Search is not available for this dataset
query
stringlengths 1
13.4k
| pos
stringlengths 1
61k
| neg
stringlengths 1
63.9k
| query_lang
stringclasses 147
values | __index_level_0__
int64 0
3.11M
|
---|---|---|---|---|
Energy adaptive MAC protocol for wireless sensor networks with RF energy transfer | AN ADAPTIVE ENERGY EFFICIENT MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS | Hadoop based Information Extract from Text Document | eng_Latn | 23,900 |
DEVELOPMENT OF WIRELESS SENSOR NETWORK USING BLUETOOTH LOW ENERGY (BLE) FOR CONSTRUCTION NOISE MONITORING | An Overview on Wireless Sensor Networks Technology and Evolution | A Simple Proof of the Restricted Isometry Property for Random Matrices | yue_Hant | 23,901 |
Routing Protocols Based on Ant Colony Optimization in Wireless Sensor Networks: A Survey | Distributed Mobile Sink Routing for Wireless Sensor Networks: A Survey | Ultrasound and MR findings in sclerosing perineurioma | eng_Latn | 23,902 |
albert's network definition | The BarabasiâBarabási (ALBERT) ba model is an algorithm for generating random-scale free networks using a preferential attachment. Mechanism-scale free networks are widely observed in natural and-human made, systems including The, internet the world wide, web citation, networks and some social. networks | Body Area Networks (BAN) Abstract. A Body Area Network is formally defined by IEEE 802.15 as, a communication standard optimized for low power devices and operation on, in or around the human body (but not limited to humans) to serve a variety of applications including medical, consumer electronics / personal entertainment and other [IEEE 802.15]. | eng_Latn | 23,903 |
Energy-Efficient Multicast Protocols | In this chapter, we presented general techniques for conserving energy in wireless communication. Then we described the metrics for modeling cost of energy consumption and different optimization goals for energy-efficient multicasting. We also discussed the existing solutions for constructing energy-efficient multicast distribution trees for WANETs and gave the qualitative analysis and simulations results of these solutions. Finally, we presented a framework for energy-efficient multicasting. | In this paper, an improved genetic algorithm to solve the unicast routing problem with QoS restrictions is proposed. The proposed algorithm uses real-coded strategy, which has unique crossover strategy, mutation strategy and fitness function, and in addition, the strategy of introducing alien species is adopted in the algorithm, in order to enhance the algorithm's global search ability. The simulation results show that the improved algorithm has a very good convergence performance and global search ability, and guarantees a reasonable success rate in finding the QoS unicast routing. | eng_Latn | 23,904 |
Designing an evolvable network with topological diversity | As environments surrounding the Internet become more changeable, a design approach is needed that requires less equipment to scale up networks against traffic growth resulting from various environmental changes. Here, we propose an evolvable network design approach in which network equipment is deployed without predetermined purpose rather than for a preplanned purpose. We use mutual information on node degree to measure the topological diversity of networks, and maximize topological diversity in the network design by minimizing the mutual information. Evaluations show that, compared to networks based on an ad hoc design method, networks constructed by our design approach can re-use already installed equipment in different environments. | In this paper, we investigate the evolution of quaternionic curve in Euclidean 4-space $\mathbb{R}^{4}$. We obtain evolution equations of the Frenet frame and curvatures. Then we give integrability conditions for the evolutions. Finally we give examples of evolution of curvatures. | eng_Latn | 23,905 |
A phased array approach to MIMO for wireless applications | In this paper we investigated the performance of linear uniform array, as it is usually used in the MIMO systems. By using the phased array techniques we investigated the effect of pattern rotation on the capacity of the system. | Traditional 3D NoC router may encounter the situations of congestion and hot spot. And it also doesn't have the function of multicast. In this paper, we present a new routing arithmetic called Multicast Rotational Routing Arithmetic (MRRA). It can handle several destination addresses at the same time, recombine packets, sent the same data to the different destination nodes, and avoid the congestion. The proposed algorithm is implemented by the new multicast 3D NoC router which is also proposed in this paper. The 3D NoC router is designed in Verilog HDL, simulated by Modelsim, synthesized and prototyped by Synplify and FPGA respectively. The experiment results show that the multicast router of MRRA can achieve a very good performance in terms of throughput and delay. The increased area utilization also can be tolerated. | eng_Latn | 23,906 |
Ergodic theorems for random clusters | We prove pointwise ergodic theorems for a class of random measures which occurs in Laplacian growth models, most notably in the anisotropic Hastings-Levitov random cluster models. The proofs are based on the theory of quasi-orthogonal functions and uniform Wiener-Wintner theorems. | In this paper pprivacy attacks to ad hoc routing protocols become an important issue as mobile ad hoc networks enter security critical domains. We modified Rids scheme for node location privacy in ANDOR protocol in mobile adhoc network. RIDS scheme also provide facility for the detection of wormhole attack and node misbehaviors in adhoc network. Different author proposed a different scheme for RIDS for providing security in mobile adhoc network. But all technique suffered common problem that problem is generation of node ID and protection of node ID in location based routing protocol. In this dissertation we modified the RIDS model for node id generation technique for identification of location of secured node. For these process we used cyclic shift technique for node ID generation. Here we discuss RIDS ANDOR and describe our proposed scheme. | eng_Latn | 23,907 |
Tactical Mobile Mesh Network System Design | Tactical mobile mesh systems are wireless communication networks characterized by: harsh propagation channels and interference, frequent and rapid changes in the network topology, the requirement for very robust, low latency multimedia information decimation, and no centralized network control. In this paper we describe a technology testbed designed to address these challenges. The testbed is based on advanced waveform technologies, modern digital likelihood receiver processing, and robust ad-hoc networking strategies. A technology testbed was assembled to evaluate the cumulative benefits of this integrated system design. Field tests are presented demonstrating low-latency voice and multimedia IP traffic over multiple hop, cooperative routes. | There is the bottom-up approach proposed and implemented for the Manufacturing Execution System in the paper. The developed Manufacturing Execution System was testes in a real production line composed of MPS stations by Festo Didactic. Production of pneumatic cylinders The MES software was written in Object Oriented Programming way in C# language with the use of Microsoft Visual Studio. The structure of the database tables is presented and the role of the tables in the system is described briefly. The classes developed and implemented were presented and described. | eng_Latn | 23,908 |
Application of Laser Ranging Technique in Airborne Fire-Control. | Abstract : The airborne laser rangefinder can offer an accurate and economical solutions for low altitude delivery of bombs. Recommendations for safety precautions and aircraft window are also made. | This paper is concerned with wideband, multimedia packet switched wireless data networks. It considers the impact of a wireless access TDMA source queue on long range dependence (LRD) in traffic statistics. Simulation results show that traffic LRD is typically retained at the output of such queues. These results point to important implications for wireless network resource allocation and traffic management. | eng_Latn | 23,909 |
Exploring Privacy Notification and Control Mechanisms for Proximity-Aware Tablets | In hospitals, offices and other settings, professionals face the challenge of accessing and sharing sensitive content in public areas. As tablets become increasingly adopted in work environments, it is important to explore ways to support privacy that are appropriate for tablet use in dynamic, mobile workflows. In this research we consider how spatial information can be utilized to support both individual and collaborative work in a natural way while respecting data privacy. We present a proof-of-concept implementation of a proximity-aware tablet, and a range of privacy notification and control mechanisms designed for such a tablet. Results from a user study support the idea that interpersonal distance and orientation can be used to mediate privacy management for tablet interfaces. Selecting a specific design for privacy threat notification and response is highly context-dependent-for example, in health care the first priority is to not impede the fluid exchange of information. | Abstract Mobile networks have experienced a sharp expansion in the population of mobile clients/subscribers. Such growth incurs additional expending of the bandwidth resources for network cost management. For future PCS (Personal Communication Services) networks, it is desirable to devise mobile networks that make resourceful use of the limited radio bandwidth. Effective mobility and location management is a way to realize such efficiency. This paper surveys different location management strategies and cost planning for personal communication systems. The stress is on how to minimize both the location update and paging costs from the wireless and wired networks. | eng_Latn | 23,910 |
Research on Real-time Multimedia Traffic Classification Method | As the precondition of improving end-user's voice and video experience,multimedia traffic classification has become a hot research area in the past years.This paper analyzes recent related research of multimedia traffic classification area,and proposes some advice for future development of this area. | Current mobile devices support multiple network technologies and network composition via such devices can enable service provisioning across heterogeneous networks. One of the key challenges for realizing this view is inter-domain routing. Indeed, given the diversity of involved network technologies and infrastructures, a flexible routing protocol that takes into account their quality properties and dynamics is an important requirement. In this paper, we present a flexible quality-aware routing protocol for infrastructure-less B3G environments that enables discovery of routes with optimal bandwidth, delay or cost according to the preference of each client. The protocol is based on the Optimized Link-State Routing (OLSR) protocol and is designed to enable computation of quality-aware routes in multi-network environments. We detail the protocol, discuss its deployment and provide experimental results. | eng_Latn | 23,911 |
Design of remote data collection system based on PLC and GPRS | Introduces a remote data collection system based on power line carrier(PLC) and GPRS network communication.The system can collect the electrical data in time and exactly and the system use several different communication techniques such as PLC and GPRS to optimize the resource of system.This paper also introduces the elements,structures and work processes of the system.Finally,the security measures and upgrade performances are discussed. | Abstract Mobile networks have experienced a sharp expansion in the population of mobile clients/subscribers. Such growth incurs additional expending of the bandwidth resources for network cost management. For future PCS (Personal Communication Services) networks, it is desirable to devise mobile networks that make resourceful use of the limited radio bandwidth. Effective mobility and location management is a way to realize such efficiency. This paper surveys different location management strategies and cost planning for personal communication systems. The stress is on how to minimize both the location update and paging costs from the wireless and wired networks. | eng_Latn | 23,912 |
Maximal Coverage Scheduling in Randomly Deployed Directional Sensor Networks | Unlike traditional omni-directional sensors that always have an omni-angle of sensing range, directional sensors may be able to switch to several directions and each direction has a limited angle of sensing range. Area coverage is still an essential issue in a directional sensor network which consists of a number of directional sensors. In this paper, we study a novel "area coverage by directional sensors" problem. We propose the maximum directional area coverage (MDAC) problem to maximize covered area by scheduling the working directions of the sensors in the network. We prove the MDAC to be NP-complete and propose one distributed scheduling algorithm for the MDAC. Simulation results are also presented to demonstrate the performance of the proposed algorithm. | This paper develops necessary and sufficient conditions for analyzing the schedulability of fixed priority algorithms on resources with limited priority levels. We introduce the degree of schedulable saturation (S/sub max/) as an objective function. A multimedia task set is used to demonstrate how S/sub max/ can be used to optimize the grouping of tasks to priority levels. > | eng_Latn | 23,913 |
Evaluation of the Passing Process on Two-Lane Rural Highways: | The main purpose of this research was to develop models to quantify the major components of the passing process. A second goal was to compare the results with existing highway-design models and to arrive at conclusions about the applicability of the existing models. Additional objectives were to evaluate several time elements of the passing process, such as the response time of drivers from the arrival of a proper gap until the start of the passing maneuver. The evaluation is based on an analysis of data that were collected by videotaping six tangent two-lane highway sections from high vantage points and from a helicopter hovering above one site. Normal driver behavior was not disturbed during the data collection process. About 1,500 passings were recorded; of these, 54 percent were characterized as "single passing," in which one driver passed a single, slower vehicle. About half of all passing maneuvers were found to involve two cars; in the other half, at least one truck was overtaken. A model showing t... | Current mobile devices support multiple network technologies and network composition via such devices can enable service provisioning across heterogeneous networks. One of the key challenges for realizing this view is inter-domain routing. Indeed, given the diversity of involved network technologies and infrastructures, a flexible routing protocol that takes into account their quality properties and dynamics is an important requirement. In this paper, we present a flexible quality-aware routing protocol for infrastructure-less B3G environments that enables discovery of routes with optimal bandwidth, delay or cost according to the preference of each client. The protocol is based on the Optimized Link-State Routing (OLSR) protocol and is designed to enable computation of quality-aware routes in multi-network environments. We detail the protocol, discuss its deployment and provide experimental results. | eng_Latn | 23,914 |
