771 resultados para Irrigation protocol
Resumo:
The structure of the borate complex responsible for the enantiodifferentiation of amines using a previously reported three-component protocol has been established. The choice between an ion pair and an amine-coordinated complex with the N atom of the amine coordinated to the B atom is favored for the former structure based on the DFT-calculated B-11 NMR chemical shifts. In contrast to expectations, the anisotropies of the quadrupolar B-11 nucleus for the two structures were calculated to be indistinguishable with regard to their effect on the linewidth of the NMR signal. (C) 2014 Elsevier Ltd. All rights reserved.
Resumo:
Different medium access control (MAC) layer protocols, for example, IEEE 802.11 series and others are used in wireless local area networks. They have limitation in handling bulk data transfer applications, like video-on-demand, videoconference, etc. To avoid this problem a cooperative MAC protocol environment has been introduced, which enables the MAC protocol of a node to use its nearby nodes MAC protocol as and when required. We have found on various occasions that specified cooperative MAC establishes cooperative transmissions to send the specified data to the destination. In this paper we propose cooperative MAC priority (CoopMACPri) protocol which exploits the advantages of priority value given by the upper layers for selection of different paths to nodes running heterogeneous applications in a wireless ad hoc network environment. The CoopMACPri protocol improves the system throughput and minimizes energy consumption. Using a Markov chain model, we developed a model to analyse the performance of CoopMACPri protocol; and also derived closed-form expression of saturated system throughput and energy consumption. Performance evaluations validate the accuracy of the theoretical analysis, and also show that the performance of CoopMACPri protocol varies with the number of nodes. We observed that the simulation results and analysis reflects the effectiveness of the proposed protocol as per the specifications.
Resumo:
A new general route for the synthesis of novel beta-aryl-beta-(methylthio)acroleins, a class of stable potential 1,3-dielectrophilic synthons, has been reported. The overall protocol involves treatment of either beta-chloroacroleins or their precursor iminium salts (generated in situ from the corresponding active methylene ketones under Vilsmeier-Haack reaction conditions) with S,S-dimethyldithiocarbonates (DDC)/aqueous KOH in either a one-pot or two-step process. The dimethyldithiocarbonate (DDC)/30% aqueous KOH has been shown to be an excellent source of methylthiolate anion. (C) 2014 Elsevier Ltd. All rights reserved.
Resumo:
A link level reliable multicast requires a channel access protocol to resolve the collision of feedback messages sent by multicast data receivers. Several deterministic media access control protocols have been proposed to attain high reliability, but with large delay. Besides, there are also protocols which can only give probabilistic guarantee about reliability, but have the least delay. In this paper, we propose a virtual token-based channel access and feedback protocol (VTCAF) for link level reliable multicasting. The VTCAF protocol introduces a virtual (implicit) token passing mechanism based on carrier sensing to avoid the collision between feedback messages. The delay performance is improved in VTCAF protocol by reducing the number of feedback messages. Besides, the VTCAF protocol is parametric in nature and can easily trade off reliability with the delay as per the requirement of the underlying application. Such a cross layer design approach would be useful for a variety of multicast applications which require reliable communication with different levels of reliability and delay performance. We have analyzed our protocol to evaluate various performance parameters at different packet loss rate and compared its performance with those of others. Our protocol has also been simulated using Castalia network simulator to evaluate the same performance parameters. Simulation and analytical results together show that the VTCAF protocol is able to considerably reduce average access delay while ensuring very high reliability at the same time.
Resumo:
A strategy for achieving enantiodivergency from R-(-)-carvone in the context of synthesis of eudesmanes and dihydroagarofurans is disclosed, which involves, among other things, sequential setting of the C10 quaternary centre and recreation of the desired C7 isopropyl stereochemistry to enter the antipodal series. A synthesis of 1-deacetoxy-ent-orbiculin has been achieved as a demonstration of the effectiveness and applicability of this approach. (C) 2015 Elsevier Ltd. All rights reserved.
