1,766 research outputs found

    A multiple hashing approach to complete identification of missing RFID tags

    Get PDF
    PublishedJournal ArticleOwing to its superior properties, such as fast identification and relatively long interrogating range over barcode systems, Radio Frequency Identification (RFID) technology has promising application prospects in inventory management. This paper studies the problem of complete identification of missing RFID tag, which is important in practice. Time efficiency is the key performance metric of missing tag identification. However, the existing protocols are ineffective in terms of execution time and can hardly satisfy the requirements of real-time applications. In this paper, a Multi-hashing based Missing Tag Identification (MMTI) protocol is proposed, which achieves better time efficiency by improving the utilization of the time frame used for identification. Specifically, the reader recursively sends bitmaps that reflect the current slot occupation state to guide the slot selection of the next hashing process, thereby changing more empty or collision slots to the expected singleton slots. We investigate the optimal parameter settings to maximize the performance of the MMTI protocol. Furthermore, we discuss the case of channel error and propose the countermeasures to make the MMTI workable in the scenarios with imperfect communication channels. Extensive simulation experiments are conducted to evaluate the performance of MMTI, and the results demonstrate that this new protocol significantly outperforms other related protocols reported in the current literature. © 2014 IEEE.This work was supported by NSFC (Grant No.s 60973117, 61173160, 61173162, 60903154, and 61321491), New Century Excellent Talents in University (NCET) of Ministry of Education of China, the National Science Foundation for Distinguished Young Scholars of China (Grant No. 61225010), and the Project funded by China Postdoctoral Science Foundation

    Completely pinpointing the missing RFID tags in a time-efficient way

    Get PDF
    PublishedJournal Article© 1968-2012 IEEE. Radio Frequency Identification (RFID) technology has been widely used in inventory management in many scenarios, e.g., warehouses, retail stores, hospitals, etc. This paper investigates a challenging problem of complete identification of missing tags in large-scale RFID systems. Although this problem has attracted extensive attention from academy and industry, the existing work can hardly satisfy the stringent real-time requirements. In this paper, a Slot Filter-based Missing Tag Identification (SFMTI) protocol is proposed to reconcile some expected collision slots into singleton slots and filter out the expected empty slots as well as the unreconcilable collision slots, thereby achieving the improved time-efficiency. The theoretical analysis is conducted to minimize the execution time of the proposed SFMTI. We then propose a cost-effective method to extend SFMTI to the multi-reader scenarios. The extensive simulation experiments and performance results demonstrate that the proposed SFMTI protocol outperforms the most promising Iterative ID-free Protocol (IIP) by reducing nearly 45% of the required execution time, and is just within a factor of 1.18 from the lower bound of the minimum execution time.This work was supported by NSFC (Grant Nos. 60973117, 61173160, 61173162, 60903154, and 61321491), New Century Excellent Talents in University (NCET) of Ministry of Education of China, the National Science Foundation for Distinguished Young Scholars of China (Grant No. 61225010), the Doctoral Fund of Ministry of Education of China (Grant No. 20130041110019), and the Project funded by China Postdoctoral Science Foundation

    Vienna Circle and Logical Analysis of Relativity Theory

    Full text link
    In this paper we present some of our school's results in the area of building up relativity theory (RT) as a hierarchy of theories in the sense of logic. We use plain first-order logic (FOL) as in the foundation of mathematics (FOM) and we build on experience gained in FOM. The main aims of our school are the following: We want to base the theory on simple, unambiguous axioms with clear meanings. It should be absolutely understandable for any reader what the axioms say and the reader can decide about each axiom whether he likes it. The theory should be built up from these axioms in a straightforward, logical manner. We want to provide an analysis of the logical structure of the theory. We investigate which axioms are needed for which predictions of RT. We want to make RT more transparent logically, easier to understand, easier to change, modular, and easier to teach. We want to obtain deeper understanding of RT. Our work can be considered as a case-study showing that the Vienna Circle's (VC) approach to doing science is workable and fruitful when performed with using the insights and tools of mathematical logic acquired since its formation years at the very time of the VC activity. We think that logical positivism was based on the insight and anticipation of what mathematical logic is capable when elaborated to some depth. Logical positivism, in great part represented by VC, influenced and took part in the birth of modern mathematical logic. The members of VC were brave forerunners and pioneers.Comment: 25 pages, 1 firgure

    Efficient Characterization of Hidden Processor Memory Hierarchies

    Full text link
    A processor's memory hierarchy has a major impact on the performance of running code. However, computing platforms, where the actual hardware characteristics are hidden from both the end user and the tools that mediate execution, such as a compiler, a JIT and a runtime system, are used more and more, for example, performing large scale computation in cloud and cluster. Even worse, in such environments, a single computation may use a collection of processors with dissimilar characteristics. Ignorance of the performance-critical parameters of the underlying system makes it difficult to improve performance by optimizing the code or adjusting runtime-system behaviors; it also makes application performance harder to understand. To address this problem, we have developed a suite of portable tools that can efficiently derive many of the parameters of processor memory hierarchies, such as levels, effective capacity and latency of caches and TLBs, in a matter of seconds. The tools use a series of carefully considered experiments to produce and analyze cache response curves automatically. The tools are inexpensive enough to be used in a variety of contexts that may include install time, compile time or runtime adaption, or performance understanding tools.Comment: 14 pages, International Conference on Computational Science 201

    TPXL-1 activates Aurora A to clear contractile ring components from the polar cortex during cytokinesis

