Energy Technology and Management

Total Page:16

File Type:pdf, Size:1020Kb

Energy Technology and Management ENERGY TECHNOLOGY AND MANAGEMENT Edited by Tauseef Aized Energy Technology and Management Edited by Tauseef Aized Published by InTech Janeza Trdine 9, 51000 Rijeka, Croatia Copyright © 2011 InTech All chapters are Open Access articles distributed under the Creative Commons Non Commercial Share Alike Attribution 3.0 license, which permits to copy, distribute, transmit, and adapt the work in any medium, so long as the original work is properly cited. After this work has been published by InTech, authors have the right to republish it, in whole or part, in any publication of which they are the author, and to make other personal use of the work. Any republication, referencing or personal use of the work must explicitly identify the original source. Statements and opinions expressed in the chapters are these of the individual contributors and not necessarily those of the editors or publisher. No responsibility is accepted for the accuracy of information contained in the published articles. The publisher assumes no responsibility for any damage or injury to persons or property arising out of the use of any materials, instructions, methods or ideas contained in the book. Publishing Process Manager Iva Simcic Technical Editor Teodora Smiljanic Cover Designer Jan Hyrat Image Copyright Sideways Design, 2011. Used under license from Shutterstock.com First published September, 2011 Printed in Croatia A free online edition of this book is available at www.intechopen.com Additional hard copies can be obtained from [email protected] Energy Technology and Management, Edited by Tauseef Aized p. cm. ISBN 978-953-307-742-0 free online editions of InTech Books and Journals can be found at www.intechopen.com Contents Preface IX Part 1 Energy Technology 1 Chapter 1 Centralizing the Power Saving Mode for 802.11 Infrastructure Networks 3 Yi Xie, Xiapu Luo and Rocky K. C. Chang Chapter 2 A Study on Design of Fiber-Reinforced Plastic (FRP) Tubes as Energy Absorption Element in Vehicles 25 Yuqiu Yang and Hiroyuki Hamada Chapter 3 Optimal Feeder Reconfiguration with Distributed Generation in Three-Phase Distribution System by Fuzzy Multiobjective and Tabu Search 59 Nattachote Rugthaicharoencheep and Somporn Sirisumranukul Chapter 4 Energy Managements in the Chemical and Biochemical World, as It may be Understood from the Systems Chemistry Point of View 79 Zoltán Mucsi, Péter Ábrányi Balogh, Béla Viskolcz and Imre G. Csizmadia Chapter 5 Energy Planning for Distributed Generation Energy System: The Optimization Work 111 Behdad Kiani Chapter 6 Network Reconfiguration for Distribution System with Micro-Grid 125 Yu Xiaodan, Chen Huanfei, Liu Zhao and Jia Hongjie Chapter 7 A Camera-Based Energy Management of Computer Displays and TV Sets 137 Vasily G. Moshnyaga VI Contents Chapter 8 Enhancement of Power System State Estimation 157 Bei Gou and Weibiao Wu Chapter 9 Smart Home Services for a Smart Grid 171 Young-Myoung Kim and Young-Woo Lee Part 2 Energy Management 185 Chapter 10 Management Crisis in Partial Deregulation of Energy Sector and Modeling the Technical and Economic Results of Organizational Management Structure 187 Joseph Yakubu Oricha Chapter 11 Methodology Development for a Comprehensive and Cost-Effective Energy Management in Public Administrations 201 Capobianchi Simona, Andreassi Luca, Introna Vito, Martini Fabrizio and Ubertini Stefano Preface Energy is one of the most important issue of modern civilization. All material developments are strongly linked with energy availability and efficient utilization. Unfortunately, energy resources are not unlimited, especially conventional energy resources are depleting at an enormous pace. Hence, efficient utilization of available resources and development of new energy resources are extremely important in order to maintain material development of human civilization. Energy management, saving and efficient utilization are important in the backdrop of current energy shortfalls. Additionally, energy studies have a wider scope than merely concentrating on technological issues of energy resource development and also include energy policy and planning issues. This book is compiled to address both technology and policy issues and presents a collection of articles from experts belonging to different parts of the world. The articles range from policy to technological issues of energy development and efficient utilization. In order to comprehend this book, some background of energy related issues is required. Students, researchers, academics, policy makers and practitioners may get benefit from this book. Prof. Tauseef Aized University of Engineering and Technology (UET) Lahore Pakistan Part 1 Energy Technology 10 Centralizing the Power Saving Mode for 802.11 Infrastructure Networks Yi Xie1, Xiapu Luo2 and Rocky K. C. Chang2 1Department of Computer Science, Xiamen University 2Department of Computing, The Hong Kong Polytechnic University 1China 2Hong Kong, SAR China 1. Introduction With the rapid development of wireless networks, efficient energy management for wireless LAN (WLAN) has become an important