-8, 1974).

    ERIC Educational Resources Information Center

    Warzee, Louis

    Theme II of the Ad Hoc Conference on the Education of Migrants was "measures to secure satisfactory educational provision before and during the host country's compulsory schooling period (including specialized and additional training for teachers dealing with migrant workers' children)". This paper briefly discusses this theme. Major topics are:…

  2. Postmodeling Sensitivity Analysis to Detect the Effect of Missing Data Mechanisms

    ERIC Educational Resources Information Center

    Jamshidian, Mortaza; Mata, Matthew

    2008-01-01

    Incomplete or missing data is a common problem in almost all areas of empirical research. It is well known that simple and ad hoc methods such as complete case analysis or mean imputation can lead to biased and/or inefficient estimates. The method of maximum likelihood works well; however, when the missing data mechanism is not one of missing…

  3. A Descriptive Analysis of Test Session Observation Checklist Ratings from the Woodcock Johnson III Standardization Sample

    ERIC Educational Resources Information Center

    Frisby, Craig L.; Osterlind, Steven J.

    2006-01-01

    Modern scale construction techniques have been used to develop scales measuring examiner ratings of examinees' test session behavior (TSB) on Wechsler and Stanford-Binet intelligence tests. This study analyzes data from the Test Session Observation Checklist (TSOC), a measure developed by post hoc rational analysis, from a portion of the Woodcock…

  4. Ad Hoc Influenza Vaccination During Years of Significant Antigenic Drift in a Tropical City With 2 Seasonal Peaks: A Cross-Sectional Survey Among Health Care Practitioners.

    PubMed

    Wong, Martin C S; Nelson, E Anthony S; Leung, Czarina; Lee, Nelson; Chan, Martin C W; Choi, Kin Wing; Rainer, Timothy H; Cheng, Frankie W T; Wong, Samuel Y S; Lai, Christopher K C; Lam, Bosco; Cheung, Tak Hong; Leung, Ting Fan; Chan, Paul K S

    2016-05-01

    We evaluated the acceptability of an additional ad hoc influenza vaccination among the health care professionals following seasons with significant antigenic drift.Self-administered, anonymous surveys were performed by hard copy questionnaires in public hospitals, and by an on-line platform available to all healthcare professionals, from April 1st to May 31st, 2015. A total of 1290 healthcare professionals completed the questionnaires, including doctors, nurses, and allied health professionals working in both the public and private systems.Only 31.8% of participating respondents expressed an intention to receive the additional vaccine, despite that the majority of them agreed or strongly agreed that it would bring benefit to the community (88.9%), save lives (86.7%), reduce medical expenses (76.3%), satisfy public expectation (82.8%), and increase awareness of vaccination (86.1%). However, a significant proportion expressed concern that the vaccine could disturb the normal immunization schedule (45.5%); felt uncertain what to do in the next vaccination round (66.0%); perceived that the summer peak might not occur (48.2%); and believed that the summer peak might not be of the same virus (83.5%). Furthermore, 27.8% of all respondents expected that the additional vaccination could weaken the efficacy of previous vaccinations; 51.3% was concerned about side effects; and 61.3% estimated that there would be a low uptake rate. If the supply of vaccine was limited, higher priority groups were considered to include the elderly aged ≥65 years with chronic medical conditions (89.2%), the elderly living in residential care homes (87.4%), and long-stay residents of institutions for the disabled (80.7%). The strongest factors associated with accepting the additional vaccine included immunization with influenza vaccines in the past 3 years, higher perceived risk of contracting influenza, and higher perceived severity of the disease impact.The acceptability to an additional ad

  5. Post Hoc Evaluation of Long-Term Goals for Energy Savings in the Buildings Sector: Lessons from Hindsight

    SciTech Connect

    Anderson, Dave M. ); Hostick, Donna J. )

    2003-04-28

    This report is one of two that re-examines the forecasted impact of individual programs currently within the Buildings Technology Program (BT) and the Weatherization and Intergovernmental Program (WIP) that appeared in the FY2000 Presidential Budget request. This report outlines the effects of re-estimating the FY 2000 budget request based on overlaying project data from subsequent years essentially revised out-year forecasts of project benefits. It shows that year-to-year long-term projections of primary energy savings can vary widely as models improve and programs change. Note that the FY2000 budget request was originally analyzed under the former Office of Building Technology, State and Community Programs (BTS), where BT and WIP were previously combined. Throughout the document, reference will be made to the predecessor of the BT and WIP programs, BTS, as FY2000 reflected that organization. A companion report develops potential methods for allowing inherent risk to be captured in the project benefits analysis. The point estimates in this paper are not influenced by uncertainty or risk. That report develops potential methods for allowing inherent risk to affect the benefits analysis via Monte Carlo simulation.

  6. Sociocultural barriers to medical care among Mexican Americans in Texas: a summary report of research conducted by the Southwest Medical Sociology Ad Hoc Committee.

    PubMed

    Quesada, G M; Heller, P L

    1977-05-01

    This paper summarizes research findings from members of the Southwest Medical Sociology Ad Hoc Committee concerning sociocultural barriers to medical care among Mexican Americans in Texas. Committee members individually, or in two-person groups, studied a number of factors concerning Mexican-American medical care in Texas such as: 1) mortality, morbidity, and other health status indicators; 2) health manpower and educational needs; 3) political factors impeding economical health care; 4) alienation, familism, and their relationship to utilization of the health services; 5) language and communication barriers; and 6) folk medicine. Findings include documentation that structural alienation of Mexican-Americans from mainstream Anglo-American middle-class society is carried over into their relation with utilization of the health care delivery system; that their emphasis on familism works alternatively to encourage and discourage their seeking access to health care; the language differences serve to perpetuate certain cultural differences that are inimical to health care delivery; and that curanderismo can be seen as complementing other types of health care. The report concludes with a number of recommendations for accomplishing cultural integration that will lead to better care for this segment of the health population. PMID:857103

  7. Sociocultural barriers to medical care among Mexican Americans in Texas: a summary report of research conducted by the Southwest Medical Sociology Ad Hoc Committee.

    PubMed

    Quesada, G M; Heller, P L

    1977-05-01

    This paper summarizes research findings from members of the Southwest Medical Sociology Ad Hoc Committee concerning sociocultural barriers to medical care among Mexican Americans in Texas. Committee members individually, or in two-person groups, studied a number of factors concerning Mexican-American medical care in Texas such as: 1) mortality, morbidity, and other health status indicators; 2) health manpower and educational needs; 3) political factors impeding economical health care; 4) alienation, familism, and their relationship to utilization of the health services; 5) language and communication barriers; and 6) folk medicine. Findings include documentation that structural alienation of Mexican-Americans from mainstream Anglo-American middle-class society is carried over into their relation with utilization of the health care delivery system; that their emphasis on familism works alternatively to encourage and discourage their seeking access to health care; the language differences serve to perpetuate certain cultural differences that are inimical to health care delivery; and that curanderismo can be seen as complementing other types of health care. The report concludes with a number of recommendations for accomplishing cultural integration that will lead to better care for this segment of the health population.

  8. Exploring the variation in implementation of a COPD disease management programme and its impact on health outcomes: a post hoc analysis of the RECODE cluster randomised trial

    PubMed Central

    Boland, Melinde R S; Kruis, Annemarije L; Huygens, Simone A; Tsiachristas, Apostolos; Assendelft, Willem J J; Gussekloo, Jacobijn; Blom, Coert M G; Chavannes, Niels H; Rutten-van Mölken, Maureen P M H

    2015-01-01

    This study aims to (1) examine the variation in implementation of a 2-year chronic obstructive pulmonary disease (COPD) management programme called RECODE, (2) analyse the facilitators and barriers to implementation and (3) investigate the influence of this variation on health outcomes. Implementation variation among the 20 primary-care teams was measured directly using a self-developed scale and indirectly through the level of care integration as measured with the Patient Assessment of Chronic Illness Care (PACIC) and the Assessment of Chronic Illness Care (ACIC). Interviews were held to obtain detailed information regarding the facilitators and barriers to implementation. Multilevel models were used to investigate the association between variation in implementation and change in outcomes. The teams implemented, on average, eight of the 19 interventions, and the specific package of interventions varied widely. Important barriers and facilitators of implementation were (in)sufficient motivation of healthcare provider and patient, the high starting level of COPD care, the small size of the COPD population per team, the mild COPD population, practicalities of the information and communication technology (ICT) system, and hurdles in reimbursement. Level of implementation as measured with our own scale and the ACIC was not associated with health outcomes. A higher level of implementation measured with the PACIC was positively associated with improved self-management capabilities, but this association was not found for other outcomes. There was a wide variety in the implementation of RECODE, associated with barriers at individual, social, organisational and societal level. There was little association between extent of implementation and health outcomes. PMID:26677770

  9. Treatment response in relation to subthreshold bipolarity in patients with major depressive disorder receiving antidepressant monotherapy: a post hoc data analysis (KOMDD study)

    PubMed Central

    Park, Young-Min; Lee, Bun-Hee

    2016-01-01

    Background The aim of this observational study was to determine whether subthreshold bipolarity affects treatment response and remission in patients with major depressive disorder receiving antidepressant (AD) monotherapy over a 6-month follow-up period. Methods Seventy-eight patients with major depressive disorder were stratified into two subgroups according to the presence of subthreshold bipolarity, identified using the Korean version of the Mood Disorder Questionnaire (K-MDQ), which classifies patients as positive for a screening of bipolarity based on the cutoff for the total K-MDQ score (ie, 7 points). They received AD monotherapy such as escitalopram, sertraline, paroxetine, or tianeptine for 6 months. The Beck Depression Inventory (BDI), Hamilton Depression Rating Scale (HAMD), Hamilton Anxiety Scale, and Beck Scale for Suicide Ideation were applied at baseline, 1 week, 3 weeks, 2 months, 3 months, and 6 months. Results The mean HAMD, BDI, and Beck Scale for Suicide Ideation scores were higher in the bipolarity group than in the nonbipolarity group at 3 weeks. The mean BDI score was also higher in the bipolarity group than in the nonbipolarity group at 6 months. Evaluation of the ratio of improvement for each scale revealed different patterns of percentage changes between the two groups over the 6-month follow-up period. Furthermore, the response and remission rates (as assessed using BDI and HAMD scores) were higher in the nonbipolarity group than in the bipolarity group, with the exception of HAMD scores at the 3-week follow-up time point. Conclusion The findings of this study showed that depressed patients with bipolarity had a worse response to AD monotherapy than did those without bipolarity. PMID:27274258

  10. Prognostic Value of the 24-Hour Neurological Examination in Anterior Circulation Ischemic Stroke: A post hoc Analysis of Two Randomized Controlled Stroke Trials

    PubMed Central

    Rangaraju, Srikant; Frankel, Michael; Jovin, Tudor G.

    2016-01-01

    Background Early prognostication of long-term outcomes following ischemic stroke can facilitate medical decision-making. We hypothesized that the 24-hour National Institute of Health Stroke Scale (NIHSS) predicts 3-month clinical outcomes in anterior circulation stroke. Methods Secondary analyses of the Interventional Management of Stroke 3 (IMS3) and intravenous tissue plasminogen activator (IV tPA) for acute ischemic stroke [National Institute of Neurological Diseases and Stroke (NINDS) IV tPA] trials were performed. In participants with documented 24-hour NIHSS and 3-month Modified Rankin Scale (mRS), the predictive power of the 24-hour NIHSS and 24-hour NIHSS improvement for 3-month outcomes [mRS 0-2 and Barthel Index (BI) ≥95] was assessed. Percentages of good outcome (mRS 0-2 or BI ≥95) at 3, 6, and 12 months and mean quality of life (EQ5D™) index at 3 months across 24-hour NIHSS quartiles were compared. Results The majority of the study participants were included (IMS3 n = 587/656, NINDS IV tPA n = 619/624). The 24-hour NIHSS was correlated with 3-month mRS (R = 0.73) with excellent predictive power for mRS 0-2 [area under the curve (AUC) = 0.91] and BI ≥95 (AUC = 0.9) in both cohorts. A model with the 24-hour NIHSS alone correctly classified 82-84% of patients in both cohorts. The percentages of good outcomes at 3-12 months across 24-hour NIHSS quartiles were similar in both cohorts. mRS 0-2 was achieved by 75.6-77.7% of patients with 24-hour NIHSS ≤11 but by only 1.4-3.6% with 24-hour NIHSS ≥20. The EQ5D index at 3 months varied among NIHSS 0-4 (mean 0.86 ± 0.16), 5-11 (0.77 ± 0.18), and 12-19 (0.59 ± 0.26) quartiles. Conclusions The 24-hour NIHSS strongly predicts long-term stroke outcomes and is associated with quality of life. Its easy availability, reliability, and validity support its use as an early prognostic marker and surrogate of clinical outcome in ischemic stroke. PMID:27051408

  11. Soil Parameter Mapping and Ad Hoc Power Analysis to Increase Blocking Efficiency Prior to Establishing a Long-Term Field Experiment.

    PubMed

    Collins, Doug; Benedict, Chris; Bary, Andy; Cogger, Craig

    2015-01-01

    The spatial heterogeneity of soil and weed populations poses a challenge to researchers. Unlike aboveground variability, below-ground variability is more difficult to discern without a strategic soil sampling pattern. While blocking is commonly used to control environmental variation, this strategy is rarely informed by data about current soil conditions. Fifty georeferenced sites were located in a 0.65 ha area prior to establishing a long-term field experiment. Soil organic matter (OM) and weed seed bank populations were analyzed at each site and the spatial structure was modeled with semivariograms and interpolated with kriging to map the surface. These maps were used to formulate three strategic blocking patterns and the efficiency of each pattern was compared to a completely randomized design and a west to east model not informed by soil variability. Compared to OM, weeds were more variable across the landscape and had a shorter range of autocorrelation, and models to increase blocking efficiency resulted in less increase in power. Weeds and OM were not correlated, so no model examined improved power equally for both parameters. Compared to the west to east blocking pattern, the final blocking pattern chosen resulted in a 7-fold increase in power for OM and a 36% increase in power for weeds.

  12. Soil Parameter Mapping and Ad Hoc Power Analysis to Increase Blocking Efficiency Prior to Establishing a Long-Term Field Experiment

    PubMed Central

    Collins, Doug; Benedict, Chris; Bary, Andy; Cogger, Craig

    2015-01-01

    The spatial heterogeneity of soil and weed populations poses a challenge to researchers. Unlike aboveground variability, below-ground variability is more difficult to discern without a strategic soil sampling pattern. While blocking is commonly used to control environmental variation, this strategy is rarely informed by data about current soil conditions. Fifty georeferenced sites were located in a 0.65 ha area prior to establishing a long-term field experiment. Soil organic matter (OM) and weed seed bank populations were analyzed at each site and the spatial structure was modeled with semivariograms and interpolated with kriging to map the surface. These maps were used to formulate three strategic blocking patterns and the efficiency of each pattern was compared to a completely randomized design and a west to east model not informed by soil variability. Compared to OM, weeds were more variable across the landscape and had a shorter range of autocorrelation, and models to increase blocking efficiency resulted in less increase in power. Weeds and OM were not correlated, so no model examined improved power equally for both parameters. Compared to the west to east blocking pattern, the final blocking pattern chosen resulted in a 7-fold increase in power for OM and a 36% increase in power for weeds. PMID:26247056

  13. Exploring the variation in implementation of a COPD disease management programme and its impact on health outcomes: a post hoc analysis of the RECODE cluster randomised trial.

    PubMed

    Boland, Melinde R S; Kruis, Annemarije L; Huygens, Simone A; Tsiachristas, Apostolos; Assendelft, Willem J J; Gussekloo, Jacobijn; Blom, Coert M G; Chavannes, Niels H; Rutten-van Mölken, Maureen P M H

    2015-01-01

    This study aims to (1) examine the variation in implementation of a 2-year chronic obstructive pulmonary disease (COPD) management programme called RECODE, (2) analyse the facilitators and barriers to implementation and (3) investigate the influence of this variation on health outcomes. Implementation variation among the 20 primary-care teams was measured directly using a self-developed scale and indirectly through the level of care integration as measured with the Patient Assessment of Chronic Illness Care (PACIC) and the Assessment of Chronic Illness Care (ACIC). Interviews were held to obtain detailed information regarding the facilitators and barriers to implementation. Multilevel models were used to investigate the association between variation in implementation and change in outcomes. The teams implemented, on average, eight of the 19 interventions, and the specific package of interventions varied widely. Important barriers and facilitators of implementation were (in)sufficient motivation of healthcare provider and patient, the high starting level of COPD care, the small size of the COPD population per team, the mild COPD population, practicalities of the information and communication technology (ICT) system, and hurdles in reimbursement. Level of implementation as measured with our own scale and the ACIC was not associated with health outcomes. A higher level of implementation measured with the PACIC was positively associated with improved self-management capabilities, but this association was not found for other outcomes. There was a wide variety in the implementation of RECODE, associated with barriers at individual, social, organisational and societal level. There was little association between extent of implementation and health outcomes. PMID:26677770

  14. Exploring the variation in implementation of a COPD disease management programme and its impact on health outcomes: a post hoc analysis of the RECODE cluster randomised trial.

    PubMed

    Boland, Melinde R S; Kruis, Annemarije L; Huygens, Simone A; Tsiachristas, Apostolos; Assendelft, Willem J J; Gussekloo, Jacobijn; Blom, Coert M G; Chavannes, Niels H; Rutten-van Mölken, Maureen P M H

    2015-12-17

    This study aims to (1) examine the variation in implementation of a 2-year chronic obstructive pulmonary disease (COPD) management programme called RECODE, (2) analyse the facilitators and barriers to implementation and (3) investigate the influence of this variation on health outcomes. Implementation variation among the 20 primary-care teams was measured directly using a self-developed scale and indirectly through the level of care integration as measured with the Patient Assessment of Chronic Illness Care (PACIC) and the Assessment of Chronic Illness Care (ACIC). Interviews were held to obtain detailed information regarding the facilitators and barriers to implementation. Multilevel models were used to investigate the association between variation in implementation and change in outcomes. The teams implemented, on average, eight of the 19 interventions, and the specific package of interventions varied widely. Important barriers and facilitators of implementation were (in)sufficient motivation of healthcare provider and patient, the high starting level of COPD care, the small size of the COPD population per team, the mild COPD population, practicalities of the information and communication technology (ICT) system, and hurdles in reimbursement. Level of implementation as measured with our own scale and the ACIC was not associated with health outcomes. A higher level of implementation measured with the PACIC was positively associated with improved self-management capabilities, but this association was not found for other outcomes. There was a wide variety in the implementation of RECODE, associated with barriers at individual, social, organisational and societal level. There was little association between extent of implementation and health outcomes.

