Ad Hoc Curriculum Implementation Working Group Ad Hoc Working Group
Brown, Sally
Ad Hoc Curriculum Implementation Working Group MINUTES Ad Hoc Working Group 4 December 2002 Friedman on her visit next week. ONE CURRICULUM OR TWO? Information presented by Trudeau shows that PSE and other programs cannot be merged into a single curriculum. The Faculty Senate website states
Adaptive Scheduling in Ad Hoc and Cellular Wireless Networks
Tan, Choo Chin
2013-01-01
multicasting in energy-constrained wireless networks,” IEEEminimum-energy multicasting in wireless ad hoc networks,”minimum-energy multicasting in wireless ad hoc networks,” in
Approximate Minimum-Energy Multicasting in Wireless Ad Hoc Networks
Liang, Weifa
Approximate Minimum-Energy Multicasting in Wireless Ad Hoc Networks Weifa Liang, Senior Member, IEEE Abstract--A wireless ad hoc network consists of mobile nodes that are equipped with energy on energy conservation in wireless ad hoc networks have been conducted. For example, energy efficient
Low-Interference Topology Control for Wireless Ad Hoc Networks
Li, Xiang-Yang
wireless ad hoc networks. Many aspects of the networking will affect the energy consumption of the wireless may cause larger energy consumption. In wireless ad hoc networks, each wireless device can selectively1 Low-Interference Topology Control for Wireless Ad Hoc Networks Kousha Moaveni-Nejad, Xiang
LEARNING-BASED ROUTE MANAGEMENT IN WIRELESS AD HOC NETWORKS
Littman, Michael L.
and Wade Trappe The nodes in a wireless ad hoc network must act as routers in a self-configuring network to shortest-path routing protocols for managing router congestion and noise in wireless ad hoc networks. iiLEARNING-BASED ROUTE MANAGEMENT IN WIRELESS AD HOC NETWORKS BY BRIAN RUSSELL A dissertation
Enhancing Cellular Multicast Performance Using Ad Hoc Networks
Kasera, Sneha Kumar
Enhancing Cellular Multicast Performance Using Ad Hoc Networks Jun Cheol Park and Sneha Kumar heterogeneity problem in cellular multicast with the help of an additional IEEE 802.11 ad hoc network. The basic idea is to allow the cellular receivers experiencing poor channel conditions to use the ad hoc network
Maximizing Battery Life Routing in Wireless Ad Hoc Networks
Liang, Weifa
Maximizing Battery Life Routing in Wireless Ad Hoc Networks Weifa Liang Department of Computer Abstract--Most wireless ad hoc networks consist of mobile devices which operate on batteries. Power con, for an ad hoc network consisting of the same type of battery mobile nodes, two approximation algorithms
Adaptive Scheduling in Ad Hoc and Cellular Wireless Networks
Tan, Choo Chin
2013-01-01
organization wireless networks and wireless mobile ad-hocfor heterogeneous wireless network”, in Proc. of IEEER. Khalaf, “Ad hoc wireless networks with mobile backbones,”
Distributed services for mobile ad hoc networks
Cao, Guangtong
2005-11-01
by equipping each node with a device like a GPS receiver, a GPS receiver?s functionality is limited due to its geographical constraints, high energy consumption and cost. Therefore, studying clock synchronization algorithms for mobile ad hoc networks has 7... Network Lifetime vs. Number of Nodes : : : : : : : : : : : : : : : : : 61 24 Standard Deviation of Remaining Energy vs. Number of Nodes : : : 63 25 The k-Mutual Exclusion System Architecture : : : : : : : : : : : : : 71 26 Operation of KRL Algorithm on a...
Maximizing the throughput of large ad hoc wireless networks
Hua, Yingbo; Huang, Yi; J, Garcia-Luna-Aceves J
2006-01-01
The transport capacity of wireless networks over fadingimprovement of ad hoc wireless networks using directionalThe capacity of wireless networks,” IEEE Trans. Inform.
Master Thesis Group Key Agreement for Ad Hoc Networks
International Association for Cryptologic Research (IACR)
Master Thesis Group Key Agreement for Ad Hoc Networks Lijun Liao Date: 06 July 2005 Supervisor: M their financial support. #12;Abstract Over the last 30 years the study of group key agreement has stimulated much present a Tree-based group key agreement Framework for Ad-hoc Networks (TFAN). TFAN is especially suitable
Curriculum Revision REPORT OF AD HOC WORKING GROUP ON
Brown, Sally
Curriculum Revision REPORT OF AD HOC WORKING GROUP ON CURRICULUM REVISION (November 2002- March (2) Charge to Ad Hoc Working Group on Curriculum.............................. 12 (3) Materials;Curriculum Revision SUMMARY Curriculum transformation at the College of Forest Resources (CFR) is a response
Transmission capacity of CDMA ad hoc networks Steven Weber
de Veciana, Gustavo
Transmission capacity of CDMA ad hoc networks Steven Weber Dept. of ECE Drexel University and tolerate co-located simultaneous transmissions. We develop analytic results on the transmission capacity of a CDMA ad hoc network. Transmission capacity is defined as the maximum permissible density
Optimum Transmission Range for Wireless Ad Hoc Networks
Deng, Jing
Optimum Transmission Range for Wireless Ad Hoc Networks Jing Deng Dept. of EECS Syracuse Univ-- The transmission range that achieves the most economical use of energy in wireless ad hoc networks is studied under homogeneous node distribution. By as- suming the knowledge of node location, we first proposed a transmission
Poon, Chung Keung
________________________________________________________________________________ Topology Control of Ad Hoc Wireless Networks for Energy Efficiency Maggie X. Cheng, Member, IEEE, Mihaela of each wireless node such that the resulting network is connected and the total energy consumption the theoretical analysis. Index Terms--Multihop, ad hoc, wireless networks, energy efficiency, transmission power
Improving the Battery Performance of Ad-Hoc Routing Protocols
Kambhampati, Subbarao
Improving the Battery Performance of Ad-Hoc Routing Protocols Q. Qi and C. Chakrabarti Department-- In ad-hoc networks formed by battery powered nodes, the network lifetime can be significantly enhanced by incorporateing the battery properties in the routing protocol. In this paper, we propose such a routing mechanism
Topology Control Protocols to Conserve Energy in Wireless Ad Hoc Networks
Xu, Ya; Bien, Solomon; Mori, Yutaka; Heidemann, John; Estrin, D
2003-01-01
Protocols to Conserve Energy in Wireless Ad Hoc Networks YaL. Tassiulas. Energy conserving routing in wireless ad-hocAdaptive Energy Conservation Protocols for Wireless Ad Hoc
The Capacityand Energy Efficiency of Wireless Ad Hoc Networks with MultipacketReception
Garcia-Luna-Aceves, J.J.
2008-01-01
per-joule capacity of energy-limited wireless networks. IEEECapacity and Energy Efficiency of Wireless Ad Hoc Networksplexity, and energy efficiency in random wireless ad hoc
Context-Aware Protocol Engines for Ad Hoc Networks
Garcia-Luna-Aceves, J.J.
2009-01-01
Context-Aware Protocol Engines for Ad Hoc Networks J. J.we call a context-aware protocol engine. With a CAPE, nodesthe context-aware protocol engine (CAPE) as an instantiation
Truthful resource management in wireless ad hoc networks
Cai, Jianfeng
2005-11-01
In wireless mobile ad hoc networks (MANETs), cooperation cannot be an im- plicit assumption anymore. Each profit-oriented network node has the intention to be selfish due to limited resource possession. In this dissertation, we investigate...
Mobilized ad-hoc networks: A reinforcement learning approach
Chang, Yu-Han
2003-12-04
Research in mobile ad-hoc networks has focused on situations in which nodes have no control over their movements. We investigate an important but overlooked domain in which nodes do have control over their movements. ...
DISS. ETH NO. 16800 Understanding Ad hoc Networks
of this dissertation investigates the newly-found freedom enabled by battery-powered devices: mobility. OneDISS. ETH NO. 16800 Understanding Ad hoc Networks From Geometry to Mobility A dissertation submitted to the SWISS FEDERAL INSTITUTE OF TECHNOLOGY ZURICH for the degree of Doctor of Sciences presented
Limited Flooding Protocol for Mobile Ad hoc Networks Mieso Denko
Goddard, Wayne
Limited Flooding Protocol for Mobile Ad hoc Networks Mieso Denko Department of Computing propose a multipath routing protocol called Limited Flooding. The protocol is fully reactive and does not entail the compu- tation of routing tables. It uses the basic features of flooding but restricts packet
Energy-Efficient Topology Control in Cooperative Ad Hoc Networks
Wang, Yu
Energy-Efficient Topology Control in Cooperative Ad Hoc Networks Ying Zhu, Minsu Huang, Siyuan Chen cooperative energy spanners in which the energy efficiency of individual paths are guaranteed. Both proposed of cooperative communication in various wireless network applications: energy efficient routing [23], [24], [25
Smart Services for Ad Hoc Databases University of Washington
Matrajt, Graciela
data-base from lists of addresses of nearby schools, locations of resources (e.g., ambulances), and contact information for emergency workers. · A consulting business analyst assembles an ad hoc data- base of commercial database management systems are prohibitive, especially without access to dedicated IT staff
Elective Participation in Ad Hoc Networks Based on Energy Consumption
Deng, Jing
Elective Participation in Ad Hoc Networks Based on Energy Consumption Marc R. Pearlman , Jing Deng of determining the op- timal transmission radius for minimal interference and energy consumption is considered be significant. There- fore, in order to more aggressively conserve energy, one must Currently with the GE Global
An Energy Efficient Location Service for Mobile Ad Hoc etworks
Varela, Carlos
the distance traveled by the location update and query packets and, thus, at reducing the overall energy cost by the location update and query packets and, thus, to reduce the overall energy cost. 2 Energy Efficient LocationAn Energy Efficient Location Service for Mobile Ad Hoc etworks Zijian Wang1 , Eyuphan Bulut1
Cooperative Cache-Based Data Access in Ad Hoc Networks
Yener, Aylin
1 Cooperative Cache-Based Data Access in Ad Hoc Networks Guohong Cao, Liangzhong Yin and Chita R: Cooperative cache-based data access framework #12;6 Data Access Framework The cooperative cache-based data data authentication based on sensitivity. #12;16 Conclusion A cooperative cache-based data access
Reducing the Energy Drain in Multihop Ad Hoc Geraud Allard
Mans, Bernard
that save energy of nodes with low battery but also allow the network to handle more flows. I. INTRODUCTION-efficient routing for Multihop Ad Hoc Networks (MANET) look at extend- ing battery life by minimizing the cost's shortest path algorithm in which we integrate the notion of remaining energy in order to satisfy flow
Service Discovery in Mobile Ad Hoc Networks: A Field Theoretic Approach Vincent Lenders
Lenders, Vincent
Service Discovery in Mobile Ad Hoc Networks: A Field Theoretic Approach Vincent Lenders , Martin: {lenders, may, plattner}@tik.ee.ethz.ch Abstract Service discovery in mobile ad hoc networks is challeng
TDROP: A routing protocol for physically hierarchical ad hoc mobile networks
Ahmed, Zaheer
2000-01-01
Many protocols for routing in mobile ad hoc networks have been proposed. None of these protocols differentiates mobile nodes based on their physical characteristics and also there is only one proposal for connecting ad hoc ...
Ad hoc networks beyond unit disk graphs Fabian Kuhn Roger Wattenhofer Aaron Zollinger
miniaturization of electronics in general and wireless communication technology in particular is mobile ad hoc networks. Ad hoc networks are formed by mobile devices consisting of, among other components, a processor a weak battery or a small solar cell. Typically, wireless ad hoc networks are intended to be employed
A Mean Field Based Methodology for Modeling Mobility in Ad Hoc Networks
HorvĂˇth, AndrĂˇs
the behavior of the system. Index Terms--ad hoc networks, mean field analysis, Petri nets; I. INTRODUCTIONA Mean Field Based Methodology for Modeling Mobility in Ad Hoc Networks Marco Beccuti1--In this paper we propose a methodology for the modeling and analysis of ad hoc networks composed by a large
Wireless ad hoc networks Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale
Gao, Jie
are not flexible. Vulnerable to attacks. · Ad hoc networks· Ad hoc networks Flexible, easy to deploy, cheaper · Optimal power assignment /transmission range · Optimal scheduling & multi-hop routing · Node are staticWireless ad hoc networks Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale #12
Capacity Region, Minimum Energy and Delay for a Mobile Ad-Hoc Network
Chen, Yuanzhu Peter
Capacity Region, Minimum Energy and Delay for a Mobile Ad-Hoc Network Rahul Urgaonkar, Michael J in a mobile ad-hoc network: the capacity region and the minimum energy function of the network. The capacity limits of a mobile ad-hoc network are the capacity region and the minimum energy function of the network
Low-complexity energy-efficient broadcasting in wireless ad-hoc networks using network coding
Chen, Yuanzhu Peter
Low-complexity energy-efficient broadcasting in wireless ad-hoc networks using network coding J energy broadcasting in ad-hoc wireless networks is NP-complete [3] and a large number of approximation of minimizing the energy per bit when multicasting in an ad-hoc wireless network. An alternative formulation
Reliable and Energy-Efficient Routing for Static Wireless Ad Hoc Networks with Unreliable Links
Wang, Yu
Reliable and Energy-Efficient Routing for Static Wireless Ad Hoc Networks with Unreliable Links. In this paper, we address the problem of energy efficient reliable routing for wireless ad hoc networks communication, energy efficiency. Ç 1 INTRODUCTION WIRELESS ad hoc networks draw lots of attentions in recent
Asplund et al. Wireless Ad Hoc Dissemination for Search and Rescue Proceedings of the 7th
Asplund et al. Wireless Ad Hoc Dissemination for Search and Rescue Proceedings of the 7th International ISCRAM Conference Seattle, USA, May 2010 1 Wireless Ad Hoc Dissemination for Search and Rescue communication and Internet connectivity. Even if we consider wireless ad hoc communication as a means
A Platform for Implementing Secure Wireless Ad Hoc Networks
Farkas, Gyula; Haller, Piroska
2010-01-01
We propose a new platform for implementing secure wireless ad hoc networks. Our proposal is based on a modular architecture, with the software stack constructed directly on the Ethernet layer. Within our platform we use a new security protocol that we designed to ensure mutual authentication between nodes and a secure key exchange. The correctness of the proposed security protocol is ensured by Guttman's authentication tests.
Name Service in IPv6 Mobile Ad-hoc Network connected to the Internet
Jeong, Jaehoon "Paul"
Name Service in IPv6 Mobile Ad-hoc Network connected to the Internet Jaehoon Jeong, Jungsoo Park-hoc network connected to the Internet. The DNS resolution of DNS names of mobile nodes within mobile ad-hoc network is performed by multicast DNS and that of DNS names of nodes in the Internet is performed through
Wang, Yu
Bluetooth Scatternet Formation for Single-hop Ad Hoc Networks Based on Virtual Positions 43 Bluetooth Scatternet Formation for Single-hop Ad Hoc Networks Based on Virtual Positions Yu Wang , Ivan, Ontario, Canada Department of Computer Science Illinois Institute of Technology Chicago, Illinois, USA
FaultTolerant Distributed Algorithms in Sparse Ad Hoc Wireless Networks
FaultTolerant Distributed Algorithms in Sparse Ad Hoc Wireless Networks (SPAWN) BETTINA WEISS communication technologies, wireless ad hoc networks are increasingly commonplace nowadays. Spontaneous (``ad wireless sensor networks and disaster area communication systems. It is also a major enabling technology
A Multiobjective Performance Evaluation Framework for Routing in Wireless Ad Hoc
Jaffrčs-Runser, Katia
network when delay, robustness and energy are considered. I. INTRODUCTION Wireless ad hoc and sensor to transmission delay [8], energy consumption [9] or fairness [10] are added on top of its main design goalA Multiobjective Performance Evaluation Framework for Routing in Wireless Ad Hoc Networks Katia
Rethinking Information Theory for Mobile Ad Hoc Networks
Andrews, Jeff; Haenggi, Martin; Berry, Randy; Jafar, Syed; Guo, Dongning; Shakkottai, Sanjay; Heath, Robert; Neely, Michael; Weber, Steven; Yener, Aylin
2007-01-01
The subject of this paper is the long-standing open problem of developing a general capacity theory for wireless networks, particularly a theory capable of describing the fundamental performance limits of mobile ad hoc networks (MANETs). A MANET is a peer-to-peer network with no pre-existing infrastructure. MANETs are the most general wireless networks, with single-hop, relay, interference, mesh, and star networks comprising special cases. The lack of a MANET capacity theory has stunted the development and commercialization of many types of wireless networks, including emergency, military, sensor, and community mesh networks. Information theory, which has been vital for links and centralized networks, has not been successfully applied to decentralized wireless networks. Even if this was accomplished, for such a theory to truly characterize the limits of deployed MANETs it must overcome three key roadblocks. First, most current capacity results rely on the allowance of unbounded delay and reliability. Second, ...
On the Connectivity in One-Dimensional Ad Hoc Wireless Networks with a Forbidden Zone
On the Connectivity in One-Dimensional Ad Hoc Wireless Networks with a Forbidden Zone Xiaodong Hu1 This paper investigates the connectivity in one-dimensional ad hoc wireless networks with a forbidden zone. We derive the probability of the wireless networks which are composed of exactly m clusters by means
SANS: A Simple Ad Hoc Network Simulator Nicolas Burri, Roger Wattenhofer, Yves Weber, Aaron present a Simple Ad Hoc Network Simulator SANS particularly intended for the simulation of distributed the concepts and correct usage of SANS as a development, debugging, testing and presentation tool. Together
American Institute of Aeronautics and Astronautics Ad Hoc UAV Ground Network (AUGNet)
Brown, Timothy X.
American Institute of Aeronautics and Astronautics 1 Ad Hoc UAV Ground Network (AUGNet) Timothy X network with radio nodes mounted at fixed sites, on ground vehicles, and in small (10kg) UAVs. The ad hoc which act as relays. We envision two scenarios for this type of network. In the first, the UAV acts
A SERVICE DISCOVERY THREAT MODEL FOR AD HOC Adrian Leung and Chris Mitchell
Mitchell, Chris
A SERVICE DISCOVERY THREAT MODEL FOR AD HOC NETWORKS Adrian Leung and Chris Mitchell Information.Leung,C.Mitchell}@rhul.ac.uk Keywords: Security, Secure Service Discovery, Threat Model, Mobile Ad Hoc Networks, MANETs. Abstract. Securing the process of service discovery is one of them. Novel solutions are therefore required. However
DELAR: Device/Energy/Load Aware Relaying in Heterogenous Wireless Ad Hoc Networks
Zhang, Yanchao
- newable energy sources. In DELAR the heterogeneity of nodal energy capabilities or device types, nodalDELAR: Device/Energy/Load Aware Relaying in Heterogenous Wireless Ad Hoc Networks Wei Liu Energy conservation is of great importance for mobile ad hoc networks in which most nodes are equipped
ADHOC MAC: a new, flexible and reliable MAC architecture for ad-hoc networks
Borgonovo, Flaminio
ADHOC MAC: a new, flexible and reliable MAC architecture for ad-hoc networks F. Borgonovo, A, make the design of a prompt, efficient, flexible, and reliable MAC very difficult. An ad hoc network.e., transmissions that reach all terminals within the range allowed by the transmitting power. Due to radio range
Energy-Efficiency of Cooperative Sensing Schemes in Ad hoc WLAN Cognitive Radios
Namboodiri, Vinod
Energy-Efficiency of Cooperative Sensing Schemes in Ad hoc WLAN Cognitive Radios Reshma Syeda, we study and analyse the energy efficiency of two generic cooperative sensing schemes in an ad hoc a comparative numerical analysis to demonstrate the amount of energy savings of the proposed cooperative schemes
Minimizing Energy and Maximizing Network Lifetime Multicasting in Wireless Ad Hoc Networks
Liang, Weifa
Minimizing Energy and Maximizing Network Lifetime Multicasting in Wireless Ad Hoc Networks Weifa Abstract-- Most mobile nodes in a wireless ad hoc network are powered by energy limited batteries, the limited battery lifetime imposes a constraint on the network performance. Therefore, energy efficiency
EAGR: Energy Aware Greedy Routing Scheme for Wireless Ad hoc Networks Sachin Sharma
Dharmaraja, S.
EAGR: Energy Aware Greedy Routing Scheme for Wireless Ad hoc Networks Sachin Sharma Tejas Networks, throughput and energy consumption. Keywords: Rate of Energy Consumption, Greedy Routing, Wireless Ad hoc distributed nodes that communicate over a wireless link. In this paper we present a scalable, Energy Aware
On the Energy Efficiency of Cognitive Radios -A Study of the Ad Hoc Wireless LAN Scenario
Namboodiri, Vinod
On the Energy Efficiency of Cognitive Radios - A Study of the Ad Hoc Wireless LAN Scenario Anm can save energy over a conventional radio in the Ad Hoc Wireless LAN scenario. The interplay between wireless spectrum, has however, resulted in researchers overlooking the importance of energy consumption
Energy Conserving Routing in Wireless Ad-hoc Networks Jae-Hwan Chang and Leandros Tassiulas
Wang, Bing
Energy Conserving Routing in Wireless Ad-hoc Networks Jae-Hwan Chang and Leandros Tassiulas-- energy-sensitive routing, wireless ad-hoc networks, sensor networks I. INTRODUCTION CONSIDER a group of wireless static nodes is considered as it arises in a rapidly deployed, sensor based, monitoring system
Does Cognition Come at a Net Energy Cost in Ad Hoc Wireless LANs?
Namboodiri, Vinod
1 Does Cognition Come at a Net Energy Cost in Ad Hoc Wireless LANs? Anm Badruddoza, Vinod that are energy constrained. This work takes a first step in this direction for the ad hoc Wireless LAN scenario the importance of energy consumption in the devices that employ such techniques. Scanning for wireless spectrum
SQL is Dead; Long Live SQL: Lightweight Query Services for Ad Hoc Research Data
Matrajt, Graciela
SQL is Dead; Long Live SQL: Lightweight Query Services for Ad Hoc Research Data Bill Howe billhowe with ad hoc scientific Q&A. Further: · We reject the conventional wisdom that "scientists won't write SQL a production-quality database server. · We observe that simply sharing examples of SQL queries allows
Clique-Based Randomized Multiple Access for Energy-Efficient Wireless Ad Hoc Networks
Clique-Based Randomized Multiple Access for Energy-Efficient Wireless Ad Hoc Networks Paul G. Flikkema and Brent West Department of Electrical Engineering Northern Arizona University Flagstaff, AZ protocol design for wireless ad hoc networks is between proactive and reactive coor- dination, where
Distributed Topology Control for Power Efficient Operation in Multihop Wireless Ad Hoc Networks
of a wireless network that is operating on battery power is limited by the capacity of its energy sourceDistributed Topology Control for Power Efficient Operation in Multihop Wireless Ad Hoc Networks of wireless multihop ad hoc net- works can be controlled by varying the transmission power of each node. We
Low-Cost Truthful Multicast in Selfish and Rational Wireless Ad Hoc Networks
Li, Xiang-Yang
en- joy a more flexible composition. A wireless ad hoc network is a collection of radio devices limited transmission power. One of the dis- tinctive features of wireless networks is that the signal sent1 Low-Cost Truthful Multicast in Selfish and Rational Wireless Ad Hoc Networks Weizhao Wang Xiang
Comparative Study of Price-based Resource Allocation Algorithms for Ad Hoc Networks
be an ample alterna- tive. 1. Introduction Mobile ad hoc networks are formed by wireless nodes that move freely and have no fixed infrastructure. Each node in the network may act as a router for other nodes a serious threat to critical infrastructures of the future. Due to the nature of ad hoc wireless networks
A bidding algorithm for optimized utility-based resource allocation in ad hoc networks
for bandwidth allo- cation in wireless ad hoc networks. The quality of service (QoS) levels for each end ad hoc networks are formed by wireless nodes that move freely and have no fixed infrastructure. Each node in the network may act as a router for other nodes, and flows follow a multi-hop path from source
Comparison of two wireless ad hoc routing protocols on a hardware test-bed
Brown, Timothy X.
Comparison of two wireless ad hoc routing protocols on a hardware test-bed Shweta Bhandare of the rout- ing protocols is carried out using the Click modular router infrastructure on laptops with wireless ethernet cards running Linux. We demonstrate the working of both ad hoc routing protocols through
Coverage Problems in Wireless Ad-hoc Sensor Networks Seapahn Meguerdichian1
technology interfacing with emerging micro-sensor based on MEMs technology [2], is allowing sophisticatedCoverage Problems in Wireless Ad-hoc Sensor Networks Seapahn Meguerdichian1 , Farinaz Koushanfar2}@cs.ucla.edu {farinaz, mbs}@ee.ucla.edu Abstract - Wireless ad-hoc sensor networks have recently emerged as a premier
Interes'ng-Phrase Mining for Ad-Hoc Text Analy'cs
Interes'ng-Phrase Mining for Ad-Hoc Text Analy'cs Klaus Berberich (kberberi Weikum (originally presented at VLDB 2010) #12;Interes'ng-Phrase Mining for Ad-Hoc Text.g., iden'fy characteris'c quota'ons by barack obama) 2 / 27 #12;Interes'ng-Phrase Mining
Report of the Ad Hoc Committee on Washington Natural Resource Agency Reform
Brown, Sally
Report of the Ad Hoc Committee on Washington Natural Resource Agency Reform February 16, 2010 of the Environment (CoEnv) to make useful contributions to the Governor's natural resource agency reform initiative. As a result, the Washington Natural Resource Agency Reform ad hoc Committee was established and given
Simulation and Evaluation of Unsynchronized Power Saving Mechanisms in Wireless Ad hoc
Braun, Torsten
Simulation and Evaluation of Unsynchronized Power Saving Mechanisms in Wireless Ad hoc Networks@sics.se Abstract. Power saving mechanisms in wireless ad hoc network nodes mainly switch off the transmission proposed power saving approach based on asynchronous wake-up patterns and wake-up announcements integrated
Using Traffic Flow for Cluster Formation in Vehicular Ad-hoc Networks
Weigle, Michele
Using Traffic Flow for Cluster Formation in Vehicular Ad-hoc Networks Mohammad S. Almalag of the traffic will flow. I. INTRODUCTION Vehicular Ad Hoc Networks (VANETs) are considered to be a class MANETs. Nodes in VANETs have more processing power and storage space and typically have no battery
Singh, Santosh Kumar
2010-01-01
Spectrum is a scarce commodity, and considering the spectrum scarcity faced by the wireless-based service providers led to high congestion levels. Technical inefficiencies from pooled spectrum (this is nothing but the "common carrier principle" adopted in oil/gas/electricity pipelines/networks.), since all ad hoc networks share a common pool of channels, exhausting the available channels will force ad hoc networks to block the services. Researchers found that cognitive radio (CR) technology may resolve the spectrum scarcity. CR network proved to next generation wireless communication system that proposed as a way to reuse under-utilised spectrum of licensee user (primary network) in an opportunistic and non-interfering basis. A CR is a self-configuring entity in a wireless networking that senses its environment, tracks changes, and frequently exchanges information with their networks. Adding this layer of such intelligence to the ad hoc network by looking at the overall geography of the network known as cogni...
Quantitative Analysis of Transmission Power Control in Wireless Ad-hoc Networks
Sivakumar, Raghupathy
-hoc network is determined by the transmission power of the stations. Be- cause different topologies have transmis- sion power is determined by the network load, the number of stations, and the network size1 Quantitative Analysis of Transmission Power Control in Wireless Ad-hoc Networks Seung-Jong Park
over several small (energy-efficient) hops. For this purpose each node in the ad-hoc network chooses buildings. In this paper we present the XTC1 topology control algorithm that works i) without GPS and ii
Cross-Layer Design of Outage Optimum Routing Metric for Wireless Ad Hoc Networks
Garcia-Luna-Aceves, J.J.
2011-01-01
PAPER Cross-layer design of outage optimum routing metricof wireless ad hoc network outage probability in a fadingJ. J. Garcia-Luna-Aceves Outage optimum routing for wireless
Quality of Service (QoS) security in mobile ad hoc networks
Lu, Bin
2006-10-30
With the rapid proliferation of wireless networks and mobile computing applications, Quality of Service (QoS) for mobile ad hoc networks (MANETs) has received increased attention. Security is a critical aspect of QoS ...
Hierarchical Skeletons and ad hoc Parallelism Marcus I. Marr and Murray Cole
Cole, Murray
Hierarchical Skeletons and ad hoc Parallelism Marcus I. Marr and Murray Cole Department of Computer Science, University of Edinburgh, email: marr@dcs.ed.ac.uk We investigate the controlled introduction
Reliability and energy-efficiency in wireless ad-hoc networks
Srinivas, Anand, 1979-
2004-01-01
In this thesis, we address issues related to reliability and energy-efficiency in wireless ad hoc networks. In the first part of the work, we deal with the problem of simultaneously routing data along multiple disjoint ...
Autonomous Undersea Systems Network (AUSNet) Protocols To Support Ad-Hoc AUV Communications
semi-autonomous networked robots. Emerging flexible low bandwidth, energy efficient architectures opposed to network support) data transmissions. Current efforts are focused on transitionAutonomous Undersea Systems Network (AUSNet) Protocols To Support Ad-Hoc AUV Communications
Service Provision in Disconnected Mobile Ad hoc Networks Nicolas Le Sommer
Paris-Sud XI, Université de
Service Provision in Disconnected Mobile Ad hoc Networks Nicolas Le Sommer Valoria Laboratory, University of South Brittany Nicolas.Le-Sommer@univ-ubs.fr Abstract With the proliferation of mobiles devices
Li, HaoQi, M. Eng. Massachusetts Institute of Technology
2012-01-01
We present a distributed photo-sharing Android application, CameraDP, that primarily relies on ad-hoc Wifi. The app runs on top of the novel DIstributed Programming Layer Over Mobile Agents (DIPLOMA) programming abstraction. ...
