317 research outputs found

    Improving probabilistic flooding using topological indexes

    Get PDF
    Unstructured networks are characterized by constrained resources and require protocols that efficiently utilize bandwidth and battery power. Probabilistic flooding, allows nodes to rebroadcast RREQ packets with some probability p, thus reducing the overhead. The key issue in of this algorithm consists of determining p. The techniques proposed so far either use a fixed p determined by a priori considerations, or a p variable from one node to the other - set, for instance based on node degree or distance between source and destination - or even a dynamic p based on the number of redundant messages received by the nodes. In order to make the computation of forwarding probability p works optimally regardless of changing of topology, we propose to set p based on the node role within the message dissemination process. Specifically, we propose to identify such role based on the nodes' clustering coefficients (the lower the coefficient, the higher the forwarding probability). The performance of the algorithm is evaluated in terms of routing overhead, packet delivery ratio, and end-to-end delay. The algorithm pays a price in terms of computation time for discovering the clustering coefficient, however reduces unnecessary and redundant control messages and achieves a significant improvements in both dense and sparse networks in terms of packet delivery ratio. We compare by simulation the performance of this algorithm with the one of the most representative competing algorithms

    Toward IoT-Friendly Learning Models

    Get PDF
    In IoT environments, data are collected by many distinct devices, at the periphery, so that their feature-sets can be naturally endowed with a faceted structure. In this work, we argue that the IoT requires specialized ML models, able to exploit this faceted structure in the learning strategy. We demonstrate the application of this principle, by a multiple kernel learning approach, based on the exploration of the partition lattice driven by the natural partitioning of the feature set. Furthermore, we consider that the whole data management, acquisition, pre-processing and analytics pipeline results from the composition of processes pursuing different and non-perfectly aligned goals (most often, enacted by distinct agents with different constraints, requirements competencies and with non-aligned interests). We propose the adoption of an adversarial modeling paradigm across the overall pipeline. We argue that knowledge of the composite nature of the learning process, as well as of the adversarial character of the relationship among phases, can help in developing heuristics for improving the learning algorithms efficiency and accuracy. We develop our argument with reference to few exemplary use cases

    Inspection games for selfish network environments

    Get PDF
    Current distributed information system consider only typical fault-tolerance techniques for re-liability issues. Selfish peers, which deviate from the collaborative protocol to increase personal benefit, may also harmfully affect the goals of networked architectures. Securing the collaborative protocol would be an option, however, this may not be always possible or wanted. Then, a post-hoc assessment, deployed by the system designer, could monitor the correct behaviour of the participants without affecting the actual system\u2019s functioning. Due to limited resources, a complete monitoring is not possible: typically monitoring is done by sampling by sampling so that misbehaviour in some case can go undetected. At the same time, a selfish peer\u2019s decision to violate also depends also on the monitoring rate of the inspecting parties. This forms an interdependent interaction landscape, which corresponds to a class of games known as Inspection Games. In this paper, we discuss the practicability of Inspection Games for networked architectures for system analysis and design. To this end, develop generalized Inspection Game versions up to m inspectors and n inspectees, starting from a simple two-player game; we further provide solutions (i.e. Nash equilibria) for all games. Afterwards, these games and solutions are adapted towards an application to networked architectures. This is done by extending them to the possibility of false negatives (the performed inspection on a player\u2019s behaviour does not detect a deviation from the protocol which has actually occurred, due to the intrinsic failability of the inspection technique)

    Photodisintegration of the triton with realistic potentials

    Get PDF
    The process γ+t→n+d\gamma + t \to n + d is treated by means of three-body integral equations employing in their kernel the W-Matrix representation of the subsystem amplitudes. As compared to the plane wave (Born) approximation the full solution of the integral equations, which takes into account the final state interaction, shows at low energies a 24% enhancement. The calculations are based on the semirealistic Malfliet-Tjon and the realistic Paris and Bonn B potentials. For comparison with earlier calculations we also present results for the Yamaguchi potential. In the low-energy region a remarkable potential dependence is observed, which vanishes at higher energies.Comment: 16 pages REVTeX, 8 postscript figures included, uses epsfig.st

    Tag relatedness in image folksonomies

    Get PDF
    Folksonomies - networks of users, resources, and tags allow users to easily retrieve, organize and browse web contents. However, their advantages are still limited mainly due to the noisiness of user provided tags. To overcome this issue, we propose an approach for characterizing related tags in folksonomies: we use tag co-occurrence statistics and Laplacian score based feature selection in order to create empirical co-occurrence probability distribution for each tag; then we identify related tags on the basis of the dissimilarity between their distributions. For this purpose, we introduce variant of the Jensen-Shannon Divergence, which is more robust to statistical noise. We experimentally evaluate our approach using WordNet and compare it to a common tag-relatedness approach based on the cosine similarity. The results show the effectiveness of our approach and its advantage over the competing method

