Ad Hoc Curriculum Implementation Working Group Ad Hoc Working Group
Brown, Sally
Ad Hoc Curriculum Implementation Working Group MINUTES Ad Hoc Working Group 4 December 2002 Friedman on her visit next week. ONE CURRICULUM OR TWO? Information presented by Trudeau shows that PSE and other programs cannot be merged into a single curriculum. The Faculty Senate website states
Distributed services for mobile ad hoc networks
Cao, Guangtong
2005-11-01T23:59:59.000Z
A mobile ad hoc network consists of certain nodes that communicate only through wireless medium and can move arbitrarily. The key feature of a mobile ad hoc network is the mobility of the nodes. Because of the mobility, communication links form...
Distributed services for mobile ad hoc networks
Cao, Guangtong
2005-11-01T23:59:59.000Z
A mobile ad hoc network consists of certain nodes that communicate only through wireless medium and can move arbitrarily. The key feature of a mobile ad hoc network is the mobility of the nodes. Because of the mobility, communication links form...
Adaptive Scheduling in Ad Hoc and Cellular Wireless Networks
Tan, Choo Chin
2013-01-01T23:59:59.000Z
multicasting in energy-constrained wireless networks,” IEEEminimum-energy multicasting in wireless ad hoc networks,”minimum-energy multicasting in wireless ad hoc networks,” in
Distributed algorithms for mobile ad hoc networks
Malpani, Navneet
2001-01-01T23:59:59.000Z
We first present two new leader election algorithms for mobile ad hoc networks. The algorithms ensure that eventually each connected component of the topology graph has exactly one leader. The algorithms are based on a routing algorithm called TORA...
Virtual infrastructure for wireless ad hoc networks
Gilbert, Seth, 1976-
2007-01-01T23:59:59.000Z
One of the most significant challenges introduced by ad hoc networks is coping with the unpredictable deployment, uncertain reliability, and erratic communication exhibited by emerging wireless networks and devices. The ...
Clock synchronization for mobile ad hoc networks
Chandra, Rajan
2013-02-22T23:59:59.000Z
Time Protocol) used in wired networks (e.g. Internet) to Mobile Ad Hoc Networks (MANets). It may also be achieved by developing other algorithms that achieve clock synchronization and may be suitable for MANets. Using the Network Time Protocol (NTP...
Dynamic address allocation protocols for Mobile ad hoc networks
Patchipulusu, Praveena
2001-01-01T23:59:59.000Z
Address allocation is an important issue in Mobile ad hoc networks. This thesis proposes solutions to assign unique IP addresses to nodes participating in Mobile ad hoc networks and evaluates the proposed solutions. Address allocation protocols...
LEARNING-BASED ROUTE MANAGEMENT IN WIRELESS AD HOC NETWORKS
Littman, Michael L.
and Wade Trappe The nodes in a wireless ad hoc network must act as routers in a self-configuring network to shortest-path routing protocols for managing router congestion and noise in wireless ad hoc networks. iiLEARNING-BASED ROUTE MANAGEMENT IN WIRELESS AD HOC NETWORKS BY BRIAN RUSSELL A dissertation
Low-Interference Topology Control for Wireless Ad Hoc Networks
Li, Xiang-Yang
wireless ad hoc networks. Many aspects of the networking will affect the energy consumption of the wireless may cause larger energy consumption. In wireless ad hoc networks, each wireless device can selectively1 Low-Interference Topology Control for Wireless Ad Hoc Networks Kousha Moaveni-Nejad, Xiang
Approximate Minimum-Energy Multicasting in Wireless Ad Hoc Networks
Liang, Weifa
Approximate Minimum-Energy Multicasting in Wireless Ad Hoc Networks Weifa Liang, Senior Member, IEEE Abstract--A wireless ad hoc network consists of mobile nodes that are equipped with energy on energy conservation in wireless ad hoc networks have been conducted. For example, energy efficient
Adaptive Scheduling in Ad Hoc and Cellular Wireless Networks
Tan, Choo Chin
2013-01-01T23:59:59.000Z
organization wireless networks and wireless mobile ad-hocfor heterogeneous wireless network”, in Proc. of IEEER. Khalaf, “Ad hoc wireless networks with mobile backbones,”
Sen, Sevil
ITA CONFERENCE 1569048773 THREAT MODELLING FOR MOBILE AD HOC AND SENSOR NETWORKS 1 Threat Modelling. Chivers, Olwen Worthington and Pankaj Rohatgi Abstract-- This paper introduces a threat model for ad hoc and mobile ad hoc networks (MANETS). It identifies threat categories, modes of use, and a variety of threats
Money Market Mutual Funds: An Experiement in Ad Hoc Deregulation
Rosen, Kenneth T.; Katz, Lawrence
1981-01-01T23:59:59.000Z
of the market. A full deregulation of the deposit marketsity range. Full deregulation of financial institutions will,periment in ad hoc deregulation. -29- APPENDIX 1 . §Money
Maximizing the throughput of large ad hoc wireless networks
Hua, Yingbo; Huang, Yi; J, Garcia-Luna-Aceves J
2006-01-01T23:59:59.000Z
The transport capacity of wireless networks over fadingimprovement of ad hoc wireless networks using directionalThe capacity of wireless networks,” IEEE Trans. Inform.
Multipath Routing Based Secure Data Transmission in Ad Hoc Networks
Delgado-Frias, José G.
Multipath Routing Based Secure Data Transmission in Ad Hoc Networks Li Zhao and José G. Delgado in the networks. In this paper, we present and evaluate a scheme, in which multipath routing combined the single path DSR. Index Terms--security, data transmission, multipath routing, ad hoc networks I
Reception-Aware Power Control in Ad Hoc Mobile Networks
Mans, Bernard
Reception-Aware Power Control in Ad Hoc Mobile Networks Nirisha Shrestha and Bernard Mans Macquarie resource in ad hoc mobile networks, mak- ing power control a popular, yet crucial, technique. The network of power control non-trivial. For sake of simplicity, most existing power control protocols only consider
Poon, Chung Keung
________________________________________________________________________________ Topology Control of Ad Hoc Wireless Networks for Energy Efficiency Maggie X. Cheng, Member, IEEE, Mihaela of each wireless node such that the resulting network is connected and the total energy consumption the theoretical analysis. Index Terms--Multihop, ad hoc, wireless networks, energy efficiency, transmission power
Curriculum Revision REPORT OF AD HOC WORKING GROUP ON
Brown, Sally
Curriculum Revision REPORT OF AD HOC WORKING GROUP ON CURRICULUM REVISION (November 2002- March (2) Charge to Ad Hoc Working Group on Curriculum.............................. 12 (3) Materials;Curriculum Revision SUMMARY Curriculum transformation at the College of Forest Resources (CFR) is a response
Topology Control Protocols to Conserve Energy in Wireless Ad Hoc Networks
Xu, Ya; Bien, Solomon; Mori, Yutaka; Heidemann, John; Estrin, D
2003-01-01T23:59:59.000Z
Protocols to Conserve Energy in Wireless Ad Hoc Networks YaL. Tassiulas. Energy conserving routing in wireless ad-hocAdaptive Energy Conservation Protocols for Wireless Ad Hoc
The Capacityand Energy Efficiency of Wireless Ad Hoc Networks with MultipacketReception
Garcia-Luna-Aceves, J.J.
2008-01-01T23:59:59.000Z
per-joule capacity of energy-limited wireless networks. IEEECapacity and Energy Efficiency of Wireless Ad Hoc Networksplexity, and energy efficiency in random wireless ad hoc
Mobilized ad-hoc networks: A reinforcement learning approach
Chang, Yu-Han
2003-12-04T23:59:59.000Z
Research in mobile ad-hoc networks has focused on situations in which nodes have no control over their movements. We investigate an important but overlooked domain in which nodes do have control over their movements. ...
User level routing for mobile ad hoc networks
Virk, Navjot
2001-01-01T23:59:59.000Z
Many routing protocols have been proposed for mobile ad hoc networks. Traditionally routing protocols have been implemented in the kernel of the operating system. The main reasons for this are performance and security. This research explores...
Poster: -Graphs: Flexible Topology Control in Wireless Ad Hoc Networks
Williamson, Carey
Poster: -Graphs: Flexible Topology Control in Wireless Ad Hoc Networks Ashikur Rahman Department networks. Most algorithms strive to reduce energy consumption by cre- ating a sparse topology with few long of topologies and provides the flexibility to network
Truthful resource management in wireless ad hoc networks
Cai, Jianfeng
2005-11-01T23:59:59.000Z
In wireless mobile ad hoc networks (MANETs), cooperation cannot be an im- plicit assumption anymore. Each profit-oriented network node has the intention to be selfish due to limited resource possession. In this dissertation, we investigate...
Context-Aware Protocol Engines for Ad Hoc Networks
Garcia-Luna-Aceves, J.J.
2009-01-01T23:59:59.000Z
Context-Aware Protocol Engines for Ad Hoc Networks J. J.we call a context-aware protocol engine. With a CAPE, nodesthe context-aware protocol engine (CAPE) as an instantiation
Modular Anomaly Detection for Smartphone Ad hoc Communication
of the security solution is evaluated in a small testbed based on three Android-based handsets and a laptop a mobile ad hoc network (MANET). While intrusion detection in MANETs is typically evaluated with network simulators, we argue that it is important to implement and test the solutions in real de- vices to evaluate
An Energy Efficient Location Service for Mobile Ad Hoc etworks
Varela, Carlos
the distance traveled by the location update and query packets and, thus, at reducing the overall energy cost by the location update and query packets and, thus, to reduce the overall energy cost. 2 Energy Efficient LocationAn Energy Efficient Location Service for Mobile Ad Hoc etworks Zijian Wang1 , Eyuphan Bulut1
Cooperative Cache-Based Data Access in Ad Hoc Networks
Yener, Aylin
1 Cooperative Cache-Based Data Access in Ad Hoc Networks Guohong Cao, Liangzhong Yin and Chita R: Cooperative cache-based data access framework #12;6 Data Access Framework The cooperative cache-based data data authentication based on sensitivity. #12;16 Conclusion A cooperative cache-based data access
1 Antenna Beamforming and Power Control for Ad Hoc Networks
Ramanathan, Ram
1 Antenna Beamforming and Power Control for Ad Hoc Networks RAM RAMANATHAN BBN Technologies power, spreading code, and antenna beams. By controlling these transceiver parameters adaptively, coding, etc.) can also yield benefits, we shall focus on antenna and power control as they have been
A Power Control MAC Protocol for Ad Hoc Networks
A Power Control MAC Protocol for Ad Hoc Networks Eun-Sun Jung Dept. of Computer Science Texas A This paper presents a power control MAC protocol that al- lows nodes to vary transmit power level on a per control. The main idea of these power control schemes is to use different power lev- els for RTS
Smart Services for Ad Hoc Databases University of Washington
Matrajt, Graciela
data-base from lists of addresses of nearby schools, locations of resources (e.g., ambulances), and contact information for emergency workers. · A consulting business analyst assembles an ad hoc data- base of commercial database management systems are prohibitive, especially without access to dedicated IT staff
Reducing the Energy Drain in Multihop Ad Hoc Geraud Allard
Mans, Bernard
that save energy of nodes with low battery but also allow the network to handle more flows. I. INTRODUCTION-efficient routing for Multihop Ad Hoc Networks (MANET) look at extend- ing battery life by minimizing the cost's shortest path algorithm in which we integrate the notion of remaining energy in order to satisfy flow
Energy-Efficient Topology Control in Cooperative Ad Hoc Networks
Wang, Yu
Energy-Efficient Topology Control in Cooperative Ad Hoc Networks Ying Zhu, Minsu Huang, Siyuan Chen cooperative energy spanners in which the energy efficiency of individual paths are guaranteed. Both proposed of cooperative communication in various wireless network applications: energy efficient routing [23], [24], [25
Limited Flooding Protocol for Mobile Ad hoc Networks Mieso Denko
Goddard, Wayne
Limited Flooding Protocol for Mobile Ad hoc Networks Mieso Denko Department of Computing propose a multipath routing protocol called Limited Flooding. The protocol is fully reactive and does not entail the compu- tation of routing tables. It uses the basic features of flooding but restricts packet
TDROP: A routing protocol for physically hierarchical ad hoc mobile networks
Ahmed, Zaheer
2000-01-01T23:59:59.000Z
Many protocols for routing in mobile ad hoc networks have been proposed. None of these protocols differentiates mobile nodes based on their physical characteristics and also there is only one proposal for connecting ad hoc networks together to form...
TDROP: A routing protocol for physically hierarchical ad hoc mobile networks
Ahmed, Zaheer
2000-01-01T23:59:59.000Z
Many protocols for routing in mobile ad hoc networks have been proposed. None of these protocols differentiates mobile nodes based on their physical characteristics and also there is only one proposal for connecting ad hoc ...
Service Discovery in Mobile Ad Hoc Networks: A Field Theoretic Approach Vincent Lenders
Lenders, Vincent
Service Discovery in Mobile Ad Hoc Networks: A Field Theoretic Approach Vincent Lenders , Martin: {lenders, may, plattner}@tik.ee.ethz.ch Abstract Service discovery in mobile ad hoc networks is challeng
Spatial Interference Mitigation for Multiple Input Multiple Output Ad Hoc Networks: MISO Gains
Paris-Sud XI, Université de
Spatial Interference Mitigation for Multiple Input Multiple Output Ad Hoc Networks: MISO Gains beamforming for a multiple input single output (MISO) ad hoc network to increase the density of successful
Enhancing the Security of On-demand Routing in Ad Hoc Networks
California at Santa Cruz, University of
Enhancing the Security of On-demand Routing in Ad Hoc Networks Zhenjiang Li1 and J.J. Garcia, to be truly effective, communication over such networks should be secure. The attacks to an ad hoc network can Springer-Verlag Berlin Heidelberg 2005 #12;Enhancing the Security of On-demand Routing in Ad Hoc Networks
Wireless ad hoc networks Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale
Gao, Jie
are not flexible. Vulnerable to attacks. · Ad hoc networks· Ad hoc networks Flexible, easy to deploy, cheaper · Optimal power assignment /transmission range · Optimal scheduling & multi-hop routing · Node are staticWireless ad hoc networks Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale #12
Asplund et al. Wireless Ad Hoc Dissemination for Search and Rescue Proceedings of the 7th
Asplund et al. Wireless Ad Hoc Dissemination for Search and Rescue Proceedings of the 7th International ISCRAM Conference Seattle, USA, May 2010 1 Wireless Ad Hoc Dissemination for Search and Rescue communication and Internet connectivity. Even if we consider wireless ad hoc communication as a means
Reliable and Energy-Efficient Routing for Static Wireless Ad Hoc Networks with Unreliable Links
Wang, Yu
Reliable and Energy-Efficient Routing for Static Wireless Ad Hoc Networks with Unreliable Links. In this paper, we address the problem of energy efficient reliable routing for wireless ad hoc networks communication, energy efficiency. Ç 1 INTRODUCTION WIRELESS ad hoc networks draw lots of attentions in recent
Low-complexity energy-efficient broadcasting in wireless ad-hoc networks using network coding
Chen, Yuanzhu Peter
Low-complexity energy-efficient broadcasting in wireless ad-hoc networks using network coding J energy broadcasting in ad-hoc wireless networks is NP-complete [3] and a large number of approximation of minimizing the energy per bit when multicasting in an ad-hoc wireless network. An alternative formulation
A Platform for Implementing Secure Wireless Ad Hoc Networks
Farkas, Gyula; Haller, Piroska
2010-01-01T23:59:59.000Z
We propose a new platform for implementing secure wireless ad hoc networks. Our proposal is based on a modular architecture, with the software stack constructed directly on the Ethernet layer. Within our platform we use a new security protocol that we designed to ensure mutual authentication between nodes and a secure key exchange. The correctness of the proposed security protocol is ensured by Guttman's authentication tests.
Name Service in IPv6 Mobile Ad-hoc Network connected to the Internet
Jeong, Jaehoon "Paul"
Name Service in IPv6 Mobile Ad-hoc Network connected to the Internet Jaehoon Jeong, Jungsoo Park-hoc network connected to the Internet. The DNS resolution of DNS names of mobile nodes within mobile ad-hoc network is performed by multicast DNS and that of DNS names of nodes in the Internet is performed through
A Multiobjective Performance Evaluation Framework for Routing in Wireless Ad Hoc
Jaffrès-Runser, Katia
network when delay, robustness and energy are considered. I. INTRODUCTION Wireless ad hoc and sensor to transmission delay [8], energy consumption [9] or fairness [10] are added on top of its main design goalA Multiobjective Performance Evaluation Framework for Routing in Wireless Ad Hoc Networks Katia
Clique-Based Randomized Multiple Access for Energy-Efficient Wireless Ad Hoc Networks
Clique-Based Randomized Multiple Access for Energy-Efficient Wireless Ad Hoc Networks Paul G. INTRODUCTION WIRELESS sensor networks, as well as other ad-hoc sys- tems that network energy-limited nodes are often traded for energy efficiency in the latter. MAC (media access control) protocols for wireless ad
FaultTolerant Distributed Algorithms in Sparse Ad Hoc Wireless Networks
FaultTolerant Distributed Algorithms in Sparse Ad Hoc Wireless Networks (SPAWN) BETTINA WEISS communication technologies, wireless ad hoc networks are increasingly commonplace nowadays. Spontaneous (``ad wireless sensor networks and disaster area communication systems. It is also a major enabling technology
Rethinking Information Theory for Mobile Ad Hoc Networks
Andrews, Jeff; Haenggi, Martin; Berry, Randy; Jafar, Syed; Guo, Dongning; Shakkottai, Sanjay; Heath, Robert; Neely, Michael; Weber, Steven; Yener, Aylin
2007-01-01T23:59:59.000Z
The subject of this paper is the long-standing open problem of developing a general capacity theory for wireless networks, particularly a theory capable of describing the fundamental performance limits of mobile ad hoc networks (MANETs). A MANET is a peer-to-peer network with no pre-existing infrastructure. MANETs are the most general wireless networks, with single-hop, relay, interference, mesh, and star networks comprising special cases. The lack of a MANET capacity theory has stunted the development and commercialization of many types of wireless networks, including emergency, military, sensor, and community mesh networks. Information theory, which has been vital for links and centralized networks, has not been successfully applied to decentralized wireless networks. Even if this was accomplished, for such a theory to truly characterize the limits of deployed MANETs it must overcome three key roadblocks. First, most current capacity results rely on the allowance of unbounded delay and reliability. Second, ...
Interes'ng-Phrase Mining for Ad-Hoc Text Analy'cs
Interes'ng-Phrase Mining for Ad-Hoc Text Analy'cs Klaus Berberich (kberberi Weikum (originally presented at VLDB 2010) #12;Interes'ng-Phrase Mining for Ad-Hoc Text.g., iden'fy characteris'c quota'ons by barack obama) 2 / 27 #12;Interes'ng-Phrase Mining
On the Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks
Chen, Ing-Ray
to that of the experimental testbed. Simulations of larger (50-node) ad hoc networks indicate that monitoring-based intrusion evaluations of IDTs are based on small testbed configura- tions, or simulations which do not incorporate any on monitoring- based intrusion detection for ad hoc networks. Experimental results show that, even for a simple
Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls
Kasera, Sneha Kumar
Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls Jun Cheol Park-- We propose to secure ad hoc networks against data injection attacks by placing firewall functionality] simulations. Our results show that our algorithm can find near-optimal solutions. Based on a simple analysis
Fuzzy Trust Recommendation Based on Collaborative Filtering for Mobile Ad-hoc Networks
Zhang, Yi
Fuzzy Trust Recommendation Based on Collaborative Filtering for Mobile Ad-hoc Networks Junhai Luo1--Mobile ad-hoc networks (MANETs) are based on the cooperative and trust characteristic of the mobile nodes focused on building up trust among distributed network nodes to simulate cooperation and improving
A Trust-based Architecture for Managing Certificates in Vehicular Ad hoc Networks
Paris-Sud XI, Université de
propose a secure and distributed public key infrastructure for vehicular ad hoc networks VANETs basedA Trust-based Architecture for Managing Certificates in Vehicular Ad hoc Networks Tahani Gazdar authority CA. We conducted a set of simulations in which we evaluate the efficiency and the stability
Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph Theoretic Approach
Lazos, Loukas
then propose a Local Broad- cast Key (LBK) based method to secure an ad hoc network from wormhole attacks simulation results to illustrate our theory. Index Terms-- wormhole, security, vulnerability, ad hoc net a decentralized realization for LBK establishment, and provide an analytical evaluation of the security level
EAGR: Energy Aware Greedy Routing Scheme for Wireless Ad hoc Networks Sachin Sharma
Dharmaraja, S.
EAGR: Energy Aware Greedy Routing Scheme for Wireless Ad hoc Networks Sachin Sharma Tejas Networks, throughput and energy consumption. Keywords: Rate of Energy Consumption, Greedy Routing, Wireless Ad hoc distributed nodes that communicate over a wireless link. In this paper we present a scalable, Energy Aware
Degree Distribution and Hopcount in Wireless Ad-hoc Networks R. Hekmat, P. Van Mieghem
Van Mieghem, Piet
Degree Distribution and Hopcount in Wireless Ad-hoc Networks R. Hekmat, P. Van Mieghem Delft focus in this article is on the degree distribution and hopcount in these networks. The results that the degree distribution in wireless ad-hoc networks is binomial for low values of the mean degree. Further
DELAR: Device/Energy/Load Aware Relaying in Heterogenous Wireless Ad Hoc Networks
Zhang, Yanchao
- newable energy sources. In DELAR the heterogeneity of nodal energy capabilities or device types, nodalDELAR: Device/Energy/Load Aware Relaying in Heterogenous Wireless Ad Hoc Networks Wei Liu Energy conservation is of great importance for mobile ad hoc networks in which most nodes are equipped
A SERVICE DISCOVERY THREAT MODEL FOR AD HOC Adrian Leung and Chris Mitchell
Mitchell, Chris
A SERVICE DISCOVERY THREAT MODEL FOR AD HOC NETWORKS Adrian Leung and Chris Mitchell Information.Leung,C.Mitchell}@rhul.ac.uk Keywords: Security, Secure Service Discovery, Threat Model, Mobile Ad Hoc Networks, MANETs. Abstract. Securing the process of service discovery is one of them. Novel solutions are therefore required. However
Coverage Problems in Wireless Ad-hoc Sensor Networks Seapahn Meguerdichian1
technology interfacing with emerging micro-sensor based on MEMs technology [2], is allowing sophisticatedCoverage Problems in Wireless Ad-hoc Sensor Networks Seapahn Meguerdichian1 , Farinaz Koushanfar2}@cs.ucla.edu {farinaz, mbs}@ee.ucla.edu Abstract - Wireless ad-hoc sensor networks have recently emerged as a premier
MobiSN: Semantics-based Mobile Ad Hoc Social Network Framework
Li, Juan "Jen"
MobiSN: Semantics-based Mobile Ad Hoc Social Network Framework Juan Li Department of Computer.khan@ndsu.edu Abstract--Mobile ad hoc social networks are self-configuring social networks that connect users using mobile devices, such as laptops, PDAs, and cellular phones. These social networks facilitate users
Inducing Spatial Clustering in MAC Contention for Spread Spectrum Ad Hoc Networks
de Veciana, Gustavo
. Our premise is that such networks are well suited to meet quality of service and energy efficiency promise towards achieving high spatial reuse, QoS, and energy efficiency in spread spectrum ad hoc goals. At least two other objectives are critical in some ad hoc network applications: energy efficiency
Report of the Ad Hoc Committee on Washington Natural Resource Agency Reform
Borenstein, Elhanan
Report of the Ad Hoc Committee on Washington Natural Resource Agency Reform February 16, 2010 of the Environment (CoEnv) to make useful contributions to the Governor's natural resource agency reform initiative. As a result, the Washington Natural Resource Agency Reform ad hoc Committee was established and given
Energy Efficient Adaptation of Multicast Protocols in Power Controlled Wireless Ad Hoc Networks
Prasanna, Viktor K.
on energy efficiency in ad hoc networks. In this paper, we assume a more practical model for power controlEnergy Efficient Adaptation of Multicast Protocols in Power Controlled Wireless Ad Hoc Networks to power controlled networks is presented. Wireless nodes are assumed to have transmis- sion power control
Low-Cost Truthful Multicast in Selfish and Rational Wireless Ad Hoc Networks
Li, Xiang-Yang
en- joy a more flexible composition. A wireless ad hoc network is a collection of radio devices limited transmission power. One of the dis- tinctive features of wireless networks is that the signal sent1 Low-Cost Truthful Multicast in Selfish and Rational Wireless Ad Hoc Networks Weizhao Wang Xiang
A Cross-Layer Framework for Exploiting Virtual MISO Links in Mobile Ad Hoc Networks
Krishnamurthy, Srikanth
A Cross-Layer Framework for Exploiting Virtual MISO Links in Mobile Ad Hoc Networks Gentian requiring the deployment of physical antenna arrays. Virtual MISO entails the simultaneous transmission. We present a novel multilayer approach for exploiting virtual MISO links in ad hoc networks
Progressive Network Coding for Message-Forwarding in Ad-Hoc Wireless Networks
Chen, Yuanzhu Peter
. This paper considers the multi-hop transmission prob- lem in wireless ad-hoc networks. In a three-node sce of multi- hop transmission. The new framework, exploiting the technology of progressive network codingProgressive Network Coding for Message-Forwarding in Ad-Hoc Wireless Networks Xingkai Bao and Jing
Joint Routing and Server Selection for Multiple Description Video Streaming in Ad Hoc Networks
Hou, Y. Thomas
Joint Routing and Server Selection for Multiple Description Video Streaming in Ad Hoc Networks ad hoc networks. In this paper, we study the important problem of joint routing and server selection by the proposed approach over existing server selection schemes. This justifies the importance of jointly
Comparative Study of Price-based Resource Allocation Algorithms for Ad Hoc Networks
be an ample alterna- tive. 1. Introduction Mobile ad hoc networks are formed by wireless nodes that move freely and have no fixed infrastructure. Each node in the network may act as a router for other nodes a serious threat to critical infrastructures of the future. Due to the nature of ad hoc wireless networks
Comparison of two wireless ad hoc routing protocols on a hardware test-bed
Brown, Timothy X.
Comparison of two wireless ad hoc routing protocols on a hardware test-bed Shweta Bhandare of the rout- ing protocols is carried out using the Click modular router infrastructure on laptops with wireless ethernet cards running Linux. We demonstrate the working of both ad hoc routing protocols through
SQL is Dead; Long Live SQL: Lightweight Query Services for Ad Hoc Research Data
Matrajt, Graciela
SQL is Dead; Long Live SQL: Lightweight Query Services for Ad Hoc Research Data Bill Howe billhowe with ad hoc scientific Q&A. Further: · We reject the conventional wisdom that "scientists won't write SQL a production-quality database server. · We observe that simply sharing examples of SQL queries allows
Does Cognition Come at a Net Energy Cost in Ad Hoc Wireless LANs?
Namboodiri, Vinod
1 Does Cognition Come at a Net Energy Cost in Ad Hoc Wireless LANs? Anm Badruddoza, Vinod that are energy constrained. This work takes a first step in this direction for the ad hoc Wireless LAN scenario the importance of energy consumption in the devices that employ such techniques. Scanning for wireless spectrum
Distributed Topology Control for Power Efficient Operation in Multihop Wireless Ad Hoc Networks
of a wireless network that is operating on battery power is limited by the capacity of its energy sourceDistributed Topology Control for Power Efficient Operation in Multihop Wireless Ad Hoc Networks of wireless multihop ad hoc net- works can be controlled by varying the transmission power of each node. We
On the Energy Efficiency of Cognitive Radios -A Study of the Ad Hoc Wireless LAN Scenario
Namboodiri, Vinod
On the Energy Efficiency of Cognitive Radios - A Study of the Ad Hoc Wireless LAN Scenario Anm can save energy over a conventional radio in the Ad Hoc Wireless LAN scenario. The interplay between wireless spectrum, has however, resulted in researchers overlooking the importance of energy consumption
Energy Conserving Routing in Wireless Ad-hoc Networks Jae-Hwan Chang and Leandros Tassiulas
Wang, Bing
Energy Conserving Routing in Wireless Ad-hoc Networks Jae-Hwan Chang and Leandros Tassiulas-- energy-sensitive routing, wireless ad-hoc networks, sensor networks I. INTRODUCTION CONSIDER a group of wireless static nodes is considered as it arises in a rapidly deployed, sensor based, monitoring system
Minimizing Energy and Maximizing Network Lifetime Multicasting in Wireless Ad Hoc Networks
Liang, Weifa
Minimizing Energy and Maximizing Network Lifetime Multicasting in Wireless Ad Hoc Networks Weifa Abstract-- Most mobile nodes in a wireless ad hoc network are powered by energy limited batteries, the limited battery lifetime imposes a constraint on the network performance. Therefore, energy efficiency
ADHOC MAC: a new, flexible and reliable MAC architecture for ad-hoc networks
Borgonovo, Flaminio
ADHOC MAC: a new, flexible and reliable MAC architecture for ad-hoc networks F. Borgonovo, A, make the design of a prompt, efficient, flexible, and reliable MAC very difficult. An ad hoc network.e., transmissions that reach all terminals within the range allowed by the transmitting power. Due to radio range
Using Traffic Flow for Cluster Formation in Vehicular Ad-hoc Networks
Weigle, Michele
Using Traffic Flow for Cluster Formation in Vehicular Ad-hoc Networks Mohammad S. Almalag of the traffic will flow. I. INTRODUCTION Vehicular Ad Hoc Networks (VANETs) are considered to be a class MANETs. Nodes in VANETs have more processing power and storage space and typically have no battery
Energy-Efficiency of Cooperative Sensing Schemes in Ad hoc WLAN Cognitive Radios
Namboodiri, Vinod
Energy-Efficiency of Cooperative Sensing Schemes in Ad hoc WLAN Cognitive Radios Reshma Syeda, we study and analyse the energy efficiency of two generic cooperative sensing schemes in an ad hoc a comparative numerical analysis to demonstrate the amount of energy savings of the proposed cooperative schemes
On the Connectivity in One-Dimensional Ad Hoc Wireless Networks with a Forbidden Zone
On the Connectivity in One-Dimensional Ad Hoc Wireless Networks with a Forbidden Zone Xiaodong Hu1 This paper investigates the connectivity in one-dimensional ad hoc wireless networks with a forbidden zone. We derive the probability of the wireless networks which are composed of exactly m clusters by means
SANS: A Simple Ad Hoc Network Simulator Nicolas Burri, Roger Wattenhofer, Yves Weber, Aaron present a Simple Ad Hoc Network Simulator SANS particularly intended for the simulation of distributed the concepts and correct usage of SANS as a development, debugging, testing and presentation tool. Together
Cross-Layer Design for Energy-Efficient Secure Multicast Communications in Ad Hoc Networks
Poovendran, Radha
Cross-Layer Design for Energy-Efficient Secure Multicast Communications in Ad Hoc Networks Loukas, University of Washington, Seattle, WA Abstract-- We consider the problem of secure multicast in an energy network operation in an wireless ad hoc environment. Energy is a physical layer parameter, while security
Lu, Songwu
evaluate the solution through simulation and implementation. 1. Introduction Mobile ad hoc networkingSelf-securing Ad Hoc Wireless Networks Haiyun Luo, Petros Zerfos, Jiejun Kong, Songwu Lu, Lixia wireless channel. However, the nature of ad hoc networks makes them vulner- able to security attacks
Singh, Santosh Kumar
2010-01-01T23:59:59.000Z
Spectrum is a scarce commodity, and considering the spectrum scarcity faced by the wireless-based service providers led to high congestion levels. Technical inefficiencies from pooled spectrum (this is nothing but the "common carrier principle" adopted in oil/gas/electricity pipelines/networks.), since all ad hoc networks share a common pool of channels, exhausting the available channels will force ad hoc networks to block the services. Researchers found that cognitive radio (CR) technology may resolve the spectrum scarcity. CR network proved to next generation wireless communication system that proposed as a way to reuse under-utilised spectrum of licensee user (primary network) in an opportunistic and non-interfering basis. A CR is a self-configuring entity in a wireless networking that senses its environment, tracks changes, and frequently exchanges information with their networks. Adding this layer of such intelligence to the ad hoc network by looking at the overall geography of the network known as cogni...