Distributed Call Admission Control for Ad Hoc Shahrokh Valaee and Baochun Li
Li, Baochun
structure of management schemes in an ad hoc network may allow destructive operation of mali- cious sources -- such as the The authors are with the Edward S. Rogers Sr. Department of Electrical and Computer Engineering, University
Energy Efficient Broadcast in Wireless Ad hoc Networks with Hitch-hiking
Wu, Jie
, weather forecasting, home appliance control, and protec- tion against bioterrorism. Ad hoc networks can of applications that can improve quality of life, and even save lives. Sensor networks find their appli- cation
Tree Based Broadcast in Ad Hoc Networks Alpar Juttner1,2
Jüttner, Alpár
, Broadcast, Multicast, Routing algorithms, Wireless LANs. 1 #12;1 Introduction Mobile ad hoc networks (MANETs infrastructure in such a way, that each communi- cating device (hereafter node) can serve as a router
Reverse Nearest Neighbors Search in Ad-hoc Subspaces Man Lung Yiu
Mamoulis, Nikos
Reverse Nearest Neighbors Search in Ad-hoc Subspaces Man Lung Yiu Department of Computer Science, H.2.4.h Query processing, H.2.4.k Spatial databases Contact Author: Man Lung Yiu Department
Secure Neighborhood Discovery: A Fundamental Element for Mobile Ad Hoc Networking
Capkun, Srdjan
devices. Static ad hoc or mesh networks are being formed by home computers with roof-top antennas. Low, topology control, transmission scheduling, energy-efficient communication, as well as physical access
Analyzing the Impact of Mobility in Ad Hoc Networks Vincent Lenders, Jorg Wagner, and Martin May
Lenders, Vincent
Analyzing the Impact of Mobility in Ad Hoc Networks Vincent Lenders, J¨org Wagner, and Martin May Computer Engineering and Networks Laboratory ETH Zurich 8092 Zurich, Switzerland lenders
An Adaptive Routing Mechanism For Ad Hoc Wireless Sensor Jane E Tateson and Ian W Marshall, BTexact
Haddadi, Hamed
An Adaptive Routing Mechanism For Ad Hoc Wireless Sensor Networks Jane E Tateson and Ian W Marshall for a network of ad hoc wireless sensor nodes. The mechanism enables sensor nodes to minimize route cost by varying their transmission range, and by experimenting with the neighbours from which they forward data
Holliday, JoAnne
Power Control MAC Protocol Analysis and Improvement for Ad Hoc Networks Ping Ding, JoAnne Holliday power control protocols have been proposed to address the limited power supplies in ad hoc networks. Recent protocols suggest varying the transmission power such that the RTS/CTS handshake is done
Ad-hoc Limited Scale-Free Models for Unstructured Peer-to-Peer Networks Hasan Guclu
Yuksel, Murat
, search success rate, routing reachability and stability) de- pend on the capability of preserving structure even over the churn caused by the ad-hoc nodes joining or leaving the network. Preserving mainly depends on the capability of preserving structure even over the churn caused by the ad-hoc nodes
Maróti, Miklós
Int. J. Ad Hoc and Ubiquitous Computing, Vol. 1, No. 4, 2006 239 Copyright © 2006 Inderscience: sensor networks; ad hoc networks; ubiquitous computing; time synchronisation; clock synchronisation and Ubiquitous Computing, Vol. 1, No. 4, pp.239251. Biographical notes: Branislav Kusý is a Research Assistant
Lazos, Loukas
Energy-Aware Secure Multicast Communication In Wireless Ad-Hoc Networks Loukas Lazos, and Radha Poovendran Abstract-- In this paper we address the problem of efficiently securing multicast communication in energy constrained wireless ad hoc networks. We show that existing scalable key distribution techniques
A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks
Shen, Xuemin "Sherman"
schemes. Index Terms--Mobile ad hoc networks, energy saving, network coding, lightweight encryption. ! 1 a lower energy consumption in MANETs [6][8]. The energy saving comes from fact that less transmissions operations, this means 1/4 energy can be saved. Besides basic transmissions, energy consumption can also come
JTP: An Energy-conscious Transport Protocol for Wireless Ad Hoc Networks
JTP: An Energy-conscious Transport Protocol for Wireless Ad Hoc Networks (Technical Report BUCS the energy gains of JTP over one-size-fits-all transport protocols. I. INTRODUCTION Motivation and Scope physical to transport [8], [9]. JAVeLEN's design ensures that energy gains obtained in one layer would
Exploiting Trust Relations for Nash Equilibrium Efficiency in Ad Hoc Networks
Baras, John S.
Exploiting Trust Relations for Nash Equilibrium Efficiency in Ad Hoc Networks Shanshan Zheng, Tao where the nodes' payoffs are affected by their trust relations. We characterize the Nash equilibrium the interactions among nodes as a game, the Nash equilibria are used to study the operating points of the network
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks
Chen, Ing-Ray
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks Maxim Raya, Panagiotis that the traditional notion of trust as a relation among entities, while useful, becomes insufficient for emerging data-centric the traditional notion of trust to data-centric trust: trustworthiness attributed to node- reported data per se
Resilient Data-Centric Storage in Wireless Ad-Hoc Sensor Networks
Chuang, John C.-I.
Resilient Data-Centric Storage in Wireless Ad-Hoc Sensor Networks Abhishek Ghose, Jens Grossklags to the limited battery life of sensor devices. It has been shown that data-centric methodologies can be used to solve this problem efficiently. In data-centric storage, a recently proposed data dissemina- tion
Non-Blocking, Localized Routing Algorithm for Balanced Energy Consumption in Mobile Ad Hoc Networks
Yu, Chansu
relevant nodes but also to balance individual battery levels. Unbalanced energy usage will result1 Non-Blocking, Localized Routing Algorithm for Balanced Energy Consumption in Mobile Ad Hoc Networks Kyungtae Woo, Chansu Yu, and Dongman Lee Hee Yong Youn Ben Lee School of Engineering Information
Mobility Models for Ad hoc Network Simulation Guolong Lin, Guevara Noubir, and Rajmohan Rajaraman
Chan, Agnes Hui
present the random waypoint model as a renewal process and derive an accurate characterizationMobility Models for Ad hoc Network Simulation Guolong Lin, Guevara Noubir, and Rajmohan Rajaraman.neu.edu Abstract-- In this paper, we propose a novel general technique, based on renewal theory, for analyzing
Mobility Models for Ad hoc Network Simulation Guolong Lin, Guevara Noubir, and Rajmohan Rajaraman
Rajaraman, Rajmohan
are twofold: #15; Analytical: We present the random waypoint model as a renewal process and derive an accurateMobility Models for Ad hoc Network Simulation Guolong Lin, Guevara Noubir, and Rajmohan Rajaraman@ccs.neu.edu Abstract--- In this paper, we propose a novel general technique, based on renewal theory, for analyzing
Energy consumption models for ad-hoc mobile Emmanuel Lochin1
Lochin, Emmanuel
1 Energy consumption models for ad-hoc mobile terminals Emmanuel Lochin1 Anne Fladenmuller1 Jean describes a set of experiments based on ACPI BIOS measurements which evaluate the energy consumption of an IEEE802.11 wireless net- work interface. Based on our ACPI measurements, two models of energy
Delay and Capacity Trade-offs in Mobile Ad Hoc Networks: A Global Perspective
Chen, Yuanzhu Peter
Mazumdar, Ness Shroff School of Electrical and Computer Engineering Purdue University West Lafayette, IN 47907, USA Email: {gsharma,shroff}@ecn.purdue.edu Department of Electrical and Computer Engineering the delay and capacity trade-offs in mobile ad hoc networks. This line of investigation started
Outage in a Cellular Network Overlaid with an Ad hoc Network: The Uplink Case
Yanikomeroglu, Halim
Outage in a Cellular Network Overlaid with an Ad hoc Network: The Uplink Case Arshdeep S. Kahlon}@sce.carleton.ca Abstract--We analyze the uplink outage probability at the randomly, but not necessarily independently nor, large-scale power control, and the knowledge of the initial outages in the absence of the secondary
Asymptotic Outage Analysis of General Motion-Invariant Ad Hoc Networks
Haenggi, Martin
Asymptotic Outage Analysis of General Motion-Invariant Ad Hoc Networks Riccardo Giacomelli Dept Dame, IN, USA E-mail: mhaenggi@nd.edu Abstract--The outage analysis of networks with randomly a homogeneous Poisson point process. In this paper, we show that in great generality, the outage probability
A Power Efficient Scheduling Mechanism for an IEEE 802.11 Multiple Rate Ad Hoc Network
Tseng, Yu-Chee
that of 802.11 PSM. Keywords: Ad Hoc Network, DCF, 802.11 PSM, Beacon Interval, and ATIM Window 1 Introduction Mechanism (802.11 PSM) that allows a wireless STA to go from the active state to doze or power-saving state
Progressive Network Coding for Message-Forwarding in Ad-Hoc Wireless Networks
Chen, Yuanzhu Peter
repetition-forward and progressive network coding are analyzed with respect to different transmit power. This paper considers the multi-hop transmission prob- lem in wireless ad-hoc networks. In a three-node sce of multi- hop transmission. The new framework, exploiting the technology of progressive network coding
Heidemann, John
monitoring in the water and soil, tagging small animals unobtrusively, or tagging small and light objects hardware and energy constrained de- vices, for noisy, unpredictable environments and for very large ad hoc, despite be- ing largely unattended, overcoming energy limitations and a lack of pre
Performance Comparison of Neighbor Discovery Protocols in Wireless Ad-Hoc Network
Pandey, Sanat Kumar
2015-08-05
In this thesis we consider the problem of neighbor discovery in synchronous single hop wireless ad-hoc networks. The central problem is to establish a broadcasting sequence such that only one transmitter broadcasts at a time while all others listen...
Capacity Bounds for Energy Efficient Data Streaming in Homogeneous Wireless Ad Hoc Networks
Li, Zongpeng
Capacity Bounds for Energy Efficient Data Streaming in Homogeneous Wireless Ad Hoc Networks Hanan activation schemes with provable asymptotic bounds on the capacity and energy efficiency of the induced add to the noise levels of each other and cause the overall network capacity to decrease
Cooperative Energy Spanners: Energy-Efficient Topology Control in Cooperative Ad Hoc Networks
Wang, Yu
Cooperative Energy Spanners: Energy-Efficient Topology Control in Cooperative Ad Hoc Networks Ying introduce a new topology control problem: energy-efficient topology control problem with cooperative communication, and propose two topology control algorithms to build cooperative energy spanners in which
Energy-Efficient Distributed Constructions of Minimum Spanning Tree for Wireless Ad-hoc
Khan, Maleq
1 Energy-Efficient Distributed Constructions of Minimum Spanning Tree for Wireless Ad-hoc Networks and energy efficient for being practical. Motivated by these considerations, we study the performance of a class of simple and local algorithms called Nearest Neighbor Tree (NNT) algorithms for energy
Price/Utility-based Optimized Resource Allocation in Wireless Ad hoc Networks
Price/Utility-based Optimized Resource Allocation in Wireless Ad hoc Networks Calin Curescu of Service (QoS) levels for each end-to-end flow are expressed using resource-utility functions, and our algorithms aim to maximise the aggregated utility of the flows. The scheme differentiates between applica
An Energy Efficient MAC Protocol for Fully Connected Wireless Ad Hoc Networks
Zhuang, Weihua
1 An Energy Efficient MAC Protocol for Fully Connected Wireless Ad Hoc Networks Kamal Rahimi Abstract--Energy efficiency is an important performance mea- sure of wireless network protocols, especially for battery-powered mobile devices such as smartphones. This paper presents a new energy-efficient medium
DataCentric Routing for Mobile Ad Hoc Networks Edward Woodrow
Heinzelman, Wendi
networks that support efficient data and route discovery based on metadata queries. Most ad hoc routing SPINIT (Sensor Protocols for Information via Negotiation Information Transfer) and SPINDL ( Directory Listing) use descriptive metadata to search the network for data of interest, and to establish
Improved Power-Delay Trade-off in Wireless Ad Hoc Networks Using Opportunistic Routing
Lee, Yong Hoon
Improved Power-Delay Trade-off in Wireless Ad Hoc Networks Using Opportunistic Routing Won power- delay trade-off than the conventional routing while providing up to a logarithmic boost that the power can be reduced at the expense of increased delay for both scenarios, but better trade-off can
14. A TAXONOMY OF DATA COMMUNICATION PROTOCOLS FOR VEHICULAR AD HOC NETWORKS
Stojmenovic, Ivan
1 14. A TAXONOMY OF DATA COMMUNICATION PROTOCOLS FOR VEHICULAR AD HOC NETWORKS Yousef efficiency. In this paper, we provide the first known taxonomy of VANET data communication protocols, based, vehicle connectivity, urgency, and message contents. The taxonomy provides fundamental blocks in VANET
Impact of Social Relation and Group Size in Multicast Ad Hoc Networks
Wang, Xinbing
1 Impact of Social Relation and Group Size in Multicast Ad Hoc Networks Yi Qin, Riheng Jia, Jinbei wireless social networks. We adopt the two-layer network model, which includes the social layer and the networking layer. In the social layer, the social group size of each source node is modeled as power
Supporting Secure Ad-hoc User Collaboration in Grid Environments Markus Lorch, Dennis Kafura
Cao, Yong
Supporting Secure Ad-hoc User Collaboration in Grid Environments Markus Lorch, Dennis Kafura is a key requirement. Current grid security mechanisms support individual users who are members of well-defined virtual organizations. Recent research seeks to provide manageable grid security services for self
Route Throughput Analysis with Spectral Reuse for Multi-Rate Mobile Ad Hoc Networks
Tseng, Yu-Chee
networks (MANETs) have received a lot of attention for its flexible network architecture. While many network (MANET) is a flexible and dynamic architecture that is attractive due to its ease in network1 Route Throughput Analysis with Spectral Reuse for Multi-Rate Mobile Ad Hoc Networks Lien-Wu Chen
Energy-Balanced Cooperative Routing in Multihop Wireless Ad Hoc Networks
Wang, Yu
Energy-Balanced Cooperative Routing in Multihop Wireless Ad Hoc Networks Siyuan Chen Minsu Huang. In this paper, we aim to study the impact of cooperative routing on balancing the energy distribution among their transmission power, our cooperative routing method can balance the energy among neighboring nodes and maximize
Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking
Sirer, Emin Gun
Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment Laura Marie Feeney, Martin Nilsson Abstract--Energy-aware design and evaluation of network protocols re- quires knowledge of the energy consumption behavior of actual wireless interfaces. But little
LHAP: A Lightweight Network Access Control Protocol for Ad-Hoc Networks
Xu, Shouhuai
, One-way Key Chain, TESLA I. INTRODUCTION In ad hoc wireless networks, no base stations exist and every of the nodes relaying the packets. For example, since mobile hosts are usually battery powered, they are susceptible to battery exhaustion attacks [36]. Clearly, a network access control capability is essential
Energy-based adaptation in simulations of survivability of ad hoc communication
Energy-based adaptation in simulations of survivability of ad hoc communication Massimiliano Raciti by the IDS. The approach is based on a model for accounting CPU energy consumption in network simulation are overloaded or not available. Unfortunately, the constrained capacity of their batteries and the energy
UAV surveillance using multihop ad-hoc wireless networks: a demonstrator
Boucherie, Richard J.
de Graaf and Gerard Hoekstra shelf quadrotor drones and wireless routers to create an ad-hoc network based on optimized link state routing, extending the operational range of the drones. 1 Introduction, flying robots equipped with cameras, often referred to as drones, have been used to overcome
TCP Performance over Mobile Ad-hoc Networks -A Quantitative Study
Park, Seung-Jong "Jay"
gaining maturity, some researchers have lately shifted focus to the transport layer performance in ad-hoc networks [8], [9], [10]. Since TCP (Transmission Control Protocol) is by far the most used transport pro notification (ELFN) to the source from the link failure point. The source, upon receiving the ELFN freezes TCP
Modular Topology Control and Energy Model for Wireless Ad Hoc Sensor Networks
Jay Yang, Shanchieh
Modular Topology Control and Energy Model for Wireless Ad Hoc Sensor Networks Niranjan in a harsh terrain typically are battery operated and, therefore, require energy efficient network protocols. In order to ease the analysis of the energy usage of proposed network protocols, this paper proposes
Energy savings in wireless ad hoc sensor networks as a result of network synchronisation
Haddadi, Hamed
Energy savings in wireless ad hoc sensor networks as a result of network synchronisation Antonio of oceanographic monitoring using a collegiate-managed autonomous network of energy-conscious wireless sensors. We-to-node synchronised transmissions in order to reduce overhearing and therefore reduce energy expenses. SSSNP (Self
ENERGY-AWARE SECURE MULTICAST COMMUNICATION IN AD-HOC NETWORKS USING GEOGRAPHIC LOCATION INFORMATION
Lazos, Loukas
ENERGY-AWARE SECURE MULTICAST COMMUNICATION IN AD-HOC NETWORKS USING GEOGRAPHIC LOCATION INFORMATION Loukas Lazos, Radha Poovendran Network Security and Cryptography Laboratory University by NSF grant ANI-0093187 and ARO grant DAAD-190210242 ABSTRACT The problem of securing multicast
Exploiting Overhearing: Flow-Aware Routing for Improved Lifetime in Ad Hoc Networks
Mans, Bernard
neighboring flows and adapt their local routing dynamically. By combining this awareness with battery- aware flow and neighborhood is then presented in Section II-D. By combining the flow awareness with batteryExploiting Overhearing: Flow-Aware Routing for Improved Lifetime in Ad Hoc Networks Nirisha
Shoubridge, Eric
1 By-Law on ad hoc Consultation with MAUT [Approved April 16, 2015 Council Meeting] Preamble MAUT-Law concerns ad hoc requests for consultation with MAUT. It does not concern participation of MAUT governed by the MAUT Constitution and/or University Regulations. Principles and process An ad hoc
IEEE ICC 2014 -Ad-hoc and Sensor Networking Symposium 978-1-4799-2003-7/14/$31.00 2014 IEEE 305
Bahk, Saewoong
IEEE ICC 2014 - Ad-hoc and Sensor Networking Symposium 978-1-4799-2003-7/14/$31.00 ©2014 IEEE 305 Ds Data packet of sequence number s A L Acknowledgement Channel sensing Forwarding data packet IEEE ICC 2014 - Ad-hoc and Sensor Networking Symposium 306 #12;IEEE ICC 2014 - Ad-hoc and Sensor Networking
PNNI routing support for ad hoc mobile networking: A flat architecture
Martinez, L.; Sholander, P.; Tolendino, L.
1997-12-01
This contribution extends the Outside Nodal Hierarchy List (ONHL) procedures described in ATM Form Contribution 97-0766. These extensions allow multiple mobile networks to form either an ad hoc network or an extension of a fixed PNNI infrastructure. This contribution covers the simplest case where the top-most Logical Group Nodes (LGNs), in those mobile networks, all reside at the same level in a PNNI hierarchy. Future contributions will cover the general case where those top-most LGNs reside at different hierarchy levels. This contribution considers a flat ad hoc network architecture--in the sense that each mobile network always participates in the PNNI hierarchy at the preconfigured level of its top-most LGN.
PNNI routing support for ad hoc mobile networking: The multilevel case
Martinez, L.; Sholander, P.; Tolendino, L.
1998-01-01
This contribution extends the Outside Nodal Hierarchy List (ONHL) procedures described in ATM Forum Contributions 97-0766 and 97-0933. These extensions allow multiple mobile networks to form either an ad hoc network or an extension of a fixed PNNI infrastructure. A previous contribution (97-1073) covered the simplest case where the top-most Logical Group Nodes (LGNs), in those mobile networks, all resided at the same level in a PNNI hierarchy. This contribution covers the more general case wherein those top-most LGNs may reside at different PNNI hierarchy levels. Both of the SNL contributions consider flat ad hoc network architectures in the sense that each mobile network always participates in the PNNI hierarchy at the pre-configured level of its top-most LGN.
A Dirichlet reputation system in reliable routing of wireless ad hoc network
Yang, Dr. Li [University of Tennessee, Knoxville (UTK); Cui, Xiaohui [ORNL; Cemerlic, Alma [University of Tennessee, Knoxville (UTK)
2010-01-01
Ad hoc networks are very helpful in situations when no fixed network infrastructure is available, such as natural disasters and military conflicts. In such a network, all wireless nodes are equal peers simultaneously serving as both senders and routers for other nodes. Therefore, how to route packets through reliable paths becomes a fundamental problems when behaviors of certain nodes deviate from wireless ad hoc routing protocols. We proposed a novel Dirichlet reputation model based on Bayesian inference theory which evaluates reliability of each node in terms of packet delivery. Our system offers a way to predict and select a reliable path through combination of first-hand observation and second-hand reputation reports. We also proposed moving window mechanism which helps to adjust ours responsiveness of our system to changes of node behaviors. We integrated the Dirichlet reputation into routing protocol of wireless ad hoc networks. Our extensive simulation indicates that our proposed reputation system can improve good throughput of the network and reduce negative impacts caused by misbehaving nodes.
Channel Sharing of Competing Flows in Ad Hoc Networks Yu Wang J. J. Garcia-Luna-Aceves
California at Santa Cruz, University of
again. Due to its stability and long-term fairness, the binary exponential backoff (BEB) is favored proposed for ad hoc networks. The BEB scheme is very effective in col- lision resolution when nodes face
Channel Sharing of Competing Flows in Ad Hoc Networks Yu Wang J. J. GarciaLunaAceves
California at Santa Cruz, University of
again. Due to its stability and longÂterm fairness, the binary exponential backoff (BEB) is favored proposed for ad hoc networks. The BEB scheme is very effective in colÂ lision resolution when nodes face
Measurements from an 802.11b Mobile Ad Hoc Network Vincent Lenders, Jorg Wagner and Martin May
Lenders, Vincent
Measurements from an 802.11b Mobile Ad Hoc Network Vincent Lenders, J¨org Wagner and Martin May Computer Engineering and Networks Laboratory ETH Zurich 8092 Zurich, Switzerland {lenders, may
Ad-hoc Limited Scale-Free Models for Unstructured Peer-to-Peer Networks
Guclu, Hasan; Yuksel, Murat
2008-01-01
Several protocol efficiency metrics (e.g., scalability, search success rate, routing reachability and stability) depend on the capability of preserving structure even over the churn caused by the ad-hoc nodes joining or leaving the network. Preserving the structure becomes more prohibitive due to the distributed and potentially uncooperative nature of such networks, as in the peer-to-peer (P2P) networks. Thus, most practical solutions involve unstructured approaches while attempting to maintain the structure at various levels of protocol stack. The primary focus of this paper is to investigate construction and maintenance of scale-free topologies in a distributed manner without requiring global topology information at the time when nodes join or leave. We consider the uncooperative behavior of peers by limiting the number of neighbors to a pre-defined hard cutoff value (i.e., no peer is a major hub), and the ad-hoc behavior of peers by rewiring the neighbors of nodes leaving the network. We also investigate t...
Inspiration from genetics to promote recognition and protection within ad hoc sensor networks
Korsnes, Reinert
2009-01-01
This work illustrates potentials for recognition within {\\em ad hoc} sensor networks if their nodes possess individual inter-related biologically inspired genetic codes. The work takes ideas from natural immune systems protecting organisms from infection. Nodes in the present proposal have individual gene sets fitting into a self organised phylogenetic tree. Members of this population are genetically ''relatives''. Outsiders cannot easily copy or introduce a new node in the network without going through a process of conception between two nodes in the population. Related nodes can locally decide to check each other for their genetic relation without directly revealing their gene sets. A copy/clone of a gene sequence or a random gene set will appear as alien. Nodes go through a cycle of introduction (conception or ''birth'') with parents in the network and later exit from it (''death''). Hence the phylogenetic tree is dynamic or possesses a genetic drift. Typical lifetimes of gene sets and number of offspring ...
Transmission Capacity of Wireless Ad Hoc Networks with Energy Harvesting Nodes
Vaze, Rahul
2012-01-01
Transmission capacity of an ad hoc wireless network is analyzed when each node of the network harvests energy from nature, e.g. solar, wind, vibration etc. Transmission capacity is the maximum allowable density of nodes, satisfying a per transmitter-receiver rate, and an outage probability constraint. Energy arrivals at each node are assumed to follow a Bernoulli distribution, and each node stores energy using an energy buffer/battery. For ALOHA medium access protocol (MAP), optimal transmission probability that maximizes the transmission capacity is derived as a function of the energy arrival distribution. Game theoretic analysis is also presented for ALOHA MAP, where each transmitter tries to maximize its own throughput, and symmetric Nash equilibrium is derived. For CSMA MAP, back-off probability and outage probability are derived in terms of input energy distribution, thereby characterizing the transmission capacity.
Bergel, Itsik
2014 IEEE 28-th Convention of Electrical and Electronics Engineers in Israel The Ergodic Rate the scaling laws of the Ergodic Rate Density (ERD) in ALOHA Wireless Ad-hoc Networks (WANETs) that utilize bound and the accuracy of the estimated parameters. I. INTRODUCTION Wireless Ad-hoc Networks (WANETs
Paris-Sud XI, Université de
Abstract-- Wireless Sensor Network (WSN) is an emerging special type of ad-hoc wireless networks that differentiate it from other types of wireless networks. These differences raise new challenges to be overcome are wireless networks where nodes can communicate wirelessly with each other without the need for a fixed
228 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 7, NO. 2, APRIL 1999 Ad Hoc Mobility Management with
Haas, Zygmunt J.
the construction of UQS through the balanced incomplete block designs. The average cost, due to call loss is sometimes necessary to reduce the cost of mobility management. Index Terms--Ad hoc network, balanced on the average cost, we investigate the tradeoff between the system reliability and the cost of location updates
Wang, Yu
Int. J. Ad Hoc and Ubiquitous Computing, Vol. 4, No. 5, 2009 251 Multi-hop scatternet formation of Computer Science, Illinois Institute of Technology, Chicago, IL 60616, USA E-mail: xli@cs.iit.edu Abstract: This paper addresses the scatternet formation for large scale multi-hop Bluetooth networks. We first describe
Perkins, Dmitri
of fixed infrastructure. The primary motivation for such networks is increased flexibility and mobilityAbstract- Mobile Ad Hoc NETworks (MANETs) are an emerging class of network architectures that are characterized by their highly dynamic topology, limited resources (i. e., bandwidth and power), and lack
Ad-hoc Authorship Attribution Competition, part of ALLC/ACH 2004 CNG Method with Weighted Voting
Keselj, Vlado
Ad-hoc Authorship Attribution Competition, part of ALLC/ACH 2004 CNG Method with Weighted Voting Vlado Keselj and Nick Cercone ({vlado,nick}cs.dal.ca) CNG Method for Authorship Attribution. The Common N-Grams (CNG) classification method for authorship attribution (AATT) was described in [2
Ad-hoc Authorship Attribution Competition, part of ALLC/ACH 2004 CNG Method with Weighted Voting
Keselj, Vlado
Ad-hoc Authorship Attribution Competition, part of ALLC/ACH 2004 CNG Method with Weighted Voting Vlado Ke#20;selj and Nick Cercone (fvlado,nickg@cs.dal.ca) CNG Method for Authorship Attribution. The Common N-Grams (CNG) classi#12;cation method for authorship attribution (AATT) was described in [2
Sivakumar, Raghupathy
transmis- sion power depends on several network characteristics such as the number of stations, the network problem in ad-hoc wireless networks. The transmission power of the stations in a network determines the network topol- ogy, The transmission power of the stations in a network deter- mines the network topology
Energy and Bandwidth-Efficient Key Distribution in Wireless Ad-Hoc Networks: A Cross-Layer
Lazos, Loukas
messages, and (d) average update energy. For each metric, we formulate an optimization problem and show1 Energy and Bandwidth-Efficient Key Distribution in Wireless Ad-Hoc Networks: A Cross metrics: (a) member key storage, (b) group controller (GC) transmissions, (c) multicast group (MG) update
Energy and Bandwidth-Efficient Key Distribution in Wireless Ad-Hoc Networks: A Cross-Layer
Poovendran, Radha
) multicast group (MG) update messages, and (d) average update energy. For each metric, we formulate1 Energy and Bandwidth-Efficient Key Distribution in Wireless Ad-Hoc Networks: A Cross, and GC transmissions, while significantly reducing the energy and bandwidth consumption of the network
Bystroff, Chris
Energy-Efficient Location Service Protocols for Mobile Ad Hoc Networks Zijian Wang, Eyuphan Bulut the location of the destination node. Seldom they consider energy efficiency in their designs energy efficiency and improve the query success rate in comparison to the previously proposed algorithms
Design Considerations for an On-Demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network
Brown, Timothy X.
1 Design Considerations for an On-Demand Minimum Energy Routing Protocol for a Wireless Ad Hoc at Boulder Boulder, CO-80309 Abstract--A minimum energy routing protocol reduces the energy con- sumption of energy to get the packets to their destination. This paper identifies the necessary features of an on
AN ECONOMICS-BASED POWER-AWARE PROTOCOL FOR COMPUTATION DISTRIBUTION IN MOBILE AD-HOC NETWORKS
Shang, Li
AN ECONOMICS-BASED POWER-AWARE PROTOCOL FOR COMPUTATION DISTRIBUTION IN MOBILE AD-HOC NETWORKS Li, Princeton, NJ 08544, USA ABSTRACT In this paper, we present a new economics-based power- aware protocol, called the distributed economic subcontracting protocol (DESP), that dynamically distributes task
Int. J. Ad Hoc and Ubiquitous Computing, Vol. , No. , 2012 1 Worst-case Latency of Broadcast one year as a Research Fellow at Trinity College Dubin. He received his MSc degree in computer science and engi- neering in 2005 and his PhD in computer science in 2011 both from Link¨oping University. His Ph
Huang, Xinming
Int. J. Ad Hoc and Ubiquitous Computing, Vol. 1, No. 4, 2006 203 Copyright © 2006 Inderscience and Ubiquitous Computing, Vol. 1, No. 4, pp.203209. Biographical notes: Xin-Ming Huang is an Assistant Professor, embedded systems and reconfigurable computing. Jing Ma received BE and ME Degrees from North
Longcope, Dana
2015-01-01
Aspects of solar flare dynamics, such as chromospheric evaporation and flare light-curves, have long been studied using one-dimensional models of plasma dynamics inside a static flare loop, subjected to some energy input. While extremely successful at explaining the observed characteristics of flares, all such models so far have specified energy input ad hoc, rather than deriving it self-consistently. There is broad consensus that flares are powered by magnetic energy released through reconnection. Recent work has generalized Petschek's basic reconnection scenario, topological change followed by field line retraction and shock heating, to permit its inclusion into a one-dimensional flare loop model. Here we compare the gas dynamics driven by retraction and shocking to those from more conventional static loop models energized by ad hoc source terms. We find significant differences during the first minute, when retraction leads to larger kinetic energies and produces higher densities at the loop top, while ad h...