problem, because mobile devices’ availability is determined by their stringent batteries power. Quite a few sources of energy consumption have been identified (Narseo et al., 2010), among which the wireless communication component uses up a significant amount of energy. For instance, the Motorola Droid phone consumes around 200mW with the backlight off, close to 400mW with the backlight on, and over 800mW when the Wi-Fi radio is active (Zeng et al., 2011). This chapter focuses on improving the energy efficiency of wireless communication component, because they may consume up to 50% of the total energy. Various mechanisms have been proposed to balance between communication quality and energy consumption for wireless devices, for example, power saving mode (PSM) that puts an idle client into a low-power mode (Gast, 2005), transmission power control (Nuggehalli et al., 2002), packet transmission scheduling (Qiao et al., 2003; Tarello et al., 2005), and some cross-layer methods (Anastasi et al., 2007). They investigate the trade-off between energy consumption and throughput (Gao et al., 2010; Zhang & Chanson, 2003), delay (Guha et al., 2010; Nuggehalli et al., 2002; 2006), or network utility (Chiang & Bell, 2004). In this chapter, we propose a centralized PSM (C-PSM), an AP-centric deployment of the IEEE 802.11 PSM, to optimize power saving and multiple performance metrics for infrastructure networks which are widely deployed in enterprise, campus, and metropolitan networks. In these networks, wireless clients (e.g., laptops, PDAs and mobile phones) using the IEEE 802.11 infrastructure mode connect to the Internet through an access point (AP). The experiment results show that significant improvements can be obtained from the new deployment of C-PSM. The IEEE 802.11 PSM, widely used in WLAN, allows an idle client to go into a sleep mode. Hereafter, we use PSM to refer to the IEEE 802.11 PSM. The clients save energy by sleeping while wakes up periodically to receive beacon frames from AP. The beacon frame, sent by an access point (AP) every beacon interval (BI), indicates whether clients have frames buffered at the AP. Each client’s wake-up frequency is determined by a PSM parameter listen interval (LI). Both BI and LI are configurable, and their settings directly influence the PSM’s performance shown by the analysis of section 4. Unfortunately, the protocol does not prescribe how the BI 42 Energy Technology andWill-be-set-by-IN-TECH Management and LI should be configured in PSM; therefore, default values are often used. Obviously, the PSM using default settings cannot adapt to the traffic and configuration dynamics inherent in typical wireless networks. Worse yet, the PSM was reported to have adverse impact on application performance, such as short TCP connections (Krashinsky & Balakrishnan, 2005). To address these shortcomings, a number of new power-saving schemes that put idle clients into sleep have been proposed. A class of them (e.g., (Nath et al., 2004); (Qiao & Shin, 2005); (Krashinsky & Balakrishnan, 2005)) enables each client to save energy by reducing the number of unnecessary wake-ups ( i.e., design an optimal wake-up schedule). These user-centric schemes, however, do not address energy consumption due to channel contention which, as we will show in section 3, is another major source of energy wastage. Another class adopts an AP-centric approach which exploits AP to improve the energy efficiency of all clients in the network. Within this class, some schemes design a packet transmission schedule to minimize channel contention (e.g., (Lin et al., 2006); (He et al., 2007); (Zeng et al., 2011)). Others redesign beacon frame and poll clients one by one, which totally avoids channel contention (Lee et al., 2006). However, most AP-centric schemes are not compatible with the standard PSM scheme or difficult to implement, because they employ precise transmission schedule. Unlike the previous works on the power saving mode (PSM), our C-PSM optimizes the beacon interval, listen interval, minimal congestion window, and sequence of first wake-up time for each device according to the traffic characteristics. Firstly, the AP chooses the optimal BI and LIs for clients based on the pattern of arriving packets to reduce energy consumption due to both unnecessary wake-ups and channel contentions. Especially, the energy wasted in channel contentions could be very significant, because all clients involved cannot go to sleep throughout the contention period which could be very long. Secondly, the AP assigns congestion windows to the clients which are involved in collisions, such that a client that wakes up less frequently will be able to retransmit earlier. Finally, C-PSM provides an additional wakeup schedule to further reduce simultaneous wakeups of clients. Having the AP control the PSM parameters, C-PSM is therefore able to maximize the total energy efficiency for all clients and facilitates various aspects of network management and operations. Our extensive simulation results show that the C-PSM is very promising under four traditional distributions of inter-frame arrival times: deterministic, uniform, exponential, and Pareto.
