912 resultados para PACKET MARKING
Resumo:
We show that the parametrized Wave-Packet Phase Space representation, which has been studied earlier by one of the authors, is equivalent to a Squeezed States Phase Space Representation of quantum mechanics. © 1988.
Resumo:
This paper describes an analytical method using high-performance liquid chromatographic (HPLC) separationcoupled with electrochemical detection to detect three dyes, Solvent Blue 14 (SB-14), Solvent Blue 35 (SB-35) andSolvent Red 24 (SR-24). The dyes were eluted and separated using a reversed-phase column (C-8) under isocraticelution with the mobile phase containing a mixture of acetonitrile/ammonium acetate (5.0 mmol L1) at the ratio of75: 25 (v/v). Two sample pretreatment methods were tested and successfully applied to quantify SB14, SB-35 and SR-24 dyes in gasoline samples. The proposed method was simple, fast and suitable to detect and quantify marker dyes ingasoline sample at low concentration.
Resumo:
Due to the lack of optical random access memory, optical fiber delay line (FDL) is currently the only way to implement optical buffering. Feed-forward and feedback are two kinds of FDL structures in optical buffering. Both have advantages and disadvantages. In this paper, we propose a more effective hybrid FDL architecture that combines the merits of both schemes. The core of this switch is the arrayed waveguide grating (AWG) and the tunable wavelength converter (TWC). It requires smaller optical device sizes and fewer wavelengths and has less noise than feedback architecture. At the same time, it can facilitate preemptive priority routing which feed-forward architecture cannot support. Our numerical results show that the new switch architecture significantly reduces packet loss probability.
Resumo:
In this paper, a cross-layer solution for packet size optimization in wireless sensor networks (WSN) is introduced such that the effects of multi-hop routing, the broadcast nature of the physical wireless channel, and the effects of error control techniques are captured. A key result of this paper is that contrary to the conventional wireless networks, in wireless sensor networks, longer packets reduce the collision probability. Consequently, an optimization solution is formalized by using three different objective functions, i.e., packet throughput, energy consumption, and resource utilization. Furthermore, the effects of end-to-end latency and reliability constraints are investigated that may be required by a particular application. As a result, a generic, cross-layer optimization framework is developed to determine the optimal packet size in WSN. This framework is further extended to determine the optimal packet size in underwater and underground sensor networks. From this framework, the optimal packet sizes under various network parameters are determined.
Resumo:
Consider a communication system in which a transmitter equipment sends fixed-size packets of data at a uniform rate to a receiver equipment. Consider also that these equipments are connected by a packet-switched network, which introduces a random delay to each packet. Here we propose an adaptive clock recovery scheme able of synchronizing the frequencies and the phases of these devices, within specified limits of precision. This scheme for achieving frequency and phase synchronization is based on measurements of the packet arrival times at the receiver, which are used to control the dynamics of a digital phase-locked loop. The scheme performance is evaluated via numerical simulations performed by using realistic parameter values. (C) 2011 Elsevier By. All rights reserved.
Resumo:
The aim of this work was to review the role of the host marking pheromone (HMP) and its application in integrated management programs for the fruit flies. Initially the oviposition behavior of tephritids has been analyzed with emphasis on Ceratitis capitata. The deposition of HMP, which consists in the last stage of the oviposition behavior has been characterized and discussed about evolutive aspects and the biological meaning of the tephritidae communication through the HMP. Finally, the perspectives on the use of HMP in the integrated management of fruit flies have been discussed.
Resumo:
L'utilizzo del materiale è concesso ai soli studenti iscritti al corso nell'anno accademico in corso, in quanto esso è coperto da copyright internazionale; la Facoltà di Economia di Forlì ha già provveduto a sostenere i relativi costi per gli studenti iscritti. Qualora altri studenti non appartenenti al corso fossero interessati a partecipare, dovranno mettersi in contatto con il prof. Emanuele Padovani per regolarizzare il pagamento dei diritti d'autore. Per ogni altra informazione sull'utilizzo del materiale e sul copyright, si rinvia alla prima pagina dell'E-packet. ENGLISH VERSION: You can use the E-packet only if you are enrolled in this course for the current academic year, because it is copyrighted under international copyright laws and the Faculty of Economics of Forlì has paid just the amount for this year's students. If you are interested in this material, you can ask information to Professor Emanuele Padovani. For any further information on the use of this material, please read the disclaimer contained in the first page of it.
Resumo:
Un livello di sicurezza che prevede l’autenticazione e autorizzazione di un utente e che permette di tenere traccia di tutte le operazioni effettuate, non esclude una rete dall’essere soggetta a incidenti informatici, che possono derivare da tentativi di accesso agli host tramite innalzamento illecito di privilegi o dai classici programmi malevoli come virus, trojan e worm. Un rimedio per identificare eventuali minacce prevede l’utilizzo di un dispositivo IDS (Intrusion Detection System) con il compito di analizzare il traffico e confrontarlo con una serie d’impronte che fanno riferimento a scenari d’intrusioni conosciute. Anche con elevate capacità di elaborazione dell’hardware, le risorse potrebbero non essere sufficienti a garantire un corretto funzionamento del servizio sull’intero traffico che attraversa una rete. L'obiettivo di questa tesi consiste nella creazione di un’applicazione con lo scopo di eseguire un’analisi preventiva, in modo da alleggerire la mole di dati da sottoporre all’IDS nella fase di scansione vera e propria del traffico. Per fare questo vengono sfruttate le statistiche calcolate su dei dati forniti direttamente dagli apparati di rete, cercando di identificare del traffico che utilizza dei protocolli noti e quindi giudicabile non pericoloso con una buona probabilità.