Quality of Service (QoS) security in mobile ad hoc networks
Lu, Bin
2006-10-30T23:59:59.000Z
With the rapid proliferation of wireless networks and mobile computing applications, Quality of Service (QoS) for mobile ad hoc networks (MANETs) has received increased attention. Security is a critical aspect of QoS provisioning in the MANET...
Service Provision in Disconnected Mobile Ad hoc Networks Nicolas Le Sommer
Paris-Sud XI, Université de
Service Provision in Disconnected Mobile Ad hoc Networks Nicolas Le Sommer Valoria Laboratory, University of South Brittany Nicolas.Le-Sommer@univ-ubs.fr Abstract With the proliferation of mobiles devices
Cross-Layer Design of Outage Optimum Routing Metric for Wireless Ad Hoc Networks
Garcia-Luna-Aceves, J.J.
2011-01-01T23:59:59.000Z
PAPER Cross-layer design of outage optimum routing metricof wireless ad hoc network outage probability in a fadingJ. J. Garcia-Luna-Aceves Outage optimum routing for wireless
Autonomous Undersea Systems Network (AUSNet) Protocols To Support Ad-Hoc AUV Communications
semi-autonomous networked robots. Emerging flexible low bandwidth, energy efficient architectures opposed to network support) data transmissions. Current efforts are focused on transitionAutonomous Undersea Systems Network (AUSNet) Protocols To Support Ad-Hoc AUV Communications
Analyzing the Impact of Mobility in Ad Hoc Networks Vincent Lenders, Jorg Wagner, and Martin May
Lenders, Vincent
Analyzing the Impact of Mobility in Ad Hoc Networks Vincent Lenders, J¨org Wagner, and Martin May Computer Engineering and Networks Laboratory ETH Zurich 8092 Zurich, Switzerland lenders
Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks
Rossi, Michele
Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks Cristiano in virtual multiple input single output (MISO) trans- missions and space-time block codes have been proposed
Li, HaoQi, M. Eng. Massachusetts Institute of Technology
2012-01-01T23:59:59.000Z
We present a distributed photo-sharing Android application, CameraDP, that primarily relies on ad-hoc Wifi. The app runs on top of the novel DIstributed Programming Layer Over Mobile Agents (DIPLOMA) programming abstraction. ...
Secure Neighborhood Discovery: A Fundamental Element for Mobile Ad Hoc Networking
Capkun, Srdjan
devices. Static ad hoc or mesh networks are being formed by home computers with roof-top antennas. Low, topology control, transmission scheduling, energy-efficient communication, as well as physical access
Tree Based Broadcast in Ad Hoc Networks Alpar Juttner1,2
Jüttner, Alpár
, Broadcast, Multicast, Routing algorithms, Wireless LANs. 1 #12;1 Introduction Mobile ad hoc networks (MANETs infrastructure in such a way, that each communi- cating device (hereafter node) can serve as a router
Reliability and energy-efficiency in wireless ad-hoc networks
Srinivas, Anand, 1979-
2004-01-01T23:59:59.000Z
In this thesis, we address issues related to reliability and energy-efficiency in wireless ad hoc networks. In the first part of the work, we deal with the problem of simultaneously routing data along multiple disjoint ...
Reverse Nearest Neighbors Search in Ad-hoc Subspaces Man Lung Yiu
Mamoulis, Nikos
Reverse Nearest Neighbors Search in Ad-hoc Subspaces Man Lung Yiu Department of Computer Science, H.2.4.h Query processing, H.2.4.k Spatial databases Contact Author: Man Lung Yiu Department
over several small (energy-efficient) hops. For this purpose each node in the ad-hoc network chooses buildings. In this paper we present the XTC1 topology control algorithm that works i) without GPS and ii
Quality of Service (QoS) security in mobile ad hoc networks
Lu, Bin
2006-10-30T23:59:59.000Z
With the rapid proliferation of wireless networks and mobile computing applications, Quality of Service (QoS) for mobile ad hoc networks (MANETs) has received increased attention. Security is a critical aspect of QoS ...
Ad-hoc Limited Scale-Free Models for Unstructured Peer-to-Peer Networks Hasan Guclu
Yuksel, Murat
, search success rate, routing reachability and stability) de- pend on the capability of preserving structure even over the churn caused by the ad-hoc nodes joining or leaving the network. Preserving mainly depends on the capability of preserving structure even over the churn caused by the ad-hoc nodes
Lyu, Michael R.
distributed systems, security in ad hoc networks is based on the use of a key management system. Specific key the network. The new solution is evaluated through simulation and implementation, and the resultsTrust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith C. H. Ngai
An Adaptive Routing Mechanism For Ad Hoc Wireless Sensor Jane E Tateson and Ian W Marshall, BTexact
Haddadi, Hamed
An Adaptive Routing Mechanism For Ad Hoc Wireless Sensor Networks Jane E Tateson and Ian W Marshall for a network of ad hoc wireless sensor nodes. The mechanism enables sensor nodes to minimize route cost by varying their transmission range, and by experimenting with the neighbours from which they forward data
Holliday, JoAnne
Power Control MAC Protocol Analysis and Improvement for Ad Hoc Networks Ping Ding, JoAnne Holliday power control protocols have been proposed to address the limited power supplies in ad hoc networks in the same transmission. In this paper, we review different power control MAC protocols, and analyze
Maróti, Miklós
Int. J. Ad Hoc and Ubiquitous Computing, Vol. 1, No. 4, 2006 239 Copyright © 2006 Inderscience: sensor networks; ad hoc networks; ubiquitous computing; time synchronisation; clock synchronisation and Ubiquitous Computing, Vol. 1, No. 4, pp.239251. Biographical notes: Branislav Kusý is a Research Assistant
Lazos, Loukas
Energy-Aware Secure Multicast Communication In Wireless Ad-Hoc Networks Loukas Lazos, and Radha Poovendran Abstract-- In this paper we address the problem of efficiently securing multicast communication in energy constrained wireless ad hoc networks. We show that existing scalable key distribution techniques
Energy-based adaptation in simulations of survivability of ad hoc communication
Energy-based adaptation in simulations of survivability of ad hoc communication Massimiliano Raciti by the IDS. The approach is based on a model for accounting CPU energy consumption in network simulation are overloaded or not available. Unfortunately, the constrained capacity of their batteries and the energy
An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network
Brown, Timothy X.
of Interdisciplinary Telecommunications, University of Colorado , Boulder, CO, USA A minimum energy routing protocol reduces the energy consumption of the nodes in a wireless ad hoc network by routing packets on routes that the battery life is maximized. While re- search continues to reduce the energy consumption for the CPU, user
Delay and Capacity Trade-offs in Mobile Ad Hoc Networks: A Global Perspective
Chen, Yuanzhu Peter
Mazumdar, Ness Shroff School of Electrical and Computer Engineering Purdue University West Lafayette, IN 47907, USA Email: {gsharma,shroff}@ecn.purdue.edu Department of Electrical and Computer Engineering the delay and capacity trade-offs in mobile ad hoc networks. This line of investigation started
Ad hoc networks beyond unit disk graphs Fabian Kuhn Roger Wattenhofer Aaron Zollinger
relief actions. Another often mentioned scenario involves cars forming an ad hoc network for professional, entertainment, or informational purposes. Car-mounted radio broadcast warning systems automatically alerting e-mail: wattenhofer@tik.ee.ethz.ch A. Zollinger (&) Department of Electrical Engineering
Energy consumption models for ad-hoc mobile Emmanuel Lochin1
Lochin, Emmanuel
1 Energy consumption models for ad-hoc mobile terminals Emmanuel Lochin1 Anne Fladenmuller1 Jean describes a set of experiments based on ACPI BIOS measurements which evaluate the energy consumption of an IEEE802.11 wireless net- work interface. Based on our ACPI measurements, two models of energy
Impact of Jitter-based Techniques on Flooding over Wireless Ad hoc Networks: Model and Analysis
Paris-Sud XI, Université de
Impact of Jitter-based Techniques on Flooding over Wireless Ad hoc Networks: Model and Analysis Philippe.Jacquet@inria.fr Emmanuel Baccelli INRIA, France Emmanuel.Baccelli@inria.fr Abstract--Jitter. This paper investigates on the impact of the standardized jitter mechanism on network-wide packet
A bidding algorithm for optimized utility-based resource allocation in ad hoc networks
A bidding algorithm for optimized utility-based resource allocation in ad hoc networks Calin-to-end flow are expressed using a resource- utility function, and our algorithms aim to maximize aggregated interfering links. We propose a novel resource allocation algorithm that employs an auction mechanism in which
Power Control and Clustering in Ad Hoc Networks Vikas Kawadia and P. R. Kumar
Kawadia, Vikas
Power Control and Clustering in Ad Hoc Networks Vikas Kawadia and P. R. Kumar Department consider the problem of power control when nodes are non-homogeneously dispersed in space. In such situations, one seeks to employ per packet power control depending on the source and destination
Revisiting multimedia streaming in mobile ad hoc Peng Xue Surendar Chandra
Chandra, Surendar
setups to show that there is a mis-match between expectations of the local system designers the resource consumed without a major revamp of existing operating systems or requiring special hardware. We im, multimedia streaming, resource management 1. MOTIVATION -OBSERVED SYSTEM BE- HAVIOR Mobile ad hoc networking
14. A TAXONOMY OF DATA COMMUNICATION PROTOCOLS FOR VEHICULAR AD HOC NETWORKS
Stojmenovic, Ivan
1 14. A TAXONOMY OF DATA COMMUNICATION PROTOCOLS FOR VEHICULAR AD HOC NETWORKS Yousef efficiency. In this paper, we provide the first known taxonomy of VANET data communication protocols, based, vehicle connectivity, urgency, and message contents. The taxonomy provides fundamental blocks in VANET
Route Throughput Analysis with Spectral Reuse for Multi-Rate Mobile Ad Hoc Networks
Tseng, Yu-Chee
networks (MANETs) have received a lot of attention for its flexible network architecture. While many network (MANET) is a flexible and dynamic architecture that is attractive due to its ease in network1 Route Throughput Analysis with Spectral Reuse for Multi-Rate Mobile Ad Hoc Networks Lien-Wu Chen
Non-Blocking, Localized Routing Algorithm for Balanced Energy Consumption in Mobile Ad Hoc Networks
Yu, Chansu
1 Non-Blocking, Localized Routing Algorithm for Balanced Energy Consumption in Mobile Ad Hoc relevant nodes but also to balance individual battery levels. Unbalanced energy usage will result achieves a trade-off between balanced energy consumption and shortest routing delay, and at the same time
Energy-Balanced Cooperative Routing in Multihop Wireless Ad Hoc Networks
Wang, Yu
Energy-Balanced Cooperative Routing in Multihop Wireless Ad Hoc Networks Siyuan Chen Minsu Huang. In this paper, we aim to study the impact of cooperative routing on balancing the energy distribution among their transmission power, our cooperative routing method can balance the energy among neighboring nodes and maximize
Opportunistic Routing in Wireless Ad Hoc Networks: Upper Bounds for the Packet
Mans, Bernard
routing, in a realistic network model where link conditions are variable. We analyze the performance1 Opportunistic Routing in Wireless Ad Hoc Networks: Upper Bounds for the Packet Propagation Speed to the destination. In this paper, we provide upper bounds on the packet propaga- tion speed for opportunistic
PATTERN-BASED COLLABORATION IN AD-HOC TEAMS THROUGH MESSAGE ANNOTATION
Dustdar, Schahram
PATTERN-BASED COLLABORATION IN AD-HOC TEAMS THROUGH MESSAGE ANNOTATION Daniel Schall, Robert: Collaboration Patterns, Message Annotation, Coordination Support, Interaction Patterns Abstract: In this paper we present a specification for annotating messages to enable computer-supported message processing
TCP Performance over Mobile Ad-hoc Networks -A Quantitative Study
Park, Seung-Jong "Jay"
gaining maturity, some researchers have lately shifted focus to the transport layer performance in ad-hoc networks [8], [9], [10]. Since TCP (Transmission Control Protocol) is by far the most used transport pro notification (ELFN) to the source from the link failure point. The source, upon receiving the ELFN freezes TCP
Minimum-Energy Topology Control Algorithms in Ad Hoc Joseph Y. Halpern Li (Erran) Li
Halpern, Joseph Y.
for an extended period of time. In order to accomplish this without a renewable energy source, energy conservationMinimum-Energy Topology Control Algorithms in Ad Hoc Networks1 Joseph Y. Halpern Li (Erran) Li Dept Holmdel, NJ 07733 halpern@cs.cornell.edu erranlli@dnrc.bell-labs.com August 7, 2004 1 Based on "Minimum-Energy
Energy savings in wireless ad hoc sensor networks as a result of network synchronisation
Haddadi, Hamed
Energy savings in wireless ad hoc sensor networks as a result of network synchronisation Antonio of oceanographic monitoring using a collegiate-managed autonomous network of energy-conscious wireless sensors. We-to-node synchronised transmissions in order to reduce overhearing and therefore reduce energy expenses. SSSNP (Self
Amorphous Placement and Retrieval of Sensory Data in Sparse Mobile AdHoc Networks
a distributed repository of spatiotemporal sensory data. Prior research in which sensor networks are viewedAmorphous Placement and Retrieval of Sensory Data in Sparse Mobile AdHoc Networks HANY MORCOS AZER the least communication overhead (power). We show that the use of Data Centric Storage (DCS), or directed
Amorphous Placement and Retrieval of Sensory Data in Sparse Mobile Ad-Hoc Networks
a distributed repository of spatiotemporal sensory data. Prior research in which sensor networks are viewedAmorphous Placement and Retrieval of Sensory Data in Sparse Mobile Ad-Hoc Networks HANY MORCOS AZER the least communication overhead (power). We show that the use of Data Centric Storage (DCS), or directed
Using Variable-Range Transmission Power Control in Wireless Ad Hoc Networks
Gomez-Castellanos, Javier
Using Variable-Range Transmission Power Control in Wireless Ad Hoc Networks Javier Gomez and Andrew control on the physical and network connectivity, network capacity, and power savings of wireless multihop networks based, not on common-range which is prevalent today, but on variable-range power control. Index
An Energy Efficient MAC Protocol for Fully Connected Wireless Ad Hoc Networks
Zhuang, Weihua
1 An Energy Efficient MAC Protocol for Fully Connected Wireless Ad Hoc Networks Kamal Rahimi Abstract--Energy efficiency is an important performance mea- sure of wireless network protocols, especially for battery-powered mobile devices such as smartphones. This paper presents a new energy-efficient medium
Energy-Efficient Distributed Constructions of Minimum Spanning Tree for Wireless Ad-hoc
Khan, Maleq
1 Energy-Efficient Distributed Constructions of Minimum Spanning Tree for Wireless Ad-hoc Networks and energy efficient for being practical. Motivated by these considerations, we study the performance of a class of simple and local algorithms called Nearest Neighbor Tree (NNT) algorithms for energy
Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking
Sirer, Emin Gun
Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking protocols re- quires knowledge of the energy consumption behavior of actual wireless interfaces. But little practical information is available about the energy consumption behavior of well-known wireless network
The Upper Bound of Capacity for A Concurrent-transmission-based Ad-hoc Network
Tseng, Yu-Chee
1 The Upper Bound of Capacity for A Concurrent-transmission-based Ad-hoc Network with Single National Chiao-Tung University, Hsin-Chu, 30010 Taiwan Department of Communication Engineering National Chiao-Tung University, Hsin-Chu, 30010 Taiwan Department of Information and Computer Engineering Chung
A Power Efficient Scheduling Mechanism for an IEEE 802.11 Multiple Rate Ad Hoc Network
Tseng, Yu-Chee
that of 802.11 PSM. Keywords: Ad Hoc Network, DCF, 802.11 PSM, Beacon Interval, and ATIM Window 1 Introduction Mechanism (802.11 PSM) that allows a wireless STA to go from the active state to doze or power-saving state
The Degree of Participation Concept in Ad Hoc Networks Youssef Iraqi and Raouf Boutaba
Boutaba, Raouf
categories: table-driven routing and source-initiated on-demand rout- ing. Examples of the first category of routing protocols are: AODV (Ad hoc On-Demand Distance Vector) routing [11]; DSR (Dynamic Source Routing mecha- nism. This can be driven by an energy saving policy for ex- ample. Special resource management
A SOLUTION TO HIDDEN TERMINAL PROBLEM OVER A SINGLE CHANNEL IN WIRELESS AD HOC NETWORKS
Latchman, Haniph A.
A SOLUTION TO HIDDEN TERMINAL PROBLEM OVER A SINGLE CHANNEL IN WIRELESS AD HOC NETWORKS Hongqiang.ufl.edu and fanggece.ufl.edu ABSTRACT In multihop wireless networks, hidden terminal problem is common and leads to the hidden terminal problem may lead to an unacceptable quality of these services. Therefore, solving
Exploiting Overhearing: Flow-Aware Routing for Improved Lifetime in Ad Hoc Networks
Mans, Bernard
neighboring flows and adapt their local routing dynamically. By combining this awareness with battery- aware flow and neighborhood is then presented in Section II-D. By combining the flow awareness with batteryExploiting Overhearing: Flow-Aware Routing for Improved Lifetime in Ad Hoc Networks Nirisha
Improved Power-Delay Trade-off in Wireless Ad Hoc Networks Using Opportunistic Routing
Lee, Yong Hoon
Improved Power-Delay Trade-off in Wireless Ad Hoc Networks Using Opportunistic Routing Won power- delay trade-off than the conventional routing while providing up to a logarithmic boost that the power can be reduced at the expense of increased delay for both scenarios, but better trade-off can
Outage in a Cellular Network Overlaid with an Ad hoc Network: The Uplink Case
Yanikomeroglu, Halim
Outage in a Cellular Network Overlaid with an Ad hoc Network: The Uplink Case Arshdeep S. Kahlon}@sce.carleton.ca Abstract--We analyze the uplink outage probability at the randomly, but not necessarily independently nor, large-scale power control, and the knowledge of the initial outages in the absence of the secondary
Asymptotic Outage Analysis of General Motion-Invariant Ad Hoc Networks
Haenggi, Martin
Asymptotic Outage Analysis of General Motion-Invariant Ad Hoc Networks Riccardo Giacomelli Dept Dame, IN, USA E-mail: mhaenggi@nd.edu Abstract--The outage analysis of networks with randomly a homogeneous Poisson point process. In this paper, we show that in great generality, the outage probability
Cooperative Energy Spanners: Energy-Efficient Topology Control in Cooperative Ad Hoc Networks
Wang, Yu
Cooperative Energy Spanners: Energy-Efficient Topology Control in Cooperative Ad Hoc Networks Ying introduce a new topology control problem: energy-efficient topology control problem with cooperative communication, and propose two topology control algorithms to build cooperative energy spanners in which
JTP: An Energy-conscious Transport Protocol for Wireless Ad Hoc Networks
JTP: An Energy-conscious Transport Protocol for Wireless Ad Hoc Networks (Technical Report BUCS the energy gains of JTP over one-size-fits-all transport protocols. I. INTRODUCTION Motivation and Scope physical to transport [8], [9]. JAVeLEN's design ensures that energy gains obtained in one layer would
Price/Utility-based Optimized Resource Allocation in Wireless Ad hoc Networks
Price/Utility-based Optimized Resource Allocation in Wireless Ad hoc Networks Calin Curescu solution. A key concept, borrowed from the dual of the optimal allocation problem, is the shadow price the bandwidth based on bids that are calculated using the shadow price of the resources and the flow's utility
Modular Topology Control and Energy Model for Wireless Ad Hoc Sensor Networks
Jay Yang, Shanchieh
Modular Topology Control and Energy Model for Wireless Ad Hoc Sensor Networks Niranjan in a harsh terrain typically are battery operated and, therefore, require energy efficient network protocols. In order to ease the analysis of the energy usage of proposed network protocols, this paper proposes
Exploiting Trust Relations for Nash Equilibrium Efficiency in Ad Hoc Networks
Baras, John S.
Exploiting Trust Relations for Nash Equilibrium Efficiency in Ad Hoc Networks Shanshan Zheng, Tao where the nodes' payoffs are affected by their trust relations. We characterize the Nash equilibrium the interactions among nodes as a game, the Nash equilibria are used to study the operating points of the network
ENERGY-AWARE SECURE MULTICAST COMMUNICATION IN AD-HOC NETWORKS USING GEOGRAPHIC LOCATION INFORMATION
Lazos, Loukas
ENERGY-AWARE SECURE MULTICAST COMMUNICATION IN AD-HOC NETWORKS USING GEOGRAPHIC LOCATION INFORMATION Loukas Lazos, Radha Poovendran Network Security and Cryptography Laboratory University by NSF grant ANI-0093187 and ARO grant DAAD-190210242 ABSTRACT The problem of securing multicast
Jarvis, Stephen
Distributed Broadcast Scheduling in Mobile Ad Hoc Networks with Unknown Topologies Guang Tan. In this paper we study the distributed broadcast schedul- ing problem in ad hoc networks. In broadcasting is a fundamental communication task in mobile ad hoc networks, and minimizing broadcasting time (or latency
Abstract--A mobile ad hoc network is a wireless communication network which does not rely on a fixed
Lyu, Michael R.
hoc networks. We propose a secure public key authentication service based on a trust model nodes in the networks. We perform an overall evaluation of our proposed approach by simulations distributed systems, security in ad hoc networks is based on the use of a key management system
PNNI routing support for ad hoc mobile networking: A flat architecture
Martinez, L.; Sholander, P.; Tolendino, L.
1997-12-01T23:59:59.000Z
This contribution extends the Outside Nodal Hierarchy List (ONHL) procedures described in ATM Form Contribution 97-0766. These extensions allow multiple mobile networks to form either an ad hoc network or an extension of a fixed PNNI infrastructure. This contribution covers the simplest case where the top-most Logical Group Nodes (LGNs), in those mobile networks, all reside at the same level in a PNNI hierarchy. Future contributions will cover the general case where those top-most LGNs reside at different hierarchy levels. This contribution considers a flat ad hoc network architecture--in the sense that each mobile network always participates in the PNNI hierarchy at the preconfigured level of its top-most LGN.
PNNI routing support for ad hoc mobile networking: The multilevel case
Martinez, L.; Sholander, P.; Tolendino, L.
1998-01-01T23:59:59.000Z
This contribution extends the Outside Nodal Hierarchy List (ONHL) procedures described in ATM Forum Contributions 97-0766 and 97-0933. These extensions allow multiple mobile networks to form either an ad hoc network or an extension of a fixed PNNI infrastructure. A previous contribution (97-1073) covered the simplest case where the top-most Logical Group Nodes (LGNs), in those mobile networks, all resided at the same level in a PNNI hierarchy. This contribution covers the more general case wherein those top-most LGNs may reside at different PNNI hierarchy levels. Both of the SNL contributions consider flat ad hoc network architectures in the sense that each mobile network always participates in the PNNI hierarchy at the pre-configured level of its top-most LGN.
A Dirichlet reputation system in reliable routing of wireless ad hoc network
Yang, Dr. Li [University of Tennessee, Knoxville (UTK); Cui, Xiaohui [ORNL; Cemerlic, Alma [University of Tennessee, Knoxville (UTK)
2010-01-01T23:59:59.000Z
Ad hoc networks are very helpful in situations when no fixed network infrastructure is available, such as natural disasters and military conflicts. In such a network, all wireless nodes are equal peers simultaneously serving as both senders and routers for other nodes. Therefore, how to route packets through reliable paths becomes a fundamental problems when behaviors of certain nodes deviate from wireless ad hoc routing protocols. We proposed a novel Dirichlet reputation model based on Bayesian inference theory which evaluates reliability of each node in terms of packet delivery. Our system offers a way to predict and select a reliable path through combination of first-hand observation and second-hand reputation reports. We also proposed moving window mechanism which helps to adjust ours responsiveness of our system to changes of node behaviors. We integrated the Dirichlet reputation into routing protocol of wireless ad hoc networks. Our extensive simulation indicates that our proposed reputation system can improve good throughput of the network and reduce negative impacts caused by misbehaving nodes.
Channel Sharing of Competing Flows in Ad Hoc Networks Yu Wang J. J. Garcia-Luna-Aceves
California at Santa Cruz, University of
again. Due to its stability and long-term fairness, the binary exponential backoff (BEB) is favored proposed for ad hoc networks. The BEB scheme is very effective in col- lision resolution when nodes face
Channel Sharing of Competing Flows in Ad Hoc Networks Yu Wang J. J. GarciaLunaAceves
California at Santa Cruz, University of
again. Due to its stability and longÂterm fairness, the binary exponential backoff (BEB) is favored proposed for ad hoc networks. The BEB scheme is very effective in colÂ lision resolution when nodes face
Protocoles distribues de contr^ole d'acc`es au medium pour reseaux ad hoc fortement charges
Coupechoux, Marceau
´es Distributed MAC Protocols for Heavily Loaded Ad Hoc Networks Marceau Coupechoux Th`ese pr´esent´ee `a l juin 2004 #12;c Copyright by Marceau Coupechoux, 2005. All Rights Reserved #12;Remerciements Je
Coupechoux, Marceau
A Scheduling Policy for Dense and Highly Mobile Ad Hoc Networks Marceau Coupechoux*º, Christian, cbonnet@eurecom.fr ºResearch and Innovation, Alcatel CIT, Marcoussis France, {marceau
Measurements from an 802.11b Mobile Ad Hoc Network Vincent Lenders, Jorg Wagner and Martin May
Lenders, Vincent
Measurements from an 802.11b Mobile Ad Hoc Network Vincent Lenders, J¨org Wagner and Martin May Computer Engineering and Networks Laboratory ETH Zurich 8092 Zurich, Switzerland {lenders, may
Ad-hoc Limited Scale-Free Models for Unstructured Peer-to-Peer Networks
Guclu, Hasan; Yuksel, Murat
2008-01-01T23:59:59.000Z
Several protocol efficiency metrics (e.g., scalability, search success rate, routing reachability and stability) depend on the capability of preserving structure even over the churn caused by the ad-hoc nodes joining or leaving the network. Preserving the structure becomes more prohibitive due to the distributed and potentially uncooperative nature of such networks, as in the peer-to-peer (P2P) networks. Thus, most practical solutions involve unstructured approaches while attempting to maintain the structure at various levels of protocol stack. The primary focus of this paper is to investigate construction and maintenance of scale-free topologies in a distributed manner without requiring global topology information at the time when nodes join or leave. We consider the uncooperative behavior of peers by limiting the number of neighbors to a pre-defined hard cutoff value (i.e., no peer is a major hub), and the ad-hoc behavior of peers by rewiring the neighbors of nodes leaving the network. We also investigate t...
Power control in reactive routing protocol for Mobile Ad Hoc Network
Heni, Maher
2012-01-01T23:59:59.000Z
The aim of this work is to change the routing strategy of AODV protocol (Ad hoc On Demand Vector) in order to improve the energy consumption in mobile ad hoc networks (MANET). The purpose is to minimize the regular period of HELLO messages generated by the AODV protocol used for the research, development and maintenance of routes. This information is useful to have an idea about battery power levels of different network hosts. After storing this information, the node elect the shortest path following the classical model used this information to elect safest path (make a compromise) in terms of energy. Transmitter node does not select another node as its battery will be exhausted soon. Any node of the network can have the same information's about the neighborhoods as well as other information about the energy level of the different terminal to avoid routing using a link that will be lost due to an exhausted battery of a node in this link. Analytical study and simulations by Jist/SWANS have been conducted to no...
Transmission Capacity of Wireless Ad Hoc Networks with Energy Harvesting Nodes
Vaze, Rahul
2012-01-01T23:59:59.000Z
Transmission capacity of an ad hoc wireless network is analyzed when each node of the network harvests energy from nature, e.g. solar, wind, vibration etc. Transmission capacity is the maximum allowable density of nodes, satisfying a per transmitter-receiver rate, and an outage probability constraint. Energy arrivals at each node are assumed to follow a Bernoulli distribution, and each node stores energy using an energy buffer/battery. For ALOHA medium access protocol (MAP), optimal transmission probability that maximizes the transmission capacity is derived as a function of the energy arrival distribution. Game theoretic analysis is also presented for ALOHA MAP, where each transmitter tries to maximize its own throughput, and symmetric Nash equilibrium is derived. For CSMA MAP, back-off probability and outage probability are derived in terms of input energy distribution, thereby characterizing the transmission capacity.
Inspiration from genetics to promote recognition and protection within ad hoc sensor networks
Korsnes, Reinert
2009-01-01T23:59:59.000Z
This work illustrates potentials for recognition within {\\em ad hoc} sensor networks if their nodes possess individual inter-related biologically inspired genetic codes. The work takes ideas from natural immune systems protecting organisms from infection. Nodes in the present proposal have individual gene sets fitting into a self organised phylogenetic tree. Members of this population are genetically ''relatives''. Outsiders cannot easily copy or introduce a new node in the network without going through a process of conception between two nodes in the population. Related nodes can locally decide to check each other for their genetic relation without directly revealing their gene sets. A copy/clone of a gene sequence or a random gene set will appear as alien. Nodes go through a cycle of introduction (conception or ''birth'') with parents in the network and later exit from it (''death''). Hence the phylogenetic tree is dynamic or possesses a genetic drift. Typical lifetimes of gene sets and number of offspring ...