Current Evidence for Extracorporeal Liver Support Systems in Acute Liver Failure and Acute-on-Chronic Liver Failure | Abstract Artificial (nonbiological) extracorporeal liver support devices aim to remove albumin-bound and water-soluble toxins to restore and preserve hepatic function and mitigate or limit the progression of multiorgan failure while hepatic recovery or liver transplant occurs. The following beneficial effects have been documented: improvement of jaundice, amelioration of hemodynamic instability, reduction of portal hypertension, and improvement of hepatic encephalopathy. The only randomized prospective multicenter controlled trial to show an improvement in transplant-free survival was for high-volume plasmapheresis. Biological (cell-based) extracorporeal liver support systems aim to support the failing liver through detoxification and synthetic function and warrant further study for safety and benefit. | Video delivery in a mobile ad-hoc network that can be deployed by members of an emergency service in an incident zone is an appealing tool for emergency and rescue services, but has not been studied yet. In order to design and test a suitable solution, we have generated realistic evaluation scenarios by modeling fireman action plans and GPS traces from real situations. We propose an overlay network solution with routing and reliability mechanisms. The Emergency Overlay Routing (EOR) protocol is a reactive protocol integrated into a store-carry-forward architecture. It selects ferry nodes to transport video data from a camera in the Incident Area to the Incident Chief’s node, looking for the minimum delay, but reliable, candidate. We also propose a simple credit based mechanism (RTCP+) to improve the communication reliability. The evaluation of the whole system shows a great improvement against previous results and promising expectations. | eng_Latn | 23,915 |
LOCATION MANAGEMENT AND COST PLANNING FOR PERSONAL COMMUNICATION SYSTEMS | Abstract Mobile networks have experienced a sharp expansion in the population of mobile clients/subscribers. Such growth incurs additional expending of the bandwidth resources for network cost management. For future PCS (Personal Communication Services) networks, it is desirable to devise mobile networks that make resourceful use of the limited radio bandwidth. Effective mobility and location management is a way to realize such efficiency. This paper surveys different location management strategies and cost planning for personal communication systems. The stress is on how to minimize both the location update and paging costs from the wireless and wired networks. | This paper treats of three principal topics: 1. The enormous economic waste which the wire, cable, and conduit equipment of a telephone system involves. 2. A recapitulation and discussion of reasons which make this waste necessary or expedient in manually operated systems. 3. How this waste can and should be greatly reduced in systems employing automatic switchboards. | yue_Hant | 23,916 |
Remote Radar Network for Traffic Observation in Tokyo Bay | Since Year 2000, the authors have been developing a remote radar network to observe the vessel traffic in Tokyo Bay. The first operational remote radar station was setup by the National Defense Academy, Yokosuka. The second remote radar station - and an AIS receiving station - were installed at Higashi Ogishima, Kawasaki. Both radars can be controlled remotely; this from our monitoring station at Tokyo University of Marine Science and Technology. Long term observation of vessel traffic can be envisaged. Along with some observed data, the outline of the system is explained in this paper. | Current mobile devices support multiple network technologies and network composition via such devices can enable service provisioning across heterogeneous networks. One of the key challenges for realizing this view is inter-domain routing. Indeed, given the diversity of involved network technologies and infrastructures, a flexible routing protocol that takes into account their quality properties and dynamics is an important requirement. In this paper, we present a flexible quality-aware routing protocol for infrastructure-less B3G environments that enables discovery of routes with optimal bandwidth, delay or cost according to the preference of each client. The protocol is based on the Optimized Link-State Routing (OLSR) protocol and is designed to enable computation of quality-aware routes in multi-network environments. We detail the protocol, discuss its deployment and provide experimental results. | eng_Latn | 23,917 |
A real-time Road Boundary Detection Algorithm Based on Driverless Cars | In this study, aiming at road boundary detection problem of driverless cars in structured and semi-structured roads, the paper proposed a new real-time road boundary detection algorithm based on driverless cars as a platform. The algorithm firstly included following steps: calibration, layered and median filtering according to the obtained LIDAR point cloud data, and then extract the left and right road boundary points of each layer. The extracted road boundary points are then straight line fitted using RANSAC algorithm. Finally, straight line is tracked using KALMAN filtering, then achieve real-time road boundary detection. The test results show that this boundary detection algorithm has the high accuracy and reliability and is able to accurately accomplish the boundary detection task, which can satisfy the requirements of real-time system. And this algorithm has been applied successfully in "The future challenge competition for driverless cars" in 2014 year and has obtained the third place. | Current mobile devices support multiple network technologies and network composition via such devices can enable service provisioning across heterogeneous networks. One of the key challenges for realizing this view is inter-domain routing. Indeed, given the diversity of involved network technologies and infrastructures, a flexible routing protocol that takes into account their quality properties and dynamics is an important requirement. In this paper, we present a flexible quality-aware routing protocol for infrastructure-less B3G environments that enables discovery of routes with optimal bandwidth, delay or cost according to the preference of each client. The protocol is based on the Optimized Link-State Routing (OLSR) protocol and is designed to enable computation of quality-aware routes in multi-network environments. We detail the protocol, discuss its deployment and provide experimental results. | eng_Latn | 23,918 |
Using the six-sigma metric to measure and improve the performance of a supply chain | The need for a comprehensive, flexible and adoptable framework for evaluating the performance of a supply chain and its entities has long been felt. It is also recognized that such a framework is more effective if the performances of various processes and entities can be measured on a common scale and benchmarked against world-class standards. In this paper, it is shown how the six- sigma metrics, immensely popular across the globe today, can help an organization in this regard. The motivation behind the integration of the two concepts comes from the versatility of the six-sigma metrics in performance measurement, certain similarities in the two approaches and research results establishing that supply chain management can be enriched through application of quality management principles. A structured methodology, with which the performance of a supply chain and its entities can be effectively measured, monitored and improved with the help of the six-sigma metrics is presented. The method is also illustrate... | In this paper, we deal with possible data transmission congestion on the sink node in wireless sensor networks (WSNs). We consider a scenario in which all the sensor nodes have a certain amount of storage space and acquire data from the surroundings at heterogeneous speed. Because receiving bandwidth of the sink node is limited, a proper bandwidth allocation mechanism should be implemented to avoid possible congestion or data loss due to the overflow of some sensor nodes. To address this problem, we firstly design a novel bandwidth allocation mechanism, SWM, that can maximize the social utility, an indicator of every sensor node's satisfaction degree and the social fairness. Furthermore, we model the allocation process under the SWM as a noncooperative game and figure out the unique Nash Equilibrium. The uniqueness of the equilibrium demonstrates that this network will actually approach to a fair and stable state. | eng_Latn | 23,919 |
Implementation of the Voronoi-Delaunay Method for Analysis of Intermolecular Voids | Voronoi diagram and Delaunay tessellation have been used for a long time for structural analysis of computer simulation of simple liquids and glasses. However the method needs a generalization to be applicable to molecular and biological systems. Crucial points of implementation of the method for analysis of intermolecular voids in 3D are discussed in this paper. The main geometrical constructions – the Voronoi S-network and Delaunay S-simplexes, are discussed. The Voronoi network “lies” in the empty spaces between molecules and represents a “navigation map” for intermolecular voids. The Delaunay S-simplexes determine the simplest interatomic cavities and serve as building blocks for composing complex voids. An algorithm for the Voronoi S-network calculation is illustrated on example of lipid bilayer model. | Sensor localization is a necessary and key functionality for the deployment of wireless sensor network (WSN) applications. This paper investigates on the range-free localization approaches for low hardware requirement. A modified DV-Hop localization algorithm is designed to reduce the localization error. The modified DV-Hop uses a novel average hop size estimate scheme, in which the local property of hop-size for a particular pair of beacon nodes is considered. Simulation results show that the modified DV-Hop algorithm outperforms the original DV-Hop algorithm, especially when the contribution of local hop-size is chosen reasonably. | eng_Latn | 23,920 |
A Stable Three-Coordinate Rhodium(I) Olefin Complex | Reaction of LLi (L = ArNC(Me)CHC(Me)NAr, Ar = 2,6-Me2C6H3) with [Rh(COE)2Cl]2 (COE = cyclooctene) produces stable, three-coordinate LRh(COE) (1). At room temperature in solution, the LRh fragment moves rapidly over one face of the COE ligand via reversible allyl hydride formation. | Current mobile devices support multiple network technologies and network composition via such devices can enable service provisioning across heterogeneous networks. One of the key challenges for realizing this view is inter-domain routing. Indeed, given the diversity of involved network technologies and infrastructures, a flexible routing protocol that takes into account their quality properties and dynamics is an important requirement. In this paper, we present a flexible quality-aware routing protocol for infrastructure-less B3G environments that enables discovery of routes with optimal bandwidth, delay or cost according to the preference of each client. The protocol is based on the Optimized Link-State Routing (OLSR) protocol and is designed to enable computation of quality-aware routes in multi-network environments. We detail the protocol, discuss its deployment and provide experimental results. | eng_Latn | 23,921 |
Edge Mobility Architecture — Routeing and Hand-off | This paper presents a network architecture for supporting edge mobility, and goes on to consider IP networks in which the core topology is fixed but where the hosts at the edge of the network may be mobile, as is the case in cellular networks. Within this architecture, mobile enhanced routeing (MER) protocols are used to support the prefix-routed requirements of the fixed Internet, along with the movement of IP addresses allocated to mobile nodes. Specific components for the support of such edge mobility (EMA:MER) are then outlined; these offer fixed/mobile IP network convergence, homogeneous IP handoff across heterogeneous access technologies, and inter-domain roaming across heterogeneous large-scale IP domains. | In this article we will show you how to carry out the water charging system,used in LAN,including it's main structure,designing conception as well as the key technology to solve several problems we met.We emphasized the way to realize a Client/Server structured MIS based on DB.Finally we will tell you how to carry out this system,which is developed in C++Builder IDE,in detail. | eng_Latn | 23,922 |
Extended Multi-touch Gesture Recognition Unrestricted by Shapes and Numbers of Touch Points | Recently the development of touch gesture in mobile devices has been faced with a generalization problem which is very dependent on the number of multi-touch points. In this paper we propose a touch gesture recognition method which is independent from variation of touch shape and the number of touch points, and it could be considered superior than those of Microsoft's window7. This method recognizes the multi-touch gestures using central moments of touch area, distances and angles between touch points, and paths of each points. Additionally, the shapes of each touch, ellipsoidal shape and area information, are used in our method to make the gesture more sensitive. We have evaluated our method on our hand-made tabletop display system and the result has shown that the proposed method is surely more elaborated and intuitive than previous methods. | This paper presents a network architecture for supporting edge mobility, and goes on to consider IP networks in which the core topology is fixed but where the hosts at the edge of the network may be mobile, as is the case in cellular networks. Within this architecture, mobile enhanced routeing (MER) protocols are used to support the prefix-routed requirements of the fixed Internet, along with the movement of IP addresses allocated to mobile nodes. Specific components for the support of such edge mobility (EMA:MER) are then outlined; these offer fixed/mobile IP network convergence, homogeneous IP handoff across heterogeneous access technologies, and inter-domain roaming across heterogeneous large-scale IP domains. | eng_Latn | 23,923 |
Security server incorporating relay servers for distributed processing environments | A method is proposed that uses a security server to assure more secure communication without degrading the performance on the distributed object-oriented network architecture in the distributed processing environment (DONA-DPE). Security in communications is enhanced when the number of communication exchanges is minimized. To accomplish this, in the proposed model the security server incorporates within itself relay servers such as search engines. The model's effectiveness is discussed using sample applications: a search of its performance is discussed. | For achieving the optimal performances and the longest lifetime of wireless sensor networks,the design of network routing protocol is very important.This paper analyzes many challenges of wireless sensor network routing protocol,and then discusses the well-known LEACH routing protocol and its evolution protocols HEED and PEGASIS in wireless sensor networks.Based on theoretical analysis,it compares comprehensively the performances such as network lifetime and delay of these routing protocols,and presents the corresponding simulation process and results. | eng_Latn | 23,924 |