Recommended publications
  • A Survey of Network Performance Monitoring Tools
    A Survey of Network Performance Monitoring Tools Travis Keshav -- [email protected] Abstract In today's world of networks, it is not enough simply to have a network; assuring its optimal performance is key. This paper analyzes several facets of Network Performance Monitoring, evaluating several motivations as well as examining many commercial and public domain products. Keywords: network performance monitoring, application monitoring, flow monitoring, packet capture, sniffing, wireless networks, path analysis, bandwidth analysis, network monitoring platforms, Ethereal, Netflow, tcpdump, Wireshark, Ciscoworks Table Of Contents 1. Introduction 2. Application & Host-Based Monitoring 2.1 Basis of Application & Host-Based Monitoring 2.2 Public Domain Application & Host-Based Monitoring Tools 2.3 Commercial Application & Host-Based Monitoring Tools 3. Flow Monitoring 3.1 Basis of Flow Monitoring 3.2 Public Domain Flow Monitoring Tools 3.3 Commercial Flow Monitoring Protocols 4. Packet Capture/Sniffing 4.1 Basis of Packet Capture/Sniffing 4.2 Public Domain Packet Capture/Sniffing Tools 4.3 Commercial Packet Capture/Sniffing Tools 5. Path/Bandwidth Analysis 5.1 Basis of Path/Bandwidth Analysis 5.2 Public Domain Path/Bandwidth Analysis Tools 6. Wireless Network Monitoring 6.1 Basis of Wireless Network Monitoring 6.2 Public Domain Wireless Network Monitoring Tools 6.3 Commercial Wireless Network Monitoring Tools 7. Network Monitoring Platforms 7.1 Basis of Network Monitoring Platforms 7.2 Commercial Network Monitoring Platforms 8. Conclusion 9. References and Acronyms 1.0 Introduction http://www.cse.wustl.edu/~jain/cse567-06/ftp/net_perf_monitors/index.html 1 of 20 In today's world of networks, it is not enough simply to have a network; assuring its optimal performance is key.
    [Show full text]
  • Free and Open Source Software for Computational Chemistry Education
    Free and Open Source Software for Computational Chemistry Education Susi Lehtola∗,y and Antti J. Karttunenz yMolecular Sciences Software Institute, Blacksburg, Virginia 24061, United States zDepartment of Chemistry and Materials Science, Aalto University, Espoo, Finland E-mail: [email protected].fi Abstract Long in the making, computational chemistry for the masses [J. Chem. Educ. 1996, 73, 104] is finally here. We point out the existence of a variety of free and open source software (FOSS) packages for computational chemistry that offer a wide range of functionality all the way from approximate semiempirical calculations with tight- binding density functional theory to sophisticated ab initio wave function methods such as coupled-cluster theory, both for molecular and for solid-state systems. By their very definition, FOSS packages allow usage for whatever purpose by anyone, meaning they can also be used in industrial applications without limitation. Also, FOSS software has no limitations to redistribution in source or binary form, allowing their easy distribution and installation by third parties. Many FOSS scientific software packages are available as part of popular Linux distributions, and other package managers such as pip and conda. Combined with the remarkable increase in the power of personal devices—which rival that of the fastest supercomputers in the world of the 1990s—a decentralized model for teaching computational chemistry is now possible, enabling students to perform reasonable modeling on their own computing devices, in the bring your own device 1 (BYOD) scheme. In addition to the programs’ use for various applications, open access to the programs’ source code also enables comprehensive teaching strategies, as actual algorithms’ implementations can be used in teaching.