Song, Yi
2011-01-01T23:59:59.000Z
In a cognitive radio (CR) network, CR users intend to operate over the same spectrum band licensed to legacy networks. A tradeoff exists between protecting the communications in legacy networks and maximizing the throughput of CR transmissions, especially when CR links are unstable due to the mobility of CR users. Because of the non-zero probability of false detection and implementation complexity of spectrum sensing, in this paper, we investigate a sensing-free spectrum sharing scenario for mobile CR ad hoc networks to improve the frequency reuse by incorporating the location awareness capability in CR networks. We propose an optimal power control algorithm for the CR transmitter to maximize the concurrent transmission region of CR users especially in mobile scenarios. Under the proposed power control algorithm, the mobile CR network achieves maximized throughput without causing harmful interference to primary users in the legacy network. Simulation results show that the proposed optimal power control algori...
Distributed Stochastic Power Control in Ad-hoc Networks: A Nonconvex Case
Yang, Lei; Zhang, Junshan; Li, Jason H
2011-01-01T23:59:59.000Z
Utility-based power allocation in wireless ad-hoc networks is inherently nonconvex because of the global coupling induced by the co-channel interference. To tackle this challenge, we first show that the globally optimal point lies on the boundary of the feasible region, which is utilized as a basis to transform the utility maximization problem into an equivalent max-min problem with more structure. By using extended duality theory, penalty multipliers are introduced for penalizing the constraint violations, and the minimum weighted utility maximization problem is then decomposed into subproblems for individual users to devise a distributed stochastic power control algorithm, where each user stochastically adjusts its target utility to improve the total utility by simulated annealing. The proposed distributed power control algorithm can guarantee global optimality at the cost of slow convergence due to simulated annealing involved in the global optimization. The geometric cooling scheme and suitable penalty pa...
Ad-hoc Authorship Attribution Competition, part of ALLC/ACH 2004 CNG Method with Weighted Voting
Keselj, Vlado
Ad-hoc Authorship Attribution Competition, part of ALLC/ACH 2004 CNG Method with Weighted Voting Vlado Keselj and Nick Cercone ({vlado,nick}cs.dal.ca) CNG Method for Authorship Attribution. The Common N-Grams (CNG) classification method for authorship attribution (AATT) was described in [2
Ad-hoc Authorship Attribution Competition, part of ALLC/ACH 2004 CNG Method with Weighted Voting
Keselj, Vlado
Ad-hoc Authorship Attribution Competition, part of ALLC/ACH 2004 CNG Method with Weighted Voting Vlado Ke#20;selj and Nick Cercone (fvlado,nickg@cs.dal.ca) CNG Method for Authorship Attribution. The Common N-Grams (CNG) classi#12;cation method for authorship attribution (AATT) was described in [2
Design Considerations for an On-Demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network
Brown, Timothy X.
1 Design Considerations for an On-Demand Minimum Energy Routing Protocol for a Wireless Ad Hoc at Boulder Boulder, CO-80309 Abstract--A minimum energy routing protocol reduces the energy con- sumption of energy to get the packets to their destination. This paper identifies the necessary features of an on
AN ECONOMICS-BASED POWER-AWARE PROTOCOL FOR COMPUTATION DISTRIBUTION IN MOBILE AD-HOC NETWORKS
Shang, Li
AN ECONOMICS-BASED POWER-AWARE PROTOCOL FOR COMPUTATION DISTRIBUTION IN MOBILE AD-HOC NETWORKS Li, Princeton, NJ 08544, USA ABSTRACT In this paper, we present a new economics-based power- aware protocol, called the distributed economic subcontracting protocol (DESP), that dynamically distributes task
Energy and Bandwidth-Efficient Key Distribution in Wireless Ad-Hoc Networks: A Cross-Layer
Lazos, Loukas
messages, and (d) average update energy. For each metric, we formulate an optimization problem and show1 Energy and Bandwidth-Efficient Key Distribution in Wireless Ad-Hoc Networks: A Cross metrics: (a) member key storage, (b) group controller (GC) transmissions, (c) multicast group (MG) update
Energy and Bandwidth-Efficient Key Distribution in Wireless Ad-Hoc Networks: A Cross-Layer
Poovendran, Radha
) multicast group (MG) update messages, and (d) average update energy. For each metric, we formulate1 Energy and Bandwidth-Efficient Key Distribution in Wireless Ad-Hoc Networks: A Cross, and GC transmissions, while significantly reducing the energy and bandwidth consumption of the network
Yu, Chansu
ABSTRACT With respect to energy balance in mobile ad hoc networks, there have been active of energy-related metrics to find the most energy- balancing route in route discovery procedure. However there have been few works touching the energy balance during data transmission that is addressed
Perkins, Dmitri
of fixed infrastructure. The primary motivation for such networks is increased flexibility and mobilityAbstract- Mobile Ad Hoc NETworks (MANETs) are an emerging class of network architectures that are characterized by their highly dynamic topology, limited resources (i. e., bandwidth and power), and lack
Int. J. Ad Hoc and Ubiquitous Computing, Vol. , No. , 2012 1 Worst-case Latency of Broadcast one year as a Research Fellow at Trinity College Dubin. He received his MSc degree in computer science and engi- neering in 2005 and his PhD in computer science in 2011 both from Link¨oping University. His Ph
Huang, Xinming
Int. J. Ad Hoc and Ubiquitous Computing, Vol. 1, No. 4, 2006 203 Copyright © 2006 Inderscience and Ubiquitous Computing, Vol. 1, No. 4, pp.203209. Biographical notes: Xin-Ming Huang is an Assistant Professor, embedded systems and reconfigurable computing. Jing Ma received BE and ME Degrees from North
A Power-Aware Technique to Manage Real-Time Database Transactions in Mobile Ad-Hoc Networks **
Gruenwald, Le
1 A Power-Aware Technique to Manage Real-Time Database Transactions in Mobile Ad-Hoc Networks ** Le@ou.edu; smbanik@ou.edu) ** This work is partially supported by the National Science Foundation grant No. EIA connectivity is required. Techniques that manage database transactions in MANET need to address additional
Enhancing the Support of Multi-Hopping in an IEEE 802.11 Ad-Hoc Hanem A. Eladly
Chen, Thomas M.
Enhancing the Support of Multi-Hopping in an IEEE 802.11 Ad-Hoc Network Hanem A. Eladly SMU, Dept of EE, PO Box 750338, Dallas, TX, USA heladly@mail.smu.edu Thomas M. Chen SMU, Dept of EE, PO Box 750338, Dallas, TX, USA tchen@mail.smu.edu Abstract Previous studies have proved that the performance of IEEE 802
Energy-Efficient Data Broadcasting in Mobile Ad-Hoc Networks** Le Gruenwald, Muhammad Javed, Meng Gu
Gruenwald, Le
is supported in part by National Science Foundation grant No. EIA-9973465 Abstract Energy saving is the mostEnergy-Efficient Data Broadcasting in Mobile Ad-Hoc Networks** Le Gruenwald, Muhammad Javed, Meng is the main method of information dissemination in wireless networks as its cost is independent of the number
228 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 7, NO. 2, APRIL 1999 Ad Hoc Mobility Management with
Haas, Zygmunt J.
the construction of UQS through the balanced incomplete block designs. The average cost, due to call loss is sometimes necessary to reduce the cost of mobility management. Index Terms--Ad hoc network, balanced on the average cost, we investigate the tradeoff between the system reliability and the cost of location updates
Bystroff, Chris
Energy-Efficient Location Service Protocols for Mobile Ad Hoc Networks Zijian Wang, Eyuphan Bulut the location of the destination node. Seldom they consider energy efficiency in their designs energy efficiency and improve the query success rate in comparison to the previously proposed algorithms
Paris-Sud XI, Université de
Abstract-- Wireless Sensor Network (WSN) is an emerging special type of ad-hoc wireless networks the needs for special type of applications where Wireless Sensor Networks (WSN) can play an important role that differentiate it from other types of wireless networks. These differences raise new challenges to be overcome
Characterizing the Interaction Between Routing and MAC Protocols in Ad-Hoc Networks
Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)
2002-01-01T23:59:59.000Z
We empirically study the effect of mobility on the performance of protocols designed for wireless ad-hoc networks. An important objective is to study the interaction of the Routing and MAC layer protocols under different mobility parameters. We use three basic mobility models: grid mobility model, random waypoint model, and exponential correlated random model. The performance of protocols is measured in terms of (i) latency, (ii) throughput, (iii) number of packets received, (iv) long term fairness and (v) number of control packets at the MAC and routing layer level. Three different commonly studied routing protocols are used: AODV, DSR and LAR1. Similarly three well known MAC protocols are used: MACA, 802.1 1 and CSMA. Our main contribution is simulation based experiments coupled with rigorous statistical analysis to characterize the interaction of MAC layer protocols with routing layer protocols in ad-hoc networks. From the results, we can conclude the following: e No single MAC or Routing protocol dominated the other protocols in their class. Probably more interestingly, no MAURouting protocol combination was better than other combinations over all scenarios and response variables. 0 In general, it is not meaningful to speak about a MAC or a routing protocol in isolation. Presence of interaction leads to trade-offs between the amount of control packets generated by each layer. The results raise the possibility of improving the performance of a particular MAC layer protocol by using a cleverly designed routing protocol or vice-versa. Thus in order to improve the performanceof a communication network, it is important to study the entire protocol stack as a single algorithmic construct; optimizing individual layers in the seven layer OS1 stack will not yield performance improvements beyond a point. A methodological contribution of this paper is the use of statistical methods such as analysis of variance (ANOVA), to characterize the interaction between the protocols, mobility patterns and speed. Such methods allow us to analyze complicated experiments with large input space in a systematic manner.
Sun, Yin; Li, Yunzhou; Zhou, Shidong; Xu, Xibin
2010-01-01T23:59:59.000Z
This paper studies a spectrum sharing scenario between an uplink cognitive relay network (CRN) and some nearby low power ad-hoc networks. In particular, the dynamic resource allocation of the CRN is analyzed, which aims to minimize the average interfering time with the ad-hoc networks subject to a minimal average uplink throughput constraint. A long term average rate formula is considered, which is achieved by a half-duplex decode-and-forward (DF) relay strategy with multi-channel transmissions. Both the source and relay are allowed to queue their data, by which they can adjust the transmission rates flexibly based on sensing and predicting the channel state and ad-hoc traffic. The dynamic resource allocation of the CRN is formulated as a non-convex stochastic optimization problem. By carefully analyzing the optimal transmission time scheduling, it is reduced to a stochastic convex optimization problem and solved by the dual optimization method. The signaling and computation processes are designed carefully t...
A State-of-the-art Survey on IDS for Mobile Ad-Hoc Networks and Wireless Mesh Networks
Deb, Novarun; Chaki, Nabendu
2011-01-01T23:59:59.000Z
An Intrusion Detection System (IDS) detects malicious and selfish nodes in a network. Ad hoc networks are often secured by using either intrusion detection or by secure routing. Designing efficient IDS for wireless ad-hoc networks that would not affect the performance of the network significantly is indeed a challenging task. Arguably, the most common thing in a review paper in the domain of wireless networks is to compare the performances of different solutions using simulation results. However, variance in multiple configuration aspects including that due to different underlying routing protocols, makes the task of simulation based comparative evaluation of IDS solutions somewhat unrealistic. In stead, the authors have followed an analytic approach to identify the gaps in the existing IDS solutions for MANETs and wireless mesh networks. The paper aims to ease the job of a new researcher by exposing him to the state of the art research issues on IDS. Nearly 80% of the works cited in this paper are published ...
Kawadia, Vikas
Principles and Protocols for Power Control in Wireless Ad Hoc Networks Vikas Kawadia and P. R. Kumar-- Transmit power control is a prototypical example of a cross-layer design problem. The transmit power level consumption. The challenge is to determine where in the architecture the power control problem
A Time-Slotted On-Demand Routing Protocol for Mobile Ad Hoc Unmanned Vehicle Systems
Hope Forsmann; Robert Hiromoto; John Svoboda
2007-04-01T23:59:59.000Z
The popularity of UAVs has increased dramatically because of their successful deployment in military operations, their ability to preserve human life, and the continual improvements in wireless communication that serves to increase their capabilities. We believe the usefulness of UAVs would be dramatically increased if formation flight were added to the list of capabilities. Currently, sustained formation flight with a cluster of UAVs has only been achieved with two nodes by the Multi-UAV Testbed at the Massachusetts Institute of Technology. (Park, 2004) Formation flight is a complex operation requiring the ability to adjust the flight patterns on the fly and correct for wind gusts, terrain, and differences in node equipment. All of which increases the amount of inner node communication. Since one of the problems with MANET communication is network congestion, we believe a first step towards formation flight can be made through improved inner node communication. We have investigated current communication routing protocols and developed an altered hybrid routing protocol in order to provide communication with less network congestion.
McGilvary, Gary Andrew
2014-11-27T23:59:59.000Z
Commercial and private cloud providers offer virtualized resources via a set of co-located and dedicated hosts that are exclusively reserved for the purpose of offering a cloud service. While both cloud models appeal to ...
Chatzigiannakis, Ioannis; Akribopoulos, Orestis; Logaras, Marios; Kokkinos, Panagiotis; Spirakis, Paul
2010-01-01T23:59:59.000Z
In this work, we discuss multiplayer pervasive games that rely on the use of ad hoc mobile sensor networks. The unique feature in such games is that players interact with each other and their surrounding environment by using movement and presence as a means of performing game-related actions, utilizing sensor devices. We discuss the fundamental issues and challenges related to these type of games and the scenarios associated with them. We also present and evaluate an example of such a game, called the "Hot Potato", developed using the Sun SPOT hardware platform. We provide a set of experimental results, so as to both evaluate our implementation and also to identify issues that arise in pervasive games which utilize sensor network nodes, which show that there is great potential in this type of games.
Communication Algorithms for Wireless Ad Hoc Networks
Viqar, Saira
2012-10-19T23:59:59.000Z
.4 Jittering trajectories : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 37 3.5 Uniform neighbor discovery block diagram. Each BNDP instance has a message processing (MP) automaton associated with it. : : : : : : : : : : 38 3.6 Hexagonal...
Clock synchronization for mobile ad hoc networks
Chandra, Rajan
2013-02-22T23:59:59.000Z
As mobile networking advances, there is a need for services such as clock synchronization that improve performance and support the development of higher-level applications. This can be achieved by adapting existing algorithms (such as the Network...
Smart & Connected Ad-Hoc Committee
Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site
an AHRI position on "smart" equipment Recently completed Proposed Framework for Demand Response Performance and Communication Specifications for SmartConnected Variable...
Multicast Routing in Ad-Hoc Networks
Garcia-Luna-Aceves, J.J.
2007-01-01T23:59:59.000Z
or IRs, which are wireless routers. However, it will beIR 100a-1001‘ is a wireless router with an IP address and anot be based on wireless links for router interconnection.
Adaptive protocols for mobile ad hoc networks
Holland, Gavin Douglas
2005-02-17T23:59:59.000Z
that are designed for this purpose. We investigate new link layer mechanisms that dynamically monitor and adapt to changes in link quality, including a protocol that uses common control messages to form a tight feedback control loop for adaptation of the link data..." changes in capacity that TCP is slow to detect. We then present a modi?ed version of TCP that is capable of more rapidly detecting and adapting to these changes. v To my wife, Lee Ann. vi ACKNOWLEDGMENTS No man is an island, entire of itself; every man...
Adaptive protocols for mobile ad hoc networks
Holland, Gavin Douglas
2005-02-17T23:59:59.000Z
. We investigate new link layer mechanisms that dynamically monitor and adapt to changes in link quality, including a protocol that uses common control messages to form a tight feedback control loop for adaptation of the link data rate to best match... of the presence of multirate links. We then investigate the performance of iv TCP, showing how communication outages caused by link failures and routing delays can be very detrimental to its performance. In response, we present a solution to this problem that uses...
Capacity consideration of wireless ad hoc networks
Tan, Yusong
2008-01-01T23:59:59.000Z
in Electrical Engineering (Communication Theory and Systems)of Science Electrical Engineering (Communication Theory andPhilosophy Electrical Engineering (Communication Theory and
Ad Hoc Assessment Committee Meeting Notes
O'Laughlin, Jay
learning outcomes · Modify the template to include space to provide information on results achieved from on university learning outcomes and template categories/directions using a "hover" feature · Simplify criteria and program benchmarks o Student interview processes, including HAC requirements o Survey
SBA: A Simple Backoff Algorithm for Wireless Ad Hoc Networks
GuÃ©rin-Lassous, Isabelle
approaches modify the BEB (Binary Exponential Backoff) al- gorithm of IEEE 802.11 to provide better. Contrary to the BEB algorithm, SBA has only two distinct contention window sizes. SBA also uses the same
Transportation Plan Ad Hoc Working Group | Department of Energy
Office of Environmental Management (EM)
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:5 TablesExports to3,1,50022,3,,0,,6,1,Separation 23 362 of Thomas P. D'Agostino Undersecretary for Nuclear1,andEarly|Materials
Performance Evaluation of Energy Efficient Ad Hoc Routing Protocols
Wang, Yu
28223, USA {lcao2, tdahlber, ywang32}@uncc.edu Abstract-- Energy aware routing protocols metric and aim to save energy consumption per packet. However, such protocols do not take the nodes' energy capacity into account. Thus, the energy consumption is not fair among nodes in the network
Power Efficient Broadcasting with Cooperative Diversity in Ad hoc Networks
Krishnamurthy, Srikanth
- munications can help combat interference and fading and hence, significantly improve the reliability-Output (MISO) system, a Single-Input Multi-Output (SIMO) system or a Multi-Input Multi- Output (MIMO) system exploits the broadcast nature of the wireless channel to emulate a MISO system. Nodes par- ticipating
The COMPOW Protocol for Power Control in Ad Hoc Networks
Kawadia, Vikas
.S Sreenivas and P.R. Kumar The Power Control problem · How do we choose the right transmit power level Power;3 Affects battery life · Higher power transmission is unnecessary if the receiver is close of links is critical · Find a way to ensure bidirectionality without breaking existing protocols
A Cooperative Communication Protocol for Wireless Ad-hoc Networks
, MMII. All rights reserved. The author hereby grants to MIT permission to reproduce and distribute in the network layer, where all nodes act as routers to relay messages. Cooperative transmission takes this idea. He was quick to o#11;er solutions when I worked my way into a corner, and constantly prompted me
Asymptotically Optimal Geometric Mobile Ad-Hoc Routing Fabian Kuhn
-geometric algorithm that also matches the lower bound, but needs some mem- ory at each node. This establishes
Truthful resource management in wireless ad hoc networks
Cai, Jianfeng
2005-11-01T23:59:59.000Z
for the public afiairs. This is reasonable because the network-wide energy saving is beneflcial for each node. Then, Pfvj = ^Pvi;vk + ^Pvk;vi+1 (3.1) vj is the winner of an auction and vk is the node of the second best bid. . After a redirection ends, another.... As an overhearing node vj competes to be the redirector within a hop, it needs to report to upstream node, vi, the minimum power Pvi;vj and listen to the downstream node, vi+1, to get the minimum power Pvj;vi+1. Since the payofi for a redirector is equal...
A Benchmarking System for Mobile Ad Hoc Network Routing Protocols
Hiranandani, Daniel
2012-01-01T23:59:59.000Z
Smart EnergyMap . . . . . . . . . . . . . . . . . . Smart Energy GridSelected for Smart Energy Grid Scenario . . . . . . . . .
INDOOR POSITIONING AN AD-HOC POSITIONING SYSTEM Rainer Mautz
to enable continuous tracking of the location of devices in all environments. Highly accurate, reliable 3D computers, printers, or simple tags with wireless radio connections that are `intelligent' enough to be able
Age Matters: Efficient Route Discovery in Mobile Ad Hoc Networks
Grossglauser, Matthias
part) by the National Competence Center in Research on Mobile Information and Communication Systems, resources such as bandwidth and bat- tery power are usually severely constrained in such networks. Therefore incur less overhead at the expense of higher route setup latency. Hybrid routing protocols [7, 6
Performance Evaluation of Ad Hoc Routing Protocols for Military Communications
Bouras, Christos
in an environment without a fixed infrastructure, the nodes are mobile, the wireless medium has its own limitations are search-and-rescue operations, military deployment in hostile environment, and several types of police of these networks. The nodes act as routers in an environment without a fixed infrastructure, the nodes are mobile
Scalable Phrase Mining for Ad-hoc Text Analytics
Waldmann, Uwe
, customer mail and reports, or Web 2.0 con- tributions offer a great potential for enhancing business, and Web 2.0 community data. This enables advanced Business-Intelligence (BI) ap- plications, or by focusing on a particular time period. We investigate alterna- tive definitions of phrase interestingness
Throughput Analysis of Wireless Ad-Hoc Cognitive Radio Networks
Banaei, Armin
2014-04-25T23:59:59.000Z
In this dissertation we consider the throughput performance of cognitive radio networks and derive the optimal sensing and access schemes for secondary users that maximizes their sum-throughput while guaranteeing certain quality of service...
Bid Activation Multiple Access in Ad Hoc Networks
Garcia-Luna-Aceves, J.J.
2006-01-01T23:59:59.000Z
12]. Each node bids on a varying number of data slots in acorrect schedule bid for slots. A Data B Fig. 2. E C Data Ddata, A and C will request activation. Hence, B will bid and
Maximizing the throughput of large ad hoc wireless networks
Hua, Yingbo; Huang, Yi; J, Garcia-Luna-Aceves J
2006-01-01T23:59:59.000Z
multi-input, single-output (MISO) protocol. During eachthe maximum throughput of the MISO protocol, in bits-meters/s/ Hz/node, is C MISO = (n ? 1) A log 2 1 + 2n P T ? h
Capacity of Wireless Ad Hoc Networks Using Practical Directional Antennas
, which is called MC-MDA network. The capacity in MC-MDA network is derived under arbitrary and random of side lobe and back lobe into account. We derive the capacity upper-bounds of MC-MDA networks decreases when s increases. Moreover, we compare the network capacity of MC-MDA using the simplified antenna
A Secure Routing Protocol for Ad Hoc Wireless Networks
Klappenecker, Andreas
't need to pass through firewalls or gateways Routing protocol controls the network but is based DSR uses source routes in data packets Can lead to DoS #12;Attacks using modification Tunneling Two
Unified Routing Scheme for Ad-Hoc Internetworking
Garcia-Luna-Aceves, J.J.
2007-01-01T23:59:59.000Z
life of tetherless wireless routers. By contrast, an on-IR is essentially a wireless IP router; with the exceptionswireless environment. In contrast to the IP Internet, mobility of hosts and routers,
Maximizing the throughput of large ad hoc wireless networks
Hua, Y; Huang, Y; Garcia-Luna-Aceves, J J
2006-01-01T23:59:59.000Z
network consists of wireless routers that are highly coop-point for every m wireless routers in a 2-D This capacitylinks are used for wireless routers). tion rates of a small
Section 180(c) Ad Hoc Working Group | Department of Energy
Office of Environmental Management (EM)
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:5 TablesExports to3,1,50022,3,,0,,6,1,Separation 23 362 334DepartmentCivilianAffairs, toSecondaryNatural ResourcesSecretary's 2014605 Buy
Security Communications Protocol Ad Hoc Working Group | Department of
Office of Environmental Management (EM)
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:5 TablesExports to3,1,50022,3,,0,,6,1,Separation 23 362 334DepartmentCivilianAffairs, toSecondaryNatural ResourcesSecretary'sWLANs using
Throughput Analysis of Wireless Ad-Hoc Cognitive Radio Networks
Banaei, Armin
2014-04-25T23:59:59.000Z
In this dissertation we consider the throughput performance of cognitive radio networks and derive the optimal sensing and access schemes for secondary users that maximizes their sum-throughput while guaranteeing certain ...
A Full Scale Wireless Ad Hoc Network Test Bed
Brown, Timothy X.
that are bench top, indoor, fixed outdoor, and mobile outdoor. Bench top test beds employ MAC filtering, RF and propagation of the outdoor environment. Full scale outdoor test beds are often restricted to fixed sites [1 features: 1. Test bed results are reproducible. 2. The test bed provides a common platform for testing
Information Dissemination in Mobile Ad-Hoc Geosensor Networks
Duckham, Matt
, and Lars Kulik3 1 National Center for Geographic Information and Analysis University of Maine, Orono, ME-aware systems are founded on a centralized model of information systems, typified by the client-server model- dancy. 1 Introduction Increasing decentralization is a widespread feature of information system archi
Geographic multicasting in wireless ad-hoc networks
Gopalakrishnan, Dhilip
1998-01-01T23:59:59.000Z
. A. The Network Model . B. Basic Principles C. The Geocast-Routing Protocol 1. Details of the Algorithm . 2. Partial Link Reversal Scheme . 3. Creation of the DAG 4. Maintenance of the DAG D. The Geocast - Multicast Protocol 1. Geocast... I Geocast-Routing: Message Types 19 LIST OF FIGURES FIGURE Page An Illustration 13 Directed Acyclic Graph 17 Creation of the Network DAG 20 Link Failure Without Link Reversals Link Failure With Link Reversals . . 21 23 Partition Detection...
Throughput optimal routing in wireless Ad-hoc networks
Zhuang, Hairuo
2010-01-01T23:59:59.000Z
in Electrical Engineering (Communication Theory and Systems)Ph. D. in Electrical Engineering (Communication Theory andin Electrical Engineering (Communication Theory and Systems)
Power and spectrum efficient communications in wireless ad hoc networks
Qu, Qi
2008-01-01T23:59:59.000Z
in Electrical and Computer Engineering (Communication Theoryin Electrical Engineering (Communication Theory and Systems)in Electrical Engineering (Communication Theory and Systems)
Randomized location service in Mobile Ad Hoc Networks
Bhattacharya, Sangeeta
2003-01-01T23:59:59.000Z
. nodes miuntain location information through flooding. Each node periodically broadcasts its location to the entire network. The location updates are transmitted based on the mobility rate of a node. Thus a node moving faster transmits messages more... often than a slow moving node. Also, far away nodes are updated less I'requently than nearby nodes. Location information is thus maintamcd proactivcly, however, route discovery, that uses the location information, is done in an on-demand fashion...
A Statistical Framework for Intrusion Detection in Ad Hoc Networks
Sarkar, Saswati
with limited processing power. The overall framework provides a good balance between complexity and performance means of electronic com- munication in areas where establishing infrastructure like base stations etc. [5], [6]. These intrusions leverage system vulnerabilities. There are two ways to prevent
Resource Management in Multi-hop Ad Hoc Networks
, they do not provide a way to control the consumption of resources in the network, such as the battery power or the carrying capacity of the nodes. This proposal describes a scheme of path-state and flow : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 5 5.2 Balancing Battery Life
Towards the Efficient Design of Vehicular Ad-Hoc Networks
Dulmage, Jared
2012-01-01T23:59:59.000Z
OFDM Outage . . . . . . . . . . .Outage probability vs.vs. SNR . . . . . . . . . . . . . . . . . . . . . . Outage
Power and spectrum efficient communications in wireless ad hoc networks
Qu, Qi
2008-01-01T23:59:59.000Z
A. Bahai, “Energy-efficiency of MIMO and cooperative MIMOMIMO-based cooperative communication for energy-constrainedcooperation, cooperative MIMO can achieve better energy and
Lifeline: Emergency Ad hoc Network Se-Hang Cheong1
Si, Yain Whar "Lawrence"
propagation techniques. Lifeline also has the ability to recover from partial crash of network and nodes lost be disrupted during natural disasters, such as earthquakes, hurricane, tsunami, etc. In such situations, mobile from partial crash of network and nodes lost. In this paper, we show how commonly available mobile
Enabling Disconnected Transitive Communication in Mobile Ad Hoc Networks
Chaudhuri, Soma
are no longer explicitly aware of their presence, much the way the electric motor exists in the world today into multiple clusters, with connectivity available within each partition but not across partitions. Freeing
Topology management protocols in ad hoc wireless sensor networks
Kim, Hogil
2009-05-15T23:59:59.000Z
A wireless sensor network (WSN) is comprised of a few hundred or thousand au-tonomous sensor nodes spatially distributed over a particular region. Each sensornode is equipped with a wireless communication device, a small microprocessor, anda battery...
A Distributed Policy Enforcement Architecture for Mobile Ad-Hoc Networks
Yang, Junfeng
of the architecture using a multitude of tech- niques. We define a threat model and a security analysis based on that threat model. We conduct a preliminary evaluation of the system using the GloMoSim simulator. Through simulations, we show that our solution incurs minimal overhead in terms of network band- width and latency
Cluster-Based Failure Detection Service for Large-Scale Ad Hoc Wireless Network Applications
Sanders, William H.
Introduction Recent advances in MEMS (micro-electro-mechanical systems) and wireless networking technologies
Neighbour -Aware, Collision Avoidance MAC Protocol (NCMac) for Mobile Ad Hoc Networks
. The IEEE 802.11 specifies the Binary Exponential Backoff (BEB) algorithm, where the duration of a backoff
Security of Future eEnabled Aircraft Ad hoc Networks Krishna Sampigethaya
Poovendran, Radha
with some open problems. I. Introduction Aviation is today faced with major challenges due effort called NextGen between the Federal Aviation Administration (FAA) and other federal agencies operation, maintenance and control. For example, the Global Positioning System (GPS) and Automated Dependent
PERFORMANCE ANALYSIS OF POWER-AWARE ROUTE SELECTION PROTOCOLS IN MOBILE AD HOC NETWORKS
California at Santa Cruz, University of
, a hybrid protocol like the CMMBCR (Conditional Max-Min Battery Capacity Routing) mechanism has been devised-Max Battery Cost Routing) scheme tries to consider the remaining battery power of nodes to prolong- gardless of the remaining battery power of nodes. Since the transmission network2002: submitted to World
Chuah, Mooi-Choo "Mooi"
] uses a variant of Telsa [8] to provide source authentication for DSR. All the above approaches suggest
Best effort QoS support routing in mobile ad hoc networks
Luo, Heng
2012-06-25T23:59:59.000Z
In the past decades, mobile traffic generated by devices such as smartphones, iphones, laptops and mobile gateways has been growing rapidly. While traditional direct connection techniques evolve to provide better access ...