Characterizing the Interaction Between Routing and MAC Protocols in Ad-Hoc Networks
Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)
2002-01-01
We empirically study the effect of mobility on the performance of protocols designed for wireless ad-hoc networks. An important objective is to study the interaction of the Routing and MAC layer protocols under different mobility parameters. We use three basic mobility models: grid mobility model, random waypoint model, and exponential correlated random model. The performance of protocols is measured in terms of (i) latency, (ii) throughput, (iii) number of packets received, (iv) long term fairness and (v) number of control packets at the MAC and routing layer level. Three different commonly studied routing protocols are used: AODV, DSR and LAR1. Similarly three well known MAC protocols are used: MACA, 802.1 1 and CSMA. Our main contribution is simulation based experiments coupled with rigorous statistical analysis to characterize the interaction of MAC layer protocols with routing layer protocols in ad-hoc networks. From the results, we can conclude the following: e No single MAC or Routing protocol dominated the other protocols in their class. Probably more interestingly, no MAURouting protocol combination was better than other combinations over all scenarios and response variables. 0 In general, it is not meaningful to speak about a MAC or a routing protocol in isolation. Presence of interaction leads to trade-offs between the amount of control packets generated by each layer. The results raise the possibility of improving the performance of a particular MAC layer protocol by using a cleverly designed routing protocol or vice-versa. Thus in order to improve the performanceof a communication network, it is important to study the entire protocol stack as a single algorithmic construct; optimizing individual layers in the seven layer OS1 stack will not yield performance improvements beyond a point. A methodological contribution of this paper is the use of statistical methods such as analysis of variance (ANOVA), to characterize the interaction between the protocols, mobility patterns and speed. Such methods allow us to analyze complicated experiments with large input space in a systematic manner.
Sun, Yin; Li, Yunzhou; Zhou, Shidong; Xu, Xibin
2010-01-01
This paper studies a spectrum sharing scenario between an uplink cognitive relay network (CRN) and some nearby low power ad-hoc networks. In particular, the dynamic resource allocation of the CRN is analyzed, which aims to minimize the average interfering time with the ad-hoc networks subject to a minimal average uplink throughput constraint. A long term average rate formula is considered, which is achieved by a half-duplex decode-and-forward (DF) relay strategy with multi-channel transmissions. Both the source and relay are allowed to queue their data, by which they can adjust the transmission rates flexibly based on sensing and predicting the channel state and ad-hoc traffic. The dynamic resource allocation of the CRN is formulated as a non-convex stochastic optimization problem. By carefully analyzing the optimal transmission time scheduling, it is reduced to a stochastic convex optimization problem and solved by the dual optimization method. The signaling and computation processes are designed carefully t...
The Capacityand Energy Efficiency of Wireless Ad Hoc Networks with MultipacketReception
Garcia-Luna-Aceves, J.J.
2008-01-01
Meng, T. Bits-per-joule capacity of energy-limited wirelessThe Capacity and Energy Efficiency of Wireless Ad Hocl ( n ) Figure 5: Capacity and energy efficiency tradeoff
Garrison, J.C.; Chiao, R.Y.
2004-11-01
An ad hoc quantization scheme for the electromagnetic field in a weakly dispersive, transparent dielectric leads to the definition of canonical and kinetic forms for the momentum of the electromagnetic field in a dispersive medium. The canonical momentum is uniquely defined as the operator that generates spatial translations in a uniform medium, but the quantization scheme suggests two possible choices for the kinetic momentum operator, corresponding to the Abraham or the Minkowski momentum in classical electrodynamics. Another implication of this procedure is that a wave packet containing a single dressed photon travels at the group velocity through the medium. The physical significance of the canonical momentum has already been established by considerations of energy and momentum conservation in the atomic recoil due to spontaneous emission, the Cerenkov effect, the Doppler effect, and phase matching in nonlinear optical processes. In addition, the data of the Jones and Leslie radiation pressure experiment is consistent with the assignment of one ({Dirac_h}/2{pi})k unit of canonical momentum to each dressed photon. By contrast, experiments in which the dielectric is rigidly accelerated by unbalanced electromagnetic forces require the use of the Abraham momentum.
A Time-Slotted On-Demand Routing Protocol for Mobile Ad Hoc Unmanned Vehicle Systems
Hope Forsmann; Robert Hiromoto; John Svoboda
2007-04-01
The popularity of UAVs has increased dramatically because of their successful deployment in military operations, their ability to preserve human life, and the continual improvements in wireless communication that serves to increase their capabilities. We believe the usefulness of UAVs would be dramatically increased if formation flight were added to the list of capabilities. Currently, sustained formation flight with a cluster of UAVs has only been achieved with two nodes by the Multi-UAV Testbed at the Massachusetts Institute of Technology. (Park, 2004) Formation flight is a complex operation requiring the ability to adjust the flight patterns on the fly and correct for wind gusts, terrain, and differences in node equipment. All of which increases the amount of inner node communication. Since one of the problems with MANET communication is network congestion, we believe a first step towards formation flight can be made through improved inner node communication. We have investigated current communication routing protocols and developed an altered hybrid routing protocol in order to provide communication with less network congestion.
McGilvary, Gary Andrew
2014-11-27
Commercial and private cloud providers offer virtualized resources via a set of co-located and dedicated hosts that are exclusively reserved for the purpose of offering a cloud service. While both cloud models appeal to ...
Yu, Chansu
hoc communication, because nodes work both as host and as router, nodes can easily consume much energy consume more energy than others and deplete its energy early [5]. This can cause an unbalanced nodes easily consume more energy than others. Even if the route path is too stable to be changed
Capacity consideration of wireless ad hoc networks
Tan, Yusong
2008-01-01
in Electrical Engineering (Communication Theory and Systems)of Science Electrical Engineering (Communication Theory andPhilosophy Electrical Engineering (Communication Theory and
Communication Paradigms for Mobile Ad Hoc Networks
Collins, Justin Scott
2014-01-01
Mur06] Amy L. Murphy et al. “Lime: A Coordination Middlewareof mobile devices using the LIME II tuple-space framework. ”Bogdan Carbunar and et al. “Lime revisited. ” In Mobile
Adaptive protocols for mobile ad hoc networks
Holland, Gavin Douglas
2005-02-17
to take advantage of the presence of multirate links. We then investigate the performance of iv TCP, showing how communication outages caused by link failures and routing delays can be very detrimental to its performance. In response, we present a solution.... : : : : : : : : : : : : : : : : : : : : : : : : 62 15 Performance of RBAR when a simple heuristic is used by the sender to try and predict the best data rate for the conditions, in an e?ort to reduce the frequency of the necessity for reservation subheaders...
Clock synchronization for mobile ad hoc networks
Chandra, Rajan
2013-02-22
synchronization uses MANet specific communication primitives with Minimum Connected Dominating Set (MCDS) approximation algorithms. This involves using a subset of nodes in the network to broadcast clock information to neighboring nodes. Several MCDS approximation...
Multicast Routing in Ad-Hoc Networks
Garcia-Luna-Aceves, J.J.
2007-01-01
or IRs, which are wireless routers. However, it will beIR 100a-1001‘ is a wireless router with an IP address and anot be based on wireless links for router interconnection.
INDOOR POSITIONING AN AD-HOC POSITIONING SYSTEM Rainer Mautz
to enable continuous tracking of the location of devices in all environments. Highly accurate, reliable 3D computers, printers, or simple tags with wireless radio connections that are `intelligent' enough to be able
Throughput optimal routing in wireless Ad-hoc networks
Zhuang, Hairuo
2010-01-01
in Electrical Engineering (Communication Theory and Systems)Ph. D. in Electrical Engineering (Communication Theory andin Electrical Engineering (Communication Theory and Systems)
Power and spectrum efficient communications in wireless ad hoc networks
Qu, Qi
2008-01-01
in Electrical and Computer Engineering (Communication Theoryin Electrical Engineering (Communication Theory and Systems)in Electrical Engineering (Communication Theory and Systems)
Information Dissemination in Mobile Ad-Hoc Geosensor Networks
Duckham, Matt
, and Lars Kulik3 1 National Center for Geographic Information and Analysis University of Maine, Orono, ME-aware systems are founded on a centralized model of information systems, typified by the client-server model- dancy. 1 Introduction Increasing decentralization is a widespread feature of information system archi
Power Optimization in Fault-Tolerant Mobile Ad Hoc Networks
Grosu, Radu
devices that communicate over wireless links. Mobile devices are typically powered by batteries applications [3] [4] [5] [6] need sensor nodes to be mobile making such networks similar to MANETS. However, embedded devices and impracticality of recharging batteries. Thus, mobile sensor networks make
Energy Aware Implementation of an Ad Hoc Routing Protocol
Brown, Timothy X.
to the world of research. This thesis is a product of his never-ending knowledge, ingenious ideas, constant, and encouragement. I would like to thank my parents for inspiring me to pursue higher education. I would lik
Delay Optimal Event Detection on Ad Hoc Wireless Sensor Networks
Kumar, Anurag
, Bangalore, INDIA email: kprem@ece.iisc.ernet.in, prasanthi.m@gmail.com, anurag@ece.iisc.ernet.in We consider causal order. In this case, the decision statistic depends on the network delays as well, whereas in the networkoblivious case, the decision statistic does not depend on the network delays. This yields
Towards the Efficient Design of Vehicular Ad-Hoc Networks
Dulmage, Jared
2012-01-01
OFDM Outage . . . . . . . . . . .Outage probability vs.vs. SNR . . . . . . . . . . . . . . . . . . . . . . Outage
Wireless Networks wireless ad-hoc and mesh networks
Biagioni, Edoardo S.
instead of radio waves Wireless Sensor Networks the Internet of Things, IoT #12;wireless mesh networks radio on and receiving a packet requires the most but even leaving on the radio still uses energy keep the radio off as much as possible, limit the number of packets sent hard to know when to turn on the radio
Lifeline: Emergency Ad hoc Network Se-Hang Cheong1
Si, Yain Whar "Lawrence"
propagation techniques. Lifeline also has the ability to recover from partial crash of network and nodes lost be disrupted during natural disasters, such as earthquakes, hurricane, tsunami, etc. In such situations, mobile from partial crash of network and nodes lost. In this paper, we show how commonly available mobile
Stable Energy-Aware Topology Management in Ad Hoc Networks
Garcia-Luna-Aceves, J.J.
2010-01-01
Different types of nodes consume energy at different rates.less interference and consume less energy. Significant worksnodes can consume large amounts of energy by main- taining
Power and spectrum efficient communications in wireless ad hoc networks
Qu, Qi
2008-01-01
A. Bahai, “Energy-efficiency of MIMO and cooperative MIMOMIMO-based cooperative communication for energy-constrainedcooperation, cooperative MIMO can achieve better energy and
Multiple-antenna systems in ad-hoc wireless networks
Govindasamy, Siddhartan, 1975-
2008-01-01
The increasing demand for wireless communication services has resulted in crowding of the electromagnetic spectrum. The "spectral-commons" model, where a portion of the electromagnetic spectrum is public and used on an ...
Topic Based Language Models for ad hoc Information Retrieval
Azzopardi, Leif
University of Paisley Paisley UK E-mail: leif.azzopardi@paisley.ac.uk Mark Girolami Computing Science
Throughput Analysis of Wireless Ad-Hoc Cognitive Radio Networks
Banaei, Armin
2014-04-25
In this dissertation we consider the throughput performance of cognitive radio networks and derive the optimal sensing and access schemes for secondary users that maximizes their sum-throughput while guaranteeing certain ...
SBA: A Simple Backoff Algorithm for Wireless Ad Hoc Networks
GuĂ©rin-Lassous, Isabelle
approaches modify the BEB (Binary Exponential Backoff) al- gorithm of IEEE 802.11 to provide better. Contrary to the BEB algorithm, SBA has only two distinct contention window sizes. SBA also uses the same
A Benchmarking System for Mobile Ad Hoc Network Routing Protocols
Hiranandani, Daniel
2012-01-01
Smart EnergyMap . . . . . . . . . . . . . . . . . . Smart Energy GridSelected for Smart Energy Grid Scenario . . . . . . . . .
A Secure Routing Protocol for Ad Hoc Wireless Networks
Klappenecker, Andreas
't need to pass through firewalls or gateways Routing protocol controls the network but is based DSR uses source routes in data packets Can lead to DoS #12;Attacks using modification Tunneling Two
1 Antenna Beamforming and Power Control for Ad Hoc Networks
Ramanathan, Ram
parameters transmit power, and antenna beam direction and present state-of-the-art methods control includes reduced interference and lower energy consumption. Beamforming and lower powers are also and power control appears to have potential, a number of questions need to be answered: What techniques
A Power Control MAC Protocol for Ad Hoc Networks
Han, Richard Y.
. Copyright 2002 ACM 1-58113-486-X/02/0009 ...Ż 5.00. DĄBUiFhVGB@BGIBxDĄ|§twVGS§I8HhŁvw9ŁPĄ7SXIwAsDĄBSe27I
Adaptive Scheduling in Ad Hoc and Cellular Wireless Networks
Tan, Choo Chin
2013-01-01
classes: regular nodes (RNs) and backbone capable nodes (that consists solely of RNs. We note that for the specialits associated BCNs and RNs will form an access network (
Poster: -Graphs: Flexible Topology Control in Wireless Ad Hoc Networks
Williamson, Carey
(m) 0 100 200 300 400 500 600 700 0 100 200 300 400 500 600 700 YCoordinate(m) X Coordinate (m) (c) G consumption. 0 100 200 300 400 500 600 700 0 100 200 300 400 500 600 700 YCoordinate(m) X Coordinate (m) 0 100 200 300 400 500 600 700 0 100 200 300 400 500 600 700 YCoordinate(m) X Coordinate (m) (a) Gm (Initial
Scalable Phrase Mining for Ad-hoc Text Analytics
Waldmann, Uwe
, customer mail and reports, or Web 2.0 con- tributions offer a great potential for enhancing business, and Web 2.0 community data. This enables advanced Business-Intelligence (BI) ap- plications, or by focusing on a particular time period. We investigate alterna- tive definitions of phrase interestingness
Unified Routing Scheme for Ad-Hoc Internetworking
Garcia-Luna-Aceves, J.J.
2007-01-01
life of tetherless wireless routers. By contrast, an on-IR is essentially a wireless IP router; with the exceptionswireless environment. In contrast to the IP Internet, mobility of hosts and routers,
Maximizing the throughput of large ad hoc wireless networks
Hua, Y; Huang, Y; Garcia-Luna-Aceves, J J
2006-01-01
network consists of wireless routers that are highly coop-point for every m wireless routers in a 2-D This capacitylinks are used for wireless routers). tion rates of a small
Topology management protocols in ad hoc wireless sensor networks
Kim, Hogil
2009-05-15
and destination. The multiple paths discovered are maintained in a memory, i.e., route cache, and can be used either as a backup route for a broken path or to balance network tra c. However, the decision procedure to nd an optimal path to balance network tra c... in this work. From the set S of all sensor nodes, All sensor nodes 1st-layer 2nd-layer Kth -layer Fig. 1. K-Layer Coverage we select only a small number of nodes to form 1-coverage and repeat this process K times to form K-coverage. A set Si, which is ith...
Asymptotically Optimal Geometric Mobile Ad-Hoc Routing Fabian Kuhn
-geometric algorithm that also matches the lower bound, but needs some mem- ory at each node. This establishes
Bid Activation Multiple Access in Ad Hoc Networks
Garcia-Luna-Aceves, J.J.
2006-01-01
12]. Each node bids on a varying number of data slots in acorrect schedule bid for slots. A Data B Fig. 2. E C Data Ddata, A and C will request activation. Hence, B will bid and
Resource Management in Multi-hop Ad Hoc Networks
, they do not provide a way to control the consumption of resources in the network, such as the battery power or the carrying capacity of the nodes. This proposal describes a scheme of path-state and flow : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 5 5.2 Balancing Battery Life
Technical Note Post hoc Bayesian model selection
Penny, Will
Technical Note Post hoc Bayesian model selection Karl Friston , Will Penny The Wellcome Trust and Raftery, 1995; Penny et al., 2004). We will try to illustrate this perspective with a few toy examples
Marolf, Donald
2009-01-01
Boundary observables and AdS/CFT . . . . .Unitiarity and AdS/CFT . . . . . . . . . . . . Thecharges in asymptotically AdS-spacetimes. Class. Quant.
Stability of AdS black strings
T. Delsate
2008-08-14
We review the recent developements in the stability problem and phase diagram for asymptotically locally $AdS$ black strings. First, we quickly review the case of locally flat black string before turning to the case of locally $AdS$ spacetimes.
AdS$_3$ and AdS$_2$ Magnetic Brane Solutions
Ahmed Almuhairi
2010-11-04
We investigate AdS$_3$ and AdS$_2$ magnetic brane solutions within the consistent truncation of AdS$_5 \\times S^5$ supergravity. The AdS$_3$ solution extends earlier work by allowing a general embedding of the magnetic $U(1)$ in $SO(6)$. We determine the ratio of strong- and weak-coupling entropies as a function of this embedding. Further, by considering crossed magnetic fields in different $U(1)$'s we are able to construct a solution that runs from AdS$_5$ in the UV to AdS$_2 \\times R^3$ in the IR. We find the notable result that there is a zero temperature entropy at strong coupling but not at weak coupling. We also show that the AdS$_2$ solution and at least some of the AdS$_3$ solutions are stable within the truncation.
Comment on the new AdS universe
Ozgur Sarioglu; Bayram Tekin
2008-11-25
We show that Bonnor's new Anti-de Sitter (AdS) universe and its D-dimensional generalization is the previously studied AdS soliton.
Analytical Study of Backoff Algorithms for MAC Protocol in Mobile Ad Hoc Networks
Manaseer, S.
Manaseer,S. Ould-Khaoua,M. Mackenzie,L. 22nd Uk Performance Engineering Workshop, Bournemouth University pp 89-94
Improvement of Robustness for Ad Hoc Networks Through Energy-Aware Routing
Engineering 2 InterOperability Laboratory 3 Department of Computer Science University of New Hampshire, Durham,2 , Radim Bartos3 , Michael J. Carter1 , and Sai S. Mupparapu1,2 1 Department of Computer and Electrical
Cross-layer Networking for Peer Databases over Wireless Ad-Hoc Communities
Papapetrou, Evaggelos
Over the last years, the scientific community has wit- nessed a significant rise of data-centric of the communicating nodes. Since data-centric communication depends on the application layer, the key for providing mostly in wired [1] but also in wireless networks [3]. According to this approach, data-centric
Cross-layer Routing for Peer Database Querying over Mobile Ad Hoc Networks
Papapetrou, Evaggelos
community has witnessed a significant rise of data-centric net- working applications over the last years. Furthermore, the advent of mobile devices has created an increased interest for data-centric applications. On the other hand, although significant work has been performed on data-centric applications over MANETs
On physical carrier sensing for random wireless ad-hoc networks
Wong, Chiu Ngok Eric
2008-01-01
in Electrical Engineering (Communication Theory and Systems)Field: Electrical Engineering (Communication Theory andin Electrical Engineering (Communication Theory and Systems)
Cross-layer design of wideband CDMA systems and cooperative diversity for wireless ad hoc networks :
Annavajjala, Ramesh
2006-01-01
in Electrical Engineering (Communication Theory and Systems)Ph. D. , Electrical Engineering (Communication Theory andin Electrical Engineering (Communication Theory and Systems)
RaWMS -Random Walk based Lightweight Membership Service for Wireless Ad Hoc Networks
Cortes, Corinna
consumption associated with sending and receiving many messages could quickly drain the batteries of mobile-YOSSEF Department of Electrical Engineering, Technion - Israel Institute of Technology and Google Haifa Engineering, Technion - Israel Institute of Technology, Haifa 32000, Israel {roy,gabik}@cs.technion.ac.il This paper
Energy-Efficient Transaction Management for Mobile Ad-hoc Network Databases
Gruenwald, Le
mobile node to support services and applications [6]. Also the battery technology is not developed as rapidly as the mobile devices and wireless technologies, so that the limited battery lifetime is always system. In this system, both clients and servers are mobile, wireless and battery
An Energy-efficient Concurrency Control Algorithm for Mobile Ad-hoc Network Databases
Gruenwald, Le
and applications [5]. Also battery technology is not developed as rapidly as mobile devices and wireless and battery- powered nodes, and every node can roam freely. A mobile database system built on a MANET is called a MANET database system. In this system, both clients and servers are mobile, wireless and battery
PowerSaving Protocols for IEEE 802.11Based MultiHop Ad Hoc Networks
Tseng, Yu-Chee
devices supported by battery powers is power saving. Without power, any mobile device will become useless. Battery power is a limited resource, and it is expected that battery technology is not likely to progress as fast as computing and com munication technologies do. Hence, how to lengthen the lifetime of batteries
Cross-Layer Design for Energy-Efficient Secure Multicast Communications in Ad Hoc Networks
Poovendran, Radha
number of mobile personal devices. Most of the sensors are battery- operated and hence, constrained and is the most dominant factor in battery depletion [1]. Many group applications already implemented in wired net significantly reducing due to advances in silicon technologies[1]. However, the power consumption due
Distributed Detection and Localization of Events in Large Ad Hoc Wireless Sensor Networks
Kumar, Anurag
are applicationspecific networks that com- prise a large number of tiny, energylimited, smart sensor devices by . This formulation is motivated by the change detection/isolation framework introduced by Nikiforov [6]. We extend decisions of ALL toggle rapidly. Motivated by this fact, we propose a distributed change detection
Rossi, Michele
and a set of unlicensed nodes. The primary network consists of a source, a destination and a set Department of Information Engineering, University of Padova, Italy CWCSPR, New Jersey Institute of Technology of additional primary nodes that can act as relays. In addition, the secondary nodes can be used as extra relays
Performance Improvements in Ad Hoc Networks Through Mobility Groups and Channel Diversity
Rossi, Michele
by using short-range, low-power, low- bandwidth devices (e.g., IEEE 802.15.4 (Zigbee) [5]) to create a city, each with a comput- ing device with both Zigbee and IEEE 802.11 interfaces. All of the people
Poster: Adaptive Topology Control for Wireless Ad-hoc Seung-Jong Park Raghupathy Sivakumar
Sivakumar, Raghupathy
that maximizes network performance. Recently, using effective topology control to optimize energy usage Sivakumar School of Electrical and Computer Engineering Georgia Institute of Technology Atlanta, GA 30332 linearly (given that the path loss ex- ponent typically ranges from 2 to 4). Hence, the overall energy con
PERFORMANCE ANALYSIS OF POWER-AWARE ROUTE SELECTION PROTOCOLS IN MOBILE AD HOC NETWORKS
California at Santa Cruz, University of
, a hybrid protocol like the CMMBCR (Conditional Max-Min Battery Capacity Routing) mechanism has been devised-Max Battery Cost Routing) scheme tries to consider the remaining battery power of nodes to prolong- gardless of the remaining battery power of nodes. Since the transmission network2002: submitted to World
Ad-Hoc Real-time Agent Networks Summer Research Institute
with voracious energy appetites Energy supplies often limited Enablers: Microelectronics Comm/Info Theory/tracking Distributed control of built environments and processes Structural health monitoring Public safety Disaster response Space Biomedical Environmental monitoring we have not yet been able to do #12;Wireless Sensor
On the Modeling of Entities for Ad-Hoc Entity Search in the Web of Data
-Verlag Berlin Heidelberg 2012 #12;134 R. Neumayer, K. Balog, and K. Nřrvĺg dbpedia:Audi_A4 dbpedia:Volkswagen
Chuah, Mooi-Choo "Mooi"
] uses a variant of Telsa [8] to provide source authentication for DSR. All the above approaches suggest
Impact of Asymmetric Traffic Densities on Delay Tolerant Vehicular Ad Hoc Networks
is considered as an enabler for driverless cars of the future [1]. Presently, there is a strong need to enable-neighbor communication, for safety appli- cations, and multihop communications for message propagation. Due to frequent vehicular communication for applications such as safety messaging, traffic and congestion monitoring
An Analytical Framework for Neighbor Discovery Strategies in Ad hoc Networks with Sectorized
Park, Joon-Sang
/reception directions. Neighbor discovery is a process of finding one-hop neighbors and is the first step towards. An analytical model for randomized neighbor discovery algorithms is presented in [9]; however, due to its inherent limitation the model can only be used to analyze randomized neighbor discovery algorithms and thus
High-Precision Ad-Hoc Indoor Positioning in Challenging Industrial Environments
Sreenan, Cormac J.
infrastructure. Several technologies are assessed with regard to these challenges and their shortcomings relatively quickly and easily. Sample environments include chemical plants and oil or gas rigs. These surveys will cause problems for positioning technologies that use radio propagation methods, line-of-sight methods
ACRR: Ad-hoc On-Demand Distance Vector Routing with Controlled Route Requests Jayesh Kataria*
Sanyal, Sugata
* Mumbai University, India, jayeshkataria@gmail.com P.S. Dhekne BARC, Mumbai, India, dhekne@barc.gov.in Sugata Sanyal TIFR, Mumbai, India, sanyal@tifr.res.in *Corresponding Author Abstract Reactive routing
Cross-layer design of wideband CDMA systems and cooperative diversity for wireless ad hoc networks :
Annavajjala, Ramesh
2006-01-01
High SNR Outage Analysis . . . . . . . . . . .Accuracy of High SNR Outage Probability Approximations . . .of High SNR Outage Probability Expressions . . . . .
A Study of Connectivity in MIMO Fading Ad-Hoc Networks
Yousefi'zadeh, Homayoun; Jafarkhani, Hamid; Kazemitabar, Javad
2009-01-01
Approximations to the Outage Capacity of MIMO channels? ,”of connectivity relying on the outage capacity of MIMOis de?ned based on an outage capacity analysis for such
Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks
Xu, Wenyuan
operations, military or police networks, and safety-critical business operations such as oil drilling channel. The main advantage of such networks is low cost of deployment and maintenance, since the nodes
Routing Mechanisms for Mobile Ad Hoc Networks based on the Energy Drain Rate
Obraczka, Katia
-points are not directly within their radio range. A critical issue for MANETs is that the activity of #12;nodes is power which nodes can be part of an active route. We describe new route selection mechanisms for MANET routing extends nodal battery life and the duration of paths, while CMDR also minimizes the total transmission
Routing Mechanisms for Mobile Ad Hoc Networks based on the Energy Drain Rate
Obraczka, Katia
points are not directly within their radio range. A critical issue for MANETs is that the activity of #12; nodes is power which nodes can be part of an active route. We describe new route selection mechanisms for MANET routing extends nodal battery life and the duration of paths, while CMDR also minimizes the total transmission
Leung, Kin K.
Engineering, Imperial College London Centre for Transport Studies, Imperial College London {wh.ho, kin
RTRD: Real-Time and Reliable Data Delivery in Ad Hoc Networks
Ravindran, Binoy
-time task. A real-time task executes on an individual node, with a given termination time tT erm. As shown and has some data which requires to be delivered to another node before tT erm. The time for real-time data delivery is the task's slack time ST, ST = tT erm - tF inish. Before task execution starts, ET
A Self-Organizing Heuristic for Building Optimal Heterogeneous Ad-Hoc Sensor Networks
Minai, Ali A.
with equal power, which means that they all have the same transmission radius. Such homoge- neous networks-making about transmission power. However, in sufficiently dense networks (or in networks with significant amount of work on heterogeneous networks, mainly due to their flexibility and better fit into potential
Phase Transition Behavior of Message Propagation in Delay Tolerant Vehicular Ad Hoc Networks
Little, Thomas
that is used to avoid contention in the system for shared resources and avoid accidents. By interconnecting part of networked information and control systems [1, 2]. Vehicle manufacturers seek to enhance connectivity. Creating safer transportation system is an important goal. One way of achieving safety
MULTIPATH HYBRID AD HOC NETWORKS FOR AVIONICS APPLICATIONS IN DISASTER AREA
Atiquzzaman, Mohammed
helicopters up in the sky and first responders on the ground. However, transmitting video and running high for rapidly establishing communication among the helicopters and first responders in a disaster area, among helicopters and ground responders to carry out necessary relief efforts. Our proposed network
A resilient synchronization algorithm for wireless ad hoc and sensor networks based on distributed
Spagnolini, Umberto
) to the establishment of period oscillations with the same frequency and, possibly, phase (e.g., for medium access with: (i) construction of a packet, (ii) queuing at the MAC layer, (iii) propagation and (iv a benign environment and cannot survive the presence of malfunctioning nodes in an emergency situation
A New Task-Based Approach for Supporting Distributed Applications on Mobile Ad Hoc Networks1
Little, Thomas
resources were found near the devices that needed those resources. Embedding of general TGs onto general case of TGs, namely trees. However, this optimal algorithm for tree TGs has a high time complexity
Simultaneous localization and tracking in wireless ad-hoc sensor networks
Taylor, Christopher J. (Christopher Jorgen)
2005-01-01
In this thesis we present LaSLAT, a sensor network algorithm that uses range measurements between sensors and a moving target to simultaneously localize the sensors, calibrate sensing hardware, and recover the target's ...