    [Show full text]
  • A DATA-ORIENTED NETWORK ARCHITECTURE Doctoral Dissertation
    TKK Dissertations 140 Espoo 2008 A DATA-ORIENTED NETWORK ARCHITECTURE Doctoral Dissertation Teemu Koponen Helsinki University of Technology Faculty of Information and Natural Sciences Department of Computer Science and Engineering TKK Dissertations 140 Espoo 2008 A DATA-ORIENTED NETWORK ARCHITECTURE Doctoral Dissertation Teemu Koponen Dissertation for the degree of Doctor of Science in Technology to be presented with due permission of the Faculty of Information and Natural Sciences for public examination and debate in Auditorium T1 at Helsinki University of Technology (Espoo, Finland) on the 2nd of October, 2008, at 12 noon. Helsinki University of Technology Faculty of Information and Natural Sciences Department of Computer Science and Engineering Teknillinen korkeakoulu Informaatio- ja luonnontieteiden tiedekunta Tietotekniikan laitos Distribution: Helsinki University of Technology Faculty of Information and Natural Sciences Department of Computer Science and Engineering P.O. Box 5400 FI - 02015 TKK FINLAND URL: http://cse.tkk.fi/ Tel. +358-9-4511 © 2008 Teemu Koponen ISBN 978-951-22-9559-3 ISBN 978-951-22-9560-9 (PDF) ISSN 1795-2239 ISSN 1795-4584 (PDF) URL: http://lib.tkk.fi/Diss/2008/isbn9789512295609/ TKK-DISS-2510 Picaset Oy Helsinki 2008 AB ABSTRACT OF DOCTORAL DISSERTATION HELSINKI UNIVERSITY OF TECHNOLOGY P. O. BOX 1000, FI-02015 TKK http://www.tkk.fi Author Teemu Koponen Name of the dissertation A Data-Oriented Network Architecture Manuscript submitted 09.06.2008 Manuscript revised 12.09.2008 Date of the defence 02.10.2008 Monograph X Article dissertation (summary + original articles) Faculty Information and Natural Sciences Department Computer Science and Engineering Field of research Networking Opponent(s) Professor Jon Crowcroft Supervisor Professor Antti Ylä-Jääski Instructor(s) Dr.
    [Show full text]
  • An Introduction
    This chapter is from Social Media Mining: An Introduction. By Reza Zafarani, Mohammad Ali Abbasi, and Huan Liu. Cambridge University Press, 2014. Draft version: April 20, 2014. Complete Draft and Slides Available at: http://dmml.asu.edu/smm Chapter 10 Behavior Analytics What motivates individuals to join an online group? When individuals abandon social media sites, where do they migrate to? Can we predict box office revenues for movies from tweets posted by individuals? These questions are a few of many whose answers require us to analyze or predict behaviors on social media. Individuals exhibit different behaviors in social media: as individuals or as part of a broader collective behavior. When discussing individual be- havior, our focus is on one individual. Collective behavior emerges when a population of individuals behave in a similar way with or without coordi- nation or planning. In this chapter we provide examples of individual and collective be- haviors and elaborate techniques used to analyze, model, and predict these behaviors. 10.1 Individual Behavior We read online news; comment on posts, blogs, and videos; write reviews for products; post; like; share; tweet; rate; recommend; listen to music; and watch videos, among many other daily behaviors that we exhibit on social media. What are the types of individual behavior that leave a trace on social media? We can generally categorize individual online behavior into three cate- gories (shown in Figure 10.1): 319 Figure 10.1: Individual Behavior. 1. User-User Behavior. This is the behavior individuals exhibit with re- spect to other individuals. For instance, when befriending someone, sending a message to another individual, playing games, following, inviting, blocking, subscribing, or chatting, we are demonstrating a user-user behavior.