Improving the Quality of Weather Information Provided to Emergency Medical Services Responding to Motor Vehicle Crashes | When a motor vehicle crash happens, emergency medical services (EMS) offer the best prospects for injured occupants. It is therefore important to address any issue that can have a negative impact on the effectiveness of EMS response to a crash. One such issue relates to shortfalls in the accuracy and completeness of current and forecast weather information. These shortfalls are often attributable to limitations in the geographic resolution of measured data as well as difficulties with obtaining real-time access to updated weather as an event unfolds. This paper examines the need for improved weather information to support both ground and air EMS response. Operating environments for responders are examined, and established sources of measured weather data are described, in particular, the system of automated weather stations that support current and forecast weather reporting in the United States. Existing and emerging mobile sensor platforms, which could broaden the geographic extent of measured data espe... | This paper presents a network architecture for supporting edge mobility, and goes on to consider IP networks in which the core topology is fixed but where the hosts at the edge of the network may be mobile, as is the case in cellular networks. Within this architecture, mobile enhanced routeing (MER) protocols are used to support the prefix-routed requirements of the fixed Internet, along with the movement of IP addresses allocated to mobile nodes. Specific components for the support of such edge mobility (EMA:MER) are then outlined; these offer fixed/mobile IP network convergence, homogeneous IP handoff across heterogeneous access technologies, and inter-domain roaming across heterogeneous large-scale IP domains. | eng_Latn | 23,925 |
Simulation study of mobility management procedures for IP-based wireless communications system | In this paper, simulation approach for verification and evaluation of the proposed mobility management mechanisms is presented. The architecture of considered wireless communications system consists of three main components, i.e. core communications segment (CCS), wireless local area networks (WLANs) and network management centre (NMC). The paper is based on both Home Agent (HA) replication and user's services profile transferring to a new location is described in detail. WLAN is connected to the core communications segment by high capacity line of sight (HCLOS) radio links. Network management center performs an essential role in supporting the mobility management functions. Both COMNET and OPNET simulation packages were used for quality assessment of the modified IPv6 mobility management procedures. The simulation results presented in the paper confirmed that the modified procedures significantly improve the wireless network accessibility. | In this article we will show you how to carry out the water charging system,used in LAN,including it's main structure,designing conception as well as the key technology to solve several problems we met.We emphasized the way to realize a Client/Server structured MIS based on DB.Finally we will tell you how to carry out this system,which is developed in C++Builder IDE,in detail. | eng_Latn | 23,926 |
Reversible Liquid−Liquid Transitions in the Early Stages of Monolayer Self-Assembly | Time-resolved atomic force microscopy, contact angle analysis, and X-ray photoelectron spectroscopy were employed to study the effect of cyclic heating and cooling of a partial octadecyltrichlorosilane (OTS) monolayer on the oxidized Si(100) surface. A reversible structural change of the partial monolayer between high density and low density two-dimensional liquid phases was observed as a function of temperature at constant coverage. These studies show that the monolayer exists in a highly mobile hydrogen-bonded state akin to the equilibrium state of Langmuir films at the air−water interface. The lifetime of the mobile state was measured to be on the order of several minutes, after which grafting and cross-linking immobilize the monolayer. The results show that the mobile state permits large scale rearrangements of the molecules within the monolayers. | The evolution from wired network systems to wireless environments such as Ad-hoc networks enables the emerging of cross-layer systems to improve the wireless network performance. Efficient methods, that may either produce or update cross-layer conceptual models have to be considered. Those models allow an efficient organisation of the wireless systems. In our approach, a cross-layer conceptual model is composed of : cross- layer interaction models and interactions description arrays, produced by the Reverse Cross-Layer (RCL) method that we proposed. The method has been applied to a chosen protocol stack. | eng_Latn | 23,927 |
A dissolved oxygen sensor based on ruthenium fluorescence and u-shaped plastic optical fiber | A dissolved oxygen sensor based on ruthenium(Ru) fluorescence and U-shape plastic optical fiber (POF) was described. ::: Dichlorotris (1, 10-phenanthroline) ruthenium (II) was used as an oxygen indicator, which was coated on to the surface ::: of a 1mm diameter U-shaped POF. Phase modulation technique is used to measure fluorescence lifetime. The phase ::: difference between 100% and 0% dissolved oxygen is 1.78 degree. By using the nonlinear assumption, we also calculate ::: that the there are only 20% thickness of the sensor material is affected by DO. | Current mobile devices support multiple network technologies and network composition via such devices can enable service provisioning across heterogeneous networks. One of the key challenges for realizing this view is inter-domain routing. Indeed, given the diversity of involved network technologies and infrastructures, a flexible routing protocol that takes into account their quality properties and dynamics is an important requirement. In this paper, we present a flexible quality-aware routing protocol for infrastructure-less B3G environments that enables discovery of routes with optimal bandwidth, delay or cost according to the preference of each client. The protocol is based on the Optimized Link-State Routing (OLSR) protocol and is designed to enable computation of quality-aware routes in multi-network environments. We detail the protocol, discuss its deployment and provide experimental results. | eng_Latn | 23,928 |
Cluster-based cooperative jamming in wireless multi-hop networks | This paper proposes a cluster-based optimal relay and jammer selection (CB-ORJ) scheme to deal with interception and improve the secrecy rate in wireless multi-hop networks in the presence of both intra-cluster and inter-cluster eavesdroppers. We first present a novel mathematical model of cluster-based secure transmission. Furthermore, we propose an on-demand relay and jammer selection approach based on the proposed model with power allocation to optimize the secrecy rate subject to a total transmit power constraint under different security requirements. To confuse the intra-cluster eavesdroppers, the cluster heads assign appropriate cluster members as jammers, while for the inter-cluster eavesdroppers, the transmitting cluster and the receiving cluster jointly select their cluster members as jammers. Finally, simulation results demonstrate that our scheme outperforms existing ones in terms of secrecy outage probability (SOP) while guaranteeing a lower desired energy consumption. | This paper addresses the problem of channel and propagation delay estimation in asynchronous DS/CDMA systems. We consider the uplink connection in DS/CDMA with long spreading codes. The MIMO stochastic gradient algorithm proposed in [6] is estimating a linear combination of the channel impulse responses and the propagation delays. This estimate suffices for the equalization purposes. The propagation delays are estimated with a simple matching scheme. | eng_Latn | 23,929 |
Applying Compression to a Game's Network Protocol | This report presents the results of applying different compression algorithms to the network protocol of an online game. The algorithm implementations compared are zlib, liblzma and my own implementation based on LZ77 and a variation of adaptive Huffman coding. The comparison data was collected from the game TomeNET. The results show that adaptive coding is especially useful for compressing large amounts of very small packets. | Abstract Cyber security problem in energy system has been paid more and more attention recently. In this paper, impact of the packet loss and bit errors in the communication process on the performance of demand response was evaluated. Thermodynamic modelling mechanism of the typical electric heat pumps was first discussed. And, a novel heat pump demand response control strategy based on Optimal Temperature Regulation (OTR) was proposed. The control strategy was then applied to balance the power fluctuations caused by renewable energy. Packet loss and bit errors in the signal transmission were discussed, and their impact on the performance of the control strategy was analysed. Finally, case studies were used to validate the given method. | eng_Latn | 23,930 |
Design of Time Synchronization Mechanism of Wireless USB over IEEE 802.15.6 | ABSTRACT Wearable computer systems can use the wireless universal serial bus (WUSB) that refers to USB technology that is merged with WiMedia PHY/MAC technical specifications. In this paper, we focus on an integrated system of the wireless USB over the IEEE 802.15.6 wireless body area networks (WBAN) for wireless wearable computer systems supporting U-health services. And a communication structure that performs the time-synchronization is proposed for WUSB over IEEE 802.15.6 hierarchical protocol. Proposed time-synchronization mechanisms adopt the WBAN Polling Access and combine it with a time-synchronization middleware using time stamps. In our performance evaluations, time-synchronization performances with only WBAN Polling Access scheme are analyzed first. After that, performances combined with the time-synchronization middleware are analyzed to evaluate the effectiveness of proposed time-synchronization structure in WUSB over IEEE 802.15.6. 키워드 : 무선인체통신, 무선홈네트워크, 무선USB, 웨어러블컴퓨터, 유-헬스 | Workflow management techniques were developed in early 1990s,and its critical part was conceptual modeling.As a kind of graphical and mathematical modeling tools,Petri Net is applicable to the modeling requirement of workflow.A method of modeling for workflow based on Generalized Stochastic Petri Net(GSPN) is proposed and the validity and reliability is checked using reachable graph method.By utilizing the equivalence relation between GSPN and Markov chain,a method of combining GSPN and Markov chain is used to analyze the performance of workflow.The effectiveness of this method is verified by an application case,which will help to implement a workflow management system. | yue_Hant | 23,931 |
A New Cooperative Communication MAC Strategy for Wireless Ad Hoc Networks | Cooperative communication has emerged as a promising technique to enhance system reliability and performances in resource-limited wireless networks. In this paper, we propose a novel cooperative MAC strategy for slow fading Ad hoc networks. Based on cooperative MAC (CMAC) protocol and node cooperative stop and wait (NCSW) ARQ protocol, our node-cooperative retransmission scheme makes three points improvements as follows: 1) In order to avoid ambiguous ACK/NAK and diffusion of cooperation process, cooperative and non-cooperative frames are distinguished. 2) Traffic categories within each node are introduced so that cooperative frames can be sent firstly. 3) According to instantaneous channel conditions, the most appropriate node is selected to help the source node retransmit data. Both the analytical and the simulation results indicate that improved scheme can alleviate collision caused by cooperation and increase the probability of successful retransmissions further. | Remote observing with Caltech's millimeter wave array at the Owens Valley Radio Observatory (OVRO) is being extended to use the graphical capabilities commonly available on computers today. To allow the instrument to be clearly presented to the user, a rich interface has been developed that combines the use of color highlights, graphical representation of data, and audio. Java and internet protocols are used to extend this interface across the Web to provide remote access. Compression techniques are used to enable use over low bandwidth links. This paper presents the design goals, implementation details, and current status of this effort with emphasis on the monitoring of the array. | kor_Hang | 23,932 |
Rbfox proteins regulate alternative mRNA splicing through evolutionarily conserved RNA bridges | The Rbfox family of developmentally important splicing factors controls alternative splicing in a tissue-specific manner. Genome-wide analyses now show that more than half of Rbfox-binding sites are located distally from exons, that these distal sites are conserved and functionally important, and that long-range RNA-RNA secondary structures mediate distal splicing regulation by Rbfox. | Current mobile devices support multiple network technologies and network composition via such devices can enable service provisioning across heterogeneous networks. One of the key challenges for realizing this view is inter-domain routing. Indeed, given the diversity of involved network technologies and infrastructures, a flexible routing protocol that takes into account their quality properties and dynamics is an important requirement. In this paper, we present a flexible quality-aware routing protocol for infrastructure-less B3G environments that enables discovery of routes with optimal bandwidth, delay or cost according to the preference of each client. The protocol is based on the Optimized Link-State Routing (OLSR) protocol and is designed to enable computation of quality-aware routes in multi-network environments. We detail the protocol, discuss its deployment and provide experimental results. | eng_Latn | 23,933 |