Automatic Hypermedia Generation for Ad-hoc Queries on Semi-structured Data
Houben, Geert-Jan
attributes or to show extra ones. The user also enters object selection criteria. We could use a language process. We address important aspects of the software that facilitates the genera- tion process. KEYWORDS for the desired information. Our target applications are collections or libraries of digital (semi
Maximizing the Number of Broadcast Operations in Random Geometric Ad-Hoc Wireless Networks
Calamoneri, Tiziana
of a node depends, in turn, on the energy power supplied to the node. In particular, the power Pv required by a node v to correctly transmit data to another station w must satisfy the inequality (see [24]): Pv dist, in some network models (like sensor networks), the adopted technology allows to have only few possible
Maximizing the Number of Broadcast Operations in Static Random Geometric Ad-Hoc Networks
Calamoneri, Tiziana
-Verlag Berlin Heidelberg 2007 #12;248 T. Calamoneri et al. supplied to the node. In particular, the power Pv]) Pv dist(v, w)2 (1) where dist(v, w) is the Euclidean distance between v and w while is a constant, in some network models (like sensor networks), the adopted technology allows to have only few possible
Minimum-energy broadcast in random-grid ad-hoc networks: approximation and distributed algorithms
Calamoneri, Tiziana
of a node de- pends, in turn, on the energy power supplied to the node. In particular, the power Pv required by a node v to cor- rectly transmit data to another station w must satisfy the inequality Pv dist(v, w)2: the adopted tech- nology allows nodes to have only few possible transmission range values. For this reason, we
A Failure Self-recovery Strategy with Balanced Energy Consumption for Wireless Ad Hoc Networks
Qiu, Tie; Xia, Feng; Wu, Guowei; Zhou, Yu
2012-01-01
In energy constrained wireless sensor networks, it is significant to make full use of the limited energy and maximize the network lifetime even when facing some unexpected situation. In this paper, all sensor nodes are grouped into clusters, and for each cluster, it has a mobile cluster head to manage the whole cluster. We consider an emergent situation that one of the mobile cluster heads is broken down, and hence the whole cluster is consequently out of work. An efficient approach is proposed for recovering the failure cluster by selecting multiple static sensor nodes as the cluster heads to collect packets and transmit them to the sink node. Improved simulated annealing algorithm is utilized to achieve the uniform deployment of the cluster heads. The new cluster heads are dynamically changed in order to keep balanced energy consumption. Among the new cluster heads, packets are transmitted through multi-hop forwarding path which is cost-lowest path found by Dijkstra's algorithm. A balanced energy consumptio...
Neighbour -Aware, Collision Avoidance MAC Protocol (NCMac) for Mobile Ad Hoc Networks
. The IEEE 802.11 specifies the Binary Exponential Backoff (BEB) algorithm, where the duration of a backoff
Security of Future eEnabled Aircraft Ad hoc Networks Krishna Sampigethaya
Poovendran, Radha
with some open problems. I. Introduction Aviation is today faced with major challenges due effort called NextGen between the Federal Aviation Administration (FAA) and other federal agencies operation, maintenance and control. For example, the Global Positioning System (GPS) and Automated Dependent
Cross-layer design of wideband CDMA systems and cooperative diversity for wireless ad hoc networks :
Annavajjala, Ramesh
2006-01-01
protocol: Power allocation as a function of rate Rate=1/4optimal power allocation is plotted as a function of ? inour objective functions. Optimum Bandwidth Allocation If we
A MULTIMEDIA CONFERENCING ON A MOBILE AD-HOC NETWORK OVER VEHICLES
Jang, Ju-Wook
-dong, Hwaseong-si, Gyeonggi-do, Korea 445-706° Next Generation Vehicle Technology(NGV), Shinlim-dong, Kwanak
On Physical Carrier Sensing in Wireless Ad Hoc Xue Yang and Njtin Vaidya
Chen, Yuanzhu Peter
attenuation and shadowing by obstacles. Second, wireless stations communicate over the air and there is significant interference among stations that are spatially close to each other. Whether two wireless stations power used by the transmitter, etc. Additionally, the quality of the communication link depends
RealTime SpatioTemporal Query Processing in Mobile AdHoc Sensor Networks
that has multiple sensors (e.g., mo tion sensors, acoustic sensors, infrared light emitting diodes,
Real-Time Spatio-Temporal Query Processing in Mobile Ad-Hoc Sensor Networks
that has multiple sensors (e.g., mo- tion sensors, acoustic sensors, infrared light emitting diodes, and pa
Analyzing Connectivity-Based Multi-Hop Ad-hoc Positioning Regina Bischoff Roger Wattenhofer
scenarios where the nodes do not receive anchors directly (multi-hop) and where no phys- ical distance positioning system (GPS) has spawned a multi-billion dollar market for positioning with an enormous variety questions of cost and even accessi- bility dominate the design. To our knowledge, all previous positioning
Community-based Bus System as Routing Backbone for Vehicular Ad Hoc Networks
Chu, Xiaowen
information [2] and tourist points of interest [3]. The work in the second category is to deliver messages collection and information sharing [4]. The work in the third category is to disseminate messages, e, Yiu-Wing Leung, Xiaowen Chu and Beihong Jin State Key Laboratory of Computer Science, Institute
A General Design towards Secure Ad-hoc Collaboration Masayuki Nakae
Sandhu, Ravi
assgned to a collaboratve team (.e., a vrtual organzaton), our TUCON- based polcy scheme allows fne-graned
DYNAMMA: A DYNAmic Multi-channel Medium Access Framework for Wireless Ad HocNetworks
Garcia-Luna-Aceves, J.J.
2007-01-01
Estrin. An energy-efficient MAC protocol for wireless sensoradaptive energy- efficient MAC protocol for wireless sensorEnergy-efficient collision-free medium access control for wireless
Efficient Broadcast in Wireless Ad Hoc and Sensor Networks with a Realistic Physical Layer
Garcia-Luna-Aceves, J.J.
2008-01-01
T. H. Meng. Minimum energy mobile wireless networks. IEEE J.minimum-energy multicast tree construction in wireless adenergy-efficient broadcast and multicast trees in wireless
Applying Light Natural Language Processing to Ad-Hoc Cross Language Information Retrieval
Lioma, C.
Lioma,C. Macdonald,C. Plachouras,V. He,B. Ounis,I. In Accessing Multilingual Information Repositories: 6th Cross-Language Evaluation Forum, CLEF 2005, Vienna, Austria, Revised Selected Papers. Lecture Notes in Computer Science, Vol. 4022 LNCS, Springer
Proceedings of the AD HOC Workshop on Ceramics for Li/FeS{sub 2} batteries
Not Available
1993-12-31
Representatives from industry, the U.S. Advanced Battery Consortium (USABC), DOE, national laboratories, and other govt agencies met to develop recommendations and actions for accelerating the development of ceramic components critical to the successful introduction of the Li/FeS{sub 2} bipolar battery for electric vehicles. Most of the workshop is devoted to electrode materials, bipolar designs, separators, and bipolar plates. The bulk of this document is viewographs and is divided into: ceramics, USABC overview, SAFT`s Li/FeS{sub 2} USABC program, bipolar Li/FeS{sub 2} component development, design requirements for bipolar plates, separator design requirements, compatibility of ceramic insulators with lithium, characterization of MgO for use in separators, resistivity measurements of separators, sintered AlN separators for LiMS batteries, etc.
AUTONOMOUS UNDERSEA SYSTEMS NETWORK (AUSNET) PROTOCOLS TO SUPPORT AD-HOC AUV COMMUNICATIONS
(as opposed to network support) data transmissions. Next steps in this effort will focus on store to support a dynamically evolving topology of truly semi-autonomous networked robots. Emerging flexible low bandwidth, energy efficient architectures and protocols will enable more effective networked subsurface
Geodesic packet routing over self-organizing mobile ad-hoc
Julien, Christine
-011 Thayne R. Coffman Christine Julien Â© Copyright 2006 The University of Texas at Austin #12;IEEE SECON `07 Thayne R. Coffman and Christine Julien, Member, IEEE Abstract--The development of routing protocols of some basic simulations that measure its ability to perform efficient geodesic packet forwarding over
Ad Hoc & Sensor Wireless Networks, Vol. 3, pp. 5575 Reprints available directly from the publisher
Liang, Weifa
Photocopying permitted by license only c 2007 Old City Publishing, Inc. Published by license under the OCP Science imprint, a member of the Old City Publishing Group Energy-Efficient Aggregate Query Evaluation. In Final Form: February 28, 2006. Wireless sensor networks, consisting of sensors equipped with energy
Cluster-Based Failure Detection Service for Large-Scale Ad Hoc Wireless Network Applications
Sanders, William H.
Introduction Recent advances in MEMS (micro-electro-mechanical systems) and wireless networking technologies
Securing Network Services for Wireless Ad Hoc and Sensor Networks Loukas Lazos
Lazos, Loukas
RLoc that is well suited in resource-constrained environments such as Wireless Sensor Networks (WSN). Furthermore we on the quantification of the performance of WSN. We address the problem of coverage in stochastically deployed WSN and Geometric Probability we provide analytical formulas for heterogeneous WSN, where sensors do not have
Lazos, Loukas
Audits William Kozma Jr. University of Arizona Electrical and Computer Engineering Dept. Tucson, Arizona 85721 wkozma@ece.arizona.edu Loukas Lazos University of Arizona Electrical and Computer Engineering Dept performance (mali- ciousness). In this paper, we investigate the problem of uniquely iden- tifying the set
Ad-hoc wireless network coverage with networked robots that cannot localize
Correll, Nikolaus
We study a fully distributed, reactive algorithm for deployment and maintenance of a mobile communication backbone that provides an area around a network gateway with wireless network access for higher-level agents. Possible ...
Ad hoc wireless networks with femto-cell deployment: a study
Bharucha, Zubin Rustam
2010-01-01
Nowadays, with a worldwide market penetration of over 50% in the mobile telecommunications sector, there is also an unrelenting demand from the subscribers for ever increasing transmission rates and availability of ...
Master thesis Implementation of an ad-hoc routing module for
Router framework and the design of a wireless test bed based upon this implementation. The code. The router can be executed in user level or kernel level as well as in the network simulator ns. Performance analysis of the OLSR implementation in Click showed that the single threaded router environment of Click
EFFECT OF MOBILITY ON PERFORMANCE OF WIRELESS AD-HOC NETWORK PROTOCOLS.
Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, M. V. (Madhav V.); Marathe, A. (Achla)
2001-01-01
We empirically study the effect of mobility on the performance of protocols designed for wireless adhoc networks. An important ohjective is to study the interaction of the Routing and MAC layer protocols under different mobility parameters. We use three basic mobility models: grid mobility model, random waypoint model, and exponential correlated random model. The performance of protocols was measured in terms of (i) latency, (ii) throughput, (iii) number of packels received, (iv) long term fairness and (v) number of control packets at the MAC layer level. Three different commonly studied routing protocols were used: AODV, DSR and LAR1. Similarly three well known MAC protocols were used: MACA, 802.1 1 and CSMA. The inair1 conclusion of our study include the following: 1. 'I'he performance of the: network varies widely with varying mobility models, packet injection rates and speeds; and can ba in fact characterized as fair to poor depending on the specific situation. Nevertheless, in general, it appears that the combination of AODV and 802.1 I is far better than other combination of routing and MAC protocols. 2. MAC layer protocols interact with routing layer protocols. This concept which is formalized using statistics implies that in general it is not meaningful to speak about a MAC or a routing protocol in isolation. Such an interaction leads to trade-offs between the amount of control packets generated by each layer. More interestingly, the results wise the possibility of improving the performance of a particular MAC layer protocol by using a cleverly designed routing protocol or vice-versa. 3. Routing prolocols with distributed knowledge about routes are more suitable for networks with mobility. This is seen by comparing the performance of AODV with DSR or LAR scheme 1. In DSli and IAR scheme 1, information about a computed path is being stored in the route query control packct. 4. MAC layer protocols have varying performance with varying mobility models. It is not only speed that influences the performance but also node degree and connectivity of the dynamic network that affects the protocol performance. 'The main implication of OUI' work is that performance analysis of protocols at a given level in the protocol stack need to be studied not locally in isolation but as a part of the complete protocol stack. The results suggest that in order to improve the pcrlormance of a communication network, it will be important to study the entire protocol stack as a single algorithmic construct; optimizing individual layers in the 7 layer OS1 stilck will not yield performance improvements beyond a point. A methodological contribution of this paper is the use of statistical methods such as design of experinierits arzd aiialysis qf variance methods to characterize the interaction between the protocols, mobility patterns and speed. This allows us to mako much more informed conclusions about the performance of thc protocols than would have been possible by merely running these experiments and observing the data. These ideas are of independtmt interest and are applicable in other contexts wherein one experimentally analyzes algorithms.
Minimum-Energy Topology Control Algorithms in Ad Hoc Joseph Y. Halpern Li (Erran) Li
Halpern, Joseph Y.
for an extended period of time. In order to accomplish this without a renewable energy source, energy conservation, network lifetime can be increased by energy reduction in the hardware, the software (operating systems consumption. For example, CPU energy consumption can be reduced through dy- namic voltage scaling
Investigation of Media Access Control Protocols for Mobile Ad-hoc Networks
, the protocol guarantees bounded delay for emergency tra c. #12;4 1 EXECUTIVE SUMMARY This report contains.D. Final Report Submitted to: National Institute of Standards and Technology Gaithersburg, MD 20899-0001 Request no. Q-912364 Purchase request no. 892-9326 #12;2 Contents 1 EXECUTIVE SUMMARY 4 2 Introduction 6 3
A Unifying Perspective on The Capacity of Wireless Ad Hoc Networks
Garcia-Luna-Aceves, J.J.
2008-01-01
We introduce (n, m, k)-casting as a generalization of allWe define (n, m, k)-casting as a generalization of all formsIn the context of (n, m, k)-casting, n, m, and k denote the
Report of the Provost's Ad Hoc Committee on Faculty in Interdisciplinary Programs
Emshwiller, Eve
development (e.g., administrative staff, course buyouts for lead faculty). 2. Allocation of Credit to Academic
Best effort QoS support routing in mobile ad hoc networks
Luo, Heng
2012-06-25
In the past decades, mobile traffic generated by devices such as smartphones, iphones, laptops and mobile gateways has been growing rapidly. While traditional direct connection techniques evolve to provide better access ...
Mobility changes anonymity: new passive threats in mobile ad hoc networks
Hong, Xiaoyan; Kong, Jiejun; Gerla, Mario
2006-01-01
delay on most portable mobile devices. D. Anonymity study inmobile nodes and prepare the counterattacks. The needed eavesdropping devices,
Robust Position-Based Routing in Wireless Ad Hoc Networks with Unstable Transmission Ranges
Chaudhuri, Soma
Barri~re Departament de Matem&tica Aplicada i Telem&tica Univ. Polit~.cnicade Catalunya Barcelona, Spain
Design and analysis of distributed primitives for mobile ad hoc networks
Chen, Yu
2006-10-30
by the network, which poses a serious challenge for the design and analysis of reliable protocols. In this work, three different approaches are used to handle mobility. The first part of the dissertation employs the simple technique of ignoring the mobility...
Steimann, Friedrich
communication infrastructure is modified or exchanged, applications should not be developed 'from scratch.g., is not compatible with Standard Java, thus we cannot use programs across platforms without re-implementing major manufacturers: even if devices in principle are able to accommodate high-level com- munication platforms
MODULO AND GRID BASED CHANNEL SELECTION IN AD HOC Gareth Owen Mo Adda
Kent, University of
based. Antenna techniques attempt to reduce the interference or mitigate it by for example, directional, University of Portsmouth Buckingham Building, Lion Terrace, Portsmouth England, PO1 3HE {gareth.owen, mo.adda}@port.ac channels. We analyse many techniques requiring only information available locally and those that do
Social Welfare Based Routing in Ad hoc Networks Mingming Lu and Jie Wu
Wu, Jie
is to save energy. Existing energy-efficient routing protocols save energy by selecting the lowest energy cost route. However, energy saving is not equal to energy efficiency. Consider a large number, and hence most packets transmitted through this path are lost, it is energy waste rather than energy saving
The Limits of Theory: Pragmatic Challenges in Mobile Ad Hoc Systems
Lenders, Vincent
, Martin May ETH Zurich 8092 Zurich, Switzerland legendre,maym@tik.ee.ethz.ch Vincent Lenders Armasuisse 3000 Berne, Switzerland lenders@tik.ee.ethz.ch Gunnar Karlsson KTH, Royal Inst. of Technology 10044
Multi-path Routing Protocols in Wireless Mobile Ad Hoc Networks: A Quantitative
Lenders, Vincent
Parissidis, Vincent Lenders, Martin May, and Bernhard Plattner Swiss Federal Institute of Technology Communications Systems Group Gloriastrasse 35, 8092 Zurich, Switzerland {parissid, lenders, may, plattner
AdS spacetimes and isometric embeddings
Steven Willison
2013-02-07
An algebraic global isometric embedding of the nonrotating BTZ black hole is presented. The ambient spacetime is $\\mathbb{M}^{2,3}$, the 3+2 dimensional flat spacetime. We also present the analogous embedding for the Euclidean BTZ spacetime and by performing a kind of double analytic continuation construct a 1-parameter family of embeddings of cosmological AdS spacetime into $\\mathbb{M}^{2,3}$ which coincide asymptotically with the embedded BTZ manifold of the appropriate mass. Finally we note that the family of embeddings of cosmological AdS$_{n}$ into $\\mathbb{M}^{2,n}$ generalises to higher dimensions.
Systematics of Coupling Flows in AdS Backgrounds
Goldberger, Walter D.
2009-01-01
can be calculated using the AdS/CFT correspondence bySystematics of Coupling Flows in AdS Backgrounds Walter D.Systematics of Coupling Flows in AdS Backgrounds Walter D.
Instability corners in AdS space
Fotios V. Dimitrakopoulos; Ben Freivogel; Matthew Lippert; I-Sheng Yang
2014-10-07
We investigate whether arbitrarily small perturbations in global AdS space are generically unstable and collapse into black holes on the time scale set by gravitational interactions. We argue that current evidence, combined with our analysis, strongly suggests that a set of nonzero measure in the space of initial conditions does not collapse on this time scale. On the other hand, existing results do not provide an equally strong indication whether the unstable solutions also form a set of nonzero measure. We perform an analysis in position space to address this puzzle, and our formalism allows us to directly address the vanishing-amplitude limit. We show that gravitational self-interaction leads to tidal deformations which are equally likely to focus or defocus energy, and we sketch the phase diagram accordingly. We also clarify the connection between gravitational evolution in global AdS and holographic thermalization.
Refined Holographic Entanglement Entropy for the AdS Solitons and AdS black Holes
Masafumi Ishihara; Feng-Li Lin; Bo Ning
2013-04-04
We consider the refinement of the holographic entanglement entropy for the holographic dual theories to the AdS solitons and AdS black holes, including the corrected ones by the Gauss-Bonnet term. The refinement is obtained by extracting the UV-independent piece of the holographic entanglement entropy, the so-called renormalized entanglement entropy which is independent of the choices of UV cutoff. Our main results are (i) the renormalized entanglement entropies of the AdS$_{d+1}$ soliton for $d=4,5$ are neither monotonically decreasing along the RG flow nor positive definite, especially around the deconfinement/confinement phase transition; (ii) there is no topological entanglement entropy for AdS$_5$ soliton even with Gauss-Bonnet correction; (iii) for the AdS black holes, the renormalized entanglement entropy obeys an expected volume law at IR regime, and the transition between UV and IR regimes is a smooth crossover even with Gauss-Bonnet correction; (iv) based on AdS/MERA conjecture, we postulate that the IR fixed-point state for the non-extremal AdS soliton is a trivial product state.
SPI 2009 1 Introduction Software-intensive automation systems, like industrial manufacturing plants, need automation systems and thus becomes more complex. System requirements may change even late in the development process, lead to ad-hoc modifications of the product and require systematic (and automated) testing
Shaghoulian, Edgar
2015-01-01
We extend a recently derived higher-dimensional Cardy formula to include angular momenta, which we use to obtain the Bekensten-Hawking entropy of AdS black branes, compactified rotating branes, and large Schwarzschild/Kerr black holes. This is the natural generalization of Strominger's microscopic derivation of the BTZ black hole entropy to higher dimensions. We propose an extension to include $U(1)$ charge, which agrees with the Bekenstein-Hawking entropy of large Reissner-Nordstrom/Kerr-Newman black holes at high temperature. We extend the results to arbitrary hyperscaling violation exponent (this captures the case of black D$p$-branes as a subclass) and reproduce logarithmic corrections.
Semiclassical strings in AdS(3) X S^2
Bogeun Gwak; Bum-Hoon Lee; Kamal L. Panigrahi; Chanyong Park
2009-01-30
In this paper, we investigate the semiclassical strings in AdS(3)XS^2, in which the string configuration of AdS(3) is classified to three cases depending on the parameters. Each of these has a different anomalous dimension proportional to logS, S^(1/3) and S, where S is a angular momentum on AdS(3). Further we generalize the dispersion relations for various string configuration on AdS(3)XS^2.
Fermilab Today - Classified Ad Policy
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
Fermilab Classified Ad Policy Fermilab Today now requires that people placing classified ads must belong to one of these categories: a. active and retired employees of Fermi...
Logarithmic Operators in AdS_3/CFT_2
Alex Lewis
1999-11-30
We discuss the relation between singletons in AdS_3 and logarithmic operators in the CFT on the boundary. In 2 dimensions there can be more logarithmic operators apart from those which correspond to singletons in AdS, because logarithmic operators can occur when the dimensions of primary fields differ by an integer instead of being equal. These operators may be needed to account for the greybody factor for gauge bosons in the bulk.
Central Charge for 2D Gravity on AdS(2) and AdS(2)/CFT(1) Correspondence
Mohsen Alishahiha; Farhad Ardalan
2008-08-19
We study 2D Maxwell-dilaton gravity on AdS(2). We distinguish two distinctive cases depending on whether the AdS(2) solution can be lifted to an AdS(3) geometry. In both cases, in order to get a consistent boundary condition we need to work with a twisted energy momentum tensor which has non-zero central charge. With this central charge and the explicit form of the twisted Virasoro generators we compute the entropy of the system using the Cardy formula. The entropy is found to be the same as that obtained from gravity calculations for a specific value of the level of the U(1) current. The agreement is an indication of $AdS(2)/CFT(1) correspondence.
Adding Value to Agricultural Products
Anderson, David P.; Hanselka, Daniel
2009-06-01
You can significantly increase farm income by adding value to agricultural products and marketing those products effectively. This publication explains how to design a value-added product based on consumer preferences and how to build a business...
AdS Field Theory from Conformal Field Theory
A. Liam Fitzpatrick; Jared Kaplan
2012-08-01
We provide necessary and sufficient conditions for a Conformal Field Theory to have a description in terms of a perturbative Effective Field Theory in AdS. The first two conditions are well-known: the existence of a perturbative `1/N' expansion and an approximate Fock space of states generated by a finite number of low-dimension operators. We add a third condition, that the Mellin amplitudes of the CFT correlators must be well-approximated by functions that are bounded by a polynomial at infinity in Mellin space, or in other words, that the Mellin amplitudes have an effective theory-type expansion. We explain the relationship between our conditions and unitarity, and provide an analogy with scattering amplitudes that becomes exact in the flat space limit of AdS. The analysis also yields a simple connection between conformal blocks and AdS diagrams, providing a new calculational tool very much in the spirit of the S-Matrix program. We also begin to explore the potential pathologies associated with higher spin fields in AdS by generalizing Weinberg's soft theorems to AdS/CFT. The AdS analog of Weinberg's argument constrains the interactions of conserved currents in CFTs, but there are potential loopholes that are unavailable to theories of massless higher spin particles in flat spacetime.
Fully Power-Aware and Location-Aware Protocols for Wireless Multi-hop Ad Hoc Networks
Tseng, Yu-Chee
issue for MANET since most mobile hosts will be oper- ated by battery powers. In this paper, we address for almost all kinds of portable devices supported battery energy is power saving. Without power, any mobile to extend the lifetime of batteries is an important issue, especially for MANET, which consists of mobile
Cambridge, University of
and Jean Bacon University of Cambridge Computer Laboratory J J Thomson Avenue, Cambridge CB3 0FD, UK Email: {eiko.yoneki, jean.bacon}@cl.cam.ac.uk Abstract-- Event broker grids that deploy the pub- lish
Spectral-efficiency of multi-antenna links in ad-hoc wireless networks with limited Tx CSI
Govindasamy, Siddhartan
An asymptotic expression is derived for the mean spectral efficiency of multi-antenna links randomly distributed on a plane in a uniform manner where transmitters (Tx) have Channel-State-Information (CSI) of the channels ...
Atkinson, Robert C
@hainu.edu.cn *Corresponding author Robert Atkinson and James Irvine Department of Electronic and Electrical Engineering, University of Strathclyde, Scotland, G1 1XW, UK E-mail: r.atkinson@eee.strath.ac.uk E-mail: j technologies. Wencai Du is a Professor and the Dean of College of Information Science & Technology, Hainan
Panwar, Shivendra S.
@photon.poly.edu, jlee25@utopia.poly.edu. Abstract-- Recent research shows that animals can be guided remotely, The system architecture and operation is introduced, and major challenges and issues are discussed. Because to sensor networks using robots. In this paper, we will first introduce the system architecture and major
Garcia-Luna-Aceves, J.J.
2009-01-01
==D=P BHAA FG KDBT BTA BFB? C @D=D@A? = >DEB? =QJ? EB T? XA BTA @D=D@BFB? C "A? = >DEB? =JA0QJ? EB BHAA BT? B T? E @D=D@BFB? C ? HA? 0 #TA ? HA?
Quorum-Based Asynchronous Power-Saving Protocols for IEEE 802.11 Ad Hoc Jehn-Ruey Jiang1
Tseng, Yu-Chee
rescue operations, and outdoor activities. This work is co-sponsored by the MOE Program for Promoting Aca is a critical issue for portable devices supported by batteries. Battery power is a limited re- source prediction: Since a host entering the PS mode will reduce its radio activity, other hosts who intend to send
Boyer, Edmond
the redundancy, such as MPR (MultiPoint Relay) or DS-MPR (Connected Dominating Sets with MPR). These methods and existence of obstacles. This paper focuses on DS-MPR. Firstly, we test it in a realistic environment to show Sensor Networks; Broadcasting; Connected Dominating Sets; MultiPoint Relay; Lognormal model. 1
Zhao, Feng
into energy savings) and mitigate the risk of network node/link failures. The longevity of a network depends on the rate the power is consumed performing computation and communication tasks at these un- tethered, battery powered sensors. Therefore, one of the central issues for Collaborative Signal and Information
Jagannatham, Aditya K.
Department Institute of Technology and Management Institute of Technology and Management Sector-23 A, Gurgaon(MANET). On demand set up, fault tolerance and unconstrained connectivity are a couple of advantages that why mobile vehicle to vehicle (V2V) communication and vehicle to road side communication. This paper describes
Leung, Kin K.
. For instance, Festag et al. (Festag et al., 2004) describe the real-world field trials of a car-to-car communication platform with an IEEE 802.11 air interface, while Bucciol et al. (Bucciol et al., 2005) conducted
Pedram, Massoud
An Energy-Aware Simulation Model and Transaction Protocol for Dynamic Workload Distribution an undesirable occurrence. Uneven distribution of energy resources and computational workloads is especially for detailed evaluation of the performance of different energy management policies in a MANET. Next it presents
LA-DCF: A New Multiple Access Protocol for Ad-Hoc Wireless Richard Akester & Stephen Hailes
Haddadi, Hamed
during backoff, the host "freezes" the backoff timer. Once the carrier is sensed idle again, the backoff-to-end transport protocol, but this can take too long to detect the loss and take action, causing channel variations in delay affects the calculation of round trip times in transport protocols. Also, they are only
Steel, G.; Maidl, M.; Bundy, Alan
We describe Coral, a counterexample finder for incorrect inductive conjectures. By devising a first-order version of Paulson's formalism for cryptographic protocol analysis, we are able to use Coral to attack protocols ...
Large rotating AdS black holes from fluid mechanics
Sayantani Bhattacharyya; Subhaneil Lahiri; R. Loganayagam; Shiraz Minwalla
2008-07-25
We use the AdS/CFT correspondence to argue that large rotating black holes in global AdS(D) spaces are dual to stationary solutions of the relativistic Navier-Stokes equations on S**(D-2). Reading off the equation of state of this fluid from the thermodynamics of non-rotating black holes, we proceed to construct the nonlinear spinning solutions of fluid mechanics that are dual to rotating black holes. In all known examples, the thermodynamics and the local stress tensor of our solutions are in precise agreement with the thermodynamics and boundary stress tensor of the spinning black holes. Our fluid dynamical description applies to large non-extremal black holes as well as a class of large non-supersymmetric extremal black holes, but is never valid for supersymmetric black holes. Our results yield predictions for the thermodynamics of all large black holes in all theories of gravity on AdS spaces, for example, string theory on AdS(5) x S**5 and M theory on AdS(4) x S**7 and AdS(7) x S**4.
Misra, Satyajayant
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. 1 Secure and Robust Localization the problem of accurate localization of static or mobile nodes in a wireless ad hoc network, using
Udphuay, Suwimon
2010-01-14
Pointe du Hoc overlooking the English Channel in Normandy, France was host to one of the most important military engagements of World War II. While the site is a valuable historic cultural resource, it is vulnerable to ...
Ultraviolet asymptotics for quasiperiodic AdS_4 perturbations
Ben Craps; Oleg Evnin; Puttarak Jai-akson; Joris Vanhoof
2015-10-29
Spherically symmetric perturbations in AdS-scalar field systems of small amplitude epsilon approximately periodic on time scales of order 1/epsilon^2 (in the sense that no significant transfer of energy between the AdS normal modes occurs) have played an important role in considerations of AdS stability. They are seen as anchors of stability islands where collapse of small perturbations to black holes does not occur. (This collapse, if it happens, typically develops on time scales of the order 1/epsilon^2.) We construct an analytic treatment of the frequency spectra of such quasiperiodic perturbations, paying special attention to the large frequency asymptotics. For the case of a self-interacting phi^4 scalar field in a non-dynamical AdS background, we arrive at a fairly complete analytic picture involving quasiperiodic spectra with an exponential suppression modulated by a power law at large mode numbers. For the case of dynamical gravity, the structure of the large frequency asymptotics is more complicated. We give analytic explanations for the general qualitative features of quasiperiodic solutions localized around a single mode, in close parallel to our discussion of the probe scalar field, and find numerical evidence for logarithmic modulations in the gravitational quasiperiodic spectra existing on top of the formulas previously reported in the literature.