    [Show full text]
  • RESOURCES in NUMERICAL ANALYSIS Kendall E
    RESOURCES IN NUMERICAL ANALYSIS Kendall E. Atkinson University of Iowa Introduction I. General Numerical Analysis A. Introductory Sources B. Advanced Introductory Texts with Broad Coverage C. Books With a Sampling of Introductory Topics D. Major Journals and Serial Publications 1. General Surveys 2. Leading journals with a general coverage in numerical analysis. 3. Other journals with a general coverage in numerical analysis. E. Other Printed Resources F. Online Resources II. Numerical Linear Algebra, Nonlinear Algebra, and Optimization A. Numerical Linear Algebra 1. General references 2. Eigenvalue problems 3. Iterative methods 4. Applications on parallel and vector computers 5. Over-determined linear systems. B. Numerical Solution of Nonlinear Systems 1. Single equations 2. Multivariate problems C. Optimization III. Approximation Theory A. Approximation of Functions 1. General references 2. Algorithms and software 3. Special topics 4. Multivariate approximation theory 5. Wavelets B. Interpolation Theory 1. Multivariable interpolation 2. Spline functions C. Numerical Integration and Differentiation 1. General references 2. Multivariate numerical integration IV. Solving Differential and Integral Equations A. Ordinary Differential Equations B. Partial Differential Equations C. Integral Equations V. Miscellaneous Important References VI. History of Numerical Analysis INTRODUCTION Numerical analysis is the area of mathematics and computer science that creates, analyzes, and implements algorithms for solving numerically the problems of continuous mathematics. Such problems originate generally from real-world applications of algebra, geometry, and calculus, and they involve variables that vary continuously; these problems occur throughout the natural sciences, social sciences, engineering, medicine, and business. During the second half of the twentieth century and continuing up to the present day, digital computers have grown in power and availability.
    [Show full text]
  • Three-Dimensional Integrated Circuit Design: EDA, Design And
    Integrated Circuits and Systems Series Editor Anantha Chandrakasan, Massachusetts Institute of Technology Cambridge, Massachusetts For other titles published in this series, go to http://www.springer.com/series/7236 Yuan Xie · Jason Cong · Sachin Sapatnekar Editors Three-Dimensional Integrated Circuit Design EDA, Design and Microarchitectures 123 Editors Yuan Xie Jason Cong Department of Computer Science and Department of Computer Science Engineering University of California, Los Angeles Pennsylvania State University [email protected] [email protected] Sachin Sapatnekar Department of Electrical and Computer Engineering University of Minnesota [email protected] ISBN 978-1-4419-0783-7 e-ISBN 978-1-4419-0784-4 DOI 10.1007/978-1-4419-0784-4 Springer New York Dordrecht Heidelberg London Library of Congress Control Number: 2009939282 © Springer Science+Business Media, LLC 2010 All rights reserved. This work may not be translated or copied in whole or in part without the written permission of the publisher (Springer Science+Business Media, LLC, 233 Spring Street, New York, NY 10013, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed is forbidden. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com) Foreword We live in a time of great change.
    [Show full text]
  • Learning to Predict End-To-End Network Performance
    CORE Metadata, citation and similar papers at core.ac.uk Provided by BICTEL/e - ULg UNIVERSITÉ DE LIÈGE Faculté des Sciences Appliquées Institut d’Électricité Montefiore RUN - Research Unit in Networking Learning to Predict End-to-End Network Performance Yongjun Liao Thèse présentée en vue de l’obtention du titre de Docteur en Sciences de l’Ingénieur Année Académique 2012-2013 ii iii Abstract The knowledge of end-to-end network performance is essential to many Internet applications and systems including traffic engineering, content distribution networks, overlay routing, application- level multicast, and peer-to-peer applications. On the one hand, such knowledge allows service providers to adjust their services according to the dynamic network conditions. On the other hand, as many systems are flexible in choosing their communication paths and targets, knowing network performance enables to optimize services by e.g. intelligent path selection. In the networking field, end-to-end network performance refers to some property of a network path measured by various metrics such as round-trip time (RTT), available bandwidth (ABW) and packet loss rate (PLR). While much progress has been made in network measurement, a main challenge in the acquisition of network performance on large-scale networks is the quadratical growth of the measurement overheads with respect to the number of network nodes, which ren- ders the active probing of all paths infeasible. Thus, a natural idea is to measure a small set of paths and then predict the others where there are no direct measurements. This understanding has motivated numerous research on approaches to network performance prediction.