Measuring and Assessing Road Profile by Employing Accelerometers and IRI Assessment Tools | This paper presents experimental studies from the road profile measurements by employing accelerometers and international roughness index - IRI assessment tools and practical guidelines with respect to measured acceleration data processing in terms of digital filter design and conversion of vertical acceleration data into displacement data. In addition, it shows comparative analysis of measurements with accelerometers and Rod & Level (Leica TS 06 Plus), and gives some recommendations how to process measured data. | Current mobile devices support multiple network technologies and network composition via such devices can enable service provisioning across heterogeneous networks. One of the key challenges for realizing this view is inter-domain routing. Indeed, given the diversity of involved network technologies and infrastructures, a flexible routing protocol that takes into account their quality properties and dynamics is an important requirement. In this paper, we present a flexible quality-aware routing protocol for infrastructure-less B3G environments that enables discovery of routes with optimal bandwidth, delay or cost according to the preference of each client. The protocol is based on the Optimized Link-State Routing (OLSR) protocol and is designed to enable computation of quality-aware routes in multi-network environments. We detail the protocol, discuss its deployment and provide experimental results. | eng_Latn | 23,934 |
Research on Agent-Based Model of Component Coordination | How to realize component coordination in the component assembly becomes a hotspot nowadays. Traditional coordination model can not adapt to the changing environment. Agent adapter coordination model will help a lot. This article proposes an Agent adapter coordination architecture, in which space is a shared component mapping store. This kind of architecture has outstanding flexibility and adaptability, which gives a good supporting to component assembly. | A protocol control system architecture that provides very high processing performance for gigabit-per-second data communication in a broadband network is described. The architecture connects protocol controllers in parallel and uses a distributed multilink method that features a distributed algorithm for allocating transmission on the transmitting side and a resequencing algorithm on the receiving side. The system performance and the influence of transmission errors caused by cell loss in an asynchronous transfer mode network are evaluated. It is shown that by reducing each controller's distributing overhead, the system increases throughput up to 90 times that achieved when using a single controller. > | eng_Latn | 23,935 |
Exchange interactions and giant magnetoresistance in magnetic multilayers | Abstract Magnetic layer structures consisting of alternating magnetic and non-magnetic layers exhibit new magnetic phenomena with great potential for applications in magnetic storage technology. It is found experimentally that the magnetic moments of neighbouring magnetic layers are spontaneously aligned ferromagnetically or antiferromagnetically depending on the thickness of the intervening nonmagnetic layers. This implies an oscillatory magnetic coupling between the layers mediated by the nonmagnetic spacer layers. The resistance of the structure when a current is passed in the direction parallel to the layers is much higher in the antiferromagnetic configuration than in the ferromagnetic one. The magnetic configuration of the layers, and hence the resistance of the structure, is strongly influenced by an applied magnetic field. This effect, called giant magnetoresistance, can be exploited to read information from a magnetic disc. The purpose of this review is to introduce the reader to magnetic multila... | Mobile Ad hoc Networks (MANETs) are very popular because of their widespread usage. In MANET, each node has to co-operate with each other to perform functions in the network. However some nodes do not participate in routing and forwarding packets which are not destined to them, in order to save their energy. Such misbehaving nodes which try to get benefitted from other nodes but refusing to forward other nodes packets can severely degrade the performance of the whole network. In MANETs, detection of such misbehaving nodes is very important. In this survey, a detailed study of misbehaving nodes, their characteristics and their effects in various layers of the network are discussed. Moreover, various detection schemes which deal with misbehaving nodes are also considered in the discussion. This paper discusses the different acknowledgement schemes for misbehaving node detection in MANETs. | eng_Latn | 23,936 |
Arthroscopically assisted reduction with volar plating or external fixation for displaced intra-articular fractures of the distal radius in the elderly patients. | Twenty-eight patients older than 70 years with AO type C fracture of the distal radius were treated with arthroscopically assisted reduction combined with volar plating or external fixation. The patients were followed up for an average of 24.9 +/- 16.1 months. The average score was 80.1 +/- 10.5 according to the modified system of Green and O'Brien. Eight patients had an excellent result, 11 had a good result, seven had a fair result, and two had a poor result. Twenty-three patients were able to return to their previous activities level or occupation without any restriction. On the basis of these results, we concluded that arthroscopically assisted reduction combined with volar plating or external fixation is one of the useful options for the treatment of a displaced intra-articular fracture of the distal radius in elderly patients who are physiologically young or active. | AX.25 protocol is the most widely used protocol in amateur packet radio network. It has existed for over 30 years and still exist today in a form of Automatic Packet Reporting System (APRS). APRS is widely used for exchanging real-time information in a shared RF environment. Conventional APRS is built on top of Bell 202 modem that is simple to implement but very inefficient regarding use of spectrum and transmitted power. LoRa modulation scheme can be implemented to extend APRS network to include LoRa based network for power constrained applications. This paper proposes using LoRa as a modem choice for APRS and the implementation of a KISS TNC based on LoRa. The prototype LoRa KISS TNC is operational and can be easily integrated with the existing APRS Internet Service network infrastructure. | eng_Latn | 23,937 |
Method of transmitting and receiving data in a multi radio access technology system using access point and apparatus thereof | PURPOSE: A data transmission and reception method in a multiple wireless connecting system and apparatus are provided to transmit data to a source apparatus by using one or more candidate cooperation terminals. CONSTITUTION: Plural apparatuses receive AP(Access Point) information from a neighboring AP(S1210). A base station respectively transmits a candidate cooperation apparatus role execution request to candidate cooperation apparatuses. The base station respectively receives the AP information from the candidate cooperation apparatuses(S1220). The source apparatus receives the AP information from the neighbor AP(S1230). The base station transmits information for one or more candidate cooperation apparatuses located at the neighbor AP to the source apparatus(S1250). | Increases in mobile device processing power, storage capacity, and connectivity in recent years have led to a rapid rise in mobile device use. But mobile users face challenges in making connections with other users in order to share resources. To address this issue, we propose an architecture that uses peer-to-peer protocol to establish a resource sharing platform for mobile devices, combined with a data grid to help analyze and classify resources. | eng_Latn | 23,938 |
Efficient Recovery From Organizational Disconnects in SkipNet | SkipNet is a scalable overlay network that provides controlled data placement and routing locality guarantees by organizing data primarily by lexicographic ordering of string names. A key side-effect of the SkipNet design is that all nodes from an organization form one or a few contiguous overlay segments. When an entire organization disconnects from the rest of the system, repair of only a few pointers quickly enables efficient routing throughout the disconnected organization; full repair is done as a subsequent background task. These same operations can be later used to efficiently reconnect an organization’s SkipNet back into the global one. | This paper explores IPv6 in mobile wireless sensor networks (WSNs). An indoor WSN mobile sensor network testbed of length 24m was built and used for mobile WSN testing. The test network enabled the use of one or two moving nodes and six stationary nodes. A Java based web application called WSNWeb was implemented that displays and records real-time route topology changes and received sensor data. We created 65 test cases with one or two moving nodes, with variable velocities, routing table update periods (RTUPs) and data packet transmission rates. The effect of these parameters on quality of service was measured in terms of packet loss and on time packet loss (OTPL), a novel quality of service metric introduced in this paper. Results indicate that 6LoWPAN can accommodate communication with acceptable packet loss among nodes moving at a walking pace with data transmission frequencies up to 10 Hz and a RTUP as fast as 0.6 s. The highest observed packet loss and OTPL was 2.97% and 0.87%, respectively. | eng_Latn | 23,939 |
A flexible QoS-aware routing protocol for infrastructure-less B3G networks | Current mobile devices support multiple network technologies and network composition via such devices can enable service provisioning across heterogeneous networks. One of the key challenges for realizing this view is inter-domain routing. Indeed, given the diversity of involved network technologies and infrastructures, a flexible routing protocol that takes into account their quality properties and dynamics is an important requirement. In this paper, we present a flexible quality-aware routing protocol for infrastructure-less B3G environments that enables discovery of routes with optimal bandwidth, delay or cost according to the preference of each client. The protocol is based on the Optimized Link-State Routing (OLSR) protocol and is designed to enable computation of quality-aware routes in multi-network environments. We detail the protocol, discuss its deployment and provide experimental results. | This paper implements the selection of roam path on 3 D digital terrain map with the selection mechanism, projection transform and coordination transform of OpenGL. Considering the dealing with spatial quads of graphics procession systems, it presents an interpolation algorithm based on grid digital terrain map. | eng_Latn | 23,940 |
Lattice decoding for joint detection in direct-sequence CDMA systems | A new joint detection method based on sphere packing lattice decoding is presented in this paper. The algorithm is suitable for both synchronous and asynchronous multiple access direct-sequence code-division multiple-access (DS-CDMA) systems, and it may jointly detect up to 64 users with a reasonable complexity. The detection complexity is independent of the modulation size and large M-PAM or M-QAM constellations can be used. Furthermore, a theoretical gain analysis is performed in which the multiple-access system performance is derived from the lattice parameters. | Various peer-to-peer (P2P) architectures for ad-hoc networks have been proposed over the last few years. Most of them are unstructured and use some form of flooding to locate content, because the physical constraints of the underlying network make the construction of arbitrary application-layer overlays impractical. In this paper, we study the problem of applying distributed hash tables (DHT) for mobile ad-hoc networks. Our approach to efficiently lookup content in such networks exploits physical proximity of peers when establishing and maintaining the DHT based routing tables. The efficiency of our method is demonstrated by simulation of large networks. | eng_Latn | 23,941 |
Concurrent Transmission Scheduling for Multi-Hop Multicast in Wireless Mesh Networks | In this paper, an innovative scheduling is designed for multi-hop multicast in wireless mesh networks, with utilization of concurrent transmission strategy. Since the performance of a multicast mechanism is constrained in a wireless setting due to the interference among local wireless transmissions, we analyze the interference relationships firstly among the transmissions by introducing a graph transformation method based on the multicast topology. Then, with consideration of interference relation, a capacity greedy algorithm is designed to provide concurrent transmission, which satisfies the time slots demanded by each transmission. Finally, we show that the proposed strategy can enhance the throughput of multi-hop multicast system efficiently through corresponding simulations. | We present a novel approach to the synchronization problem. It is a well-known fact that a problem of finding minimal (or: the shortest) synchronizing word (MSW) for a given synchronizing automaton is NP-complete. In this paper we present the genetic algorithm which tries, for a given automaton, to find possibly short word that synchronizes it. We use a modified version of a classical simple genetic algorithm (SGA). | eng_Latn | 23,942 |
Rhesus diploid rabies vaccine (adsorbed), a new rabies vaccine. II. Results of clinical studies simulating prophylactic therapy for rabies exposure. | Rhesus diploid-cell-strain rabies vaccine (RDRV) (adsorbed) is a new rabies vaccine intended for use in man. Sixty volunteers were given five doses of RDRV at 0, 3, 7, 14, and 28 days to simulate prophylactic treatment of persons exposed to a rabid animal. Thirty-five volunteers were given commercial high-titer rabies immune globulin, 20 IU/kg, before the first dose of RDRV, and 25 were given RDRV without prior rabies immune globulin. Antibody responses at 14, 28, and 42 days were comparable with those reported with human diploid rabies vaccine. Simulated postexposure prophylactic treatment with RDRV was associated with acceptable levels of local and constitutional symptoms. ( JAMA 1983;249:2663-2665) | A mobile Ad-hoc network consists of wireless nodes communicating with each other without the need for an external support or supervision, where all the moving nodes potential-ly contribute to the routing of data packets. Due to the free moving ability of the nodes in a ad hoc network model, there is a need of routing protocols which can adapt dynamically to the changing topology. In this project a routing protocol which can perform best in ad hoc mode with limited resource conditions like bandwidth, storage capacity, battery power, CPU capacity and storage capacity. Routing protocols Dynamic Source Routing (DSR), Destination Sequenced Distance Vector (DSDV), Optimized link state Routing (OLSR) and ad hoc on-demand distance vector (AODV) routing are simulated for this kind of scenario. The performances of these routing protocols are evaluated through PDR (Packet Delivery Ratio), Routing overhead, End to End Delay and Throughput. | eng_Latn | 23,943 |