  15. Healthy Aging 5 Years After a Period of Daily Supplementation With Antioxidant Nutrients: A Post Hoc Analysis of the French Randomized Trial SU.VI.MAX.

    PubMed

    Assmann, Karen E; Andreeva, Valentina A; Jeandel, Claude; Hercberg, Serge; Galan, Pilar; Kesse-Guyot, Emmanuelle

    2015-10-15

    This study's objective was to investigate healthy aging in older French adults 5 years after a period of daily nutritional-dose supplementation with antioxidant nutrients. The study was based on the double-blind, randomized trial, Supplementation with Antioxidant Vitamins and Minerals (SU.VI.MAX) Study (1994-2002) and the SU.VI.MAX 2 Follow-up Study (2007-2009). During 1994-2002, participants received a daily combination of vitamin C (120 mg), β-carotene (6 mg), vitamin E (30 mg), selenium (100 µg), and zinc (20 mg) or placebo. Healthy aging was assessed in 2007-2009 by using multiple criteria, including the absence of major chronic disease and good physical and cognitive functioning. Data from a subsample of the SU.VI.MAX 2 cohort, initially free of major chronic disease, with a mean age of 65.3 years in 2007-2009 (n = 3,966), were used to calculate relative risks. Supplementation was associated with a greater healthy aging probability among men (relative risk = 1.16, 95% confidence interval: 1.04, 1.29) but not among women (relative risk = 0.98, 95% confidence interval: 0.86, 1.11) or all participants (relative risk = 1.07, 95% confidence interval: 0.99, 1.16). Moreover, exploratory subgroup analyses indicated effect modification by initial serum concentrations of zinc and vitamin C. In conclusion, an adequate supply of antioxidant nutrients (equivalent to quantities provided by a balanced diet rich in fruits and vegetables) may have a beneficial role for healthy aging.

  16. Evaluation of blood pressure reduction response and responder characteristics to fixed-dose combination treatment of amlodipine and losartan: a post hoc analysis of pooled clinical trials.

    PubMed

    Unniachan, Sreevalsa; Wu, David; Rajagopalan, Srinivasan; Hanson, Mary E; Fujita, Kenji P

    2014-09-01

    Data from four clinical trials compared reductions in systolic blood pressure (SBP) and diastolic blood pressure (DBP) among patients treated with amlodipine/losartan 5/50 mg vs 5/100 mg and amlodipine/losartan 5/50 mg vs amlodipine 5 mg and 10 mg. Response rate was assessed as reduction in SBP or DBP (>20/10 mm Hg) and proportion of patients achieving SBP <140 mm Hg or DBP <90 mm Hg. Patients were grouped into quartiles based on baseline SBP and DBP. Mean SBP and DBP were reduced in amlodipine/losartan 5/50 mg (n=182) and amlodipine/losartan 5/100 mg (n=95) users across all baseline quartiles. Patients using amlodipine/losartan 5/50 mg had significantly greater SBP and DBP reductions vs amlodipine 5 mg (P=.001 and P=.02, respectively). Amlodipine/losartan 5/50 mg users had significantly greater SBP reduction vs amlodipine 10 mg (SBP P=.02; DBP P=not significant). The odds of responding to therapy were significantly greater with amlodipine/losartan 5/50 mg vs amlodipine 5 mg (odds ratio, 5.33; 95% confidence interval, 1.42-25.5) and were similar vs amlodipine 10 mg (odds ratio, 0.67; 95% confidence interval, 0.017-9.51). These results support the use of combination therapy early in the treatment of hypertension.

  17. Healthy Aging 5 Years After a Period of Daily Supplementation With Antioxidant Nutrients: A Post Hoc Analysis of the French Randomized Trial SU.VI.MAX.

    PubMed

    Assmann, Karen E; Andreeva, Valentina A; Jeandel, Claude; Hercberg, Serge; Galan, Pilar; Kesse-Guyot, Emmanuelle

    2015-10-15

    This study's objective was to investigate healthy aging in older French adults 5 years after a period of daily nutritional-dose supplementation with antioxidant nutrients. The study was based on the double-blind, randomized trial, Supplementation with Antioxidant Vitamins and Minerals (SU.VI.MAX) Study (1994-2002) and the SU.VI.MAX 2 Follow-up Study (2007-2009). During 1994-2002, participants received a daily combination of vitamin C (120 mg), β-carotene (6 mg), vitamin E (30 mg), selenium (100 µg), and zinc (20 mg) or placebo. Healthy aging was assessed in 2007-2009 by using multiple criteria, including the absence of major chronic disease and good physical and cognitive functioning. Data from a subsample of the SU.VI.MAX 2 cohort, initially free of major chronic disease, with a mean age of 65.3 years in 2007-2009 (n = 3,966), were used to calculate relative risks. Supplementation was associated with a greater healthy aging probability among men (relative risk = 1.16, 95% confidence interval: 1.04, 1.29) but not among women (relative risk = 0.98, 95% confidence interval: 0.86, 1.11) or all participants (relative risk = 1.07, 95% confidence interval: 0.99, 1.16). Moreover, exploratory subgroup analyses indicated effect modification by initial serum concentrations of zinc and vitamin C. In conclusion, an adequate supply of antioxidant nutrients (equivalent to quantities provided by a balanced diet rich in fruits and vegetables) may have a beneficial role for healthy aging. PMID:26374140

  18. Second-Guessing Scientists and Engineers: Post Hoc Criticism and the Reform of Practice in Green Chemistry and Engineering.

    PubMed

    Lynch, William T

    2015-10-01

    The article examines and extends work bringing together engineering ethics and Science and Technology Studies, which had built upon Diane Vaughan's analysis of the Challenger shuttle accident as a test case. Reconsidering the use of her term "normalization of deviance," the article argues for a middle path between moralizing against and excusing away engineering practices contributing to engineering disaster. To explore an illustrative pedagogical case and to suggest avenues for constructive research developing this middle path, it examines the emergence of green chemistry and green engineering. Green chemistry began when Paul Anastas and John Warner developed a set of new rules for chemical synthesis that sought to learn from missed opportunities to avoid environmental damage in the twentieth century, an approach that was soon extended to engineering as well. Examination of tacit assumptions about historical counterfactuals in recent, interdisciplinary discussions of green chemistry illuminate competing views about the field's prospects. An integrated perspective is sought, addressing how both technical practice within chemistry and engineering and the influence of a wider "social movement" can play a role in remedying environmental problems. PMID:25218835

  19. Second-Guessing Scientists and Engineers: Post Hoc Criticism and the Reform of Practice in Green Chemistry and Engineering.

    PubMed

    Lynch, William T

    2015-10-01

    The article examines and extends work bringing together engineering ethics and Science and Technology Studies, which had built upon Diane Vaughan's analysis of the Challenger shuttle accident as a test case. Reconsidering the use of her term "normalization of deviance," the article argues for a middle path between moralizing against and excusing away engineering practices contributing to engineering disaster. To explore an illustrative pedagogical case and to suggest avenues for constructive research developing this middle path, it examines the emergence of green chemistry and green engineering. Green chemistry began when Paul Anastas and John Warner developed a set of new rules for chemical synthesis that sought to learn from missed opportunities to avoid environmental damage in the twentieth century, an approach that was soon extended to engineering as well. Examination of tacit assumptions about historical counterfactuals in recent, interdisciplinary discussions of green chemistry illuminate competing views about the field's prospects. An integrated perspective is sought, addressing how both technical practice within chemistry and engineering and the influence of a wider "social movement" can play a role in remedying environmental problems.

  20. Migraine and triggers: Post hoc ergo propter hoc?

    PubMed Central

    Hoffmann, Jan; Recober, Ana

    2013-01-01

    The influence of environmental factors on the clinical manifestation of migraine has been a matter of extensive debate over the past decades. Migraineurs commonly report foods, alcohol, meteorologic or atmospheric changes, exposure to light, sounds, or odors, as factors that trigger or aggravate their migraine attacks. In the same way, physicians frequently follow this belief in their recommendations in how migraineurs may reduce their attack frequency, especially with regard to the consumption of certain food components. Interestingly, despite being such a common belief, most of the clinical studies have shown conflicting results. The aim of the review is to critically analyze clinical and pathophysiological facts that support or refute a correlation between certain environmental stimuli and the occurrence of migraine attacks. Given the substantial discrepancy between patients' reports and objective clinical data, the methodological difficulties of investigating the link between environmental factors and migraine are highlighted. PMID:23996725

  1. General guidance on exploratory and confirmatory subgroup analysis in late-stage clinical trials.

    PubMed

    Dmitrienko, Alex; Muysers, Christoph; Fritsch, Arno; Lipkovich, Ilya

    2016-01-01

    This article focuses on a broad class of statistical and clinical considerations related to the assessment of treatment effects across patient subgroups in late-stage clinical trials. This article begins with a comprehensive review of clinical trial literature and regulatory guidelines to help define scientifically sound approaches to evaluating subgroup effects in clinical trials. All commonly used types of subgroup analysis are considered in the article, including different variations of prospectively defined and post-hoc subgroup investigations. In the context of confirmatory subgroup analysis, key design and analysis options are presented, which includes conventional and innovative trial designs that support multi-population tailoring approaches. A detailed summary of exploratory subgroup analysis (with the purpose of either consistency assessment or subgroup identification) is also provided. The article promotes a more disciplined approach to post-hoc subgroup identification and formulates key principles that support reliable evaluation of subgroup effects in this setting.

  2. Safinamide as Add-On Therapy to Levodopa in Mid- to Late-Stage Parkinson’s Disease Fluctuating Patients: Post hoc Analysesof Studies 016 and SETTLE

    PubMed Central

    Cattaneo, Carlo; Sardina, Marco; Bonizzoni, Ermino

    2016-01-01

    Background: Studies 016 and SETTLE showed that safinamide was safe and effective as adjunct therapy in patients with advanced Parkinson’s disease (PD) and motor fluctuations. The addition of safinamide to a stable dose of levodopa alone or with other antiparkinsonian medications significantly increased ON time with no/non-troublesome dyskinesia, decreased OFF time and improved Parkinson’s symptoms. Objective: To evaluate the clinical effects of safinamide 100 mg/day on motor fluctuations and cardinal Parkinson’s symptoms in specific patient subgroups using pooled data from Studies 016 and SETTLE. Methods: Both studies were double blind, placebo-controlled, randomized, phase 3 trials which enrolled patients with mid- to late-stage PD experiencing motor fluctuations while receiving optimized and stable doses of levodopa, alone or with other dopaminergic treatments. The present post-hoc analyses assessed the change from baseline in ON time (with no or non-troublesome dyskinesia) and OFF time in subgroups of patients who were receiving only levodopa at baseline, who were classified as “mild fluctuators” (daily OFF time ≤4 h), and who were receiving concomitant dopaminergic therapy, with or without amantadine, and the effects of safinamide versus placebo on individual cardinal PD symptoms during ON time. Results: Safinamide significantly increased mean ON time (with no or non-troublesome dyskinesia) and reduced mean OFF time when used as first adjunct therapy in levodopa-treated patients and patients with mild motor fluctuations. Mean daily ON time (with no or non-troublesome dyskinesia) and OFF time were favorably changed, compared with placebo, to similar extents regardless of whether patients were receiving concomitant dopamine agonists, catechol-O-methyltransferase inhibitors and amantadine. Additionally, safinamide improved bradykinesia, rigidity, tremor and gait. Conclusions: Safinamide was a safe and effective first adjunct therapy in levodopa

  3. Bioconversion of α-Linolenic Acid into n-3 Long-Chain Polyunsaturated Fatty Acid in Hepatocytes and Ad Hoc Cell Culture Optimisation

    PubMed Central

    Alhazzaa, Ramez; Sinclair, Andrew J.; Turchini, Giovanni M.

    2013-01-01

    This study aimed to establish optimal conditions for a cell culture system that would allow the measurement of 18∶3n-3 (ALA) bioconversion into n-3 long-chain polyunsaturated fatty acid (n-3 LC-PUFA), and to determine the overall pathway kinetics. Using rat hepatocytes (FaO) as model cells, it was established that a maximum 20∶5n-3 (EPA) production from 50 µM ALA initial concentration was achieved after 3 days of incubation. Next, it was established that a gradual increase in the ALA concentration from 0 up to 125µM lead to a proportional increase in EPA, without concomitant increase in further elongated or desaturated products, such as 22∶5n-3 (DPA) and 22∶6n-3 (DHA) in 3 day incubations. Of interest, ALA bioconversion products were observed in the culture medium. Therefore, in vitro experiments disregarding the medium fatty acid content are underestimating the metabolism efficiency. The novel application of the fatty acid mass balance (FAMB) method on cell culture system (cells with medium) enabled quantifying the apparent enzymatic activities for the biosynthesis of n-3 LC-PUFA. The activity of the key enzymes was estimated and showed that, under these conditions, 50% (Km) of the theoretical maximal (Vmax = 3654 µmol.g−1 of cell protein.hour−1) Fads2 activity on ALA can be achieved with 81 µM initial ALA. Interestingly, the apparent activity of Elovl2 (20∶5n-3 elongation) was the slowest amongst other biosynthesis steps. Therefore, the possible improvement of Elovl2 activity is suggested toward a more efficient DHA production from ALA. The present study proposed and described an ad hoc optimised cell culture conditions and methodology towards achieving a reliable experimental platform, using FAMB, to assist in studying the efficiency of ALA bioconversion into n-3 LC-PUFA in vitro. The FAMB proved to be a powerful and inexpensive method to generate a detailed description of the kinetics of n-3 LC-PUFA biosynthesis enzymes activities in vitro

  4. Monitoring of slope-instabilities and deformations with Micro-Electro-Mechanical-Systems (MEMS) in wireless ad-hoc Sensor Networks

    NASA Astrophysics Data System (ADS)

    Arnhardt, C.; Fernández-Steeger, T. M.; Azzam, R.

    2009-04-01

    In most mountainous regions, landslides represent a major threat to human life, properties and infrastructures. Nowadays existing landslide monitoring systems are often characterized by high efforts in terms of purchase, installation, maintenance, manpower and material. In addition (or because of this) only small areas or selective points of the endangered zone can be observed by the system. Therefore the improvement of existing and the development of new monitoring and warning systems are of high relevance. The joint project "Sensor based Landslide Early Warning Systems" (SLEWS) deals with the development of a prototypic Alarm- and Early Warning system (EWS) for different types of landslides using low-cost micro-sensors (MEMS) integrated in a wireless sensor network (WSN). Modern so called Ad-Hoc, Multi-Hop wireless sensor networks (WSN) are characterized by a self organizing and self-healing capacity of the system (autonomous systems). The network consists of numerous individual and own energy-supply operating sensor nodes, that can send data packages from their measuring devices (here: MEMS) over other nodes (Multi-Hop) to a collection point (gateway). The gateway provides the interface to central processing and data retrieval units (PC, Laptop or server) outside the network. In order to detect and monitor the different landslide processes (like fall, topple, spreading or sliding) 3D MEMS capacitive sensors made from single silicon crystals and glass were chosen to measure acceleration, tilting and altitude changes. Based on the so called MEMS (Micro-Electro-Mechanical Systems) technology, the sensors combine very small mechanical and electronic units, sensing elements and transducers on a small microchip. The mass production of such type of sensors allows low cost applications in different areas (like automobile industries, medicine, and automation technology). Apart from the small and so space saving size and the low costs another advantage is the energy

  5. Clobazam is equally safe and efficacious for seizures associated with Lennox-Gastaut syndrome across different age groups: Post hoc analyses of short- and long-term clinical trial results.

    PubMed

    Ng, Yu-Tze; Conry, Joan; Mitchell, Wendy G; Buchhalter, Jeffrey; Isojarvi, Jouko; Lee, Deborah; Drummond, Rebecca; Chung, Steve

    2015-05-01

    The peak age at onset of Lennox-Gastaut syndrome (LGS) is between 3 and 5years. Patients with LGS frequently experience multiple types of treatment-refractory seizures and require lifelong therapy with several antiepileptic drugs. Here, post hoc analyses of clinical trials (phase III trial OV-1012 and open-label extension trial OV-1004) provide short- and long-term efficacy and safety data of adjunctive clobazam in patients with LGS stratified by age at baseline (≥2 to <12years, ≥12 to <17years, and ≥17years). In OV-1012, 301 patients were screened, 238 were randomized, 217 comprised the modified intention-to-treat population, and 177 completed the study. A total of 267/306 patients (61 of 68 from phase II trial OV-1002 and 206 of 238 from phase III trial OV-1012) entered the open-label extension trial. Demographics and clinical characteristics were similar between different age groups in OV-1012 and OV-1004. No differences in efficacy or adverse events were observed across age groups in OV-1012 and OV-1004. The results of these post hoc analyses show that adjunctive clobazam over the short and longterm was similarly effective and well-tolerated in both pediatric and adult patients with LGS.

  6. Analysis

    NASA Astrophysics Data System (ADS)

    Abdelazeem, Maha; El-Sawy, El-Sawy K.; Gobashy, Mohamed M.

    2013-06-01

    Ar Rika fault zone constitutes one of the two major parts of the NW-SE Najd fault system (NFS), which is one of the most prominent structural features located in the east of the center of the Arabian Shield, Saudi Arabia. By using Enhancement Thematic Mapper data (ETM+) and Principle Component Analysis (PCA), surface geological characteristics, distribution of rock types, and the different trends of linear features and faults are determined in the study area. First and second order magnetic gradients of the geomagnetic field at the North East of Wadi Ar Rika have been calculated in the frequency domain to map both surface and subsurface lineaments and faults. Lineaments as deduced from previous studies, suggest an extension of the NFS beneath the cover rocks in the study area. In the present study, integration of magnetic gradients and remote sensing analysis that resulted in different valuable derivative maps confirm the subsurface extension of some of the surface features. The 3D Euler deconvolution, the total gradient, and the tilt angle maps have been utilized to determine accurately the distribution of shear zones, the tectonic implications, and the internal structures of the terranes in the Ar Rika quadrangle in three dimensions.

