Transportation Plan Ad Hoc Working Group | Department of Energy
Office of Environmental Management (EM)
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2Uranium Transferon theTed DonatEnergyDepartment of EnergyPlan Ad Hoc
Distributed services for mobile ad hoc networks
Cao, Guangtong
2005-11-01T23:59:59.000Z
A mobile ad hoc network consists of certain nodes that communicate only through wireless medium and can move arbitrarily. The key feature of a mobile ad hoc network is the mobility of the nodes. Because of the mobility, communication links form...
ad hoc unmanned: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
Abdel Ilah of the Unmanned Aerial Vehicle (UAV) Ad-Hoc net- work, the layered architecture is not flexible enough to achieve in the first three layers based on the aircraft...
access ad hoc: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
the channel utilization of multihop wireless networks. Keywords: Mobile ad hoc networks, medium access control, this is not necessarily true in a mobile ad hoc network (MANET)...
IT Licentiate theses Ad Hoc Routing Protocol
Flener, Pierre
IT Licentiate theses 2005-004 Ad Hoc Routing Protocol Validation OSKAR WIBLING UPPSALA UNIVERSITY SWEDEN Dissertation for the degree of Licentiate of Technology in Computer Science at Uppsala University
Virtual infrastructure for wireless ad hoc networks
Gilbert, Seth, 1976-
2007-01-01T23:59:59.000Z
One of the most significant challenges introduced by ad hoc networks is coping with the unpredictable deployment, uncertain reliability, and erratic communication exhibited by emerging wireless networks and devices. The ...
Distributed algorithms for mobile ad hoc networks
Malpani, Navneet
2001-01-01T23:59:59.000Z
We first present two new leader election algorithms for mobile ad hoc networks. The algorithms ensure that eventually each connected component of the topology graph has exactly one leader. The algorithms are based on a routing algorithm called TORA...
Clock synchronization for mobile ad hoc networks
Chandra, Rajan
2013-02-22T23:59:59.000Z
Time Protocol) used in wired networks (e.g. Internet) to Mobile Ad Hoc Networks (MANets). It may also be achieved by developing other algorithms that achieve clock synchronization and may be suitable for MANets. Using the Network Time Protocol (NTP...
Dynamic address allocation protocols for Mobile ad hoc networks
Patchipulusu, Praveena
2001-01-01T23:59:59.000Z
Address allocation is an important issue in Mobile ad hoc networks. This thesis proposes solutions to assign unique IP addresses to nodes participating in Mobile ad hoc networks and evaluates the proposed solutions. Address allocation protocols...
Topology Control in Wireless Ad Hoc and Sensor PAOLO SANTI
Chen, Yuanzhu Peter
- works to reduce energy consumption, which is essential to extend the network operational time. The goal, with the purpose of maintaining some global graph property (e.g., connectivity) while reducing energy consumption and Phrases: Connectivity, Energy consumption, Sensor networks, Topol- ogy control, Wireless ad hoc networks 1
Mapping subtasks with multiple versions on an ad hoc grid
Maciejewski, Anthony A.
Mapping subtasks with multiple versions on an ad hoc grid S. Shivle a , P. Sugavanam a , H; Mapping; Resource allocation; Task scheduling 1. Introduction and problem statement An ad hoc grid; accepted 15 April 2005 Available online 16 June 2005 Abstract An ad hoc grid is a heterogeneous computing
Adaptive Scheduling in Ad Hoc and Cellular Wireless Networks
Tan, Choo Chin
2013-01-01T23:59:59.000Z
organization wireless networks and wireless mobile ad-hocfor heterogeneous wireless network”, in Proc. of IEEER. Khalaf, “Ad hoc wireless networks with mobile backbones,”
Sen, Sevil
ITA CONFERENCE 1569048773 THREAT MODELLING FOR MOBILE AD HOC AND SENSOR NETWORKS 1 Threat Modelling. Chivers, Olwen Worthington and Pankaj Rohatgi Abstract-- This paper introduces a threat model for ad hoc and mobile ad hoc networks (MANETS). It identifies threat categories, modes of use, and a variety of threats
The Quest for Security in Mobile Ad Hoc Networks \\Lambda JeanPierre Hubaux
Bencsáth, Boldizsár
network to work without any external management or configuration. Although not all mobile ad hoc networksThe Quest for Security in Mobile Ad Hoc Networks \\Lambda JeanPierre Hubaux Institute for Computer Communications and Applications Swiss Federal Institute of Technology -- Lausanne CH1015, Switzerland Jean
Geography-informed Energy Conservation for Ad Hoc Routing
Xu, Ya; Heidemann, John; Estrin, D
2001-01-01T23:59:59.000Z
Geography-informed Energy Conservation for Ad Hoc Routingof network lifetime, energy conservation, and data deliverypowers node off for energy conservation while G A F - m a
Money Market Mutual Funds: An Experiement in Ad Hoc Deregulation
Rosen, Kenneth T.; Katz, Lawrence
1981-01-01T23:59:59.000Z
of the market. A full deregulation of the deposit marketsity range. Full deregulation of financial institutions will,periment in ad hoc deregulation. -29- APPENDIX 1 . §Money
Maximizing the throughput of large ad hoc wireless networks
Hua, Yingbo; Huang, Yi; J, Garcia-Luna-Aceves J
2006-01-01T23:59:59.000Z
The transport capacity of wireless networks over fadingimprovement of ad hoc wireless networks using directionalThe capacity of wireless networks,” IEEE Trans. Inform.
Reception-Aware Power Control in Ad Hoc Mobile Networks
Mans, Bernard
Reception-Aware Power Control in Ad Hoc Mobile Networks Nirisha Shrestha and Bernard Mans Macquarie resource in ad hoc mobile networks, mak- ing power control a popular, yet crucial, technique. The network of power control non-trivial. For sake of simplicity, most existing power control protocols only consider
Stimulating Cooperative Diversity in Wireless Ad Hoc Networks through Pricing
Adve, Raviraj
Stimulating Cooperative Diversity in Wireless Ad Hoc Networks through Pricing Naveen Shastry in commercial wireless ad hoc networks. For the relay, cooperation represents both a real cost of energy a pricing game that stimulates cooperation via reimbursements to the relay. Specifically, given the price
Multipath Routing Based Secure Data Transmission in Ad Hoc Networks
Delgado-Frias, José G.
Multipath Routing Based Secure Data Transmission in Ad Hoc Networks Li Zhao and José G. Delgado in the networks. In this paper, we present and evaluate a scheme, in which multipath routing combined the single path DSR. Index Terms--security, data transmission, multipath routing, ad hoc networks I
Route duration modeling for mobile ad-hoc networks Michael Pascoe-Chalke Javier Gomez
Gomez-Castellanos, Javier
of Electrical Engineering, Metropolitan Autonomous University, Mexico City, Mexico e-mail: milo@xanum.uam.mx 123-hoc Net- works (VANETs), Wireless Sensor Networks (WSNs) and Mobile Ad-hoc Networks (MANETs). In MANETs. Pascoe-Chalke (&) Á J. Gomez Á V. Rangel Department of Electrical Engineering, National Autonomous
Poster: -Graphs: Flexible Topology Control in Wireless Ad Hoc Networks
Williamson, Carey
Poster: -Graphs: Flexible Topology Control in Wireless Ad Hoc Networks Ashikur Rahman Department networks. Most algorithms strive to reduce energy consumption by cre- ating a sparse topology with few long of topologies and provides the flexibility to network
Nomadic Communications AA 2009/10 Vehicular Ad Hoc Networks
Lo Cigno, Renato Antonio
Nomadic Communications AA 2009/10 Vehicular Ad Hoc Networks 90% of this material is reproduced brakes before a collision Some 40% more do not brake effectively Road Accidents 41.600 fatalities 1
Nomadic Communications AA 2010/11 Vehicular Ad Hoc Networks
Lo Cigno, Renato Antonio
Nomadic Communications AA 2010/11 Vehicular Ad Hoc Networks 90% of this material is reproduced brakes before a collision Some 40% more do not brake effectively Road Accidents 41.600 fatalities 1
Nomadic Communications AA 2010/11 Vehicular Ad Hoc Networks
Lo Cigno, Renato Antonio
Nomadic Communications AA 2010/11 Vehicular Ad Hoc Networks 90% of this material is reproduced% of passengers vehicles and 26% of trucks do not activate brakes before a collision Some 40% more do not brake
Nomadic Communications AA 2009/10 Vehicular Ad Hoc Networks
Lo Cigno, Renato Antonio
Nomadic Communications AA 2009/10 Vehicular Ad Hoc Networks 90% of this material is reproduced% of passengers vehicles and 26% of trucks do not activate brakes before a collision Some 40% more do not brake
User level routing for mobile ad hoc networks
Virk, Navjot
2001-01-01T23:59:59.000Z
Many routing protocols have been proposed for mobile ad hoc networks. Traditionally routing protocols have been implemented in the kernel of the operating system. The main reasons for this are performance and security. This research explores...
Modular Anomaly Detection for Smartphone Ad hoc Communication
by the infrastructure-based technologies there are no major deploy- ments of ad hoc networks in every day scenarios, or rendered useless due to damages. Thus, message dissemination in disaster area networks using a phone
Truthful resource management in wireless ad hoc networks
Cai, Jianfeng
2005-11-01T23:59:59.000Z
In wireless mobile ad hoc networks (MANETs), cooperation cannot be an im- plicit assumption anymore. Each profit-oriented network node has the intention to be selfish due to limited resource possession. In this dissertation, we investigate...
Connectivity Based Location Estimation Scheme for Wireless Ad Hoc Networks
Ramanathan, Parameswaran "Parmesh"
Connectivity Based Location Estimation Scheme for Wireless Ad Hoc Networks Niveditha Sundaram. The loca- tion estimates rely on neighborhood relationships gathered by each user through message, form factors, energy consumption, etc., providing GPS support may not be feasible even in outdoor
Smaller Connected Dominating Sets in Ad Hoc and Sensor Networks
Paris-Sud XI, Université de
Smaller Connected Dominating Sets in Ad Hoc and Sensor Networks based on Coverage by Two be broadcasting, where the size of the set greatly impacts on energy consumption. Obtaining small sets is thus is considered. In our new definition, a node u is not dominant if there exists in its 2- hop neighborhood
1 Antenna Beamforming and Power Control for Ad Hoc Networks
Ramanathan, Ram
1 Antenna Beamforming and Power Control for Ad Hoc Networks RAM RAMANATHAN BBN Technologies power, spreading code, and antenna beams. By controlling these transceiver parameters adaptively, coding, etc.) can also yield benefits, we shall focus on antenna and power control as they have been
A Power Control MAC Protocol for Ad Hoc Networks
A Power Control MAC Protocol for Ad Hoc Networks Eun-Sun Jung Dept. of Computer Science Texas A This paper presents a power control MAC protocol that al- lows nodes to vary transmit power level on a per control. The main idea of these power control schemes is to use different power lev- els for RTS
Managing Concurrent Execution of Transactions in Mobile Ad-hoc
Gruenwald, Le
: an Energy-Efficient Approach Zhaowen Xing University of Oklahoma School of Computer Science 110 West Boyd Systems: an Energy-Efficient Approach Abstract. A Mobile Ad-hoc Network (MANET) is a collection of mobile. In order to provide timely and correct results for multiple concurrent transactions, energy-efficient
A Locationaided Poweraware Routing Protocol in Mobile Ad Hoc Networks
Nahrstedt, Klara
hop wireless adhoc networks, designing energyefficient rout ing protocols is critical since nodes are power be mobile, demanding the energyefficient routing protocol to be fully distributed and adaptive spect to endtoend energyefficient routes. Finally, preliminary simulation results are presented
Energy Aware Implementation of an Ad Hoc Routing Protocol
Brown, Timothy X.
Energy Aware Implementation of an Ad Hoc Routing Protocol by Shweta Bhandare Scriptor B in Telecommunications Department of InterDisciplinary Telecommunications 2003 #12;This thesis entitled: Energy Aware mentioned discipline. #12;iii Scriptor, Shweta Bhandare (M.S., Telecommunications) Energy Aware
Spatial Interference Mitigation for Multiple Input Multiple Output Ad Hoc Networks: MISO Gains
Paris-Sud XI, Université de
Spatial Interference Mitigation for Multiple Input Multiple Output Ad Hoc Networks: MISO Gains beamforming for a multiple input single output (MISO) ad hoc network to increase the density of successful
TDROP: A routing protocol for physically hierarchical ad hoc mobile networks
Ahmed, Zaheer
2000-01-01T23:59:59.000Z
Many protocols for routing in mobile ad hoc networks have been proposed. None of these protocols differentiates mobile nodes based on their physical characteristics and also there is only one proposal for connecting ad hoc networks together to form...
Node Localisation in Wireless Ad Hoc Networks Jon Arnold, Nigel Bean, Miro Kraetzl, Matthew Roughan
Roughan, Matthew
Node Localisation in Wireless Ad Hoc Networks Jon Arnold, Nigel Bean, Miro Kraetzl, Matthew Roughan, Australia Email:{nigel.bean,matthew.roughan}@adelaide.edu.au Abstract-- Wireless ad hoc networks often
Energy consumption models for ad-hoc mobile Emmanuel Lochin1
Lochin, Emmanuel
1 Energy consumption models for ad-hoc mobile terminals Emmanuel Lochin1 Anne Fladenmuller1 Jean describes a set of experiments based on ACPI BIOS measurements which evaluate the energy consumption of an IEEE802.11 wireless net- work interface. Based on our ACPI measurements, two models of energy
On the Energy Efficiency of Cognitive Radios -A Study of the Ad Hoc Wireless LAN Scenario
Namboodiri, Vinod
and determine if its usage can prove energy efficient in portable devices. Through this work we makeOn the Energy Efficiency of Cognitive Radios - A Study of the Ad Hoc Wireless LAN Scenario Anm of achieving better communication performance on selected spectrum. The benefits in terms of reduced energy
Wireless ad hoc networks Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale
Gao, Jie
are not flexible. Vulnerable to attacks. · Ad hoc networks· Ad hoc networks Flexible, easy to deploy, cheaper · Optimal power assignment /transmission range · Optimal scheduling & multi-hop routing · Node are staticWireless ad hoc networks Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale #12
Mapping of Subtasks with Multiple Versions in a Heterogeneous Ad Hoc Grid Environment
Maciejewski, Anthony A.
Mapping of Subtasks with Multiple Versions in a Heterogeneous Ad Hoc Grid Environment Sameer Shivle. Index Terms-- ad hoc grid, communication scheduling, mapping, resource allocation, task scheduling. 1 in the ad hoc grid. It is also assumed that a static mapping that maps the subtasks to these M machines
Static Mapping of Subtasks in a Heterogeneous Ad Hoc Grid Environment
Maciejewski, Anthony A.
Static Mapping of Subtasks in a Heterogeneous Ad Hoc Grid Environment Sameer Shivle1 , Ralph to efficiently map tasks to machines in an ad hoc grid so as to minimize the energy consumed due to communication University George T. Abell Endowment. Abstract An ad hoc grid is a heterogeneous computing and communication
Enhancing the Security of On-demand Routing in Ad Hoc Networks
California at Santa Cruz, University of
Enhancing the Security of On-demand Routing in Ad Hoc Networks Zhenjiang Li1 and J.J. Garcia, to be truly effective, communication over such networks should be secure. The attacks to an ad hoc network can Springer-Verlag Berlin Heidelberg 2005 #12;Enhancing the Security of On-demand Routing in Ad Hoc Networks
FaultTolerant Distributed Algorithms in Sparse Ad Hoc Wireless Networks
FaultTolerant Distributed Algorithms in Sparse Ad Hoc Wireless Networks (SPAWN) BETTINA WEISS communication technologies, wireless ad hoc networks are increasingly commonplace nowadays. Spontaneous (``ad wireless sensor networks and disaster area communication systems. It is also a major enabling technology
A Multiobjective Performance Evaluation Framework for Routing in Wireless Ad Hoc
Jaffrès-Runser, Katia
network when delay, robustness and energy are considered. I. INTRODUCTION Wireless ad hoc and sensor to transmission delay [8], energy consumption [9] or fairness [10] are added on top of its main design goalA Multiobjective Performance Evaluation Framework for Routing in Wireless Ad Hoc Networks Katia
ad-hoc wireless environments: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
the state-ofthe -art of the ad hoc networking technology in four areas: routing, medium access control, multicasting, and security. Where possible, comparison between the...
Constructing Minimum-Energy Broadcast Trees In Wireless Ad Hoc Networks
Liang, Weifa
algorithm, power awareness, ad hoc networks, energy consumption optimization, broad- cast and multicastConstructing Minimum-Energy Broadcast Trees In Wireless Ad Hoc Networks Weifa Liang Department related to power consump- tion in this kind of network. One is the minimum-energy broadcast tree problem
Reliable and Energy-Efficient Routing for Static Wireless Ad Hoc Networks with Unreliable Links
Wang, Yu
Reliable and Energy-Efficient Routing for Static Wireless Ad Hoc Networks with Unreliable Links, Yanwei Wu, Student Member, IEEE, and Yong Qi, Member, IEEE Abstract--Energy efficient routing and power. In this paper, we address the problem of energy efficient reliable routing for wireless ad hoc networks
Low-Cost Truthful Multicast in Selfish and Rational Wireless Ad Hoc Networks
Li, Xiang-Yang
en- joy a more flexible composition. A wireless ad hoc network is a collection of radio devices limited transmission power. One of the dis- tinctive features of wireless networks is that the signal sent1 Low-Cost Truthful Multicast in Selfish and Rational Wireless Ad Hoc Networks Weizhao Wang Xiang
A Cross-Layer Framework for Exploiting Virtual MISO Links in Mobile Ad Hoc Networks
Krishnamurthy, Srikanth
A Cross-Layer Framework for Exploiting Virtual MISO Links in Mobile Ad Hoc Networks Gentian requiring the deployment of physical antenna arrays. Virtual MISO entails the simultaneous transmission. We present a novel multilayer approach for exploiting virtual MISO links in ad hoc networks
A Token Ring Protocol for Dynamic Ad-hoc Wireless Environments
Top, P; Kohlhepp, V; Dowla, F
2005-09-30T23:59:59.000Z
A wireless ad-hoc networking protocol is presented. The protocol is designed to be flexible, easy to use and adaptable to a wide variety of potential applications. The primary considerations in design are small code size, guaranteed bandwidth access, limited delay, and error resilience in a highly dynamic ad-hoc environment. These considerations are achieved through the use of token ring protocol.
DELAR: Device/Energy/Load Aware Relaying in Heterogenous Wireless Ad Hoc Networks
Zhang, Yanchao
- newable energy sources. In DELAR the heterogeneity of nodal energy capabilities or device types, nodalDELAR: Device/Energy/Load Aware Relaying in Heterogenous Wireless Ad Hoc Networks Wei Liu Energy conservation is of great importance for mobile ad hoc networks in which most nodes are equipped
Energy-ef cient Cache Replacement Policies for Cooperative Caching in Mobile Ad Hoc Network
Chan, Edward
Energy-ef cient Cache Replacement Policies for Cooperative Caching in Mobile Ad Hoc Network dynamically. Most existing cache strategies perform replacement independently, and they seldom consider coordinated replacement and energy saving issues in the context of a mobile ad hoc network. In this paper, we
Energy Efficient Adaptation of Multicast Protocols in Power Controlled Wireless Ad Hoc Networks
Prasanna, Viktor K.
on energy efficiency in ad hoc networks. In this paper, we assume a more practical model for power controlEnergy Efficient Adaptation of Multicast Protocols in Power Controlled Wireless Ad Hoc Networks to power controlled networks is presented. Wireless nodes are assumed to have transmis- sion power control
Joint Routing and Server Selection for Multiple Description Video Streaming in Ad Hoc Networks
Hou, Y. Thomas
Joint Routing and Server Selection for Multiple Description Video Streaming in Ad Hoc Networks ad hoc networks. In this paper, we study the important problem of joint routing and server selection by the proposed approach over existing server selection schemes. This justifies the importance of jointly
Cross-Layer Design for Energy-Efficient Secure Multicast Communications in Ad Hoc Networks
Poovendran, Radha
Cross-Layer Design for Energy-Efficient Secure Multicast Communications in Ad Hoc Networks Loukas, University of Washington, Seattle, WA Abstract-- We consider the problem of secure multicast in an energy network operation in an wireless ad hoc environment. Energy is a physical layer parameter, while security
ADHOC MAC: a new, flexible and reliable MAC architecture for ad-hoc networks
Borgonovo, Flaminio
ADHOC MAC: a new, flexible and reliable MAC architecture for ad-hoc networks F. Borgonovo, A, make the design of a prompt, efficient, flexible, and reliable MAC very difficult. An ad hoc network.e., transmissions that reach all terminals within the range allowed by the transmitting power. Due to radio range
PCQoS: Power Controlled QoS in Wireless Ad Hoc Networks
Gomez-Castellanos, Javier
Department of Electrical Engineering National University of Mexico, D.F., 04510 Email: {javierg@cs.dartmouth.edu Abstract--Mobile Ad hoc networks typically use a common transmission power approach for the discoveryS differentiation to applications in wireless ad hoc networks. I. INTRODUCTION The impact of transmission power
On the Connectivity in One-Dimensional Ad Hoc Wireless Networks with a Forbidden Zone
On the Connectivity in One-Dimensional Ad Hoc Wireless Networks with a Forbidden Zone Xiaodong Hu1 This paper investigates the connectivity in one-dimensional ad hoc wireless networks with a forbidden zone. We derive the probability of the wireless networks which are composed of exactly m clusters by means
Experimental Comparison of Algorithms for Energy-Efficient Multicasting in Ad Hoc
Caragiannis, Ioannis
Experimental Comparison of Algorithms for Energy-Efficient Multicasting in Ad Hoc Networks Stavros Technology Institute and Dept. of Computer Engineering and Informatics University of Patras, 26500 Rio, Greece Abstract. Energy is a scarce resource in ad hoc wireless networks and it is of paramount
Fully Distributed Trust Model based on Trust Graph for Mobile Ad hoc Networks
Paris-Sud XI, Université de
University of Technology, France. bouabdal@hds.utc.fr Abstract A mobile ad hoc network (MANET) is a wireless pre-existing in- frastructure; all networking operations (routing, mobility management, and so onFully Distributed Trust Model based on Trust Graph for Mobile Ad hoc Networks Mawloud Omar, Yacine
The Quest for Security in Mobile Ad Hoc Networks Jean-Pierre Hubaux
Capkun, Srdjan
management or con guration. Although not all mobile ad hoc networks are self-organized, this propertyThe Quest for Security in Mobile Ad Hoc Networks Jean-Pierre Hubaux Institute for Computer Communications and Applications Swiss Federal Institute of Technology Lausanne CH-1015, Switzerland Jean
Report of the Ad Hoc Committee on Washington Natural Resource Agency Reform
Borenstein, Elhanan
Report of the Ad Hoc Committee on Washington Natural Resource Agency Reform February 16, 2010 of the Environment (CoEnv) to make useful contributions to the Governor's natural resource agency reform initiative. As a result, the Washington Natural Resource Agency Reform ad hoc Committee was established and given
Hop-Reservation Multiple Access (HRMA) for Ad-Hoc Networks
California at Santa Cruz, University of
Hop-Reservation Multiple Access (HRMA) for Ad-Hoc Networks Zhenyu Tang and J. J. Garcia (HRMA) for wireless ad-hoc networks (multi-hop packet radio networks) is introduced, specified and analyzed. HRMA is based on simple half-duplex, very-slow frequency-hopping spread spectrum (FHSS) radios
HopReservation Multiple Access (HRMA) for AdHoc Networks \\Lambda
California at Santa Cruz, University of
HopReservation Multiple Access (HRMA) for AdHoc Networks \\Lambda Zhenyu Tang and J. J. Garcia (HRMA) for wireless adhoc networks (multihop packet radio networks) is introduced, specified and analyzed. HRMA is based on simple halfduplex, veryslow frequencyhopping spread spectrum (FHSS) radios
Energy-Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc Networks
Langendoen, Koen
Energy-Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc Networks Javad minimum energy routing (RMER). RMECR addresses three important requirements of ad hoc networks: energy-efficiency energy of nodes as well as quality of links to find energy-efficient and reliable routes that increase
MobiSN: Semantics-based Mobile Ad Hoc Social Network Framework
Li, Juan "Jen"
MobiSN: Semantics-based Mobile Ad Hoc Social Network Framework Juan Li Department of Computer.khan@ndsu.edu Abstract--Mobile ad hoc social networks are self-configuring social networks that connect users using mobile devices, such as laptops, PDAs, and cellular phones. These social networks facilitate users
Degree Distribution and Hopcount in Wireless Ad-hoc Networks R. Hekmat, P. Van Mieghem
Van Mieghem, Piet
Degree Distribution and Hopcount in Wireless Ad-hoc Networks R. Hekmat, P. Van Mieghem Delft focus in this article is on the degree distribution and hopcount in these networks. The results that the degree distribution in wireless ad-hoc networks is binomial for low values of the mean degree. Further
Progressive Network Coding for Message-Forwarding in Ad-Hoc Wireless Networks
Chen, Yuanzhu Peter
. This paper considers the multi-hop transmission prob- lem in wireless ad-hoc networks. In a three-node sce of multi- hop transmission. The new framework, exploiting the technology of progressive network codingProgressive Network Coding for Message-Forwarding in Ad-Hoc Wireless Networks Xingkai Bao and Jing
A Special-Purpose Peer-to-Peer File Sharing System for Mobile Ad Hoc Networks
Lindemann, Christoph
application scenarios include sharing traffic and weather data by car-to-car communication in a wideA Special-Purpose Peer-to-Peer File Sharing System for Mobile Ad Hoc Networks Alexander Klemm-to-peer (P2P) file sharing for mobile ad hoc networks (MANET) requires the construction of a search algorithm
Inducing Spatial Clustering in MAC Contention for Spread Spectrum Ad Hoc Networks
de Veciana, Gustavo
. Our premise is that such networks are well suited to meet quality of service and energy efficiency promise towards achieving high spatial reuse, QoS, and energy efficiency in spread spectrum ad hoc goals. At least two other objectives are critical in some ad hoc network applications: energy efficiency
On the Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks
Chen, Ing-Ray
to that of the experimental testbed. Simulations of larger (50-node) ad hoc networks indicate that monitoring-based intrusion evaluations of IDTs are based on small testbed configura- tions, or simulations which do not incorporate any on monitoring- based intrusion detection for ad hoc networks. Experimental results show that, even for a simple
Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls
Kasera, Sneha Kumar
Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls Jun Cheol Park-- We propose to secure ad hoc networks against data injection attacks by placing firewall functionality] simulations. Our results show that our algorithm can find near-optimal solutions. Based on a simple analysis
Fuzzy Trust Recommendation Based on Collaborative Filtering for Mobile Ad-hoc Networks
Zhang, Yi
Fuzzy Trust Recommendation Based on Collaborative Filtering for Mobile Ad-hoc Networks Junhai Luo1--Mobile ad-hoc networks (MANETs) are based on the cooperative and trust characteristic of the mobile nodes focused on building up trust among distributed network nodes to simulate cooperation and improving
A Trust-based Architecture for Managing Certificates in Vehicular Ad hoc Networks
Paris-Sud XI, Université de
propose a secure and distributed public key infrastructure for vehicular ad hoc networks VANETs basedA Trust-based Architecture for Managing Certificates in Vehicular Ad hoc Networks Tahani Gazdar authority CA. We conducted a set of simulations in which we evaluate the efficiency and the stability
Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph Theoretic Approach
Lazos, Loukas
then propose a Local Broad- cast Key (LBK) based method to secure an ad hoc network from wormhole attacks simulation results to illustrate our theory. Index Terms-- wormhole, security, vulnerability, ad hoc net a decentralized realization for LBK establishment, and provide an analytical evaluation of the security level
E-Print Network 3.0 - ad hoc cloud Sample Search Results
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
any ad hoc combination of physical processes... . 21. Adding 10% in mass of 10 y m water ice particles to the cloud of Fig 2 ( Y y m, ) reduces... Warming Early Mars with...