Controlling the pink bollworm by disrupting sex pheromone communication between adult moths | The synthetic sex pheromone (gossyplure) of the pink bollworm was evaporated into the atmosphere of three cotton fields during an entire growing season. The resulting disruption of premating pheromone communication between male and female moths led to a reduction in the population of larvae infesting cotton bolls. This larval control was comparable, in terms of both effectiveness and expense of materials used, to the control achieved in ten comparison fields by growers using conventional insecticide applications. | DYMO is a novel routing protocol of MANET. However, it has not specified how to monitor the link, and part of dropped packets is due to the insensitive reaction of the routing protocol to broken link. In view of the above, this paper proposes that the link layer feedback could be used as the link monitoring mechanism of DYMO protocol, and simulation results show that the link layer feedback could help DYMO protocol largely reduce the delay of sensing broken link under small traffic scenario, inform the nodes using this broken link in the network that the relative route could not be used any more, thus lowering the amount of packet-drop due to the node using a failed route. | eng_Latn | 23,944 |
Distributed parameter estimation for monitoring diffusion phenomena using physical models | In this work, we address the problem of estimating parameters of diffusion phenomena via autonomous wireless sensor networks. Diffusion phenomena, such as the propagation of a gas in the air or of a chemical agent in the water, can be modeled by means of partial differential equations (PDE's). In several scenarios, the parameters characterizing such models, i.e. the coefficients of the PDE's, are not known a-priori and need to be estimated. We develop an adaptive approach for the distributed identification of the parameters of diffusion models for both the cases of known and unknown boundary conditions (BCs). The technique also applies to the case of spatially varying parameters. We present simulation results to show the performance and the various trade-offs of the method. | Most peer-to-peer systems are built upon the assumption that their running environment is homogeneous. However, for Internet-scale applications this assumption could lead to performance limitations. We propose a framework for building peer-to-peer systems which use performance monitoring techniques to adapt to changes in their environment. | eng_Latn | 23,945 |
An effective polling MAC scheme for IEEE 802.11e | In medium access control (MAC) protocols for wireless local area networks (WLANs), the round-robin scheme is the general polling scheme. A major drawback of this scheme is that it is inefficient when only a small number of stations have packets to transmit. This inefficiency is caused by polling of stations that have no packets to transmit. This paper proposes an effective and simple polling scheme to reduce the number of polling times for station with no packets to transmit. Our proposed scheme uses traffic characteristics and the number of successive polling times for a station with packets to transmit. Through the use of these values, the period of polling for a station can be adaptively changed. Therefore, this method improves the inefficiency of the polling for stations with no packets to transmit. | The invention discloses an MVB device status word transmission method based on load balance. Before bus resource allocation, all cyclic loads in a whole macrocycle are calculated according to allocation of application ports, calculation results are sequenced from small to large, and roll poling of a device status word is inserted in a low-load cycle in a single cycle according to the sequencing result. The method has the advantages that the principle is simple, network loads can be optimized, and correctness and stability of device state display are guaranteed. | yue_Hant | 23,946 |
Evaluation of the BSIM6 compact MOSFET model's scalability in 40nm CMOS technology | The aggressive downscaling of advanced bulk CMOS technologies demands MOSFET models that are able to describe accurately the behavior of devices accounting for all the physical phenomena. A reliable model should have the ability to handle all the different operating regions of the MOS transistor in the whole geometry range of one technology. Targeting to meet the aforementioned needs, the new charge-based compact model BSIM6 has been developed. In this article, as a first benchmarking of BSIM6, the model is evaluated for its scaling capabilities when a single set of parameters is used. The model is compared against a state-of-the-art 40nm CMOS technology. The results attest the model's scalability under all bias conditions, proving its reliability for nowadays complex IC designs. | This document describes a minimal mode of operation for an IPv6 over ::: the TSCH mode of IEEE 802.15.4e (6TiSCH) network. This minimal mode of ::: operation specifies the baseline set of protocols that need to be ::: supported and the recommended configurations and modes of operation ::: sufficient to enable a 6TiSCH functional network. 6TiSCH provides IPv6 ::: connectivity over a Time-Slotted Channel Hopping (TSCH) mesh composed ::: of IEEE Std 802.15.4 TSCH links. This minimal mode uses a collection ::: of protocols with the respective configurations, including the IPv6 ::: Low-Power Wireless Personal Area Network (6LoWPAN) framework, enabling ::: interoperable IPv6 connectivity over IEEE Std 802.15.4 TSCH. This ::: minimal configuration provides the necessary bandwidth for network and ::: security bootstrapping and defines the proper link between the IETF ::: protocols that interface to IEEE Std 802.15.4 TSCH. This minimal mode ::: of operation should be implemented by all 6TiSCH-compliant devices. | eng_Latn | 23,947 |
Management of Distributed Electrical Storage in Wide Area Communication Systems | Centralized electrical storage system management in islanded micro-grids is treated both theoretically and experimentally. An overview of the types of distributed islands in Wi-Fi Long Distance networks is the starting point, followed by examples of WiLDNets and associated reliability problems. Presentation of an archetypical tree structure communication system serves to introduce a centralized management system that may be used to improve reliability of multi-community private networks. An existing Wi-Fi long distance testbed with distributed storage serves as an islanded micro-grid for experimental study. Centralized management algorithms are tested. The results are generalized to the case of large meshed communication system. | A file sharing system based on Windows CE embedded platform have been realizes.The author optimized the system according to the characteristics of the specific embedded platform and proposed two kinds of optimization.The problem of slow-speed I/O operation in the embedded platform is solved by efficient utilization of the memory resource.And the problem of limited Socket numbers is solved by improving the queue algorithm.Test results show that the performances of the system have been effectively improved by using these two optimization methods.And the downloading speed of files is enhanced in the improved system. | eng_Latn | 23,948 |
Network Centric Warfare and the Joint Forces Air Component Commander | Abstract : The JFACC concept rests on the belief that aircraft possess a unique ability to reach the deep battle and need to be centrally controlled and coordinated. Today, however, the JFACC controls more than just aircraft. The JFACC staff continues to grow to accommodate controlling and coordinating new technologies. In reality, the ability of aircraft to reach and influence the deep battle is no longer unique. It applies to a myriad of weapons, sensors, and information. A network centric automated system is better suited to control and coordinate these assets. Such a system would be able to absorb the functions of JFACC as a subset of functions performed. The system would be far streamlined and much more efficient than the JFACC. This system is interactive and fuses all information, weapons, and sensors into a common situational picture for all users. This system is a battlespace system. | Abstract Mobile networks have experienced a sharp expansion in the population of mobile clients/subscribers. Such growth incurs additional expending of the bandwidth resources for network cost management. For future PCS (Personal Communication Services) networks, it is desirable to devise mobile networks that make resourceful use of the limited radio bandwidth. Effective mobility and location management is a way to realize such efficiency. This paper surveys different location management strategies and cost planning for personal communication systems. The stress is on how to minimize both the location update and paging costs from the wireless and wired networks. | eng_Latn | 23,949 |
Modified distributed quality-of-service routing in wireless mobile ad-hoc networks | The QoS routing is a key function for the transmission and distribution of multimedia traffic across networks. However, their application in ad hoc networks is difficult because of the ever-changing nature of the network topology, and the inherently imprecision of routing state information. In this paper an efficient distributed routing algorithm based on the ticket based probing algorithm is proposed. The proposed algorithm presents an efficient solution for the problem of message overhead through the application of two modified termination strategies and data structures. Simulation results have shown better performance over the original algorithm. | We analyze the parallelization of QR factorization by means of Householder transformations. This parallelization is carried out on a machine with a mesh topology (a 2-D torus to be more precise). We use a cyclic distribution of the elements of the sparse matrix M we want to decompose over the processors. Each processor represents the nonzero elements of its part of the matrix by a one-dimensional doubly linked list data structure. Then, we describe the different procedures that constitute the parallel algorithm. As an application of QR factorization, we concentrate on the least squares problem and finally we present an evaluation of the efficiency of this algorithm for a set of test matrices from the Harwell-Boeing sparse matrix collection. | eng_Latn | 23,950 |
IMMUNO-HISTOCHEMICAL LOCALIZATION OF TISSUE POLYPEPTIDE ANTIGEN (TPA) AND CARCINO-EMBRYONIC ANTIGEN (CEA) IN BREAST CANCER | The presence of Tissue Polypeptide Antigen (TPA) and Carcino-embryonic Antigen (CEA) in serial sections of 32 breast carcinomas and one case of neurofibrosarcoma was demonstrated by immunocytochemistry using the indirect peroxidase technique. The neurofibrosarcoma was negative for TPA and CEA. All 32 specimens of breast cancer were positive for TPA and/or CEA. In 12 cases the staining was strongly positive for both TPA and CEA. In other cases either TPA or CEA was more abundant in the tumor. The overall concordance of staining was 58%, which is in relative agreement with the correlation between values for TPA and CEA in serum from patients with breast cancer. The finding that in addition to the difference between tumors, there was a difference within tumors was interesting. This indicated that TPA and CEA may be synthesized during partly different phases of the proliferative cycle. | IEEE 802.15.3 is expected to play a significant role in the Internet of Things IoT. It is developed for high-rate communication between low-power devices in a Wireless Personal Area Network WPAN. The standard defines Medium Access Control MAC and physical layer protocols that support real-time communication over an area of ten square metres. IEEE 802.15.3 MAC consists of a combination of Carrier Sense Multiple Access/Collision Avoidance CSMA/CA and Time Division Multiple Access TDMA protocols. The channel is divided into superframe structures where each superframe consists of a beacon, a Contention Access Period CAP and a Channel Time Allocation Period CTAP. In this paper we analyse the performance of the CAP period using both analytical and simulation-based methods. We simulate CSMA/CA protocol in the CAP period using NS-2. The simulation results are compared with those obtained from analytical approximations in terms of different parameters including throughput and optimal CAP periods. | yue_Hant | 23,951 |
EERP: Energy-Efficient Relay Node Placement for k-Connected Wireless Sensor Networks Using Genetic Algorithm | In this article, we propose relay node placement for providing k-connectivity to randomly deployed sensor nodes with energy efficacy using Genetic Algorithm (GA). Here, we also explain the basic step of GA with suitable examples. Also, we carried out the extensive simulations to study proposed algorithm’s performance with existing one in terms of number of deployed nodes and lifetime of the network. | Using GPS and GIS technology, the next generation of ERP (Electronic Road Pricing) system, are designed in this paper. The structure and approaches of the system has also been presented. The next generation of ERP system has resolved the issues of traditional ERP system, such as, high cost, unavailable for wide range of application. And, The new system not only more consistent with road pricing principles and objectives of reducing traffic congestion and air pollution, but also more flexible for the integration of ERP system with other Intelligent Transportation Systems (ITS). The paper also elaborated the key technical issues of the system. | eng_Latn | 23,952 |
Multiple Odontogenic Keratocysts | Odontogenic keratocyst is a cyst of odontogenic origin that exhibits a keratinized epithelial lining. Odontogenic keratocyst has been the topic of numerous investigators and is known for its potentially aggressive behavior and significant rate of recurrences. 1 OKC cyst often occurs as a solitary lesion at the angle of the mandible, however in some instances, multiple such cysts may occur in association with a syndrome called “Nevoid basal cell syndrome”. 1 These patients have propensity to develop multiple neoplasm including basal cell carcinoma and medulloblastoma. Hence early diagnosis and treatment is of utmost importance in reducing the severity of long-term sequelae of this syndrome. Here we present a case of multiple odontogenic keratocysts with nevi and narrowed ribs which has profound relevance to specialist in Oral Medicine and Radiology and Oral and Maxillofacial Surgery. | Recent routing/multicast protocols in large-scale mobile ad-hoc networks (MANETs) adopt two-tier infrastructures by selecting backbone hosts (BHs) in order to avoid the inefficiency of the flooding. Further, previous MANET quality-of-service (QoS) routing/multicasting protocols determined bandwidth-satisfied routes for QoS applications. However, they suffer from two bandwidth-violation problems. In this paper, a novel algorithm that can avoid the two problems is proposed and integrated with the two-tier infrastructures to construct bandwidth-satisfied multicast trees for QoS applications in large-scale MANETs. | eng_Latn | 23,953 |
Neue chemotherapeutisch-aktive 4-trifluormethylpyrimidine | Abstract Condensation of N -(2-hydroxyethyl)- N -methylguanidine sulfate with various β-diketonesbearing 1,1,1-trifluoromethyl substituents leads to 2-[ N -(2-hydroxyethyl)-methylamino]-4-trifluoromethylpyrimidine derivatives. These compounds exhibit antimycotic, trichomonazide and anti-HIV properties. | The technology of Internet of Things is gradually maturing. IoT has applied in many fields and extended to industrial networks. Thus, the IETF has proposed 6TiSCH (IPv6 over the TSCH mode of IEEE 802.15.4e) to establish the link between Internet and IWSNs (Industrial Wireless Sensor Networks). The main purpose of this research is to enhance the performance of Multi-hop 6TiSCH network by using the proposed Priority-based Fast Forward Scheduling Function (PFFSF). According to the simulation results, the proposed PFFSF has lower end-to-end transmission delay and higher throughput then the original 6TiSCH SF0 mechanism. | deu_Latn | 23,954 |