Mobility changes anonymity: new passive threats in mobile ad hoc networks
Hong, Xiaoyan; Kong, Jiejun; Gerla, Mario
2006-01-01T23:59:59.000Z
delay on most portable mobile devices. D. Anonymity study inmobile nodes and prepare the counterattacks. The needed eavesdropping devices,
A Failure Self-recovery Strategy with Balanced Energy Consumption for Wireless Ad Hoc Networks
Qiu, Tie; Xia, Feng; Wu, Guowei; Zhou, Yu
2012-01-01T23:59:59.000Z
In energy constrained wireless sensor networks, it is significant to make full use of the limited energy and maximize the network lifetime even when facing some unexpected situation. In this paper, all sensor nodes are grouped into clusters, and for each cluster, it has a mobile cluster head to manage the whole cluster. We consider an emergent situation that one of the mobile cluster heads is broken down, and hence the whole cluster is consequently out of work. An efficient approach is proposed for recovering the failure cluster by selecting multiple static sensor nodes as the cluster heads to collect packets and transmit them to the sink node. Improved simulated annealing algorithm is utilized to achieve the uniform deployment of the cluster heads. The new cluster heads are dynamically changed in order to keep balanced energy consumption. Among the new cluster heads, packets are transmitted through multi-hop forwarding path which is cost-lowest path found by Dijkstra's algorithm. A balanced energy consumptio...
An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network
Telecommunications, University of Colorado , Boulder, CO, USA A minimum energy routing protocol reduces the energy is maxi- mized. While research continues to reduce the energy consumption for the CPU, user interface communication the- ory focuses on physical and link layer mechanisms for reducing energy consumption. Here we
Report of the Provost's Ad Hoc Committee on Faculty in Interdisciplinary Programs
Emshwiller, Eve
development (e.g., administrative staff, course buyouts for lead faculty). 2. Allocation of Credit to Academic
Robust Position-Based Routing in Wireless Ad Hoc Networks with Unstable Transmission Ranges
Chaudhuri, Soma
Barri~re Departament de Matem&tica Aplicada i Telem&tica Univ. Polit~.cnicade Catalunya Barcelona, Spain
Role-Based Multicast in Highly Mobile but Sparsely Connected Ad Hoc Networks
Briesemeister, Linda
airbag ig- nition. Then, it can report the accident instantly to equipped vehicles nearby. We present
An Analytical Framework for Neighbor Discovery Strategies in Ad hoc Networks with Sectorized
Park, Joon-Sang
/reception directions. Neighbor discovery is a process of finding one-hop neighbors and is the first step towards. An analytical model for randomized neighbor discovery algorithms is presented in [9]; however, due to its inherent limitation the model can only be used to analyze randomized neighbor discovery algorithms and thus
High-Precision Ad-Hoc Indoor Positioning in Challenging Industrial Environments
Sreenan, Cormac J.
infrastructure. Several technologies are assessed with regard to these challenges and their shortcomings relatively quickly and easily. Sample environments include chemical plants and oil or gas rigs. These surveys will cause problems for positioning technologies that use radio propagation methods, line-of-sight methods
Investigation of Media Access Control Protocols for Mobile Ad-hoc Networks
, the protocol guarantees bounded delay for emergency tra c. #12;4 1 EXECUTIVE SUMMARY This report contains.D. Final Report Submitted to: National Institute of Standards and Technology Gaithersburg, MD 20899-0001 Request no. Q-912364 Purchase request no. 892-9326 #12;2 Contents 1 EXECUTIVE SUMMARY 4 2 Introduction 6 3
A MULTIMEDIA CONFERENCING ON A MOBILE AD-HOC NETWORK OVER VEHICLES
Jang, Ju-Wook
-dong, Hwaseong-si, Gyeonggi-do, Korea 445-706° Next Generation Vehicle Technology(NGV), Shinlim-dong, Kwanak
Cross-layer design of wideband CDMA systems and cooperative diversity for wireless ad hoc networks :
Annavajjala, Ramesh
2006-01-01T23:59:59.000Z
protocol: Power allocation as a function of rate Rate=1/4optimal power allocation is plotted as a function of ? inour objective functions. Optimum Bandwidth Allocation If we
Asplund et al. Wireless Ad Hoc Dissemination for Search and Rescue Proceedings of the 7th
is now fully decentralized and relies on text communication to achieve energy efficiency. Keywords FOSS infrastructure and prevalence of electricity blackouts seems an obvious premise when planning for emergency
2004 David Malan, Harvard University 1 CodeBlue: An Ad Hoc Sensor Network
Malan, David J.
software Shared-key encryption and MAC layer based on SKIPJACK Power-aware, multihop routing protocol of patient status is difficult Current systems are paper-, phone-, radio-based Sensor nets have potential Publish/subscribe data delivery model Sensor nodes publish vital signs, location, identity Rescue
A Scalable Model for Channel Access Protocols in Multihop Ad Hoc Networks
California at Santa Cruz, University of
@soe.ucsc.edu ABSTRACT A new modeling framework is introduced for the analytical study of medium access control (MAC be modeled individually, i.e., it allows a per-node setup of many layer-specific parameters. Moreover methodologies; C.4 [Performance of Systems]: Modeling Techniques; C.2.5 [Local and Wide-Area Net- works]: Access
Collaborative Sensing via Local Negotiations in Ad Hoc Networks of Smart Cameras
Qureshi, Faisal Z.
to the lack of any centralized control. Categories and Subject Descriptors H.4 [Information Systems protocol that al- lows cameras nodes to setup collaborative tasks in a purely distributed manner. Camera-contained vision systems, with increasingly sophisticated image sensors, on-board processing and stor- age
Routing Mechanisms for Mobile Ad Hoc Networks based on the Energy Drain Rate
Obraczka, Katia
-points are not directly within their radio range. A critical issue for MANETs is that the activity of #12;nodes is power which nodes can be part of an active route. We describe new route selection mechanisms for MANET routing extends nodal battery life and the duration of paths, while CMDR also minimizes the total transmission
Routing Mechanisms for Mobile Ad Hoc Networks based on the Energy Drain Rate
Obraczka, Katia
points are not directly within their radio range. A critical issue for MANETs is that the activity of #12; nodes is power which nodes can be part of an active route. We describe new route selection mechanisms for MANET routing extends nodal battery life and the duration of paths, while CMDR also minimizes the total transmission
Design and analysis of distributed primitives for mobile ad hoc networks
Chen, Yu
2006-10-30T23:59:59.000Z
, 39, 24, 2, 1, 12, 15, 14, 13, 16 and has length 82. The bold nodes in this sequence are a65 , a40 and the neighbors of a40 . We now consider the construction of a family of graphs, a34a207a35 , a12 a53 a144a66a109a81a149a113a109a17a141a59a141a59a141... graph satisfying a32a1a33 15 Fig. 4. Construction of a34a2a35 and a40a41a39 a53 a40a74a143a172a48a73a44 a154 a144a45a49a148a141a13a8 . Note that each a167 a39 satis es a32a1a33 with respect to a40a71a39a90a109a93a65a38a39 and a9 , and the xed point...
Community-based Bus System as Routing Backbone for Vehicular Ad Hoc Networks
Chu, Xiaowen
information [2] and tourist points of interest [3]. The work in the second category is to deliver messages collection and information sharing [4]. The work in the third category is to disseminate messages, e, Yiu-Wing Leung, Xiaowen Chu and Beihong Jin State Key Laboratory of Computer Science, Institute
AUTONOMOUS UNDERSEA SYSTEMS NETWORK (AUSNET) PROTOCOLS TO SUPPORT AD-HOC AUV COMMUNICATIONS
(as opposed to network support) data transmissions. Next steps in this effort will focus on store to support a dynamically evolving topology of truly semi-autonomous networked robots. Emerging flexible low bandwidth, energy efficient architectures and protocols will enable more effective networked subsurface
Design and analysis of distributed primitives for mobile ad hoc networks
Chen, Yu
2006-10-30T23:59:59.000Z
by the network, which poses a serious challenge for the design and analysis of reliable protocols. In this work, three different approaches are used to handle mobility. The first part of the dissertation employs the simple technique of ignoring the mobility...
Performance Analysis of Transactional Traffic in Mobile Ad-hoc Networks
Cheng, Yufei
2014-05-31T23:59:59.000Z
are expected to present different characteristics and pose different requirements for transport protocols as well as routing protocols. The canonical transport protocol to carry transactional traffic is HTTP on TCP, there are several drawbacks for TCP to better... contribution from the ResiliNets group we have mod- eled DSDV routing protocol [19], 3D–Gauss-Markov mobility model [20], TDMA MAC protocol, DSR routing protocol [21], and HTTP traffic generator [22], TCP Westwood and Westwood+ [23]. This thesis demonstrates...
Reliable Routing in Vehicular Ad hoc Networks Gongjun Yan1 Nathalie Mitton2 Xu Li2
Paris-Sud XI, Université de
range (e.g., mandated by the Federal Communications Commission in the United States), routing paths topology is constantly changing and the wireless communication links are inherently unstable, due to high) that provides vehicle-to-vehicle and vhicle-to-roadside wireless communications. It was first introduced
Securing Network Services for Wireless Ad Hoc and Sensor Networks Loukas Lazos
Lazos, Loukas
RLoc that is well suited in resource-constrained environments such as Wireless Sensor Networks (WSN). Furthermore we on the quantification of the performance of WSN. We address the problem of coverage in stochastically deployed WSN and Geometric Probability we provide analytical formulas for heterogeneous WSN, where sensors do not have
Ad-Hoc Real-time Agent Networks Summer Research Institute
to interference and unreliable wireless medium Enables PHY-layer security #12;Micro- Controller PIC18F8720 Power => robustness, adaptivity #12;Research Results On-line calibration of analog sensor interfaces Compensates
Social Welfare Based Routing in Ad hoc Networks Mingming Lu and Jie Wu
Wu, Jie
is to save energy. Existing energy-efficient routing protocols save energy by selecting the lowest energy cost route. However, energy saving is not equal to energy efficiency. Consider a large number, and hence most packets transmitted through this path are lost, it is energy waste rather than energy saving
The Limits of Theory: Pragmatic Challenges in Mobile Ad Hoc Systems
Lenders, Vincent
, Martin May ETH Zurich 8092 Zurich, Switzerland legendre,maym@tik.ee.ethz.ch Vincent Lenders Armasuisse 3000 Berne, Switzerland lenders@tik.ee.ethz.ch Gunnar Karlsson KTH, Royal Inst. of Technology 10044
Multi-path Routing Protocols in Wireless Mobile Ad Hoc Networks: A Quantitative
Lenders, Vincent
Parissidis, Vincent Lenders, Martin May, and Bernhard Plattner Swiss Federal Institute of Technology Communications Systems Group Gloriastrasse 35, 8092 Zurich, Switzerland {parissid, lenders, may, plattner
A Self-Organizing Heuristic for Building Optimal Heterogeneous Ad-Hoc Sensor Networks
Minai, Ali A.
with equal power, which means that they all have the same transmission radius. Such homoge- neous networks-making about transmission power. However, in sufficiently dense networks (or in networks with significant amount of work on heterogeneous networks, mainly due to their flexibility and better fit into potential
MODULO AND GRID BASED CHANNEL SELECTION IN AD HOC Gareth Owen Mo Adda
Kent, University of
based. Antenna techniques attempt to reduce the interference or mitigate it by for example, directional, University of Portsmouth Buckingham Building, Lion Terrace, Portsmouth England, PO1 3HE {gareth.owen, mo.adda}@port.ac channels. We analyse many techniques requiring only information available locally and those that do
Master thesis Implementation of an ad-hoc routing module for
Router framework and the design of a wireless test bed based upon this implementation. The code. The router can be executed in user level or kernel level as well as in the network simulator ns. Performance analysis of the OLSR implementation in Click showed that the single threaded router environment of Click
EFFECT OF MOBILITY ON PERFORMANCE OF WIRELESS AD-HOC NETWORK PROTOCOLS.
Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, M. V. (Madhav V.); Marathe, A. (Achla)
2001-01-01T23:59:59.000Z
We empirically study the effect of mobility on the performance of protocols designed for wireless adhoc networks. An important ohjective is to study the interaction of the Routing and MAC layer protocols under different mobility parameters. We use three basic mobility models: grid mobility model, random waypoint model, and exponential correlated random model. The performance of protocols was measured in terms of (i) latency, (ii) throughput, (iii) number of packels received, (iv) long term fairness and (v) number of control packets at the MAC layer level. Three different commonly studied routing protocols were used: AODV, DSR and LAR1. Similarly three well known MAC protocols were used: MACA, 802.1 1 and CSMA. The inair1 conclusion of our study include the following: 1. 'I'he performance of the: network varies widely with varying mobility models, packet injection rates and speeds; and can ba in fact characterized as fair to poor depending on the specific situation. Nevertheless, in general, it appears that the combination of AODV and 802.1 I is far better than other combination of routing and MAC protocols. 2. MAC layer protocols interact with routing layer protocols. This concept which is formalized using statistics implies that in general it is not meaningful to speak about a MAC or a routing protocol in isolation. Such an interaction leads to trade-offs between the amount of control packets generated by each layer. More interestingly, the results wise the possibility of improving the performance of a particular MAC layer protocol by using a cleverly designed routing protocol or vice-versa. 3. Routing prolocols with distributed knowledge about routes are more suitable for networks with mobility. This is seen by comparing the performance of AODV with DSR or LAR scheme 1. In DSli and IAR scheme 1, information about a computed path is being stored in the route query control packct. 4. MAC layer protocols have varying performance with varying mobility models. It is not only speed that influences the performance but also node degree and connectivity of the dynamic network that affects the protocol performance. 'The main implication of OUI' work is that performance analysis of protocols at a given level in the protocol stack need to be studied not locally in isolation but as a part of the complete protocol stack. The results suggest that in order to improve the pcrlormance of a communication network, it will be important to study the entire protocol stack as a single algorithmic construct; optimizing individual layers in the 7 layer OS1 stilck will not yield performance improvements beyond a point. A methodological contribution of this paper is the use of statistical methods such as design of experinierits arzd aiialysis qf variance methods to characterize the interaction between the protocols, mobility patterns and speed. This allows us to mako much more informed conclusions about the performance of thc protocols than would have been possible by merely running these experiments and observing the data. These ideas are of independtmt interest and are applicable in other contexts wherein one experimentally analyzes algorithms.
Ad-hoc wireless network coverage with networked robots that cannot localize
Correll, Nikolaus
We study a fully distributed, reactive algorithm for deployment and maintenance of a mobile communication backbone that provides an area around a network gateway with wireless network access for higher-level agents. Possible ...
Ad hoc wireless networks with femto-cell deployment: a study
Bharucha, Zubin Rustam
2010-01-01T23:59:59.000Z
Nowadays, with a worldwide market penetration of over 50% in the mobile telecommunications sector, there is also an unrelenting demand from the subscribers for ever increasing transmission rates and availability of ...
Leung, Kin K.
and the special characteristics and technical challenges that they exhibit. They offer a tempting solution algorithms and data dissemination for VANETs. Specifically, we propose a cross- layer approach to the link smoothed average of the signal strength of every packet received by a specific sender. In order to moni
Applying Light Natural Language Processing to Ad-Hoc Cross Language Information Retrieval
Lioma, C.
Lioma,C. Macdonald,C. Plachouras,V. He,B. Ounis,I. In Accessing Multilingual Information Repositories: 6th Cross-Language Evaluation Forum, CLEF 2005, Vienna, Austria, Revised Selected Papers. Lecture Notes in Computer Science, Vol. 4022 LNCS, Springer
Phase Transition Behavior of Message Propagation in Delay Tolerant Vehicular Ad Hoc Networks
Little, Thomas
that is used to avoid contention in the system for shared resources and avoid accidents. By interconnecting part of networked information and control systems [1, 2]. Vehicle manufacturers seek to enhance connectivity. Creating safer transportation system is an important goal. One way of achieving safety
Real-Time Spatio-Temporal Query Processing in Mobile Ad-Hoc Sensor Networks
that has multiple sensors (e.g., mo- tion sensors, acoustic sensors, infrared light emitting diodes, and pa
RealTime SpatioTemporal Query Processing in Mobile AdHoc Sensor Networks
that has multiple sensors (e.g., mo tion sensors, acoustic sensors, infrared light emitting diodes,
A PROBABILITY COLLECTIVES APPROACH TO WEIGHTED CLUSTERING ALGORITHMS FOR AD HOC NETWORKS
Ross, Kevin
personnel or soldiers on the battlefield. It is an inefficient use of power, battery life, and bandwidth
Geodesic packet routing over self-organizing mobile ad-hoc
Julien, Christine
by devices with severe constraints on processing power, battery life, and bandwidth. Manuscript received
DYNAMMA: A DYNAmic Multi-channel Medium Access Framework for Wireless Ad HocNetworks
Garcia-Luna-Aceves, J.J.
2007-01-01T23:59:59.000Z
Estrin. An energy-efficient MAC protocol for wireless sensoradaptive energy- efficient MAC protocol for wireless sensorEnergy-efficient collision-free medium access control for wireless
Efficient Broadcast in Wireless Ad Hoc and Sensor Networks with a Realistic Physical Layer
Garcia-Luna-Aceves, J.J.
2008-01-01T23:59:59.000Z
T. H. Meng. Minimum energy mobile wireless networks. IEEE J.minimum-energy multicast tree construction in wireless adenergy-efficient broadcast and multicast trees in wireless
Multipath Routing in Ad Hoc Networks An-I Andy Wang Geoffrey H. Kuenning Peter Reiher
Wang, Andy
way to recover from frequent network failures, balance load and energy resources among network nodes table entries to become out of date before ever being used. Newer on-demand approaches maintain table. However, such approaches are still inefficient, since mobility can frequently break those on-demand routes
Short Paper: A Reservation MAC Protocol for Ad-Hoc Underwater Acoustic Sensor Networks
Roy, Sumit
to shore or surface buoys equipped with RF modems and signif- icant battery power; the other fixed are interconnected us- ing acoustic communications for cost effective data trans- port. The acoustic channel, however and mobile non-gateway nodes are typically much more power limited. MAC protocol design for such a network
On physical carrier sensing for random wireless ad-hoc networks
Wong, Chiu Ngok Eric
2008-01-01T23:59:59.000Z
in Electrical Engineering (Communication Theory and Systems)Field: Electrical Engineering (Communication Theory andin Electrical Engineering (Communication Theory and Systems)
Cross-layer design of wideband CDMA systems and cooperative diversity for wireless ad hoc networks :
Annavajjala, Ramesh
2006-01-01T23:59:59.000Z
in Electrical Engineering (Communication Theory and Systems)Ph. D. , Electrical Engineering (Communication Theory andin Electrical Engineering (Communication Theory and Systems)
Distributed CA-based PKI for Mobile Ad hoc Networks using Elliptic Curve Cryptography
Gaj, Krzysztof
Zouridaki1, Brian L. Mark1 , Kris Gaj1, Roshan K. Thomas2 1 George Mason University, Electrical and Computer for several reasons: (1) lack of a fixed infrastructure; (2) a centralized certification authority (CA of nodes vary in time; (4) nodes often have limited transmission and computational power, storage
Impact of Asymmetric Traffic Densities on Delay Tolerant Vehicular Ad Hoc Networks
is considered as an enabler for driverless cars of the future [1]. Presently, there is a strong need to enable-neighbor communication, for safety appli- cations, and multihop communications for message propagation. Due to frequent vehicular communication for applications such as safety messaging, traffic and congestion monitoring
On the Modeling of Entities for Ad-Hoc Entity Search in the Web of Data
-Verlag Berlin Heidelberg 2012 #12;134 R. Neumayer, K. Balog, and K. Nørvåg dbpedia:Audi_A4 dbpedia:Volkswagen
A Study of Connectivity in MIMO Fading Ad-Hoc Networks
Yousefi'zadeh, Homayoun; Jafarkhani, Hamid; Kazemitabar, Javad
2009-01-01T23:59:59.000Z
Approximations to the Outage Capacity of MIMO channels? ,”of connectivity relying on the outage capacity of MIMOis de?ned based on an outage capacity analysis for such
Cross-layer design of wideband CDMA systems and cooperative diversity for wireless ad hoc networks :
Annavajjala, Ramesh
2006-01-01T23:59:59.000Z
High SNR Outage Analysis . . . . . . . . . . .Accuracy of High SNR Outage Probability Approximations . . .of High SNR Outage Probability Expressions . . . . .
Simultaneous localization and tracking in wireless ad-hoc sensor networks
Taylor, Christopher J. (Christopher Jorgen)
2005-01-01T23:59:59.000Z
In this thesis we present LaSLAT, a sensor network algorithm that uses range measurements between sensors and a moving target to simultaneously localize the sensors, calibrate sensing hardware, and recover the target's ...
Automatic Hypermedia Generation for Ad-hoc Queries on Semi-structured Data
Houben, Geert-Jan
attributes or to show extra ones. The user also enters object selection criteria. We could use a language process. We address important aspects of the software that facilitates the genera- tion process. KEYWORDS for the desired information. Our target applications are collections or libraries of digital (semi
A resilient synchronization algorithm for wireless ad hoc and sensor networks based on distributed
Spagnolini, Umberto
) to the establishment of period oscillations with the same frequency and, possibly, phase (e.g., for medium access with: (i) construction of a packet, (ii) queuing at the MAC layer, (iii) propagation and (iv a benign environment and cannot survive the presence of malfunctioning nodes in an emergency situation
MULTIPATH HYBRID AD HOC NETWORKS FOR AVIONICS APPLICATIONS IN DISASTER AREA
Atiquzzaman, Mohammed
helicopters up in the sky and first responders on the ground. However, transmitting video and running high for rapidly establishing communication among the helicopters and first responders in a disaster area, among helicopters and ground responders to carry out necessary relief efforts. Our proposed network
Analytical Study of Backoff Algorithms for MAC Protocol in Mobile Ad Hoc Networks
Manaseer, S.
Manaseer,S. Ould-Khaoua,M. Mackenzie,L. 22nd Uk Performance Engineering Workshop, Bournemouth University pp 89-94
PMW: a Robust Clustering Algorithm for Mobile Ad-hoc Networks Zhaowen Xing and Le Gruenwald
Gruenwald, Le
are managed by a node in the cluster, called cluster head, has been proven to be a promising approach. Many calculating the weight utilized to determine whether a node is eligible to be a cluster head, these algorithms either consider only one metric (like mobility or power of nodes), or rely on some metric collected from
Rossi, Michele
and a set of unlicensed nodes. The primary network consists of a source, a destination and a set Department of Information Engineering, University of Padova, Italy CWCSPR, New Jersey Institute of Technology of additional primary nodes that can act as relays. In addition, the secondary nodes can be used as extra relays
Instability corners in AdS space
Fotios V. Dimitrakopoulos; Ben Freivogel; Matthew Lippert; I-Sheng Yang
2014-10-07T23:59:59.000Z
We investigate whether arbitrarily small perturbations in global AdS space are generically unstable and collapse into black holes on the time scale set by gravitational interactions. We argue that current evidence, combined with our analysis, strongly suggests that a set of nonzero measure in the space of initial conditions does not collapse on this time scale. On the other hand, existing results do not provide an equally strong indication whether the unstable solutions also form a set of nonzero measure. We perform an analysis in position space to address this puzzle, and our formalism allows us to directly address the vanishing-amplitude limit. We show that gravitational self-interaction leads to tidal deformations which are equally likely to focus or defocus energy, and we sketch the phase diagram accordingly. We also clarify the connection between gravitational evolution in global AdS and holographic thermalization.
Refined Holographic Entanglement Entropy for the AdS Solitons and AdS black Holes
Masafumi Ishihara; Feng-Li Lin; Bo Ning
2013-04-04T23:59:59.000Z
We consider the refinement of the holographic entanglement entropy for the holographic dual theories to the AdS solitons and AdS black holes, including the corrected ones by the Gauss-Bonnet term. The refinement is obtained by extracting the UV-independent piece of the holographic entanglement entropy, the so-called renormalized entanglement entropy which is independent of the choices of UV cutoff. Our main results are (i) the renormalized entanglement entropies of the AdS$_{d+1}$ soliton for $d=4,5$ are neither monotonically decreasing along the RG flow nor positive definite, especially around the deconfinement/confinement phase transition; (ii) there is no topological entanglement entropy for AdS$_5$ soliton even with Gauss-Bonnet correction; (iii) for the AdS black holes, the renormalized entanglement entropy obeys an expected volume law at IR regime, and the transition between UV and IR regimes is a smooth crossover even with Gauss-Bonnet correction; (iv) based on AdS/MERA conjecture, we postulate that the IR fixed-point state for the non-extremal AdS soliton is a trivial product state.
SPI 2009 1 Introduction Software-intensive automation systems, like industrial manufacturing plants, need automation systems and thus becomes more complex. System requirements may change even late in the development process, lead to ad-hoc modifications of the product and require systematic (and automated) testing
Misra, Satyajayant
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. 1 Secure and Robust Localization the problem of accurate localization of static or mobile nodes in a wireless ad hoc network, using
Large rotating AdS black holes from fluid mechanics
Sayantani Bhattacharyya; Subhaneil Lahiri; R. Loganayagam; Shiraz Minwalla
2008-07-25T23:59:59.000Z
We use the AdS/CFT correspondence to argue that large rotating black holes in global AdS(D) spaces are dual to stationary solutions of the relativistic Navier-Stokes equations on S**(D-2). Reading off the equation of state of this fluid from the thermodynamics of non-rotating black holes, we proceed to construct the nonlinear spinning solutions of fluid mechanics that are dual to rotating black holes. In all known examples, the thermodynamics and the local stress tensor of our solutions are in precise agreement with the thermodynamics and boundary stress tensor of the spinning black holes. Our fluid dynamical description applies to large non-extremal black holes as well as a class of large non-supersymmetric extremal black holes, but is never valid for supersymmetric black holes. Our results yield predictions for the thermodynamics of all large black holes in all theories of gravity on AdS spaces, for example, string theory on AdS(5) x S**5 and M theory on AdS(4) x S**7 and AdS(7) x S**4.
Steel, G.; Maidl, M.; Bundy, Alan
We describe Coral, a counterexample finder for incorrect inductive conjectures. By devising a first-order version of Paulson's formalism for cryptographic protocol analysis, we are able to use Coral to attack protocols which may have an unbounded...
Panwar, Shivendra S.
@photon.poly.edu, jlee25@utopia.poly.edu. Abstract-- Recent research shows that animals can be guided remotely, The system architecture and operation is introduced, and major challenges and issues are discussed. Because to sensor networks using robots. In this paper, we will first introduce the system architecture and major
Thorhaug, A. (ed.)
1980-01-01T23:59:59.000Z
This report of Workshop I (presented in outline form) by the Greater Caribbean Energy and Environment Foundation begin an intensive focus on the energy problems of the Caribbean. The process by which environmental assessments by tropical experts can be successfully integrated into energy decisions is by: (1) international loan institutions requiring or strongly recommending excellent assessments; (2) engineering awareness of total effects of energy projects; (3) governmental environmental consciousness-raising with regard to natural resource value and potential inadvertent and unnecessary resource losses during energy development; and (4) media participation. Section headings in the outline are: preamble; introduction; research tasks: today and twenty years hence; needed research, demonstration and information dissemination projects to get knowledge about Caribbean energy-environment used; summary; recommendations; generalized conclusions; and background literature. (JGB)
Quorum-Based Asynchronous Power-Saving Protocols for IEEE 802.11 Ad Hoc Jehn-Ruey Jiang1
Tseng, Yu-Chee
rescue operations, and outdoor activities. This work is co-sponsored by the MOE Program for Promoting Aca is a critical issue for portable devices supported by batteries. Battery power is a limited re- source prediction: Since a host entering the PS mode will reduce its radio activity, other hosts who intend to send
Boyer, Edmond
the redundancy, such as MPR (MultiPoint Relay) or DS-MPR (Connected Dominating Sets with MPR). These methods and existence of obstacles. This paper focuses on DS-MPR. Firstly, we test it in a realistic environment to show Sensor Networks; Broadcasting; Connected Dominating Sets; MultiPoint Relay; Lognormal model. 1
LA-DCF: A New Multiple Access Protocol for Ad-Hoc Wireless Richard Akester & Stephen Hailes
Haddadi, Hamed
during backoff, the host "freezes" the backoff timer. Once the carrier is sensed idle again, the backoff-to-end transport protocol, but this can take too long to detect the loss and take action, causing channel variations in delay affects the calculation of round trip times in transport protocols. Also, they are only
Pedram, Massoud
An Energy-Aware Simulation Model and Transaction Protocol for Dynamic Workload Distribution an undesirable occurrence. Uneven distribution of energy resources and computational workloads is especially for detailed evaluation of the performance of different energy management policies in a MANET. Next it presents
Leung, Kin K.
. For instance, Festag et al. (Festag et al., 2004) describe the real-world field trials of a car-to-car communication platform with an IEEE 802.11 air interface, while Bucciol et al. (Bucciol et al., 2005) conducted
Cluster-Based Semi-Asynchronous Power-Saving Protocols for Multi-hop Ad Hoc Networks
Tseng, Yu-Chee
applied to a multi-hop MANET. I. INTRODUCTION Since most mobile devices do not have plug-in power, battery
Jagannatham, Aditya K.
Department Institute of Technology and Management Institute of Technology and Management Sector-23 A, Gurgaon(MANET). On demand set up, fault tolerance and unconstrained connectivity are a couple of advantages that why mobile vehicle to vehicle (V2V) communication and vehicle to road side communication. This paper describes
Spectral-efficiency of multi-antenna links in ad-hoc wireless networks with limited Tx CSI
Govindasamy, Siddhartan
An asymptotic expression is derived for the mean spectral efficiency of multi-antenna links randomly distributed on a plane in a uniform manner where transmitters (Tx) have Channel-State-Information (CSI) of the channels ...
Atkinson, Robert C
@hainu.edu.cn *Corresponding author Robert Atkinson and James Irvine Department of Electronic and Electrical Engineering, University of Strathclyde, Scotland, G1 1XW, UK E-mail: r.atkinson@eee.strath.ac.uk E-mail: j technologies. Wencai Du is a Professor and the Dean of College of Information Science & Technology, Hainan
Branes in AdS and pp-wave spacetimes
Kostas Skenderis; Marika Taylor
2002-07-03T23:59:59.000Z
We find half supersymmetric AdS-embeddings in AdS_5 x S^5 corresponding to all quarter BPS orthogonal intersections of D3-branes with Dp-branes. A particular case is the Karch-Randall embedding AdS_4 x S^2. We explicitly prove that these embeddings are supersymmetric by showing that the kappa symmetry projections are compatible with half of the target space Killing spinors and argue that all these cases lead to AdS/dCFT dualities involving a CFT with a defect. We also find an asymptotically AdS_4 x S^2 embedding that corresponds to a holographic RG-flow on the defect. We then consider the pp-wave limit of the supersymmetric AdS-embeddings and show how it leads to half supersymmetric D-brane embeddings in the pp-wave background. We systematically analyze D-brane embeddings in the pp-wave background along with their supersymmetry. We construct all supersymmetric D-branes wrapped along the light-cone using operators in the dual gauge theory: the open string states are constructed using defect fields. We also find supersymmetric D1 (monopoles) and D3 (giant gravitons) branes that wrap only one of the light-cone directions. These correspond to non-perturbative states in the dual gauge theory.