  7. Extending and automating a Systems-Theoretic hazard analysis for requirements generation and analysis.

    SciTech Connect

    Thomas, John

    2012-05-01

    Systems Theoretic Process Analysis (STPA) is a powerful new hazard analysis method designed to go beyond traditional safety techniques - such as Fault Tree Analysis (FTA) - that overlook important causes of accidents like flawed requirements, dysfunctional component interactions, and software errors. While proving to be very effective on real systems, no formal structure has been defined for STPA and its application has been ad-hoc with no rigorous procedures or model-based design tools. This report defines a formal mathematical structure underlying STPA and describes a procedure for systematically performing an STPA analysis based on that structure. A method for using the results of the hazard analysis to generate formal safety-critical, model-based system and software requirements is also presented. Techniques to automate both the analysis and the requirements generation are introduced, as well as a method to detect conflicts between the safety and other functional model-based requirements during early development of the system.

  8. Monitoring of slope-instabilities and deformations with Micro-Electro-Mechanical-Systems (MEMS) in wireless ad-hoc Sensor Networks

    NASA Astrophysics Data System (ADS)

    Arnhardt, C.; Fernández-Steeger, T. M.; Azzam, R.

    2009-04-01

    In most mountainous regions, landslides represent a major threat to human life, properties and infrastructures. Nowadays existing landslide monitoring systems are often characterized by high efforts in terms of purchase, installation, maintenance, manpower and material. In addition (or because of this) only small areas or selective points of the endangered zone can be observed by the system. Therefore the improvement of existing and the development of new monitoring and warning systems are of high relevance. The joint project "Sensor based Landslide Early Warning Systems" (SLEWS) deals with the development of a prototypic Alarm- and Early Warning system (EWS) for different types of landslides using low-cost micro-sensors (MEMS) integrated in a wireless sensor network (WSN). Modern so called Ad-Hoc, Multi-Hop wireless sensor networks (WSN) are characterized by a self organizing and self-healing capacity of the system (autonomous systems). The network consists of numerous individual and own energy-supply operating sensor nodes, that can send data packages from their measuring devices (here: MEMS) over other nodes (Multi-Hop) to a collection point (gateway). The gateway provides the interface to central processing and data retrieval units (PC, Laptop or server) outside the network. In order to detect and monitor the different landslide processes (like fall, topple, spreading or sliding) 3D MEMS capacitive sensors made from single silicon crystals and glass were chosen to measure acceleration, tilting and altitude changes. Based on the so called MEMS (Micro-Electro-Mechanical Systems) technology, the sensors combine very small mechanical and electronic units, sensing elements and transducers on a small microchip. The mass production of such type of sensors allows low cost applications in different areas (like automobile industries, medicine, and automation technology). Apart from the small and so space saving size and the low costs another advantage is the energy

  9. An Evidence-Based Unified Definition of Lifelong and Acquired Premature Ejaculation: Report of the Second International Society for Sexual Medicine Ad Hoc Committee for the Definition of Premature Ejaculation

    PubMed Central

    Serefoglu, Ege Can; McMahon, Chris G; Waldinger, Marcel D; Althof, Stanley E; Shindel, Alan; Adaikan, Ganesh; Becher, Edgardo F; Dean, John; Giuliano, Francois; Hellstrom, Wayne JG; Giraldi, Annamaria; Glina, Sidney; Incrocci, Luca; Jannini, Emmanuele; McCabe, Marita; Parish, Sharon; Rowland, David; Segraves, R Taylor; Sharlip, Ira; Torres, Luiz Otavio

    2014-01-01

    Introduction The International Society for Sexual Medicine (ISSM) Ad Hoc Committee for the Definition of Premature Ejaculation developed the first evidence-based definition for lifelong premature ejaculation (PE) in 2007 and concluded that there were insufficient published objective data at that time to develop a definition for acquired PE. Aim The aim of this article is to review and critique the current literature and develop a contemporary, evidence-based definition for acquired PE and/or a unified definition for both lifelong and acquired PE. Methods In April 2013, the ISSM convened a second Ad Hoc Committee for the Definition of Premature Ejaculation in Bangalore, India. The same evidence-based systematic approach to literature search, retrieval, and evaluation used by the original committee was adopted. Results The committee unanimously agreed that men with lifelong and acquired PE appear to share the dimensions of short ejaculatory latency, reduced or absent perceived ejaculatory control, and the presence of negative personal consequences. Men with acquired PE are older, have higher incidences of erectile dysfunction, comorbid disease, and cardiovascular risk factors, and have a longer intravaginal ejaculation latency time (IELT) as compared with men with lifelong PE. A self-estimated or stopwatch IELT of 3 minutes was identified as a valid IELT cut-off for diagnosing acquired PE. On this basis, the committee agreed on a unified definition of both acquired and lifelong PE as a male sexual dysfunction characterized by (i) ejaculation that always or nearly always occurs prior to or within about 1 minute of vaginal penetration from the first sexual experience (lifelong PE) or a clinically significant and bothersome reduction in latency time, often to about 3 minutes or less (acquired PE); (ii) the inability to delay ejaculation on all or nearly all vaginal penetrations; and (iii) negative personal consequences, such as distress, bother, frustration, and/or the

  10. Ockham's razor and Bayesian analysis. [statistical theory for systems evaluation

    NASA Technical Reports Server (NTRS)

    Jefferys, William H.; Berger, James O.

    1992-01-01

    'Ockham's razor', the ad hoc principle enjoining the greatest possible simplicity in theoretical explanations, is presently shown to be justifiable as a consequence of Bayesian inference; Bayesian analysis can, moreover, clarify the nature of the 'simplest' hypothesis consistent with the given data. By choosing the prior probabilities of hypotheses, it becomes possible to quantify the scientific judgment that simpler hypotheses are more likely to be correct. Bayesian analysis also shows that a hypothesis with fewer adjustable parameters intrinsically possesses an enhanced posterior probability, due to the clarity of its predictions.

  11. [Indoor air guide values for naphthalene and naphthalene-like compounds. Announcement of the German Ad-hoc Working Group on Indoor Guidelines of the Indoor Air Hygiene Committee and of the States' Supreme Health Authorities].

    PubMed

    2013-10-01

    The German Ad-hoc Working Group on Indoor Guidelines of the Indoor Air Hygiene Committee and of the States' Supreme Health Authorities is issuing indoor air guide values to protect public health. Naphthalene is a potentially volatile two-ring hydrocarbon with a mothball-like odor. Indoor air contaminations usually originate from tar-containing building products, sometimes from the use of mothballs. In Germany, indoor air concentrations of naphthalene are usually low, near the detection limit (medians of about 0.001 mg/m3, 95th percentiles up to 0.004 mg/m3). Naphthalene-like volatile compounds have been defined to cover methyl- and dimethylnaphthalenes and tricyclic aromatic hydrocarbons (e.g., acenaphthene, acenaphthylene, anthracene, fluorene and phenanthrene). Though methylnaphthalenes and dimethylnaphthalenes usually show low indoor air concentrations, they have been suspected to add to the mothball-like odor. Tricyclic aromatic hydrocarbons mostly occur below 0.001 mg/m3 of indoor air. Against this background naphthalene is seen to be the key component of this group of substances in indoor air. No valid human data is available with respect to health effects of inhaled naphthalene. Based on animal data cytotoxic-inflammatory lesions in the rat nasal epithelium are regarded as the critical endpoint. In a subchronic inhalation study in rats (Dodd et al., Inhal Toxicol 24:70–79, 2012), minimal effects were observed following an exposure to 5 mg naphthalene/m3. From this study the Ad-hoc Working Group derived a chronic NAEC of 2.5 mg naphthalene/m3. Time scaling was considered by a factor of 5.6 extrapolating from 6 to 24 h and 5 to 7 days, a factor of 2 applied for the use of F344 rats instead of the more sensitive Sprague-Dawley rats. Incorporating an interspecies factor of 1, an intraspecies factor of 10 and a factor of 2 for insufficient data on the toxicity of naphthalene in children resulted in a precautionary value of 0.01 mg naphthalene/m3 and a hazard

  12. Hearings before the Ad Hoc Committee on Maritime Education and Training of the Committee on Merchant Marine and Fisheries, Ninety-Third Congress; Second Session on Officer Requirements, and Session on Maritime Education Regarding Safety at Sea. Serial No. 93-44.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. House Committee on Merchant Marine and Fisheries.

    The publication consists of Congressional hearings before the Ad Hoc Committee on Maritime Education and Training: (1) June 26, 1974 hearing pertaining to officer requirements and (2) November 19, 1974 hearing on maritime education regarding safety at sea. Estimated cost per graduate for the U. S. Merchant Marine 1973 class was $31,100. Supply and…

  13. Sea Training at Maritime Academies Oversight. Hearings Before the Ad Hoc Select Subcommittee on Maritime Education and Training of the Committee on Merchant Marine and Fisheries, House of Representatives, Ninety-Sixth Congress, Second Session on Sea Training of United States Merchant Marine Officers and Different Ways of Satisfying This Requirement at the Various Maritime Academies.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. House Committee on Merchant Marine and Fisheries.

    Recorded are minutes of hearings before the House Ad Hoc Select Subcommittee on Maritime Education and Training regarding the sea training of United States Merchant Marine officers. Examined are various approaches to meeting the sea training requirement, especially the options of maritime academy training vessels, sailing on U.S.-flag merchant…

  14. Diffraction Analysis of Solar Coronagraphs

    NASA Astrophysics Data System (ADS)

    Rabin, Douglas M.; gong, qian

    2016-05-01

    The design of a solar coronagraph is predicated on controlling diffracted and scattered light using principles dating back to Bernard Lyot in the 1930’s. The existence of many successful ground- and space-based coronagraphs testifies to our ability to apply these principles in specific cases, but it is difficult to explore a significant range of design parameters because the calculations are tricky and time-consuming. Indeed, scattered light is so design-specific that ad hoc analysis is unavoidable once guidelines from experience are used to create a first-guess system of baffles and low-scatter surfaces. Here we describe a combination of analytic and computational approaches that has the potential to explore coronagraph design space somewhat more systematically with respect to diffracted light.

  15. Adsorption of Organic Compounds to Diesel Soot: Frontal Analysis and Polyparameter Linear Free-Energy Relationship.

    PubMed

    Lu, Zhijiang; MacFarlane, John K; Gschwend, Philip M

    2016-01-01

    Black carbons (BCs) dominate the sorption of many hydrophobic organic compounds (HOCs) in soils and sediments, thereby reducing the HOCs' mobilities and bioavailabilities. However, we do not have data for diverse HOCs' sorption to BC because it is time-consuming and labor-intensive to obtain isotherms on soot and other BCs. In this study, we developed a frontal analysis chromatographic method to investigate the adsorption of 21 organic compounds with diverse functional groups to NIST diesel soot. This method was precise and time-efficient, typically taking only a few hours to obtain an isotherm. Based on 102 soot-carbon normalized sorption coefficients (KsootC) acquired at different sorbate concentrations, a sorbate-activity-dependent polyparameter linear free-energy relationship was established: logKsootC = (3.74 ± 0.11)V + ((-0.35 ± 0.02)log ai)E + (-0.62 ± 0.10)A + (-3.35 ± 0.11)B + (-1.45 ± 0.09); (N = 102, R(2) = 0.96, SE = 0.18), where V, E, A, and B are the sorbate's McGowan's characteristic volume, excess molar refraction, and hydrogen acidity and basicity, respectively; and ai is the sorbate's aqueous activity reflecting the system's approach to saturation. The difference in dispersive interactions with the soot versus with the water was the dominant factor encouraging adsorption, and H-bonding interactions discouraged this process. Using this relationship, soot-water and sediment-water or soil-water adsorption coefficients of HOCs of interest (PAHs and PCBs) were estimated and compared with the results reported in the literature. PMID:26587648

  16. Flourishing in people with depressive symptomatology increases with Acceptance and Commitment Therapy. Post-hoc analyses of a randomized controlled trial.

    PubMed

    Bohlmeijer, Ernst T; Lamers, Sanne M A; Fledderus, Martine

    2015-02-01

    Mental health is more than the absence of mental illness. Rather, both well-being (positive mental health) and mental illness are actually two related continua, with higher levels of well-being defined as "flourishing." This two-continua model and existing studies about the impact of flourishing on psychopathology underscore the need for interventions that enhance flourishing and well-being. Acceptance and Commitment Therapy (ACT) is a model of cognitive behavioral therapy that aims not only to reduce psychopathology but also to promote flourishing as well. This is the first study to evaluate the impact of ACT on flourishing. A post-analysis was conducted on an earlier randomized controlled trial of a sample of adults with depressive symptomatology who participated in a guided self-help ACT intervention. This post-analysis showed a 5%-28% increase of flourishing by the participants. In addition, the effects on flourishing were maintained at the three-month follow-up. When compared to participants in a control group, the flourishing of the ACT-trained participants increased from 5% to about 14% after nine weeks. In addition to levels of positive mental health at baseline, an increase of psychological flexibility during the intervention was a significant predictor of flourishing at the three-month follow-up. PMID:25596344

  17. Criteria for the diagnosis of heat-related deaths: National Association of Medical Examiners. Position paper. National Association of Medical Examiners Ad Hoc Committee on the Definition of Heat-Related Fatalities.

    PubMed

    Donoghue, E R; Graham, M A; Jentzen, J M; Lifschultz, B D; Luke, J L; Mirchandani, H G

    1997-03-01

    The National Association of Medical Examiners Ad Hoc Committee on the Definition of Heat-Related Fatalities recommends the following definition of "heat-related death": a death in which exposure to high ambient temperature either caused the death or significantly contributed to it. The committee also recommends that the diagnosis of heat-related death be based on a history of exposure to high ambient temperature and the reasonable exclusion of other causes of hyperthermia. The diagnosis may be established from the circumstances surrounding the death, investigative reports concerning environmental temperature, and/or measured antemortem body temperature at the time of collapse. In cases where the measured antemortem body temperature at the time of collapse was > or = 105 degrees F (> or = 40.6 degrees C), the cause of death should be certified as heat stroke or hyperthermia. Deaths may also be certified as heat stroke or hyperthermia with lower body temperatures when cooling has been attempted prior to arrival at the hospital and/or when there is a clinical history of mental status changes and elevated liver and muscle enzymes. In cases where the antemortem body temperature cannot be established but the environmental temperature at the time of collapse was high, an appropriate heat-related diagnosis should be listed as the cause of death or as a significant contributing condition.

  18. Survival analysis in drug program evaluation. Part II. Partitioning treatment effects.

    PubMed

    Anglin, M D; Fisher, D G

    1987-04-01

    Survivorship analysis is applied to both a summative process (during treatment) and a summative outcome (after discharge) evaluation comparing data obtained from 297 admissions to multiple-site methadone maintenance programs in three California counties. Measures included rates of retention, incarceration, addiction, crime, dealing, and loss of employment. In order to take full advantage of the multiple outcome measures that were used, a method for within-subject simultaneous consideration of all outcome measures is presented. This method is an adaptation of the Friedman nonparametric analysis of variance and a Bonferroni post hoc comparison of the mean ranks.

  19. Effect of catechol-O-methyltransferase-val158met-polymorphism on the automatization of motor skills - a post hoc view on an experimental data.

    PubMed

    Krause, Daniel; Beck, Frieder; Agethen, Manfred; Blischke, Klaus

    2014-06-01

    The purpose of this study was to evaluate if the catechol-O-methyltransferase-val158met (COMT)-polymorphism, which is known to affect prefrontal dopaminergic metabolism, affects the automatization of motor skills. Twenty-two participants volunteered for gene analysis after they had participated in experiments in which they practiced a single-joint arm movement sequence 460-760 times under different feedback conditions. Motor automaticity was assessed in a pre-test and a post-test according to the dual-task paradigm, which incorporated a visuo-spatial secondary task. To account for the different practice conditions in the four original studies, dual-task cost reduction was assessed using single case effect sizes proportioned to the respective group mean. For the secondary task but not for the prioritized motor task, these relative single case effect sizes proved to be positively (and significantly) correlated with the number of met-alleles on the COMT-genotype, rs=.553; p=.004. Thus, the number of met-alleles indicated a tendency toward enhanced motor automatization. Thus, due to an increased prefrontal dopamine level, met-carriers may be able to develop a well formed and stable, spatially coded movement representation early in practice, thereby supporting the formation of a representation in motor coordinates in the course of extended practice, which later enables automatic movement execution. This process might also be enhanced by a prevalence of met-carriers to functionally evaluate positive feedback information (i.e., rewards) and to better maintain recent reward information in active working memory. PMID:24607512

  20. An analysis of science versus pseudoscience

    NASA Astrophysics Data System (ADS)

    Hooten, James T.

    2011-12-01

    This quantitative study identified distinctive features in archival datasets commissioned by the National Science Foundation (NSF) for Science and Engineering Indicators reports. The dependent variables included education level, and scores for science fact knowledge, science process knowledge, and pseudoscience beliefs. The dependent variables were aggregated into nine NSF-defined geographic regions and examined for the years 2004 and 2006. The variables were also examined over all years available in the dataset. Descriptive statistics were determined and tests for normality and homogeneity of variances were performed using Statistical Package for the Social Sciences. Analysis of Variance was used to test for statistically significant differences between the nine geographic regions for each of the four dependent variables. Statistical significance of 0.05 was used. Tukey post-hoc analysis was used to compute practical significance of differences between regions. Post-hoc power analysis using G*Power was used to calculate the probability of Type II errors. Tests for correlations across all years of the dependent variables were also performed. Pearson's r was used to indicate the strength of the relationship between the dependent variables. Small to medium differences in science literacy and education level were observed between many of the nine U.S. geographic regions. The most significant differences occurred when the West South Central region was compared to the New England and the Pacific regions. Belief in pseudoscience appeared to be distributed evenly across all U.S. geographic regions. Education level was a strong indicator of science literacy regardless of a respondent's region of residence. Recommendations for further study include more in-depth investigation to uncover the nature of the relationship between education level and belief in pseudoscience.

  1. The efficacy of extended-release levomilnacipran in moderate to severe major depressive disorder: secondary and post-hoc analyses from a randomized, double-blind, placebo-controlled study.