Resumo:
Standard trypsin digestion protocol of proteins followed by MALDI-MS analysis has been realized as an important tool for the identification and characterization of proteins. In this article, we proposed the elimination of the step of `staining/de-staining of gel pieces' in in-gel digestion protocol in order to improve the efficiency of trypsin digestion. Coomassie dye is known to interfere with digestion of proteins by trypsin and the procedure of staining-de-staining could result in loss of photoaffinity probe, post translational modifications and catalytic activities of enzymes. Further, we studied parameters like hydrophobicity and isoelectric point, and attempted to quantitatively relate it to the efficiency of trypsin digestion. We suggest that properties of proteins should be considered and trypsin digestion protocol should be appropriately modified as per sequence and other information.
Resumo:
A variety of functionalized organoselenium compounds were synthesized from doubly activated cyclopropanes and diselenides in the presence of sodium borohydride. A range of substituents were stable under these reaction conditions. Additionally, we extended the scope of the method by reducing nitro groups in the products to give the corresponding selenium-containing unnatural amino acids.
Resumo:
A routing protocol in a mobile ad hoc network (MANET) should be secure against both the outside attackers which do not hold valid security credentials and the inside attackers which are the compromised nodes in the network. The outside attackers can be prevented with the help of an efficient key management protocol and cryptography. However, to prevent inside attackers, it should be accompanied with an intrusion detection system (IDS). In this paper, we propose a novel secure routing with an integrated localized key management (SR-LKM) protocol, which is aimed to prevent both inside and outside attackers. The localized key management mechanism is not dependent on any routing protocol. Thus, unlike many other existing schemes, the protocol does not suffer from the key management - secure routing interdependency problem. The key management mechanism is lightweight as it optimizes the use of public key cryptography with the help of a novel neighbor based handshaking and Least Common Multiple (LCM) based broadcast key distribution mechanism. The protocol is storage scalable and its efficiency is confirmed by the results obtained from simulation experiments.
Resumo:
Multicast in wireless sensor networks (WSNs) is an efficient way to spread the same data to multiple sensor nodes. It becomes more effective due to the broadcast nature of wireless link, where a message transmitted from one source is inherently received by all one-hop receivers, and therefore, there is no need to transmit the message one by one. Reliable multicast in WSNs is desirable for critical tasks like code updation and query based data collection. The erroneous nature of wireless medium coupled with limited resource of sensor nodes, makes the design of reliable multicast protocol a challenging task. In this work, we propose a time division multiple access (TDMA) based energy aware media access and control (TEA-MAC) protocol for reliable multicast in WSNs. The TDMA eliminates collisions, overhearing and idle listening, which are the main sources of reliability degradation and energy consumption. Furthermore, the proposed protocol is parametric in the sense that it can be used to trade-off reliability with energy and delay as per the requirement of the underlying applications. The performance of TEA-MAC has been evaluated by simulating it using Castalia network simulator. Simulation results show that TEA-MAC is able to considerably improve the performance of multicast communication in WSNs.
Resumo:
This paper presents the development and application of a stochastic dynamic programming model with fuzzy state variables for irrigation of multiple crops. A fuzzy stochastic dynamic programming (FSDP) model is developed in which the reservoir storage and soil moisture of the crops are considered as fuzzy numbers, and the reservoir inflow is considered as a stochastic variable. The model is formulated with an objective of minimizing crop yield deficits, resulting in optimal water allocations to the crops by maintaining storage continuity and soil moisture balance. The standard fuzzy arithmetic method is used to solve all arithmetic equations with fuzzy numbers, and the fuzzy ranking method is used to compare two or more fuzzy numbers. The reservoir operation model is integrated with a daily-based water allocation model, which results in daily temporal variations of allocated water, soil moisture, and crop deficits. A case study of an existing Bhadra reservoir in Karnataka, India, is chosen for the model application. The FSDP is a more realistic model because it considers the uncertainty in discretization of state variables. The results obtained using the FSDP model are found to be more acceptable for the case study than those of the classical stochastic dynamic model and the standard operating model, in terms of 10-day releases from the reservoir and evapotranspiration deficit. (C) 2015 American Society of Civil Engineers.