    Get PDF
    During cytokinesis, a signal from the central spindle that forms between the separating anaphase chromosomes promotes the accumulation of contractile ring components at the cell equator, while a signal from the centrosomal microtubule asters inhibits accumulation of contractile ring components at the cell poles. However, the molecular identity of the inhibitory signal has remained unknown. To identify molecular components of the aster-based inhibitory signal, we developed a means to monitor the removal of contractile ring proteins from the polar cortex after anaphase onset. Using this assay, we show that polar clearing is an active process that requires activation of Aurora A kinase by TPXL-1. TPXL-1 concentrates on astral microtubules coincident with polar clearing in anaphase, and its ability to recruit Aurora A and activate its kinase activity are essential for clearing. In summary, our data identify Aurora A kinase as an aster-based inhibitory signal that restricts contractile ring components to the cell equator during cytokinesis.We thank the Caenorhabditis Genetic Center (funded by the National Institutes of Health Office of Research Infrastructure Programs P40 OD010440) for strains. This work was supported by grants to K. Oegema (National Institutes of Health; GM074207), E. Zanin (Deutsche Forschungsgemeinschaft, ZA619/3-1), and A.X. Carvalho (European Research Council; 640553–ACTOMYO). T. Kim was supported by a grant to Arshad Desai (National Institutes of Health; GM074215). K. Oegema receives salary and other support from the Ludwig Institute for Cancer Research. S. Mangal is a member of International Max Planck Research School for Molecular Life Sciences, and J. Sacher is a member of the Life Science Munich graduate program; both thank their programs for support

    Efficiency in Multi-objective Games

    Full text link
    In a multi-objective game, each agent individually evaluates each overall action-profile on multiple objectives. I generalize the price of anarchy to multi-objective games and provide a polynomial-time algorithm to assess it. This work asserts that policies on tobacco promote a higher economic efficiency

    Designing an automated clinical decision support system to match clinical practice guidelines for opioid therapy for chronic pain

    Get PDF
    Abstract Background Opioid prescribing for chronic pain is common and controversial, but recommended clinical practices are followed inconsistently in many clinical settings. Strategies for increasing adherence to clinical practice guideline recommendations are needed to increase effectiveness and reduce negative consequences of opioid prescribing in chronic pain patients. Methods Here we describe the process and outcomes of a project to operationalize the 2003 VA/DOD Clinical Practice Guideline for Opioid Therapy for Chronic Non-Cancer Pain into a computerized decision support system (DSS) to encourage good opioid prescribing practices during primary care visits. We based the DSS on the existing ATHENA-DSS. We used an iterative process of design, testing, and revision of the DSS by a diverse team including guideline authors, medical informatics experts, clinical content experts, and end-users to convert the written clinical practice guideline into a computable algorithm to generate patient-specific recommendations for care based upon existing information in the electronic medical record (EMR), and a set of clinical tools. Results The iterative revision process identified numerous and varied problems with the initially designed system despite diverse expert participation in the design process. The process of operationalizing the guideline identified areas in which the guideline was vague, left decisions to clinical judgment, or required clarification of detail to insure safe clinical implementation. The revisions led to workable solutions to problems, defined the limits of the DSS and its utility in clinical practice, improved integration into clinical workflow, and improved the clarity and accuracy of system recommendations and tools. Conclusions Use of this iterative process led to development of a multifunctional DSS that met the approval of the clinical practice guideline authors, content experts, and clinicians involved in testing. The process and experiences described provide a model for development of other DSSs that translate written guidelines into actionable, real-time clinical recommendations.http://deepblue.lib.umich.edu/bitstream/2027.42/78267/1/1748-5908-5-26.xmlhttp://deepblue.lib.umich.edu/bitstream/2027.42/78267/2/1748-5908-5-26.pdfhttp://deepblue.lib.umich.edu/bitstream/2027.42/78267/3/1748-5908-5-26-S3.TIFFhttp://deepblue.lib.umich.edu/bitstream/2027.42/78267/4/1748-5908-5-26-S2.TIFFhttp://deepblue.lib.umich.edu/bitstream/2027.42/78267/5/1748-5908-5-26-S1.TIFFPeer Reviewe

    A novel PKC activating molecule promotes neuroblast differentiation and delivery of newborn neurons in brain injuries

    Get PDF
    Neural stem cells are activated within neurogenic niches in response to brain injuries. This results in the production of neuroblasts, which unsuccessfully attempt to migrate toward the damaged tissue. Injuries constitute a gliogenic/non-neurogenic niche generated by the presence of anti-neurogenic signals, which impair neuronal differentiation and migration. Kinases of the protein kinase C (PKC) family mediate the release of growth factors that participate in different steps of the neurogenic process, particularly, novel PKC isozymes facilitate the release of the neurogenic growth factor neuregulin. We have demonstrated herein that a plant derived diterpene, (EOF2; CAS number 2230806-06-9), with the capacity to activate PKC facilitates the release of neuregulin 1, and promotes neuroblasts differentiation and survival in cultures of subventricular zone (SVZ) isolated cells in a novel PKC dependent manner. Local infusion of this compound in mechanical cortical injuries induces neuroblast enrichment within the perilesional area, and noninvasive intranasal administration of EOF2 promotes migration of neuroblasts from the SVZ towards the injury, allowing their survival and differentiation into mature neurons, being some of them cholinergic and GABAergic. Our results elucidate the mechanism of EOF2 promoting neurogenesis in injuries and highlight the role of novel PKC isozymes as targets in brain injury regeneration
    • …
    corecore