A Power-Aware Technique to Manage Real-Time Database Transactions in Mobile Ad-Hoc Networks **
Gruenwald, Le
1 A Power-Aware Technique to Manage Real-Time Database Transactions in Mobile Ad-Hoc Networks ** Le@ou.edu; smbanik@ou.edu) ** This work is partially supported by the National Science Foundation grant No. EIA connectivity is required. Techniques that manage database transactions in MANET need to address additional
Yu, Chansu
ABSTRACT With respect to energy balance in mobile ad hoc networks, there have been active of energy-related metrics to find the most energy- balancing route in route discovery procedure. However there have been few works touching the energy balance during data transmission that is addressed
Lu, Songwu
evaluate the solution through simulation and implementation. 1. Introduction Mobile ad hoc networkingSelf-securing Ad Hoc Wireless Networks Haiyun Luo, Petros Zerfos, Jiejun Kong, Songwu Lu, Lixia wireless channel. However, the nature of ad hoc networks makes them vulner- able to security attacks
Service Provision in Disconnected Mobile Ad hoc Networks Nicolas Le Sommer
Paris-Sud XI, Université de
Service Provision in Disconnected Mobile Ad hoc Networks Nicolas Le Sommer Valoria Laboratory, University of South Brittany Nicolas.Le-Sommer@univ-ubs.fr Abstract With the proliferation of mobiles devices
Autonomous Undersea Systems Network (AUSNet) Protocols To Support Ad-Hoc AUV Communications
semi-autonomous networked robots. Emerging flexible low bandwidth, energy efficient architectures opposed to network support) data transmissions. Current efforts are focused on transitionAutonomous Undersea Systems Network (AUSNet) Protocols To Support Ad-Hoc AUV Communications
Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks
Rossi, Michele
Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks Cristiano in virtual multiple input single output (MISO) trans- missions and space-time block codes have been proposed
An energy-efficient communication system for ad hoc wireless and sensor networks
Tetteh, William Nii Adjetey
2007-01-01T23:59:59.000Z
Existing ad hoc wireless and sensor network systems often trade off energy against performance. As such, it is hard to find a single deployable system that supports high data rates while maintaining energy-efficient ...
Zafoune, Youcef; kanawati, Rushed; 10.5121/ijcnc.2010.2213
2010-01-01T23:59:59.000Z
This paper presents a new approach in the management of mobile ad hoc networks. Our alternative, based on mobile agent technology, allows the design of mobile centralized server in ad hoc network, where it is not obvious to think about a centralized management, due to the absence of any administration or fixed infrastructure in these networks. The aim of this centralized approach is to provide permanent availability of services in ad hoc networks which are characterized by a distributed management. In order to evaluate the performance of the proposed approach, we apply it to solve the problem of mobile code localization in ad hoc networks. A comparative study, based upon a simulation, of centralized and distributed localization protocols in terms of messages number exchanged and response time shows that the centralized approach in a distributed form is more interesting than a totally centralized approach.
Energy-Efficient Distributed Constructions of Minimum Spanning Tree for Wireless Ad-hoc
Khan, Maleq
1 Energy-Efficient Distributed Constructions of Minimum Spanning Tree for Wireless Ad-hoc Networks of a class of simple and local algorithms called Nearest Neighbor Tree (NNT) algorithms for energy-efficient
Quality of Service (QoS) security in mobile ad hoc networks
Lu, Bin
2006-10-30T23:59:59.000Z
With the rapid proliferation of wireless networks and mobile computing applications, Quality of Service (QoS) for mobile ad hoc networks (MANETs) has received increased attention. Security is a critical aspect of QoS provisioning in the MANET...
ad-hoc vehicular network: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Information Sharing in Vehicular Ad Hoc Networks. Open Access Theses and Dissertations Summary: ??The...
Power control in reactive routing protocol for Mobile Ad Hoc Network
Heni, Maher
2012-01-01T23:59:59.000Z
The aim of this work is to change the routing strategy of AODV protocol (Ad hoc On Demand Vector) in order to improve the energy consumption in mobile ad hoc networks (MANET). The purpose is to minimize the regular period of HELLO messages generated by the AODV protocol used for the research, development and maintenance of routes. This information is useful to have an idea about battery power levels of different network hosts. After storing this information, the node elect the shortest path following the classical model used this information to elect safest path (make a compromise) in terms of energy. Transmitter node does not select another node as its battery will be exhausted soon. Any node of the network can have the same information's about the neighborhoods as well as other information about the energy level of the different terminal to avoid routing using a link that will be lost due to an exhausted battery of a node in this link. Analytical study and simulations by Jist/SWANS have been conducted to no...
An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network
An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network Sheetalkumar Doshi of an on-demand minimum energy routing protocol and suggests mechanisms for their imple- mentation. We of an on-demand minimum energy routing protocol in terms of energy savings with an existing on-demand ad
An Energy-Aware On-Demand Routing Protocol for Ad-Hoc Wireless Networks
Veerayya, Mallapur
2008-01-01T23:59:59.000Z
An ad-hoc wireless network is a collection of nodes that come together to dynamically create a network, with no fixed infrastructure or centralized administration. An ad-hoc network is characterized by energy constrained nodes, bandwidth constrained links and dynamic topology. With the growing use of wireless networks (including ad-hoc networks) for real-time applications, such as voice, video, and real-time data, the need for Quality of Service (QoS) guarantees in terms of delay, bandwidth, and packet loss is becoming increasingly important. Providing QoS in ad-hoc networks is a challenging task because of dynamic nature of network topology and imprecise state information. Hence, it is important to have a dynamic routing protocol with fast re-routing capability, which also provides stable route during the life-time of the flows. In this thesis, we have proposed a novel, energy aware, stable routing protocol named, Stability-based QoS-capable Ad-hoc On-demand Distance Vector (SQ-AODV), which is an enhancement...
An Adaptive Routing Mechanism For Ad Hoc Wireless Sensor Jane E Tateson and Ian W Marshall, BTexact
Haddadi, Hamed
An Adaptive Routing Mechanism For Ad Hoc Wireless Sensor Networks Jane E Tateson and Ian W Marshall for a network of ad hoc wireless sensor nodes. The mechanism enables sensor nodes to minimize route cost by varying their transmission range, and by experimenting with the neighbours from which they forward data
Holliday, JoAnne
Power Control MAC Protocol Analysis and Improvement for Ad Hoc Networks Ping Ding, JoAnne Holliday power control protocols have been proposed to address the limited power supplies in ad hoc networks in the same transmission. In this paper, we review different power control MAC protocols, and analyze
Lazos, Loukas
Energy-Aware Secure Multicast Communication In Wireless Ad-Hoc Networks Loukas Lazos, and Radha Poovendran Abstract-- In this paper we address the problem of efficiently securing multicast communication in energy constrained wireless ad hoc networks. We show that existing scalable key distribution techniques
Chuah, Mooi-Choo "Mooi"
A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks M. Chuah, P.Yang, J University Bethlehem, PA 18015 Abstract-- Several intrusion detection approaches have been proposed in sparse ad hoc networks. In this paper, we propose a ferry-based intrusion detection and mitigation (FBIDM
Lyu, Michael R.
distributed systems, security in ad hoc networks is based on the use of a key management system. Specific key the network. The new solution is evaluated through simulation and implementation, and the resultsTrust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith C. H. Ngai
Route Throughput Analysis with Spectral Reuse for Multi-Rate Mobile Ad Hoc Networks
Tseng, Yu-Chee
networks (MANETs) have received a lot of attention for its flexible network architecture. While many network (MANET) is a flexible and dynamic architecture that is attractive due to its ease in network1 Route Throughput Analysis with Spectral Reuse for Multi-Rate Mobile Ad Hoc Networks Lien-Wu Chen
Location Discovery using Ad Hoc Anand S. Gajparia and Po Wah Yau
Dent, Alexander W.
worker. Such a scenario would also vastly reduce the time and cost of stock-taking. Instead of itemising items of stock in a warehouse. We suppose that the stock items contain devices capable of forming an ad hoc network. When a warehouse worker wishes to locate an item in the ware- house, the stock items
Opportunistic Routing in Wireless Ad Hoc Networks: Upper Bounds for the Packet
Mans, Bernard
routing, in a realistic network model where link conditions are variable. We analyze the performance1 Opportunistic Routing in Wireless Ad Hoc Networks: Upper Bounds for the Packet Propagation Speed to the destination. In this paper, we provide upper bounds on the packet propaga- tion speed for opportunistic
Load and Energy Aware Topology Control in Wireless Ad-hoc Networks
Rahman, A.K.M. Ashikur
of (energy efficient) relays. However, using the same set of relays all the time causes some nodes to becomeLoad and Energy Aware Topology Control in Wireless Ad-hoc Networks Tandra Chakraborty, Fazlay Rabbi a family of connected topology with (possibly) disjoint relay sets. Thus, by creating different energy
PATTERN-BASED COLLABORATION IN AD-HOC TEAMS THROUGH MESSAGE ANNOTATION
Dustdar, Schahram
PATTERN-BASED COLLABORATION IN AD-HOC TEAMS THROUGH MESSAGE ANNOTATION Daniel Schall, Robert: Collaboration Patterns, Message Annotation, Coordination Support, Interaction Patterns Abstract: In this paper we present a specification for annotating messages to enable computer-supported message processing
Using Energy-Efficient Overlays to Reduce Packet Error Rates in Wireless Ad-Hoc Networks
Khan, Bilal
the problem of how to balance Western Michigan University, MI. John Jay College of Criminal Justice, City1 Using Energy-Efficient Overlays to Reduce Packet Error Rates in Wireless Ad-Hoc Networks A. Al-Fuqaha G. Ben Brahim M. Guizani B. Khan Abstract-- In this paper we present new energy-efficient tech
Delay and Capacity Trade-offs in Mobile Ad Hoc Networks: A Global Perspective
Chen, Yuanzhu Peter
Mazumdar, Ness Shroff School of Electrical and Computer Engineering Purdue University West Lafayette, IN 47907, USA Email: {gsharma,shroff}@ecn.purdue.edu Department of Electrical and Computer Engineering the delay and capacity trade-offs in mobile ad hoc networks. This line of investigation started
Using Variable-Range Transmission Power Control in Wireless Ad Hoc Networks
Gomez-Castellanos, Javier
Using Variable-Range Transmission Power Control in Wireless Ad Hoc Networks Javier Gomez and Andrew control on the physical and network connectivity, network capacity, and power savings of wireless multihop networks based, not on common-range which is prevalent today, but on variable-range power control. Index
Power Control and Clustering in Ad Hoc Networks Vikas Kawadia and P. R. Kumar
Kawadia, Vikas
Power Control and Clustering in Ad Hoc Networks Vikas Kawadia and P. R. Kumar Department consider the problem of power control when nodes are non-homogeneously dispersed in space. In such situations, one seeks to employ per packet power control depending on the source and destination
Revisiting multimedia streaming in mobile ad hoc Peng Xue Surendar Chandra
Chandra, Surendar
setups to show that there is a mis-match between expectations of the local system designers the resource consumed without a major revamp of existing operating systems or requiring special hardware. We im, multimedia streaming, resource management 1. MOTIVATION -OBSERVED SYSTEM BE- HAVIOR Mobile ad hoc networking
14. A TAXONOMY OF DATA COMMUNICATION PROTOCOLS FOR VEHICULAR AD HOC NETWORKS
Stojmenovic, Ivan
1 14. A TAXONOMY OF DATA COMMUNICATION PROTOCOLS FOR VEHICULAR AD HOC NETWORKS Yousef efficiency. In this paper, we provide the first known taxonomy of VANET data communication protocols, based, vehicle connectivity, urgency, and message contents. The taxonomy provides fundamental blocks in VANET
Non-Blocking, Localized Routing Algorithm for Balanced Energy Consumption in Mobile Ad Hoc Networks
Lee, Ben
1 Non-Blocking, Localized Routing Algorithm for Balanced Energy Consumption in Mobile Ad Hoc relevant nodes but also to balance individual battery levels. Unbalanced energy usage will result achieves a trade-off between balanced energy consumption and shortest routing delay, and at the same time
Energy-Balanced Cooperative Routing in Multihop Wireless Ad Hoc Networks
Wang, Yu
Energy-Balanced Cooperative Routing in Multihop Wireless Ad Hoc Networks Siyuan Chen Minsu Huang. In this paper, we aim to study the impact of cooperative routing on balancing the energy distribution among their transmission power, our cooperative routing method can balance the energy among neighboring nodes and maximize
Ad Hoc Categories and Geospatial Ontology Position Paper for COSIT Ontology Workshop
Bennett, Brandon
1 Ad Hoc Categories and Geospatial Ontology Position Paper for COSIT Ontology Workshop Jeffrey S and Geospatial Ontology There is a dependence relationship which exists between the domain of contraband prevention and geospatial ontology, namely the former domain would not exist if there were not also entities
ENERGY-AWARE SECURE MULTICAST COMMUNICATION IN AD-HOC NETWORKS USING GEOGRAPHIC LOCATION INFORMATION
Lazos, Loukas
ENERGY-AWARE SECURE MULTICAST COMMUNICATION IN AD-HOC NETWORKS USING GEOGRAPHIC LOCATION INFORMATION Loukas Lazos, Radha Poovendran Network Security and Cryptography Laboratory University by NSF grant ANI-0093187 and ARO grant DAAD-190210242 ABSTRACT The problem of securing multicast
An Approach to Minimal Power Routing and Scheduling in Wireless Ad Hoc Networks
Massachusetts at Amherst, University of
's fixed power level that is used, leading to data loss. The problem that we address is primarily a routingAn Approach to Minimal Power Routing and Scheduling in Wireless Ad Hoc Networks Sugata Hazarika # Jim Kurose # Dennis Goeckel + # Department of Computer Science + Department. of Electrical Engineering
PERFORMANCE OF DISTRIBUTED UTILITY-BASED POWER CONTROL FOR WIRELESS AD HOC NETWORKS
Kuzmanovic, Aleksandar
PERFORMANCE OF DISTRIBUTED UTILITY-BASED POWER CONTROL FOR WIRELESS AD HOC NETWORKS Jianwei Huang network. The users exchange prices that reflect their loss in utility due to interference. The prices are then used to determine optimal (utility maximizing) power levels for each user. We present simulation
An Approach to Minimal Power Routing and Scheduling in Wireless Ad Hoc Networks
Massachusetts at Amherst, University of
's fixed power level that is used, leading to data loss. The problem that we address is primarily a routingAn Approach to Minimal Power Routing and Scheduling in Wireless Ad Hoc Networks Sugata Hazarika Jim Kurose Dennis Goeckel Department of Computer Science Department. of Electrical Engineering University
The Upper Bound of Capacity for A Concurrent-transmission-based Ad-hoc Network
Tseng, Yu-Chee
1 The Upper Bound of Capacity for A Concurrent-transmission-based Ad-hoc Network with Single National Chiao-Tung University, Hsin-Chu, 30010 Taiwan Department of Communication Engineering National Chiao-Tung University, Hsin-Chu, 30010 Taiwan Department of Information and Computer Engineering Chung
Energy-based adaptation in simulations of survivability of ad hoc communication
of opportunistic ad hoc communication scenarios is unlikely on a large scale. Part of it is due to business models and application layer services, such as security, can be designed (offline) to do an efficient use of the resources. Real- time adaptation can further minimise their impact on the energy consumption, increasing
Trust and Exclusion in Vehicular Ad Hoc Networks: An Economic Incentive Model based Approach
Paris-Sud XI, Université de
Trust and Exclusion in Vehicular Ad Hoc Networks: An Economic Incentive Model based Approach Nadia, and lowers the overall data reception ratio in the network. To tackle this, we propose a new incentive model with exclusion for malicious nodes called VIME. VIME is inspired from the signaling theory from economics
Route Duration in Mobile Ad hoc Networks Michael Pascoe*, Javier Gomez, Victor Rangel
Gomez-Castellanos, Javier
of Electrical Engineering National University of Mexico, Mexico City, Mexico Email: {michael to the limited transmission range of wireless network interfaces, multiple network interlinks or "hops" mayRoute Duration in Mobile Ad hoc Networks Michael Pascoe*, Javier Gomez, Victor Rangel Department
An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network
Brown, Timothy X.
An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network Sheetalkumar Doshi the necessary features of an on-demand minimum energy routing protocol and suggests mechanisms the performance of an on-demand minimum energy routing protocol in terms of energy savings with an existing on
Modular Topology Control and Energy Model for Wireless Ad Hoc Sensor Networks
Jay Yang, Shanchieh
Modular Topology Control and Energy Model for Wireless Ad Hoc Sensor Networks Niranjan in a harsh terrain typically are battery operated and, therefore, require energy efficient network protocols. In order to ease the analysis of the energy usage of proposed network protocols, this paper proposes
A MAC Layer Protocol for Priority-based Reliable Multicast in Wireless Ad Hoc Networks
Demirbas, Murat
A MAC Layer Protocol for Priority-based Reliable Multicast in Wireless Ad Hoc Networks Murat Abstract RTS-CTS handshake based protocols achieve "reliable unicast" by eliminating the hidden node. Here we present a simple, light-weight, and self- stabilizing MAC protocol, namely Busy Elimination
The Degree of Participation Concept in Ad Hoc Networks Youssef Iraqi and Raouf Boutaba
Boutaba, Raouf
categories: table-driven routing and source-initiated on-demand rout- ing. Examples of the first category of routing protocols are: AODV (Ad hoc On-Demand Distance Vector) routing [11]; DSR (Dynamic Source Routing mecha- nism. This can be driven by an energy saving policy for ex- ample. Special resource management
A SOLUTION TO HIDDEN TERMINAL PROBLEM OVER A SINGLE CHANNEL IN WIRELESS AD HOC NETWORKS
Latchman, Haniph A.
A SOLUTION TO HIDDEN TERMINAL PROBLEM OVER A SINGLE CHANNEL IN WIRELESS AD HOC NETWORKS Hongqiang.ufl.edu and fanggece.ufl.edu ABSTRACT In multihop wireless networks, hidden terminal problem is common and leads to the hidden terminal problem may lead to an unacceptable quality of these services. Therefore, solving
Improved Power-Delay Trade-off in Wireless Ad Hoc Networks Using Opportunistic Routing
Lee, Yong Hoon
Improved Power-Delay Trade-off in Wireless Ad Hoc Networks Using Opportunistic Routing Won power- delay trade-off than the conventional routing while providing up to a logarithmic boost that the power can be reduced at the expense of increased delay for both scenarios, but better trade-off can
Asymptotic Outage Analysis of General Motion-Invariant Ad Hoc Networks
Haenggi, Martin
Asymptotic Outage Analysis of General Motion-Invariant Ad Hoc Networks Riccardo Giacomelli Dept Krishna Ganti Dept. of Electrical and Computer Eng. University of Texas at Austin Austin, TX, USA E-mail: rganti@austin.utexas.edu Martin Haenggi Dept. of Electrical Engineering University of Notre Dame Notre
Amorphous Placement and Retrieval of Sensory Data in Sparse Mobile AdHoc Networks
a distributed repository of spatiotemporal sensory data. Prior research in which sensor networks are viewedAmorphous Placement and Retrieval of Sensory Data in Sparse Mobile AdHoc Networks HANY MORCOS AZER the least communication overhead (power). We show that the use of Data Centric Storage (DCS), or directed
Amorphous Placement and Retrieval of Sensory Data in Sparse Mobile Ad-Hoc Networks
a distributed repository of spatiotemporal sensory data. Prior research in which sensor networks are viewedAmorphous Placement and Retrieval of Sensory Data in Sparse Mobile Ad-Hoc Networks HANY MORCOS AZER the least communication overhead (power). We show that the use of Data Centric Storage (DCS), or directed
Impact of Jitter-based Techniques on Flooding over Wireless Ad hoc Networks: Model and Analysis
Paris-Sud XI, Université de
Impact of Jitter-based Techniques on Flooding over Wireless Ad hoc Networks: Model and Analysis Philippe.Jacquet@inria.fr Emmanuel Baccelli INRIA, France Emmanuel.Baccelli@inria.fr Abstract--Jitter. This paper investigates on the impact of the standardized jitter mechanism on network-wide packet
Maximizing the Number of Broadcast Operations in Random Geometric Ad-Hoc Wireless Networks
Calamoneri, Tiziana
static ad-hoc wireless networks whose nodes, equipped with the same initial battery charge, may dynamically change their transmission range. When a node v transmits with range r(v), its battery charge of a node depends, in turn, on the energy power supplied to the node. In particular, the power Pv required
Energy savings in wireless ad hoc sensor networks as a result of network synchronisation
Haddadi, Hamed
Energy savings in wireless ad hoc sensor networks as a result of network synchronisation Antonio of oceanographic monitoring using a collegiate-managed autonomous network of energy-conscious wireless sensors. We-to-node synchronised transmissions in order to reduce overhearing and therefore reduce energy expenses. SSSNP (Self
TCP Performance over Mobile Ad-hoc Networks -A Quantitative Study
Park, Seung-Jong "Jay"
gaining maturity, some researchers have lately shifted focus to the transport layer performance in ad-hoc networks [8], [9], [10]. Since TCP (Transmission Control Protocol) is by far the most used transport pro notification (ELFN) to the source from the link failure point. The source, upon receiving the ELFN freezes TCP
DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS
Hou, Y. Thomas
1 DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudainayagam of functioning and available resources. In this paper, we propose a Device and Energy Aware Routing protocol-powered nodes and battery-powered nodes. We embed both the energy and the device awareness into the routing
EAGR: Energy Aware Greedy Routing Scheme for Wireless Ad hoc Networks Sachin Sharma
Dharmaraja, S.
EAGR: Energy Aware Greedy Routing Scheme for Wireless Ad hoc Networks Sachin Sharma Tejas Networks Delhi, New Delhi, India (email: dharmar@maths.iitd.ac.in) Abstract This paper presents Energy Aware distributed nodes that communicate over a wireless link. In this paper we present a scalable, Energy Aware
A Mobility and Energy-aware Hierarchical Intrusion Detection System for Mobile ad hoc Networks
Stavrakakis, Ioannis
A Mobility and Energy-aware Hierarchical Intrusion Detection System for Mobile ad hoc Networks consumption. The proposed architecture adopts and enhances the Mobility and Energy Aware Clustering Algorithm and energy of nodes in the cluster formation in order to improve detection accuracy and re- duce energy
Minimum-Energy Topology Control Algorithms in Ad Hoc Joseph Y. Halpern Li (Erran) Li
Halpern, Joseph Y.
for an extended period of time. In order to accomplish this without a renewable energy source, energy conservationMinimum-Energy Topology Control Algorithms in Ad Hoc Networks1 Joseph Y. Halpern Li (Erran) Li Dept Holmdel, NJ 07733 halpern@cs.cornell.edu erranlli@dnrc.bell-labs.com August 7, 2004 1 Based on "Minimum-Energy
Effect of Vehicle Mobility on Connectivity of Vehicular Ad Hoc Networks
Zhou, Xiangyun "Sean"
Effect of Vehicle Mobility on Connectivity of Vehicular Ad Hoc Networks Salman Durrani, Xiangyun equivalent speed parameter and develop an analytical model to explain the effect of vehicle mobility vehicle speed and it decreases as the standard deviation of the vehicle speed increases. Using
Secure Group-based Information Sharing in Mobile Ad Hoc Networks
Wang, Yu
efforts such as joint intrusion detection. As an example, Phoenix Joint Terrorism Task Forces have information. Therefore, in an integrated ad hoc network, group-based data access must be controlled through. First, even with Elliptic Curve Cryptography, symmetric encryption still has its unique advantages
Ad-Hoc Association-Rule Mining within the Data Warehouse Svetlozar Nestorov
Nestorov, Svetlozar
Ad-Hoc Association-Rule Mining within the Data Warehouse Svetlozar Nestorov Department of Computer software systems. Association-rule mining, which captures co-occurrence patterns within data, has attracted considerable efforts from data warehousing researchers and practitioners alike. Unfortunately, most data mining
Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking
Sirer, Emin Gun
Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking protocols re- quires knowledge of the energy consumption behavior of actual wireless interfaces. But little practical information is available about the energy consumption behavior of well-known wireless network
Steimann, Friedrich
for an appropriate development support for devices with short life cycles. Third-party solutions often do not reachAbstract -- Developing software for mobile or ad hoc scenarios is very cost intensive. Different processors and big memories are available in principle, they con- sume a great amount of valuable battery
Jarvis, Stephen
Distributed Broadcast Scheduling in Mobile Ad Hoc Networks with Unknown Topologies Guang Tan. In this paper we study the distributed broadcast schedul- ing problem in ad hoc networks. In broadcasting is a fundamental communication task in mobile ad hoc networks, and minimizing broadcasting time (or latency
Abstract--A mobile ad hoc network is a wireless communication network which does not rely on a fixed
Lyu, Michael R.
hoc networks. We propose a secure public key authentication service based on a trust model nodes in the networks. We perform an overall evaluation of our proposed approach by simulations distributed systems, security in ad hoc networks is based on the use of a key management system
PNNI routing support for ad hoc mobile networking: A flat architecture
Martinez, L.; Sholander, P.; Tolendino, L.
1997-12-01T23:59:59.000Z
This contribution extends the Outside Nodal Hierarchy List (ONHL) procedures described in ATM Form Contribution 97-0766. These extensions allow multiple mobile networks to form either an ad hoc network or an extension of a fixed PNNI infrastructure. This contribution covers the simplest case where the top-most Logical Group Nodes (LGNs), in those mobile networks, all reside at the same level in a PNNI hierarchy. Future contributions will cover the general case where those top-most LGNs reside at different hierarchy levels. This contribution considers a flat ad hoc network architecture--in the sense that each mobile network always participates in the PNNI hierarchy at the preconfigured level of its top-most LGN.
PNNI routing support for ad hoc mobile networking: The multilevel case
Martinez, L.; Sholander, P.; Tolendino, L.
1998-01-01T23:59:59.000Z
This contribution extends the Outside Nodal Hierarchy List (ONHL) procedures described in ATM Forum Contributions 97-0766 and 97-0933. These extensions allow multiple mobile networks to form either an ad hoc network or an extension of a fixed PNNI infrastructure. A previous contribution (97-1073) covered the simplest case where the top-most Logical Group Nodes (LGNs), in those mobile networks, all resided at the same level in a PNNI hierarchy. This contribution covers the more general case wherein those top-most LGNs may reside at different PNNI hierarchy levels. Both of the SNL contributions consider flat ad hoc network architectures in the sense that each mobile network always participates in the PNNI hierarchy at the pre-configured level of its top-most LGN.
Acharya, Tamaghna; Roy, Rajarshi; 10.5121/ijwmn.2010.2210
2010-01-01T23:59:59.000Z
For stationary wireless ad hoc networks, one of the key challenging issues in routing and multicasting is to conserve as much energy as possible without compromising path efficiency measured as end-to-end delay. In this paper, we address the problem of path efficient and energy aware multicasting in static wireless ad hoc networks. We propose a novel distributed scalable algorithm for finding a virtual multicast backbone (VMB). Based on this VMB, we have further developed a multicasting scheme that jointly improves path efficiency and energy conservation. By exploiting inherent broadcast advantage of wireless communication and employing a more realistic energy consumption model for wireless communication which not only depends on radio propagation losses but also on energy losses in transceiver circuitry, our simulation results show that the proposed VMB-based multicasting scheme outperforms existing prominent tree based energy conserving, path efficient multicasting schemes.