Ultraviolet asymptotics for quasiperiodic AdS_4 perturbations
Ben Craps; Oleg Evnin; Puttarak Jai-akson; Joris Vanhoof
2015-09-04T23:59:59.000Z
Spherically symmetric perturbations in AdS-scalar field systems of small amplitude epsilon approximately periodic on time scales of order 1/epsilon^2 (in the sense that no significant transfer of energy between the AdS normal modes occurs) have played an important role in considerations of AdS stability. They are seen as anchors of stability islands where collapse of small perturbations to black holes does not occur. (This collapse, if it happens, typically develops on time scales of the order 1/epsilon^2.) We construct an analytic treatment of the frequency spectra of such quasiperiodic perturbations, paying special attention to the large frequency asymptotics. For the case of a self-interacting phi^4 scalar field in a non-dynamical AdS background, we arrive at a fairly complete analytic picture involving quasiperiodic spectra with an exponential suppression modulated by a power law at large mode numbers. For the case of dynamical gravity, the structure of the large frequency asymptotics is more complicated. We give analytic explanations for the general qualitative features of quasiperiodic solutions localized around a single mode, in close parallel to our discussion of the probe scalar field, and find numerical evidence for logarithmic modulations in the gravitational quasiperiodic spectra existing on top of the formulas previously reported in the literature.
Jet Quenching via Gravitational Radiation in Thermal AdS
Edward Shuryak; Ho-Ung Yee; Ismail Zahed
2011-10-04T23:59:59.000Z
We argue that classical bulk gravitational radiation effects in AdS/CFT, previously ignored because of their subleading nature in the 1/Nc-expansion, are magnified by powers of large Lorentz factors gamma for ultrarelativistic jets, thereby dominating other forms of jet energy loss in holography at finite temperature. We make use of the induced gravitational self-force in thermal AdS5 to estimate its effects. In a thermal medium, relativistic jets may loose most of their energy through longitudinal drag caused by the energy accumulated in their nearby field as they zip through the strongly coupled plasma.
Emergent quantum criticality, Fermi surfaces, and AdS2
Thomas Faulkner; Hong Liu; John McGreevy; David Vegh
2011-10-30T23:59:59.000Z
Gravity solutions dual to d-dimensional field theories at finite charge density have a near-horizon region which is AdS_2 x R^{d-1}. The scale invariance of the AdS_2 region implies that at low energies the dual field theory exhibits emergent quantum critical behavior controlled by a (0+1)-dimensional CFT. This interpretation sheds light on recently-discovered holographic descriptions of Fermi surfaces, allowing an analytic understanding of their low-energy excitations. For example, the scaling behavior near the Fermi surfaces is determined by conformal dimensions in the emergent IR CFT. In particular, when the operator is marginal in the IR CFT, the corresponding spectral function is precisely of the "Marginal Fermi Liquid" form, postulated to describe the optimally doped cuprates.
Perturbative entanglement thermodynamics for AdS spacetime: Renormalization
Rohit Mishra; Harvendra Singh
2015-07-14T23:59:59.000Z
We study the effect of charged excitations in the AdS spacetime on the first law of entanglement thermodynamics. It is found that `boosted' AdS black holes give rise to a more general form of first law which includes chemical potential and charge density. To obtain this result we have to resort to a second order perturbative calculation of entanglement entropy for small size subsystems. At first order the form of entanglement law remains unchanged even in the presence of charged excitations. But the thermodynamic quantities have to be appropriately `renormalized' at the second order due to the corrections. We work in the perturbative regime where $T_{thermal}\\ll T_E$.
AdS_6 solutions of type II supergravity
Fabio Apruzzi; Marco Fazzi; Achilleas Passias; Dario Rosa; Alessandro Tomasiello
2015-04-03T23:59:59.000Z
Very few AdS_6 x M_4 supersymmetric solutions are known: one in massive IIA, and two IIB solutions dual to it. The IIA solution is known to be unique; in this paper, we use the pure spinor approach to give a classification for IIB supergravity. We reduce the problem to two PDEs on a two-dimensional space Sigma. M_4 is then a fibration of S^2 over Sigma; the metric and fluxes are completely determined in terms of the solution to the PDEs. The results seem likely to accommodate near-horizon limits of (p,q)-fivebrane webs studied in the literature as a source of CFT_5's. We also show that there are no AdS_6 solutions in eleven-dimensional supergravity.
Perturbative entanglement thermodynamics for AdS spacetime: Renormalization
Mishra, Rohit
2015-01-01T23:59:59.000Z
We study the effect of charged excitations in the AdS spacetime on the first law of entanglement thermodynamics. It is found that `boosted' AdS black holes give rise to a more general form of first law which includes chemical potential and charge density. To obtain this result we have to resort to a second order perturbative calculation of entanglement entropy for small size subsystems. At first order the form of entanglement law remains unchanged even in the presence of charged excitations. But the thermodynamic quantities have to be appropriately `renormalized' at the second order due to the corrections. We work in the perturbative regime where $T_{thermal}\\ll T_E$.
Quintessence and effective AdS brane geometries
K. Priyabrat Pandey; Abhishek K. Singh; Sunita Singh; Supriya Kar
2014-07-25T23:59:59.000Z
A geometric torsion dynamics leading to an effective curvature in a second order formalism on a D4-brane is revisited with a renewed interest. We obtain two effective $AdS_4$ brane geometries on a vacuum created pair of $(D{\\bar D})_3$-brane. One of them is shown to describe an AdS Schwarzschild spinning black hole and the other is shown to describe a spinning black hole bound state. It is argued that a D-instanton in a vacuum created anti D3-brane within a pair may describe a quintessence. It may seen to incorporate a varying vacuum energy density in a brane universe. We consider the effective curvature scalar on $S^1\\times S^1$ to analyze torsion-less geometries on a vacuum created pair of $(D{\\bar D})_2$-brane. The emergent $AdS_3$ brane is shown to describe a Schwarzschild and a Reissner-Nordstrom (RN) geometries in presence of extra dimension(s).
Quantum strings in AdS5 x S5 and AdS/CFT duality
A. A. Tseytlin
2009-09-23T23:59:59.000Z
We review some recent progress in understanding the spectrum of energies/dimensions of strings/operators in AdS5 x S5 -- planar N=4 super Yang-Mills correspondence. We consider leading strong coupling corrections to the energy of lightest massive string modes in AdS5 x S5, which should be dual to members of the Konishi operator multiplet in the SYM theory. This determines the general structure of strong-coupling expansion of the anomalous dimension of the Konishi operator. Following arXiv:0906.4294 we use 1-loop results for semiclassical string states to extract information about the leading coefficients in this expansion.
Entanglement Entropy and Duality in AdS(4)
Ioannis Bakas; Georgios Pastras
2015-04-30T23:59:59.000Z
Small variations of the entanglement entropy \\delta S and the expectation value of the modular Hamiltonian \\delta E are computed holographically for circular entangling curves in the boundary of AdS(4), using gravitational perturbations with general boundary conditions in spherical coordinates. Agreement with the first law of thermodynamics, \\delta S = \\delta E, requires that the line element of the entangling curve remains constant. In this context, we also find a manifestation of electric-magnetic duality for the entanglement entropy and the corresponding modular Hamiltonian, following from the holographic energy-momentum/Cotton tensor duality.
Entanglement Entropy and Duality in AdS(4)
Bakas, Ioannis
2015-01-01T23:59:59.000Z
Small variations of the entanglement entropy \\delta S and the expectation value of the modular Hamiltonian \\delta E are computed holographically for circular entangling curves in the boundary of AdS(4), using gravitational perturbations with general boundary conditions in spherical coordinates. Agreement with the first law of thermodynamics, \\delta S = \\delta E, requires that the line element of the entangling curve remains constant. In this context, we also find a manifestation of electric-magnetic duality for the entanglement entropy and the corresponding modular Hamiltonian, following from the holographic energy-momentum/Cotton tensor duality.
AdS Chern-Simons Gravity induces Conformal Gravity
Rodrigo Aros; Danilo E. Diaz
2013-12-25T23:59:59.000Z
The leitmotif of this paper is the question of whether four- and higher even-dimensional Conformal Gravities do have a Chern-Simons pedigree. We show that Weyl gravity can be obtained as dimensional reduction of a five-dimensional Chern-Simons action for a suitable (gauged-fixed, tractor-like) five-dimensional AdS connection. The gauge-fixing and dimensional reduction program admits a readily generalization to higher dimensions for the case of certain conformal gravities obtained by contractions of the Weyl tensor.
Thermal Fluctuations in a Charged AdS Black Hole
Pourhassan, B
2015-01-01T23:59:59.000Z
In this paper, we will analyze the effects of thermal fluctuations on a charged AdS black hole. This will be done by analyzing the corrections to black hole thermodynamics due to these thermal fluctuations. We will demonstrate that the entropy of this black hole get corrected by logarithmic term. We will also calculate other corrections to other important thermodynamic quantities for this black hole. Finally, we will use the corrected value of the specific heat to analyze the phase transition in this system.
Thermal Fluctuations in a Charged AdS Black Hole
B. Pourhassan; Mir Faizal
2015-08-12T23:59:59.000Z
In this paper, we will analyze the effects of thermal fluctuations on a charged AdS black hole. This will be done by analyzing the corrections to black hole thermodynamics due to these thermal fluctuations. We will demonstrate that the entropy of this black hole get corrected by logarithmic term. We will also calculate other corrections to other important thermodynamic quantities for this black hole. Finally, we will use the corrected value of the specific heat to analyze the phase transition in this system.
Strings on AdS Wormholes and Nonsingular Black Holes
H. Lu; Justin F. Vazquez-Poritz; Zhibai Zhang
2014-10-22T23:59:59.000Z
Certain AdS black holes in the STU model can be conformally scaled to wormhole and black hole solutions of an f(R) type theory which have two asymptotically AdS regions and are completely free of curvature singularities. While there is a delta-function source for the dilaton, classical string probes are not sensitive to this singularity. If the AdS/CFT correspondence can be applied in this context, then the wormhole background describes a phase in which two copies of a conformal field theory interact with each other, whereas the nonsingular black hole describes entangled states. By studying the behavior of open strings on these backgrounds, we extract a number of features of the quarks and anti-quarks that live in the field theories. In the interacting phase, we find that there is a maximum speed with which the quarks can move without losing energy, beyond which energy is transferred from a quark in one field theory to a quark in the other. We also compute the rate at which moving quarks within entangled states lose energy to the two surrounding plasmas. While a quark-antiquark pair within a single field theory exhibits Coulomb interaction for small separation, a quark in one field theory exhibits spring-like confinement with an anti-quark in the other field theory. For the entangled states, we study how the quark-antiquark screening length depends on temperature and chemical potential. In the interacting phase of the two field theories, a quadruplet made up of one quark-antiquark pair in each field theory can undergo transitions involving how the quarks and antiquarks are paired in terms of the screening.
Marco M. Caldarelli; Joan Camps; Blaise Goutéraux; Kostas Skenderis
2014-04-18T23:59:59.000Z
We present a comprehensive analysis of the AdS/Ricci-flat correspondence, a map between a class of asymptotically locally AdS spacetimes and a class of Ricci-flat spacetimes. We provide a detailed derivation of the map, discuss a number of extensions and apply it to a number of important examples, such as AdS on a torus, AdS black branes and fluids/gravity metrics. In particular, the correspondence links the hydrodynamic regime of asymptotically flat black $p$-branes or the Rindler fluid with that of AdS. It implies that this class of Ricci-flat spacetimes inherits from AdS a generalized conformal symmetry and has a holographic structure. We initiate the discussion of holography by analyzing how the map acts on boundary conditions and holographic 2-point functions.
Adding Value to Agricultural Products
Anderson, David P.; Hanselka, Daniel
2009-06-01T23:59:59.000Z
and some of the viscera into menudo or tripas. Booker Packing Company, Caviness Packing Company and J&B Foods are some of the compa- nies adding value to meat successfully in spite of processing costs. A recent survey of such companies indicated...
Matching of correlators in AdS_3/CFT_2
Marika Taylor
2007-09-12T23:59:59.000Z
Recently exact agreement has been found between three-point correlators of chiral operators computed in string theory on AdS_3 x S^3 x T^4 with NS-NS flux and those computed in the symmetric orbifold CFT. However, it has also been shown that these correlators disagree with those computed in supergravity, under any identification of single particle operators which respects the symmetries. In this note we resolve this disagreement: the key point is that mixings with multi-particle operators are not suppressed even at large N in extremal correlators. Allowing for such mixings, orbifold/string theory operators and supergravity operators can be matched such that both non-extremal and extremal three point functions agree, giving further evidence for the non-renormalization of the chiral ring.
The Analytic Bootstrap and AdS Superhorizon Locality
A. Liam Fitzpatrick; Jared Kaplan; David Poland; David Simmons-Duffin
2013-01-24T23:59:59.000Z
We take an analytic approach to the CFT bootstrap, studying the 4-pt correlators of d > 2 dimensional CFTs in an Eikonal-type limit, where the conformal cross ratios satisfy |u| 2\\Delta_\\phi + 2n for each integer n as l -> infinity. We show how the rate of approach is controlled by the twist and OPE coefficient of the leading twist operator in the \\phi x \\phi OPE, and we discuss SCFTs and the 3d Ising Model as examples. Additionally, we show that the OPE coefficients of other large spin operators appearing in the OPE are bounded as l -> infinity. We interpret these results as a statement about superhorizon locality in AdS for general CFTs.
AdS Bubbles, E$p$-branes and Entanglement
Harvendra Singh
2014-10-15T23:59:59.000Z
The AdS-bubble solutions interestingly mimic Schr\\"odinger-like geometries when expressed in light-cone coordinates. These D$p$ bubble vacuas exhibit asymmetric scaling property with a negative dynamical exponent of time $a0$ in type II* super-strings. We obtain an expression for the entanglement entropy for `bubble E3-branes'. It is argued that the entropy from E3-bubbles has to be the lowest.
Islands of stability and recurrence times in AdS
Stephen R. Green; Antoine Maillard; Luis Lehner; Steven L. Liebling
2015-08-27T23:59:59.000Z
We study the stability of anti-de Sitter (AdS) spacetime to spherically symmetric perturbations of a real scalar field in general relativity. Further, we work within the context of the "two time framework" (TTF) approximation, which describes the leading nonlinear effects for small amplitude perturbations, and is therefore suitable for studying the weakly turbulent instability of AdS---including both collapsing and non-collapsing solutions. We have previously identified a class of quasi-periodic (QP) solutions to the TTF equations, and in this work we analyze their stability. We show that there exist several families of QP solutions that are stable to linear order, and we argue that these solutions represent islands of stability in TTF. We extract the eigenmodes of small oscillations about QP solutions, and we use them to predict approximate recurrence times for generic non-collapsing initial data in the full (non-TTF) system. Alternatively, when sufficient energy is driven to high-frequency modes, as occurs for initial data far from a QP solution, the TTF description breaks down as an approximation to the full system. Depending on the higher order dynamics of the full system, this often signals an imminent collapse to a black hole.
Islands of stability and recurrence times in AdS
Green, Stephen R; Lehner, Luis; Liebling, Steven L
2015-01-01T23:59:59.000Z
We study the stability of anti-de Sitter (AdS) spacetime to spherically symmetric perturbations of a real scalar field in general relativity. Further, we work within the context of the "two time framework" (TTF) approximation, which describes the leading nonlinear effects for small amplitude perturbations, and is therefore suitable for studying the weakly turbulent instability of AdS---including both collapsing and non-collapsing solutions. We have previously identified a class of quasi-periodic (QP) solutions to the TTF equations, and in this work we analyze their stability. We show that there exist several families of QP solutions that are stable to linear order, and we argue that these solutions represent islands of stability in TTF. We extract the eigenmodes of small oscillations about QP solutions, and we use them to predict approximate recurrence times for generic non-collapsing initial data in the full (non-TTF) system. Alternatively, when sufficient energy is driven to high-frequency modes, as occurs ...
Islands of stability and recurrence times in AdS
Stephen R. Green; Antoine Maillard; Luis Lehner; Steven L. Liebling
2015-07-29T23:59:59.000Z
We study the stability of anti-de Sitter (AdS) spacetime to spherically symmetric perturbations of a real scalar field in general relativity. Further, we work within the context of the "two time framework" (TTF) approximation, which describes the leading nonlinear effects for small amplitude perturbations, and is therefore suitable for studying the weakly turbulent instability of AdS---including both collapsing and non-collapsing solutions. We have previously identified a class of quasi-periodic (QP) solutions to the TTF equations, and in this work we analyze their stability. We show that there exist several families of QP solutions that are stable to linear order, and we argue that these solutions represent islands of stability in TTF. We extract the eigenmodes of small oscillations about QP solutions, and we use them to predict approximate recurrence times for generic non-collapsing initial data in the full (non-TTF) system. Alternatively, when sufficient energy is driven to high-frequency modes, as occurs for initial data far from a QP solution, the TTF description breaks down as an approximation to the full system. Depending on the higher order dynamics of the full system, this often signals an imminent collapse to a black hole.
Fermilab Today | Classifieds Ad Form
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:5 TablesExports(Journal Article)41clothThe Bonneville Power AdministrationHawaiiEnergy StorageDepartmentPOPSECFemtosecondAds Subscribe | Contact
Kaolin AD | Open Energy Information
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousPlasmaP aCentrothermDepew,IndependentCounty, Oregon: EnergyJohnston,KaapaKaneohe, Hawaii:KansassourceKaolin AD
Ad Building demolition, recycling completed
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:5 TablesExports(Journal Article) |govInstrumentsmfrirt DocumentationSitesWeather Outreach Home Room NewsAccelerateAdministration andEmergencyHomeActiveAd
Fermilab Today - Classified Ad Policy
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:5 TablesExports(Journal Article)41clothThe Bonneville Power AdministrationHawaiiEnergy StorageDepartmentPOPSECFemtosecond ArchiveNov.MaySept.1, 20117, 2012Ad
Light-cone AdS/CFT-adapted approach to AdS fields/currents, shadows, and conformal fields
R. R. Metsaev
2015-07-23T23:59:59.000Z
Light-cone gauge formulation of fields in AdS space and conformal field theory in flat space adapted for the study of AdS/CFT correspondence is developed. Arbitrary spin mixed-symmetry fields in AdS space and arbitrary spin mixed-symmetry currents, shadows, and conformal fields in flat space are considered on an equal footing. For the massless and massive fields in AdS and the conformal fields in flat space, simple light-cone gauge actions leading to decoupled equations of motion are found. For the currents and shadows, simple expressions for all 2-point functions are also found. We demonstrate that representation of conformal algebra generators on space of currents, shadows, and conformal fields can be built in terms of spin operators entering the light-cone gauge formulation of AdS fields. This considerably simplifies the study of AdS/CFT correspondence. Light-cone gauge actions for totally symmetric arbitrary spin long conformal fields in flat space are presented. We apply our approach to the study of totally antisymmetric (one-column) and mixed-symmetry (two-column) fields in AdS space and currents, shadows, and conformal fields in flat space.
AEI-2008-085 The Classical Exchange Algebra of AdS5 S5
Paris-Sud XI, Université de
AEI-2008-085 The Classical Exchange Algebra of AdS5 × S5 String Theory Marc Magro Universit´e de matrix of AdS5× S5 string theory in the Green-Schwarz formulation is determined by using a first the pure spinor description of AdS5 × S5 string theory. These results are compared to the one obtained by A
On Rotating and Oscillating Four-Spin Strings in AdS5 X S5
Kamal L. Panigrahi; Pabitra M. Pradhan
2012-10-26T23:59:59.000Z
We study rigidly rotating strings in AdS5 X S5 background with one spin along AdS5 and three angular momenta along S5. We find dispersion relations among various charges and interpret them as giant magnon and spiky string solutions in various limits. Further we present an example of oscillating string which oscillates in the radial direction of the AdS5 and at the same time rotates in S5.
On Rotating and Oscillating Four-Spin Strings in AdS5 X S5
Panigrahi, Kamal L
2012-01-01T23:59:59.000Z
We study rigidly rotating strings in AdS5 X S5 background with one spin along AdS5 and three angular momenta along S5. We find dispersion relations among various charges and interpret them as giant magnon and spiky string solutions in various limits. Further we present an example of oscillating string which oscillates in the radial direction of the AdS5 and at the same time rotates in S5.
Longitudinal Analysis of Android Ad Library Permissions
Wallach, Dan
Longitudinal Analysis of Android Ad Library Permissions Theodore Book, Adam Pridgen, Dan S. Wallach in the behavior of Android ad libraries. Taking a sample of 114,000 apps, we extract and classify their ad particular risks to user privacy and security. I. INTRODUCTION The Android operating system is one
The different phases of hairy black holes in AdS5 space
Gaston Giribet; Andres Goya; Julio Oliva
2014-12-31T23:59:59.000Z
We investigate the thermodynamics of hairy black holes in asymptotically Anti-de Sitter (AdS) space, including backreaction. Resorting to the Euclidean path integral approach, we show that matter conformally coupled to Einstein gravity in five dimensions may exhibit a phase transition whose endpoint turns out to be a hairy black hole in AdS5 space. The scalar field configuration happens to be regular everywhere outside and on the horizon, and behaves asymptotically in such a way that respects the AdS boundary conditions that are relevant for AdS/CFT. The theory presents other peculiar features in the ultraviolet, like the existence of black holes with arbitrarily low temperature in AdS5. This provides a simple setup in which the fully backreacting problem of a hair forming in AdS at certain critical temperature can be solved analytically.
The different phases of hairy black holes in AdS5 space
Giribet, Gaston; Oliva, Julio
2015-01-01T23:59:59.000Z
We investigate the thermodynamics of hairy black holes in asymptotically Anti-de Sitter (AdS) space, including backreaction. Resorting to the Euclidean path integral approach, we show that matter conformally coupled to Einstein gravity in five dimensions may exhibit a phase transition whose endpoint turns out to be a hairy black hole in AdS5 space. The scalar field configuration happens to be regular everywhere outside and on the horizon, and behaves asymptotically in such a way that respects the AdS boundary conditions that are relevant for AdS/CFT. The theory presents other peculiar features in the ultraviolet, like the existence of black holes with arbitrarily low temperature in AdS5. This provides a simple setup in which the fully backreacting problem of a hair forming in AdS at certain critical temperature can be solved analytically.
Topics in network communications
Cannons, Jillian Leigh
2008-01-01T23:59:59.000Z
Int. Workshop on Evaluation of Wireless Ad Hoc, Sensor andon Performance Evaluation of Wireless Ad Hoc, Sensor and
Tunneling between the giant gravitons in AdS5 x S5
Julian Lee
2001-04-05T23:59:59.000Z
I consider the giant gravitons in AdS5 x S5. By numerical simulation, I show a strong indication that there is no instanton solution describing the direct tunneling between the giant graviton in the S5 and its dual counterpart in the AdS5. I argue that it supports the supersymmetry breaking scenario suggested in hep-th/0008015
LWR (Light Water Reactor) power plant simulations using the AD10 and AD100 systems
Wulff, W.; Cheng, H.S.; Chien, C.J.; Jang, J.Y.; Lin, H.C.; Mallen, A.N.; Wang, S.J. (Brookhaven National Lab., Upton, NY (USA); Institute of Nuclear Energy Research, Lung-Tan (Taiwan); Tawian Power Co., Taipei (Taiwan); Brookhaven National Lab., Upton, NY (USA); Institute of Nuclear Energy Research, Lung-Tan (Taiwan))
1989-01-01T23:59:59.000Z
Boiling (BWR) and Pressurized (PWR) Water Reactor Power Plants are being simulated at BNL with the AD10 and AD100 Peripheral Processor Systems. The AD10 system has been used for BWR simulations since 1984 for safety analyses, emergency training and optimization studies. BWR simulation capabilities have been implemented recently on the AD100 system and PWR simulation capabilities are currently being developed under the auspices of international cooperation. Modeling and simulation methods are presented with emphasis on the simulation of the Nuclear Steam Supply System. Results are presented for BWR simulation and performance characteristics are compared of the AD10 and AD100 systems. It will be shown that the AD100 simulates two times faster than two AD10 processors operating in parallel and that the computing capacity of one AD100 (with FMU processor) is twice as large as that of two AD10 processors. 9 refs., 5 figs., 1 tab.
University Policy No.: AD2210 Classification: Administration
Victoria, University of
University Policy No.: AD2210 Classification: Administration FIELDWORK AND INTERNATIONAL: includes all University of Victoria administrators, faculty, staff, and students while such individuals
University Policy No.: AD2215 Classification: Administration
Victoria, University of
University Policy No.: AD2215 Classification: Administration Approving Authority: Board Review: 1. This statement applies to the policies and administration of trademarks registered
University Policy No.: AD2530 Classification: Administration
Victoria, University of
University Policy No.: AD2530 Classification: Administration PHOTOCOPY AND FACSIMILE (FAX may be obtained through library managed machines or through the use of personal accounts. 1
Splitting of Folded Strings in AdS_4*CP^3
Jun-Bao Wu
2012-08-04T23:59:59.000Z
We study classically splitting of two kinds of folded string solutions in AdS_4*CP^3. Conserved charges of the produced fragments are computed for each case. We find interesting patterns among these conserved charges.
Duality invariance of $s \\ge 3/2$ fermions in AdS
S. Deser; D. Seminara
2014-09-11T23:59:59.000Z
We show that in D=4 AdS, $s\\ge 3/2$ partially massless (PM) fermions retain the duality invariances of their flat space massless counterparts. They have tuned ratios $ {m^2}/{M^2}\
Freivogel, Ben; /Stanford U., Phys. Dept. /LBL, Berkeley; Hubeny, Veronika E.; /LBL, Berkeley /Durham U., Dept. of Math.; Maloney, Alexander; /Stanford U., Phys. Dept.; Myers, Rob; /Perimeter Inst. Theor. Phys. /Waterloo U.; Rangamani, Mukund; /LBL, Berkeley /Durham U., Dept. of Math.; Shenker, Stephen; /Stanford U., Phys. Dept.
2005-10-07T23:59:59.000Z
We study the realization of inflation within the AdS/CFT correspondence. We assume the existence of a string landscape containing at least one stable AdS vacuum and a (nearby) metastable de Sitter state. Standard arguments imply that the bulk physics in the vicinity of the AdS minimum is described by a boundary CFT. We argue that large enough bubbles of the dS phase, including those able to inflate, are described by mixed states in the CFT. Inflating degrees of freedom are traced over and do not appear explicitly in the boundary description. They nevertheless leave a distinct imprint on the mixed state. Analytic continuation allows us, in principle, to recover a large amount of nonperturbatively defined information about the inflating regime. Our work also shows that no scattering process can create an inflating region, even by quantum tunneling, since a pure state can never evolve into a mixed state under unitary evolution.We study the realization of inflation within the AdS/CFT correspondence. We assume the existence of a string landscape containing at least one stable AdS vacuum and a (nearby) metastable de Sitter state. Standard arguments imply that the bulk physics in the vicinity of the AdS minimum is described by a boundary CFT. We argue that large enough bubbles of the dS phase, including those able to inflate, are described by mixed states in the CFT. Inflating degrees of freedom are traced over and do not appear explicitly in the boundary description. They nevertheless leave a distinct imprint on the mixed state. Analytic continuation allows us, in principle, to recover a large amount of nonperturbatively defined information about the inflating regime. Our work also shows that no scattering process can create an inflating region, even by quantum tunneling, since a pure state can never evolve into a mixed state under unitary evolution.
Di Benedetto, Maria-Gabriella
of proposals have been submitted in March 2003 [4]. Europe is also getting active in the field of UWB, via standardisation (ETSI, European Telecommunications Standard Institute) and regulation (CEPT, Conférence Européenne by the introduction of an idle period after transmitting a pulse (short waveform concentrating energy followed
Rincon-Mora, Gabriel A.
fuel cells (FCs) excel. Although various control strategies for energy flow between batteries and FCs for the same wherein volume, energy, and power are optimized for peak-power and extended-lifetime performance and control energy flow between batteries and macro-scale FCs with constant, time-independent fuel flow, fuel
Ghosh, Kaushik; Das, and Pradip K; 10.5121/jgraphoc.2010.2204
2010-01-01T23:59:59.000Z
Energy consumption and delay incurred in packet delivery are the two important metrics for measuring the performance of geographic routing protocols for Wireless Adhoc and Sensor Networks (WASN). A protocol capable of ensuring both lesser energy consumption and experiencing lesser delay in packet delivery is thus suitable for networks which are delay sensitive and energy hungry at the same time. Thus a smart packet forwarding technique addressing both the issues is thus the one looked for by any geographic routing protocol. In the present paper we have proposed a Fermat point based forwarding technique which reduces the delay experienced during packet delivery as well as the energy consumed for transmission and reception of data packets.
The Tetrahedron Zamolodchikov Algebra and the AdS5 x S5 S-matrix
Mitev, Vladimir; Tsuboi, Zengo
2012-01-01T23:59:59.000Z
The S-matrix of the AdS5 x S5 string theory is a tensor product of two centrally extended su(2|2) S-matrices, each of which is related to the R-matrix of the Hubbard model. The R-matrix of the Hubbard model was first found by Shastry, who ingeniously exploited the fact that, for zero coupling, the Hubbard model can be decomposed into two XX models. In this article, we review and clarify this construction from the AdS/CFT perspective and investigate the implications this has for the AdS5 x S5 S-matrix.
The Tetrahedron Zamolodchikov Algebra and the AdS5 x S5 S-matrix
Vladimir Mitev; Matthias Staudacher; Zengo Tsuboi
2012-10-08T23:59:59.000Z
The S-matrix of the AdS5 x S5 string theory is a tensor product of two centrally extended su(2|2) S-matrices, each of which is related to the R-matrix of the Hubbard model. The R-matrix of the Hubbard model was first found by Shastry, who ingeniously exploited the fact that, for zero coupling, the Hubbard model can be decomposed into two XX models. In this article, we review and clarify this construction from the AdS/CFT perspective and investigate the implications this has for the AdS5 x S5 S-matrix.