Ultraviolet asymptotics for quasiperiodic AdS_4 perturbations
Ben Craps; Oleg Evnin; Puttarak Jai-akson; Joris Vanhoof
2015-09-04
Spherically symmetric perturbations in AdS-scalar field systems of small amplitude epsilon approximately periodic on time scales of order 1/epsilon^2 (in the sense that no significant transfer of energy between the AdS normal modes occurs) have played an important role in considerations of AdS stability. They are seen as anchors of stability islands where collapse of small perturbations to black holes does not occur. (This collapse, if it happens, typically develops on time scales of the order 1/epsilon^2.) We construct an analytic treatment of the frequency spectra of such quasiperiodic perturbations, paying special attention to the large frequency asymptotics. For the case of a self-interacting phi^4 scalar field in a non-dynamical AdS background, we arrive at a fairly complete analytic picture involving quasiperiodic spectra with an exponential suppression modulated by a power law at large mode numbers. For the case of dynamical gravity, the structure of the large frequency asymptotics is more complicated. We give analytic explanations for the general qualitative features of quasiperiodic solutions localized around a single mode, in close parallel to our discussion of the probe scalar field, and find numerical evidence for logarithmic modulations in the gravitational quasiperiodic spectra existing on top of the formulas previously reported in the literature.
Ultraviolet asymptotics for quasiperiodic AdS_4 perturbations
Craps, Ben; Jai-akson, Puttarak; Vanhoof, Joris
2015-01-01
Spherically symmetric perturbations in AdS-scalar field systems of small amplitude epsilon approximately periodic on time scales of order 1/epsilon^2 (in the sense that no significant transfer of energy between the AdS normal modes occurs) have played an important role in considerations of AdS stability. They are seen as anchors of stability islands where collapse of small perturbations to black holes does not occur. (This collapse, if it happens, typically develops on time scales of the order 1/epsilon^2.) We construct an analytic treatment of the frequency spectra of such quasiperiodic perturbations, paying special attention to the large frequency asymptotics. For the case of a self-interacting phi^4 scalar field in a non-dynamical AdS background, we arrive at a fairly complete analytic picture involving quasiperiodic spectra with an exponential suppression modulated by a power law at large mode numbers. For the case of dynamical gravity, the structure of the large frequency asymptotics is more complicated....
A paucity of bulk entangling surfaces: AdS wormholes with de Sitter interiors
Fischetti, S; Marolf, D; Wall, AC
2015-01-01
Inside the horizon with AdS / CFT, Phys.Rev. D67 (2003)entanglement entropy from AdS/CFT, Phys.Rev.Lett. 96 (2006)dual to Reissner-Nordstrm AdS 5 , JHEP 1404 (2014) 023, [
Perturbative entanglement thermodynamics for AdS spacetime: Renormalization
Mishra, Rohit
2015-01-01
We study the effect of charged excitations in the AdS spacetime on the first law of entanglement thermodynamics. It is found that `boosted' AdS black holes give rise to a more general form of first law which includes chemical potential and charge density. To obtain this result we have to resort to a second order perturbative calculation of entanglement entropy for small size subsystems. At first order the form of entanglement law remains unchanged even in the presence of charged excitations. But the thermodynamic quantities have to be appropriately `renormalized' at the second order due to the corrections. We work in the perturbative regime where $T_{thermal}\\ll T_E$.
Perturbative entanglement thermodynamics for AdS spacetime: Renormalization
Rohit Mishra; Harvendra Singh
2015-07-14
We study the effect of charged excitations in the AdS spacetime on the first law of entanglement thermodynamics. It is found that `boosted' AdS black holes give rise to a more general form of first law which includes chemical potential and charge density. To obtain this result we have to resort to a second order perturbative calculation of entanglement entropy for small size subsystems. At first order the form of entanglement law remains unchanged even in the presence of charged excitations. But the thermodynamic quantities have to be appropriately `renormalized' at the second order due to the corrections. We work in the perturbative regime where $T_{thermal}\\ll T_E$.
Emergent quantum criticality, Fermi surfaces, and AdS2
Thomas Faulkner; Hong Liu; John McGreevy; David Vegh
2011-10-30
Gravity solutions dual to d-dimensional field theories at finite charge density have a near-horizon region which is AdS_2 x R^{d-1}. The scale invariance of the AdS_2 region implies that at low energies the dual field theory exhibits emergent quantum critical behavior controlled by a (0+1)-dimensional CFT. This interpretation sheds light on recently-discovered holographic descriptions of Fermi surfaces, allowing an analytic understanding of their low-energy excitations. For example, the scaling behavior near the Fermi surfaces is determined by conformal dimensions in the emergent IR CFT. In particular, when the operator is marginal in the IR CFT, the corresponding spectral function is precisely of the "Marginal Fermi Liquid" form, postulated to describe the optimally doped cuprates.
Spiky Strings on AdS(4) X CP**3
Bum-Hoon Lee; Kamal L. Panigrahi; Chanyong Park
2008-11-07
We study a giant magnon and a spike solution for the string rotating on AdS(4) X CP**3 geometry. We consider rigid rotating fundamental string in the SU(2) X SU(2) sector inside the CP**3 and find out the general form of all the conserved charges. We find out the dispersion relation corresponding to both the known giant magnon and the new spike solutions. We further study the finite size correction in both cases.
Fermilab Today | Classifieds Ad Form
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
will be posted on the Internet and can lead to responses from outside the lab. Some ads posted in Fermilab Today in the past have received responses from scammers who, for...
Thermal Fluctuations in a Charged AdS Black Hole
Pourhassan, B
2015-01-01
In this paper, we will analyze the effects of thermal fluctuations on a charged AdS black hole. This will be done by analyzing the corrections to black hole thermodynamics due to these thermal fluctuations. We will demonstrate that the entropy of this black hole get corrected by logarithmic term. We will also calculate other corrections to other important thermodynamic quantities for this black hole. Finally, we will use the corrected value of the specific heat to analyze the phase transition in this system.
Thermal Fluctuations in a Charged AdS Black Hole
B. Pourhassan; Mir Faizal
2015-08-12
In this paper, we will analyze the effects of thermal fluctuations on a charged AdS black hole. This will be done by analyzing the corrections to black hole thermodynamics due to these thermal fluctuations. We will demonstrate that the entropy of this black hole get corrected by logarithmic term. We will also calculate other corrections to other important thermodynamic quantities for this black hole. Finally, we will use the corrected value of the specific heat to analyze the phase transition in this system.
Tunneling during Quantum Collapse in AdS Spacetime
Cenalo Vaz; Kinjalk Lochan
2013-01-30
We extend previous results on the reflection and transmission of self-gravitating dust shells across the apparent horizon during quantum dust collapse to non-marginally-bound dust collapse in arbitrary dimensions with a negative cosmological constant. We show that the Hawking temperature is independent of the energy function and that the wave functional describing the collapse is well behaved at the Hawking-Page transition point. Thermal radiation from the apparent horizon appears as a generic result of non-marginal collapse in AdS space-time owing to the singular structure of the Hamiltonian constraint at the apparent horizon.
Entanglement Entropy and Duality in AdS(4)
Ioannis Bakas; Georgios Pastras
2015-04-30
Small variations of the entanglement entropy \\delta S and the expectation value of the modular Hamiltonian \\delta E are computed holographically for circular entangling curves in the boundary of AdS(4), using gravitational perturbations with general boundary conditions in spherical coordinates. Agreement with the first law of thermodynamics, \\delta S = \\delta E, requires that the line element of the entangling curve remains constant. In this context, we also find a manifestation of electric-magnetic duality for the entanglement entropy and the corresponding modular Hamiltonian, following from the holographic energy-momentum/Cotton tensor duality.
Topics in 3D N=2 AdS supergravity in superspace
Gabriele Tartaglino-Mazzucchelli
2012-02-01
We review some recent results on the construction in superspace of 3D N=2 AdS supergravities and on the formulation of rigid supersymmetric theories in (1,1) and (2,0) AdS superspaces.
A. Liam Fitzpatrick; Jared Kaplan
2011-04-13
We show that suitably regulated multi-trace primary states in large N CFTs behave like `in' and `out' scattering states in the flat-space limit of AdS. Their transition matrix elements approach the exact scattering amplitudes for the bulk theory, providing a natural CFT definition of the flat space S-Matrix. We study corrections resulting from the AdS curvature and particle propagation far from the center of AdS, and show that AdS simply provides an IR regulator that disappears in the flat space limit.
Strings on AdS Wormholes and Nonsingular Black Holes
H. Lu; Justin F. Vazquez-Poritz; Zhibai Zhang
2014-10-22
Certain AdS black holes in the STU model can be conformally scaled to wormhole and black hole solutions of an f(R) type theory which have two asymptotically AdS regions and are completely free of curvature singularities. While there is a delta-function source for the dilaton, classical string probes are not sensitive to this singularity. If the AdS/CFT correspondence can be applied in this context, then the wormhole background describes a phase in which two copies of a conformal field theory interact with each other, whereas the nonsingular black hole describes entangled states. By studying the behavior of open strings on these backgrounds, we extract a number of features of the quarks and anti-quarks that live in the field theories. In the interacting phase, we find that there is a maximum speed with which the quarks can move without losing energy, beyond which energy is transferred from a quark in one field theory to a quark in the other. We also compute the rate at which moving quarks within entangled states lose energy to the two surrounding plasmas. While a quark-antiquark pair within a single field theory exhibits Coulomb interaction for small separation, a quark in one field theory exhibits spring-like confinement with an anti-quark in the other field theory. For the entangled states, we study how the quark-antiquark screening length depends on temperature and chemical potential. In the interacting phase of the two field theories, a quadruplet made up of one quark-antiquark pair in each field theory can undergo transitions involving how the quarks and antiquarks are paired in terms of the screening.
AdHeat: An Influence-based Diffusion Model for Propagating Hints to Match Ads
Cortes, Corinna
AdHeat: An Influence-based Diffusion Model for Propagating Hints to Match Ads Hongji Bao Google edchang@google.com ABSTRACT In this paper, we present AdHeat, a social ad model con- sidering user influence in addition to relevance for match- ing ads. Traditionally, ad placement employs the relevance
Thermodynamics of Charged Lovelock - AdS Black Holes
Prasobh C. B.; Jishnu Suresh; V. C. Kuriakose
2015-10-16
We investigate the thermodynamic behavior of maximally symmetric charged, asymptotically AdS black hole solutions of Lovelock gravity. We explore the thermodynamic stability of such solutions by the ordinary method of calculating the specific heat of the black holes and investigating its divergences which signal second order phase transitions between black hole states. We then utilize the methods of thermodynamic geometry of black hole spacetimes in order to explain the origin of these points of divergence. We calculate the curvature scalar corresponding to a Legendre-invariant thermodynamic metric of these spacetimes and find that the divergences in the black hole specific heat correspond to singularities in the thermodynamic phase space. We also calculate the area spectrum for large black holes in the model by applying the Bohr-Sommerfeld quantization to the adiabatic invariant calculated for the spacetime.
AdS Bubbles, E$p$-branes and Entanglement
Harvendra Singh
2014-10-15
The AdS-bubble solutions interestingly mimic Schr\\"odinger-like geometries when expressed in light-cone coordinates. These D$p$ bubble vacuas exhibit asymmetric scaling property with a negative dynamical exponent of time $a0$ in type II* super-strings. We obtain an expression for the entanglement entropy for `bubble E3-branes'. It is argued that the entropy from E3-bubbles has to be the lowest.
Islands of stability and recurrence times in AdS
Stephen R. Green; Antoine Maillard; Luis Lehner; Steven L. Liebling
2015-07-29
We study the stability of anti-de Sitter (AdS) spacetime to spherically symmetric perturbations of a real scalar field in general relativity. Further, we work within the context of the "two time framework" (TTF) approximation, which describes the leading nonlinear effects for small amplitude perturbations, and is therefore suitable for studying the weakly turbulent instability of AdS---including both collapsing and non-collapsing solutions. We have previously identified a class of quasi-periodic (QP) solutions to the TTF equations, and in this work we analyze their stability. We show that there exist several families of QP solutions that are stable to linear order, and we argue that these solutions represent islands of stability in TTF. We extract the eigenmodes of small oscillations about QP solutions, and we use them to predict approximate recurrence times for generic non-collapsing initial data in the full (non-TTF) system. Alternatively, when sufficient energy is driven to high-frequency modes, as occurs for initial data far from a QP solution, the TTF description breaks down as an approximation to the full system. Depending on the higher order dynamics of the full system, this often signals an imminent collapse to a black hole.
Islands of stability and recurrence times in AdS
Stephen R. Green; Antoine Maillard; Luis Lehner; Steven L. Liebling
2015-08-27
We study the stability of anti-de Sitter (AdS) spacetime to spherically symmetric perturbations of a real scalar field in general relativity. Further, we work within the context of the "two time framework" (TTF) approximation, which describes the leading nonlinear effects for small amplitude perturbations, and is therefore suitable for studying the weakly turbulent instability of AdS---including both collapsing and non-collapsing solutions. We have previously identified a class of quasi-periodic (QP) solutions to the TTF equations, and in this work we analyze their stability. We show that there exist several families of QP solutions that are stable to linear order, and we argue that these solutions represent islands of stability in TTF. We extract the eigenmodes of small oscillations about QP solutions, and we use them to predict approximate recurrence times for generic non-collapsing initial data in the full (non-TTF) system. Alternatively, when sufficient energy is driven to high-frequency modes, as occurs for initial data far from a QP solution, the TTF description breaks down as an approximation to the full system. Depending on the higher order dynamics of the full system, this often signals an imminent collapse to a black hole.
Islands of stability and recurrence times in AdS
Green, Stephen R; Lehner, Luis; Liebling, Steven L
2015-01-01
We study the stability of anti-de Sitter (AdS) spacetime to spherically symmetric perturbations of a real scalar field in general relativity. Further, we work within the context of the "two time framework" (TTF) approximation, which describes the leading nonlinear effects for small amplitude perturbations, and is therefore suitable for studying the weakly turbulent instability of AdS---including both collapsing and non-collapsing solutions. We have previously identified a class of quasi-periodic (QP) solutions to the TTF equations, and in this work we analyze their stability. We show that there exist several families of QP solutions that are stable to linear order, and we argue that these solutions represent islands of stability in TTF. We extract the eigenmodes of small oscillations about QP solutions, and we use them to predict approximate recurrence times for generic non-collapsing initial data in the full (non-TTF) system. Alternatively, when sufficient energy is driven to high-frequency modes, as occurs ...
The AdS Graviton/Pomeron Description of Deep Inelastic Scattering at Small x
Richard C. Brower; Marko Djuric; Ina Sarcevic; Chung-I Tan
2011-06-28
In the holographic or AdS/CFT dual to QCD, the Pomeron is identified with a Reggeized Graviton in $AdS_5$. We emphasize the importance of confinement, which in this context corresponds to a deformation of $AdS_5$ geometry in the IR. The holographic Pomeron provides a very good fit to the combined data from HERA for Deep Inelastic Scattering at small $x$, lending new confidence to this AdS dual approach to high energy diffractive scattering.
Entropy of near-extremal black holes in AdS5
Balasubramanian, Vijay
2008-01-01
is a family of asymptotically AdS 5 ×S 5 black holes chargedCvetic et al. , “Embedding AdS black holes in ten and elevenA toy model for the AdS/CFT correspondence,” JHEP 0407,
Determining an asymptotically AdS Einstein spacetime from data on its conformal boundary
Enciso, Alberto
Determining an asymptotically AdS Einstein spacetime from data on its conformal boundary Alberto of the AdS/CFT correspondence in string theory is the holographic prescription problem for Einstein metrics and to discuss its physical implications. PACS numbers: 04.20.Ex, 04.20.Ha, 11.25.Tq Keywords: AdS metrics
Spectral Flow in AdS(3)/CFT(2)
Gaston Giribet; Ari Pakman; Leonardo Rastelli
2007-12-19
We study the spectral flowed sectors of the H3 WZW model in the context of the holographic duality between type IIB string theory in AdS(3)x S^3 x T^4 with NSNS flux and the symmetric product orbifold of T^4. We construct explicitly the physical vertex operators in the flowed sectors that belong to short representations of the superalgebra, thus completing the bulk-to-boundary dictionary for 1/2 BPS states. We perform a partial calculation of the string three-point functions of these operators. A complete calculation would require the three-point couplings of non-extremal flowed operators in the H3 WZW model, which are at present unavailable. In the unflowed sector, perfect agreement has recently been found between the bulk and boundary three-point functions of 1/2 BPS operators. Assuming that this agreement persists in the flowed sectors, we determine certain unknown three-point couplings in the H3 WZW model in terms of three-point couplings of affine descendants in the SU(2) WZW model.
Ad Building demolition, recycling completed
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room News Publications Traditional Knowledge KiosksAbout AwardedAcronyms This is aHomeAd Building
Light-cone AdS/CFT-adapted approach to AdS fields/currents, shadows, and conformal fields
R. R. Metsaev
2015-07-23
Light-cone gauge formulation of fields in AdS space and conformal field theory in flat space adapted for the study of AdS/CFT correspondence is developed. Arbitrary spin mixed-symmetry fields in AdS space and arbitrary spin mixed-symmetry currents, shadows, and conformal fields in flat space are considered on an equal footing. For the massless and massive fields in AdS and the conformal fields in flat space, simple light-cone gauge actions leading to decoupled equations of motion are found. For the currents and shadows, simple expressions for all 2-point functions are also found. We demonstrate that representation of conformal algebra generators on space of currents, shadows, and conformal fields can be built in terms of spin operators entering the light-cone gauge formulation of AdS fields. This considerably simplifies the study of AdS/CFT correspondence. Light-cone gauge actions for totally symmetric arbitrary spin long conformal fields in flat space are presented. We apply our approach to the study of totally antisymmetric (one-column) and mixed-symmetry (two-column) fields in AdS space and currents, shadows, and conformal fields in flat space.
U(1) Instantons on AdS_4 and the Uplift to Exact Supergravity Solutions
Ali Imaanpur
2011-11-23
We consider self-duality equation of U(1) gauge fields on Euclidean AdS_4 space, and find a simple finite action solution. With a suitable ansatz, we are able to embed this solution into the 10d supergravity background of AdS_4\\times CP^3. Further, we show that the solution can be uplifted to an exact solution in 11d supergravity background of AdS_4\\times SE_7.
Dynamical sectors for a spinning particle in AdS3 Carles Batlle1
Batlle, Carles
Dynamical sectors for a spinning particle in AdS3 Carles Batlle1 , Joaquim Gomis2 , Kiyoshi the dynamics of a particle of mass M and spin J in AdS3. The study reveals the presence of different dynamical sectors depending on the relative values of M, J and the AdS3 radius R. For the subcritical M2 R2 -J2 > 0
AdS solutions to the 2D type 0A effective action David Mattoon Thompson*
Romps, David M.
AdS solutions to the 2D type 0A effective action David Mattoon Thompson* Jefferson Physical November 2004) We present a two-parameter family of AdS solutions to the two-dimensional type 0A effective action. DOI: 10.1103/PhysRevD.70.106001 PACS numbers: 11.25.Mj I. INTRODUCTION AdS backgrounds of string
Production Requirements Full-Page Ads
Buehrer, R. Michael
Production Requirements Full-Page Ads · The final trim size for a full-page ad is 8.75" x 10.875". · Full-page ads should also include .125-inch bleed on all four sides, making the total image area 9" x if over-trimming occurs in the printing process. 1/2-Page and 1/3-Page Ads · The final trim size for a 1
Ads-Portal Domains: Identification and Measurements
Yang, Xiaowei
4 Ads-Portal Domains: Identification and Measurements MISHARI ALMISHARI University of California, Irvine and XIAOWEI YANG Duke University An ads-portal domain refers to a Web domain that shows only develop a machine-learning- based classifier to identify ads-portal domains, which has 96% accuracy. We
Online Effects of Offline Ads Diane Lambert
Cortes, Corinna
Online Effects of Offline Ads Diane Lambert Google, Inc. 76 Ninth Ave New York, NY 10011 dlambert a methodology for assessing how ad campaigns in offline media such as print, audio and TV affect online in ad appeared suggests heightened interest in the advertised product, as long as there would have been
Longitudinal Analysis of Android Ad Library Permissions
Wallach, Dan
Longitudinal Analysis of Android Ad Library Permissions Theodore Book, Adam Pridgen, Dan S. Wallach in the behavior of Android ad libraries. Taking a sample of 114,000 apps, we extract and classify their ad particular risks to user privacy and security. I. INTRODUCTION The Android operating system is one
The different phases of hairy black holes in AdS5 space
Gaston Giribet; Andres Goya; Julio Oliva
2014-12-31
We investigate the thermodynamics of hairy black holes in asymptotically Anti-de Sitter (AdS) space, including backreaction. Resorting to the Euclidean path integral approach, we show that matter conformally coupled to Einstein gravity in five dimensions may exhibit a phase transition whose endpoint turns out to be a hairy black hole in AdS5 space. The scalar field configuration happens to be regular everywhere outside and on the horizon, and behaves asymptotically in such a way that respects the AdS boundary conditions that are relevant for AdS/CFT. The theory presents other peculiar features in the ultraviolet, like the existence of black holes with arbitrarily low temperature in AdS5. This provides a simple setup in which the fully backreacting problem of a hair forming in AdS at certain critical temperature can be solved analytically.
The different phases of hairy black holes in AdS5 space
Giribet, Gaston; Oliva, Julio
2015-01-01
We investigate the thermodynamics of hairy black holes in asymptotically Anti-de Sitter (AdS) space, including backreaction. Resorting to the Euclidean path integral approach, we show that matter conformally coupled to Einstein gravity in five dimensions may exhibit a phase transition whose endpoint turns out to be a hairy black hole in AdS5 space. The scalar field configuration happens to be regular everywhere outside and on the horizon, and behaves asymptotically in such a way that respects the AdS boundary conditions that are relevant for AdS/CFT. The theory presents other peculiar features in the ultraviolet, like the existence of black holes with arbitrarily low temperature in AdS5. This provides a simple setup in which the fully backreacting problem of a hair forming in AdS at certain critical temperature can be solved analytically.
Strings on AdS2 and the high-energy limit of noncritical M-theory
Horava, Petr
2008-01-01
B. Clark, and A. Karch, The CFT/AdS correspondence, massiveCoordinate-free action for AdS(3) higher-spin-matterKlebanov and A. M. Polyakov, AdS dual of the critical O(N)
The Incremental Reach and Cost Efficiency of Online Video Ads over TV Ads
Cortes, Corinna
The Incremental Reach and Cost Efficiency of Online Video Ads over TV Ads Yuxue Jin, Sheethal number of brand marketers are including video ads in their advertising campaigns. These advertisers would like to know the incremental reach and cost efficiency of their video and display ads compared
Boundary conditions for conformally coupled scalar in AdS$_4$
Jae-Hyuk Oh
2015-02-05
We consider conformally coupled scalar with $\\phi^4$ coupling in AdS$_4$ and study its various boundary conditions on AdS boundary. We have obtained perturbative solutions of equation of motion of the conformally coupled scalar with power expansion order by order in $\\phi^4$ coupling $\\lambda$ up to $\\lambda^2$ order. In its dual CFT, we get 2,4 and 6 point functions by using this solution with Dirichlet and Neumann boundary conditions via AdS/CFT dictionary. We also consider marginal deformation on AdS boundary and get its on-shell and boundary effective actions.
LWR (Light Water Reactor) power plant simulations using the AD10 and AD100 systems
Wulff, W.; Cheng, H.S.; Chien, C.J.; Jang, J.Y.; Lin, H.C.; Mallen, A.N.; Wang, S.J. (Brookhaven National Lab., Upton, NY (USA); Institute of Nuclear Energy Research, Lung-Tan (Taiwan); Tawian Power Co., Taipei (Taiwan); Brookhaven National Lab., Upton, NY (USA); Institute of Nuclear Energy Research, Lung-Tan (Taiwan))
1989-01-01
Boiling (BWR) and Pressurized (PWR) Water Reactor Power Plants are being simulated at BNL with the AD10 and AD100 Peripheral Processor Systems. The AD10 system has been used for BWR simulations since 1984 for safety analyses, emergency training and optimization studies. BWR simulation capabilities have been implemented recently on the AD100 system and PWR simulation capabilities are currently being developed under the auspices of international cooperation. Modeling and simulation methods are presented with emphasis on the simulation of the Nuclear Steam Supply System. Results are presented for BWR simulation and performance characteristics are compared of the AD10 and AD100 systems. It will be shown that the AD100 simulates two times faster than two AD10 processors operating in parallel and that the computing capacity of one AD100 (with FMU processor) is twice as large as that of two AD10 processors. 9 refs., 5 figs., 1 tab.
Non-Relativistic AdS Branes and Newton-Hooke Superalgebra
Makoto Sakaguchi; Kentaroh Yoshida
2006-05-12
We examine a non-relativistic limit of D-branes in AdS_5xS^5 and M-branes in AdS_{4/7}xS^{7/4}. First, Newton-Hooke superalgebras for the AdS branes are derived from AdSxS superalgebras as Inonu-Wigner contractions. It is shown that the directions along which the AdS-brane worldvolume extends are restricted by requiring that the isometry on the AdS-brane worldvolume and the Lorentz symmetry in the transverse space naturally extend to the super-isometry. We also derive Newton-Hooke superalgebras for pp-wave branes and show that the directions along which a brane worldvolume extends are restricted. Then the Wess-Zumino terms of the AdS branes are derived by using the Chevalley-Eilenberg cohomology on the super-AdSxS algebra, and the non-relativistic limit of the AdS-brane actions is considered. We show that the consistent limit is possible for the following branes: Dp (even,even) for p=1 mod 4 and Dp (odd,odd) for p=3 mod 4 in AdS_5xS^5, and M2 (0,3), M2 (2,1), M5 (1,5) and M5 (3,3) in AdS_{4}xS^{7} and S^{4}xAdS_{7}. We furthermore present non-relativistic actions for the AdS branes.
Topics in network communications
Cannons, Jillian Leigh
2008-01-01
Int. Workshop on Evaluation of Wireless Ad Hoc, Sensor andon Performance Evaluation of Wireless Ad Hoc, Sensor and
Three-dimensional N=2 (AdS) supergravity and associated supercurrents
Sergei M. Kuzenko; Gabriele Tartaglino-Mazzucchelli
2012-09-28
Long ago, Achucarro and Townsend discovered that in three dimensions (3D) N-extended anti-de Sitter (AdS) supergravity exists in several incarnations, which were called the (p,q) AdS supergravity theories with non-negative integers p>=q such that N=p+q. Using the superspace approach to 3D N-extended supergravity developed in arXiv:1101.4013, we present three superfield formulations for N=2 supergravity that allow for well defined cosmological terms and supersymmetric AdS solutions. The conformal compensators corresponding to these theories are respectively: (i) a chiral scalar multiplet: (ii) a vector multiplet; and (iii) an improved complex linear multiplet. The theories corresponding to (i) and (iii) are shown to provide two dually equivalent realizations of the (1,1) AdS supergravity, while (ii) describes the (2,0) AdS supergravity. We associate with each supergravity formulation, with and without a cosmological term, a consistent supercurrent multiplet. The supercurrents in the (1,1) and (2,0) AdS backgrounds are derived for the first time. We elaborate on rigid supersymmetric theories in (1,1) and (2,0) AdS superspaces.
Supersymmetric Asymptotic AdS and Lifshitz Solutions in Einstein-Weyl and Conformal Supergravities
H. Lu; Zhao-Long Wang
2012-05-22
We show that there exist supersymmetric Lifshitz vacua in off-shell Einstein-Weyl supergravity, in addition to the BPS AdS_4 vacuum. The Lifshitz exponents are determined by the product of the cosmological constant and the coupling of the Weyl-squared term. We then obtain the equations of the supersymmetric solutions that are asymptotic to the AdS or Lifshitz vacua. We obtain many examples of exact solutions as well as numerical ones. We find examples of extremal AdS black branes whose near-horizon geometry is AdS_2\\times T^2. We also find an extremal Lifshitz black hole with z=-2, whose horizon coincides with the curvature singularity. However the asymptotic Lifshitz solutions are in general smooth wormholes. In conformal supergravity, we find intriguing examples of non-extremal "BPS" AdS and Lifshitz black holes whose local Killing spinor is divergent on the horizon. We show that all the supersymmetric asymptotic AdS and Lifshitz solutions have the vanishing Noether charge associated with some scaling symmetry. We also study the integrability condition of the Killing spinor equation and the supersymmetric invariance of the action. Finally we show that the only spherically-symmetric BPS solution is the AdS vacuum.
University Policy No.: AD2530 Classification: Administration
Victoria, University of
University Policy No.: AD2530 Classification: Administration PHOTOCOPY AND FACSIMILE (FAX may be obtained through library managed machines or through the use of personal accounts. 1
Ad Lucem: Modeling Market Transformation Pathways Workshop
Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site
AD LUCEM ... TOWARD THE LIGHT 3 Fig. 2: Projected solar market diffusion (including photovoltaic and concentrated solar power). Moore's law, the experience curve framework,...
University Policy No.: AD2210 Classification: Administration
Victoria, University of
University Policy No.: AD2210 Classification: Administration FIELDWORK AND INTERNATIONAL: includes all University of Victoria administrators, faculty, staff, and students while such individuals
University Policy No.: AD2215 Classification: Administration
Victoria, University of
University Policy No.: AD2215 Classification: Administration Approving Authority: Board Review: 1. This statement applies to the policies and administration of trademarks registered
Rincon-Mora, Gabriel A.
fuel cells (FCs) excel. Although various control strategies for energy flow between batteries and FCs for the same wherein volume, energy, and power are optimized for peak-power and extended-lifetime performance and control energy flow between batteries and macro-scale FCs with constant, time-independent fuel flow, fuel
Ghosh, Kaushik; Das, and Pradip K; 10.5121/jgraphoc.2010.2204
2010-01-01
Energy consumption and delay incurred in packet delivery are the two important metrics for measuring the performance of geographic routing protocols for Wireless Adhoc and Sensor Networks (WASN). A protocol capable of ensuring both lesser energy consumption and experiencing lesser delay in packet delivery is thus suitable for networks which are delay sensitive and energy hungry at the same time. Thus a smart packet forwarding technique addressing both the issues is thus the one looked for by any geographic routing protocol. In the present paper we have proposed a Fermat point based forwarding technique which reduces the delay experienced during packet delivery as well as the energy consumed for transmission and reception of data packets.