    PubMed

    Montgomery, Stuart A; Mansuy, Lucilla; Ruth, Adam C; Li, Dayong; Gommoll, Carl

    2014-01-01

    Levomilnacipran (1S, 2R-milnacipran) is a potent and selective serotonin and norepinephrine reuptake inhibitor that is Food and Drug Administration approved for once-daily treatment of major depressive disorder in adults. Secondary and post-hoc analyses were carried out on data from a positive 10-week, randomized, double-blind, placebo-controlled, parallel-group, multicenter, proof-of-concept trial (EudraCT Number: 2006-002404-34) on 75 or 100 mg/day levomilnacipran extended release (ER). Included outpatients (18-70 years) met the criteria for a major depressive episode. There was a statistically significant difference in favor of levomilnacipran ER versus placebo in change from baseline to week 10 on every Montgomery Åsberg Depression Rating Scale (MADRS) single item (mixed-effects model for repeated measures; P<0.05) and most Hamilton Depression Rating Scale (HAMD17) single items. Significantly more levomilnacipran ER versus placebo patients (P < 0.05) achieved 'complete' (MADRS ≤ 5; 24 vs. 10%) and 'sustained' (MADRS ≤ 10 in Weeks 4-10; 16 vs. 10%) remission, Sheehan Disability Scale (SDS) response (total score ≤ 12 and each item score ≤ 4; 52 vs. 35%) and remission (total score ≤ 6 and each item score ≤ 2; 26 vs. 17%), and combined symptomatic (MADRS) and functional (SDS) remission (19 vs. 8%). Treatment effects of similar magnitude were observed in the severe depression subgroup (MADRS ≥ 30). These results demonstrate the benefit of levomilnacipran ER over placebo for patients with symptomatic and functional impairment associated with major depressive disorder. PMID:24172160

  2. [Methods for mortality analysis in SENTIERI Project].

    PubMed

    De Santis, M; Pasetto, R; Minelli, G; Conti, S

    2011-01-01

    The methods of mortality analysis in Italian polluted sites (IPS) are described. The study concerned 44 IPSs; each one included one or more municipalities. Mortality at municipality level was studied in the period 1995-2002, using the following indicators: crude rate, standardized rate, standardized mortality ratio (SMR), and SMR adjusted for an ad hoc deprivation index. Regional populations were used as reference for indirect standardization. The deprivation index was constructed using the 2001 national census variables representing the following socioeconomic domains: education, unemployment, dwelling ownership, overcrowding. Mortality indicators were computed for 63 single or grouped causes. The results for all the 63 analysed causes of death are available for each IPS, and in this Chapter the results for each IPS for causes selected on the basis of a priori evidence of risk from local sources of environmental pollution are presented. The procedures and results of the evidence evaluation have been published in the 2010 Supplement of Epidemiology & Prevention devoted to SENTIERI.

  3. Effect of glatiramer acetate three-times weekly on the evolution of new, active multiple sclerosis lesions into T1-hypointense "black holes": a post hoc magnetic resonance imaging analysis.

    PubMed

    Zivadinov, Robert; Dwyer, Michael; Barkay, Hadas; Steinerman, Joshua R; Knappertz, Volker; Khan, Omar

    2015-03-01

    Conversion of active lesions to black holes has been associated with disability progression in subjects with relapsing-remitting multiple sclerosis (RRMS) and represents a complementary approach to evaluating clinical efficacy. The objective of this study was to assess the conversion of new active magnetic resonance imaging (MRI) lesions, identified 6 months after initiating treatment with glatiramer acetate 40 mg/mL three-times weekly (GA40) or placebo, to T1-hypointense black holes in subjects with RRMS. Subjects received GA40 (n = 943) or placebo (n = 461) for 12 months. MRI was obtained at baseline and Months 6 and 12. New lesions were defined as either gadolinium-enhancing T1 or new T2 lesions at Month 6 that were not present at baseline. The adjusted mean numbers of new active lesions at Month 6 converting to black holes at Month 12 were analyzed using a negative binomial model; adjusted proportions of new active lesions at Month 6 converting to black holes at Month 12 were analyzed using a logistic regression model. Of 1,292 subjects with complete MRI data, 433 (50.3 %) GA-treated and 247 (57.2 %) placebo-treated subjects developed new lesions at Month 6. Compared with placebo, GA40 significantly reduced the mean number (0.31 versus 0.45; P = .0258) and proportion (15.8 versus 19.6 %; P = .006) of new lesions converting to black holes. GA significantly reduced conversion of new active lesions to black holes, highlighting the ability of GA40 to prevent tissue damage in RRMS. PMID:25542295

  4. Effect of glatiramer acetate three-times weekly on the evolution of new, active multiple sclerosis lesions into T1-hypointense "black holes": a post hoc magnetic resonance imaging analysis.

    PubMed

    Zivadinov, Robert; Dwyer, Michael; Barkay, Hadas; Steinerman, Joshua R; Knappertz, Volker; Khan, Omar

    2015-03-01

    Conversion of active lesions to black holes has been associated with disability progression in subjects with relapsing-remitting multiple sclerosis (RRMS) and represents a complementary approach to evaluating clinical efficacy. The objective of this study was to assess the conversion of new active magnetic resonance imaging (MRI) lesions, identified 6 months after initiating treatment with glatiramer acetate 40 mg/mL three-times weekly (GA40) or placebo, to T1-hypointense black holes in subjects with RRMS. Subjects received GA40 (n = 943) or placebo (n = 461) for 12 months. MRI was obtained at baseline and Months 6 and 12. New lesions were defined as either gadolinium-enhancing T1 or new T2 lesions at Month 6 that were not present at baseline. The adjusted mean numbers of new active lesions at Month 6 converting to black holes at Month 12 were analyzed using a negative binomial model; adjusted proportions of new active lesions at Month 6 converting to black holes at Month 12 were analyzed using a logistic regression model. Of 1,292 subjects with complete MRI data, 433 (50.3 %) GA-treated and 247 (57.2 %) placebo-treated subjects developed new lesions at Month 6. Compared with placebo, GA40 significantly reduced the mean number (0.31 versus 0.45; P = .0258) and proportion (15.8 versus 19.6 %; P = .006) of new lesions converting to black holes. GA significantly reduced conversion of new active lesions to black holes, highlighting the ability of GA40 to prevent tissue damage in RRMS.

  5. Triglyceride High-Density Lipoprotein Ratios Predict Glycemia-Lowering in Response to Insulin Sensitizing Drugs in Type 2 Diabetes: A Post Hoc Analysis of the BARI 2D

    PubMed Central

    Zonszein, Joel; Lombardero, Manuel; Ismail-Beigi, Faramarz; Palumbo, Pasquale; Foucher, Suzy; Groenewoud, Yolanda; Cushing, Gary; Wajchenberg, Bernardo; Genuth, Saul; BARI 2D Study Group

    2015-01-01

    Glycemic management is central in prevention of small vessel and cardiovascular complications in type 2 diabetes. With the plethora of newer medications and recommendations for a patient centered approach, more information is necessary to match the proper drug to each patient. We showed that BARI 2D, a five-year trial designed to compare two different glycemic treatment strategies, was suitable for assessing different responses according to different phenotypic characteristics. Treatment with insulin sensitizing medications such as thiazolidinediones and metformin was more effective in improving glycemic control, particularly in the more insulin resistant patient, when compared to the insulin provision strategy using insulin and or sulfonylureas. Triglyceride and high density lipoprotein ratio (TG/HDL-cholesterol ratio) was found to be a readily available and practical biomarker that helps to identify the insulin resistant patient. These results support the concept that not all medications for glycemic control work the same in all patients. Thus, tailored therapy can be done using phenotypic characteristics rather than a “one-size-fits-all approach.” PMID:26106623

  6. Physical activity does not influence the effect of antioxidant supplementation at nutritional doses on the incidence of impaired fasting glucose: a 7.5 year post-hoc analysis from the SU.VI.MAX study.

    PubMed

    Fezeu, L; Henegar, A; Kesse-Guyot, E; Julia, C; Galan, P; Hercberg, S; Ristow, M; Czernichow, S

    2010-10-01

    Supplementation with high doses of antioxidant vitamins prevents the insulin-sensitizing effects of physical exercise. However, little is known whether antioxidant supplementation affects the incidence of impaired fasting glucose (IFG). Data from 8938 subjects included in a randomized controlled trial on supplementation with antioxidants vitamins and trace elements at nutritional doses (SU.VI.MAX) were used to examine the effects of antioxidants on incident IFG after 7.5 years of follow-up, with and without stratification for daily physical exercise. The odds-ratio (95% CI) for developing an IFG among study participants receiving antioxidant supplementation was 1.34 (0.90-1.97) (p=0.33), in comparison to placebo. This risk did not vary significantly according to physical activity level (p for homogeneity=0.10). Supplementation with trace elements and antioxidants at nutritional doses apparently does not affect the incidence of IFG irrespective of self-reported physical exercise habits.

  7. Lower vegetable protein intake and higher dietary acid load associated with lower carbohydrate intake are risk factors for metabolic syndrome in patients with type 2 diabetes: Post-hoc analysis of a cross-sectional study

    PubMed Central

    Iwase, Hiroya; Tanaka, Muhei; Kobayashi, Yukiko; Wada, Sayori; Kuwahata, Masashi; Kido, Yasuhiro; Hamaguchi, Masahide; Asano, Mai; Yamazaki, Masahiro; Hasegawa, Goji; Nakamura, Naoto; Fukui, Michiaki

    2015-01-01

    Aims/Introduction A low-carbohydrate diet based on animal sources is associated with higher all-cause mortality, whereas a vegetable-based low-carbohydrate diet is associated with lower cardiovascular disease mortality. It has been suggested that acid/base imbalance might play an important role in some cardiometabolic abnormalities. The aims of the present study were to evaluate whether carbohydrate intake is associated with quality of dietary protein and acid load, and whether these are related to metabolic syndrome in patients with type 2 diabetes. Materials and Methods The present cross-sectional study involved 149 patients with type 2 diabetes. Dietary intake was assessed using a validated self-administered diet history questionnaire. Dietary acid load was assessed by potential renal acid load and net endogenous acid production. Results Mean daily total energy intake, carbohydrate intake, animal protein intake and vegetable protein intake were 1821.5 kcal, 248.8 g, 36.1 g and 31.1 g, respectively. Carbohydrate energy/total energy was negatively correlated with animal protein energy/total energy, potential renal acid load or net endogenous acid production score, and was positively correlated with vegetable protein energy/total energy. Logistic regression analyses showed that the subgroup of patients with a lower vegetable protein energy/total energy or higher potential renal acid load or net endogenous acid production score was significantly associated with the prevalence of metabolic syndrome. Conclusions The present study showed that carbohydrate intake was associated with the quality of dietary protein and dietary acid load. Furthermore, decreased vegetable protein intake and increased dietary acid load were associated with the prevalence of metabolic syndrome. PMID:26221526

  8. Ad-Hoc Implicature in Preschool Children

    ERIC Educational Resources Information Center

    Stiller, Alex J.; Goodman, Noah D.; Frank, Michael C.

    2015-01-01

    If a speaker tells us that "some guests were late to the party," we typically infer that not all were. Implicatures, in which an ambiguous statement ("some and possibly all") is strengthened pragmatically (to "some and not all"), are a paradigm case of pragmatic reasoning. Inferences of this sort are difficult for…

  9. Spaceborne Mobile Ad-Hoc Networks

    NASA Astrophysics Data System (ADS)

    Forcada, Ignasi; Strauss, Adi

    2010-08-01

    Reliable global networking is essential for a rapidly growing mobile and interactive communication. Satellite communication plays already a significant role in this subject. However, the classical space-based data transmission requires an appropriate infrastructure, both on the ground and in orbit. This paper discusses the potential of a self-organising distributed satellite system in Low Earth Orbits (LEO) to achieve a seamless integration in already existing infrastructures. The communication approach is based on dynamic Inter Satellite Links (ISL) not controlled nor coordinated on an individual basis from the ground-based stations.

  10. Clobazam is efficacious for patients across the spectrum of disease severity of Lennox-Gastaut syndrome: post hoc analyses of clinical trial results by baseline seizure-frequency quartiles and VNS experience.

    PubMed

    Wheless, James W; Isojarvi, Jouko; Lee, Deborah; Drummond, Rebecca; Benbadis, Selim R

    2014-12-01

    Lennox-Gastaut syndrome (LGS) severity varies considerably, so the potential impact of differences in baseline severity on patient outcome following treatment is clinically informative. Here, two surrogate indicators of LGS severity (baseline seizure frequency and vagus nerve stimulation [VNS] use) were used in post hoc analyses of both short- and long-term clobazam trials (Phase III OV-1012 [CONTAIN] and open-label extension [OLE] OV-1004). In CONTAIN, 217 patients comprised the modified, intention-to-treat population. Each baseline seizure-frequency quartile had ~40 patients, and baseline weekly drop-seizure frequency ranges were as follows: <10 (Quartile 1), 10-30 (Quartile 2), 32-86 (Quartile 3), and 86-1077 (Quartile 4). Mean percentage decreases in average weekly drop and total seizures were similar for all quartiles. More than 50% of patients in all 4 quartiles demonstrated ≥ 50% decreases in weekly drop- and total-seizure frequency. The percentage of patients achieving 100% reduction in drop seizures was 33% for clobazam-treated patients (vs. 7% for placebo) in Quartile 1. Five percent of clobazam-treated patients in Quartile 4 (most severe LGS) vs. 0% for placebo achieved 100% reduction in drop seizures. A total of 267 of 306 possible patients entered the OLE (61/68 from a Phase II study and 206/238 from Phase III CONTAIN). Each quartile had ~66 patients, and baseline weekly drop-seizure ranges were as follows: <10 (Quartile 1), 10-31 (Quartile 2), 32-110 (Quartile 3), and 111-1147 (Quartile 4). Median percentage decreases in average weekly drop and total seizures were similar between quartiles. Through 5 years of therapy, >50% of patients in all 4 quartiles demonstrated ≥ 50% decreases in weekly frequency for drop seizures. More than 12% of patients in Quartile 4 achieved 100% reduction in drop seizures from Month 3 through Year 5. For the VNS analyses in CONTAIN, the least-squares mean decreases in average weekly rate of drop seizures (m

  11. Analysis of the Space Propulsion System Problem Using RAVEN

    SciTech Connect

    diego mandelli; curtis smith; cristian rabiti; andrea alfonsi

    2014-06-01

    This paper presents the solution of the space propulsion problem using a PRA code currently under development at Idaho National Laboratory (INL). RAVEN (Reactor Analysis and Virtual control ENviroment) is a multi-purpose Probabilistic Risk Assessment (PRA) software framework that allows dispatching different functionalities. It is designed to derive and actuate the control logic required to simulate the plant control system and operator actions (guided procedures) and to perform both Monte- Carlo sampling of random distributed events and Event Tree based analysis. In order to facilitate the input/output handling, a Graphical User Interface (GUI) and a post-processing data-mining module are available. RAVEN allows also to interface with several numerical codes such as RELAP5 and RELAP-7 and ad-hoc system simulators. For the space propulsion system problem, an ad-hoc simulator has been developed and written in python language and then interfaced to RAVEN. Such simulator fully models both deterministic (e.g., system dynamics and interactions between system components) and stochastic behaviors (i.e., failures of components/systems such as distribution lines and thrusters). Stochastic analysis is performed using random sampling based methodologies (i.e., Monte-Carlo). Such analysis is accomplished to determine both the reliability of the space propulsion system and to propagate the uncertainties associated to a specific set of parameters. As also indicated in the scope of the benchmark problem, the results generated by the stochastic analysis are used to generate risk-informed insights such as conditions under witch different strategy can be followed.

  12. Maximum Likelihood Analysis of Low Energy CDMS II Germanium Data

    SciTech Connect

    Agnese, R.

    2015-03-30

    We report on the results of a search for a Weakly Interacting Massive Particle (WIMP) signal in low-energy data of the Cryogenic Dark Matter Search experiment using a maximum likelihood analysis. A background model is constructed using GEANT4 to simulate the surface-event background from Pb210decay-chain events, while using independent calibration data to model the gamma background. Fitting this background model to the data results in no statistically significant WIMP component. In addition, we also perform fits using an analytic ad hoc background model proposed by Collar and Fields, who claimed to find a large excess of signal-like events in our data. Finally, we confirm the strong preference for a signal hypothesis in their analysis under these assumptions, but excesses are observed in both single- and multiple-scatter events, which implies the signal is not caused by WIMPs, but rather reflects the inadequacy of their background model.

  13. Maximum likelihood analysis of low energy CDMS II germanium data

    NASA Astrophysics Data System (ADS)

    Agnese, R.; Anderson, A. J.; Balakishiyeva, D.; Basu Thakur, R.; Bauer, D. A.; Billard, J.; Borgland, A.; Bowles, M. A.; Brandt, D.; Brink, P. L.; Bunker, R.; Cabrera, B.; Caldwell, D. O.; Cerdeno, D. G.; Chagani, H.; Chen, Y.; Cooley, J.; Cornell, B.; Crewdson, C. H.; Cushman, P.; Daal, M.; Di Stefano, P. C. F.; Doughty, T.; Esteban, L.; Fallows, S.; Figueroa-Feliciano, E.; Fritts, M.; Godfrey, G. L.; Golwala, S. R.; Graham, M.; Hall, J.; Harris, H. R.; Hertel, S. A.; Hofer, T.; Holmgren, D.; Hsu, L.; Huber, M. E.; Jastram, A.; Kamaev, O.; Kara, B.; Kelsey, M. H.; Kennedy, A.; Kiveni, M.; Koch, K.; Leder, A.; Loer, B.; Lopez Asamar, E.; Mahapatra, R.; Mandic, V.; Martinez, C.; McCarthy, K. A.; Mirabolfathi, N.; Moffatt, R. A.; Moore, D. C.; Nelson, R. H.; Oser, S. M.; Page, K.; Page, W. A.; Partridge, R.; Pepin, M.; Phipps, A.; Prasad, K.; Pyle, M.; Qiu, H.; Rau, W.; Redl, P.; Reisetter, A.; Ricci, Y.; Rogers, H. E.; Saab, T.; Sadoulet, B.; Sander, J.; Schneck, K.; Schnee, R. W.; Scorza, S.; Serfass, B.; Shank, B.; Speller, D.; Upadhyayula, S.; Villano, A. N.; Welliver, B.; Wright, D. H.; Yellin, S.; Yen, J. J.; Young, B. A.; Zhang, J.; SuperCDMS Collaboration

    2015-03-01

    We report on the results of a search for a Weakly Interacting Massive Particle (WIMP) signal in low-energy data of the Cryogenic Dark Matter Search experiment using a maximum likelihood analysis. A background model is constructed using geant4 to simulate the surface-event background from 210Pb decay-chain events, while using independent calibration data to model the gamma background. Fitting this background model to the data results in no statistically significant WIMP component. In addition, we perform fits using an analytic ad hoc background model proposed by Collar and Fields, who claimed to find a large excess of signal-like events in our data. We confirm the strong preference for a signal hypothesis in their analysis under these assumptions, but excesses are observed in both single- and multiple-scatter events, which implies the signal is not caused by WIMPs, but rather reflects the inadequacy of their background model.