Higher spins in AdS_5 at one loop: vacuum energy, boundary conformal anomalies and AdS/CFT
M. Beccaria; A. A. Tseytlin
2014-11-18T23:59:59.000Z
We consider general-symmetry higher spin fields in AdS_5 and derive expressions for their one-loop corrections to vacuum energy E and the associated 4d boundary conformal anomaly a-coefficient. We a propose a similar expression for the second conformal anomaly c-coefficient. We show that all the three quantities (E, a, c) computed for N=8 gauged 5d supergravity are -1/2 of the values for N=4 conformal 4d supergravity and also twice the values for N=4 Maxwell multiplet. This gives 5d derivation of the fact that the system of N=4 conformal supergravity and four N=4 Maxwell multiplets is anomaly free. The values of (E, a, c) for the states at level p of Kaluza-Klein tower of 10d type IIB supergravity compactified on S^5 turn out to be equal to those for p copies of N=4 Maxwell multiplets. This may be related to the fact that these states appear in the tensor product of p superdoubletons. Under a natural regularization of the sum over p, the full 10d supergravity contribution is then minus that of the Maxwell multiplet, in agreement with the standard adjoint AdS/CFT duality (SU(n) SYM contribution is n^2-1 of one Maxwell multiplet). We also verify the matching of (E, a, c) for spin 0 and 1/2 boundary theory cases of vectorial AdS/CFT duality. The consistency conditions for vectorial AdS/CFT turn out to be equivalent to the cancellation of anomalies in the closely related 4d conformal higher spin theories. In addition, we study novel example of vectorial AdS/CFT duality when the boundary theory is described by free spin 1 fields and is dual to a particular higher spin theory in AdS_5 containing fields in mixed-symmetry representations. We also discuss its supersymmetric generalizations.
Missouri Value-Added Grant Program (Missouri)
Broader source: Energy.gov [DOE]
The Missouri Value-Added Grant Program provides grants for projects that add value to Missouri agricultural products and aid the economy of a rural community. Grant applications will be considered...
Jia-Lin Zhang; Rong-Gen Cai; Hongwei Yu
2015-03-03T23:59:59.000Z
We study thermodynamics and thermodynamic geometry of a five-dimensional Schwarzschild AdS black hole in $AdS_5\\times{S^5}$ spacetime by treating the cosmological constant as the number of colors in the boundary gauge theory and its conjugate quantity as the associated chemical potential. It is found that the chemical potential is always negative in the stable branch of black hole thermodynamics and it has a chance to be positive, but appears in the unstable branch. We calculate scalar curvatures of the thermodynamical Weinhold metric, Ruppeiner metric and Quevedo metric, respectively and we find that the divergence of scalar curvature is related to the divergence of specific heat with fixed chemical potential in the Weinhold metric and Ruppeiner metric, while in the Quevedo metric the divergence of scalar curvature is related to the divergence of specific heat with fixed number of colors and the vanishing of the specific heat with fixed chemical potential.
AUAARHUS UNIVERSITY Adding of attachments Financial Control
, and the picture file from this scan must be saved (on a PC or server) before the file is added to the expense sheet. Important: Attachments must be saved in PDF or TIF format. If the attachment is not added in one address or save the picture file on your PC or a server. Open the file and save it on your PC #12;AUAARHUS
QCD Condensates and Holographic Wilson Loops for Asymptotically AdS Spaces
Quevedo, R. Carcasses [Instituto Balseiro, Centro Atomico Bariloche, 8400 San Carlos de Bariloche (Argentina); CONICET, Rivadavia 1917, 1033 Buenos Aires (Argentina); Goity, Jose L. [Hampton University, Hampton, VA 23668 (United States); Thomas Jefferson National Accelerator Facility, Newport News, VA (United States); Trinchero, Roberto C. [Instituto Balseiro, Centro Atomico Bariloche, 8400 San Carlos de Bariloche (Argentina); CONICET, Rivadavia 1917, 1033 Buenos Aires (Argentina)
2014-02-01T23:59:59.000Z
The minimization of the Nambu-Goto (NG) action for a surface whose contour defines a circular Wilson loop of radius a placed at a finite value of the coordinate orthogonal to the border is considered. This is done for asymptotically AdS spaces. The condensates of dimension n = 2, 4, 6, 8, and 10 are calculated in terms of the coefficients in the expansion in powers of the radius a of the on-shell subtracted NG action for small a->0. The subtraction employed is such that it presents no conflict with conformal invariance in the AdS case and need not introduce an additional infrared scale for the case of confining geometries. It is shown that the UV value of the gluon condensates is universal in the sense that it only depends on the first coefficients of the difference with the AdS case.
Bonus Symmetries of N=4 Super-Yang-Mills Correlation Functions via AdS Duality
Kenneth Intriligator
1999-05-03T23:59:59.000Z
General conjectures about the SL(2,Z) modular transformation properties of N=4 super-Yang-Mills correlation functions are presented. It is shown how these modular transformation properties arise from the conjectured duality with IIB string theory on AdS_5 x S^5. We discuss in detail a prediction of the AdS duality: that N=4 field theory, in an appropriate limit, must exhibit bonus symmetries, corresponding to the enhanced symmetries of IIB string theory in its supergravity limit.
Computing and Using Metrics in the ADS
Henneken, Edwin A; Kurtz, Michael J; Grant, Carolyn S; Thompson, Donna; Luker, Jay; Chyla, Roman; Holachek, Alexandra; Murray, Stephen S
2014-01-01T23:59:59.000Z
Finding measures for research impact, be it for individuals, institutions, instruments or projects, has gained a lot of popularity. More papers than ever are being written on new impact measures, and problems with existing measures are being pointed out on a regular basis. Funding agencies require impact statistics in their reports, job candidates incorporate them in their resumes, and publication metrics have even been used in at least one recent court case. To support this need for research impact indicators, the SAO/NASA Astrophysics Data System (ADS) has developed a service which provides a broad overview of various impact measures. In this presentation we discuss how the ADS can be used to quench the thirst for impact measures. We will also discuss a couple of the lesser known indicators in the metrics overview and the main issues to be aware of when compiling publication-based metrics in the ADS, namely author name ambiguity and citation incompleteness.
Building America Expert Meeting: Key Innovations for Adding Energy...
Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site
Key Innovations for Adding Energy Efficiency to Maintenance Projects Building America Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance Projects This...
Addendum Added to Innovative Demonstration of Geothermal Energy...
Office of Environmental Management (EM)
Addendum Added to Innovative Demonstration of Geothermal Energy Production FOA Addendum Added to Innovative Demonstration of Geothermal Energy Production FOA July 2, 2010 - 2:13pm...
Multi-Spin Strings in AdS_4*CP^3 and its ?-deformation
Jun-Bao Wu
2013-05-31T23:59:59.000Z
In this paper, we study the multi-spin string solutions in AdS_4*CP^3 and its \\beta-deformation with real \\beta. We give various explicit solutions after some general studies. Conserved charges are computed for these explicit solutions.
Killing spinors, the adS black hole and I(ISO(2,1)) gravity
R. B. Mann; G. Papadopoulos
1996-06-12T23:59:59.000Z
We construct a supersymmetric extension of the $I\\big(ISO(2,1)\\big)$ Chern-Simons gravity and show that certain particle-like solutions and the adS black-hole solution of this theory are supersymmetric.
S-matrix for strings on $\\eta$-deformed AdS5 x S5
Arutyunov, Gleb; Frolov, Sergey
2014-01-01T23:59:59.000Z
We determine the bosonic part of the superstring sigma model Lagrangian on $\\eta$-deformed AdS5 x S5, and use it to compute the perturbative world-sheet scattering matrix of bosonic particles of the model. We then compare it with the large string tension limit of the q-deformed S-matrix and find exact agreement.
S-matrix for strings on $?$-deformed AdS5 x S5
Gleb Arutyunov; Riccardo Borsato; Sergey Frolov
2014-04-07T23:59:59.000Z
We determine the bosonic part of the superstring sigma model Lagrangian on $\\eta$-deformed AdS5 x S5, and use it to compute the perturbative world-sheet scattering matrix of bosonic particles of the model. We then compare it with the large string tension limit of the q-deformed S-matrix and find exact agreement.
Bound State Transfer Matrix for AdS5 x S5 Superstring
Gleb Arutyunov; Marius de Leeuw; Ryo Suzuki; Alessandro Torrielli
2009-09-17T23:59:59.000Z
We apply the algebraic Bethe ansatz technique to compute the eigenvalues of the transfer matrix constructed from the general bound state S-matrix of the light-cone AdS5 x S5 superstring. This allows us to verify certain conjectures on the quantum characteristic function, and to extend them to the general case.
The Thermal Scalar and Random Walks in AdS3 and BTZ
Thomas G. Mertens; Henri Verschelde; Valentin I. Zakharov
2014-07-08T23:59:59.000Z
We analyze near-Hagedorn thermodynamics of strings in the WZW $AdS_3$ model. We compute the thermal spectrum of all primaries and find the thermal scalar explicitly in the string spectrum using CFT twist techniques. Then we use the link to the Euclidean WZW BTZ black hole and write down the Euclidean BTZ spectrum. We give a Hamiltonian interpretation of the thermal partition function of angular orbifolds where we find a reappearance of discrete states that dominate the partition function. Using these results, we discuss the nature of the thermal scalar in the WZW BTZ model. As a slight generalization of the angular orbifolds, we discuss the $AdS_3$ string gas with a non-zero chemical potential corresponding to angular momentum around the spatial cigar. For this model as well, we determine the thermal spectrum and the Hagedorn temperature as a function of chemical potential. Finally the nature of $\\alpha'$ corrections to the $AdS_3$ thermal scalar action is analyzed and we find the random walk behavior of highly excited strings in this particular $AdS_3$ background.
Holographic Thermalization, stability of AdS, and the Fermi-Pasta-Ulam-Tsingou paradox
Venkat Balasubramanian; Alex Buchel; Stephen R. Green; Luis Lehner; Steven L. Liebling
2014-06-16T23:59:59.000Z
For a real massless scalar field in general relativity with a negative cosmological constant, we uncover a large class of spherically symmetric initial conditions that are close to AdS, but whose numerical evolution does not result in black hole formation. According to the AdS/CFT dictionary, these bulk solutions are dual to states of a strongly interacting boundary CFT that fail to thermalize at late times. Furthermore, as these states are not stationary, they define dynamical CFT configurations that do not equilibrate. We develop a two-timescale perturbative formalism that captures both direct and inverse cascades of energy and agrees with our fully nonlinear evolutions in the appropriate regime. We also show that this formalism admits a large class of quasi-periodic solutions. Finally, we demonstrate a striking parallel between the dynamics of AdS and the classic Fermi-Pasta-Ulam-Tsingou problem.
The Classical Exchange Algebra of AdS5 x S5 String Theory
Marc Magro
2009-01-07T23:59:59.000Z
The classical exchange algebra satisfied by the monodromy matrix of AdS5 x S5 string theory in the Green-Schwarz formulation is determined by using a first-order Hamiltonian formulation and by adding to the Bena-Polchinski-Roiban Lax connection terms proportional to constraints. This enables in particular to show that the conserved charges of this theory are in involution. This result is obtained for a general world-sheet metric. The same exchange algebra is obtained within the pure spinor description of AdS5 x S5 string theory. These results are compared to the one obtained by A. Mikhailov and S. Schaefer-Nameki for the pure spinor formulation.
Measuring value added characteristics in feeder cattle
Mathews, Crystal Dawn
2009-05-15T23:59:59.000Z
, cyclical effects, lot size, weight, breed type, sex, commingling, fed cattle futures price, and corn price were all found to have an impact on the sale price of feeder cattle. Feeder calves sold through MFA Health Track Beef Alliance and other value added...
Marius de Leeuw; Takuya Matsumoto; Sanefumi Moriyama; Vidas Regelskis; Alessandro Torrielli
2012-04-11T23:59:59.000Z
We discuss special quantum group (secret) symmetries of the integrable system associated to the AdS/CFT correspondence. These symmetries have by now been observed in a variety of forms, including the spectral problem, the boundary scattering problem, n-point amplitudes, the pure-spinor formulation and quantum affine deformations.
de Leeuw, Marius; Moriyama, Sanefumi; Regelskis, Vidas; Torrielli, Alessandro
2012-01-01T23:59:59.000Z
We discuss special quantum group (secret) symmetries of the integrable system associated to the AdS/CFT correspondence. These symmetries have by now been observed in a variety of forms, including the spectral problem, the boundary scattering problem, n-point amplitudes, the pure-spinor formulation and quantum affine deformations.
AD CONTENT CHECK LIST: o Company logo
Zakharov, Vladimir
AD CONTENT CHECK LIST: o Company logo o Address o Contact Info: Phone, web site, and/or e-mail o that will perfectly reflect your image! Acceptable Formats For Logos/Graphics/Photos High-Res (300 dpi) PDF, EPS
Universality of Long-Distance AdS Physics from the CFT Bootstrap
A. Liam Fitzpatrick; Jared Kaplan; Matthew T. Walters
2014-07-10T23:59:59.000Z
We begin by explicating a recent proof of the cluster decomposition principle in AdS_{d+1} from the CFT_d bootstrap in d > 2. The CFT argument also computes the leading interactions between distant objects in AdS, and we confirm the universal agreement between the CFT bootstrap and AdS gravity in the semi-classical limit. We proceed to study the generalization to 2d CFTs, which requires knowledge of the Virasoro conformal blocks in a lightcone OPE limit. We compute these blocks in a semiclassical, large central charge approximation, and use them to prove a suitably modified theorem. In particular, from the 2d bootstrap we prove the existence of large spin operators with fixed 'anomalous dimensions' indicative of the presence of deficit angles in AdS_3. As we approach the threshold for the BTZ black hole, interpreted as a CFT scaling dimension, the twist spectrum of large spin operators becomes dense. Due to the exchange of the Virasoro identity block, primary states above the BTZ threshold mimic a thermal background for light operators. We derive the BTZ quasi-normal modes, and we use the bootstrap equation to prove that the twist spectrum is dense. Corrections to thermality could be obtained from a more refined computation of the Virasoro conformal blocks.
Training Needs in Louisiana's Value-Added Forest Products Industry
Training Needs in Louisiana's Value-Added Forest Products Industry Richard VloskyRichard Vlosky-Added Training in Other States · The Need for Training in Louisiana-Past Research #12;Industry Development & Adding Value #12;Value-Added Industry Development is Multi-Faceted Marketing Workforce Training Strategic
The free energy of N=2 supersymmetric AdS_4 solutions of M-theory
Maxime Gabella; Dario Martelli; Achilleas Passias; James Sparks
2011-07-29T23:59:59.000Z
We show that general N=2 supersymmetric AdS_4 solutions of M-theory with non-zero M2-brane charge admit a canonical contact structure. The free energy of the dual superconformal field theory on S^3 and the scaling dimensions of operators dual to supersymmetric wrapped M5-branes are expressed via AdS/CFT in terms of contact volumes. In particular, this leads to topological and localization formulae for the coefficient of N^{3/2} in the free energy of such solutions.
Covariant propagator in AdS5 x S5 superspace
Peng Dai; Ru-Nan Huang; Warren Siegel
2010-02-10T23:59:59.000Z
We give an explicit superspace propagator for the chiral scalar field strength of 10D IIB supergravity on an AdS5 x S5 background. Because this space is conformally flat, the propagator is very simple, almost identical to that of flat space. We also give an explicit expansion over the Kaluza-Klein modes of S5. The fact that the full propagator is so much simpler suggests that, as in 2D conformal field theory, AdS/CFT calculations would be simpler without a mode expansion.
Ramkumar, Mahalingam
. The pro- posed trust evaluation method and trust models are employed in ad hoc networks for secure ad hoc Terms--Ad hoc networks, security, trust modeling and evaluation. I. INTRODUCTION AN AD HOC NETWORK strategy to improve security of ad hoc networks is to develop mech- anisms that allow a node to evaluate
Renormalization, averaging, conservation laws and AdS (in)stability
Ben Craps; Oleg Evnin; Joris Vanhoof
2015-01-19T23:59:59.000Z
We continue our analytic investigations of non-linear spherically symmetric perturbations around the anti-de Sitter background in gravity-scalar field systems, and focus on conservation laws restricting the (perturbatively) slow drift of energy between the different normal modes due to non-linearities. We discover two conservation laws in addition to the energy conservation previously discussed in relation to AdS instability. A similar set of three conservation laws was previously noted for a self-interacting scalar field in a non-dynamical AdS background, and we highlight the similarities of this system to the fully dynamical case of gravitational instability. The nature of these conservation laws is best understood through an appeal to averaging methods which allow one to derive an effective Lagrangian or Hamiltonian description of the slow energy transfer between the normal modes. The conservation laws in question then follow from explicit symmetries of this averaged effective theory.
Extremal Static AdS Black Hole/CFT Correspondence in Gauged Supergravities
H. Lu; Jianwei Mei; C. N. Pope; J. Vazquez-Poritz
2009-01-13T23:59:59.000Z
A recently proposed holographic duality allows the Bekenstein-Hawking entropy of extremal rotating black holes to be calculated microscopically, by applying the Cardy formula to the two-dimensional chiral CFTs associated with certain reparameterisations of azimuthal angular coordinates in the solutions. The central charges are proportional to the angular momenta of the black hole, and so the method degenerates in the case of static (non-rotating) black holes. We show that the method can be extended to encompass such charged static extremal AdS black holes by using consistent Kaluza-Klein sphere reduction ansatze to lift them to exact solutions in the low-energy limits of string theory or M-theory, where the electric charges become reinterpreted as angular momenta associated with internal rotations in the reduction sphere. We illustrate the procedure for the examples of extremal charged static AdS black holes in four, five, six and seven dimensions.
Weak Field Collapse in AdS: Introducing a Charge Density
Elena Caceres; Arnab Kundu; Juan F. Pedraza; Di-Lun Yang
2015-06-29T23:59:59.000Z
We study the effect of a non-vanishing chemical potential on the thermalization time of a strongly coupled large $N_c$ gauge theory in $(2+1)$-dimensions, using a specific bottom-up gravity model in asymptotically AdS space. We first construct a perturbative solution to the gravity-equations, which dynamically interpolates between two AdS black hole backgrounds with different temperatures and chemical potentials, in a perturbative expansion of a bulk neutral scalar field. In the dual field theory, this corresponds to a quench dynamics by a marginal operator, where the corresponding coupling serves as the small parameter in which the perturbation is carried out. The evolution of non-local observables, such as the entanglement entropy, suggests that thermalization time decreases with increasing chemical potential. We also comment on the validity of our perturbative analysis.
New ${\\cal N} = 1$ supersymmetric $AdS_5$ backgrounds in Type IIA supergravity
Konstadinos Sfetsos; Daniel C. Thompson
2014-08-27T23:59:59.000Z
We present a family of N=1 supersymmetric backgrounds in type-IIA supergravity and their lifts to eleven-dimensional supergravity. These are of the form $AdS_5 \\times X^5$ and are characterised by an $SU(2)$ structure. The internal space, $X^5$, is obtained from the known Sasaki-Einstein manifolds, $Y^{p,q}$, via an application of non-Abelian T-duality.
Perturbative calculation of quasinormal modes of AdS Schwarzschild black holes
Musiri, Suphot; Ness, Scott; Siopsis, George [Department of Physics, Srinakharinwirot University, Bangkok 10110 (Thailand); Department of Physics and Astronomy, The University of Tennessee, Knoxville, Tennessee 37996-1200 (United States)
2006-03-15T23:59:59.000Z
We calculate analytically quasinormal modes of AdS Schwarzschild black holes including first-order corrections. We consider massive scalar, gravitational and electromagnetic perturbations. Our results are in good agreement with numerical calculations. In the case of electromagnetic perturbations, ours is the first calculation to provide an analytic expression for quasinormal frequencies, because the effective potential vanishes at zeroth order. We show that the first-order correction is logarithmic.
A new holographic limit of AdS5 x S5
Machiko Hatsuda; Warren Siegel
2003-02-06T23:59:59.000Z
We re-examine the projective lightcone limit of the gauge-invariant Green-Schwarz action on 5D anti-de Sitter x the five-sphere. It implies the usual holography for AdS5, but also (a complex) one for S5. The result is N=4 projective superspace, which unlike N=4 harmonic superspace can describe N=4 super Yang-Mills off shell.
John H. Schwarz
2009-07-28T23:59:59.000Z
The study of AdS/CFT (or gauge/gravity) duality has been one of the most active and illuminating areas of research in string theory over the past decade. The scope of its relevance and the insights it is providing seem to be ever expanding. In this talk I briefly describe some of the attempts to explore how the duality works for maximally supersymmetric systems.
ARM KAZR-ARSCL Value Added Product
DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]
Jensen, Michael
The Ka-band ARM Zenith Radars (KAZRs) have replaced the long-serving Millimeter Cloud Radars, or MMCRs. Accordingly, the primary MMCR Value Added Product (VAP), the Active Remote Sensing of CLouds (ARSCL) product, is being replaced by a KAZR-based version, the KAZR-ARSCL VAP. KAZR-ARSCL provides cloud boundaries and best-estimate time-height fields of radar moments.
ARM KAZR-ARSCL Value Added Product
Jensen, Michael
2012-09-28T23:59:59.000Z
The Ka-band ARM Zenith Radars (KAZRs) have replaced the long-serving Millimeter Cloud Radars, or MMCRs. Accordingly, the primary MMCR Value Added Product (VAP), the Active Remote Sensing of CLouds (ARSCL) product, is being replaced by a KAZR-based version, the KAZR-ARSCL VAP. KAZR-ARSCL provides cloud boundaries and best-estimate time-height fields of radar moments.
Fermilab Today | Classified Ads | Archive - 2015
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:5 TablesExports(Journal Article)41clothThe Bonneville Power AdministrationHawaiiEnergy StorageDepartmentPOPSECFemtosecondAds Subscribe | Contact Fermilab
Adding coal dust to coal batch
V.S. Shved; A.V.Berezin [OAO Koks, Kemerovo (Russian Federation)
2009-05-15T23:59:59.000Z
The granulometric composition of coke dust from the dry-slaking machine is determined. The influence of additions of 3-7% coke dust on the quality of industrial coking batch and the coke obtained by box coking is estimated. Adding 1% coke dust to coking batch does not markedly change the coke quality. Industrial equipment for the supply of dry-slaking dust to the batch is described.
ADS: The Next Generation Search Platform
Accomazzi, Alberto; Henneken, Edwin A; Chyla, Roman; Luker, James; Grant, Carolyn S; Thompson, Donna M; Holachek, Alexandra; Dave, Rahul; Murray, Stephen S
2015-01-01T23:59:59.000Z
Four years after the last LISA meeting, the NASA Astrophysics Data System (ADS) finds itself in the middle of major changes to the infrastructure and contents of its database. In this paper we highlight a number of features of great importance to librarians and discuss the additional functionality that we are currently developing. Starting in 2011, the ADS started to systematically collect, parse and index full-text documents for all the major publications in Physics and Astronomy as well as many smaller Astronomy journals and arXiv e-prints, for a total of over 3.5 million papers. Our citation coverage has doubled since 2010 and now consists of over 70 million citations. We are normalizing the affiliation information in our records and, in collaboration with the CfA library and NASA, we have started collecting and linking funding sources with papers in our system. At the same time, we are undergoing major technology changes in the ADS platform which affect all aspects of the system and its operations. We hav...
Variations of 14-C around AD 775 and AD 1795 - due to solar activity
Neuhaeuser, Ralph
2015-01-01T23:59:59.000Z
The motivation for our study is the disputed cause for the strong variation of 14-C around AD 775. Our method is to compare the 14-C variation around AD 775 with other periods of strong variability. Our results are: (a) We see three periods, where 14-C varied over 200 yr in a special way showing a certain pattern of strong secular variation: after a Grand Minimum with strongly increasing 14-C, there is a series of strong short-term drop(s), rise(s), and again drop(s) within 60 yr, ending up to 200 yr after the start of the Grand Minimum. These three periods include the strong rises around BC 671, AD 775, and AD 1795. (b) We show with several solar activity proxies (radioisotopes, sunspots, and aurorae) for the AD 770s and 1790s that such intense rapid 14-C increases can be explained by strong rapid decreases in solar activity and, hence, wind, so that the decrease in solar modulation potential leads to an increase in radioisotope production. (c) The strong rises around AD 775 and 1795 are due to three effects...
Entropy of near-extremal black holes in AdS5
Simon, Joan; Balasubramanian, Vijay; de Boer, Jan; Jejjala, Vishnu; Simon, Joan
2007-07-24T23:59:59.000Z
We construct the microstates of near-extremal black holes in AdS_5 x S5 as gases of defects distributed in heavy BPS operators in the dual SU(N) Yang-Mills theory. These defects describe open strings on spherical D3-branes in the S5, and we show that they dominate the entropy by directly enumerating them and comparing the results with a partition sum calculation. We display new decoupling limits in which the field theory of the lightest open strings on the D-branes becomes dual to a near-horizon region of the black hole geometry. In the single-charge black hole we find evidence for an infrared duality between SU(N) Yang-Mills theories that exchanges the rank of the gauge group with an R-charge. In the two-charge case (where pairs of branes intersect on a line), the decoupled geometry includes an AdS_3 factor with a two-dimensional CFT dual. The degeneracy in this CFT accounts for the black hole entropy. In the three-charge case (where triples of branes intersect at a point), the decoupled geometry contains an AdS_2 factor. Below a certain critical mass, the two-charge system displays solutions with naked timelike singularities even though they do not violate a BPS bound. We suggest a string theoretic resolution of these singularities.
Secret Symmetries of Type IIB Superstring Theory on AdS3 x S3 x M4
Antonio Pittelli; Alessandro Torrielli; Martin Wolf
2014-11-06T23:59:59.000Z
We establish features of so-called Yangian secret symmetries for AdS3 type IIB superstring backgrounds thus verifying the persistence of such symmetries to this new instance of the AdS/CFT correspondence. Specifically, we find two a priori different classes of secret symmetry generators. One class of generators, anticipated from the previous literature, is more naturally embedded in the algebra governing the integrable scattering problem. The other class of generators is more elusive, and somewhat closer in its form to its higher-dimensional AdS5 counterpart. All of these symmetries respect left-right crossing. In addition, by considering the interplay between left and right representations, we gain a new perspective on the AdS5 case. We also study the RTT-realisation of the Yangian in AdS3 backgrounds thus establishing a new incarnation of the Beisert-de Leeuw construction.
Alternative approach to the regularization of odd dimensional AdS gravity
Pablo Mora
2007-08-23T23:59:59.000Z
In this paper I present an action principle for odd dimensional AdS gravity which consists of introducing another manifold with the same boundary and a very specific boundary term. This new action allows and alternative approach to the regularization of the theory, yielding a finite euclidean action and finite conserved charges. The choice of the boundary term is justified on the grounds that an enhanced 'almost off-shell' local AdS/Conformal symmetry arises for that very special choice. One may say that the boundary term is dictated by a guiding symmetry principle. Two sets of boundary conditions are considered, which yield regularization procedures analogous to (but different from) the standard 'background substraction' and 'counterterms' regularization methods. The Noether charges are constructed in general. As an application it is shown that for Schwarszchild-AdS black holes the charge associated to the time-like Killing vector is finite and is indeed the mass. The Euclidean action for Schwarzschild-AdS black holes is computed, and it turns out to be finite, and to yield the right thermodynamics. The previous paragraph may be interpreted in the sense that the boundary term dictated by the symmetry principle is the one that correctly regularizes the action.
Ad Lucem: Modeling Market Transformation Pathways Workshop
Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankShale_Gas.pdfService on the TargetFY12 DOE -NAT IONA L S47.1 (June 2004) 1June|AD LUCEM ... TOWARD THE
Holographic formula for the determinant of the scattering operator in thermal AdS
Danilo E. Díaz
2009-08-26T23:59:59.000Z
A 'holographic formula' expressing the functional determinant of the scattering operator in an asymptotically locally anti-de Sitter(ALAdS) space has been proposed in terms of a relative functional determinant of the scalar Laplacian in the bulk. It stems from considerations in AdS/CFT correspondence of a quantum correction to the partition function in the bulk and the corresponding subleading correction at large N on the boundary. In this paper we probe this prediction for a class of quotients of hyperbolic space by a discrete subgroup of isometries. We restrict to the simplest situation of an abelian group where the quotient geometry describes thermal AdS and also the non-spinning BTZ instanton. The bulk computation is explicitly done using the method of images and the answer can be encoded in a (Patterson-)Selberg zeta-function.
On Thermodynamics of AdS Black Holes in Arbitrary Dimensions
A. Belhaj; M. Chabab; H. El Moumni; M. B. Sedra
2012-09-23T23:59:59.000Z
Considering the cosmological constant $\\Lambda$ as a thermodynamic pressure and its conjugate quantity as a thermodynamic volume as proposed in Kubiznak and Mann (2012), we discuss the critical behavior of charged AdS black hole in arbitrary dimensions $d$. In particular, we present a comparative study in terms of the spacetime dimension $d$ and the displacement of critical points controlling the transition between the small and the large black holes. Such behaviors vary nicely in terms of $d$. Among our result in this context consists in showing that the equation of state for a charged RN-AdS black hole predicts an universal number given by $\\frac{2d-5}{4d-8}$. The three dimensional solution is also discussed.
Managing On-air Ad Inventory in Broadcast Television
Bollapragada, Srinivas; Mallik, Suman
2008-01-01T23:59:59.000Z
Motivated by the experiences of the National Broadcasting Company (NBC), we present an analytical model for managing on-air ad inventory in broadcast television. The ad inventory in this industry is priced based on rating ...
Superconductors for superstrings on AdS_5 x T^{1,1}
Francesco Aprile; Andrea Borghese; Aldo Dector; Diederik Roest; Jorge G. Russo
2012-05-09T23:59:59.000Z
We construct a one-parameter family of five-dimensional N=2 supergravity Lagrangians with an SU(2,1) / U(2) hypermultiplet. For certain values of the parameter, these are argued to describe the dynamics of scalar modes of superstrings on AdS_5 x T^{1,1}, and therefore to be dual to specific chiral primary operators of Klebanov-Witten superconformal field theory. We demonstrate that, below a critical temperature, the thermodynamics is dominated by charged black holes with hair for the scalars that are dual to the operator of lowest conformal dimension 3/2. The system thus enters into a superconducting phase where condenses.
Integrable $?$-deformations: Squashing Coset CFTs and $AdS_5\\times S^5$
Saskia Demulder; Konstantinos Sfetsos; Daniel C. Thompson
2015-04-10T23:59:59.000Z
We examine integrable $\\lambda$-deformations of $SO(n+1)/SO(n)$ coset CFTs and their analytic continuations. We provide an interpretation of the deformation as a squashing of the corresponding coset $\\sigma$-model's target space. We realise the $\\lambda$-deformation for $n=5$ case as a solution to supergravity supported by non-vanishing five-form and dilaton. This interpolates between the coset CFT $SO(4,2)/SO(4,1)\\times SO(6)/SO(5)$ constructed as a gauged WZW model and the non-Abelian T-dual of the $AdS_5\\times S^5$ spacetime.