Resumo:
The thesis deals with channel coding theory applied to upper layers in the protocol stack of a communication link and it is the outcome of four year research activity. A specific aspect of this activity has been the continuous interaction between the natural curiosity related to the academic blue-sky research and the system oriented design deriving from the collaboration with European industry in the framework of European funded research projects. In this dissertation, the classical channel coding techniques, that are traditionally applied at physical layer, find their application at upper layers where the encoding units (symbols) are packets of bits and not just single bits, thus explaining why such upper layer coding techniques are usually referred to as packet layer coding. The rationale behind the adoption of packet layer techniques is in that physical layer channel coding is a suitable countermeasure to cope with small-scale fading, while it is less efficient against large-scale fading. This is mainly due to the limitation of the time diversity inherent in the necessity of adopting a physical layer interleaver of a reasonable size so as to avoid increasing the modem complexity and the latency of all services. Packet layer techniques, thanks to the longer codeword duration (each codeword is composed of several packets of bits), have an intrinsic longer protection against long fading events. Furthermore, being they are implemented at upper layer, Packet layer techniques have the indisputable advantages of simpler implementations (very close to software implementation) and of a selective applicability to different services, thus enabling a better matching with the service requirements (e.g. latency constraints). Packet coding technique improvement has been largely recognized in the recent communication standards as a viable and efficient coding solution: Digital Video Broadcasting standards, like DVB-H, DVB-SH, and DVB-RCS mobile, and 3GPP standards (MBMS) employ packet coding techniques working at layers higher than the physical one. In this framework, the aim of the research work has been the study of the state-of-the-art coding techniques working at upper layer, the performance evaluation of these techniques in realistic propagation scenario, and the design of new coding schemes for upper layer applications. After a review of the most important packet layer codes, i.e. Reed Solomon, LDPC and Fountain codes, in the thesis focus our attention on the performance evaluation of ideal codes (i.e. Maximum Distance Separable codes) working at UL. In particular, we analyze the performance of UL-FEC techniques in Land Mobile Satellite channels. We derive an analytical framework which is a useful tool for system design allowing to foresee the performance of the upper layer decoder. We also analyze a system in which upper layer and physical layer codes work together, and we derive the optimal splitting of redundancy when a frequency non-selective slowly varying fading channel is taken into account. The whole analysis is supported and validated through computer simulation. In the last part of the dissertation, we propose LDPC Convolutional Codes (LDPCCC) as possible coding scheme for future UL-FEC application. Since one of the main drawbacks related to the adoption of packet layer codes is the large decoding latency, we introduce a latency-constrained decoder for LDPCCC (called windowed erasure decoder). We analyze the performance of the state-of-the-art LDPCCC when our decoder is adopted. Finally, we propose a design rule which allows to trade-off performance and latency.
Resumo:
This thesis regards the Wireless Sensor Network (WSN), as one of the most important technologies for the twenty-first century and the implementation of different packet correcting erasure codes to cope with the ”bursty” nature of the transmission channel and the possibility of packet losses during the transmission. The limited battery capacity of each sensor node makes the minimization of the power consumption one of the primary concerns in WSN. Considering also the fact that in each sensor node the communication is considerably more expensive than computation, this motivates the core idea to invest computation within the network whenever possible to safe on communication costs. The goal of the research was to evaluate a parameter, for example the Packet Erasure Ratio (PER), that permit to verify the functionality and the behavior of the created network, validate the theoretical expectations and evaluate the convenience of introducing the recovery packet techniques using different types of packet erasure codes in different types of networks. Thus, considering all the constrains of energy consumption in WSN, the topic of this thesis is to try to minimize it by introducing encoding/decoding algorithms in the transmission chain in order to prevent the retransmission of the erased packets through the Packet Erasure Channel and save the energy used for each retransmitted packet. In this way it is possible extend the lifetime of entire network.
Resumo:
As a self-styled 'female Columbus', E. Catherine Bates took a transcontinental journey across North America with a woman companion in the late 1880s and, on her return to England, published A Year in the Great Republic . This paper, following critical theory approaches to the study of travel writing, explores the ways in which several of Bates's many-layered social identities as a woman of the British e lite class came to the fore in her travel narrative. I argue that Bates constructed her narrative primarily around her shifting gender identities- as 'feminine' and 'feminist'- and suggest that imperialistic writing was less apparent because she was travelling to a place that had an 'empire-to-empire' rather than a 'colony-to-empire', relationship to Britain during its 'Age of Empire'. In this paper I am searching for a middle ground between what I have termed 'modernist' interpretations of women's travel writing and the more recent post-structural interpretations. I make the case that Victorian women travellers' revisionist commentary on gender roles, as well as their observations of domestic scenes, should remain in focus as we continue to mark them for historical study.
Resumo:
In male rats, the dopamine agonist apomorphine (APO) generally facilitates copulatory behavior. However, disruptive effects of high APO doses have been reported. These have been interpreted in diverse ways, as products of a dopaminergic system that inhibits sexual behavior or as consequences of APO's stimulation of competing responses. To test the generality of these effects, we observed APO's impact on copulatory behavior in male hamsters. Several effects were observed, all attributable to a relatively high dose and involving the disruption of male behavior. More unexpectedly, APO treatment caused males to attack estrous stimulus females in the course of these tests. To clarify these effects, we observed the effects of APO on flank marking, a type of scent marking closely allied to aggression and dominance in hamsters. Treatment reliably decreased the latency of marking. It also increased the rate of marking when appropriate measures were taken to prevent this effect from being obscured by drug-induced cheek pouching. Together, these results confirm and extend APO's well-known ability to increase aggression. Further, they suggest that APO-induced aggression can intrude into other contexts so as to disrupt, or possibly facilitate, other forms of social behavior.