  14. The effect of pedigree complexity on quantitative trait linkage analysis.

    PubMed

    Dyer, T D; Blangero, J; Williams, J T; Göring, H H; Mahaney, M C

    2001-01-01

    Due to the computational difficulties of performing linkage analysis on large complex pedigrees, most investigators resort to simplifying such pedigrees by some ad hoc strategy. In this paper, we suggest an analytical method to compare the power of various pedigree simplification schemes by using the asymptotic distribution of the likelihood-ratio statistic. We applied the method to the large Hutterine pedigree. Our results indicate that the breaking and reduction of inbreeding loops can greatly diminish the power to localize quantitative trait loci. We also present an efficient Monte Carlo method for estimating identity-by-descent allele sharing in large complex pedigrees. This method is used to facilitate a linkage analysis of serum IgE levels in the Hutterites without simplifying the pedigree.

  15. Assessment of Fluorescent Particles for Surface Flow Analysis

    PubMed Central

    Tauro, Flavia; Mocio, Gabriele; Rapiti, Emiliano; Grimaldi, Salvatore; Porfiri, Maurizio

    2012-01-01

    In this paper, a systematic performance assessment of the measurement system for surface flow analysis developed by our group in (Tauro et al., Sensors, 2010) is presented. The system is based on the detection of buoyant fluorescent microspheres through a low-cost apparatus, which incorporates light sources to elicit fluorescence response and a digital camera to identify the particles' transit. Experiments are conducted using green fluorescent particles and further tests are executed to evaluate the system performance for red and orange particles varying in emission wavelength, degree of biocompatibility, and cost. The influence of the following parameters on surface flow sensing using fluorescent beads is investigated: (i) distance of the light sources from the water surface, (ii) presence of an ad-hoc filter tuned at the particle emission wavelength, (iii) camera resolution and frame rate, (iv) flow regime, and (v) ambient light. Experimental results are used to inform implementation guidelines for surface flow analysis in natural environments. PMID:23202234

  16. Fatigue detection in strength training using three-dimensional accelerometry and principal component analysis.

    PubMed

    Brown, Niklas; Bichler, Sebastian; Fiedler, Meike; Alt, Wilfried

    2016-06-01

    Detection of neuro-muscular fatigue in strength training is difficult, due to missing criterion measures and the complexity of fatigue. Thus, a variety of methods are used to determine fatigue. The aim of this study was to use a principal component analysis (PCA) on a multifactorial data-set based on kinematic measurements to determine fatigue. Twenty participants (strength training experienced, 60% male) executed 3 sets of 3 exercises with 50 (12 repetitions), 75 (12 repetitions) and 100%-12 RM (RM). Data were collected with a 3D accelerometer and analysed by a newly developed algorithm to evaluate parameters for each repetition. A PCA with six variables was carried out on the results. A fatigue factor was computed based on the loadings on the first component. One-way ANOVA with Bonferroni post hoc analysis was calculated to test for differences between the intensity levels. All six input variables had high loadings on the first component. The ANOVA showed a significant difference between intensities (p < 0.001). Post-hoc analysis revealed a difference between 100% and the lower intensities (p < 0.05) and no difference between 50 and 75%-12RM. Based on these results, it is possible to distinguish between fatigued and non-fatigued sets of strength training. PMID:27111008

  17. QTAIM Analysis in the Context of Quasirelativistic Quantum Calculations.

    PubMed

    Pilmé, Julien; Renault, Eric; Bassal, Fadel; Amaouch, Mohamed; Montavon, Gilles; Galland, Nicolas

    2014-11-11

    Computational chemistry currently lacks ad hoc tools for probing the nature of chemical bonds in heavy and superheavy-atom systems where the consideration of spin-orbit coupling (SOC) effects is mandatory. We report an implementation of the Quantum Theory of Atoms-In-Molecules in the framework of two-component relativistic calculations. Used in conjunction with the topological analysis of the Electron Localization Function, we show for astatine (At) species that SOC significantly lowers At electronegativity and boosts its propensity to make charge-shift bonds. Relativistic spin-dependent effects are furthermore able to change some bonds from mainly covalent to charge-shift type. The implication of the disclosed features regarding the rationalization of the labeling protocols used in nuclear medicine for (211)At radioisotope nicely illustrates the potential of the introduced methodology for investigating the chemistry of (super)heavy elements. PMID:26584370

  18. Experiments with Test Case Generation and Runtime Analysis

    NASA Technical Reports Server (NTRS)

    Artho, Cyrille; Drusinsky, Doron; Goldberg, Allen; Havelund, Klaus; Lowry, Mike; Pasareanu, Corina; Rosu, Grigore; Visser, Willem; Koga, Dennis (Technical Monitor)

    2003-01-01

    Software testing is typically an ad hoc process where human testers manually write many test inputs and expected test results, perhaps automating their execution in a regression suite. This process is cumbersome and costly. This paper reports preliminary results on an approach to further automate this process. The approach consists of combining automated test case generation based on systematically exploring the program's input domain, with runtime analysis, where execution traces are monitored and verified against temporal logic specifications, or analyzed using advanced algorithms for detecting concurrency errors such as data races and deadlocks. The approach suggests to generate specifications dynamically per input instance rather than statically once-and-for-all. The paper describes experiments with variants of this approach in the context of two examples, a planetary rover controller and a space craft fault protection system.

  19. Measurement and analysis of calcium signaling in heterogeneous cell cultures.

    PubMed

    Richards, Gillian R; Jack, Andrew D; Platts, Amy; Simpson, Peter B

    2006-01-01

    High-content imaging platforms capable of studying kinetic responses at a single-cell level have elevated kinetic recording techniques from labor-intensive low-throughput experiments to potential high-throughput screening assays. We have applied this technology to the investigation of heterogeneous cell cultures derived from primary neural tissue. The neuronal cultures mature into a coupled network and display spontaneous oscillations in intracellular calcium, which can be modified by the addition of pharmacological agents. We have developed algorithms to perform Fourier analysis and quantify both the degree of synchronization and the effects of modulators on the oscillations. Functional and phenotypic experiments can be combined using this approach. We have used post-hoc immunolabeling to identify subpopulations of cells in cocultures and to dissect the calcium responses of these cells from the population response. The combination of these techniques represents a powerful tool for drug discovery.

  20. VISPA: a computational pipeline for the identification and analysis of genomic vector integration sites.

    PubMed

    Calabria, Andrea; Leo, Simone; Benedicenti, Fabrizio; Cesana, Daniela; Spinozzi, Giulio; Orsini, Massimilano; Merella, Stefania; Stupka, Elia; Zanetti, Gianluigi; Montini, Eugenio

    2014-01-01

    The analysis of the genomic distribution of viral vector genomic integration sites is a key step in hematopoietic stem cell-based gene therapy applications, allowing to assess both the safety and the efficacy of the treatment and to study the basic aspects of hematopoiesis and stem cell biology. Identifying vector integration sites requires ad-hoc bioinformatics tools with stringent requirements in terms of computational efficiency, flexibility, and usability. We developed VISPA (Vector Integration Site Parallel Analysis), a pipeline for automated integration site identification and annotation based on a distributed environment with a simple Galaxy web interface. VISPA was successfully used for the bioinformatics analysis of the follow-up of two lentiviral vector-based hematopoietic stem-cell gene therapy clinical trials. Our pipeline provides a reliable and efficient tool to assess the safety and efficacy of integrating vectors in clinical settings. PMID:25342980

  1. English-Vietnamese Scientific Terminology for High School and Junior College Students. Book 4: Chemistry = Danh Tu Khoa Hoc Anh-Viet Danh Cho Hoc Sinh Trung Hoc Va Sinh Vien Nam Thu Nhat Dai Hoc. Quyen 4: Hoa Hoc.

    ERIC Educational Resources Information Center

    Khanh-Van, Tran Thi

    Vietnamese students now enrolled in American high schools incur an extremely special need in English. After being taught subject matter disciplines in Vietnamese for many years, and while English is still a foreign language for them, these students are bound to go through two linguistic processes. First, while reading or sitting through lectures…

  2. English-Vietnamese Scientific Terminology for High School and Junior College Students. Book 1: Mathematics = Danh Tu Khoa Hoc Anh Viet Danh Cho Hoc Sinh Trung Hoc Va Sinh Vien Dai Hoc So Cap. Quyen 1: Toan Hoc. Revised Edition.

    ERIC Educational Resources Information Center

    Duong, Pham Cao

    Vietnamese students now enrolled in American high schools incur an extremely special need in English. After being taught subject matter disciplines in Vietnamese for many years, and while English is still a foreign language for them, these students are bound to go through two linguistic processes. First, while reading or sitting through lectures…

  3. Application of headspace analysis to the study of sorption of hydrophobic organic chemicals to α-Al2O3

    USGS Publications Warehouse

    Pelinger, Judith A.; Eisenreich, Steven J.; Capel, Paul D.

    1993-01-01

    The sorption of hydrophobic organic chemicals (HOCs) to ??-Al2O3 was investigated with a headspace analysis method. The semiautomated headspace analyzer gave rapid, precise, and accurate results for a homologous series alkylbenzenes even at low percentages of solute mass sorbed (3-50%). Sorption experiments carried out with benzene alone indicated weak interactions with well-characterized aluminum oxide, and a solids concentration effect was observed. When the sorption coefficients for benzene alone obtained by headspace analysis were extrapolated up to the solids concentrations typically used in batch sorption experiments, the measured sorption coefficients agreed with reported sorption coefficients for HOCs and sediments of low fractional organic carbon content. Sorbed concentrations increased exponentially with aqueous concentration in isotherms with mixtures of alkylbenzenes, indicating solute-solute interactions at the mineral surface. Sorption was, however, greater than predicted for partitioning of a solute between its pure liquid phase and water, indicating additional influences of the surface and/or the structured liquid near the mineral surface. ?? 1993 American Chemical Society.

  4. An introduction to analysis of variance (ANOVA) with special reference to data from clinical experiments in optometry.

    PubMed

    Armstrong, R A; Slade, S V; Eperjesi, F

    2000-05-01

    This article is aimed primarily at eye care practitioners who are undertaking advanced clinical research, and who wish to apply analysis of variance (ANOVA) to their data. ANOVA is a data analysis method of great utility and flexibility. This article describes why and how ANOVA was developed, the basic logic which underlies the method and the assumptions that the method makes for it to be validly applied to data from clinical experiments in optometry. The application of the method to the analysis of a simple data set is then described. In addition, the methods available for making planned comparisons between treatment means and for making post hoc tests are evaluated. The problem of determining the number of replicates or patients required in a given experimental situation is also discussed.

  5. Analysis of the Fall-1989 two-meter box test bed experiments performed at the Army Pulse Radiation Facility (APRF)

    NASA Astrophysics Data System (ADS)

    Johnson, J. O.; Drischler, J. D.; Barnes, J. M.

    This report summarizes the results of a benchmark analysis of the Monte Carlo Adjoint Shielding Code System (MASH) against a series of experiments performed at the Army Pulse Radiation Facility (APRF) in Aberdeen Proving Ground, Maryland. The series of experiments was performed in the Fall of 1989 and involved experimentalists from APRF; the Defense Research Establishment Ottawa, Canada (DREO); Bubble Technology Industries, Canada, (BTI); and the Establishment Technique Central de l'Armement, France (ETCA). The 'benchmark' analysis of MASH is designed to determine the capability of MASH to reproduce the measured neutron and gamma ray integral and differential (spectral) data. Results of the 'benchmark' analysis are to be used in the recommendations to the North Atlantic Treaty Organization (NATO) Panel 7 Ad Hoc Group of Shielding Experts for replacing the Vehicle Code System (VCS) with MASH as the reference code of choice for armored vehicle nuclear vulnerability calculations.

  6. Differential DNA Methylation Analysis without a Reference Genome.

    PubMed

    Klughammer, Johanna; Datlinger, Paul; Printz, Dieter; Sheffield, Nathan C; Farlik, Matthias; Hadler, Johanna; Fritsch, Gerhard; Bock, Christoph

    2015-12-22

    Genome-wide DNA methylation mapping uncovers epigenetic changes associated with animal development, environmental adaptation, and species evolution. To address the lack of high-throughput methods for DNA methylation analysis in non-model organisms, we developed an integrated approach for studying DNA methylation differences independent of a reference genome. Experimentally, our method relies on an optimized 96-well protocol for reduced representation bisulfite sequencing (RRBS), which we have validated in nine species (human, mouse, rat, cow, dog, chicken, carp, sea bass, and zebrafish). Bioinformatically, we developed the RefFreeDMA software to deduce ad hoc genomes directly from RRBS reads and to pinpoint differentially methylated regions between samples or groups of individuals (http://RefFreeDMA.computational-epigenetics.org). The identified regions are interpreted using motif enrichment analysis and/or cross-mapping to annotated genomes. We validated our method by reference-free analysis of cell-type-specific DNA methylation in the blood of human, cow, and carp. In summary, we present a cost-effective method for epigenome analysis in ecology and evolution, which enables epigenome-wide association studies in natural populations and species without a reference genome.

  7. Differential DNA Methylation Analysis without a Reference Genome.

    PubMed

    Klughammer, Johanna; Datlinger, Paul; Printz, Dieter; Sheffield, Nathan C; Farlik, Matthias; Hadler, Johanna; Fritsch, Gerhard; Bock, Christoph

    2015-12-22

    Genome-wide DNA methylation mapping uncovers epigenetic changes associated with animal development, environmental adaptation, and species evolution. To address the lack of high-throughput methods for DNA methylation analysis in non-model organisms, we developed an integrated approach for studying DNA methylation differences independent of a reference genome. Experimentally, our method relies on an optimized 96-well protocol for reduced representation bisulfite sequencing (RRBS), which we have validated in nine species (human, mouse, rat, cow, dog, chicken, carp, sea bass, and zebrafish). Bioinformatically, we developed the RefFreeDMA software to deduce ad hoc genomes directly from RRBS reads and to pinpoint differentially methylated regions between samples or groups of individuals (http://RefFreeDMA.computational-epigenetics.org). The identified regions are interpreted using motif enrichment analysis and/or cross-mapping to annotated genomes. We validated our method by reference-free analysis of cell-type-specific DNA methylation in the blood of human, cow, and carp. In summary, we present a cost-effective method for epigenome analysis in ecology and evolution, which enables epigenome-wide association studies in natural populations and species without a reference genome. PMID:26673328

  8. Differential DNA Methylation Analysis without a Reference Genome

    PubMed Central

    Klughammer, Johanna; Datlinger, Paul; Printz, Dieter; Sheffield, Nathan C.; Farlik, Matthias; Hadler, Johanna; Fritsch, Gerhard; Bock, Christoph

    2015-01-01

    Summary Genome-wide DNA methylation mapping uncovers epigenetic changes associated with animal development, environmental adaptation, and species evolution. To address the lack of high-throughput methods for DNA methylation analysis in non-model organisms, we developed an integrated approach for studying DNA methylation differences independent of a reference genome. Experimentally, our method relies on an optimized 96-well protocol for reduced representation bisulfite sequencing (RRBS), which we have validated in nine species (human, mouse, rat, cow, dog, chicken, carp, sea bass, and zebrafish). Bioinformatically, we developed the RefFreeDMA software to deduce ad hoc genomes directly from RRBS reads and to pinpoint differentially methylated regions between samples or groups of individuals (http://RefFreeDMA.computational-epigenetics.org). The identified regions are interpreted using motif enrichment analysis and/or cross-mapping to annotated genomes. We validated our method by reference-free analysis of cell-type-specific DNA methylation in the blood of human, cow, and carp. In summary, we present a cost-effective method for epigenome analysis in ecology and evolution, which enables epigenome-wide association studies in natural populations and species without a reference genome. PMID:26673328

  9. A practical guide to environmental association analysis in landscape genomics.

    PubMed

    Rellstab, Christian; Gugerli, Felix; Eckert, Andrew J; Hancock, Angela M; Holderegger, Rolf

    2015-09-01

    Landscape genomics is an emerging research field that aims to identify the environmental factors that shape adaptive genetic variation and the gene variants that drive local adaptation. Its development has been facilitated by next-generation sequencing, which allows for screening thousands to millions of single nucleotide polymorphisms in many individuals and populations at reasonable costs. In parallel, data sets describing environmental factors have greatly improved and increasingly become publicly accessible. Accordingly, numerous analytical methods for environmental association studies have been developed. Environmental association analysis identifies genetic variants associated with particular environmental factors and has the potential to uncover adaptive patterns that are not discovered by traditional tests for the detection of outlier loci based on population genetic differentiation. We review methods for conducting environmental association analysis including categorical tests, logistic regressions, matrix correlations, general linear models and mixed effects models. We discuss the advantages and disadvantages of different approaches, provide a list of dedicated software packages and their specific properties, and stress the importance of incorporating neutral genetic structure in the analysis. We also touch on additional important aspects such as sampling design, environmental data preparation, pooled and reduced-representation sequencing, candidate-gene approaches, linearity of allele-environment associations and the combination of environmental association analyses with traditional outlier detection tests. We conclude by summarizing expected future directions in the field, such as the extension of statistical approaches, environmental association analysis for ecological gene annotation, and the need for replication and post hoc validation studies.

  10. Concise review: no breakthroughs for human mesenchymal and embryonic stem cell culture: conditioned medium, feeder layer, or feeder-free; medium with fetal calf serum, human serum, or enriched plasma; serum-free, serum replacement nonconditioned medium, or ad hoc formula? All that glitters is not gold!

    PubMed

    Mannello, Ferdinando; Tonti, Gaetana A

    2007-07-01

    The choice of an optimal strategy of stem cell culture is at the moment an impossible task, and the elaboration of a culture medium adapted to the production of embryonic and adult mesenchymal stem cells for the clinical application of cell therapy remains a crucial matter. To make an informed choice, it is crucial to not underestimate the theoretical health risk of using xenogenic compounds, to limit the immunological reactions once stem cells are transplanted, to not overestimate the controversial results obtained with human serum, plasma, and blood derivatives, as well as to carefully examine the pros and cons of serum-free and ad hoc formulation strategies; besides that, to also maintain multipotentiality, self-renewal, and transplantability. The extent to which we are able to achieve effective cell therapies will depend on assimilating a rapidly developing base of scientific knowledge with the practical considerations of design, delivery, and host response. Although clinical studies have already started, many questions remain unsolved, and concomitantly even more evidence on suitable and safe off-the-shelf products (mainly xeno-free) for embryonic and mesenchymal stem cells is cropping up, even though there should be no rush to enter the clinical stage while the underlying basic research is still not so solid; this solely will lead to high-quality translational research, without making blunders stemming from the assumption that all that glitters is not gold. Disclosure of potential conflicts of interest is found at the end of this article.

