1,191 research outputs found

    Channel estimation and transmit power control in wireless body area networks

    Get PDF
    Wireless body area networks have recently received much attention because of their application to assisted living and remote patient monitoring. For these applications, energy minimisation is a critical issue since, in many cases, batteries cannot be easily replaced or recharged. Reducing energy expenditure by avoiding unnecessary high transmission power and minimising frame retransmissions is therefore crucial. In this study, a transmit power control scheme suitable for IEEE 802.15.6 networks operating in beacon mode with superframe boundaries is proposed. The transmission power is modulated, frame-by-frame, according to a run-time estimation of the channel conditions. Power measurements using the beacon frames are made periodically, providing reverse channel gain and an opportunistic fade margin, set on the basis of prior power fluctuations, is added. This approach allows tracking of the highly variable on-body to on-body propagation channel without the need to transmit additional probe frames. An experimental study based on test cases demonstrates the effectiveness of the scheme and compares its performance with alternative solutions presented in the literature

    The James Madison Carpenter collection of traditional song and drama

    Get PDF
    James Madison Carpenter (1888-1983) was until recently a relatively unknown figure in the history of Anglo-American folksong and British folk play scholarship (Jabbour 1998; Bishop 1998). Born and bred in Mississippi, he was university-educated and worked as a minister and teacher prior to entering Harvard in 1920 to do a Ph.D. in English. Under the supervision of George Lyman Kittredge, he wrote a thesis on "Forecastle Songs and Chanties," based on fieldwork with retired seamen in the United States and in ports that he visited in the summer of 1928 on a Dexter scholarship around England, Scotland, and Ireland. After gaining his doctorate in 1929, and encouraged by Kittredge, Carpenter returned to Britain in order to continue fieldwork. Armed with a portable typewriter and a Dictaphone cylinder machine, he bought a car and struck off northwards up the east coast (Figure 2).1Not

    TREX1 is expressed by microglia in normal human brain and increases in regions affected by ischemia

    Get PDF
    BACKGROUND: Mutations in the three-prime repair exonuclease 1 (TREX1) gene have been associated with neurological diseases, including Retinal Vasculopathy with Cerebral Leukoencephalopathy (RVCL). However, the endogenous expression of TREX1 in human brain has not been studied. METHODS: We produced a rabbit polyclonal antibody (pAb) to TREX1 to characterize TREX1 by Western blotting (WB) of cell lysates from normal controls and subjects carrying an RVCL frame-shift mutation. Dual staining was performed to determine cell types expressing TREX1 in human brain tissue. TREX1 distribution in human brain was further evaluated by immunohistochemical analyses of formalin-fixed, paraffin-embedded samples from normal controls and patients with RVCL and ischemic stroke. RESULTS: After validating the specificity of our anti-TREX1 rabbit pAb, WB analysis was utilized to detect the endogenous wild-type and frame-shift mutant of TREX1 in cell lysates. Dual staining in human brain tissues from patients with RVCL and normal controls localized TREX1 to a subset of microglia and macrophages. Quantification of immunohistochemical staining of the cerebral cortex revealed that TREX1 CONCLUSIONS: TREX1 is expressed by a subset of microglia in normal human brain, often in close proximity to the microvasculature, and increases in the setting of ischemic lesions. These findings suggest a role for TREX

    Data remanence and digital forensic investigation for CUDA Graphics Processing Units

    Get PDF
    This paper investigates the practicality of memory attacks on commercial Graphics Processing Units (GPUs). With recent advances in the performance and viability of using GPUs for various highly-parallelised data processing tasks, a number of security challenges are raised. Unscrupulous software running subsequently on the same GPU, either by the same user, or another user, in a multi-user system, may be able to gain access to the contents of the GPU memory. This contains data from previous program executions. In certain use-cases, where the GPU is used to offload intensive parallel processing such as pattern matching for an intrusion detection system, financial systems, or cryptographic algorithms, it may be possible for the GPU memory to contain privileged data, which would ordinarily be inaccessible to an unprivileged application running on the host computer. With GPUs potentially yielding access to confidential information, existing research in the field is built upon, to investigate the practicality of extracting data from global, shared and texture memory, and retrieving this data for further analysis. These techniques are also implemented on various GPUs using three different Nvidia CUDA versions. A novel methodology for digital forensic examination of GPU memory for remanent data is then proposed, along with some suggestions and considerations towards countermeasures and anti-forensic technique

    WESTT (Workload, Error, Situational Awareness, Time and Teamwork): An analytical prototyping system for command and control

    Get PDF
    Modern developments in the use of information technology within command and control allow unprecedented scope for flexibility in the way teams deal with tasks. These developments, together with the increased recognition of the importance of knowledge management within teams present difficulties for the analyst in terms of evaluating the impacts of changes to task composition or team membership. In this paper an approach to this problem is presented that represents team behaviour in terms of three linked networks (representing task, social network structure and knowledge) within the integrative WESTT software tool. In addition, by automating analyses of workload and error based on the same data that generate the networks, WESTT allows the user to engage in the process of rapid and iterative “analytical prototyping”. For purposes of illustration an example of the use of this technique with regard to a simple tactical vignette is presented

    Non-destructive identification of fibre orientation in multi-ply biaxial laminates using contact temperature sensors

    Get PDF
    Fibre orientation within composite structures dictates the material properties of the laminate once cured. The ability to accurately and automatically assess fibre orientation of composite parts is a significant enabler in the goal to optimise the established processes within aftermarket aerospace industries. Incorrect ply lay-up results in a structure with undesirable material properties and as such, has the potential to fail under safe working loads. Since it is necessary to assure structural integrity during re-manufacture and repair assessment, the paper demonstrates a novel method of readily and non-destructively determining fibre orientation throughout multi-ply Biaxial woven composite laminates using point temperature contact sensors and data analysis techniques. Once cured, only the outermost laminates are visible to assess orientation. The inspection method is conducted visually, with reference guides to allow for rapid adoption with minimum training, as well as harnessing established temperature sensors within the Maintenance Repair and Overhaul (MRO) environment. The system is amenable to integration within existing repair/re-manufacture processes without significant impact to process flow. The method is able to identify noisy samples with an accuracy, precision and recall of 0.9, and for synthetically created samples of double the cure ply thickness, a precision of 0.75, a recall of 0.7 and an accuracy of 0.87

    The personal distributed environment

    Get PDF
    Beyond 3G continues to dominate discussion within the cellular community. A variety of issues are being actively debated: the requirement for a new air interface, greater interworking with WLANs and other networks, a service-driven approach, and potential for increasing market penetration of network-enabled devices. The Mobile VCE vision for beyond 3G encompasses a world that has embraced a disparate range of networked processing and communications devices. This article presents an architecture for user-centric communication across heterogeneous access networks

    Effects of traumatic brain injury on cognitive functioning and cerebral metabolites in HIV-infected individuals.

    Get PDF
    We explored the possible augmenting effect of traumatic brain injury (TBI) history on HIV (human immunodeficiency virus) associated neurocognitive complications. HIV-infected participants with self-reported history of definite TBI were compared to HIV patients without TBI history. Groups were equated for relevant demographic and HIV-associated characteristics. The TBI group evidenced significantly greater deficits in executive functioning and working memory. N-acetylaspartate, a putative marker of neuronal integrity, was significantly lower in the frontal gray matter and basal ganglia brain regions of the TBI group. Together, these results suggest an additional brain impact of TBI over that from HIV alone. One clinical implication is that HIV patients with TBI history may need to be monitored more closely for increased risk of HIV-associated neurocognitive disorder signs or symptoms
    corecore