Warfield, Andrew
A Data Synchronization Service for Ad Hoc Groups Terry Coatta, Norman C. Hutchinson, Andrew: norm@cs.ubc.ca Computer Laboratory, University of Cambridge, Cambridge, United Kingdom Email: andrew
Protocoles distribues de contr^ole d'acc`es au medium pour reseaux ad hoc fortement charges
Coupechoux, Marceau
´es Distributed MAC Protocols for Heavily Loaded Ad Hoc Networks Marceau Coupechoux Th`ese pr´esent´ee `a l juin 2004 #12;c Copyright by Marceau Coupechoux, 2005. All Rights Reserved #12;Remerciements Je
Coupechoux, Marceau
A Scheduling Policy for Dense and Highly Mobile Ad Hoc Networks Marceau Coupechoux*º, Christian, cbonnet@eurecom.fr ºResearch and Innovation, Alcatel CIT, Marcoussis France, {marceau
Probabilistic Power Management for Wireless Ad Hoc Networks
Li, Baochun
mode to conserve energy, if they do not participate as sources or destinations of active connections of the local neighborhood within its range. Connectivity is still maintained due to the natural routing networks. Recent work has shown that, by appropri- ately powering off nodes, energy may be significantly
A Cooperative Communication Protocol for Wireless Ad-hoc Networks
, MMII. All rights reserved. The author hereby grants to MIT permission to reproduce and distribute in the network layer, where all nodes act as routers to relay messages. Cooperative transmission takes this idea. He was quick to o#11;er solutions when I worked my way into a corner, and constantly prompted me
A State-of-the-art Survey on IDS for Mobile Ad-Hoc Networks and Wireless Mesh Networks
Deb, Novarun; Chaki, Nabendu
2011-01-01T23:59:59.000Z
An Intrusion Detection System (IDS) detects malicious and selfish nodes in a network. Ad hoc networks are often secured by using either intrusion detection or by secure routing. Designing efficient IDS for wireless ad-hoc networks that would not affect the performance of the network significantly is indeed a challenging task. Arguably, the most common thing in a review paper in the domain of wireless networks is to compare the performances of different solutions using simulation results. However, variance in multiple configuration aspects including that due to different underlying routing protocols, makes the task of simulation based comparative evaluation of IDS solutions somewhat unrealistic. In stead, the authors have followed an analytic approach to identify the gaps in the existing IDS solutions for MANETs and wireless mesh networks. The paper aims to ease the job of a new researcher by exposing him to the state of the art research issues on IDS. Nearly 80% of the works cited in this paper are published ...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applications
Al-Omari, Saleh Ali K; 10.5121/jgraphhoc.2010.2107
2010-01-01T23:59:59.000Z
Mobile Ad Hoc Network (MANET) is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized administrator also the wireless nodes that can dynamically form a network to exchange information without using any existing fixed network infrastructure. And it's an autonomous system in which mobile hosts connected by wireless links are free to be dynamically and some time act as routers at the same time, and we discuss in this paper the distinct characteristics of traditional wired networks, including network configuration may change at any time, there is no direction or limit the movement and so on, and thus needed a new optional path Agreement (Routing Protocol) to identify nodes for these actions communicate with each other path, An ideal choice way the agreement should not only be able to find the right path, and the Ad Hoc Network must be able to adapt to changing network of this type at any...
Security Communications Protocol Ad Hoc Working Group | Department of
Office of Environmental Management (EM)
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergy SmallImplementingSecurity SymposiumSecuring the Nation's GridEnergy
Section 180(c) Ad Hoc Working Group | Department of Energy
Office of Environmental Management (EM)
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2Uranium Transfer to FundPreparedContinuing Appropriations Act |
Security Communications Protocol Ad Hoc Working Group | Department of
Office of Environmental Management (EM)
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2Uranium Transfer to FundPreparedContinuing AppropriationsWLANs
Gruenwald, Le
Managing Real-Time Database Transactions in Mobile Ad-Hoc Networks ** Le Gruenwald Shankar M. Banik, transaction management, ad-hoc networks. 1. INTRODUCTION Rapid developments in wireless technology have enabled mobile users to access data from different sites. The Mobile MultiDatabase Management Systems
Performance Analysis of Contention Window Cheating Misbehaviors in Mobile Ad Hoc Networks
Kalaiarasi, R; Pari, S Neelavathy; Sridharan, D
2010-01-01T23:59:59.000Z
Mobile Ad Hoc Network (MANET) is a collection of nodes that can be rapidly deployed as a multi-hop network without the aid of any centralized administration. Misbehavior is challenged by bandwidth and energy efficient medium access control and fair share of throughput. Node misbehavior plays an important role in MANET. In this survey, few of the contention window misbehavior is reviewed and compared. The contention window cheating either minimizes the active communication of the network or reduces bandwidth utilization of a particular node. The classification presented is in no case unique but summarizes the chief characteristics of many published proposals for contention window cheating. After getting insight into the different contention window misbehavior, few of the enhancements that can be done to improve the existing contention window are suggested. The purpose of this paper is to facilitate the research efforts in combining the existing solutions to offer more efficient methods to reduce contention win...
Song, Yi
2011-01-01T23:59:59.000Z
In a cognitive radio (CR) network, CR users intend to operate over the same spectrum band licensed to legacy networks. A tradeoff exists between protecting the communications in legacy networks and maximizing the throughput of CR transmissions, especially when CR links are unstable due to the mobility of CR users. Because of the non-zero probability of false detection and implementation complexity of spectrum sensing, in this paper, we investigate a sensing-free spectrum sharing scenario for mobile CR ad hoc networks to improve the frequency reuse by incorporating the location awareness capability in CR networks. We propose an optimal power control algorithm for the CR transmitter to maximize the concurrent transmission region of CR users especially in mobile scenarios. Under the proposed power control algorithm, the mobile CR network achieves maximized throughput without causing harmful interference to primary users in the legacy network. Simulation results show that the proposed optimal power control algori...
Distributed Stochastic Power Control in Ad-hoc Networks: A Nonconvex Case
Yang, Lei; Zhang, Junshan; Li, Jason H
2011-01-01T23:59:59.000Z
Utility-based power allocation in wireless ad-hoc networks is inherently nonconvex because of the global coupling induced by the co-channel interference. To tackle this challenge, we first show that the globally optimal point lies on the boundary of the feasible region, which is utilized as a basis to transform the utility maximization problem into an equivalent max-min problem with more structure. By using extended duality theory, penalty multipliers are introduced for penalizing the constraint violations, and the minimum weighted utility maximization problem is then decomposed into subproblems for individual users to devise a distributed stochastic power control algorithm, where each user stochastically adjusts its target utility to improve the total utility by simulated annealing. The proposed distributed power control algorithm can guarantee global optimality at the cost of slow convergence due to simulated annealing involved in the global optimization. The geometric cooling scheme and suitable penalty pa...
A Multipath Energy-Aware On demand Source Routing Protocol for Mobile Ad-Hoc Networks
Chettibi, Saloua
2009-01-01T23:59:59.000Z
Energy consumption is the most challenging issue in routing protocol design for mobile ad-hoc networks (MANETs), since mobile nodes are battery powered. Furthermore, replacing or recharging batteries is often impossible in critical environments such as in military or rescue missions. In a MANET, the energy depletion of a node does not affect the node itself only, but the overall network lifetime. In this paper, we present multipath and energy-aware on demand source routing (MEA-DSR) protocol, which exploits route diversity and information about batteries-energy levels for balancing energy consumption between mobile nodes. Simulation results, have shown that MEA-DSR protocol is more energy efficient than DSR in almost mobility scenarios.
de Veciana, Gustavo
A Comprehensive Energy Conservation Solution for Mobile Ad Hoc Networks John A. Stine and Gustavo, TX 78712 Abstract- Multiple energy conserving approaches have been proposed for wireless networks Routing (NSR)1 , that these types of energy conservation mechanisms can be managed si- multaneously. We
Perkins, Dmitri
of fixed infrastructure. The primary motivation for such networks is increased flexibility and mobilityAbstract- Mobile Ad Hoc NETworks (MANETs) are an emerging class of network architectures that are characterized by their highly dynamic topology, limited resources (i. e., bandwidth and power), and lack
Enhancing the Support of Multi-Hopping in an IEEE 802.11 Ad-Hoc Hanem A. Eladly
Chen, Thomas M.
Enhancing the Support of Multi-Hopping in an IEEE 802.11 Ad-Hoc Network Hanem A. Eladly SMU, Dept of EE, PO Box 750338, Dallas, TX, USA heladly@mail.smu.edu Thomas M. Chen SMU, Dept of EE, PO Box 750338, Dallas, TX, USA tchen@mail.smu.edu Abstract Previous studies have proved that the performance of IEEE 802
Design Considerations for an On-Demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network
Brown, Timothy X.
1 Design Considerations for an On-Demand Minimum Energy Routing Protocol for a Wireless Ad Hoc- demand minimum energy routing protocol and suggests mechanisms for their implementation. We highlight of an 'energy aware' link cache for storing this information. We also compare the performance of an on-demand
Paris-Sud XI, Université de
Abstract-- Wireless Sensor Network (WSN) is an emerging special type of ad-hoc wireless networks the needs for special type of applications where Wireless Sensor Networks (WSN) can play an important role that differentiate it from other types of wireless networks. These differences raise new challenges to be overcome
Energy-Efficient Data Broadcasting in Mobile Ad-Hoc Networks** Le Gruenwald, Muhammad Javed, Meng Gu
Gruenwald, Le
is supported in part by National Science Foundation grant No. EIA-9973465 Abstract Energy saving is the mostEnergy-Efficient Data Broadcasting in Mobile Ad-Hoc Networks** Le Gruenwald, Muhammad Javed, Meng is the main method of information dissemination in wireless networks as its cost is independent of the number
228 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 7, NO. 2, APRIL 1999 Ad Hoc Mobility Management with
Haas, Zygmunt J.
the construction of UQS through the balanced incomplete block designs. The average cost, due to call loss is sometimes necessary to reduce the cost of mobility management. Index Terms--Ad hoc network, balanced on the average cost, we investigate the tradeoff between the system reliability and the cost of location updates
Cui, Jun-Hong
acoustic link capacity, are significantly different from ground-based mo- bile ad-hoc networks (MANET-disciplinary efforts of acoustic communication, signal pro- cessing and mobile acoustic network protocol design. I investigations, e.g., for marine incidents (especially involved with chemi- cal pollution and oil spill
Power-Aware Routing in Mobile Ad Hoc Networks Suesh Singh and Mke Woo C. S. Mghavendra
Han, Richard Y.
in energy con- sumption obtained by using PAMAS, our MAC layer pr- tocol). Furthermore, using these new) or Wow insurance companies to tie claims horn the field. Building such ad hoc networks poses to be energy conserving so that battery fife is maximized. Several technologies are being developed to achieve
Ad-hoc On-Demand Distance Vector Routing Charles E. Perkins
Han, Richard Y.
-hoc networks. Each Mobile Host operates as a specialized router, and routes are obtained as needed i.e., on
Sun, Yin; Li, Yunzhou; Zhou, Shidong; Xu, Xibin
2010-01-01T23:59:59.000Z
This paper studies a spectrum sharing scenario between an uplink cognitive relay network (CRN) and some nearby low power ad-hoc networks. In particular, the dynamic resource allocation of the CRN is analyzed, which aims to minimize the average interfering time with the ad-hoc networks subject to a minimal average uplink throughput constraint. A long term average rate formula is considered, which is achieved by a half-duplex decode-and-forward (DF) relay strategy with multi-channel transmissions. Both the source and relay are allowed to queue their data, by which they can adjust the transmission rates flexibly based on sensing and predicting the channel state and ad-hoc traffic. The dynamic resource allocation of the CRN is formulated as a non-convex stochastic optimization problem. By carefully analyzing the optimal transmission time scheduling, it is reduced to a stochastic convex optimization problem and solved by the dual optimization method. The signaling and computation processes are designed carefully t...
A Comprehensive study of a New Multipath Energy Aware Routing Protocol for Mobile Ad-hoc Networks
Chettibi, Saloua
2009-01-01T23:59:59.000Z
Maximizing network lifetime is a very challenging issue in routing protocol design for Mobile Ad-hoc NETworks (MANETs), since mobile nodes are powered by limited-capacity batteries. Furthermore, replacing or recharging batteries is often impossible in critical environments (e.g. battlefields, disaster areas, etc.) The proposed MEA-DSR (Multipath Energy-Aware on Demand Source Routing) protocol uses a load distribution policy in order to maximize network lifetime. The simulation results have shown the efficiency of the proposed protocol in comparison to DSR routing protocol in many difficult scenarios
Chatzigiannakis, Ioannis; Akribopoulos, Orestis; Logaras, Marios; Kokkinos, Panagiotis; Spirakis, Paul
2010-01-01T23:59:59.000Z
In this work, we discuss multiplayer pervasive games that rely on the use of ad hoc mobile sensor networks. The unique feature in such games is that players interact with each other and their surrounding environment by using movement and presence as a means of performing game-related actions, utilizing sensor devices. We discuss the fundamental issues and challenges related to these type of games and the scenarios associated with them. We also present and evaluate an example of such a game, called the "Hot Potato", developed using the Sun SPOT hardware platform. We provide a set of experimental results, so as to both evaluate our implementation and also to identify issues that arise in pervasive games which utilize sensor network nodes, which show that there is great potential in this type of games.
Kawadia, Vikas
Principles and Protocols for Power Control in Wireless Ad Hoc Networks Vikas Kawadia and P. R. Kumar-- Transmit power control is a prototypical example of a cross-layer design problem. The transmit power level consumption. The challenge is to determine where in the architecture the power control problem
An Intrusion Detection Tool for AODV-based Ad hoc Wireless Networks
California at Santa Barbara, University of
University of California, Santa Barbara {vigna,sumitg,kavitha,ebelding,kemm}@cs.ucsb.edu Abstract Mobile ad. These techniques prevent a range of attacks against routing protocols but are expensive to de- ploy on energy the stream of audit data to identify evidence of the occurrence of the modeled attacks. Misuse and anomaly
An Intrusion Detection Tool for AODV-based Ad hoc Wireless Networks
Belding-Royer, Elizabeth M.
University of California, Santa Barbara vigna,sumitg,kavitha,ebelding,kemmÂ¡ @cs.ucsb.edu Abstract Mobile ad. These techniques prevent a range of attacks against routing protocols but are expensive to de- ploy on energy "signatures") that are matched against the stream of audit data to identify evidence of the oc- currence
Fuzzy Routing in Ad Hoc Networks Gasim Alandjani and Eric E. Johnson
Johnson, Eric E.
of Electrical and Computer Engineering New Mexico State University ejohnson@nmsu.edu Abstract Routing discovery and packet forwarding. In wired net- works, bandwidth is high and network topology is rela- tively in the net- work so that the next hop for an arriving packet can be computed quickly at each router
Trinder, Phil
in Libya, and the Cultural Affairs in London, for the financial support during my study. I would like in Libya, also to my father (Allah bless his soul). ii #12;Declaration I hereby declare that the work
Design and analysis of distributed primitives for mobile ad hoc networks
Chen, Yu
2006-10-30T23:59:59.000Z
by the network, which poses a serious challenge for the design and analysis of reliable protocols. In this work, three different approaches are used to handle mobility. The first part of the dissertation employs the simple technique of ignoring the mobility...
A Self-Organizing Heuristic for Building Optimal Heterogeneous Ad-Hoc Sensor Networks
Minai, Ali A.
with equal power, which means that they all have the same transmission radius. Such homoge- neous networks-making about transmission power. However, in sufficiently dense networks (or in networks with significant amount of work on heterogeneous networks, mainly due to their flexibility and better fit into potential
A Scalable Model for Channel Access Protocols in Multihop Ad Hoc Networks
California at Santa Cruz, University of
@soe.ucsc.edu ABSTRACT A new modeling framework is introduced for the analytical study of medium access control (MAC be modeled individually, i.e., it allows a per-node setup of many layer-specific parameters. Moreover methodologies; C.4 [Performance of Systems]: Modeling Techniques; C.2.5 [Local and Wide-Area Net- works]: Access
Exploiting Overhearing: Flow-Aware Routing for Improved Lifetime in Ad Hoc Networks
Mans, Bernard
of the schemes claiming to be energy-efficient neglect this cost by only focusing on energy costs due to local whether a more traffic-conscious routing scheme works better in improving the energy-efficiency Shrestha, Bernard Mans Department of Computing, Macquarie University Sydney, NSW 2109 Australia Email
McGilvary, Gary Andrew
2014-11-27T23:59:59.000Z
Commercial and private cloud providers offer virtualized resources via a set of co-located and dedicated hosts that are exclusively reserved for the purpose of offering a cloud service. While both cloud models appeal to ...
Yang, Sung-Bong
, Wendi Heinzelman, "ed. Mobile Ad Hoc Networks: Energy-Efficient Real-Time Data Communications", Springer-peer systems, there are the MOB system considers the mobility of peers, the Energy system considers the energy of peers, and the Hybrid system considers both mobility and energy for selecting super peers during
Future works The Ion trap -Laser cooling technique has the ad-
Hensinger, Winfried
Future works The Ion trap - Laser cooling technique has the ad- vantages to easily manipulate apparatus for trace isotope analysis. Guidance of the ion beams to the trap Laser cooling of ions with this apparatus Realization of trapping ions from ICP-MS Optimization of the experimental system for detecting
Thorhaug, A. (ed.)
1980-01-01T23:59:59.000Z
This report of Workshop I (presented in outline form) by the Greater Caribbean Energy and Environment Foundation begin an intensive focus on the energy problems of the Caribbean. The process by which environmental assessments by tropical experts can be successfully integrated into energy decisions is by: (1) international loan institutions requiring or strongly recommending excellent assessments; (2) engineering awareness of total effects of energy projects; (3) governmental environmental consciousness-raising with regard to natural resource value and potential inadvertent and unnecessary resource losses during energy development; and (4) media participation. Section headings in the outline are: preamble; introduction; research tasks: today and twenty years hence; needed research, demonstration and information dissemination projects to get knowledge about Caribbean energy-environment used; summary; recommendations; generalized conclusions; and background literature. (JGB)
Work Control Center Operating Procedure page 1 D-NSTX-OP-AD-129 Rev.OO
Princeton Plasma Physics Laboratory
Responsibilities: 7 5.0 Flow Chart of Work Package Processing: 9 7.0 Work Control Center Meetings: 12 7.1 Plan and Operations Division Energy Conversion System!Motor Control Division Environmental Restoration & Waste
Intrusion detection in mobile ad hoc networks
Sun, Bo
2005-08-29T23:59:59.000Z
.Zone-BasedIntrusionDetectionSystem(ZBIDS)...... 25 1. ZBIDSFramework.................... 25 D.InternalModeloftheIDSAgent............... 29 1. DataCollectionModule................. 30 2. DetectionEngine..................... 31 3. Local Aggregation and Correlation Engine (LACE) . . 32 4. Global... have been widely regarded as being part of the solution to protect today?s computer systems. Research on IDSs began with a report by Anderson [9] followed by Denning?s seminal paper [10], which lays the foundation for most of the current intrusion...
Ad Hoc Assessment Committee Meeting Notes
O'Laughlin, Jay
learning outcomes · Modify the template to include space to provide information on results achieved from on university learning outcomes and template categories/directions using a "hover" feature · Simplify criteria and program benchmarks o Student interview processes, including HAC requirements o Survey
Adaptive protocols for mobile ad hoc networks
Holland, Gavin Douglas
2005-02-17T23:59:59.000Z
. We investigate new link layer mechanisms that dynamically monitor and adapt to changes in link quality, including a protocol that uses common control messages to form a tight feedback control loop for adaptation of the link data rate to best match... of the presence of multirate links. We then investigate the performance of iv TCP, showing how communication outages caused by link failures and routing delays can be very detrimental to its performance. In response, we present a solution to this problem that uses...
Smart & Connected Ad-Hoc Committee
Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site
used to advance the utilization of demand response ready equipment on utility load-management and load- shaping programs Objectives of Specification Development To apply the...
Communication Algorithms for Wireless Ad Hoc Networks
Viqar, Saira
2012-10-19T23:59:59.000Z
.4 Jittering trajectories : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 37 3.5 Uniform neighbor discovery block diagram. Each BNDP instance has a message processing (MP) automaton associated with it. : : : : : : : : : : 38 3.6 Hexagonal...
Clock synchronization for mobile ad hoc networks
Chandra, Rajan
2013-02-22T23:59:59.000Z
As mobile networking advances, there is a need for services such as clock synchronization that improve performance and support the development of higher-level applications. This can be achieved by adapting existing algorithms (such as the Network...
Tam, Vincent W. L.
@gmail.com) By applying the wireless ad-hoc network and sensor technology to monitor the efficiency of workflow, a working prototype was built to demonstrate how these technologies can be combined to facilitate the analysis in a manufacturing plant. Besides, a supervisor can easily access such real-time analysis about a specific machine
Ad Hoc Committee on Employment Policies May 4, 2000
Chou, James
for Service Contracts P. Proposed Benefits and Perquisites for Long Term Casuals ii #12;Executive Summary - 1
INDOOR POSITIONING AN AD-HOC POSITIONING SYSTEM Rainer Mautz
to enable continuous tracking of the location of devices in all environments. Highly accurate, reliable 3D computers, printers, or simple tags with wireless radio connections that are `intelligent' enough to be able
A Benchmarking System for Mobile Ad Hoc Network Routing Protocols
Hiranandani, Daniel
2012-01-01T23:59:59.000Z
Limited. High-level smart meter data tra?c analysis, 2010. [2x2) equipped with smart energy meters that are able toas ?xed data sinks in smart energy meter networks [18] or
Maximizing the throughput of large ad hoc wireless networks
Hua, Y; Huang, Y; Garcia-Luna-Aceves, J J
2006-01-01T23:59:59.000Z
multi-input, single-output (MISO) protocol. During eachthe maximum throughput of the MISO protocol, in bits-meters/s/ Hz/node, is C MISO = (n ? 1) A log 2 1 + 2n P T ? h
Throughput Analysis of Wireless Ad-Hoc Cognitive Radio Networks
Banaei, Armin
2014-04-25T23:59:59.000Z
In this dissertation we consider the throughput performance of cognitive radio networks and derive the optimal sensing and access schemes for secondary users that maximizes their sum-throughput while guaranteeing certain ...
Distributed Mobility Transparent Broadcast in Mobile Ad Hoc Networks
Sikdar, Biplab
and highly adaptive to node mobility. It does not demand any neighborhood information and incurs little£ciency and alleviated interference; on the other hand, the proposed protocol achieves network energy balance by randomly- mum Connected Dominating Set (MCDS) should be elected as relay nodes, and identifying the MCDS
Topology Control in Ad Hoc Wireless Networks Using Cooperative Communication
Wu, Jie
energy consumption within its 2-hop neighborhood without losing connectivity under the CC model such that the resulting topology is strongly connected and the total energy expenditure for achieving the strong connectivity is minimized. In order to reduce the energy consumption, we take advantage of a physical layer
Randomized location service in Mobile Ad Hoc Networks
Bhattacharya, Sangeeta
2003-01-01T23:59:59.000Z
I 3. Pcrccntagc of outdated values for Algorithm II 4. Pcrccntage of outdated values for Algorithm III. , 5. Distribution of query' results lor Algorithm I with grid size 300x300m 7 6. Distribution ol' query results (or Algonthm I with gnd size... 500x500m . . . . . . z 7. Distribution of query results for Algorithm I with grid size 750x750m . . . . , . 8. Distribution of query results for Algorithm I with grid size 1000x I 000m . . 9. Distribution of query results for Algorithm II with grid...
Age Matters: Efficient Route Discovery in Mobile Ad Hoc Networks
Grossglauser, Matthias
part) by the National Competence Center in Research on Mobile Information and Communication Systems, resources such as bandwidth and bat- tery power are usually severely constrained in such networks. Therefore incur less overhead at the expense of higher route setup latency. Hybrid routing protocols [7, 6
A Full Scale Wireless Ad Hoc Network Test Bed
Brown, Timothy X.
that are bench top, indoor, fixed outdoor, and mobile outdoor. Bench top test beds employ MAC filtering, RF and propagation of the outdoor environment. Full scale outdoor test beds are often restricted to fixed sites [1 features: 1. Test bed results are reproducible. 2. The test bed provides a common platform for testing
A Generic Distributed Broadcast Scheme in Ad Hoc Wireless Networks
Wu, Jie
-to-date") before the broadcast process or a reactive process (i.e., "on-the- fly") during the broadcast process
Broadcasting in Ad Hoc Networks Based on Self-Pruning
Wu, Jie
and maintained through either a proactive process (i.e., "up-to-date") or a reactive process (i.e., "on
PERFORMANCE EVALUATION OF AD HOC PROTOCOLS FOR UNDERWATER NETWORKS
amongst Unmanned Underwater Vehicles (UUVs). Underwater networks face extreme challenges of low bandwidth amongst Unmanned Underwater Vehicles (UUVs). Underwater networks face extreme challenges of low bandwidth that the movement of underwater vehicles is not random and that it can be predicted or it is known beforehand
Smart Services for Ad Hoc Databases University of Washington
or resources. · The initial investment required to design and populate a database is also costly. Developing Capital estimated that 90% of all business data is maintained in spreadsheets [12]. Permission to copy data-base from lists of addresses of nearby schools, locations of resources (e.g., ambulances
Enabling Disconnected Transitive Communication in Mobile Ad Hoc Networks
Chaudhuri, Soma
are no longer explicitly aware of their presence, much the way the electric motor exists in the world today into multiple clusters, with connectivity available within each partition but not across partitions. Freeing
Topology management protocols in ad hoc wireless sensor networks
Kim, Hogil
2009-05-15T23:59:59.000Z
A wireless sensor network (WSN) is comprised of a few hundred or thousand au-tonomous sensor nodes spatially distributed over a particular region. Each sensornode is equipped with a wireless communication device, a small microprocessor, anda battery...
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs
Carruthers, Jeffrey
. Figure 1 depicts a conceptual "throughput versus load" curve for a network. In the presence of congestion to zero as the load increases, i.e. it follows the "Congested" curve in Figure 1 instead of following a certain point, the network throughput decreases with increasing load instead of maintaining its peak value
Geographic multicasting in wireless ad-hoc networks
Gopalakrishnan, Dhilip
1998-01-01T23:59:59.000Z
. A. The Network Model . B. Basic Principles C. The Geocast-Routing Protocol 1. Details of the Algorithm . 2. Partial Link Reversal Scheme . 3. Creation of the DAG 4. Maintenance of the DAG D. The Geocast - Multicast Protocol 1. Geocast... I Geocast-Routing: Message Types 19 LIST OF FIGURES FIGURE Page An Illustration 13 Directed Acyclic Graph 17 Creation of the Network DAG 20 Link Failure Without Link Reversals Link Failure With Link Reversals . . 21 23 Partition Detection...
A Statistical Framework for Intrusion Detection in Ad Hoc Networks
Sarkar, Saswati
with limited processing power. The overall framework provides a good balance between complexity and performance means of electronic com- munication in areas where establishing infrastructure like base stations etc. [5], [6]. These intrusions leverage system vulnerabilities. There are two ways to prevent
Continuum Equilibria for Routing in Dense Ad-hoc Networks
Lucioles, B.P. 93, 06902 Sophia-Antipolis Cedex, France. Email: Eitan.Altman@sophia.inria.fr Pierre Bernhard I3S, UniversitÂ´e de Nice-Sophia Antipolis and CNRS 940 Route des Colles, B.P. 145, 06903 Sophia.P. 93, 06902 Sophia-Antipolis Cedex, France. Email: Alonso.Silva@sophia.inria.fr Merouane Debbah SUPELEC
Capacity of Wireless Ad Hoc Networks Using Practical Directional Antennas
, which is called MC-MDA network. The capacity in MC-MDA network is derived under arbitrary and random of side lobe and back lobe into account. We derive the capacity upper-bounds of MC-MDA networks decreases when s increases. Moreover, we compare the network capacity of MC-MDA using the simplified antenna
The COMPOW Protocol for Power Control in Ad Hoc Networks
Kawadia, Vikas
.S Sreenivas and P.R. Kumar The Power Control problem · How do we choose the right transmit power level Power;3 Affects battery life · Higher power transmission is unnecessary if the receiver is close of links is critical · Find a way to ensure bidirectionality without breaking existing protocols
Truthful resource management in wireless ad hoc networks
Cai, Jianfeng
2005-11-01T23:59:59.000Z
for the public afiairs. This is reasonable because the network-wide energy saving is beneflcial for each node. Then, Pfvj = ^Pvi;vk + ^Pvk;vi+1 (3.1) vj is the winner of an auction and vk is the node of the second best bid. . After a redirection ends, another.... As an overhearing node vj competes to be the redirector within a hop, it needs to report to upstream node, vi, the minimum power Pvi;vj and listen to the downstream node, vi+1, to get the minimum power Pvj;vi+1. Since the payofi for a redirector is equal...