  11. Analysis of Wireless Sensor Network Topology and Estimation of Optimal Network Deployment by Deterministic Radio Channel Characterization

    PubMed Central

    Aguirre, Erik; Lopez-Iturri, Peio; Azpilicueta, Leire; Astrain, José Javier; Villadangos, Jesús; Falcone, Francisco

    2015-01-01

    One of the main challenges in the implementation and design of context-aware scenarios is the adequate deployment strategy for Wireless Sensor Networks (WSNs), mainly due to the strong dependence of the radiofrequency physical layer with the surrounding media, which can lead to non-optimal network designs. In this work, radioplanning analysis for WSN deployment is proposed by employing a deterministic 3D ray launching technique in order to provide insight into complex wireless channel behavior in context-aware indoor scenarios. The proposed radioplanning procedure is validated with a testbed implemented with a Mobile Ad Hoc Network WSN following a chain configuration, enabling the analysis and assessment of a rich variety of parameters, such as received signal level, signal quality and estimation of power consumption. The adoption of deterministic radio channel techniques allows the design and further deployment of WSNs in heterogeneous wireless scenarios with optimized behavior in terms of coverage, capacity, quality of service and energy consumption. PMID:25664434

  12. Analysis of wireless sensor network topology and estimation of optimal network deployment by deterministic radio channel characterization.

    PubMed

    Aguirre, Erik; Lopez-Iturri, Peio; Azpilicueta, Leire; Astrain, José Javier; Villadangos, Jesús; Falcone, Francisco

    2015-02-05

    One of the main challenges in the implementation and design of context-aware scenarios is the adequate deployment strategy for Wireless Sensor Networks (WSNs), mainly due to the strong dependence of the radiofrequency physical layer with the surrounding media, which can lead to non-optimal network designs. In this work, radioplanning analysis for WSN deployment is proposed by employing a deterministic 3D ray launching technique in order to provide insight into complex wireless channel behavior in context-aware indoor scenarios. The proposed radioplanning procedure is validated with a testbed implemented with a Mobile Ad Hoc Network WSN following a chain configuration, enabling the analysis and assessment of a rich variety of parameters, such as received signal level, signal quality and estimation of power consumption. The adoption of deterministic radio channel techniques allows the design and further deployment of WSNs in heterogeneous wireless scenarios with optimized behavior in terms of coverage, capacity, quality of service and energy consumption.

  13. Entropy based analysis of satellite magnetic data for searching possible e.m. signatures due to big earthquakes

    NASA Astrophysics Data System (ADS)

    Cianchini, G.; de Santis, A.; Balasis, G.; Mandea, M.; Qamili, E.

    2009-04-01

    The importance of detecting possible electromagnetic signatures due to big earthquakes is self-evident, signatures which can be either anticipating, simultaneous or subsequent with respect to the main shock. Taking advantage of the present orbiting Champ satellite, we apply two "ad hoc" techniques both based on the Information Theory (after the seminal monography by Shannon, 1948) to the satellite magnetic data with the aim at extracting eventual time anomalies. These techniques have different time-space resolutions: the first technique requires a preliminary spherical harmonic analysis of daily magnetic data and, potentially, detects long-wavelength variations, while the second uses a preliminary wavelet analysis and can detect shorter-wavelength anomalies. Some examples are given for magnetic satellite data taken in correspondence with the two big earthquakes occurred in the Sumatra region on 24 December 2004 (M=9.1) and 28 March 2005 (M=8.6).

  14. Analysis of complex elastic structures by a Rayleigh-Ritz component modes method using Lagrange multipliers. Ph.D. Thesis

    NASA Technical Reports Server (NTRS)

    Klein, L. R.

    1974-01-01

    The free vibrations of elastic structures of arbitrary complexity were analyzed in terms of their component modes. The method was based upon the use of the normal unconstrained modes of the components in a Rayleigh-Ritz analysis. The continuity conditions were enforced by means of Lagrange Multipliers. Examples of the structures considered are: (1) beams with nonuniform properties; (2) airplane structures with high or low aspect ratio lifting surface components; (3) the oblique wing airplane; and (4) plate structures. The method was also applied to the analysis of modal damping of linear elastic structures. Convergence of the method versus the number of modes per component and/or the number of components is discussed and compared to more conventional approaches, ad-hoc methods, and experimental results.

  15. A New MANET wormhole detection algorithm based on traversal time and hop count analysis.

    PubMed

    Karlsson, Jonny; Dooley, Laurence S; Pulkkis, Göran

    2011-01-01

    As demand increases for ubiquitous network facilities, infrastructure-less and self-configuring systems like Mobile Ad hoc Networks (MANET) are gaining popularity. MANET routing security however, is one of the most significant challenges to wide scale adoption, with wormhole attacks being an especially severe MANET routing threat. This is because wormholes are able to disrupt a major component of network traffic, while concomitantly being extremely difficult to detect. This paper introduces a new wormhole detection paradigm based upon Traversal Time and Hop Count Analysis (TTHCA), which in comparison to existing algorithms, consistently affords superior detection performance, allied with low false positive rates for all wormhole variants. Simulation results confirm that the TTHCA model exhibits robust wormhole route detection in various network scenarios, while incurring only a small network overhead. This feature makes TTHCA an attractive choice for MANET environments which generally comprise devices, such as wireless sensors, which possess a limited processing capability. PMID:22247657

  16. Identifying time measurement tampering in the traversal time and hop count analysis (TTHCA) wormhole detection algorithm.

    PubMed

    Karlsson, Jonny; Dooley, Laurence S; Pulkkis, Göran

    2013-01-01

    Traversal time and hop count analysis (TTHCA) is a recent wormhole detection algorithm for mobile ad hoc networks (MANET) which provides enhanced detection performance against all wormhole attack variants and network types. TTHCA involves each node measuring the processing time of routing packets during the route discovery process and then delivering the measurements to the source node. In a participation mode (PM) wormhole where malicious nodes appear in the routing tables as legitimate nodes, the time measurements can potentially be altered so preventing TTHCA from successfully detecting the wormhole. This paper analyses the prevailing conditions for time tampering attacks to succeed for PM wormholes, before introducing an extension to the TTHCA detection algorithm called ∆T Vector which is designed to identify time tampering, while preserving low false positive rates. Simulation results confirm that the ∆T Vector extension is able to effectively detect time tampering attacks, thereby providing an important security enhancement to the TTHCA algorithm. PMID:23686143

  17. Applying latent semantic analysis to large-scale medical image databases.

    PubMed

    Stathopoulos, Spyridon; Kalamboukis, Theodore

    2015-01-01

    Latent Semantic Analysis (LSA) although has been used successfully in text retrieval when applied to CBIR induces scalability issues with large image collections. The method so far has been used with small collections due to the high cost of storage and computational time for solving the SVD problem for a large and dense feature matrix. Here we present an effective and efficient approach of applying LSA skipping the SVD solution of the feature matrix and overcoming in this way the deficiencies of the method with large scale datasets. Early and late fusion techniques are tested and their performance is calculated. The study demonstrates that early fusion of several composite descriptors with visual words increase retrieval effectiveness. It also combines well in a late fusion for mixed (textual and visual) ad hoc and modality classification. The results reported are comparable to state of the art algorithms without including additional knowledge from the medical domain. PMID:24934416

  18. Identifying Time Measurement Tampering in the Traversal Time and Hop Count Analysis (TTHCA) Wormhole Detection Algorithm

    PubMed Central

    Karlsson, Jonny; Dooley, Laurence S.; Pulkkis, Göran

    2013-01-01

    Traversal time and hop count analysis (TTHCA) is a recent wormhole detection algorithm for mobile ad hoc networks (MANET) which provides enhanced detection performance against all wormhole attack variants and network types. TTHCA involves each node measuring the processing time of routing packets during the route discovery process and then delivering the measurements to the source node. In a participation mode (PM) wormhole where malicious nodes appear in the routing tables as legitimate nodes, the time measurements can potentially be altered so preventing TTHCA from successfully detecting the wormhole. This paper analyses the prevailing conditions for time tampering attacks to succeed for PM wormholes, before introducing an extension to the TTHCA detection algorithm called ΔT Vector which is designed to identify time tampering, while preserving low false positive rates. Simulation results confirm that the ΔT Vector extension is able to effectively detect time tampering attacks, thereby providing an important security enhancement to the TTHCA algorithm. PMID:23686143

  19. Identifying time measurement tampering in the traversal time and hop count analysis (TTHCA) wormhole detection algorithm.

    PubMed

    Karlsson, Jonny; Dooley, Laurence S; Pulkkis, Göran

    2013-05-17

    Traversal time and hop count analysis (TTHCA) is a recent wormhole detection algorithm for mobile ad hoc networks (MANET) which provides enhanced detection performance against all wormhole attack variants and network types. TTHCA involves each node measuring the processing time of routing packets during the route discovery process and then delivering the measurements to the source node. In a participation mode (PM) wormhole where malicious nodes appear in the routing tables as legitimate nodes, the time measurements can potentially be altered so preventing TTHCA from successfully detecting the wormhole. This paper analyses the prevailing conditions for time tampering attacks to succeed for PM wormholes, before introducing an extension to the TTHCA detection algorithm called ∆T Vector which is designed to identify time tampering, while preserving low false positive rates. Simulation results confirm that the ∆T Vector extension is able to effectively detect time tampering attacks, thereby providing an important security enhancement to the TTHCA algorithm.

  20. A New MANET Wormhole Detection Algorithm Based on Traversal Time and Hop Count Analysis

    PubMed Central

    Karlsson, Jonny; Dooley, Laurence S.; Pulkkis, Göran

    2011-01-01

    As demand increases for ubiquitous network facilities, infrastructure-less and self-configuring systems like Mobile Ad hoc Networks (MANET) are gaining popularity. MANET routing security however, is one of the most significant challenges to wide scale adoption, with wormhole attacks being an especially severe MANET routing threat. This is because wormholes are able to disrupt a major component of network traffic, while concomitantly being extremely difficult to detect. This paper introduces a new wormhole detection paradigm based upon Traversal Time and Hop Count Analysis (TTHCA), which in comparison to existing algorithms, consistently affords superior detection performance, allied with low false positive rates for all wormhole variants. Simulation results confirm that the TTHCA model exhibits robust wormhole route detection in various network scenarios, while incurring only a small network overhead. This feature makes TTHCA an attractive choice for MANET environments which generally comprise devices, such as wireless sensors, which possess a limited processing capability. PMID:22247657

  1. A New MANET wormhole detection algorithm based on traversal time and hop count analysis.

    PubMed

    Karlsson, Jonny; Dooley, Laurence S; Pulkkis, Göran

    2011-01-01

    As demand increases for ubiquitous network facilities, infrastructure-less and self-configuring systems like Mobile Ad hoc Networks (MANET) are gaining popularity. MANET routing security however, is one of the most significant challenges to wide scale adoption, with wormhole attacks being an especially severe MANET routing threat. This is because wormholes are able to disrupt a major component of network traffic, while concomitantly being extremely difficult to detect. This paper introduces a new wormhole detection paradigm based upon Traversal Time and Hop Count Analysis (TTHCA), which in comparison to existing algorithms, consistently affords superior detection performance, allied with low false positive rates for all wormhole variants. Simulation results confirm that the TTHCA model exhibits robust wormhole route detection in various network scenarios, while incurring only a small network overhead. This feature makes TTHCA an attractive choice for MANET environments which generally comprise devices, such as wireless sensors, which possess a limited processing capability.

  2. Attack and flee: game-theory-based analysis on interactions among nodes in MANETs.

    PubMed

    Li, Feng; Yang, Yinying; Wu, Jie

    2010-06-01

    In mobile ad hoc networks, nodes have the inherent ability to move. Aside from conducting attacks to maximize their utility and cooperating with regular nodes to deceive them, malicious nodes get better payoffs with the ability to move. In this paper, we propose a game theoretic framework to analyze the strategy profiles for regular and malicious nodes. We model the situation as a dynamic Bayesian signaling game and analyze and present the underlining connection between nodes' best combination of actions and the cost and gain of the individual strategy. Regular nodes consistently update their beliefs based on the opponents' behavior, while malicious nodes evaluate their risk of being caught to decide when to flee. Some possible countermeasures for regular nodes that can impact malicious nodes' decisions are presented as well. An extensive analysis and simulation study shows that the proposed equilibrium strategy profile outperforms other pure or mixed strategies and proves the importance of restricting malicious nodes' advantages brought by the flee option.

  3. The accident evolution and barrier function (AEB) model applied to incident analysis in the processing industries.

    PubMed

    Svenson, O

    1991-09-01

    This study develops a theoretical model for accident evolutions and how they can be arrested. The model describes the interaction between technical and human-organizational systems which may lead to an accident. The analytic tool provided by the model gives equal weight to both these types of systems and necessitates simultaneous and interactive accident analysis by engineers and human factors specialists. It can be used in predictive safety analyses as well as in post hoc incident analyses. To illustrate this, the AEB model is applied to an incident reported by the nuclear industry in Sweden. In general, application of the model will indicate where and how safety can be improved, and it also raises questions about issues such as the cost, feasibility, and effectiveness of different ways of increasing safety.

  4. Analysis of ECG from pole-zero models.

    PubMed

    Murthy, I S; Prasad, G S

    1992-07-01

    A complete solution to the fundamental problem of ECG analysis, viz., delineation of the signal into its component waves, is proposed from a system theoretic point of view. The discrete cosine transform of a bell shaped biphasic function is approximated mathematically by a system function with two poles and two zeros, i.e., of order (2, 2). Using this concept as the basis, a pole-zero model of suitable order is derived from the discrete cosine transform (DCT) of the given signal using Steiglitz-McBride method. This model is expanded into a unique set of partial fractions each of order (2, 2), and a biphasic function is recovered from each one of these fractions in the inverse process. Each of the P and T waves usually requires only one biphasic function, while the QRS complex needs two or at most three such fractions. A one-to-one relationship between the pole pattern in the z-plane and component wave pattern in the time signal is established. Results of analysis of continuous strips of ECG show that the delineated component waves are in excellent agreement with the original waves both qualitatively and quantitatively. The method is robust for the analysis of signals with artifacts of various kinds, independent of the sampling rate used, and is free from ad hoc back and forth search procedures. PMID:1516941

  5. On Automating Failure Mode Analysis and Enforcing its Integrity

    NASA Technical Reports Server (NTRS)

    Tai, Ann T.; Tso, Kam S.; Chau, Savio N.

    2005-01-01

    This paper reports our experience on the development of a design-for-safety (DFS) workbench called Risk Assessment and Management Environment (RAME) for microelectronic avionics systems. Our objective is to transform DFS practice from an ad-hoc, inefficient, error-prone approach to a stringent engineering process such that DFS can keep up with the rapidly growing complexity of avionics systems. In particular, RAME is built upon an information infrastructure that comprises a fault model, a knowledge base, and a failure reporting/tracking system. This infrastructure permits systematic learning from prior projects and enables the automation of failure modes, effects and criticality analysis (FMECA). Among other unique features, the most important advantage of RAME is its capability of directly accepting design source code in hardware description languages (HDLs) for automated failure mode analysis, which enables RAME to be compatible and to evolve with most electronic-computer-aided-design systems. Through an initial experimental evaluation of the RAME prototype, we show that our approach to FMECA automation improves failure mode analysis turn-around-time, completeness, and accuracy.

  6. A Combined Metabolomic and Proteomic Analysis of Gestational Diabetes Mellitus.

    PubMed

    Hajduk, Joanna; Klupczynska, Agnieszka; Dereziński, Paweł; Matysiak, Jan; Kokot, Piotr; Nowak, Dorota M; Gajęcka, Marzena; Nowak-Markwitz, Ewa; Kokot, Zenon J

    2015-12-16

    The aim of this pilot study was to apply a novel combined metabolomic and proteomic approach in analysis of gestational diabetes mellitus. The investigation was performed with plasma samples derived from pregnant women with diagnosed gestational diabetes mellitus (n = 18) and a matched control group (n = 13). The mass spectrometry-based analyses allowed to determine 42 free amino acids and low molecular-weight peptide profiles. Different expressions of several peptides and altered amino acid profiles were observed in the analyzed groups. The combination of proteomic and metabolomic data allowed obtaining the model with a high discriminatory power, where amino acids ethanolamine, L-citrulline, L-asparagine, and peptide ions with m/z 1488.59; 4111.89 and 2913.15 had the highest contribution to the model. The sensitivity (94.44%) and specificity (84.62%), as well as the total group membership classification value (90.32%) calculated from the post hoc classification matrix of a joint model were the highest when compared with a single analysis of either amino acid levels or peptide ion intensities. The obtained results indicated a high potential of integration of proteomic and metabolomics analysis regardless the sample size. This promising approach together with clinical evaluation of the subjects can also be used in the study of other diseases.

  7. Volume analysis of heat-induced cracks in human molars: A preliminary study

    PubMed Central

    Sandholzer, Michael A.; Baron, Katharina; Heimel, Patrick; Metscher, Brian D.

    2014-01-01

    Context: Only a few methods have been published dealing with the visualization of heat-induced cracks inside bones and teeth. Aims: As a novel approach this study used nondestructive X-ray microtomography (micro-CT) for volume analysis of heat-induced cracks to observe the reaction of human molars to various levels of thermal stress. Materials and Methods: Eighteen clinically extracted third molars were rehydrated and burned under controlled temperatures (400, 650, and 800°C) using an electric furnace adjusted with a 25°C increase/min. The subsequent high-resolution scans (voxel-size 17.7 μm) were made with a compact micro-CT scanner (SkyScan 1174). In total, 14 scans were automatically segmented with Definiens XD Developer 1.2 and three-dimensional (3D) models were computed with Visage Imaging Amira 5.2.2. The results of the automated segmentation were analyzed with an analysis of variance (ANOVA) and uncorrected post hoc least significant difference (LSD) tests using Statistical Package for Social Sciences (SPSS) 17. A probability level of P < 0.05 was used as an index of statistical significance. Results: A temperature-dependent increase of heat-induced cracks was observed between the three temperature groups (P < 0.05, ANOVA post hoc LSD). In addition, the distributions and shape of the heat-induced changes could be classified using the computed 3D models. Conclusion: The macroscopic heat-induced changes observed in this preliminary study correspond with previous observations of unrestored human teeth, yet the current observations also take into account the entire microscopic 3D expansions of heat-induced cracks within the dental hard tissues. Using the same experimental conditions proposed in the literature, this study confirms previous results, adds new observations, and offers new perspectives in the investigation of forensic evidence. PMID:25125923

  8. The physiology analysis system: an integrated approach for warehousing, management and analysis of time-series physiology data.