Belding-Royer, Elizabeth M.
techniques and modified network protocols aimed at providing adequate quality of service in this difficult quality voice communication in MANETs. In this paper, we focus on speech coding techniques and some wireless bandwidth, low-power mobile terminals, high error rates, and the broad- cast nature of wireless
Zhao, Feng
battery power, frequent node attrition, and variable data and communication quality. To scale up, California 94304, U.S.A. Abstract This paper describes two novel techniques, information-driven sensor that the information-driven querying and routing techniques are more energy efficient, have lower detection latency
Hefeeda, Mohammed
, burn the infrastructure, and may result in high human death toll near urban areas. Common causes in the Okanagan Mountain Park in the Province of British Columbia, Canada. The fire was spread by the strong wind]. Preventing a small fraction of these fires would account to sig
Joshua Erlich
2008-12-29
AdS/QCD is an extra-dimensional approach to modeling the light hadronic resonances in QCD. AdS/QCD models are generally successful at reproducing low-energy observables with around 10-20% accuracy, depending on the details of the model. We discuss the motivation for these models, their intrinsic limitations, and some recent results.
Martin Schvellinger
2008-06-03
We briefly review one of the current applications of the AdS/CFT correspondence known as AdS/QCD and discuss about the calculation of four-point quark-flavour current correlation functions and their applications to the calculation of observables related to neutral kaon decays and neutral kaon mixing processes.
Tristan McLoughlin; Ian Swanson
2006-06-26
A class of marginal deformations of four-dimensional N=4 super Yang-Mills theory has been found to correspond to a set of smooth, multiparameter deformations of the S^5 target subspace in the holographic dual on AdS_5 x S^5. We present here an analogous set of deformations that act on global toroidal isometries in the AdS_5 subspace. Remarkably, certain sectors of the string theory remain classically integrable in this larger class of so-called gamma-deformed AdS_5 x S^5 backgrounds. Relying on studies of deformed su(2)_gamma models, we formulate a local sl(2)_gamma Lax representation that admits a classical, thermodynamic Bethe equation (based on the Riemann-Hilbert interpretation of Bethe's ansatz) encoding the spectrum in the deformed AdS_5 geometry. This result is extended to a set of discretized, asymptotic Bethe equations for the twisted string theory. Near-pp-wave energy spectra within sl(2)_gamma and su(2)_gamma sectors provide a useful and stringent test of such equations, demonstrating the reliability of this technology in a wider class of string backgrounds. In addition, we study a twisted Hubbard model that yields certain predictions of the dual beta-deformed gauge theory.
Duality invariance of $s \\ge 3/2$ fermions in AdS
S. Deser; D. Seminara
2014-09-11
We show that in D=4 AdS, $s\\ge 3/2$ partially massless (PM) fermions retain the duality invariances of their flat space massless counterparts. They have tuned ratios $ {m^2}/{M^2}\
Boundary conditions, effective action, and Virasoro algebra for AdS?
Porfyriadis, Achilleas P
2010-01-01
We construct an effective action of General Relativity for small excitations from asymptotic transformations and use it to study conformal symmetry in the boundary of AdS3. By requiring finiteness of the boundary effective ...
Operator Product Expansion for Pure Spinor Superstring on AdS(5)*S(5)
Valentina Giangreco M. Puletti
2006-07-16
The tree-level operator product expansion coefficients of the matter currents are calculated in the pure spinor formalism for type IIB superstring in the AdS(5)*S(5) background.
Near Flat Space limit of strings on AdS_4 x CP^3
M. Kreuzer; R. C. Rashkov; M. Schimpf
2008-11-03
The non-linear nature of string theory on non-trivial backgrounds related to the AdS/CFT correspondence suggests to look for simplifications. Two such simplifications proved to be useful in studying string theory. These are the pp-wave limit which describes point-like strings and the so called "near flat space" limit which connects two different sectors of string theory -- pp-waves and "giant magnons". Recently another example of AdS/CFT duality emerged - $AdS_4/CFT_3$, which suggests duality between $\\mathcal N=6$ CS theory and superstring theory on $AdS_4\\times \\cp$. In this paper we study the "near flat space" limit of strings on the $AdS_4\\times \\cp$ background and discuss possible applications of the reduced theory.
Ishii, Takaaki
2015-01-01
We study nonlinear dynamics of the flux tube between an external quark-antiquark pair in $\\mathcal{N}=4$ super Yang-Mills theory using the AdS/CFT duality. In the gravity side, the flux tube is realized by a fundamental string whose endpoints are attached to the AdS boundary. We perturb the endpoints in various ways and numerically compute the time evolution of the nonlinearly oscillating string. As a result, cusps can form on the string, accompanied by weak turbulence and power law behavior in the energy spectrum. When cusps traveling on the string reach the boundary, we observe the divergence of the force between the quark and antiquark. Minimal amplitude of the perturbation below which cusps do not form is also investigated. No cusp formation is found when the string moves in all four AdS space directions, and in this case an inverse energy cascade follows a direct cascade.
Takaaki Ishii; Keiju Murata
2015-06-25
We study nonlinear dynamics of the flux tube between an external quark-antiquark pair in $\\mathcal{N}=4$ super Yang-Mills theory using the AdS/CFT duality. In the gravity side, the flux tube is realized by a fundamental string whose endpoints are attached to the AdS boundary. We perturb the endpoints in various ways and numerically compute the time evolution of the nonlinearly oscillating string. As a result, cusps can form on the string, accompanied by weak turbulence and power law behavior in the energy spectrum. When cusps traveling on the string reach the boundary, we observe the divergence of the force between the quark and antiquark. Minimal amplitude of the perturbation below which cusps do not form is also investigated. No cusp formation is found when the string moves in all four AdS space directions, and in this case an inverse energy cascade follows a direct cascade.
Entropy of Warped Taub-NUT AdS Black String via the Brick Wall Method
Chong Oh Lee
2015-03-10
When we consider five-dimensional warped Taub-NUT/bolt AdS black string with minimally coupled massive scalar field, we calculate entropies by using the brick wall method. It is found that they are proportional to being quadratically divergent in a cutoff parameter. In particular, we show that the entropy of warped Taub-NUT AdS black string holds for an area law in the bulk as well as on the brane.
Geometry and supersymmetry of heterotic warped flux AdS backgrounds
Beck, S W; Papadopoulos, G
2015-01-01
We classify the geometries of the most general warped, flux AdS backgrounds of heterotic supergravity up to two loop order in sigma model perturbation theory. We show under some mild assumptions that there are no $AdS_n$ backgrounds with $n\
Supersymmetric branes in AdS2S2 Aaron Simons, Andrew Strominger, David Thompson, and Xi Yin
Romps, David M.
Supersymmetric branes in AdS2S2 CY3 Aaron Simons, Andrew Strominger, David Thompson, and Xi Yin-BPS (Bogomol'nyi- Prasad-Sommerfield) configurations, which are static for some choice of global AdS2 requires alignment of all the charge vectors. The radial position of the branes in global AdS2
OKHEP-00-11 Quantum (In)Stability of a Brane-World AdS5 Universe at
Milton, Kim
OKHEP-00-11 Quantum (In)Stability of a Brane-World AdS5 Universe at Nonzero Temperature Iver Brevik effects of bulk matter (scalars, spinors) in the Randall-Sundrum AdS5 brane-world at nonzero temperature dynamical mechanism to stabilize the thermal AdS5 brane-world. It is shown that the brane separation
AdAlyze Redux: Post-Click and Post-Conversion Text Feature Attribution for Sponsored Search Ads
Cortes, Corinna
AdAlyze Redux: Post-Click and Post-Conversion Text Feature Attribution for Sponsored Search Ads In this paper, we present our ongoing research on an ads quality testing tool that we call AdAlyze Redux of textual ads features, tailored to exactly the ads in an advertiser's set of accounts. This lets them
Classical Worldsheets for String Scattering on Flat and AdS Spacetime
Charles M. Sommerfield; Charles B. Thorn
2008-05-21
We present a study of the worldsheets that describe the classical limit of various string scattering processes. Our main focus is on string scattering in AdS spacetime because of its relation via the AdS/CFT correspondence to gluon scattering in {\\cal N}=4 supersymmetric Yang-Mills theory. But we also consider analogous processes in flat Minkowski spacetime which we compare to the AdS case. In addition to scattering of string by string we also find and study worldsheets describing the scattering of a string by external sources.
AdS and Lifshitz Black Holes in Conformal and Einstein-Weyl Gravities
H. Lu; Y. Pang; C. N. Pope; J. Vazquez-Poritz
2012-04-14
We study black hole solutions in extended gravities with higher-order curvature terms, including conformal and Einstein-Weyl gravities. In addition to the usual AdS vacuum, the theories admit Lifshitz and Schr\\"odinger vacua. The AdS black hole in conformal gravity contains an additional parameter over and above the mass, which may be interpreted as a massive spin-2 hair. By considering the first law of thermodynamics, we find that it is necessary to introduce an associated additional intensive/extensive pair of thermodynamic quantities. We also obtain new Liftshitz black holes in conformal gravity and study their thermodynamics. We use a numerical approach to demonstrate that AdS black holes beyond the Schwarzschild-AdS solution exist in Einstein-Weyl gravity. We also demonstrate the existence of asymptotically Lifshitz black holes in Einstein-Weyl gravity. The Lifshitz black holes arise at the boundary of the parameter ranges for the AdS black holes. Outside the range, the solutions develop naked singularities. The asymptotically AdS and Lifshitz black holes provide an interesting phase transition, in the corresponding boundary field theory, from a relativistic Lorentzian system to a non-relativistic Lifshitz system.
Noncommutative geometry of AdS coordinates on a D-brane
Lawrence B. Crowell
2012-07-02
In this short paper the noncommutative geometry and quantization of branes and the AdS is discussed. The question in part addresses an open problem left by this author in [1] on how branes are generated by stringy physics. The breaking of an open type I string into two strings generates a nascent brane at the new endpoints with inflationary cosmologies. This was left as a conjecture at the end of this paper on the role of quantum critical points in the onset of inflationary cosmology. The noncommutative geometry of the clock and lapse functions for the AdS-brane are derived as is the number of degrees of freedom which appear. The role of the AdS spacetime, or in particular its boundary, in cosmology is discussed in an elementary regularization scheme of the cosmological constant on the boundary. This is compared to schemes of conformal compactification of the AdS spacetime and the Heisenberg group.
On Thermodynamics of AdS Black Holes in M-Theory
A. Belhaj; M. Chabab; H. EL Moumni; K. Masmar; M. B. Sedra
2015-09-07
Motivated by a recent work on asymptotically AdS_4 black holes in M-theory, we investigate the thermodynamics and thermodynamical geometry of AdS black holes from M2 and M5-branes. Concretely, we consider AdS black holes in AdS_{p+2}\\times S^{11-p-2}, where p=2,5 by interpreting the number of M2 (and M5-branes) as a thermodynamical variable. We study the corresponding phase transition to examine their stabilities by calculating and discussing various thermodynamical quantities including the chemical potential. Then, we compute the thermodynamical curvatures from the Quevedo metric for M2 and M5-branes geometries to reconsider the stability of such black objects. The Quevedo metric singularities recover similar stability results provided by the phase transition program.
Position Number: (Assigned when added to Library)
California at Davis, University of
Position Number: (Assigned when added to Library) 02016240 Dept: INST OF TRANSPORTATION STUDIES distributions to social media and trade media. 20% WEBSITE, SOCIAL MEDIA AND MEDIA MONITORING Monitor trends
Jia-Lin Zhang; Rong-Gen Cai; Hongwei Yu
2015-03-03
We study thermodynamics and thermodynamic geometry of a five-dimensional Schwarzschild AdS black hole in $AdS_5\\times{S^5}$ spacetime by treating the cosmological constant as the number of colors in the boundary gauge theory and its conjugate quantity as the associated chemical potential. It is found that the chemical potential is always negative in the stable branch of black hole thermodynamics and it has a chance to be positive, but appears in the unstable branch. We calculate scalar curvatures of the thermodynamical Weinhold metric, Ruppeiner metric and Quevedo metric, respectively and we find that the divergence of scalar curvature is related to the divergence of specific heat with fixed chemical potential in the Weinhold metric and Ruppeiner metric, while in the Quevedo metric the divergence of scalar curvature is related to the divergence of specific heat with fixed number of colors and the vanishing of the specific heat with fixed chemical potential.
Measuring value added characteristics in feeder cattle
Mathews, Crystal Dawn
2009-05-15
VALUE-ADDED CHARACTERISTICS IN FEEDER CATTLE A Thesis by CRYSTAL DAWN MATHEWS Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE... August 2007 Major Subject: Agricultural Economics MEASURING VALUE-ADDED CHARACTERISTICS IN FEEDER CATTLE A Thesis by CRYSTAL DAWN MATHEWS Submitted to the Office of Graduate Studies of Texas A&M University...
AUAARHUS UNIVERSITY Adding of attachments Financial Control
, and the picture file from this scan must be saved (on a PC or server) before the file is added to the expense sheet. Important: Attachments must be saved in PDF or TIF format. If the attachment is not added in one address or save the picture file on your PC or a server. Open the file and save it on your PC #12;AUAARHUS
On the Thermodynamic Geometry and Critical Phenomena of AdS Black Holes
Anurag Sahay; Tapobrata Sarkar; Gautam Sengupta
2010-04-21
In this paper, we study various aspects of the equilibrium thermodynamic state space geometry of AdS black holes. We first examine the Reissner-Nordstrom-AdS (RN-AdS) and the Kerr-AdS black holes. In this context, the state space scalar curvature of these black holes is analysed in various regions of their thermodynamic parameter space. This provides important new insights into the structure and significance of the scalar curvature. We further investigate critical phenomena, and the behaviour of the scalar curvature near criticality, for KN-AdS black holes in two mixed ensembles, introduced and elucidated in our earlier work arXiv:1002.2538 [hep-th]. The critical exponents are identical to those in the RN-AdS and Kerr-AdS cases in the canonical ensemble. This suggests an universality in the scaling behaviour near critical points of AdS black holes. Our results further highlight qualitative differences in the thermodynamic state space geometry for electric charge and angular momentum fluctuations of these.
Comments on Cosmic Censorship in AdS/CFT
Hubeny, Veronika E.
2009-01-01
black hole singularity in AdS/CFT, [arXiv:hep-th/0306170]. [Censorship Violation in AdS, [arXiv:gr-qc/0405050]. [17] D.Quasinormal modes of AdS black holes and the approach to
SAO/NASA ADS Help Pages May 30, 2014
Hardcastle, Martin
SAO/NASA ADS Help Pages ADS Team May 30, 2014 #12;Contents 1 Overview 4 1.1 What is the ADS? . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.1.1 Use of the ADS . . . . . . . . . . . . . . . . . . . . . . . . 4 1.1.2 User Privacy . . . . . . . . . . . . . . . . . . . . . . . . . 5 1.2 About the Data in the ADS . . . . . . . . . . . . . . . . . . . . . 6 1.2.1 Origin
QCD Condensates and Holographic Wilson Loops for Asymptotically AdS Spaces
Quevedo, R. Carcasses; Goity, Jose L.; Trinchero, Roberto C.
2014-02-01
The minimization of the Nambu-Goto (NG) action for a surface whose contour defines a circular Wilson loop of radius a placed at a finite value of the coordinate orthogonal to the border is considered. This is done for asymptotically AdS spaces. The condensates of dimension n = 2, 4, 6, 8, and 10 are calculated in terms of the coefficients in the expansion in powers of the radius a of the on-shell subtracted NG action for small a->0. The subtraction employed is such that it presents no conflict with conformal invariance in the AdS case and need not introduce an additional infrared scale for the case of confining geometries. It is shown that the UV value of the gluon condensates is universal in the sense that it only depends on the first coefficients of the difference with the AdS case.
2D Gravity on $AdS_2$ with Chern-Simons Corrections
Mohsen Alishahiha; Reza Fareghbal; Amir E. Mosaffa
2008-12-23
We study 2D Maxwell-dilaton gravity with higher order corrections given by the Chern-Simons term. The model admits three distinctive $AdS_2$ vacuum solutions. By making use of the entropy function formalism we find the entropy of the solutions which is corrected due to the presence of the Chern-Simons term. We observe that the form of the correction depends not only on the coefficient of the Chern-Simons term, but also on the sign of the electric charge; pointing toward the chiral nature of the dual CFT. Using the asymptotic symmetry of the theory as well as requiring a consistent picture we can find the central charge and the level of U(1) current. Upon uplifting the solutions to three dimensions we get purely geometric solutions which will be either $AdS_3$ or warped $AdS_3$ with an identification.
2D Gravity on $AdS_2$ with Chern-Simons Corrections
Alishahiha, Mohsen; Mosaffa, Amir E
2009-01-01
We study 2D Maxwell-dilaton gravity with higher order corrections given by the Chern-Simons term. The model admits three distinctive $AdS_2$ vacuum solutions. By making use of the entropy function formalism we find the entropy of the solutions which is corrected due to the presence of the Chern-Simons term. We observe that the form of the correction depends not only on the coefficient of the Chern-Simons term, but also on the sign of the electric charge; pointing toward the chiral nature of the dual CFT. Using the asymptotic symmetry of the theory as well as requiring a consistent picture we can find the central charge and the level of U(1) current. Upon uplifting the solutions to three dimensions we get purely geometric solutions which will be either $AdS_3$ or warped $AdS_3$ with an identification.
Low frequency quasi-normal modes of AdS black holes
George Siopsis
2007-02-10
We calculate analytically low frequency quasi-normal modes of gravitational perturbations of AdS Schwarzschild black holes in $d$ dimensions. We arrive at analytic expressions which are in agreement with their counterparts from linearized hydrodynamics in $S^{d-2}\\times \\mathbb{R}$, in accordance with the AdS/CFT correspondence. Our results are also in good agreement with results of numerical calculations.
Schwinger Pair Production in dS_2 and AdS_2
Sang Pyo Kim; Don N. Page
2009-02-20
We study Schwinger pair production in scalar QED from a uniform electric field in dS_2 with scalar curvature R_{dS} = 2 H^2 and in AdS_2 with R_{AdS} = - 2 K^2. With suitable boundary conditions, we find that the pair-production rate is the same analytic function of the scalar curvature in both cases.
Double-Trace Deformations and Entanglement Entropy in AdS
Taiki Miyagawa; Noburo Shiba; Tadashi Takayanagi
2015-11-30
We compute the bulk entanglement entropy of a massive scalar field in a Poincare AdS with the Dirichlet and Neumann boundary condition when we trace out a half space. Moreover, by taking into account the quantum back reaction to the minimal surface area, we calculate how much the entanglement entropy changes under a double-trace deformation of a holographic CFT. In the AdS3/CFT2 setup, our result agrees with the known result in 2d CFTs. In higher dimensions, our results offer holographic predictions.
Global causal propagator for the KleinGordon equation on a class of supersymmetric AdS backgrounds
Enciso, Alberto
Global causal propagator for the KleinGordon equation on a class of supersymmetric AdS backgrounds analyze the Cauchy problem for the KleinGordon equation on the type IIB super- gravity backgrounds AdS5 of their connections to the AdS/CFT correspon- dence [2]. More precisely, if Y is a SasakiEinstein 5-manifold
Computing and Using Metrics in the ADS
Henneken, Edwin A; Kurtz, Michael J; Grant, Carolyn S; Thompson, Donna; Luker, Jay; Chyla, Roman; Holachek, Alexandra; Murray, Stephen S
2014-01-01
Finding measures for research impact, be it for individuals, institutions, instruments or projects, has gained a lot of popularity. More papers than ever are being written on new impact measures, and problems with existing measures are being pointed out on a regular basis. Funding agencies require impact statistics in their reports, job candidates incorporate them in their resumes, and publication metrics have even been used in at least one recent court case. To support this need for research impact indicators, the SAO/NASA Astrophysics Data System (ADS) has developed a service which provides a broad overview of various impact measures. In this presentation we discuss how the ADS can be used to quench the thirst for impact measures. We will also discuss a couple of the lesser known indicators in the metrics overview and the main issues to be aware of when compiling publication-based metrics in the ADS, namely author name ambiguity and citation incompleteness.
Jacopo Bechi
2009-09-25
This paper focuses on some issues about condensates and renormalization in AdS/QCD models. In particular we consider the consistency of the AdS/QCD approach for scale dependent quantities as the chiral condensate questioned in some recent papers and the 4D meaning of the 5D cosmological constant in a model in which the QCD is dual to a 5D gravity theory. We will be able to give some arguments that the cosmological constant is related to the QCD gluon condensate.
Building America Expert Meeting: Key Innovations for Adding Energy...
Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance Projects Building America Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance...
Addendum Added to Innovative Demonstration of Geothermal Energy...
Office of Environmental Management (EM)
Addendum Added to Innovative Demonstration of Geothermal Energy Production FOA Addendum Added to Innovative Demonstration of Geothermal Energy Production FOA July 2, 2010 - 2:13pm...
Peculiarities of String Theory on AdS(4) x CP(3)
Dmitri Sorokin; Linus Wulff
2011-03-08
We review peculiar features of type IIA string theory compactified on AdS(4) x CP(3) superspace, in particular, the structure of the Green-Schwarz action, issues with fixing its kappa-symmetry, classical integrability and the string instanton on CP(3)
Gauge Non-Invariant Higher-Spin Currents in $AdS_4$
Smirnov, P A
2015-01-01
Conserved currents of any spin $t>0$ built from bosonic symmetric massless gauge fields of arbitrary integer spins in $AdS_4$ are found. Analogously to the case of $4d$ Minkowski space, currents considered in this paper are not gauge invariant but generate gauge invariant conserved charges.
Hawking radiation for a scalar field conformally coupled to an AdS black hole
P. Valtancoli
2015-02-05
The decomposition in normal modes of a scalar field conformally coupled to an AdS black hole leads to a Heun equation with simple coefficients thanks to conformal invariance. By applying the Damour-Ruffini method we can relate the critical exponent of the radial part at the horizon surface to the Hawking radiation of scalar particles.
Holographic Thermalization, stability of AdS, and the Fermi-Pasta-Ulam-Tsingou paradox
Venkat Balasubramanian; Alex Buchel; Stephen R. Green; Luis Lehner; Steven L. Liebling
2014-06-16
For a real massless scalar field in general relativity with a negative cosmological constant, we uncover a large class of spherically symmetric initial conditions that are close to AdS, but whose numerical evolution does not result in black hole formation. According to the AdS/CFT dictionary, these bulk solutions are dual to states of a strongly interacting boundary CFT that fail to thermalize at late times. Furthermore, as these states are not stationary, they define dynamical CFT configurations that do not equilibrate. We develop a two-timescale perturbative formalism that captures both direct and inverse cascades of energy and agrees with our fully nonlinear evolutions in the appropriate regime. We also show that this formalism admits a large class of quasi-periodic solutions. Finally, we demonstrate a striking parallel between the dynamics of AdS and the classic Fermi-Pasta-Ulam-Tsingou problem.
The Cornell Potential from General Geometries in AdS / QCD
C D White
2007-07-02
We consider the heavy quark-antiquark potential in the AdS / QCD correspondence, focusing in particular on a recently calculated AdS-like metric deformed by back-reaction effects. We find that tuning the long-distance behaviour of the potential leads to a discrepancy at small distances, and discuss how to better constrain AdS / QCD geometries. A systematic comparison of various geometries is presented, based on goodness of fit to lattice data in the quenched approximation. The back-reacted geometry is seen to be phenomenologically favoured over an alternative geometry with the same number of parameters, although it does not perform as well as some other geometries.
OKHEP0011 Quantum (In)Stability of a BraneWorld AdS 5 Universe at
Milton, Kim
OKHEP0011 Quantum (In)Stability of a BraneWorld AdS 5 Universe at Nonzero Temperature Iver the quantum e#ects of bulk matter (scalars, spinors) in the RandallSundrum AdS 5 braneworld at nonzero). That suggests a new dynamical mechanism to stabilize the thermal AdS 5 braneworld. It is shown that the brane
Sean Cantrell
2015-10-21
Conformal deformations manifest in the AdS/CFT correspondence as boundary conditions on the AdS field. Heretofore, double-trace deformations have been the primary focus in this context. To better understand multitrace deformations, we revisit the relationship between the generating AdS partition function for a free bulk theory and the boundary CFT partition function subject to arbitrary conformal deformations. The procedure leads us to a formalism that constructs bulk fields from boundary operators. Using this formalism, we independently replicate the holographic RG flow narrative to go on to interpret the brane used to regulate the AdS theory as a renormalization scale. The scale-dependence of the dilatation spectrum of a boundary theory in the presence of general deformations can be thus understood on the AdS side using this formalism.
McDonald, Kirk
Accelerator-Driven System (ADS) · High power proton accelerator (E ~0.6 2 Gev; I = xmA > 5 MW) · Heavy accelerator-driven systems technology for nuclear waste transmutation and power generation (e.g., MYRRAH, SMART). · Finding #2: Accelerator-driven sub-critical systems offer the potential for safely burning
LIQUOR POLICY University Policy No.: AD2400
Victoria, University of
Page 1 LIQUOR POLICY University Policy No.: AD2400 Classification: Administration Approving and Appendices: Procedures Associated with the University Liquor Policy Appendix ,,A - Licensed Establishments on University Property PURPOSE 1.00 The purpose of this policy is to: set out requirements regarding
Politico, Sept. 11, 2012 Making Political Ads Personal
Peha, Jon M.
Politico, Sept. 11, 2012 Making Political Ads Personal Jon M. Peha Published in Politico, Sept. 11 seeing campaign ads sharply attacking current environmental regulations, another sees ads passionately arguing for stronger environmental regulations and the campaign ads you see never mention the environment
ADS modules Adel Alahmadi, S. K. Jain and Andre Leroy
André, Leroy
ADS modules Adel Alahmadi, S. K. Jain and Andr´e Leroy Abstract We study the class of ADS rings such as injectivity and quasi-continuousity. A simple ring R such that RR is ADS must be either right self injective or indecomposable as right R- module. Under certain conditions we can construct a unique ADS hull up to isomorphism
Viewability Prediction for Online Display Ads Information Systems Dept.
Borcea, Cristian
Viewability Prediction for Online Display Ads Chong Wang Information Systems Dept. New Jersey. Advertisers are charged by ad serv- ing, where their ads are shown in web pages. However, re- cent studies show that about half of the ads were actually never seen by users because they do not scroll deep
The free energy of N=2 supersymmetric AdS_4 solutions of M-theory
Maxime Gabella; Dario Martelli; Achilleas Passias; James Sparks
2011-07-29
We show that general N=2 supersymmetric AdS_4 solutions of M-theory with non-zero M2-brane charge admit a canonical contact structure. The free energy of the dual superconformal field theory on S^3 and the scaling dimensions of operators dual to supersymmetric wrapped M5-branes are expressed via AdS/CFT in terms of contact volumes. In particular, this leads to topological and localization formulae for the coefficient of N^{3/2} in the free energy of such solutions.
High Energy Scattering in the AdS/CFT Correspondence
Joao Penedones
2008-02-06
This work explores the celebrated AdS/CFT correspondence in the regime of high energy scattering in Anti--de Sitter (AdS) spacetime. In particular, we develop the eikonal approximation to high energy scattering in AdS and explore its consequences for the dual Conformal Field Theory (CFT). Using position space Feynman rules, we rederive the eikonal approximation for high energy scattering in flat space. Following this intuitive position space perspective, we then generalize the eikonal approximation for high energy scattering in AdS and other spacetimes. Remarkably, we are able to resum, in terms of a generalized phase shift, ladder and cross ladder Witten diagrams associated to the exchange of an AdS spin j field, to all orders in the coupling constant. By the AdS/CFT correspondence, the eikonal amplitude in AdS is related to the four point function of CFT primary operators in the regime of large 't Hooft coupling, including all terms of the 1/N expansion. We then show that the eikonal amplitude determines the behavior of the CFT four point function for small values of the cross ratios in a Lorentzian regime and that this controls its high spin and dimension conformal partial wave decomposition. These results allow us to determine the anomalous dimension of high spin and dimension double trace primary operators, by relating it to the AdS eikonal phase shift. Finally we find that, at large energies and large impact parameters in AdS, the gravitational interaction dominates all other interactions, as in flat space. Therefore, the anomalous dimension of double trace operators, associated to graviton exchange in AdS, yields a universal prediction for CFT's with AdS gravitational duals.
Weak Field Collapse in AdS: Introducing a Charge Density
Elena Caceres; Arnab Kundu; Juan F. Pedraza; Di-Lun Yang
2015-06-29
We study the effect of a non-vanishing chemical potential on the thermalization time of a strongly coupled large $N_c$ gauge theory in $(2+1)$-dimensions, using a specific bottom-up gravity model in asymptotically AdS space. We first construct a perturbative solution to the gravity-equations, which dynamically interpolates between two AdS black hole backgrounds with different temperatures and chemical potentials, in a perturbative expansion of a bulk neutral scalar field. In the dual field theory, this corresponds to a quench dynamics by a marginal operator, where the corresponding coupling serves as the small parameter in which the perturbation is carried out. The evolution of non-local observables, such as the entanglement entropy, suggests that thermalization time decreases with increasing chemical potential. We also comment on the validity of our perturbative analysis.
Renormalization, averaging, conservation laws and AdS (in)stability
Ben Craps; Oleg Evnin; Joris Vanhoof
2015-01-19
We continue our analytic investigations of non-linear spherically symmetric perturbations around the anti-de Sitter background in gravity-scalar field systems, and focus on conservation laws restricting the (perturbatively) slow drift of energy between the different normal modes due to non-linearities. We discover two conservation laws in addition to the energy conservation previously discussed in relation to AdS instability. A similar set of three conservation laws was previously noted for a self-interacting scalar field in a non-dynamical AdS background, and we highlight the similarities of this system to the fully dynamical case of gravitational instability. The nature of these conservation laws is best understood through an appeal to averaging methods which allow one to derive an effective Lagrangian or Hamiltonian description of the slow energy transfer between the normal modes. The conservation laws in question then follow from explicit symmetries of this averaged effective theory.