    [Show full text]
  • Development of Electrochemical Methods for Detection of Pesticides and Biofuel
    Development of Electrochemical Methods for Detection of Pesticides and Biofuel Production Asli Sahin Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2012 © 2012 Asli Sahin All Rights Reserved ABSTRACT Development of Electrochemical Methods for Detection of Pesticides and Biofuel Production Asli Sahin Electrochemical methods coupled with biological elements are used in industrial, medical and environmental applications. In this thesis we will discuss two such applications: an electrochemical biosensor for detection of pesticides and biofuel generation using electrochemical methods coupled with microorganisms. Electrochemical biosensors are commonly used as a result of their selectivity, sensitivity, rapid response and portability. A common application for electrochemical biosensors is detection of pesticides and toxins in water samples. In this thesis, we will focus on detection of organosphosphates (OPs), a group of compounds that are commonly used as pesticides and nerve agents. Rapid and sensitive detection of these compounds has been an area of active research due to their high toxicity. Amperometric and potentiometric electrochemical biosensors that use organophosphorus hydrolase (OPH), an enzyme that can hydrolyze a broad class of OPs, have been reported for field detection of OPs. Amperometry is used for detection of electroactive leaving groups and potentiometry is used for detection of pH changes that take place during the hydrolysis reaction. Both these methods have limitations: using amperometric biosensors, very low limits of detection are achieved but this method is limited to the few OPs with electroactive leaving groups, on the other hand potentiometric biosensor can be used for detection of all OPs but they don’t have low enough limits of detection.
    [Show full text]
  • Computational Chemistry
    G UEST E DITORS’ I NTRODUCTION COMPUTATIONAL CHEMISTRY omputational chemistry has come of chemical, physical, and biological phenomena. age. With significant strides in com- The Nobel Prize award to John Pople and Wal- puter hardware and software over ter Kohn in 1998 highlighted the importance of the last few decades, computational these advances in computational chemistry. Cchemistry has achieved full partnership with the- With massively parallel computers capable of ory and experiment as a tool for understanding peak performance of several teraflops already on and predicting the behavior of a broad range of the scene and with the development of parallel software for efficient exploitation of these high- end computers, we can anticipate that computa- tional chemistry will continue to change the scientific landscape throughout the coming cen- tury. The impact of these advances will be broad and encompassing, because chemistry is so cen- tral to the myriad of advances we anticipate in areas such as materials design, biological sci- ences, and chemical manufacturing. Application areas Materials design is very broad in scope. It ad- dresses a diverse range of compositions of matter that can better serve structural and functional needs in all walks of life. Catalytic design is one such example that clearly illustrates the promise and challenges of computational chemistry. Al- most all chemical reactions of industrial or bio- chemical significance are catalytic. Yet, catalysis is still more of an art (at best) or an empirical fact than a design science. But this is sure to change. A recent American Chemical Society Sympo- sium volume on transition state modeling in catalysis illustrates its progress.1 This sympo- sium highlighted a significant development in the level of modeling that researchers are em- 1521-9615/00/$10.00 © 2000 IEEE ploying as they focus more and more on the DONALD G.
    [Show full text]
  • Outline of Physical Science
    Outline of physical science “Physical Science” redirects here. It is not to be confused • Astronomy – study of celestial objects (such as stars, with Physics. galaxies, planets, moons, asteroids, comets and neb- ulae), the physics, chemistry, and evolution of such Physical science is a branch of natural science that stud- objects, and phenomena that originate outside the atmosphere of Earth, including supernovae explo- ies non-living systems, in contrast to life science. It in turn has many branches, each referred to as a “physical sions, gamma ray bursts, and cosmic microwave background radiation. science”, together called the “physical sciences”. How- ever, the term “physical” creates an unintended, some- • Branches of astronomy what arbitrary distinction, since many branches of physi- cal science also study biological phenomena and branches • Chemistry – studies the composition, structure, of chemistry such as organic chemistry. properties and change of matter.[8][9] In this realm, chemistry deals with such topics as the properties of individual atoms, the manner in which atoms form 1 What is physical science? chemical bonds in the formation of compounds, the interactions of substances through intermolecular forces to give matter its general properties, and the Physical science can be described as all of the following: interactions between substances through chemical reactions to form different substances. • A branch of science (a systematic enterprise that builds and organizes knowledge in the form of • Branches of chemistry testable explanations and predictions about the • universe).[1][2][3] Earth science – all-embracing term referring to the fields of science dealing with planet Earth. Earth • A branch of natural science – natural science science is the study of how the natural environ- is a major branch of science that tries to ex- ment (ecosphere or Earth system) works and how it plain and predict nature’s phenomena, based evolved to its current state.