The Throughput Capacity of Cluster CDMA Wireless Ad Hoc Networks | This paper addresses the upper bound of throughput capacity of cluster CDMA wireless Ad Hoc networks,and draws the conclusion that the upper bound throughput capacity is Θ(n 1/2)if there is no overlapping cluster of the networks,and in the other hand,the upper bound throughput capacity is Θ(1/logn)if there is partial overlapping cluster of the networks. | A file sharing system based on Windows CE embedded platform have been realizes.The author optimized the system according to the characteristics of the specific embedded platform and proposed two kinds of optimization.The problem of slow-speed I/O operation in the embedded platform is solved by efficient utilization of the memory resource.And the problem of limited Socket numbers is solved by improving the queue algorithm.Test results show that the performances of the system have been effectively improved by using these two optimization methods.And the downloading speed of files is enhanced in the improved system. | eng_Latn | 23,955 |
Schistosomiasis prophylaxis in vivo using N,N-diethyl-m-toluamide (DEET). | Topical N,N-Diethyl-m-toluamide (DEET) was studied as a schistosomiasis prophylactic in vivo for the use of individuals with limited exposure. Fifteen subjects, on a 3-week expedition to Lake Malawi in September 2001, applied 50% DEET to their skin after exposure to lake water. No subjects developed evidence of a new infection at 3-month follow-up. | In Delay Tolerant Networks (DTNs), network partitioning is likely to happen due to sparse and mobile nodes with limited transmission ranges. The network partitioning leads to the unavailability of fully connected paths from sources to destinations. To deal with this problem, many routing schemes are proposed such as Epidemic routing and Spray and Wait routing. These schemes obtain high delivery rate but incur high overhead. In this paper, we propose a Different Neighbor-History Spray and Wait (DNH-SaW) routing scheme. DNH-SaW calculates the number of data copies to forward based on the neighbor-history of each receiver. Our simulation result shows that DNH-SaW can reduce overhead up to 27% and increases delivery utility up to 21.68% while achieving comparable delivery probability with previous works. | eng_Latn | 23,956 |
An Energy Efficient Algorithm for Connected Dominating Set in Unidirectional Wireless Ad-Hoc Networks | In wireless ad-hoc networks,routing based on connected dominating set is a promised approach,where the searching space for route is reduced to nodes in the dominating set.But most of the algorithms can’t work well in unidirectional wireless ad-hoc networks.To the fact of the unidirectional links in wireless ad hoc networks we propose a maximal weighted algorithm for minimum connected dominating set. Also, we improve the correctness of the algorithm. Simulation results show that proposed approach can ensure the fewer nodes to form connected dominating set. | A new trend in home automation is to integrate audio en video applications. However in current domotics systems, these are usually conFigured statically. We implemented a home automation tool that dynamically (re)schedules bandwidth for different types of multimedia streams with different constraints toward latency and quality. The dynamic scheduling problem was implemented using distributed agents negotiating for bandwidth using the contract-net negotation protocol. | eng_Latn | 23,957 |
MAC Protocol for Wireless Network on Chip | In this paper, analysis of efficient medium access control (MAC) protocol for resolving channel contention and minimizing collision probability through consideration of different WNoC architectures is discussed. In this analysis we study the different channel access mechanisms for WNoC in our proposed architecture. Further we also discussed some possible architectures for WNoC. | A file sharing system based on Windows CE embedded platform have been realizes.The author optimized the system according to the characteristics of the specific embedded platform and proposed two kinds of optimization.The problem of slow-speed I/O operation in the embedded platform is solved by efficient utilization of the memory resource.And the problem of limited Socket numbers is solved by improving the queue algorithm.Test results show that the performances of the system have been effectively improved by using these two optimization methods.And the downloading speed of files is enhanced in the improved system. | kor_Hang | 23,958 |
The Basic Features of "Maoism" Strategy | The basic contents of "Maoism", embodied in the social structure with peasants as the main body, are to establish, in light with the organizational principles of Leninism, an energetic Party whose members believe in the basic rules of Marxism and Leninism. Thus, this thought system is different from the Soviet Union' s Bolshevik with working class as the main body. Due to its outstanding creativity of thought, Mao Zedong Thought has become an independent school of Marxism and Leninism in the Orient. | Recent routing/multicast protocols in large-scale mobile ad-hoc networks (MANETs) adopt two-tier infrastructures by selecting backbone hosts (BHs) in order to avoid the inefficiency of the flooding. Further, previous MANET quality-of-service (QoS) routing/multicasting protocols determined bandwidth-satisfied routes for QoS applications. However, they suffer from two bandwidth-violation problems. In this paper, a novel algorithm that can avoid the two problems is proposed and integrated with the two-tier infrastructures to construct bandwidth-satisfied multicast trees for QoS applications in large-scale MANETs. | kor_Hang | 23,959 |
Analysis and Thinking of Discipline Construction of Public Cause Management Specialty (Sports Management Orientation) in Physical Education Colleges | AbstrcatWith the development of education, public cause management are developing in different direction, including education management, sports management, management of art and literature, environmental economy and management, management of city community, and so on. The main difference between public cause management specialty and traditional administration management specialty is that the former stresses to settle the practical problems using the theory of economy and method of quantity, except presenting problem from the aspect of politic and society. Sports Management faces the new contents and the new situation of market economy. The article indicates how to construct public cause management specialty (sports management orientation) in market economy situation from a new angle. | Abstract Mobile networks have experienced a sharp expansion in the population of mobile clients/subscribers. Such growth incurs additional expending of the bandwidth resources for network cost management. For future PCS (Personal Communication Services) networks, it is desirable to devise mobile networks that make resourceful use of the limited radio bandwidth. Effective mobility and location management is a way to realize such efficiency. This paper surveys different location management strategies and cost planning for personal communication systems. The stress is on how to minimize both the location update and paging costs from the wireless and wired networks. | eng_Latn | 23,960 |
Mobile ad-hoc network data communication in large geographic areas | A mobile ad-hoc network (MANET) is a group of wireless, mobile, battery-powered clients and servers that autonomously form temporary networks. Three data communication modes can be provided in a MANET: data broadcast, data query, and peer-to-peer messaging. In support of data communication needs in these networks, a database is utilized for data broadcast and data query. This paper presents the TriM protocol (tri-modal communication) to handle data communication in a MANET. TriM accommodates node disconnection and reconnection through periodic synchronization while having minimum power consumption. This protocol has been shown capable of allowing all three data communication modes in a single network deployment in small geographic regions. This paper extends those results by evaluating TriM in the larger geographic regions present in the military scenario. Simulation shows that TriM is capable of providing power-aware and mobile-aware data communication services in the larger regions of the military scenario | In this article we will show you how to carry out the water charging system,used in LAN,including it's main structure,designing conception as well as the key technology to solve several problems we met.We emphasized the way to realize a Client/Server structured MIS based on DB.Finally we will tell you how to carry out this system,which is developed in C++Builder IDE,in detail. | eng_Latn | 23,961 |
Applying the Small World Concepts in the Design of Heterogeneous Wireless Sensor Networks | We propose a model to design heterogeneous sensor network topologies with small world features based on the Kleinberg model. The proposed model considers the data communication flow in this kind of network to create network shortcuts toward the sink node in a way that the communication between the sink and the sensor nodes is optimized. The end-points of these shortcuts are nodes with more powerful hardware, leading to a heterogeneous sensor network. Simulation results show that, when the shortcuts are created toward the sink node, with a few powerful sensors, the network presents better small world features and the latency is reduced in the data communication when compared with the original Kleinberg model. | We present a novel approach to the synchronization problem. It is a well-known fact that a problem of finding minimal (or: the shortest) synchronizing word (MSW) for a given synchronizing automaton is NP-complete. In this paper we present the genetic algorithm which tries, for a given automaton, to find possibly short word that synchronizes it. We use a modified version of a classical simple genetic algorithm (SGA). | eng_Latn | 23,962 |
Spontaneous rupture of an adrenal adenoma managed by laparoscopic adrenalectomy: a case report. | Spontaneous rupture of an adrenal adenoma is a rare condition. This case report describes spontaneous rupture of the right adrenal adenoma in the women that presented with acute abdominal pain. Early suspicion of this condition, effective imaging, and prompt treatment should save the patient. Urgency laparoscopic adrenalectomy is a safe and feasible option. | A mobile Ad-hoc network consists of wireless nodes communicating with each other without the need for an external support or supervision, where all the moving nodes potential-ly contribute to the routing of data packets. Due to the free moving ability of the nodes in a ad hoc network model, there is a need of routing protocols which can adapt dynamically to the changing topology. In this project a routing protocol which can perform best in ad hoc mode with limited resource conditions like bandwidth, storage capacity, battery power, CPU capacity and storage capacity. Routing protocols Dynamic Source Routing (DSR), Destination Sequenced Distance Vector (DSDV), Optimized link state Routing (OLSR) and ad hoc on-demand distance vector (AODV) routing are simulated for this kind of scenario. The performances of these routing protocols are evaluated through PDR (Packet Delivery Ratio), Routing overhead, End to End Delay and Throughput. | eng_Latn | 23,963 |
Multi-Mode Elastic Peak Electron Microscopy (MM-EPEM): a new imaging technique with an ultimate in-depth resolution for surface analysis | A non-destructive new imaging technique called Multi-Mode Elastic Peak Electron Microscopy (MM-EPEM), hypersensitive to surface chemistry and with an in-depth resolution of one atomic monolayer was developed. This method consists on performing several MM-EPEM images containing n × n pixels associated to an intensity of the elastic backscattered electrons by varying the incident electron energy in the range 200-2000 eV. This approach allows obtaining depth sampling information of the analyzed structures. Furthermore, MM-EPEM is associated with Monte-Carlo simulations describing the electron pathway in materials in order to obtain very precise quantitative information, for instance the growth mode and the organization of ultra-thin layers (2D materials) or nanoparticules. In this work, we used this new method to study the deposition of very small amount of gold down to one monolayer. Example of 3D reconstruction is also provided. | This paper presents a network architecture for supporting edge mobility, and goes on to consider IP networks in which the core topology is fixed but where the hosts at the edge of the network may be mobile, as is the case in cellular networks. Within this architecture, mobile enhanced routeing (MER) protocols are used to support the prefix-routed requirements of the fixed Internet, along with the movement of IP addresses allocated to mobile nodes. Specific components for the support of such edge mobility (EMA:MER) are then outlined; these offer fixed/mobile IP network convergence, homogeneous IP handoff across heterogeneous access technologies, and inter-domain roaming across heterogeneous large-scale IP domains. | eng_Latn | 23,964 |
Só o receptor salva a comunicação | Th e book shows how the apparent triumph of communication in the modern societies has become a factor for its own weakness. While the functional dimension of communication has quickly fl ourished in the last 50 years, its normative dimension, responsible for the social bounds and the creation of a common project for the democratic societies, has been kept atrophied. To equilibrate both dimensions, avoiding that incommunication leads to the breakdown of democracy, we need to turn our attention to the receptor of communication, emphasizing respect and cohabitation among the cultures of our globalized world. | A main challenge in the field of sensor networks is energy efficiency to prolong the sensor's operational lifetime. Due to low-cost hardware, nodes' placement or hardware design, recharging might be impossible. Since most energy is spent for radio communication, many approaches exist that put sensor nodes into sleep mode with the communication radio turned off. In this paper, we propose a new Topology and Energy Control Algorithm called TECA. We will show the performance of TECA by means of extensive simulations compared to two other approaches. In terms of operational lifetime, packet delivery and network connectivity, TECA shows promising results. Unlike many other simulations, we use an appropriate link loss model that was verified in reality. By measuring packet delivery rates, TECA is able to adapt to different environments while still maintaining network connectivity. | por_Latn | 23,965 |