Critical Dimension for Stable Self-gravitating Stars in AdS
Zhong-Hua Li; Rong-Gen Cai
2009-08-03
We study the self-gravitating stars with a linear equation of state, $P=a \\rho$, in AdS space, where $a$ is a constant parameter. There exists a critical dimension, beyond which the stars are always stable with any central energy density; below which there exists a maximal mass configuration for a certain central energy density and when the central energy density continues to increase, the configuration becomes unstable. We find that the critical dimension depends on the parameter $a$, it runs from $d=11.1429$ to 10.1291 as $a$ varies from $a=0$ to 1. The lowest integer dimension for a dynamically stable self-gravitating configuration should be $d=12$ for any $a \\in [0,1]$ rather than $d=11$, the latter is the case of self-gravitating radiation configurations in AdS space.
CFT dual of charged AdS black hole in the large dimension limit
Er-Dong Guo; Miao Li; Jia-Rui Sun
2015-12-28
We study the dual CFT description of the $d+1$-dimensional Reissner-Nordstr\\"om-Anti de Sitter (RN-AdS$_{d+1}$) black hole in the large dimension (large $d$) limit, both for the extremal and nonextremal cases. The central charge of the dual CFT$_2$ (or chiral CFT$_1$) is calculated for the near horizon near extremal geometry which possess an AdS$_2$ structure. Besides, the $Q$-picture hidden conformal symmetry in the nonextremal background can be naturally obtained by a probe charged scalar field in the large $d$ limit, without the need to input the usual limits to probe the hidden conformal symmetry. Furthermore, an new dual CFT description of the nonextremal RN-AdS$_{d+1}$ black hole is found in the large $d$ limit and the duality is analyzed by comparing the entropies, the absorption cross sections and the retarded Green's functions obtained both from the gravity and the dual CFT sides.
Homothety and Quasi Self Similarity in Asymptotically Flat and AdS Spacetimes
Wenli Zhao
2015-03-02
For a spherically symmetric self-gravitating scalar field we study self similar and quasi-self similar solutions in asymptotically flat and AdS spacetimes in various dimensions. Our main approach relies on reducing the Einstein-Klein-Gordon system of equations under the self similarity assumption to a dynamical system. Applying standard techniques in the analysis of dynamical system we study the corresponding phase diagrams, gaining some insight into the short and long-term evolution of the system. In the asymptotically flat case the fixed points of the dynamical system correspond to conformally flat spacetimes. We observed a new transition from a fixed point to a black hole and we compute the corresponding exponent analytically. In the case of AdS spacetime, we observed the quasi self similar scalar field scattering to infinity after interfering near the center corresponding to the dynamical system with no fixed points.
Extremal Static AdS Black Hole/CFT Correspondence in Gauged Supergravities
H. Lu; Jianwei Mei; C. N. Pope; J. Vazquez-Poritz
2009-01-13
A recently proposed holographic duality allows the Bekenstein-Hawking entropy of extremal rotating black holes to be calculated microscopically, by applying the Cardy formula to the two-dimensional chiral CFTs associated with certain reparameterisations of azimuthal angular coordinates in the solutions. The central charges are proportional to the angular momenta of the black hole, and so the method degenerates in the case of static (non-rotating) black holes. We show that the method can be extended to encompass such charged static extremal AdS black holes by using consistent Kaluza-Klein sphere reduction ansatze to lift them to exact solutions in the low-energy limits of string theory or M-theory, where the electric charges become reinterpreted as angular momenta associated with internal rotations in the reduction sphere. We illustrate the procedure for the examples of extremal charged static AdS black holes in four, five, six and seven dimensions.
Isometry Group Orbit Quantization of Spinning Strings in AdS_3 x S^3
Martin Heinze; George Jorjadze; Luka Megrelidze
2015-07-01
Describing the bosonic AdS_3 x S^3 particle and string in SU(1,1) x SU(2) group variables, we provide a Hamiltonian treatment of the isometry group orbits of solutions via analysis of the pre-symplectic form. For the particle we obtain a one-parameter family of orbits parameterized by creation-annihilation variables, which leads to the Holstein-Primakoff realization of the isometry group generators. The scheme is then applied to spinning string solutions characterized by one winding number in AdS_3 and two winding numbers in S^3. We find a two-parameter family of orbits, where quantization again provides the Holstein-Primakoff realization of the symmetry generators with an oscillator type energy spectrum. Analyzing the minimal energy at strong coupling we verify the spectrum of short strings at special values of winding numbers.
ARM KAZR-ARSCL Value Added Product
Jensen, Michael
2012-09-28
The Ka-band ARM Zenith Radars (KAZRs) have replaced the long-serving Millimeter Cloud Radars, or MMCRs. Accordingly, the primary MMCR Value Added Product (VAP), the Active Remote Sensing of CLouds (ARSCL) product, is being replaced by a KAZR-based version, the KAZR-ARSCL VAP. KAZR-ARSCL provides cloud boundaries and best-estimate time-height fields of radar moments.
Merged Sounding Value-Added Product
Troyan, D
2010-03-03
The Merged Sounding value-added product (VAP) uses a combination of observations from radiosonde soundings, the microwave radiometer (MWR), surface meteorological instruments, and European Centre for Medium-Range Weather Forecasts (ECMWF) model output with a sophisticated scaling/interpolation/smoothing scheme in order to define profiles of the atmospheric thermodynamic state at one-minute temporal intervals and a total of 266 altitude levels.
ARM KAZR-ARSCL Value Added Product
DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]
Jensen, Michael
The Ka-band ARM Zenith Radars (KAZRs) have replaced the long-serving Millimeter Cloud Radars, or MMCRs. Accordingly, the primary MMCR Value Added Product (VAP), the Active Remote Sensing of CLouds (ARSCL) product, is being replaced by a KAZR-based version, the KAZR-ARSCL VAP. KAZR-ARSCL provides cloud boundaries and best-estimate time-height fields of radar moments.
ADS development in Japan Kenji KIKUCHI
McDonald, Kirk
, Fermi, Oct. 2009 / Kikuchi #12;Design parametersDesign parameters · Accelerator power: 20MW (1 3mA 1 5GeV)· Accelerator power: 20MW (1.3mA, 1.5GeV) · Reactor power: 800MW · SCLINAC (0.11.5GeV): 472m · Reactor size: 10m for a spallation target and a reactor coolant. · In the accelerator driven nuclear transmutation system (ADS), LBE
Adding coal dust to coal batch
V.S. Shved; A.V.Berezin [OAO Koks, Kemerovo (Russian Federation)
2009-05-15
The granulometric composition of coke dust from the dry-slaking machine is determined. The influence of additions of 3-7% coke dust on the quality of industrial coking batch and the coke obtained by box coking is estimated. Adding 1% coke dust to coking batch does not markedly change the coke quality. Industrial equipment for the supply of dry-slaking dust to the batch is described.
John H. Schwarz
2009-07-28
The study of AdS/CFT (or gauge/gravity) duality has been one of the most active and illuminating areas of research in string theory over the past decade. The scope of its relevance and the insights it is providing seem to be ever expanding. In this talk I briefly describe some of the attempts to explore how the duality works for maximally supersymmetric systems.
Perturbative calculation of quasinormal modes of AdS Schwarzschild black holes
Musiri, Suphot; Ness, Scott; Siopsis, George [Department of Physics, Srinakharinwirot University, Bangkok 10110 (Thailand); Department of Physics and Astronomy, The University of Tennessee, Knoxville, Tennessee 37996-1200 (United States)
2006-03-15
We calculate analytically quasinormal modes of AdS Schwarzschild black holes including first-order corrections. We consider massive scalar, gravitational and electromagnetic perturbations. Our results are in good agreement with numerical calculations. In the case of electromagnetic perturbations, ours is the first calculation to provide an analytic expression for quasinormal frequencies, because the effective potential vanishes at zeroth order. We show that the first-order correction is logarithmic.
Stability of asymptotically AdS wormholes in vacuum against scalar field perturbations
Diego H. Correa; Julio Oliva; Ricardo Troncoso
2008-08-18
The stability of certain class of asymptotically AdS wormholes in vacuum against scalar field perturbations is analyzed. For a free massive scalar field, the stability of the perturbation is guaranteed provided the squared mass is bounded from below by a negative quantity. Depending on the base manifold of the AdS asymptotics, this lower bound could be more stringent than the Breitenlohner-Freedman bound. An exact expression for the spectrum is found analytically. For a scalar field perturbation with a nonminimal coupling, slow fall-off asymptotic behavior is also allowed, provided the squared mass fulfills certain negative upper bound. Although the Ricci scalar is not constant, an exact expression for the spectrum of the scalar field can also be found, and three different quantizations for the scalar field can be carried out. They are characterized by the fall-off of the scalar field, which can be fast or slow with respect to each asymptotic region. For these perturbations, stability can be achieved in a range of negative squared masses which depends on the base manifold of the AdS asymptotics. This analysis also extends to a class of gravitational solitons with a single conformal boundary.
Entropy of near-extremal black holes in AdS5
Simon, Joan; Balasubramanian, Vijay; de Boer, Jan; Jejjala, Vishnu; Simon, Joan
2007-07-24
We construct the microstates of near-extremal black holes in AdS_5 x S5 as gases of defects distributed in heavy BPS operators in the dual SU(N) Yang-Mills theory. These defects describe open strings on spherical D3-branes in the S5, and we show that they dominate the entropy by directly enumerating them and comparing the results with a partition sum calculation. We display new decoupling limits in which the field theory of the lightest open strings on the D-branes becomes dual to a near-horizon region of the black hole geometry. In the single-charge black hole we find evidence for an infrared duality between SU(N) Yang-Mills theories that exchanges the rank of the gauge group with an R-charge. In the two-charge case (where pairs of branes intersect on a line), the decoupled geometry includes an AdS_3 factor with a two-dimensional CFT dual. The degeneracy in this CFT accounts for the black hole entropy. In the three-charge case (where triples of branes intersect at a point), the decoupled geometry contains an AdS_2 factor. Below a certain critical mass, the two-charge system displays solutions with naked timelike singularities even though they do not violate a BPS bound. We suggest a string theoretic resolution of these singularities.
AdS Geometry, projective embedded coordinates and associated isometry groups
Roldao da Rocha; E. Capelas de Oliveira
2006-03-20
This work is intended to investigate the geometry of anti-de Sitter spacetime (AdS), from the point of view of the Laplacian Comparison Theorem (LCT), and to give another description of the hyperbolical embedding standard formalism of the de Sitter and anti-de Sitter spacetimes in a pseudo-Euclidean spacetime. It is shown how to reproduce some geometrical properties of AdS, from the LCT in AdS, choosing suitable functions that satisfy basic properties of Riemannian geometry. We also introduce and discuss the well-known embedding of a 4-sphere and a 4-hyperboloid in a 5-dimensional pseudo-Euclidean spacetime, reviewing the usual formalism of spherical embedding and the way how it can retrieve the Robertson-Walker metric. With the choice of the de Sitter metric static frame, we write the so-called reduced model in suitable coordinates. We assume the existence of projective coordinates, since de Sitter spacetime is orientable. From these coordinates, obtained when stereographic projection of the de Sitter 4-hemisphere is done, we consider the Beltrami geodesic representation, which gives a more general formulation of the seminal full model described by Schrodinger, concerning the geometry and the topology of de Sitter spacetime. Our formalism retrieves the classical one if we consider the metric terms over the de Sitter splitting on Minkowski spacetime. From the covariant derivatives we find the acceleration of moving particles, Killing vectors and the isometry group generators associated to de the Sitter spacetime.
Variations of 14-C around AD 775 and AD 1795 - due to solar activity
Neuhaeuser, Ralph
2015-01-01
The motivation for our study is the disputed cause for the strong variation of 14-C around AD 775. Our method is to compare the 14-C variation around AD 775 with other periods of strong variability. Our results are: (a) We see three periods, where 14-C varied over 200 yr in a special way showing a certain pattern of strong secular variation: after a Grand Minimum with strongly increasing 14-C, there is a series of strong short-term drop(s), rise(s), and again drop(s) within 60 yr, ending up to 200 yr after the start of the Grand Minimum. These three periods include the strong rises around BC 671, AD 775, and AD 1795. (b) We show with several solar activity proxies (radioisotopes, sunspots, and aurorae) for the AD 770s and 1790s that such intense rapid 14-C increases can be explained by strong rapid decreases in solar activity and, hence, wind, so that the decrease in solar modulation potential leads to an increase in radioisotope production. (c) The strong rises around AD 775 and 1795 are due to three effects...
CFT adapted gauge invariant formulation of arbitrary spin fields in AdS and modified de Donder gauge
R. R. Metsaev
2009-01-22
Using Poincare parametrization of AdS space, we study totally symmetric arbitrary spin massless fields in AdS space of dimension greater than or equal to four. CFT adapted gauge invariant formulation for such fields is developed. Gauge symmetries are realized similarly to the ones of Stueckelberg formulation of massive fields. We demonstrate that the curvature and radial coordinate contributions to the gauge transformation and Lagrangian of the AdS fields can be expressed in terms of ladder operators. Realization of the global AdS symmetries in the conformal algebra basis is obtained. Modified de Donder gauge leading to simple gauge fixed Lagrangian is found. The modified de Donder gauge leads to decoupled equations of motion which can easily be solved in terms of Bessel function. Interrelations between our approach to the massless AdS fields and the Stueckelberg approach to massive fields in flat space are discussed.
Alternative approach to the regularization of odd dimensional AdS gravity
Pablo Mora
2007-08-23
In this paper I present an action principle for odd dimensional AdS gravity which consists of introducing another manifold with the same boundary and a very specific boundary term. This new action allows and alternative approach to the regularization of the theory, yielding a finite euclidean action and finite conserved charges. The choice of the boundary term is justified on the grounds that an enhanced 'almost off-shell' local AdS/Conformal symmetry arises for that very special choice. One may say that the boundary term is dictated by a guiding symmetry principle. Two sets of boundary conditions are considered, which yield regularization procedures analogous to (but different from) the standard 'background substraction' and 'counterterms' regularization methods. The Noether charges are constructed in general. As an application it is shown that for Schwarszchild-AdS black holes the charge associated to the time-like Killing vector is finite and is indeed the mass. The Euclidean action for Schwarzschild-AdS black holes is computed, and it turns out to be finite, and to yield the right thermodynamics. The previous paragraph may be interpreted in the sense that the boundary term dictated by the symmetry principle is the one that correctly regularizes the action.
Interpolated Sounding Value-Added Product
Troyan, D
2013-04-01
The Interpolated Sounding (INTERPSONDE) value-added product (VAP) uses a combination of observations from radiosonde soundings, the microwave radiometer (MWR), and surface meteorological instruments in order to define profiles of the atmospheric thermodynamic state at one-minute temporal intervals and a total of at least 266 altitude levels. This VAP is part of the Merged Sounding (MERGESONDE) suite of VAPs. INTERPSONDE is the profile of the atmospheric thermodynamic state created using the algorithms of MERGESONDE without including the model data from the European Centre for Medium-range Weather Forecasting (ECMWF). More specifically, INTERPSONDE VAP represents an intermediate step within the larger MERGESONDE process.
Adding International Rates | OpenEI Community
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EAand DaltonSolar Energy LLC JumpInformationAdding International Rates
ARM - Value-Added Products (VAP)
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory of raregovAboutRecovery Act Recovery Act LogogovDataValue-Added Products
Ad Lucem Workshop Welcome | Department of Energy
Broader source: Energy.gov (indexed) [DOE]
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i n c i p a l De p u t y A s sconveyance(EPACT)SpringDOE during the DOE Ad Lucem
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) byMultiday ProductionDesigningResources Thomas Jefferson JesupAD&D
Higher Dimensional Gravity, Propagating Torsion and AdS Gauge Invariance
Ricardo Troncoso; Jorge Zanelli
2000-10-02
The most general theory of gravity in d-dimensions which leads to second order field equations for the metric has [(d-1)/2] free parameters. It is shown that requiring the theory to have the maximum possible number of degrees of freedom, fixes these parameters in terms of the gravitational and the cosmological constants. In odd dimensions, the Lagrangian is a Chern-Simons form for the (A)dS or Poincare groups. In even dimensions, the action has a Born-Infeld-like form. Torsion may occur explicitly in the Lagrangian in the parity-odd sector and the torsional pieces respect local (A)dS symmetry for d=4k-1 only. These torsional Lagrangians are related to the Chern-Pontryagin characters for the (A)dS group. The additional coefficients in front of these new terms in the Lagrangian are shown to be quantized.
On Thermodynamics of AdS Black Holes in Arbitrary Dimensions
A. Belhaj; M. Chabab; H. El Moumni; M. B. Sedra
2012-09-23
Considering the cosmological constant $\\Lambda$ as a thermodynamic pressure and its conjugate quantity as a thermodynamic volume as proposed in Kubiznak and Mann (2012), we discuss the critical behavior of charged AdS black hole in arbitrary dimensions $d$. In particular, we present a comparative study in terms of the spacetime dimension $d$ and the displacement of critical points controlling the transition between the small and the large black holes. Such behaviors vary nicely in terms of $d$. Among our result in this context consists in showing that the equation of state for a charged RN-AdS black hole predicts an universal number given by $\\frac{2d-5}{4d-8}$. The three dimensional solution is also discussed.
POSSIBLE CHROMOSPHERIC ACTIVITY CYCLES IN AD LEO
Buccino, Andrea P.; Petrucci, Romina; Mauas, Pablo J. D.; Jofré, Emiliano
2014-01-20
AD Leo (GJ 388) is an active dM3 flare star that has been extensively observed both in the quiescent and flaring states. Since this active star is near the fully convective boundary, studying its long-term chromospheric activity in detail could be an appreciable contribution to dynamo theory. Here, using the Lomb-Scargle periodogram, we analyze the Ca II K line-core fluxes derived from CASLEO spectra obtained between 2001 and 2013 and the V magnitude from the ASAS database between 2004 and 2010. From both of these totally independent time series, we obtain a possible activity cycle with a period of approximately seven years and a less significant shorter cycle of approximately two years. A tentative interpretation is that a dynamo operating near the surface could be generating the longer cycle, while a second dynamo operating in the deep convection zone could be responsible for the shorter one. Based on the long duration of our observing program at CASLEO and the fact that we observe different spectral features simultaneously, we also analyze the relation between simultaneous measurements of the Na I index (R{sub D}{sup ?}), H?, and Ca II K fluxes at different activity levels of AD Leo, including flares.
Instantons and quark zero modes in AdS/QCD
Jacopo Bechi
2009-09-16
In this paper the quark zero modes creation effect is studied in the context of the AdS/QCD approach. This effect is generated, in presence of instantons, by a new that can be added in the bulk.
The Reach and Persuasiveness of Viral Video Ads
Tucker, Catherine Elizabeth
Many video ads are designed to go viral so that the total number of views they receive depends on customers sharing the ads with their friends. This paper explores the relationship between the number of views and how ...
Managing On-air Ad Inventory in Broadcast Television
Bollapragada, Srinivas; Mallik, Suman
2008-01-01
Motivated by the experiences of the National Broadcasting Company (NBC), we present an analytical model for managing on-air ad inventory in broadcast television. The ad inventory in this industry is priced based on rating ...
A $\\mathcal{N}=2$ Supersymmetric $AdS_4$ Solution in M-theory
Lozano, Yolanda; Montero, Jesús
2015-01-01
We find a new $\\mathcal{N}=2$ $AdS_4$ solution in M-theory supported by purely magnetic flux via a sequence of abelian and non-abelian T-dualities. This provides the second known example in this class besides the uplift of the Pernici and Sezgin solution to 7d gauged supergravity constructed in the eighties. We compute the free energy of the solution, and show that it scales as $N^{3/2}$. It is intriguing that even though the natural holographic interpretation is in terms of M5-branes wrapped on a special Lagrangian 3-cycle, this solution does not exhibit the expected $N^3$ behavior.
Superconductors for superstrings on AdS_5 x T^{1,1}
Francesco Aprile; Andrea Borghese; Aldo Dector; Diederik Roest; Jorge G. Russo
2012-05-09
We construct a one-parameter family of five-dimensional N=2 supergravity Lagrangians with an SU(2,1) / U(2) hypermultiplet. For certain values of the parameter, these are argued to describe the dynamics of scalar modes of superstrings on AdS_5 x T^{1,1}, and therefore to be dual to specific chiral primary operators of Klebanov-Witten superconformal field theory. We demonstrate that, below a critical temperature, the thermodynamics is dominated by charged black holes with hair for the scalars that are dual to the operator of lowest conformal dimension 3/2. The system thus enters into a superconducting phase where condenses.
$P-V$ criticality of AdS black hole in $f(R)$ gravity
Songbai Chen; Xiaofang Liu; Changqing Liu
2013-05-31
We study thermodynamics of a charged AdS black hole in the special $f(R)$ correction with the constant Ricci scalar curvature. Our results show that the the $f(R)$ correction influences the Gibbs free energy and the phase transition of system. The ratio $\\rho_c$ occurred at the critical point increases monotonically with the derivative term $f'(R_0)$. We also disclose that the critical exponents are the same as those of the liquid-gas phase transition in the Van der Waals model, which does not depend on the $f(R)$ correction considered here.
Transition from AdS universe to DS universe in the BPP model
Wontae Kim; Myungseok Yoon
2007-03-03
It can be shown that in the BPP model the smooth phase transition from the asymptotically decelerated AdS universe to the asymptotically accelerated DS universe is possible by solving the modified semiclassical equations of motion. This transition comes from noncommutative Poisson algebra, which gives the constant curvature scalars asymptotically. The decelerated expansion of the early universe is due to the negative energy density with the negative pressure induced by quantum back reaction, and the accelerated late-time universe comes from the positive energy and the negative pressure which behave like dark energy source in recent cosmological models.
On Heat Properties of AdS Black Holes in Higher Dimensions
A. Belhaj; M. Chabab; H. EL Moumni; K. Masmar; M. B. Sedra; A. Segui
2015-07-01
We investigate the heat properties of AdS Black Holes in higher dimensions. We consider the study of the corresponding thermodynamical properties including the heat capacity explored in the determination of the black hole stability. In particular, we compute the heat latent. To overcome the instability problem, the Maxwell construction, in the (T,S)-plane, is elaborated. This method is used to modify the the Hawking-Page phase structure by removing the negative heat capacity regions. Then, we discuss the thermodynamic cycle and the heat engines using the way based on the extraction of the work from a black hole solution.
Conformally related massless fields in dS, AdS and Minkowski spaces
E. Huguet; J. Queva; J. Renaud
2006-03-09
In this paper we write down the equation for a scalar conformally coupled field simultaneously for de Sitter (dS), anti-de Sitter (AdS) and Minkowski spacetime in d-dimensions. The curvature dependence appears in a very simple way through a conformal factor. As a consequence the process of curvature free limit, including wave functions limit and two-points functions, turns to be a straightforward issue. We determine a set of modes, that we call de Sitter plane waves, which become ordinary plane waves when the curvature vanishes.
A D2-brane in the Penrose limits of AdS(4)x CP(3)
M. Ali-Akbari
2010-05-02
We consider a D2-brane in the pp-wave backgrounds obtained from AdS$_4\\times$CP$^3$ when electric and magnetic fields have been turned on. Upon fixing the light-cone gauge, light-cone Hamiltonian and BPS configurations are obtained. In particular we study BPS configurations with electric dipole on the two sphere giant and a giant graviton rotating in transverse directions. Moreover we show that the gauge field living on the D2-brane is replaced by a scalar field in the light-cone Hamiltonian. We also present a matrix model by regularizing (quantizing) 2-brane theory.
AdS/QCD at finite density and temperature
Kim, Y., E-mail: ykim@apctp.org [Pohang University of Science and Technology, Asia Pacific Center for Theoretical Physics and Department of Physics (Korea, Republic of)
2012-07-15
We review some basics of AdS/QCD following a non-standard path and list a few results from AdS/QCD or holographic QCD. The non-standard path here is to use the analogy of the way one obtains an effective model of QCD like linear sigma model and the procedure to construct an AdS/QCD model based on the AdS/CFT dictionary.
Categorization of Display Ads using Image and Landing Page Features
Massachusetts at Amherst, University of
Categorization of Display Ads using Image and Landing Page Features Andrew Kae Department the problem of automatically categorizing display ad images into a taxonomy of relevant interest categories. In particu- lar, we focus on the efficacy of using image features extracted by OCR techniques from the ad
Google's Auction for Radio and TV Ads Preliminary version
Cortes, Corinna
Google's Auction for Radio and TV Ads Preliminary version Noam Nisan Jason Bayer Deepak Chandra Tal. Abstract This document describes the auction system used by Google for allocation and pricing of TV ads and Radio ads. It is based on a simultaneous ascending auction, and has been in use since September 2008. 0
New Stochastic Algorithms for Placing Ads in Sponsored Search
Feuerstein, Esteban
New Stochastic Algorithms for Placing Ads in Sponsored Search Esteban Feuerstein Depto. de@baeza.cl ABSTRACT We introduce a family of algorithms for the selection of ads in sponsored search that intends to increase ad diversity while not significantly reducing revenue and maintaining an incentive for advertisers
Review of AdS/CFT Integrability, Chapter IV.3: N=6 Chern-Simons and Strings on AdS4xCP3
Thomas Klose
2012-03-27
We review the duality and integrability of N=6 superconformal Chern-Simons theory in three dimensions and IIA superstring theory on the background AdS4xCP3. We introduce both of these models and describe how their degrees of freedom are mapped to excitations of a long-range integrable spin-chain. Finally, we discuss the properties of the Bethe equations, the S-matrix and the algebraic curve that are special to this correspondence and differ from the case of N=4 SYM theory and strings on AdS5xS5.
Vacuum densities for a thick brane in AdS spacetime
A. A. Saharian; A. L. Mkhitaryan
2007-10-18
For a massive scalar field with general curvature coupling parameter we evaluate Wightman function, vacuum expectation values of the field square and the energy-momentum tensor induced by a $Z_{2}$-symmetric brane with finite thickness located on $(D+1)$-dimensional AdS bulk. For the general case of static plane symmetric interior structure the expectation values in the region outside the brane are presented as the sum of free AdS and brane induced parts. For a conformally coupled massless scalar the brane induced part in the vacuum energy-momentum tensor vanishes. In the limit of strong gravitational fields the brane induced parts are exponentially suppressed for points not too close to the brane boundary. As an application of general results a special model is considered in which the geometry inside the brane is a slice of the Minkowski spacetime orbifolded along the direction perpendicular to the brane. For this model the Wightman function, vacuum expectation values of the field square and the energy-momentum tensor inside the brane are evaluated. It is shown that for both minimally and conformally coupled scalar fields the interior vacuum forces acting on the brane boundaries tend to decrease the brane thickness.
Quartic AdS Interactions in Higher-Spin Gravity from Conformal Field Theory
Bekaert, Xavier; Ponomarev, Dmitry; Sleight, Charlotte
2015-01-01
Clarifying the locality properties of higher-spin gravity is a pressing task, but notoriously difficult due to the absence of a weakly-coupled flat regime. The simplest non-trivial case where this question can be addressed is the quartic self-interaction of the AdS scalar field present in the higher-spin multiplet. We investigate this issue in the context of the holographic duality between the minimal bosonic higher-spin theory on AdS$_4$ and the free $O\\left(N\\right)$ vector model in three dimensions. In particular, we determine the exact explicit form of the derivative expansion of the bulk scalar quartic vertex. The quartic vertex is obtained from the field theory four-point function of the operator dual to the bulk scalar, by making use of our previous results for the Witten diagrams of higher-spin exchanges. This is facilitated by establishing the conformal block expansions of both the boundary four-point function and the dual bulk Witten diagram amplitudes. We show that the vertex we find satisfies a ge...
Geometric free energy of toric AdS4/CFT3 models
Sangmin Lee; Daisuke Yokoyama
2015-01-22
We study the supersymmetric free energy of three dimensional Chern-Simons-matter theories holographically dual to AdS$_4$ times toric Sasaki-Einstein seven-manifolds. In the large $N$ limit, we argue that the square of the free energy can be written as a quartic polynomial of trial R-charges. The coefficients of the polynomial are determined geometrically from the toric diagrams. We present the coefficients of the quartic polynomial explicitly for generic toric diagrams with up to 6 vertices, and some particular diagrams with 8 vertices. Decomposing the trial R-charges into mesonic and baryonic variables, and eliminating the baryonic ones, we show that the quartic polynomial reproduces the inverse of the Martelli-Sparks-Yau volume function. On the gravity side, we explore the possibility of using the same quartic polynomial as the prepotential in the AdS gauged supergravity. Comparing Kaluza-Klein gravity and gauged supergravity descriptions, we find perfect agreement in the mesonic sector but some discrepancy in the baryonic sector.
Emergent IR dual 2d CFTs in charged AdS5 black holes
Jan de Boer; Maria Johnstone; M. M. Sheikh-Jabbari; Joan Simon
2011-12-20
We study the possible dynamical emergence of IR conformal invariance describing the low energy excitations of near-extremal R-charged global AdS5 black holes. We find interesting behavior especially when we tune parameters in such a way that the relevant extremal black holes have classically vanishing horizon area, i.e. no classical ground-state entropy, and when we combine the low energy limit with a large N limit of the dual gauge theory. We consider both near-BPS and non-BPS regimes and their near horizon limits, emphasize the differences between the local AdS3 throats emerging in either case, and discuss potential dual IR 2d CFTs for each case. We compare our results with the predictions obtained from the Kerr/CFT correspondence, and obtain a natural quantization for the central charge of the near-BPS emergent IR CFT which we interpret in terms of the open strings stretched between giant gravitons.
