1,508 research outputs found
When Things Matter: A Data-Centric View of the Internet of Things
With the recent advances in radio-frequency identification (RFID), low-cost
wireless sensor devices, and Web technologies, the Internet of Things (IoT)
approach has gained momentum in connecting everyday objects to the Internet and
facilitating machine-to-human and machine-to-machine communication with the
physical world. While IoT offers the capability to connect and integrate both
digital and physical entities, enabling a whole new class of applications and
services, several significant challenges need to be addressed before these
applications and services can be fully realized. A fundamental challenge
centers around managing IoT data, typically produced in dynamic and volatile
environments, which is not only extremely large in scale and volume, but also
noisy, and continuous. This article surveys the main techniques and
state-of-the-art research efforts in IoT from data-centric perspectives,
including data stream processing, data storage models, complex event
processing, and searching in IoT. Open research issues for IoT data management
are also discussed
Multiple cyclotron line-forming regions in GX 301-2
We present two observations of the high-mass X-ray binary GX 301-2 with
NuSTAR, taken at different orbital phases and different luminosities. We find
that the continuum is well described by typical phenomenological models, like a
very strongly absorbed NPEX model. However, for a statistically acceptable
description of the hard X-ray spectrum we require two cyclotron resonant
scattering features (CRSF), one at ~35 keV and the other at ~50 keV. Even
though both features strongly overlap, the good resolution and sensitivity of
NuSTAR allows us to disentangle them at >=99.9% significance. This is the first
time that two CRSFs are seen in GX 301-2. We find that the CRSFs are very
likely independently formed, as their energies are not harmonically related
and, if it were a single line, the deviation from a Gaussian shape would be
very large. We compare our results to archival Suzaku data and find that our
model also provides a good fit to those data. We study the behavior of the
continuum as well as the CRSF parameters as function of pulse phase in seven
phase bins. We find that the energy of the 35 keV CRSF varies smoothly as
function of phase, between 30-38 keV. To explain this variation, we apply a
simple model of the accretion column, taking the altitude of the line-forming
region, the velocity of the in-falling material, and the resulting relativistic
effects into account. We find that in this model the observed energy variation
can be explained simply due to a variation of the projected velocity and
beaming factor of the line forming region towards us.Comment: 18 pages, 10 figures, accepted for publication in A&
Decoding Ventromedial Hypothalamic Neural Activity during Male Mouse Aggression
The ventromedial hypothalamus, ventrolateral area (VMHvl) was identified recently as a critical locus for inter-male aggression. Optogenetic stimulation of VMHvl in male mice evokes attack toward conspecifics and inactivation of the region inhibits natural aggression, yet very little is known about its underlying neural activity. To understand its role in promoting aggression, we recorded and analyzed neural activity in the VMHvl in response to a wide range of social and nonsocial stimuli. Although response profiles of VMHvl neurons are complex and heterogeneous, we identified a subpopulation of neurons that respond maximally during investigation and attack of male conspecific mice and during investigation of a source of male mouse urine. These âmale responsiveâ neurons in the VMHvl are tuned to both the inter-male distance and the animal's velocity during attack. Additionally, VMHvl activity predicts several parameters of future aggressive action, including the latency and duration of the next attack. Linear regression analysis further demonstrates that aggression-specific parameters, such as distance, movement velocity, and attack latency, can model ongoing VMHvl activity fluctuation during inter-male encounters. These results represent the first effort to understand the hypothalamic neural activity during social behaviors using quantitative tools and suggest an important role for the VMHvl in encoding movement, sensory, and motivation-related signals
Edge Influence Computation in Dynamic Graphs
Reachability queries are of great importance in many research and application areas, including general graph mining, social network analysis and so on. Many approaches have been proposed to compute whether there exists one path from one node to another node in a graph. Most of these approaches focus on static graphs, however in practice dynamic graphs are more common. In this paper, we focus on handling graph reachability queries in dynamic graphs. Specifically we investigate the influence of a given edge in the graph, aiming to study the overall reachability changes in the graph brought by the possible failure/deletion of the edge. To this end, we firstly develop an efficient update algorithm for handling edge deletions. We then define the edge influence concept and put forward a novel computation algorithm to accelerate the computation of edge influence. We evaluate our approach using several real world datasets. The experimental results show that our approach outperforms traditional approaches significantly