Resumo:
Clock synchronization in a wireless sensor network (WSN) is quite essential as it provides a consistent and a coherent time frame for all the nodes across the network. Typically, clock synchronization is achieved by message passing using a contention-based scheme for media access, like carrier sense multiple access (CSMA). The nodes try to synchronize with each other, by sending synchronization request messages. If many nodes try to send messages simultaneously, contention-based schemes cannot efficiently avoid collisions. In such a situation, there are chances of collisions, and hence, message losses, which, in turn, affects the convergence of the synchronization algorithms. However, the number of collisions can be reduced with a frame based approach like time division multiple access (TDMA) for message passing. In this paper, we propose a design to utilize TDMA-based media access and control (MAC) protocol for the performance improvement of clock synchronization protocols. The basic idea is to use TDMA-based transmissions when the degree of synchronization improves among the sensor nodes during the execution of the clock synchronization algorithm. The design significantly reduces the collisions among the synchronization protocol messages. We have simulated the proposed protocol in Castalia network simulator. The simulation results show that the proposed protocol significantly reduces the time required for synchronization and also improves the accuracy of the synchronization algorithm.
Resumo:
Executing authenticated computation on outsourced data is currently an area of major interest in cryptology. Large databases are being outsourced to untrusted servers without appreciable verification mechanisms. As adversarial server could produce erroneous output, clients should not trust the server's response blindly. Primitive set operations like union, set difference, intersection etc. can be invoked on outsourced data in different concrete settings and should be verifiable by the client. One such interesting adaptation is to authenticate email search result where the untrusted mail server has to provide a proof along with the search result. Recently Ohrimenko et al. proposed a scheme for authenticating email search. We suggest significant improvements over their proposal in terms of client computation and communication resources by properly recasting it in two-party settings. In contrast to Ohrimenko et al. we are able to make the number of bilinear pairing evaluation, the costliest operation in verification procedure, independent of the result set cardinality for union operation. We also provide an analytical comparison of our scheme with their proposal which is further corroborated through experiments.
Resumo:
The nodes with dynamicity, and management without administrator are key features of mobile ad hoc networks (1VIANETs). Increasing resource requirements of nodes running different applications, scarcity of resources, and node mobility in MANETs are the important issues to be considered in allocation of resources. Moreover, management of limited resources for optimal allocation is a crucial task. In our proposed work we discuss a design of resource allocation protocol and its performance evaluation. The proposed protocol uses both static and mobile agents. The protocol does the distribution and parallelization of message propagation (mobile agent with information) in an efficient way to achieve scalability and speed up message delivery to the nodes in the sectors of the zones of a MANET. The protocol functionality has been simulated using Java Agent Development Environment (JADE) Framework for agent generation, migration and communication. A mobile agent migrates from central resource rich node with message and navigate autonomously in the zone of network until the boundary node. With the performance evaluation, it has been concluded that the proposed protocol consumes much less time to allocate the required resources to the nodes under requirement, utilize less network resources and increase the network scalability. (C) 2015 Elsevier B.V. All rights reserved.
Resumo:
A short-term real-time operation model with fuzzy state variables is developed for irrigation of multiple crops based on earlier work on long-term steady-state policy. The features of the model that distinguish it from the earlier work are (1) apart from inclusion of fuzziness in reservoir storage and in soil moisture of crops, spatial variations in rainfall and soil moisture of crops are included in the real-time operation model by considering gridded command area with a grid size of 0.5 degrees latitude by 0.5 degrees longitude; (2) the water allocation model and soil moisture balance equations are integrated with the real-time operation model with consideration of ponding water depth for Paddy crop; the model solution specifies reservoir releases for irrigation in a 10-day time period and allocations among the crops on a daily basis at each grid by maintaining soil moisture balance at the end of the day; and (3) the release policy is developed using forecasted daily rainfall data of each grid and is implemented for the current time period using actual 10-day inflow and actual daily rainfall of each grid. The real-time operation model is applied to Bhadra Reservoir in Karnataka, India. The results obtained using the real-time operation model are compared with those of the standard operating policy model. Inclusion of fuzziness in reservoir storage and soil moisture of crops captures hydrologic uncertainties in real time. Considerations of irrigation decisions on a daily basis and the gridded command area result in variations in allocating water to the crops, variations in actual crop evapotranspiration, and variations in soil moisture of the crops on a daily basis for each grid of the command area. (C) 2015 American Society of Civil Engineers.