Search results for "networks"
showing 10 items of 3260 documents
A Metaheuristic Bandwidth Allocation Scheme for FiWi Networks Using Ant Colony Optimization
2015
Optical-wireless access networks constitute a quite attractive solution to meet the ever-increasing bandwidth requirements of end-users, offering significant benefits such as ubiquitous coverage in the wireless domain and huge bandwidth in the optical domain. However, converging optical and wireless networking technologies, with Passive Optical Networks (PONs) and 4G wireless standards, such as the Worldwide Interoperability for Microwave Access (WiMAX) and the Long Term Evolution (LTE), entails major challenges that need to be addressed. In this context, designing an efficient and fair bandwidth distribution with Quality of Service (QoS) support is a difficult task due to the interdependen…
Proxy Mobile IPv6-Based Seamless Handover
2013
A prospective next generation wireless network is expected to integrate harmoniously into an IP-based core network. It is widely anticipated that IP-layer handover is a feasible solution to global mobility. However, the performance of IP-layer handover based on basic Mobile IP (MIP) cannot support real time services very well due to long handover delay. The Internet Engineering Task Force (IETF) Network-based Localized Mobility Management (NETLMM) working group developed a network-based localized mobility management protocol called Proxy Mobile IPv6 (PMIPv6) to reduce the handoff latency of MIPv6. Moreover, PMIPv6 provides the IP with the mobility to support User Equipments (UEs) without it…
Metabolic shift of polyphosphate-accumulating organisms with different levels of polyphosphate storage
2012
Previous studies have shown that polyphosphate-accumulating organisms (PAOs) are able to behave as glycogen-accumulating organisms (GAOs) under different conditions. In this study we investigated the behavior of a culture enriched with Accumulibacter at different levels of polyphosphate (poly-P) storage. The results of stoichiometric ratios Gly degraded/HAc uptake, PHB synthesized/HAc uptake, PHV synthesized/HAc uptake and P release/HAc uptake confirmed a metabolic shift from PAO metabolism to GAO metabolism: PAOs with high poly-P content used the poly-P to obtain adenosine tri-phosphate (ATP), and glycogen (Gly) to obtain nicotinamide adenine dinucleotide (NADH) and some ATP. In a test whe…
Dropping out of school as a meaningful action for adolescents with social, emotional and behavioural difficulties
2013
This study examines and discusses dropping out of school related to adolescents with social, emotional and behavioural difficulties (SEBD). It is based on in-depth interviews of 10 adolescents between the ages of 16 and 20, three girls and two boys with internalised problems, and two girls and three boys with extroverted behavioural problems. Given this group of students' challenges at school, the aim of this paper is to explore the narratives of this adolescent group as they relate to the significance they attach to their dropout behaviour. An additional objective is to draw attention to what these findings are likely to mean for implementing preventive practices in school. Results show th…
Interference and Communications among Active Network Applications
1999
A New Adaptive Neural Harmonic Compensator for Inverter Fed Distributed Generation
2004
This paper deals with the command of inverters in DG (distributed generation) systems by use of linear neural networks in such a way that, with a slight upgrade of their control software, they can be used also to compensate for the harmonic distortion in the node where they are connected (local compensation), that is in the in the point of common coupling (PCC). To this purpose a neural estimator based on linear neurons (ADALINEs) has been developed which is able to act as a selective noise cancellers for each harmonic of the node voltage. The use of linear neurons permits the drawbacks of classical neural networks to be overcome and moreover the neural estimator is easy to implement, thus …
Is the nonREM–REM sleep cycle reset by forced awakenings from REM sleep?
2002
In selective REM sleep deprivation (SRSD), the occurrence of stage REM is repeatedly interrupted by short awakenings. Typically, the interventions aggregate in clusters resembling the REM episodes in undisturbed sleep. This salient phenomenon can easily be explained if the nonREM–REM sleep process is continued during the periods of forced wakefulness. However, earlier studies have alternatively suggested that awakenings from sleep might rather discontinue and reset the ultradian process. Theoretically, the two explanations predict a different distribution of REM episode duration. We evaluated 117 SRSD treatment nights recorded from 14 depressive inpatients receiving low dosages of Trimipram…
A conceptual model of feedback mechanisms in adjusted affordances – Insights from usage of a mental mobile health application
2023
Affordance theory provides one of the most prominent lenses through which the socio-technical aspects of a system’s use can be investigated and understood. In this context, the literature has proposed that perceived and actualized affordances may be adjusted over time. Yet, how the adjustment of affordances occurs has not been explained in detail. Thus, in this article, we develop a conceptual model of feedback mechanisms that includes a more explicit description of how affordances are perceived by users, whether actualized and adjusted. With the model, we introduce the central concept of a generative base, out of which affordance perceptions emerge and which can be updated through affordan…
A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks
2018
International audience; Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network. In this scheme, a set of detection and response techniques are proposed to monitor the UAV behaviors and categorize them into the appropriate list (normal, abnormal, suspect, and malicious) according to the detected cyber-attack. We focus on the m…
Utility-based resource allocations in multi-hop wireless networks
2011
It is well known that CSMA (Carrier Sense Multiple Access) protocols exhibit very poor performance in case of multi-hop transmissions, because of inter-link interference due to imperfect carrier sensing. Since ad-hoc networks based on multihop packet deliveries are becoming more and more common in different application and networking scenarios, different medium access control extensions are currently considered for improving the channel utilization efficiency. In this paper, we propose a simple approach based on preallocating temporal slots in which different sets of nodes are allowed to contend for the channel access, which can significantly improve CSMA performance with limited signaling …