Performance Evaluation of Energy Efficient Ad Hoc Routing Protocols
Wang, Yu
28223, USA {lcao2, tdahlber, ywang32}@uncc.edu Abstract-- Energy aware routing protocols metric and aim to save energy consumption per packet. However, such protocols do not take the nodes' energy capacity into account. Thus, the energy consumption is not fair among nodes in the network
Performance Evaluation of Ad Hoc Routing Protocols for Military Communications
Bouras, Christos
in an environment without a fixed infrastructure, the nodes are mobile, the wireless medium has its own limitations are search-and-rescue operations, military deployment in hostile environment, and several types of police of these networks. The nodes act as routers in an environment without a fixed infrastructure, the nodes are mobile
Power Efficient Broadcasting with Cooperative Diversity in Ad hoc Networks
Krishnamurthy, Srikanth
- munications can help combat interference and fading and hence, significantly improve the reliability-Output (MISO) system, a Single-Input Multi-Output (SIMO) system or a Multi-Input Multi- Output (MIMO) system exploits the broadcast nature of the wireless channel to emulate a MISO system. Nodes par- ticipating
A Benchmarking System for Mobile Ad Hoc Network Routing Protocols
Hiranandani, Daniel
2012-01-01T23:59:59.000Z
Grid Node Density Map . . . . . . . . . . . . . . . . .9: Smart Energy Grid Node Density Map DSDV maintainng a
Routing in Vehicular Ad Hoc Networks: A Survey
Wang, Yu
have already begun to invest inter-vehicle networks. Audi, BMW, DaimlerChrysler, Fiat, Renault focuses on providing wireless access for the vehicular environment. According to the official IEEE 802
Throughput Analysis of Wireless Ad-Hoc Cognitive Radio Networks
Banaei, Armin
2014-04-25T23:59:59.000Z
In this dissertation we consider the throughput performance of cognitive radio networks and derive the optimal sensing and access schemes for secondary users that maximizes their sum-throughput while guaranteeing certain quality of service...
Consider not only working for an Ad,
Shull, Kenneth R.
Chicago Shakespeare Theatre Coca-Cola Draft FCB ESPN Facebook GolinHarris Google Groupon IBM Illinois
AdS String: Classical Solutions and Moduli Dynamics
Antal Jevicki; Kewang Jin
2010-01-29T23:59:59.000Z
We review some recent work and techniques for constructing dynamical string solutions in AdS spacetime. These solutions generalize the folded string and multi-spike solutions of GKP and Kruczenski. The methods developed for constructing these dynamical solutions are based on Pohlmeyer reduction to integrable sinh-Gordon type equations. The integrability of the equations is seen as the crucial tool for reconstruction of the string configurations. We discuss the physical meaning of these dynamical spike solutions and the question of their moduli space.
automation systems and thus becomes more complex. System requirements may change even late in the development process, lead to ad-hoc modifications of the product and require systematic (and automated) testing approaches. However, unit tests for automation software have to consider the interac- tion with hardware
Xie, Geoffrey
of constructive interdependence. As noted in the Net-Centric Operational Environment Joint Integrating Concept by the Net-Centric Environment Joint Functional Concept [NCE05], are the ability to collaborate, synchronize such as those operating in Iraq have very limited data communication capabilities between soldiers. Tactical
AUTONOMOUS UNDERSEA SYSTEMS NETWORK (AUSNET) PROTOCOLS TO SUPPORT AD-HOC AUV COMMUNICATIONS
(as opposed to network support) data transmissions. Next steps in this effort will focus on store to support a dynamically evolving topology of truly semi-autonomous networked robots. Emerging flexible low bandwidth, energy efficient architectures and protocols will enable more effective networked subsurface
Fault Tolerance Techniques for Wireless Ad Hoc Sensor Networks Farinaz Koushanfar
poten- tial to provide inexpensive and pervasive bridge between physical and computational worlds and actuators that have significantly higher fault rates than the traditional semiconductor integrated circuits
Role-Based Multicast in Highly Mobile but Sparsely Connected Ad Hoc Networks
Briesemeister, Linda
airbag ig- nition. Then, it can report the accident instantly to equipped vehicles nearby. We present
Proceedings of the AD HOC Workshop on Ceramics for Li/FeS{sub 2} batteries
Not Available
1993-12-31T23:59:59.000Z
Representatives from industry, the U.S. Advanced Battery Consortium (USABC), DOE, national laboratories, and other govt agencies met to develop recommendations and actions for accelerating the development of ceramic components critical to the successful introduction of the Li/FeS{sub 2} bipolar battery for electric vehicles. Most of the workshop is devoted to electrode materials, bipolar designs, separators, and bipolar plates. The bulk of this document is viewographs and is divided into: ceramics, USABC overview, SAFT`s Li/FeS{sub 2} USABC program, bipolar Li/FeS{sub 2} component development, design requirements for bipolar plates, separator design requirements, compatibility of ceramic insulators with lithium, characterization of MgO for use in separators, resistivity measurements of separators, sintered AlN separators for LiMS batteries, etc.
MISPAR: Mitigating Stealthy Packet Dropping in Locally-Monitored Multi-hop Wireless Ad Hoc Networks
Bagchi, Saurabh
partial neighborhood communication to detect misbehavior such as packet drop or delay. However, local-constrained, not only on energy but on bandwidth and computation as well. This limitation presents an additional loss of data or degradation of network functionality, say through disrupting network connectivity
A New Power-Aware Distributed Topology Control Algorithm for Wireless Ad Hoc Networks
Sethu, Harish
and versatile topology control algorithms that reduces energy costs while preserving connectivity. In this paper,k instead of wi,j while also preserving graph connectivity. The Directed Relative Neighborhood Graph (DRNG the topology of the network to save energy by choosing a smaller number of neighbors with which it communicates
Cooperative Energy Spanners: Energy-Efficient Topology Control in Cooperative Ad Hoc Networks
Wang, Yu
connected topology control prob- lem, which aims to find a connected topology such that the total energy) which aims to obtain a strongly-connected topology with minimum total energy consumption. They first the energy consumption using CC model. The first algorithm (DTCC) uses 2-hop neighborhood information of each
Efficient Broadcasting using Packet History in Mobile Ad-Hoc Spiros Agathos1
Papapetrou, Evaggelos
this problem. Among them, the class of algorithms that construct on-demand a connected dominating set, known as dominant pruning, yields an improved performance. Dominant pruning algorithms capitalize on neighborhood [3] and made clear that the limited bandwidth and energy resources necessitate the design
UAV surveillance using multihop ad-hoc wireless networks: a demonstrator
Boucherie, Richard J.
Critical infrastructures such as power plants, large industrial areas, harbours, rail- way emplacements of living. The number of threats that may disrupt the normal functioning of these infrastructures is growing increases, more cameras and man- power are needed to cover greater areas, increasing costs. In recent years
Comparison of two wireless ad hoc routing protocols on a hardware test-bed
Brown, Timothy X.
and are equipped with wireless ethernet cards. To maximize the lifetime of the node, conservation of battery power.g. at the operating system level, physical level, and MAC level. Energy can be conserved at the routing level by designing cross-layered protocols and deploying low-power routing algorithms that use the power cost
2004 David Malan, Harvard University 1 CodeBlue: An Ad Hoc Sensor Network
Malan, David J.
software Shared-key encryption and MAC layer based on SKIPJACK Power-aware, multihop routing protocol of patient status is difficult Current systems are paper-, phone-, radio-based Sensor nets have potential Publish/subscribe data delivery model Sensor nodes publish vital signs, location, identity Rescue
Collaborative Sensing via Local Negotiations in Ad Hoc Networks of Smart Cameras
Qureshi, Faisal Z.
to the lack of any centralized control. Categories and Subject Descriptors H.4 [Information Systems protocol that al- lows cameras nodes to setup collaborative tasks in a purely distributed manner. Camera-contained vision systems, with increasingly sophisticated image sensors, on-board processing and stor- age
Ad-Hoc And Personal Ontologies: A Prototyping Approach to Ontology Engineering
Richards, Debbie
and formal techniques that can be equated to the Waterfall system development life cycle. However, in domains]. Agile software development offers a major alternative to the traditional Waterfall system development life cycle model and process. While some fear that agile methods may not scale up or may result
Design and analysis of distributed primitives for mobile ad hoc networks
Chen, Yu
2006-10-30T23:59:59.000Z
, 39, 24, 2, 1, 12, 15, 14, 13, 16 and has length 82. The bold nodes in this sequence are a65 , a40 and the neighbors of a40 . We now consider the construction of a family of graphs, a34a207a35 , a12 a53 a144a66a109a81a149a113a109a17a141a59a141a59a141... graph satisfying a32a1a33 15 Fig. 4. Construction of a34a2a35 and a40a41a39 a53 a40a74a143a172a48a73a44 a154 a144a45a49a148a141a13a8 . Note that each a167 a39 satis es a32a1a33 with respect to a40a71a39a90a109a93a65a38a39 and a9 , and the xed point...
Real-Time Spatio-Temporal Query Processing in Mobile Ad-Hoc Sensor Networks
that has multiple sensors (e.g., mo- tion sensors, acoustic sensors, infrared light emitting diodes, and pa
RealTime SpatioTemporal Query Processing in Mobile AdHoc Sensor Networks
that has multiple sensors (e.g., mo tion sensors, acoustic sensors, infrared light emitting diodes,
A PROBABILITY COLLECTIVES APPROACH TO WEIGHTED CLUSTERING ALGORITHMS FOR AD HOC NETWORKS
Ross, Kevin
personnel or soldiers on the battlefield. It is an inefficient use of power, battery life, and bandwidth
Geodesic packet routing over self-organizing mobile ad-hoc
Julien, Christine
by devices with severe constraints on processing power, battery life, and bandwidth. Manuscript received
Benefit-based Data Caching in Ad Hoc Networks Bin Tang, Himanshu Gupta, Samir Das
Gupta, Himanshu
network by reducing the access latency and bandwidth usage. However, designing effi- cient distributed. The computing devices could be conventional computers (e.g., PDA, laptop, or PC) or backbone routing platforms in bandwidth as well as battery energy. The problem of cache placement is particularly challenging when each
On Physical Carrier Sensing in Wireless Ad Hoc Xue Yang and Njtin Vaidya
Chen, Yuanzhu Peter
of Illinois at Urbana-Champaign Department of Electrical and Computer Engineering. and Coordinated Science. While channel utilization is determined by MAC overhead, physical carrier sense has been used suffer a significant loss. 1. INTRODUCTION Two fundamental aspects of wireless communication make
Weigle, Michele
integrity in VANET. In our approach, we use network cells as security as well as communication units-cell position information integrity as well. Vehicles request that their neighbors or vehicles in oncoming on accurate location information. It is, therefore, imperative to provide mechanisms that ensure the integrity
Get more than just ad hoc methods--discover a sound theoretical framework! Boris Mirkin
Mirkin, Boris
through trial-and-error. Even the most popular clustering methods -- K-Means for partitioning the data set that not only closes gaps in K-Means and Ward methods, but also extends the meth- ods into areas of current Bivariate Analysis Feature Space and Data Scatter Preprocessing and Standardizing Mixed Data K-MEANS
Simultaneous localization and tracking in wireless ad-hoc sensor networks
Taylor, Christopher J. (Christopher Jorgen)
2005-01-01T23:59:59.000Z
In this thesis we present LaSLAT, a sensor network algorithm that uses range measurements between sensors and a moving target to simultaneously localize the sensors, calibrate sensing hardware, and recover the target's ...
Proactive Route Maintenance in Wireless Ad Hoc Fei Dai and Jie Wu
Wu, Jie
. Reactive (i.e., on- demand) protocols such as DSR [4] and AODV [5] do not up- date routing information
Achieving Robust Protocols for Mobile Ad Hoc Networks John P. Mullen
Mullen, John
School of Electrical and Computer Engineering New Mexico State University Las Cruces, NM 88003 Abstract time to time, opt to not participate in the net. Because the topology frequently changes, a MANET has backbone created by these routers, in spite of the nets dynamic topology [1, 2]. At this time, virtually
Ad hoc wireless networks with femto-cell deployment: a study
Bharucha, Zubin Rustam
2010-01-01T23:59:59.000Z
Nowadays, with a worldwide market penetration of over 50% in the mobile telecommunications sector, there is also an unrelenting demand from the subscribers for ever increasing transmission rates and availability of ...
Ad-hoc wireless network coverage with networked robots that cannot localize
Correll, Nikolaus
We study a fully distributed, reactive algorithm for deployment and maintenance of a mobile communication backbone that provides an area around a network gateway with wireless network access for higher-level agents. Possible ...
PMW: a Robust Clustering Algorithm for Mobile Ad-hoc Networks Zhaowen Xing and Le Gruenwald
Gruenwald, Le
are managed by a node in the cluster, called cluster head, has been proven to be a promising approach. Many calculating the weight utilized to determine whether a node is eligible to be a cluster head, these algorithms either consider only one metric (like mobility or power of nodes), or rely on some metric collected from
A Transparent Collaborative Integration Approach for Ad Hoc Product Data Jingzhi Guo
Guo, Jingzhi
and buy refrigerators. Now if SME1 (buyer) encodes the refrigerator in Voc1 as: the refrigerator in Voc2 as: silver
Multipath Routing in Ad Hoc Networks An-I Andy Wang Geoffrey H. Kuenning Peter Reiher
Wang, Andy
way to recover from frequent network failures, balance load and energy resources among network nodes table entries to become out of date before ever being used. Newer on-demand approaches maintain table. However, such approaches are still inefficient, since mobility can frequently break those on-demand routes
Short Paper: A Reservation MAC Protocol for Ad-Hoc Underwater Acoustic Sensor Networks
Roy, Sumit
to shore or surface buoys equipped with RF modems and signif- icant battery power; the other fixed are interconnected us- ing acoustic communications for cost effective data trans- port. The acoustic channel, however and mobile non-gateway nodes are typically much more power limited. MAC protocol design for such a network
Distributed CA-based PKI for Mobile Ad hoc Networks using Elliptic Curve Cryptography
Gaj, Krzysztof
Zouridaki1, Brian L. Mark1 , Kris Gaj1, Roshan K. Thomas2 1 George Mason University, Electrical and Computer for several reasons: (1) lack of a fixed infrastructure; (2) a centralized certification authority (CA of nodes vary in time; (4) nodes often have limited transmission and computational power, storage
Energy Efficiency in the Mobile Ad Hoc Networking Approach to Monitoring Farm Animals
Aickelin, Uwe
,709,000. The beef and veal consumption in 2002 was on average 19.7kg per capita in UK and 19.6kg in EU [3 that the proposed approach is feasible and the proposed optimizations considerably decrease the energy consumption
PERFORMANCE ANALYSIS OF POWER-AWARE ROUTE SELECTION PROTOCOLS IN MOBILE AD HOC NETWORKS
California at Santa Cruz, University of
, a hybrid protocol like the CMMBCR (Conditional Max-Min Battery Capacity Routing) mechanism has been devised-Max Battery Cost Routing) scheme tries to consider the remaining battery power of nodes to prolong- gardless of the remaining battery power of nodes. Since the transmission network2002: submitted to World
Energy-Limited vs. Interference-Limited Ad Hoc Network Capacity
Jindal, Nihar
, signal and interference power increase proportionally while thermal noise power remains constant. Thus are thermal noise and multi- user interference. If the power of each simultaneous trans- mission is increased-limited, and any further increase in transmission power provides essentially no benefit. On the other hand, thermal
On the Performance of Collision Avoidance Protocols in Ad-Hoc Networks
Paterakis, Michael
the dialogue-based scheme. Examples of such protocols are: MACA [1], MACAW [2], DBTMA [3], FPRP [5], HRMA [7
A Location-aided Power-aware Routing Protocol in Mobile Ad Hoc Networks
Li, Baochun
hard problem due to two important fac- tors: First, the nodes may be mobile, demanding the energy-efficient algorithms, we are able to derive critical global properties with re- spect to end-to-end energy-efficient. Such observations pose significant challenges to design energy-efficient packet routing protocols while still ac
Maximizing the Number of Broadcast Operations in Static Random Geometric Ad-Hoc Networks
Calamoneri, Tiziana
networks where nodes have the same initial battery charge and they may dynamically change their transmission range at every time slot. When a node v transmits with range r(v), its battery charge is decreased-Verlag Berlin Heidelberg 2007 #12;248 T. Calamoneri et al. supplied to the node. In particular, the power Pv
An Integrated Approach to Service Selection in Mobile Ad Hoc Networks Zhuoyao Zhang, Weiwei Sun
Loo, Boon Thau
potential value (PV). The PV is determined by both the service dependent information (semantic facts perceived at the application layer) and device dependent information (battery level, current load, network
Chuah, Mooi-Choo "Mooi"
] uses a variant of Telsa [8] to provide source authentication for DSR. All the above approaches suggest
Energy-Efficient Geographic Routing in Ad-hoc Wireless Networks
Haddadi, Hamed
applied to minimize the number of hops however the energy consumption is not considered. In this paper, we based on the optimal transmission range, which minimizes the total energy consumption of the transmission (summation of energy consumption of all hops). Furthermore, based on ORF, we propose the Optimal
Ad-Hoc Real-time Agent Networks Summer Research Institute
to interference and unreliable wireless medium Enables PHY-layer security #12;Micro- Controller PIC18F8720 Power => robustness, adaptivity #12;Research Results On-line calibration of analog sensor interfaces Compensates
A Unified Channel-Network Coding Treatment for User Cooperation in Wireless Ad-Hoc Networks
Li, Tiffany Jing
beneficial for wireless systems, since while an individual channel operating alone may be useless due communicating with a common destination. We take a cross-layer approach and leverage the technologies from both channel coding has long been established as a fundamental technology for protecting bit streams from being
Asplund et al. Wireless Ad Hoc Dissemination for Search and Rescue Proceedings of the 7th
is now fully decentralized and relies on text communication to achieve energy efficiency. Keywords FOSS infrastructure and prevalence of electricity blackouts seems an obvious premise when planning for emergency
Evaluation of a Stastical Technique to Mitigate Malicious Control Packets in Ad Hoc Networks
Boppana, Rajendra V.
traffic over TCP, we show that the rate control mechanism is very effective in detecting and mitigating. Intrusion detection systems [22] address DoS as part of a variety of other security attacks can be launched by malicious nodes without generating unusually high traffic. This makes the detection
Performance Analysis of Transactional Traffic in Mobile Ad-hoc Networks
Cheng, Yufei
2014-05-31T23:59:59.000Z
are expected to present different characteristics and pose different requirements for transport protocols as well as routing protocols. The canonical transport protocol to carry transactional traffic is HTTP on TCP, there are several drawbacks for TCP to better... contribution from the ResiliNets group we have mod- eled DSDV routing protocol [19], 3D–Gauss-Markov mobility model [20], TDMA MAC protocol, DSR routing protocol [21], and HTTP traffic generator [22], TCP Westwood and Westwood+ [23]. This thesis demonstrates...
Reliable Routing in Vehicular Ad hoc Networks Gongjun Yan1 Nathalie Mitton2 Xu Li2
Paris-Sud XI, Université de
range (e.g., mandated by the Federal Communications Commission in the United States), routing paths topology is constantly changing and the wireless communication links are inherently unstable, due to high) that provides vehicle-to-vehicle and vhicle-to-roadside wireless communications. It was first introduced
Using Vision-Based Driver Assistance to Augment Vehicular Ad-Hoc Network Communication
Beauchemin, Steven S.
a Vision-Based Driver Assistance (VBDA) system that monitors the environment surrounding the vehicle using in the surrounding environment. The concept of a CCWS has been introduced, studied and validated by a number adoption of the Wireless Access in Vehicular Environments (WAVE) set of standards in production vehicles
Leung, Kin K.
and the special characteristics and technical challenges that they exhibit. They offer a tempting solution algorithms and data dissemination for VANETs. Specifically, we propose a cross- layer approach to the link smoothed average of the signal strength of every packet received by a specific sender. In order to moni
A Distributed Policy Enforcement Architecture for Mobile Ad-Hoc Networks
Yang, Junfeng
of the architecture using a multitude of tech- niques. We define a threat model and a security analysis based on that threat model. We conduct a preliminary evaluation of the system using the GloMoSim simulator. Through simulations, we show that our solution incurs minimal overhead in terms of network band- width and latency
Holographic superconductors in the AdS black hole with a magnetic charge
M. R. Setare; D. Momeni; R. Myrzakulov; Muhammad Raza
2012-11-17T23:59:59.000Z
In this work we study the analytical properties of a 2+1 dimensional magnetically charged holographic superconductor in $AdS_4$. We obtain the critical chemical potential $\\mu_c$ analytically, using the Sturm-Liouville variational approach. Also, the obtained analytic result can be used to back up the numerical computations in the holographic superconductor in the probe limit.
Freivogel, Ben; /Stanford U., Phys. Dept. /LBL, Berkeley; Hubeny, Veronika E.; /LBL, Berkeley /Durham U., Dept. of Math.; Maloney, Alexander; /Stanford U., Phys. Dept.; Myers, Rob; /Perimeter Inst. Theor. Phys. /Waterloo U.; Rangamani, Mukund; /LBL, Berkeley /Durham U., Dept. of Math.; Shenker, Stephen; /Stanford U., Phys. Dept.
2005-10-07T23:59:59.000Z
We study the realization of inflation within the AdS/CFT correspondence. We assume the existence of a string landscape containing at least one stable AdS vacuum and a (nearby) metastable de Sitter state. Standard arguments imply that the bulk physics in the vicinity of the AdS minimum is described by a boundary CFT. We argue that large enough bubbles of the dS phase, including those able to inflate, are described by mixed states in the CFT. Inflating degrees of freedom are traced over and do not appear explicitly in the boundary description. They nevertheless leave a distinct imprint on the mixed state. Analytic continuation allows us, in principle, to recover a large amount of nonperturbatively defined information about the inflating regime. Our work also shows that no scattering process can create an inflating region, even by quantum tunneling, since a pure state can never evolve into a mixed state under unitary evolution.We study the realization of inflation within the AdS/CFT correspondence. We assume the existence of a string landscape containing at least one stable AdS vacuum and a (nearby) metastable de Sitter state. Standard arguments imply that the bulk physics in the vicinity of the AdS minimum is described by a boundary CFT. We argue that large enough bubbles of the dS phase, including those able to inflate, are described by mixed states in the CFT. Inflating degrees of freedom are traced over and do not appear explicitly in the boundary description. They nevertheless leave a distinct imprint on the mixed state. Analytic continuation allows us, in principle, to recover a large amount of nonperturbatively defined information about the inflating regime. Our work also shows that no scattering process can create an inflating region, even by quantum tunneling, since a pure state can never evolve into a mixed state under unitary evolution.
Action Principles for Transgression and Chern-Simons AdS Gravities
Pablo Mora
2014-08-06T23:59:59.000Z
Chern-Simons gravities are theories with a lagrangian given by a Chern-Simons form constructed from a space-time gauge group. In previous investigations we showed that, for some special field configurations that are solutions of the field equations, the extension from Chern-Simons to Transgression forms as lagrangians, motivated by gauge invariance, automatically yields the boundary terms required to regularize the theory, giving finite conserved charges and black hole thermodynamics. Further work by other researchers showed that one of the action functionals considered in the above mentioned work yields a well defined action principle in the metric (zero torsion) case and for asymptotically Anti de Sitter (AdS) space-times. In the present work we consider several action functionals for Chern-Simons AdS gravity constructed from Transgression forms, and show the action principles to be well defined and the Noether charges and Euclidean action to be finite for field configurations satisfying only that the gauge field curvature (field strength) for the AdS gauge group is asymptotically finite. For that purpose we consider an asymptotic expansion of the vielbein and spin connection that may be regarded as a perturbation of an AdS space-time, but allowing a non zero torsion. Our results are of potential interest for Lovelock gravity theories, as it has been shown that the boundary terms dictated by the transgressions for Chern-Simons gravities are also suitable to regularize Lovelock theories.
A EUROPEAN ADVANCED TECHNOLOGY PROGRAMME FOR ADS ACCELERATOR DEVELOPMENT*
Paris-Sud XI, Université de
associated to a fast digital feedback system. A programme for the remaining R&D, focused on experimental as such a reactor. Consecutive to the initial work of the Technical Working Group on ADS technology [1], the project in 2002 [2], and studied 3 versions of an XADS: both a molten-metal (eutectic Pb-Bi) and a gas cooled ADS
A Microscopic Analysis of TCP Performance over Wireless Adhoc Networks
Sivakumar, Raghupathy
of this paper is to study the performance of the TCP transport layer protocol over adhoc net works. Recent works in transport protocols for adhoc networks have in vestigated the impact of adhoc network receiving the ELFN freezes TCP's timers and state, recomputes a new route to the destination, and either
Supersymmetric Warped AdS in Extended Topologically Massive Supergravity
Nihat Sadik Deger; Ali Kaya; Henning Samtleben; Ergin Sezgin
2014-05-22T23:59:59.000Z
We determine the most general form of off-shell N=(1,1) supergravity field configurations in three dimensions by requiring that at least one off-shell Killing spinor exists. We then impose the field equations of the topologically massive off-shell supergravity and find a class of solutions whose properties crucially depend on the norm of the auxiliary vector field. These are spacelike-squashed and timelike-stretched AdS_3 for the spacelike and timelike norms, respectively. At the transition point where the norm vanishes, the solution is null warped AdS_3. This occurs when the coefficient of the Lorentz-Chern-Simons term is related to the AdS radius by $\\mu\\ell=2$. We find that the spacelike-squashed AdS_3 can be modded out by a suitable discrete subgroup of the isometry group, yielding an extremal black hole solution which avoid closed timelike curves.
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProducts (VAP) VAP7-0973 1 IntroductionActinideAdding New Functionality When a
WORK PROGRAMME 2009 COOPERATION
Milano-Bicocca, Università
)........................................ 46 Area 2.3.3 Industrial biotechnology: novel high added-value bio-products and bio-processes ..................................................................................................................... 48 Area 2.3.5 Environmental biotechnologyWORK PROGRAMME 2009 COOPERATION THEME 2 FOOD, AGRICULTURE AND FISHERIES, AND BIOTECHNOLOGY
WORK PROGRAMME 2010 COOPERATION
Milano-Bicocca, Università
)........................................ 53 Area 2.3.3 Industrial biotechnology: novel high added-value bio-products and bio-processes ..................................................................................................................... 58 Area 2.3.5 Environmental biotechnologyWORK PROGRAMME 2010 COOPERATION THEME 2 FOOD, AGRICULTURE AND FISHERIES, AND BIOTECHNOLOGY
(A)dS Holography with a Cut-off
Debajyoti Sarkar
2014-10-09T23:59:59.000Z
We find out the smearing/ transfer functions that relate a local bulk operator with its boundary values at a cut-off surface located at $z=z_0$ of the AdS Poincar\\'{e} patch. We compare these results with de Sitter counterparts and comment on their connections with corresponding construction for dS/ CFT. As the boundary values can help define the required field theory at $z=z_0$ and encode bulk locality in terms of it, our work can provide key information about holographic RG in the context of AdS/ CFT.
