10 research outputs found

    Evaluation of an OPNET Model for Unmanned Aerial Vehicle Networks

    Get PDF
    The concept of Unmanned Aerial Vehicles (UAVs) was first used as early as the American Civil War, when the North and the South unsuccessfully attempted to launch balloons with explosive devices. Since the American Civil War, the UAV concept has been used in all subsequent military operations. Over the last few years, there has been an explosion in the use of UAVs in military operations, as well as civilian and commercial applications. UAV Mobile Ad Hoc Networks (MANETs) are fast becoming essential to conducting Network-Centric Warfare (NCW). As of October 2006, coalition UAVs, exclusive of hand-launched systems, had flown almost 400,000 flight hours in support of Operations Enduring Freedom and Iraqi Freedom [1]. This study develops a verified network model that emulates UAV network behavior during flight, using a leading simulation tool. A flexible modeling and simulation environment is developed to test proposed technologies against realistic mission scenarios. The simulation model evaluation is performed and findings documented. These simulations are designed to understand the characteristics and essential performance parameters of the delivered model. A statistical analysis is performed to explain results obtained, and identify potential performance irregularities. A systemic approach is taken during the preparation and execution simulation phases to avoid producing misleading results

    Enhanced sedimentation of elongated plankton in simple flows

    Get PDF
    Negatively buoyant phytoplankton play an important role in the sequestration of CO_2 from the atmo-sphere and are fundamental to the health of the world’s fisheries. However, there is still much to discoveron transport mechanisms from the upper photosynthetic regions to the deep ocean. In contrast to intuitive expectations that mixing increases plankton residence time in light-rich regions, recent experimental and computational evidence suggests that turbulence can actually enhance sedimentation of negatively buoyant diatoms. Motivated by these studies we dissect the enhanced sedimentation mechanisms using the simplest possible two-dimensional flows, avoiding expensive computations and obfuscation. In particular, we find that in vertical shear, preferential flow alignment and aggregation in down-welling regions both increase sedimentation, whereas horizontal shear reduces the sedimentation due only to alignment. However the magnitude of the shear does not affect the sedimentation rate. In simple vertical Kolmogorov flow elongated particles also have an enhanced sedimentation speed as they spend more time in down-welling regions of the flow with vertically aligned orientation, an effect that increases with the magnitude of shear. An additional feature is identified in horizontal Kolomogorov flow, whereby the impact of shear-dependent sedimentation speed is to cause aggregation in regions of high-shear where the sedimentation speed is minimum. In cellular flow, there is an increase in mean sedimentation speed with aspect ratio and shear strength associated with aggregation in down-welling regions. Furthermore, spatially projected trajectories can intersect and give rise to chaotic dynamics, which is associated with a depletion of particles within so called retention zones

    Secure and scalable deduplication of horizontally partitioned health data for privacy-preserving distributed statistical computation

    Get PDF
    Background Techniques have been developed to compute statistics on distributed datasets without revealing private information except the statistical results. However, duplicate records in a distributed dataset may lead to incorrect statistical results. Therefore, to increase the accuracy of the statistical analysis of a distributed dataset, secure deduplication is an important preprocessing step. Methods We designed a secure protocol for the deduplication of horizontally partitioned datasets with deterministic record linkage algorithms. We provided a formal security analysis of the protocol in the presence of semi-honest adversaries. The protocol was implemented and deployed across three microbiology laboratories located in Norway, and we ran experiments on the datasets in which the number of records for each laboratory varied. Experiments were also performed on simulated microbiology datasets and data custodians connected through a local area network. Results The security analysis demonstrated that the protocol protects the privacy of individuals and data custodians under a semi-honest adversarial model. More precisely, the protocol remains secure with the collusion of up to N − 2 corrupt data custodians. The total runtime for the protocol scales linearly with the addition of data custodians and records. One million simulated records distributed across 20 data custodians were deduplicated within 45 s. The experimental results showed that the protocol is more efficient and scalable than previous protocols for the same problem. Conclusions The proposed deduplication protocol is efficient and scalable for practical uses while protecting the privacy of patients and data custodians

    Finishing the euchromatic sequence of the human genome

    Get PDF
    The sequence of the human genome encodes the genetic instructions for human physiology, as well as rich information about human evolution. In 2001, the International Human Genome Sequencing Consortium reported a draft sequence of the euchromatic portion of the human genome. Since then, the international collaboration has worked to convert this draft into a genome sequence with high accuracy and nearly complete coverage. Here, we report the result of this finishing process. The current genome sequence (Build 35) contains 2.85 billion nucleotides interrupted by only 341 gaps. It covers ∌99% of the euchromatic genome and is accurate to an error rate of ∌1 event per 100,000 bases. Many of the remaining euchromatic gaps are associated with segmental duplications and will require focused work with new methods. The near-complete sequence, the first for a vertebrate, greatly improves the precision of biological analyses of the human genome including studies of gene number, birth and death. Notably, the human enome seems to encode only 20,000-25,000 protein-coding genes. The genome sequence reported here should serve as a firm foundation for biomedical research in the decades ahead

    Opposing striptopia: The embattled spaces of adult entertainment

    No full text
    While adult entertainment venues offering striptease have proliferated in the UK, recent reforms have subjected them to more onerous and restrictive forms of licensing control. This article examines the justification for this re-regulation, noting that debates around the desirability of such venues have become increasingly framed in terms of gendered exploitation rather than sexual liberation and 'play'. Noting that such debates often conflate questions of public morality, criminality, nuisance and exploitation in unhelpful ways, this article argues that the reform of the licensing law was underpinned by possibly flawed assumptions about the gendered and sexed nature of adult entertainment. The article accordingly emphasizes the ability of the naked body to excite both desire and disgust, and challenges the assumption that commercial sex is always exploitative. © The Author(s), 2009

    Radiolabeled antibodies for the management of metastatic cancer

    No full text

    7 Getting There from Here: Research on the Effects of Work–Family Initiatives on Work–Family Conflict and Business Outcomes

    No full text

    Stroke: Pathophysiology and Therapy

    No full text

    The Society for Vascular Surgery practice guidelines on the care of patients with an abdominal aortic aneurysm

    No full text
    corecore