    PubMed

    McKenna, Thomas M; Bawa, Gagandeep; Kumar, Kamal; Reifman, Jaques

    2007-04-01

    The physiology analysis system (PAS) was developed as a resource to support the efficient warehousing, management, and analysis of physiology data, particularly, continuous time-series data that may be extensive, of variable quality, and distributed across many files. The PAS incorporates time-series data collected by many types of data-acquisition devices, and it is designed to free users from data management burdens. This Web-based system allows both discrete (attribute) and time-series (ordered) data to be manipulated, visualized, and analyzed via a client's Web browser. All processes occur on a server, so that the client does not have to download data or any application programs, and the PAS is independent of the client's computer operating system. The PAS contains a library of functions, written in different computer languages that the client can add to and use to perform specific data operations. Functions from the library are sequentially inserted into a function chain-based logical structure to construct sophisticated data operators from simple function building blocks, affording ad hoc query and analysis of time-series data. These features support advanced mining of physiology data.

  9. An electromyographic analysis of the Ab-Slide exercise, abdominal crunch, supine double leg thrust, and side bridge in healthy young adults: implications for rehabilitation professionals.

    PubMed

    Youdas, James W; Guck, Benjamin R; Hebrink, Ryan C; Rugotzke, John D; Madson, Timothy J; Hollman, John H

    2008-11-01

    The purpose of this study was to examine the effectiveness of a commercial abdominal machine (Ab-Slide) and three common abdominal strengthening exercises (abdominal crunch, supine double leg thrust, and side bridge) on activating abdominal and minimizing extraneous (nonabdominal) musculature-namely, the rectus femoris muscle. We recruited 10 males and 12 females whose mean (+/- SD) percent body fat was 10.7 +/- 4 and 20.7% +/- 3.2%, respectively. Electromyographic (EMG) data were recorded using surface electrodes for the rectus abdominis, external oblique, internal oblique, and rectus femoris. We recorded peak EMG activity for each muscle during each of the four exercises and normalized the EMG values by maximum muscle contractions (% MVIC). A two-factor repeated-measures analysis of variance assessed differences in normalized EMG activity among the different exercise variations (p < 0.05). Post hoc analyses were performed using the Bonferroni-adjusted alpha to assess between-exercise pair comparisons (p < 0.002). Gender did not affect performance; hence, data were collapsed across gender. We found a muscle x exercise interaction (F9,189 = 5.2, p < 0.001). Post hoc analyses revealed six pairwise differences. The Ab-Slide elicited the greatest EMG activity for the abdominal muscles and the least for the rectus femoris. The supine double leg thrust could be a problem for patients with low-back pathology due to high rectus femoris muscle activity. PMID:18978615

  10. A Variational Approach to the Analysis of Dissipative Electromechanical Systems

    PubMed Central

    Allison, Andrew; Pearce, Charles E. M.; Abbott, Derek

    2014-01-01

    We develop a method for systematically constructing Lagrangian functions for dissipative mechanical, electrical, and electromechanical systems. We derive the equations of motion for some typical electromechanical systems using deterministic principles that are strictly variational. We do not use any ad hoc features that are added on after the analysis has been completed, such as the Rayleigh dissipation function. We generalise the concept of potential, and define generalised potentials for dissipative lumped system elements. Our innovation offers a unified approach to the analysis of electromechanical systems where there are energy and power terms in both the mechanical and electrical parts of the system. Using our novel technique, we can take advantage of the analytic approach from mechanics, and we can apply these powerful analytical methods to electrical and to electromechanical systems. We can analyse systems that include non-conservative forces. Our methodology is deterministic, and does does require any special intuition, and is thus suitable for automation via a computer-based algebra package. PMID:24586221

  11. Independent vector analysis using subband and subspace nonlinearity

    NASA Astrophysics Data System (ADS)

    Na, Yueyue; Yu, Jian; Chai, Bianfang

    2013-12-01

    Independent vector analysis (IVA) is a recently proposed technique, an application of which is to solve the frequency domain blind source separation problem. Compared with the traditional complex-valued independent component analysis plus permutation correction approach, the largest advantage of IVA is that the permutation problem is directly addressed by IVA rather than resorting to the use of an ad hoc permutation resolving algorithm after a separation of the sources in multiple frequency bands. In this article, two updates for IVA are presented. First, a novel subband construction method is introduced, IVA will be conducted in subbands from high frequency to low frequency rather than in the full frequency band, the fact that the inter-frequency dependencies in subbands are stronger allows a more efficient approach to the permutation problem. Second, to improve robustness and against noise, the IVA nonlinearity is calculated only in the signal subspace, which is defined by the eigenvector associated with the largest eigenvalue of the signal correlation matrix. Different experiments were carried out on a software suite developed by us, and dramatic performance improvements were observed using the proposed methods. Lastly, as an example of real-world application, IVA with the proposed updates was used to separate vibration components from high-speed train noise data.

  12. Maximum Likelihood Analysis of Low Energy CDMS II Germanium Data

    DOE PAGES

    Agnese, R.

    2015-03-30

    We report on the results of a search for a Weakly Interacting Massive Particle (WIMP) signal in low-energy data of the Cryogenic Dark Matter Search experiment using a maximum likelihood analysis. A background model is constructed using GEANT4 to simulate the surface-event background from Pb210decay-chain events, while using independent calibration data to model the gamma background. Fitting this background model to the data results in no statistically significant WIMP component. In addition, we also perform fits using an analytic ad hoc background model proposed by Collar and Fields, who claimed to find a large excess of signal-like events in ourmore » data. Finally, we confirm the strong preference for a signal hypothesis in their analysis under these assumptions, but excesses are observed in both single- and multiple-scatter events, which implies the signal is not caused by WIMPs, but rather reflects the inadequacy of their background model.« less

  13. Optimizing Stimulation and Analysis Protocols for Neonatal fMRI

    PubMed Central

    Cusack, Rhodri; Wild, Conor; Linke, Annika C.; Arichi, Tomoki; Lee, David S. C.; Han, Victor K.

    2015-01-01

    The development of brain function in young infants is poorly understood. The core challenge is that infants have a limited behavioral repertoire through which brain function can be expressed. Neuroimaging with fMRI has great potential as a way of characterizing typical development, and detecting abnormal development early. But, a number of methodological challenges must first be tackled to improve the robustness and sensitivity of neonatal fMRI. A critical one of these, addressed here, is that the hemodynamic response function (HRF) in pre-term and term neonates differs from that in adults, which has a number of implications for fMRI. We created a realistic model of noise in fMRI data, using resting-state fMRI data from infants and adults, and then conducted simulations to assess the effect of HRF of the power of different stimulation protocols and analysis assumptions (HRF modeling). We found that neonatal fMRI is most powerful if block-durations are kept at the lower range of those typically used in adults (full on/off cycle duration 25-30s). Furthermore, we show that it is important to use the age-appropriate HRF during analysis, as mismatches can lead to reduced power or even inverted signal. Where the appropriate HRF is not known (for example due to potential developmental delay), a flexible basis set performs well, and allows accurate post-hoc estimation of the HRF. PMID:26266954

  14. Collagen types analysis and differentiation by FTIR spectroscopy.

    PubMed

    Belbachir, Karima; Noreen, Razia; Gouspillou, Gilles; Petibois, Cyril

    2009-10-01

    Abnormal formation and organization of collagen network is commonly observed in many organ pathologies, but analytical techniques able to reveal the collagen biodistribution are still lacking. In this study, Fourier-transform infrared (FTIR) spectroscopy has been used to analyze type I, III, IV, V, and VI collagens, the most important compounds of connective tissues. A robust classification of 30 FTIR spectra per collagen type could be obtained by using a combination of four spectral intervals [nu(C=O) absorption of amide I (1,700-1,600 cm(-1)), delta(CH(2)), and delta(CH(3)) absorptions (1,480-1,350 cm(-1)), nu(C-N), and delta(N-H) absorptions of amide III (1,300-1,180 cm(-1)), and nu(C-O) and nu(C-O-C) absorptions of carbohydrate moieties (1,100-1,005 cm(-1))]. Then, a submolecular justification of this classification model was sought using a curve fitting analysis of the four spectral intervals. Results demonstrated that every spectral interval used for the classification contained highly discriminant absorption bands between all collagen types (multivariate analysis of variance, p < 0.01; Dunnett's T3 post hoc test, p < 0.05). All conditions seem thus joined to make FTIR spectroscopy and imaging major tools for implementing innovative methods in the field of molecular histology, which would be very helpful for the diagnosis of a wide range of pathologies.

  15. Optimizing stimulation and analysis protocols for neonatal fMRI.

    PubMed

    Cusack, Rhodri; Wild, Conor; Linke, Annika C; Arichi, Tomoki; Lee, David S C; Han, Victor K

    2015-01-01

    The development of brain function in young infants is poorly understood. The core challenge is that infants have a limited behavioral repertoire through which brain function can be expressed. Neuroimaging with fMRI has great potential as a way of characterizing typical development, and detecting abnormal development early. But, a number of methodological challenges must first be tackled to improve the robustness and sensitivity of neonatal fMRI. A critical one of these, addressed here, is that the hemodynamic response function (HRF) in pre-term and term neonates differs from that in adults, which has a number of implications for fMRI. We created a realistic model of noise in fMRI data, using resting-state fMRI data from infants and adults, and then conducted simulations to assess the effect of HRF of the power of different stimulation protocols and analysis assumptions (HRF modeling). We found that neonatal fMRI is most powerful if block-durations are kept at the lower range of those typically used in adults (full on/off cycle duration 25-30s). Furthermore, we show that it is important to use the age-appropriate HRF during analysis, as mismatches can lead to reduced power or even inverted signal. Where the appropriate HRF is not known (for example due to potential developmental delay), a flexible basis set performs well, and allows accurate post-hoc estimation of the HRF. PMID:26266954

  16. Reinforcement learning for routing in cognitive radio ad hoc networks.

    PubMed

    Al-Rawi, Hasan A A; Yau, Kok-Lim Alvin; Mohamad, Hafizal; Ramli, Nordin; Hashim, Wahidah

    2014-01-01

    Cognitive radio (CR) enables unlicensed users (or secondary users, SUs) to sense for and exploit underutilized licensed spectrum owned by the licensed users (or primary users, PUs). Reinforcement learning (RL) is an artificial intelligence approach that enables a node to observe, learn, and make appropriate decisions on action selection in order to maximize network performance. Routing enables a source node to search for a least-cost route to its destination node. While there have been increasing efforts to enhance the traditional RL approach for routing in wireless networks, this research area remains largely unexplored in the domain of routing in CR networks. This paper applies RL in routing and investigates the effects of various features of RL (i.e., reward function, exploitation, and exploration, as well as learning rate) through simulation. New approaches and recommendations are proposed to enhance the features in order to improve the network performance brought about by RL to routing. Simulation results show that the RL parameters of the reward function, exploitation, and exploration, as well as learning rate, must be well regulated, and the new approaches proposed in this paper improves SUs' network performance without significantly jeopardizing PUs' network performance, specifically SUs' interference to PUs. PMID:25140350

  17. Sorption of hydrophobic organic compounds (HOC) in rapeseed oil bodies.

    PubMed

    Boucher, J; Cengelli, F; Trumbic, D; Marison, I W

    2008-02-01

    Oil-bodies are minute plant organelles (0.5-2.0microm diameter) consisting of an oil core surrounded by a phospholipid monolayer/proteinaceous membrane. Oil-bodies have been isolated from rapeseed seeds and demonstrated to constitute a novel type of micro-capsule suitable for the extraction of hydrophobic organic compounds from aqueous environments. Three hydrophobic pesticides: atrazine (2-chlor-4-ethyl-amino-6-isopropylamino-1,3,5-triazine), carbaryl (1-naphthyl methylcarbamate) and parathion (O,O-diethyl O-(4-nitrophenyl) phosphorothioate), as well as naphthalene and 2-phenylethanol were successfully extracted from aqueous solutions, with absorption in the inner oily core of OB as sorption mechanism. The OB membrane does not represent a barrier for the mass transfer of the compound towards the inner oily core of OB. Moreover, due to very high surface area to volume ratio, oil-bodies exhibit very good mass transfer properties compared with larger synthetic microcapsules or two-phase liquid-liquid extraction (LLE) techniques, which diminishes the need for strong agitation and avoids the formation of difficult to separate stable emulsions.

  18. Reinforcement Learning for Routing in Cognitive Radio Ad Hoc Networks

    PubMed Central

    Al-Rawi, Hasan A. A.; Mohamad, Hafizal; Hashim, Wahidah

    2014-01-01

    Cognitive radio (CR) enables unlicensed users (or secondary users, SUs) to sense for and exploit underutilized licensed spectrum owned by the licensed users (or primary users, PUs). Reinforcement learning (RL) is an artificial intelligence approach that enables a node to observe, learn, and make appropriate decisions on action selection in order to maximize network performance. Routing enables a source node to search for a least-cost route to its destination node. While there have been increasing efforts to enhance the traditional RL approach for routing in wireless networks, this research area remains largely unexplored in the domain of routing in CR networks. This paper applies RL in routing and investigates the effects of various features of RL (i.e., reward function, exploitation, and exploration, as well as learning rate) through simulation. New approaches and recommendations are proposed to enhance the features in order to improve the network performance brought about by RL to routing. Simulation results show that the RL parameters of the reward function, exploitation, and exploration, as well as learning rate, must be well regulated, and the new approaches proposed in this paper improves SUs' network performance without significantly jeopardizing PUs' network performance, specifically SUs' interference to PUs. PMID:25140350

  19. Teachers' Support with Ad-Hoc Collaborative Networks

    ERIC Educational Resources Information Center

    Cortez, C.; Nussbaum, M.; Lpez, X.; Rodrguez, P.; Santelices, R.; Rosas, R.; Marianov, V.

    2005-01-01

    Efforts to improve the educational process must focus on those most responsible for implementing it: the teachers. It is with them in mind that we propose a face-to-face computer-supported collaborative learning system that uses wirelessly networked hand-held computers to create an environment for helping students assimilate and transfer…

  20. Group Monitoring in Mobile Ad-Hoc Networks

    NASA Astrophysics Data System (ADS)

    Gaba, Albana; Voulgaris, Spyros; van Steen, Maarten

    Maintaining bonds of cohesion between members of small groups in densely populated venues (e.g., a family in an amusement park, or some friends in a stadium) is increasingly gaining interest, both as a safety measure against malicious activity and as a convenient tool to prevent group splitting. Note that the use of mobile phones is often ruled out in such scenarios, due to extreme network load. Current solutions are typically based on custom installations of antennas, centralized control, and user devices with high transmission power.

  1. Report of the AD HOC Committee on Patent Documentation.

    ERIC Educational Resources Information Center

    Urbach, Peter; And Others

    The Committee was established in September 1967 to study and make recommendations on Recommendation XXIX and XXX of the Report of the President's Commission on the Patent System. Based on interviews with Patent Office officials, patent examiners and classifiers and a review of Patent Office studies and documents, the Committee concluded that the…

  2. Report of the Ad Hoc Committee on Test Beam Policy

    SciTech Connect

    Stefanski, R.; Anderson, D.; Childress, S.; Coleman, R.; Fisk, H.E.; Garbincius, P.; Holmes, S.; Kephart, R.; Kreisler, M.; Lubatti, H.; Siegrist, J.

    1989-03-20

    This document was developed at the request of the Physics Advisory Committee of the Fermi National Accelerator Laboratory to review the general subject of test beams with the purpose of establishing general policy and guidelines for consideration of future test beam requests. The recommendations stated here should be subject to periodic review, since the Laboratory position must change as needs and available resources change.

  3. Reinforcement learning for routing in cognitive radio ad hoc networks.

    PubMed

    Al-Rawi, Hasan A A; Yau, Kok-Lim Alvin; Mohamad, Hafizal; Ramli, Nordin; Hashim, Wahidah

    2014-01-01

    Cognitive radio (CR) enables unlicensed users (or secondary users, SUs) to sense for and exploit underutilized licensed spectrum owned by the licensed users (or primary users, PUs). Reinforcement learning (RL) is an artificial intelligence approach that enables a node to observe, learn, and make appropriate decisions on action selection in order to maximize network performance. Routing enables a source node to search for a least-cost route to its destination node. While there have been increasing efforts to enhance the traditional RL approach for routing in wireless networks, this research area remains largely unexplored in the domain of routing in CR networks. This paper applies RL in routing and investigates the effects of various features of RL (i.e., reward function, exploitation, and exploration, as well as learning rate) through simulation. New approaches and recommendations are proposed to enhance the features in order to improve the network performance brought about by RL to routing. Simulation results show that the RL parameters of the reward function, exploitation, and exploration, as well as learning rate, must be well regulated, and the new approaches proposed in this paper improves SUs' network performance without significantly jeopardizing PUs' network performance, specifically SUs' interference to PUs.

  4. Sensor Sharing in Mobile Ad-Hoc Networks

    ERIC Educational Resources Information Center

    Mitra, Pramita

    2013-01-01

    Today's modern mobile devices (such as smartphones and tablets) present great potential for growth of many novel, powerful, but also highly demanding applications. However, most mobile devices/users operate in isolation from one another, i.e., they are not aware of the presence of other devices in their proximity. There are numerous situations…

  5. Time synchronization in ad-hoc wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Sharma, Nishant

    2013-06-01

    Advances in micro-electronics and developments in the various technologies have given birth to this era of wireless sensor networks. A sensor network is the one which provides information about the surrounding environment by sensing it and clock synchronization in wireless sensor networks plays a vital role to maintain the integrity of entire network. In this paper two major low energy consumption clock synchronization algorithms, Reference Broadcast Synchronization (RBS) and Timing-Sync Protocol for Sensor Networks (TPSN) are simulated, which result in high level of accuracy, reliability, handles substantially greater node densities, supports mobility, and hence perform well under all possible conditions.