Supergravity at the boundary of AdS supergravity
Amsel, Aaron J.; Compere, Geoffrey [Department of Physics, University of California, Santa Barbara, California 93106 (United States)
2009-04-15T23:59:59.000Z
We give a general analysis of AdS boundary conditions for spin-3/2 Rarita-Schwinger fields and investigate boundary conditions preserving supersymmetry for a graviton multiplet in AdS{sub 4}. Linear Rarita-Schwinger fields in AdS{sub d} are shown to admit mixed Dirichlet-Neumann boundary conditions when their mass is in the range 0{<=}|m|<1/2l{sub AdS}. We also demonstrate that mixed boundary conditions are allowed for larger masses when the inner product is 'renormalized' accordingly with the action. We then use the results obtained for |m|=1/l{sub AdS} to explore supersymmetric boundary conditions for N=1 AdS{sub 4} supergravity in which the metric and Rarita-Schwinger fields are fluctuating at the boundary. We classify boundary conditions that preserve boundary supersymmetry or superconformal symmetry. Under the AdS/CFT dictionary, Neumann boundary conditions in d=4 supergravity correspond to gauging the superconformal group of the three-dimensional CFT describing M2-branes, while N=1 supersymmetric mixed boundary conditions couple the CFT to N=1 superconformal topologically massive gravity.
New Massive Gravity and AdS_4 counterterms
Dileep P. Jatkar; Aninda Sinha
2011-04-06T23:59:59.000Z
We show that the recently proposed DBI extension of new massive gravity emerges naturally as a counterterm in AdS$_4$. The resulting on-shell Euclidean action is independent of the cut-off at zero temperature. We also find that the same choice of counterterm gives the usual area law for the AdS$_4$ Schwarzschild black hole entropy in a cut-off independent manner. The parameter values of the resulting counterterm action correspond to a $c=0$ theory in the context of AdS$_3$/CFT$_2$. We rewrite this theory in terms of the gauge field that is used to recast 3D gravity as a Chern-Simons theory.
Branes in AdS and pp-wave spacetimes
Kostas Skenderis; Marika Taylor
2002-07-03T23:59:59.000Z
We find half supersymmetric AdS-embeddings in AdS_5 x S^5 corresponding to all quarter BPS orthogonal intersections of D3-branes with Dp-branes. A particular case is the Karch-Randall embedding AdS_4 x S^2. We explicitly prove that these embeddings are supersymmetric by showing that the kappa symmetry projections are compatible with half of the target space Killing spinors and argue that all these cases lead to AdS/dCFT dualities involving a CFT with a defect. We also find an asymptotically AdS_4 x S^2 embedding that corresponds to a holographic RG-flow on the defect. We then consider the pp-wave limit of the supersymmetric AdS-embeddings and show how it leads to half supersymmetric D-brane embeddings in the pp-wave background. We systematically analyze D-brane embeddings in the pp-wave background along with their supersymmetry. We construct all supersymmetric D-branes wrapped along the light-cone using operators in the dual gauge theory: the open string states are constructed using defect fields. We also find supersymmetric D1 (monopoles) and D3 (giant gravitons) branes that wrap only one of the light-cone directions. These correspond to non-perturbative states in the dual gauge theory.
Wilson lines for AdS_5 black strings
Kiril Hristov; Stefanos Katmadas
2014-12-03T23:59:59.000Z
We describe a simple method of extending AdS_5 black string solutions of 5d gauged supergravity in a supersymmetric way by addition of Wilson lines along a circular direction in space. When this direction is chosen along the string, and due to the specific form of 5d supergravity that features Chern-Simons terms, the existence of magnetic charges automatically generates conserved electric charges in a 5d analogue of the Witten effect. Therefore we find a rather generic, model-independent way of adding electric charges to already existing solutions with no backreaction from the geometry or breaking of any symmetry. We use this method to explicitly write down more general versions of the Benini-Bobev black strings and comment on the implications for the dual field theory and the similarities with generalizations of the Cacciatori-Klemm black holes in AdS_4.
Boyer, Edmond
the redundancy, such as MPR (MultiPoint Relay) or DS-MPR (Connected Dominating Sets with MPR). These methods and existence of obstacles. This paper focuses on DS-MPR. Firstly, we test it in a realistic environment to show Sensor Networks; Broadcasting; Connected Dominating Sets; MultiPoint Relay; Lognormal model. 1
Cluster-Based Semi-Asynchronous Power-Saving Protocols for Multi-hop Ad Hoc Networks
Tseng, Yu-Chee
applied to a multi-hop MANET. I. INTRODUCTION Since most mobile devices do not have plug-in power, battery
A highly reliable multi-path routing scheme for ad hoc wireless FEI DAI and JIE WU
Wu, Jie
and suffer from high overhead. Reactive (i.e. on- demand) protocols such as DSR [9] and AODV [17] do
Johnson, Eric E.
, and Srugun Sreepuram Klipsch School of Electrical and Computer Engineering1 New Mexico State University are emerging as a means to interconnect wired subnetworks in various mo- bile and contingency applications
Stojanovic, Milica
@coitt.es, millitsa@mit.edu Abstract- An autonomous network of underwater vehicles is considered in which of connectivity, successful transmission rate, average delay and energy consumption. Simulation analysis is used Underwater Vehicles. I. INTRODUCTION Autonomous operations future naval capability (AOFNC) calls
Kuzmanovic, Aleksandar
HRMA[7] and RICH-DP[8] utilize frequency hopping. In HRMA, pairs of nodes that have successfully hop following the common hop sequence. It is proved that HRMA completely solves the hidden terminal
Steel, G.; Maidl, M.; Bundy, Alan
We describe Coral, a counterexample finder for incorrect inductive conjectures. By devising a first-order version of Paulson's formalism for cryptographic protocol analysis, we are able to use Coral to attack protocols which may have an unbounded...
LA-DCF: A New Multiple Access Protocol for Ad-Hoc Wireless Richard Akester & Stephen Hailes
Haddadi, Hamed
during backoff, the host "freezes" the backoff timer. Once the carrier is sensed idle again, the backoff-to-end transport protocol, but this can take too long to detect the loss and take action, causing channel variations in delay affects the calculation of round trip times in transport protocols. Also, they are only
Pedram, Massoud
An Energy-Aware Simulation Model and Transaction Protocol for Dynamic Workload Distribution an energy-aware network transaction protocol that dynamically redistributes the computational workload among for detailed evaluation of the performance of different energy management policies in a MANET. Next it presents
Lorentzian AdS geometries, wormholes, and holography
Arias, Raul E.; Silva, Guillermo A. [IFLP-CONICET and Departamento de Fisica Facultad de Ciencias Exactas, Universidad Nacional de La Plata , CC 67, 1900, La Plata (Argentina); Botta Cantcheff, Marcelo [Theory Division, CERN, 1211 Geneva 23 (Switzerland); IFLP-CONICET and Departamento de Fisica Facultad de Ciencias Exactas, Universidad Nacional de La Plata , CC 67, 1900, La Plata (Argentina)
2011-03-15T23:59:59.000Z
We investigate the structure of two-point functions for the quantum field theory dual to an asymptotically Lorentzian Anti de Sitter (AdS) wormhole. The bulk geometry is a solution of five-dimensional second-order Einstein-Gauss-Bonnet gravity and causally connects two asymptotically AdS spacetimes. We revisit the Gubser-Klebanov-Polyakov-Witten prescription for computing two-point correlation functions for dual quantum field theories operators O in Lorentzian signature and we propose to express the bulk fields in terms of the independent boundary values {phi}{sub 0}{sup {+-}} at each of the two asymptotic AdS regions; along the way we exhibit how the ambiguity of normalizable modes in the bulk, related to initial and final states, show up in the computations. The independent boundary values are interpreted as sources for dual operators O{sup {+-}} and we argue that, apart from the possibility of entanglement, there exists a coupling between the degrees of freedom living at each boundary. The AdS{sub 1+1} geometry is also discussed in view of its similar boundary structure. Based on the analysis, we propose a very simple geometric criterion to distinguish coupling from entanglement effects among two sets of degrees of freedom associated with each of the disconnected parts of the boundary.
Jet Quenching via Gravitational Radiation in Thermal AdS
Edward Shuryak; Ho-Ung Yee; Ismail Zahed
2011-10-04T23:59:59.000Z
We argue that classical bulk gravitational radiation effects in AdS/CFT, previously ignored because of their subleading nature in the 1/Nc-expansion, are magnified by powers of large Lorentz factors gamma for ultrarelativistic jets, thereby dominating other forms of jet energy loss in holography at finite temperature. We make use of the induced gravitational self-force in thermal AdS5 to estimate its effects. In a thermal medium, relativistic jets may loose most of their energy through longitudinal drag caused by the energy accumulated in their nearby field as they zip through the strongly coupled plasma.
AdS_6 solutions of type II supergravity
Fabio Apruzzi; Marco Fazzi; Achilleas Passias; Dario Rosa; Alessandro Tomasiello
2015-02-28T23:59:59.000Z
Very few AdS_6 x M_4 supersymmetric solutions are known: one in massive IIA, and two IIB solutions dual to it. The IIA solution is known to be unique; in this paper, we use the pure spinor approach to give a classification for IIB supergravity. We reduce the problem to two PDEs on a two-dimensional space Sigma. M_4 is then a fibration of S^2 over Sigma; the metric and fluxes are completely determined in terms of the solution to the PDEs. The results seem likely to accommodate near-horizon limits of (p,q)-fivebrane webs studied in the literature as a source of CFT_5's. We also show that there are no AdS_6 solutions in eleven-dimensional supergravity.
AdS_6 solutions of type II supergravity
Fabio Apruzzi; Marco Fazzi; Achilleas Passias; Dario Rosa; Alessandro Tomasiello
2015-04-03T23:59:59.000Z
Very few AdS_6 x M_4 supersymmetric solutions are known: one in massive IIA, and two IIB solutions dual to it. The IIA solution is known to be unique; in this paper, we use the pure spinor approach to give a classification for IIB supergravity. We reduce the problem to two PDEs on a two-dimensional space Sigma. M_4 is then a fibration of S^2 over Sigma; the metric and fluxes are completely determined in terms of the solution to the PDEs. The results seem likely to accommodate near-horizon limits of (p,q)-fivebrane webs studied in the literature as a source of CFT_5's. We also show that there are no AdS_6 solutions in eleven-dimensional supergravity.
The Mixed Phase of Charged AdS Black holes
Piyabut Burikham; Chatchai Promsiri
2015-01-20T23:59:59.000Z
We study the mixed phase of charged AdS black hole and radiation when the total energy is fixed below the threshold to produce a stable charged black hole branch. The coexistence conditions for the charged AdS black hole and radiation are derived for the generic case when radiation particles carry charge. The phase diagram of the mixed phase is demonstrated for both fixed potential and charge ensemble. In the dual gauge picture, they correspond to the mixed phase of quark-gluon plasma~(QGP) and hadron gas in the fixed chemical potential and density ensemble respectively. In the nuclei and heavy ion collisions at intermediate energies, the mixed phase of exotic QGP and hadron gas could be produced. The mixed phase will condensate and evaporate into the hadron gas as the fireball expands.
Higher derivative effects for 4d AdS gravity
Jelena Smolic; Marika Taylor
2013-02-13T23:59:59.000Z
Motivated by holography, we explore higher derivative corrections to four-dimensional Anti-de Sitter (AdS) gravity. We point out that in such a theory the variational problem is generically not well-posed given only a boundary condition for the metric. However, when one evaluates the higher derivative terms perturbatively on a leading order Einstein solution, the equations of motion are always second order and therefore the variational problem indeed requires only a boundary condition for the metric. The equations of motion required to compute the spectrum around the corrected background are still generically higher order, with the additional boundary conditions being associated with new operators in the dual conformal field theory. We discuss which higher derivative curvature invariants are expected to arise in the four-dimensional action from a top-down perspective and compute the corrections to planar AdS black holes and to the spectrum around AdS in various cases. Requiring that the dual theory is unitary strongly constrains the higher derivative terms in the action, as the operators associated with the extra boundary conditions generically have complex conformal dimensions and non-positive norms.
Quintessence and effective AdS brane geometries
K. Priyabrat Pandey; Abhishek K. Singh; Sunita Singh; Supriya Kar
2014-07-25T23:59:59.000Z
A geometric torsion dynamics leading to an effective curvature in a second order formalism on a D4-brane is revisited with a renewed interest. We obtain two effective $AdS_4$ brane geometries on a vacuum created pair of $(D{\\bar D})_3$-brane. One of them is shown to describe an AdS Schwarzschild spinning black hole and the other is shown to describe a spinning black hole bound state. It is argued that a D-instanton in a vacuum created anti D3-brane within a pair may describe a quintessence. It may seen to incorporate a varying vacuum energy density in a brane universe. We consider the effective curvature scalar on $S^1\\times S^1$ to analyze torsion-less geometries on a vacuum created pair of $(D{\\bar D})_2$-brane. The emergent $AdS_3$ brane is shown to describe a Schwarzschild and a Reissner-Nordstrom (RN) geometries in presence of extra dimension(s).
A derivative-free optimization method to compute scalar perturbation of AdS black holes
Rodrigo S. Lima; Alan B. Pavan
2014-03-25T23:59:59.000Z
In this work we describe an interesting application of a simple derivative-free optimization method to extract the quasinormal modes (QNM's) of a massive scalar field propagating in a 4-dimensional Schwarzschild anti-de Sitter black hole (Sch-AdS$_4$). In this approach, the problem to find the QNM's is reduced to minimize a real valued function of two variables and does not require any information about derivatives. In fact, our strategy requires only evaluations of the objective function to search global minimizers of the optimization problem. Firstly, numerical experiments were performed to find the QNM's of a massless scalar field propagating in intermediate and large Sch-AdS$_4$ black holes. The performance of this optimization algorithm was compared with other numerical methods used in previous works. Our results showed to be in good agreement with those obtained previously. Finally, the massive scalar field case and its QNM's were also obtained and discussed.
Quantum strings in AdS5 x S5 and AdS/CFT duality
A. A. Tseytlin
2009-09-23T23:59:59.000Z
We review some recent progress in understanding the spectrum of energies/dimensions of strings/operators in AdS5 x S5 -- planar N=4 super Yang-Mills correspondence. We consider leading strong coupling corrections to the energy of lightest massive string modes in AdS5 x S5, which should be dual to members of the Konishi operator multiplet in the SYM theory. This determines the general structure of strong-coupling expansion of the anomalous dimension of the Konishi operator. Following arXiv:0906.4294 we use 1-loop results for semiclassical string states to extract information about the leading coefficients in this expansion.
AdS Chern-Simons Gravity induces Conformal Gravity
Rodrigo Aros; Danilo E. Diaz
2013-12-25T23:59:59.000Z
The leitmotif of this paper is the question of whether four- and higher even-dimensional Conformal Gravities do have a Chern-Simons pedigree. We show that Weyl gravity can be obtained as dimensional reduction of a five-dimensional Chern-Simons action for a suitable (gauged-fixed, tractor-like) five-dimensional AdS connection. The gauge-fixing and dimensional reduction program admits a readily generalization to higher dimensions for the case of certain conformal gravities obtained by contractions of the Weyl tensor.
Entanglement Entropy and Duality in AdS(4)
Ioannis Bakas; Georgios Pastras
2015-03-02T23:59:59.000Z
Small variations of the entanglement entropy \\delta S and the expectation value of the modular Hamiltonian \\delta E are computed holographically for circular entangling curves in the boundary of AdS(4), using gravitational perturbations with general boundary conditions in spherical coordinates. Agreement with the first law of thermodynamics, \\delta S = \\delta E, requires that the line element of the entangling curve remains constant. In this context, we also find a manifestation of electric-magnetic duality for the entanglement entropy and the corresponding modular Hamiltonian, following from the holographic energy-momentum/Cotton tensor duality.
Entanglement Entropy and Duality in AdS(4)
Bakas, Ioannis
2015-01-01T23:59:59.000Z
Small variations of the entanglement entropy \\delta S and the expectation value of the modular Hamiltonian \\delta E are computed holographically for circular entangling curves in the boundary of AdS(4), using gravitational perturbations with general boundary conditions in spherical coordinates. Agreement with the first law of thermodynamics, \\delta S = \\delta E, requires that the line element of the entangling curve remains constant. In this context, we also find a manifestation of electric-magnetic duality for the entanglement entropy and the corresponding modular Hamiltonian, following from the holographic energy-momentum/Cotton tensor duality.
Entanglement Entropy and Duality in AdS(4)
Ioannis Bakas; Georgios Pastras
2015-04-30T23:59:59.000Z
Small variations of the entanglement entropy \\delta S and the expectation value of the modular Hamiltonian \\delta E are computed holographically for circular entangling curves in the boundary of AdS(4), using gravitational perturbations with general boundary conditions in spherical coordinates. Agreement with the first law of thermodynamics, \\delta S = \\delta E, requires that the line element of the entangling curve remains constant. In this context, we also find a manifestation of electric-magnetic duality for the entanglement entropy and the corresponding modular Hamiltonian, following from the holographic energy-momentum/Cotton tensor duality.
Fitzpatrick, A.Liam; /Boston U.; Kaplan, Jared; /SLAC
2012-02-14T23:59:59.000Z
We show that suitably regulated multi-trace primary states in large N CFTs behave like 'in' and 'out' scattering states in the flat-space limit of AdS. Their transition matrix elements approach the exact scattering amplitudes for the bulk theory, providing a natural CFT definition of the flat space S-Matrix. We study corrections resulting from the AdS curvature and particle propagation far from the center of AdS, and show that AdS simply provides an IR regulator that disappears in the flat space limit.
Small Hairy Black Holes in Global AdS Spacetime
Pallab Basu; Jyotirmoy Bhattacharya; Sayantani Bhattacharyya; R. Loganayagam; Shiraz Minwalla; V. Umesh
2010-05-16T23:59:59.000Z
We study small charged black holes in global AdS spacetime in the presence of a charged massless minimally coupled scalar field. In a certain parameter range these black holes suffer from well known superradiant instabilities. We demonstrate that the end point of the resultant tachyon condensation process is a hairy black hole which we construct analytically in a perturbative expansion in the black hole radius. At leading order our solution is a small undeformed RNAdS black hole immersed into a charged scalar condensate that fills the AdS `box'. These hairy black hole solutions appear in a two parameter family labelled by their mass and charge. Their mass is bounded from below by a function of their charge; at the lower bound a hairy black hole reduces to a regular horizon free soliton which can also be thought of as a nonlinear Bose condensate. We compute the microcanonical phase diagram of our system at small mass, and demonstrate that it exhibits a second order `phase transition' between the RNAdS black hole and the hairy black hole phases.
america los fondos: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
Websites Summary: . . . . . . . . . . . . . . . . . . 68 4.2 Ad-Hoc Networks and Self-Organization . . . . . . . . . . . . . . 70 4.2.1 Related Work . . . . . . . . . . . . . . ....
Marco M. Caldarelli; Joan Camps; Blaise Goutéraux; Kostas Skenderis
2014-04-18T23:59:59.000Z
We present a comprehensive analysis of the AdS/Ricci-flat correspondence, a map between a class of asymptotically locally AdS spacetimes and a class of Ricci-flat spacetimes. We provide a detailed derivation of the map, discuss a number of extensions and apply it to a number of important examples, such as AdS on a torus, AdS black branes and fluids/gravity metrics. In particular, the correspondence links the hydrodynamic regime of asymptotically flat black $p$-branes or the Rindler fluid with that of AdS. It implies that this class of Ricci-flat spacetimes inherits from AdS a generalized conformal symmetry and has a holographic structure. We initiate the discussion of holography by analyzing how the map acts on boundary conditions and holographic 2-point functions.
FINAL Announcement International Brainstorming Work-
FINAL Announcement 1st International Brainstorming Work- shop on Waste to Energy in India Organized, though in an energy in-efficient way. Organic MSW is identified as one of the potential sources on food versus fuel intensifies, biomass can provide added income to farmers with- out compromising
2010-07-16T23:59:59.000Z
Jul 2, 2010 ... Working Paper. Branch and Bound Algorithms for ...... interest when evaluating the performance. First, each derived subproblem means usage ...
Social Media Ad Metrics Definitions
Collins, Gary S.
these metrics to encourage growth through consistency. Social media speaks to a new way of understanding howSocial Media Ad Metrics Definitions Released May 2009 #12;Social Media Metrics Definitions © 2008 & Social Media Committee. About the IAB's User-Generated Content & Social Media Committee: The User
Adding Value to Agricultural Products
Anderson, David P.; Hanselka, Daniel
2009-06-01T23:59:59.000Z
and some of the viscera into menudo or tripas. Booker Packing Company, Caviness Packing Company and J&B Foods are some of the compa- nies adding value to meat successfully in spite of processing costs. A recent survey of such companies indicated...
Matching of correlators in AdS_3/CFT_2
Marika Taylor
2007-09-12T23:59:59.000Z
Recently exact agreement has been found between three-point correlators of chiral operators computed in string theory on AdS_3 x S^3 x T^4 with NS-NS flux and those computed in the symmetric orbifold CFT. However, it has also been shown that these correlators disagree with those computed in supergravity, under any identification of single particle operators which respects the symmetries. In this note we resolve this disagreement: the key point is that mixings with multi-particle operators are not suppressed even at large N in extremal correlators. Allowing for such mixings, orbifold/string theory operators and supergravity operators can be matched such that both non-extremal and extremal three point functions agree, giving further evidence for the non-renormalization of the chiral ring.
AdS strings with torsion: Noncomplex heterotic compactifications
Frey, Andrew R.; Lippert, Matthew [California Institute of Technology, Mail Code 452-48, Pasadena, California 91125 (United States); University of Kentucky, Lexington, Kentucky 40506, USA and University of Louisville, Louisville, Kentucky 40292 (United States)
2005-12-15T23:59:59.000Z
Combining the effects of fluxes and gaugino condensation in heterotic supergravity, we use a ten-dimensional approach to find a new class of four-dimensional supersymmetric AdS{sub 4} compactifications on almost-Hermitian manifolds of SU(3) structure. Computation of the torsion allows a classification of the internal geometry, which for a particular combination of fluxes and condensate, is nearly Kaehler. We argue that all moduli are fixed, and we show that the Kaehler potential and superpotential proposed in the literature yield the correct AdS{sub 4} radius. In the nearly Kaehler case, we are able to solve the H Bianchi identity using a nonstandard embedding. Finally, we point out subtleties in deriving the effective superpotential and understanding the heterotic supergravity in the presence of a gaugino condensate.
The Analytic Bootstrap and AdS Superhorizon Locality
A. Liam Fitzpatrick; Jared Kaplan; David Poland; David Simmons-Duffin
2013-01-24T23:59:59.000Z
We take an analytic approach to the CFT bootstrap, studying the 4-pt correlators of d > 2 dimensional CFTs in an Eikonal-type limit, where the conformal cross ratios satisfy |u| 2\\Delta_\\phi + 2n for each integer n as l -> infinity. We show how the rate of approach is controlled by the twist and OPE coefficient of the leading twist operator in the \\phi x \\phi OPE, and we discuss SCFTs and the 3d Ising Model as examples. Additionally, we show that the OPE coefficients of other large spin operators appearing in the OPE are bounded as l -> infinity. We interpret these results as a statement about superhorizon locality in AdS for general CFTs.
Vortex hair on AdS black holes
Gregory, Ruth; Kubiznak, David; Mann, Robert B; Wills, Danielle
2014-01-01T23:59:59.000Z
We analyse vortex hair for charged rotating asymptotically AdS black holes in the abelian Higgs model. We give analytical and numerical arguments to show how the vortex interacts with the horizon of the black hole, and how the solution extends to the boundary. The solution is very close to the corresponding asymptotically flat vortex, once one transforms to a frame that is non-rotating at the boundary. We show that there is a Meissner effect for extremal black holes, with the vortex flux being expelled from sufficiently small black holes. The phase transition is shown to be first order in the presence of rotation, but second order without rotation. We comment on applications to holography.
Building Intelligent Environments By Adding Smart Artifacts to Spaces
Loke, Seng W. - Loke, Seng W.
Building Intelligent Environments By Adding Smart Artifacts to Spaces: a Peer-to-Peer Architecture collections of smart artifacts, each artifact with an embedded processor, networking and sensing capabilities. The interactive capabilities of the environment are due to the collective working of the smart artifacts
Bound States of the q-Deformed AdS5 x S5 Superstring S-matrix
Ben Hoare; Timothy J. Hollowood; J. Luis Miramontes
2012-05-31T23:59:59.000Z
The investigation of the q deformation of the S-matrix for excitations on the string world sheet in AdS5 x S5 is continued. We argue that due to the lack of Lorentz invariance the situation is more subtle than in a relativistic theory in that the nature of bound states depends on their momentum. At low enough momentum |p|1. This subtlety fixes a problem involving the consistency of crossing symmetry with the relativistic limit found in earlier work. With mirror kinematics, obtained after a double Wick rotation, the bound state structure is simpler and there are no marginally unstable bound states.
Bound States of the q-Deformed AdS5 x S5 Superstring S-matrix
Hoare, Ben; Miramontes, J Luis
2012-01-01T23:59:59.000Z
The investigation of the q deformation of the S-matrix for excitations on the string world sheet in AdS5 x S5 is continued. We argue that due to the lack of Lorentz invariance the situation is more subtle than in a relativistic theory in that the nature of bound states depends on their momentum. At low enough momentum |p|1. This subtlety fixes a problem involving the consistency of crossing symmetry with the relativistic limit found in earlier work. With mirror kinematics, obtained after a double Wick rotation, the bound state structure is simpler and there are no marginally unstable bound states.
AEI-2008-085 The Classical Exchange Algebra of AdS5 S5
Paris-Sud XI, Université de
AEI-2008-085 The Classical Exchange Algebra of AdS5 × S5 String Theory Marc Magro Universit´e de matrix of AdS5× S5 string theory in the Green-Schwarz formulation is determined by using a first the pure spinor description of AdS5 × S5 string theory. These results are compared to the one obtained by A
On Rotating and Oscillating Four-Spin Strings in AdS5 X S5
Kamal L. Panigrahi; Pabitra M. Pradhan
2012-10-26T23:59:59.000Z
We study rigidly rotating strings in AdS5 X S5 background with one spin along AdS5 and three angular momenta along S5. We find dispersion relations among various charges and interpret them as giant magnon and spiky string solutions in various limits. Further we present an example of oscillating string which oscillates in the radial direction of the AdS5 and at the same time rotates in S5.
On Rotating and Oscillating Four-Spin Strings in AdS5 X S5
Panigrahi, Kamal L
2012-01-01T23:59:59.000Z
We study rigidly rotating strings in AdS5 X S5 background with one spin along AdS5 and three angular momenta along S5. We find dispersion relations among various charges and interpret them as giant magnon and spiky string solutions in various limits. Further we present an example of oscillating string which oscillates in the radial direction of the AdS5 and at the same time rotates in S5.
Kaolin AD | Open Energy Information
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetecGtelInteriasIowa: EnergyKanabec County,Kaolin AD Jump to: navigation,
Fermilab Today - Classified Ad Policy
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist. CategoryFebruaryFebruaryInThe, 2015 spacer7,, 20150,2,Aug.Ad
Fermilab Today | Classifieds Ad Form
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist. CategoryFebruaryFebruaryInThe, 2015Ads Subscribe |
Adding structure to agent programming languages
Zachmann, Gabriel
Zachmann (Computer Graphics) #12;Adding structure to agent programming languages Peter NovÃ¡k, JÃ¼rgen Dix
The inside outs of AdS(3)/CFT(2): Exact AdS wormholes with entangled CFT duals
Gautam Mandal; Ritam Sinha; Nilakash Sorokhaibam
2014-11-03T23:59:59.000Z
We present the complete family of solutions of 3D gravity (Lambda<0) with two asymptotically AdS exterior regions. The solutions are constructed from data at the two boundaries, which correspond to two independent and arbitrary stress tensors T_R, \\bar T_R, and T_L, \\bar T_L. The two exteriors are smoothly joined on to an interior region through a regular horizon. We find CFT duals of these geometries which are entangled states of two CFT's. We compute correlators between general operators at the two boundaries and find perfect agreement between CFT and bulk calculations. We calculate and match the CFT entanglement entropy (EE) with the holographic EE which involves geodesics passing through the wormhole. We also compute a holographic, non-equilibrium entropy for the CFT using properties of the regular horizon. The construction of the bulk solutions here uses an exact version of Brown-Henneaux type diffeomorphisms which are asymptotically nontrivial and transform the CFT states by two independent unitary operators on the two sides. Our solutions provide an infinite family of explicit examples of the ER=EPR relation of Maldacena and Susskind [arXiv:1306.0533].