A Probabilistic Analysis of Kademlia Networks
Kademlia is currently the most widely used searching algorithm in P2P
(peer-to-peer) networks. This work studies an essential question about Kademlia
from a mathematical perspective: how long does it take to locate a node in the
network? To answer it, we introduce a random graph K and study how many steps
are needed to locate a given vertex in K using Kademlia's algorithm, which we
call the routing time. Two slightly different versions of K are studied. In the
first one, vertices of K are labelled with fixed IDs. In the second one,
vertices are assumed to have randomly selected IDs. In both cases, we show that
the routing time is about c*log(n), where n is the number of nodes in the
network and c is an explicitly described constant.Comment: ISAAC 201
A Circularly Polarized Low-Cost Flat Panel Antenna Array With a High Impedance Surface Meta-Substrate for Satellite On-the-Move Medical IoT Applications
A 1Ă3 linear antenna array consisting of Quad-Arm Curl antenna with a High impedance meta-surface (QACH) is presented. We believe that it is the first linear phased array solution which can provide 360° azimuth coverage. This array has been designed to operate at L-Band (1.518 - 1.675 GHz) and generate right hand circularly polarized radiation to primarily target the Inmarsat BGAN satellite constellation. The metamaterial structure integrated into each antenna element allows a low-profile height of 17.2 mm (λ1.597/10.9). Since the curl element has wideband characteristics, the array is able to provide shared aperture functionality. The array guarantees high gain beam steering for low elevation angles (up to Ξ = 70° from the zenith) with an average gain of 7.96 dBic at Ξ = 70°. In comparison, to achieve an equivalent high gain a conventional 4Ă5 patch array would be required (3 elements vs 20 elements). This means that the proposed array requires 80% fewer phase shifters, amplifiers and LNAs. This translates to a crucial commercial advantage in relation to manufacturing cost. This development can lead to disruption of the existing Satcom market by lowering the barrier-to-entry for customers looking for a mass deployable, low-cost IoT on Satcom solution
Technology transfer of dynamic IT outsourcing requires security measures in SLAs
For the present efforts in dynamic IT outsourcing environments like Grid or Cloud computing security and trust are ongoing issues. SLAs are a proved remedy to build up trust in outsourcing relations. Therefore, it is necessary to determine whether SLAs can improve trust from the perspective of the outsourcing customer by integration of security measures. The conducted survey indicates that customers see SLAs as an approach to increase their level of trust in IT outsourcing partners. In addition, security measures in SLAs are of high relevance to support trust but not yet integrated appropriately. However, SLAs are very important for the technology transfer of eScience projects in Grid computing. Again, Grid based outsourcing of biomedical IT services requires security measures in SLAs. Thus, the technology transfer process of dynamic IT outsourcing infrastructures requires adequate SLAs in order to be successful
Formation of phase lags at the cyclotron energies in the pulse profiles of magnetized, accreting neutron stars
Context: Accretion-powered X-ray pulsars show highly energy-dependent and
complex pulse-profile morphologies. Significant deviations from the average
pulse profile can appear, in particular close to the cyclotron line energies.
These deviations can be described as energy-dependent phase lags, that is, as
energy-dependent shifts of main features in the pulse profile. Aims: Using a
numerical study we explore the effect of cyclotron resonant scattering on
observable, energy-resolved pulse profiles. Methods: We generated the
observable emission as a function of spin phase, using Monte Carlo simulations
for cyclotron resonant scattering and a numerical ray-tracing routine
accounting for general relativistic light-bending effects on the intrinsic
emission from the accretion columns. Results: We find strong changes in the
pulse profile coincident with the cyclotron line energies. Features in the
pulse profile vary strongly with respect to the average pulse profile with the
observing geometry and shift and smear out in energy additionally when assuming
a non-static plasma. Conclusions: We demonstrate how phase lags at the
cyclotron energies arise as a consequence of the effects of angular
redistribution of X-rays by cyclotron resonance scattering in a strong magnetic
field combined with relativistic effects. We also show that phase lags are
strongly dependent on the accretion geometry. These intrinsic effects will in
principle allow us to constrain a system's accretion geometry.Comment: 4 pages, 4 figures; updated reference lis
- âŠ