804,614 research outputs found

    SDL based validation of a node monitoring protocol

    Full text link
    Mobile ad hoc network is a wireless, self-configured, infrastructureless network of mobile nodes. The nodes are highly mobile, which makes the application running on them face network related problems like node failure, link failure, network level disconnection, scarcity of resources, buffer degradation, and intermittent disconnection etc. Node failure and Network fault are need to be monitored continuously by supervising the network status. Node monitoring protocol is crucial, so it is required to test the protocol exhaustively to verify and validate the functionality and accuracy of the designed protocol. This paper presents a validation model for Node Monitoring Protocol using Specification and Description Llanguage (SDL) using both Static Agent (SA) and Mobile Agent (MA). We have verified properties of the Node Monitoring Protocol (NMP) based on the global states with no exits, deadlock states or proper termination states using reachability graph. Message Sequence Chart (MSC) gives an intuitive understanding of the described system behavior with varying node density and complex behavior etc.Comment: 16 pages, 24 figures, International Conference of Networks, Communications, Wireless and Mobile 201

    Exploration Atmosphere & EVA Prebreathe Protocol Validation in the 20-Foot Chamber

    Get PDF
    The 2020 exploration atmosphere and EVA prebreathe protocol validation will be the first test in elevated oxygen since the Skylab Medical Experiment Altitude Test (SMEAT)

    Using Colored Stochastic Petri Net (CS-PN) software for protocol specification, validation, and evaluation

    Get PDF
    The specification, verification, validation, and evaluation, which make up the different steps of the CS-PN software are outlined. The colored stochastic Petri net software is applied to a Wound/Wait protocol decomposable into two principal modules: request or couple (transaction, granule) treatment module and wound treatment module. Each module is specified, verified, validated, and then evaluated separately, to deduce a verification, validation and evaluation of the complete protocol. The colored stochastic Petri nets tool is shown to be a natural extension of the stochastic tool, adapted to distributed systems and protocols, because the color conveniently takes into account the numerous sites, transactions, granules and messages

    An on-line solid phase extraction procedure for the routine quantification of urinary methylmalonic acid by liquid chromatography-tandem mass spectrometry

    Get PDF
    Background: The goal of this study was to develop and to validate an improved isotope-dilution-liquid chromatography-tandem mass spectrometry (LC-MS/MS) method for the quantification of methylmalonic acid (MMA) in urine. Methods: A previously described sample preparation protocol requires two solvent extraction steps, including evaporation. The first extraction is to extract the analyte from the sample, and second occurs following derivatization of the extract. In the method described here, the second evaporation step was substituted by on-line solid phase extraction employing column-switching and a permanent co-polymer based extraction cartridge. A standard validation protocol was applied to investigate the performance of the method. Results: The method was found to be linear in the clinically relevant range of concentrations (6-100 mu mol/L). Total coefficients of variation were below 10% and inaccuracy was <10% for quality control samples at three concentrations. Conclusions: By omitting one evaporation step, the semi-automated method described in this article enables for more convenient work-flow in the quantification of urinary MMA compared to the previous protocol. This is of relevance for MMA measurement in the routine clinical laboratory setting. Validation demonstrated acceptable analytical performance. Clin Chem Lab Med 2010;48:1647-50

    Archon Genomics X PRIZE Validation Protocol

    Get PDF
    This document is a collective assembly of techniques designed to test the quality and accuracy of 100 whole human genome sequences resulting from the $10 Million Archon Genomics X PRIZE (AGXP) competition. The purpose of this article is to enlist constructive criticism from the genomic and genetic community on the outlined approaches. The intent for the final version of this Validation Protocol is to become a useful standard by which to gauge the capabilities of whole genome sequencing technologies that emerge even after 2012

    Long-Range Correlations and Memory in the Dynamics of Internet Interdomain Routing

    Full text link
    Data transfer is one of the main functions of the Internet. The Internet consists of a large number of interconnected subnetworks or domains, known as Autonomous Systems. Due to privacy and other reasons the information about what route to use to reach devices within other Autonomous Systems is not readily available to any given Autonomous System. The Border Gateway Protocol is responsible for discovering and distributing this reachability information to all Autonomous Systems. Since the topology of the Internet is highly dynamic, all Autonomous Systems constantly exchange and update this reachability information in small chunks, known as routing control packets or Border Gateway Protocol updates. Motivated by scalability and predictability issues with the dynamics of these updates in the quickly growing Internet, we conduct a systematic time series analysis of Border Gateway Protocol update rates. We find that Border Gateway Protocol update time series are extremely volatile, exhibit long-term correlations and memory effects, similar to seismic time series, or temperature and stock market price fluctuations. The presented statistical characterization of Border Gateway Protocol update dynamics could serve as a ground truth for validation of existing and developing better models of Internet interdomain routing

    Comments and Suggestions for Improvement of the Archon Genomics X PRIZE Validation Protocol

    Get PDF
    This document is a comment on the X PRIZE validation protocol written by Kedes et al. (2011). We propose several modifications which we think will improve the fairness and transparency of the contest while keeping the cost of the validation process under control

    Cognitive Science and Psychology

    Get PDF
    The protocol algorithm abstracted from a human cognizer's own narrative in the course of doing a cognitive task is an explanation of the corresponding mental activity in Pylyshyn's (1984) virtual machine model of mind. Strong equivalence between an analytic algorithm and the protocol algorithm is an index of validity of the explanatory model. Cognitive psychologists may not find the index strong equivalence useful as a means to ensure that a theory is not circular because (a) research data are also used as foundation data, (b) there is no justification for the relationship between a to﷓be﷓validated theory and its criterion of validity, and (c) foundation data, validation criterion and to﷓be﷓validated theory are not independent in cognitive science. There is also the difficulty with not knowing what psychological primitives are
    corecore