Online Effects of Offline Ads Diane Lambert
Tomkins, Andrew
a methodology for assessing how ad campaigns in offline media such as print, audio and TV affect online in-in-difference estimation, Lift, Causal Modeling, Bootstrapping 1. INTRODUCTION Loosely speaking, an ad is effective was conducted in an offline medium such as print, radio or TV. That is, one measure of offline ad effectiveness
Topics in network communications
Cannons, Jillian Leigh
2008-01-01T23:59:59.000Z
Int. Workshop on Evaluation of Wireless Ad Hoc, Sensor andon Performance Evaluation of Wireless Ad Hoc, Sensor and
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengtheningWildfires may contribute more to &83 3.3At DOE Working At
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengtheningWildfires may contribute more to &83 3.3At DOE Working
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron SpinPrincetonUsingWhat is abigpresented in theWork & Life
Tunneling between the giant gravitons in AdS5 x S5
Julian Lee
2001-04-05T23:59:59.000Z
I consider the giant gravitons in AdS5 x S5. By numerical simulation, I show a strong indication that there is no instanton solution describing the direct tunneling between the giant graviton in the S5 and its dual counterpart in the AdS5. I argue that it supports the supersymmetry breaking scenario suggested in hep-th/0008015
Fermilab at Work | Work Resources
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist.New Mexico Feb. 13, 2013 NAME:Job Opportunities JoinWork Resources
University Policy No.: AD2530 Classification: Administration
Victoria, University of
University Policy No.: AD2530 Classification: Administration PHOTOCOPY AND FACSIMILE (FAX may be obtained through library managed machines or through the use of personal accounts. 1
ammonia synthesis ad: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
spin fields in AdS(5) HEP - Theory (arXiv) Summary: Free arbitrary spin massless and self-dual massive fields propagating in AdS5 are investigated. We study totally...
AdS (In)stability: Lessons From The Scalar Field
Pallab Basu; Chethan Krishnan; P. N. Bala Subramanian
2015-01-29T23:59:59.000Z
We argued in arXiv:1408.0624 that the quartic scalar field in AdS has features that could be instructive for answering the gravitational stability question of AdS. Indeed, the conserved charges identified there have recently been observed in the full gravity theory as well. In this paper, we continue our investigation of the scalar field in AdS and provide evidence that in the Two-Time Formalism (TTF), even for initial conditions that are far from quasi-periodicity, the energy in the higher modes at late times is exponentially suppressed in the mode number. Based on this and some related observations, we argue that there is no thermalization in the scalar TTF model within time-scales that go as $\\sim 1/\\epsilon^2$, where $\\epsilon$ measures the initial amplitude (with only low-lying modes excited). It is tempting to speculate that the result holds also for AdS collapse.
Duality invariance of $s \\ge 3/2$ fermions in AdS
S. Deser; D. Seminara
2014-09-11T23:59:59.000Z
We show that in D=4 AdS, $s\\ge 3/2$ partially massless (PM) fermions retain the duality invariances of their flat space massless counterparts. They have tuned ratios $ {m^2}/{M^2}\
Splitting of Folded Strings in AdS_4*CP^3
Jun-Bao Wu
2012-08-04T23:59:59.000Z
We study classically splitting of two kinds of folded string solutions in AdS_4*CP^3. Conserved charges of the produced fragments are computed for each case. We find interesting patterns among these conserved charges.
AdS black hole solutions in dilatonic Einstein-Gauss-Bonnet gravity
Maeda, Kei-ichi [Department of Physics, Waseda University, Shinjuku, Tokyo 169-8555 (Japan); Advanced Research Institute for Science and Engineering, Waseda University, Shinjuku, Tokyo 169-8555 (Japan); Ohta, Nobuyoshi [Department of Physics, Kinki University, Higashi-Osaka, Osaka 577-8502 (Japan); Sasagawa, Yukinori [Department of Physics, Waseda University, Shinjuku, Tokyo 169-8555 (Japan)
2011-02-15T23:59:59.000Z
We find that anti-de Sitter (AdS) spacetime with a nontrivial linear dilaton field is an exact solution in the effective action of the string theory, which is described by gravity with the Gauss-Bonnet curvature terms coupled to a dilaton field in the string frame without a cosmological constant. The AdS radius is determined by the spacetime dimensions and the coupling constants of curvature corrections. We also construct the asymptotically AdS black hole solutions with a linear dilaton field numerically. We find these AdS black holes for hyperbolic topology and in dimensions higher than four. We discuss the thermodynamical properties of those solutions. Extending the model to the case with the even-order higher Lovelock curvature terms, we also find the exact AdS spacetime with a nontrivial dilaton. We further find a cosmological solution with a bounce of three-dimensional space and a solitonic solution with a nontrivial dilaton field, which is regular everywhere and approaches an asymptotically AdS spacetime.
The Tetrahedron Zamolodchikov Algebra and the AdS5 x S5 S-matrix
Mitev, Vladimir; Tsuboi, Zengo
2012-01-01T23:59:59.000Z
The S-matrix of the AdS5 x S5 string theory is a tensor product of two centrally extended su(2|2) S-matrices, each of which is related to the R-matrix of the Hubbard model. The R-matrix of the Hubbard model was first found by Shastry, who ingeniously exploited the fact that, for zero coupling, the Hubbard model can be decomposed into two XX models. In this article, we review and clarify this construction from the AdS/CFT perspective and investigate the implications this has for the AdS5 x S5 S-matrix.
The Tetrahedron Zamolodchikov Algebra and the AdS5 x S5 S-matrix
Vladimir Mitev; Matthias Staudacher; Zengo Tsuboi
2012-10-08T23:59:59.000Z
The S-matrix of the AdS5 x S5 string theory is a tensor product of two centrally extended su(2|2) S-matrices, each of which is related to the R-matrix of the Hubbard model. The R-matrix of the Hubbard model was first found by Shastry, who ingeniously exploited the fact that, for zero coupling, the Hubbard model can be decomposed into two XX models. In this article, we review and clarify this construction from the AdS/CFT perspective and investigate the implications this has for the AdS5 x S5 S-matrix.
Risk Assessment Technical Expert Working Group (RWG) Conference Call Minutes, March 8, 2010
Broader source: Energy.gov [DOE]
Risk Assessment Technical Experts Working Group Charter – The steeringcommittee discussed the draft charter. Two recommended changes were agreed upon:• A sentence will be added to identify that the...
EnergyEfficient Initialization Protocols for Adhoc Radio Networks ?
Nakano, Koji
EnergyÂEfficient Initialization Protocols for AdÂhoc Radio Networks ? J. L. Bordim 1 , J. Cui 1 , T contribution of this work is to propose energyÂ efficient randomized initialization protocols for adÂhoc radio this protocol to deÂ sign an energyÂefficient initialization protocol that terminates, with high probability
CAR: Context-aware Adaptive Routing for Delay Tolerant Mobile Networks
Mascolo, Cecilia
are evaluated using simulations based on a social network founded mobility model, a purely random one and real of the existing research work in mobile ad hoc networking is based on the assumption that a path exists between mobile ad hoc networks. The protocol is based on the idea of exploiting nodes as carriers of messages
Higher spins in AdS_5 at one loop: vacuum energy, boundary conformal anomalies and AdS/CFT
M. Beccaria; A. A. Tseytlin
2014-11-18T23:59:59.000Z
We consider general-symmetry higher spin fields in AdS_5 and derive expressions for their one-loop corrections to vacuum energy E and the associated 4d boundary conformal anomaly a-coefficient. We a propose a similar expression for the second conformal anomaly c-coefficient. We show that all the three quantities (E, a, c) computed for N=8 gauged 5d supergravity are -1/2 of the values for N=4 conformal 4d supergravity and also twice the values for N=4 Maxwell multiplet. This gives 5d derivation of the fact that the system of N=4 conformal supergravity and four N=4 Maxwell multiplets is anomaly free. The values of (E, a, c) for the states at level p of Kaluza-Klein tower of 10d type IIB supergravity compactified on S^5 turn out to be equal to those for p copies of N=4 Maxwell multiplets. This may be related to the fact that these states appear in the tensor product of p superdoubletons. Under a natural regularization of the sum over p, the full 10d supergravity contribution is then minus that of the Maxwell multiplet, in agreement with the standard adjoint AdS/CFT duality (SU(n) SYM contribution is n^2-1 of one Maxwell multiplet). We also verify the matching of (E, a, c) for spin 0 and 1/2 boundary theory cases of vectorial AdS/CFT duality. The consistency conditions for vectorial AdS/CFT turn out to be equivalent to the cancellation of anomalies in the closely related 4d conformal higher spin theories. In addition, we study novel example of vectorial AdS/CFT duality when the boundary theory is described by free spin 1 fields and is dual to a particular higher spin theory in AdS_5 containing fields in mixed-symmetry representations. We also discuss its supersymmetric generalizations.
The Blackbody Radiation Laws in the $ \\textrm{AdS}_5 \\times {\\cal S}^5 $ Spacetime
Ramaton Ramos; Henrique Boschi Filho
2014-09-25T23:59:59.000Z
In the footsteps of our previous work \\cite{RamatonBoschi} we generalize the Stefan-Boltzmann and Wien's displacement laws for the $ \\textrm{AdS}_5 \\times {\\cal S}^5 $ spacetime, the background of the AdS/CFT correspondence foremost realization. Our results take into account the $ \\textrm{AdS}_5 \\times {\\cal S}^5 $ full dimensionality in the electromagnetic field $A^{\\mu}$ wave equation, which yields the higher-dimensional blackbody characteristic features suggested in literature. In particular, the total radiated power and the spectral radiancy match the original Stefan-Boltzmann and Wien's displacement laws in the low-energy regime up to available experimental data.
Maciejewski, Anthony A.
and neighborhood, and (c) extended dy- namic connectivity grouping. The experimental results re- veal tolerance. Furthermore, replication also conserves energy by traversing fewer radio links to access
Di Benedetto, Maria-Gabriella
of proposals have been submitted in March 2003 [4]. Europe is also getting active in the field of UWB, via standardisation (ETSI, European Telecommunications Standard Institute) and regulation (CEPT, Conférence Européenne by the introduction of an idle period after transmitting a pulse (short waveform concentrating energy followed
Durresi, Arjan
Engineering Fukuoka Institute of Technology (FIT), Japan barolli@fit.ac.jp ** Graduate School of Science. However, many useless control packets are used resulting in the increase of network load and decrease for a new route, it sends many useless control packets, which increase the network load and decrease
University Policy No.: AD2215 Classification: Administration
Victoria, University of
University Policy No.: AD2215 Classification: Administration Approving Authority: Board of Governors LICENSING PROGRAM POLICY Effective Date: June/90 Supersedes: Last Editorial Change: Mandated Review: 1. This statement applies to the policies and administration of trademarks registered
University Policy No.: AD2210 Classification: Administration
Victoria, University of
University Policy No.: AD2210 Classification: Administration FIELDWORK AND INTERNATIONAL Approving Authority: President TRAVEL RISK MANAGEMENT POLICY Effective Date: November/07 Supersedes: New Last Editorial Change: Mandated Review: November/14 Purpose 1. The purpose of the policy
Missouri Value-Added Grant Program (Missouri)
Broader source: Energy.gov [DOE]
The Missouri Value-Added Grant Program provides grants for projects that add value to Missouri agricultural products and aid the economy of a rural community. Grant applications will be considered...
Testing the AdS/CFT Correspondence
Klebanov, Igor R. [Joseph Henry Laboratories and Princeton Center for Theoretical Science, Princeton University, Princeton, NJ 08544 (United States)
2008-07-28T23:59:59.000Z
This lecture begins with some history and basic facts about string theory and its connections with strong interactions. Comparisons of stacks of Dirichlet branes with curved backgrounds produced by them are used to motivate the AdS/CFT correspondence between superconformal gauge theory and string theory on a product of Anti-de Sitter space and a compact manifold. The ensuing duality between semi-classical spinning strings and long gauge theory operators is briefly reviewed. We go on to describe a recent test of the AdS/CFT correspondence using the Wilson loop cusp anomaly as a function of the coupling, which also enters dimensions of high-spin operators. Finally, strongly coupled thermal SYM theory is explored via a black hole in 5-dimensional AdS space, which leads to explicit results for its entropy and shear viscosity.
AUAARHUS UNIVERSITY Adding of attachments Financial Control
, and the picture file from this scan must be saved (on a PC or server) before the file is added to the expense sheet. Important: Attachments must be saved in PDF or TIF format. If the attachment is not added in one address or save the picture file on your PC or a server. Open the file and save it on your PC #12;AUAARHUS
Holographic superconductors in the AdS black hole spacetime with a global monopole
Songbai Chen; Liancheng Wang; Chikun Ding; Jiliang Jing
2010-06-08T23:59:59.000Z
We study holographic superconductors in the Schwarzschild-AdS black hole with a global monopole through a charged complex scalar field. We calculate the condensates of the charged operators in the dual conformal field theories (CFTs) and discuss the effects of the global monopole on the condensation formation. Moreover, we compute the electric conductive using the probe approximation and find that the properties of the conductive are quite similar to those in the Schwarzschild-AdS black hole. These results can help us know more about holographic superconductors in the asymptotic AdS black holes.
Bonus Symmetries of N=4 Super-Yang-Mills Correlation Functions via AdS Duality
Kenneth Intriligator
1999-05-03T23:59:59.000Z
General conjectures about the SL(2,Z) modular transformation properties of N=4 super-Yang-Mills correlation functions are presented. It is shown how these modular transformation properties arise from the conjectured duality with IIB string theory on AdS_5 x S^5. We discuss in detail a prediction of the AdS duality: that N=4 field theory, in an appropriate limit, must exhibit bonus symmetries, corresponding to the enhanced symmetries of IIB string theory in its supergravity limit.
A novel DHT Routing Protocol for MANETs
Chellamani, Deepak
2010-04-30T23:59:59.000Z
The central challenge in Mobile Ad hoc Networks (MANETs) is to provide a stable routing strategy without depending on any central administration. This work presents and examines the working of Radio Ring Routing Protocol (RRRP), a DHT based routing...
Building America Expert Meeting: Key Innovations for Adding Energy...
Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site
Key Innovations for Adding Energy Efficiency to Maintenance Projects Building America Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance Projects This...
Addendum Added to Innovative Demonstration of Geothermal Energy...
Office of Environmental Management (EM)
Addendum Added to Innovative Demonstration of Geothermal Energy Production FOA Addendum Added to Innovative Demonstration of Geothermal Energy Production FOA July 2, 2010 - 2:13pm...
Hawking radiation for a scalar field conformally coupled to an AdS black hole
P. Valtancoli
2015-02-05T23:59:59.000Z
The decomposition in normal modes of a scalar field conformally coupled to an AdS black hole leads to a Heun equation with simple coefficients thanks to conformal invariance. By applying the Damour-Ruffini method we can relate the critical exponent of the radial part at the horizon surface to the Hawking radiation of scalar particles.
S-matrix for strings on $\\eta$-deformed AdS5 x S5
Arutyunov, Gleb; Frolov, Sergey
2014-01-01T23:59:59.000Z
We determine the bosonic part of the superstring sigma model Lagrangian on $\\eta$-deformed AdS5 x S5, and use it to compute the perturbative world-sheet scattering matrix of bosonic particles of the model. We then compare it with the large string tension limit of the q-deformed S-matrix and find exact agreement.
S-matrix for strings on $?$-deformed AdS5 x S5
Gleb Arutyunov; Riccardo Borsato; Sergey Frolov
2014-04-07T23:59:59.000Z
We determine the bosonic part of the superstring sigma model Lagrangian on $\\eta$-deformed AdS5 x S5, and use it to compute the perturbative world-sheet scattering matrix of bosonic particles of the model. We then compare it with the large string tension limit of the q-deformed S-matrix and find exact agreement.
Bound State Transfer Matrix for AdS5 x S5 Superstring
Gleb Arutyunov; Marius de Leeuw; Ryo Suzuki; Alessandro Torrielli
2009-09-17T23:59:59.000Z
We apply the algebraic Bethe ansatz technique to compute the eigenvalues of the transfer matrix constructed from the general bound state S-matrix of the light-cone AdS5 x S5 superstring. This allows us to verify certain conjectures on the quantum characteristic function, and to extend them to the general case.
The Thermal Scalar and Random Walks in AdS3 and BTZ
Thomas G. Mertens; Henri Verschelde; Valentin I. Zakharov
2014-07-08T23:59:59.000Z
We analyze near-Hagedorn thermodynamics of strings in the WZW $AdS_3$ model. We compute the thermal spectrum of all primaries and find the thermal scalar explicitly in the string spectrum using CFT twist techniques. Then we use the link to the Euclidean WZW BTZ black hole and write down the Euclidean BTZ spectrum. We give a Hamiltonian interpretation of the thermal partition function of angular orbifolds where we find a reappearance of discrete states that dominate the partition function. Using these results, we discuss the nature of the thermal scalar in the WZW BTZ model. As a slight generalization of the angular orbifolds, we discuss the $AdS_3$ string gas with a non-zero chemical potential corresponding to angular momentum around the spatial cigar. For this model as well, we determine the thermal spectrum and the Hagedorn temperature as a function of chemical potential. Finally the nature of $\\alpha'$ corrections to the $AdS_3$ thermal scalar action is analyzed and we find the random walk behavior of highly excited strings in this particular $AdS_3$ background.
Multi-Spin Strings in AdS_4*CP^3 and its ?-deformation
Jun-Bao Wu
2013-05-31T23:59:59.000Z
In this paper, we study the multi-spin string solutions in AdS_4*CP^3 and its \\beta-deformation with real \\beta. We give various explicit solutions after some general studies. Conserved charges are computed for these explicit solutions.
Killing spinors, the adS black hole and I(ISO(2,1)) gravity
R. B. Mann; G. Papadopoulos
1996-06-12T23:59:59.000Z
We construct a supersymmetric extension of the $I\\big(ISO(2,1)\\big)$ Chern-Simons gravity and show that certain particle-like solutions and the adS black-hole solution of this theory are supersymmetric.
Jacopo Bechi
2009-09-25T23:59:59.000Z
This paper focuses on some issues about condensates and renormalization in AdS/QCD models. In particular we consider the consistency of the AdS/QCD approach for scale dependent quantities as the chiral condensate questioned in some recent papers and the 4D meaning of the 5D cosmological constant in a model in which the QCD is dual to a 5D gravity theory. We will be able to give some arguments that the cosmological constant is related to the QCD gluon condensate.
Ad Lucem: Modeling Market Transformation Pathways Workshop
Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: The Future of1 AAccelerated aging of1.1Energy DPF forWorkshop Welcome AdAD
R-charged AdS_{5} black holes and large N unitary matrix models
Pallab Basu; Spenta R. Wadia
2005-07-20T23:59:59.000Z
Using the AdS/CFT, we establish a correspondence between the intricate thermal phases of R-charged AdS_{5} blackholes and the R-charge sector of the N=4 gauge theory, in the large N limit. Integrating out all fields in the gauge theory except the thermal Polyakov line, leads to an effective unitary matrix model. In the canonical ensemble, a logarithmic term is generated in the non-zero charge sector of the matrix model. This term is important to discuss various supergravity properties like i) the non-existence of thermal AdS as a solution, ii) the existence of a point of cusp catastrophe in the phase diagram and iii) the matching of saddle points and the critical exponents of supergravity and those of the effective matrix model.
Holographic Thermalization, stability of AdS, and the Fermi-Pasta-Ulam-Tsingou paradox
Venkat Balasubramanian; Alex Buchel; Stephen R. Green; Luis Lehner; Steven L. Liebling
2014-06-16T23:59:59.000Z
For a real massless scalar field in general relativity with a negative cosmological constant, we uncover a large class of spherically symmetric initial conditions that are close to AdS, but whose numerical evolution does not result in black hole formation. According to the AdS/CFT dictionary, these bulk solutions are dual to states of a strongly interacting boundary CFT that fail to thermalize at late times. Furthermore, as these states are not stationary, they define dynamical CFT configurations that do not equilibrate. We develop a two-timescale perturbative formalism that captures both direct and inverse cascades of energy and agrees with our fully nonlinear evolutions in the appropriate regime. We also show that this formalism admits a large class of quasi-periodic solutions. Finally, we demonstrate a striking parallel between the dynamics of AdS and the classic Fermi-Pasta-Ulam-Tsingou problem.
Deeply Virtual Compton Scattering and Higgs Production Using the Pomeron in AdS
Richard C. Brower; Miguel S. Costa; Marko Djuri?; Chung-I Tan
2012-10-04T23:59:59.000Z
In the past decade overwhelming evidence has emerged for a conjectured duality between a wide class of gauge theories in d dimensions and string theories on asymptotically AdS_{d+1} spaces. We apply this duality to scattering processes that occur via Pomeron exchange. First we develop the Pomeron in string theory, as done by Brower, Polchinski, Strassler and Tan, showing that it naturally emerges as the Regge Trajectory of the AdS graviton. Next we apply the AdS Pomeron to the study of Deeply Virtual Compton Scattering (DVCS), and see that our model gives good results when compared to HERA data. We then show how we can extend our results to double Pomeron exchange, and apply it to developing a formalism for the study of double diffractive Higgs production.
The Classical Exchange Algebra of AdS5 x S5 String Theory
Marc Magro
2009-01-07T23:59:59.000Z
The classical exchange algebra satisfied by the monodromy matrix of AdS5 x S5 string theory in the Green-Schwarz formulation is determined by using a first-order Hamiltonian formulation and by adding to the Bena-Polchinski-Roiban Lax connection terms proportional to constraints. This enables in particular to show that the conserved charges of this theory are in involution. This result is obtained for a general world-sheet metric. The same exchange algebra is obtained within the pure spinor description of AdS5 x S5 string theory. These results are compared to the one obtained by A. Mikhailov and S. Schaefer-Nameki for the pure spinor formulation.
University Policy No.: AD2300 Classification: Administration
Victoria, University of
University Policy No.: AD2300 Classification: Administration Approving Authority: President FLAG DISPLAY POLICY Effective Date: March/08 Supersedes: June/99 Last Editorial Change: Mandated Review: March/15 PURPOSE 1.00 The purpose of this policy is to provide guidance on the display of flags
Measuring value added characteristics in feeder cattle
Mathews, Crystal Dawn
2009-05-15T23:59:59.000Z
, cyclical effects, lot size, weight, breed type, sex, commingling, fed cattle futures price, and corn price were all found to have an impact on the sale price of feeder cattle. Feeder calves sold through MFA Health Track Beef Alliance and other value added...
Marius de Leeuw; Takuya Matsumoto; Sanefumi Moriyama; Vidas Regelskis; Alessandro Torrielli
2012-04-11T23:59:59.000Z
We discuss special quantum group (secret) symmetries of the integrable system associated to the AdS/CFT correspondence. These symmetries have by now been observed in a variety of forms, including the spectral problem, the boundary scattering problem, n-point amplitudes, the pure-spinor formulation and quantum affine deformations.
de Leeuw, Marius; Moriyama, Sanefumi; Regelskis, Vidas; Torrielli, Alessandro
2012-01-01T23:59:59.000Z
We discuss special quantum group (secret) symmetries of the integrable system associated to the AdS/CFT correspondence. These symmetries have by now been observed in a variety of forms, including the spectral problem, the boundary scattering problem, n-point amplitudes, the pure-spinor formulation and quantum affine deformations.
AD CONTENT CHECK LIST: o Company logo
Zakharov, Vladimir
AD CONTENT CHECK LIST: o Company logo o Address o Contact Info: Phone, web site, and/or e-mail o that will perfectly reflect your image! Acceptable Formats For Logos/Graphics/Photos High-Res (300 dpi) PDF, EPS
Training Needs in Louisiana's Value-Added Forest Products Industry
Training Needs in Louisiana's Value-Added Forest Products Industry Richard VloskyRichard Vlosky-Added Training in Other States · The Need for Training in Louisiana-Past Research #12;Industry Development & Adding Value #12;Value-Added Industry Development is Multi-Faceted Marketing Workforce Training Strategic
Ryu, Jee-Hwan
A/D , MUX and REFS update #12;Korea University of Technology and Education ADSC=1 of Technology and Education Korea University of Technology and Education A/D converter #12;Korea University of Technology and Education () AD > -> X = 1 Korea University of Technology and Education AD #12;Korea
Universality of Long-Distance AdS Physics from the CFT Bootstrap
A. Liam Fitzpatrick; Jared Kaplan; Matthew T. Walters
2014-07-10T23:59:59.000Z
We begin by explicating a recent proof of the cluster decomposition principle in AdS_{d+1} from the CFT_d bootstrap in d > 2. The CFT argument also computes the leading interactions between distant objects in AdS, and we confirm the universal agreement between the CFT bootstrap and AdS gravity in the semi-classical limit. We proceed to study the generalization to 2d CFTs, which requires knowledge of the Virasoro conformal blocks in a lightcone OPE limit. We compute these blocks in a semiclassical, large central charge approximation, and use them to prove a suitably modified theorem. In particular, from the 2d bootstrap we prove the existence of large spin operators with fixed 'anomalous dimensions' indicative of the presence of deficit angles in AdS_3. As we approach the threshold for the BTZ black hole, interpreted as a CFT scaling dimension, the twist spectrum of large spin operators becomes dense. Due to the exchange of the Virasoro identity block, primary states above the BTZ threshold mimic a thermal background for light operators. We derive the BTZ quasi-normal modes, and we use the bootstrap equation to prove that the twist spectrum is dense. Corrections to thermality could be obtained from a more refined computation of the Virasoro conformal blocks.
Covariant propagator in AdS5 x S5 superspace
Peng Dai; Ru-Nan Huang; Warren Siegel
2010-02-10T23:59:59.000Z
We give an explicit superspace propagator for the chiral scalar field strength of 10D IIB supergravity on an AdS5 x S5 background. Because this space is conformally flat, the propagator is very simple, almost identical to that of flat space. We also give an explicit expansion over the Kaluza-Klein modes of S5. The fact that the full propagator is so much simpler suggests that, as in 2D conformal field theory, AdS/CFT calculations would be simpler without a mode expansion.
The free energy of N=2 supersymmetric AdS_4 solutions of M-theory
Maxime Gabella; Dario Martelli; Achilleas Passias; James Sparks
2011-07-29T23:59:59.000Z
We show that general N=2 supersymmetric AdS_4 solutions of M-theory with non-zero M2-brane charge admit a canonical contact structure. The free energy of the dual superconformal field theory on S^3 and the scaling dimensions of operators dual to supersymmetric wrapped M5-branes are expressed via AdS/CFT in terms of contact volumes. In particular, this leads to topological and localization formulae for the coefficient of N^{3/2} in the free energy of such solutions.