Brief announcement: k-shot distributed broadcasting in radio networks | We study distributed broadcasting protocols with few transmissions ('shots') in radio networks with unknown topology. In particular, we examine the case in which a bound k is given and a node may transmit at most k times during the broadcasting protocol. We focus on almost oblivious algorithms for k-shot broadcasting, that is, algorithms where the nodes decide whether to transmit or not with very little consideration of the transmission history. In this context, we show a lower bound of Ω(n2/k) on the broadcasting time of any almost oblivious k-shot broadcasting algorithm. We also present an almost oblivious protocol that matches the above lower bound for every k≤√n. | This paper documents some tests of 802.11b wireless communication technology for vehicle to roadside communication. Data has been collected for a single vehicle communicating with a dedicated roadside antenna. The work is part of a larger effort to benchmark possible throughput of off-the-shelf wireless technologies. The results show that high-speed communication is possible over distances of up to 1 kilometer. | eng_Latn | 23,966 |
Research of Routing Protocol Selection Method in Tactical Internet | Ad Hoc network technology is an important technology in tactical Internet networking. It is a key issue to select the appropriate tactics of the Internet protocol among the many self-organizing routing protocols. This paper introduces the Ad Hoc routing protocols,has a simple analysis of the network characteristics and service features and major network indicators in Tactical Internet. At the last,a method to select feasible routing protocols in a variety of Internet routing protocols is put out. | We have read with interest the article by Kwiatkowski and colleagues ([1][1]) reporting mTOR pathway activating mutations as possible predictors of mTOR inhibitor response in renal cell carcinoma (RCC). Recent evidence indicate inferior global efficacy of rapalogs compared with new agents; however, | eng_Latn | 23,967 |
A novel chipless RFID-based stretchable and wearable hand gesture sensor | The continuous monitoring of hand gestures is a very challenging application due to the demanding requirements for robustness, accuracy, efficiency and cost effectiveness. Although several vision-based gesture sensors have made good progress in human action recognition, the human hand is a smaller object with more dexterity and is more easily affected by segmentation errors. In this paper, we present a novel chipless RFID-based hand gesture sensor utilizing stretchable silicone-based electrically conductive adhesives (silo-ECAs) which effectively create a “smart-skin”. The hand sensor uses wearable multi-resonator spectral signatures to encode data and to provide a unique ID for every hand gesture. | Current mobile devices support multiple network technologies and network composition via such devices can enable service provisioning across heterogeneous networks. One of the key challenges for realizing this view is inter-domain routing. Indeed, given the diversity of involved network technologies and infrastructures, a flexible routing protocol that takes into account their quality properties and dynamics is an important requirement. In this paper, we present a flexible quality-aware routing protocol for infrastructure-less B3G environments that enables discovery of routes with optimal bandwidth, delay or cost according to the preference of each client. The protocol is based on the Optimized Link-State Routing (OLSR) protocol and is designed to enable computation of quality-aware routes in multi-network environments. We detail the protocol, discuss its deployment and provide experimental results. | eng_Latn | 23,968 |
Weather Information System for Farmers Based on WAP Technology | The WAP application is an application that is accessed via mobile device over a wireless ::: network; this technology has been rapidly growing and distributed in different ::: environments and has basically affected our lives directly and indirectly. This study ::: carried out an investigation into the Weather Information System for Farmers based on ::: WAP Technology to simplify the weather queries via the mobile device. Furthermore the ::: proposed application would be able to save the time and effort of the farmers in checking ::: the required weather changes. The WAP Weather Information System was developed ::: based on WML and ASP mobile programming architecture; furthermore, the usability ::: testing results were obtained to determine the system usefulness. Finally, the WAP ::: Weather Information System may help the farmers by providing them with useful ::: functions, such as weather news, product price, and local news. | Abstract Mobile networks have experienced a sharp expansion in the population of mobile clients/subscribers. Such growth incurs additional expending of the bandwidth resources for network cost management. For future PCS (Personal Communication Services) networks, it is desirable to devise mobile networks that make resourceful use of the limited radio bandwidth. Effective mobility and location management is a way to realize such efficiency. This paper surveys different location management strategies and cost planning for personal communication systems. The stress is on how to minimize both the location update and paging costs from the wireless and wired networks. | eng_Latn | 23,969 |
Improved algorithm of TCP congestion control in multi-hop Ad Hoc networks | To improve the performance of the transmission control protocol in wireless mobile communications network environment, and reduce network congestion, the reason of data lost in Ad Hoc network supporting web communication is discussed.An improved TCP algorithm is discussed.Finally, our research work is summarized, and some perspectives are done for the future work.The simulation results showed that improved TCP congestion control mechanisms is able to significantly enhance the web communication performance and avoid the network congestion in the wireless Ad Hoc network. | We study a new technique for optimal data compression subject to conditions of causality and different types of memory. The technique is based on the assumption that some information about compressed data can be obtained from a solution of the associated problem without constraints of causality and memory. This allows us to consider two separate problem related to compression and de- compression subject to those constraints. Their solutions are given and the analysis of the associated errors is provided. Keywords—stochastic signals, optimization problems in signal processing. | eng_Latn | 23,970 |
Fatigue Performance Experimental Research of Pre-stress OFRP Reinforcing Bridge Structure | Humdrum static load experiment and fatigue experiment were made on two groups of carbon fiber, the carbon fiber reinforced with plastics and the carbon fiber reinforced with girder, under different pre-stress levels to investigate fatigue load of fatigue experiment girder and the expansion of crack under each load rank acting, the strain and displacement. And the crack load, yielding load and ultimate load are obtained. Results show that with the increasing of pre-stress level, width and length of the crack decrease. Meanwhile, the displacement decreases obviously too. The yielding load and the ultimate load and the ultimate load have different increments. | Current mobile devices support multiple network technologies and network composition via such devices can enable service provisioning across heterogeneous networks. One of the key challenges for realizing this view is inter-domain routing. Indeed, given the diversity of involved network technologies and infrastructures, a flexible routing protocol that takes into account their quality properties and dynamics is an important requirement. In this paper, we present a flexible quality-aware routing protocol for infrastructure-less B3G environments that enables discovery of routes with optimal bandwidth, delay or cost according to the preference of each client. The protocol is based on the Optimized Link-State Routing (OLSR) protocol and is designed to enable computation of quality-aware routes in multi-network environments. We detail the protocol, discuss its deployment and provide experimental results. | eng_Latn | 23,971 |
Evolution of CCITT numbering plans and network interworking | Abstract While CCITT Recommendation X.121 (International Numbering Plan for Public Data Networks) played a key role in the evolution of modern computer communications, there have been recognized needs to enhance the capability of X.121 to meet new requirements, namely, to interwork with other networks. The prime intent of this paper is to present the latest progress of CCITT work on the International Numbering Plan for Public Data Networks and related activities. The rationale for modifications and future requirements are addressed. | An algorithm for improving connectivity between an infrastructure and mobile terminals is proposed based on IEEE 802.11p/WAVE for infotainment services. We improve the connectivity with the cooperation of neighbor terminals. | eng_Latn | 23,972 |
Wireless Sensor Platform: Creating an Ubiquitous and Automated Real Time Environment | Wireless Sensor Networks (WSN) are used in variety of fields which includes military, healthcare, environmental, biological, home and other commercial applications. With the huge advancement in the field of embedded computer and sensor technology, Wireless Sensor Networks (WSN), which is composed of several thousands of sensor nodes which are capable of sensing, actuating, and relaying the collected information, have made remarkable impact everywhere? This paper presents an overview of the various WSN based applications. | A file sharing system based on Windows CE embedded platform have been realizes.The author optimized the system according to the characteristics of the specific embedded platform and proposed two kinds of optimization.The problem of slow-speed I/O operation in the embedded platform is solved by efficient utilization of the memory resource.And the problem of limited Socket numbers is solved by improving the queue algorithm.Test results show that the performances of the system have been effectively improved by using these two optimization methods.And the downloading speed of files is enhanced in the improved system. | eng_Latn | 23,973 |
Homotopy theory of dihedral and quaternionic sets | Abstract Call a map f : A→B of O (2)-spaces a weak equivalence if f H :A H →B H is a weak homotopy equivalence for all finite cyclic and dihedral subgroups H ⊆ O (2). We show that the resulting homotopy category is equivalent to the homotopy category of dihedral sets with suitable weak equivalences. There is a similar relation between Pin(2)-spaces and quaternionic sets. | In wireless ad-hoc networks,routing based on connected dominating set is a promised approach,where the searching space for route is reduced to nodes in the dominating set.But most of the algorithms can’t work well in unidirectional wireless ad-hoc networks.To the fact of the unidirectional links in wireless ad hoc networks we propose a maximal weighted algorithm for minimum connected dominating set. Also, we improve the correctness of the algorithm. Simulation results show that proposed approach can ensure the fewer nodes to form connected dominating set. | eng_Latn | 23,974 |
Digital VLSI Implementation of Piecewise-Affine Controllers Based on Lattice Approach | This paper presents a small, fast, low-power consumption solution for piecewise-affine (PWA) controllers. To achieve this goal, a digital architecture for very-large-scale integration (VLSI) circuits is proposed. The implementation is based on the simplest lattice form, which eliminates the point location problem of other PWA representations and is able to provide continuous PWA controllers defined over generic partitions of the input domain. The architecture is parameterized in terms of number of inputs, outputs, signal resolution, and features of the controller to be generated. The design flows for field-programmable gate arrays and application-specific integrated circuits are detailed. Several application examples of explicit model predictive controllers (such as an adaptive cruise control and the control of a buck–boost dc–dc converter) are included to illustrate the performance of the VLSI solution obtained with the proposed lattice-based architecture. | For achieving the optimal performances and the longest lifetime of wireless sensor networks,the design of network routing protocol is very important.This paper analyzes many challenges of wireless sensor network routing protocol,and then discusses the well-known LEACH routing protocol and its evolution protocols HEED and PEGASIS in wireless sensor networks.Based on theoretical analysis,it compares comprehensively the performances such as network lifetime and delay of these routing protocols,and presents the corresponding simulation process and results. | eng_Latn | 23,975 |
Double-sheath helices: Leaky-wave antenna | A leaky-wave antenna whose radiation pattern is uniform in circumference is made of double-sheath helices. The fundamental characteristics of this antenna are discussed theoretically and experimentally. A method which produces a tapered field along its aperture to effect reduced sidelobe level, and the relationship between the dielectric supporter for the sheath helices and the wavenumber are also discussed. | For achieving the optimal performances and the longest lifetime of wireless sensor networks,the design of network routing protocol is very important.This paper analyzes many challenges of wireless sensor network routing protocol,and then discusses the well-known LEACH routing protocol and its evolution protocols HEED and PEGASIS in wireless sensor networks.Based on theoretical analysis,it compares comprehensively the performances such as network lifetime and delay of these routing protocols,and presents the corresponding simulation process and results. | eng_Latn | 23,976 |
May 1, 2006On the Feasibility of DHT Lookup in Ad-Hoc Networks | Various peer-to-peer (P2P) architectures for ad-hoc networks have been proposed over the last few years. Most of them are unstructured and use some form of flooding to locate content, because the physical constraints of the underlying network make the construction of arbitrary application-layer overlays impractical. In this paper, we study the problem of applying distributed hash tables (DHT) for mobile ad-hoc networks. Our approach to efficiently lookup content in such networks exploits physical proximity of peers when establishing and maintaining the DHT based routing tables. The efficiency of our method is demonstrated by simulation of large networks. | In this article we will show you how to carry out the water charging system,used in LAN,including it's main structure,designing conception as well as the key technology to solve several problems we met.We emphasized the way to realize a Client/Server structured MIS based on DB.Finally we will tell you how to carry out this system,which is developed in C++Builder IDE,in detail. | eng_Latn | 23,977 |