    [Show full text]
  • Network‐Based Approaches for Pathway Level Analysis
    Network-Based Approaches for Pathway UNIT 8.25 Level Analysis Tin Nguyen,1 Cristina Mitrea,2 and Sorin Draghici2,3 1Department of Computer Science and Engineering, University of Nevada, Reno, Nevada 2Department of Computer Science, Wayne State University, Detroit, Michigan 3Department of Obstetrics and Gynecology, Wayne State University, Detroit, Michigan Identification of impacted pathways is an important problem because it allows us to gain insights into the underlying biology beyond the detection of differ- entially expressed genes. In the past decade, a plethora of methods have been developed for this purpose. The last generation of pathway analysis methods are designed to take into account various aspects of pathway topology in order to increase the accuracy of the findings. Here, we cover 34 such topology-based pathway analysis methods published in the past 13 years. We compare these methods on categories related to implementation, availability, input format, graph models, and statistical approaches used to compute pathway level statis- tics and statistical significance. We also discuss a number of critical challenges that need to be addressed, arising both in methodology and pathway repre- sentation, including inconsistent terminology, data format, lack of meaningful benchmarks, and, more importantly, a systematic bias that is present in most existing methods. C 2018 by John Wiley & Sons, Inc. Keywords: systems biology r pathway r topology r gene network r survey r pathway analysis How to cite this article: Nguyen, T., Mitrea, C., & Draghici, S. (2018). Network-based approaches for pathway level analysis. Current Protocols in Bioinformatics, 61, 8.25.1–8.25.24. doi: 10.1002/cpbi.42 INTRODUCTION this gap is the fact that living organisms are With rapid advances in high-throughput complex systems whose emerging phenotypes technologies, various kinds of genomic are the results of multiple complex interactions data have become prevalent in most of taking place on various metabolic and signal- biomedical research.
    [Show full text]
  • Architecture of Low Duty-Cycle Mechanisms Nadjib Aitsaadi, Paul Muhlethaler, Mohamed-Haykel Zayani
    Architecture of low duty-cycle mechanisms Nadjib Aitsaadi, Paul Muhlethaler, Mohamed-Haykel Zayani To cite this version: Nadjib Aitsaadi, Paul Muhlethaler, Mohamed-Haykel Zayani. Architecture of low duty-cycle mecha- nisms. 2014. hal-01068788 HAL Id: hal-01068788 https://hal.archives-ouvertes.fr/hal-01068788 Submitted on 26 Sep 2014 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. GETRF delivrable 4: Architecture of low duty-cycle mechanisms Nadjib Aitsaadi, Paul M¨uhlethaler, Mohamed-Haykel Zayani Hipercom Project-Team Inria Paris-Rocquencourt February 2014 1 Contents 1 Introduction 4 2 Principlesofthearchitecture 5 2.1 Routingprotocols......................... 5 2.2 MACrendezvousprotocols. 6 2.2.1 Sender-oriented rendezvous algorithm . 6 2.2.2 Receiver-oriented rendezvous algorithms . 9 2.3 Building a low duty-cycle protocol in multihop wireless networks 9 3 Descriptionofourcontributions 10 3.1 Receiver-orientedproposal . 10 3.1.1 Description ........................ 10 3.1.2 Analyticalmodel . 12 3.1.3 Simulationresults. 15 3.2 Sender-orientedproposal . 24 3.2.1 Description ........................ 24 3.2.2 Analyticalmodel . 27 3.2.3 Simulationresults. 28 3.3 Comparisonanddiscussion . 32 4 Conclusion 34 2 3 1 Introduction A Wireless Sensor Network (WSN) is composed of sensor nodes deployed within an area to monitor predefined phenomena (e.g.
    [Show full text]