804,614 research outputs found
SDL based validation of a node monitoring protocol
Mobile ad hoc network is a wireless, self-configured, infrastructureless
network of mobile nodes. The nodes are highly mobile, which makes the
application running on them face network related problems like node failure,
link failure, network level disconnection, scarcity of resources, buffer
degradation, and intermittent disconnection etc. Node failure and Network fault
are need to be monitored continuously by supervising the network status. Node
monitoring protocol is crucial, so it is required to test the protocol
exhaustively to verify and validate the functionality and accuracy of the
designed protocol. This paper presents a validation model for Node Monitoring
Protocol using Specification and Description Llanguage (SDL) using both Static
Agent (SA) and Mobile Agent (MA). We have verified properties of the Node
Monitoring Protocol (NMP) based on the global states with no exits, deadlock
states or proper termination states using reachability graph. Message Sequence
Chart (MSC) gives an intuitive understanding of the described system behavior
with varying node density and complex behavior etc.Comment: 16 pages, 24 figures, International Conference of Networks,
Communications, Wireless and Mobile 201
Exploration Atmosphere & EVA Prebreathe Protocol Validation in the 20-Foot Chamber
The 2020 exploration atmosphere and EVA prebreathe protocol validation will be the first test in elevated oxygen since the Skylab Medical Experiment Altitude Test (SMEAT)
Using Colored Stochastic Petri Net (CS-PN) software for protocol specification, validation, and evaluation
The specification, verification, validation, and evaluation, which make up the different steps of the CS-PN software are outlined. The colored stochastic Petri net software is applied to a Wound/Wait protocol decomposable into two principal modules: request or couple (transaction, granule) treatment module and wound treatment module. Each module is specified, verified, validated, and then evaluated separately, to deduce a verification, validation and evaluation of the complete protocol. The colored stochastic Petri nets tool is shown to be a natural extension of the stochastic tool, adapted to distributed systems and protocols, because the color conveniently takes into account the numerous sites, transactions, granules and messages
An on-line solid phase extraction procedure for the routine quantification of urinary methylmalonic acid by liquid chromatography-tandem mass spectrometry
Background: The goal of this study was to develop and to validate an improved isotope-dilution-liquid chromatography-tandem mass spectrometry (LC-MS/MS) method for the quantification of methylmalonic acid (MMA) in urine. Methods: A previously described sample preparation protocol requires two solvent extraction steps, including evaporation. The first extraction is to extract the analyte from the sample, and second occurs following derivatization of the extract. In the method described here, the second evaporation step was substituted by on-line solid phase extraction employing column-switching and a permanent co-polymer based extraction cartridge. A standard validation protocol was applied to investigate the performance of the method. Results: The method was found to be linear in the clinically relevant range of concentrations (6-100 mu mol/L). Total coefficients of variation were below 10% and inaccuracy was <10% for quality control samples at three concentrations. Conclusions: By omitting one evaporation step, the semi-automated method described in this article enables for more convenient work-flow in the quantification of urinary MMA compared to the previous protocol. This is of relevance for MMA measurement in the routine clinical laboratory setting. Validation demonstrated acceptable analytical performance. Clin Chem Lab Med 2010;48:1647-50
Archon Genomics X PRIZE Validation Protocol
This document is a collective assembly of techniques designed to test the quality and accuracy of 100 whole human genome sequences resulting from the $10 Million Archon Genomics X PRIZE (AGXP) competition. The purpose of this article is to enlist constructive criticism from the genomic and genetic community on the outlined approaches. The intent for the final version of this Validation Protocol is to become a useful standard by which to gauge the capabilities of whole genome sequencing technologies that emerge even after 2012
Long-Range Correlations and Memory in the Dynamics of Internet Interdomain Routing
Data transfer is one of the main functions of the Internet. The Internet
consists of a large number of interconnected subnetworks or domains, known as
Autonomous Systems. Due to privacy and other reasons the information about what
route to use to reach devices within other Autonomous Systems is not readily
available to any given Autonomous System. The Border Gateway Protocol is
responsible for discovering and distributing this reachability information to
all Autonomous Systems. Since the topology of the Internet is highly dynamic,
all Autonomous Systems constantly exchange and update this reachability
information in small chunks, known as routing control packets or Border Gateway
Protocol updates. Motivated by scalability and predictability issues with the
dynamics of these updates in the quickly growing Internet, we conduct a
systematic time series analysis of Border Gateway Protocol update rates. We
find that Border Gateway Protocol update time series are extremely volatile,
exhibit long-term correlations and memory effects, similar to seismic time
series, or temperature and stock market price fluctuations. The presented
statistical characterization of Border Gateway Protocol update dynamics could
serve as a ground truth for validation of existing and developing better models
of Internet interdomain routing
Comments and Suggestions for Improvement of the Archon Genomics X PRIZE Validation Protocol
This document is a comment on the X PRIZE validation protocol written by Kedes et al. (2011). We propose several modifications which we think will improve the fairness and transparency of the contest while keeping the cost of the validation process under control
Cognitive Science and Psychology
The protocol algorithm abstracted from a human cognizer's own narrative in the course of doing a cognitive task is an explanation of the corresponding mental activity in Pylyshyn's (1984) virtual machine model of mind. Strong equivalence between an analytic algorithm and the protocol algorithm is an index of validity of the explanatory model. Cognitive psychologists may not find the index strong equivalence useful as a means to ensure that a theory is not circular because (a) research data are also used as foundation data, (b) there is no justification for the relationship between a tobevalidated theory and its criterion of validity, and (c) foundation data, validation criterion and tobevalidated theory are not independent in cognitive science. There is also the difficulty with not knowing what psychological primitives are
- …