Effect of CrRu underlayer on the magnetic, recording, and thermal stability characteristics of CoCrPtTa thin film media | The effects of CrRu underlayers on the grain size, lattice matching, magnetic, recording and thermal stability characteristics for CoCrPtTa thin film media are presented, CrRu/sub 10/ and CrRu/sub 20/ underlayers produced about 800-960 Oe higher coercivity compared to media with a Cr underlayer. At 300 kfci recording density the CoCrPtTa/CrRu media has about 10-15% lower media noise and about 1-1.5 dB higher SNR compared to the similar media with Cr underlayer. X-ray diffraction data suggest somewhat better lattice matching between the CoCrPtTa/CrRu media due to the addition of Ru to the Cr underlayer compared to CoCrPtTa/Cr media. The CoCrPtTa/CrRu media has an average grain size of 12 nm in comparison to the average grain size of 15 nm for the CoCrPtTa/Cr media. The thin film media with CrRu/sub 10/ underlayer has smaller grain size but similar thermal stability performance compared to Cr underlayer. | Wireless video multicasting/broadcasting is an efficient method for simultaneous transmission of data to a group of users. But the multicasting rates are fixed in current IEEE 802.11 PHYs standard. In this paper, we propose a novel collision-detection based rate-adaptation scheme (CDRA), which fully exploits the potential of rate adaptation capability of wireless physical layer, to improve service qualities of video multicasting. The received signal strength indication (RSSI) and packet error ratio (PER) are comprehensively used to detect collision. The PER-guided rate adjustment algorithm is performed when no collision happens. Otherwise the collision-avoid mechanism works. By detecting the collision, our scheme could adaptively select the maximum data rates for video multicasting. We construct a practical multicasting test-bed in IEEE 802.11b network and carry out extensive experiments. The results show that CDRA achieves throughput gain up to 166% and PSNR gain to 139% compared with existing methods. | eng_Latn | 23,978 |
Implementation of a distributed management system using Java | We introduce an alarm management system based on management by delegation paradigm (MbD) which provides the operator with an integrated and homogeneous environment in which different types of alarms exist. The platform chosen was Java owing to its special features (code mobility, platform independency, distributed capabilities, etc.). This system provides the programmer with a flexible, modular and robust environment where the functionality of the system can be increased dynamically without having to alter any part of it. This system overcomes most of the limitations inherent to centralised systems. Some of the key characteristics of the system are: protocol integration, the use of an RDBMS to enhance the information about alarms, multi-user monitoring through an intuitive GUI applet with several permission constraints. | A number of multifunction sensors deployed randomly with limited energy is one character of wireless sensor networks, so energy efficient is a critical factor in sensor network design. In this literature, we present a clustering protocol based on Virtual Area Partition using Double Cluster Heads scheme (VAP-DCH) for wireless sensor networks, which partitions the network and selects a Main Cluster Head (MCH) and a Vice Cluster Head (VCH) in each cluster adaptively. The simulation results show that the protocol we presented improves the system performance, prolongs the network lifetime and transfers more data to the base station.. | eng_Latn | 23,979 |
Cutting management of willows (Salix spp.) and leguminous shrubs for forage during summer | Abstract An experiment was conducted to determine the potential value of shrubs for providing fodder for ruminants during periods of feed insufficiency. The work was undertaken at a moist and a dry site in the lower North Island of New Zealand in 1992/93 with four shrub species: Chamaecytisus palmensis (tagasaste); Dorycnium rectum (erect dorycnium); Salix kinuyanagi (kinuyanagi willow); and Salix matsudana x alba (hybrid willow). Five cutting regimes were adopted which varied in cutting frequency and height, with. the latter being either a low (L) or high (H) cutting height. There was a single low cut (L) in April at the end of the growing season, 2 cuts (LL and HL treatments) in February and April, and 3 cuts (LLL and HHL treatments) in December, February, and April. Three cuts during the season were investigated only at the moist site. Whole plant yields over the 1992/93 growing season were highest from a single cut in April. However, 2‐ and 3‐cut treatments sometimes gave yields as high as those from ... | For achieving the optimal performances and the longest lifetime of wireless sensor networks,the design of network routing protocol is very important.This paper analyzes many challenges of wireless sensor network routing protocol,and then discusses the well-known LEACH routing protocol and its evolution protocols HEED and PEGASIS in wireless sensor networks.Based on theoretical analysis,it compares comprehensively the performances such as network lifetime and delay of these routing protocols,and presents the corresponding simulation process and results. | eng_Latn | 23,980 |
Cross-Dehydrogenative Coupling (CDC) as Key-Transformations to Various D−π–A Organic Dyes: C–H/C–H Synthetic Study Directed toward Dye-Sensitized Solar Cells Applications | A variety of push–pull type organic dyes are facilely synthesized through the most atom-economical C–H/C–H dehydrogenative coupling reactions. After comprehensive synthetic optimizations, a broad substrate scope is achieved and functional groups, such as ester, ketone, nitrile, nitro, and triazene are well tolerated. The sensitive aldehyde group required for the conversion into anchoring groups for DSSCs applications is also compatible under present oxidant-containing reaction conditions. Based on this optimum C–H/C–H coupling approach, three new organic sensitizers are readily prepared and submitted to solar cell device fabrications, giving the power conversion efficiency (PCE) up to 4.85%. This work constitutes the first example that connects high atom-efficiency C–H/C–H green catalysis with dye-sensitized solar cell applications. | A number of multifunction sensors deployed randomly with limited energy is one character of wireless sensor networks, so energy efficient is a critical factor in sensor network design. In this literature, we present a clustering protocol based on Virtual Area Partition using Double Cluster Heads scheme (VAP-DCH) for wireless sensor networks, which partitions the network and selects a Main Cluster Head (MCH) and a Vice Cluster Head (VCH) in each cluster adaptively. The simulation results show that the protocol we presented improves the system performance, prolongs the network lifetime and transfers more data to the base station.. | eng_Latn | 23,981 |
A Multi-Protein Complex with TRPC, PDE1C, and A2R Plays a Critical Role in Regulating Cardiomyocyte cAMP and Survival | Background—cAMP plays a critical role in regulating cardiomyocyte survival. Various cAMP signaling pathways behave distinctly or in opposition. We have previously reported that activation of cAMP hydrolysis by cyclic nucleotide phosphodiesterase 1C (PDE1C) promotes cardiomyocytes death/apoptosis, yet the underlying molecular mechanism remains unknown. In this study, we aimed to identify the specific cAMP signaling pathway modulated by PDE1C and determine the mechanism by which Ca2+/calmodulin-stimulated PDE1C is activated. Methods—To study cardiomyocyte death/apoptosis, we used both isolated mouse adult cardiomyocytes in vitro and doxorubicin (DOX)-induced cardiac toxicity in vivo. We used a variety of pharmacological activators and inhibitors, as well as genetically engineered molecular tools to manipulate the expression and/or activity of proteins of interest. Results—We found that the protective effect of PDE1C inhibition/deficiency on Ang II or doxorubicin (DOX)-induced cardiomyocyte death/apoptosis i... | We study the problem of eco-routing Plug-In Hybrid Electric Vehicles (PHEVs) to minimize the overall energy consumption costs. Unlike the traditional Charge Depleting First (CDF) approaches in the literature where the power-train control strategy is fixed, we propose a Combined Routing and Power-train Control (CRPTC) algorithm which can simultaneously calculate the optimal energy route as well as the optimal power-train control strategy. To validate our method, we apply our eco-routing algorithm to a subnetwork of the Eastern Massachusetts (EMA) transportation network using actual traffic data provided by the Boston Region Metropolitan Planning Organization. As an alternative benchmark, we also simulate the traffic behavior of the network using the extracted flow data from the aforementioned traffic dataset. We show that the CRPTC approach outperforms the traditional CDF approach and we quantify the trade-off between saving energy and time in using eco-routing algorithms. | eng_Latn | 23,982 |
Considerations on link and system throughput of Bluetooth networks | The radio network performance of a large number of Bluetooth piconets is investigated in this contribution. Asynchronous packet data connections are considered exclusively. Continuously transmitting piconets as well as partially loaded piconets with constant average user bit rate (according to a WWW traffic model) are treated. All piconets are located in a single room. It turns out that Bluetooth provides a large capacity for data connections. Under normal load conditions, the link throughput is degraded only marginally by interference. Several hundred simultaneous WWW sessions are feasible in the considered scenario. A maximum aggregate system throughput of about 18 Mbit/s can be obtained. In general, long and uncoded Bluetooth packet types should be preferred for data transmission, since they provide for the largest throughput in most interference conditions. | Abstract The paradigm of heterogeneous systems has been demanding the implementation of new approaches to ensure the organizational operations as a whole. This work proposes a new integration model, which can be applied to any system, based on the execution of instructions transmitted between systems supported by research in an organization with great needs at integration systems level. | eng_Latn | 23,983 |
Research on a Molecular Identification System for Jujube Cultivars | Using fluorescent-labeled AFLP markers,this paper identifies 26 jujube cultivars and 1 sour jujube.Based on the number and quality of polymorphic fragments,8 AFLP primer pairs were selected for the identification.A total of 886 AFLP markers were identified,of which 112 makers were unique fragments and 60 markers were deletion fragments.These special markers have important use in jujube cultivars identification.Furthermore,21 fragments were selected from 3 primer pairs and changed to 1 and 0 data to establish a computer identification system. | This paper, introduces the application of Content-Based Music Information Retrieval (CBMIR) in wireless ad-hoc networks. We investigate for the first time the challenges posed by the wireless medium and recognise the factors that require optimisation. We propose novel techniques, which attain a significant reduction in both response times and traffic, compared to naive approaches. Extensive experimental results illustrate the appropriateness and efficiency of the proposed method in this bandwidth-starving and volatile, due to mobility, environment. | eng_Latn | 23,984 |
A novel mixed granularity frequency hopping method for single carrier multi-user access system | In this paper, a mixed granularity frequency hopping method for single carrier multi-user access system is introduced. This frequency hopping method solves the problem of mixed bandwidth granularity localized transmission in a single carrier system. The main concept is using the predefined mode to guarantee the orthogonal frequency hopping pattern and single carrier property. | We study the scalability problem of a priori-like algorithms that are used in mining association rules. We show how a priori suffers from performance deterioration for large-scale problems and propose alternative data structures and operations that can be used to apply the a priori-trick optimization method in large-scale problems. In the proposed method, the database is transformed into a more efficient structure that is used along with the intersection operation, to find the frequent itemsets in the database. The performance evaluation shows that, with a minor increase in the storage requirement, the proposed technique outperforms significantly the existing algorithms especially in large-scale problems. | eng_Latn | 23,985 |
MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks | Epidemic Routing for Partially-Connected Ad Hoc Networks | Adaptive protocols for information dissemination in wireless sensor networks | eng_Latn | 23,986 |
Energy-Efficient Wireless MAC Protocols for Railway Monitoring Applications | A bit-map-assisted energy-efficient MAC scheme for wireless sensor networks | Persian Plagiarism Detection Using Sentence Correlations | eng_Latn | 23,987 |
Fast Feature Selection for Learning to Rank | FSMRank: Feature Selection Algorithm for Learning to Rank | A dynamic geographic hash table for data-centric storage in sensor networks | eng_Latn | 23,988 |
Finding available parking spaces made easy | Decentralized discovery of free parking places | A Survey on Position-Based Routing in Mobile Ad-Hoc Networks | eng_Latn | 23,989 |
A Comparison with two semantic sensor data storages in total data transmission | Wireless integrated network sensors | Full-dimension MIMO (FD-MIMO) for next generation cellular technology | eng_Latn | 23,990 |
ietf standardization in the field of the internet of things ( iot ) : a survey . | A Comprehensive Evaluation of RPL under Mobility | Dynamic source routing in ad hoc wireless networks | eng_Latn | 23,991 |
Algorithms for Visualizing Large Networks | Graph Drawing by Stress Majorization | Simulation of the DNP3 protocol over TCP/IP on a network IEEE 802.11g ad-hoc with smart meter | eng_Latn | 23,992 |
A fast randomized algorithm for orthogonal projection | numerical methods for least square problems . | Towards Expanded Trust Management for Agents in Vehicular Ad-hoc Networks | eng_Latn | 23,993 |
A Survey of Secure Routing Protocols in Multi-Hop Cellular Networks | TSRF: A Trust-Aware Secure Routing Framework in Wireless Sensor Networks | Context-Aware Data Loss Prevention for Cloud Storage Services | eng_Latn | 23,994 |
The impact of data aggregation in wireless sensor networks | Directed diffusion: a scalable and robust communication paradigm for sensor networks | A User's Guide to Support Vector Machines | eng_Latn | 23,995 |
Distributed Clustering-Task Scheduling for Wireless Sensor Networks Using Dynamic Hyper Round Policy | Wireless Sensor Networks: Technology, Protocols, and Applications | Tree ensembles for predicting structured outputs | eng_Latn | 23,996 |
Architecture and algorithms for an IEEE 802.11-based multi-channel wireless mesh network | Load-balancing routing for wireless access networks | Improving Weakly-Supervised Object Localization By Micro-Annotation | eng_Latn | 23,997 |
TiNA: a scheme for temporal coherency-aware in-network aggregation | APTEEN: A Hybrid Protocol for Efficient Routing and Comprehensive Information Retrieval in Wireless Sensor Networks | ECOMIPS: an economic MIPS CPU design on FPGA | eng_Latn | 23,998 |
Gap Trap : A Pothole Detection and Reporting System Utilizing Mobile Devices | The pothole patrol: using a mobile sensor network for road surface monitoring | TAG: a Tiny AGgregation service for ad-hoc sensor networks | eng_Latn | 23,999 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.