Can ECN Be Used to Differentiate Congestion Losses from Wireless Sa^ad Biaz Xia Wang
Can ECN Be Used to Differentiate Congestion Losses from Wireless Losses? Sa^ad Biaz Xia Wang.auburn.edu Technical Report CSSE04-04 May 13, 2004 Abstract TCP was designed and tuned to work well on networks where losses are mainly congestion losses. The performance of TCP decreases dramatically when a TCP connection
Iyer, Ramakrishnan [Department of Physics and Astronomy, University of Southern California, Los Angeles, California 90089-0484 (United States); Mukhopadhyay, Ayan [Harish-Chandra Research Institute, Chhatnag Road, Jhusi, Allahabad 211019 (India)
2010-04-15T23:59:59.000Z
The AdS/CFT correspondence defines a sector with universal strongly coupled dynamics in the field theory as the dual of pure gravity in AdS described by Einstein's equation with a negative cosmological constant. We explain here, from the field-theoretic viewpoint how the dynamics in this sector gets determined by the expectation value of the energy-momentum tensor alone. We first show that the Boltzmann equation has very special solutions which could be functionally completely determined in terms of the energy-momentum tensor alone. We call these solutions conservative solutions. We indicate why conservative solutions should also exist when we refine this kinetic description to go closer to the exact microscopic theory or even move away from the regime of weak coupling so that no kinetic description could be employed. We argue that these conservative solutions form the universal sector dual to pure gravity at strong coupling and large N. Based on this observation, we propose a regularity condition on the energy-momentum tensor so that the dual solution in pure gravity has a smooth future horizon. We also study if irreversibility emerges only at long time scales of observation, unlike the case of the Boltzmann equation.
Ramkumar, Mahalingam
. The pro- posed trust evaluation method and trust models are employed in ad hoc networks for secure ad hoc Terms--Ad hoc networks, security, trust modeling and evaluation. I. INTRODUCTION AN AD HOC NETWORK strategy to improve security of ad hoc networks is to develop mech- anisms that allow a node to evaluate
EnergyWorks Grabs Attention in Calm and Stormy Weather with Intuitive Ads |
Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube|6721 FederalTexas Energyof 2005 at IowasecurityEnergyPlus OvercomesDepartment of
Boyer, Edmond
hardware-based (physical) attacks and work under th Technical Report 01/07/2007 lirmm-00171028,version1-11Sep2007 #12;Added Redundancy Explicit Authentication
Going to Work: Understanding Work Schedules
Hoffman, Rosemarie
2000-07-20T23:59:59.000Z
have to work: John, Joyce, Jessie and Mary are full- time employees, and Jan is part-time. Each employee is required to report to This is an example of a work schedule that tells you when and what you have to do: It is best to arrive at least 5 to 15... John, Jessie Joyce Mary Wednesday Joyce, Mary John Jan Thursday Jessie, Joyce Jan Mary Friday Jan, Jessie Joyce John Saturday Mary, Joyce John Jessie Please answer the following questions about the work schedule: 1. What week is this work schedule...
Isometry Group Orbit Quantization of Spinning Strings in AdS_3 x S^3
Martin Heinze; George Jorjadze; Luka Megrelidze
2014-10-13T23:59:59.000Z
Describing the bosonic AdS_3 x S^3 particle and string in SU(1,1) x SU(2) group variables, we provide a Hamiltonian treatment of the isometry group orbits of solutions via analysis of the pre-symplectic form. For the particle we obtain a one-parameter family of orbits parameterized by creation-annihilation variables, which leads to the Holstein-Primakoff realization of the isometry group generators. The scheme is then applied to spinning string solutions characterized by one winding number in AdS_3 and two winding numbers in S^3. We find a two-parameter family of orbits, where quantization again provides the Holstein-Primakoff realization of the symmetry generators with an oscillator type energy spectrum. Analyzing the minimal energy at strong coupling we verify the spectrum of short strings at special values of winding numbers.
'AdS_5' Geometry Beyond Space-time and 4D Noncommutative Space-time
Otto C. W. Kong
2009-06-19T23:59:59.000Z
We discuss a 4D noncommutative space-time as suggested by the version of quantum (deformed) relativity which provides a classical geometry picture as an `AdS_5'. The 4D noncommutative space-time is more like a part of a phase space description, in accordance with the quantum notion -- quantum mechanics talks about only states but not configurations. The `AdS_5' picture also illustrates the classical 4D space-time is to be described as part of a bigger geometry beyond space-time at the quantum level. The radically new picture of quantum 'space-time' is expected to provide the basis for a (still to be formulated) new approach to quantum gravity with fundamental constants (quantum) hbar and Newton's constant G put at a similar level as c, the speed of light.
Renormalization, averaging, conservation laws and AdS (in)stability
Ben Craps; Oleg Evnin; Joris Vanhoof
2015-01-19T23:59:59.000Z
We continue our analytic investigations of non-linear spherically symmetric perturbations around the anti-de Sitter background in gravity-scalar field systems, and focus on conservation laws restricting the (perturbatively) slow drift of energy between the different normal modes due to non-linearities. We discover two conservation laws in addition to the energy conservation previously discussed in relation to AdS instability. A similar set of three conservation laws was previously noted for a self-interacting scalar field in a non-dynamical AdS background, and we highlight the similarities of this system to the fully dynamical case of gravitational instability. The nature of these conservation laws is best understood through an appeal to averaging methods which allow one to derive an effective Lagrangian or Hamiltonian description of the slow energy transfer between the normal modes. The conservation laws in question then follow from explicit symmetries of this averaged effective theory.
A new holographic limit of AdS5 x S5
Machiko Hatsuda; Warren Siegel
2003-02-06T23:59:59.000Z
We re-examine the projective lightcone limit of the gauge-invariant Green-Schwarz action on 5D anti-de Sitter x the five-sphere. It implies the usual holography for AdS5, but also (a complex) one for S5. The result is N=4 projective superspace, which unlike N=4 harmonic superspace can describe N=4 super Yang-Mills off shell.
New ${\\cal N} = 1$ supersymmetric $AdS_5$ backgrounds in Type IIA supergravity
Konstadinos Sfetsos; Daniel C. Thompson
2014-08-27T23:59:59.000Z
We present a family of N=1 supersymmetric backgrounds in type-IIA supergravity and their lifts to eleven-dimensional supergravity. These are of the form $AdS_5 \\times X^5$ and are characterised by an $SU(2)$ structure. The internal space, $X^5$, is obtained from the known Sasaki-Einstein manifolds, $Y^{p,q}$, via an application of non-Abelian T-duality.
ARM KAZR-ARSCL Value Added Product
DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]
Jensen, Michael
The Ka-band ARM Zenith Radars (KAZRs) have replaced the long-serving Millimeter Cloud Radars, or MMCRs. Accordingly, the primary MMCR Value Added Product (VAP), the Active Remote Sensing of CLouds (ARSCL) product, is being replaced by a KAZR-based version, the KAZR-ARSCL VAP. KAZR-ARSCL provides cloud boundaries and best-estimate time-height fields of radar moments.
Adding coal dust to coal batch
V.S. Shved; A.V.Berezin [OAO Koks, Kemerovo (Russian Federation)
2009-05-15T23:59:59.000Z
The granulometric composition of coke dust from the dry-slaking machine is determined. The influence of additions of 3-7% coke dust on the quality of industrial coking batch and the coke obtained by box coking is estimated. Adding 1% coke dust to coking batch does not markedly change the coke quality. Industrial equipment for the supply of dry-slaking dust to the batch is described.
Merged Sounding Value-Added Product
Troyan, D
2010-03-03T23:59:59.000Z
The Merged Sounding value-added product (VAP) uses a combination of observations from radiosonde soundings, the microwave radiometer (MWR), surface meteorological instruments, and European Centre for Medium-Range Weather Forecasts (ECMWF) model output with a sophisticated scaling/interpolation/smoothing scheme in order to define profiles of the atmospheric thermodynamic state at one-minute temporal intervals and a total of 266 altitude levels.
Entropy of near-extremal black holes in AdS5
Simon, Joan; Balasubramanian, Vijay; de Boer, Jan; Jejjala, Vishnu; Simon, Joan
2007-07-24T23:59:59.000Z
We construct the microstates of near-extremal black holes in AdS_5 x S5 as gases of defects distributed in heavy BPS operators in the dual SU(N) Yang-Mills theory. These defects describe open strings on spherical D3-branes in the S5, and we show that they dominate the entropy by directly enumerating them and comparing the results with a partition sum calculation. We display new decoupling limits in which the field theory of the lightest open strings on the D-branes becomes dual to a near-horizon region of the black hole geometry. In the single-charge black hole we find evidence for an infrared duality between SU(N) Yang-Mills theories that exchanges the rank of the gauge group with an R-charge. In the two-charge case (where pairs of branes intersect on a line), the decoupled geometry includes an AdS_3 factor with a two-dimensional CFT dual. The degeneracy in this CFT accounts for the black hole entropy. In the three-charge case (where triples of branes intersect at a point), the decoupled geometry contains an AdS_2 factor. Below a certain critical mass, the two-charge system displays solutions with naked timelike singularities even though they do not violate a BPS bound. We suggest a string theoretic resolution of these singularities.
ADS: The Next Generation Search Platform
Accomazzi, Alberto; Henneken, Edwin A; Chyla, Roman; Luker, James; Grant, Carolyn S; Thompson, Donna M; Holachek, Alexandra; Dave, Rahul; Murray, Stephen S
2015-01-01T23:59:59.000Z
Four years after the last LISA meeting, the NASA Astrophysics Data System (ADS) finds itself in the middle of major changes to the infrastructure and contents of its database. In this paper we highlight a number of features of great importance to librarians and discuss the additional functionality that we are currently developing. Starting in 2011, the ADS started to systematically collect, parse and index full-text documents for all the major publications in Physics and Astronomy as well as many smaller Astronomy journals and arXiv e-prints, for a total of over 3.5 million papers. Our citation coverage has doubled since 2010 and now consists of over 70 million citations. We are normalizing the affiliation information in our records and, in collaboration with the CfA library and NASA, we have started collecting and linking funding sources with papers in our system. At the same time, we are undergoing major technology changes in the ADS platform which affect all aspects of the system and its operations. We hav...
QEP WORKING GROUP CHARGES Assessment Working Group
Liu, Paul
and a framework that details timelines, leadership, resource allocation, and an assessment plan that is clearlyQEP WORKING GROUP CHARGES Assessment Working Group The topic of the QEP should fit should be supported by a thorough understanding of the institutional context and by assessment data
Review: [Untitled] Reviewed Work(s)
Elman, Benjamin
Review: [Untitled] Reviewed Work(s): DodonÃ¦us in Japan: Translation and the Scientific Mind to leading academic journals and scholarly literature from around the world. The Archive is supported-for-profit organization with a mission to help the scholarly community take advantage of advances in technology. For more
SOCIAL MEDIA AD Intreat is looking for a part-time Social Media Guru to help build and
SOCIAL MEDIA AD Intreat is looking for a part-time Social Media Guru to help build and engage our to work for a startup in a new and dynamically growing market. We are a small team with big goals in our app? Are you an outgoing creative who is interested in working in social media marketing? Do you
Secret Symmetries of Type IIB Superstring Theory on AdS3 x S3 x M4
Antonio Pittelli; Alessandro Torrielli; Martin Wolf
2014-11-06T23:59:59.000Z
We establish features of so-called Yangian secret symmetries for AdS3 type IIB superstring backgrounds thus verifying the persistence of such symmetries to this new instance of the AdS/CFT correspondence. Specifically, we find two a priori different classes of secret symmetry generators. One class of generators, anticipated from the previous literature, is more naturally embedded in the algebra governing the integrable scattering problem. The other class of generators is more elusive, and somewhat closer in its form to its higher-dimensional AdS5 counterpart. All of these symmetries respect left-right crossing. In addition, by considering the interplay between left and right representations, we gain a new perspective on the AdS5 case. We also study the RTT-realisation of the Yangian in AdS3 backgrounds thus establishing a new incarnation of the Beisert-de Leeuw construction.
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Scienceand Requirements RecentlyElectronicResources Resources About oneRethinking theAD&D
Fermilab Today | Classified Ads | Archive - 2015
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist. CategoryFebruaryFebruaryInThe, 2015Ads Subscribe | Contact
ARM - Value-Added Products (VAP)
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProducts (VAP) VAP Update Information on new, existing, and future value-added
ads spallation target: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
and as a BPS state in the dual spacetime CFT. Finally, we attempt to apply the lessons learned to the description of BTZ black holes as AdS3 orbifolds and to related big crunch...
added tax rate: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
budgetary expenses must be paid attention strictly. Because coefficients of value-added tax and corporate income tax are positive and significant, an increase in value-added tax...
Managing On-air Ad Inventory in Broadcast Television
Bollapragada, Srinivas; Mallik, Suman
2008-01-01T23:59:59.000Z
Motivated by the experiences of the National Broadcasting Company (NBC), we present an analytical model for managing on-air ad inventory in broadcast television. The ad inventory in this industry is priced based on rating ...
Holographic formula for the determinant of the scattering operator in thermal AdS
Danilo E. Díaz
2009-08-26T23:59:59.000Z
A 'holographic formula' expressing the functional determinant of the scattering operator in an asymptotically locally anti-de Sitter(ALAdS) space has been proposed in terms of a relative functional determinant of the scalar Laplacian in the bulk. It stems from considerations in AdS/CFT correspondence of a quantum correction to the partition function in the bulk and the corresponding subleading correction at large N on the boundary. In this paper we probe this prediction for a class of quotients of hyperbolic space by a discrete subgroup of isometries. We restrict to the simplest situation of an abelian group where the quotient geometry describes thermal AdS and also the non-spinning BTZ instanton. The bulk computation is explicitly done using the method of images and the answer can be encoded in a (Patterson-)Selberg zeta-function.
On Thermodynamics of AdS Black Holes in Arbitrary Dimensions
A. Belhaj; M. Chabab; H. El Moumni; M. B. Sedra
2012-09-23T23:59:59.000Z
Considering the cosmological constant $\\Lambda$ as a thermodynamic pressure and its conjugate quantity as a thermodynamic volume as proposed in Kubiznak and Mann (2012), we discuss the critical behavior of charged AdS black hole in arbitrary dimensions $d$. In particular, we present a comparative study in terms of the spacetime dimension $d$ and the displacement of critical points controlling the transition between the small and the large black holes. Such behaviors vary nicely in terms of $d$. Among our result in this context consists in showing that the equation of state for a charged RN-AdS black hole predicts an universal number given by $\\frac{2d-5}{4d-8}$. The three dimensional solution is also discussed.
Naik, Vinayak; Arora, Anish; Sinha, Prasun; Zhang, Hongwei
2007-01-01T23:59:59.000Z
Assignment in Radio Networks,” Wireless Networks, vol. 7,in a Mobile Ad Hoc Network,” Wireless Networks, vol. 8, no.Sensor Net- works,” Wireless Networks, vol. 8, no. 2, pp.
agencies industrial facilities: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
Industrial Processes and Industries Associated with Cancer in Humans CiteSeer Summary: Report of an IARC ad hoc Working Group which met in Lyon, 8- i 2 February i 982 to advise...
Transition from AdS universe to DS universe in the BPP model
Wontae Kim; Myungseok Yoon
2007-03-03T23:59:59.000Z
It can be shown that in the BPP model the smooth phase transition from the asymptotically decelerated AdS universe to the asymptotically accelerated DS universe is possible by solving the modified semiclassical equations of motion. This transition comes from noncommutative Poisson algebra, which gives the constant curvature scalars asymptotically. The decelerated expansion of the early universe is due to the negative energy density with the negative pressure induced by quantum back reaction, and the accelerated late-time universe comes from the positive energy and the negative pressure which behave like dark energy source in recent cosmological models.
Aspects of Axion Phenomenology in a slice of AdS_5
Thomas Flacke; David Maybury
2006-12-11T23:59:59.000Z
Motivated by multi-throat considerations, we study the phenomenological implications of a bulk axion in a slice of AdS_5 with a large extra dimension: k~0.01 eV, kR > 1. In particular, we compare axion physics with a warped geometry to axions in flat compactifications. As in flat compactification scenarios, we find that the mass of the axion can become independent from the underlying Peccei-Quinn scale. Surprisingly, we find that in warped extra dimensions the axion's invisibility, cosmological viability, and basic phenomenology remain essentially unaltered in comparison to axions in flat compactifications.
Integrable $?$-deformations: Squashing Coset CFTs and $AdS_5\\times S^5$
Saskia Demulder; Konstantinos Sfetsos; Daniel C. Thompson
2015-04-10T23:59:59.000Z
We examine integrable $\\lambda$-deformations of $SO(n+1)/SO(n)$ coset CFTs and their analytic continuations. We provide an interpretation of the deformation as a squashing of the corresponding coset $\\sigma$-model's target space. We realise the $\\lambda$-deformation for $n=5$ case as a solution to supergravity supported by non-vanishing five-form and dilaton. This interpolates between the coset CFT $SO(4,2)/SO(4,1)\\times SO(6)/SO(5)$ constructed as a gauged WZW model and the non-Abelian T-dual of the $AdS_5\\times S^5$ spacetime.
Superconductors for superstrings on AdS_5 x T^{1,1}
Francesco Aprile; Andrea Borghese; Aldo Dector; Diederik Roest; Jorge G. Russo
2012-05-09T23:59:59.000Z
We construct a one-parameter family of five-dimensional N=2 supergravity Lagrangians with an SU(2,1) / U(2) hypermultiplet. For certain values of the parameter, these are argued to describe the dynamics of scalar modes of superstrings on AdS_5 x T^{1,1}, and therefore to be dual to specific chiral primary operators of Klebanov-Witten superconformal field theory. We demonstrate that, below a critical temperature, the thermodynamics is dominated by charged black holes with hair for the scalars that are dual to the operator of lowest conformal dimension 3/2. The system thus enters into a superconducting phase where condenses.
Geons and Spin-2 Condensates in the AdS Soliton
Gavin S. Hartnett; Gary T. Horowitz
2012-11-06T23:59:59.000Z
We construct geons starting with gravitational perturbations of the AdS soliton. Previous studies of a charged scalar field in the soliton background showed a holographic insulator/superconductor transition at a critical chemical potential. We explore the possibility that dimensional reduction of the geon could model a transition to a d-wave superconductor. We find that although one does get a charged spin-2 condensate, it has higher free energy than the state without the condensate, so there is no phase transition.
C-AD electron-cooling Photocathode and Laser
C-AD electron-cooling Photocathode and Laser A. Burrill and T. Rao #12;C-AD electron system Design of 2nd and third generation system · Laser system Requirements Commercial Capsule fabrication · Brazing · Metallization #12;C-AD electron-cooling Overview Photocathode Requirements
AUAARHUS UNIVERSITY Adding a bonus card AU Finance and Planning
AUAARHUS UNIVERSITY Adding a bonus card AU Finance and Planning Financial Management 12/02/2013 Page 1 of 6 Guide to adding a bonus card in CWT's online system Log on to CWT: https://sso.carlsonwagonlit.com/login.do Type in your username and password Click on "Sign on" #12;AUAARHUS UNIVERSITY Adding a bonus card AU
Review of AdS/CFT Integrability, Chapter IV.3: N=6 Chern-Simons and Strings on AdS4xCP3
Thomas Klose
2012-03-27T23:59:59.000Z
We review the duality and integrability of N=6 superconformal Chern-Simons theory in three dimensions and IIA superstring theory on the background AdS4xCP3. We introduce both of these models and describe how their degrees of freedom are mapped to excitations of a long-range integrable spin-chain. Finally, we discuss the properties of the Bethe equations, the S-matrix and the algebraic curve that are special to this correspondence and differ from the case of N=4 SYM theory and strings on AdS5xS5.
Berdichevsky, Victor
Team work: Construction Management The Division of Engineering Technology in an construction technology area, an associate degree in construction science, or college- level course work equivalent to an associate degree in construction related area
Work with Biological Materials
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
Work with Biological Materials Print Planning A complete Experiment Safety Sheet (ESS) is required before work can be done at the ALS. This ESS is either a part of the proposal...
Interagency Sustainability Working Group
Broader source: Energy.gov [DOE]
The Interagency Sustainability Working Group (ISWG) is the coordinating body for sustainable buildings in the federal government.
Geometric free energy of toric AdS4/CFT3 models
Sangmin Lee; Daisuke Yokoyama
2015-01-22T23:59:59.000Z
We study the supersymmetric free energy of three dimensional Chern-Simons-matter theories holographically dual to AdS$_4$ times toric Sasaki-Einstein seven-manifolds. In the large $N$ limit, we argue that the square of the free energy can be written as a quartic polynomial of trial R-charges. The coefficients of the polynomial are determined geometrically from the toric diagrams. We present the coefficients of the quartic polynomial explicitly for generic toric diagrams with up to 6 vertices, and some particular diagrams with 8 vertices. Decomposing the trial R-charges into mesonic and baryonic variables, and eliminating the baryonic ones, we show that the quartic polynomial reproduces the inverse of the Martelli-Sparks-Yau volume function. On the gravity side, we explore the possibility of using the same quartic polynomial as the prepotential in the AdS gauged supergravity. Comparing Kaluza-Klein gravity and gauged supergravity descriptions, we find perfect agreement in the mesonic sector but some discrepancy in the baryonic sector.
Dual Superconformal Symmetry from AdS5 x S5 Superstring Integrability
Niklas Beisert; Riccardo Ricci; Arkady Tseytlin; Martin Wolf
2008-11-17T23:59:59.000Z
We discuss 2d duality transformations in the classical AdS5 x S5 superstring and their effect on the integrable structure. T-duality along four directions in Poincare parametrization of AdS5 maps the bosonic part of the superstring action into itself. On bosonic level, this duality may be understood as a symmetry of the first-order (phase space) system of equations for the coset components of the current. The associated Lax connection is invariant modulo the action of an so(2,4)-automorphism. We then show that this symmetry extends to the full superstring, provided one supplements the transformation of the bosonic components of the current with a transformation on the fermionic ones. At the level of the action, this symmetry can be seen by combining the bosonic duality transformation with a similar one applied to part of the fermionic superstring coordinates. As a result, the full superstring action is mapped into itself, albeit in a different kappa-symmetry gauge. One implication is that the dual model has the same superconformal symmetry group as the original one, and this may be seen as a consequence of the integrability of the superstring. The invariance of the Lax connection under the duality implies a map on the full set of conserved charges that should interchange some of the Noether (local) charges with hidden (non-local) ones and vice versa.
Shear Viscosity from AdS Born-Infeld Black Holes
Rong-Gen Cai; Ya-Wen Sun
2008-09-23T23:59:59.000Z
We calculate the shear viscosity in the frame of AdS/CFT correspondence for the field theory with a gravity dual of Einstein-Born-Infeld gravity. We find that the ratio of $\\eta/s$ is still the conjectured universal value $1/4\\pi$ at least up to the first order of the Born-Infeld parameter $1/b^2$.
Vacuum densities for a thick brane in AdS spacetime
A. A. Saharian; A. L. Mkhitaryan
2007-10-18T23:59:59.000Z
For a massive scalar field with general curvature coupling parameter we evaluate Wightman function, vacuum expectation values of the field square and the energy-momentum tensor induced by a $Z_{2}$-symmetric brane with finite thickness located on $(D+1)$-dimensional AdS bulk. For the general case of static plane symmetric interior structure the expectation values in the region outside the brane are presented as the sum of free AdS and brane induced parts. For a conformally coupled massless scalar the brane induced part in the vacuum energy-momentum tensor vanishes. In the limit of strong gravitational fields the brane induced parts are exponentially suppressed for points not too close to the brane boundary. As an application of general results a special model is considered in which the geometry inside the brane is a slice of the Minkowski spacetime orbifolded along the direction perpendicular to the brane. For this model the Wightman function, vacuum expectation values of the field square and the energy-momentum tensor inside the brane are evaluated. It is shown that for both minimally and conformally coupled scalar fields the interior vacuum forces acting on the brane boundaries tend to decrease the brane thickness.
A paucity of bulk entangling surfaces: AdS wormholes with de Sitter interiors
Sebastian Fischetti; Donald Marolf; Aron Wall
2014-09-23T23:59:59.000Z
We study and construct spacetimes, dubbed planar AdS-dS-wormholes, satisfying the null energy condition and having two asymptotically AdS boundaries connected through a (non-traversable) inflating wormhole. As for other wormholes, it is natural to expect dual descriptions in terms of two disconnected CFTs in appropriate entangled states. But for our cases certain expected bulk entangling surfaces used by the Hubeny-Rangamani-Takayanagi (HRT) prescription to compute CFT entropy do not exist. In particular, no real codimension-2 extremal surface can run from one end of the wormhole to the other. According to HRT, the mutual information between any two finite-sized subregions (one in each CFT) must then vanish at leading order in large $N$ -- though the leading-order mutual information per unit area between the two CFTs taken as wholes may be nonzero. Some planar AdS-dS-wormholes also fail to have plane-symmetric surfaces that would compute the total entropy of either CFT. We suggest this to remain true of less-symmetric surfaces so that the HRT entropy is ill-defined and some modified prescription is required. It may be possible to simply extend HRT or the closely-related maximin construction by a limiting procedure, though complex extremal surfaces could also play an important role.
Aerosol Best Estimate Value-Added Product
Flynn, C; Turner, D; Koontz, A; Chand, D; Sivaraman, C
2012-07-19T23:59:59.000Z
The objective of the Aerosol Best Estimate (AEROSOLBE) value-added product (VAP) is to provide vertical profiles of aerosol extinction, single scatter albedo, asymmetry parameter, and Angstroem exponents for the atmospheric column above the Central Facility at the ARM Southern Great Plains (SGP) site. We expect that AEROSOLBE will provide nearly continuous estimates of aerosol optical properties under a range of conditions (clear, broken clouds, overcast clouds, etc.). The primary requirement of this VAP was to provide an aerosol data set as continuous as possible in both time and height for the Broadband Heating Rate Profile (BBHRP) VAP in order to provide a structure for the comprehensive assessment of our ability to model atmospheric radiative transfer for all conditions. Even though BBHRP has been completed, AEROSOLBE results are very valuable for environmental, atmospheric, and climate research.
Shuang-Qing Wu
2011-12-13T23:59:59.000Z
With the help of a generalized form of the metric ansatz found for the single-charge case in a previous work [S.Q. Wu, Phys. Rev. D 83, 121502(R) (2011)], I adopt a simple algorithm to construct the most general nonextremal rotating charged black hole solutions in five-dimensional $U(1)^3$ gauged supergravity. The general solution that is interesting for testing the AdS$_5$/CFT$_4$ correspondence in M-theory, is characterized by its mass, two unequal rotation parameters, three different U(1) charges, and a negative cosmological constant. The metric ansatz is very universal and illuminative, it is not only especially suitable for constructing solutions with multiple different electric charges in (un)gauged supergravities, but also for other dilatonic gravity theory.
Robust Cubic-Based 3-D Localization for Wireless Sensor Networks
Shwe, Hnin Y; Wang, Chenchao; Chong, Peter Han Joo; Kumar, Arun
2013-01-01T23:59:59.000Z
tion for Mobile Wireless Sensor Networks,” Ad Hoc Net-tion for Mobile Wireless Sensor Networks,” Ad Hoc Net-Scheme in Stereo Wireless Sensor Networks,” Advances in
access control mechanism: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
the channel utilization of multihop wireless networks. Keywords: Mobile ad hoc networks, medium access control, this is not necessarily true in a mobile ad hoc network (MANET)...
Youth Leads the Way in 4-H Club Work.
Anonymous
1955-01-01T23:59:59.000Z
R I CTIVITY, achievement and ad. venture await youth in 4-H Club work. All boys and girls be tween the ages of 9 and 21 are eli. gible to be members. 4-H Cluh work is the youth phase of the Agricultural Extension Service. To become a 4-H... Club member, an individual must want to be one, know about 4-H work, realize what is expected of him and have a place in the program. @ 4-H CLUB WORK is voluntary. There are no dues. It is not a school subject. @ ON THE FARM, in the home anti i...
Does the Sun work as a nuclear fusion amplifier of
Scafetta, Nicola
Does the Sun work as a nuclear fusion amplifier of planetary tidal forcing? Nicola Scafetta ACRIM oscillates because of planetary motion The Sun is likely very sensitive to these oscillations March 1977); We reconstruct here Sun-centred planetary conjunctions and tidal potentials for the AD 1645
2005-04-19T23:59:59.000Z
POLICY X.X.X. Volume V, Information Technology. Chapter 6, Acceptable Safety Work Locations. Issuing Office: Department of Mathematics. Responsible ...