Quantum compositeness of gravity: black holes, AdS and inflation
Dvali, Gia; Gomez, Cesar E-mail: cesar.gomez@uam.es
2014-01-01
Gravitational backgrounds, such as black holes, AdS, de Sitter and inflationary universes, should be viewed as composite of N soft constituent gravitons. It then follows that such systems are close to quantum criticality of graviton Bose-gas to Bose-liquid transition. Generic properties of the ordinary metric description, including geodesic motion or particle-creation in the background metric, emerge as the large-N limit of quantum scattering of constituent longitudinal gravitons. We show that this picture correctly accounts for physics of large and small black holes in AdS, as well as reproduces well-known inflationary predictions for cosmological parameters. However, it anticipates new effects not captured by the standard semi-classical treatment. In particular, we predict observable corrections that are sensitive to the inflationary history way beyond last 60 e-foldings. We derive an absolute upper bound on the number of e-foldings, beyond which neither de Sitter nor inflationary Universe can be approximated by a semi-classical metric. However, they could in principle persist in a new type of quantum eternity state. We discuss implications of this phenomenon for the cosmological constant problem.
Wilson Loops in 3d QFT from D-branes in AdS(4) x CP**3
J. Kluson; Kamal L. Panigrahi
2009-03-09
We study the Wilson loops and defects in the three dimensional QFT from the D-branes in the AdS(4) x CP**3 geometry. We find out explicit D-brane configurations in the bulk which correspond to both straight and circular Wilson lines extended to the boundary of AdS(4). We analyze critically the role of boundary contributions to the D2-branes with various topology and to the fundamental string actions.
Adding Gauge Fields to Kaplan's Fermions
T. Blum; Leo Karkkainen
1993-12-10
We experiment with adding dynamical gauge field to Kaplan (defect) fermions. In the case of U(1) gauge theory we use an inhomogenous Higgs mechanism to restrict the 3d gauge dynamics to a planar 2d defect. In our simulations the 3d theory produce the correct 2d gauge dynamics. We measure fermion propagators with dynamical gauge fields. They posses the correct chiral structure. The fermions at the boundary of the support of the gauge field (waveguide) are non-chiral, and have a mass two times heavier than the chiral modes. Moreover, these modes cannot be excited by a source at the defect; implying that they are dynamically decoupled. We have also checked that the anomaly relation is fullfilled for the case of a smooth external gauge field. This is an uuencoded ps-file. Use 'uudecode hepchiral.ps.Z' and 'uncompress hepchiral.ps.Z' to produce the psfile.
Scannell, Kevin Patrick
that compact oriented orthochronous 2 + 1 AdS spacetime with non-empty spacelike boundary S a product S × [0, 1] and embeds in a domain of dependence. Is it possible to construct a singular AdS manifold with more than two constant curvature spacetime. (3) (Schlenker) Let M be a compact AdS cone manifold with m singular curves
AdS$_4$ solutions of massive IIA from dyonic ISO(7) supergravity
Oscar Varela
2015-09-23
Explicit formulae are given for the consistent truncation of massive type IIA supergravity on the six-sphere to the SU(3)--invariant sector of $D=4$ ${\\cal N}=8$ supergravity with dyonic ISO(7) gauging. These formulae are then used to construct AdS$_4$ solutions of massive type IIA via uplift on $S^6$ of the critical points of the $D=4$ supergravity with at least SU(3) symmetry. We find a new ${\\cal N}=1$ solution with SU(3) symmetry, a new non-supersymmetric solution with SO(6) symmetry, and recover previously known solutions. We quantise the fluxes, calculate the gravitational free energies of the solutions and discuss the stability of the non-supersymmetric ones. Among these, only a (previously known) G$_2$--invariant solution is found to be stable.
AdS$_4$ solutions of massive IIA from dyonic ISO(7) supergravity
Varela, Oscar
2015-01-01
Explicit formulae are given for the consistent truncation of massive type IIA supergravity on the six-sphere to the SU(3)--invariant sector of $D=4$ ${\\cal N}=8$ supergravity with dyonic ISO(7) gauging. These formulae are then used to construct AdS$_4$ solutions of massive type IIA via uplift on $S^6$ of the critical points of the $D=4$ supergravity with at least SU(3) symmetry. We find a new ${\\cal N}=1$ solution with SU(3) symmetry, a new non-supersymmetric solution with SO(6) symmetry, and recover previously known solutions. We quantise the fluxes, calculate the gravitational free energies of the solutions and discuss the stability of the non-supersymmetric ones. Among these, only a (previously known) G$_2$--invariant solution is found to be stable.
Dyonic AdS_4 black hole entropy and attractors via entropy function
Goulart, Prieslei
2015-01-01
Using the Sen's entropy function formalism, we compute the entropy for the extremal dyonic black hole solutions of theories in the presence of dilaton field coupled to the field strength and a dilaton potential. We solve the attractor equations analytically and determine the near horizon metric, the value of the scalar fields and the electric field on the horizon, and consequently the entropy of these black holes. The attractor mechanism plays a very important role for these systems, and after studying the simplest systems involving dilaton fields, we propose a general ansatz for the value of the scalar field on the horizon, which allows us to solve the attractor equations for gauged supergravity theories in AdS_4 spaces.
Quasinormal modes and holographic correlators in a crunching AdS geometry
Kumar, S Prem
2015-01-01
We calculate frequency space holographic correlators in an asymptotically AdS crunching background, dual to a relevant deformation of the M2-brane CFT placed in de Sitter spacetime. For massless bulk scalars, exploiting the connection to a solvable supersymmetric quantum mechanical problem, we obtain the exact frequency space correlator for the dual operator in the deformed CFT. Controlling the shape of the crunching surface in the Penrose diagram by smoothly dialling the deformation from zero to infinity, we observe that in the large deformation limit the Penrose diagram becomes a `square', and the exact holographic correlators display striking similarities to their counterparts in the BTZ black hole and its higher dimensional generalisations. We numerically determine quasinormal poles for relevant and irrelevant operators, and find an intricate pattern of these in the complex frequency plane. In the case of relevant operators, the deformation parameter has an infinite sequence of critical values, each one c...
The holographic superconductors in higher-dimensional AdS soliton
Chong Oh Lee
2012-07-30
We explore the behaviors of the holographic superconductors at zero temperature for a charged scalar field coupled to a Maxwell field in higher-dimensional AdS soliton spacetime via analytical way. In the probe limit, we obtain the critical chemical potentials increase linearly as a total dimension $d$ grows up. We find that the critical exponent for condensation operator is obtained as 1/2 independently of $d$, and the charge density is linearly related to the chemical potential near the critical point. Furthermore, we consider a slightly generalized setup the Einstein-Power-Maxwell field theory, and find that the critical exponent for condensation operator is given as $1/(4-2n)$ in terms of a power parameter $n$ of the Power-Maxwell field, and the charge density is proportional to the chemical potential to the power of $1/(2-n)$.
Emerging Non-Anomalous Baryonic Symmetries in the AdS_5/CFT_4 Correspondence
Nessi Benishti
2011-06-06
We study the breaking of baryonic symmetries in the AdS_5/CFT_4 correspondence for D3 branes at Calabi-Yau three-fold singularities. This leads, for particular VEVs, to the emergence of non-anomalous baryonic symmetries during the renormalization group flow. We claim that these VEVs correspond to critical values of the B-field moduli in the dual supergravity backgrounds. We study in detail the C^3/Z_3 orbifold, the cone over F_0 and the C^3/Z_5 orbifold. For the first two examples, we study the dual supergravity backgrounds that correspond to the breaking of the emerging baryonic symmetries and identify the expected Goldstone bosons and global strings in the infra-red. In doing so we confirm the claim that the emerging symmetries are indeed non-anomalous baryonic symmetries.
Emergent Space and the Example of AdS_5XS^5
Frank Ferrari
2013-05-06
We explain how to build field theoretic observables from which the geometrical properties of a dual holographic formulation can be read off straightforwardly. In some cases this construction yields explicit and calculable models of emergent space. We illustrate the idea on the type IIB background generated by N D3-branes in the near horizon limit, for which a full derivation from first principles can be presented. The six transverse dimensions emerge at large N and we find the full AdS_5XS^5 metric and self-dual Ramond-Ramond field strength on the resulting ten dimensional space-time, with the correct radii and quantization law. We briefly discuss possible applications and generalizations.
Conformal Transformations and Strings for an Accelerating Quark-Antiquark Pair in AdS3
Shijong Ryang
2014-12-08
From a simple moving open string solution dual to a moving heavy quark with constant velocity in the Poincare AdS_3 spacetime, we construct an accerlerating open string solution dual to a heavy quark-antiquark pair accelerated in opposite directions by performing the three mappings such as the SL(2,R)_L x SL(2,R)_R isometry transformation, the special conformal transformation and the conformal SO(2,2) transformation. Using the string sigma model action we construct two open string solutions staying in two different regions whose dividing line is associated with the event horizon appeared on the string worldsheet and obtain the accelerating open string solution by gluing two such solutions.
Semiclassical Strings in Electric and Magnetic Fields Deformed $AdS_5 \\times S^5$ Spacetimes
Wung-Hong Huang
2006-01-06
We first apply the transformation of mixing azimuthal and internal coordinate or mixing time and internal coordinate to the 11D M-theory with a stack N M2-branes to find the spacetime of a stack of N D2-branes with magnetic or electric flux in 10 D IIA string theory, after the Kaluza-Klein reduction. We then perform the T duality to the spacetime to find the background of a stack of N D3-branes with magnetic or electric flux. In the near-horizon limit the background becomes the magnetic or electric field deformed $AdS_5 \\times S^5$. We adopt an ansatz to find the classical string solution which is rotating in the deformed $S^5$ with three angular momenta in the three rotation planes. The relations between the classical string energy and its angular momenta are found and results show that the external magnetic and electric fluxes will increase the string energy. Therefore, from the AdS/CFT point of view, the corrections of the anomalous dimensions of operators in the dual SYM theory will be positive. We also investigate the small fluctuations in these solutions and discuss the effects of magnetic and electric fields on the stability of these classical rotating string solutions. Finally, we find the possible solutions of string pulsating on the deformed spacetimes and show that the corrections to the anomalous dimensions of operators in the dual SYM theory are non-negative.
Zhou, Ping
2008-01-01
Transmission Strategies for Wireless Devices,” in Proc. ofand Power Control for Wireless Ad-hoc Networks," in Proc. offor ad hoc mobile wireless networks," IEEE Personal
Buehrer, R. Michael
What's in an ad? Print ads generally have four written parts -- headline, support copy, call. Strategy and copy · The most important step is to set a single objective for the ad. Are you featuring to get the attention of your reader. Your ad's headline is often the only part of an ad that is read
Developing Louisiana's Forest Products Industry: Adding Value for the Future
of a manufacturingThe increased value at each stage of a manufacturing assembly processassembly process Those and necessaryimportant and necessary Addition of net economic valueAddition of net economic value Value can be added through manufacturing orValue can be added through manufacturing or marketingmarketing Why Add Value
Projection from Yang-Mills Geometry to AdS Space
B. E. Eichinger
2015-01-22
The geometry that yields the gauge potential and curvature form of Yang-Mills theory is known to be $Sp(2)/Sp(1)\\times Sp(1)\\sim S^4$. The projective metric for this space will be constructed and the curvature tensor will be shown to consist of both self-dual and anti-self-dual components. In the central projection, one hemisphere of $S^4$ is mapped onto the other, such that one hemisphere, excluding the equator, is equivalent to a four dimensional ball. This enables a mapping between the compact geometry of YM theory and relativity, with the double cover of the equator mapping to infinity in the anti-de Sitter (AdS) space. By interpreting the YM geometry (instanton) as the space of interactions between two particles it is suggested that the $Sp(2)/Sp(1)\\times Sp(1)$ YM quaternionic geometry can be generalized to $n$ fermions, each having an $Sp(1)\\sim SU(2)$ gauge group.
Emergent AdS3 and BTZ Black Hole from Weakly Interacting Hot 2d CFT
Soo-Jong Rey; Yasuaki Hikida
2006-05-02
We investigate emergent holography of weakly coupled two-dimensional hyperK\\"ahler sigma model on cotangent bundle of (N-1)-dimensional complex projective space at zero and finite temperature. The sigma model is motivated by the spacetime conformal field theory dual to the near-horizon geometry of Q1 D1-brane bound to Q5 D5-brane wrapped on four-torus times circle, where N = Q1*Q5. The sigma model admits nontrivial instanton for all N greater than or equal to 2, which serves as a local probe of emergent holographic spacetime. We define emergent geometry of the spacetime as that of instanton moduli space via Hitchin's information metric. At zero temperature, we find that emergent geometry is AdS3. At finite temperature, time-periodic instanton is mappable to zero temperature instanton via conformal transformation. Utilizing the transformation, we show that emergent geometry is precisely that of the non-extremal, non-rotating BTZ black hole.
New Formulation of the Type IIB Superstring Action in $AdS_5 \\times S^5$
John H. Schwarz
2015-06-25
Previous studies of the type IIB superstring in an ${AdS_5 \\times S^5}$ background are based on a description of the superspace geometry as the quotient space $PSU(2,2|4)/SO(4,1) \\times SO(5)$. This paper develops an alternative approach in which the Grassmann coordinates provide a nonlinear realization of $PSU(2,2|4)$ based on the quotient space $PSU(2,2|4)/SU(2,2) \\times SU(4)$, and the bosonic coordinates are described as a submanifold of $SU(2,2) \\times SU(4)$. This formulation keeps all bosonic symmetries manifest, and it provides the complete dependence on the Grassmann coordinates in terms of simple analytic expressions. It is used to construct the superstring world-sheet action in a form in which the $PSU(2,2|4)$ symmetry is manifest and kappa symmetry can be established. This formulation might have some advantages compared to previous ones, but this remains to be demonstrated.
Characteristic length of an AdS/CFT superconductor
Kengo Maeda; Takashi Okamura
2008-10-30
We investigate in more detail the holographic model of a superconductor recently found by Hartnoll, Herzog, and Horowitz [Phys. Rev. Lett. 101, 031601], which is constructed from a condensate of a charged scalar field in AdS_4-Schwarzschild background. By analytically studying the perturbation of the gravitational system near the critical temperature T_c, we obtain the superconducting coherence length proportional to 1/\\sqrt{1-T/T_c} via AdS/CFT correspondence. By adding a small external homogeneous magnetic field to the system, we find that a stationary diamagnetic current proportional to the square of the order parameter is induced by the magnetic field. These results agree with Ginzburg-Landau theory and strongly support the idea that a superconductor can be described by a charged scalar field on a black hole via AdS/CFT duality.
New $AdS_3 \\times S^2$ T-duals with $\\mathcal{N} = (0,4)$ supersymmetry
Lozano, Yolanda; Montero, Jesús; Colgáin, Eoin Ó
2015-01-01
It is well known that Hopf-fibre T-duality and uplift takes the D1-D5 near-horizon into a class of $AdS_3 \\times S^2$ geometries in 11D where the internal space is a Calabi-Yau three-fold. Moreover, supersymmetry dictates that Calabi-Yau is the only permissible $SU(3)$-structure manifold. Generalising this duality chain to non-Abelian isometries, a strong parallel exists, resulting in the first explicit example of a class of $AdS_3 \\times S^2$ geometries with $SU(2)$-structure. Furthermore, the non-Abelian T-dual of $AdS_3 \\times S^3 \\times S^3 \\times S^1$ results in a new supersymmetric $AdS_3 \\times S^2$ geometry, which falls outside of all known classifications. We explore the basic properties of the holographic duals associated to the new backgrounds. We compute the central charges and show that they are compatible with a large $\\mathcal{N}=4$ superconformal algebra in the infra-red.
New $AdS_3 \\times S^2$ T-duals with $\\mathcal{N} = (0,4)$ supersymmetry
Yolanda Lozano; Niall T. Macpherson; Jesús Montero; Eoin Ó Colgáin
2015-07-09
It is well known that Hopf-fibre T-duality and uplift takes the D1-D5 near-horizon into a class of $AdS_3 \\times S^2$ geometries in 11D where the internal space is a Calabi-Yau three-fold. Moreover, supersymmetry dictates that Calabi-Yau is the only permissible $SU(3)$-structure manifold. Generalising this duality chain to non-Abelian isometries, a strong parallel exists, resulting in the first explicit example of a class of $AdS_3 \\times S^2$ geometries with $SU(2)$-structure. Furthermore, the non-Abelian T-dual of $AdS_3 \\times S^3 \\times S^3 \\times S^1$ results in a new supersymmetric $AdS_3 \\times S^2$ geometry, which falls outside of all known classifications. We explore the basic properties of the holographic duals associated to the new backgrounds. We compute the central charges and show that they are compatible with a large $\\mathcal{N}=4$ superconformal algebra in the infra-red.
arXiv:hep-th/0204081v422Jan2003 On the Geometry and Mass of Static, Asymptotically AdS
Galloway, Greg
arXiv:hep-th/0204081v422Jan2003 On the Geometry and Mass of Static, Asymptotically AdS Spacetimes, and the Uniqueness of the AdS Soliton G.J. Gallowaya , S. Suryab,c , E. Woolgarc,b a Dept. of Mathematics, University theorem is a unique- ness theorem for the negative mass AdS soliton spacetime. This result lends support
Boundary values of mixed-symmetry massless fields in AdS space
Chekmenev, Alexander
2015-01-01
We elaborate on the ambient space approach to boundary values of $AdS_{d+1}$ gauge fields and apply it to massless fields of mixed-symmetry type. In the most interesting case of odd-dimensional bulk the respective leading boundary values are conformal gauge fields subject to the invariant equations. As a byproduct our approach gives a manifestly conformal and gauge covariant formulation for these fields. Although such formulation employs numerous auxiliary fields, it comes with a systematic procedure for their elimination that results in a more concise formulation involving only a reasonable set of auxiliaries, which eventually (at least in principle) can be reduced to the minimal formulation in terms of the irreducible Lorentz tensors. The simplest mixed-symmetry field, namely, the rank-3 tensor associated to the two-row Young diagram, is considered in some details.
Noncommutative Extension of AdS-CFT and Holographic Superconductors
Souvik Pramanik; Sudipta Das; Subir Ghosh
2015-02-13
In this Letter, we consider a Non-Commutative (NC) extension of AdS-CFT correspondence and its effects on holographic superconductors. NC corrections are incorporated via the NC generalization of Schwarzschild black hole metric in AdS with the probe limit. We study NC effects on the relations connecting the charge density and the critical temperature of the Holographic Superconductors. Furthermore, condensation operator of the superconductor has been analyzed. Our results suggest that generically, NC effects increase the critical temperature of the holographic superconductor.
Investigating AdS/QCD duality through scalar glueball correlators
P. Colangelo; F. De Fazio; F. Jugeau; S. Nicotri
2009-09-03
We investigate AdS/QCD duality for the two-point correlation function of the lowest dimension scalar glueball operator, in the case of the IR soft wall model. We point out the role of the boundary conditions for the bulk-to-boundary propagator in determining the gluon condensates. We show that a low energy QCD theorem can be obtained within the AdS approach, together with a gluon condensate close to the commonly accepted value and robust against perturbation of the background dilaton field.
Towards a consistent AdS/QCD dictionary
Frederic Jugeau
2009-03-01
This note focuses on the large-N behaviour of the Hard Wall model of QCD and clarifies the AdS/QCD dictionary formulated on the basis of the AdS/CFT correspondence. It is shown how short-distance studies performed in the framework of the AdS/QCD Soft Wall model allow one to determine unambiguously the chiral symmetry breaking function in the Hard Wall model. Especially, the different forms of the field/operator prescription are emphasized. The large-N behaviour of the Hard Wall model is then checked considering the vector and gravitational form factors of the pion in the chiral limit.
Thermodynamics of Charged AdS Black Holes in Extended Phases Space via M2-branes Background
Chabab, M; Masmar, K
2015-01-01
Motivated by a recent work on asymptotically Ad$S_4$ black holes in M-theory, we investigate both thermodynamics and thermodynamical geometry of Raissner-Nordstrom-AdS black holes from M2-branes. More precisely, we study AdS black holes in $AdS_{4}\\times S^{7}$, with the number of M2-branes interpreted as a thermodynamical variable. In this context, we calculate various thermodynamical quantities including the chemical potential, and examine their phase transitions along with the corresponding stability behaviors. In addition, we also evaluate the thermodynamical curvatures of the Weinhold, Ruppeiner and Quevedo metrics for M2-branes geometry to study the stability of such black object. We show that the singularities of these scalar curvature's metrics reproduce similar stability results obtained by the phase transition program via the heat capacities in different ensembles either when the number of the M2 branes or the charge are held fixed. Also, we note that all results derived in [1] are recovered in the ...
Ad-nilpotent ideals of complex and real reductive groups
Fang, Chuying
2007-01-01
In this thesis, we study ad-nilpotent ideals and its relations with nilpotent orbits, affine Weyl groups, sign types and hyperplane arrangements. This thesis is divided into three parts. The first and second parts deal ...
Topping Turbines: Adding New Life to Older Plants
Cadrecha, M.
1984-01-01
An existing power plant can be repowered at a modest investment cost through a topping turbine installation. Essentially, this consists of replacing the existing old, low pressure boilers with new, high pressure boilers and adding a new, high...
Yang, Sung-Bong
. A F 1 . #12;132 9 2 2011 02 2 . 100, 1500J F C, G, K . . Hybrid . . [8]. 40% 20% . 30% 30% ` ' 30% ` ' . 100% 3,000J, 100J 30% 30% 2,100J, 1,500J, 30% 900J 3 . 3 900J, 1,500J, 2,100J . 100J . 100 `MATLAB' . 1 MATLAB . `1' randn(100,1) 100 data `4.5', `7.5', `11.5' . 100 100 . 2 900J , 1,500J, 2,200J . MOB
Fighting Online Click-Fraud Using Bluff Ads
Haddadi, Hamed
2010-01-01
Online advertising is currently the greatest source of revenue for many Internet giants. The increased number of specialized websites and modern profiling techniques, have all contributed to an explosion of the income of ad brokers from online advertising. The single biggest threat to this growth, is however, click-fraud. Trained botnets and even individuals are hired by click-fraud specialists in order to maximize the revenue of certain users from the ads they publish on their websites, or to launch an attack between competing businesses. In this note we wish to raise the awareness of the networking research community on potential research areas within this emerging field. As an example strategy, we present Bluff ads; a class of ads that join forces in order to increase the effort level for click-fraud spammers. Bluff ads are either targeted ads, with irrelevant display text, or highly relevant display text, with irrelevant targeting information. They act as a litmus test for the legitimacy of the individual...
Chaotic strings in a near Penrose limit of AdS$_5\\times T^{1,1}$
Yuhma Asano; Daisuke Kawai; Hideki Kyono; Kentaroh Yoshida
2015-07-17
We study chaotic motions of a classical string in a near Penrose limit of AdS$_5\\times T^{1,1}$. It is known that chaotic solutions appear on $R\\times T^{1,1}$, depending on initial conditions. It may be interesting to ask whether the chaos persists even in Penrose limits or not. In this paper, we show that sub-leading corrections in a Penrose limit provide an unstable separatrix, so that chaotic motions are generated as a consequence of collapsed Kolmogorov-Arnold-Moser (KAM) tori. Our analysis is based on deriving a reduced system composed of two degrees of freedom by supposing a winding string ansatz. Then, we provide support for the existence of chaos by computing Poincare sections. In comparison to the AdS$_5\\times T^{1,1}$ case, we argue that no chaos lives in a near Penrose limit of AdS$_5\\times$S$^5$, as expected from the classical integrability of the parent system.
AdS/CFT and Exclusive Processes in QCD
Stanley J. Brodsky; Guy F. de Teramond
2007-09-13
The AdS/CFT correspondence between string theory in AdS space and conformal field theories in physical space-time leads to an analytic, semi-classical model for strongly-coupled QCD which has scale invariance and dimensional counting at short distances and color confinement at large distances. One can use holography to map the amplitude describing the hadronic state in the fifth dimension of Anti-de Sitter space to the light-front wavefunctions of hadrons in physical space-time, thus providing a relativistic description of hadrons in QCD at the amplitude level. In particular, we show that there is an exact correspondence between the fifth-dimensional coordinate of AdS space z and a specific impact variable zeta which measures the separation of the quark and gluonic constituents within the hadron in ordinary space-time. New relativistic light-front equations in ordinary space-time can then be derived which reproduce the results obtained using the 5-dimensional theory. The effective light-front equations possess elegant algebraic structures and integrability properties. This connection between the AdS and the light-front representations allows one to compute the analytic form of the frame-independent light-front wavefunctions, the fundamental entities which encode hadron properties and allow the computation of decay constants, form factors, deeply virtual Compton scattering, exclusive heavy hadron decays and other exclusive scattering amplitudes. As specific examples we compute the pion coupling constant and study the behavior of the pion form factor in the space and time-like regions. We also determine the Dirac form factors of the proton and neutron in the space-like region.
van Tiggelen, Bart
Exploiter Conclusion Annexes ANF Datacentre Monitoring Environnemental Ad-Hoc Jonathan Schaeffer jonathan
Comments on Cosmic Censorship in AdS/CFT
Hubeny, Veronika E.; Liu, Xiao; Rangamani, Mukund; Shenker, Stephen
2004-03-21
Recently Hertog, Horowitz, and Maeda (HHM) (hep-th/0310054) have proposed that cosmic censorship can be violated in the AdS/CFT context. They argue that for certain initial data there is insufficient energy available to make a black hole whose horizon is big enough to cloak the singularity that forms. We have investigated this proposal in the models HHM discuss and have thus far been unable to find initial data that provably satisfy this criterion, despite our development of an improved lower bound on the size of the singular region. This is consistent with recent numerical results (hep-th/0402109). For certain initial data, the energies of our configurations are not far above the lower bound on the requisite black hole mass, and so it is possible that in the exact time development naked singularities do form. We go on to argue that the finite radius cut-off AdS_5 situation discussed by HHM displays instabilities when the full 10D theory is considered. We propose an AdS_3 example that may well be free of this instability.
Comments on Cosmic Censorship in AdS/CFT
Hubeny, V.
2004-04-06
Recently Hertog, Horowitz, and Maeda (HHM) (hep-th/0310054) have proposed that cosmic censorship can be violated in the AdS/CFT context. They argue that for certain initial data there is insufficient energy available to make a black hole whose horizon is big enough to cloak the singularity that forms. We have investigated this proposal in the models HHM discuss and have thus far been unable to find initial data that provably satisfy this criterion, despite our development of an improved lower bound on the size of the singular region. This is consistent with recent numerical results (hep-th/0402109). For certain initial data, the energies of our configurations are not far above the lower bound on the requisite black hole mass, and so it is possible that in the exact time development naked singularities do form. We go on to argue that the finite radius cut-off AdS5 situation discussed by HHM displays instabilities when the full 10D theory is considered. We propose an AdS3 example that may well be free of this instability.
ADS-B benefits to general aviation and barriers to implementation
Kunzi, Fabrice
2011-01-01
Automatic Dependent Surveillance - Broadcast (ADS-B) will be the basis of the future surveillance system in the US. To achieve benefit from ADS-B, aircraft have to be equipped with ADS-B avionics across all stakeholders. ...
1 ADS1210, 1211 24-Bit ANALOG-TO-DIGITAL CONVERTER
Hochmuth, Olaff
® 1 ADS1210, 1211 ® ADS1210 ADS1211 24-Bit ANALOG-TO-DIGITAL CONVERTER FEATURES q DELTA-SIGMA A/D-OFF FREQUENCY UP TO 15.6kHz q INTERNAL/EXTERNAL REFERENCE q ON CHIP SELF-CALIBRATION q ADS1211 INCLUDES 4 CHANNEL MUX DESCRIPTION The ADS1210 and ADS1211 are precision, wide dynamic range, delta-sigma analog
No-carrier-added [1.sup.11 c]putrescine
McPherson, Daniel W. (Baltimore, MD); Fowler, Joanna S. (Bellport, NY); Wolf, Alfred P. (Setauket, NY)
1989-01-01
The invention relates to a new radiolabeled imaging agent, no-carrier-added [1-.sup.11 C]putrescine, and to the use of this very pure material as a radiotracer with positron emission tomography for imaging brain tumors. The invention further relates to the synthesis of no-carrier-added [1-.sup.11 C]putrescine based on the Michael addition of potassium .sup.11 C-labeled cyanide to acrylonitrile followed by reduction of the .sup.11 C-labeled dinitrile. The new method is rapid and efficient and provides radiotracer with a specific activity greater than 1.4 curies per millimol and in a purity greater than 95%.
Nucleon and flavor form factors in AdS/QCD
Chakrabarti, Dipankar
2013-01-01
The electromagnetic form factors for the nucleons are related with the GPDs by sum rules. Using the sum rules we calculate the valence GPDs for $u$ and $d$ quarks in a quark model using the lightfront wavefunctions for the nucleons obtained from AdS/QCD. The flavor decompositions of the nucleon form factors are also calculated from the GPDs in this model. We show that the nucleon form factors and their flavor decompositions calculated in AdS/QCD are in agreement with experimental data.
PERFORMANCE ENHANCEMENT TECHNIQUES FOR PHASED LOGIC CIRCUITS
Thornton, Mitchell
, these mechanims have been added to Phased Logic circuits by ad-hoc and manual means that require a designers
Non-extended phase space thermodynamics of Lovelock AdS black holes in grand canonical ensemble
Jie-Xiong Mo; Wen-Biao Liu
2015-03-06
Recently, extended phase space thermodynamics of Lovelock AdS black holes has been of great interest. To provide insight from a different perspective and gain a unified phase transition picture, non-extended phase space thermodynamics of $(n+1)$-dimensional charged topological Lovelock AdS black holes is investigated detailedly in the grand canonical ensemble. Specifically, the specific heat at constant electric potential is calculated and phase transition in the grand canonical ensemble is discussed. To probe the impact of the various parameters, we utilize the control variate method and solve the phase transition condition equation numerically for the case $k=1,-1$. There are two critical points for the case $n=6,k=1$ while there is only one for other cases. For $k=0$, there exists no phase transition point. To figure out the nature of phase transition in the grand canonical ensemble, we carry out an analytic check of the analog form of Ehrenfest equations proposed by Banerjee et al. It is shown that Lovelock AdS black holes in the grand canonical ensemble undergo a second order phase transition. To examine the phase structure in the grand canonical ensemble, we utilize the thermodynamic geometry method and calculate both the Weinhold metric and Ruppeiner metric. It is shown that for both analytic and graphical results that the divergence structure of the Ruppeiner scalar curvature coincides with that of the specific heat. Our research provides one more example that Ruppeiner metric serves as a wonderful tool to probe the phase structures of black holes.