Transition from AdS universe to DS universe in the BPP model
Wontae Kim; Myungseok Yoon
2007-03-03T23:59:59.000Z
It can be shown that in the BPP model the smooth phase transition from the asymptotically decelerated AdS universe to the asymptotically accelerated DS universe is possible by solving the modified semiclassical equations of motion. This transition comes from noncommutative Poisson algebra, which gives the constant curvature scalars asymptotically. The decelerated expansion of the early universe is due to the negative energy density with the negative pressure induced by quantum back reaction, and the accelerated late-time universe comes from the positive energy and the negative pressure which behave like dark energy source in recent cosmological models.
On Heat Properties of AdS Black Holes in Higher Dimensions
A. Belhaj; M. Chabab; H. EL Moumni; K. Masmar; M. B. Sedra; A. Segui
2015-07-01T23:59:59.000Z
We investigate the heat properties of AdS Black Holes in higher dimensions. We consider the study of the corresponding thermodynamical properties including the heat capacity explored in the determination of the black hole stability. In particular, we compute the heat latent. To overcome the instability problem, the Maxwell construction, in the (T,S)-plane, is elaborated. This method is used to modify the the Hawking-Page phase structure by removing the negative heat capacity regions. Then, we discuss the thermodynamic cycle and the heat engines using the way based on the extraction of the work from a black hole solution.
Aspects of Axion Phenomenology in a slice of AdS_5
Thomas Flacke; David Maybury
2006-12-11T23:59:59.000Z
Motivated by multi-throat considerations, we study the phenomenological implications of a bulk axion in a slice of AdS_5 with a large extra dimension: k~0.01 eV, kR > 1. In particular, we compare axion physics with a warped geometry to axions in flat compactifications. As in flat compactification scenarios, we find that the mass of the axion can become independent from the underlying Peccei-Quinn scale. Surprisingly, we find that in warped extra dimensions the axion's invisibility, cosmological viability, and basic phenomenology remain essentially unaltered in comparison to axions in flat compactifications.
AdS/QCD at finite density and temperature
Kim, Y., E-mail: ykim@apctp.org [Pohang University of Science and Technology, Asia Pacific Center for Theoretical Physics and Department of Physics (Korea, Republic of)
2012-07-15T23:59:59.000Z
We review some basics of AdS/QCD following a non-standard path and list a few results from AdS/QCD or holographic QCD. The non-standard path here is to use the analogy of the way one obtains an effective model of QCD like linear sigma model and the procedure to construct an AdS/QCD model based on the AdS/CFT dictionary.
AUAARHUS UNIVERSITY Adding a bonus card AU Finance and Planning
AUAARHUS UNIVERSITY Adding a bonus card AU Finance and Planning Financial Management 12/02/2013 Page 1 of 6 Guide to adding a bonus card in CWT's online system Log on to CWT: https://sso.carlsonwagonlit.com/login.do Type in your username and password Click on "Sign on" #12;AUAARHUS UNIVERSITY Adding a bonus card AU
C-AD electron-cooling Photocathode and Laser
C-AD electron-cooling Photocathode and Laser A. Burrill and T. Rao #12;C-AD electron system Design of 2nd and third generation system · Laser system Requirements Commercial Capsule fabrication · Brazing · Metallization #12;C-AD electron-cooling Overview Photocathode Requirements
Review of AdS/CFT Integrability, Chapter IV.3: N=6 Chern-Simons and Strings on AdS4xCP3
Thomas Klose
2012-03-27T23:59:59.000Z
We review the duality and integrability of N=6 superconformal Chern-Simons theory in three dimensions and IIA superstring theory on the background AdS4xCP3. We introduce both of these models and describe how their degrees of freedom are mapped to excitations of a long-range integrable spin-chain. Finally, we discuss the properties of the Bethe equations, the S-matrix and the algebraic curve that are special to this correspondence and differ from the case of N=4 SYM theory and strings on AdS5xS5.
Emergent IR dual 2d CFTs in charged AdS5 black holes
Jan de Boer; Maria Johnstone; M. M. Sheikh-Jabbari; Joan Simon
2011-12-20T23:59:59.000Z
We study the possible dynamical emergence of IR conformal invariance describing the low energy excitations of near-extremal R-charged global AdS5 black holes. We find interesting behavior especially when we tune parameters in such a way that the relevant extremal black holes have classically vanishing horizon area, i.e. no classical ground-state entropy, and when we combine the low energy limit with a large N limit of the dual gauge theory. We consider both near-BPS and non-BPS regimes and their near horizon limits, emphasize the differences between the local AdS3 throats emerging in either case, and discuss potential dual IR 2d CFTs for each case. We compare our results with the predictions obtained from the Kerr/CFT correspondence, and obtain a natural quantization for the central charge of the near-BPS emergent IR CFT which we interpret in terms of the open strings stretched between giant gravitons.
Shear Viscosity from AdS Born-Infeld Black Holes
Rong-Gen Cai; Ya-Wen Sun
2008-09-23T23:59:59.000Z
We calculate the shear viscosity in the frame of AdS/CFT correspondence for the field theory with a gravity dual of Einstein-Born-Infeld gravity. We find that the ratio of $\\eta/s$ is still the conjectured universal value $1/4\\pi$ at least up to the first order of the Born-Infeld parameter $1/b^2$.
Quartic AdS Interactions in Higher-Spin Gravity from Conformal Field Theory
Bekaert, Xavier; Ponomarev, Dmitry; Sleight, Charlotte
2015-01-01T23:59:59.000Z
Clarifying the locality properties of higher-spin gravity is a pressing task, but notoriously difficult due to the absence of a weakly-coupled flat regime. The simplest non-trivial case where this question can be addressed is the quartic self-interaction of the AdS scalar field present in the higher-spin multiplet. We investigate this issue in the context of the holographic duality between the minimal bosonic higher-spin theory on AdS$_4$ and the free $O\\left(N\\right)$ vector model in three dimensions. In particular, we determine the exact explicit form of the derivative expansion of the bulk scalar quartic vertex. The quartic vertex is obtained from the field theory four-point function of the operator dual to the bulk scalar, by making use of our previous results for the Witten diagrams of higher-spin exchanges. This is facilitated by establishing the conformal block expansions of both the boundary four-point function and the dual bulk Witten diagram amplitudes. We show that the vertex we find satisfies a ge...
Geometric free energy of toric AdS4/CFT3 models
Sangmin Lee; Daisuke Yokoyama
2015-01-22T23:59:59.000Z
We study the supersymmetric free energy of three dimensional Chern-Simons-matter theories holographically dual to AdS$_4$ times toric Sasaki-Einstein seven-manifolds. In the large $N$ limit, we argue that the square of the free energy can be written as a quartic polynomial of trial R-charges. The coefficients of the polynomial are determined geometrically from the toric diagrams. We present the coefficients of the quartic polynomial explicitly for generic toric diagrams with up to 6 vertices, and some particular diagrams with 8 vertices. Decomposing the trial R-charges into mesonic and baryonic variables, and eliminating the baryonic ones, we show that the quartic polynomial reproduces the inverse of the Martelli-Sparks-Yau volume function. On the gravity side, we explore the possibility of using the same quartic polynomial as the prepotential in the AdS gauged supergravity. Comparing Kaluza-Klein gravity and gauged supergravity descriptions, we find perfect agreement in the mesonic sector but some discrepancy in the baryonic sector.
Vacuum densities for a thick brane in AdS spacetime
A. A. Saharian; A. L. Mkhitaryan
2007-10-18T23:59:59.000Z
For a massive scalar field with general curvature coupling parameter we evaluate Wightman function, vacuum expectation values of the field square and the energy-momentum tensor induced by a $Z_{2}$-symmetric brane with finite thickness located on $(D+1)$-dimensional AdS bulk. For the general case of static plane symmetric interior structure the expectation values in the region outside the brane are presented as the sum of free AdS and brane induced parts. For a conformally coupled massless scalar the brane induced part in the vacuum energy-momentum tensor vanishes. In the limit of strong gravitational fields the brane induced parts are exponentially suppressed for points not too close to the brane boundary. As an application of general results a special model is considered in which the geometry inside the brane is a slice of the Minkowski spacetime orbifolded along the direction perpendicular to the brane. For this model the Wightman function, vacuum expectation values of the field square and the energy-momentum tensor inside the brane are evaluated. It is shown that for both minimally and conformally coupled scalar fields the interior vacuum forces acting on the brane boundaries tend to decrease the brane thickness.
Dual Superconformal Symmetry from AdS5 x S5 Superstring Integrability
Niklas Beisert; Riccardo Ricci; Arkady Tseytlin; Martin Wolf
2008-11-17T23:59:59.000Z
We discuss 2d duality transformations in the classical AdS5 x S5 superstring and their effect on the integrable structure. T-duality along four directions in Poincare parametrization of AdS5 maps the bosonic part of the superstring action into itself. On bosonic level, this duality may be understood as a symmetry of the first-order (phase space) system of equations for the coset components of the current. The associated Lax connection is invariant modulo the action of an so(2,4)-automorphism. We then show that this symmetry extends to the full superstring, provided one supplements the transformation of the bosonic components of the current with a transformation on the fermionic ones. At the level of the action, this symmetry can be seen by combining the bosonic duality transformation with a similar one applied to part of the fermionic superstring coordinates. As a result, the full superstring action is mapped into itself, albeit in a different kappa-symmetry gauge. One implication is that the dual model has the same superconformal symmetry group as the original one, and this may be seen as a consequence of the integrability of the superstring. The invariance of the Lax connection under the duality implies a map on the full set of conserved charges that should interchange some of the Noether (local) charges with hidden (non-local) ones and vice versa.
Aerosol Best Estimate Value-Added Product
Flynn, C; Turner, D; Koontz, A; Chand, D; Sivaraman, C
2012-07-19T23:59:59.000Z
The objective of the Aerosol Best Estimate (AEROSOLBE) value-added product (VAP) is to provide vertical profiles of aerosol extinction, single scatter albedo, asymmetry parameter, and Angstroem exponents for the atmospheric column above the Central Facility at the ARM Southern Great Plains (SGP) site. We expect that AEROSOLBE will provide nearly continuous estimates of aerosol optical properties under a range of conditions (clear, broken clouds, overcast clouds, etc.). The primary requirement of this VAP was to provide an aerosol data set as continuous as possible in both time and height for the Broadband Heating Rate Profile (BBHRP) VAP in order to provide a structure for the comprehensive assessment of our ability to model atmospheric radiative transfer for all conditions. Even though BBHRP has been completed, AEROSOLBE results are very valuable for environmental, atmospheric, and climate research.
Zhou, Ping
2008-01-01T23:59:59.000Z
Transmission Strategies for Wireless Devices,” in Proc. ofand Power Control for Wireless Ad-hoc Networks," in Proc. offor ad hoc mobile wireless networks," IEEE Personal
Robust Cubic-Based 3-D Localization for Wireless Sensor Networks
Shwe, Hnin Y; Wang, Chenchao; Chong, Peter Han Joo; Kumar, Arun
2013-01-01T23:59:59.000Z
tion for Mobile Wireless Sensor Networks,” Ad Hoc Net-tion for Mobile Wireless Sensor Networks,” Ad Hoc Net-Scheme in Stereo Wireless Sensor Networks,” Advances in
Conformal Transformations and Strings for an Accelerating Quark-Antiquark Pair in AdS3
Shijong Ryang
2014-12-08T23:59:59.000Z
From a simple moving open string solution dual to a moving heavy quark with constant velocity in the Poincare AdS_3 spacetime, we construct an accerlerating open string solution dual to a heavy quark-antiquark pair accelerated in opposite directions by performing the three mappings such as the SL(2,R)_L x SL(2,R)_R isometry transformation, the special conformal transformation and the conformal SO(2,2) transformation. Using the string sigma model action we construct two open string solutions staying in two different regions whose dividing line is associated with the event horizon appeared on the string worldsheet and obtain the accelerating open string solution by gluing two such solutions.
Emerging Non-Anomalous Baryonic Symmetries in the AdS_5/CFT_4 Correspondence
Nessi Benishti
2011-06-06T23:59:59.000Z
We study the breaking of baryonic symmetries in the AdS_5/CFT_4 correspondence for D3 branes at Calabi-Yau three-fold singularities. This leads, for particular VEVs, to the emergence of non-anomalous baryonic symmetries during the renormalization group flow. We claim that these VEVs correspond to critical values of the B-field moduli in the dual supergravity backgrounds. We study in detail the C^3/Z_3 orbifold, the cone over F_0 and the C^3/Z_5 orbifold. For the first two examples, we study the dual supergravity backgrounds that correspond to the breaking of the emerging baryonic symmetries and identify the expected Goldstone bosons and global strings in the infra-red. In doing so we confirm the claim that the emerging symmetries are indeed non-anomalous baryonic symmetries.
Emergent Space and the Example of AdS_5XS^5
Frank Ferrari
2013-05-06T23:59:59.000Z
We explain how to build field theoretic observables from which the geometrical properties of a dual holographic formulation can be read off straightforwardly. In some cases this construction yields explicit and calculable models of emergent space. We illustrate the idea on the type IIB background generated by N D3-branes in the near horizon limit, for which a full derivation from first principles can be presented. The six transverse dimensions emerge at large N and we find the full AdS_5XS^5 metric and self-dual Ramond-Ramond field strength on the resulting ten dimensional space-time, with the correct radii and quantization law. We briefly discuss possible applications and generalizations.
The holographic superconductors in higher-dimensional AdS soliton
Chong Oh Lee
2012-07-30T23:59:59.000Z
We explore the behaviors of the holographic superconductors at zero temperature for a charged scalar field coupled to a Maxwell field in higher-dimensional AdS soliton spacetime via analytical way. In the probe limit, we obtain the critical chemical potentials increase linearly as a total dimension $d$ grows up. We find that the critical exponent for condensation operator is obtained as 1/2 independently of $d$, and the charge density is linearly related to the chemical potential near the critical point. Furthermore, we consider a slightly generalized setup the Einstein-Power-Maxwell field theory, and find that the critical exponent for condensation operator is given as $1/(4-2n)$ in terms of a power parameter $n$ of the Power-Maxwell field, and the charge density is proportional to the chemical potential to the power of $1/(2-n)$.
The S-matrix of the AdS5 x S5 superstring
Marius de Leeuw
2010-07-28T23:59:59.000Z
In this article we review the world-sheet scattering theory of strings on AdS 5 x S5. The asymptotic spectrum of this world-sheet theory contains both fundamental particles and bound states of the latter. We explicitly derive the S-matrix that describes scattering of arbitrary bound states. The key feature that enables this derivation is the so-called Yangian symmetry which is related to the centrally extended su(2|2) superalgebra. Subsequently, we study the universal algebraic properties of the found S-matrix. As in many integrable models, the S-matrix plays a key role in the determination of the energy spectrum. In this context, we employ the Bethe ansatz approach to compute the large volume energy spectrum of string bound states.
The Bound State S-Matrix for AdS5 x S5 Superstring
Gleb Arutyunov; Marius de Leeuw; Alessandro Torrielli
2011-08-24T23:59:59.000Z
We determine the S-matrix that describes scattering of arbitrary bound states in the light-cone string theory in AdS5 x S5. The corresponding construction relies on the Yangian symmetry and the superspace formalism for the bound state representations. The basic analytic structure supporting the S-matrix entries turns out to be the hypergeometric function 4F3. We show that for particular bound state numbers it reproduces all the scattering matrices previously obtained in the literature. Our findings should be relevant for the TBA and Luescher approaches to the finite-size spectral problem. They also shed some light on the construction of the universal R-matrix for the centrally-extended psu(2|2) superalgebra.
Semiclassical Strings in Electric and Magnetic Fields Deformed $AdS_5 \\times S^5$ Spacetimes
Wung-Hong Huang
2006-01-06T23:59:59.000Z
We first apply the transformation of mixing azimuthal and internal coordinate or mixing time and internal coordinate to the 11D M-theory with a stack N M2-branes to find the spacetime of a stack of N D2-branes with magnetic or electric flux in 10 D IIA string theory, after the Kaluza-Klein reduction. We then perform the T duality to the spacetime to find the background of a stack of N D3-branes with magnetic or electric flux. In the near-horizon limit the background becomes the magnetic or electric field deformed $AdS_5 \\times S^5$. We adopt an ansatz to find the classical string solution which is rotating in the deformed $S^5$ with three angular momenta in the three rotation planes. The relations between the classical string energy and its angular momenta are found and results show that the external magnetic and electric fluxes will increase the string energy. Therefore, from the AdS/CFT point of view, the corrections of the anomalous dimensions of operators in the dual SYM theory will be positive. We also investigate the small fluctuations in these solutions and discuss the effects of magnetic and electric fields on the stability of these classical rotating string solutions. Finally, we find the possible solutions of string pulsating on the deformed spacetimes and show that the corrections to the anomalous dimensions of operators in the dual SYM theory are non-negative.
On the short string limit of the folded spinning string in AdS5 x S5
M. Beccaria; A. Tirziu
2008-10-23T23:59:59.000Z
In this paper we generalize the results of arXiv:0806.4758 to non-zero value J of angular momentum in S^5. We compute the 1-loop correction to the energy of the folded spinning string in AdS_5 x S^5 in the particular limit of slow short string approximation. In this limit the string is moving in a near-flat central region of AdS_5 slowly rotating in both AdS_5 and S^5. The one-loop correction should represent the first subleading correction to strong coupling expansion of the anomalous dimension of short gauge theory operators of the form Tr D^S Z^J in the SL(2) sector.
Developing Louisiana's Forest Products Industry: Adding Value for the Future
of a manufacturingThe increased value at each stage of a manufacturing assembly processassembly process Those and necessaryimportant and necessary Addition of net economic valueAddition of net economic value Value can be added through manufacturing orValue can be added through manufacturing or marketingmarketing Why Add Value
Dynamics and BPS states of AdS5 supergravity with a Gauss-Bonnet term
Olivera Miskovic; Ricardo Troncoso; Jorge Zanelli
2006-03-23T23:59:59.000Z
Some dynamical aspects of five-dimensional supergravity as a Chern-Simons theory for the SU(2,2|N) group, are analyzed. The gravitational sector is described by the Einstein-Hilbert action with negative cosmological constant and a Gauss-Bonnet term with a fixed coupling. The interaction between matter and gravity is characterized by intricate couplings which give rise to dynamical features not present in standard theories. Depending on the location in phase space, the dynamics can possess different number of propagating degrees of freedom, including purely topological sectors. This inhomogeneity of phase space requires special care in the analysis. Background solutions in the canonical sectors, which have regular dynamics with maximal number of degrees of freedom, are shown to exist. Within this class, explicit solutions given by locally AdS spacetimes with nontrivial gauge fields are constructed, and BPS states are identified. It is shown that the charge algebra acquires a central extension due to the presence of the matter fields. The Bogomol'nyi bound for these charges is discussed. Special attention is devoted to the N=4 case since then the gauge group has a U(1) central charge and the phase space possesses additional irregular sectors.
Emergent AdS3 and BTZ Black Hole from Weakly Interacting Hot 2d CFT
Soo-Jong Rey; Yasuaki Hikida
2006-05-02T23:59:59.000Z
We investigate emergent holography of weakly coupled two-dimensional hyperK\\"ahler sigma model on cotangent bundle of (N-1)-dimensional complex projective space at zero and finite temperature. The sigma model is motivated by the spacetime conformal field theory dual to the near-horizon geometry of Q1 D1-brane bound to Q5 D5-brane wrapped on four-torus times circle, where N = Q1*Q5. The sigma model admits nontrivial instanton for all N greater than or equal to 2, which serves as a local probe of emergent holographic spacetime. We define emergent geometry of the spacetime as that of instanton moduli space via Hitchin's information metric. At zero temperature, we find that emergent geometry is AdS3. At finite temperature, time-periodic instanton is mappable to zero temperature instanton via conformal transformation. Utilizing the transformation, we show that emergent geometry is precisely that of the non-extremal, non-rotating BTZ black hole.
New Formulation of the Type IIB Superstring Action in $AdS_5 \\times S^5$
John H. Schwarz
2015-06-25T23:59:59.000Z
Previous studies of the type IIB superstring in an ${AdS_5 \\times S^5}$ background are based on a description of the superspace geometry as the quotient space $PSU(2,2|4)/SO(4,1) \\times SO(5)$. This paper develops an alternative approach in which the Grassmann coordinates provide a nonlinear realization of $PSU(2,2|4)$ based on the quotient space $PSU(2,2|4)/SU(2,2) \\times SU(4)$, and the bosonic coordinates are described as a submanifold of $SU(2,2) \\times SU(4)$. This formulation keeps all bosonic symmetries manifest, and it provides the complete dependence on the Grassmann coordinates in terms of simple analytic expressions. It is used to construct the superstring world-sheet action in a form in which the $PSU(2,2|4)$ symmetry is manifest and kappa symmetry can be established. This formulation might have some advantages compared to previous ones, but this remains to be demonstrated.
Classical and Quantum Equations of Motion for a BTZ Black String in AdS Space
Eric Greenwood; Evan Halstead; Peng Hao
2010-01-24T23:59:59.000Z
We investigate gravitational collapse of a $(3+1)$-dimensional BTZ black string in AdS space in the context of both classical and quantum mechanics. This is done by first deriving the conserved mass per unit length of the cylindrically symmetric domain wall, which is taken as the classical Hamiltonian of the black string. In the quantum mechanical context, we take primary interest in the behavior of the collapse near the horizon and near the origin (classical singularity) from the point of view of an infalling observer. In the absence of radiation, quantum effects near the horizon do not change the classical conclusions for an infalling observer, meaning that the horizon is not an obstacle for him/her. The most interesting quantum mechanical effect comes in when investigating near the origin. First, quantum effects are able to remove the classical singularity at the origin, since the wave function is non-singular at the origin. Second, the Schr\\"odinger equation describing the behavior near the origin displays non-local effects, which depend on the energy density of the domain wall. This is manifest in that derivatives of the wavefunction at one point are related to the value of the wavefunction at some other distant point.
An Integrable Deformation of the AdS5 x S5 Superstring
Timothy J. Hollowood; J. Luis Miramontes; David M. Schmidtt
2014-09-24T23:59:59.000Z
The S-matrix on the world-sheet theory of the string in AdS5 x S5 has previously been shown to admit a deformation where the symmetry algebra is replaced by the associated quantum group. The case where q is real has been identified as a particular deformation of the Green-Schwarz sigma model. An interpretation of the case with q a root of unity has, until now, been lacking. We show that the Green-Schwarz sigma model admits a discrete deformation which can be viewed as a rather simple deformation of the F/F_V gauged WZW model, where F=PSU(2,2|4). The deformation parameter q is then a k-th root of unity where k is the level. The deformed theory has the same equations-of-motion as the Green-Schwarz sigma model but has a different symplectic structure. We show that the resulting theory is integrable and has just the right amount of kappa-symmetries that appear as a remnant of the fermionic part of the original gauge symmetry. This points to the existence of a fully consistent deformed string background.
An Integrable Deformation of the AdS5 x S5 Superstring
Hollowood, Timothy J; Schmidtt, David
2014-01-01T23:59:59.000Z
The S-matrix on the world-sheet theory of the string in AdS5 x S5 has previously been shown to admit a deformation where the symmetry algebra is replaced by the associated quantum group. The case where q is real has been identified as a particular deformation of the Green-Schwarz sigma model. An interpretation of the case with q a root of unity has, until now, been lacking. We show that the Green-Schwarz sigma model admits a discrete deformation which can be viewed as a rather simple deformation of the F/F gauged WZW model, where F=PSU(2,2|4). The deformation parameter q is then a k-th root of unity where k is the level. The deformed theory has the same equations-of-motion as the Green-Schwarz sigma model but has a different symplectic structure. We show that the resulting theory is integrable and has just the right amount of kappa-symmetries that appear as a remnant of the fermionic part of the original gauge symmetry. This points to the existence of a fully consistent deformed string background.
Characteristic length of an AdS/CFT superconductor
Kengo Maeda; Takashi Okamura
2008-10-30T23:59:59.000Z
We investigate in more detail the holographic model of a superconductor recently found by Hartnoll, Herzog, and Horowitz [Phys. Rev. Lett. 101, 031601], which is constructed from a condensate of a charged scalar field in AdS_4-Schwarzschild background. By analytically studying the perturbation of the gravitational system near the critical temperature T_c, we obtain the superconducting coherence length proportional to 1/\\sqrt{1-T/T_c} via AdS/CFT correspondence. By adding a small external homogeneous magnetic field to the system, we find that a stationary diamagnetic current proportional to the square of the order parameter is induced by the magnetic field. These results agree with Ginzburg-Landau theory and strongly support the idea that a superconductor can be described by a charged scalar field on a black hole via AdS/CFT duality.
New $AdS_3 \\times S^2$ T-duals with $\\mathcal{N} = (0,4)$ supersymmetry
Yolanda Lozano; Niall T. Macpherson; Jesús Montero; Eoin Ó Colgáin
2015-07-09T23:59:59.000Z
It is well known that Hopf-fibre T-duality and uplift takes the D1-D5 near-horizon into a class of $AdS_3 \\times S^2$ geometries in 11D where the internal space is a Calabi-Yau three-fold. Moreover, supersymmetry dictates that Calabi-Yau is the only permissible $SU(3)$-structure manifold. Generalising this duality chain to non-Abelian isometries, a strong parallel exists, resulting in the first explicit example of a class of $AdS_3 \\times S^2$ geometries with $SU(2)$-structure. Furthermore, the non-Abelian T-dual of $AdS_3 \\times S^3 \\times S^3 \\times S^1$ results in a new supersymmetric $AdS_3 \\times S^2$ geometry, which falls outside of all known classifications. We explore the basic properties of the holographic duals associated to the new backgrounds. We compute the central charges and show that they are compatible with a large $\\mathcal{N}=4$ superconformal algebra in the infra-red.
A generalization of the Lax pair for the pure spinor superstring in AdS5 x S5
Andrei Mikhailov
2013-08-09T23:59:59.000Z
We show that the Lax pair of the pure spinor superstring in AdS5xS5 admits a generalization where the generators of the superconformal algebra are replaced by the generators of some infinite-dimensional Lie superalgebra.
A generalization of the Lax pair for the pure spinor superstring in AdS5 x S5
Mikhailov, Andrei
2013-01-01T23:59:59.000Z
We show that the Lax pair of the pure spinor superstring in AdS5xS5 admits a generalization where the generators of the superconformal algebra are replaced by the generators of some infinite-dimensional Lie superalgebra.
Yangian Symmetry, S-Matrices and Bethe Ansatz for the AdS5 x S5 Superstring
M de Leeuw
2009-01-22T23:59:59.000Z
We discuss the relation between the recently derived bound state S-matrices for the AdS5 x S5 superstring and Yangian symmetry. We will study the relation between this Yangian symmetry and the Bethe ansatz. In particular we can use it to derive the Bethe equations for bound states.
Critical behavior of charged Gauss-Bonnet AdS black holes in the grand canonical ensemble
Zou, De-Cheng; Wang, Bin
2014-01-01T23:59:59.000Z
We study the thermodynamics in the grand canonical ensemble of D-dimensional charged Gauss-Bonnet-AdS black holes in the extended phase space. We find that the usual small-large black hole phase transition, which exhibits analogy with the Van de Waals liquid-gas system holds in five-dimensional spherical charged Gauss-Bonnet-AdS black holes when its potential is fixed within the range $0Gauss-Bonnet-AdS black holes, there is no such phase transition. In the limiting case, Reissner-Nordstrom-AdS black holes, with vanishing Gauss-Bonnet parameter, there is no critical behavior in the grand canonical ensemble. This result holds independent of the spacetime dimensions and topologies. We also examine the behavior of physical quantities in the vicinity of the critical point in the five-dimensional spherical charged Gauss-Bonnet-AdS black holes.
Critical behavior of charged Gauss-Bonnet AdS black holes in the grand canonical ensemble
De-Cheng Zou; Yunqi Liu; Bin Wang
2014-09-03T23:59:59.000Z
We study the thermodynamics in the grand canonical ensemble of D-dimensional charged Gauss-Bonnet-AdS black holes in the extended phase space. We find that the usual small-large black hole phase transition, which exhibits analogy with the Van de Waals liquid-gas system holds in five-dimensional spherical charged Gauss-Bonnet-AdS black holes when its potential is fixed within the range $0Gauss-Bonnet-AdS black holes, there is no such phase transition. In the limiting case, Reissner-Nordstrom-AdS black holes, with vanishing Gauss-Bonnet parameter, there is no critical behavior in the grand canonical ensemble. This result holds independent of the spacetime dimensions and topologies. We also examine the behavior of physical quantities in the vicinity of the critical point in the five-dimensional spherical charged Gauss-Bonnet-AdS black holes.
Noncommutative Extension of AdS-CFT and Holographic Superconductors
Souvik Pramanik; Sudipta Das; Subir Ghosh
2015-02-13T23:59:59.000Z
In this Letter, we consider a Non-Commutative (NC) extension of AdS-CFT correspondence and its effects on holographic superconductors. NC corrections are incorporated via the NC generalization of Schwarzschild black hole metric in AdS with the probe limit. We study NC effects on the relations connecting the charge density and the critical temperature of the Holographic Superconductors. Furthermore, condensation operator of the superconductor has been analyzed. Our results suggest that generically, NC effects increase the critical temperature of the holographic superconductor.
Adding OAI-ORE Support to Repository Platforms
Maslov, Alexey; Mikeal, Adam; Phillips, Scott; Leggett, John; McFarland, Mark
2009-05-17T23:59:59.000Z
the local to the federated repository became evident. This paper presents our experiences adding harvesting support to the DSpace repository platform using the ORE and PMH protocols from the Open Archives Initiative. We describe our use case for a statewide...
Missouri Value-Added Loan Guarantee Program (Missouri)
Broader source: Energy.gov [DOE]
The Missouri Value-Added Loan Guarantee Program provides a 50% first-loss guarantee to lenders who make agricultural business development loans for the acquisition, construction, improvement, or...