  6. Applying Ad Hoc Institutional Research Findings to College Strategic Planning

    ERIC Educational Resources Information Center

    Clagett, Craig A.

    2004-01-01

    Environmental scanning, enrollment forecasting, budget analyses, and institutional effectiveness assessment are examples of the explicit contributions institutional research offices make to campus strategic planning.

  7. Hydrogen Bonding: HOC=O· · ·H-N vs. HOC=O· · ·H-C

    PubMed Central

    Dey, Sanjeev K.; Datta, Suchitra; Lightner, David A.

    2014-01-01

    A chloroform-soluble dipyrrinone, 8,9-bis-(5-carboxypentyl)-2,3-bis-(2-methoxyethoxy)-10H-dipyrrin-1-one, with solubilizing 2-methoxyethoxy β-substituents on the lactam ring and two hexanoic acid groups (one at C(9), the other at C(8) of the pyrrole ring) was synthesized for its ability to form intramolecular hydrogen bonds to the lactam unit from either carboxylic acid, whether in the syn-(Z) or anti-(Z) conformation. In the syn-(Z) conformation, such intramolecular hydrogen bonds can also include the pyrrole N-H. In the anti-(Z), intramolecular hydrogen bonds can include the pyrrole C(7)-H. Evidence for both monomer conformations in equilibrium is provided by 1H NMR analyses, which indicate that the syn-(Z) is favored over the anti-(Z) and predict an interconversion barrier of approximately 40 kJ mol−1. PMID:25745269

  8. A scientific workflow framework for (13)C metabolic flux analysis.

    PubMed

    Dalman, Tolga; Wiechert, Wolfgang; Nöh, Katharina

    2016-08-20

    Metabolic flux analysis (MFA) with (13)C labeling data is a high-precision technique to quantify intracellular reaction rates (fluxes). One of the major challenges of (13)C MFA is the interactivity of the computational workflow according to which the fluxes are determined from the input data (metabolic network model, labeling data, and physiological rates). Here, the workflow assembly is inevitably determined by the scientist who has to consider interacting biological, experimental, and computational aspects. Decision-making is context dependent and requires expertise, rendering an automated evaluation process hardly possible. Here, we present a scientific workflow framework (SWF) for creating, executing, and controlling on demand (13)C MFA workflows. (13)C MFA-specific tools and libraries, such as the high-performance simulation toolbox 13CFLUX2, are wrapped as web services and thereby integrated into a service-oriented architecture. Besides workflow steering, the SWF features transparent provenance collection and enables full flexibility for ad hoc scripting solutions. To handle compute-intensive tasks, cloud computing is supported. We demonstrate how the challenges posed by (13)C MFA workflows can be solved with our approach on the basis of two proof-of-concept use cases.

  9. A scientific workflow framework for (13)C metabolic flux analysis.

    PubMed

    Dalman, Tolga; Wiechert, Wolfgang; Nöh, Katharina

    2016-08-20

    Metabolic flux analysis (MFA) with (13)C labeling data is a high-precision technique to quantify intracellular reaction rates (fluxes). One of the major challenges of (13)C MFA is the interactivity of the computational workflow according to which the fluxes are determined from the input data (metabolic network model, labeling data, and physiological rates). Here, the workflow assembly is inevitably determined by the scientist who has to consider interacting biological, experimental, and computational aspects. Decision-making is context dependent and requires expertise, rendering an automated evaluation process hardly possible. Here, we present a scientific workflow framework (SWF) for creating, executing, and controlling on demand (13)C MFA workflows. (13)C MFA-specific tools and libraries, such as the high-performance simulation toolbox 13CFLUX2, are wrapped as web services and thereby integrated into a service-oriented architecture. Besides workflow steering, the SWF features transparent provenance collection and enables full flexibility for ad hoc scripting solutions. To handle compute-intensive tasks, cloud computing is supported. We demonstrate how the challenges posed by (13)C MFA workflows can be solved with our approach on the basis of two proof-of-concept use cases. PMID:26721184

  10. Steady-State Analysis Model for Advanced Fuel Cycle Schemes.

    2008-03-17

    Version 00 SMAFS was developed as a part of the study, "Advanced Fuel Cycles and Waste Management", which was performed during 2003-2005 by an ad-hoc expert group under the Nuclear Development Committee in the OECD/NEA. The model was designed for an efficient conduct of nuclear fuel cycle scheme cost analyses. It is simple, transparent and offers users the capability to track down cost analysis results. All the fuel cycle schemes considered in the model aremore » represented in a graphic format and all values related to a fuel cycle step are shown in the graphic interface, i.e., there are no hidden values embedded in the calculations. All data on the fuel cycle schemes considered in the study including mass flows, waste generation, cost data, and other data such as activities, decay heat and neutron sources of spent fuel and high-level waste along time are included in the model and can be displayed. The user can easily modify values of mass flows and/or cost parameters and see corresponding changes in the results. The model calculates: front-end fuel cycle mass flows such as requirements of enrichment and conversion services and natural uranium; mass of waste based on the waste generation parameters and the mass flow; and all costs.« less

  11. Steady-state Analysis Model for Advanced Fuelcycle Schemes

    2006-05-12

    The model was developed as a part of the study, "Advanced Fuel Cycles and Waste Management", which was performed during 2003—2005 by an ad-hoc expert group under the Nuclear Development Committee in the OECD/NEA. The model was designed for an efficient conduct of nuclear fuel cycle scheme cost analyses. It is simple, transparent and offers users the capability to track down the cost analysis results. All the fuel cycle schemes considered in the model aremore » represented in a graphic format and all values related to a fuel cycle step are shown in the graphic interface, i.e., there are no hidden values embedded in the calculations. All data on the fuel cycle schemes considered in the study including mass flows, waste generation, cost data, and other data such as activities, decay heat and neutron sources of spent fuel and high—level waste along time are included in the model and can be displayed. The user can modify easily the values of mass flows and/or cost parameters and see the corresponding changes in the results. The model calculates: front—end fuel cycle mass flows such as requirements of enrichment and conversion services and natural uranium; mass of waste based on the waste generation parameters and the mass flow; and all costs. It performs Monte Carlo simulations with changing the values of all unit costs within their respective ranges (from lower to upper bounds).« less

  12. Analysis of sponge zones for computational fluid mechanics

    SciTech Connect

    Bodony, Daniel J. . E-mail: bodony@stanford.edu

    2006-03-01

    The use of sponge regions, or sponge zones, which add the forcing term -{sigma}(q - q {sub ref}) to the right-hand-side of the governing equations in computational fluid mechanics as an ad hoc boundary treatment is widespread. They are used to absorb and minimize reflections from computational boundaries and as forcing sponges to introduce prescribed disturbances into a calculation. A less common usage is as a means of extending a calculation from a smaller domain into a larger one, such as in computing the far-field sound generated in a localized region. By analogy to the penalty method of finite elements, the method is placed on a solid foundation, complete with estimates of convergence. The analysis generalizes the work of Israeli and Orszag [M. Israeli, S.A. Orszag, Approximation of radiation boundary conditions, J. Comp. Phys. 41 (1981) 115-135] and confirms their findings when applied as a special case to one-dimensional wave propagation in an absorbing sponge. It is found that the rate of convergence of the actual solution to the target solution, with an appropriate norm, is inversely proportional to the sponge strength. A detailed analysis for acoustic wave propagation in one-dimension verifies the convergence rate given by the general theory. The exponential point-wise convergence derived by Israeli and Orszag in the high-frequency limit is recovered and found to hold over all frequencies. A weakly nonlinear analysis of the method when applied to Burgers' equation shows similar convergence properties. Three numerical examples are given to confirm the analysis: the acoustic extension of a two-dimensional time-harmonic point source, the acoustic extension of a three-dimensional initial-value problem of a sound pulse, and the introduction of unstable eigenmodes from linear stability theory into a two-dimensional shear layer.

  13. Comparison of retinal thickness by Fourier-domain optical coherence tomography and OCT retinal image analysis software segmentation analysis derived from Stratus optical coherence tomography images

    NASA Astrophysics Data System (ADS)

    Tátrai, Erika; Ranganathan, Sudarshan; Ferencz, Mária; Debuc, Delia Cabrera; Somfai, Gábor Márk

    2011-05-01

    Purpose: To compare thickness measurements between Fourier-domain optical coherence tomography (FD-OCT) and time-domain OCT images analyzed with a custom-built OCT retinal image analysis software (OCTRIMA). Methods: Macular mapping (MM) by StratusOCT and MM5 and MM6 scanning protocols by an RTVue-100 FD-OCT device are performed on 11 subjects with no retinal pathology. Retinal thickness (RT) and the thickness of the ganglion cell complex (GCC) obtained with the MM6 protocol are compared for each early treatment diabetic retinopathy study (ETDRS)-like region with corresponding results obtained with OCTRIMA. RT results are compared by analysis of variance with Dunnett post hoc test, while GCC results are compared by paired t-test. Results: A high correlation is obtained for the RT between OCTRIMA and MM5 and MM6 protocols. In all regions, the StratusOCT provide the lowest RT values (mean difference 43 +/- 8 μm compared to OCTRIMA, and 42 +/- 14 μm compared to RTVue MM6). All RTVue GCC measurements were significantly thicker (mean difference between 6 and 12 μm) than the GCC measurements of OCTRIMA. Conclusion: High correspondence of RT measurements is obtained not only for RT but also for the segmentation of intraretinal layers between FD-OCT and StratusOCT-derived OCTRIMA analysis. However, a correction factor is required to compensate for OCT-specific differences to make measurements more comparable to any available OCT device.

  14. A comparative analysis of dietary intakes during pregnancy in Europe: a planned pooled analysis of birth cohort studies1234

    PubMed Central

    Kogevinas, Manolis

    2011-01-01

    Background: There is growing evidence that despite the absence of marked deficiencies, diet during pregnancy has important implications for maternal and child health in industrialized countries. At present, relatively little is known about prevailing patterns of intake across groups with diverse sociodemographic and lifestyle patterns in these settings. Objectives: The aims of this study were to develop methods for the standardization of food group intake data and to describe the process of applying these methods to existing pregnancy cohort studies, which included >200,000 women across Europe. Design: The study developed a detailed standardization protocol to harmonize intakes of selected food groups, which included fruit, vegetables, meats, seafood, and dairy products. Standardization is necessary to facilitate valid comparisons of intake patterns and disparities across countries and will lead to the development of harmonized databases for possible future pooled analyses. Results: On the basis of comparisons with previously coordinated multicountry studies, preliminary data suggest that the standardization process yielded sufficiently comparable intake data, which indicate differences in food cultures across the countries that participated. Conclusions: This project provides lessons on the feasibility of harmonizing dietary intake data from existing studies, which can be applied in future post hoc standardization efforts. The data yielded in this analysis will also provide useful information for the development of food and nutrition policies for pregnant women in Europe, including the identification of population subgroups in which dietary inadequacies during pregnancy may be widespread. PMID:21974890

  15. Thermal analysis

    SciTech Connect

    Wunderlich, B. )

    1990-01-01

    This book presents the basic theory and techniques of thermal analysis. It discusses a range of applications and instrumentation from all fields of applied and basic research, and concludes with problem sets. Topics covered include: The Basics of Thermal Analysis; Thermometry; Differential Thermal Analysis; Calorimetry; Thermomechanical Analysis and Dilatometry; and Thermogravimetry.

  16. Evaluating residual dentin thickness following various mandibular anterior tooth preparations for zirconia full-coverage single crowns: an in vitro analysis.

    PubMed

    Borelli, Bruna; Sorrentino, Roberto; Goracci, Cecilia; Amato, Massimo; Zarone, Fernando; Ferrari, Marco

    2015-01-01

    The objective of this study was to evaluate the residual dentin thickness (RDT) after different tooth preparations. Ninety mandibular anterior teeth were divided into three groups: central incisors, lateral incisors, and canines. Specimens were prepared for single-crown coverage with shoulder, slight chamfer, and knife-edge finish lines. Specimens were sectioned and divided into four subgroups according to measurement areas: (1) buccal, (2) distal, (3) lingual, and (4) mesial. The RDT was analyzed statistically by means of one-way analysis of variance and Tukey post hoc test (P = .05). Significant differences were found for shoulder but not for slight chamfer and knife-edge finish lines. The interproximal areas wound up being critical due to thin RDT, potentially interfering with the structural and biologic integrity of teeth.

  17. An ion beam analysis software based on ImageJ

    NASA Astrophysics Data System (ADS)

    Udalagama, C.; Chen, X.; Bettiol, A. A.; Watt, F.

    2013-07-01

    The suit of techniques (RBS, STIM, ERDS, PIXE, IL, IF,…) available in ion beam analysis yields a variety of rich information. Typically, after the initial challenge of acquiring data we are then faced with the task of having to extract relevant information or to present the data in a format with the greatest impact. This process sometimes requires developing new software tools. When faced with such situations the usual practice at the Centre for Ion Beam Applications (CIBA) in Singapore has been to use our computational expertise to develop ad hoc software tools as and when we need them. It then became apparent that the whole ion beam community can benefit from such tools; specifically from a common software toolset that can be developed and maintained by everyone with freedom to use and allowance to modify. In addition to the benefits of readymade tools and sharing the onus of development, this also opens up the possibility for collaborators to access and analyse ion beam data without having to depend on an ion beam lab. This has the virtue of making the ion beam techniques more accessible to a broader scientific community. We have identified ImageJ as an appropriate software base to develop such a common toolset. In addition to being in the public domain and been setup for collaborative tool development, ImageJ is accompanied by hundreds of modules (plugins) that allow great breadth in analysis. The present work is the first step towards integrating ion beam analysis into ImageJ. Some of the features of the current version of the ImageJ ‘ion beam' plugin are: (1) reading list mode or event-by-event files, (2) energy gates/sorts, (3) sort stacks, (4) colour function, (5) real time map updating, (6) real time colour updating and (7) median & average map creation.

  18. 25 years of telepathology research: a bibliometric analysis

    PubMed Central

    2011-01-01

    Background The first appearance of the word “telepathology” in a scientific paper can be tracked down to 1986, in a famous editorial of Ronald Weinstein. Since that paper, research in telepathology grew up developing different subfields, including static and dynamic telepathology and more recently virtual microscopy. The present work attempts an analysis of research in telepathology, starting from the tools provided by bibliometrics. Methods A query has been developed to extract papers related to telepathology and virtual microscopy, and it has been then submitted to Pubmed by means of Entrez Utilities functions. Results obtained in XML have been processed through ad-hoc developed PHP scripts, in order to extract data on Authors, countries, and keywords. Results On PubMed, 967 papers related to telepathology and virtual microscopy have been retrieved, which involved 2904 Authors; corresponding authors were from 37 countries. Of those authors, 2213 co-authored just one paper. Papers were published on 344 different journals, of which only 52 from the Pathology field. An analysis of papers per year has been also attempted, that demonstrates variable research output in time. Conclusions From the proposed analysis, telepathology seems to have been consistently studied, in time, by about 400 researchers, with occasional participation of many other people. Telepathology research seems also to have varied in time, although some peaks in paper publishing are certainly related to the proceedings of the European congress on telepathology series, when they have been published on journals. However, some clear sign appears that suggests research in traditional telepathology, after a peak in 2000, showed some decline until virtual microscopy became mainstream, topic that currently pushes research again. The low number of clinical trials calls for more randomized studies in telepathology, to enable evidence-based application. PMID:21489197

  19. Effect modification of FADS2 polymorphisms on the association between breastfeeding and intelligence: protocol for a collaborative meta-analysis

    PubMed Central

    Hartwig, Fernando Pires; Davies, Neil Martin; Horta, Bernardo Lessa; Victora, Cesar Gomes; Davey Smith, George

    2016-01-01

    Introduction Evidence from observational studies and randomised controlled trials suggests that breastfeeding is positively associated with IQ, possibly because breast milk is a source of long-chain polyunsaturated fatty acids. Different studies have detected gene-breastfeeding interactions involving FADS2 variants and intelligence. However, findings are inconsistent regarding the direction of such effect modification. Methods/design To clarify how FADS2 and breastfeeding interact in their association with IQ, we are conducting a consortium-based meta-analysis of independent studies. Results produced by each individual study using standardised analysis scripts and harmonised data will be used. Inclusion criteria: breastfeeding, IQ and either rs174575 or rs1535 polymorphisms available; and being of European ancestry. Exclusion criteria: twin studies; only poorly imputed genetic data available; or unavailability of proper ethics approval. Studies will be invited based on being known to have at least some of the required data, or suggested by participating studies as potentially eligible. This inclusive approach will favour achieving a larger sample size and be less prone to publication bias. Discussion Improving current understanding of FADS2-breastfeeding interaction may provide important biological insights regarding the importance of long-chain polyunsaturated fatty acids for the breastfeeding-IQ association. This meta-analysis will help to improve such knowledge by replicating earlier studies, conducting additional analysis and evaluating different sources of heterogeneity. Publishing this protocol will minimise the possibility of bias due to post hoc changes to the analysis protocol. PMID:27311901

  20. Superior functional outcome after femoral derotation osteotomy according to gait analysis in cerebral palsy.

    PubMed

    Niklasch, M; Dreher, T; Döderlein, L; Wolf, S I; Ziegler, K; Brunner, R; Rutz, E

    2015-01-01

    The femoral derotation osteotomy (FDO) is seen as the golden standard treatment in children with cerebral palsy and internal rotation gait. Variable outcomes with cases of over- and undercorrection mainly in the less involved patients have been reported. The determination of the amount of derotation is still inconsistent. 138 patients (age: 11 (± 3.3) years) with cerebral palsy and internal rotation gait were examined pre- and 1 year postoperatively after distal or proximal FDO, using standardized clinical examination and 3D gait analysis. Three groups were defined retrospectively depending on the amount of derotation in relation to the mean hip rotation in stance (MHR) during gait analysis: Group A (derotation angle > MHR + 10°), Group B (derotation angle = MHR ± 10°), Group C (derotation angle hoc test was used for statistics (p < 0.05). Group B had the greatest benefit with the highest rate (86%) of good results (postoperative MHR = ± 15°). In contrast there were 14% cases of overcorrection and 5% cases of deterioration in Group A with only 81% good results and only 79% good results in Group C. It can be concluded, that it is less likely to have unsatisfactory outcomes if the amount of FDO is defined according to the findings of gait analysis compared with clinical examination.