    Preparation and properties of copper-oil-based nanofluids

    Get PDF
    In this study, the lipophilic Cu nanoparticles were synthesized by surface modification method to improve their dispersion stability in hydrophobic organic media. The oil-based nanofluids were prepared with the lipophilic Cu nanoparticles. The transport properties, viscosity, and thermal conductivity of the nanofluids have been measured. The viscosities and thermal conductivities of the nanofluids with the surface-modified nanoparticles have higher values than the base fluids do. The composition has more significant effects on the thermal conductivity than on the viscosity. It is valuable to prepare an appropriate oil-based nanofluid for enhancing the heat-transfer capacity of a hydrophobic system. The effects of adding Cu nanoparticles on the thermal oxidation stability of the fluids were investigated by measuring the hydroperoxide concentration in the Cu/kerosene nanofluids. The hydroperoxide concentrations are observed to be clearly lower in the Cu nanofluids than in their base fluids. Appropriate amounts of metal nanoparticles added in a hydrocarbon fuel can enhance the thermal oxidation stability

    Acceptance of two liquid vitamin D₃ formulations among mothers with newborn infants: a randomized, single-blind trial

    Get PDF
    In Switzerland, children are prescribed 7.5-12.5 ÎŒg per day of vitamin D(3) dissolved in alcohol, but many families do not adhere to the recommendation. The aim of the trial was to compare the acceptance of vitamin D(3) dissolved in alcohol or in medium-chain triglycerides among mothers of Swiss newborn infants. The acceptance was tested in 42 healthy newborn infants (20 girls and 22 boys) aged between 2 and 7 days. Their neonatal body weight ranged between 2.225 and 4.150 kg, and the gestational age between 36 1/7 and 41 3/7 weeks. The blinded mothers rated the facial reaction of their children by pointing on a facial hedonic scale. Thirty eight of the 41 mothers, who brought the comparison to completion, assigned a better score to the oily preparation with no difference in the remaining three cases (P < 0.0001). The acceptance for the oily preparation was significantly better both among mothers whose babies were initially presented the alcoholic preparation and among mothers whose babies were initially presented the oily preparation. Furthermore, the acceptance for the oily preparation was better irrespective of gender of the infant or parity of the mother. In conclusion, from the perspective of mothers, Swiss newborn infants prefer the taste of the oily vitamin D(3) preparation over the alcoholic preparation

    A High Statistics Measurement of the Lambdac+ Lifetime

    Full text link
    A high statistics measurement of the Lambdac+ lifetime from the Fermilab fixed-target FOCUS photoproduction experiment is presented. We describe the analysis technique with particular attention to the determination of the systematic uncertainty. The measured value of 204.6 +/- 3.4 (stat.) +/- 2.5 (syst.) fs from 8034 +/- 122 Lambdac -> pKpi decays represents a significant improvement over the present world average.Comment: Submitted to Physical Review Letter

    Search for CP Violation in the decays D+ -> K_S pi+ and D+ -> K_S K+

    Full text link
    A high statistics sample of photo-produced charm from the FOCUS(E831) experiment at Fermilab has been used to search for direct CP violation in the decays D+->K_S pi+ and D+ -> K_S K+. We have measured the following asymmetry parameters relative to D+->K-pi+pi+: A_CP(K_S pi+) = (-1.6 +/- 1.5 +/- 0.9)%, A_CP(K_S K+) = (+6.9 +/- 6.0 +/- 1.5)% and A_CP(K_S K+) = (+7.1 +/- 6.1 +/- 1.2)% relative to D+->K_S pi+. The first errors quoted are statistical and the second are systematic. We also measure the relative branching ratios: \Gamma(D+->\bar{K0}pi+)/\Gamma(D+->K-pi+pi+) = (30.60 +/- 0.46 +/- 0.32)%, \Gamma(D+->\bar{K0}K+)/\Gamma(D+->K-pi+pi+) = (6.04 +/- 0.35 +/- 0.30)% and \Gamma(D+->\bar{K0}K+)/\Gamma(D+->\bar{K0}pi+) = (19.96 +/- 1.19 +/- 0.96)%.Comment: 4 pages, 3 figure

    Search for CP violation in D0 and D+ decays

    Full text link
    A high statistics sample of photoproduced charm particles from the FOCUS (E831) experiment at Fermilab has been used to search for CP violation in the Cabibbo suppressed decay modes D+ to K-K+pi+, D0 to K-K+ and D0 to pi-pi+. We have measured the following CP asymmetry parameters: A_CP(K-K+pi+) = +0.006 +/- 0.011 +/- 0.005, A_CP(K-K+) = -0.001 +/- 0.022 +/- 0.015 and A_CP(pi-pi+) = +0.048 +/- 0.039 +/- 0.025 where the first error is statistical and the second error is systematic. These asymmetries are consistent with zero with smaller errors than previous measurements.Comment: 12 pages, 4 figure
    • 

    corecore