Fighting Online Click-Fraud Using Bluff Ads
Haddadi, Hamed
2010-01-01T23:59:59.000Z
Online advertising is currently the greatest source of revenue for many Internet giants. The increased number of specialized websites and modern profiling techniques, have all contributed to an explosion of the income of ad brokers from online advertising. The single biggest threat to this growth, is however, click-fraud. Trained botnets and even individuals are hired by click-fraud specialists in order to maximize the revenue of certain users from the ads they publish on their websites, or to launch an attack between competing businesses. In this note we wish to raise the awareness of the networking research community on potential research areas within this emerging field. As an example strategy, we present Bluff ads; a class of ads that join forces in order to increase the effort level for click-fraud spammers. Bluff ads are either targeted ads, with irrelevant display text, or highly relevant display text, with irrelevant targeting information. They act as a litmus test for the legitimacy of the individual...
Self-Stabilizing construction of Bounded Size Clusters Colette Johnen
Johnen, Colette
node parameters as transmission power, battery power, .... 1. Introduction An ad hoc network is a self
Chaotic strings in a near Penrose limit of AdS$_5\\times T^{1,1}$
Yuhma Asano; Daisuke Kawai; Hideki Kyono; Kentaroh Yoshida
2015-07-17T23:59:59.000Z
We study chaotic motions of a classical string in a near Penrose limit of AdS$_5\\times T^{1,1}$. It is known that chaotic solutions appear on $R\\times T^{1,1}$, depending on initial conditions. It may be interesting to ask whether the chaos persists even in Penrose limits or not. In this paper, we show that sub-leading corrections in a Penrose limit provide an unstable separatrix, so that chaotic motions are generated as a consequence of collapsed Kolmogorov-Arnold-Moser (KAM) tori. Our analysis is based on deriving a reduced system composed of two degrees of freedom by supposing a winding string ansatz. Then, we provide support for the existence of chaos by computing Poincare sections. In comparison to the AdS$_5\\times T^{1,1}$ case, we argue that no chaos lives in a near Penrose limit of AdS$_5\\times$S$^5$, as expected from the classical integrability of the parent system.
AdS/CFT and Exclusive Processes in QCD
Stanley J. Brodsky; Guy F. de Teramond
2007-09-13T23:59:59.000Z
The AdS/CFT correspondence between string theory in AdS space and conformal field theories in physical space-time leads to an analytic, semi-classical model for strongly-coupled QCD which has scale invariance and dimensional counting at short distances and color confinement at large distances. One can use holography to map the amplitude describing the hadronic state in the fifth dimension of Anti-de Sitter space to the light-front wavefunctions of hadrons in physical space-time, thus providing a relativistic description of hadrons in QCD at the amplitude level. In particular, we show that there is an exact correspondence between the fifth-dimensional coordinate of AdS space z and a specific impact variable zeta which measures the separation of the quark and gluonic constituents within the hadron in ordinary space-time. New relativistic light-front equations in ordinary space-time can then be derived which reproduce the results obtained using the 5-dimensional theory. The effective light-front equations possess elegant algebraic structures and integrability properties. This connection between the AdS and the light-front representations allows one to compute the analytic form of the frame-independent light-front wavefunctions, the fundamental entities which encode hadron properties and allow the computation of decay constants, form factors, deeply virtual Compton scattering, exclusive heavy hadron decays and other exclusive scattering amplitudes. As specific examples we compute the pion coupling constant and study the behavior of the pion form factor in the space and time-like regions. We also determine the Dirac form factors of the proton and neutron in the space-like region.
PERFORMANCE ENHANCEMENT TECHNIQUES FOR PHASED LOGIC CIRCUITS
Thornton, Mitchell
, these mechanims have been added to Phased Logic circuits by ad-hoc and manual means that require a designers
Top Value Added Chemicals from Biomass: Volume I--Results of...
Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site
Top Value Added Chemicals from Biomass: Volume I--Results of Screening for Potential Candidates from Sugars and Synthesis Gas Top Value Added Chemicals from Biomass: Volume...
No-carrier-added [1.sup.11 c]putrescine
McPherson, Daniel W. (Baltimore, MD); Fowler, Joanna S. (Bellport, NY); Wolf, Alfred P. (Setauket, NY)
1989-01-01T23:59:59.000Z
The invention relates to a new radiolabeled imaging agent, no-carrier-added [1-.sup.11 C]putrescine, and to the use of this very pure material as a radiotracer with positron emission tomography for imaging brain tumors. The invention further relates to the synthesis of no-carrier-added [1-.sup.11 C]putrescine based on the Michael addition of potassium .sup.11 C-labeled cyanide to acrylonitrile followed by reduction of the .sup.11 C-labeled dinitrile. The new method is rapid and efficient and provides radiotracer with a specific activity greater than 1.4 curies per millimol and in a purity greater than 95%.
Nucleon and flavor form factors in AdS/QCD
Chakrabarti, Dipankar
2013-01-01T23:59:59.000Z
The electromagnetic form factors for the nucleons are related with the GPDs by sum rules. Using the sum rules we calculate the valence GPDs for $u$ and $d$ quarks in a quark model using the lightfront wavefunctions for the nucleons obtained from AdS/QCD. The flavor decompositions of the nucleon form factors are also calculated from the GPDs in this model. We show that the nucleon form factors and their flavor decompositions calculated in AdS/QCD are in agreement with experimental data.
Non-extended phase space thermodynamics of Lovelock AdS black holes in grand canonical ensemble
Jie-Xiong Mo; Wen-Biao Liu
2015-03-06T23:59:59.000Z
Recently, extended phase space thermodynamics of Lovelock AdS black holes has been of great interest. To provide insight from a different perspective and gain a unified phase transition picture, non-extended phase space thermodynamics of $(n+1)$-dimensional charged topological Lovelock AdS black holes is investigated detailedly in the grand canonical ensemble. Specifically, the specific heat at constant electric potential is calculated and phase transition in the grand canonical ensemble is discussed. To probe the impact of the various parameters, we utilize the control variate method and solve the phase transition condition equation numerically for the case $k=1,-1$. There are two critical points for the case $n=6,k=1$ while there is only one for other cases. For $k=0$, there exists no phase transition point. To figure out the nature of phase transition in the grand canonical ensemble, we carry out an analytic check of the analog form of Ehrenfest equations proposed by Banerjee et al. It is shown that Lovelock AdS black holes in the grand canonical ensemble undergo a second order phase transition. To examine the phase structure in the grand canonical ensemble, we utilize the thermodynamic geometry method and calculate both the Weinhold metric and Ruppeiner metric. It is shown that for both analytic and graphical results that the divergence structure of the Ruppeiner scalar curvature coincides with that of the specific heat. Our research provides one more example that Ruppeiner metric serves as a wonderful tool to probe the phase structures of black holes.
A $\\mathcal{N}=2$ Supersymmetric $AdS_4$ Solution in M-theory with Purely Magnetic Flux
Yolanda Lozano; Niall T. Macpherson; Jesús Montero
2015-07-10T23:59:59.000Z
We find a new $\\mathcal{N}=2$ $AdS_4$ solution in M-theory supported by purely magnetic flux via a sequence of abelian and non-abelian T-dualities. This provides the second known example in this class besides the uplift of the Pernici and Sezgin solution to 7d gauged supergravity constructed in the eighties. We compute the free energy of the solution, and show that it scales as $N^{3/2}$. It is intriguing that even though the natural holographic interpretation is in terms of M5-branes wrapped on a special Lagrangian 3-cycle, this solution does not exhibit the expected $N^3$ behavior.
$P-V$ criticality of AdS black hole in the Einstein-Maxwell-power-Yang-Mills gravity
Ming Zhang; Zhan-Ying Yang; De-Cheng Zou; Wei Xu; Rui-Hong Yue
2014-12-03T23:59:59.000Z
We study the $P-V$ critical behaivor of N-dimensional AdS black holes in Einstein-Maxwell-power-Yang-Mills gravity. Our results show the existence of the Van der Waals like small-large black hole phase transitions when taking some special values of charges of the Maxwell and Yang-Mills (YM) fields. Further to calculate the critical exponents of the black holes at the critical point, we find that they are the same as those in the Van der Waals liquid-gas system.
Bound States of the q-Deformed AdS5 x S5 Superstring S-matrix
Ben Hoare; Timothy J. Hollowood; J. Luis Miramontes
2012-05-31T23:59:59.000Z
The investigation of the q deformation of the S-matrix for excitations on the string world sheet in AdS5 x S5 is continued. We argue that due to the lack of Lorentz invariance the situation is more subtle than in a relativistic theory in that the nature of bound states depends on their momentum. At low enough momentum |p|1. This subtlety fixes a problem involving the consistency of crossing symmetry with the relativistic limit found in earlier work. With mirror kinematics, obtained after a double Wick rotation, the bound state structure is simpler and there are no marginally unstable bound states.
Bound States of the q-Deformed AdS5 x S5 Superstring S-matrix
Hoare, Ben; Miramontes, J Luis
2012-01-01T23:59:59.000Z
The investigation of the q deformation of the S-matrix for excitations on the string world sheet in AdS5 x S5 is continued. We argue that due to the lack of Lorentz invariance the situation is more subtle than in a relativistic theory in that the nature of bound states depends on their momentum. At low enough momentum |p|1. This subtlety fixes a problem involving the consistency of crossing symmetry with the relativistic limit found in earlier work. With mirror kinematics, obtained after a double Wick rotation, the bound state structure is simpler and there are no marginally unstable bound states.
Adding Parallel I/O to PARA-BMU
Johnson, Nick; Bethune, Iain
2012-10-01T23:59:59.000Z
VOX-FE is a voxel-based bone modelling suite. The solver part of the suite - PARA-BMU - currently uses only serial I/O routines which lead to poor scalability. We enhance the code by adding parallel I/O routines based on the netCDF and HDF5...
Drug Information Chart Notes Drug ad (intrinsic bias)
Fletcher, Robin
Drug Information Chart Notes Drug ad (intrinsic bias) Trade name Different for each company Dosage Same or different? A drug in a different dosage can be used for a different therapy. Precautions Check for pregnancy A complete book on drugs in pregnancy and lactation in bibliography. (unbiased
Building Intelligent Environments By Adding Smart Artifacts to Spaces
Loke, Seng W. - Loke, Seng W.
Building Intelligent Environments By Adding Smart Artifacts to Spaces: a Peer-to-Peer Architecture collections of smart artifacts, each artifact with an embedded processor, networking and sensing capabilities. The interactive capabilities of the environment are due to the collective working of the smart artifacts
Raman Lidar Profiles–Temperature (RLPROFTEMP) Value-Added Product
Newsom, RK; Sivaraman, C; McFarlane, SA
2012-10-31T23:59:59.000Z
The purpose of this document is to describe the Raman Lidar Profiles–Temperature (RLPROFTEMP) value-added product (VAP) and the procedures used to derive atmospheric temperature profiles from the raw RL measurements. Sections 2 and 4 describe the input and output variables, respectively. Section 3 discusses the theory behind the measurement and the details of the algorithm, including calibration and overlap correction.
AdSplit: Separating smartphone advertising from applications Shashi Shekhar
Wallach, Dan
AdSplit: Separating smartphone advertising from applications Shashi Shekhar shashi applications today rely on third-party advertising services, which provide libraries that are linked into the hosting application. This situ- ation is undesirable for both the application author and the advertiser
Shipboard lighting: A.D. 400-1900
Quinn, Kendra LeeAnne
1999-01-01T23:59:59.000Z
From A.D. 400-1900, illumination was gained by simply lighting a fibrous wick soaked in a burnable fuel. Yet, this basic technology played an integral part in the every day functioning of ships. Vessels which either sailed through the night...
Institute for Software Technology Ad anced RoboticsAdvanced Robotics
Institute for Software Technology Ad anced RoboticsAdvanced Robotics Human Robot Interaction Gerald Steinbauer Institute for Software Technology Gerald Steinbauer 1 Advanced Robotics Â Human Robot Interaction #12;Institute for Software Technology Motivation lik t h b t th tÂ· we like to have robots
Wood Products Marketing And Value-Added Opportunities
Wood Products Marketing And Value-Added Opportunities In Latin America: A Focus on Brazil Richard Vlosky, Ph.D. Professor-Forest Products Marketing Interim Director-Louisiana Forest Products Laboratory Industry Strategic Services & Publisher: WOOD Markets Monthly newsletter WOOD Markets 2002 - The Solid Wood
Wood Products Marketing And Value-Added Opportunities
Wood Products Marketing And Value-Added Opportunities Richard Vlosky, Ph.D. Professor-Forest Products Marketing Interim Director-Louisiana Forest Products Laboratory School of Renewable Natural, R.E. Taylor & Associates Ltd. Forest Industry Strategic Services & Publisher: WOOD Markets Monthly
Operational Risk Management: Added Value of Advanced Methodologies
Maume-Deschamps, VÃ©ronique
Operational Risk Management: Added Value of Advanced Methodologies Paris, September 2013 Bertrand HASSANI Head of Major Risks Management & Scenario Analysis Santander UK Disclaimer: The opinions, ideas Measurement Key statements 1. Risk management moto: Si Vis Pacem Para Belum 1. Awareness 2. Prevention 3
Fusion for AdS/CFT boundary S-matrices
Rafael I. Nepomechie; Rodrigo A. Pimenta
2015-09-14T23:59:59.000Z
We propose a fusion formula for AdS/CFT worldsheet boundary S-matrices. We show that, starting from the fundamental Y=0 boundary S-matrix, this formula correctly reproduces the two-particle bound-state boundary S-matrices.
Adding Semantics to Data-Driven Paraphrasing Ellie Pavlick1
Plotkin, Joshua B.
minimal/significant husband/marry to found/party clean/cleanse tower/building boy/young girl oil/oil priceAdding Semantics to Data-Driven Paraphrasing Ellie Pavlick1 Johan Bos2 Malvina Nissim2 Charley (Figure 1). In contrast, data-driving paraphrasing typically sidesteps de- veloping a clear definition
Real-Time Bid Optimization for Group-Buying Ads
Balakrishnan, Raju
2012-01-01T23:59:59.000Z
Group-buying ads seeking a minimum number of customers before the deal expiry are increasingly used by the daily-deal providers. Unlike the traditional web ads, the advertiser's profits for group-buying ads depends on the time to expiry and additional customers needed to satisfy the minimum group size. Since both these quantities are time-dependent, optimal bid amounts to maximize profits change with every impression. Consequently, traditional static bidding strategies are far from optimal. Instead, bid values need to be optimized in real-time to maximize expected bidder profits. This online optimization of deal profits is made possible by the advent of ad exchanges offering real-time (spot) bidding. To this end, we propose a real-time bidding strategy for group-buying deals based on the online optimization of bid values. We derive the expected bidder profit of deals as a function of the bid amounts, and dynamically vary bids to maximize profits. Further, to satisfy time constraints of the online bidding, we ...
Topping Turbines: Adding New Life to Older Plants
Cadrecha, M.
1984-01-01T23:59:59.000Z
the Sixth Annual Industrial Energy Technology Conference Volume II, Houston, TX, April 15-18, 1984 TOPPING TURBINES: ADDING NEW LIFE TO OLDER PLANTS Manuel Cadrecha, Ebasco Services, Inc., Atlanta. Georgia ARSTRlICT Ane~istingpower plant can be repowered...
A Study to Determine the Energy Impact of Adding Polarshield to Air Conditioning Systems
Cromer, C. J.
2001-01-01T23:59:59.000Z
. COA was added, one on a 5 ton older unit where 2.5 oz. COA was added, and a third on the same 5 ton unit where an additional 2.5 oz. COA was added to total 5.0 oz added to the system. The heat and humidity loads were carefully held constant...
1 Introduzione 5 2 La Fisica dei Quark Pesanti ad HERA 7
calorimetro ad uranio--scintillatore (CAL) . . . . . . . . . . . . . . . 35 4.3.1 Risoluzione energetica e
Non-extended phase space thermodynamics of Lovelock AdS black holes in grand canonical ensemble
Mo, Jie-Xiong
2015-01-01T23:59:59.000Z
Recently, extended phase space thermodynamics of Lovelock AdS black holes has been of great interest. To provide insight from a different perspective and gain a unified phase transition picture, non-extended phase space thermodynamics of $(n+1)$-dimensional charged topological Lovelock AdS black holes is investigated detailedly in the grand canonical ensemble. Specifically, the specific heat at constant electric potential is calculated and phase transition in the grand canonical ensemble is discussed. To probe the impact of the various parameters, we utilize the control variate method and solve the phase transition condition equation numerically for the case $k=1,-1$. There are two critical points for the case $n=6,k=1$ while there is only one for other cases. For $k=0$, there exists no phase transition point. To figure out the nature of phase transition in the grand canonical ensemble, we carry out an analytic check of the analog form of Ehrenfest equations proposed by Banerjee et al. It is shown that Lovelo...
Wireless Network Esercitazioni
Lo Cigno, Renato Antonio
Wireless Network Esercitazioni Alessandro Villani avillani@science.unitn.it #12;Reti Ad Hoc #12;Reti Ad Hoc (IBSS) Tipicamente le wireless LANs che conosciamo utilizzano la modalità "infrastrutturata Hoc (IBSS) La modalità Ad Hoc permette agli utenti di costituire una wireless LAN autonomamente
Some Recent Progress in AdS/CFT
John H. Schwarz
2010-06-08T23:59:59.000Z
Much of modern string theory research concerns AdS/CFT duality, or more generally, gauge/gravity duality. The main subjects are a) Testing and understanding such dualities by exploring how they work for systems with a lot of supersymmetry b) Constructing and exploring approximate string theory duals of QCD c) Applying gauge/gravity duality to other areas of physics such as condensed matter and nuclear physics. I will briefly discuss the first topic.
Organic Aerosol Component (OACOMP) Value-Added Product Report
Fast, J; Zhang, Q; Tilp, A; Shippert, T; Parworth, C; Mei, F
2013-08-23T23:59:59.000Z
Significantly improved returns in their aerosol chemistry data can be achieved via the development of a value-added product (VAP) of deriving OA components, called Organic Aerosol Components (OACOMP). OACOMP is primarily based on multivariate analysis of the measured organic mass spectral matrix. The key outputs of OACOMP are the concentration time series and the mass spectra of OA factors that are associated with distinct sources, formation and evolution processes, and physicochemical properties.
Shuchi Energy Ad Promotions P Ltd | Open Energy Information
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onsource History View New PagessourceRavenand Some Initial ResultsShelbyShorewood Hills,Shuchi Energy Ad Promotions P Ltd
ARM Value-Added Cloud Products: Description and Status
Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:5 TablesExports(Journal Article)41cloth Documentation Data ManagementProductswsicloudwsicloudsummary Documentation Data Management8Data6454063Value-Added
A Natural Language for AdS/CFT Correlators
Fitzpatrick, A.Liam; /Boston U.; Kaplan, Jared; /SLAC; Penedones, Joao; /Perimeter Inst. Theor. Phys.; Raju, Suvrat; /Harish-Chandra Res. Inst.; van Rees, Balt C.; /YITP, Stony Brook
2012-02-14T23:59:59.000Z
We provide dramatic evidence that 'Mellin space' is the natural home for correlation functions in CFTs with weakly coupled bulk duals. In Mellin space, CFT correlators have poles corresponding to an OPE decomposition into 'left' and 'right' sub-correlators, in direct analogy with the factorization channels of scattering amplitudes. In the regime where these correlators can be computed by tree level Witten diagrams in AdS, we derive an explicit formula for the residues of Mellin amplitudes at the corresponding factorization poles, and we use the conformal Casimir to show that these amplitudes obey algebraic finite difference equations. By analyzing the recursive structure of our factorization formula we obtain simple diagrammatic rules for the construction of Mellin amplitudes corresponding to tree-level Witten diagrams in any bulk scalar theory. We prove the diagrammatic rules using our finite difference equations. Finally, we show that our factorization formula and our diagrammatic rules morph into the flat space S-Matrix of the bulk theory, reproducing the usual Feynman rules, when we take the flat space limit of AdS/CFT. Throughout we emphasize a deep analogy with the properties of flat space scattering amplitudes in momentum space, which suggests that the Mellin amplitude may provide a holographic definition of the flat space S-Matrix.
Derivation of the action and symmetries of the q-deformed AdS_5 x S^5 superstring
Francois Delduc; Marc Magro; Benoit Vicedo
2014-09-01T23:59:59.000Z
We recently proposed an integrable q-deformation of the AdS_5 x S^5 superstring action. Here we give details on the hamiltonian origin and construction of this deformation. The procedure is a generalization of the one previously developed for deforming principal chiral and symmetric space sigma-models. We also show that the original psu(2,2|4) symmetry is replaced in the deformed theory by a classical analog of the quantum group U_q(psu(2,2|4)) with q real. The relation between q and the deformation parameter entering the action is given. The framework used to derive the deformation also enables to prove that at the hamiltonian level, the "maximal deformation" limit corresponds to an undeformed semi-symmetric space sigma-model with bosonic part dS_5 x H^5. Finally, we discuss the various freedoms in the construction.
On the Central Charge of Spacetime Current Algebras and Correlators in String Theory on AdS3
Porrati, Massimo
2015-01-01T23:59:59.000Z
Spacetime Virasoro and affine Lie algebras for strings propagating in AdS3 are known to all orders in $\\alpha'$. The central extension of such algebras is a string vertex, whose expectation value can depend on the number of long strings present in the background but should be otherwise state-independent. In hep-th/0106004, on the other hand, a state-dependent expectation value was found. Another puzzling feature of the theory is lack of cluster decomposition property in certain connected correlators. This note shows that both problems can be removed by defining the free energy of the spacetime boundary conformal field theory as the Legendre transform of the formula proposed in the literature. This corresponds to pass from a canonical ensemble, where the number of fundamental strings that create the background can fluctuate, to a microcanonical one, where it is fixed.
A. Belhaj; M. Chabab; H. EL Moumni; K. Masmar; M. B. Sedra
2015-07-01T23:59:59.000Z
Interpreting the cosmological constant as a thermodynamic pressure and its conjugate quantity as a thermodynamic volume, we reconsider the investigation of P-V critical behaviors of (1+n)-dimensional topological AdS black holes in Lovelock-Born-Infeld gravity. In particular, we give an explicit expression of the universal number \\chi=\\frac{P_c v_c}{T_c} in terms of the space dimension $n$. Then, we examine the phase transitions at the critical points of such topological black holes for 6 \\leq n \\leq 11 as required by the physical condition of the thermodynamical quantities. More precisely, the Ehrenfest equations have been checked revealing that the black hole system undergoes a second phase transition at the critical points.
Non-perturbative Effects in AdS5 * S5 String Theory and d=4 SUSY Yang-Mills
Tom Banks; Michael B. Green
1998-06-10T23:59:59.000Z
We show that five-dimensional anti de-Sitter space remains a solution to low-energy type IIB supergravity when the leading higher-derivative corrections to the classical supergravity (which are non-perturbative in the string coupling) are included. Furthermore, at this order in the low energy expansion of the IIB theory the graviton two-point and three-point functions in $AdS_5 \\times S^5$ are shown not to be renormalized and a precise expression is obtained for the four-graviton and related S-matrix elements. By invoking Maldacena's conjectured connection between IIB superstring theory and supersymmetric Yang-Mills theory corresponding statements are obtained concerning correlation functions of the energy-momentum tensor and related operators in the large-N Yang-Mills theory. This leads to interesting non-perturbative statements and insights into the r\\^ole of instantons in the gauge theory.
Bound States, Yangian Symmetry and Classical r-matrix for the AdS5 x S5 Superstring
M de Leeuw
2009-10-06T23:59:59.000Z
We show that the recently found S-matrices describing the scattering of two-particle bound states of the light-cone string sigma model on AdS5 x S5 are compatible with Yangian symmetry. In case the invariance with respect to the centrally extended su(2|2) algebra is not sufficient to fully specify the scattering matrix, the requirement of Yangian symmetry provides an alternative to the Yang-Baxter equation and leads to a complete, up to an overall phase, determination of the S-matrix. We then compare the semi-classical limit of the bound state S-matrices with the universal classical r-matrix by Beisert and Spill evaluated in the corresponding bound state representations and find perfect agreement.
Ad Lucem: Modeling of Market Transformation Pathways Workshop Agenda |
Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankShale_Gas.pdfService on the TargetFY12 DOE -NAT IONA L S47.1 (June 2004) 1June|AD LUCEM ... TOWARD
Addendum Added to Innovative Demonstration of Geothermal Energy Production
Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankShale_Gas.pdfService on the TargetFY12 DOE -NAT IONA L S47.1 (June 2004) 1June|AD LUCEM
Some engineering properties of heavy concrete added silica fume
Akka?, Ay?e [Suleyman Demirel University Teknoloji Fakültesi, Isparta (Turkey); Ba?yi?it, Celalettin; Esen, Serap [Suleyman Demirel University, Mühendislik Fakültesi, Isparta (Turkey)
2013-12-16T23:59:59.000Z
Many different types of building materials have been used in building construction for years. Heavy concretes can be used as a building material for critical building as it can contain a mixture of many heavy elements. The barite itself for radiation shielding can be used and also in concrete to produce the workable concrete with a maximum density and adequate structural strength. In this study, some engineering properties like compressive strength, elasticity modules and flexure strength of heavy concretes’ added Silica fume have been investigated.
AD Hydro Power Ltd ADHPL | Open Energy Information
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousPlasmaP a g eWorks - As Prepared forChoiceNEG Micon AVestasInformation 2-MOptions in theAD Hydro Power Ltd
Value Added Energy Information Systems VAEIS | Open Energy Information
AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousPlasmaP a g eWorks -09-0018-CXNuonYuchengRichlands,projectUrat Rear BannerUtilityVANEValue Added Energy
An Experiment with Digital Lighting in Adding Machine: A Musical
Esfandiary, Rana; Reaney, Mark
2014-01-01T23:59:59.000Z
of house position. Virtual scenic elements were Figure 1. Mr. Zero at the office. Note the animation clip of swirling numbers visible on the stage floor. by Rana Esfandiary and Mark Reaney an experiment with digital l ighting in Adding Machine: A... in this production was two pair of computers and digital projectors, one mounted house left, the other house right, from which lighting effects could be gener- ated in real time using a series of recorded video sequences and real-time video manipulation software...
Generalized Parton Distributions for the Proton in AdS/QCD
Chakrabarti, Dipankar
2013-01-01T23:59:59.000Z
We present a study of proton GPDs in both momentum and position spaces using proton wavefunction obtained from AdS/ QCD. Here we consider the soft wall model. The results are compared with a phenomenological model of proton GPDs.
Comparison of value-added models for school ranking and classification: a Monte Carlo study
Wang, Zhongmiao
2009-05-15T23:59:59.000Z
A “Value-Added” definition of school effectiveness calls for the evaluation of schools based on the unique contribution of schools to individual student academic growth. The estimates of value-added school effectiveness are usually used for ranking...
Digital ad morphing : using behavioral analysis to increase response rates to online advertisements
Link, Cordelia S
2011-01-01T23:59:59.000Z
This paper details the implementation and testing of a digital ad morphing system, a system which determines user cognitive style based on interaction with a website and serves ads designed to complement that cognitive ...
Jenkins, Marisa Rachael
2009-01-01T23:59:59.000Z
Automatic Dependent Surveillance-Broadcast (ADS-B) is considered to be a crucial part of the next generation of air transportation systems worldwide. Developing mature ADS-B applications which provide stakeholders with ...
Matching the Hagedorn temperature in AdS/CFT correspondence
Harmark, Troels; Orselli, Marta [Niels Bohr Institute and Nordita Blegdamsvej 17, 2100 Copenhagen O (Denmark)
2006-12-15T23:59:59.000Z
We match the Hagedorn/deconfinement temperature of planar N=4 super Yang-Mills (SYM) on RxS{sup 3} to the Hagedorn temperature of string theory on AdS{sub 5}xS{sup 5}. The match is done in a near-critical region where both gauge theory and string theory are weakly coupled. The near-critical region is near a point with zero temperature and critical chemical potential. On the gauge-theory side we are taking a decoupling limit found in Ref. 7 in which the physics of planar N=4 SYM is given exactly by the ferromagnetic XXX{sub 1/2} Heisenberg spin chain. We find moreover a general relation between the Hagedorn/deconfinement temperature and the thermodynamics of the Heisenberg spin chain and we use this to compute it in two distinct regimes. On the string-theory side, we identify the dual limit for which the string tension and string coupling go to zero. This limit is taken of string theory on a maximally supersymmetric pp-wave background with a flat direction, obtained from a Penrose limit of AdS{sub 5}xS{sup 5}. We compute the Hagedorn temperature of the string theory and find agreement with the Hagedorn/deconfinement temperature computed on the gauge-theory side.
Influences of Government Interventions on Increasing Value-Added Wood Product Exports from Ghana
Influences of Government Interventions on Increasing Value-Added Wood Product Exports from Ghana exporting raw materials such lumber to exporting processed or value-added wood products. In the mid-1990s on increasing value-added exports. These actions are: 1) the imposition of a levy on air-dried lumber exports, 2
q-Deformation of the AdS5 x S5 Superstring S-matrix and its Relativistic Limit
Hoare, Ben; Miramontes, J Luis
2011-01-01T23:59:59.000Z
A set of four factorizable non-relativistic S-matrices for a multiplet of fundamental particles are defined based on the R-matrix of the quantum group deformation of the centrally extended superalgebra su(2|2). The S-matrices are a function of two independent couplings g and q=exp(i\\pi/k). The main result is to find the scalar factor, or dressing phase, which ensures that the unitarity and crossing equations are satisfied. For generic (g,k), the S-matrices are branched functions on a product of rapidity tori. In the limit k->infinity, one of them is identified with the S-matrix describing the magnon excitations on the string world sheet in AdS5 x S5, while another is the mirror S-matrix that is needed for the TBA. In the g->infinity limit, the rapidity torus degenerates, the branch points disappear and the S-matrices become meromorphic functions, as required by relativistic S-matrix theory. However, it is only the mirror S-matrix which satisfies the correct relativistic crossing equation. The mirror S-matrix ...
No-carrier-added (/sup 18/F)-N-methylspiroperidol
Shiue, C.Y.; Fowler, J.S.; Wolf, A.P.
1985-10-04T23:59:59.000Z
The present invention is directed to the synthesis of a radioligand, labeled with a positron emitting radionuclide which is suitable for dynamic studies in humans using positron emission transaxial tomography. No-carrier-added (NCA) (/sup 18/F)-N-methylspiroperiodl is prepared from four different sustrates: p-nitrobenzonitrile, cyclopropyl p-nitrophenyl ketone, p-cyclopropanoyl-N,N,N-trimethylanilinium iodide and p-cyclopropanoyl-N,N,N-trimethylanilinium perchlorate. The process for the production of NCA (/sup 18/F)-N-methylspiroperidol is a nucleophilic aromatic substitution reaction. Furthermore, the compound of this invention is shown to be effective as a new drug of choice for in vivo examination of dopamine binding sites in a human brain. In particular, this drug is primarily useful in the noninvasive technique of positron emission transaxial tomography (PETT).