Lowrey, Dino
2008-01-01T23:59:59.000Z
INL @ work features jobs performed at the lab. For more information about INL careers, visit http://www.facebook.com/idahonationallaboratory.
Bailey, Charlotte M
2014-09-16T23:59:59.000Z
Job or Work Problems. (Needed equations or formulas). Worker's rate = 1 total time alone. Examples: Joe completes a job in 11 hours; his rate is job/hour.
Lowrey, Dino
2013-05-28T23:59:59.000Z
INL @ work features jobs performed at the lab. For more information about INL careers, visit http://www.facebook.com/idahonationallaboratory.
Conformal Transformations and Strings for an Accelerating Quark-Antiquark Pair in AdS3
Shijong Ryang
2014-12-08T23:59:59.000Z
From a simple moving open string solution dual to a moving heavy quark with constant velocity in the Poincare AdS_3 spacetime, we construct an accerlerating open string solution dual to a heavy quark-antiquark pair accelerated in opposite directions by performing the three mappings such as the SL(2,R)_L x SL(2,R)_R isometry transformation, the special conformal transformation and the conformal SO(2,2) transformation. Using the string sigma model action we construct two open string solutions staying in two different regions whose dividing line is associated with the event horizon appeared on the string worldsheet and obtain the accelerating open string solution by gluing two such solutions.
The S-matrix of the AdS5 x S5 superstring
Marius de Leeuw
2010-07-28T23:59:59.000Z
In this article we review the world-sheet scattering theory of strings on AdS 5 x S5. The asymptotic spectrum of this world-sheet theory contains both fundamental particles and bound states of the latter. We explicitly derive the S-matrix that describes scattering of arbitrary bound states. The key feature that enables this derivation is the so-called Yangian symmetry which is related to the centrally extended su(2|2) superalgebra. Subsequently, we study the universal algebraic properties of the found S-matrix. As in many integrable models, the S-matrix plays a key role in the determination of the energy spectrum. In this context, we employ the Bethe ansatz approach to compute the large volume energy spectrum of string bound states.
The Bound State S-Matrix for AdS5 x S5 Superstring
Gleb Arutyunov; Marius de Leeuw; Alessandro Torrielli
2011-08-24T23:59:59.000Z
We determine the S-matrix that describes scattering of arbitrary bound states in the light-cone string theory in AdS5 x S5. The corresponding construction relies on the Yangian symmetry and the superspace formalism for the bound state representations. The basic analytic structure supporting the S-matrix entries turns out to be the hypergeometric function 4F3. We show that for particular bound state numbers it reproduces all the scattering matrices previously obtained in the literature. Our findings should be relevant for the TBA and Luescher approaches to the finite-size spectral problem. They also shed some light on the construction of the universal R-matrix for the centrally-extended psu(2|2) superalgebra.
AdS Boundary Conditions and the Topologically Massive Gravity/CFT Correspondence
Skenderis, Kostas; Taylor, Marika; Rees, Balt C. van [Institute for Theoretical Physics, University of Amsterdam, Valckenierstraat 65, 1018 XE Amsterdam (Netherlands)
2009-12-15T23:59:59.000Z
The AdS/CFT correspondence provides a new perspective on recurrent questions in General Relativity such as the allowed boundary conditions at infinity and the definition of gravitational conserved charges. Here we review the main insights obtained in this direction over the last decade and apply the new techniques to Topologically Massive Gravity. We show that this theory is dual to a non-unitary CFT for any value of its parameter mu and becomes a Logarithmic CFT at mu = 1.
Design of the Helium Purifier for IHEP-ADS Helium Purification System
Jianqin, Zhang; Zhuo, Zhang; Rui, Ge
2015-01-01T23:59:59.000Z
Helium Purification System is an important sub-system in the Accelerator Driven Subcritical System of the Institute of High Energy Physics(IHEP ADS). The purifier is designed to work at the temperature of 77K. The purifier will work in a flow rate of 5g/s at 20MPa in continuous operation of 12 hours. The oil and moisture are removed by coalescing filters and a dryer, while nitrogen and oxygen are condensed by a phase separator and then adsorbed in several activated carbon adsorption cylinders. After purification, the purified helium has an impurity content of less than 5ppm.
adVancing frontiers in energy and
Merica and the World. front cover: researchers at Pnnl are delivering new knowledge about the processing and use of glass for hazardous waste stabilization and storage. above: Pnnl's work in vehicle emissions is helping to achieve the energy security, environmental footprint, and economic performance we need as a nation. Pnnl
Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]
1999-04-20T23:59:59.000Z
It establishes a work authorization and control process for work performed by designated management and operating (M&O), management and integrating (M&I), environmental restoration management contracts (ERMC) and other contracts determined by the Procurement Executive (hereafter referred to as M&O contractors). Cancels DOE O 5700.7C. Canceled by DOE O 412.1A.
WORKPLACE GUIDES GLOBAL WORKING
Roelleke, Thomas
of Stonewall good practice publications profiles some of the employers paving the way for gay staff to work do arise. This guide provides clear, practical tips on how gay employees can access internationalWORKPLACE GUIDES GLOBAL WORKING Supporting lesbian, gay and bisexual staff on overseas assignments
Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]
2005-04-21T23:59:59.000Z
To establish a work authorization and control process for work performed by designated site and facility management contractors, and other contractors as determined by the procurement executive, consistent with the budget execution and program evaluation requirements of the Department of Energy's (DOE's) Planning, Programming, Budgeting, and Evaluation process. Cancels DOE O 412.1.
Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]
2005-04-21T23:59:59.000Z
To establish a work authorization and control process for work performed by designated site and facility management contractors, and other contractors as determined by the procurement executive, consistent with the budget execution and program evaluation requirements of the Department of Energy's Planning, Programming, Budgeting, and Evaluation process. Admin Chg 1, dated 5-21-2014, cancels DOE O 412.1A.
ads harvesting agent: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
agent programming languages Peter Novk, Jrgen Dix IfI Technical Report Series Zachmann (Computer Graphics) 12;Adding structure to agent programming languages Peter...
DOE Announces Webinars on Adding Solar to Your Building Portfolio...
Broader source: Energy.gov (indexed) [DOE]
typically required. You can also watch archived webinars and browse previously aired videos, slides, and transcripts. Upcoming Webinars March 4: Live Webinar on Adding Solar...
On the short string limit of the folded spinning string in AdS5 x S5
M. Beccaria; A. Tirziu
2008-10-23T23:59:59.000Z
In this paper we generalize the results of arXiv:0806.4758 to non-zero value J of angular momentum in S^5. We compute the 1-loop correction to the energy of the folded spinning string in AdS_5 x S^5 in the particular limit of slow short string approximation. In this limit the string is moving in a near-flat central region of AdS_5 slowly rotating in both AdS_5 and S^5. The one-loop correction should represent the first subleading correction to strong coupling expansion of the anomalous dimension of short gauge theory operators of the form Tr D^S Z^J in the SL(2) sector.
Universal slow fall-off to the unique AdS infinity in Einstein-Gauss-Bonnet gravity
Maeda, Hideki [Centro de Estudios Cientificos (CECS), Arturo Prat 514, Valdivia (Chile)
2008-08-15T23:59:59.000Z
In this paper, the following two propositions are proven under the dominant energy condition for the matter field in the higher-dimensional spherically symmetric spacetime in Einstein-Gauss-Bonnet gravity in the presence of a cosmological constant {lambda}. First, for {lambda}{<=}0 and {alpha}{>=}0 without a fine-tuning to give a unique anti-de Sitter (AdS) vacuum, where {alpha} is the Gauss-Bonnet coupling constant, vanishing generalized Misner-Sharp mass is equivalent to the maximally symmetric spacetime. Under the fine-tuning, it is equivalent to the vacuum class I spacetime. Second, under the fine-tuning with {alpha}>0, the asymptotically AdS spacetime in the higher-dimensional Henneaux-Teitelboim sense is only a special class of the vacuum class I spacetime. This means the universal slow fall-off to the unique AdS infinity in the presence of physically reasonable matter.
Broader source: Energy.gov [DOE]
Clean Energy Works began in 2009 as a pilot program run by the City of Portland. In 2010, the US department of Energy awarded $20 million to create a statewide nonprofit to expand the program...
Broader source: Energy.gov [DOE]
Fusion energy is the energy source of the sun and all of the stars. As part of How Energy Works, we'll cover everything from fuel sources to plasma physics and beyond.
Brendan Casey; Herman White; Craig Hogan; Denton Morris; Mary Convery; Bonnie Fleming; Deborah Harris; Dave Schmitz; Brenna Flaugher; Aron Soha
2013-02-14T23:59:59.000Z
Six days. Three frontiers. One amazing lab. From 2010 to 2012, a film crew followed a group of scientists at the Department of Energy's Fermilab and filmed them at work and at home. This 40-minute documentary shows the diversity of the people, research and work at Fermilab. Viewers catch a true behind-the-scenes look of the United States' premier particle physics laboratory while scientists explain why their research is important to them and the world.
Developing Louisiana's Forest Products Industry: Adding Value for the Future
of a manufacturingThe increased value at each stage of a manufacturing assembly processassembly process Those and necessaryimportant and necessary Addition of net economic valueAddition of net economic value Value can be added through manufacturing orValue can be added through manufacturing or marketingmarketing Why Add Value
Characteristic length of an AdS/CFT superconductor
Kengo Maeda; Takashi Okamura
2008-10-30T23:59:59.000Z
We investigate in more detail the holographic model of a superconductor recently found by Hartnoll, Herzog, and Horowitz [Phys. Rev. Lett. 101, 031601], which is constructed from a condensate of a charged scalar field in AdS_4-Schwarzschild background. By analytically studying the perturbation of the gravitational system near the critical temperature T_c, we obtain the superconducting coherence length proportional to 1/\\sqrt{1-T/T_c} via AdS/CFT correspondence. By adding a small external homogeneous magnetic field to the system, we find that a stationary diamagnetic current proportional to the square of the order parameter is induced by the magnetic field. These results agree with Ginzburg-Landau theory and strongly support the idea that a superconductor can be described by a charged scalar field on a black hole via AdS/CFT duality.
Dynamics and BPS states of AdS5 supergravity with a Gauss-Bonnet term
Olivera Miskovic; Ricardo Troncoso; Jorge Zanelli
2006-03-23T23:59:59.000Z
Some dynamical aspects of five-dimensional supergravity as a Chern-Simons theory for the SU(2,2|N) group, are analyzed. The gravitational sector is described by the Einstein-Hilbert action with negative cosmological constant and a Gauss-Bonnet term with a fixed coupling. The interaction between matter and gravity is characterized by intricate couplings which give rise to dynamical features not present in standard theories. Depending on the location in phase space, the dynamics can possess different number of propagating degrees of freedom, including purely topological sectors. This inhomogeneity of phase space requires special care in the analysis. Background solutions in the canonical sectors, which have regular dynamics with maximal number of degrees of freedom, are shown to exist. Within this class, explicit solutions given by locally AdS spacetimes with nontrivial gauge fields are constructed, and BPS states are identified. It is shown that the charge algebra acquires a central extension due to the presence of the matter fields. The Bogomol'nyi bound for these charges is discussed. Special attention is devoted to the N=4 case since then the gauge group has a U(1) central charge and the phase space possesses additional irregular sectors.
Classical and Quantum Equations of Motion for a BTZ Black String in AdS Space
Eric Greenwood; Evan Halstead; Peng Hao
2010-01-24T23:59:59.000Z
We investigate gravitational collapse of a $(3+1)$-dimensional BTZ black string in AdS space in the context of both classical and quantum mechanics. This is done by first deriving the conserved mass per unit length of the cylindrically symmetric domain wall, which is taken as the classical Hamiltonian of the black string. In the quantum mechanical context, we take primary interest in the behavior of the collapse near the horizon and near the origin (classical singularity) from the point of view of an infalling observer. In the absence of radiation, quantum effects near the horizon do not change the classical conclusions for an infalling observer, meaning that the horizon is not an obstacle for him/her. The most interesting quantum mechanical effect comes in when investigating near the origin. First, quantum effects are able to remove the classical singularity at the origin, since the wave function is non-singular at the origin. Second, the Schr\\"odinger equation describing the behavior near the origin displays non-local effects, which depend on the energy density of the domain wall. This is manifest in that derivatives of the wavefunction at one point are related to the value of the wavefunction at some other distant point.
An Integrable Deformation of the AdS5 x S5 Superstring
Timothy J. Hollowood; J. Luis Miramontes; David M. Schmidtt
2014-09-24T23:59:59.000Z
The S-matrix on the world-sheet theory of the string in AdS5 x S5 has previously been shown to admit a deformation where the symmetry algebra is replaced by the associated quantum group. The case where q is real has been identified as a particular deformation of the Green-Schwarz sigma model. An interpretation of the case with q a root of unity has, until now, been lacking. We show that the Green-Schwarz sigma model admits a discrete deformation which can be viewed as a rather simple deformation of the F/F_V gauged WZW model, where F=PSU(2,2|4). The deformation parameter q is then a k-th root of unity where k is the level. The deformed theory has the same equations-of-motion as the Green-Schwarz sigma model but has a different symplectic structure. We show that the resulting theory is integrable and has just the right amount of kappa-symmetries that appear as a remnant of the fermionic part of the original gauge symmetry. This points to the existence of a fully consistent deformed string background.
An Integrable Deformation of the AdS5 x S5 Superstring
Hollowood, Timothy J; Schmidtt, David
2014-01-01T23:59:59.000Z
The S-matrix on the world-sheet theory of the string in AdS5 x S5 has previously been shown to admit a deformation where the symmetry algebra is replaced by the associated quantum group. The case where q is real has been identified as a particular deformation of the Green-Schwarz sigma model. An interpretation of the case with q a root of unity has, until now, been lacking. We show that the Green-Schwarz sigma model admits a discrete deformation which can be viewed as a rather simple deformation of the F/F gauged WZW model, where F=PSU(2,2|4). The deformation parameter q is then a k-th root of unity where k is the level. The deformed theory has the same equations-of-motion as the Green-Schwarz sigma model but has a different symplectic structure. We show that the resulting theory is integrable and has just the right amount of kappa-symmetries that appear as a remnant of the fermionic part of the original gauge symmetry. This points to the existence of a fully consistent deformed string background.
Gribov ambiguity in asymptotically AdS three-dimensional gravity
Anabalon, Andres [Departamento de Ciencias, Facultad de Artes Liberales, Facultad de Ingenieria y Ciencias, Universidad Adolfo Ibanez, Vina Del Mar (Chile); Canfora, Fabrizio [Centro de Estudios Cientificos (CECS), Casilla 1469, Valdivia (Chile); Giacomini, Alex; Oliva, Julio [Instituto de Fisica, Facultad de Ciencias, Universidad Austral de Chile, Valdivia (Chile)
2011-03-15T23:59:59.000Z
In this paper the zero modes of the de Donder gauge Faddeev-Popov operator for three-dimensional gravity with negative cosmological constant are analyzed. It is found that the AdS{sub 3} vacuum produces (infinitely many) normalizable smooth zero modes of the Faddeev-Popov operator. On the other hand, it is found that the Banados-Teitelboim-Zanelli black hole (including the zero mass black hole) does not generate zero modes. This differs from the usual Gribov problem in QCD where, close to the maximally symmetric vacuum, the Faddeev-Popov determinant is positive definite while 'far enough' from the vacuum it can vanish. This suggests that the zero mass Banados-Teitelboim-Zanelli black hole could be a suitable ground state of three-dimensional gravity with negative cosmological constant. Because of the kinematic origin of this result, it also applies for other covariant gravity theories in three dimensions with AdS{sub 3} as maximally symmetric solution, such as new massive gravity and topologically massive gravity. The relevance of these results for supersymmetry breaking is pointed out.
Working group report: Neutrino physics
2009-01-01T23:59:59.000Z
Working group report: Neutrino physics Acknowledgements TheWorking group report: Neutrino physics Coordinators: SANDHYAthe report of the neutrino physics working group at WHEPP-X.
Large N Free Energy of 3d N=4 SCFTs and AdS/CFT
Benjamin Assel; John Estes; Masahito Yamazaki
2012-09-24T23:59:59.000Z
We provide a non-trivial check of the AdS_4/CFT_3 correspondence recently proposed in arXiv:1106.4253 by verifying the GKPW relation in the large N limit. The CFT free energy is obtained from the previous works (arXiv:1105.2551, arXiv:1105.4390) on the S^3 partition function for 3-dimensional N=4 SCFT T[SU(N)]. This is matched with the computation of the type IIB action on the corresponding gravity background. We unexpectedly find that the leading behavior of the free energy at large N is 1/2 N^2 ln N. We also extend our results to richer theories and argue that 1/2 N^2 ln N is the maximal free energy at large N in this class of gauge theories.
New $AdS_3 \\times S^2$ T-duals with $\\mathcal{N} = (0,4)$ supersymmetry
Yolanda Lozano; Niall T. Macpherson; Jesús Montero; Eoin Ó Colgáin
2015-07-09T23:59:59.000Z
It is well known that Hopf-fibre T-duality and uplift takes the D1-D5 near-horizon into a class of $AdS_3 \\times S^2$ geometries in 11D where the internal space is a Calabi-Yau three-fold. Moreover, supersymmetry dictates that Calabi-Yau is the only permissible $SU(3)$-structure manifold. Generalising this duality chain to non-Abelian isometries, a strong parallel exists, resulting in the first explicit example of a class of $AdS_3 \\times S^2$ geometries with $SU(2)$-structure. Furthermore, the non-Abelian T-dual of $AdS_3 \\times S^3 \\times S^3 \\times S^1$ results in a new supersymmetric $AdS_3 \\times S^2$ geometry, which falls outside of all known classifications. We explore the basic properties of the holographic duals associated to the new backgrounds. We compute the central charges and show that they are compatible with a large $\\mathcal{N}=4$ superconformal algebra in the infra-red.
Notes on beta-deformations of the pure spinor superstring in AdS(5) x S(5)
Oscar A. Bedoya; L. Ibiapina Beviláqua; Andrei Mikhailov; Victor O. Rivelles
2010-05-01T23:59:59.000Z
We study the properties of the vertex operator for the beta-deformation of the superstring in AdS(5) x S(5) in the pure spinor formalism. We discuss the action of supersymmetry on the infinitesimal beta-deformation, the application of the homological perturbation theory, and the relation between the worldsheet description and the spacetime supergravity description.
A generalization of the Lax pair for the pure spinor superstring in AdS5 x S5
Andrei Mikhailov
2013-08-09T23:59:59.000Z
We show that the Lax pair of the pure spinor superstring in AdS5xS5 admits a generalization where the generators of the superconformal algebra are replaced by the generators of some infinite-dimensional Lie superalgebra.
A generalization of the Lax pair for the pure spinor superstring in AdS5 x S5
Mikhailov, Andrei
2013-01-01T23:59:59.000Z
We show that the Lax pair of the pure spinor superstring in AdS5xS5 admits a generalization where the generators of the superconformal algebra are replaced by the generators of some infinite-dimensional Lie superalgebra.
Yangian Symmetry, S-Matrices and Bethe Ansatz for the AdS5 x S5 Superstring
M de Leeuw
2009-01-22T23:59:59.000Z
We discuss the relation between the recently derived bound state S-matrices for the AdS5 x S5 superstring and Yangian symmetry. We will study the relation between this Yangian symmetry and the Bethe ansatz. In particular we can use it to derive the Bethe equations for bound states.
Enhanced radiological work planning
DECKER, W.A.
1999-05-21T23:59:59.000Z
The purpose of this standard is to provide Project Hanford Management Contractors (PHMC) with guidance for ensuring radiological considerations are adequately addressed throughout the work planning process. Incorporating radiological controls in the planning process is a requirement of the Hanford Site Radiological Control Manual (HSRCM-I), Chapter 3, Part 1. This standard is applicable to all PHMC contractors and subcontractors. The essential elements of this standard will be incorporated into the appropriate site level work control standard upon implementation of the anticipated revision of the PHMC Administration and Procedure System.
Work breakdown structure guide
Not Available
1987-02-06T23:59:59.000Z
Utilization of the work breakdown structure (WBS) technique is an effective aid in managing Department of Energy (DOE) programs and projects. The technique provides a framework for project management by focusing on the products that are being developed or constructed to solve technical problems. It assists both DOE and contractors in fulfilling their management responsibilities. This document provides guidance for use of the WBS technique for product oriented work identification and definition. It is one in a series of policy and guidance documents supporting DOE's project manaagement system.
Work with Biological Materials
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengtheningWildfires may contribute more to &83 3.3 Table3Work withWork
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron SpinPrincetonUsingWhat is abigpresented in theWorkBusiness1:Working with
Critical behavior of charged Gauss-Bonnet AdS black holes in the grand canonical ensemble
Zou, De-Cheng; Wang, Bin
2014-01-01T23:59:59.000Z
We study the thermodynamics in the grand canonical ensemble of D-dimensional charged Gauss-Bonnet-AdS black holes in the extended phase space. We find that the usual small-large black hole phase transition, which exhibits analogy with the Van de Waals liquid-gas system holds in five-dimensional spherical charged Gauss-Bonnet-AdS black holes when its potential is fixed within the range $0Gauss-Bonnet-AdS black holes, there is no such phase transition. In the limiting case, Reissner-Nordstrom-AdS black holes, with vanishing Gauss-Bonnet parameter, there is no critical behavior in the grand canonical ensemble. This result holds independent of the spacetime dimensions and topologies. We also examine the behavior of physical quantities in the vicinity of the critical point in the five-dimensional spherical charged Gauss-Bonnet-AdS black holes.
Critical behavior of charged Gauss-Bonnet AdS black holes in the grand canonical ensemble
De-Cheng Zou; Yunqi Liu; Bin Wang
2014-09-03T23:59:59.000Z
We study the thermodynamics in the grand canonical ensemble of D-dimensional charged Gauss-Bonnet-AdS black holes in the extended phase space. We find that the usual small-large black hole phase transition, which exhibits analogy with the Van de Waals liquid-gas system holds in five-dimensional spherical charged Gauss-Bonnet-AdS black holes when its potential is fixed within the range $0Gauss-Bonnet-AdS black holes, there is no such phase transition. In the limiting case, Reissner-Nordstrom-AdS black holes, with vanishing Gauss-Bonnet parameter, there is no critical behavior in the grand canonical ensemble. This result holds independent of the spacetime dimensions and topologies. We also examine the behavior of physical quantities in the vicinity of the critical point in the five-dimensional spherical charged Gauss-Bonnet-AdS black holes.
Public Works Transportation Infrastructure Study
Minnesota, University of
Public Works Transportation Infrastructure Study Minneapolis City of Lakes Minneapolis Public Works Transportation Infrastructure Study #12;Public Works Transportation Infrastructure Study Minneapolis City Works Transportation Infrastructure Study Minneapolis City of Lakes Background: Â· Currently, funding
WORK PROGRAMME 2009 COOPERATION
Milano-Bicocca, Università
_______ 15 SSH-2009 - 4.1.1. Competition and collaboration in access to oil, gas and mineral resourcesWORK PROGRAMME 2009 COOPERATION THEME 8 SOCIO-ECONOMIC SCIENCES AND HUMANITIES (European Commission and the Humanities Page 1 of 38 OBJECTIVE_______________________________________________________________ 3 I CONTEXT
Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]
1983-03-23T23:59:59.000Z
The order provides guidance and procedures and states responsibilities for maintaining work force discipline in DOE. Chg 1, dated 3-11-85; Chg 2, dated 1-6-86; Chg 3, dated 3-21-89; Chg 4, dated 8-2-90; Chg 5, dated 3-9-92; Chg 6, dated 8-21-92, cancels Chg 5.
Noncommutative Extension of AdS-CFT and Holographic Superconductors
Souvik Pramanik; Sudipta Das; Subir Ghosh
2015-02-13T23:59:59.000Z
In this Letter, we consider a Non-Commutative (NC) extension of AdS-CFT correspondence and its effects on holographic superconductors. NC corrections are incorporated via the NC generalization of Schwarzschild black hole metric in AdS with the probe limit. We study NC effects on the relations connecting the charge density and the critical temperature of the Holographic Superconductors. Furthermore, condensation operator of the superconductor has been analyzed. Our results suggest that generically, NC effects increase the critical temperature of the holographic superconductor.
Miskovic, Olivera; Olea, Rodrigo [Instituto de Fisica, Pontificia Universidad Catolica de Valparaiso, Casilla 4059, Valparaiso (Chile)
2011-03-15T23:59:59.000Z
We consider curvature-squared corrections to Einstein-Hilbert gravity action in the form of a Gauss-Bonnet term in D>4 dimensions. In this theory, we study the thermodynamics of charged static black holes with anti-de Sitter (AdS) asymptotics, and whose electric field is described by nonlinear electrodynamics. These objects have received considerable attention in recent literature on gravity/gauge dualities. It is well-known that, within the framework of anti-de Sitter/conformal field theory (AdS/CFT) correspondence, there exists a nonvanishing Casimir contribution to the internal energy of the system, manifested as the vacuum energy for global AdS spacetime in odd dimensions. Because of this reason, we derive a quantum statistical relation directly from the Euclidean action and not from the integration of the first law of thermodynamics. To this end, we employ a background-independent regularization scheme which consists, in addition to the bulk action, of counterterms that depend on both extrinsic and intrinsic curvatures of the boundary (Kounterterm series). This procedure results in a consistent inclusion of the vacuum energy and chemical potential in the thermodynamic description for Einstein-Gauss-Bonnet AdS gravity regardless of the explicit form of the nonlinear electrodynamics Lagrangian.
Construction work process management
Soares, Jorge Barbosa
1994-01-01T23:59:59.000Z
within an organization. TQM started in the 1940s with the application of Statistical Process Control (SPC) to manufacturing (Tenner and De Toro 1992). During World War II, SPC was largely used in the production of weapons. Dr. Joseph Juran describes...: Stuart D. Anderson (Chair of Committee) V&ctor L. Wdlson (Member) Charles H Samson (Member) Ignacio Rodrigue -It rbe (Department Head) Charles D. M ul1 an (Member) August 1994 Major Subject: Civil Engineering ABSTRACT Construction Work...
ads targeting public: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
system does not automatically search any patent databases so it is necessary for you to enter them manually. 1. On your Home screen click Oakley, Jeremy 2 Betrayed by Your Ads...
T HE C ABLE Did the Swift Boat Ads
Pritchard, Jonathan
by Associate Professor Scott Ashworth on the 2004 Swift Boat television ad campaign and its influence on John of interdisciplinary research. Lifting a Family Legacy Timothy Hannegan, MPP'87, discusses how becoming one
USDA Webinar: Value-Added Producer Grants for Tribal Entities
Broader source: Energy.gov [DOE]
Sponsored by the U.S. Department of Agriculture (USDA) Rural Development, this tribal-specific training will provide an overview of the FY14 Funding Opportunity and the Value-Added Producer Grants ...
Topping Turbines: Adding New Life to Older Plants
Cadrecha, M.
1984-01-01T23:59:59.000Z
An existing power plant can be repowered at a modest investment cost through a topping turbine installation. Essentially, this consists of replacing the existing old, low pressure boilers with new, high pressure boilers and adding a new, high...
Missouri Value-Added Loan Guarantee Program (Missouri)
Broader source: Energy.gov [DOE]
The Missouri Value-Added Loan Guarantee Program provides a 50% first-loss guarantee to lenders who make agricultural business development loans for the acquisition, construction, improvement, or...
Topping Turbines: Adding New Life to Older Plants
Cadrecha, M.
1984-01-01T23:59:59.000Z
An existing power plant can be repowered at a modest investment cost through a topping turbine installation. Essentially, this consists of replacing the existing old, low pressure boilers with new, high pressure boilers and adding a new, high...
adding e85 fueling: Topics by E-print Network
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
electricity, ethanol (E85), natural gas 8 DESIGN AND MODELLING OF OXIDE FUEL FOR INCINERATION OF AMERICIUM AND PLUTONIUM IN AN EXPERIMENTAL ADS CiteSeer Summary: The interest to...